the grugq's newsletter

Subscribe
Archives
October 8, 2025
October 8, 2025
October 8, 2025 https://t.co/VswrXw9ZjZ pic.twitter.com/mukGkzNca6— Damin Toell (@damintoell) October 7, 2025 POChttps://t.co/6VziQNQ76p...
October 7, 2025
October 7, 2025
October 7, 2025 This was an interesting read, but to their credit, I was expecting a bit wider coverage. The coverage of IO in sync with kinetic strikes is...
October 5-6, 2025
October 6, 2025
October 5-6, 2025 GitHub - b1n4r1b01/n-daysContribute to b1n4r1b01/n-days development by creating an account on GitHub. GitHub - stealth/crash: crypted admin...
October 3-4, 2025
October 4, 2025
October 3-4, 2025 There is someone exposing IRGC (Islamic Revolutionary Guard Corps) stuff on GitHub.I'm not a IRGC geopolitical nerd, so I can't assess the...
October 2, 2025
October 2, 2025
October 2, 2025 Most #CyberSecurity classes focus on Western technology stacks, fueling #APT groups with TTPs to ravage our own networks. We are flipping the...
October 1, 2025
October 1, 2025
October 1, 2025 Pre-pandemic, the calculus was what the likelihood was of an employee being bribed to insert a USB stick into their work computer at the...
September 30, 2025
September 30, 2025
September 30, 2025 Just uploaded my RomHack slides about attack vectors against PsSetLoadImageNotifyRoutine and drivers that rely on it....
September 29, 2025
September 29, 2025
September 29, 2025 Writeup for CVE-2025-24085, an ITW mediaplaybackd vulnerability patched earlier this year https://t.co/XopOVNmfnc— binaryboy (@b1n4r1b01)...
September 28, 2025
September 28, 2025
September 28, 2025 Check out Titanis, my new C#-based protocol library! It features implementations of SMB and various Windows RPC protocols along with...
September 27, 2025
September 27, 2025
September 27, 2025 Precisely this: 👇Understanding how something is built helps you understand how it can break. The best way to understand how something is...
September 26, 2025
September 26, 2025
September 26, 2025 In 2016 Geoffrey Hinton said “we should stop training radiologists now" since AI would soon be better at their jobs.He was right: models...
September 25, 2025
September 25, 2025
September 25, 2025 We are releasing details on BRICKSTORM malware activity, a China-based threat hitting US tech to potentially target downstream customers...
September 24, 2025
September 24, 2025
September 24, 2025 A very special between two nerds… Between Two Nerds: How the US can win the cyber war - Risky Business Media OPSEC fails that beggar...
September 23, 2025
September 23, 2025
September 23, 2025 Poland’s deputy prime minister said that if Poland were hit by a cyberattack on critical infrastructure such as energy or water with broad...
September 22, 2025
September 22, 2025
September 22, 2025 this was a googlectf challenge btw https://t.co/tC2yYC09At pic.twitter.com/FzaRuBAaWX— Rebane (@rebane2001) September 21, 2025 Thorough...
September 21, 2025
September 21, 2025
September 21, 2025 Just published some notes on httpjail - this is a really interesting new sandboxing project, it lets you run a process (on macOS or Linux...
September 20, 2025
September 20, 2025
September 20, 2025 The vast majority of hacking is just credentials. There are four basic ways to get creds:STABSteal: using malware, etc.Try: brute force,...
September 18-19, 2025
September 19, 2025
September 18-19, 2025 I've been researching the Microsoft cloud for almost 7 years now. A few months ago that research resulted in the most impactful...
September 17, 2025
September 17, 2025
September 17, 2025 Quite a good Between Two Nerds discussion. Between Two Nerds: The limits of cyber power - Risky Business Media OpenAI literally just...
September 16, 2025
September 16, 2025
September 16, 2025 When we decompile an APK and see an unreadable https://t.co/BbQf3H943H.bundle, it could be Hermes bytecode. Using https://t.co/DBonMwpUBM...
September 15, 2025
September 15, 2025
September 15, 2025 Say hello to Eternal Tux🐧, a 0-click RCE exploit against the Linux kernel from KSMBD N-Days (CVE-2023-52440 &...
September 13-14,
September 14, 2025
September 13-14, There's a sick linenoise article by @iximeow in @phrack 71 called "Learning An ISA By Force Of Will", where ixi goes from unknown binary...
September 12, 2025
September 12, 2025
September 12, 2025 Scattered Lapsus$ Hunters has provided the following message on breachforums[.]hn.They have essentially retired....
September 11, 2025
September 11, 2025
September 11, 2025 Claude "File creation" is actually a sandboxed code execution environment and has full internet access.This is great for me, since we now...
September 10, 2025
September 10, 2025
September 10, 2025 wow... great finds. good writeup, worth a read! :) and if you've ever been to burgerking drivethru, AI is analyzing your convos ;D...
