the grugq's newsletter

Subscribe
Archives
September 1, 2025

September 1, 2025

September 1, 2025

Was in a bookshop and asked a worker if he could recommend books to me. He said "Sure, they're great".

— Andy Ryan (@ItsAndyRyan) August 30, 2025


Just like how corp and prod are fundamentally different environments (corp is all 3rd-party software you can't modify), so are "home" and "homelab". The best results come from keeping them separated so that their configurations can be tailored to their highly disparate use-cases. https://t.co/ejPOUcpwV2

— Dino A. Dai Zovi (@dinodaizovi) August 30, 2025


Working on tons of new features including passive OS detection. Ducky’s usually do OS detection by sending lock keys and response timing.

But it’s better to not be a keyboard at all and just check how the host enumerates the USB stack.

Not sure if I’ll release publicly https://t.co/iKWFX6xOJn

— 丂卄ㄖᗪ卂几 - 👋 crack fingers (@therealshodan) August 30, 2025


Malicious meeting invites and device linking — #UNC6293 is using these tactics to target prominent academics, critics of Russia, and journalists.

Learn more about this group's tactics and how to defend against the threat by reading our blog post.

🔗: https://t.co/kDpptOl7fa pic.twitter.com/82knfpWkcm

— Mandiant (part of Google Cloud) (@Mandiant) August 30, 2025


If you want to avoid your exec team buying vaporware from some snake oil cybersecurity vendor, my honest advice is to be more proactive in going out and finding products you do believe in. Execs don’t want to hear “that won’t work”, but they love “we’re already doing that” https://t.co/P9mCy2HM8Y

— Zack Korman (@ZackKorman) August 31, 2025


Do you remember your 1980s Blackberry? pic.twitter.com/M8V1rUInHF

— Paul Asadoorian @paulasadoorian@infosec.exchange (@securityweekly) August 31, 2025


BRILLIANT @GoogleDeepMind research.

Even the best embeddings cannot represent all possible query-document combinations, which means some answers are mathematically impossible to recover.

Reveals a sharp truth, embedding models can only capture so many pairings, and beyond that,… pic.twitter.com/6iNVuCL51E

— Rohan Paul (@rohanpaul_ai) August 31, 2025


NEW LEAK: Price sheet of 200+ crypto influencers and their wallet addresses from a project they were recently contacted by to promote.

From 160+ accounts who accepted the deal I only saw <5 accounts actually disclose the promotional posts as an advertisement. pic.twitter.com/Kph9dUvDxB

— ZachXBT (@zachxbt) September 1, 2025


> sniffer written in go
> looks inside
> python pic.twitter.com/HZ72209rr8

— mel (@melqtx) August 31, 2025


The paper trains cybersecurity agents using simulated Capture The Flag environments, skipping real runtimes while still boosting results.

Up to 13.1% absolute gains, an open 32B model rivals top closed systems at lower cost.

These challenges are stepwise puzzles where a solver… pic.twitter.com/KRCNdTB2dZ

— Rohan Paul (@rohanpaul_ai) September 1, 2025
Don't miss what's next. Subscribe to the grugq's newsletter:
Start the conversation:
X