August 27, 2022
This seems very important. The Belarus cyber partisans provided Bellingcat with a database that led to the exposure of a GRU Illegal.
We first noticed her thanks to a super useful database shared with us by @cpartisans: the border crossing records of Belarus. We knew the passport ranges of GRU and FSB spies, so we decided to search in that data-set by partial matches, leaving the last 3 digits out as wildcards.
-
-
Impressive work 👏
IAM Whoever I Say IAM :: Infiltrating VMWare Workspace ONE Access Using a 0-Click Exploit
srcincite.io/blog/2022/08/1…
-
The Glasshouse Centre discuss the Mudge whistleblower event, along with a number of other events of the last week.
-
Ukraine translated the IRA green book for resistance fighters.
https://www.sundayworld.com/news/irish-news/ukrainian-soldiers-use-iras-green-book-in-preparation-for-guerrilla-warfare-against-russia/41474758.htmlThe library which the Ukrainians make available for underground resistance work includes the popular “Total Resistance” Swiss manual.
https://sprotyv.mod.gov.ua/portfolio/download/-
This individual takes credit for the ransoming of Costa Rica, Capcom, the D.C. Metropolitan Police Department and more. Article:-
With the headlines about classified docs at Mar-a-Lago containing info on "human sources," I can't help but think of this old article
nytimes.com/2019/09/09/us/…
-
The movie Sneakers came out 30 years ago today. It was this movie that made me want to get in to hacking. They didn't really mention all the fucking heap grooming though.
-
A veritable treasure trove of FreeBSD kernel exploitation techniques and possibilities…
FreeBSD 11.0-13.0 LPE via aio_aqueue Kernel Refcount Bug, by @accessvector
accessvector.net/2022/freebsd-a…
-
This is one of the most in depth blog series I've ever read about networking on Linux. A bit old now but still 🔥
Everything from physical NIC registration to how data moves from userland<->kernel and beyond.
Sending: blog.packagecloud.io/monitoring-tun…
Receiving: blog.packagecloud.io/monitoring-tun…
Also if you are interested in low level Linux and you hadn't had the opportunity to read this wonderful text, Linux Insides by @0xAX is a must-read. You can read it linear, or use as a reference to how certain things work. And it's in multiple languages!
-
-
On this @BBCtrending episode we've examined the latest and most extreme incarnation of Japan's QAnon movement.
Members of the anti-vax group Yamato Q believe they have different genes from the rest of the population and accuse police of being reptiles.
-
-
I always find it weird how companies have hijacked the "full disclosure" movement into a "payments to keep quiet" movement.
Sean Melia @seanmeals
-
They know how to sell it… of course, the Army isn’t really a top tier threat actor.
Interested in becoming a nation state hacker? We will develop your skills in offensive and defensive cyber operations. Defend. Attack. Exploit. goarmy.com/careers-and-jo…
-
We examine which safety techniques for LMs are more robust to human-written, adversarial inputs (“red teaming”) and find that RL from Human Feedback scales the best out of the methods we studied. We also release our red team data so others can also use it to build safer models.
reminder that creating models for automated censorship also creates the ability to automatically generate the censored content in concentrated form
Anthropic @AnthropicAI
Don't miss what's next. Subscribe to the grugq's newsletter: