Windows Internals Blog
Yarden Shafir
Goodbye Secure Pool, Hello KDP Pool
Kernel Data Protection (KDP) is a Windows 11 VBS feature that allows drivers to protect their data from being modified by other kernel drivers or malware that achieved kernel write access. It actually contains two separate features: static and dynamic KDP. Static KDP, that allows drivers to enforce...
Zero Day Initiative
TrendAI Research Team
CVE-2026-33824: Remote Code Execution in Windows IKEv2
In this excerpt of a TrendAI Research Services vulnerability report, Richard Chen and Lucas Miller of the TrendAI Research team detail a recently patched double free vulnerability in the Windows Internet Key Exchange (IKE) service. This bug was originally discovered by WARP & MORSE team at
Talos - Vulnerability Reports
Adobe Photoshop Installation Privilege Escalation Vulnerability
CVE-2026-34632 A privilege escalation vulnerability exists during the installation of Adobe Photoshop via the Microsoft Store. The vulnerable version of the installer is Photoshop\_Set-Up.exe 2.11.0.30. A low-privilege user can replace files during the installation process, which may result in...
Check Point Research
antoniost@checkpoint.com
DFIR Report – The Gentlemen & SystemBC: A Sneak Peek Behind the Proxy
Key Points The Gentlemen RaaS The Gentlemen ransomware‑as‑a‑service (RaaS) operation is a relatively new group that emerged around mid‑2025. The operators advertise their services across multiple underground forums, promoting their ransomware platform and inviting penetration testers (and other technically skilled actors) to join as affiliates. The RaaS provides affiliates with multi‑OS lockers for Windows, Linux, […]
Cisco Talos Blog
Foxit, LibRaw vulnerabilities
Cisco Talos’ Vulnerability Discovery & Research team recently disclosed one Foxit Reader vulnerability, and six LibRaw file reader vulnerabilities. The vulnerabilities mentioned in this blog post have been patched by their respective vendors, all in adherence to Cisco’s third-party vulnerability disclosure policy.     For Snort coverage that can detect the exploitation of these vulnerabilities, download the latest rule sets from Snort.org, and our latest Vulnerability Advisories are always pos
Talos - Vulnerability Reports
LibRaw uncompressed_fp_dng_load_raw integer overflow vulnerability
CVE-2026-24450 An integer overflow vulnerability exists in the uncompressed\_fp\_dng\_load\_raw functionality of LibRaw Commit 8dc68e2. A specially crafted malicious file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability. The versions below...
Talos - Vulnerability Reports
LibRaw HuffTable::initval heap-based buffer overflow vulnerability
CVE-2026-20911 A heap-based buffer overflow vulnerability exists in the HuffTable::initval functionality of LibRaw Commit 0b56545 and Commit d20315b. A specially crafted malicious file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability. The...
Talos - Vulnerability Reports
LibRaw x3f_load_huffman heap-based buffer overflow vulnerability
CVE-2026-24660 A heap-based buffer overflow vulnerability exists in the x3f\_load\_huffman functionality of LibRaw Commit d20315b. A specially crafted malicious file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability. The versions below were...
Artificial truth
jvoisin
A quick look at __pledge_open
A recent article of the OpenBSD journal caught me attention: Pledge changes in 7.9-beta (archive.org mirror as it's currently offline). The quoted message starts with: > Previously under certain promises it was possible to open certain files or devices even if the program didn't pledge "rpath" or...
Check Point Research
stcpresearch
Operation TrueChaos: 0-Day Exploitation Against Southeast Asian Government Targets
Key Points Introduction At the beginning of 2026, Check Point Research observed a series of targeted attacks against government entities in Southeast Asia carried out via a legitimate TrueConf software installed in the targets’ environment. The investigation led to the discovery of a zero-day vulnerability in the TrueConf client, tracked as CVE-2026-3502 with a CVSS score of 7.8. […]
Talos - Vulnerability Reports
Foxit Reader List Box Calculate Array Use-After-Free Vulnerability
CVE-2026-3779 A use-after-free vulnerability exists in the way Foxit Reader handles an Array object. A specially crafted JavaScript code inside a malicious PDF document can trigger this vulnerability, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to...
Check Point Research
alexeybu
ChatGPT Data Leakage via a Hidden Outbound Channel in the Code Execution Runtime
Key Takeaways What Happened AI assistants now handle some of the most sensitive data people own. Users discuss symptoms and medical history. They ask questions about taxes, debts, and personal finances, upload PDFs, contracts, lab results, and identity-rich documents that contain names, addresses, account details, and private records. That trust depends on a simple expectation: […]
Check Point Research
matthewsu
AI Threat Landscape Digest January-February 2026
KEY FINDINGS AI-assisted malware development has reached operational maturity.VoidLink framework, which is modular, professionally engineered, and fully functional,was built by a single developer using a commercial AI-powered IDE within a compressedtimeframe. AI-assisted development is no longer experimental but produces deploymentreadyoutput. AI-assisted development is not always obvious from the final product.VoidLink was initially assessed as the […]
Cisco Talos Blog
TP-Link, Canva, HikVision vulnerabilities
Cisco Talos’ Vulnerability Discovery & Research team recently disclosed a vulnerability in HikVision, as well as 10 in TP-Link, and 19 in Canva. The vulnerabilities mentioned in this blog post have been patched by their respective vendors, all in adherence to Cisco’s third-party vulnerability disclosure policy. For Snort coverage that can detect the exploitation of these vulnerabilities, download the latest rule sets from Snort.org, and our latest Vulnerability Advisories are always posted on
Artificial truth
jvoisin
Quick notes on KERNSEAL
The mysterious unreadable `kernseal.txt` file on PaX' documentation page has been sitting there since 2003, described as "sealed kernel storage design & implementation." In 2006, it was described as: > the problem KERNSEAL sets out to solve is kernel self-protection, that is, assuming arbitrary...
GitHub
sleightofalex
Salesforce Workbench Disclosure
Reported to: Salesforce Product: Workbench Date Reported: 2026-03-23 Severity: Redacted until the 90-day disclosure is lifted. 90-day Deadline Expires: 2026-06-21
Talos - Vulnerability Reports
Hangzhou Hikvision Digital Technology Co., Ltd. Face Recognition Modules SADP XML parsing stack-based buffer overflow vulnerability
CVE-2025-66176 A stack-based buffer overflow vulnerability exists in the SADP XML parsing functionality of Hangzhou Hikvision Digital Technology Co., Ltd. Ultra Face Recognition Terminal 3.7.60\_250613 and Face Recognition Terminal for Turnstyle 3.7.0\_240524 (under emulation). A specially crafted...
Talos - Vulnerability Reports
Canva Affinity EMF File EMR_HEADER nDescription Out-Of-Bounds Read Vulnerability
CVE-2025-62500 An out-of-bounds read vulnerability exists in the EMF functionality of Canva Affinity. By using a specially crafted EMF file, an attacker could exploit this vulnerability to perform an out-of-bounds read, potentially leading to the disclosure of sensitive information. The versions...
Talos - Vulnerability Reports
Canva Affinity EMF File EMR_POLYBEZIER Count Out-Of-Bounds Read Vulnerability
CVE-2025-61952 An out-of-bounds read vulnerability exists in the EMF functionality of Canva Affinity. By using a specially crafted EMF file, an attacker could exploit this vulnerability to perform an out-of-bounds read, potentially leading to the disclosure of sensitive information. The versions...
Talos - Vulnerability Reports
Tp-Link AX53 v1.0 tmpServer opcode 0x429 stack-based buffer overflow vulnerability
CVE-2025-62405 A stack-based buffer overflow vulnerability exists in the tmpServer SmartNetSetClientList() functionality of Tp-Link AX53 v1.0 1.3.1 Build 20241120 rel.54901(5553). A specially crafted set of network packets can lead to arbitrary code execution. An attacker can send packets to...
