the grugq's newsletter

Subscribe
Archives
April 23, 2025

April 23, 2025

April 23, 2025

pic.twitter.com/i7KlHvgCRZ

— UwU-Underground (@uwu_underground) April 22, 2025


This is good stuff from the crew at Ghost on a topic that's near-and-dear to my heart - Signal to noise ratios and the cost of triage.

The study scanned ~2,850 open‑source projects in Go (Gin), Python (Flask) and PHP (Laravel). SAST engines surfaced 2,116 issues - after an… pic.twitter.com/v1L6AQTlmd

— cje (@caseyjohnellis) April 22, 2025


The BYTE Vol. 13, Iss. 2
“Succeeding as an Army Operating in a Joint Environment”https://t.co/WxeMIbkEeE
“Everywhere and Always…In the Fight!”#Army250 #BeAllYouCanBe@USArmy @ARCYBER @ArmyCyberSchool @Army_Cyber_CoE @ArmyCyberInst pic.twitter.com/FKdInH5S5F

— 780th Military Intelligence Brigade (Cyber) (@780thC) April 22, 2025


Russian hackers attacked a public facility in the Netherlands last year - the first confirmed sabotage attack in the Netherlands, the Military Intelligence and Security Service (MIVD) said in its annual report on Tuesday. https://t.co/miYiybuNoJ @NL_Times

— 780th Military Intelligence Brigade (Cyber) (@780thC) April 22, 2025


RE//verse 2025 videoshttps://t.co/IWTLcnaBFp

— Alex Plaskett (@alexjplaskett) April 23, 2025

https://www.youtube.com/playlist?list=PLBKkldXXZQhAW5QKjUQOUWaMAHAxDtgio


In the past, you had to:
phish a user, drop malware, escalate privileges, pivot to servers, evade EDR, dump creds, move laterally, exfiltrate quietly, clean up, leave a backdoor.

Today, you just:
phish a user, steal an OAuth token, access everything from anywhere.

Cloud… https://t.co/rIri6ovfH9

— Florian Roth ⚡️ (@cyb3rops) April 23, 2025


AI models can generate exploit code at lightning speed

https://www.theregister.com/2025/04/21/ai_models_can_generate_exploit/


Don't miss what's next. Subscribe to the grugq's newsletter:
X