July 6, 2025
July 6, 2025
#SpyNews - week 27 (June 29-July 5):
— Spy Collection (@SpyCollection1) July 6, 2025
A summary of 91 espionage-related stories from week 27 coming from 🇮🇱🇮🇷🇮🇪🇺🇸🇨🇦🇨🇳🇺🇦🇷🇺🇫🇷🇨🇾🇦🇿🇬🇧🇧🇪🇹🇷🇷🇸🇵🇸🇵🇰🇱🇹🇻🇳🇱🇻🇬🇷🇰🇵🇸🇪🇩🇪🇩🇰🇰🇿🇱🇧ðŸ‡ðŸ‡°ðŸ‡¨ðŸ‡ðŸ‡³ðŸ‡±ðŸ‡¦ðŸ‡²ðŸ‡ªðŸ‡¸ðŸ‡¹ðŸ‡¼ðŸ‡µðŸ‡±ðŸ‡¦ðŸ‡«ðŸ‡®ðŸ‡³ðŸ‡§ðŸ‡©ðŸ‡²ðŸ‡©ðŸ‡ªðŸ‡ªðŸ‡¦ðŸ‡·ðŸ‡²ðŸ‡¦ðŸ‡²ðŸ‡½ðŸ‡®ðŸ‡©ðŸ‡²ðŸ‡¾ðŸ‡®ðŸ‡¹ðŸ‡°ðŸ‡ªðŸ‡±ðŸ‡¦ https://t.co/JE5LBSShSv#OSINT #espionage #spy #HUMINT #SIGINT
I recommend reading for those who are interested in v8sbx (especially the implementation of hardware-supported sbx)
— xvonfers (@xvonfers) July 5, 2025
[427946951]Determine how to deal with WasmStacks for hardware sandboxinghttps://t.co/6PW2hhiy9Z https://t.co/aKOs5bDZje pic.twitter.com/1g9jr8g2lx
Most people don't know this man, yet his legacy lives in every PE file. Meet Mark Zbikowski, one of the original MS-DOS architects. The 'magic number' in PE files, 0x5A4D (or 'MZ' in ASCII), is a signature named after him. pic.twitter.com/lMIwfZh5wF
— Smukx.E (@5mukx) July 5, 2025
BBC News - How MI5 piled falsehood on falsehood in court in the case of a spy who abused women - BBC Newshttps://t.co/rshsKwFty1
— Dr. Dan Lomas (@Sandbagger_01) July 6, 2025

How MI5 piled falsehood on falsehood in court in the case of a spy who abused women
Security Service continued to provide misleading evidence even after its lie was exposed, BBC can reveal.
Disjointed Cyber Warfare: Internal Conflicts among Russian Intelligence Agencies
Our ongoing, descriptive study explores the intricacies of Offensive Cyber Operations (OCOs), particularly in the context of the Russian-Ukrainian conflict that began in 2022. This conflict has underscored an escalation in Russian cyber capabilities. Despite OCOs playing a role, academic research...
Exploiting Human Trust in Cybersecurity: Which Trust Development Process Is Predominant in Phishing Attacks?
Humans live in an interconnected world that is increasingly featured with virtual interactions in cyberspace. That world has raised cybersecurity concerns, particularly regarding the exploitation of human trust through various means, such as phishing. Phishing remains one of the most prevalent...
New blog post about all the fun I had red teaming at @NationalCCDC this year!
— sshell (@sshell_) July 5, 2025
Covers some of the fun we had this year specifically relating to the web side of things, as well as some tips and resources for competitors & those interested in participatinghttps://t.co/ofshcp66uP
Insecure Boot: Injecting initramfs from a debug shellhttps://t.co/LhQvLatkPm
— Anderson Nascimento (@andersonc0d3) July 6, 2025