Entry Thumbnail

Defeating KASLR by Doing Nothing at All

_Posted by Seth Jenkins, Project Zero_ # Introduction I’ve recently been researching Pixel kernel exploitation and as part of this research I found myself with an excellent arbitrary write primitive…but without a KASLR leak. As necessity is the mother of all invention, on a hunch, I started researching the Linux […]

Posted by
Entry Thumbnail

Beating XLoader at Speed: Generative AI as a Force Multiplier for Reverse Engineering

**Research by: Alexey Bukhteyev** XLoader is a widely observed malicious loader with information-stealing capabilities. It first surfaced in 2020 as a rebrand of the FormBook code base, a well-known and capable information stealer, and has since undergone substantial hardening and feature growth. In addition to the Windows variant, its developers […]

Posted by
Entry Thumbnail

Breaking Into a Brother (MFC-J1010DW): Three Security Flaws in a Seemingly Innocent Printer

## The Target: Brother MFC-J1010DW – Affected Models: `Brother Printer MFC-J1010DW` – Vulnerable Firmware: `Version <= 1.18` ## TL;DR: The Vulnerability Chain We discovered three vulnerabilities that when chained together, allow for complete remote compromise: – **Authentication Bypass via SNMP**- Retrieve the printer’s serial number without authentication, allowing attackers to […]

Posted by
Entry Thumbnail

Drawn to Danger: Windows Graphics Vulnerabilities Lead to Remote Code Execution and Memory Exposure

Check Point Research (CPR) identified three security vulnerabilities in the _Graphics Device Interface (_ `GDI`) in Windows. We promptly reported these issues to Microsoft, and they were addressed in the _Patch Tuesday_ updates in May, July, and August 2025. These are the vulnerabilities: Vulnerability disclosures such as these highlight the need for proactive […]

Posted by