Good morning. This is your security briefing for Sunday, March 1st, 2026, covering five articles analyzed overnight. All attribution is by the article authors, and all article analysis is automated.
Trail of Bits has released mquire, an open-source Linux memory forensics tool that performs type-aware analysis of kernel memory snapshots without requiring external debug symbols. The tool leverages kernel-embedded BTF and kallsyms to enable incident responders and security researchers to detect rootkits, analyze malware, and recover hidden files from memory dumps of Linux systems running kernel 4.18 or newer.
Security researchers from Pwn0 have disclosed two critical Remote Code Execution vulnerabilities in Unitree Go2 robots affecting firmware versions 1.1.7 through 1.1.11. CVE-2026-27509 allows unauthenticated RCE as root via unvalidated Python code through DDS packets, while CVE-2026-27510 exploits the Android app's local database, both enabling complete robot takeover with persistent access capabilities.
Researchers David Cash and Richard Warren have disclosed a Remote Code Execution vulnerability in the Delinea Protocol Handler's sslauncher URL handler affecting Secret Server Protocol Handler versions 6.0.3.39 and below and Connection Manager versions 2.7.1 and below. The flaw stems from improper sanitization of server-supplied launcher data, allowing attackers to execute arbitrary processes by manipulating encrypted instructions sent via malicious webpages, though Delinea has now released patches.
According to decoder.cloud, Windows Server 2025 has silently mitigated a specific NTLM relay attack that previously allowed attackers to relay authentication from misconfigured Domain Controllers to escalate privileges. The mitigation is hardcoded in msv1_0.dll and prevents NTLMv1 response generation regardless of LmCompatibilityLevel settings, effectively breaking the attack chain.
MacNoise, an open-source macOS telemetry generation framework from 0xv1n, simulates realistic system events including network connections, file operations, process execution, and TCC permission probes. Security teams can use this modular tool to test detection capabilities of EDR, SIEM, and firewall solutions by emulating attacker behaviors aligned with MITRE ATT&CK techniques.
That concludes today's briefing.