Security Review #293

February 06, 2026

Not a single one of the cells that compose you knows who you are, or cares.

— Daniel Dennett

Starred Articles

How LLMs Feed Your RE Habit: Following the Use-After-Free Trail in CLFS

This post demonstrates how LLMs and pyghidra-mcp accelerate reverse engineering by tracing a use-after-free vulnerability in Windows’ Common Log File System (CLFS) through a patch diff, showing how AI maintains momentum in complex analysis.

Exploiting PostMessage Vulnerabilities: Advanced Exploitation Guide

In this article, we explore how to identify and exploit postMessage vulnerabilities in modern web applications, ranging from basic origin validation bypasses to advanced DOM XSS chains that exploit insecure message handlers.

New Articles

Windows event logs were cleared, but resurrected in another file!

The Windows Event Logging Service contains a bug (use of uninitialized memory) that sometimes results in recently deleted (cleared) log entries being stored in other (unrelated) *.evtx journal files. This post discusses the necessary conditions and how deleted events logs can be retrieved through this bug.

1-Click RCE To Steal Your Moltbot Data and Keys (CVE-2026-25253)

A technical teardown of a 1-click RCE against OpenClaw. We detail how a settings logic flaw and a WebSocket pivot turn a single webpage visit into token exfiltration, safety-control bypass, and arbitrary command execution.

GatewayToHeaven: Finding a Cross-Tenant Vulnerability in GCP's Apigee

A technical step-by-step writeup about finding CVE-2025-13292, a cross-tenant vulnerability in Google Cloud's Apigee. This vulnerability allowed an attacker to gain read/write access to verbose cross-tenant access logs and analytics data that could contain access tokens of end users.

Quest Desktop Authority RCE Named Pipe

Quest KACE Desktop Authority exposes a named pipe running as SYSTEM that accepts connections from any authenticated domain user over the network. Any authenticated user on the network can achieve remote code execution as a local administrator on hosts running the Desktop Authority agent.

The Chrysalis Backdoor: A Deep Dive into Lotus Blossom's toolkit

We identified a security incident stemming from a sophisticated compromise of the infrastructure hosting Notepad++, which was subsequently used to deliver a previously undocumented custom backdoor, which we have dubbed Chrysalis.

AppLocker Rules Abuse

We explain how threat actors could abuse AppLocker to deploy rules that will prevent EDR processes from execution in order to execute arbitrary commands and software on the asset without EDR disruption.

ConsentFix (a.k.a

We walk through the ConsentFix (a.k.a. AuthCodeFix) attack mechanics, and learn about mitigations and detections strategies.

Exploiting CVE-2025-49825

A small investigation on the vulnerability, root cause and exploitation of CVE-2025-49825, an authentication bypass vulnerability in Teleport.

CVE-2025-11730: Remote Code Execution via DDNS configuration in ZYXEL ATP/USG Series (V5.41)

A critical vulnerability in Zyxel firewalls, allows remote command execution with root privileges through improper input sanitization in the Dynamic DNS (DDNS) configuration. By injecting shell commands into a user-controlled URL parameter, an authenticated attacker can exploit the internal execution of curl to achieve full system compromise.

TrustedSec

A full review of JWT concepts, implementation, attack surface and flaws exploitation.

Oldies but Goodies

Reversing a Microsoft-Signed Rootkit: The Netfilter Driver

I stumbled over a malicious driver called Netfilter that somehow ended up legitimately signed by Microsoft. In this aryicle we will reverse it, see how the threat actors slipped through, and learn what Microsoft tightened afterward.

Abusing Microsoft Warbird for Shellcode Execution

In this blog post, we’ll be covering Microsoft Warbird and how we can abuse it to sneakily load shellcode without being detected by AV or EDR solutions. We’ll show how we can encrypt our shellcode and let the Windows kernel decrypt and load it for us using the Warbird API.