April 4, 2023
Meet the FSB contractor: 0Day Technologies
An investigation into the FSB’s digital surveillance and disinformation contractor (🧵)
clement-briens.com/2023/04/01/mee…
-
-
A front company in New Jersey signed the contract for the unknown gov agency. The company - “Cleopatra Holdings” - is actually Riva Networks, the same company the FBI used two years earlier to purchase Pegasus.
Mark Mazzetti @MarkMazzettiNYT
-
Attention Firefox bug bounty hunters: WebGPU is now enabled by default in Firefox Nightly and eligible for bounty rewards. It's a large chunk of new code with plenty of attack surface for everyone to share.
-
Germany’s cybersecurity agency BSI, which is charged with ensuring the security of the country’s 5G network, has now admitted that it uses Huawei internally itself. In Germany, fact trumps fiction when it comes to the total disregard for national security
-
The Military Strategic Effects of the Russian National Segment of the Internet (2023) urn.fi/URN:ISBN:978-9…
Direct link to thesis (2.2MB .pdf, 148pp) doria.fi/bitstream/hand…
Author: Dr Juha Kukkola / Finnish National Defence University (@mpkkfi).
/c @paulducheine Dusk for sandwich bots? A few top mev bots were targetted in block
https://t.co/tnlx5tAX1G
@peckshield @BlockSecTeam @bertcmiller @samczsun @bbbb https://t.co/Kfyv8fP8Dd
-
The wife says our marriage is boring so I replaced the air freshner in the bathroom with an air horn
-
UK’s offensive hacking unit takes on military opponents and terrorist groups
https://www.theguardian.com/technology/2023/apr/03/uks-offensive-hacking-unit-takes-on-military-opponents-and-terrorist-groupsToday the National Cyber Force publishes a doctrine, "Responsible Cyber Power in Practice" & publicly avows its commander, GCHQ's James Babbage. Below, my interview with him. We discussed NCF's "doctrine of cognitive effect" & offensive cyber more broadly
Paper here. Well worth a read.
https://www.gov.uk/government/publications/responsible-cyber-power-in-practice/responsible-cyber-power-in-practice-htmlA panel discussion on the paper is happening here, on Wednesday:
https://events.teams.microsoft.com/event/be2b1188-6f8e-4a91-b7a3-384accf07490@2efd699a-1922-4e69-b601-108008d28a2e-
-
The latest instalment of Gwen Tovey's memoir on siginthistorian.blogspot.com sees her applying for and getting a job at GCHQ, and tells a couple of stories about GCHQ analysts.
-
1/ @samczsun explained that the attacker exploited the vulnerability in mev-boost-relay to drain MEV bots. After digging into the attack, we have two more findings. First, the attacker used a honeypot tx to lure MEV bots. Second, the honeypot tx has a self-protected mechanism.
3155.eth @punk3155
-
We have no secrets for the multi-billion dollar digital advertising industry. Moreover, through online-auctions these are sold across the globe to the highest bidder. From private persons to criminals & intelligence agencies.
@gerardusjanssen for @FTM_eu
-
Even if you can't write assembly like a poet, you can read disassembly like a hunter
https://wordsandbuttons.online/you_dont_have_to_learn_assembly_to_read_disassembly.html-
In the UK, there's the National Cyber Force (NCF), which conducts offensive cyber operations for both military and civilian purposes:
archive.is/dsSxM#selectio…
-
Don't miss what's next. Subscribe to the grugq's newsletter: