<?xml version="1.0" encoding="UTF-8"?>
    <rss version="2.0">
      <channel>
        <title>Theori BLOG</title>
        <link>https://theori.io/blog</link>
        <description>Empowering Innovation with SecurityExplore expert insights into offensive security and threat intelligence.</description>
        <pubDate>Thu, 06 Mar 2025 04:09:43 GMT</pubDate>
        <generator>inblog</generator>
        <lastBuildDate>Mon, 06 Apr 2026 20:05:26 GMT</lastBuildDate>
        <image>
          <url>https://image.inblog.dev?url=https%3A%2F%2Finblog.ai%2Fapi%2Fog-logo%3FlogoUrl%3Dhttps%253A%252F%252Fsource.inblog.dev%252Flogo%252F2025-03-17T09%253A35%253A07.309Z-f470ea09-7b8a-45da-9dc3-c3c1d22a032b%26title%3D%26description%3DEmpowering%2520Innovation%2520with%2520Security%250AExplore%2520expert%2520insights%2520into%2520offensive%2520security%2520and%2520threat%2520intelligence.&amp;w=1920&amp;q=85</url>
          <title>og image</title>
          <link>https://theori.io/blog</link>
        </image>

        <item>
              <title>What are business logic vulnerabilities, and why are they so hard to catch?</title>
              <link>https://theori.io/blog/what-are-business-logic-vulnerabilities</link>
              <description>Even secure-looking code can hide dangerous flaws. Learn why business logic vulnerabilities are hard to detect and why most scanners miss them.</description>
              <pubDate>Fri, 06 Mar 2026 05:04:00 GMT</pubDate>
              <guid>https://theori.io/blog/what-are-business-logic-vulnerabilities</guid>
              <category>AI for Security</category>
              <author>Xint</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2026-03-06T05%3A06%3A15.887Z-c526fcb9-eaae-4626-9f61-b9b0873c4bb5&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>Announcing Xint Code</title>
              <link>https://theori.io/blog/announcing-xint-code</link>
              <description>Real Vulnerabilities. Actionable Results.</description>
              <pubDate>Tue, 16 Dec 2025 00:43:33 GMT</pubDate>
              <guid>https://theori.io/blog/announcing-xint-code</guid>
              <category>AI for Security</category>
              <author>Xint</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-12-16T00%3A27%3A56.794Z-d1fe1126-58a0-42b6-b906-6e81920b9578&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>Building Effective LLM Agents | AI Cyber Challenge</title>
              <link>https://theori.io/blog/building-effective-llm-agents-63446</link>
              <description>How we learned to build effective LLM agents for hacking at DARPA&apos;s AI Cyber Challenge (AIxCC)</description>
              <pubDate>Fri, 08 Aug 2025 19:28:00 GMT</pubDate>
              <guid>https://theori.io/blog/building-effective-llm-agents-63446</guid>
              <category>AI for Security</category><category>AIxCC</category>
              <author>Xint</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-08-08T19%3A27%3A53.613Z-3caae5d2-b7a4-49cf-b227-e97c06cd3999&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>AI Cyber Challenge and Theori&apos;s RoboDuck</title>
              <link>https://theori.io/blog/aixcc-and-roboduck-63447</link>
              <description>An introduction to DARPA&apos;s AI Cyber Challnge and Theori&apos;s third place cyber reasoning system</description>
              <pubDate>Fri, 08 Aug 2025 19:27:40 GMT</pubDate>
              <guid>https://theori.io/blog/aixcc-and-roboduck-63447</guid>
              <category>AI for Security</category><category>AIxCC</category>
              <author>Xint</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-08-08T19%3A27%3A30.568Z-2d0e7fd4-5e82-41de-9029-5586d59d9fdd&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>Inside the brain of a hacking robot: Exploring traces | AI Cyber Challenge</title>
              <link>https://theori.io/blog/exploring-traces-63950</link>
              <description>Agent trajectory walkthroughs of a fully autonomous hacking system</description>
              <pubDate>Fri, 08 Aug 2025 19:25:46 GMT</pubDate>
              <guid>https://theori.io/blog/exploring-traces-63950</guid>
