August 25, 2022
The "Mobile Advertising IDs" in this disclosure are used by most mobile telemetry providers to geolocate phones. Combined with a mobtel API you can buy access to, this lets you track the GPS self-reported locations of phones anywhere on Earth. Not just a threat to CN citizens.
Zach Edwards @thezedwards
-
The Cybersecurity and Infrastructure Security Agency (#CISA), Stakeholder Engagement Division, Department of Homeland Security is seeking multiple GS-12 to GS-13 DoD civilian employees to support the Cyber Safety Review Board’s (CSRB) review efforts.
-
📢1/ Today Stanford Internet Observatory & @Graphika_NYC are releasing a report analyzing what we believe is the first major covert pro-US/Western influence operation suspended by Twitter and Meta. Each has just released a data set of accounts involved. cyber.fsi.stanford.edu/io/news/sio-au…
-
NEW: While much has been made about the lack of Russian electronic warfare, extensive Russian jamming on a battlefield level hugely hindered Ukrainian forces in the initial weeks.
-
slides for my talk "E’rybody Gettin’ TIPC: Demystifying Remote Linux Kernel Exploitation" are up here:
conference.hitb.org/hitbsecconf202…
-
Document archive for the Twitter whistleblower brouhaha
https://archive.org/download/whistleblower_disclosure-
"Kyiv has borrowed heavily from online tactics first pioneered by the Kremlin to attack its opponents, promote itself on the global stage and fight back against its larger opponent in the increasingly entrenched war in Eastern Europe."
-
It's incredible, and it inspired this column about a wave of AI progress that I think we should all be paying much closer attention to.-
NEW REPORT: Chinese Discourse Power: Ambitions and Reality in the Digital Domain
From @DFRLab's @kentonthibaut, this report traces #China's CCP’s concerted strategy to center itself at the heart of a new alternative international order. 🧵👇atlanticcouncil.org/in-depth-resea…
-
Microsoft has discovered a post-compromise capability we’re calling MagicWeb, which the threat actor tracked as NOBELIUM is using to maintain persistent access to environments they have compromised. In-depth technical analysis and hunting guidance here:
-
Nice collection of tools to sanitise files, stripping metadata or modifying PDFs
https://darknetlive.com/post/former-nsa-director-will-kill-you-via-metadata/-
Basically a laser-guided rocket technicalOSINTtechnical @Osinttechnical
-
1/ Cameron Redman is the alleged person responsible for the hacked NFT Twitter accounts over the past few months
Does the name ring any bells? Well it should bc in February 2020 he SIM swapped a single person for $37 million worth of Bitcoin & Bitcoin Cash
Time for a thread
-
Another sharp piece from @joshuachuminski
No easy answers, though recognising how Russian failures can end up being successes depending on our response forms a good starting point
-
Our intern @_qwerty_po was destined to analyze a recent Linux kernel LPE vuln (CVE-2022-32250), a bug found and reported by @FidgetingBits.
Here's a brief write-up on the analysis of the bug and the exploit development. Check it out! blog.theori.io/research/CVE-2… (exploit included)
-
Leaked documents online show the purchase (and documentation of) an $8,000,000 iOS Remote Code Execution 0day exploit
A thread on the infamous forum of xss.is featured a proposal contract from Intellexa for (one of?) their mobile spyware platform that's able to target recent versions of both Android and iOS. I break it down in this 🧵👇
Documents here:
https://anonfiles.com/k095pb56y3/Intellexa_7z-
Don't miss what's next. Subscribe to the grugq's newsletter: