the grugq's newsletter

Archives
April 29, 2026

April 29, 2026

April 29, 2026

you never think this will happen to you, but this happened to me today.

a DPRK actor posed as somebody i previously worked with at the arbitrum foundation to have a catchup call. they reached out via telegram, in a channel where we had an existing messaging history.

the DPRK… https://t.co/hjyJ8Pf1Iz pic.twitter.com/uJs98A6RPy

— whizwang (@whizwang) April 28, 2026


Throwback to early NYT reporting on Russian hackers

In 2007, @mschwirtz asked Russian LJ users for their opinions. One user said he didn't think hackers were a big problem & he was cited by @cliffordlevy a week later

This was a sentiment shared by some, but not all in Russia pic.twitter.com/AfOpNbkFqv

— Oleg Shakirov (@shakirov2036) April 28, 2026


Putting outdated coding books in the Little Free Library should be considered illegal dumping, and carry a sentence of 100 hours community service. pic.twitter.com/MBnzHLdflc

— Y Disassembler (@loomdoop) April 28, 2026


The cutout network addresses most of the structural vulnerabilities that exposed NSO Group. It provides legal insulation between developer and sale, complicates sanctions targeting through jurisdictional dispersion, and gives both vendor and client deniability.

Local importers… https://t.co/GwbIDUcubr

— Gabriella (@gabrielladb_) April 28, 2026


claude-red is a curated library of offensive security skills designed for the Claude skills system. Each skill is a structured SKILL.mdfile that primes Claude with expert-level methodology for a specific attack surface from SQLi to shellcode, EDR evasion to exploit development.… pic.twitter.com/QjsB8TILkH

— 7h3h4ckv157 (@7h3h4ckv157) April 25, 2026

GitHub - SnailSploit/Claude-Red: claude-red is a curated library of offensive security skills designed for the Claude skills system. Each skill is a structured SKILL.md file that primes Claude with expert-level methodology for a specific attack surface — from SQLi to shellcode, EDR evasion to exploit development. · GitHub

claude-red is a curated library of offensive security skills designed for the Claude skills system. Each skill is a structured SKILL.md file that primes Claude with expert-level methodology for a s...


SnailSploit/Claude-Red (1,064 stars) claude-red is a curated library of offensive security skills designed for the Claude skills system. Each skill is a structured SKILL.md file that primes Claude with expert-level methodology for a specific attack surface — from SQLi to shellcode, EDR evasion to exploit development.

source: 7h3h4ckv157 (@7h3h4ckv157)


It's wild to think about how massive 1M token context windows in LLMs really are

That's roughly equivalent to:
- The complete works of Shakespeare
- 11 hours of audio
- A 5-minute session fixing some TypeScript issue

— David K 🎹 (@DavidKPiano) April 28, 2026


A response to recent reporting in Germany, in service of clarity and accountability:

First, it’s important to be precise when it comes to critical infrastructure like Signal. Signal was not “hacked” — in that our encryption, infrastructure, and the integrity of the app’s code…

— Signal (@signalapp) April 27, 2026


How Amazon uses agentic AI for vulnerability detection at global scale https://t.co/fMtNQarSsW

— Vipin George (@vipinonline) April 28, 2026

How Amazon uses agentic AI for vulnerability detection at global scale - Amazon Science

Amazon’s RuleForge system uses agentic AI to generate production-ready detection rules 336% faster than traditional methods.


Oh, great to see MSRC listens! This indeed covers some harmful attack scenarios which the previous versions didn’t cover (such as the OLE and Protected View one). It’s a good move for Office researchers and all Office users.👏

(with this spirit, I just shared my personal… https://t.co/iadtUEbWXH

— Haifei Li (@HaifeiLi) April 28, 2026


🤵 Keynote #2 at #FUZZING'26 is online

Where the Fuzz Are We Going?
by Sergej Dechand (@CI_Fuzz).https://t.co/K2RxY2awhJ

— Marcel Böhme👨‍🔬 (@mboehme_) April 27, 2026


NDSS 2026 - FUZZING 2026, Keynote 2 by Sergej Dechand — NDSS Symposium

source: Marcel Böhme👨‍🔬 (@mboehme_)


MAD Bugs: QEMU and UTM Escape

Welcome gift for @justdionysus! Now onto another cool one for @i0n1c.

Blog: https://t.co/vILIkTZB1jhttps://t.co/YfJSt3W6sN

— thaidn (@XorNinja) April 28, 2026

https://blog.calif.io/p/mad-bugs-qemu-and-utm-escape


QEMU and UTM Escape — Calif Official

source: thaidn (@XorNinja)


[1/7]I've spent the last several years researching declassified CIA records for two books on Cold War intelligence operations. Along the way, I built a tool I wish had existed when I started.
It's called Intelligence Archive. https://t.co/MNRvvE0Z0K

— Albert Lulushi (@albertlulushi) April 28, 2026

Intelligence Archive - Cold War Intelligence Documents

Declassified CIA documents — Albania operations, OSS to Early CIA, U.S. intelligence & former Nazi personnel. 1939–2007.


This is one of the best takeways from #fast16 story. I cannot but agree more. This is so close to how I explain the journalists why fast16 hasn't been found until now. Kudos to Trey Darley. Checkout his full piece on Trusting Trust: https://t.co/Fto2GNDCeE pic.twitter.com/IGIR2FFY8R

— Vitaly Kamluk (@vkamluk) April 27, 2026

Field Note #10 ∷ On Trusting Trust, Revisited

On Ken Thompson's 1984 lecture, the fast16 sabotage framework, and the discipline of making trust commitments visible.


32 years ago today I registered the @L0phtHeavyInd class C. I got the email from ARIN, sent the class C address to our ISP, then got the first packets routed over our 56K modem to our 486 linux box. When those first packets come through the whole room exploded with chants of, "We… pic.twitter.com/juuazbg5Xr

— Chris Wysopal (@WeldPond) April 28, 2026

http://gbppr.net/l0pht/l0pht.html


NEW: we caught 🇨🇳Chinese hackers... again.

Twist: they're hacking journalists & activists, but we suspect they're private contractors.

State repression... with a profit margin.

Thread + how to protect yourself 1/

By us @citizenlab in collab w/@ICIJorg pic.twitter.com/fBQq5a8bxs

— John Scott-Railton (@jsrailton) April 28, 2026


Don't miss what's next. Subscribe to the grugq's newsletter:

Add a comment:

Share this email:
Share on Twitter Share on Hacker News Share via email Share on Mastodon Share on Bluesky
Twitter