the grugq's newsletter

Subscribe
Archives
November 11, 2025

November 11, 2025

November 11, 2025

Kimi K2 thinking is truly impressive for an oss model, with it's assistant we developed fully firefox rce given 0x41414141 primitive in very short time.More importantly, the freedom without worrying it might leak 0day to closed source model vendor!
This bug has been patched by… https://t.co/cPk6HRBs1W

— Toan Pham (@__suto) November 9, 2025


I gave the closing keynote at @SidesBer 2025:
AI for AppSec & Offensive Security: From Automation to Autonomy

We explored how AI is reshaping vulnerability research from tool automation to the first steps toward autonomous red teams.

Slides 📎https://t.co/IReEws098P… pic.twitter.com/Au9krl5S9t

— FuzzingLabs (@FuzzingLabs) November 10, 2025


I'm really excited to share my first research article related to hacking Google Gemini!https://t.co/e7GcJuGLCb#bugSWAT #GoogleVRP

— Valentino Massaro (@valent1nee) November 10, 2025


cybercrime https://t.co/qwdqARBrt1

— Dr. Wesley McGrew (@McGrewSecurity) November 10, 2025


New: We've translated in full a 1988 KGB training manual on how to infiltrate U.S. government facilities in the Middle East and North Africa. Something of a Russian growth industry, you might say. We'll be bringing out all 29 of the old "Lubyanka Files" in English over the next… pic.twitter.com/u2ubAkuA5k

— Michael Weiss (@michaeldweiss) November 10, 2025


I have written poc. write your own Exception handler logic to bypass Modern EDRs hooks.

Poc: https://t.co/3xtO9bkjIU pic.twitter.com/OUmaycijzt

— Smukx.E (@5mukx) November 9, 2025


https://t.co/7moM6PXUWT pic.twitter.com/c4H9q5kqgA

— Aric Toler (@AricToler) November 11, 2025


Honestly, here's what I'd like to see with the future of enterprise security in general. At least for organizations who genuinely want to try to make it a priority🧵:

1. Finally accepting detection + response importantly backstops solid prevention but cannot substitute for it.

— Brian in Pittsburgh (@arekfurt) November 10, 2025


Shader systems are ridiculously powerful if you’re clever enough.

Most people use them to create visual effects. You know what’s cooler?

Running Linux.

Inside an emulated RISC-V CPU. Inside a pixel shader. Inside of VRChat... pic.twitter.com/nEbdxmmkdR

— LaurieWired (@lauriewired) November 10, 2025

https://blog.pimaker.at/texts/rvc1/


https://www.techdigest.tv/2025/11/breach-of-chinese-cybersecurity-firm-reveals-state-backed-hacking-tools.html


Four new adversarial prompts added by Ben McCarthy in PromptIntel targeting Gemini! Check this out! 🤓

👉 https://t.co/cOkoBGyvdD pic.twitter.com/zcNWzr4QkF

— Thomas Roccia 🤘 (@fr0gger_) November 11, 2025


Don't miss what's next. Subscribe to the grugq's newsletter:
Start the conversation:
X