<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Endolum Blog</title>
    <link>https://endolum.io/blog/</link>
    <atom:link href="https://endolum.io/blog/rss.xml" rel="self" type="application/rss+xml" />
    <description>Cybersecurity research, threat intelligence, and tutorials from Endolum, a Swiss security studio.</description>
    <language>en</language>
    <copyright>Endolum GmbH</copyright>
    <lastBuildDate>Wed, 13 May 2026 15:40:04 GMT</lastBuildDate>
    <item>
      <title>CVE-2026-23918: Apache HTTP/2 Double Free RCE</title>
      <link>https://endolum.io/blog/cve-2026-23918-apache-http2-double-free/</link>
      <guid isPermaLink="true">https://endolum.io/blog/cve-2026-23918-apache-http2-double-free/</guid>
      <pubDate>Tue, 05 May 2026 00:00:00 GMT</pubDate>
      <description>CVE-2026-23918 is a double free in Apache 2.4.66 mod_http2. An HTTP/2 early reset can trigger remote code execution. Apache 2.4.67 ships the fix.</description>
      <dc:creator>Endolum Academy</dc:creator>
      <category>cve</category>
      <category>apache</category>
      <category>rce</category>
      <category>threat-intel</category>
    </item>
    <item>
      <title>How exposed is Switzerland to CVE-2026-23918?</title>
      <link>https://endolum.io/blog/swiss-apache-cve-2026-23918-exposure/</link>
      <guid isPermaLink="true">https://endolum.io/blog/swiss-apache-cve-2026-23918-exposure/</guid>
      <pubDate>Tue, 05 May 2026 00:00:00 GMT</pubDate>
      <description>7&apos;141 Swiss servers run Apache 2.4.66 the day after CVE-2026-23918. Only 14.8% have HTTP/2 enabled, the actual exploit gate. Inside our 749 host probe.</description>
      <dc:creator>Endolum Academy</dc:creator>
      <category>cve</category>
      <category>apache</category>
      <category>threat-intel</category>
      <category>switzerland</category>
    </item>
    <item>
      <title>301 D-Link Cameras Wide Open in Switzerland</title>
      <link>https://endolum.io/blog/swiss-dlink-camera-exposure-2026/</link>
      <guid isPermaLink="true">https://endolum.io/blog/swiss-dlink-camera-exposure-2026/</guid>
      <pubDate>Wed, 29 Apr 2026 00:00:00 GMT</pubDate>
      <description>We looked for the new D-Link Mirai router bug in Swiss IP space. Found zero. Then we found 301 D-Link cameras leaking video, MAC, and LAN topology.</description>
      <dc:creator>Endolum Academy</dc:creator>
      <category>threat-intel</category>
      <category>vulnerability-scanning</category>
      <category>network-security</category>
    </item>
    <item>
      <title>1&apos;370 SharePoint Servers Still Open a Week After the Patch</title>
      <link>https://endolum.io/blog/sharepoint-1370-unpatched-ongoing-attacks/</link>
      <guid isPermaLink="true">https://endolum.io/blog/sharepoint-1370-unpatched-ongoing-attacks/</guid>
      <pubDate>Wed, 22 Apr 2026 00:00:00 GMT</pubDate>
      <description>Shadowserver counts 1&apos;370 SharePoint servers exposed and unpatched against CVE-2026-32201. Fewer than 200 got patched after release. Attacks continue.</description>
      <dc:creator>Endolum Academy</dc:creator>
      <category>cve</category>
      <category>threat-intel</category>
      <category>microsoft</category>
    </item>
    <item>
      <title>We Measured 1&apos;448 Swiss NetScalers for CitrixBleed 3</title>
      <link>https://endolum.io/blog/swiss-netscaler-citrixbleed-3-exposure/</link>
      <guid isPermaLink="true">https://endolum.io/blog/swiss-netscaler-citrixbleed-3-exposure/</guid>
      <pubDate>Mon, 20 Apr 2026 00:00:00 GMT</pubDate>
      <description>Passive measurement of Swiss Citrix NetScaler exposure to CVE-2026-3055. 57 hosts still on pre patch builds, a new fingerprinting signal, and one very ambitious honeypot.</description>
