Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

adulau@infosec.exchangeA

adulau@infosec.exchange

@adulau@infosec.exchange
About
Posts
10
Topics
5
Shares
0
Groups
0
Followers
0
Following
0

View Original

Posts

Recent Best Controversial

  • I'm happy to announce the long-awaited first release of misp-modules-cli version 1.0.0.
    adulau@infosec.exchangeA adulau@infosec.exchange

    I'm happy to announce the long-awaited first release of misp-modules-cli version 1.0.0.

    This initial release makes it nifty and convenient to use MISP expansion modules directly from the command line, whether you are working against a local or remote misp-modules service. The goal is simple: bring the power of misp-modules into a lightweight CLI workflow that is easy to script, automate, and integrate into daily analysis work.

    #misp #mispmodules #threatintelligence #threatintel #opensource #cli #cybersecurity #osint

    @misp

    πŸ”— Release note https://github.com/MISP/misp-modules-cli/releases/tag/v1.0
    misp-modules-cli https://github.com/MISP/misp-modules-cli
    misp-modules https://github.com/MISP/misp-modules

    Uncategorized misp mispmodules threatintellige threatintel opensource

  • waaah 🀩 cool!
    adulau@infosec.exchangeA adulau@infosec.exchange

    @decio Cool! Let us know if you see anything missing.

    Uncategorized

  • I don't run 'pip install' often enough that uv speed matters to me.
    adulau@infosec.exchangeA adulau@infosec.exchange

    @nicoe uv is pretty cool to run custom version of Python. I bet OpenAI will push some cash on it and then they will drop the support and a fork will appear later.

    Uncategorized python

  • With the recent integration of CERT-VDE’s CSAF advisories, it becomes even clearer why diverse vulnerability data sources are essential.
    adulau@infosec.exchangeA adulau@infosec.exchange

    With the recent integration of CERT-VDE’s CSAF advisories, it becomes even clearer why diverse vulnerability data sources are essential.

    CSAF delivers direct vendor remediation information, and when correlated with the CVE Program , it highlights how important federation and data correlation are for remediation efforts and vulnerability management as a whole. (See example below)

    πŸ”— https://db.gcve.eu/vuln/vde-2025-066

    #gcve #cve #vulnerabilitymanagement #cybersecurity #opensource

    @circl
    @gcve
    @CVE_Program

    Uncategorized gcve cve vulnerabilityma cybersecurity opensource

  • A new pull request for Vulnerability-Lookup adds a CSAF producer that publishes advisories for many manufacturers.
    adulau@infosec.exchangeA adulau@infosec.exchange

    A new pull request for Vulnerability-Lookup adds a CSAF producer that publishes advisories for many manufacturers.

    This is great for defenders and researchers, as it increases the amount of detailed vulnerability information available.

    It will push the number of ingested feeds to more than 50 unique sources, highlighting the growing diversity of our data sources.

    If someone tells you there is a single source of truth for vulnerability information, they’re ignoring the reality: vulnerability intelligence comes from many different sources.

    Thanks to @rafi0t for the continuous work on adding CSAF and feeds to vulnerability-lookup

    #gcve #cve #cybersecurity #csaf #vulnerability #opendata #opensource

    πŸ”— The new PR with many new CSAF sources https://github.com/vulnerability-lookup/vulnerability-lookup/pull/348
    πŸ”— The open source vulnerability-lookup software https://www.vulnerability-lookup.org/
    πŸ”— GCVE instance https://db.gcve.eu/

    @gcve
    @cedric

    Uncategorized gcve cve cybersecurity csaf vulnerability

  • We issued an RFP for the same hardware that we ordered in September 2025.
    adulau@infosec.exchangeA adulau@infosec.exchange

    We issued an RFP for the same hardware that we ordered in September 2025. The quoted price is 3.5 times higher than the previous price for the exact same hardware. In addition, the offer validity is now limited to only three days.

    #memory #aibubble #hardware

    Uncategorized memory aibubble hardware

  • Last April, CISA issued an 11-month extension for its CVE program with MITRE, rescuing the program from an almost certain death.
    adulau@infosec.exchangeA adulau@infosec.exchange

    @metacurity

    There are already many vulnerability identifiers used across different databases and ecosystems. CVE is an important one, but it is only part of a broader and already distributed landscape of vulnerability information.

    If you want to explore the diversity of existing sources including CSAF advisories, GitHub security advisories, and disclosures coming from various regions (including China and Russia).

    You can see examples here:

    Link Preview Image
    Vulnerability-Lookup

    Vulnerability-Lookup - Fast vulnerability lookup correlation from different sources.

    favicon

    (db.gcve.eu)

    Within the context of NIS2, the EUVD is expected to play the role of a reference point at the European level.

    In practice, this makes the handling of cross-references between different identifiers particularly important. While reference catalogues can exist, the assurance and publication of vulnerability information will likely remain (and increase) distributed across many contributors.

    @jbm @joshbressers

    Uncategorized

  • We are aware of recent reports regarding targeted phishing attacks that have resulted in account takeovers of some Signal users, including government officials and journalists.
    adulau@infosec.exchangeA adulau@infosec.exchange

    @signalapp Since Signal always asks for a PIN code for backups, it seems logical that threat actors are exploiting this behavior to trick users.

    Uncategorized

  • I hate Discord.
    adulau@infosec.exchangeA adulau@infosec.exchange

    @eragon At least you can pull-requests on the discourse repository to fix your issues πŸ˜‰

    Chat Protocols and Apps opensource discourse

  • I hate Discord.
    adulau@infosec.exchangeA adulau@infosec.exchange

    I hate Discord. The platform is proprietary, the U/X is just completely confusing and it's difficult to find anything.

    If you run a project, I love @Discourse - it's open source, the U/X is great and you can archive everything in markdown (and much more).

    https://github.com/discourse/discourse
    and we run it for GCVE https://discourse.ossbase.org/c/gcve/14

    #opensource #discourse

    Chat Protocols and Apps opensource discourse
  • Login

  • Login or register to search.
  • First post
    Last post
0
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups