the grugq's newsletter

Subscribe
Archives
July 6, 2025

July 6, 2025

July 6, 2025

#SpyNews - week 27 (June 29-July 5):
A summary of 91 espionage-related stories from week 27 coming from 🇮🇱🇮🇷🇮🇪🇺🇸🇨🇦🇨🇳🇺🇦🇷🇺🇫🇷🇨🇾🇦🇿🇬🇧🇧🇪🇹🇷🇷🇸🇵🇸🇵🇰🇱🇹🇻🇳🇱🇻🇬🇷🇰🇵🇸🇪🇩🇪🇩🇰🇰🇿🇱🇧🇭🇰🇨🇭🇳🇱🇦🇲🇪🇸🇹🇼🇵🇱🇦🇫🇮🇳🇧🇩🇲🇩🇪🇪🇦🇷🇲🇦🇲🇽🇮🇩🇲🇾🇮🇹🇰🇪🇱🇦 https://t.co/JE5LBSShSv#OSINT #espionage #spy #HUMINT #SIGINT

— Spy Collection (@SpyCollection1) July 6, 2025


I recommend reading for those who are interested in v8sbx (especially the implementation of hardware-supported sbx)

[427946951]Determine how to deal with WasmStacks for hardware sandboxinghttps://t.co/6PW2hhiy9Z https://t.co/aKOs5bDZje pic.twitter.com/1g9jr8g2lx

— xvonfers (@xvonfers) July 5, 2025


Most people don't know this man, yet his legacy lives in every PE file. Meet Mark Zbikowski, one of the original MS-DOS architects. The 'magic number' in PE files, 0x5A4D (or 'MZ' in ASCII), is a signature named after him. pic.twitter.com/lMIwfZh5wF

— Smukx.E (@5mukx) July 5, 2025


BBC News - How MI5 piled falsehood on falsehood in court in the case of a spy who abused women - BBC Newshttps://t.co/rshsKwFty1

— Dr. Dan Lomas (@Sandbagger_01) July 6, 2025

How MI5 piled falsehood on falsehood in court in the case of a spy who abused women

Security Service continued to provide misleading evidence even after its lie was exposed, BBC can reveal.



Disjointed Cyber Warfare: Internal Conflicts among Russian Intelligence Agencies

Our ongoing, descriptive study explores the intricacies of Offensive Cyber Operations (OCOs), particularly in the context of the Russian-Ukrainian conflict that began in 2022. This conflict has underscored an escalation in Russian cyber capabilities. Despite OCOs playing a role, academic research...


Exploiting Human Trust in Cybersecurity: Which Trust Development Process Is Predominant in Phishing Attacks?

Humans live in an interconnected world that is increasingly featured with virtual interactions in cyberspace. That world has raised cybersecurity concerns, particularly regarding the exploitation of human trust through various means, such as phishing. Phishing remains one of the most prevalent...


New blog post about all the fun I had red teaming at @NationalCCDC this year!
Covers some of the fun we had this year specifically relating to the web side of things, as well as some tips and resources for competitors & those interested in participatinghttps://t.co/ofshcp66uP

— sshell (@sshell_) July 5, 2025


Insecure Boot: Injecting initramfs from a debug shellhttps://t.co/LhQvLatkPm

— Anderson Nascimento (@andersonc0d3) July 6, 2025
Don't miss what's next. Subscribe to the grugq's newsletter:
X