ISO 27001 Audit – Zero Nonconformities By Alex Fernandez 🛡️ Turning compliance into measurable business value through structured leadership. Only two months after joining the company, I was assigned to lead the full ISO 27001 certification process — despite it being my first time managing an external audit of this magnitude. The previous year, under different leadership, the company had faced several nonconformities and significant external consulting costs. I approached the challenge with a structured methodology: rebuilding the SGSI documentation from the ground up, aligning every Annex A control, and establishing a clear task distribution and follow-up system. Each department was assigned measurable responsibilities, with weekly check-ins, internal audits, and evidence tracking. Through disciplined project execution, cross-department collaboration, and full alignment with ISO 27001, we achieved a flawless external audit with zero nonconformities — a result never reached before in the company. This success also generated a significant financial impact. By earning my ISO 27001 Internal Auditor and Lead Auditor certifications, I fully internalized the audit process, eliminating the need for outsourced auditors and saving the organization thousands of euros every year.Additionally, having no nonconformities meant that departments avoided weeks of corrective rework and resource loss — translating into substantial time and cost savings across all teams. This achievement proved my ability to lead complex compliance initiatives under pressure, structure large-scale projects effectively, and deliver measurable business value in a remarkably short period.
Beware of the “Child in Distress” Scam: Technical Investigation of a Real Case in Spain
Beware of the “Child in Distress” Scam: Technical Investigation of a Real Case in Spain By Alex Fernandez Recently, a close family member was the target of a digital scam attempt in which criminals tried to steal €4,000 by impersonating me on WhatsApp. I was able to gather evidence of how they operate and hand everything over to the authorities. I want to share the experience and the technical analysis to raise awareness and demonstrate how these groups work. Step-by-Step Breakdown of the Fraud The initial contact The scammers pretended to be me on WhatsApp, claiming that my phone was broken and that I urgently needed money. The financial objective They first requested a €500 Bizum transfer to a number supposedly belonging to “a friend of mine.” Later, they increased the pressure, asking for up to €4,000. The different IBANs they used During the conversation, they provided up to five different bank accounts in an attempt to receive the money.After my investigation, I discovered the origin and registration location of each account: CaixaBank (Palma de Mallorca) BBVA (Albal, Valencia) Santander (Picassent, Valencia) Caja Rural (Albal, Valencia) Sabadell (Palma de Mallorca) The use of multiple accounts demonstrates that this network has infrastructure in place to avoid immediate blocking. The Technical Investigation When my relative informed me of what had happened, I decided to carry out an investigation in several phases. 1. SMS Spoofing as a Counter-Social Engineering Technique I used controlled SMS spoofing to send a message to the number linked to the Bizum, simulating that it came from their own network of contacts (the other number we had, belonging to another scammer). The SMS contained a tracking link. Result: the attackers opened the link, which allowed me to record their real IP, device, browser, and exact geolocation for two hours. Example: IP: 84.125.72.85 Location: Xeraco, Valencia Device: Android 10, Chrome 139 2. Correlation with Databases Next, I performed an OSINT analysis by cross-referencing the IPs with several repositories. I found matches with emails and credentials associated with the same IP addresses, as well as the full name, surname, and public address of three individuals. This indicates that the network members are not sophisticated actors, since they leave traces in compromised services. 3. Analysis of the Modus Operandi The group likely uses Telegram to coordinate and maintain quick communication. The Bizum numbers and IBANs probably belong to money mules who receive funds in exchange for a commission. The core criminal group is probably from Eastern Europe. Lessons Learned Never trust urgent messages without verifying through another channel. A 30-second call can prevent the loss of thousands of euros. Scammers constantly change IBANs and phone numbers to avoid being blocked, making them harder to track. Social engineering is their main weapon. They don’t rely on sophisticated exploits, but on manipulating trust and urgency. Tracking is possible, but must be done carefully and always reported to the authorities. Final Reflection This case confirms what we see every day in cybersecurity: technology and psychology go hand in hand in modern fraud schemes.The key lies in education, prevention, and, whenever possible, investigation and reporting.
Critical Vulnerabilities in 23andMe API: LFI, HTML Injection, and Sensitive Data Exposure
Critical Vulnerabilities in 23andMe API: LFI, HTML Injection, and Sensitive Data Exposure By Alex Fernandez This report presents a security analysis of the 23andMe API endpoints (https://api.23andme.com), conducted to identify potential vulnerabilities that could compromise server integrity and user data. The findings reveal critical issues, including Local File Inclusion (LFI), reflected HTML Injection, and overexposed debug endpoints, which pose significant risks despite existing mitigation measures such as Cloudflare and Content Security Policy (CSP). Although current defenses have prevented immediate exploitation, the underlying lack of sanitization and authentication highlights the need for urgent remediation. With a criticality level assessed at 7 out of 10—reflecting a high impact potential tempered by moderate exploitation probability—these vulnerabilities underscore the importance of proactive security enhancements to protect 23andMe’s systems and millions of users. All findings were responsibly disclosed to 23andMe to facilitate timely resolution.
Vulnerabilidades críticas detectadas en sistemas solares y de control industrial en España
Vulnerabilidades críticas detectadas en sistemas solares y de control industrial en España By Alex Fernandez Resumen Ejecutivo: Durante un análisis pasivo utilizando herramientas públicas como Shodan, se han detectado múltiples dispositivos de control solar (SenNet Solar) y al menos un sistema de interfaz industrial crítica (Universal Interface de GE Security) accesibles libremente en Internet sin medidas básicas de seguridad. Estas exposiciones ponen en grave riesgo la estabilidad de la infraestructura energética local, pudiendo ser explotadas para causar apagones o sabotajes industriales. Detalles Técnicos: Sistemas SenNet Solar: Dataloggers solares expuestos vía HTTP simple, sin HTTPS. Versiones antiguas detectadas (V2.90, V4.37). IPs afectadas: ejemplos incluyen 185.248.97.198, 95.124.92.150, 88.28.44.58, entre otros. Riesgo: desactivación o sabotaje de plantas solares conectadas a la red nacional. Sistema Universal Interface GE Security: Accesible en http://185.140.216.91:3081/. Permite configuración de red, gestión de firewall, carga de firmware y reinicio de CPU. Sin capa de protección HTTPS. Riesgo de manipulación directa de componentes industriales críticos. Impacto Potencial: Manipulación de parámetros críticos de producción eléctrica. Inducción de inestabilidad en la frecuencia o voltaje de la red. Apagones locales o regionales. Compromiso de la confianza en el sistema de energías renovables español. Recomendaciones Urgentes: Cerrar exposición de interfaces a Internet inmediatamente. Aplicar actualizaciones de firmware y contraseñas robustas. Segmentar redes industriales críticas del tráfico público. Implantar firewalls industriales y monitoreo activo de anomalías de red. Conclusión: La transformación energética basada en renovables es crítica para el futuro, pero debe ir acompañada de un refuerzo urgente de la ciberseguridad industrial.La exposición documentada representa un riesgo real y necesita ser corregida antes de que actores maliciosos puedan explotarla. Anexos Técnicos: Capturas de pantallas de acceso a interfaces. HTML web guardadas. Listado de IPs afectadas y banners observados. Nota Legal: Todo el análisis ha sido realizado utilizando técnicas de reconocimiento pasivo y fuentes públicas abiertas (OSINT).No se ha llevado a cabo ninguna intrusión ni alteración de los sistemas auditados.
Brute Force Attack for Vulnerable Home Networks – PROJECT
Brute Force Attack for Vulnerable Home Networks – PROJECT By Alex Fernandez Explore in this PDF document the details of how a brute force attack can be conducted on vulnerable home networks. The article methodically explains the steps and tools used to expose and understand common security weaknesses in home networks. ENGLISH Not available yet. ESPAÑOL
LAN network in a three-story building – PROJECT
LAN network in a three-story building – PROJECT By Alex Fernandez Dive into this detailed PDF document where I share the complete process of installing a scalable home LAN network. From initial planning to final execution ENGLISH ESPAÑOL
Your neighbor is in your own house, and you can’t see him: The ease of hacking home Wi-Fi networks.
