the grugq's newsletter

Subscribe
Archives
July 10, 2025

July 10, 2025

July 10, 2025

How can the Government best protect the UK against grey zone threats?

We have published a report. Read our recommendations ⬇️https://t.co/ISo1JKrFgU pic.twitter.com/ufd3pes4wc

— Defence Committee (@CommonsDefence) July 9, 2025


dns0.eu — The European public DNS that makes your Internet safer

A free, sovereign and GDPR-compliant recursive DNS resolver with a strong focus on security to protect the citizens and organizations of the European Union.


AI security notes, July 8th: Improving our (poor) ability to forecast AI so we can do better AI security work

AI is changing so rapidly that to invest in security for AI, and AI for security, requires forecasting where AI itself will be in at least the short and medium term.

AI as Normal Technology

A new paper that we will expand into our next book


This is a great question because, as many of you have noticed, many reports will proclaim a malware payload or Threat Actor to be "highly sophisticated" when, in actuality, they're fairly generic and use recycled techniques.

To be direct: it's entirely subjective. There have… https://t.co/aN3KYCMQ3C

— vx-underground (@vxunderground) July 10, 2025

Threat Actors care, but it depends on the type of malware and their "target audience" e.g. home user, enterprise, or other governments... Ultimately, it is impossible for malware to be undetected forever. Additionally, to make your code be undetectable is very strenuous work and… https://t.co/efEStUTXKw

— vx-underground (@vxunderground) July 10, 2025


As an old fart in #xdev, I often get asked how to get into binary exploitation in 2025. I looked around, and here’s my recommendation:https://t.co/hc1SlbSHSj #pwncollege is a huge collection of free #lectures and practical #challenges maintained by a team of #hackers at @ASU. pic.twitter.com/n92pNayjmJ

— raptor@infosec.exchange (@0xdea) July 10, 2025


White Noise

A truly secure and private messenger that's lightning fast, massively scalable, and identity-free.


Out-of-Band, Part 1: The new gen of IP KVMs & how to find them

We begin the series exploring security risks of OoB management devices like BMCs, serial console servers, and IP-enabled KVMs, and share how to find them.


The Software Reverse Engineering Bookshelf https://t.co/WoVlHjKlYN . These are books that I recommend to attendees of my reverse engineering and low-level programming workshops, such as the ones I'm teaching for offical @defcon Workshops and the @MalwareVillage in a few weeks!

— Dr. Wesley McGrew (@McGrewSecurity) July 9, 2025

https://mcgrewsecurity.com/writings/sre-bookshelf/


Perplexity’s CEO said the company’s web browser is designed to track users across the web to build detailed profiles and sell hyper-personalized ads. The browser is to monitor browsing habits, shopping activity, travel and dining interests, and time spent on sites, etc.… pic.twitter.com/vY2SBCxa1l

— Lukasz Olejnik (@lukOlejnik) July 10, 2025


Don't miss what's next. Subscribe to the grugq's newsletter:
X