the grugq's newsletter
Subscribe
Archives
September 22, 2024
September 22, 2024
September 22, 2024 "Kyrylo Budanov, Chief of the Defence Intelligence of Ukraine, provided substantiated evidence that Russian special services have access...
September 21, 2024
September 21, 2024
September 21, 2024 https://www.bunniestudios.com/blog/2024/turning-everyday-gadgets-into-bombs-is-a-bad-idea/ Introduction to Security...
September 20, 2024
September 20, 2024
September 20, 2024 Most of cryptography research is developing a really nice mental model for what’s possible and impossible in the field, so you can avoid...
September 19, 2024
September 19, 2024
September 19, 2024 New: police have hacked Ghost, an encrypted app used by organized crime. I think this shows a fundamental shift: criminals are no longer...
September 18, 2024
September 18, 2024
September 18, 2024 The actual details of the pager attack, as reported by Reuters, are more interesting than I speculated earlier. They boomdoored the pagers...
Hezbollah Hacked? Pager Panic!
September 18, 2024
Hezbollah Hacked? Pager Panic! A supplement post to collect information on the attack targeting Hezbollah's pagers. Obviously, this is still a developing...
September 17, 2024
September 17, 2024
September 17, 2024 From Rob Heaton's blog: https://t.co/1knGydWYgJ— Andy Kong (@oldestasian) September 15, 2024 We’re launching the public beta phase of our...
September 16, 2024
September 16, 2024
September 16, 2024 How Lazarus Group laundered $200M from 25 hacks How Lazarus Group laundered $200M from 25+ crypto hacks to fiat … — Investigations By...
September 15, 2024
September 15, 2024
September 15, 2024 Security Phd: run fuzzers for days and get an unexploitable bug 🤡 Game console players: look at the fbsd kernel for 15 minutes and find a...
September 14, 2024
September 14, 2024
September 14, 2024 Interesting vector, ever seen this before @_JohnHammond? pic.twitter.com/oAkaXgnRBI— Mohamed Aruham #boleh (@aruhamm) September 12, 2024...
September 12-13, 2024
September 13, 2024
September 12-13, 2024 Recovering a full PEM Private Key when half of it is redactedhttps://t.co/esd8tEPf3n— Simone Margaritelli (@evilsocket) September 9,...
September 11, 2024
September 11, 2024
September 11, 2024 Photos released in Aug. 2024 reportedly showing US Special Forces training on CNE/CNA operations to disrupt and/or gain access to their...
September 10, 2024
September 10, 2024
September 10, 2024 Read this as the Hall of Meat pic.twitter.com/9Xza91h52M— Classical Studies Memes for Hellenistic Teens (@CSMFHT) September 9, 2024 My...
September 9, 2024
September 9, 2024
September 9, 2024 (CVE-2024-3914)[330759272][Pwn2Own 2024][DOMArrayBuffer]DOMArrayBuffer confused about ownership of backing buffer -> UAF is now open with...
September 8, 2024
September 8, 2024
September 8, 2024 Cracking an old ZIP file to help open source the ANC's "Operation Vula" secret crypto code This is quite cool. John Graham-Cumming's blog:...
September 7, 2024
September 7, 2024
September 7, 2024 The state of sandbox evasion techniques in 2024 https://fudgedotdotdot.github.io/posts/sandbox-evasion-in-2024/sandboxes.html Deep Linux...
September 6, 2024
September 6, 2024
September 6, 2024 This is a cool project, shows you what percentage of ads you’re blocking. Tried it on wifi with @The_Pi_Hole doing its thing then on 5G,...
September 4-5, 2024
September 5, 2024
September 4-5, 2024 Interesting paper on abusing the BPF infrastructure to bypass Linux kernel isolation techniquehttps://t.co/McFKINejmf#Linux #infosec...
September 3, 2024
September 3, 2024
September 3, 2024 Presentation slides from #HITB2024BKK are available for download here: https://t.co/CExLbj9CBZ— HITBSecConf (@HITBSecConf) September 3,...
September 1-2, 2024
September 2, 2024
September 1-2, 2024 a brief history of barbed wire fence telephone networks] a brief history of barbed wire fence telephone networks – loriemersonIf you look...
August 31, 2024
August 31, 2024
August 31, 2024 the first podcast that listens to you!! https://t.co/QSWLDmKK7u— Mick Baccio (@nohackme) August 29, 2024 ⚠️ Breaking: North Korea just burned...
August 30, 2024
August 30, 2024
August 30, 2024 I've finally finished my series of security frameworks. Security Operations: https://t.co/X37hqWvFva Product Security:...
August 29, 2024
August 29, 2024
August 29, 2024 As MSRC finally confirmed the two bugs, I have a "protip" to share w/ my fellow researchers.. 😅https://t.co/xy4MqzJ3Gd— Haifei Li (@HaifeiLi)...
August 28, 2024
August 28, 2024
August 28, 2024 Members of my CTF team & the SPS train repair company will meet NEWAG, the train manufacturer, in court on Wednesday (you might remember the...
