Blog posts
Deep dives into vulnerabilities we discover, offensive security techniques we develop, and insights from the front lines of enterprise security research.

Microsoft Defender SmartScreen bypass with copy-paste from ISO
The article presents a detailed breakdown of how ISO files can be used to bypass Microsoft Defender SmartScreen protections.
Red teaming
Vulnerability research
Windows
Karol Mazurek
February 12, 2026
5
min read
•
Sep 20, 2024

Task Injection on macOS
The article explores Task Injection on macOS, detailing how attackers can acquire task ports, allocate memory, and execute arbitrary code within target processes. It demonstrates shellcode creation, memory management, and execution techniques, while examining macOS security mechanisms like taskgated, Hardened Runtime, and platform binary protections. Debugging and injection scenarios are tested, highlighting potential vulnerabilities and secure practices.
Apple
MacOS
Reverse engineering
Vulnerability research
Karol Mazurek
February 12, 2026
12
min read
•
Jan 22, 2025

SLAP & FLOP: Apple Silicon’s Data Speculation Vulnerabilities
Discover how SLAP and FLOP attacks exploit Apple Silicon’s speculative execution vulnerabilities, enabling remote data leaks via web browsers. Learn about their impact, exploitation techniques, and potential mitigations to protect your privacy.
Apple
Vulnerability research
Karol Mazurek
February 12, 2026
4
min read
•
Jan 30, 2025

Case Study: Analyzing macOS IONVMeFamily Driver Denial of Service Issue
Explore a detailed case study on detecting vulnerabilities in macOS drivers. Learn how to analyze IOKit, reverse engineer kernel extensions, and debug system crashes using real-world techniques. This guide walks through the discovery of a Denial of Service (DoS) condition in the NS_01 driver within Apple’s IONVMeFamily, offering insights into fuzzing, integer overflow detection, and crash analysis.
Apple
Karol Mazurek
February 12, 2026
10
min read
•
Feb 12, 2025

JTAG & Flipper Zero: To repair the Proxmark3
Bricked your Proxmark3? No problem! This guide shows you how to revive it using Flipper Zero as a JTAG adapter, from setup to flashing recovery firmware. Plus, we’ll explore how JTAG can be used in hardware security and penetration testing.
Internet of things
Hardware
Marcin Węgłowski
February 12, 2026
12
min read
•
Feb 19, 2025

Microsoft 365 Phishing: Bypassing Outlook Spam Filters
Discover how attackers bypass Microsoft 365 spam filters using URL obfuscation to distribute malicious files. This vulnerability, reported to Microsoft but left unpatched, demonstrates why email security requires multiple layers of defense beyond built-in filters.
Red teaming
Social engineering
Web
Karol Mazurek
February 12, 2026
3
min read
•
Feb 24, 2025

TOCTOU Vulnerabilities in C# Applications: Mitigation
In this article, we explore TOCTOU vulnerabilities, subtle yet dangerous race conditions that occur when security checks and resource usage are not tightly coupled. In C# development on Windows, where file operations and dynamic code loading are common, understanding and mitigating these risks is essential for building secure and resilient applications.
Secure coding
Windows
Sławomir Zakrzewski
February 12, 2026
13
min read
•
Mar 5, 2025

Prompt Injection Mitigation: 7 Defense Strategies for LLMs
A practical guide to prompt injection mitigation strategies for LLM applications. Explores 7 defense methods including guardrails, design patterns, and input preprocessing - plus why no solution offers 100% protection.
AI
LLM
Mateusz Wojciechowski
February 12, 2026
6
min read
•
Mar 7, 2025

NULL Pointer Dereference on macOS: Exploitation History
Technical analysis of NULL Pointer Dereference bugs, mitigations, and exploit development challenges on Apple Silicon macOS.
MacOS
Vulnerability research
Apple
Karol Mazurek
February 12, 2026
15
min read
•
Mar 10, 2025

PostgreSQL Injection in NetIQ: CVE-2024-10864 & CVE-2024-10865
NetIQ Advanced Authentication reflected XSS vulnerability (CVE-2024-10865) discovered during PostgreSQL injection testing
Web
Maksymilian Kubiak
February 12, 2026
5
min read
•
Jul 15, 2025
Sort by Categories
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Monthly Security Report
Subscribe to our Enterprise Security Report. Every month, we share what we're discovering in enterprise software, what vulnerabilities you should watch for, and the security trends we're seeing from our offensive security work.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
