Entry Thumbnail

Beating XLoader at Speed: Generative AI as a Force Multiplier for Reverse Engineering

**Research by: Alexey Bukhteyev** XLoader is a widely observed malicious loader with information-stealing capabilities. It first surfaced in 2020 as a rebrand of the FormBook code base, a well-known and capable information stealer, and has since undergone substantial hardening and feature growth. In addition to the Windows variant, its developers […]

Posted by
Entry Thumbnail

Breaking Into a Brother (MFC-J1010DW): Three Security Flaws in a Seemingly Innocent Printer

## The Target: Brother MFC-J1010DW – Affected Models: `Brother Printer MFC-J1010DW` – Vulnerable Firmware: `Version <= 1.18` ## TL;DR: The Vulnerability Chain We discovered three vulnerabilities that when chained together, allow for complete remote compromise: – **Authentication Bypass via SNMP**- Retrieve the printer’s serial number without authentication, allowing attackers to […]

Posted by
Entry Thumbnail

Drawn to Danger: Windows Graphics Vulnerabilities Lead to Remote Code Execution and Memory Exposure

Check Point Research (CPR) identified three security vulnerabilities in the _Graphics Device Interface (_ `GDI`) in Windows. We promptly reported these issues to Microsoft, and they were addressed in the _Patch Tuesday_ updates in May, July, and August 2025. These are the vulnerabilities: Vulnerability disclosures such as these highlight the need for proactive […]

Posted by
Entry Thumbnail

Windows ARM64 Internals: Exception & Privilege Model, Virtual Memory Management, and Windows under Virtualization Host Extensions

# Windows ARM64 Internals: Exception & Privilege Model, Virtual Memory Management, and Windows under Virtualization Host Extensions (VHE) ## Introduction About 5 years ago I put out a blog post about 64-bit “memory paging” on a standard Intel x64-based Windows machine when I was first starting to learn about Windows […]

Posted by