Authors Ahmed Amin Product Security Engineer Hazem Hesham Cybersecurity engineer Abdullah Hassan Cybersecurity engineer at ISEC Khaled El-Refa'ei Malware Analyst at EG-CERT