Hank Chen
653 posts

Hank Chen
@Hank0438
Security Researcher ^ CTF Enthusiast

Nice work! Angelboy & TwinkleStar03 (@scwuaptx & @_twinklestar03) of DEVCORE Research Team + DEVCORE Internship Program was able to exploit Microsoft Windows 11! If confirmed, they win $30,000 and 3 Master of Pwn points. They're off to the disclosure room to explain how they did it. #Pwn2Own #P2OBerlin







Here is a detailed bug analysis for MALI GPU CVE-2025-XXXX(6349|8045). We implements a stable privilege escalation on the latest version of the Pixel 9, and leverage a double-free primitive to arbitrary physical memory RW without any info leak. 👍dawnslab.jd.com/Pixel_9_Pro_Eo…

The commercial packer that lets ransomware groups kill your EDR 😵💫HeartCrypt bundles ransomware with EDR-disabling drivers (many signed with revoked or stolen certificates) and keeps evolving as vendors chase it. Groups like MedusaLocker, RansomHub, and BlackSuit are already using it in active campaigns, including the SimpleHelp RCE (CVE-2025-0282). Our team at MagicSword has been tracking this campaign, building on the initial research by Gábor Szappanos and Steeve Gaudreault from @sophos. What we’re seeing now is alarming: these attacks reach full compromise in under 30 minutes. We’re tracking it live. Defend by blocking certificates, not just hashes. Check out the article here: linkedin.com/pulse/heartcry… #HeartCrypt #EDREvasion #Ransomware #CyberSecurity #MagicSword #ThreatIntel


















