the grugq's newsletter

Subscribe
Archives
January 2, 2025

January 2, 2025

January 2, 2025

From fault injection to RCE Analyzing a Bluetooth tracker by Nicolas Oberlihttps://t.co/AkGMEAyJOuhttps://t.co/lgwhI1Zb2a pic.twitter.com/dI5EgnxWJ9

— Alex Plaskett (@alexjplaskett) December 30, 2024


“The community must accept and explore unorthodox ideas.

The community must separate research from market capitalization” https://t.co/vavwAY0GnU

— haroon meer (@haroonmeer) January 1, 2025

https://doc.cat-v.org/bell_labs/utah2000/utah2000.pdf


''Decrypting CryptProtectMemory without code injection''#infosec #pentest #redteam #blueteamhttps://t.co/8SQkK5PQsV

— Florian Hansemann (@CyberWarship) December 31, 2024


Fantastic story from @WIRED on the Treasury Department hack where Chinese-linked threat actors abused BeyondTrust for access.https://t.co/abhNlAO7Ti

— Jake Williams (@MalwareJake) December 31, 2024


U.S. Army Soldier Arrested in AT&T, Verizon Extortions – Krebs on Security

Federal authorities have arrested and indicted a 20-year-old U.S. Army soldier on suspicion of being Kiberphant0m, a cybercriminal who has been selling and leaking sensitive customer call records stolen earlier this year from AT&T and Verizon. As first reported by…

Krebs posted a blog post yesterday about a US Army soldier who worked alongside threat actors to steal customer call records from AT&T and Verizon.

I found a screenshot dating back to September 2nd, 2022 and I believe it is of Cameron John Wagenius aka Kiberphant0m.… pic.twitter.com/RHdv8ckE4D

— vxdb (@vxdb) December 31, 2024

Timing might not line up? He’s 20 now, if your SS is from Sep ‘22, over 2 years ago, he’d be 18 then. Not impossible, would have to see how long his bootcamp & tech school are.

— Titus (@df_titus) December 31, 2024

If only the picture was better quality

— vxdb (@vxdb) December 31, 2024


Daring Fireball: Coding Font Selection 'Tournament'

Link to: https://www.codingfont.com/

https://www.codingfont.com


Demystifying Common Microcontroller Debug Protocols by @xobshttps://t.co/SFLBKLhVSt

— Alex Plaskett (@alexjplaskett) January 1, 2025


Reflecting on the year, here are some tools I’ve been building:
🚀 URL validation bypass cheat sheet https://t.co/XsguZic9SK
🔒Sign Saboteur Extension https://t.co/r0SBWZfUWA
🤖 Bypass bot detection Extension https://t.co/hcuP1HCZmo
More to come in 2025! 🎄

— d4d (@d4d89704243) December 31, 2024


GitHub - PartialVolume/shredos.x86_64: Shredos Disk Eraser 64 bit for all Intel 64 bit processors as well as processors from AMD and other vendors which make compatible 64 bit chips. ShredOS - Secure disk erasure/wipe

Shredos Disk Eraser 64 bit for all Intel 64 bit processors as well as processors from AMD and other vendors which make compatible 64 bit chips. ShredOS - Secure disk erasure/wipe - PartialVolume/sh...


This is amazing because the old small con jobs have been reinvented for a virtual space… by teenagers. I wish I knew whether they recreated them from scratch, or adapted them from movies or something.


I don't suppose P0 or anyone else has put together a list of Chrome CVEs and whether or not they were exploited in the wild?

— Sean Heelan (@seanhn) January 2, 2025

https://t.co/oj5XPclAKW

— j j (@mistymntncop) January 2, 2025


Don't miss what's next. Subscribe to the grugq's newsletter:
X