the grugq's newsletter

Subscribe
Archives
April 30, 2025

April 30, 2025

April 30, 2025

watched a talk on Necrobotics, which started by posing an insane question: would you let a dead spider, controlled by AI robotics, perform surgery on your eyeball? and then told us that this wasn’t actually a theoretical question at all. pic.twitter.com/2lktDAZYRo

β€” Chairman Birb Bernanke (@Bonecondor) April 28, 2025


Since people suddenly care about rotational inertia on the grid, here's our paper on the topic from 6 years ago. pic.twitter.com/2176qiQ0im

β€” Michael E. Webber (@MichaelEWebber) April 29, 2025


Exploiting CVE-2024-0582 via the Dirty Pagetable Method@kuzeyardabulut posted an article about exploiting CVE-2024-0582 in io_uring using the Dirty Pagetable technique: https://t.co/QTcePhPBsN

This bug was reported by @tehjh: https://t.co/FuxAT4wfOX pic.twitter.com/sarqjOqyc3

β€” Linux Kernel Security (@linkersec) April 28, 2025


Thanks Forbes, I was confused what password spraying...sorry, "sparaying" attacks looked like. 🫠 pic.twitter.com/5glRHZfarF

β€” Tib3rius (@0xTib3rius) April 28, 2025


Microsoft Telnet Server MS-TNAP Guest Access Restriction Bypass Exploit https://t.co/BuqLbfm5bu

β€” hackerfantastic.x (@hackerfantastic) April 29, 2025


Monty Python and the Holy Grail turns 50 https://t.co/2XlTvimdxp

β€” Ars Technica (@arstechnica) April 29, 2025


LMFAO - Which one of you degenerates did this? πŸ˜‚ pic.twitter.com/UULhopJwPA

β€” ☣️ Mr. The Plague ☣️ (@DotNetRussell) April 29, 2025


OpenAI: We are delighted to inform you we've silently shipped an update transforming ChatGPT into the Schizophrenia Accelerator from the hit novel "Do Not Build the Schizophrenia Accelerator" https://t.co/hc4VkUFkTE

β€” 0.005 Seconds (3/694) (@seconds_0) April 28, 2025


πŸ€“ Last week, Anthropic released a report on malicious uses of Claude.

The report is very interesting, but I think it is missing critical actionable insights to make it useful for threat analysts.

I broke down my POV in a blog, quick thread πŸ‘‡πŸ§΅https://t.co/V2Xf00QlsA

β€” Thomas Roccia 🀘 (@fr0gger_) April 29, 2025

@thegrugq Guten Tag, the unroll you asked for: https://t.co/Ebop6kG7gb Share this if you think it's interesting. πŸ€–

β€” Thread Reader App (@threadreaderapp) April 30, 2025


AirBorne: Wormable Zero-Click RCE in Apple AirPlay Puts Billions of Devices at Risk | Oligo Security | Oligo Security

Oligo Security reveals AirBorne, a new set of vulnerabilities in Apple’s AirPlay protocol and SDK. Learn how zero-click RCEs, ACL bypasses, and wormable exploits could endanger Apple and IoT devices worldwide β€” and how to protect yourself.


Crazy idea: let’s give one country to the Habsburgs and one to the Bourbons and check on them 500 years later pic.twitter.com/nak4rp7SR8

β€” Luka Ivan Jukic (@lijukic) April 29, 2025


Top Tier Target | What It Takes to Defend a Cybersecurity Company from Today's Adversaries | SentinelOne

This report highlights a rarely-discussed but crucially important attack surface: security vendors themselves.


Don't miss what's next. Subscribe to the grugq's newsletter:
X