the grugq's newsletter

Subscribe
Archives
April 10, 2024

April 10, 2024

April 10, 2024

Come see how I used my jerry-rigged “EMBite” probe to capture an EM side-channels using a HackRF.

I used this to figure out the precise timing of where a completely unknown boot check fails - and then used that timing to bypass the check 😁 https://t.co/hGzdCSvn93 pic.twitter.com/C88NaJH8rU

— stacksmashing (@ghidraninja) April 9, 2024


Attacking cars wireless exposed communication (Tesla Model Y, NFC and Proxmark)
Interesting white paper (2022) by @Josep_Pi (@IOActive)

White paper link: https://t.co/zmJ1Bhx9c4 #automotive #cybersecurity pic.twitter.com/oZNV1U0M5M

— 0xor0ne (@0xor0ne) April 9, 2024


In 2016, @dagrz gave one of the greatest cloud security talks ever, filled with new techniques that have been rediscovered repeatedly in the years since. I've remastered it from video obtained from an audience member and the slide deck. https://t.co/o0sMXeZPiw

— Scott Piper (@0xdabbad00) October 17, 2021


"A Real-World Law-Enforcement Breach of End-to-End Encrypted Messaging: The Case of Encrochat" is a talk presented by Sunoo Park at RWC 2024. https://t.co/bVjSja26zg
Slides here: https://t.co/mcZHP10q8v

— Aristotle Tzafalias (@Aristot73) April 9, 2024


ZDI blog: " This is the largest Patch Tuesday release from Microsoft of all time."https://t.co/GHcXhZEb3j

— Ryan Naraine (@ryanaraine) April 9, 2024


you: i use Claude 3 Opus for coding
me: i use the Amazon Shopping app for coding pic.twitter.com/OMeOmFvQpK

— Mert (@mertdumenci) April 10, 2024


📌The EXPMON system is mainly a #sandbox-based system but with static analysis modules. Unlike all the other sandboxes that I know, EXPMON is specifically designed and built for detecting advanced file-based #exploits.
➡️[blog]https://t.co/ZSBTm8mqwC… pic.twitter.com/zQtYU6cyMC

— Ring3API 🇺🇦 We Are Fighting For Our Land (@ntlmrelay) April 9, 2024


Scraping onion sites across Tor hidden services in an automated way -- quick crash course on some of the command-line tools or Python libraries that can help you create your own custom monitoring tools for cybercrime: https://t.co/M5zpzHf6Fq pic.twitter.com/E9wHzwFom3

— John Hammond (@_JohnHammond) April 9, 2024


"When Russia unleashed its war on Ukraine, the DGSE had the same technical information as its American partners ... The problem is then how you exploit and analyse that information and the way in which you think an event will or won’t take place".https://t.co/9lyGTzwYQC

— Dr. Dan Lomas (@Sandbagger_01) April 9, 2024

https://archive.is/CGHxf


Are these Crowdstrike or Microsoft threat actor names? https://t.co/yiCBT2cwB8

— Shane Huntley (@ShaneHuntley) April 9, 2024

Spearmint Rhino is suing the Peppermint Hippo

— Las Vegas Locally 🌴 (@LasVegasLocally) April 9, 2024


A thread of the variety of products on ships that allow remote monitoring of critical systems on ships.

Just really want to put to bed the idea that systems are always air gapped.

Kongsberg offer multiple systems allowing remote monitoring of ICMS.https://t.co/QFdDdeZnWm pic.twitter.com/Xf8hUtXM9d

— Cybergibbons 🚲🚲🚲 (@cybergibbons) April 9, 2024


Don't miss what's next. Subscribe to the grugq's newsletter:
Start the conversation:
X