Skip Navigation
BlackBerry Blog

12 Days of Haxxmas

On the first day of Haxxmas
My blackhat sent to me:
A zero day in SMB

On the second day of Haxxmas
My blackhat sent to me:
Two factor auth
And a zero day in SMB

On the third day of Haxxmas
My blackhat sent to me:
Three ROP chains
Two factor auth
And a zero day in SMB

On the fourth day of Haxxmas
My blackhat sent to me:
Four vulns with names
Three ROP chains
Two factor auth
And a zero day in SMB

On the fifth day of Haxxmas
My blackhat sent to me:
Five privilege rings
Four vulns with names
Three ROP chains
Two factor auth
And a zero day in SMB

On the sixth day of Haxxmas
My blackhat sent to me:
Six stacks-a-smashing
Five privilege rings
Four vulns with names
Three ROP chains
Two factor auth
And a zero day in SMB

On the seventh day of Haxxmas
My blackhat sent to me:
Seven vaults-a-leaking
Six stacks-a-smashing
Five privilege rings
Four vulns with names
Three ROP chains
Two factor auth
And a zero day in SMB

On the eighth day of Haxxmas
My blackhat sent to me:
Eight blockchains forking
Seven vaults-a-leaking
Six stacks-a-smashing
Five privilege rings
Four vulns with names
Three ROP chains
Two factor auth
And a zero day in SMB

On the ninth day of Haxxmas
My blackhat sent to me:
Nine boxes sniffing
Eight blockchains forking
Seven vaults-a-leaking
Six stacks-a-smashing
Five privilege rings
Four vulns with names
Three ROP chains
Two factor auth
And a zero day in SMB

On the tenth day of Haxxmas
My blackhat sent to me:
Ten heaps corrupting
Nine boxes sniffing
Eight blockchains forking
Seven vaults-a-leaking
Six stacks-a-smashing
Five privilege rings
Four vulns with names
Three ROP chains
Two factor auth
And a zero day in SMB

On the eleventh day of Haxxmas
My blackhat sent to me:
Eleven botnets spamming
Ten heaps corrupting
Nine boxes sniffing
Eight blockchains forking
Eleven vaults-a-leaking
Six stacks-a-smashing
Five privilege rings
Four vulns with names
Three ROP chains
Two factor auth
And a zero day in SMB

On the twelfth day of Haxxmas
My blackhat sent to me:
Twelve packers packing
Eleven botnets spamming
Ten heaps corrupting
Nine boxes sniffing
Eight blockchains forking
Seven vaults-a-leaking
Six stacks-a-smashing
Five privilege rings
Four vulns with names
Three ROP chains
Two factor auth
And a zero day in SMB


A very Merry Christmas season from all at Cylance! 

The Cylance Research and Intelligence Team

About The Cylance Research and Intelligence Team

Exploring the boundaries of the information security field

The Cylance Research and Intelligence team explores the boundaries of the information security field identifying emerging threats and remaining at the forefront of attacks. With insights gained from these endeavors, Cylance stays ahead of the threats.