the grugq's newsletter

Archives
Subscribe
January 3, 2026

January 3, 2026

January 3, 2026

“Cognitive Warfare seeks “to exploit facets of cognition to disrupt, undermine, influence, or modify human decision-making by altering human behaviour and cognition through any means and technological advances”. A new Cognitive Warfare report from NATO’s chief scientist.… pic.twitter.com/uBhSUnx3M3

— Mick Ryan, AM (@WarintheFuture) January 2, 2026


its late so i'll probably regret posting this but...

enter the dragon 🔥🐲

say hi to Smaug, the helpful hoarding dragon that roams your Twitter bookmarks and helps you organize them into your personal knowledge system of choice. https://t.co/d8pEXqTGMG

special thanks to…

— 📙 Alex Hillman (@alexhillman) January 2, 2026


Let's begin the new year with some V8 exploitation!
Learn how to turn a broken CanonicalEquality check into arbitrary Wasm type confusion in this ASIS CTF Finals writeup by @Erge!

Read it here: https://t.co/OMofRaV0l5 pic.twitter.com/aeZEPYBkDr

— Gabriel Prostitis (@___prosti) January 2, 2026


The “AI is replacing penetration testers” posts and debates seem to be cropping up again. Here are my thoughts.

If you’re in a penetration testing role and the bulk of your value entails hunting for technical vulns or doing general technical testing, I think replacement is at…

— Nick VanGilder (@nickvangilder) December 30, 2025


Getting arbitrary read/write in QEMU by exploiting iret/call far instructions https://t.co/wfHSaIiDsz#infosec pic.twitter.com/iVtOsfGbR0

— 0xor0ne (@0xor0ne) January 1, 2026


XSSNow - The Ultimate XSS Payload Databasehttps://t.co/xYIpeNvVIZ pic.twitter.com/H0ZFX5nyQ0

— Het Mehta (@hetmehtaa) January 2, 2026


Full story here 👇https://t.co/qzz58A69vp

— Mehmet INCE (@mdisec) January 1, 2026


Brian Tatosky: "Getting Grok to "apologize" for generating non-co…" - Mastodon

Getting Grok to "apologize" for generating non-consensual porn is like getting Excel to apologize for generating accounting fraud.


https://t.co/txBlxmMa61 Anti-cheat evolution in Windows... New Year post while I am in vacation is ready!!! 🎉 Happy 2026!

— Andrea Allievi (@aall86) January 2, 2026


“We can’t be getting bombed, there is nothing on FlightRadar!” https://t.co/PsNky7oHuE

— Oliver Alexander (@OAlexanderDK) January 3, 2026


It is dangerously easy to build a neural network today without actually understanding how it works.

We live in an era of 'import torch'. You can train a model in three lines of code, but the moment you need to debug a collapsing loss function or a vanishing gradient, syntax… pic.twitter.com/T6NUxBnc1X

— Tech with Mak (@techNmak) January 2, 2026

https://udlbook.github.io/udlbook/


''Attacking LINE Cryptography for Fun and .. Forensics - Team 501''#infosec #pentest #redteam #blueteamhttps://t.co/qZ7GjYR5Xv

— Florian Hansemann (@CyberWarship) January 2, 2026


Automate orchestration of containers and operationalize Browser in the Browser (BITB) attacks for red teams 🔥https://t.co/cryzc3tHLF

— Mehmet Ergene 🔸 (@Cyb3rMonk) January 2, 2026


Major update to claude-workflow

After @bcherny sharing his workflow, I have added 13 new slash commands based on his patterns.

Inner-loop commands for daily work:
/project-starter:commit → auto-generate commit message
/project-starter:commit-push-pr → commit + push + create…

— CloudAI-X (@cloudxdev) January 2, 2026


Don't miss what's next. Subscribe to the grugq's newsletter:

Add a comment:

Share this email:
Share on Twitter Share on Hacker News Share via email Share on Mastodon Share on Bluesky
Twitter