Pixel Poisoning: Hacking Generative AI
A fierce visual defense against generative AI — fight back with poisoned pixels, stealthy watermarks, and adversarial trickery.
Read on MediumThrough our Partners, we provide your company with top protection of all your information and communication assets
Through our partners platforms, we offer you seamless Endpoint Detection & Response by instantly isolating threats, maintaining visibility and automatic response to ensure your operations are protected in real time
Email still remains the most common and successful tactic bad actors use to infect an organization with malware. Employees cannot be trusted to do the right thing with suspicious emails resulting in a heightened risk of data breaches, ransomware, and other threats.
With our enterprise-grade threat detection, incident response, and continuous monitoring. We provide a proactive protection, backed by real-time security intelligence and automated response capabilities—all managed through a single, scalable platform designed to meet the evolving cybersecurity demands of businesses of any scale.
With our gap analysis experience, we provide vital insights to ensure your organization adheres to IT and data security standards like ISO 27001, NIST and also compliance with data protection regulations like GDPR, PCI DSS. We develop orgnizational cybersecurity governance and standard procedures that ensures a secure operational environment.
In a well secured environment, employees and people has shown the weakest point for most successful attacks and your people need to know how best to interact with technology to reduce threat vectors. Cybersecurity awareness has remained instrumental to protecting your enterprise and assets from bad actors. Our robust cybersecurity awareness training geard at ensuring the right information is passed down the line.
We will assess your organization's readiness for disaster recovery and business continuity. We develop, test and maintain business continuity and recovery plans to ensure swift restoration of your services in an event of a disaster
Do you wish to model your information system according to known standards? We offer cybersecurity auditing and compliance to enable identify possible vulnerabilities in your network
You IT partner for new technology implementation like AI agents, business automations and integrations, our highly skiled and experienced team will work with you to understand your needs and provide you with insightful guideline on tools to adopt and to operate. We will provide your team with product knowledge and training
CGPA: 8.36
Percentage: 89.8%
Percentage: 94.8%
EC-Council
CompTIA
IIT Kanpur (Capstone Projects)
NPTEL
Qualys
Cisco NetAcad
Amazon Web Services
Postman
"Robotics and Cybersecurity Fundamentals: Understanding Robotics, Penetration Testing Tools and Attack Vectors" accepted for publication in Book "Robot Automation: Principle, Design and Applications" (CRC Press, Taylor & Francis, Scopus Indexed) on 11/02/2025
"Hacking Generative Artificial Intelligence: Data Privacy via Image Poisoning" submitted for publication in book "Blockchain solutions for securing IOT networks: Practical applications and case studies"
Published multiple cybersecurity and scripting-related articles on Medium, featured in renowned publications like InfoSec Write-Ups and System Weakness
Secured Top 10 (Offline Category) in Hacknovate 5.0, May 2024, with Team API Alchemist at ABES IT, Ghaziabad
Ranked in the Global Top 2% on TryHackMe, showcasing expertise in cybersecurity, ethical hacking, and VAPT through solving advanced, real-world challenges
A fierce visual defense against generative AI — fight back with poisoned pixels, stealthy watermarks, and adversarial trickery.
Read on Medium
                        Learn how to exploit SQL injection vulnerabilities using SQLMAP, an automated penetration testing tool for database security assessment.
Read on Medium
                        A comprehensive guide to hacking and securing Wi-Fi networks using Aircrack-ng, covering practical attack techniques, encryption vulnerabilities, and prevention strategies.
Read on Medium