Alexandre Dulaunoy

Enjoy when humans are using machines in unexpected ways. I break stuff and I do stuff.

The other side is at @a (photography, art and free software at large)

#infosec #opensource #threatintelligence #fedi22 #threatintel #searchable

Alexandre Dulaunoy boosted:
2025-05-28

AIL 6.2 released - Smarter Analysis, Search and Enhanced User Experience

We’re excited to release AIL Framework v6.2, a major update with new features and improved performance. This version makes analysis easier and the overall experience faster and more user-friendly.

Among the highlights are a fully revamped search engine powered by MeiliSearch, improved language detection for short text, local AI-driven image descriptions, and a yara-hunting editor tool.

🔗 ail-project.org/blog/2025/05/2

#darkweb #threatintelligence #threatintel #cti #opensource #osint

AIL Project extracting social network information and extracting the description of the image.
Alexandre Dulaunoy boosted:
2025-05-28

@adulau yes this focus on certification is a real issue of our industry in many aspects... I was also surprised when I saw a NIS2 lead implementer certification and then I realized it was a real PECB certification scheme, all of this while I) the only available Implementing Regulation focus on the digital infrastructure sector/digital service providers and ii) the directive has been transposed in approx only half of the EU countries...

Alexandre Dulaunoy boosted:
Frederic Jacobsfj
2025-05-28
Airplanes being re-routed to protect them from Starship debris
Source: https://x.com/DJSnM/status/1897844400472178841
Alexandre Dulaunoyadulau@infosec.exchange
2025-05-28

Spotted yet another "NIS 2 certified" title on LinkedIn. Impressive, considering NIS 2 doesn't actually have a certification.

Are training agencies just inventing fantasy diplomas so people can avoid reading the actual NIS 2 directive?

Maybe we need a "Certified NIS 2 Reader" badge, read the document once, and you're more qualified than half the certifications out there.

#certification #nis2 #cybersecurity

Alexandre Dulaunoy boosted:
2025-05-28

The DWARF debug format is well-known for debugging executables,
but it is also an effective format for sharing reverse engineering information
across various tools, such as IDA, BinaryNinja, Ghidra, and Radare2.

In this blog post, I introduce a new high-level API in LIEF that allows the
creation of DWARF files. Additionally, I present two plugins designed to export
program information from Ghidra and BinaryNinja into a DWARF file.

lief.re/blog/2025-05-27-dwarf-

(Bonus: The blog post includes a DWARF file detailing my reverse engineering work on DroidGuard)

Alexandre Dulaunoy boosted:
Alexandre Dulaunoyadulau@infosec.exchange
2025-05-27

CVE-2024-4367 (PDF.js) is gaining traction in some exploitation-focused Telegram channels...

vulnerability.circl.lu/cve/CVE

seen via @ail_project

#vulnerability #opensource #threatintelligence #cve #exploit

CVE-2024-4367 (PDF.js) is gaining traction in some exploitation-focused Telegram channels... via AIL project.
Alexandre Dulaunoyadulau@infosec.exchange
2025-05-26

CVE-2024-4367 (PDF.js) is gaining traction in some exploitation-focused Telegram channels...

vulnerability.circl.lu/cve/CVE

seen via @ail_project

#vulnerability #opensource #threatintelligence #cve #exploit

CVE-2024-4367 (PDF.js) is gaining traction in some exploitation-focused Telegram channels... via AIL project.
Alexandre Dulaunoy boosted:
Alexandre Dulaunoya@paperbay.org
2025-05-25

How to Choose an Open Source Project for the Long Term

Many of us face the challenge of selecting open source projects for long-term use. This could involve choosing dependencies for your own open source project, or simply selecting software you plan to run and rely on over time.

📖 foo.be/2025/05/choose-an-open-

#opensource #freesoftware #software #oss #floss #foss

a bigger splash from
https://www.flickr.com/photos/adulau/54512012779/
Alexandre Dulaunoyadulau@infosec.exchange
2025-05-23

@BenAveling I didn’t know that one. It’s the museum of horrors ;-) @mhoye

Alexandre Dulaunoy boosted:
2025-05-22

New version of Lookyloo and Lacus just fresh out of the oven!

These ones are mostly improving the support of proxies thanks to the great Wireproxy.

All the details are in the release notes:

github.com/Lookyloo/lookyloo/r

Alexandre Dulaunoyadulau@infosec.exchange
2025-05-22

The VLAI severity model is doing great with #Ivanti ;-)

#vulnerability #cybersecurity #opensource

The model is completely open source and available to facilitate the ranking or severity based on a description only.