              <category>AI for Security</category><category>AIxCC</category>
              <author>Xint</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-08-08T19%3A24%3A24.222Z-ea1e4de2-7f6f-4324-9adb-62c83b2c3714&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>How to Identify Phishing Scams</title>
              <link>https://theori.io/blog/How-to-Identify-Phishing-Scams</link>
              <description>Learn how to spot phishing scams with expert tips recognizing suspicious emails, SMS, and fraudulent request for personal information. </description>
              <pubDate>Mon, 28 Apr 2025 23:00:00 GMT</pubDate>
              <guid>https://theori.io/blog/How-to-Identify-Phishing-Scams</guid>
              <category>Vulnerability Research</category>
              <author>Frontier Squad</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-04-28T17%3A35%3A09.747Z-245c4f3e-c664-4da6-ab67-8041bfcc657e&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>Importance of Continuous Security: Lessons from the Bybit Case</title>
              <link>https://theori.io/blog/web2-security-over-web3-ecosystem-what-were-missing-in-the-bybit-case-48821</link>
              <description>In this article, we briefly look at the circumstances of the Bybit incident and discuss what countermeasures could have been implemented. Then, we discuss the limitations of current solutions and how Xint resolves them.</description>
              <pubDate>Thu, 27 Mar 2025 06:38:06 GMT</pubDate>
              <guid>https://theori.io/blog/web2-security-over-web3-ecosystem-what-were-missing-in-the-bybit-case-48821</guid>
              <category>AI for Security</category>
              <author>Xint</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-03-26T16%3A32%3A22.949Z-93d3bf81-d6ca-4dec-b6f8-7ccba3954d7a&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>Reviving the modprobe_path Technique: Overcoming search_binary_handler() Patch</title>
              <link>https://theori.io/blog/reviving-the-modprobe-path-technique-overcoming-search-binary-handler-patch</link>
              <description>A new approach to the Overwriting modprobe_path technique is introduced, addressing changes in the Upstream kernel that prevent triggering via dummy files.</description>
              <pubDate>Sat, 15 Mar 2025 08:52:16 GMT</pubDate>
              <guid>https://theori.io/blog/reviving-the-modprobe-path-technique-overcoming-search-binary-handler-patch</guid>
              <category>Vulnerability Research</category>
              <author>Frontier Squad</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-03-18T04%3A56%3A42.484Z-96378e90-b357-4e96-a412-28c5c8d78d43&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>Four Ways to Protect Your Legacy with Theori’s Cybersecurity Solutions</title>
              <link>https://theori.io/blog/four-ways-to-protect-your-legacy-with-theoris-cybersecurity-solutions</link>
              <description>Discover the top cybersecurity threats for 2025 and how Theori&apos;s innovative solutions can safeguard your business from evolving cyber risks and costly data breaches.</description>
              <pubDate>Sun, 16 Feb 2025 15:00:00 GMT</pubDate>
              <guid>https://theori.io/blog/four-ways-to-protect-your-legacy-with-theoris-cybersecurity-solutions</guid>
              <category>Web2 Security</category>
              <author>Frontier Squad</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-03-18T04%3A56%3A43.891Z-e541cf56-55bc-4edf-a758-8713e1698e67&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>DeepSeek Security, Privacy, and Governance: Hidden Risks in Open-Source AI</title>
              <link>https://theori.io/blog/deepseek-security-privacy-and-governance-hidden-risks-in-open-source-ai</link>
              <description>This post examines DeepSeek&apos;s security gaps, privacy practices, and open-source AI risks, offering practical advice for users and developers.</description>
              <pubDate>Thu, 06 Feb 2025 15:00:00 GMT</pubDate>
              <guid>https://theori.io/blog/deepseek-security-privacy-and-governance-hidden-risks-in-open-source-ai</guid>
              <category>Security for AI</category>
              <author>αprism</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-03-18T04%3A56%3A44.807Z-284bdd07-3555-46b3-8409-ae7450c37070&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>The True Cost of Siloed Security Tools</title>
              <link>https://theori.io/blog/the-true-cost-of-siloed-security-tools-48551</link>
              <description>Security silos occur when different security tools, teams, or systems operate in isolation, unable to effectively share data or communicate.</description>
              <pubDate>Fri, 20 Dec 2024 09:00:00 GMT</pubDate>
              <guid>https://theori.io/blog/the-true-cost-of-siloed-security-tools-48551</guid>
              <category>AI for Security</category>
              <author>Xint</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-03-24T08%3A51%3A00.713Z-dcee5d29-61ad-4f17-b330-479856e74447&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>Finding Vulnerabilities in Firmware with Static Analysis Platform QueryX</title>
              <link>https://theori.io/blog/finding-vulnerabilities-in-firmware-with-static-analysis-platform-queryx</link>
              <description>QueryX, Theori’s program analysis platform, automates variant analysis for vulnerability detection. Learn how its taint analysis module uncovered CVE-2023-39471.</description>
              <pubDate>Wed, 06 Nov 2024 15:00:00 GMT</pubDate>
              <guid>https://theori.io/blog/finding-vulnerabilities-in-firmware-with-static-analysis-platform-queryx</guid>
              <category>Vulnerability Research</category>
              <author>Frontier Squad</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-03-18T04%3A56%3A45.767Z-fa5e088d-253b-4888-9c15-243e25e7a73b&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>Side Effects: When Continuous Development Introduces Security Threats</title>
              <link>https://theori.io/blog/side-effects-when-continuous-development-introduces-security-threats-48550</link>
              <description>Dive into five significant security risks that emerged as unintended consequences of new feature development.</description>
              <pubDate>Mon, 04 Nov 2024 09:00:00 GMT</pubDate>
              <guid>https://theori.io/blog/side-effects-when-continuous-development-introduces-security-threats-48550</guid>
              <category>Web2 Security</category>
              <author>Xint</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-03-24T08%3A50%3A33.632Z-76b71398-ac5d-4031-915d-f5387bade519&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>Top 5 Features Your ASM Solution Must Have</title>
              <link>https://theori.io/blog/top-5-features-your-asm-solution-must-have-48548</link>
              <description>So you know what ASM is and why you need it — but which features are crucial? Here’s the run down.</description>
              <pubDate>Thu, 24 Oct 2024 09:00:00 GMT</pubDate>
              <guid>https://theori.io/blog/top-5-features-your-asm-solution-must-have-48548</guid>
              <category>AI for Security</category>
              <author>Xint</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-03-24T08%3A50%3A00.464Z-b4cb99e9-6edc-417c-9196-bef3f273f590&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>Offensive Security with Large Language Models (2)</title>
              <link>https://theori.io/blog/offensive-security-with-large-language-models-2-48547</link>
              <description>How LLMs are changing the game for static analysis — especially when source code is available.</description>
              <pubDate>Mon, 30 Sep 2024 09:00:00 GMT</pubDate>
              <guid>https://theori.io/blog/offensive-security-with-large-language-models-2-48547</guid>
              <category>AI for Security</category>
              <author>Xint</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-03-24T08%3A49%3A31.816Z-5d737d0b-d8b6-4444-9d2a-c25922b3f6a7&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>Offensive Security with Large Language Models (1)</title>
              <link>https://theori.io/blog/offensive-security-with-large-language-models-1-48546</link>
              <description>Applications of larage language models in offensive security</description>
              <pubDate>Fri, 27 Sep 2024 09:00:00 GMT</pubDate>
              <guid>https://theori.io/blog/offensive-security-with-large-language-models-1-48546</guid>
              <category>AI for Security</category>
              <author>Xint</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-03-24T08%3A49%3A03.206Z-04cb5cbb-6263-4427-ad6e-111d258071d0&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>Winning the AIxCC Qualification Round</title>
              <link>https://theori.io/blog/winning-the-aixcc-qualification-round</link>
              <description>Theori’s Cyber Reasoning System (CRS) “Robo Duck” not only cleared the bar to get us $2M and a spot at the AIxCC finals in 2025, it also got the first place among all the submissions in the highly competitive event.</description>
              <pubDate>Mon, 23 Sep 2024 15:00:00 GMT</pubDate>
              <guid>https://theori.io/blog/winning-the-aixcc-qualification-round</guid>
              <category>AI for Security</category>
              <author>Xint</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-03-18T04%3A56%3A47.023Z-2ea7026f-6d9c-4101-9409-30cc43190982&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>Top Penetration Testing Solutions for IT Security: 2024 Guide</title>
              <link>https://theori.io/blog/top-penetration-testing-solutions-for-it-security-2024-guide-48545</link>
              <description>The top 7penetration testing tools of 2024 for hackers and for businesses.</description>
              <pubDate>Wed, 11 Sep 2024 09:00:00 GMT</pubDate>
              <guid>https://theori.io/blog/top-penetration-testing-solutions-for-it-security-2024-guide-48545</guid>
              <category>AI for Security</category>
              <author>Xint</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-03-24T08%3A48%3A24.925Z-ae1d184e-cb23-4424-8314-6008f407815b&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>Deep Dive into RCU Race Condition: Analysis of TCP-AO UAF (CVE-2024–27394)</title>
              <link>https://theori.io/blog/deep-dive-into-rcu-race-condition-analysis-of-tcp-ao-uaf-cve-2024-27394</link>
              <description>CVE-2024-27394 is a TCP-AO Use-After-Free vulnerability caused by improper RCU API usage. Read the in-depth analysis and reliable triggering technique.</description>
              <pubDate>Tue, 03 Sep 2024 15:00:00 GMT</pubDate>
              <guid>https://theori.io/blog/deep-dive-into-rcu-race-condition-analysis-of-tcp-ao-uaf-cve-2024-27394</guid>
              <category>Vulnerability Research</category>
              <author>Frontier Squad</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-03-18T04%3A56%3A49.437Z-16f2a78c-6e84-4e14-9900-efe2dbb53e1c&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>Offensive Security vs. Defensive Security: Navigating the Two Pillars of Cybersecurity</title>
              <link>https://theori.io/blog/offensive-security-vs-defensive-security-navigating-the-two-pillars-of-cybersecurity</link>
              <description>Explore how offensive and defensive security strategies work together to protect against cyber threats.</description>
              <pubDate>Fri, 30 Aug 2024 09:00:00 GMT</pubDate>
              <guid>https://theori.io/blog/offensive-security-vs-defensive-security-navigating-the-two-pillars-of-cybersecurity</guid>
              <category>Web2 Security</category>
              <author>Xint</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-03-24T08%3A46%3A40.860Z-88bc1d51-c5ce-4396-85fd-f45ea68ee5ed&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>A Deep Dive into the CoSoSys EndPoint Protector Exploit: Remote Code Execution</title>
              <link>https://theori.io/blog/a-deep-dive-into-the-cososys-endpoint-protector-exploit-remote-code-execution</link>
              <description>Four critical RCE vulnerabilities (CVE-2024-36072 to CVE-2024-36075) in CoSoSys Endpoint Protector were identified, allowing full server and client compromise. Read the full analysis.</description>
              <pubDate>Thu, 29 Aug 2024 15:00:00 GMT</pubDate>
              <guid>https://theori.io/blog/a-deep-dive-into-the-cososys-endpoint-protector-exploit-remote-code-execution</guid>
              <category>Web2 Security</category>
              <author>Frontier Squad</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-03-18T04%3A56%3A50.277Z-1c7949e1-8ea8-4eac-9c96-3265e33b72e3&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>Chaining N-days to Compromise All: Part 6 — Windows Kernel LPE: Get SYSTEM</title>
              <link>https://theori.io/blog/chaining-n-days-to-compromise-all-part-6-windows-kernel-lpe-get-system</link>
              <description>The final part of the N-day exploit series analyzes CVE-2023-36802, a privilege escalation vulnerability in mskssrv.sys, used to gain SYSTEM access on a VMware host.</description>
              <pubDate>Tue, 21 May 2024 15:00:00 GMT</pubDate>
              <guid>https://theori.io/blog/chaining-n-days-to-compromise-all-part-6-windows-kernel-lpe-get-system</guid>
              <category>Vulnerability Research</category>
              <author>Frontier Squad</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-03-18T04%3A56%3A52.552Z-b029d23f-3d5b-4d1a-b3a3-54b12425ecb4&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>Chaining N-days to Compromise All: Part 5 — VMware Workstation Guest-to-Host Escape</title>
              <link>https://theori.io/blog/chaining-n-days-to-compromise-all-part-5-vmware-workstation-host-to-guest-escape</link>
              <description>CVE-2023-20869 was exploited to achieve arbitrary code execution on a VMware host from a guest system. Read the full technical analysis.</description>
              <pubDate>Thu, 02 May 2024 15:00:00 GMT</pubDate>
              <guid>https://theori.io/blog/chaining-n-days-to-compromise-all-part-5-vmware-workstation-host-to-guest-escape</guid>
              <category>Vulnerability Research</category>
              <author>Frontier Squad</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-03-18T04%3A56%3A55.141Z-378eb36c-dcec-44a5-8f25-a42b7b6a67c9&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>Chaining N-days to Compromise All: Part 4 — VMware Workstation Information leakage</title>
              <link>https://theori.io/blog/chaining-n-days-to-compromise-all-part-4-vmware-workstation-information-leakage</link>
              <description>CVE-2023-34044, a variant of CVE-2023-20870, was exploited to extract critical information from a VMware host process. Read the in-depth analysis.</description>
              <pubDate>Wed, 17 Apr 2024 15:00:00 GMT</pubDate>
              <guid>https://theori.io/blog/chaining-n-days-to-compromise-all-part-4-vmware-workstation-information-leakage</guid>
              <category>Vulnerability Research</category>
              <author>Frontier Squad</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-03-18T04%3A57%3A00.149Z-a0caff67-7c1e-4d09-88ea-4667d1f3e53d&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>Chaining N-days to Compromise All: Part 3 — Windows Driver LPE: Medium to System</title>
              <link>https://theori.io/blog/chaining-n-days-to-compromise-all-part-3-windows-driver-lpe-medium-to-system</link>
              <description>CVE-2023-29360, a logic bug in the mskssrv.sys driver, was exploited to escalate privileges to SYSTEM in a 1-day full chain attack. Read the detailed breakdown.</description>
              <pubDate>Mon, 08 Apr 2024 15:00:00 GMT</pubDate>
              <guid>https://theori.io/blog/chaining-n-days-to-compromise-all-part-3-windows-driver-lpe-medium-to-system</guid>
              <category>Vulnerability Research</category>
              <author>Frontier Squad</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-03-18T04%3A57%3A01.884Z-9aa1d5a5-0b2b-4086-8f5b-8ac6139119ef&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>Chaining N-days to Compromise All: Part 2 — Windows Kernel LPE (a.k.a Chrome Sandbox Escape)</title>
              <link>https://theori.io/blog/chaining-n-days-to-compromise-all-part-2-windows-kernel-lpe-a-k-a-chrome-sandbox-escape</link>
