the grugq's newsletter

Subscribe
Archives
May 27, 2025

May 27, 2025

May 27, 2025

This post from @s1guza should be mandatory reading for seceng. Playing whack-a-mole with first-order primitives or just patching vulnerabilities stand alone without disrupting exploit strategies is always going to be fighting a losing battle. https://t.co/1nBMHFFAY1

— Alex Plaskett (@alexjplaskett) May 25, 2025


Claude 4 just refactored my entire codebase in one call.

25 tool invocations. 3,000+ new lines. 12 brand new files.

It modularized everything. Broke up monoliths. Cleaned up spaghetti.

None of it worked.
But boy was it beautiful. pic.twitter.com/wvmzh7IeAP

— vas (@vasumanmoza) May 25, 2025


Interesting. Last year I ran an experiment comparing the latest models at the time (Sonnet 3.5, GPT-4o and Gemini 1.5). The task was to simulate a fuzzer by analysing C code and then generating inputs that hit both sides of each branch. Gemini 1.5 was the best back then as well. https://t.co/Hb3QEYwnjf

— Sean Heelan (@seanhn) May 26, 2025



Bypassing MTE with CVE-2025-0072 - The GitHub Blog

See how a vulnerability in the Arm Mali GPU can be exploited to gain kernel code execution even when Memory Tagging Extension (MTE) is enabled.


Interesting and highly detailed piece about the TSEC/KL-7 crypto machine, which was used by US military, intelligence agencies and NATO allies from 1953 to 1983: https://t.co/oNdCKRu9pu pic.twitter.com/hKxVpz5dxL

— Electrospaces (@electrospaces) May 26, 2025


Many missed this on #BadSuccessor: it’s also a credential dumper.
I wrote a simple PowerShell script that uses Rubeus to dump Kerberos keys and NTLM hashes for every principal-krbtgt, users, machines. no DCSync required, no code execution on DC. pic.twitter.com/MlLfRIVuuM

— Yuval Gordon (@YuG0rd) May 25, 2025


😈 BEWARE: Claude 4 + GitHub MCP will leak your private GitHub repositories, no questions asked.

We discovered a new attack on agents using GitHub’s official MCP server, which can be exploited by attackers to access your private repositories.

creds to @marco_milanta

(1/n) 👇 pic.twitter.com/ES9nuv2lzc

— Luca Beurer-Kellner (@lbeurerkellner) May 26, 2025


Really cool blog dissecting DefendNot(https://t.co/3dymO8DPtr) and how to detect. Really like how they broke out the various detection surface of the tool. Gives blue a better understanding of what to look for and red a better understanding of what to change :) https://t.co/cIGRWwQZ40

— Octoberfest7 (@Octoberfest73) May 25, 2025


spaf: "On a more serious note... A letter about potenti…" - Mastodon 🐘

On a more serious note... A letter about potential strategy for cybersecurity and encryption in Europe: https://www.globalencryption.org/2025/05/joint-letter-on-the-european-internal-security-strategy-protecteu/


Recently declassified by the #NSA, an internal study from 1988 titled: "Fifty Years of Mathematical Cryptanalysis (1937-1987)" https://t.co/vQPYG9qihD

— Electrospaces (@electrospaces) May 27, 2025


China-linked ‘Silk Typhoon’ hackers accessed Commvault cloud environments, person familiar says | https://t.co/8AuqYZmvOG @NextgovFCW

— 780th Military Intelligence Brigade (Cyber) (@780thC) May 27, 2025


Don't miss what's next. Subscribe to the grugq's newsletter:
X