Archives
- 04 Apr CVE-2025-43520 The XNU Kernel Buffer Overflow That Gave DarkSword ROOT
- 03 Apr CVE-2025-43510 The Kernel COW Race That Gave DarkSword Its First Glimpse Into the XNU Kernel
- 27 Mar DarkSword Stage 4 XPC Injection into mediaplaybackd — The Hidden Bridge to the iOS Kernel
- 24 Mar CVE-2025-14174 The ANGLE Graphics Bug That Let DarkSword Escape Safari's Sandbox
- 23 Mar CVE-2026-20700 How DarkSword Defeated Apple's Hardware Security — The dyld PAC-TPRO Bypass
- 22 Mar CVE-2025-43529 The Garbage Collector Race That Gave DarkSword Its Teeth
- 21 Mar CVE-2025-31277 Inside the JavaScriptCore JIT Vulnerability That Opened iPhones to DarkSword
- 21 Mar DarkSword The Six-Stage iOS Exploit Kit Used by States, Spies, and Surveillance Vendors
- 20 Mar CVE-2026-20131 CVSS 10.0 Cisco Firewall Management Center Zero-Day Exploited by Interlock Ransomware
- 19 Mar CVE-2026-20963 Microsoft SharePoint Deserialization RCE - Technical Deep Dive
- 19 Mar CVE-2025-68613 n8n Expression Injection - When Your Automation Hub Becomes a Master Key
- 17 Mar Watering Hole Attacks How Predators Lurk in Trusted Websites
- 16 Mar CVE-2026-3909 & CVE-2026-3910 Technical Deep Dive into Chrome's Dual Zero-Day Exploit Chain
- 16 Mar Building Decentralized Digital Identity with Hedera Hashgraph
- 29 Jan Subsequence in Rust
- 28 Jan Vulnserver : Buffer Overflow on TRUN Function
- 15 Jan Two numbers addition in Rust
- 15 Jan Big-O Notation in Algorithm
- 14 Jan Choosing the Right Open Source Cyber Security Solution For Your Business
- 06 Jan Simple HTTP Server in Rust
- 04 Jan How the Mitre Attck Framework Can Help Improve Your Cyber Security