Check Point Research
matthewsu
“Handala Hack” – Unveiling Group’s Modus Operandi
Key Findings Introduction Handala Hack, also tracked by Check Point Research as Void Manticore, is an Iranian threat actor that is known for multiple destructive wiping attacks combined with “hack and leak” operations. The threat actor operates several online personas, with the most prominent among them being Homeland Justice, maintained from mid-2022 specifically for multiple attacks […]
Cisco Talos Blog
DirectX, OpenFOAM, Libbiosig vulnerabilities
Cisco Talos’ Vulnerability Discovery & Research team recently disclosed vulnerabilities in the BioSig Project Libbiosig library and OpenCFD OpenFOAM, as well as an unpatched vulnerability in Microsoft DirectX.
Talos - Vulnerability Reports
Microsoft DirectX End-User Runtime Web Installer Privilege Escalation Vulnerability
CVE-2025-68623 A local privilege escalation vulnerability exists during the installation of Microsoft DirectX End-User Runtime. A low-privilege user can replace an executable file during the installation process, which may result in unintended elevation of privileges. The versions below were...
Check Point Research
stcpresearch
Iranian MOIS Actors & the Cyber Crime Connection
Iran‑linked MOIS threat actors increasingly leverage cybercrime tools, malware, and ransomware ecosystems to enhance capability, obscure attribution, and advance state objectives.
GitHub
rcorrea35
Swagger-Parser race condition leads to Cross-Thread Data Contamination
### Summary The swagger-parser library is not thread safe for OpenAPI 3.1 specifications. When parsing on multiple threads concurrently it is possible for the parsing results for specs on concurr...
Check Point Research
stcpresearch
Interplay between Iranian Targeting of IP Cameras and Physical Warfare in the Middle East
Key Findings Introduction As highlighted in the Cyber Security Report 2026, cyber operations have increasingly become an additional tool in interstate conflicts, used both to support military operations and to enable ongoing battle damage assessment (BDA). During the 12-day conflict between Israel and Iran in June 2025, the compromise of cameras was likely used to support […]
Check Point Research
bferrite
Silver Dragon Targets Organizations in Southeast Asia and Europe
Key Findings Introduction In recent months, Check Point Research (CPR) has been tracking a sophisticated, Chinese-aligned threat group whose activity demonstrates operational correlation with campaigns previously associated with APT41. We have designated this activity cluster as Silver Dragon. This group actively targets organizations in Southeast Asia and Europe, with a particular focus on government entities. […]
Talos - Vulnerability Reports
The Biosig Project libbiosig Intan CLP parsing heap-based buffer overflow vulnerability
CVE-2026-22891 A heap-based buffer overflow vulnerability exists in the Intan CLP parsing functionality of The Biosig Project libbiosig 3.9.2 and Master Branch (db9a9a63). A specially crafted Intan CLP file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger...
Talos - Vulnerability Reports
The Biosig Project libbiosig Nicolet WFT parsing heap-based buffer overflow vulnerability
CVE-2026-20777 A heap-based buffer overflow vulnerability exists in the Nicolet WFT parsing functionality of The Biosig Project libbiosig 3.9.2 and Master Branch (db9a9a63). A specially crafted .wft file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this...
Talos - Vulnerability Reports
The Biosig Project libbiosig ABF parsing out-of-bounds read vulnerability
CVE-2025-64736 An out-of-bounds read vulnerability exists in the ABF parsing functionality of The Biosig Project libbiosig 3.9.2 and Master Branch (5462afb0). A specially crafted .abf file can lead to an information leak. An attacker can provide a malicious file to trigger this vulnerability. The...
