the grugq's newsletter

Subscribe
Archives
October 4, 2022

October 4, 2022

Here’s the full playlist

The Info Op is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.

-

A description of the tactics used by the Ukrainians in their advance. Very interesting.

Twitter avatar for @wartranslated
Dmitri @wartranslated
Russian military reporter Sladkov describes the Ukrainian tactic in the LPR of using fast squads to surround the Russian positions and bases and "strangle" them. t.me/Sladkov_plus/6…
Image
Image
9:06 AM ∙ Oct 3, 2022
3,011Likes307Retweets

-

Twitter avatar for @Michael1979
Sir Michael @Michael1979
It can be very difficult to tell the difference between certain animals. Here's what to look for
Image
8:26 PM ∙ Jan 30, 2021
13,034Likes1,916Retweets

-

Twitter avatar for @LivFaustDieJung
Ukraine Memes for NATO Teens @LivFaustDieJung
Enjoying the slew of former senior military folks posting ridiculous hot takes that amount to "UKRAINE IS TRYING A NEW STYLE OF WARFARE THAT IS BASICALLY <the prevailing means of military art, but executed competently>". Like y'all understand combined arms isn't new, right?
12:33 AM ∙ Oct 3, 2022
2,289Likes195Retweets

-

Twitter avatar for @securelyfitz
Joe Fitz @securelyfitz
Shameless plug: you can't always be sure you'll be able to identify an unmarked chip, but I do cover all these techniques in applied physical attacks 2 - identifying packages, analyzing adjacent components, and determining essential pinout details...
Twitter avatar for @_MG_
_MG_ @_MG_
From “NSA- grade spying device that few people in the world have the skills to make” to @securelyfitz giving you the BOM to build one yourself using just a picture. Pro Tip: Fitz teaches how to do this type of reversing in his classes. https://t.co/3SLUrZrhqg
4:21 PM ∙ Oct 3, 2022
13Likes3Retweets

-

Cyber attack against government!

Twitter avatar for @AvaSantina
Ava-Santina @AvaSantina
Live chat for Jacob Rees Mogg at Tory conference has been hijacked by an adult dating site
Image
12:16 PM ∙ Oct 3, 2022
4,914Likes867Retweets

-

Twitter avatar for @timmisiak
Tim Misiak @timmisiak
WinDbg has learned some new tricks recently, like opening Linux core dumps. The secret to this new extensibility is the Target Composition Model. Read my new blog post about how it works and how you could use it to teach WinDbg some new tricks too!
timdbg.comWhat’s the Target Model? (And Why?)How do you teach an old dog new tricks? That’s the topic of today’s post. “WinDbg” is short for “Windows Debugger”, but lately that name seems a bit odd since the WinDbg of today knows about a lot more than just Windows. WinDbg now supports Linux and MacOS crash dump targets, as well as few things t…
5:26 PM ∙ Oct 3, 2022
158Likes47Retweets

-

Twitter avatar for @fakehistoryhunt
Fake History Hunter @fakehistoryhunt
A coat of arms has to be impressive, full of symbolism, it's important, it represents an powerful family or person, so you have to think long and hard about its design and take it very seriously. Or just put some underpants on it. Like Lord Jan van Abbenbroeck did;
Image
8:15 AM ∙ Jan 30, 2022
1,775Likes380Retweets

-

Twitter avatar for @arekfurt
Brian in Pittsburgh @arekfurt
You know what perhaps the biggest shame about the missed opportunities to improve cybersecurity in the aftermath of the Solarwinds campaign was though? It was/is actually a wonderful case to learn key lessons from. There were, in fact, orgs that stopped those SVR bastards cold.
2:52 PM ∙ Oct 3, 2022
31Likes11Retweets
Twitter avatar for @jonoberheide
Jon Oberheide @jonoberheide
Mandiant caught the post-Solarwinds lateral movement via MFA enrollment alerts, of all things: darkreading.com/threat-intelli…
Twitter avatar for @arekfurt
Brian in Pittsburgh @arekfurt
Simply put, security-conscious organizations *could* beat them. And some did. So why aren't we talking about what went right? Why aren't we talking about what *actually* worked to stop vaunted APT29?
11:17 PM ∙ Oct 3, 2022
23Likes5Retweets

-

Twitter avatar for @Tyl0us
Matt Eidelberg @Tyl0us
Introducing Ivy a unique, stealthy method of executing shellcode using VBA and COM objects without dropping office macro documents to disk. Ivy also allows for the unhooking EDRs from the VBA environment. Check it out: github.com/optiv/Ivy 👀 #netsec #redteam #EDR #evasion
github.comGitHub - optiv/Ivy: Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s lo…Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by utilizing programmatical access in the VBA object environmen...
4:34 PM ∙ Jan 11, 2022
730Likes374Retweets

-

Twitter avatar for @M_B_Petersen
Michael Bang Petersen @M_B_Petersen
Online platforms do not create hostility. For those already disposed, it offers what we call "connectivity" (cambridge.org/core/journals/…): A useful tool for reaching victims & establishing collectives. Before the Internet, mobilization & coordination was difficult. No longer. (9/14)
cambridge.orgThe Psychology of Online Political Hostility: A Comprehensive, Cross-National Test of the Mismatch Hypothesis | American Political Science …The Psychology of Online Political Hostility: A Comprehensive, Cross-National Test of the Mismatch Hypothesis - Volume 116 Issue 1
8:46 AM ∙ Oct 10, 2021
136Likes43Retweets

-

Twitter avatar for @OctopusCaveman
Octopus/Caveman @OctopusCaveman
Thought @nineinchnails might appreciate this awesome cover
8:55 AM ∙ Aug 18, 2021
334Likes72Retweets

-

Twitter avatar for @AmarSaar
Saar Amar @AmarSaar
Lots of exciting stuff from ARM - Shadow stacks (GCS - "Guarded Control Stack"), permission indirection and overlays, 128-bit translation tables, translation hardening, SME2 and more! community.arm.com/arm-community-…
Image
Image
Image
11:37 AM ∙ Oct 3, 2022
135Likes45Retweets

-

Twitter avatar for @AthertonKD
Kelsey D. Atherton @AthertonKD
Darmok and Jalad? At *my* Tenagra?
2:50 AM ∙ Oct 4, 2022
105Likes18Retweets

-

Twitter avatar for @petetoth
peter toth @petetoth
Polite letter from 2200 years ago: "I am ashamed to keep on pestering you with such a trifle but I have asked you both personally and in writing multiple times: please send back my millstone" @BLMedieval Papyrus 2091 #MondayMotivation #mondaythoughts #KindnessMatters
Image
10:51 AM ∙ Oct 3, 2022
698Likes208Retweets

-

Twitter avatar for @buitengebieden
Buitengebieden @buitengebieden
Busted.. 😂
8:56 PM ∙ Oct 3, 2022
100,889Likes12,563Retweets

-

Twitter avatar for @TheSpyTheState
Jeff Rogg @TheSpyTheState
Many thoughts here based on my study of the whole history of American intelligence...actually around 600 pages of thoughts when the book is eventually published by @OxUniPress. What does this longer history teach us? newyorker.com/magazine/2022/… via @NewYorker
newyorker.comHas the C.I.A. Done More Harm Than Good?In the agency’s seventy-five years of existence, a lack of accountability has sustained dysfunction, ineptitude, and lawlessness.
8:58 PM ∙ Oct 3, 2022
138Likes47Retweets

The Info Op is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.

Don't miss what's next. Subscribe to the grugq's newsletter:
X