Trying to make the digital world safer, one test at a time.
My last publications
Explore my blog to found interesting pentesting process and investigations.
Cloud Security
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna
Read MoreCloud Security
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna
Read MoreApplication Security
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna
Read MoreApplication Security
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna
Read More
My last publications
Explore my blog to found interesting pentesting process and investigations.
My last publications

How to Build a Resilient Cyber Defense for Critical Infrastructure
Sed ut perspiciatis unde omnis iste natus error sit voluptatem accusantium doloremque laudantium, totam rem aperiam, eaque ipsa quae ab illo inventore veritatis et quasi

5 Emerging Cyber Threats Every Organization Must Watch in 2025
Sed ut perspiciatis unde omnis iste natus error sit voluptatem accusantium doloremque laudantium, totam rem aperiam, eaque ipsa quae ab illo inventore veritatis et quasi

5 Emerging Cyber Threats Every Organization Must Watch in 2025
Sed ut perspiciatis unde omnis iste natus error sit voluptatem accusantium doloremque laudantium, totam rem aperiam, eaque ipsa quae ab illo inventore veritatis et quasi
Enchance Your Cyber Defenses
Username / Password
- Use strong passwords
- Avoid use the same password in differet places
- use credentials manager
- Regulary change your passwords
Ensure that your credentials or sites where your are using it are secure.
Suspicius emails?
this last year the pshishing campaings increase a lot, pay attention to this:.
- Dont open links from untrusted sources
- Dont kwon the sender? dont trust
- Be Proactive, report suspicous emails to help others
- becareful with attached files
Lorem ipsum dolor sit amet consecte adipi scing elit adipiscing eleifend dictum poteder mattis viverra lorem ipsum dolor sit amet consecte adipisci ng elit adipiscingdiper eleifend dictum potenti mattis viverra.
Somebody is watching you
Somethimes people sufer privacy related diclosure thouth his screen when somebody is looking what you have on the phone screen.
- Use a position that block the view of the screen.
- avoid to open sensitive content when youre in public.
- Buy a privacy screen proetctor
- Avoid to install aplications from untrusted sources
Lorem ipsum dolor sit amet consecte adipi scing elit adipiscing eleifend dictum poteder mattis viverra lorem ipsum dolor sit amet consecte adipisci ng elit adipiscingdiper eleifend dictum potenti mattis viverra.
No all wifi are good
Many hackers use false free WIFI to catch devices in his controlled networks to steal data or compromise crednetials.
- Avoid to use public WIFI if not necesary
- Avoid networks that ask for credentials in a portal
- Avoid the use of sensitive app in public WIFI such as bank
- be proactive, after the use in a public wifi disconnect from the network
Can a thirtparty access
- is the pin pas of the door secure?
- is ok if i leave this windows open?
- is normal to leave my access card alone?
- is necessary to protect that ethernet port?
the physical controls are very importante too!! default password to a restric area, people leaving his access card alone, and more allow attackers to clone cards or access to restricted areas.

We Try To Keep People Safe & Secure Around The digital World
00+ Reports
Delivered to differetent companies
00Vulnerabilities
Reported across different companies

How testto Build a
Sed ut perspiciatis unde omnis iste natus error sit voluptatem accusantium doloremque laudantium, totam rem aperiam, eaque ipsa quae ab illo inventore veritatis et quasi