Alexandre Dulaunoy's Avatar

Alexandre Dulaunoy

@adulau.infosec.exchange.ap.brid.gy

Enjoy when humans are using machines in unexpected ways. I break stuff and I do stuff. The other side is at @a (photography, art and free software at large) […] [bridged from https://infosec.exchange/@adulau on the fediverse by https://fed.brid.gy/ ]

101 Followers  |  11 Following  |  140 Posts  |  Joined: 17.11.2024  |  1.9553

Latest posts by adulau.infosec.exchange.ap.brid.gy on Bluesky

Funny magic cadrant ;-)

Funny magic cadrant ;-)

Finally a useful magic quadrant

Thanks to @wendynather for the discovery.

#cybersecurity #vulnerability

11.08.2025 06:20 — 👍 2    🔁 7    💬 0    📌 0
"This graph shows the fraction of timeouts and failures when downloading static files of different sizes over Tor, either from a server on the public internet or from an onion server. A timeout occurs when a download does not complete within the scheduled time, in which case it is aborted in order not to overlap with the next scheduled download. A failure occurs when the download completes, but the response is smaller than expected." There is an increase from one source for some failures and time-out.

"This graph shows the fraction of timeouts and failures when downloading static files of different sizes over Tor, either from a server on the public internet or from an onion server. A timeout occurs when a download does not complete within the scheduled time, in which case it is aborted in order not to overlap with the next scheduled download. A failure occurs when the download completes, but the response is smaller than expected." There is an increase from one source for some failures and time-out.

Anyone having issue with Tor for the past few days?

It seems one of the Snowflake bridge is down (but should not impact obfs4):

https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/issues/40475

but from the number of relays […]

[Original post on infosec.exchange]

10.08.2025 09:26 — 👍 0    🔁 1    💬 0    📌 0
Original post on infosec.exchange

We’ve just dropped the first draft agenda for @hack_lu ! The conference is taking place over 4 days (from Tuesday 21st October 2025 until the 24th October 2025)

This year’s edition is going to be wild, expect mind-blowing talks, hands-on workshops, extra CTF challenges during the conference […]

08.08.2025 18:08 — 👍 4    🔁 5    💬 0    📌 0
misp-galaxy website - Threat-actor galaxy and relationships with other galaxy clusters.

misp-galaxy website - Threat-actor galaxy and relationships with other galaxy clusters.

Seeing all the synonyms from a threat-actor on the misp-galaxy.org website

Seeing all the synonyms from a threat-actor on the misp-galaxy.org website

Threat-actor database in MISP

Threat-actor database in MISP

When I added the threat-actor @misp galaxy type on Mar 4, 2016, I didn’t expect that, years later, vendors would still invent new names for already known threat actors, avoid using UUIDs, reuse similar names for different actors, and create confusing names […]

[Original post on infosec.exchange]

01.08.2025 09:14 — 👍 5    🔁 16    💬 1    📌 0
This advisory has been withdrawn because users of Axios 1.10.0 have the flexibility to use a patched version of form-data, the software in which the vulnerability originates, without upgrading Axios to address GHSA-fjxv-7rqg-78g4.

This advisory has been withdrawn because users of Axios 1.10.0 have the flexibility to use a patched version of form-data, the software in which the vulnerability originates, without upgrading Axios to address GHSA-fjxv-7rqg-78g4.

I love the @github Security Advisory Database because they actually preserve the data from rejected advisories including the original information and the reason for rejection.

It’s clearly much more insightful than just having a bare ID marked as "rejected […]

[Original post on infosec.exchange]

25.07.2025 08:28 — 👍 2    🔁 2    💬 0    📌 0
Post image Post image Post image

💥 CERT-UA published a report on a malware powered by an LLM.

The malware uses Qwen 2.5-Coder-32B-Instruct via the HuggingFace API to generate and execute commands on infected systems.

It is a Python script that embeds prompts to dynamically craft Windows […]

[Original post on infosec.exchange]

22.07.2025 13:32 — 👍 1    🔁 3    💬 0    📌 0
Original post on infosec.exchange

Call for Papers and Presentation: Open Source Conference 2025 Luxembourg (OSC-LU 2025).

