<?xml version="1.0" encoding="UTF-8" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Eresus Security Research Feed</title>
    <link>https://www.eresussec.com</link>
    <atom:link href="https://www.eresussec.com/rss.xml" rel="self" type="application/rss+xml" />
    <description>Research, advisories, and offensive security writing from Eresus Security.</description>
    <language>en-us</language>
    <lastBuildDate>Wed, 20 May 2026 22:23:25 GMT</lastBuildDate>
    
    <item>
      <title><![CDATA[Linux Kernel LPE 2026: Copy Fail, Dirty Frag, and Fragnesia Compared]]></title>
      <link>https://www.eresussec.com/en/blog/linux-kernel-lpe-2026-copy-fail-dirty-frag-fragnesia</link>
      <guid>https://www.eresussec.com/en/blog/linux-kernel-lpe-2026-copy-fail-dirty-frag-fragnesia</guid>
      <pubDate>Sun, 17 May 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Three deterministic Linux kernel local privilege escalation vulnerabilities — Copy Fail (CVE-2026-31431), Dirty Frag (CVE-2026-43284/43500), and Fragnesia (CVE-2026-46300) — were disclosed within 15 days. This guide compares attack surfaces, mitigations, patch status, and which systems remain at risk if only some are addressed.]]></description>
    </item>
    <item>
      <title><![CDATA[JavaScript Obfuscation Reverse Engineering: A Practical Deobfuscation Playbook]]></title>
      <link>https://www.eresussec.com/en/blog/javascript-obfuscation-reverse-engineering-deobfuscation</link>
      <guid>https://www.eresussec.com/en/blog/javascript-obfuscation-reverse-engineering-deobfuscation</guid>
      <pubDate>Sun, 17 May 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[How to break JavaScript obfuscation used by obfuscator.io, JScrambler, webpack, and custom schemes. Covers string array rotation, control flow flattening, eval unwrapping, AST manipulation with Babel, Chrome DevTools tricks, and source map recovery. Practical for bug bounty hunters and pentesters needing to read protected frontend code.]]></description>
    </item>
    <item>
      <title><![CDATA[Fragnesia CVE-2026-46300: Linux Kernel XFRM ESP-in-TCP Local Privilege Escalation]]></title>
      <link>https://www.eresussec.com/en/blog/fragnesia-cve-2026-46300-linux-kernel-xfrm-esp-privilege-escalation</link>
      <guid>https://www.eresussec.com/en/blog/fragnesia-cve-2026-46300-linux-kernel-xfrm-esp-privilege-escalation</guid>
      <pubDate>Sun, 17 May 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Fragnesia (CVE-2026-46300) is a third Linux kernel local privilege escalation vulnerability discovered on May 14, 2026, following Dirty Frag. It exploits the XFRM ESP-in-TCP subsystem to achieve deterministic page-cache corruption and root access. Discovered by William Bowling (Zellic) and V12 security team. Includes mitigation commands and distro advisory links.]]></description>
    </item>
    <item>
      <title><![CDATA[Dirty Frag CVE-2026-43284: Linux Kernel Local Privilege Escalation via ESP and RxRPC]]></title>
      <link>https://www.eresussec.com/en/blog/dirty-frag-cve-2026-43284-linux-kernel-privilege-escalation</link>
      <guid>https://www.eresussec.com/en/blog/dirty-frag-cve-2026-43284-linux-kernel-privilege-escalation</guid>
      <pubDate>Sun, 17 May 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Dirty Frag (CVE-2026-43284 / CVE-2026-43500) is a deterministic Linux kernel local privilege escalation vulnerability chain in the xfrm-ESP and RxRPC subsystems. Microsoft Defender has observed limited in-the-wild exploitation. Includes mitigation commands, affected distro list, Fragnesia variant (CVE-2026-46300), and a hardening checklist for Kubernetes nodes and CI runners.]]></description>
    </item>
    <item>
      <title><![CDATA[AI Chatbot Web Application Pentesting: Attack Surface Beyond Prompt Injection]]></title>
      <link>https://www.eresussec.com/en/blog/ai-chatbot-web-application-pentest-methodology</link>
      <guid>https://www.eresussec.com/en/blog/ai-chatbot-web-application-pentest-methodology</guid>
      <pubDate>Sun, 17 May 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[How to pentest the web application wrapping an AI chatbot — not the LLM itself. Covers IDOR in conversation endpoints, XSS via AI markdown rendering, API key exposure in frontend bundles, SSRF via browsing tools, rate-limit abuse for cost amplification, file upload attack paths, and authorization failures in share/export features.]]></description>
    </item>
    <item>
      <title><![CDATA[CVE-2026-7482: Ollama GGUF Heap Out-of-Bounds Read — Full Technical Analysis]]></title>
      <link>https://www.eresussec.com/en/blog/ollama-cve-2026-7482-heap-oob-gguf-vulnerability</link>
      <guid>https://www.eresussec.com/en/blog/ollama-cve-2026-7482-heap-oob-gguf-vulnerability</guid>
      <pubDate>Mon, 04 May 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[CVE-2026-7482 is a critical heap out-of-bounds read in Ollama's GGUF model loader (CVSS 9.1). Unauthenticated remote attackers can leak ~2 MB of heap memory per request — including environment variables, API keys, system prompts, and concurrent users' conversation data. Two-bug chain, full PoC, patch diff, and Ollama 0.17.1 fix.]]></description>
    </item>
    <item>
      <title><![CDATA[CVE-2026-41940: Emergency Action Plan for cPanel & WHM Authentication Bypass]]></title>
      <link>https://www.eresussec.com/en/blog/cpanel-whm-cve-2026-41940-authentication-bypass-action-plan</link>
      <guid>https://www.eresussec.com/en/blog/cpanel-whm-cve-2026-41940-authentication-bypass-action-plan</guid>
      <pubDate>Fri, 01 May 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[CVE-2026-41940 is a critical authentication bypass in cPanel & WHM affecting all versions after 11.40. Covers affected versions, patch commands, temporary firewall mitigations, session IOC checks, and a fleet action checklist for hosting teams.]]></description>
    </item>
    <item>
      <title><![CDATA[Copy Fail CVE-2026-31431: Linux Kernel Local Privilege Escalation]]></title>
      <link>https://www.eresussec.com/en/blog/copy-fail-cve-2026-31431-linux-kernel-privilege-escalation</link>
      <guid>https://www.eresussec.com/en/blog/copy-fail-cve-2026-31431-linux-kernel-privilege-escalation</guid>
      <pubDate>Fri, 01 May 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[CVE-2026-31431 (Copy Fail) is a local privilege escalation vulnerability in the Linux kernel's algif_aead cryptographic interface. Affects kernels from 4.14 to 6.12.x across Ubuntu, RHEL, Debian, Amazon Linux, and more. Includes a kernel module workaround, container hardening steps, and a patch strategy for Kubernetes nodes and CI runners.]]></description>
    </item>
    <item>
      <title><![CDATA[What Is AWS IAM in Cloud Security?]]></title>
      <link>https://www.eresussec.com/en/blog/aws-iam-first-line-of-defense-cloud-security</link>
      <guid>https://www.eresussec.com/en/blog/aws-iam-first-line-of-defense-cloud-security</guid>
      <pubDate>Fri, 24 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Learn how AWS Identity and Access Management (IAM) controls access, prevents data breaches, and serves as the ultimate perimeter in modern cloud security.]]></description>
    </item>
    <item>
      <title><![CDATA[Vercel, Context.ai, and AI SaaS Security]]></title>
      <link>https://www.eresussec.com/en/blog/vercel-context-ai-security-incident-analysis</link>
      <guid>https://www.eresussec.com/en/blog/vercel-context-ai-security-incident-analysis</guid>
      <pubDate>Wed, 22 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Eresus analyzes the April 20, 2026 Vercel incident linked to Context.ai and explains why OAuth-connected AI tools now belong in the core SaaS attack surface.]]></description>
    </item>
    <item>
      <title><![CDATA[The April 2026 MCP RCE Wave]]></title>
      <link>https://www.eresussec.com/en/blog/mcp-rce-architecture-wave-april-2026</link>
      <guid>https://www.eresussec.com/en/blog/mcp-rce-architecture-wave-april-2026</guid>
      <pubDate>Wed, 22 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Why MCP security depends on architecture, identity, tool isolation, and registration control more than a single CVE.]]></description>
    </item>
    <item>
      <title><![CDATA[AI Agent Traps: Web Attacks Against Agents]]></title>
      <link>https://www.eresussec.com/en/blog/ai-agent-traps-web-attacks-analysis</link>
      <guid>https://www.eresussec.com/en/blog/ai-agent-traps-web-attacks-analysis</guid>
      <pubDate>Wed, 22 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[How hidden web content, poisoned context, and tool access can manipulate autonomous AI agents in real enterprise workflows.]]></description>
