the grugq's newsletter

Subscribe
Archives
November 1, 2022

November 1, 2022

Twitter avatar for @ChuckPfarrer
Chuck Pfarrer | Indications & Warnings | @ChuckPfarrer
MAKING HISTORY: UKR's innovative small, unmanned surface vessels (USVs) conducted naval warfare’s first remotely actuated surface battle. Directed by Beyond Line of Sight (BLOS) man-in-the loop control, these USVs can be maneuvered on recon, surveillance and attack missions.
Image
8:08 PM ∙ Oct 30, 2022
6,241Likes1,032Retweets

-

Twitter avatar for @AthertonKD
Kelsey D. Atherton @AthertonKD
I was invited to fire a laser weapon on a test range and did so. Here's my story, for @PopSci
popsci.comWhat it’s like to fire Raytheon’s powerful anti-drone laserPopular Science tested out a laser weapon that is designed to zap drones out of the sky. Here’s what it’s like to operate and how it works.
4:10 PM ∙ Oct 31, 2022
188Likes50Retweets

-

Twitter avatar for @samuelskove
samskove @samuelskove
My story for @RFERL on a day in the life of a drone operator in Ukraine's military. One cool thing - they use AI to help find Russian vehicles hiding under trees. rferl.org/a/ukraine-dron… @sgutterman @SamBendett
rferl.orgNear The Front, Ukraine’s Drone Pilots Wage A Modern War On A Shoestring BudgetBefore the Russian invasion, one was a bodybuilder, another a civil engineer, and the third worked in real estate. Their journey from green recruits to seasoned drone operators shows how much Ukraine has achieved – and just how far Ukraine has to go in matters ranging from weapons to intelligence.
2:05 PM ∙ Oct 31, 2022
62Likes33Retweets

-

It’s a day of Drone news. Also, Bayruktar is developing air to air missiles for dealing with loitering munitions.

Twitter avatar for @SamBendett
Samuel Bendett @SamBendett
1/ QUICK THREAD: Mikhail Fedorov, Ukraine's Ministry of Digital Development: Kyiv is preparing for a “war of drones”: "Ukraine is now engaged in the purchase of drones that can intercept other drones. This is the next stage in the development of ideas."
forbes.uaЦена Starlink, разговоры с Маском, дроны против дронов и цифровизация игорного бизнеса. Большое интервью Михаила Федорова — Forbes.uaМинистр цифровой трансформации Федоров о том, сколько в Украине Starlink, кто за них платит и как их распределяют; армию дронов и реформу игорного бизнеса
7:34 PM ∙ Oct 31, 2022
1,027Likes209Retweets

-

Twitter avatar for @yanluowangleaks
ywl_leaks @yanluowangleaks
yanluowang matrix chat and server leaks
anonfiles.comhello1.json - AnonFiles
1:01 AM ∙ Oct 31, 2022
3Likes1Retweet

-

Low effort phishing attempt, but these things work some percentage of the time.

Twitter avatar for @zackwhittaker
Zack Whittaker @zackwhittaker
Twitter's ongoing verification chaos is now a cybersecurity problem. It looks like some people (including in our newsroom) are getting crude phishing emails trying to trick people into turning over their Twitter credentials.
Image
9:03 PM ∙ Oct 31, 2022
6,623Likes3,168Retweets

-

Twitter avatar for @CurtisRemarc
Curtis Remarc 🌴🤙 @CurtisRemarc
You will never figure out where this video is going even into the end of it
11:16 PM ∙ Oct 30, 2022
95,908Likes10,615Retweets

-

Twitter avatar for @dellcam
dell cameron @dellcam
Homeland Security agents "scrambled" to Best Buy in 2020 to get laptops for new recruits with "barely any form of training," meeting up in a "parking lot" to begin work creating spy files on Americans protesting George Floyd's murder.
Image
4:55 PM ∙ Oct 27, 2022
6,582Likes2,320Retweets

