the grugq's newsletter

Subscribe
Archives
May 9, 2025

May 9, 2025

May 9, 2025

Russian hackers are interested in chaos and money, says NATO CCDCOE director
May 8, 2025, ERR | Estoniahttps://t.co/HibxWpGMWg | Russian cyberattacks against Ukraine have also caused global economic damage.

— 780th Military Intelligence Brigade (Cyber) (@780thC) May 8, 2025


What keeps kernel shadow stack effective against kernel exploits? by @standa_t https://t.co/07GomwRJWC

— Alex Plaskett (@alexjplaskett) May 8, 2025


EXCLUSIVE: Bryan Vorndran, who has helped guide the FBI to be more aggressive in disrupting malicious hackers and cybercrime gangs, will retire from the agency soon.

On @TheRecord_Media https://t.co/VII8U8IKIp

— Martin Matishak (@martinmatishak) May 8, 2025


Qtap: An eBPF agent that captures pre-encrypted network traffic, providing rich context about egress connections and their originating processes.

GitHub - qpoint-io/qtap: Qtap: An eBPF agent that captures pre-encrypted network traffic, providing rich context about egress connections and their originating processes.

Qtap: An eBPF agent that captures pre-encrypted network traffic, providing rich context about egress connections and their originating processes. - qpoint-io/qtap

Cloud Egress : Your Biggest Blindspot | Qpoint

See Through Encryption to Map Dependencies, Identify Sensitive Data Sharing, and Enforce Egress Controls


an ai system is the top hacker at h1 us leaderboard pic.twitter.com/3xykSJECBi

— mbg (@mbrg0) May 8, 2025


Lockbit ransomware group has been compromised. Their backend panel was dumped.

You can see my build logs in the data dump.

Lockbit gave me access after I sent him a bunch of cat pictures. pic.twitter.com/G1F3mhs6u7

— vx-underground (@vxunderground) May 8, 2025


How Ransomware Groups Got In: @rapid7 MDR’s Top Initial Access Vectors from Q1 2025.

Top Initial Access Vectors
- Account Compromise (No MFA)
- Vuln Exploitation (all known, patchable)
- Brute Forcing
- Exposed RDP
- SEO Poisoning

What our #MDR team saw in real-world…

— Jon Hencinski (@jhencinski) May 8, 2025


Tariffs just got real: our first $36K bill with 125% + 20% + 25% markup hits hard 💸. These are upfront costs - due before selling a single unit - causing serious cash flow strain, price increases, read more! 📦 https://t.co/G8uZX97sQC#Tariffs pic.twitter.com/LNN2p0Gkym

— adafruit industries (@adafruit) May 8, 2025


Latest #Pakistan's #SideCopy #APT Targeting #Indian Govt. entities with the python-based #Ares #RAT Malware

Infra: https://t.co/SkNQlxfrio

Note: Infection chain of the campaign and other details are explained in the screenshot.@500mk500 @PrakkiSathwik #Malware #ioc pic.twitter.com/fAgWGKDuSy

— Cyber Team (@Cyberteam008) May 8, 2025


I've exported the chats from the #lockbit #ransomware #databreach into an easier to read text format. I hate MySQL formating and it's honestly an eye sore as was the JSON

Updated files: https://t.co/Y4GoO00FZA

JSON output is in the thread.

cc @vxdb @DarkWebInformer… pic.twitter.com/4sAFSFUAal

— Evil Rabbit Security Inc. (@EvilRabbitSec) May 8, 2025


with offensivecon around the corner, i figured id write another post on linux kernel exploitation techniques - this time i cover the world of page table exploitation! enjoy 🤓https://t.co/dqW9eMJkVI

— sam4k (@sam4k1) May 7, 2025


Oh cool a hit infosec tweet, is it:

A) an existing technique rewritten in a useless language
B) a "new" EDR killer
C) a "new" byte patch
D) engagement farming account reposting old blogs

— Josh (@passthehashbrwn) May 8, 2025


Math major possible career paths:
- quant
- programmer
- grad student
- pope https://t.co/eFjWwsomTy

— Mac Lane’s Strongest Soldier (@1969itS) May 8, 2025


https://t.co/KPQcCFcGv5

— es3n1n (@es3n1n) May 8, 2025


Want to be even more depressed?

For a 6.2GHz CPU (i9-14900KS), data can travel at most 4.8 cm/cycle. (1.9 in/cycle in uncivilized units)

Keep your DRAM close, and your cache closer. https://t.co/sB1JurSlTV

— Rachel Blum (@groby) May 9, 2025


DOGE software engineer’s computer infected by info-stealing malware - Ars Technica

The presence of credentials in leaked “stealer logs” indicates his device was infected.


Daax, being the traditional memesteroni he is, shared a cool proof-of-concept which demonstrates how to get a pointer to the Process Environment Block without using the GS and/or FS register.

Look at the full thread. It's interesting. https://t.co/iUDdlXfOxb

— vx-underground (@vxunderground) May 7, 2025

Unlock forbidden Windows knowledge! 🤫💻
Find the PEB through truly undetected means and pop calculator 💥
The non-golf form will be available below 👇#redteamtips #windowsinternals #rust pic.twitter.com/aEIm6ZNDHu

— Daax (@daaximus) May 4, 2025

find the peb in a novel, pain inducing manner · GitHub

find the peb in a novel, pain inducing manner. GitHub Gist: instantly share code, notes, and snippets.

Don't miss what's next. Subscribe to the grugq's newsletter:
X