the grugq's newsletter

Subscribe
Archives
September 16, 2022

September 16, 2022

Twitter avatar for @vxunderground
vx-underground @vxunderground
Update: A Threat Actor claims to have completely compromised Uber - they have posted screenshots of their AWS instance, HackerOne administration panel, and more. They are openly taunting and mocking @Uber.
Image
Image
Image
Image
2:16 AM ∙ Sep 16, 2022
1,518Likes729Retweets

Persistence is the greatest hacker tool:

Twitter avatar for @hacker_
Corben Leo @hacker_
Apparently there was an internal network share that contained powershell scripts... "One of the powershell scripts contained the username and password for a admin user in Thycotic (PAM) Using this i was able to extract secrets for all services, DA, DUO, Onelogin, AWS, GSuite"
Image
1:17 AM ∙ Sep 16, 2022
1,135Likes256Retweets

-

The Info Op is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.

Twitter avatar for @ABC
ABC News @ABC
HISTORIC HANG-UP: Workers remove the last public payphone operating on the streets of New York city. Mass adoption of cellphones have rendered the once-ubiquitous installations obsolete. abcn.ws/3wJMsy6
12:10 PM ∙ May 24, 2022
577Likes232Retweets

-

Twitter avatar for @ginnyhogan_
Ginny Hogan_ @ginnyhogan_
My boyfriend just sent me six texts, all by accident, all intended for his friend. All six were about how much he loved Nicolas Cage. I would have rather found out he was cheating.
10:44 PM ∙ Sep 14, 2022
143,314Likes4,838Retweets

-

Geopolitical cyber incidents in Canada, eh.

https://dandurand.uqam.ca/wp-content/uploads/2022/08/2022-08-22-Rapport-OCM-ENG.pdf

-

An interview with a foreign volunteer who was in Bucharest while it was occupied.

-

Twitter avatar for @cyb3rops
Florian Roth ⚡ @cyb3rops
#OffSec devs 🤭
Image
8:28 PM ∙ Sep 15, 2022
601Likes101Retweets

-

Twitter avatar for @notjessewalker
Jesse Walker @notjessewalker
An insurer asked a 60-officer police department to "enact more than a dozen changes focused on reducing violent encounters with the public. When police failed to do so, the risk pool pulled its coverage, and the department disbanded."
washingtonpost.comInsurers force change on police departments long resistant to itInsurance companies are successfully dictating reforms in police departments, a movement driven by the large settlements out of use-of-force cases.
5:32 PM ∙ Sep 15, 2022
4,765Likes1,123Retweets

-

Twitter avatar for @morozov_dev
Aleksandr Morozov @morozov_dev
Developers: it's a simple feature, users will understand it.
Users:
6:25 PM ∙ Sep 15, 2022
22,444Likes3,740Retweets

-

Twitter avatar for @amyngyn
amy nguyen @amyngyn
COWORKER: we need to find the root cause asap ME: *takes long drag* the root cause is that our processes are not robust enough to prevent a person from making this mistake COWORKER: amy please not right now
7:38 PM ∙ Dec 11, 2018
12,651Likes3,209Retweets

-

Twitter avatar for @jeffvanderstoep
Jeff Vander Stoep @jeffvanderstoep
Agreed. Fuzzing is currently our best tool for finding memory safety bugs. However it's: - Somewhat effective at discovering spacial safety bugs. - Much less effective (ineffective, really) at finding temporal safety bugs. Temporal safety is where we most urgently need solutions
Twitter avatar for @InsanityBit
InsanityBit @InsanityBit
"Half of the known exploitable bugs in Chrome are use-after-frees" kinda makes you question this whole "we solve spatial safety but not temporal safety" thing some languages are selling lately
11:15 AM ∙ Sep 15, 2022
94Likes9Retweets

-

Twitter avatar for @Metlstorm
Metlstorm @Metlstorm
The more they stay the same https://t.co/aZKucVTUdS
Image
Twitter avatar for @Metlstorm
Metlstorm @Metlstorm
The more things change 😭 https://t.co/lDyDIhyocq https://t.co/PAB9EQKwTq
4:42 AM ∙ Sep 16, 2022
18Likes5Retweets

-

Twitter avatar for @NandanLohitaksh
Lohitaksh Nandan @NandanLohitaksh
30 Search Engines for Cybersecurity Researchers: 1. Dehashed—View leaked credentials. 2. SecurityTrails—Extensive DNS data. 3. DorkSearch—Really fast Google dorking. 4. ExploitDB—Archive of various exploits. #cybersecurity #infosec #bugbounty
4:23 PM ∙ Sep 15, 2022
1,514Likes493Retweets

-

Twitter avatar for @jfslowik
Joe Słowik 🌻 @jfslowik
Image
6:59 PM ∙ Sep 14, 2022
353Likes45Retweets

-

**Zombie Ant Farm: Primitives and Offensive Tooling for Playing Hide and Seek with Linux EDRs**

https://github.com/dsnezhkov/zombieant/wiki/Project-Overview

-

Twitter avatar for @Mpolymer
Marc Polymeropoulos @Mpolymer
Scenario likely happening overseas: An agent braces his case officer "ok, so you're telling me that the info that I'm giving you all, that can get me killed, can be just taken home by a former president? And your vaunted justice system is tied in knots? This is nuts. I quit."
8:57 AM ∙ Sep 16, 2022
1,913Likes471Retweets

-

Twitter avatar for @CobraKeiser
SᴡᴇᴇᴘTʜᴇLᴇɢ @CobraKeiser
i am not a religious man but i said a quick prayer for my guy
11:59 PM ∙ Sep 14, 2022
107,610Likes9,958Retweets

-

Twitter avatar for @0xdea
raptor @0xdea
Windows TCP/IP Remote Code Execution Vulnerability (CVE-2022-34718) 🤨
msrc.microsoft.com/update-guide/v…
Image
Image
6:09 AM ∙ Sep 16, 2022
127Likes43Retweets

-

Twitter avatar for @mischiefanimals
animals going goblin mode @mischiefanimals
8:11 AM ∙ Jul 29, 2022
559,372Likes76,203Retweets

-

Twitter avatar for @mrkoot
Matthijs R. Koot @mrkoot
U.S. DOD & DOJ join FCC inquiry into internet routing security (Sep 14) justice.gov/opa/pr/departm… Said FCC inquiry (Feb 28): fcc.gov/document/fcc-l… FCC solicited comments from netops who participate in @RoutingMANRS: see screenshots (source: FCC-22-18A1, §13). #RPKI #BGP
Image
Image
6:37 AM ∙ Sep 16, 2022
10Likes7Retweets

-

Lies. Damn lies. And newspaper headlines.

Twitter avatar for @PeteEtchells
Prof Pete Etchells @PeteEtchells
Take a look at this headline. This is based on an unpublished conference abstract (being presented today at an endocrinology meeting) of a study on rats.
Image
5:57 AM ∙ Sep 16, 2022
953Likes271Retweets
Twitter avatar for @PeteEtchells
Prof Pete Etchells @PeteEtchells
The research finds nothing of the sort. They exposed immature rats to 6/12 hrs of intense blue light. There is nothing remotely relevant to screens or childhood puberty in this study.
5:58 AM ∙ Sep 16, 2022
275Likes46Retweets

-

Twitter avatar for @amasad
Amjad Masad ⠕ @amasad
I grew up in the golden age of SQL injections but GPT3 injections just hit different 🤣
Image
Image
Image
Image
2:19 AM ∙ Sep 16, 2022
5,130Likes1,002Retweets

The Info Op is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.

Don't miss what's next. Subscribe to the grugq's newsletter:
X