the grugq's newsletter

Subscribe
Archives
June 29, 2025

June 29, 2025

June 29, 2025

AI and Secure Code Generation


AI and Secure Code Generation | Lawfare

AI is reshaping code security—shifting metrics, unknown bugs, and autonomous decisions humans may never understand.


Android 16 can warn you that you might be connected to a fake cell tower

Android 16 can warn you that you might be connected to a fake cell tower - Android Authority

Android 16 has a new "network notifications" feature that can warn you when your device might be connected to a fake cell tower.


https://crookedtimber.org/2025/06/05/occasional-paper-the-impossible-predicament-of-the-death-newts/


Verifiably Correct Lifting of Position-Independent x86-64 Binaries to Symbolized Assembly

https://dl.acm.org/doi/10.1145/3658644.3690244


https://www.tandfonline.com/doi/full/10.1080/02684527.2025.2500847?src=exp-la


This is wild (from report linked from CNN story): https://t.co/763RXCZbOX pic.twitter.com/5nW3IIBwOc

— Dino A. Dai Zovi (@dinodaizovi) June 29, 2025


Circa 2018, as the FBI was working on the El Chapo case, the Sinaloa cartel hired a hacker to track the movements of a senior FBI official around Mexico City, a newly released DOJ audit says. The cartel then user the info to kill potential FBI informants: https://t.co/G6hbsGEGVX

— Sean Lyngaas (@snlyngaas) June 28, 2025


PSYCHOLOGICAL OPERATIONS: Lecture given by Sir Leslie Glass to the National Defence College on 14 March 1973

Sir Leslie Charles Glass was an Army officer in the Psychological Warfare Division in South East Asia in the Second World War, Director-General of Information in Cyprus during the Emergency and later Chairman of the Counter Subversion Committee.


Advanced CTF Challenge Write-up: “Chrome Sandbox Escape via V8 JIT Compiler Vulnerability“https://t.co/DOPu37u1jp

— xvonfers (@xvonfers) June 28, 2025



Fun historical story that most people don’t know: when the US National Institutes of Standards and Technology selected Keccak to be the new Secure Hash Algorithm (SHA3), they knew that it was inefficient—that it did a lot computation that wasn’t necessary for security. ⤵️

— zooko🛡🦓🦓🦓 ⓩ (@zooko) June 29, 2025


Google's Approach for Secure AI Agents


ITW 0-day Google Chrome Sandbox Escape https://t.co/s1ZfWIPn0I

— Security Bug Aggregator (@BugsAggregator) June 28, 2025


Don't miss what's next. Subscribe to the grugq's newsletter:
X