Search:

Last Week in Security (LWiS) - 2026-02-16

SharePoint enumeration (@matthiasdeeg), LNK "0days" (@Wietze), AMD driver LPE (@Bad_Jubies), POSTing to superadmin (@XeEaton), and more!

Last Week in Security is a summary of the interesting cybersecurity news, techniques, tools and exploits from the past week. This post covers 2026-02-09 to 2026-02-16.

News

  • New Android Theft Protection Feature Updates: Smarter, Stronger - New improvements to anti-theft including detecting if a phone has been grabbed while unlocked as part of a "snatch-and-run." I've witnessed two "roadmen" on ebikes snatch a phone from someone's hands on the sidewalk in London. It's gotten so bad there is a Mind the Grab campaign on the sidewalks.
  • Senate Bill S9005 - The US state of New York is considering requiring every 3D printer sold in the state to be "capable of ensuring a three-dimensional printer will not proceed to print any print job unless the underlying three-dimensional printing file has been evaluated by a firearms blueprint detection algorithm and determined not to be a printing file that would produce a firearm or illegal firearm parts." Besides the impossibility of a "firearms blueprint detection algorithm," when did legislating the tool become the solution? Is New York also going to do the same for lathes, table saws, or injection molds?
  • About the security content of iOS 26.3 and iPadOS 26.3 - dyld is the one to read: "Impact: An attacker with memory write capability may be able to execute arbitrary code. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26. CVE-2025-14174 and CVE-2025-43529 were also issued in response to this report." Reported by Google's Threat Analysis Group (TAG); sounds like they found a whole exploit chain in the wild. Great work TAG! Update those iPhones and Macs.
  • Cyber Model Arena - A new benchmark with deterministic scoring (vs LLM-as-a-judge).
  • The Israeli Spyware Firm That Accidentally Just Exposed Itself - Massive OPSEC fail from the Paragon Solutions general counsel, who uploaded a photo of herself standing in front of a live spyware control panel that shows a target phone number from Czechia.
  • Notepad's new Markdown powers served with a side of remote code execution - This one got a lot of hype but it does require a user to click a link inside a document. UNC paths also apparently work 🤦‍♂️.
  • Ring and Flock Cancel Partnership - "We determined the planned Flock Safety integration would require significantly more time and resources than anticipated." Or the backlash from the public actually worked to change course here?

Techniques and Write-ups

Tools and Exploits

  • PhantomSec | Advanced Offensive Capabilities Automated - EvadeX Sponsored - EvadeX is an evasion-as-a-service platform for red teams and pentesters who want modern, continuously-updated evasive tradecraft without turning every engagement into an R&D project. Generate highly customizable, low-signature payloads through a simple web workflow so you can tune to the target and stay focused on the engagement. Trusted by teams from small consultancies to the Fortune 10. Get callbacks past EDR today!
  • lnk-it-up - Project for generating and identifying deceptive LNK files.
  • aid - A tool for detecting invisible Unicode characters in files, designed to identify potential ASCII smuggling attempts, hidden data encoding, and suspicious Unicode usage patterns.
  • AMD_uProf - Exploit code for CVE-2025-61969, incorrect permission assignment in AMD µProf may allow a local user-privileged attacker to achieve privilege escalation, potentially resulting in arbitrary code execution.
  • sandboxec - A lightweight command sandbox for Linux, secure-by-default, built on Landlock.
  • PassLLM - World's most accurate password guessing AI tool. A PyTorch implementation of PassLLM (USENIX 2025) that leverages PII and LoRA fine-tuning to outperform existing tools by over 45% on consumer hardware.
  • aznet - The standard Go net.Conn interface using Azure Storage services as the transport layer.
  • reflektor is a Go library and CLI for loading shared libraries from bytes and invoking exported functions.
  • Adaptix-StealthPalace - Crystal Palace RDLL loader for Adaptix C2 with Ekko sleep obfuscation, IAT hooking via PICO, and per-section permission restoration.
  • CobaltStrike-Linux-Beacon - Proof of Concept (PoC) implant for creating custom Cobalt Strike Beacons.

New to Me and Miscellaneous

This section is for news, techniques, write-ups, tools, and off-topic items that weren't released last week but are new to me. Perhaps you missed them too!

  • labca - A private Certificate Authority for internal (lab) use, based on the open source ACME Automated Certificate Management Environment implementation from Let's Encrypt (tm).
  • BusterCall - "Bypassing" HVCI via donor PFN swaps to modify read-only code pages. Call chained kernel functions (kCET and SLAT support), modify read-only code pages, and more.
  • nova-proximity - Nova-Proximity is a MCP and Agent Skills security scanner powered with NOVA.
  • cua-kit - Tools for attacking Computer Use Agents.
  • [X] Something Big Is Happening - Are we in the February 2020 before COVID stage of AI where a few vocal outcasts claiming massive change is coming while the world generally ignores them? With the last batch of models I am starting to believe the outcasts more and more.
  • breachpool - Predict the next ransomware target based on wisdom of the crowd.

Techniques, tools, and exploits linked in this post are not reviewed for quality or safety. Do your own research and testing.