September 9, 2025
September 9, 2025
September 9, 2025 Great technical writeup on how NodeZero solves Game of Active Directory (GOAD):TL;DR – How NodeZero Solved GOAD in 14 Minutes:NodeZero...
September 8, 2025
September 8, 2025
September 8, 2025 In this paper, we present CVE-GENIE, an automated, large language model (LLM)-based multi-agent framework designed to reproduce real-world...
September 7, 2025
September 7, 2025
September 7, 2025 Extensive analysis of PHRACK's "North Korea Files"🇰🇵https://t.co/xLHGlM0NyK🔥 “the most comprehensive and technically intimate disclosures”...
September 6, 2025
September 6, 2025
September 6, 2025 Did you know that we have over 50 talks from past years of CYBERWARCON available on our YouTube? Catch them here >...
September 5, 2025
September 5, 2025
September 5, 2025 🚨 Czech cybersecurity agency NÚKIB issues HIGH threat warning about data transfers to China and remote administration of technical assets...
September 4, 2025
September 4, 2025
September 4, 2025 Between Two Nerds: How threat actors are using AI to run wild - Risky Business Media The Gentlemen Hackers interviewing Halvar Flake:...
September 2-3, 2025
September 3, 2025
September 2-3, 2025 NEW: The standards of the US Telephone Security Group (TSG), to prevent phones from being turned into a listening...
September 1, 2025
September 1, 2025
September 1, 2025 Was in a bookshop and asked a worker if he could recommend books to me. He said "Sure, they're great".— Andy Ryan (@ItsAndyRyan) August 30,...
August 30–31, 2025
August 31, 2025
August 30–31, 2025 New: Tesla said it didn't have critical data in a fatal crash. Then a hacker found it. "For any reasonable person, it was obvious the data...
August 29, 2025
August 29, 2025
August 29, 2025 I'm once again looking at the epic 20-part essay which Ian Lance Taylor wrote about linkers https://t.co/DKtvyCiP6r - did anyone ever write...
August 28, 2025
August 28, 2025
August 28, 2025 #ESETResearch has discovered the first known AI-powered ransomware, which we named #PromptLock. The PromptLock malware uses the gpt-oss:20b...
August27, 2025
August 27, 2025
August27, 2025 2025 State of the Internet Report: Summary and Conclusionshttps://t.co/rmgBK1198Q(Screenshot: PolarEdge infections as of 5 August 2025)...
August 26,2025
August 26, 2025
August 26,2025 excellent writeup that highlights how many 0-days are simply asking nicely for something. https://t.co/4GZmKR2wme pic.twitter.com/QfhZfZ2bSf—...
August 25, 2025
August 25, 2025
August 25, 2025 David Gerard: "latest hilarity: Perplexity, the AI search engin…" - GSV Sleeper Servicelatest hilarity: Perplexity, the AI search engine,...
August 24, 2025
August 24, 2025
August 24, 2025 daisy-chaining wifi networks to reach a hard target is 🆆🅸🅻🅳but operational "sophistication" is often the clean up 🧹 https://t.co/fHcIv8Q3mD...
August 23, 2025
August 23, 2025
August 23, 2025 Brief info and POC for this week's Apple 0click iOS 18.6.1 RCE bug CVE-2025-43300 https://t.co/EL3qg56N8X pic.twitter.com/j8yuv1CXU7—...
August 22, 2025
August 22, 2025
August 22, 2025 AWS CEO says using AI to replace junior staff is 'Dumbest thing I've ever heard' “I think the skills that should be emphasized are how do you...
August 21, 2025
August 22, 2025
August 21, 2025 Reading G-2 "#Counterintelligence Situation in China Theater" Report from 1946. "On the purpose of collecting information from the American...
August 20, 2025
August 20, 2025
August 20, 2025 Never considered it before until now.Abuse Microsoft AI copilot to "live off the land" and perform automated malicious tasks by simply...
August 18, 2025
August 19, 2025
August 18, 2025 At @defcon, I presented my research on client-side deanonymization attacks in @Google's Privacy Sandbox! Privacy research doesn't get as much...
August 16-17, 2025
August 17, 2025
August 16-17, 2025 The previous thread glossed over how our LLM Agents actually work.The truth is, it took us a long time to figure out how to get reliable...
August 15, 2025
August 15, 2025
August 15, 2025 Russian hackers seized control of Norwegian dam, spy chief says | Russia | The GuardianBeate Gangås says attack in April by Norway’s...
August 14, 2025
August 14, 2025
August 14, 2025 NewTaiwan’s New Naval Drones Could Strike Any Chinese Invasionhttps://t.co/vBKXtTZ5A5— H I Sutton (@CovertShores) August 13, 2025 Wrapped up...
August 13, 2025
August 13, 2025
August 13, 2025 If you missed this talk at BH/DC last week, it's worth a read: "From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial...
August 12, 2025
August 12, 2025
August 12, 2025 ThinkstKeeping up with security research is near impossible. ThinkstScapes helps with this. We scour through thousands of blog posts, tweets...
 
Older archives   
X