the grugq's newsletter

Subscribe
Archives
April 20, 2023

April 20, 2023

Google embargo on another linux kernel issue found by @_esoj1 and I finally lifted... here is the advisory: https://t.co/ZQ9EmEvtwW

— Rodrigo Branco (@bsdaemon) April 12, 2023

I've long been interested in how EDRs work under the hood and how we can apply a more evidence-based approach to evasion. I'm happy to announce that I've written a book covering these topics with @nostarch which is now available for preorder 🎉https://t.co/tHSWnVzuMX

— Matt Hand (@matterpreter) April 19, 2023

We are excited to announce the release of our latest report on wartime cyber operations in Ukraine!

The report covers key takeaways from a recent workshop supported by the @NCSC, featuring practitioners, academics, & government officialshttps://t.co/DrdGXmRZWm

— European Cyber Conflict Research Initiative (@cyber_conflict) April 20, 2023

How old were you when you first saw the 8 in the middle of the 8 of diamonds card? ♦️ pic.twitter.com/pJnvaI7Pt3

— Today Years Old (@todayyearsoldig) April 19, 2023

I hesitate to further the distribution of this @newsweek piece, but I just...can't let it percolate out there without addressing some of its misleading statements and misunderstandings concerning the U.S. submarine force and submarine operations.https://t.co/w9GOxAPJAj

— Tom Shugart (@tshugart3) April 19, 2023

A darknet market vendor was let go after a raid in his house while he was logged into Tor and into a marketplace, cause the police ejected the USB that was running the OS and the whole drive was wiped off :))

https://infosec.exchange/@nikahverse/110226250277590100

https://www.dailymail.co.uk/news/article-11939961/Joshua-Giffin-claims-police-bungled-raid-Brisbane-home.html

Ongoing disinformation operation targeting Poland/Lithuania/Ukraine. Impressively fast (but reliable!) attribution to Belarusian cyber group UNC1151. Only took one day! Sent to many people via emails, Telegram and SMS. About recruitment to an army group. https://t.co/ek3TZ2hMyC pic.twitter.com/tR5qNt3DJA

— Lukasz Olejnik, Ph.D, LL.M (@lukOlejnik) April 19, 2023

The likely DPRK 3CX incident was part of a DOUBLE supply chain incident (access from one supply chain compromise was used to create another). Leapfrogging this way allows the actor to create a vicious cycle that expands their footholds exponentially. https://t.co/9SXK1MMbe4

— John Hultquist (@JohnHultquist) April 20, 2023
Don't miss what's next. Subscribe to the grugq's newsletter:

Start the conversation:

Be the first to share your thoughts

X