    </item>
    <item>
      <title><![CDATA[Building a Zero Trust Architecture for Enterprise AI and LLM Deployment]]></title>
      <link>https://www.eresussec.com/en/blog/zero-trust-architecture-for-ai-models</link>
      <guid>https://www.eresussec.com/en/blog/zero-trust-architecture-for-ai-models</guid>
      <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Why integrating an LLM requires strict micro-segmentation. Learn how to construct a Zero Trust framework to prevent GenAI from becoming an internal...]]></description>
    </item>
    <item>
      <title><![CDATA[What is AI Security? A Complete Enterprise Blueprint for Securing Machine Learning Ecosystems]]></title>
      <link>https://www.eresussec.com/en/blog/what-is-ai-security</link>
      <guid>https://www.eresussec.com/en/blog/what-is-ai-security</guid>
      <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[A deep dive into the complex world of AI Security. Understand the mechanics behind data poisoning, adversarial ML evasion, and prompt injection attacks...]]></description>
    </item>
    <item>
      <title><![CDATA[OWASP Top 10 for LLMs: The Definitive Guide to AI Vulnerabilities]]></title>
      <link>https://www.eresussec.com/en/blog/owasp-top-10-for-llm-vulnerabilities</link>
      <guid>https://www.eresussec.com/en/blog/owasp-top-10-for-llm-vulnerabilities</guid>
      <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Explore the official OWASP Top 10 for Large Language Models (LLMs). From Prompt Injection to Supply Chain Attacks, learn how to secure your enterprise...]]></description>
    </item>
    <item>
      <title><![CDATA[The Art of LLM Jailbreaking: Demystifying Offensive Prompt Engineering]]></title>
      <link>https://www.eresussec.com/en/blog/llm-jailbreaking-red-teaming-tactics</link>
      <guid>https://www.eresussec.com/en/blog/llm-jailbreaking-red-teaming-tactics</guid>
      <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[How do Red Teamers bypass the safety filters of Large Language Models? Dive deep into the manipulative art of LLM Jailbreaking, DAN prompts, and...]]></description>
    </item>
    <item>
      <title><![CDATA[AI Compliance Crisis: Navigating GDPR/KVKK in RAG Architectures]]></title>
      <link>https://www.eresussec.com/en/blog/gdpr-kvkk-compliance-for-rag-ai-models</link>
      <guid>https://www.eresussec.com/en/blog/gdpr-kvkk-compliance-for-rag-ai-models</guid>
      <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Discover the severe data privacy risks of Enterprise RAG models. Learn how to align Large Language Models with GDPR mandates like the 'Right to be...]]></description>
    </item>
    <item>
      <title><![CDATA[The Rise of Corporate Deepfakes and Vishing: AI-Powered Social Engineering]]></title>
      <link>https://www.eresussec.com/en/blog/deepfake-vishing-ai-social-engineering</link>
      <guid>https://www.eresussec.com/en/blog/deepfake-vishing-ai-social-engineering</guid>
      <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Discover how threat actors use Deepfakes and Voice Phishing (Vishing) for multi-million dollar corporate heists, and how to defend your enterprise.]]></description>
    </item>
    <item>
      <title><![CDATA[The Rise of the Certified AI Security Professional (CAISP): Reimagining Enterprise Pentesting]]></title>
      <link>https://www.eresussec.com/en/blog/certified-ai-security-professional</link>
      <guid>https://www.eresussec.com/en/blog/certified-ai-security-professional</guid>
      <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Traditional penetration testing cannot protect Machine Learning models. Learn why the Certified AI Security Professional (CAISP) is crucial for securing...]]></description>
    </item>
    <item>
      <title><![CDATA[Bug Bounties for AI Systems: Harnessing Crowdsourced Security for LLMs]]></title>
      <link>https://www.eresussec.com/en/blog/bug-bounty-for-ai-systems</link>
      <guid>https://www.eresussec.com/en/blog/bug-bounty-for-ai-systems</guid>
      <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Discover why traditional Bug Bounty programs fail for Generative AI, and how enterprises can launch crowdsourced vulnerability disclosure programs to...]]></description>
    </item>
  </channel>
</rss>