Check Point Research
samanthar@checkpoint.com
Caught in the Hook: RCE and API Token Exfiltration Through Claude Code Project Files | CVE-2025-59536 | CVE-2026-21852
By Aviv Donenfeld and Oded Vanunu Executive Summary Check Point Research has discovered critical vulnerabilities in Anthropic’s Claude Code that allow attackers to achieve remote code execution and steal API credentials through malicious project configurations. The vulnerabilities exploit various configuration mechanisms including Hooks, Model Context Protocol (MCP) servers, and environment variables -executing arbitrary shell commands […]
Check Point Research
samanthar@checkpoint.com
2025: The Untold Stories of Check Point Research
Introduction Check Point Research (CPR) continuously tracks threats, following the clues that lead to major players and incidents in the threat landscape. Whether it’s high-end financially-motivated campaigns or state-sponsored activity, our focus is to figure out what the threat is, report our findings to the relevant parties, and make sure Check Point customers stay protected. […]
Zero Day Initiative
TrendAI Research Team
CVE-2026-20841: Arbitrary Code Execution in the Windows Notepad
In this excerpt of a TrendAI Research Services vulnerability report, Nikolai Skliarenko and Yazhi Wang of the TrendAI Research team detail a recently patched command injection vulnerability in the Windows Notepad application. This bug was originally discovered by Cristian Papa and Alasdair Gorniak
Cisco Talos Blog
“Good enough” emulation: Fuzzing a single thread to uncover vulnerabilities
A Talos researcher used targeted emulation of the Socomec DIRIS M-70 gateway’s Modbus thread to uncover six patched vulnerabilities, showcasing efficient tools and methods for IoT security testing.
Talos - Vulnerability Reports
OpenCFD OpenFOAM Code Stream directive arbitrary code execution vulnerability
CVE-2025-61982 An arbitrary code execution vulnerability exists in the Code Stream directive functionality of OpenCFD OpenFOAM 2506. A specially crafted OpenFOAM simulation file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability. The...
Check Point Research
shlomoo@checkpoint.com
AI in the Middle: Turning Web-Based AI Services into C2 Proxies & The Future Of AI Driven Attacks
<h2>Key Points</h2> <ul> <li>Check Point Research (CPR) has discovered that certain AI assistants that support web browsing or URL fetching can be abused as covert command-and-control relays (“AI as a proxy”), allowing attacker traffic to blend seamlessly into legitimate, commonly permitted...
Zero Day Initiative
TrendAI Research Team
CVE-2025-6978: Arbitrary Code Execution in the Arista NG Firewall
In this excerpt of a TrendAI Research Services vulnerability report, Jonathan Lein and Simon Humbert of the TrendAI Research team detail a recently patched command injection vulnerability in the Arista NG Firewall. This bug was originally discovered by Gereon Huppertz and reported through the Tren
Artificial truth
jvoisin
Antide's Law
A friend of mine, namely Antide "xarkes" Petit, came up with a pretty good rule of thumb that I think should be elevated into a law, Antide's Law: > If it's unclear what a cyber-security company is doing, what they're doing is pretty clear. For example, take a look at Offensive Con 2025 and 2024...
Check Point Research
samanthar@checkpoint.com
Amaranth-Dragon: Weaponizing CVE-2025-8088 for Targeted Espionage in the Southeast Asia
<h2>Key Points</h2> <ul> <li>Check Point Research (CPR) has been tracking <strong>Amaranth-Dragon,</strong> a nexus of <strong>APT-41</strong>, previously aligned with Chinese interests. The group launched highly targeted cyber-espionage campaigns throughout 2025 against government and law...
Check Point Research
samanthar@checkpoint.com
Cyber Security Report 2026
<p>Check Point Research continuously investigates real-world attacks, vulnerabilities, attackers’ infrastructure, and emerging techniques across global networks and environments. The <a href="https://www.checkpoint.com/security-report/" rel="noreferrer" target="_blank">Cyber Security Report...
