Jean-Louis Huynen

Mad scientist

Jean-Louis Huynen boosted:
Alexandre Dulaunoyadulau@infosec.exchange
2025-10-15

One year, I had a chat with the fine people @suricata during the @cert_eu conference, and they were wondering why we didn't create an open source website for all the different rules (YARA, Suricata, and many others) β€” a place to allow comments, reviews, bundling, and integration with @misp.

We’ve just released the first beta version of the rulezet.org service! πŸŽ‰

The platform is open and publicly available and the entire back-end is fully open source.

It’s still in beta, so feedback is very welcome!

πŸ”— rulezet.org/

#cti #yara #threatintelligence #osint #dfir #cybersecurity #suricata

@misp
@circl

rulezet.org screenshot of a Suricata rule.rulezet.org screenshot of a list of rules.
Jean-Louis Huynen boosted:
Unlock Your BrainUYBHYS@infosec.exchange
2025-10-09

#UYBHYS [Samedi 8/11 11h15] TALK de CΓ©dric Bonhomme (@cedric) et Alexandre Dulaunoy (@adulau) du @circl :

Advancing Vulnerability Tracking and Disclosure Through an open and distributed platform

unlockyourbrain.bzh/conferences

#UYBHYS25

Bannière UYBHYS avec les photos des intervenants, le titre du talk et les sponsors de la conférence
Jean-Louis Huynen boosted:
2025-09-03

Flowintel release version 2.0.0 with a new UI

Flowintel is an open-source platform designed to help analysts and incident responders manage, investigate, and collaborate on cases efficiently.

πŸ”— github.com/flowintel/flowintel

#opensource #dfir #threathunting #misp

@misp

Jean-Louis Huynen boosted:
abuse.ch :verified:abuse_ch@ioc.exchange
2025-06-20

We are happy to announce the integration of @kunai_project Linux Sandbox on MalwareBazaar πŸ₯³

Sample ELF X86 report ‡️
bazaar.abuse.ch/sample/0d2211b

Jean-Louis Huynen boosted:
2025-06-10

πŸŽ‰ Just dropped a new Kunai release! πŸŽ‰

We've been working hard on some exciting new features and performance boosts that we can't wait for you to try out! Here's what's new:

New Features:
πŸ” Track io_uring operations with new io_uring_sqe events!
πŸ“ Get more context with parent command line information for execve and execve_script events.
πŸ”Ž Get information about matching filtering rules in final events.
πŸ§ͺ Test your filters with ease using the new test command.

Improvements:
⚑ Experience performance boosts thanks to changes in the event matching engine and code refactoring.

Ready to dive in? Check out the full release notes here: github.com/kunai-project/kunai

Don't hesitate to give Kunai a try and share your feedback! Let's make Kunai even better together!

#Linux #ThreatHunting #ThreatDetection #DFIR #DetectionEngineering #OpenSource

Jean-Louis Huynen boosted:
Alexandre Dulaunoyadulau@infosec.exchange
2025-06-03

The hackathon FIRSTCON25 takes place physically at 37th ANNUAL FIRST CONFERENCE on Sunday 22nd June in Copenhagen.

GCVE.eu topic has been added to the hackathon.

πŸ”— About the hackathon discourse.ossbase.org/c/hackat
πŸ”— GCVE.eu topic discourse.ossbase.org/t/gcve-e
πŸ”— Registration pretix.eu/circl/hackathonfirst

@firstdotorg @gcve @ddu @jtk @gallypette

#gcve #vulnerability #opensource #hackathon #cve #firstcon25

Jean-Louis Huynen boosted:
2025-06-02

πŸš€ New Blog Post: Kunai vs io_uring (why.kunai.rocks/blog/kunai-vs-) πŸš€

πŸ’‘ Ever wondered how io_uring revolutionizes I/O operations in the Linux kernel? Inspired by Armo's blog post (armosec.io/blog/io_uring-rootk) about a PoC rootkit using io_uring, we explored this feature's security implications and how tools like Kunai can monitor these operations.

