the grugq's newsletter

Subscribe
Archives
April 9, 2024

April 9, 2024

April 9, 2024

In a shot across Microsoft's bow, @RonWyden is introducing legislation that would set a four-year deadline for the government to stop using collaboration software that isn't interoperable with competing products. https://t.co/qZHkO3wRue pic.twitter.com/L7EsFMv77e

— Eric Geller (@ericgeller) April 8, 2024


This is so cool https://t.co/MA82u1kkBr@toool #lego #lockpicking #locksport

— raptor@infosec.exchange (@0xdea) April 9, 2024


"The boom, the bust, the adjust and the unknown"

The industry around us changes at a faster pace than ever before.

This will force the different stakeholders to reevaluate their strategy and how they will decide to move forward. #Zer0Con2024 https://t.co/eTFbRL49jC

— Maor Shwartz (@malltos92) April 9, 2024


https://x.com/cpresearch/status/1777258357851902152


The best defence against ransowmare is to actually defend against ransowmare.

And herein lies the problem…. The elephant in the cyber room perhaps?

Take a look here:https://t.co/vMbUrcxunj

Look the ransowmare kill chains aren’t insanely complex, they opposite. What does… https://t.co/lHDZTvhnl6

— mRr3b00t (@UK_Daniel_Card) April 9, 2024

Really excellent, interesting article on #ransomware strategy from @AlexMartin @TheRecord_Media , even if I disagree with quite a lot of what’s quoted, except myself of course 😂 1/3https://t.co/W002mOEzNy

— Ciaran Martin (@ciaranmartinoxf) April 8, 2024


A simple Samsung Shannon loader - lean solution to load Exynos Modem images in IDA Pro 8.xhttps://t.co/VDZyw4r4Ud

— alx (alxhh) (@alexander_pick) April 8, 2024


It's ironic that most of the best security controls we have (well, so far as anyone can tell) are not implemented by buying magic tech add-on security stuff or hiring more expert "security" personnel but by thoughtfully but determinedly implementing classical IT measures better. https://t.co/zxUJOhzo8x

— Brian in Pittsburgh (@arekfurt) April 8, 2024


Excellent CTF challenges writeups for learning the msg_msg technique for arbitrary read and write for Linux kernel exploitationhttps://t.co/IdUyVbRATuhttps://t.co/wLXOKNdKv6#Linux #cybersecurity pic.twitter.com/WDpiefLBPu

— 0xor0ne (@0xor0ne) April 9, 2024


An espionage scandal rocks Austria, laying bare alleged Russian spying operations across Europehttps://t.co/S3ZgZRK7rd

— Dr. Dan Lomas (@Sandbagger_01) April 9, 2024


***BREAKING***

Sea Drone (USV) found in Black Sea Is American AM-800 Boat with Massive Soviet STYX missile warhead#Ukraine #Russia #OSINT https://t.co/d51XGiVcP3

— H I Sutton (@CovertShores) April 8, 2024


As much as the new tech is cool, the older stuff like ICMP is still useful: https://t.co/AVJ9g7wv6e

exfil via 32-byte echo requests

— Daniel Cuthbert (@dcuthbert) April 8, 2024


this is really funny if you know anything about jonas’ work

(he’s, IMO, one of the world’s best & most accomplished windows kernel security researchers. the tweet makes him seem like some silly guy) https://t.co/aQHdy9RxrB

— fox 🦊🏳️‍🌈 (@soft_fox_lad) April 8, 2024

guys like this are every software engineer’s worst nightmare pic.twitter.com/8PeTj8ui67

— varepsilon (@var_epsilon) April 8, 2024


BlueDucky automates exploitation of Bluetooth pairing vulnerability that leads to 0-click code executionhttps://t.co/mVu85fOmD2

— Simone Margaritelli (@evilsocket) April 8, 2024


https://www.hezmatt.org/~mpalmer/blog/2024/04/09/how-i-tripped-over-the-debian-weak-keys-vuln.html
Don't miss what's next. Subscribe to the grugq's newsletter:
Start the conversation:
X