{"id":62,"date":"2020-12-03T21:47:54","date_gmt":"2020-12-03T21:47:54","guid":{"rendered":"https:\/\/www.attack-secure.com\/?page_id=62"},"modified":"2020-12-07T08:54:03","modified_gmt":"2020-12-07T08:54:03","slug":"about","status":"publish","type":"page","link":"https:\/\/www.attack-secure.com\/about\/","title":{"rendered":""},"content":{"rendered":"\n
\"\"\/<\/figure>\n\n\n\n\n\n

Mohamed Ramadan<\/h1>\n\n\n\n

Cyber Security Expert<\/p>\n\n\n\n

Welcome! I\u2019m so glad you are here! My name is Mohamed and bug hunting, ethical hacking, penetration testing, forensics, reverse engineering, securing websites are my passion.<\/p><\/blockquote>\n\n\n\n

I found MANY Security Vulnerabilities in Google, Facebook, Twitter, Microsoft, Yandex, Apple, Adobe, Nokia, AT&T, RedHat, SoundCloud, GitHub, Etsy, Nokia Siemens, Zynga, Constant Contact and Coinbase.<\/p><\/blockquote>\n\n\n\n


\n\n\n\n

Keep in touch with me:<\/strong><\/p>\n\n\n\n

Email: <\/strong>admin@attack-secure.com<\/p>\n\n\n\n

Facebook:\u00a0<\/strong>\u00a0AttackSecure<\/a><\/p>\n\n\n\n

Twitter:<\/strong>\u00a0Attack_Secure<\/a><\/p>\n\n\n\n

LinkedIn<\/strong>,\u00a0MohamedRamadan007<\/a><\/p>\n\n\n\n

Google:\u00a0<\/strong>+MohamedRamadan007<\/a><\/p>\n\n\n\n


\n\n\n\n

I helped these companies and their users and customers to be safe and secure<\/h2>\n\n\n\n

Paypal, Facebook, Google. Twitter, Apple and Many More.<\/h3>\n\n\n\n
\"\"\/<\/figure>\n\n\n\n
\n\n\n\n

Media Appearance<\/h2>\n\n\n\n

I am a Special guest in many popular TalkShow Programs in Arabic World<\/h3>\n\n\n\n
\"\"\/<\/figure>\n\n\n\n
\"\"\/<\/figure>\n\n\n\n
\"\"\/<\/figure>\n\n\n\n

\u0639\u0632 \u0627\u0644\u0634\u0628\u0627\u0628 – \u0645\u0646 \u0627\u0642\u0648\u064a \u0627\u0644\u0647\u0627\u0643\u0631\u0632 \u0641\u064a \u0627\u0644\u0639\u0627\u0644\u0645<\/p>\n\n\n\n

\"\"\/<\/figure>\n\n\n\n
\"\"\/<\/figure>\n\n\n\n
\"\"\/<\/figure>\n\n\n\n
\"\"\/<\/figure>\n\n\n\n
\"\"\/<\/figure>\n\n\n\n
\"\"\/<\/figure>\n\n\n\n
\"\"\/<\/figure>\n\n\n\n
\"\"\/<\/figure>\n\n\n\n
\"\u062a\u0643\u0646\u0648\u0646\u0627\u064a\u0644<\/figure>\n\n\n\n
\"\u0635\u0628\u0627\u062d\u0643<\/figure>\n\n\n\n
\"\u0639\u0632<\/figure>\n\n\n\n
\"\u062a\u0643\u0646\u0648<\/figure>\n\n\n\n
\"\u062a\u0643\u0646\u0648\u0646\u0627\u064a\u0644<\/figure>\n\n\n\n
\"\u0635\u0628\u0627\u062d<\/figure>\n\n\n\n
\"\u0641\u064a\u0633\u0628\u0648\u0643<\/figure>\n\n\n\n
\"\u0635\u0628\u0627\u062d<\/figure>\n\n\n\n
\"\u062a\u0643\u0646\u0648\u0646\u0627\u064a\u0644<\/figure>\n\n\n\n
\"\u0645\u0635\u0631\u064a<\/figure>\n\n\n\n
\"\u0627\u0632\u0627\u0649<\/figure>\n","protected":false},"excerpt":{"rendered":"