-

Twitter avatar for @briankrebs
briankrebs @briankrebs
Last week, the DOJ unsealed an indictment of 26 y/o Ukrainian national Mark Sokolovsky as the core developer behind the Raccoon stealer malware. Scoop: He was caught in March fleeing Ukraine's mandatory service in the wake of the Russian invasion.
krebsonsecurity.comAccused ‘Raccoon’ Malware Developer Fled Ukraine After Russian InvasionA 26-year-old Ukrainian man is awaiting extradition to the United States on charges that he acted as a core developer for Raccoon, a “malware-as-a-service” offering that helped paying customers steal passwords and financial data from millions of cybercrime victims. KrebsOnSecurity…
10:06 PM ∙ Oct 31, 2022
183Likes73Retweets

-

Twitter avatar for @mboehme_
Marcel Böhme @mboehme_
"Successful exploitation is always evidence of someone’s incorrect assumptions about the computational nature of the system" //
8:19 PM ∙ Oct 31, 2022
34Likes4Retweets

-

Twitter avatar for @Jason_Healey
Jay Healey @Jason_Healey
It's been FIFTY YEARS this month that the Anderson Report of 1972 documented that security must be "designed into a system from its inception" as "there is little chance it can be made secure by retrofit"
Image
Twitter avatar for @techpolicySIPA
Tech & Policy @ SIPA @techpolicySIPA
As cybersecurity awareness month reaches its end, have a look at this 50-year-old USAF report (Oct 1972) which describes the advantage possessed by tiger teams (now red teams) in testing computer security. Will the same offensive advantage remain in 2072? https://t.co/dqdpnKAzd7 https://t.co/mWlnDFMJZK
8:46 PM ∙ Oct 31, 2022
149Likes68Retweets

-

Twitter avatar for @shubroski
Shubhro Saha @shubroski
This weekend I built =GPT3(), a way to run GPT-3 prompts in Google Sheets. It's incredible how tasks that are hard or impossible to do w/ regular formulas become trivial. For example: sanitize data, write thank you cards, summarize product reviews, categorize feedback...
5:37 PM ∙ Oct 31, 2022
15,810Likes1,955Retweets

-

https://googleprojectzero.blogspot.com/2022/10/rc4-is-still-considered-harmful.html

-

People are making fun of this guy and his girlfriend, but I want to push back a bit. Yes, this was stupid. But it is very unlikely that his girlfriend’s instagram was the instrumental part of his capture. Regardless however, with or without the Instagram he would’ve been caught. The modern age is one where most activities are linked to an identity. His time was limited from the start.

Subscribe now

But there is still a relevant lesson learned to extract from here. The problem with secrecy is that other people don’t practice the same level of care as you. If you avoid having a mobile phone, your friends won’t. If you’re not on Facebook, they’ll build a shadow profile of you and it’ll get populated as your friends interact around you.

Allen Dulles, in his 73 rules of Spycraft, lamented the rise of technology that exposed the case officer to the tradecraft of amateurs.

The greatest vice in the game is that of carelessness. Mistakes made generally cannot Mistakes be rectified.
The greatest material curse to the profession, despite all its advantages, is undoubtedly the telephone. It is a constant source of temptation to slackness. And even if you do not use it carelessly yourself, the other fellow, very often will, so in any case, warn him. Always act on the principle that every conversation is listened to, that a call may always give the enemy a line. Naturally, always unplug during confidential conversations. Even better is it to have no phone in your room, or else have it in a box or cupboard.
Twitter avatar for @vxunderground
vx-underground @vxunderground
Mark Sokolovsky, a Ukrainian and the alleged author of Raccoon Stealer, was arrested in the Netherlands in March, 2022 with the accidental help of his girlfriend
They fled Ukraine together. She documented everything on Instagram She posted this photo 2 days prior to his arrest
Image
4:44 AM ∙ Nov 1, 2022
1,080Likes207Retweets
Twitter avatar for @vxunderground
vx-underground @vxunderground
tl;dr if you're an internationally wanted cyber criminal, avoiding a mandatory draft, and illegally immigrating into NATO territory, do not document everything on social media.
4:46 AM ∙ Nov 1, 2022
749Likes81Retweets

