Pixel Poisoning: Hacking Generative AI
A fierce visual defense against generative AI — fight back with poisoned pixels, stealthy watermarks, and adversarial trickery.
Read on MediumMy focus is on protecting digital assets and implementing innovative security solutions in a constantly evolving IT environment.
I am a Cybersecurity Consultant with over 8+ years of experience in SOC analyst, digital forensics, cloud security, network security, and incident response. With 20+ international certifications, I have successfully designed secure systems, led vulnerability assessments, and delivered key security projects.
I am skilled at improving incident response times, mitigating threats, and ensuring compliance with ISO 27001 standards.
I support my team in monitoring and safeguarding the organization’s digital assets. I play a key role in maintaining system integrity by detecting threats and assisting with incident response efforts to ensure a secure infrastructure.
I was responsible for investigating cyber incidents and analyzing malware threats that targeted critical infrastructure. My role involved identifying and mitigating threats, conducting forensic investigations, and developing strategies to strengthen the organization's security posture.
I was responsible for safeguarding the organization’s digital assets and ensuring compliance with cybersecurity standards. I played a key role in developing security policies, conducting risk assessments, and implementing measures to protect sensitive information and IT systems from security breaches and cyber threats.
I was responsible for managing and maintaining the college’s server infrastructure to ensure its security, performance, and data integrity. My role involved overseeing server operations, supporting faculty and students, and ensuring that the IT systems aligned with the academic environment's evolving needs.
I oversaw the network infrastructure, ensuring that network services were always available, secure, and efficient. I worked closely with the IT team to keep operations running smoothly and implemented key improvements to enhance performance and security.
I designed, developed, and maintained the college’s website and web applications. I worked closely with faculty and administrators to ensure the website met the needs of students and stakeholders while maintaining high standards of usability, security, and performance.
EC-Council
EC-Council
CompTIA
Microsoft
Huawei
Qualys
Cisco NetAcad
Cisco
Microsoft
Microsoft
Microsoft
Microsoft
Microsoft
Cisco
Cisco
Cisco
Microsoft
Microsoft
Microsoft
"Robotics and Cybersecurity Fundamentals: Understanding Robotics, Penetration Testing Tools and Attack Vectors" accepted for publication in Book "Robot Automation: Principle, Design and Applications" (CRC Press, Taylor & Francis, Scopus Indexed) on 11/02/2025
"Hacking Generative Artificial Intelligence: Data Privacy via Image Poisoning" submitted for publication in book "Blockchain solutions for securing IOT networks: Practical applications and case studies"
Published multiple cybersecurity and scripting-related articles on Medium, featured in renowned publications like InfoSec Write-Ups and System Weakness
Secured Top 10 (Offline Category) in Hacknovate 5.0, May 2024.
Ranked in the Global Top 2% on TryHackMe, showcasing expertise in cybersecurity, ethical hacking, and VAPT through solving advanced, real-world challenges
A fierce visual defense against generative AI — fight back with poisoned pixels, stealthy watermarks, and adversarial trickery.
Read on MediumLearn how to exploit SQL injection vulnerabilities using SQLMAP, an automated penetration testing tool for database security assessment.
Read on MediumA comprehensive guide to hacking and securing Wi-Fi networks using Aircrack-ng, covering practical attack techniques, encryption vulnerabilities, and prevention strategies.
Read on Medium