      <dc:creator>Endolum Academy</dc:creator>
      <category>threat-intel</category>
      <category>vulnerability-scanning</category>
      <category>network-security</category>
    </item>
    <item>
      <title>How an AI Tool Got Vercel Breached</title>
      <link>https://endolum.io/blog/vercel-context-ai-breach/</link>
      <guid isPermaLink="true">https://endolum.io/blog/vercel-context-ai-breach/</guid>
      <pubDate>Mon, 20 Apr 2026 00:00:00 GMT</pubDate>
      <description>On April 19, Vercel confirmed a breach traced to Context.ai, a third-party AI tool with broad OAuth scopes. The supply chain blind spot is universal.</description>
      <dc:creator>Endolum Academy</dc:creator>
      <category>threat-intel</category>
      <category>supply-chain</category>
      <category>incident-analysis</category>
    </item>
    <item>
      <title>Adobe Acrobat Zero-Day Was Live for Five Months</title>
      <link>https://endolum.io/blog/cve-2026-34621-adobe-acrobat/</link>
      <guid isPermaLink="true">https://endolum.io/blog/cve-2026-34621-adobe-acrobat/</guid>
      <pubDate>Sat, 18 Apr 2026 00:00:00 GMT</pubDate>
      <description>CVE-2026-34621 is a prototype pollution zero-day in Adobe Acrobat Reader, exploited in the wild since November 2025 via invoice and legal PDF lures.</description>
      <dc:creator>Endolum Academy</dc:creator>
      <category>cve</category>
      <category>threat-intel</category>
    </item>
    <item>
      <title>Inside APT28&apos;s MikroTik DNS Hijacking Campaign</title>
      <link>https://endolum.io/blog/apt28-mikrotik-dns-hijacking/</link>
      <guid isPermaLink="true">https://endolum.io/blog/apt28-mikrotik-dns-hijacking/</guid>
      <pubDate>Sat, 18 Apr 2026 00:00:00 GMT</pubDate>
      <description>APT28 hijacked 18,000 routers to steal Microsoft 365 logins. How FrostArmada worked, why MikroTik keeps getting hit, and how to check your own.</description>
      <dc:creator>Endolum Academy</dc:creator>
      <category>threat-intel</category>
      <category>network-security</category>
      <category>apt</category>
    </item>
    <item>
      <title>Two HTTP Requests to Full Nginx Takeover</title>
      <link>https://endolum.io/blog/cve-2026-33032-nginx-ui/</link>
      <guid isPermaLink="true">https://endolum.io/blog/cve-2026-33032-nginx-ui/</guid>
      <pubDate>Thu, 16 Apr 2026 00:00:00 GMT</pubDate>
      <description>CVE-2026-33032 is a CVSS 9.8 auth bypass in nginx-ui. One unprotected MCP endpoint lets attackers rewrite nginx configs and take over the server.</description>
      <dc:creator>Endolum Academy</dc:creator>
      <category>cve</category>
      <category>web-security</category>
      <category>threat-intel</category>
    </item>
    <item>
      <title>A Security Vendor Got Owned by SQL Injection</title>
      <link>https://endolum.io/blog/forticlient-ems-sql-injection/</link>
      <guid isPermaLink="true">https://endolum.io/blog/forticlient-ems-sql-injection/</guid>
      <pubDate>Wed, 15 Apr 2026 00:00:00 GMT</pubDate>
      <description>CVE-2026-21643 is an unauthenticated SQL injection in FortiClient EMS 7.4.4. A Python f-string gave attackers access to every managed endpoint.</description>
      <dc:creator>Endolum Academy</dc:creator>
      <category>threat-intel</category>
      <category>web-security</category>
      <category>sql-injection</category>
    </item>
    <item>
      <title>Is Port 3389 (RDP) Safe to Have Open?</title>
      <link>https://endolum.io/blog/port-3389-rdp-security/</link>
      <guid isPermaLink="true">https://endolum.io/blog/port-3389-rdp-security/</guid>
      <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
