Blog

By category:
Karol Mazurek

Technical analysis of NULL Pointer Dereference bugs, mitigations, and exploit development challenges on Apple Silicon macOS.

A hound on a leash that represents the constraints that we put on Large Language Models.
Mateusz Wojciechowski

This article touches on the subject of recommendations for fixing Prompt Injection vulnerabilities. It introduces broad categories of the mitigations and explains issues with them.

Sławomir Zakrzewski

In this article, we explore TOCTOU vulnerabilities, subtle yet dangerous race conditions that occur when security checks and resource usage are not tightly coupled. In C# development on Windows, where file operations and dynamic code loading are common, understanding and mitigating these risks is essential for building secure and resilient applications.

Karol Mazurek

Discover how attackers bypass Outlook spam filters using disguised hyperlinks to deliver malicious ISO files. Learn the risks and how to protect your inbox.

Marcin Węgłowski

Bricked your Proxmark3? No problem! This guide shows you how to revive it using Flipper Zero as a JTAG adapter, from setup to flashing recovery firmware. Plus, we’ll explore how JTAG can be used in hardware security and penetration testing.

Karol Mazurek

Explore a detailed case study on detecting vulnerabilities in macOS drivers. Learn how to analyze IOKit, reverse engineer kernel extensions, and debug system crashes using real-world techniques. This guide walks through the discovery of a Denial of Service (DoS) condition in the NS_01 driver within Apple’s IONVMeFamily, offering insights into fuzzing, integer overflow detection, and crash analysis.

Karol Mazurek

Discover how SLAP and FLOP attacks exploit Apple Silicon’s speculative execution vulnerabilities, enabling remote data leaks via web browsers. Learn about their impact, exploitation techniques, and potential mitigations to protect your privacy.

Karol Mazurek

The article explores Task Injection on macOS, detailing how attackers can acquire task ports, allocate memory, and execute arbitrary code within target processes. It demonstrates shellcode creation, memory management, and execution techniques, while examining macOS security mechanisms like taskgated, Hardened Runtime, and platform binary protections. Debugging and injection scenarios are tested, highlighting potential vulnerabilities and secure practices.

Karol Mazurek

The article presents a detailed breakdown of how ISO files can be used to bypass Microsoft Defender SmartScreen protections.

Karol Mazurek

Explore advanced techniques for bypassing anti-execution defenses in corporate environments. This article delves into methods for executing code on hardened systems during Red Team Operations after gaining initial access.

Is your company secure online?

Join our list of satisfied customers and safeguard your company’s data!

Trust us and leave your contact details. Our team will contact you to discuss the details and prepare a tailor-made offer for you. Full discretion and confidentiality of your data are guaranteed.

Willing to ask a question immediately? Visit our Contact page.