Blog posts
Deep dives into vulnerabilities we discover, offensive security techniques we develop, and insights from the front lines of enterprise security research.

VoIP Penetration Tests
VoIP is transforming business communication with flexibility and cost savings. However, its reliance on the internet brings cybersecurity risks. Discover how VoIP works, common threats, and the role of penetration testers in protecting organizations.
Infrastructure
VOIP
Zbigniew Piotrak
February 13, 2026
5
min read
•
Apr 14, 2025

Case Study: IOMobileFramebuffer NULL Pointer Dereference
How broken access and Null Pointer Dereference was found in macOS IOMobileFramebuffer (AppleCLCD2) service.
MacOS
Reverse engineering
Vulnerability research
Karol Mazurek
February 12, 2026
8
min read
•
Apr 22, 2025

Threat of TCC Bypasses on macOS
TCC on macOS isn’t just an annoying prompt—it’s the last line of defense between malware and your private data. This article breaks down how TCC works, why third-party developers must take bypass vulnerabilities seriously, and how seemingly minor flaws can open the door to real-world attacks. Written from the perspective of both attacker and defender, it’s a must-read for app developers and security researchers alike.
Apple
MacOS
Red teaming
Vulnerability research
Karol Mazurek
February 12, 2026
6
min read
•
May 26, 2025

Ready_ Wasn’t Ready – Four Critical Vulnerabilities in Symfonia eDokumenty
In our latest research, we discovered four critical vulnerabilities in Symfonia eDokumenty (formerly Ready_TM), including Remote Code Execution, SQL Injection, and more. This case illustrates why consistent and thorough security testing is essential for applications handling sensitive data.
Vulnerability research
Web
Maksymilian Kubiak
February 12, 2026
5
min read
•
Jun 2, 2025

Desktop Application Testing: Essential Steps
Desktop applications handle critical business operations across enterprises. Banking software processes transactions. Healthcare apps store patient records. Manufacturing tools control production systems. They all share common security challenges that standard desktop application testing approaches miss. The problem is straightforward: most security testing methodologies were built for web and mobile applications. They don’t account for direct […]
Linux
MacOS
Vulnerability research
Windows
Paweł Woyke
February 13, 2026
3
min read
•
Nov 28, 2025

Unmasking the Security Labyrinth: Navigating the Perils of SAP GuiXT Scripting
This blog post uncovers critical vulnerabilities like Insecure Design, remote script loading, and NTLM hash theft.
SAP
Vulnerability research
Web
Windows
Michał Majchrowicz
February 13, 2026
5
min read
•
Jun 9, 2025

Null Pointer Exceptions: From Java’s Pitfalls to Kotlin’s Solutions
This article explores the root causes of NullPointerExceptions in Java and how Kotlin’s built-in null safety mechanisms offer a cleaner, safer alternative. Through practical code examples and real-world patterns, we compare both languages and highlight Kotlin’s advantages in writing more robust and maintainable code.
Web
Secure coding
Sławomir Zakrzewski
February 12, 2026
7
min read
•
Jun 16, 2025

When Memory Refuses to Forget: Sensitive Data Persistence in Desktop Application
This article explores a security flaw in desktop applications across Windows, Linux, and macOS: the persistent storage of sensitive data in memory.
Apple
Linux
MacOS
Red teaming
Secure coding
Karol Mazurek
February 12, 2026
5
min read
•
Jun 23, 2025

LLM Security: Prompt Injection Defense with CaMeL Framework
DeepMind released CaMeL, a new prompt injection security mechanism. It is based on Dual LLM design pattern. Is it an end to prompt injection?
AI
LLM
Mateusz Wojciechowski
February 12, 2026
7
min read
•
Jun 30, 2025

GraphQL Security from a Pentester’s Perspective
Discover key security vulnerabilities in GraphQL APIs, practical testing methods, and effective mitigations. Essential reading for security professionals and developers.
API
Secure coding
Vulnerability research
Web
Paweł Zdunek
February 12, 2026
32
min read
•
Jul 7, 2025
Sort by Categories
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Monthly Security Report
Subscribe to our Enterprise Security Report. Every month, we share what we're discovering in enterprise software, what vulnerabilities you should watch for, and the security trends we're seeing from our offensive security work.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
