the grugq's newsletter

Subscribe
Archives
October 1, 2025

October 1, 2025

October 1, 2025

Pre-pandemic, the calculus was what the likelihood was of an employee being bribed to insert a USB stick into their work computer at the office.

Now, it's even easier and they just text their creds and an OTP token. Progress?

Strong device identity prevents assisted ATOs too. https://t.co/ZveU6lva2c

โ€” Dino A. Dai Zovi (@dinodaizovi) September 29, 2025


Hacker 1: "hold my beer..."https://t.co/o5aMrhJ2X2

โ€” Jon Lindsay (@jonrlindsay) September 29, 2025


Check out this new entry in the #UnprotectProject by my friend @DarkCoderSc! ๐Ÿ˜Ž

*Indirect Memory Writing* for example an attacker calls standard Windows APIs that accept an output pointer. You can point that pointer at executable memory. The attacker can then build a payloadโ€ฆ https://t.co/QmNLoHCkHn

โ€” Thomas Roccia ๐Ÿค˜ (@fr0gger_) September 30, 2025


Soraโ€™s new development of โ€œcameoโ€ that allows others to set you (or anyone else) into any AI generated scene will impact disinformation, how everyday folks view media as real or fake, elections, public health, and more for years to come. We need AI labeled content everywhere now. https://t.co/EOP5U1tSHR

โ€” Rachel Tobac (@RachelTobac) September 30, 2025


youre only seeing the times it has thousands of likes https://t.co/UiiEEMMIWV

โ€” Sir Roberto Pizza (@LOLandlord) September 29, 2025


youre only seeing the times it has thousands of likes https://t.co/UiiEEMMIWV

โ€” Sir Roberto Pizza (@LOLandlord) September 29, 2025


The anatomy of a bug: 6 Months at STAR Labs@gerrard_tai posted an article describing their experience in finding kernel bugs and participating in the KernelCTF and Pwn2Own competitionshttps://t.co/gUfCLQCx1Q pic.twitter.com/5wbmWVX1ip

โ€” Linux Kernel Security (@linkersec) September 30, 2025


Obvious to toddlers? pic.twitter.com/azTTfYlkIw

โ€” Anthony Bonato (@Anthony_Bonato) September 30, 2025


Let me explain where this incredible vulnerability in Notepad++ comes from... my blog post from 3w ago. The problem is there's no vuln. I described this as sneaky init access. You might as well do binary patching of any PE file in the world.#infosechttps://t.co/rXWXaskcG0

โ€” Print3M (@Print3M_) September 29, 2025


please don't i need job security https://t.co/ozF513zJPe

โ€” corgi (@corg_e) September 30, 2025


๐Ÿ”’ Secure Bits ๐Ÿ’ก
Did you know ๐˜†๐—ผ๐˜‚ ๐—ฐ๐—ฎ๐—ป ๐—ต๐—ถ๐—ฑ๐—ฒ ๐——๐—ผ๐—บ๐—ฎ๐—ถ๐—ป ๐—”๐—ฑ๐—บ๐—ถ๐—ป๐˜€ from standard discoveryโ€”even from other admins?

Active Directory is a โ€œ๐—ฟ๐—ฒ๐—ฎ๐—ฑ-๐—บ๐—ฎ๐—ป๐˜†โ€ ๐—ฑ๐—ถ๐—ฟ๐—ฒ๐—ฐ๐˜๐—ผ๐—ฟ๐˜† by design.
But ๐—Ÿ๐—ถ๐˜€๐˜ ๐—ข๐—ฏ๐—ท๐—ฒ๐—ฐ๐˜ ๐— ๐—ผ๐—ฑ๐—ฒ (๐—Ÿ๐—ข๐— ) can change that.
๐Ÿ•ต๏ธโ€โ™‚๏ธ Martin Handlโ€ฆ pic.twitter.com/yAggWJAACU

โ€” Horizon Secured (@horizon_secured) September 30, 2025


https://x.com/uwu_underground/status/1973141417955639507

Don't miss what's next. Subscribe to the grugq's newsletter:
Start the conversation:
X