the grugq's newsletter

Subscribe
Archives
February 23, 2024

February 23, 2024

February 23, 2024

cat is the most misused thing by programmers new to linux. I cringe every time someone uses it wrong in a bash script. Thread below with proper uses of cat only

— Arian van Putten (@ProgrammerDude) February 22, 2024

Thread by @ProgrammerDude on Thread Reader App – Thread Reader App

@ProgrammerDude: cat is the most misused thing by programmers new to linux. I cringe every time someone uses it wrong in a bash script. Thread below with proper uses of cat only Use cat to check...


Wrote an article about turning a ThinkPad X1 Carbon 6th Gen laptop into a programmable USB device by enabling the xDCI controller 😯

Now I can emulate USB devices from the laptop without external hardware, including via Raw Gadget or even Facedancer 😁https://t.co/B46Su8Wu9C

— Andrey Konovalov (@andreyknvl) February 22, 2024


░AND░YOU░MAY░FIND░YOURSELF░
░IN░A░BEAUTIFUL░BIO░
░WITH░A░BEAUTIFUL░BOT░
░AND░YOU░MAY░ASK░YOURSELF░
░WELL,░WHERE'S░THE░PUSSY?░ pic.twitter.com/f9JCt0IuA1

— Alice Lia Maro (@slimelia) February 21, 2024


Impact: FTC is fining cybersecurity company Avast $16.5 million. This is in response to mine and @Michael_Kan's investigation based on internal documents that revealed Avast was using its AV to harvest browsing data and then sell it at a massive scale https://t.co/MEI0a2VDt1

— Joseph Cox (@josephfcox) February 22, 2024


Worldwide #OSINT Tools map

747 links (50 new) - national registries, phone books, yellow pages, cadastral maps and much more.

Almost 300 countries, cities, states and regions.https://t.co/lnthwyQyXV pic.twitter.com/o4UuLSWoj7

— Cyber Detective💙💛 (@cyb_detective) February 22, 2024


I read it, now I can't get the title out of my head:

"Nobody Ever Gets Credit for Fixing Problems that Never Happened: Creating and Sustaining Process Improvement"https://t.co/T1de70BMVu

— Dino A. Dai Zovi (@dinodaizovi) February 23, 2024


pic.twitter.com/bS3XQpQAoo

— EvilMog (@Evil_Mog) February 22, 2024


Reverse engineering of AES protected USB flash drives
Excellent research @matthiasdeeg https://t.co/aAkowTOfh3https://t.co/Xgrl5gpnh8#hardware #infosec #aes pic.twitter.com/6PyBaau8vm

— 0xor0ne (@0xor0ne) February 22, 2024


Cyber policy ppl: it's worth looking at the history of how exploits are actually written by crews , which this article does very well in the prelude and you don't need a lot of technical depth https://t.co/yhynKN68BB

— Dave Aitel (@daveaitel) February 22, 2024

I think it is now acceptable to reveal who wrote this paper: Nicolas Brito aka Sauron aka Modem. R.I.P. my friend. Missing you every day.

— Julien Vanegue (jvanegue@mathstodon.xyz) (@jvanegue) February 23, 2024


Interesting reading on reversing a custom Instruction Set Architecture (ISA) using Binary Ninja (37C3 CTF)
Credits Thomas Imbert (@Synacktiv)https://t.co/BIymI52HJ5#cybersecurity #reverseengineering #binaryninja pic.twitter.com/s6vMgwbg4O

— 0xor0ne (@0xor0ne) February 22, 2024


Banking trojan steals faces. "Unsuspecting users are tricked into giving up personal IDs and phone numbers and are prompted to perform face scans. These images are then swapped out with AI-generated deepfakes that can easily bypass security checkpoints" https://t.co/yKgO8lv6Y3

— Kim Zetter (@KimZetter) February 22, 2024


The code worked differently when the moon was full - Scott Hanselman's Blog

I love a good bug, especially ones that are initially hard to explain but then ...


I think ppl in infosec & .gov do not understand the horrifically insecure shit customers request of software vendors.

eg at one company, a large customer asked us to, in effect, build a remote access trojan (RAT) into the product.

I refused, for what I hope are obvious reasons https://t.co/DzPTSWpLRz

— Kelly Shortridge (@swagitda_) February 22, 2024

in the spirit of transparency, here’s what @rpetrich & I wrote in response to @CISAgov’s RFI on Secure by Design: https://t.co/xwj5faCL7e

we believe Secure by Design can & should align with biz goals like velocity, dev productivity, and reliability

blog: https://t.co/945xTb2KAC

— Kelly Shortridge (@swagitda_) February 21, 2024

This old article on web application performance and garbage collection is a very valuable resource for people thinking about Security By Design: https://t.co/Bda9xLMXui

— Dave Aitel (@daveaitel) February 22, 2024


if i won the lottery i wouldn’t tell anyone

but there would be signs… pic.twitter.com/n6fxXQDTkw

— Jack Forge (@TheJackForge) February 22, 2024


Don't miss what's next. Subscribe to the grugq's newsletter:
Start the conversation:
X