the grugq's newsletter

Subscribe
Archives
January 19, 2024

January 19, 2024

January 19, 2024

Reverse engineering expert system by @juanandres_gs free to play with (ChatGPT plus subscription required) at https://t.co/haFXmZWEnw pic.twitter.com/yuL2BMAP3J

— Costin Raiu (@craiu) January 18, 2024


New: Google News is boosting AI-generated garbage articles that rip-off other peoples' work. One company even admitted practice to me. Even wilder: Google says it doesn't focus on whether an article was made by AI or a human for News, opening way for more https://t.co/LAfu2FgtOo pic.twitter.com/fqgV9y9MHS

— Joseph Cox (@josephfcox) January 18, 2024


New blog from Google's TAG (@wxs) outing some elusive COLDRIVER (UNC4057) malware tracked as SPICA:

"Russian threat group COLDRIVER expands its targeting of Western officials to include the use of malware"https://t.co/efldf9S8ZB

— Dan Black (@DanWBlack) January 18, 2024


So the overall point here, that E2E services leak a ton of metadata through key updates, is a good one. Same thing goes for Apple: you can more or less enumerate all devices if you reverse the Apple Directory Service APIs. https://t.co/SIfVjkARtb

— Matthew Green (@matthew_d_green) January 18, 2024

1/ A technical writeup on @Meta’s @WhatsApp privacy issue:
WA leaks victim devices’ end-to-end encryption (E2EE) identity information (mobile device + up to 4 linked devices) to any user, by design, even if blocked and not in contacts.https://t.co/ONmcdC3ZqC

— Tal Be'ery (@TalBeerySec) January 17, 2024


We've witnessed attackers using new attack techniques in AWS:

• Creating a large number of ECS clusters for crypto mining
• Using EC2 Instance Connect for lateral movement
• Using AWS Resource Explorer for enumerationhttps://t.co/AQgLB5K0Tp pic.twitter.com/DY7rMv6c4Y

— Christophe Tafani-Dereeper (@christophetd) January 18, 2024


o/

— Phrack Zine (@phrack) January 18, 2024


Port scans are not cyber attacks https://t.co/GouTdHzAOW pic.twitter.com/vL0IrNlbmD

— dade (@0xdade) January 18, 2024

Ridiculous cyber security numbers from JPMorgan just dropped

• Spends $15 billion annually on IT defense
• Experiences 45 billion hacker attempts per day
• Carries 62,000 tech specialists to protect system

They're making those hackers work for it

— Morning Brew ☕️ (@MorningBrew) January 17, 2024


I’m fascinated by the idea of the Dead Internet, in which AI bots create website copies littered with ads that are then recursively crawled by “audience bots” over and over again. There are sectors of the internet devoid of all humanity, except for the person collecting ad rev. https://t.co/xFy2CzzszF

— Telefon Tel Aviv (@telefontelaviv) January 18, 2024

Google News is indexing and promoting websites that immediately rip off others with AI clones of their articles. These websites are absolutely littered with Google ads. Our website, in which real humans do journalism, is not indexed by Google Newshttps://t.co/0mshx4sQgs

— Jason Koebler (@jason_koebler) January 18, 2024

Thread by @jason_koebler on Thread Reader App – Thread Reader App

@jason_koebler: Google News is indexing and promoting websites that immediately rip off others with AI clones of their articles. These websites are absolutely littered with Google ads. Our website, in which real hum...…


cyber crime is out of control pic.twitter.com/vC506gYcaH

— vx-underground (@vxunderground) January 18, 2024


How does @DARPA's AIxCC actually work? We did a deep dive into the 50-page document to understand the competition's format, scoring, and challenges. Read our thoughts here: https://t.co/vLPHmy5k1r

— Trail of Bits (@trailofbits) January 18, 2024


hi, check out this tool for easy Linux kernel building and debugging - easylkb

worked on it together with @netspooky! 💕

writeup: https://t.co/PcJis51kp9
repo: https://t.co/mChGACX5wG pic.twitter.com/7omGbOu2xj

— hermit (@ackmage) November 21, 2023


https://ntietz.com/blog/rsa-deceptively-simple/


From 0 to 1 MB in DOS

From 0 to 1 MB in DOS - by Julio Merino - Blog System/5

A tour on how DOS was able to use most of the 1 MB address space of the 8086


Don't miss what's next. Subscribe to the grugq's newsletter:

Start the conversation:

Be the first to share your thoughts

X