the grugq's newsletter

Subscribe
Archives
March 1, 2023

March 1, 2023

Twitter avatar for @lukOlejnik
Lukasz Olejnik (@LukaszOlejnik@Mastodon.Social) @lukOlejnik
U.S. Congress to vote on a law that would make it easy to prohibit foreign apps. Like TikTok, explicitly mentioned in the proposal. A complete. Ban. Considered. This all-thing is going very fast. congress.gov/bill/118th-con… docs.house.gov/meetings/FA/FA…
Image
Image
Image
8:35 PM ∙ Feb 28, 2023
4Likes4Retweets

-

Twitter avatar for @ChristianKaune1
Christian Kaunert @ChristianKaune1
Many thanks for this wonderful collaboration, ⁦⁦@DrSNewbery⁩ !! ⁦@IICRR⁩ ⁦@HumanitiesDCU⁩ ⁦@DCU⁩ ⁦@USWPolResearch⁩ ⁦@USWPolicing_Sec⁩ ⁦@USWISRM⁩ ⁦@eucter⁩ ⁦⁦@euacademy_dcu⁩ ⁦@ErasmusIMSISS⁩
tandfonline.comCritical Intelligence Studies: A new framework for analysisAs the purpose of the study of intelligence is, in part, to aid the practice of intelligence, scholarship must reflect that practice. This article sets out a theoretical framework for Critical Inte...
1:37 PM ∙ Feb 22, 2023
26Likes7Retweets

-

A collection of jailbreak prompts for ChatGPT

https://www.jailbreakchat.com

-

Twitter avatar for @perrymetzger
Perry E. Metzger @perrymetzger
Re: LastPass: I will repeat, I simply don't trust cloud storage of password safes. It's too tempting a target.
2:23 AM ∙ Mar 1, 2023
92Likes22Retweets

-

Twitter avatar for @arunninghacker
Vlad Styran 🇺🇦 @arunninghacker
Війна вносить трагічні елементи в персональну модель кіберзагроз. Випадки, коли наші воїни гинуть, а їхні гаджети стають здобиччю ворога, зараз трапляються чи не щодня. Як наслідок, ворог часто отримує цінний цифровий актив – кіберперсону загиблого воїна. 2/9
6:49 PM ∙ Feb 28, 2023
18Likes5Retweets

War introduces tragic elements into the personal model of cyber threats. Cases when our soldiers die, and their gadgets become the prey of the enemy, now happen almost every day. As a result, the enemy often receives a valuable digital asset – the cyber persona of the fallen soldier. 2/9

By unlocking the device with a fingerprint or face, enemy intelligence can use the stolen identity of a service member. 3/9

You can combat such methods by turning off biometrics to unlock the device. Unlock the device by pin code, and turn on biometrics to unlock sensitive applications inside the gadget. 4/9

-

Twitter avatar for @haroonmeer
haroon meer @haroonmeer
Hot-take: I don't think "vendor consolidation" is a priority for serious infosec ppl. "none of this works" is more common than "all this works but i hate having multiple vendors" Aside from Microsoft, i can't think of many reasonable "just buy it from the consolidator" options
9:14 AM ∙ Mar 1, 2023
13Likes2Retweets

-

Twitter avatar for @ifsecure
Ivan Fratric 💙💛 @ifsecure
Random exploit dev tip of the day: If you want to do JOP on ARM, take a look at the "scatterload" function. Allows you to call arbitrary functions with arbitrary arguments. In a loop. A pretty powerful and a rather generic primitive that I didn't see mentioned anywhere else.
8:50 AM ∙ Mar 1, 2023
29Likes3Retweets

