the grugq's newsletter
Archives
Search...
Subscribe
August 7, 2025
August 7, 2025
August 7, 2025 This might be the first time the Swiss weren't able to reach a financial deal with nazis [contains quote post or other embedded content] — Sam...
August 6, 2025
August 6, 2025
August 6, 2025 https://www.usenix.org/conference/usenixsecurity25/presentation/beitis KGB Stuff by Filip Kovacevic | SubstackKGB secrets you may want to know...
August 4-5, 2025
August 5, 2025
August 4-5, 2025 ai app so good it XSSes itself pic.twitter.com/4CdK2dwQqY— PatRyk (@Patrosi73) August 3, 2025 For years I have heard that MacOS is more...
August 3, 2025
August 3, 2025
August 3, 2025 Weeks ago I shared on LinkedIn about my quick thoughts why LLMs are useful for web pentesting:“IMO why LLMs are helpful in web black box...
August 2, 2025
August 2, 2025
August 2, 2025 [2506.11060] Code Researcher: Deep Research Agent for Large Systems Code and Commit HistoryLarge Language Model (LLM)-based coding agents have...
August 1, 2025
August 1, 2025
August 1, 2025 boB Rudis 🇺🇦 🇬🇱 🇨🇦: "🆕 GreyNoise Research: Early Warning Signals Befor…" - MastodonAttached: 2 images 🆕 GreyNoise Research: Early Warning...
July 31, 2025
July 31, 2025
July 31, 2025 Interesting and detailed explanation of how smartphones can be intercepted through the vulnerabilities of the SS7 signaling...
July 30, 2025
July 30, 2025
July 30, 2025 Top Lawyer for National Security Agency Is Fired https://t.co/kMbvqM95Ml— Dr. Dan Lomas (@Sandbagger_01) July 29, 2025 from "China’s Lessons...
July 29, 2025
July 29, 2025
July 29, 2025 Terence Tao: "In the field of cybersecurity, a distinction is m…" - MathstodonIn the field of cybersecurity, a distinction is made between the...
July 28, 2025
July 28, 2025
July 28, 2025 Modern Binary Exploitation by @RPISEC. This was a university course developed and run solely by students to teach skills in vulnerability...
July 27, 2025
July 27, 2025
July 27, 2025 Just finished a new blog sharing an interesting example demonstrating the power of cross-operating system vulnerability variant analysis! Check...
July 26, 2025
July 26, 2025
July 26, 2025 It's been months since https://t.co/70znqJx6hO went down and (apparently?) lost all of its data. I have a local copy of everything(ish). I made...
July 25, 2025
July 25, 2025
July 25, 2025 https://t.co/bEGbFvtNiE pic.twitter.com/VqkRK8aaYJ— Zack Witten (@zswitten) July 24, 2025 BlackHat-MEA-2024-slides/BH MEA 2024 - Reverse...
July 24, 2025
July 24, 2025
July 24, 2025 Introducing Loki, a software obfuscation approach designed to withstand all known automated deobfuscation attacks.This method efficiently...
July 23, 2025
July 23, 2025
July 23, 2025 https://www.theregister.com/2025/07/21/replit_saastr_vibe_coding_incident/?td=rt-3a MSTIC blog on Sharepoint exploitation At least 3 actors...
July 22, 2025
July 22, 2025
July 22, 2025 The #CIA has to adjust to a world where everyone's activities and movements are being watched and stored and analysed by artificial...
July 20, 2025
July 20, 2025
July 20, 2025 101 Chrome Exploitation — Part 0: Preface We are starting a new series on modern browsers' architecture and their exploitation using Chrome as...
July 19, 2025
July 19, 2025
July 19, 2025 Very interesting view. Social media, traditional media, blogs, etc give voices to single individuals, while LLMs sample among many....
July 18, 2025
July 18, 2025
July 18, 2025 One of the very first tools/projects I released back in early 2022 looked at hosting malware via DNS records and then retrieving+reassembling....
July 17, 2025
July 17, 2025
July 17, 2025 https://t.co/b0CJjfm4eB pic.twitter.com/PhAlnlIKrI— Silas Cutler // p1nk (@silascutler) July 17, 2025 This is so much! 🔥🔥😎Found two new Potato...
Newer archives
Older archives