the grugq's newsletter

Subscribe
Archives
July 31, 2025
July 31, 2025
July 31, 2025 Interesting and detailed explanation of how smartphones can be intercepted through the vulnerabilities of the SS7 signaling...
July 30, 2025
July 30, 2025
July 30, 2025 Top Lawyer for National Security Agency Is Fired https://t.co/kMbvqM95Ml— Dr. Dan Lomas (@Sandbagger_01) July 29, 2025 from "China’s Lessons...
July 29, 2025
July 29, 2025
July 29, 2025 Terence Tao: "In the field of cybersecurity, a distinction is m…" - MathstodonIn the field of cybersecurity, a distinction is made between the...
July 28, 2025
July 28, 2025
July 28, 2025 Modern Binary Exploitation by @RPISEC. This was a university course developed and run solely by students to teach skills in vulnerability...
July 27, 2025
July 27, 2025
July 27, 2025 Just finished a new blog sharing an interesting example demonstrating the power of cross-operating system vulnerability variant analysis! Check...
July 26, 2025
July 26, 2025
July 26, 2025 It's been months since https://t.co/70znqJx6hO went down and (apparently?) lost all of its data. I have a local copy of everything(ish). I made...
July 25, 2025
July 25, 2025
July 25, 2025 https://t.co/bEGbFvtNiE pic.twitter.com/VqkRK8aaYJ— Zack Witten (@zswitten) July 24, 2025 BlackHat-MEA-2024-slides/BH MEA 2024 - Reverse...
July 24, 2025
July 24, 2025
July 24, 2025 Introducing Loki, a software obfuscation approach designed to withstand all known automated deobfuscation attacks.This method efficiently...
July 23, 2025
July 23, 2025
July 23, 2025 https://www.theregister.com/2025/07/21/replit_saastr_vibe_coding_incident/?td=rt-3a MSTIC blog on Sharepoint exploitation At least 3 actors...
July 22, 2025
July 22, 2025
July 22, 2025 The #CIA has to adjust to a world where everyone's activities and movements are being watched and stored and analysed by artificial...
July 20, 2025
July 20, 2025
July 20, 2025 101 Chrome Exploitation — Part 0: Preface We are starting a new series on modern browsers' architecture and their exploitation using Chrome as...
July 19, 2025
July 19, 2025
July 19, 2025 Very interesting view. Social media, traditional media, blogs, etc give voices to single individuals, while LLMs sample among many....
July 18, 2025
July 18, 2025
July 18, 2025 One of the very first tools/projects I released back in early 2022 looked at hosting malware via DNS records and then retrieving+reassembling....
July 17, 2025
July 17, 2025
July 17, 2025 https://t.co/b0CJjfm4eB pic.twitter.com/PhAlnlIKrI— Silas Cutler // p1nk (@silascutler) July 17, 2025 This is so much! 🔥🔥😎Found two new Potato...
July 16, 2025
July 16, 2025
July 16, 2025 Dear attacker, Clear-History does not clear the PSReadLine command history file.Clear-History, as taken from the official documentation,...
July 15, 2025
July 15, 2025
July 15, 2025 grok claims to be mechahitler and they immediately operation paperclip it lol https://t.co/W9E0jtjYQ3— sam (dependent thinker) (@CobrastanGuy)...
July 14, 2025
July 14, 2025
July 14, 2025 Intelligence Group 13, embedded within the Shahid Kaveh Cyber Group, represents one of the most operationally aggressive and ideologically...
July 13, 2025
July 13, 2025
July 13, 2025 Senate Armed Services Committee wants DOD to explore 'tactical' cyber employment | DefenseScoopA provision in the Senate Armed Services...
July 12, 2025
July 12, 2025
July 12, 2025 This one mostly flew below radar and media coverage, but I think is a significant case. The article refrains from directly naming the group or...
July 11, 2025
July 11, 2025
July 11, 2025 Four UK arrests in Scattered Spider incidents. Suspects are 17 to 20 years old. https://t.co/sJhfry71Tk— John Hultquist (@JohnHultquist) July...
July 10, 2025
July 10, 2025
July 10, 2025 How can the Government best protect the UK against grey zone threats? We have published a report. Read our recommendations...
July 9, 2025
July 9, 2025
July 9, 2025 AI voice clones have hit the White House AGAIN, now impersonating the Secretary of State to other Gov officials to try to steal...
July 8, 2025
July 8, 2025
July 8, 2025 🇺🇸 #US: A Homeland Security operation took place at the MacArthur Park in Los Angeles, described in leaked Army documents as a "show of...
July 7, 2025
July 7, 2025
July 7, 2025 my weekend project to learn about bluetooth mesh networks, relays and store and forward models, message encryption models, and a few other...
July 6, 2025
July 6, 2025
July 6, 2025 #SpyNews - week 27 (June 29-July 5):A summary of 91 espionage-related stories from week 27 coming from...
