October 4, 2022
Here’s the full playlist
-
A description of the tactics used by the Ukrainians in their advance. Very interesting.
Russian military reporter Sladkov describes the Ukrainian tactic in the LPR of using fast squads to surround the Russian positions and bases and "strangle" them.
t.me/Sladkov_plus/6…
-
-
Enjoying the slew of former senior military folks posting ridiculous hot takes that amount to "UKRAINE IS TRYING A NEW STYLE OF WARFARE THAT IS BASICALLY <the prevailing means of military art, but executed competently>". Like y'all understand combined arms isn't new, right?
-
Shameless plug: you can't always be sure you'll be able to identify an unmarked chip, but I do cover all these techniques in applied physical attacks 2 - identifying packages, analyzing adjacent components, and determining essential pinout details...
_MG_ @_MG_
-
Cyber attack against government!
-
WinDbg has learned some new tricks recently, like opening Linux core dumps. The secret to this new extensibility is the Target Composition Model. Read my new blog post about how it works and how you could use it to teach WinDbg some new tricks too!
-
A coat of arms has to be impressive, full of symbolism, it's important, it represents an powerful family or person, so you have to think long and hard about its design and take it very seriously.
Or just put some underpants on it.
Like Lord Jan van Abbenbroeck did;
-
You know what perhaps the biggest shame about the missed opportunities to improve cybersecurity in the aftermath of the Solarwinds campaign was though?
It was/is actually a wonderful case to learn key lessons from.
There were, in fact, orgs that stopped those SVR bastards cold.
Mandiant caught the post-Solarwinds lateral movement via MFA enrollment alerts, of all things: darkreading.com/threat-intelli…
Brian in Pittsburgh @arekfurt
-
Introducing Ivy a unique, stealthy method of executing shellcode using VBA and COM objects without dropping office macro documents to disk. Ivy also allows for the unhooking EDRs from the VBA environment. Check it out: github.com/optiv/Ivy 👀 #netsec #redteam #EDR #evasion
-
Online platforms do not create hostility. For those already disposed, it offers what we call "connectivity" (cambridge.org/core/journals/…): A useful tool for reaching victims & establishing collectives. Before the Internet, mobilization & coordination was difficult. No longer. (9/14)
-
-
Lots of exciting stuff from ARM - Shadow stacks (GCS - "Guarded Control Stack"), permission indirection and overlays, 128-bit translation tables, translation hardening, SME2 and more! community.arm.com/arm-community-…
-
-
Polite letter from 2200 years ago:
"I am ashamed to keep on pestering you with such a trifle but I have asked you both personally and in writing multiple times: please send back my millstone"
@BLMedieval Papyrus 2091
#MondayMotivation #mondaythoughts #KindnessMatters
-
-
Don't miss what's next. Subscribe to the grugq's newsletter: