02 Feb 2026

Bugs EVERYWHERE....

The team from Praetorian is sharing a new tool that will surely be added to your Windows Red Team arsenal Corrupting the Hive Mind: Persistence Through Forgotten Windows Internals.

Who doesn't like a good Pwn2Own story, the sentence "Convinced that exploitation would be straightforward, we spent the second month procrastinating." especially hurts On the clock: Escaping VMware Workstation at Pwn2Own Berlin 2025.

Trail of Bits is sharing more and more skills. This one to detect Insecure Defaults Detection.

Steven Seeley is back with a new blog post and walks us through two bugs with source code to follow Samstung Part 2 :: Remote Code Execution in MagicINFO 9 Server.

I hope no one will mind that I put my own content in there. I^WClaude found a JWT bypass in HarbourJwt CVE-2026-23993: JWT authentication bypass in HarbourJwt via “unknown alg”.

📬 Never Miss Quality Security Research

Get these curated picks delivered to your inbox every week:

  • Hand-picked vulnerability research
  • Practical security insights
  • CVE deep-dives worth your time
  • No fluff, just signal
Subscribe for Free →
Photo of PentesterLab
PentesterLab
The platform to learn web hacking and security code review