Alexandre Dulaunoy

Enjoy when humans are using machines in unexpected ways. I break stuff and I do stuff.

The other side is at @a (photography, art and free software at large)

#infosec #opensource #threatintelligence #fedi22 #threatintel #searchable

Matrix
@adulau:matrix.circl.lu
PGP FP
6BB5 6353 1D99 F112 4C00 8C4F 815D 4786 1ECB 73D5
Alexandre Dulaunoy boosted:
2025-12-17

Cisco is aware of a potential vulnerability. Cisco is currently investigating and will update these details as appropriate as more information becomes available.

The CPE mentioned is this obscure vulnerability description is "Cisco Secure Email".

CVE-2025-20393

#cve #vulnerabilitymanagement #cybersecurity #cisco #ciscosecureemail

🔗 vulnerability.circl.lu/vuln/CV

Alexandre Dulaunoyadulau@infosec.exchange
2025-12-17

@quinn Maybe Alex K. got the right substance if you are so tired 😇

Alexandre Dulaunoyadulau@infosec.exchange
2025-12-17

Why it matters to create and maintain open-source infrastructure for security monitoring including collection of forums and malicious communication channels.

This is a strong example (Google dark web report is discontinued) of the risks of relying solely on commercial vendors. If a capability does not align with their business interests or generate sufficient revenue, it can be discontinued at any time. Open-source infrastructure helps ensure continuity, transparency, and long-term access to critical monitoring capabilities that are essential for the security community.

If you want to run your own "darkweb" monitoring, we develop open source tooling supporting such monitoring

#darkweb #opensource #osint #cybersecurity

🔗 support.google.com/websearch/a

Alexandre Dulaunoyadulau@infosec.exchange
2025-12-17

@hyc Sounds like a fair deal.

Alexandre Dulaunoy boosted:
Alexandre Dulaunoyadulau@infosec.exchange
2025-12-17

Something that’s been bothering me for years in the security world: why do researchers demand bug bounties for vulnerabilities in open source projects, when the very contributors maintaining and fixing those issues get nothing, just goodwill?

It feels deeply unfair. The burden falls on unpaid maintainers, yet bounty hunters get rewarded. If you want a paid bounty, maybe help fund the people who actually fix the mess too.

#opensource #security #bugbounty

Alexandre Dulaunoy boosted:
2025-12-16
Rust is is not a "silver bullet" that can solve all security problems, but it sure helps out a lot and will cut out huge swatches of Linux kernel vulnerabilities as it gets used more widely in our codebase.

That being said, we just assigned our first CVE for some Rust code in the kernel: https://lore.kernel.org/all/2025121614-CVE-2025-68260-558d@gregkh/ where the offending issue just causes a crash, not the ability to take advantage of the memory corruption, a much better thing overall.

Note the other 159 kernel CVEs issued today for fixes in the C portion of the codebase, so as always, everyone should be upgrading to newer kernels to remain secure overall.
Alexandre Dulaunoy boosted:
2025-12-16

As we approach the end of the year, we have a small gift for everyone.

We ran a series of Rust training sessions as an introduction to the Rust programming language, and we recorded them. The videos, along with the training materials, are now available online.

Thanks to Quentin Jerome and all the participants for their contributions.

📽️ youtube.com/playlist?list=PLhS
🔗 github.com/ngsoti/rust-trainin

#rust #rusttraining #programming #cybersecurity #opensource #training

Alexandre Dulaunoy boosted:
Alexandre Dulaunoya@paperbay.org
2025-12-14

KPI - Key Pointless Indicator should be the proper definition.

#kpi #bureaucracy

Alexandre Dulaunoy boosted:

MISP v2.5.30 and v2.5.29 released: Beta UI/UX Mode, New Workflow modules and Performance Enhancements

This release introduces a foundational beta UI/UX mode (which will be the foundation for the next versions, feedback is more than welcome), new workflow modules, improvements to the Event Index, and important security updates.

