Research Worth Reading Week 05/2026

Published: 02 Feb 2026

Bugs EVERYWHERE....

🪟 Corrupting the Hive Mind: Persistence Through Forgotten Windows Internals

The team from Praetorian is sharing a new tool that will surely be added to your Windows Red Team arsenal: Corrupting the Hive Mind: Persistence Through Forgotten Windows Internals. 0

On the clock: Escaping VMware Workstation at Pwn2Own Berlin 2025

Who doesn't like a good Pwn2Own story, the sentence "Convinced that exploitation would be straightforward, we spent the second month procrastinating." especially hurts: On the clock: Escaping VMware Workstation at Pwn2Own Berlin 2025. 0

🪲 Insecure Defaults Detection

Trail of Bits is sharing more and more skills. This one to detect: Insecure Defaults Detection. 0

Samstung Part 2 :: Remote Code Execution in MagicINFO 9 Server

Steven Seeley is back with a new blog post and walks us through two bugs with source code to follow: Samstung Part 2 :: Remote Code Execution in MagicINFO 9 Server. 0

🪲 CVE-2026-23993: JWT authentication bypass in HarbourJwt via “unknown alg”

I hope no one will mind that I put my own content in there. I^WClaude found a JWT bypass in HarbourJwt: CVE-2026-23993: JWT authentication bypass in HarbourJwt via “unknown alg”. 0

📬 Never Miss Quality Security Research

Get these curated picks delivered to your inbox every week:

  • Hand-picked vulnerability research
  • Practical security insights
  • CVE deep-dives worth your time
  • No fluff, just signal
Subscribe for Free →
Photo of PentesterLab
Written by PentesterLab
The platform to learn web hacking and security code review