August 21, 2025
August 21, 2025
Reading G-2 "#Counterintelligence Situation in China Theater" Report from 1946.
— Filip Kovacevic (@ChekistMonitor) August 20, 2025
"On the purpose of collecting information from the American Army in Shanghai, Russia sent 20 well-trained women spies to various bars."
The full report: https://t.co/8Fuqu90sva pic.twitter.com/m8Dwx2Kdjn
Hey this is a cool site:https://t.co/ylaCDWhMCA#TOR pic.twitter.com/cM3NCzXs49
— mRr3b00t (@UK_Daniel_Card) August 20, 2025
This is some really nice research! It's definitely worth trying these techniques against cryptocurrency extensions! https://t.co/XUi4s1l8tL
— James Kettle (@albinowax) August 20, 2025
Windows Defender blocks any procdump execution referencing "lsass" on the command line (1️⃣)
— Wietze (@Wietze) August 20, 2025
Simply querying lsass' process ID and using this instead bypasses this somewhat naive detection (2️⃣)
Even simpler? Use lsass' service name, "KeyIso" 🤷 (3️⃣) pic.twitter.com/ieGJseiiJD
AMD accidentally posted FSR4's Source Code and then tried to delete it all LOL
— CaptainMcShotgun (@CaptMcShotty) August 20, 2025
The repohttps://t.co/FOpsWIn5sf
Commit historyhttps://t.co/nIMoDMt0LF
Great move from Microsoft. With Chinese cyber ops becoming increasingly pervasive, continuing to share vulnerability data with companies feeding China’s government vuln-sharing system was a clear risk (link to full article + analysis piece in thread) pic.twitter.com/UR5dWquJOW
— Eugenio Benincasa (@eubenincasa) August 20, 2025
"The Hacker's Renaissance: A Manifesto Reborn" 🔥https://t.co/TgPN0Zu8Is
— Justin Elze (@HackingLZ) August 19, 2025
As it turns out, @orange_8361 and I have more in common than I had thought! If you love old school PHP quirks and CTF tricks I recommend you read our articles:https://t.co/oFro6bACfihttps://t.co/6Y9yMUlilj
— ϻг_ϻε (@steventseeley) August 19, 2025