CVE-2026-40103
Scoped API token authorization mismatch in Vikunja. The public write-up documents the validated background-route case and remediation context.
ACyberSecure is built on experience across 300+ client security projects, including 125+ penetration testing engagements, cloud and M365 reviews, phishing work, and findings readouts for technical and executive stakeholders.
About ACyberSecure
ACyberSecure is my independent consulting practice. I work across penetration testing, cloud and M365 reviews, gap assessments, phishing-related engagements, and security advisory, with experience built through 300+ client security projects and more than 125 penetration testing engagements.
I also bring experience briefing technical teams and executives, plus rebuilding reporting workflows and assessment tooling to make delivery cleaner, faster, and more consistent.
You work with the person doing the work—no sales handoff or account layers.
Penetration tests, cloud reviews, identity work, and advisory engagements are sized for real budgets, timelines, and team capacity.
Reports and readouts are built to help engineers fix issues and help leadership understand risk, priority, and next steps.
Relevant Experience
These are examples of environments I have supported through team and consulting engagements. The work has included internal and external penetration tests, cloud and M365 reviews, gap assessments, phishing-related work, and findings readouts.
Supported security work for customer experience organizations at global scale.
Supported engagements in regulated healthcare environments with strict privacy requirements.
Supported assessments for major content and IP portfolios.
Supported work for public-sector operations with compliance constraints.
Supported reviews in temperature-sensitive logistics operations.
Supported security work for essential services across multiple regions.
Figures are rounded for privacy and reflect environments supported across internal, consulting, and independent engagements.
Core Services
These are the offers I focus on most: penetration testing, recurring validation, adversary simulation, gap assessments, cloud and identity reviews, and short-window implementation support.
Web, API, internal, external, cloud, and mobile testing, plus Active Directory work when relevant, with clear reporting and prioritized remediation.
Request ScopeRecurring test cycles, retest support, and release validation to catch regressions and keep pace with ongoing changes.
Request ScopeScoped adversary emulation and collaborative exercises to test detection and response, including phishing and social engineering scenarios when appropriate.
Request ScopeBaseline your current state against NIST CSF or CIS Controls, then turn the gaps into a practical roadmap with technical and executive priorities.
Request ScopeAzure, M365, and identity-focused reviews covering IAM, Entra ID, MFA, logging, admin risk, and control validation across cloud environments.
Request ScopeShort-window support for Okta-to-Entra planning, licensing reviews, MFA and security configuration changes, endpoint security transitions, vulnerability triage, and related admin tasks.
Request ScopeCredentials & Deliverables
4+ years of hands-on security work across penetration testing, cloud/M365 reviews, and security support delivered through internal teams and consulting engagements. I’ve treated every year intentionally, investing heavily in continuous learning and practical execution to improve with every engagement.
Sample report available on request.
CCSP, eJPT, AZ-900, and SC-900 backed by repeated delivery across cloud, identity, and offensive security engagements.
Hands-on delivery across cloud, identity, and offensive security engagements.
Research & Disclosures
Public vulnerability research and coordinated disclosure notes from work I identified and reported, with direct links when there is a public technical write-up worth reading.
Scoped API token authorization mismatch in Vikunja. The public write-up documents the validated background-route case and remediation context.
Request Scope
If you need a pentest, cloud/M365 review, gap assessment, or short-window identity/security support, send a note with your environment, target scope, timing, and constraints. I'll follow up with next steps.
Typical response time: 1 business day.
Remote-first, onsite by request
Flexible scheduling based on scope
Pentesting, cloud/M365, identity, advisory