Aaron Grattafiori
19.9K posts

Aaron Grattafiori
@dyn___
Offensive Security / AI Red Teaming @ NVIDIA. Ex-GenAI and OffSec Red Teaming Lead at Meta. Ex-Principal Consultant and Researcher @ NCC Group.

I spoke to Anthropic’s AI agent Claude about AI collecting massive amounts of personal data and how that information is being used to violate our privacy rights. What an AI agent says about the dangers of AI is shocking and should wake us up.








🚨 Meet #CrackArmor. What happens when vulnerabilities are found in the very security module designed to protect your Linux system? I am incredibly proud to share the latest research from our team at the Qualys Threat Research Unit (TRU). We have uncovered CrackArmor: a set of 9 vulnerabilities in AppArmor, the default Linux Security Module protecting millions of Ubuntu, Debian, and SUSE systems. The TRU team discovered a fundamental "confused-deputy" flaw that allows any unprivileged local user to arbitrarily load, replace, or remove AppArmor profiles. But they didn't stop there. By creatively chaining this logic flaw, the team demonstrated multiple paths for Local Privilege Escalation (LPE) to full ROOT: 🔥 User-Space LPE: Weaponizing AppArmor to force a "fail-open" state in Sudo, leveraging Postfix for root access. (Note: Postfix is not installed by default on modern Ubuntu, and this Sudo issue was independently found and fixed by ZeroPath in Nov 2025.) 🔥Kernel-Space LPEs: Exploiting deeply buried memory corruption bugs (including a Use-After-Free and Double-Free) to achieve root despite modern kernel mitigations like CONFIG_RANDOM_KMALLOC_CACHES and CONFIG_SLAB_BUCKETS. 🔥 Namespace Bypass: A complete bypass of Ubuntu’s unprivileged user-namespace restrictions. ⚠️ Urgent Note for Defenders: Patches officially landed upstream in Linus’s tree today. However, due to the new Linux kernel assignment process, CVEs have not been assigned yet. Do not wait for a CVE ID to trigger your vulnerability scanners—start reviewing your patching strategy now! Qualys customers can use QID 386714 - AppArmor Local Privilege Escalation Vulnerability (CrackArmor), which was just released. 🙏Thank you to the Canonical, Debian, SUSE, and Linux Kernel security teams for their coordination. #CyberSecurity #Linux #AppArmor #CrackArmor #QualysTRU #InfoSec #KernelExploitation #ThreatResearch #Qualys blog.qualys.com/vulnerabilitie…





LLMs have changed the way offensive security practitioners reason about problems and build offensive capabilities. @evan_pena2003 and I wrote how our @ArmadinSecurity red team approaches this in the new age of LLMs ⬇️ armadin.com/blog-posts/thi…

"For the first time since we began publishing the CTHR in 2021, we observed a tactical pivot by threat actors. They’re now targeting third-party software vulnerabilities more than weak or missing credentials as the primary initial access vector." cloud.google.com/blog/products/…





UNDEFEATED.







