March 31, 2025
March 31, 2025
What would you do if you could spy on SMS messages? @theredguild and @opsek_io have identified SLOVENLY COMET, a threat actor which has been intercepting OTP codes and other credentials sent over SMS to certain regions since as early as February 7, 2025
β Security Alliance (@_SEAL_Org) March 30, 2025
More info below π pic.twitter.com/7ZQ2zBaF5b
Remember Aaron's talk on iPhone Mirroring at #38c3? He just published a blog post about his findings in threat modelling and researching the security of this new feature, including more details he's only able to talk about now. https://t.co/wBceap3Pb3
β Jiska (@naehrdine) March 30, 2025

How I Would Steal The Watches & Wonders Releases From Rolex
β Watches of Espionage
A Former CIA Case Officer Dissects How To Penetrate Rolex SA We are now one week out from Watches and Wonders, the annual trade show in Geneva, Switzerland, where many of the premier luxury watch brands debut their latest designs. W&W is a masterclass in marketing, with weeks of blogs and legacy media speculating o
NEW: The secure communications equipment that Trump's national security team should have used instead of the Signal app:https://t.co/uSH6NUC99X
β Electrospaces (@electrospaces) March 30, 2025
Sigint Historian: Austerity in Post-War GCHQ - and Help from Friends
Austerity, belt-tightening, peace dividend: at various points during my career HMG found ways to make my life less simple, either by cutting...
New video on how this device was turned into a COVCOM crypto system during the Cold War. Do you know more about it? Let us know!https://t.co/KeeAvuejJy#Poland #UK #ColdWar #espionage #HISTINT #tradecraft #COVCOM
β Spy Collection (@SpyCollection1) March 31, 2025
"almost anything online can be used for C2" β’οΈπ«©https://t.co/hxW2IDSYv6 https://t.co/Gdtqwd3NA2 pic.twitter.com/2qIYzWpyfw
β Jβ©βmie Williams (@jamieantisocial) March 31, 2025
Streamlined the installation process of my IDA Pro MCP server. You can now start experimenting with vibe reversing in less than 2 minutes!π€―
β Duncan Ogilvie π (@mrexodia) March 29, 2025
This was using Claude for testing, but Cline and Roo Code are also configured automatically! pic.twitter.com/lniTRJLjEh
GitHub - mrexodia/ida-pro-mcp: MCP Server for IDA Pro
MCP Server for IDA Pro. Contribute to mrexodia/ida-pro-mcp development by creating an account on GitHub.
Although it is not my area of ββwork, this professional maintains a well-organized blog about building an EDR in Rust:
β Alexandre Borges (@ale_sp_brazil) March 31, 2025
Theory: EDR Syscall hooking and Ghost Hunting, my approach to detection:https://t.co/HcwEFeIOUw#edr #cybersecuritty #redteam #blueteam #ir #dfir pic.twitter.com/shj40KgOQb
''Weaponizing WDAC: Killing the Dreams of EDR''#infosec #pentest #redteam #blueteamhttps://t.co/y7I6T3aiQ7
β Florian Hansemann (@CyberWarship) March 30, 2025
It reminds me of the REsearch we conducted a few years ago on SMM to uncover the simplicity of code reuse attacks using ROP/JOP primitives to bypass certain mitigations. Nothing changes, and the results remain relevant.https://t.co/2YjbWV1KzG https://t.co/2aQu6dGF8e
β Alex Matrosov (@matrosov) March 31, 2025