the grugq's newsletter

Subscribe
Archives
October 27, 2022

October 27, 2022

Twitter avatar for @JohnHultquist
John Hultquist🌻 @JohnHultquist
DRAGONBRIDGE is behind the strange APT41 attribution denialism and doing election related activity too. They are aggressive, well-resourced, but ultimately failing to get engagement. Election interference is no longer just Russia and Iran.
mandiant.comPro-PRC DRAGONBRIDGE Influence Campaign Leverages New TTPs to Aggressively Target U.S. Interests, Including Midterm Elections | MandiantAn influence campaign likely supporting People’s Republic of China is aggressively targeting the U.S.
2:14 PM ∙ Oct 26, 2022
69Likes33Retweets

-

Twitter avatar for @QuinnyPig
Corey 👻 “Open S3 Bucket”🎃 Quinn @QuinnyPig
This meeting could have been a shitpost.
2:20 PM ∙ Oct 26, 2022
504Likes84Retweets

-

Twitter avatar for @LawDavF
Lawrence Freedman @LawDavF
My latest post for Comment is Freed, on how the coming of winter is shaping the strategy of both sides. Includes discussion of 'dirty bombs' issue, and nuclear deterrence.
samf.substack.comGeneral Winter Knocks at the DoorWinters loom large in the military history of Russia and Ukraine, famously when they were fighting together as part of Imperial Russia against Napoleon and then as part of the Soviet Union against Nazi Germany. Winter is about to return and with it questions about how it will affect this war – wheth…
11:46 AM ∙ Oct 26, 2022
203Likes90Retweets

-

Analysis of TCP IP RCE CVE.


TCP/IP Vulnerability CVE-2022–34718 PoC Restoration and Analysis | by Numen Cyber Labs | Numen Cyber Labs | Medium

An Analysis of Remote Code Execution Vulnerability CVE-2022–34718

-

First person story of a man who fell 15,000 feet and survived.

https://uss-la-ca135.org/60/1960Judkins-Knott.html

-

Twitter avatar for @PogoWasRight
Dissent Doe, PhD @PogoWasRight
Daniel Kaye aka “Popopret,” “Bestbuy,” “TheRealDeal,” “Logger,” “David Cohen,” “Marc Chapon,” “UserL0ser,” “Spdrman,” “Dlinch Kravitz,” “Fora Ward,” and “Ibrahim Sahil,” operator of The Real Deal marketplace, arraigned on federal charges: justice.gov/usao-ndga/pr/h…
3:20 PM ∙ Oct 26, 2022
87Likes24Retweets
Twitter avatar for @GossiTheDog
Kevin Beaumont @GossiTheDog
This is the best researched cybersecurity story I’ve read all year. The utterly bonkers story of Daniel Kaye, Liberia’s internet and corporate espionage, well worth a read.
bloomberg.comBloomberg - Are you a robot?
12:13 PM ∙ Dec 20, 2019
527Likes194Retweets

-

-

Twitter avatar for @ex16x41
Eva Prokofiev‏‏ @ex16x41
How to properly utilize git-sites for OSINT Investigations and research - My guide with tips and tricks (a 🧵) 🔎
Image
6:11 PM ∙ Oct 26, 2022
136Likes39Retweets

-

Great little bits of espionage advice from the DGSI.

https://www.dgsi.interieur.gouv.fr/la-dgsi-a-vos-cotes/contre-espionnage/sinformer/lofficier-de-renseignement-et-ses-methodes

-

Twitter avatar for @Powerzzs
grad student redemption arc @Powerzzs
No more usb-c, no more lightning, it's time to put scsi on the iphone
Image
10:24 PM ∙ Oct 25, 2022
8,616Likes1,148Retweets

-

Twitter avatar for @CatsOfYore
Cats of Yore @CatsOfYore
Here is a thread of cats destroying our stuff throughout history, because they've always done it and they always will and for some reason we will keep loving them for it. Two Young Women Wrapped in Yukata After a Bath. Kitagawa Utamaro, ca. 1796. ukiyo-e.org/image/met/DP13…
A Japanese woodblock print of two young women wearing loose bathrobes and their bath. One woman is standing and a small white and black bobtailed cat is on it's back playfully attacking the edge of her robe as she tries to pull it to safety.
A zoomed-in view of the cat fiendishly grabbing and bunny-kicking the corner of the robe.
7:10 PM ∙ Aug 15, 2022
64,349Likes15,605Retweets

