#OpenSourceSecurity

2025-04-30

Thank you Brittany Day, Linux Security for your insightful coverage of #VulnCon25!

This article highlights critical developments in vulnerability management including metadata improvements, supply chain security measures, EU Cyber Resilience Act impacts and emerging security baseline standards.

Read more: go.first.org/zeokh

#cybersecurity #OpenSourceSecurity #VulnerabilityManagement

Simon Roses Femerlingsimonroses@infosec.exchange
2025-04-29

Version 0.2 of Bytes Revealer is out. @vulnexsl open source and powerful hex editor, Cool new features: export analysis de JSON, Data Inspector, light/dark mode, detailed file signatures, and more! Enjoy 😊 #reversing #AppSec #CyberSecurity #opensource #opensourcesecurity bytesrevealer.online

2025-04-29

Join us for this week's security communications drill designed to strengthen your communication skills during the chaos of a critical open-source vulnerability!

You’ll practice:

➡️ Creating effective technical communications for diverse stakeholders
➡️ Managing sensitive non-public vulnerability information
➡️ Coordinating emergency response across engineering teams
➡️ Balancing immediate mitigation with long-term security strategy
➡️ Leveraging personal relationships in the open-source community

Remember, you can now choose from two different time slots to fit your schedule. 💛

Register at DiscernibleInc.com/drills

#IncidentResponse #SecurityComms #OpenSourceSecurity

2025-04-28

This episode of #OpenSourceSecurity I chat with Dimitri Stiliadis of @endorlabs about the tj-actions/changed-files backdoor

Endor did some great research into how many repos were affected and we cover some of the background on this attack. It's way weirder than you can imagine

opensourcesecurity.io/2025/202

2025-04-25

Breaking threat alert from DigitalOcean and Microsoft Azure! Mass exploitation campaign detected by actor codenamed Goofy Khaki Flamecrest. Find out about the 4 key events that characterized the campaign 👇

On the 15th of April, we detected a coordinated exploitation effort that included over 1,300 machines at its peak. The machines were small to medium-sized VPCs in public clouds such as Microsoft Azure and DigitalOcean. Using our comprehensive threat intelligence data, we were able to get a clear view of the exploitation campaign.

🔥Campaign Timeline:
The campaign timeline can be divided into 4 key sections:

1. 8th of April: The attacker launches a small-scale reconnaissance campaign using ~100 rented machines from a small Indonesian-based company. The reconnaissance involves exploits such as CVE-2021-41773 and CVE-2021-42013 for Apache Server to find vulnerable web servers.

2. 13th of April: The attacker kicks off the attack and delivers payloads using the previously used machines. The attack self-propagates as captured machines quickly start infecting other machines. At the peak of the two-day campaign, CrowdSec observed around 1,300 IPs from a broad range of server providers.

3. 16th of April: On the 3rd day of the campaign, the first cloud provider steps in with remediation. Microsoft Azure takes down all infected machines in direct action, dropping around ~400 machines from the network. Other server providers follow suit over the next few days.

4. 20th of April: DigitalOcean, the last remaining big provider, stops the propagation of Goofy Khaki Flamecrest on its servers. The attack gradually fades, leaving roughly 20 machines from various smaller Autonomous Systems operational.

💡 Further Information
🔹The most aggressive IPs involved in Goofy Khaki Flamecrest can be tracked using the CrowdSec CTI: app.crowdsec.net/cti?q=classif"Attacker+Group%3A+goofy+khaki+flamecrest"+AND+(reputation%3Amalicious+OR+reputation%3Asuspicious+OR+reputation%3Aknown)&page=1

🔹At the time of the detection, about 50% of the IPs involved in the attack were flagged as malicious in our Threat Intelligence database.

🔹The attack shows that fast response by VPC providers is an important metric to track. The longer affected machines stay online, the more opportunities arise to propagate the attack. Smaller MSSPs are especially vulnerable, as a failure to act can result in their IP ranges being blocked by other providers.

✅ Keeping tabs:
If you are an MSSP looking to get ahead of even Microsoft in taking down infected machines, you can inquire our sales team about Am I Attacking, a bespoke service where we proactively monitor your IP ranges to alert you if one of your machines starts showing up on our radar: crowdsec.net/business-requests

#cybersecurity #cohortattack #threaintel #opensourcesecurity #infosec #zeroday #blueteam

2025-04-23

📬 You've Got Mail – and It's Full of Good Stuff!
Sign up for our newsletter and stay in the loop with:

🔄 Monthly updates
💡 Security insights & tips
💸 Exclusive deals
🚫 100% spam-free – promise!

