top of page


The AI agent crawls from the nest to his kingdom
These days, the key question is no longer about an AI agent’s ability. It’s about his behavior and the AI agents communities; yeah, nowadays they have their social community, all thanks to OpenClaw, and how they might impact our security and policies. As an intelligent, crazy idea, OpenClaw has established a Moltbook, which is an experimental AI agent social platform exploring the shift from AI as an assistant to AI as an autonomous actor. Moltbook is a platform for autonomou
Laila Alahaideb
Feb 43 min read


Make your agent
To keep up to date and catch up on the volume of cyber news, rather than consuming time manually tracking, filtering, and summarizing threats, it has become inefficient and error-prone due to the distraction caused by multiple email subscriptions across different domains. I currently subscribe to dozens of newsletters, but reading them all daily takes more time than I have. The best proposal is to create a unified channel that aggregates news in one place, providing concise,
Laila Alahaideb
Jan 82 min read


Heavy PIE for a safe life
PIE is a delicious dish with various recipes, depending on the baker's choice and needs. Generally, a grandma with life experience knows which recipe for a PIE is full of flavor and baked with love, filling us with lovely, secure memories. AS WELL AS PIEs in computer security. PIE refers to a Position Independent Executable, a type of program binary that can be loaded and executed at any memory address, rather than a fixed location. PIE enhances Address Space Layout Randomiz
Laila Alahaideb
Dec 27, 20252 min read


The Lifeblood of the Modern World
Data is the lifeblood of the modern world. In an age where information is power, harnessing and analyzing data is crucial for success. From tracking consumer trends to predicting market fluctuations, data empowers us to make informed decisions and unlock valuable insights. In this fast-paced digital era, the impact of data is undeniable, and its potential is limitless. In this blog, we will focus on Data as a managed asset, which organizations manage and control at the techni
Laila Alahaideb
Dec 17, 20255 min read


Sharing is caring, but not when it comes to cookies!
Sharing cookies can lead to several potential risks and privacy issues thus you should be mindful of how you handle cookies and share them to protect your privacy and security while browsing the web; the privacy concerns surrounding cookies primarily revolve around personal information and tracking, hence cookies can monitor your browsing habits and preferences, potentially exposing your history to third parties. Furthermore, some cookies store sensitive data, such as login
Laila Alahaideb
Dec 17, 20243 min read


Stuxnet Computer Worm
The fascinating story of Stuxnet, a super sneaky computer worm discovered in 2010 but thought to have been in development since 2005....
Laila Alahaideb
Aug 27, 20242 min read


Fall into my trap by landing on a fake website
Imagine a scenario where a malicious entity launches a Man-In-The-Middle (MITM) Attack with a Compromised Certificate Authority (CA)....
Laila Alahaideb
Aug 19, 20244 min read


BGP Hijacking
BGP is the Border Gateway Protocol. It is the protocol used to carry the best paths for sending data across autonomous systems (ASes). An...
Laila Alahaideb
May 14, 20246 min read


Marshmallow
Android, the open-source operating system for mobile devices, is famous for its robust app ecosystem and user-friendly design. Its...
Laila Alahaideb
May 6, 20243 min read


DES algorithm strengths and weaknesses
During the 1970s and 1980s, electronic data encryption often utilized the symmetric key algorithm called the Data Encryption Standard...
Laila Alahaideb
Jan 26, 20242 min read


Information Security Policy
Information Security, also known as InfoSec, refers to the policies, processes, and tools designed and deployed to protect sensitive...
Laila Alahaideb
Jan 7, 20242 min read


Cognitive Computing
Cognitive Computing is a branch of computer science widely related to the Artificial Intelligence (AI) concept and refers to a range of...
Laila Alahaideb
Nov 3, 20222 min read


The fifth generation
In the human lifecycle, the firstborn babies came into the world with no skills, then they start monitoring the environment around them,...
Laila Alahaideb
Oct 27, 20222 min read


The most interesting Technology
Quantum computer When I say quantum what’s the first thing that comes to your mind? Your answer will show your major or your era of...
Laila Alahaideb
Oct 5, 20222 min read


Cloud Computing
Cloud computing is a computer system delivered via the Internet without direct active supervision by the user, in particular, data...
Laila Alahaideb
Sep 27, 20222 min read


Across 4 generations
From vacuum tups to quantum Over the centuries, all computers have interacted with bits either 0 or 1, which share one thing in common,...
Laila Alahaideb
Sep 7, 20223 min read


CS432 - Network Security Course Project
Imagine that I was hired by XSecure, a great cyber security company, to design a secure file-sharing application. The company wants the...
Laila Alahaideb
Dec 9, 20211 min read


BERT in the Arabic Language
BERT is a pre-trained contextual language model that is available for several languages. It has achieved high performance in many NLP...
Laila Alahaideb
Dec 9, 20214 min read


CS445-Compilers Cours Project Program
In java programming language I build a program that acts like a compiler to : 1. Check whether the given input string belongs to the...
Laila Alahaideb
Apr 22, 20211 min read


Regular Expression in compiler
Regular Expression concept! Regular expressions are used to characterize tokens (lexical constructs). A token characterizes a pattern of...
Laila Alahaideb
Mar 2, 20211 min read
bottom of page