              <description>CVE-2023-21674, a Windows kernel UAF vulnerability, was used to escape the Chrome sandbox in a 1-day full chain exploit. Read the detailed analysis.</description>
              <pubDate>Sun, 31 Mar 2024 15:00:00 GMT</pubDate>
              <guid>https://theori.io/blog/chaining-n-days-to-compromise-all-part-2-windows-kernel-lpe-a-k-a-chrome-sandbox-escape</guid>
              <category>Vulnerability Research</category>
              <author>Frontier Squad</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-03-18T04%3A57%3A04.539Z-584abc6f-4df3-4588-be27-831c0aa2d441&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>Chaining N-days to Compromise All: Part 1 — Chrome Renderer RCE</title>
              <link>https://theori.io/blog/chaining-n-days-to-compromise-all-part-1-chrome-renderer-rce</link>
              <description>This post begins our series on the 1-day exploit chain demoed on X, focusing on a Chrome renderer exploit, CVE-2023-3079, a type confusion bug in V8.</description>
              <pubDate>Sun, 17 Mar 2024 15:00:00 GMT</pubDate>
              <guid>https://theori.io/blog/chaining-n-days-to-compromise-all-part-1-chrome-renderer-rce</guid>
              <category>Vulnerability Research</category>
              <author>Frontier Squad</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-03-18T04%3A57%3A11.032Z-c157cd5d-a9e6-4bc7-af16-c5a55db84c7c&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>Fermium-252 : The Cyber Threat Intelligence Database</title>
              <link>https://theori.io/blog/fermium-252-the-cyber-threat-intelligence-database</link>
              <description>Fermium-252 is a premier vulnerability intelligence platform providing real-time tracking of 1-day exploits, PoCs, and in-depth reports. Stay ahead of cyber threats with our expert analysis.</description>
              <pubDate>Sun, 03 Mar 2024 15:00:00 GMT</pubDate>
              <guid>https://theori.io/blog/fermium-252-the-cyber-threat-intelligence-database</guid>
              <category>Vulnerability Research</category>
              <author>Frontier Squad</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-03-18T04%3A57%3A12.732Z-85820e05-bdc1-44f8-a8a8-9b09bf31419d&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>A Deep Dive into V8 Sandbox Escape Technique Used in In-The-Wild Exploit</title>
              <link>https://theori.io/blog/a-deep-dive-into-v8-sandbox-escape-technique-used-in-in-the-wild-exploit</link>
              <description>We bypassed the V8 sandbox using a raw pointer in WasmIndirectFunctionTable, enabling arbitrary write and code execution. Read our deep dive into the exploit.</description>
              <pubDate>Thu, 25 Jan 2024 15:00:00 GMT</pubDate>
              <guid>https://theori.io/blog/a-deep-dive-into-v8-sandbox-escape-technique-used-in-in-the-wild-exploit</guid>
              <category>Vulnerability Research</category>
              <author>Frontier Squad</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-03-18T04%3A57%3A15.726Z-4c20c893-6c32-4d99-b0ec-f178ad9517dd&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>Exploiting Windows Kernel Wild Copy With User Fault Handling (CVE-2023–28218)</title>
              <link>https://theori.io/blog/exploiting-windows-kernel-wild-copy-with-user-fault-handling-cve-2023-28218</link>
              <description>At Hexacon 2023, we presented our Windows kernel security research, uncovering CVE-2023-28218, a heap overflow in afd.sys. Read our exploit analysis and methodology.</description>
              <pubDate>Thu, 09 Nov 2023 15:00:00 GMT</pubDate>
              <guid>https://theori.io/blog/exploiting-windows-kernel-wild-copy-with-user-fault-handling-cve-2023-28218</guid>
              <category>Vulnerability Research</category>
              <author>Frontier Squad</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-03-18T04%3A57%3A16.914Z-9083cae0-eafe-4465-9c95-456f108fabd9&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>NEAT and NES Algorithms</title>
              <link>https://theori.io/blog/neat-and-nes-algorithms</link>