August 27, 2024
August 27, 2024
August 27, 2024 I've written about AI doing realtime alteration to video directly on the phone. We're getting closer to that being a very interesting...
August 26, 2024
August 26, 2024
August 26, 2024 An epilogue 10yrs in the making sees arrests of those behind the first ransomware-as-a-service model, now fuelling today's cybercrime...
August 25, 2024
August 25, 2024
August 25, 2024 People say China is a near peer but evidence says we are the near peer. https://t.co/4eFLVq27eb— Dave Aitel (@daveaitel) August 24, 2024...
August 24, 2024
August 24, 2024
August 24, 2024 History: How to Build a Bugging Device in 1917 Kevin's Security Scrapbook: History: How to Build a Bugging Device in 1917News & Tips on...
August 23, 2024
August 23, 2024
August 23, 2024 Let's explore China’s 0-day vulnerability research capabilities. I’ve long been intrigued by the prolific nature of Chinese teams in...
August 22, 2024
August 22, 2024
August 22, 2024 Deadbeat dad faked his own death by hacking government sites https://www.theregister.com/2024/08/21/man_jailed_faking_death_online/ Data...
August 21, 2024
August 21, 2024
August 21, 2024 One of Munich's most famous landmarks is Karlsplatz/Stachus. During the Cold War, it was a centre of intelligence services. Nowhere else in...
August 20, 2024
August 20, 2024
August 20, 2024 The time has come, and with it your reading material for the week. Phrack #71 is officially released ONLINE! Let us know what you...
August 19, 2024
August 19, 2024
August 19, 2024 Are Geofence Warrants Headed for Extinction? https://www.americanbar.org/groups/criminal_justice/publications/criminal-justice-...
August 18, 2024
August 18, 2024
August 18, 2024 What we're finding @trailofbits more and more: fuzzing bests formal verification for all but the most narrow use...
August 17, 2024
August 17, 2024
August 17, 2024 Chinese Backdoor Alert! Security enhancements on Mifare Classic cards used in hotels/business contain a supply chain backdoor making reading...
August 15-16, 2024
August 16, 2024
August 15-16, 2024 Yes EvilEmpire ASN (hosting c2) aka TNSECURITY aka Russian propaganda networks are now openly buying 0days using a front company...
August 14, 2024
August 14, 2024
August 14, 2024 Great research from my colleagues @CyberCX into a China based network attempting social media interference against the West. As ever these...
August 13, 2024
August 13, 2024
August 13, 2024 A quote from the launch of Google Project Zero in 2014: “We’re really going to make a dent in this problem,” Evans says. “Now is a very good...
August 12, 2024
August 12, 2024
August 12, 2024 So cool to see my vulnerability research automation work integrated into such a powerful tool! Keep it up ✊ https://t.co/jsBlS1j0LC—...
August 11, 2024
August 11, 2024
August 11, 2024 Just re-upping this amazing podcast which I think is one of our best of the year https://t.co/7eTTrL9Lvr— Ryan Evans (@EvansRyan202) August...
August 10, 2024
August 10, 2024
August 10, 2024 The biggest risk from cyber attacks is businesses with lax resilience failing to rapidly recover. The good news? Most critical national...
August 9, 2024
August 9, 2024
August 9, 2024 wow. an amazing 325 page google strategy document quietly unsealed buried in google antitrust docket. It's gonna take a long thread but I have...
August 8, 2024
August 8, 2024
August 8, 2024 I’m no military security expert (ok, yes I am) but it seems like using Discord for critical comms is bad? Two more videos of Russian soldiers...
The Hostile Hotel
August 8, 2024
The Hostile Hotel Actually, it's good that hotels announced room searches Some hotels in Vegas have alerted their guests there will be daily room searches to...
August 6-7, 2024
August 7, 2024
August 6-7, 2024 Crowdstrike BSOD is actually exploitable for LPE.. https://t.co/OwT68CjDS0 pic.twitter.com/ErQAtzoYvN— Richard Johnson (@richinseattle)...
August 5, 2024
August 5, 2024
August 5, 2024 Nicholas Carlini is one of the sharper people I have ever met and I pay attention to anything he writes; this, on day-to-day utility of LLMs,...
August 4, 2024
August 4, 2024
August 4, 2024 LayeredSyscall – Abusing VEH to Bypass EDRs : https://t.co/PWlPoiLZm9 Bypassing AV/EDR Hooks via Vectored Syscall - POC Vectored Syscall :...
August 3, 2024
August 3, 2024
August 3, 2024 Seems like the Docker Escape (CVE-2024-6222) that our team members, @st424204 ,@n0psledbyte & @tuanit96 presented at Pwn2Own is finally fixed....
August 2, 2024
August 2, 2024
August 2, 2024 The first version of Arcane, formerly known as PowerRemoteDesktop is now available. For those unfamiliar with the project, Arcane is a fully...
August 1, 2024
August 1, 2024
August 1, 2024 I found an old iOS reversing guide I wrote a few years ago, it's a bit dated but I think it's still useful ☺️ https://t.co/kPaHN7zdNv— Ghidra...
Newer archives
Older archives
Twitter