Mohamed Ramadan Cyber Security Expert Welcome! I\u2019m so glad you are here! My name is Mohamed and bug hunting, ethical […]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"yoast_head":"\n- Attack Secure<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.attack-secure.com\/about\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"- Attack Secure\" \/>\n<meta property=\"og:description\" content=\"Mohamed Ramadan Cyber Security Expert Welcome! I\u2019m so glad you are here! My name is Mohamed and bug hunting, ethical […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.attack-secure.com\/about\/\" \/>\n<meta property=\"og:site_name\" content=\"Attack Secure\" \/>\n<meta property=\"article:modified_time\" content=\"2020-12-07T08:54:03+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/web.archive.org\/web\/20160314195132im_\/http:\/\/static1.squarespace.com\/static\/55dd2d78e4b0a4a7a533443f\/t\/56165800e4b007142a3d7e32\/1444304902235\/?format=750w\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.attack-secure.com\/about\/\",\"url\":\"https:\/\/www.attack-secure.com\/about\/\",\"name\":\"- Attack Secure\",\"isPartOf\":{\"@id\":\"https:\/\/www.attack-secure.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.attack-secure.com\/about\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.attack-secure.com\/about\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/web.archive.org\/web\/20160314195132im_\/http:\/\/static1.squarespace.com\/static\/55dd2d78e4b0a4a7a533443f\/t\/56165800e4b007142a3d7e32\/1444304902235\/?format=750w\",\"datePublished\":\"2020-12-03T21:47:54+00:00\",\"dateModified\":\"2020-12-07T08:54:03+00:00\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.attack-secure.com\/about\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.attack-secure.com\/about\/#primaryimage\",\"url\":\"http:\/\/web.archive.org\/web\/20160314195132im_\/http:\/\/static1.squarespace.com\/static\/55dd2d78e4b0a4a7a533443f\/t\/56165800e4b007142a3d7e32\/1444304902235\/?format=750w\",\"contentUrl\":\"http:\/\/web.archive.org\/web\/20160314195132im_\/http:\/\/static1.squarespace.com\/static\/55dd2d78e4b0a4a7a533443f\/t\/56165800e4b007142a3d7e32\/1444304902235\/?format=750w\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.attack-secure.com\/#website\",\"url\":\"https:\/\/www.attack-secure.com\/\",\"name\":\"Attack Secure\",\"description\":\"Protecting you against cyber attacks!\",\"publisher\":{\"@id\":\"https:\/\/www.attack-secure.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.attack-secure.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.attack-secure.com\/#organization\",\"name\":\"TECHNUX SMC PVT LIMITED\",\"url\":\"https:\/\/www.attack-secure.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.attack-secure.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.attack-secure.com\/wp-content\/uploads\/2021\/01\/AttackSecure-1.png\",\"contentUrl\":\"https:\/\/www.attack-secure.com\/wp-content\/uploads\/2021\/01\/AttackSecure-1.png\",\"width\":471,\"height\":166,\"caption\":\"TECHNUX SMC PVT LIMITED\"},\"image\":{\"@id\":\"https:\/\/www.attack-secure.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"- Attack Secure","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.attack-secure.com\/about\/","og_locale":"en_US","og_type":"article","og_title":"- Attack Secure","og_description":"Mohamed Ramadan Cyber Security Expert Welcome! I\u2019m so glad you are here! My name is Mohamed and bug hunting, ethical […]","og_url":"https:\/\/www.attack-secure.com\/about\/","og_site_name":"Attack Secure","article_modified_time":"2020-12-07T08:54:03+00:00","og_image":[{"url":"http:\/\/web.archive.org\/web\/20160314195132im_\/http:\/\/static1.squarespace.com\/static\/55dd2d78e4b0a4a7a533443f\/t\/56165800e4b007142a3d7e32\/1444304902235\/?format=750w"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.attack-secure.com\/about\/","url":"https:\/\/www.attack-secure.com\/about\/","name":"- Attack Secure","isPartOf":{"@id":"https:\/\/www.attack-secure.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.attack-secure.com\/about\/#primaryimage"},"image":{"@id":"https:\/\/www.attack-secure.com\/about\/#primaryimage"},"thumbnailUrl":"http:\/\/web.archive.org\/web\/20160314195132im_\/http:\/\/static1.squarespace.com\/static\/55dd2d78e4b0a4a7a533443f\/t\/56165800e4b007142a3d7e32\/1444304902235\/?format=750w","datePublished":"2020-12-03T21:47:54+00:00","dateModified":"2020-12-07T08:54:03+00:00","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.attack-secure.com\/about\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.attack-secure.com\/about\/#primaryimage","url":"http:\/\/web.archive.org\/web\/20160314195132im_\/http:\/\/static1.squarespace.com\/static\/55dd2d78e4b0a4a7a533443f\/t\/56165800e4b007142a3d7e32\/1444304902235\/?format=750w","contentUrl":"http:\/\/web.archive.org\/web\/20160314195132im_\/http:\/\/static1.squarespace.com\/static\/55dd2d78e4b0a4a7a533443f\/t\/56165800e4b007142a3d7e32\/1444304902235\/?format=750w"},{"@type":"WebSite","@id":"https:\/\/www.attack-secure.com\/#website","url":"https:\/\/www.attack-secure.com\/","name":"Attack Secure","description":"Protecting you against cyber attacks!","publisher":{"@id":"https:\/\/www.attack-secure.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.attack-secure.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.attack-secure.com\/#organization","name":"TECHNUX SMC PVT LIMITED","url":"https:\/\/www.attack-secure.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.attack-secure.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.attack-secure.com\/wp-content\/uploads\/2021\/01\/AttackSecure-1.png","contentUrl":"https:\/\/www.attack-secure.com\/wp-content\/uploads\/2021\/01\/AttackSecure-1.png","width":471,"height":166,"caption":"TECHNUX SMC PVT LIMITED"},"image":{"@id":"https:\/\/www.attack-secure.com\/#\/schema\/logo\/image\/"}}]}},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false},"uagb_author_info":{"display_name":"Anas Baig","author_link":"https:\/\/www.attack-secure.com\/author\/anas-baig\/"},"uagb_comment_info":0,"uagb_excerpt":"Mohamed Ramadan Cyber Security Expert Welcome! I\u2019m so glad you are here! My name is Mohamed and bug hunting, ethical […]","_links":{"self":[{"href":"https:\/\/www.attack-secure.com\/wp-json\/wp\/v2\/pages\/62"}],"collection":[{"href":"https:\/\/www.attack-secure.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.attack-secure.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.attack-secure.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.attack-secure.com\/wp-json\/wp\/v2\/comments?post=62"}],"version-history":[{"count":0,"href":"https:\/\/www.attack-secure.com\/wp-json\/wp\/v2\/pages\/62\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.attack-secure.com\/wp-json\/wp\/v2\/media?parent=62"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}