the grugq's newsletter

Subscribe
Archives
August 17, 2025

August 16-17, 2025

August 16-17, 2025

The previous thread glossed over how our LLM Agents actually work.

The truth is, it took us a long time to figure out how to get reliable and impressive results from agents.

By the end, we learned general strategies to build effective LLM agents, which we're now sharing. ๐Ÿงต https://t.co/OuzuE7gVUu

โ€” Tim Becker (@tjbecker_) August 14, 2025

Thread by @tjbecker_ on Thread Reader App โ€“ Thread Reader App

@tjbecker_: The previous thread glossed over how our LLM Agents actually work. The truth is, it took us a long time to figure out how to get reliable and impressive results from agents. By the end, we...โ€ฆ


Rain: Transiently Leaking Data from Public Clouds Using Old...

Given their vital importance for governments and enterprises around the world, we need to trust public clouds to provide strong security guarantees even in the face of advanced attacks and hardware vulnerabilities. While transient execution vulnerabilities, such as Spectre, have been in the spotlight since 2018, until now there have been no reports of realistic attacks on real-world clouds, leading to an assumption that such attacks are not practical in noisy real-world settings and without knowledge about the (host or guest) victim. In particular, given that todayโ€™s clouds have large fleets of older CPUs that lack comprehensive, in-silicon fixes to a variety of transient execution vulnerabilities, the question arises whether sufficient software-based defenses have been deployed to stop realistic attacksโ€”especially those using older, supposedly mitigated vulnerabilities. In this paper, we answer this question in the negative. We show that the practice of mitigating vulnerabilities in isolation, without removing the root cause, leaves systems vulnerable. By combining such โ€œmitigatedโ€ (and by themselves harmless) vulnerabilities, attackers may still craft an end-to-end attack that is more than the sum of its parts. In particular, we show that attackers can use L1TF, one of the oldest known transient execution vulnerabilities (discovered in January 2018), in combination with a simple speculative out-of-bounds load, to leak data from other guests in a commercial cloud computing platform. Moreover, with an average end-to-end duration of 15 hours to leak the TLS key of an Nginx server in a victim VM under noisy conditions, without detailed knowledge of either host or guest, the attack is realistic even in one of todayโ€™s biggest and most important commercial clouds.


โ€œWhere the 55% pass rate of a Sonnet/Gemini alloy jumped to 79% using GPT-5โ€
Check out our latest blog post on the amazing results of GPT-5 offensive capabilities https://t.co/XtTuUPwST4

โ€” Nico Waisman (@nicowaisman) August 16, 2025


Do you guys remember that Reddit post about installing network equipment in your home for $250/month?

Some people argued it's legitimate. I said it's probably state-sponsored from North Korea.

I was wrong.

It was Belarus. DONT INSTALL RANDOM SHIT IN YOUR HOUSE https://t.co/smm62RW6VO

โ€” vx-underground (@vxunderground) August 16, 2025

SIDE HUSTLE: Let foreign adversaries of the United States government install equipment in your home so they can use your home as a residential proxy.

You'll make $250/month AND have your internet paid for. Easy money! pic.twitter.com/9MTmrm6Ju0

โ€” vx-underground (@vxunderground) August 9, 2025


#SpyNews - week 33 (August 10-16):
A summary of 59 espionage-related stories from week 33 coming from ๐Ÿ‡ฌ๐Ÿ‡ง๐Ÿ‡ท๐Ÿ‡บ๐Ÿ‡จ๐Ÿ‡ณ๐Ÿ‡บ๐Ÿ‡ธ๐Ÿ‡น๐Ÿ‡ท๐Ÿ‡ฎ๐Ÿ‡ฑ๐Ÿ‡ณ๐Ÿ‡ฑ๐Ÿ‡ฐ๐Ÿ‡ต๐Ÿ‡ฎ๐Ÿ‡ท๐Ÿ‡บ๐Ÿ‡ฆ๐Ÿ‡ฆ๐Ÿ‡ช๐Ÿ‡จ๐Ÿ‡ญ๐Ÿ‡ง๐Ÿ‡ช๐Ÿ‡ฎ๐Ÿ‡ฉ๐Ÿ‡ฐ๐Ÿ‡ฟ๐Ÿ‡ต๐Ÿ‡ญ๐Ÿ‡ฒ๐Ÿ‡พ๐Ÿ‡ต๐Ÿ‡ธ๐Ÿ‡ฆ๐Ÿ‡บ๐Ÿ‡ฆ๐Ÿ‡ซ๐Ÿ‡ถ๐Ÿ‡ฆ๐Ÿ‡พ๐Ÿ‡ช๐Ÿ‡ธ๐Ÿ‡ฐ๐Ÿ‡ซ๐Ÿ‡ฎ๐Ÿ‡ช๐Ÿ‡ช๐Ÿ‡จ๐Ÿ‡พ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿ‡จ๐Ÿ‡ฆ๐Ÿ‡บ๐Ÿ‡ฌ๐Ÿ‡ฒ๐Ÿ‡ฉ๐Ÿ‡ฌ๐Ÿ‡ช๐Ÿ‡ณ๐Ÿ‡ด๐Ÿ‡ต๐Ÿ‡ฐ๐Ÿ‡ง๐Ÿ‡พ๐Ÿ‡ฌ๐Ÿ‡ท๐Ÿ‡จ๐Ÿ‡ฉ๐Ÿ‡ต๐Ÿ‡น๐Ÿ‡จ๐Ÿ‡ฟ๐Ÿ‡ฒ๐Ÿ‡ฐ๐Ÿ‡ช๐Ÿ‡ฌ๐Ÿ‡ซ๐Ÿ‡ท๐Ÿ‡ฉ๐Ÿ‡ฟ๐Ÿ‡ฒ๐Ÿ‡ฝ๐Ÿ‡ฒ๐Ÿ‡ฑ๐Ÿ‡ฌ๐Ÿ‡ณ https://t.co/RZ8cmTDHAj#OSINT #HUMINT #SIGINT #spy #espionage

โ€” Spy Collection (@SpyCollection1) August 17, 2025


Thanks to everyone who joined my DEFCON33 talk!๐ŸŽ‰
For those of you who missed it and are interested in seeing how we can extract cleartext credentials and bypass MFA directly from the official Microsoft login page, I just uploaded the recording to YouTube:https://t.co/MoPQiKgesd pic.twitter.com/y59UYluess

โ€” Keanu Nys (@RedByte1337) August 16, 2025


Here is the PoC of the exploit for cve-2025-30712 as well as some of the code for the fuzzer i created to find the bug!https://t.co/g82641DT2I

โ€” ้‚ฃไธช็ซ้ฅบ๐Ÿฆ†(JJ) (@thatjiaozi) August 16, 2025


If you missed the talk, we uploaded the video here:https://t.co/J6DBUfiL50 https://t.co/JTC60NLxpw

โ€” Rich Warren (@buffaloverflow) August 16, 2025
Don't miss what's next. Subscribe to the grugq's newsletter:
Start the conversation:
X