      <description>Port 3389 is the default for Remote Desktop. Over 4 million instances sit exposed on the internet. Here is why that is a problem and what to do about it.</description>
      <dc:creator>Endolum Academy</dc:creator>
      <category>network-security</category>
      <category>tutorial</category>
      <category>vulnerability-scanning</category>
    </item>
    <item>
      <title>How to Scan Your Home Network for Vulnerabilities</title>
      <link>https://endolum.io/blog/scan-your-home-network/</link>
      <guid isPermaLink="true">https://endolum.io/blog/scan-your-home-network/</guid>
      <pubDate>Mon, 30 Mar 2026 00:00:00 GMT</pubDate>
      <description>Your home IP is being probed by bots every hour. Here is how to find out what is exposed and how to fix it, step by step.</description>
      <dc:creator>Endolum Academy</dc:creator>
      <category>tutorial</category>
      <category>network-security</category>
      <category>home-network</category>
    </item>
    <item>
      <title>Endolum Sentinel vs Shodan: Which One Should You Use?</title>
      <link>https://endolum.io/blog/sentinel-vs-shodan/</link>
      <guid isPermaLink="true">https://endolum.io/blog/sentinel-vs-shodan/</guid>
      <pubDate>Mon, 30 Mar 2026 00:00:00 GMT</pubDate>
      <description>Shodan shows you what is exposed. Sentinel tells you what to fix. Here is how they compare and when to use each one.</description>
      <dc:creator>Endolum Academy</dc:creator>
      <category>comparison</category>
      <category>vulnerability-scanning</category>
      <category>shodan</category>
    </item>
    <item>
      <title>CVE-2026-20841: Notepad Markdown RCE Explained</title>
      <link>https://endolum.io/blog/cve-2026-20841-notepad-markdown-rce/</link>
      <guid isPermaLink="true">https://endolum.io/blog/cve-2026-20841-notepad-markdown-rce/</guid>
      <pubDate>Thu, 12 Feb 2026 00:00:00 GMT</pubDate>
      <description>Technical analysis of the Windows Notepad RCE vulnerability, attack vectors, detection strategies, and IOCs for defenders.</description>
      <dc:creator>Endolum Academy</dc:creator>
      <category>cve</category>
      <category>windows</category>
      <category>rce</category>
      <category>threat-intel</category>
      <category>detection</category>
    </item>
    <item>
      <title>0APT: The Fastest Ransomware Crew of 2026</title>
      <link>https://endolum.io/blog/0apt-ransomware-fastest-crew-2026/</link>
      <guid isPermaLink="true">https://endolum.io/blog/0apt-ransomware-fastest-crew-2026/</guid>
      <pubDate>Tue, 10 Feb 2026 00:00:00 GMT</pubDate>
      <description>71 victims in 48 hours. A deep dive into the new RaaS syndicate, their TTPs, and actionable detection guidance.</description>
      <dc:creator>Endolum Academy</dc:creator>
      <category>ransomware</category>
      <category>threat-intel</category>
      <category>detection</category>
      <category>iocs</category>
    </item>
    <item>
      <title>Infostealer Malware: How Your Credentials End Up For Sale</title>
      <link>https://endolum.io/blog/infostealer-malware-breakdown/</link>
      <guid isPermaLink="true">https://endolum.io/blog/infostealer-malware-breakdown/</guid>
      <pubDate>Thu, 05 Feb 2026 00:00:00 GMT</pubDate>
      <description>Infostealers harvest browser passwords, session tokens, and crypto wallets. Here is how they work, what they target, and how to detect them.</description>
      <dc:creator>Endolum Academy</dc:creator>
      <category>malware</category>
      <category>threat-intel</category>
      <category>infostealers</category>
    </item>
    <item>
      <title>SQL Injection Still Works in 2026</title>
      <link>https://endolum.io/blog/sql-injection-still-works/</link>