              <description>We reverse-engineered NEAT and NES, two unpublished symmetric encryption algorithms from South Korea’s GPKI cryptography library. Read our analysis and implementations.</description>
              <pubDate>Thu, 20 Apr 2023 15:00:00 GMT</pubDate>
              <guid>https://theori.io/blog/neat-and-nes-algorithms</guid>
              <category>Vulnerability Research</category>
              <author>Frontier Squad</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-03-18T04%3A57%3A18.029Z-f8176c6a-2b04-43a8-839a-8cbd477dd231&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>Linux Kernel Exploit (CVE-2022–32250) with mqueue</title>
              <link>https://theori.io/blog/linux-kernel-exploit-cve-2022-32250-with-mqueue</link>
              <description>We exploited CVE-2022-32250, a use-after-free vulnerability in Linux Netfilter, to achieve root on Ubuntu 22.04. Learn how we bypassed KASLR and modified modprobe_path.</description>
              <pubDate>Tue, 23 Aug 2022 15:00:00 GMT</pubDate>
              <guid>https://theori.io/blog/linux-kernel-exploit-cve-2022-32250-with-mqueue</guid>
              <category>Vulnerability Research</category>
              <author>Frontier Squad</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-03-18T04%3A57%3A21.710Z-d4017e9c-264e-4cbd-9624-b619da6b1818&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>Binary-searching into CVMServer</title>
              <link>https://theori.io/blog/binary-searching-into-cvmserver</link>
              <description>While analyzing the patch for CVE-2021-30724, we discovered a new uninitialized memory vulnerability (CVE-2022-26721) in macOS&apos;s CVMServer. Read our exploitation insights.</description>
              <pubDate>Thu, 16 Jun 2022 15:00:00 GMT</pubDate>
              <guid>https://theori.io/blog/binary-searching-into-cvmserver</guid>
              <category>Vulnerability Research</category>
              <author>Frontier Squad</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-03-18T04%3A57%3A22.530Z-ef056815-6655-4578-8013-42e800be93c6&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>Exploiting Safari’s ANGLE Component</title>
              <link>https://theori.io/blog/exploiting-safaris-angle-component</link>
              <description>We discovered CVE-2022-26717, an exploitable bug in WebKit&apos;s WebGL component affecting Safari on macOS and iOS. Read our analysis and exploitation methodology.</description>
              <pubDate>Tue, 17 May 2022 15:00:00 GMT</pubDate>
              <guid>https://theori.io/blog/exploiting-safaris-angle-component</guid>
              <category>Vulnerability Research</category>
              <author>Frontier Squad</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-03-18T04%3A57%3A23.803Z-49dc1bc1-b5e4-43c2-a30f-cd2886cdc61f&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>Patch Gapping a Safari Type Confusion</title>
              <link>https://theori.io/blog/patch-gapping-a-safari-type-confusion</link>
              <description>Safari 14.1 introduced AudioWorklets, but a newly patched type confusion bug left iOS versions vulnerable for weeks. We share our root cause analysis and exploit details.</description>
              <pubDate>Mon, 24 May 2021 15:00:00 GMT</pubDate>
              <guid>https://theori.io/blog/patch-gapping-a-safari-type-confusion</guid>
              <category>Vulnerability Research</category>
              <author>Frontier Squad</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-03-18T04%3A57%3A24.660Z-ef066f3e-1939-4b86-8504-4a6e099795ea&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>Compromising virtualization without attacking the hypervisor</title>
              <link>https://theori.io/blog/compromising-virtualization-without-attacking-the-hypervisor</link>
              <description>Discover CVE-2020-27675 (XSA-331), a denial-of-service and potential out-of-bounds write vulnerability in the Xen paravirtualization driver, and learn how it can impact virtualization security.</description>
              <pubDate>Tue, 20 Oct 2020 15:00:00 GMT</pubDate>
              <guid>https://theori.io/blog/compromising-virtualization-without-attacking-the-hypervisor</guid>
              <category>Vulnerability Research</category>
              <author>Frontier Squad</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-03-18T04%3A57%3A26.286Z-f0e55b91-a3d7-429e-a109-ad1c1c2e9f94&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>Cleanly Escaping the Chrome Sandbox</title>
              <link>https://theori.io/blog/cleanly-escaping-the-chrome-sandbox</link>
              <description>Learn how we discovered and exploited Issue 1062091, a use-after-free (UAF) vulnerability in Chrome and Chromium-based Edge, leading to a sandbox escape.</description>
              <pubDate>Sun, 19 Apr 2020 15:00:00 GMT</pubDate>
              <guid>https://theori.io/blog/cleanly-escaping-the-chrome-sandbox</guid>
              <category>Vulnerability Research</category>
              <author>Frontier Squad</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-03-18T04%3A57%3A27.563Z-44691993-c9e7-4394-a3eb-4691b7f869e6&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>Receiving NRSC-5</title>
              <link>https://theori.io/blog/receiving-nrsc-5</link>
              <description>We have implemented an NRSC-5-C digital radio receiver and released it as open source on GitHub. Explore IBOC-based hybrid broadcasting and security research opportunities.</description>
              <pubDate>Thu, 08 Jun 2017 15:00:00 GMT</pubDate>
              <guid>https://theori.io/blog/receiving-nrsc-5</guid>
              <category>Vulnerability Research</category>
              <author>Frontier Squad</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-03-18T04%3A57%3A30.858Z-e697c793-60c9-4d07-a872-51914dfe722e&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>Chakra JIT CFG Bypass</title>
              <link>https://theori.io/blog/chakra-jit-cfg-bypass</link>
              <description>Learn how attackers bypassed Microsoft&apos;s Control Flow Guard (CFG) in Internet Explorer and Edge. We break down our PoC exploit, mitigation bypass, and the MS16-119 patch details.</description>
              <pubDate>Tue, 13 Dec 2016 15:00:00 GMT</pubDate>
              <guid>https://theori.io/blog/chakra-jit-cfg-bypass</guid>
              <category>Vulnerability Research</category>
              <author>Frontier Squad</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-03-18T04%3A57%3A39.246Z-1d955bed-542e-42a4-9246-a7a9f5eafde0&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>Patch Analysis of MS16–063 (jscript9.dll)</title>
              <link>https://theori.io/blog/patch-analysis-of-ms16-063-jscript9-dll</link>
              <description>Microsoft&apos;s MS16-063 patch fixed a critical memory corruption vulnerability in jscript9.dll (TypedArray &amp; DataView) affecting Internet Explorer. Read our analysis, vulnerability breakdown, and PoC exploit.</description>
              <pubDate>Sun, 26 Jun 2016 15:00:00 GMT</pubDate>
              <guid>https://theori.io/blog/patch-analysis-of-ms16-063-jscript9-dll</guid>
              <category>Vulnerability Research</category>
              <author>Frontier Squad</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-03-18T04%3A57%3A41.514Z-151c205b-7eea-40af-9575-38845cfd4f8f&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>Patch Analysis of CVE-2016–0189</title>
              <link>https://theori.io/blog/patch-analysis-of-cve-2016-0189</link>
              <description>Microsoft&apos;s MS16-051 patch addressed a critical Internet Explorer vulnerability (CVE-2016-0189) exploited in South Korea. Explore our in-depth analysis, patch breakdown, and proof-of-concept exploit.</description>
              <pubDate>Tue, 21 Jun 2016 15:00:00 GMT</pubDate>
              <guid>https://theori.io/blog/patch-analysis-of-cve-2016-0189</guid>
              <category>Vulnerability Research</category>
              <author>Frontier Squad</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-03-18T04%3A57%3A47.321Z-832bcbfa-f430-4ae3-be86-2014242c501c&amp;w=1920&amp;q=85" type="image/webp"/>
            </item>
      </channel>
    </rss>