Posts for category: Vulnerability Research

Risks of Microsoft Zero-Day Vulnerabilities

Executive Summary Microsoft zero-day vulnerabilities are security flaws that attackers exploit before a patch or fix is publicly available. These vulnerabilities can allow attackers to gain ...

Systemic Security Weaknesses in Consumer IoT Devices

Executive Summary The rapid expansion of consumer Internet of Things (IoT) devices has fundamentally reshaped modern households, embedding network-connected technologies into everyday life. However, ...

Chrome Zero-Day (CVE-2026-2441)

Executive Summary Browser zero-day attacks have been on the rise, leaving popular search engines that millions of users rely on, such as Google Chrome, Firefox, and or Bing, vulnerable to ...

AI Vulnerability Easier to Exploit than Previously Thought

Executive Summary Researchers have conducted a study showing that Artificial Intelligence (AI) models may be easier to poison than previously thought. With the widespread use of AI models like ...

New Zoom VDI Client Vulnerability

Executive Summary On November 10, 2025, CVE 2025-64740 was identified and given a CVSS score of 7.5 indicating a high severity vulnerability. This vulnerability affects Zoom’s Virtual Desktop ...

Bypassing BitLocker Encryption Via Physical Technique

Executive Summary A new vulnerability has been identified in Windows’s BitLocker security feature that can bypass PIN authentication. Attackers can steal data from BitLocker encrypted hard drives ...

Highest CVSS Score Yet for Microsoft’s ASP.NET Framework

Executive Summary On October 17 2025, CVE-2025-55315 was identified and patched for Microsoft’s Active Server Pages (ASP).NET framework. This vulnerability exists in a widely used web development ...

Pixnapping: A New Approach to Information Stealing

Executive Summary A vulnerability called Pixnapping has been identified in modern Android devices that allows hackers to steal data from pixels on a screen. This attack is a proof of concept that is ...

Shai-Hulud Worm: Supply Chain Threat

Executive Summary On September 15, 2025, suspicious files began appearing in the Node Package Manager (npm) ecosystem hosted on GitHub. This event was discovered to be part of a hacking campaign ...

CISA Issues Emergency Directive In Light of New Cisco Vulnerabilities

Executive Summary On September 25, 2025, Cisco identified three day-zero vulnerabilities that pertains to their Adaptive Security Appliances (ASA) and Firepower Threat Defender (FTD).  These ...