Nutcracker - Mobile Security & Offensive Threat Intelligence
Nutcracker banner Attackers capitalize on one thing better than anyone else: the moment we start seeing security as a...
amplifying vulnerabilities with AI Despite the title, this is not a post about a new exploitation technique, an exotic zero-day, or a hacking method you can try at your next CTF. It’s an invitation...
Nutcracker banner Attackers capitalize on one thing better than anyone else: the moment we start seeing security as a...
Well, after such a long time without writing I decided to migrate my blog to this subdomain and change blogger for he...
On November 5 I had the honor of participating in the LimaHack 2011 that took place at the UPC (Lima-Peru), in which ...
Hi Dear readers, here I bring to you, some implementations of the data structure’s course, but with python.In my Univ...
"In chaos, I train."
Cybersecurity Manager and Security Specialist with 15+ years of experience in software engineering, cybersecurity, application security, risk management, offensive security, and ethical hacking. MSc in Cybersecurity,OWASP Chapter Leader, speaker, mentor, and open-source enthusiast focused on secure development, threat modeling, DevSecOps, and security culture.