About
I am a cybersecurity professional with experience in penetration testing, vulnerability research, and the analysis of complex systems across IT, OT, industrial environments, and embedded technologies.
My work spans hardware security, web security, cyber range design, and many of the challenges that come with assessing or defending modern infrastructures.
I have a strong interest in understanding how systems behave at their boundaries, both in software and hardware, and I enjoy exploring how they respond when pushed beyond their expected use cases.
Many of the vulnerabilities I study come from VAPT engagements, personal research, or experiments conducted on real infrastructures. I value clear and responsible communication, so everything I publish follows proper disclosure processes and appears only after vendors or CERTs have validated or released the information.
I also enjoy listening to Led Zeppelin, usually playing in the background during research sessions or while I am debugging something particularly stubborn.
This blog was created to share what I learn, document interesting findings, and collect reflections that emerge from real security work. Whether you are a professional, a researcher, or someone who enjoys the technical side of cybersecurity, I hope you find something useful here.
If you would like to discuss research, methodologies, or ideas, I am always open to connecting.