Entry Thumbnail

You’re Not Supposed To ShareFile With Everyone (Progress ShareFile Pre-Auth RCE Chain CVE-2026-2699 & CVE-2026-2701)

# You’re Not Supposed To ShareFile With Everyone (Progress ShareFile Pre-Auth RCE Chain CVE-2026-2699 & CVE-2026-2701) If you squint and look at the CISA KEV list, you might think it’s made up exclusively of vulnerabilities in file transfer solutions. While this would be wrong (and you shouldn’t squint, it’s bad […]

Posted by
Entry Thumbnail

CHECK Removed, Context Confused, Checkmate Achieved

## TL;DR In January 2026, the Chrome Releases blog announced several security fixes across different Chrome components. One entry caught our attention: **CVE-2026-0899**, an Out-of-Bounds memory access in V8 discovered by @p1nky4745. Vulnerabilities in V8, especially OOB and Type Confusions are always interesting from a security research perspective. We decided […]

Posted by
Entry Thumbnail

Operation TrueChaos: 0-Day Exploitation Against Southeast Asian Government Targets

At the beginning of 2026, Check Point Research observed a series of targeted attacks against government entities in Southeast Asia carried out via a legitimate TrueConf software installed in the targets’ environment. The investigation led to the discovery of a zero-day vulnerability in the TrueConf client, tracked as **CVE-2026-3502** with a **CVSS score […]

Posted by
Entry Thumbnail

InfinitySix TWAP Stale Price

# InfinitySix Stale TWAP Price Exploitation (BSC) Two compounding flaws in InfinitySix’s ( `$i6`) BSC staking contract were chained to extract **273,802 USDT** in block 89,703,286. The contract credits referral bonuses to a sponsor’s withdrawable balance immediately upon the referral’s `invest()` call; separately, its TWAP oracle enforces a 1-minute hard […]

Posted by
Entry Thumbnail

LML APower Reward-Claim Price Manipulation

# LML / APower Reward-Claim Price Manipulation On March 31, 2026 at 20:39:02 UTC, the attacker used flash-loaned capital on BNB Chain to manipulate the LML/USDT market, then batch-triggered reward claims for pre-seeded accounts through APower and immediately sold the resulting LML back into the distorted pool. The primary issue […]

Posted by
Entry Thumbnail

WhaleBit CES/IGT Staking Oracle Manipulation

# WhaleBit CES / IGT Staking Spot-Oracle Manipulation On March 31, 2026 at 22:56:21 UTC (Polygon block `84938872`), an attacker exploited WhaleBit’s unverified staking system through a **same-transaction spot-oracle manipulation** funded by a flash loan. The attacker EOA `0xe66b37de57b65691b9f4ac48de2c2b7be53c5c6f` used helper contract `0xb5a8d7a37d60aa662f4dc9b3ef4c32a3fe21fadf` to borrow `51,024.905390945780848543 CES`, run three batches […]

Posted by