      <guid isPermaLink="true">https://endolum.io/blog/sql-injection-still-works/</guid>
      <pubDate>Wed, 04 Feb 2026 00:00:00 GMT</pubDate>
      <description>It has been over two decades since SQL injection was first documented. Companies still get breached by it. Here is how it works and how to actually prevent it.</description>
      <dc:creator>Endolum Academy</dc:creator>
      <category>tutorial</category>
      <category>web-security</category>
      <category>sql-injection</category>
    </item>
    <item>
      <title>Notepad++ Supply Chain Attack: Chrysalis Backdoor</title>
      <link>https://endolum.io/blog/notepad-plus-plus-supply-chain-chrysalis/</link>
      <guid isPermaLink="true">https://endolum.io/blog/notepad-plus-plus-supply-chain-chrysalis/</guid>
      <pubDate>Tue, 03 Feb 2026 00:00:00 GMT</pubDate>
      <description>Chinese APT compromised Notepad++ update infrastructure to deliver a sophisticated backdoor to targeted victims. Full technical breakdown with IOCs.</description>
      <dc:creator>Endolum Academy</dc:creator>
      <category>threat-intel</category>
      <category>supply-chain</category>
      <category>malware</category>
      <category>APT</category>
    </item>
    <item>
      <title>Threat Landscape: Swiss Financial Sector in 2026</title>
      <link>https://endolum.io/blog/threats-swiss-financial-sector/</link>
      <guid isPermaLink="true">https://endolum.io/blog/threats-swiss-financial-sector/</guid>
      <pubDate>Tue, 03 Feb 2026 00:00:00 GMT</pubDate>
      <description>Switzerland&apos;s banks and fintech companies face a specific set of threats. From APT groups to regulatory pressure, here is what security teams should watch.</description>
      <dc:creator>Endolum Academy</dc:creator>
      <category>threat-intel</category>
      <category>finance</category>
      <category>switzerland</category>
    </item>
    <item>
      <title>Moltbook Hacked in 3 Minutes: Vibe-Coding vs Security</title>
      <link>https://endolum.io/blog/moltbook-hack-vibe-coding-security/</link>
      <guid isPermaLink="true">https://endolum.io/blog/moltbook-hack-vibe-coding-security/</guid>
      <pubDate>Mon, 02 Feb 2026 00:00:00 GMT</pubDate>
      <description>The AI social network exposed 1.5 million API keys because of two missing SQL statements. A breakdown of what went wrong and how to avoid it.</description>
      <dc:creator>Endolum Academy</dc:creator>
      <category>security</category>
      <category>incident-analysis</category>
      <category>supabase</category>
      <category>web-security</category>
    </item>
    <item>
      <title>Ransomware in 2026: What Changed and What Stayed Broken</title>
      <link>https://endolum.io/blog/ransomware-landscape-2026/</link>
      <guid isPermaLink="true">https://endolum.io/blog/ransomware-landscape-2026/</guid>
      <pubDate>Mon, 02 Feb 2026 00:00:00 GMT</pubDate>
      <description>The ransomware ecosystem evolved again. Double extortion is old news. Here is what groups are doing now and why your backups alone will not save you.</description>
      <dc:creator>Endolum Academy</dc:creator>
      <category>threat-intel</category>
      <category>ransomware</category>
      <category>malware</category>
    </item>
    <item>
      <title>Welcome to the Endolum blog</title>
      <link>https://endolum.io/blog/welcome/</link>
      <guid isPermaLink="true">https://endolum.io/blog/welcome/</guid>
      <pubDate>Mon, 02 Feb 2026 00:00:00 GMT</pubDate>
      <description>We are opening a public space for the research, walkthroughs, and field notes that come out of running Sentinel and Hacked. This is what to expect.</description>
      <dc:creator>Endolum</dc:creator>
      <category>announcement</category>
    </item>
  </channel>
</rss>
