Andrea Fortuna
Andrea Fortuna — Cybersecurity expert and digital forensics analyst
Cybersecurity expert, software developer, experienced digital forensic analyst, musician
andreafortuna.orgMost organizations don't fail at security because they lack tools, they fail because they can't sustain attention at 2:00 AM.
A cybersecurity blog that bridges the gap between hands-on technical analysis and strategic thinking. Andrea writes about everything from iOS forensics to building 24/7 security operations on small teams, often opening with real-world scenarios that pull you into complex topics. His European perspective on security regulation and infrastructure adds a dimension you won't find on most infosec blogs.
Written by Andrea Fortuna.
Very Active
Publishes multiple times per week
3
Independent Blog
English
How this blog's content is accessed through Blogs Are Back.
Full Content
RSS feed includes complete post content for reading in-app
Direct Access
Feed can be fetched directly from your browser
Direct Post Links
Post pages can be loaded directly in the reader
Embeddable
Posts can be displayed inline in the reader view
Recent posts from Andrea Fortuna's RSS feed.
MalHunt gets a major overhaul: Volatility3, smarter YARA handling, and better error recovery
If you have been following my open-source work, you probably know MalHunt, the memory forensics tool I built to automate malware hunting on top of Volatility. Yesterday I pushed a significant batch of updates that, taken together, amount to a near-complete rewrite of the project. Here is what changed and why it matters. From a script to a proper Python package The most visible change is structural. The original malhunt.py was a single 317-line script: practical, but not particularly maintain...
Ten problems every Volatility2 analyst will hit when migrating to Volatility3
After years of daily use in incident response and forensic investigations, Volatility2 becomes part of muscle memory. Commands are typed by reflex, plugin behaviour is predictable, and the toolchain rarely surprises you. Moving to Volatility3 dismantles most of those assumptions at once. The rewrite is architecturally justified and the result is genuinely superior, but the migration path is littered with specific, repeatable problems that every experienced analyst hits in roughly the same order....
Face ID vs. Android Face Unlock: A Security Comparison
The hardware gap that defines the comparison Apple built Face ID around dedicated hardware that most competitors have never replicated at scale. The TrueDepth camera system, introduced with the iPhone X in 2017 and refined across every subsequent generation, uses a dot projector, an infrared camera, and a flood illuminator to cast more than 30,000 invisible infrared points onto the user’s face. The TrueDepth system then reads the distortion of those dots to generate a precise depth map, while a...
Audit-Proofing your NIS2 training plan: a strategic guide
Why training is no longer optional The NIS2 Directive (EU) 2022/2555 has fundamentally redefined what it means for a European organization to take cybersecurity seriously. Among its most significant shifts is the elevation of training from a recommended best practice to a binding legal obligation. Article 20 explicitly requires that management bodies of essential and important entities follow cybersecurity training, and encourages organizations to offer similar, regular training to their employ...
Privileged access management: risks and best practices for zero trust implementations
The strategic weight of privileged accounts In any enterprise environment, privileged accounts represent the highest-value target for attackers. These are not just administrator credentials; they encompass service accounts, DevOps pipelines, cloud management interfaces, and any identity with elevated permissions over critical systems. When one of these accounts is compromised, the consequences extend far beyond a single machine or dataset. Attackers can move laterally, escalate privileges, and...
If you enjoy Andrea Fortuna, you might also like these blogs.

Troy Hunt
troyhunt.comSecurity researcher and creator of Have I Been Pwned. Expert analysis on data breaches and web security.
Filippo Valsorda
words.filippo.ioGo security team member writing about cryptography and open source maintenance.

Robert Heaton
robertheaton.comThoughtful essays on programming, security, and the human side of software.

Perishable Press
perishablepress.comWeb Dev + WordPress + Security
Follow Andrea Fortuna
Whether you're a security practitioner or just trying to understand the threat landscape, Andrea breaks down complex security topics with real-world clarity.