Check Point Research
samanthar@checkpoint.com
KONNI Adopts AI to Generate PowerShell Backdoors
<h2>Key Findings:</h2> <ul> <li>Check Point Research (CPR) is tracking a phishing campaign linked to a North Korea–aligned threat actor known as KONNI.</li> <li>This activity goes beyond KONNI’s typical focus areas, indicating broader targeting across the APAC region, including Japan,...
GitHub
rcorrea35
Python Wheel (Zip) Parser Differential Vulnerability v2.0
### Summary It is still possible (albeit with significantly more effort) to upload a specially crafted Wheel file (i.e. zip) to PyPI that when installed with PIP (or another Python zipfile based t...
Check Point Research
samanthar@checkpoint.com
VoidLink: Evidence That the Era of Advanced AI-Generated Malware Has Begun
<h2>Key Points</h2> <ul> <li>Check Point Research (CPR) believes a new era of AI-generated malware has begun. <a href="https://research.checkpoint.com/2026/voidlink-the-cloud-native-malware-framework/" rel="noreferrer" target="_blank">VoidLink</a> stands as the first evidently documented case of...
Talos - Vulnerability Reports
MedDream PACS Premium sendOruReport reflected cross-site scripting (XSS) vulnerability
CVE-2025-44000 A reflected cross-site scripting (xss) vulnerability exists in the sendOruReport functionality of MedDream PACS Premium 7.3.6.870. A specially crafted malicious URL can lead to arbitrary javascript code execution. An attacker can provide a crafted URL to trigger this...
Talos - Vulnerability Reports
MedDream PACS Premium modifyAutopurgeFilter reflected cross-site scripting (XSS) vulnerability
CVE-2025-54814 A reflected cross-site scripting (xss) vulnerability exists in the modifyAutopurgeFilter functionality of MedDream PACS Premium 7.3.6.870. A specially crafted malicious URL can lead to arbitrary javascript code execution. An attacker can provide a crafted URL to trigger this...
Talos - Vulnerability Reports
MedDream PACS Premium downloadZip reflected cross-site scripting (XSS) vulnerability
CVE-2025-53516 A reflected cross-site scripting (xss) vulnerability exists in the downloadZip functionality of MedDream PACS Premium 7.3.6.870. A specially crafted malicious url can lead to arbitrary javascript code execution. An attacker can provide a crafted URL to trigger this...
Sean Heelan's Blog
seanhn
On the Coming Industrialisation of Exploit Generation with LLMs
Recently I ran an experiment where I built agents on top of Opus 4.5 and GPT-5.2 and then challenged them to write exploits for a zeroday vulnerability in the QuickJS Javascript interpreter. I adde…
Check Point Research
samanthar@checkpoint.com
Sicarii Ransomware: Truth vs Myth
<h2>Key findings</h2> <ul> <li><strong>Sicarii is a newly observed RaaS operation</strong>&nbsp;that surfaced in late 2025 and has only published 1 claimed victim.</li> <li>The group&nbsp;<strong>explicitly brands itself as Israeli/Jewish</strong>, using Hebrew language, historical symbols,...
Check Point Research
pedrod@checkpoint.com
Unveiling VoidLink – A Stealthy, Cloud-Native Linux Malware Framework
<h2>Key takeaways</h2> <ul> <li><strong>VoidLink</strong> is an advanced malware framework made up of custom loaders, implants, rootkits, and modular plugins designed to maintain long-term access to <strong>Linux systems</strong>. The framework includes multiple <strong>cloud-focused...
Check Point Research
alexeybu
Inside GoBruteforcer: AI-Generated Server Defaults, Weak Passwords, and Crypto-Focused Campaigns
<h2>Key takeaways</h2> <ul> <li>GoBruteforcer (also called GoBrut) is a modular botnet, written in Go, that brute-forces user passwords for services such as FTP, MySQL, PostgreSQL, and phpMyAdmin on Linux servers. The botnet spreads through a chain of web shell, downloader, IRC bot, and...