Check out the analysis by @cryptocat.me for CVE-2026-20127 in Cisco SD WAN. That other PoC posted last week exploits a totally different bug that doesn't match the reported IOCs (some kind of file upload due to path traversal in vManage maybe). We asses with high confidence this is CVE-2026-20127 π₯
11.03.2026 16:36
π 2
π 1
π¬ 0
π 0
As per its stated policy, Kaspersky did not attribute Operation Triangulation.
Instead the company winked that it knew who made the tools when it chose the name and logo of the hacking campaign.
techcrunch.com/2026/03/09/a...
10.03.2026 02:12
π 24
π 4
π¬ 2
π 0
MuddyWater Exposed: Inside an Iranian APT operation
MuddyWater espionage campaign exposed
The Ctrl-Alt-Intel team has dumped the content of misconfigured command and control servers linked to the MuddyWater Iranian APT, aka Static Kitten, Mango Sandstorm, Earth Vetala, Seedworm, and TA450
ctrlaltintel.com/threat%20res...
05.03.2026 18:28
π 9
π 6
π¬ 0
π 0
Phrack Prophile on FX
Click to read the article on phrack
phrack.org/issues/68/2#...
Another legend has crossed over. Thank you @fxv2.bsky.social for being your kind, brilliant self, whose contributions are too many to name, not just in hacking, but in being a superconnector who I now know is responsible for so many friendships & marriages. You are missed.
02.03.2026 19:09
π 35
π 10
π¬ 3
π 1
A Deep Dive into the GetProcessHandleFromHwnd API - Project Zero
In my previous blog post I mentioned the GetProcessHandleFromHwnd API. This was an API I didnβt know existed until I found a publicly disclosed UAC bypass us...
In the final part of his blog series, @tiraniddo.dev tells the story of how a bug was introduced into a Windows API.
Code re-writes can improve security, but itβs important not to forget the security properties the code needs to enforce in the process.
projectzero.google/2026/02/gphf...
26.02.2026 19:41
π 5
π 4
π¬ 0
π 0
[RSS] Discovery & Analysis of CVE-2025-29969
www.safebreach.com ->
(Windows MS-EVEN RPC Remote Code Execution Vulnerability)
Original->
20.02.2026 18:46
π 0
π 1
π¬ 0
π 0
Guess what's out :)
19.02.2026 14:10
π 8
π 4
π¬ 0
π 0
We have disclosed CVE-2026-2329, a critical unauth stack-based buffer overflow vuln affecting the Grandstream GXP1600 series of VoIP phones. Read our disclosure on the @rapid7.com blog, including technical details for unauth RCE, and accompanying @metasploit-r7.bsky.social modules: r-7.co/4tIzope
18.02.2026 14:39
π 3
π 5
π¬ 0
π 0
Three-part series Binarly on Supermicro BMC firmware authentication bypasses
Part 1: www.binarly.io/blog/ghost-i...
Part 2: www.binarly.io/blog/broken-...
Part 3: www.binarly.io/blog/have-yo...
#infosec
15.02.2026 12:45
π 14
π 4
π¬ 0
π 0
[RSS] IDA Pro 9.3 released
docs.hex-rays.com ->
Original->
15.02.2026 13:06
π 0
π 1
π¬ 0
π 0
Reconnaissance Has Begun for the New BeyondTrust RCE (CVE-2026-1731): Here's What We See So Far
A PoC for CVE-2026-1731 hit GitHub on Feb 10. Within 24 hours, GreyNoise observed reconnaissance probing for vulnerable BeyondTrust instances.
It took less than a day. A PoC for BeyondTrust CVE-2026-1731 hit GitHub, and GreyNoise immediately started seeing reconnaissance from multi-exploit actors hiding behind VPNs + custom tooling. See what our data reveals about whoβs mapping targets + how.
12.02.2026 18:13
π 2
π 2
π¬ 0
π 1
The February 2026 security updates are available:
10.02.2026 21:17
π 2
π 2
π¬ 0
π 0
CVE-2026-1731 | AttackerKB
On February 6, 2026, BeyondTrust published an advisory for a new critical command injection vulnerability, CVE-2026-1731, affecting their products Remote Suppoβ¦
We just published our @rapid7.com analysis of CVE-2026-1731, a critical command injection affecting BeyondTrust Privileged Remote Access (PRA) & Remote Support (RS). Unauthenticated RCE, with a root cause due to Bash arithmetic evaluation. Analysis/PoC here: attackerkb.com/topics/jNMBc...
10.02.2026 15:07
π 3
π 1
π¬ 0
π 1
Atredis identified a vulnerability in the way Rapid7's Nexpose was generating passwords to protect its Java KeyStore which is used to encrypt saved credentials. This vulnerability was reported to Rapid7 and a patch is being rolled out today! Check out the details here: github.com/atredispartn...
09.02.2026 19:27
π 0
π 2
π¬ 0
π 0
AMD updates installed without signature checking (from an HTTP link, no less)? /via @drwhax
mrbruh.com ->
Recent report about a nation-state implant that would be useful to exploit this:
blog.talosintelligence.com ->
Original->
06.02.2026 16:12
π 2
π 1
π¬ 0
π 0
Registration is open to all RECon classes!
As usual, Iβll be teaching Windows Internals. This is the only time this year that the class is offered in North America π
And if windows isnβt your thing, there are lots of other great classes!
recon.cx/2026/en/trai...
31.01.2026 15:34
π 4
π 2
π¬ 0
π 0
Hadn't realised that the third party review of Twitter's chat protocol had been published and wow github.com/trailofbits/...
28.01.2026 18:21
π 119
π 35
π¬ 2
π 6
New blog post is live! Xusheng tears apart a tiny Linux binary that really does not want to be reversed. Malformed ELF headers, segment tricks, layered XOR and RC4, plus a bunch of Binary Ninja tricks along the way. Read it here: binary.ninja/2026/01/23/r...
27.01.2026 15:31
π 7
π 3
π¬ 0
π 0
[RSS] Districton 1 Slides - Control the Variables and You Control the Code: Language-Level Vulnerabilities in Adobe ColdFusion
www.hoyahaxa.com ->
Original->
27.01.2026 08:10
π 0
π 3
π¬ 0
π 0