CVE-2026-40453 is the incomplete-fix follow-up to CVE-2025-27636. The 2025 setLowerCase(true) patch covered HttpHeaderFilterStrategy but skipped five non-HTTP filter strategies. The reach map across five wire protocols, three release lanes, and the JDK jspawnhelper EDR-rule trap — with the lab to reproduce.
Read article →28 APR 2026 · ~11 min
A misplaced brace in Spring Boot 4.0 strips the AuthorizationFilter from every chain. The bypass isn't scoped to /actuator, /env isn't the leak path, and reactive fails closed. Reach map, source walk, and detections.
Read article →28 APR 2026 · ~13 min
Vendor questionnaires and binary SCA both claim to vet third-party software. Here's when each is sufficient — and when one is theater.
Read article →26 APR 2026 · ~3 min
What drives the price of a firmware security assessment: scope, depth, timeline, and the difference between a scan and a forensic dissection.
Read article →26 APR 2026 · ~3 min
What's inside a pre-procurement vendor binary review: verifiable SBOM, exploitability-ranked findings, license exposure, and a one-page signed verdict.
Read article →26 APR 2026 · ~3 min
Not every security problem needs a binary autopsy. An honest guide to when reverse engineering is overkill — and what to buy instead.
Read article →26 APR 2026 · ~3 min
The SBOM your vendor handed you doesn't match the binary in the box. Here's why source SBOMs lie, and what a binary-derived SBOM actually proves.
Read article →26 APR 2026 · ~3 min
Three rooms — engineering, legal, regulator — read your forensic report cold. The structure that survives all three.
Read article →21 APR 2026 · ~3 min