πŸ” Key Takeaways:
πŸ”Ή io_uring boosts I/O performance by reducing system call overhead and enabling asynchronous operations
πŸ”Ή Security tools struggle to monitor io_uring due to its unique handling of operations
πŸ”Ή Kunai now provides visibility into io_uring operations, though blocking malicious activities remains challenging
πŸ”Ή Recent kernel versions have introduced auditing and security controls for io_uring, but these are still limited

πŸ“– Read more: why.kunai.rocks/blog/kunai-vs-

#Linux #io_uring #Security #OpenSource #ThreatDetection #SOC #DFIR

Jean-Louis Huynen boosted:
2025-04-28

If you didn't buy your #BSidesLuxembourg2025 ticket yet, why not?

We're hoping you'll like the 6 PARALLEL TRACKS, 3 with hands-on hacking workshops and similar, 3 with talks, including the security management/CLUSIL track for Security Managers, architects, CISOs and so on!

The schedule is here --> pretalx.com/bsidesluxembourg-2

Jean-Louis Huynen boosted:
Alexandre Dulaunoyadulau@infosec.exchange
2025-04-19

@circl and by the way, we just launched πŸ”— gcve.eu/

GCVE: Global CVE Allocation System

The Global CVE (GCVE) allocation system is a new, decentralized approach to vulnerability identification and numbering, designed to improve flexibility, scalability, and autonomy for participating entities.

While remaining compatible with the traditional CVE system, GCVE introduces GCVE Numbering Authorities (GNAs). GNAs are independent entities that can allocate identifiers without relying on a centralised block distribution system or rigid policy enforcement.

Mastodon account for GCVE - @gcve

Jean-Louis Huynen boosted:
Γ‰ric LeblondRegit@infosec.exchange
2025-04-12

Massive contribution to @suricata by
Todd Mortimer from the Canadian Centre for Cyber Security (cyber.gc.ca/en). The HTTP support is now handled by a Rust crate: github.com/OISF/suricata/commi
This is so good to see contributions from governmental organization to common good.

Jean-Louis Huynen boosted:
Alexandre Dulaunoyadulau@infosec.exchange
2025-04-12

Over 22 real contributions and project outcomes came out of our two-day hackathon in Luxembourg, truly impressive work! The collaboration and energy were next-level.

Glad to share that we'll also be hosting a smaller hackathon at @firstdotorg’s annual conference in Copenhagen on Sunday 22nd June . See you there! πŸ’₯ #Hackathon #FIRSTcon25

#hackathon #opensource #csirt #cybersecurity

πŸ”— hackathon.lu 2025 - Outcome and results details hackathon.lu/2025/04/11/hackat

πŸ”— hackathon at FIRSTCON25 discourse.ossbase.org/c/hackat

A dedicated fediverse account has been created to follow the hackathon topics

@hackathonfirstcon25

@ddu and @gallypette will also coordinate the hackathon with me.

Jean-Louis Huynen boosted:
Alexandre Dulaunoyadulau@infosec.exchange
2025-04-07

For the hackathon in Luxembourg, we’ve set up @hackathon-lu, a bridge to the Discourse forum for the event.

πŸ”— discourse.ossbase.org/c/hackat

If you want to follow what’s happening during the hackathon for the next two days, you can subscribe to @hackathon-lu

#hackathon #cybersecurity #opensource #luxembourg

πŸ”— hackathon.lu/

Jean-Louis Huynen boosted:
2025-03-20

🚨 Alert: The use of #Spyware and an attack on #Encryption have been tabled in the French Parliament. These measures pose a serious threat to everyone’s online privacy and security.

In an urgent letter to members of the French National Assembly, 22 digital rights organisations from all around Europe, including EDRi, call to reject the proposed articles.
edri.org/wp-content/uploads/20

EDRi-member @LaQuadrature is mobilising against the β€žnarcotraficβ€œ legislation:
laquadrature.net/en/warondrugs
#PPLNarcotrafic

Visual with two CCTV cameras on one side, symbolising surveillance, and a lock on the other, symbolising encryption. Symbol of an "open letter" and labelled "22 organisations call to protect digital rights and freedoms in French draft "narcotrafic" law." EDRi logo.
Jean-Louis Huynen boosted:
2025-02-27

TR-93 - Financial transaction fraud after system compromise.

