
PyPI's Dirty Secret: Your `pip install` Just Became a Trojan Horse
Developers are targets, and the open-source supply chain is a prime attack vector for credential theft and backdoors.
Securing digital infrastructures and building robust web solutions. Specialized in SOC operations, Penetration Testing, and Full-stack Development.
A timeline of my journey in Cybersecurity and IT Operations.
A snapshot of recent work — security tools, marketplaces, and automation. Click a card to see the full development timeline.
Daily cybersecurity writing — incident analysis, vulnerability disclosures, and defensive playbooks.

Developers are targets, and the open-source supply chain is a prime attack vector for credential theft and backdoors.

A critical RCE in SonicWall Email Security appliances leaves organizations scrambling to patch their most crucial communication conduit.

A recently disclosed Windows Wi-Fi RCE means your network card could be handing over your PC to attackers.
Tools and technologies I use to secure and build systems.