Security Review #303

April 17, 2026

Programming is 10% science, 25% ingenuity and 65% getting the ingenuity to work with the science.

— Unknown

Starred Articles

Stealthy RCE on Hardened Linux: noexec + Userland Execution PoC

In this article, we prove that once arbitrary code execution lands inside a process, most of the “hardened Linux” playbook turns into expensive theater. Noexec, MAC policies, filesystem controls - all bypassed in userspace with zero kernel involvement.

Abusing WinML for In-Memory Staging and EDR Evasion

This article discusses how legitimate machine learning infrastructure can be abused for payload delivery, in-memory staging, and EDR evasion on Windows 10/11.

Building Runtime Enforcement for Kubernetes with eBPF

How we replaced a Falco sidecar with an embedded eBPF sensor, built a five-stage event pipeline, and learned the hard way why namespace scoping matters for enforcement.

BlueHammer: Inside the Windows Zero-Day

We detail the BlueHammer exploit, a Windows zero-day leveraging Defender's update process to escalate privileges, remaining unpatched.

New Articles

Mirax: a new Android RAT turning infected devices into potential residential proxy nodes

A technical analysis of Mirax, a sophisticated Malware-as-a-Service (MaaS) offering, specifically targeting Android devices. It integrates advanced Remote Access Trojan (RAT) capabilities and enhances its operational value by turning infected devices into residential proxy nodes.

A brief analysis of a vulnerability in the glibc (CVE-2025-4802)

In this article, we present a succinct analysis of the vulnerability CVE-2025-4802, which affects the GNU project's implementation of libc, This vulnerability allows statically linked ELF binaries that execute dlopen() to load arbitrary libraries via the LD_LIBRARY_PATH environment variable on a SUID binary, leading to privilege escalation.

DSCourier: Weaponizing DSC via WinGet COM API for Evasive Execution

This post delves into the abuse of WinGet as a LoL binary. Instead of calling winget.exe, we invoke the WinGet Configuration engine directly through its COM API, completely removing the CLI process from the execution chain. The result is arbitrary code execution inside a Microsoft-signed process with no winget.exe, no powershell.exe, and no cmd.exe in the process tree.

Inside an AI-enabled device code phishing campaign

We analyze a widespread phishing campaign leveraging the device code authentication flow to compromise organizational accounts at scale. This campaign demonstrated a higher success rate, driven by automation and dynamic code generation that circumvented the standard 15-minute expiration window for device codes.

Disclosure: Command Injection in Geutebruck Cameras

We identified a command injection vulnerability in Geutebruck security cameras that allows authenticated attackers to execute arbitrary commands as root through the web interface. The root cause is unsanitized user input being passed into a sed script.

LOLBins – Analysis of MSBuild-Based Attack Techniques

Threat actors exploit MSBuild.exe to execute arbitrary code without explicitly leaving malware on disk, and covertly perform additional actions in the post-infiltration phase. In this article, we will introduce how the attack technique utilizing MSBuild works, look at actual attack cases, and suggest countermeasures.

EvilTokens: Turning OAuth Device Codes into Full-Scale...

Overview of a phishing-as-a-service platform exploiting Microsoft’s Device Code OAuth flow at scale, then weaponizing stolen tokens with AI-powered email intelligence to automate business email compromise.

Fail Open, Game Over: Turning a One-Line Tomcat Fix into Unauthenticated RCE

We uncovered a fail-open regression in Apache Tomcat's cluster encryption that turns a one-line code change into unauthenticated Remote Code Execution (CVE-2026-34486). The flaw lies in a previous patch leading to unconditional deserialization of attacker-controled bytes.

Paying Google to Hack macOS Users?

Installing software with curl | sh is a bad habit - unfortunately common nowadays. This is an attack vector exploited through malvertising. The article describes what happens when someone blindly installs a tool from a sponsored website.

Active Directory Pentesting - Part 1

This post covers the AD fundamentals every pentester needs locked in: domains, trees, forests, the Domain Controller as crown jewel, Kerberos SSO, multi-master replication, and why even a low-privileged domain account is worth more than it looks.

jq For Forensics

jq is a great tool for parsing JSON data. But DFIR professionals often apply jq differently from the typical examples you see written for developers.

Unpatched RAGFlow Vulnerability Allows Post-Auth RCE

A vulnerability in RAGFlow allows low-privilege authenticated users to execute arbitrary code on instances using Infinity for chunk storage. In this article, we walk through the discovery, and exploitation of the vulnerability.

Unearthed Arcana