-

Twitter avatar for @WarOnTheRocks
War on the Rocks @WarOnTheRocks
A consortium could maintain all the open-source materials, databases, and platforms for the national security apparatus.
warontherocks.comBuilding An Open-Source Intelligence Buyer’s Club - War on the RocksThe Ukraine conflict has blown open the door on how open-source information — broadly defined as publicly and commercially available data — can be a
6:30 AM ∙ Nov 1, 2022
13Likes6Retweets

-

Twitter avatar for @techreview
MIT Technology Review @techreview
YouTube videos demonstrating dangerous—and even deadly—DIY crafts and hacks attract millions of views. This YouTube baker spends her time debunking them, but the craze shows no signs of stopping.
trib.alThe YouTube baker fighting back against deadly “craft hacks”Ann Reardon spends her time debunking dangerous activities that go viral on the platform—but the craze shows no signs of abating.
7:19 AM ∙ Nov 1, 2022
58Likes24Retweets

-

Twitter avatar for @haynesdeborah
Deborah Haynes @haynesdeborah
British cyber spies have been playing a key role in defending Ukraine from widespread Russian cyber attacks since the start of the invasion, it has been confirmed.
bit.lyUkraine war: British spies playing key role in defending Kyiv from Russian cyber attacksBritain has made its cyber support public because keeping it secret was no longer deemed necessary, officials said - an indication that the Kremlin was already aware.
7:14 AM ∙ Nov 1, 2022
220Likes66Retweets

-

Twitter avatar for @Jeremy_Kirk
Jeremy Kirk @Jeremy_Kirk
Should Australia's @medibank health insurer pay extortionists to prevent the release of sensitive medical documents related to millions of people? A 🧵 on ransoms and extortion. #auspol #infosec @ClareONeilMP @CyberGovAU @ASDGovAu @Optus
12:23 AM ∙ Nov 1, 2022
49Likes12Retweets

-

NASCAR driver claims qualifying place by using a move from playing GameCube

Twitter avatar for @barstoolsports
Barstool Sports @barstoolsports
Ross Chastain hit the NOS button to make it to the championship over Denny @rubbinisracing
9:43 PM ∙ Oct 30, 2022
18,636Likes1,619Retweets

-

Twitter avatar for @worldwise001
shh, heavy tweeter & SOC2 opinion-haver @worldwise001
Happy OpenSSL critical CVE drop day to all those who celebrate.
12:22 PM ∙ Nov 1, 2022
63Likes36Retweets

-

Twitter avatar for @silascutler
Silas @silascutler
It's finally #SpookySSL day! Thanks @NCSCgov for the artwork: github.com/NCSC-NL/OpenSS…
Image
1:13 PM ∙ Nov 1, 2022
8Likes3Retweets

-

Twitter avatar for @BlogsofWar
@blogsofwar@mastodon.social @BlogsofWar
ProPublica’s How to “Follow the Money” in a Political Campaign should be required reading for all Americans.
propublica.orgHow to “Follow the Money” in a Political CampaignCampaign contributions can be a confusing web of super PACs, FEC filings and dark money. That’s why we’re covering how campaign finance works in this edition of our User’s Guide to Democracy.
1:10 PM ∙ Nov 1, 2022
6Likes4Retweets

-

Twitter avatar for @aaronbateman22
Aaron Bateman @aaronbateman22
Declassified 1974 intel assessment regarding the relationship between the Indian space program and nuclear-delivery system development.
Image
Image
12:44 PM ∙ Nov 1, 2022
13Likes6Retweets
Don't miss what's next. Subscribe to the grugq's newsletter:
X