
Your ESXi Hypervisor Just Opened Its Root Door
Turns out, the foundation of your virtual kingdom had a critical flaw, letting authenticated users write files and escalate privileges.
Securing digital infrastructures and building robust web solutions. Specialized in SOC operations, Penetration Testing, and Full-stack Development.
A timeline of my journey in Cybersecurity and IT Operations.
A snapshot of recent work — security tools, marketplaces, and automation. Click a card to see the full development timeline.
Daily cybersecurity writing — incident analysis, vulnerability disclosures, and defensive playbooks.

Turns out, the foundation of your virtual kingdom had a critical flaw, letting authenticated users write files and escalate privileges.

Developers are targets, and the open-source supply chain is a prime attack vector for credential theft and backdoors.

A critical RCE in SonicWall Email Security appliances leaves organizations scrambling to patch their most crucial communication conduit.
Tools and technologies I use to secure and build systems.