Blog

By category:
Maksymilian Kubiak

In our latest research, we discovered four critical vulnerabilities in Symfonia eDokumenty (formerly Ready_TM), including Remote Code Execution, SQL Injection, and more. This case illustrates why consistent and thorough security testing is essential for applications handling sensitive data.

Karol Mazurek

TCC on macOS isn’t just an annoying prompt—it’s the last line of defense between malware and your private data. This article breaks down how TCC works, why third-party developers must take bypass vulnerabilities seriously, and how seemingly minor flaws can open the door to real-world attacks. Written from the perspective of both attacker and defender, it’s a must-read for app developers and security researchers alike.

Karol Mazurek

How broken access and Null Pointer Dereference was found in macOS IOMobileFramebuffer (AppleCLCD2) service.

Paweł Zdunek

Invoker is a Burp Suite extension that automates external tools like dosfiner, sqlmap, nuclei, or ffuf, bridging the gap between captured requests and CLI commands.

Michał Majchrowicz

Explore how Windows API functions like GetWindowTextA and WM_GETTEXT can be used to interact with SAP GUI controls using Python. Whether retrieving window titles, extracting hidden text, or analyzing user input fields, these methods provide valuable insights for enhancing the security of SAP systems with penetration tests.

Karol Mazurek

Technical analysis of NULL Pointer Dereference bugs, mitigations, and exploit development challenges on Apple Silicon macOS.

Karol Mazurek

Discover how SLAP and FLOP attacks exploit Apple Silicon’s speculative execution vulnerabilities, enabling remote data leaks via web browsers. Learn about their impact, exploitation techniques, and potential mitigations to protect your privacy.

Karol Mazurek

The article explores Task Injection on macOS, detailing how attackers can acquire task ports, allocate memory, and execute arbitrary code within target processes. It demonstrates shellcode creation, memory management, and execution techniques, while examining macOS security mechanisms like taskgated, Hardened Runtime, and platform binary protections. Debugging and injection scenarios are tested, highlighting potential vulnerabilities and secure practices.

Karol Mazurek

The article presents a detailed breakdown of how ISO files can be used to bypass Microsoft Defender SmartScreen protections.

Zbigniew Piotrak

Read about multiple vulnerabilities in IBM i Access Client Solutions software related to connecting AS400 servers. Chaining those vulnerabilities could allow remote attackers to access client and server machines.

Is your company secure online?

Join our list of satisfied customers and safeguard your company’s data!

Trust us and leave your contact details. Our team will contact you to discuss the details and prepare a tailor-made offer for you. Full discretion and confidentiality of your data are guaranteed.

Willing to ask a question immediately? Visit our Contact page.