-

Twitter avatar for @daveaitel
Dave Aitel @daveaitel
Nobody has written a good piece on the cyber and intel contest that is going to result from the new BIS export controls vs China. For example, the US wants to send the message that "if you try to cheat on them, you will get caught and added to the entity list immediately"
12:43 AM ∙ Oct 27, 2022
9Likes4Retweets

-

Twitter avatar for @_simo36
simo @_simo36
+16 kernel bugs I reported to Apple have been fixed in iOS 16/16.1. I'll give a talk on how I chained some bugs to achieve kernel r/w at #POC2022 next month, and the kernel exploit for iOS 15 will be released along with a some other high impact vulns after the conference.
7:53 PM ∙ Oct 26, 2022
653Likes126Retweets

-

-

Twitter avatar for @AtomicAnalyst
Stephen Schwartz @AtomicAnalyst
Sixty years ago tonight, as the Cuban Missile Crisis escalated toward confrontation, a sentry on patrol at Duluth AFB, Minnesota, thought he saw someone climbing the perimeter fence. He shot at the intruder and activated the base sabotage alarm, which by design automatically ...
6:00 PM ∙ Oct 25, 2022
979Likes317Retweets

-

SiriSpy - iOS bug allowed apps to eavesdrop on your conversations with Siri | Rambo Codes

An incredibly complicated vulnerability scenario that results in access to Siri. Complex interactions resulting in bugs is always inter


SiriSpy - iOS bug allowed apps to eavesdrop on your conversations with Siri | Rambo Codes

Gui Rambo writes about his coding and reverse engineering adventures.

-

Twitter avatar for @mahal0z
Zion Basque @mahal0z
Ever wanted to use the symbols you've reversed using Ghidra in gdb on-the-fly? Wanted decompilation too? decomp2dbg v3 is out with Ghidra support! Get symbols and a source-like panel, that updates, in gdb. Demo: youtu.be/MK7N7uQTUNY (90s) Code:
github.comGitHub - mahaloz/decomp2dbg: A plugin to introduce interactive symbols into your debugger from your decompilerA plugin to introduce interactive symbols into your debugger from your decompiler - GitHub - mahaloz/decomp2dbg: A plugin to introduce interactive symbols into your debugger from your decompiler
3:00 PM ∙ Oct 26, 2022
105Likes31Retweets

-

Twitter avatar for @brianwhelton
𝔅͛𝔯͛𝔦͛𝔞͛𝔫͛ ͛𝔚͛𝔥͛𝔢͛𝔩͛𝔱͛𝔬͛𝔫͛ @brianwhelton
Hang on, WTF? @PostOffInquiry witness Terence Austin (Sys Prog Dir) created a task force report to deal with the bugs on Horizon in 2001, and this is what an internal ICL/@fujitsu_uk report on the status of team was: "Whoever wrote this code clearly has no..." #PostOfficeScandal
Image
Image
Image
9:40 AM ∙ Oct 27, 2022
45Likes24Retweets

-

Twitter avatar for @olivier_boschko
Boschko 🇨🇦 @olivier_boschko
Wrote a blogpost on vulnerabilities I discovered in @GLiNetWiFi MT300N-V2 router. I see this badboy at every InfoSec conference I attend. Nice little hardware teardown, some cool software vulnerabilities, & 3 CVEs. Enjoy the read ❤️
boschko.caGL.iNET GL-MT300N-V2 Router Vulnerabilities and Hardware TeardownDiscovered multiple vulnerabilities in the IoT hardware, software, & cloud peripheral applications (CVE-2022-31898 CVE-2022-42055 CVE-2022-42054).
2:08 PM ∙ Oct 26, 2022
72Likes41Retweets

Don't miss what's next. Subscribe to the grugq's newsletter:
X