June 5, 2025
July 5, 2025
June 5, 2025 🚨 New APT group “NightEagle” is hacking Microsoft Exchange with stealthy tools and unpatched exploits.Targets? China’s AI, military, and quantum...
July 4, 2025
July 4, 2025
July 4, 2025 Pro-Russian hacktivism: Shifting alliances, new groups… | Intel 471Pro-Russian hacktivism campaigns continued to be directed at countries and...
July 3, 2025
July 3, 2025
July 3, 2025 GitHub - VirtualBox/virtualbox: Source code for Oracle VirtualBoxSource code for Oracle VirtualBox. Contribute to VirtualBox/virtualbox...
July 2, 2025
July 2, 2025
July 2, 2025 Jesko is an excellent reverse engineer and Binary Refinery is a great tool to check out for malware triage: https://t.co/wjWZk3PU6G...
July 1, 2025
July 1, 2025
July 1, 2025 Proofpoint: TA829 is a unique actor... its behavior classifies it as a financially-motivated actor. Following the invasion of Ukraine, TA829...
June 30, 2025
June 30, 2025
June 30, 2025 Today, Microsoft Threat Intelligence Center is proud to announce the release of RIFT, an open-source tool designed to assist malware analysts...
June 29, 2025
June 29, 2025
June 29, 2025 AI and Secure Code Generation AI and Secure Code Generation | Lawfare AI is reshaping code security—shifting metrics, unknown bugs, and...
June 28, 2025
June 28, 2025
June 28, 2025 “On 12 June 2025, dozens of anonymous X (formerly Twitter) accounts advocating Scottish independence abruptly went silent…Their sudden...
June 27, 2025
June 27, 2025
June 27, 2025 I'm excited to announce our "Out-of-Band" series; focused on the security risks of management devices like BMCs, serial servers, and KVMs....
June 25, 2025
June 25, 2025
June 25, 2025 doing surveillance to the surveillance state https://www.404media.co/fucklapd-com-lets-anyone-use-facial-recognition-to-instantly-identify-...
June 24, 2025
June 24, 2025
June 24, 2025 RUSI Experts react to US strikes on Iran's nuclear facilities - click below for analysis from @BurcuAOzcelik, @MTSavill, and @DDolzikova....
June 23, 2025
June 23, 2025
June 23, 2025 Stacca Stacca! This is an amazing film. Part of an italian TV documentary it shows two hackers doing some hacking via X.25 into a US military...
June 22, 2025
June 22, 2025
June 22, 2025 https://t.co/kZuTtTS9dVPretty cool experimentation work from the Infoblox team to speed up the boring work of web searches for open source...
June 21, 2025
June 21, 2025
June 21, 2025 Your average non-state APT doesn't use browser exploits for initial access. They don't give a shit about the kernel or the EDR, they don't...
June 20, 2025
June 20, 2025
June 20, 2025 Package Hallucinations: How LLMs Can Invent Vulnerabilities | USENIX I’ve started joining every Google Meet 30 seconds early.When you join...
June 19, 2025
June 19, 2025
June 19, 2025 Hacking with AI - Atlantic CouncilCan generative AI help hackers? By deconstructing the question into attack phases and actor profiles, this...
June 18, 2024
June 18, 2025
June 18, 2024 🚗🔌 We reverse engineered the Tesla Wall Connector and uncovered a previously undocumented attack surface via the charging cable. From protocol...
June 17, 2025
June 17, 2025
June 17, 2025 Predatory Sparrows are back Predatory Sparrow’s past cyber attacks on Iranian steel plants and gas stations have demonstrated tangible effects...
June 16, 2025
June 16, 2025
June 16, 2025 News: The Washington Post has suffered a cyber intrusion that compromised the emails of at least several reporters at the paper, including...
June 15, 2025
June 15, 2025
June 15, 2025 #SpyNews - week 24 (June 8-14):A summary of 67 espionage-related stories from week 24 coming from...
June 14, 2025
June 14, 2025
June 14, 2025 “Finally, Copilot hides the source of the instructions, so the user can’t trace what happened”Fun times ahead! https://t.co/fTi9P6A42k...
June 13, 2025
June 13, 2025
June 13, 2025 today i learned.https://t.co/zNcUATyhEo pic.twitter.com/QIfHEdYqcN— J⩜⃝mie Williams (@jamieantisocial) June 11, 2025 Every time I read...
June 12, 2025
June 12, 2025
June 12, 2025 "We have been able to do that through the use of AI tools far more quickly than what was done previously—which was to have humans go through".I...
June 11, 2025
June 11, 2025
June 11, 2025 GitHub - autoscrape-labs/pydoll: Pydoll is a library for automating chromium-based browsers without a WebDriver, offering realistic...
June 10
June 10, 2025
June 10 I've always said self-driving technology would save lives. Had there been humans driving those cars, the death toll would be devastating....
 
Older archives   
X