🔗 vulnerability.circl.lu/vuln/cv

= vulnerability.circl.lu C
5: vulnerability p—
-lookup a

CVE-2025-4427 (GCVE-0-2025-

4427)

Vulnerability from cvelistvb

Published

2025-05-13 15:45

Modified

2025-05-21 03:55

Severity ?

5.3 (Medium) -

CVSS:3.1/AV:N/AC:L/PRIN/UIIN/S:U/C:L/IIN/A:

N

VLAI Severity ?

EPSS score ?

61.10% (0.98181)

Summary

An authentication bypass in the API

component of lvanti Endpoint Manager

Mobile 12.5.0.0 and prior allows attackers to

access protected resources without proper

credentials via the API.

References
Alexandre Dulaunoyadulau@infosec.exchange
2025-05-22

@jbm In my opinion, the CRA is more of an exception compared to the standard CVD process. It typically only addresses known exploited vulnerabilities, which usually end up being handled through a standard CVD process under NIS 2.

Alexandre Dulaunoy boosted:
Jean-Baptiste Mailletjbm@infosec.exchange
2025-05-22

Did you know?
CIRCL's vulnerability-lookup is mentioned in the LF/OpenSSF CRA training. (screencap, top left)
vulnerability.circl.lu/
training.linuxfoundation.org/e
@adulau
#circl #vulnerability-lookup #cra

Alexandre Dulaunoyadulau@infosec.exchange
2025-05-21

We implemented a major new feature in the AIL Project that addresses a long-standing issue related to the collection of images or screenshots that may be harmful to analysts (e.g., violent content, CSAM, etc.). The feature allows users to trigger the description of an image before actually viewing it.

The feature will be included in the upcoming release of AIL (version 6.2).

This work is co-funded in the AIPITCH project. We would like to thank Qwen for the open source Qwen2-VL vision-language models which provide an excellent basis for image detection and description while allowing local inferences.

@aipitch @circl @ail_project

#ai #cybersecurity #visual #darkweb #monitoring #threatintelligence #opensource

AIL Project screenshot using the new visual LLM description of images.
Alexandre Dulaunoy boosted:
mhoyemhoye
2025-05-21

Watching Microsoft’s robots telling Microsoft’s other robots that they need to agree to Microsoft CLAs in between Microsoft’s developers begging Microsoft’s robots to actually understand the problems they’re trying to fix in Microsoft's platform code on Microsoft's version-control website is kind of amazing.

This is definitely the future Terry Gilliam promised us.

A screenshot from a Github issue, in which the dotnet-policy-service bot is insisting that the copilot bot read and sign the Microsoft CLA
Alexandre Dulaunoyadulau@infosec.exchange
2025-05-21

@mhoye CLAs are just tools invented by lawyers to exploit human contributions. Seeing a bot get blocked feels like a bit of karmic payback aimed at the legal team.

Alexandre Dulaunoy boosted:
2025-05-21

TR-94 - Ongoing Phishing Campaigns Targeting Microsoft 365 Tenants Lacking Multi-Factor Authentication

We observed more than 48 organisations in Luxembourg with M365 account compromised in the past 7 days starting from 21st May 2025.

🔗 circl.lu/pub/tr-94/

#cybersecurity #office365 #incident #phishing #luxembourg

Alexandre Dulaunoy boosted:
2025-05-19

#MISP connector available in Cyberbro demo thanks to the @circl that allowed it!

#cti #threatintel #osint

cyberbro demo with ioccyberbro demo with ioc
Alexandre Dulaunoy boosted:
2025-05-19

🛠️ Cyberbro has now a #MISP connector!

Use your MISP events to check observables:

- last seen
- first seen
- top 5 latest MISP events
- Research link in MISP

#ioc #cti #threathunting

⬇️⬇️⬇️

github.com/stanfrbd/cyberbro/

Poke @misp @circl

image of cyberbro report with MISP integrationimage of cyberbro report with MISP integration
Alexandre Dulaunoy boosted:
2025-05-19

The hack.lu 2025 Call for Papers closes in just 1 day! If you’ve been planning to submit a talk, workshop, or lightning talk — now’s the time to do it.

#conference #luxembourg #infosec #hacklu2025 #hacklu #cybersecurity

🔗 hack.lu/blog/hack.lu-2025-call

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst