
Snowflake's Data Blizzard: Your Credentials, Not Their Cloud, Was The Problem
Recent Snowflake breaches show that even the most secure clouds can't save you from your own weak credential hygiene.
Securing digital infrastructures and building robust web solutions. Specialized in SOC operations, Penetration Testing, and Full-stack Development.
A snapshot of recent work — security tools, marketplaces, and automation. Click a card to see the full development timeline.
Daily cybersecurity writing — incident analysis, vulnerability disclosures, and defensive playbooks.

Recent Snowflake breaches show that even the most secure clouds can't save you from your own weak credential hygiene.

Cisco's recent advisories drop two critical RCEs for ASA and FTD, turning your secure VPN gateway into an open invitation for attackers.

A recent RCE vulnerability in Jenkins proves that your software factory is only as secure as its weakest link.
Tools and technologies I use to secure and build systems.
A timeline of my journey in Cybersecurity and IT Operations.