Symmetric Key Encryption Using AES-GCM and External Key Derivation for Smart Phones
2015| International Journal of Computer Networks and Communications Security
Cyber Security Engineer by Morning ,Security Researcher by Night, he worked on many projects in the feild of threat intelligence and digital forensics, he does most of his research in the field of cryptography, writing exploit codes as POCs and helping Open Source Projects. In his free time he writes technical articles, check them on his blog here Click Here .. One more thing, if you need help just Ask.
I am available for paid gigs (code audit, exploit dev, penetration testing, anything interesting).
We can deliver Incident Response Services deliver critical services before/during/after a security incident. we can deliver fast detection, investigation, containment, and return to safe operation for your company.
We can test your company's security by providing a security assesment and try to penetrate your systems. our service include conducting pentration testing to your web application, company's network. and even ad-hoc implementation.
If you develop an application in-house and you are worried about the security of your application we can do a code review and give you the weeknesses in your application with a full report.
If you got attacked by a malware and you want to know the full picture and what is the malware are capable of doing, worry no more and we will do this task for you.
2015| International Journal of Computer Networks and Communications Security
2019| IACR Cryptology
2020| IACR Cryptology
2022 | CVE-2022-37835
Torguard VPN 4.8, has a vulnerability that allows an attacker to dump sensitive information, such as credentials and information about the server, without admin privileges.
2020 | CVE-2020-7213
Parallels 13 uses cleartext HTTP as part of the update process, allowing man-in-the-middle attacks. Users of out-of-date versions are presented with a pop-up window for a parallels_updates.xml file on the http://update.parallels.com web site..
2020 | CVE-2020-27834
A vulnerability was found in Zabbix 5.0.2, where an attacker can use one CSRF token and send request on the user behalf, and the token will be valid in every request.
2019 | CVE-2019-16902
In the ARforms plugin 3.7.1 for WordPress, arf_delete_file in arformcontroller.php allows unauthenticated deletion of an arbitrary file by supplying the full pathname..
Tower Hamlets or mass or members of propaganda bananas real estate. However, a large and a mourning, vel euismod.
Tower Hamlets or mass or members of propaganda bananas real estate. However, a large and a mourning, vel euismod.