A vulnerability in the opcode cache of Zen 2 processors

CTI Analysis · Disclosure Doctrine The Embargo Isn’t Dead Everywhere: What the AMD-SB-7052 Disclosure Reminds Us Seven months of embargo, no leak, successful multi-actor coordination. In the middle of a series documenting the erosion of responsible disclosure, the AMD-SB-7052 case deserves to be read for what it is: a demonstration that the classical model still…

What AI Is Changing in Responsible Disclosure

CTI Analysis · Disclosure Doctrine The Embargo Is No Longer a Protection: What AI Is Changing in Responsible Disclosure Six dnsmasq CVEs, a maintainer exhausted by the tsunami of AI-generated bug reports, and the public admission of a major doctrinal pivot. Reading a weak signal that could foreshadow the end of a model thirty years…

Two Windows zero-days disclosed without coordination

CTI Analysis · Critical Vulnerability BitLocker Is No Longer a Promise: What the YellowKey Case Reveals Two Windows zero-days disclosed without coordination, a researcher openly challenging Microsoft, and a phantom component in the Windows Recovery Environment whose true nature, bug or backdoor, no one can yet determine. Published May 14, 2026 Reading time 15 minutes…

CVE-2026-40361: zero-click use-after-free vulnerability in the Outlook rendering engine (wwlib.dll)

Remote code execution via the Reading Pane, without user interaction Executive summary On May 12, 2026, as part of the monthly Patch Tuesday cycle, Microsoft released a fix for CVE-2026-40361, a critical use-after-free vulnerability (CWE-416) officially classified by the vendor as a “Microsoft Office Word Remote Code Execution Vulnerability” (1) (2). Researcher Haifei Li, founder…

Dirty Frag (CVE-2026-43284 and CVE-2026-43500)

Universal Local Privilege Escalation in the Linux Kernel Executive summary On May 7, 2026, researcher Hyunwoo Kim (alias @v4bel) publicly disclosed a new class of Linux kernel vulnerabilities named Dirty Frag (1) (2). This disclosure, brought forward as a result of an embargo break by an unrelated third party, exposes an exploitation chain combining two…