the grugq's newsletter

Subscribe
Archives
February 15, 2025

February 15, 2024

February 15, 2024

https://vault.fbi.gov/kevin-mitnick/kevin-mitnick-part-01-final/view


When I heard Musk say this on Tuesday, my assumption was that it was a programming issue. Because I can code and have written to databases and because I am familiar with other examples of default values being misinterpreted. Yet somehow Musk isn't.

— Philip Bump (@pbump.com) 2025-02-14T13:39:32.051Z

It was never satire

— Cool Rick (@deadseriousrick.bsky.social) 2025-02-14T13:43:42.556Z


Does anyone know how to get around Venmo’s character limit? pic.twitter.com/duvV2m30u4

— Dan White (@atdanwhite) February 14, 2025


A repo on GitHub claims to have the source code of Brute Ratel and NightHawk. Haven’t tested/looked into it, but I thought many of you would be interested in it. https://t.co/rLqRWi9Miu

— Scoubi (@ScoubiMtl) February 14, 2025

GitHub - APTIRAN/C2: The repository of popular C2 (sources).

The repository of popular C2 (sources). Contribute to APTIRAN/C2 development by creating an account on GitHub.


ecdsa private key leak due to nonce reuse strikes again, this time in the elliptic npm library https://t.co/zs3FDpPWTL

— yan (@bcrypt) February 13, 2025


https://www.theregister.com/2025/02/14/chinese_spies_ransomware_moonlighting/?td=rt-3a


SiphonDNS : Covert data exfiltration via DNS : https://t.co/HiKkCZB5lT

Repo : https://t.co/r1N4nwWt0f pic.twitter.com/tiAL4mAtmB

— Binni Shah (@binitamshah) February 14, 2025


I can imagine how effective this lure is, and I hate it: https://t.co/puaJwSbs3m pic.twitter.com/zsngnd8BIE

— Brian in Pittsburgh (@arekfurt) February 14, 2025


Had this saved in the WIP folder forever
KQL for anti-forensics activitieshttps://t.co/3RhxxSLh4g

So much can be added to this. Think 3rd party tools to aid anti-forensics, browser forensics... too much to name
OMG, look at this😶updates to come! https://t.co/GVSKs19vWf

— Dylan🛡AttacktheSOC (@DylanInfosec) February 14, 2025


New Blog! Investigating Anonymous VPS services used by Ransomware Gangs

h/t to @drb_ra for lending me some of their C2 data! Made my life a lot easier 🫡

🔗 https://t.co/kAwKmzcnFi pic.twitter.com/zRdeFBsjuD

— Will (@BushidoToken) February 14, 2025


pic.twitter.com/PeBQSvD7mE Meta just published two papers showing they can decode thoughts into text with 80% accuracy, in real time, using non-invasive brain-computer interfaces. Thought-to-action is almost here.
Kurzweil was right, as always. Brain-computer chips are the future.

— Chubby♨️ (@kimmonismus) February 14, 2025


Endless Exploits: The Saga of a macOS Vulnerability Struck Nine Times by @patch1thttps://t.co/HwkGqdQjPZ

— Alex Plaskett (@alexjplaskett) February 14, 2025


We have been tracking multiple Russian APT groups aggressively targeting organizations with Microsoft Device Code authentication phishing. The attackers got creative with tricking users into granting them access to their accounts. Have a look at our blog for all the details. https://t.co/Xx5kD8cZjO

— Steven Adair (@stevenadair) February 14, 2025


Don't miss what's next. Subscribe to the grugq's newsletter:
X