the grugq's newsletter

Subscribe
Archives
June 18, 2024

June 18, 2024

June 18, 2024

Hackers who stole Ticketmaster data from Snowflake account appears to have accessed data through a contractor named EPAM Systems. EPAM has workers in Belarus, Ukraine and, before war, Russia. Hacker told me they breached an EPAM worker in Ukraine. https://t.co/2c6mOHsBoy

— Kim Zetter (@KimZetter) June 17, 2024


📣Official statement: the new EU chat controls proposal for mass scanning is the same old surveillance with new branding.

Whether you call it a backdoor, a front door, or “upload moderation” it undermines encryption & creates significant vulnerabilitieshttps://t.co/g0xNNKqquA pic.twitter.com/3L1hqbBRgq

— Meredith Whittaker (@mer__edith) June 17, 2024


Strong post by @gavinbwilde off platform pic.twitter.com/G9uFlmFG1d

— Thomas Rid (@RidT) June 17, 2024


Yes. That is correct.

The manufacturers of commercial spyware Pegasus argued in a court filing that it is appropriate for its global clients to target any high-ranking official with the technology because their jobs categorically make them “legitimate intelligence targets.” https://t.co/E25SOSeKR6

— The Record From Recorded Future News (@TheRecord_Media) June 17, 2024


We have to keep remembering that these policies are not an attack on "encryption": they are an attack on confidentiality - your ability to have a private conversation. *Governments have lost the argument about breaking encryption*, so now they want the data before it's encrypted. https://t.co/ZIGK00UGUk

— R Wilton https://freeradical.zone/@futureidentity (@futureidentity) June 17, 2024


Three people convicted of spying for Russia in Poland avoid prison – Polish media outlet https://t.co/Bxkr38JKH7

— Dr. Dan Lomas (@Sandbagger_01) June 17, 2024


I got an email this morning, supposedly from Warner Media. I'm sure it's a scam, but I got a belly laugh out of it. Here's the first paragraph:

"Your published material 'x64 Assembly Language Step-by-Step' was recommended to us for review and our company - WarnerMedia would…

— Jeff Duntemann (@JeffDuntemann) February 28, 2024


https://www.cyberscarecrow.com


Every Way To Get Structured Output From LLMs


[2406.08719] TikTag: Breaking ARM's Memory Tagging Extension with Speculative Execution

ARM Memory Tagging Extension (MTE) is a new hardware feature introduced in ARMv8.5-A architecture, aiming to detect memory corruption vulnerabilities. The low overhead of MTE makes it an attractive solution to mitigate memory corruption attacks in modern software systems and is considered the most promising path forward for improving C/C++ software security. This paper explores the potential security risks posed by speculative execution attacks against MTE. Specifically, this paper identifies ne...


for sale:
sex rope,
never used https://t.co/9yl6Ohv1RW

— shy watson (@formermissNJ) June 17, 2024


Don't miss what's next. Subscribe to the grugq's newsletter:

Start the conversation:

Be the first to share your thoughts

X