Wpisy na Blogu
Szczegółowe omówienia odkrytych przez nas podatności, innowacyjnych technik testów bezpieczeństwa i praktycznych spostrzeżeń z badań nad ochroną dużych organizacji.

Firmware Hacking: From Router Firmware to Buffer Overflow on MIPS
Full pipeline walkthrough: firmware extraction, Ghidra reverse engineering, QEMU emulation, and GDB fork-following to confirm a pre-auth stack buffer overflow in a MIPS router CGI binary. Including the debugging and troubleshooting steps most writeups skip.
Hardware
Franciszek Malek
March 27, 2026
19
min read
•
Mar 27, 2026

TLPT DORA 2026: Wymogi RTS i 6-Fazowy Proces Testowania
Kompletny przewodnik po TLPT pod DORA - kto jest objęty obowiązkiem, jak przebiega każda z sześciu faz, czego wymaga regulacja od red teamów i dostawców threat intelligence, i na co zwrócić uwagę przy wyborze partnera.
Buyer's Guide
Paweł Woyke
March 27, 2026
14
min read
•
Feb 24, 2026

Kiosk Breakout: From PIN Bypass to NT AUTHORITY\SYSTEM
Three kiosk breakout techniques chained during an AFINE engagement - from cracking a KioWare PIN to NT AUTHORITY\SYSTEM. Covers CVE-2024-3459, CVE-2024-3460, and a bypass of CVE-2022-44875 across file dialog escapes, Adobe Acrobat sandbox escape, and iframe privilege escalation.
Vulnerability research
Windows
Maksymilian Kubiak
March 27, 2026
12
min read
•
Mar 25, 2026

Hunting GlassWorm: Open-Source Detection for Invisible Supply Chain Payloads
GlassWorm has compromised 400+ packages across five waves - and you can't see the malicious code. It hides inside invisible Unicode characters that your editor, terminal, and linter all render as nothing. We built glassworm-hunter to fix that: a free, open-source Python scanner that detects GlassWorm payloads in your VS Code extensions, npm packages, and Python dependencies before they become your problem.
Vulnerability research
Paweł Woyke
Sławomir Zakrzewski
March 21, 2026
9
min read
•
Mar 20, 2026

USB HID Attack for $3: Brute-Forcing a Kiosk PIN with an Attiny85
A $3 microcontroller. No lockout. 10,000 PIN combinations. Here's how CVE-2024-3461 turns any KioWare kiosk into an open door - and why USB HID attacks bypass every USB security policy you have.
Vulnerability research
Hardware
Red teaming
Maksymilian Kubiak
March 27, 2026
7
min read
•
Mar 13, 2026
Stored XSS to RCE: Finding CVE-2025-4951 in Rapid7 AppSpider
How an unvalidated XML field in Rapid7 AppSpider escalates to arbitrary code execution via ActiveX. CVE-2025-4951, found during a manual audit.
Vulnerability research
Maksymilian Kubiak
March 19, 2026
9
min read
•
Mar 13, 2026

Pickle Deserialization in ML Pipelines: The RCE that won’t go away
Pickle deserialization in ML pipelines is a silent RCE vector hiding in plain sight - passing code review, surviving security audits, and shipping to production at companies that know better. Here's why it keeps happening.
Vulnerability research
Secure coding
Sławomir Zakrzewski
March 12, 2026
min read
•

Dyrektywa NIS2 a testy penetracyjne: Praktyczny przewodnik dla menedżerów bezpieczeństwa
Dyrektywa NIS2 nie wymaga tylko dokumentacji - wymaga dowodu, że kontrole bezpieczeństwa wytrzymują rzeczywisty atak. Techniczne i operacyjne omówienie dla menedżerów bezpieczeństwa.
Buyer's Guide
Paweł Woyke
March 6, 2026
9
min read
•
Mar 5, 2026

Web Application Penetration Testing Services: How to Evaluate a Provider
What to look for in a web application penetration testing provider - and how to tell if you're getting a real test or a cleaned-up scanner report.
Buyer's Guide
Paweł Woyke
March 5, 2026
15
min read
•
Feb 28, 2026

Caido vs Burp Suite - Porównanie Narzędzi do Pentestów
Czy Caido to poważna alternatywa dla Burp Suite Professional? Porównanie funkcjonalności obu narzędzi.
Web
Vulnerability research
Rafał Wójcicki
February 28, 2026
12
min read
•
Feb 27, 2026
Next
1 / 6
Sort by Categories
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Miesięczny Raport Ofensywny
Dołącz do naszego newslettera! Co miesiąc ujawniamy nowe zagrożenia w oprogramowaniu biznesowym, wskazujemy kluczowe luki wymagające uwagi oraz analizujemy trendy w cyberbezpieczeństwie na podstawie naszych testów ofensywnych.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Cookie Settings
We use cookies to provide you with the best possible experience. They also allow us to analyze user behavior in order to constantly improve the website for you.
See our Privacy PolicyThank you! Your submission has been received!
Oops! Something went wrong while submitting the form.