the grugq's newsletter

Subscribe
Archives
March 31, 2025

March 31, 2025

March 31, 2025

What would you do if you could spy on SMS messages? @theredguild and @opsek_io have identified SLOVENLY COMET, a threat actor which has been intercepting OTP codes and other credentials sent over SMS to certain regions since as early as February 7, 2025

More info below πŸ”— pic.twitter.com/7ZQ2zBaF5b

β€” Security Alliance (@_SEAL_Org) March 30, 2025


Remember Aaron's talk on iPhone Mirroring at #38c3? He just published a blog post about his findings in threat modelling and researching the security of this new feature, including more details he's only able to talk about now. https://t.co/wBceap3Pb3

β€” Jiska (@naehrdine) March 30, 2025



How I Would Steal The Watches & Wonders Releases From Rolex – Watches of Espionage

A Former CIA Case Officer Dissects How To Penetrate Rolex SA We are now one week out from Watches and Wonders, the annual trade show in Geneva, Switzerland, where many of the premier luxury watch brands debut their latest designs. W&W is a masterclass in marketing, with weeks of blogs and legacy media speculating o


NEW: The secure communications equipment that Trump's national security team should have used instead of the Signal app:https://t.co/uSH6NUC99X

β€” Electrospaces (@electrospaces) March 30, 2025


Sigint Historian: Austerity in Post-War GCHQ - and Help from Friends

Austerity, belt-tightening, peace dividend: at various points during my career HMG found ways to make my life less simple, either by cutting...


New video on how this device was turned into a COVCOM crypto system during the Cold War. Do you know more about it? Let us know!https://t.co/KeeAvuejJy#Poland #UK #ColdWar #espionage #HISTINT #tradecraft #COVCOM

β€” Spy Collection (@SpyCollection1) March 31, 2025


"almost anything online can be used for C2" β„’οΈπŸ«©https://t.co/hxW2IDSYv6 https://t.co/Gdtqwd3NA2 pic.twitter.com/2qIYzWpyfw

β€” Jβ©œβƒmie Williams (@jamieantisocial) March 31, 2025


Streamlined the installation process of my IDA Pro MCP server. You can now start experimenting with vibe reversing in less than 2 minutes!🀯

This was using Claude for testing, but Cline and Roo Code are also configured automatically! pic.twitter.com/lniTRJLjEh

β€” Duncan Ogilvie 🍍 (@mrexodia) March 29, 2025

GitHub - mrexodia/ida-pro-mcp: MCP Server for IDA Pro

MCP Server for IDA Pro. Contribute to mrexodia/ida-pro-mcp development by creating an account on GitHub.


Although it is not my area of ​​work, this professional maintains a well-organized blog about building an EDR in Rust:

Theory: EDR Syscall hooking and Ghost Hunting, my approach to detection:https://t.co/HcwEFeIOUw#edr #cybersecuritty #redteam #blueteam #ir #dfir pic.twitter.com/shj40KgOQb

β€” Alexandre Borges (@ale_sp_brazil) March 31, 2025


''Weaponizing WDAC: Killing the Dreams of EDR''#infosec #pentest #redteam #blueteamhttps://t.co/y7I6T3aiQ7

β€” Florian Hansemann (@CyberWarship) March 30, 2025


It reminds me of the REsearch we conducted a few years ago on SMM to uncover the simplicity of code reuse attacks using ROP/JOP primitives to bypass certain mitigations. Nothing changes, and the results remain relevant.https://t.co/2YjbWV1KzG https://t.co/2aQu6dGF8e

β€” Alex Matrosov (@matrosov) March 31, 2025


Don't miss what's next. Subscribe to the grugq's newsletter:
X