-

Twitter avatar for @Sandbagger_01
Dr. Dan Lomas @Sandbagger_01
💬 "But he added that the US still lacks a clear consensus as to what happened". A comment that will be overlooked in the rush to say lab-based is the most likely scenario. bbc.co.uk/news/world-us-…
bbc.co.ukFBI chief Christopher Wray says China lab leak ‘most likely’Other US agencies have come to different conclusions from the FBI on how the pandemic began.
8:40 AM ∙ Mar 1, 2023
5Likes3Retweets
Twitter avatar for @IRHotTakes
Starfish PhDing in Plankton and Salmon Studies @IRHotTakes
I honestly don’t think the Chinese themselves know if COVID came from the lab or not because if it did, everyone who was part of the little fucky wucky would 100% do everything in their power to cover it up and take that shit to the grave.
1:53 AM ∙ Mar 1, 2023
96Likes4Retweets

-

Twitter avatar for @richinseattle
Richard Johnson @richinseattle
symbolic execution engine using radare2 backend
Twitter avatar for @alkalinesec
𝚊𝚕𝚔𝚊𝚕𝚒 @alkalinesec
radius2 1.0.18 has been released! it now uses mimalloc for some hypothetical performance gains. more importantly it fixes some significant bugs. install radare2 from git cargo install radius2 https://t.co/QVZyNciKKL
7:07 AM ∙ Mar 1, 2023
10Likes1Retweet

-

Twitter avatar for @matrosov
Alex Matrosov @matrosov
⛓️This is a very important industry-wide disclosure since many vendors are affected by the bug in the TPM reference code and specification. "The attacker can also overwrite protected data in the TPM firmware. This may lead to a crash or arbitrary code execution ..." --@fdfalcon
Twitter avatar for @CISACyber
CISA Cyber @CISACyber
VU#782720: TCG TPM2.0 implementations vulnerable to memory corruption https://t.co/cpf8w1nqUX
9:05 PM ∙ Feb 28, 2023
35Likes22Retweets

-

Twitter avatar for @NatlParkService
National Park Service @NatlParkService
If you come across a bear, never push a slower friend down…even if you feel the friendship has run its course.⁣⁣
7:37 PM ∙ Feb 28, 2023
94,121Likes11,208Retweets

Obviously! You push down the faster friend, they’re the threat. You can already outrun the slow friend.

-

Twitter avatar for @jamespomfret
James Pomfret @jamespomfret
Our story on how unknown parties faked the online identities of two @Reuters reporters @brendagoh_ and @JessiePang0125 to approach activists linked to #China's white paper protests, including @badiucao and those with possible ties to @CitizensDailyCN
reuters.comReuters reporters’ online accounts faked to approach China activistsTwo Reuters journalists had their identities faked by an unknown person or people who then used sham social media accounts to engage with Chinese activists on several online platforms over several months.
5:42 AM ∙ Feb 28, 2023
70Likes66Retweets

-

Twitter avatar for @runasand
Runa Sandvik @runasand
Latest post in my Journalist and Spy series is about Richard Sorge, a German journalist and Soviet intelligence officer active before and during WW II. An expert on Chinese agriculture, but perhaps most known for his espionage networks in China and Japan.
journalistandspy.substack.comRichard SorgeRichard Sorge was a German journalist and Soviet intelligence officer active before and during World War II. Sorge visited Scandinavia and the U.S. at various times in his career, though he’s perhaps most known for his work in China and Japan. While there, Sorge established himself as an expert on C…
8:08 PM ∙ Feb 27, 2023
24Likes6Retweets

-

Twitter avatar for @bagder
daniel:// stenberg:// @bagder
This company called @Microsoft runs this package manager called @nuget. They host a curl package there, that was last updated in 2013 and now contains **68** documented vulnerabilities. But there is apparently no way I can report this or make them act on this.
10:58 PM ∙ Feb 28, 2023
2,168Likes261Retweets

-

Twitter avatar for @AlphaSignalAI
Lior⚡ @AlphaSignalAI
Microsoft's new Kosmos-1 is incredible. It's a new Multimodal Large Language Model (MLLM). Their model can understand images, text, images with text, OCR, image captioning, visual QA. It can even solve IQ tests. Paper: arxiv.org/abs/2302.14045 Code: github.com/microsoft/unilm
Image
7:28 PM ∙ Feb 28, 2023
1,637Likes351Retweets
Don't miss what's next. Subscribe to the grugq's newsletter:
X