Open your inbox to smarter, safer content.
👉 Subscribe now! newsletter.cryptomator.org/sub

#PrivacyFirst #CyberSecurity #DataProtection #NewsletterSignup #TechTips #NoSpam #OpenSourceSecurity #InboxUpgrade #Cryptomator #Newsletter

Green background with a large white envelope icon in the center. The text above says “YOU'VE GOT MAIL!” and below “OPEN NOW!” – promoting a newsletter subscription.Green background featuring an open envelope with a lock-themed robot inside. Above it is the text “Subscribe to our newsletter and receive:” followed by bullet points for “Monthly updates”, “Interesting insights”, “Latest deals”, and “No spam”.
2025-04-21

📻 I enjoyed the #OpenSourceSecurityPodcast this week with

👤 infosec.exchange/@joshbressers and
👤 @popey
of
🏢 @anchore

I used #Syft/ #Grype on a few OCI containers recently and was horrified to discover one had some nasty issues lurking within.

Great tools which I intend to use any time I handle OCI containers. Looking forward to trying Grant soon.

Thank you

🔗 opensourcesecurity.io/2025/202
🔗 anchore.com/opensource/

#OpenSourceSecurity
#CyberSecurity
#SBOM
#Vulnerabilities

Viktor Peterssonvpetersson@hachyderm.io
2025-04-16

One typo can open the door to malicious code.

On the latest episode of Nerding out with Viktor, we examine the ongoing threat of package squatting and why naming is a security issue.

How safe are your dependencies, really?

vpetersson.com/podcast/S02E07.

#DevSecOps #OpenSourceSecurity #SoftwareSupplyChain

2025-04-15

Think APTs and open source don't mix? Think again. Sadly, it's happening right now. 🤯

Case in point: UNC5174 (with suspected China links) is actually using tools like SNOWLIGHT & VShell to hit Linux systems.

It's just another stark reminder, isn't it? Open source is fantastic, no doubt, but it's definitely not secure right out of the box. You've *really* got to be smart about the tools you choose and make sure those systems are properly hardened.

And get this – AI is apparently even helping attackers figure out new ways to misuse these tools. Just great. 🤦‍♂️

On the bright side, this is exactly the kind of nasty surprise a thorough pentest can dig up. Believe me, clients are always *way* happier when we find these things before the actual threat actors do. 😉

So, what have you seen out there regarding open source security? And what are your go-to tools for locking down Linux environments? Let's hear it! 🤔

#APT #Linux #Security #Cybersecurity #OpenSourceSecurity

Linux Foundation Europelfeurope
2025-04-11

🚨 62% of open source stewards lack dedicated personnel for incident response—a key CRA requirement.

Learn more in our full report: linuxfoundation.org/research/c

BIOS level hacking has always been one of the stealthiest and most dangerous forms of attack. Operating beneath the OS, malware embedded in firmware can survive drive wipes and reinstalls. While rare, these attacks are very real. From state actors using BIOS implants for espionage to researchers demonstrating how firmware can be weaponized, this layer is often ignored until it is too late. Projects like Libreboot and Coreboot aim to replace proprietary firmware with open alternatives, giving users more control and reducing the risk of hidden vulnerabilities.

#FirmwareSecurity #BIOSHacking #Coreboot #Libreboot #CyberSecurity #LowLevelThreats #OpenSourceSecurity

2025-04-09

🚨 OpenSSF community is heading to Denver for #OpenSSFCommunity Day NA 2025 on June 26!
AI security, SBOM tooling, real-world TTX, and more — all in one day.
🌄 Co-located with #OSSummit
🛡️ Agenda is live — register now!
🔗 openssf.org/blog/2025/04/09/op
#CyberSecurity #OpenSourceSecurity

ActiveStateactivestate
2025-04-08

AI is transforming vulnerability management.

Discover how AI-powered Software Posture Management (SPM) is changing the game for vulnerability detection and remediation. From proactive risk management to smarter decision-making, learn how enterprises can secure their software supply chains with confidence.

Read the blog to explore the future of AI in vulnerability management: activestate.com/uncategorised/

2025-04-07

This episode of #OpenSourceSecurity talks to @predrag about cargo-semver-checks

it's a #Rust tool that can help you figure out if you broke #semver, it's pretty awesome

We also touch on the difficulty of detecting breaking changes, sustainable open source, and what's to come for semver checking

It's a fun chat and you'll learn a lot

opensourcesecurity.io/2025/202

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst