Blog posts
Deep dives into vulnerabilities we discover, offensive security techniques we develop, and insights from the front lines of enterprise security research.

Enhancing User Privacy and Security with Android 15: A quick jump into New Features
Take a look at the security & privacy improvements brought to its users in Android 15. The article explores what was changed, how it affects daily users and application developers.
Mobile
Android
Marcin Węgłowski
February 12, 2026
3
min read
•
Mar 27, 2024

Red Team Tactics for Code Execution
This article delves into advanced methods for running code on systems safeguarded by hardened policies. Expanding on prior discussions about initial access approaches, it uncovers weaknesses in seemingly strong security measures. It offers insights into how Red Team Operators can navigate these obstacles in corporate settings.
Active Directory
Red teaming
Karol Mazurek
February 12, 2026
17
min read
•
Aug 5, 2024

Microsoft Defender SmartScreen bypass with copy-paste from ISO
The article presents a detailed breakdown of how ISO files can be used to bypass Microsoft Defender SmartScreen protections.
Red teaming
Vulnerability research
Windows
Karol Mazurek
February 12, 2026
5
min read
•
Sep 20, 2024

Task Injection on macOS
The article explores Task Injection on macOS, detailing how attackers can acquire task ports, allocate memory, and execute arbitrary code within target processes. It demonstrates shellcode creation, memory management, and execution techniques, while examining macOS security mechanisms like taskgated, Hardened Runtime, and platform binary protections. Debugging and injection scenarios are tested, highlighting potential vulnerabilities and secure practices.
Apple
MacOS
Reverse engineering
Vulnerability research
Karol Mazurek
February 12, 2026
12
min read
•
Jan 22, 2025

SLAP & FLOP: Apple Silicon’s Data Speculation Vulnerabilities
Discover how SLAP and FLOP attacks exploit Apple Silicon’s speculative execution vulnerabilities, enabling remote data leaks via web browsers. Learn about their impact, exploitation techniques, and potential mitigations to protect your privacy.
Apple
Vulnerability research
Karol Mazurek
February 12, 2026
4
min read
•
Jan 30, 2025

Case Study: Analyzing macOS IONVMeFamily Driver Denial of Service Issue
Explore a detailed case study on detecting vulnerabilities in macOS drivers. Learn how to analyze IOKit, reverse engineer kernel extensions, and debug system crashes using real-world techniques. This guide walks through the discovery of a Denial of Service (DoS) condition in the NS_01 driver within Apple’s IONVMeFamily, offering insights into fuzzing, integer overflow detection, and crash analysis.
Apple
Karol Mazurek
February 12, 2026
10
min read
•
Feb 12, 2025

JTAG & Flipper Zero: To repair the Proxmark3
Bricked your Proxmark3? No problem! This guide shows you how to revive it using Flipper Zero as a JTAG adapter, from setup to flashing recovery firmware. Plus, we’ll explore how JTAG can be used in hardware security and penetration testing.
Internet of things
Hardware
Marcin Węgłowski
February 12, 2026
12
min read
•
Feb 19, 2025

Microsoft 365 Phishing: Bypassing Outlook Spam Filters
Discover how attackers bypass Microsoft 365 spam filters using URL obfuscation to distribute malicious files. This vulnerability, reported to Microsoft but left unpatched, demonstrates why email security requires multiple layers of defense beyond built-in filters.
Red teaming
Social engineering
Web
Karol Mazurek
February 12, 2026
3
min read
•
Feb 24, 2025

TOCTOU Vulnerabilities in C# Applications: Mitigation
In this article, we explore TOCTOU vulnerabilities, subtle yet dangerous race conditions that occur when security checks and resource usage are not tightly coupled. In C# development on Windows, where file operations and dynamic code loading are common, understanding and mitigating these risks is essential for building secure and resilient applications.
Secure coding
Windows
Sławomir Zakrzewski
February 12, 2026
13
min read
•
Mar 5, 2025

Prompt Injection Mitigation: 7 Defense Strategies for LLMs
A practical guide to prompt injection mitigation strategies for LLM applications. Explores 7 defense methods including guardrails, design patterns, and input preprocessing - plus why no solution offers 100% protection.
AI
LLM
Mateusz Wojciechowski
February 12, 2026
6
min read
•
Mar 7, 2025
Sort by Categories
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Monthly Security Report
Subscribe to our Enterprise Security Report. Every month, we share what we're discovering in enterprise software, what vulnerabilities you should watch for, and the security trends we're seeing from our offensive security work.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Cookie Settings
We use cookies to provide you with the best possible experience. They also allow us to analyze user behavior in order to constantly improve the website for you.
See our Privacy PolicyThank you! Your submission has been received!
Oops! Something went wrong while submitting the form.