🔗 misp-project.org/2025/12/13/mi

#cti #opensource #misp

@cosive
@circl
@cudeso

This release introduces a foundational beta UI/UX mode (which will be the foundation for the next versions, feedback is more than welcome), new workflow modules, improvements to the Event Index, and important security updates.
Alexandre Dulaunoyadulau@infosec.exchange
2025-12-13

BRICKSTORM Backdoor

"The Cybersecurity and Infrastructure Security Agency (CISA) analyzed eight BRICKSTORM samples obtained from victim organizations. BRICKSTORM is a custom Executable and Linkable Format (ELF) Go-based backdoor. "

MISP standard and STIX files available at the following location:

🔗 cti-transmute.org/convert/deta

@misp
@cisacyber

#backdoor #cti #brickstorm #malware #threatintel #threatintelligence #cybersecurity

Alexandre Dulaunoy boosted:
2025-12-12

AIL v6.6 is a release with a strong focus on PDF ingestion (captured from social networks or other collection sources) and translation, crawler improvements, and operational enhancements across users, queues, and metadata handling.

This version significantly expands AIL’s document-processing and data-collection capabilities by introducing a hardened PDF ingestion pipeline where all PDFs are converted to PDF/A and stripped of embedded metadata before ingestion to remove malicious content.

It also allows users to browse content locally with Lacus and send captured pages directly to AIL as crawler data, along with associated browser cookies and local storage imported as a cookiejar for reuse by the crawler, while continuing to improve reliability, scalability, and analyst workflows.

ail-project.org/blog/2025/12/1

#cti #opensource #threatintelligence #ail #darkweb #cybersecurity #intelligence #osint

@circl
@terrtia

The PDF metadata are also now considered as new pivot data points (e.g. author name) in AIL to allow correlation among those selectors.The example below is an automatic conversion of PDF document processed in AIL from a chat channel where the translation is done automatically and displayed as an overlay on the original text.
Alexandre Dulaunoy boosted:

MISP v2.5.28 delivers critical security fixes, a major dashboard upgrade to Gridstack 12, and significant platform stability enhancements. This release includes extensive XSS vulnerability patching, refined tag filtering logic, and better support for meta Communities.

Don't forget to update.

#misp #cti #threatintelligence #opensource #cybersecurity

misp-project.org/2025/12/11/mi

Alexandre Dulaunoyadulau@infosec.exchange
2025-12-10

If you want a quick way to install misp-modules, the installation via ‘uv’ is super easy.

#misp #cti #opensource #threatintel

@misp

misp.github.io/misp-modules/in

If you want a quick way to install misp-modules, the installation via ‘uv’ is super easy
Alexandre Dulaunoy boosted:
2025-12-09

React2Shell blog update 🚨 compromised Next.js nodes are rapidly being enlisted into botnets; threat actor activity reaches ~80 source countries; and more. greynoise.io/blog/cve-2025-551
#React2Shell #Nextjs #GreyNoise #ThreatIntel

Alexandre Dulaunoyadulau@infosec.exchange
2025-12-09

GCVE-BCP-02 Published - Version 1.3 (2025-12-09)

We’re pleased to announce the publication of GCVE-BCP-02 – Practical Guide to Vulnerability Handling and Disclosure, now available in its version 1.3.

This Best Current Practice document provides actionable guidance for organisations, researchers, and GCVE Numbering Authorities (GNAs) on managing and disclosing vulnerabilities effectively, both within the GCVE ecosystem and beyond.

🔗 Read it here: (HTML)

gcve.eu/bcp/gcve-bcp-02/

🔗 Read it here: (PDF)

gcve.eu/files/bcp/gcve-bcp-02.

Thank you to everyone contributing to the improvement and adoption of vulnerability handling and disclosure practice!

@gcve@social.circl.lu
@gcve@discourse.ossbase.org
@circl
@vulnerability_lookup

Alexandre Dulaunoyadulau@infosec.exchange
2025-12-07

@ploum

Cela fait des années que l’on devrait investir davantage de temps dans SearXNG (le fork de SearX) et créer des index distribués. Mais c’est lourd et coûteux.

Indexer un mois de Common Crawl (commoncrawl.org/

) nécessite une infrastructure conséquente pour une visibilité finalement assez limitée.

🔗 docs.searxng.org/

🔗 searx.space/

On a beaucoup de briques libres, ce qui est bien, mais la partie search engine reste un point faible.

Alexandre Dulaunoyadulau@infosec.exchange
2025-12-06

@hrbrmstr

Quarto self-publishing is usually great and no need to host at an unstable third-party.

quarto.org/

Alexandre Dulaunoyadulau@infosec.exchange
2025-12-06

We’ve updated the draft GCVE BCP-05 standard to introduce flexible record types, making it easier to extend, enrich, and structure security advisories.

Comments are more than welcome!

#gcve #cve #vulnerability #openstandard

@gcve
@circl

🔗 discourse.ossbase.org/t/gcve-b

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst