the grugq's newsletter
Archives
Search archives...
Subscribe
July 10, 2025
July 10, 2025
July 10, 2025 How can the Government best protect the UK against grey zone threats? We have published a report. Read our recommendations...
July 9, 2025
July 9, 2025
July 9, 2025 AI voice clones have hit the White House AGAIN, now impersonating the Secretary of State to other Gov officials to try to steal...
July 8, 2025
July 8, 2025
July 8, 2025 🇺🇸 #US: A Homeland Security operation took place at the MacArthur Park in Los Angeles, described in leaked Army documents as a "show of...
July 7, 2025
July 7, 2025
July 7, 2025 my weekend project to learn about bluetooth mesh networks, relays and store and forward models, message encryption models, and a few other...
July 6, 2025
July 6, 2025
July 6, 2025 #SpyNews - week 27 (June 29-July 5):A summary of 91 espionage-related stories from week 27 coming from...
June 5, 2025
July 5, 2025
June 5, 2025 🚨 New APT group “NightEagle” is hacking Microsoft Exchange with stealthy tools and unpatched exploits.Targets? China’s AI, military, and quantum...
July 4, 2025
July 4, 2025
July 4, 2025 Pro-Russian hacktivism: Shifting alliances, new groups… | Intel 471Pro-Russian hacktivism campaigns continued to be directed at countries and...
July 3, 2025
July 3, 2025
July 3, 2025 GitHub - VirtualBox/virtualbox: Source code for Oracle VirtualBoxSource code for Oracle VirtualBox. Contribute to VirtualBox/virtualbox...
July 2, 2025
July 2, 2025
July 2, 2025 Jesko is an excellent reverse engineer and Binary Refinery is a great tool to check out for malware triage: https://t.co/wjWZk3PU6G...
July 1, 2025
July 1, 2025
July 1, 2025 Proofpoint: TA829 is a unique actor... its behavior classifies it as a financially-motivated actor. Following the invasion of Ukraine, TA829...
June 30, 2025
June 30, 2025
June 30, 2025 Today, Microsoft Threat Intelligence Center is proud to announce the release of RIFT, an open-source tool designed to assist malware analysts...
June 29, 2025
June 29, 2025
June 29, 2025 AI and Secure Code Generation AI and Secure Code Generation | Lawfare AI is reshaping code security—shifting metrics, unknown bugs, and...
June 28, 2025
June 28, 2025
June 28, 2025 “On 12 June 2025, dozens of anonymous X (formerly Twitter) accounts advocating Scottish independence abruptly went silent…Their sudden...
June 27, 2025
June 27, 2025
June 27, 2025 I'm excited to announce our "Out-of-Band" series; focused on the security risks of management devices like BMCs, serial servers, and KVMs....
June 25, 2025
June 25, 2025
June 25, 2025 doing surveillance to the surveillance state https://www.404media.co/fucklapd-com-lets-anyone-use-facial-recognition-to-instantly-identify-...
June 24, 2025
June 24, 2025
June 24, 2025 RUSI Experts react to US strikes on Iran's nuclear facilities - click below for analysis from @BurcuAOzcelik, @MTSavill, and @DDolzikova....
June 23, 2025
June 23, 2025
June 23, 2025 Stacca Stacca! This is an amazing film. Part of an italian TV documentary it shows two hackers doing some hacking via X.25 into a US military...
June 22, 2025
June 22, 2025
June 22, 2025 https://t.co/kZuTtTS9dVPretty cool experimentation work from the Infoblox team to speed up the boring work of web searches for open source...
June 21, 2025
June 21, 2025
June 21, 2025 Your average non-state APT doesn't use browser exploits for initial access. They don't give a shit about the kernel or the EDR, they don't...
June 20, 2025
June 20, 2025
June 20, 2025 Package Hallucinations: How LLMs Can Invent Vulnerabilities | USENIX I’ve started joining every Google Meet 30 seconds early.When you join...
Newer archives
Older archives