Chasing the Ghost in the Log: A Deep Dive into CVE-2026-20820
Microsoft called it a heap overflow; my debugger said otherwise. Follow my journey from a Bindiff mismatch to a kernel-mode OOB write in clfs.sys
Microsoft called it a heap overflow; my debugger said otherwise. Follow my journey from a Bindiff mismatch to a kernel-mode OOB write in clfs.sys
How overlooked objects in AD's Recycle Bin can become a goldmine for attackers—and what defenders need to know
Strategies to minimize logging generation, and methods to enhance logging efficiency
Review of the current security level brought by BitLocker against data theft
Implementing S/MIME with Exchange Online and OWA for secure email communications
Discover how to exploit the certifried vulnerability easily with bloodyAD.
Take full control of the Kerberos protocol on Active Directory using bloodyAD.
Leverage certificate-based authentication power on Active Directory environment.