This document outlines a malspam attack targeting businesses through fraudulent emails that exploit Remote Monitoring & Management (RMM) tools. The attackers deceive recipients into clicking a malicious link disguised as an invoice, which installs an RMM tool on their system. Since these tools are legitimate applications, they evade antivirus detection.

#cybersecurity #fraud #dfir

πŸ”— circl.lu/pub/tr-93/

Jean-Louis Huynen boosted:
Alexandre Dulaunoyadulau@infosec.exchange
2025-02-25

Super happy to see the open source sysdiagnose joining the hackathon.lu held in Luxembourg on April 8th and 9th, 2025.

sysdiagnose is an open-source framework developed to facilitate the analysis of the Apple sysdiagnose files and especially the one generated on mobile devices (iOS / iPadOS). In the light of targeted attacks against journalists, activist, representatives from the civil society and politicians, it empowered incident response team to review device behaviour and ensure their integrity. This tool is initially the result of a joint effort between EC DIGIT CSOC (European Commission DG DIGIT) and CERT-EU (cert.europa.eu/).

hackathon.lu/projects/#sysdiag

Don't hesitate to register and add your project!

#opensource #dfir #forensic #hackathon #luxembourg

Thanks to @ddu and the team to join us.

Jean-Louis Huynen boosted:
Alexandre Dulaunoyadulau@infosec.exchange
2025-02-22

We imported the data from Black Basta Ransomware group leak into AIL and there are many interesting aspects.

  • The federation network of Matrix servers (see the screenshot) used to communicated among the affiliates/group(s).

  • Activities in the chat room, especially the daily activity view in AIL. Guessing the location and timezone of groups or affiliates is an endless source of information.

  • They rely on many open-source and SaaS tools, including Google Docs or Zoom.

  • Many interesting correlations with cryptocurrencies, IP addresses, CVE numbers, and chat username relationships (who talks to whom and when).

If you are using AIL project and want to import the leak dataset, @terrtia did an importer github.com/ail-project/ail-fee

#BlackBasta #blackbastleaks #threatintel #osint #threatintelligence #opensource #dataset

@ail_project

Maybe some interesting input for @fr0gger for his existing analysis.

I see that this dataset can be used to enhance some of our open-source tools.

github.com/ail-project/ail-fra

Lists of Matrix server references involved in the Black Basta ransomware group leak. The data has been imported to AIL.Activities in the chat room, especially the daily activity view in AIL.Many interesting correlations with cryptocurrencies, IP addresses, CVE numbers, and chat username relationships (who talks to whom and when).
Jean-Louis Huynen boosted:
2025-02-19

πŸš€ New Kunai Patch Release! πŸ”₯

This update brings important fixes:
βœ… Fix probe tripping the eBPF verifier affecting Linux v5 (only on AArch64)
βœ… Improved compatibility with kernels β‰₯ 6.11

πŸ”— check it out: github.com/kunai-project/kunai

#opensource #linux #threathunting #dfir

Jean-Louis Huynen boosted:
Alexandre Dulaunoyadulau@infosec.exchange
2025-02-19

The famous library called Lacus behind @ail_project to perform web capture in headless mode, has been released as version 1.13.0

The new version has a mode to perform web capture with a headed browser.

Thanks to @rafi0t for the continuous work on the library.

#cybersecurity #threatintel #opensource #threatintelligence

πŸ”— Release notes github.com/ail-project/lacus/r
πŸ”— Project page github.com/ail-project/lacus

Lacus project logo
Jean-Louis Huynen boosted:
2025-02-09

I’m sure the same assholes that effectively murdered Aaron Swartz for attempting to make academic research accessible to all will now be shutting down Meta over this. Yep, no doubt at all.

arstechnica.com/tech-policy/20

#Meta #Facebook #BigTech #AI

Jean-Louis Huynen boosted:
2025-02-08

With the release of Vulnerability Lookup 2.5, the online service at CIRCL has been updated to include a new feature: vulnerability notifications for monitored vendors and products.

πŸ”— Online service vulnerability.circl.lu/

πŸ”— 2.5 release notes vulnerability-lookup.org/2025/

#vulnerability #cve #cybersecurity #opensource #opendata

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst