The other side is at @a (photography, art and free software at large) […]
[bridged from https://infosec.exchange/@adulau on the fediverse by https://fed.brid.gy/ ]
"The Cybersecurity and Infrastructure Security Agency (CISA) analyzed eight BRICKSTORM samples obtained from victim organizations. BRICKSTORM is a custom Executable and Linkable Format (ELF) Go-based backdoor. "
MISP standard and STIX files available at the following […]
"The Cybersecurity and Infrastructure Security Agency (CISA) analyzed eight BRICKSTORM samples obtained from victim organizations. BRICKSTORM is a custom Executable and Linkable Format (ELF) Go-based backdoor. "
MISP standard and STIX files available at the following […]
#misp #cti #opensource #threatintel
@misp
https://misp.github.io/misp-modules/install/
#misp #cti #opensource #threatintel
@misp
https://misp.github.io/misp-modules/install/
We’re pleased to announce the publication of **GCVE-BCP-02 – Practical Guide to Vulnerability Handling and Disclosure** , now available in its **version 1.3**.
This Best Current Practice document provides actionable guidance for organisations […]
We’re pleased to announce the publication of **GCVE-BCP-02 – Practical Guide to Vulnerability Handling and Disclosure** , now available in its **version 1.3**.
This Best Current Practice document provides actionable guidance for organisations […]
Comments are more than welcome!
#gcve #cve #vulnerability #openstandard
@gcve
@circl
🔗 […]
Comments are more than welcome!
#gcve #cve #vulnerability #openstandard
@gcve
@circl
🔗 […]
someone(s) burned new infra to do so, too.
if any org gets compromised from an opportunistic campaign (like this) they fully deserve the […]
[Original post on mastodon.social]
someone(s) burned new infra to do so, too.
if any org gets compromised from an opportunistic campaign (like this) they fully deserve the […]
[Original post on mastodon.social]
"There have been some recent concerns about ML-KEM, NIST’s standard for encryption with Post-Quantum Cryptography, related standards of the IETF, and lots of conspiracy theories about malicious actors subverting the standardization process. "
#pqc #pqcrypto #cybersecurity […]
"There have been some recent concerns about ML-KEM, NIST’s standard for encryption with Post-Quantum Cryptography, related standards of the IETF, and lots of conspiracy theories about malicious actors subverting the standardization process. "
#pqc #pqcrypto #cybersecurity […]
I particularly enjoyed this one. By the way, in Vulnerability Lookup we also have a nice display of the actual credits: finder, coordinator, and so on.
🔗 […]
[Original post on infosec.exchange]
I particularly enjoyed this one. By the way, in Vulnerability Lookup we also have a nice display of the actual credits: finder, coordinator, and so on.
🔗 […]
[Original post on infosec.exchange]
It's great news for arXiv. I'm just wondering why they want actually move to the cloud:
"finish migrating to cloud […]
It's great news for arXiv. I'm just wondering why they want actually move to the cloud:
"finish migrating to cloud […]
This report presents an analysis of Threat Intelligence (TI) Sightings aggregated from several key data sources, including social platforms, code repositories, and specialized TI feeds. The primary objective is to visually track historical […]
This report presents an analysis of Threat Intelligence (TI) Sightings aggregated from several key data sources, including social platforms, code repositories, and specialized TI feeds. The primary objective is to visually track historical […]
If any research team wants to do this on-the-regular (we get scads of unsolicited SNMP every day — see next post in thread) lemm know.
Over a 12-month period (Nov 2024–Oct 2025), our network telescope captured ~634 million unsolicited SNMP queries from more than 153,000 unique IPv4 […]
If any research team wants to do this on-the-regular (we get scads of unsolicited SNMP every day — see next post in thread) lemm know.
Over a 12-month period (Nov 2024–Oct 2025), our network telescope captured ~634 million unsolicited SNMP queries from more than 153,000 unique IPv4 […]
Over a 12-month period (Nov 2024–Oct 2025), our network telescope captured ~634 million unsolicited SNMP queries from more than 153,000 unique IPv4 […]
Over a 12-month period (Nov 2024–Oct 2025), our network telescope captured ~634 million unsolicited SNMP queries from more than 153,000 unique IPv4 […]
Over a 12-month period (Nov 2024–Oct 2025), our network telescope captured ~634 million unsolicited SNMP queries from more than 153,000 unique IPv4 […]
This minor, fully backward-compatible addition reinforces the long-term stability and extensibility of the MISP standard format.
#cti #opensource #openstandard […]
This minor, fully backward-compatible addition reinforces the long-term stability and extensibility of the MISP standard format.
#cti #opensource #openstandard […]
Was staring into the expanse that is the untagged sessions in our fleet and eventually plotted a course towards the ICMP system, which eventually led me to a planet that was beaconing with some oddly […]
[Original post on mastodon.social]
Was staring into the expanse that is the untagged sessions in our fleet and eventually plotted a course towards the ICMP system, which eventually led me to a planet that was beaconing with some oddly […]
[Original post on mastodon.social]
It seems Firefox blocks access to a predefined list of TCP ports, and this has been in place for […]
It seems Firefox blocks access to a predefined list of TCP ports, and this has been in place for […]
The standard is similar to the @cve record format with some extensions (via the `X_` prefixes) for GCVE format and the reference implementation vulnerability-lookup. This […]
The standard is similar to the @cve record format with some extensions (via the `X_` prefixes) for GCVE format and the reference implementation vulnerability-lookup. This […]
#cve #vulnerability #opensource #vulnerabilitymanagement #cybersecurity
🔗 https://www.vulnerability-lookup.org/2025/11/08/unlock-your-brain-2025/
#cve #vulnerability #opensource #vulnerabilitymanagement #cybersecurity
🔗 https://www.vulnerability-lookup.org/2025/11/08/unlock-your-brain-2025/
Pretty cool stuff seen at the @UYBHYS workshop
#5g #fuzzing #opensource #cybersecurity
🔗 https://github.com/ANSSI-FR/py5sig
Pretty cool stuff seen at the @UYBHYS workshop
#5g #fuzzing #opensource #cybersecurity
🔗 https://github.com/ANSSI-FR/py5sig
Pretty cool stuff seen at the @UYBHYS workshop
#5g #fuzzing #opensource #cybersecurity
🔗 https://github.com/ANSSI-FR/py5sig
Pretty cool stuff seen at the @UYBHYS workshop
#5g #fuzzing #opensource #cybersecurity
🔗 https://github.com/ANSSI-FR/py5sig
It comes with detailed attributes such as manufacturer, cost, and technical specs.
You can now easily classify, model, and share […]
[Original post on infosec.exchange]
It comes with detailed attributes such as manufacturer, cost, and technical specs.
You can now easily classify, model, and share […]
[Original post on infosec.exchange]