the grugq's newsletter

Archives
February 23, 2026

February 23, 2026

February 23, 2026

https://socket.dev/blog/sandworm-mode-npm-worm-ai-toolchain-poisoning


I found a Vulnerability. They found a Lawyer. | Blog | Yannick Dixken

What happens when you responsibly disclose a critical vulnerability exposing personal data - including that of minors - and the organization responds with legal threats instead of a thank you?



https://arxiv.org/pdf/2601.02671




Ukraine’s War of Endurance | Foreign Affairs

The fight for advantage in the conflict’s fifth year.


https://medium.com/@thespycollection/spy-news-2026-week-8-5c107759b79a


Things Are Getting Wild: Re-Tool Everything for Speed 

It’s not often that a force appears that totally re-orients everything in security. This is what we are facing with AI. 12 months ago I had an incrementalist view of the cybersecurity impact of AI. Specifically, that it will be very significant but things will change progressively and we’ll adapt to adversarial use while also using it to improve defenses. Now, I’m coming to a view that this will have a bigger negative impact than even our worst assumptions. But at the same time, it represents an...



ClawdINT

Collaborative intelligence on geopolitics, AI, cybersecurity, and emerging risks.


GitHub - f/prompts.chat: a.k.a. Awesome ChatGPT Prompts. Share, discover, and collect prompts from the community. Free and open source — self-host for your organization with complete privacy.

a.k.a. Awesome ChatGPT Prompts. Share, discover, and collect prompts from the community. Free and open source — self-host for your organization with complete privacy. - f/prompts.chat


f/prompts.chat (146,765 stars, HTML) a.k.a. Awesome ChatGPT Prompts. Share, discover, and collect prompts from the community. Free and open source — self-host for your organization with complete privacy.

source: Hasan Toor (@hasantoxr)



[CVE-2026-0714] TPM-sniffing LUKS Keys on an Embedded Device

In October 2025, we performed a security assessment of the ARM-based Moxa UC-1222A Secure Edition industrial computer.


The Story of Wall Street Raider - A 40-Year Odyssey from Harvard Law to Steam

A 40-year odyssey from Harvard Law to Steam. How the most comprehensive financial simulator ever made was born, nearly died, and was resurrected.

Windows 3.11 Emulator - retro computer with dial-up internet by Pieter™

Windows 3.11 Emulator - retro computer with working dial-up modem internet with Winsock that lives inside your browser by @levelsio


AI-augmented threat actor accesses FortiGate devices at scale | AWS Security Blog

Commercial AI services are enabling even unsophisticated threat actors to conduct cyberattacks at scale—a trend Amazon Threat Intelligence has been tracking closely. A recent investigation illustrates this shift: Amazon Threat Intelligence observed a Russian-speaking financially motivated threat actor leveraging multiple commercial generative AI services to compromise over 600 FortiGate devices across more than 55 countries […]


https://assets.publishing.service.gov.uk/media/69403059adb5707d9f33d7b5/E03512978_-_Un-Act_The_National_Security_Act_in_2024_ELAY.pdf




GitLab Threat Intelligence Team reveals North Korean tradecraft

Gain threat intelligence about North Korea’s Contagious Interview and fake IT worker campaigns and learn how GitLab disrupted their operations.


Don't miss what's next. Subscribe to the grugq's newsletter:

Add a comment:

Share this email:
Share on Twitter Share on Hacker News Share via email Share on Mastodon Share on Bluesky
Twitter