The Silent Threat: Why MCP Attacks Are Reshaping AI Security

“With great power comes great responsibility.” — Stan Lee Modern AI developers love how the Model Context Protocol (MCP) lets large language models like Anthropic’s Claude, Cursor and other agentic AI tools talk to local files, APIs and databases as easily as plugging in a USB‑C cable. Just as…

Lookups Gone Wild: The New JNDI Injection Angle in CVE-2024-20931

In Oracle's latest official January 2024 patch, a remote command execution vulnerability CVE-2024-20931 based on the WebLogic T3\IIOP protocol was fixed. This vulnerability was submitted to Oracle by the author in October 2023. In principle, it is a bypass of the CVE-2023-21839 patch, which involves a new…

Gopher in the Machine: Outfoxing EDR with Go-Powered Sleight of Hand

TL;DR We walk through three low-level tricks—dynamic syscalls, Phantom DLL hollowing, and RW→RX direct execution—and show how layering them confuses most Endpoint Detection & Response platforms. All examples are in Go so you can adapt them quickly. GitHub - nullcult/GoGotBackContribute to nullcult/GoGotBack development by…