Your neighbor is in your own house, and you can’t see him: The ease of hacking home Wi-Fi networks By Alex Fernandez They can access your home network The Ease of Hacking WPA2-Protected WiFis using Fern Wifi Cracker in Linux, a USB network adapter in monitor mode, and the RockYou brute force password book. In the digital age we live in, the security of our Wi-Fi networks is of utmost importance. However, it is astonishing how easy it can be to hack into a Wi-Fi network protected with the WPA2 security standard. In this article, we will explore the process of hacking such networks using tools like Fern Wifi Cracker, a USB network adapter in monitor mode, and the famous RockYou brute force password book. Fern Wifi Cracker is a powerful wireless network auditing and security tool that runs on Linux. With this tool, we can perform brute force attacks and retrieve WEP/WPA/WPS keys. Its user-friendly graphical user interface (GUI) makes it easy to use, even for those who are not hacking experts. To carry out a successful attack, we will need a USB network adapter that supports monitor mode, which allows us to capture Wi-Fi traffic in our area. Make sure your adapter is compatible with this feature before getting started. Lastly, we will need the well-known RockYou brute force password book. This book contains an extensive list of commonly used passwords that are frequently used for Wi-Fi networks. By using Fern Wifi Cracker, we can combine this list with the hashing process used in the WPA2 authentication protocol to guess the correct password and gain access to the protected Wi-Fi network. Once on your home network, they will be able to see all the devices, including Alexa devices, Chromecast, televisions and home automation devices that they can access without problems and take control. It is important to mention that while this article provides information on the Wi-Fi hacking process, we strongly recommend using these techniques only for educational purposes and to secure your own personal networks. Unauthorized use of these techniques is illegal and can have serious legal consequences. Always remember to keep your Wi-Fi network secure by using strong passwords and regularly updating your devices and routers with the latest security updates. MAC filtering, or hiding your network’s SSID will greatly increase the security of your home network. If you are interested in learning more about wireless network security and how to protect your own network, contact me. Remember, security is a shared responsibility, and it is up to all of us to protect our networks and stay safe in the ever-changing digital world!
Small Python projects
Small Python Projects By Alex Fernandez Small demonstrations of small projects that can be built in minutes only using Python YouTube Video Downloader GUI with Python The “YouTube Video Downloader GUI” project is a user-friendly Python application designed to make downloading YouTube videos a breeze. With this application, users can simply input a YouTube video URL, select their preferred video quality (720p or 1080p), and initiate the download process with just a few clicks. The application provides real-time feedback, informing users of the download progress and displaying a success message upon completion. This project showcases the integration of the tkinter library for building the graphical user interface (GUI) and the pytube library for handling YouTube video downloads. It offers a practical solution for users who want to download videos from YouTube in high-quality formats and serves as a great introduction to GUI development in Python. Key Features: Easy-to-use graphical user interface (GUI). Selectable video quality options (720p and 1080p). Real-time status updates during the download process. Error handling for a seamless user experience. Secure Password Generator with GUI in Python The “Secure Password Generator with Graphic User Interface in Python” is a versatile and user-friendly application designed to create strong and secure passwords. This project combines the power of Python programming with a graphical user interface (GUI) to provide an intuitive and interactive experience for users. Key Features: Customizable Passwords: Users can specify their desired minimum and maximum password lengths, choose whether to include special characters or numbers, and tailor the password to meet their specific security requirements. Password Strength Indicator: The application calculates and displays the password’s strength in terms of entropy, providing users with valuable feedback on the generated password’s level of security. Clipboard Copy Functionality: With a single click, users can easily copy the generated password to their clipboard, simplifying the process of using the password for various accounts and services. User-Friendly Interface: The GUI provides a user-friendly and intuitive way to interact with the application, making it accessible to individuals with varying levels of technical expertise. This project not only simplifies the process of creating strong and unique passwords but also helps users understand the security level of their passwords through entropy-based feedback. It empowers users to take control of their online security, making it a valuable tool for anyone concerned about safeguarding their digital identity. By combining the power of Python programming with an easy-to-use interface, this project showcases the capabilities of modern software development in enhancing online security practices. QR Code Generator App in Python Create, share, and download QR codes effortlessly with this user-friendly QR Code Generator App. This project showcases a Python-based desktop application built using tkinter and qrcode libraries. The app allows users to input a URL, generates a QR code with customization options, and displays the code for download. The interface features a sleek design with a transparent background, making it visually appealing. This project not only demonstrates programming skills but also provides a practical tool for generating QR codes for various purposes. Explore this project to simplify QR code creation for your website or business needs.
New Spanish phone number!
New Spanish phone number! By Alex Fernandez Due to problems with my previous phone operator, my Spanish mobile number has changed. Currently my Spanish contact number is: 676290967. Sorry for the inconvenience.
IBM DevOps and Software Engineering
IBM DevOps and Software Engineering achieved! By Alex Fernandez It has been a long way (more than I would like), to get this professional certificate from IBM This IBM professional certification consists of the following 13 courses: -Introduction to Agile Development and Scrum -Introduction to DevOps -Application Security and Monitoring -Python Project for AI & Application Development -Continuous Integration and Continuous Delivery (CI/CD) -Introduction to Test Driven Development (TDD) -Python for Data Science, AI & Development -Introduction to Cloud Computing -Hands-on Introduction to Linux Commands and Shell Scripting -Getting Started with Git and GitHub -Application Development using Microservices and Serverless -Introduction to Containers w/ Docker, Kubernetes & OpenShift -DevOps Capstone Project My resume and about me page have already been updated. See you soon with more news. I’m still on the road!