Session Title | Low Hanging Satellite
Malicious actors could abuse vulnerabilities in satellite equipment and communication protocols like backdoors, hard-coded credentials, insecure protocols, and weak encryption algorithms In addition to design flaws.
Ibrahim has gained extensive experience handling various security threats. As a cyber-security researcher Holding a master’s degree in information security from Nile University while working simultaneously in the industry, He has acquired both theoretical and practical knowledge of major security topics, especially in the fields of detection, response, incident handling, and forensics.