The Open Source Conference 2025 will take place the 1st of October 2025 in Belval, Esch-sur-Alzette, Luxembourg.

🔗 https://conference.opensource.lu/
🔗 CfP https://pretalx.com/open-source-conference-2025/cfp […]

21.07.2025 13:44 — 👍 0    🔁 3    💬 0    📌 0
Bundle - Microsoft Sharepoint - Customer guidance for SharePoint vulnerability CVE-2025-53770 Vulnerability-Lookup - Fast vulnerability lookup correlation from different sources.

Customer guidance for SharePoint vulnerability CVE-2025-53770 | MSRC Blog | Microsoft Security Response Center

#sharepoint #cybersecurity #vulnerability

🔗 https://vulnerability.circl.lu/bundle/7eb6b389-20dd-404f-90c4-314ed370fcc5

20.07.2025 06:04 — 👍 0    🔁 1    💬 0    📌 0
Preview
Getting Started: Ark Integrated Active Measurement Programming Environment CAIDA’s Archipelago (Ark) infrastructure provides a programming environment

CAIDA Ark now has an active measurement programming environment for qualified researchers. https://www.caida.org/projects/ark/programming/

19.07.2025 11:56 — 👍 0    🔁 2    💬 0    📌 0

@quinn rofl

19.07.2025 08:25 — 👍 0    🔁 0    💬 0    📌 0
CIRCL Open Source tools and SOC/CSIRT eco-system

CIRCL Open Source tools and SOC/CSIRT eco-system

Curious about all the open source and projects developed by @circl ?

CIRCL Open Source tools powering SOC & CSIRT teams.

#opensource #cybersecurity #soc #csirt #threatintel #threatintelligence

🔗 https://hdoc.cnw.circl.lu/JJKFoeHrS9Wf28L4tAyCNg?view#

18.07.2025 14:08 — 👍 3    🔁 3    💬 1    📌 0
Infosec Exchange

I’ll do an online session about GCVE in 30 minutes. If you want to join, all details are below.

#gcve #vulnerability #vulnerabilitymanagement

https://infosec.exchange/@gcve@social.circl.lu/114873102367912236

18.07.2025 11:34 — 👍 0    🔁 2    💬 0    📌 0
Preview
Cloudflare 1.1.1.1 Incident on July 14, 2025 On July 14th, 2025, Cloudflare made a change to our service topologies that caused an outage for 1.1.1.1 on the edge, resulting in downtime for 62 minutes for customers using the 1.1.1.1 public DNS Resolver as well as intermittent degradation of service for Gateway DNS. We’re deeply sorry for this outage. This outage was the result of an internal configuration error and not the result of an attack or a BGP hijack. In this blog post, we’re going to talk about what the failure was, why it occurred, and what we’re doing to make sure this doesn’t happen again.

« Cloudflare 1.1.1.1 Incident on July 14, 2025 »

Perhaps it’s time to return to DNS’s original distributed design.

#dns #distributed #cloudflare

https://blog.cloudflare.com/cloudflare-1-1-1-1-incident-on-july-14-2025/

16.07.2025 05:27 — 👍 0    🔁 12    💬 0    📌 0
Original post on infosec.exchange

Wrapped up an energising Vulnerability Lookup workshop during @circl’s Virtual Summer School 2025.

Video and slides are now available.

Big thanks to everyone who joined the discussions.

:youtube: Video https://youtu.be/imkPqA-1mVE
📜 Slides […]

14.07.2025 19:47 — 👍 1    🔁 6    💬 0    📌 0
Original post on infosec.exchange

Wrapped up an energising Vulnerability Lookup workshop during @circl’s Virtual Summer School 2025.

Video and slides are now available.

Big thanks to everyone who joined the discussions.

:youtube: Video https://youtu.be/imkPqA-1mVE
📜 Slides […]

14.07.2025 19:47 — 👍 1    🔁 6    💬 0    📌 0
Preview
[CVE-2025-38001] Exploiting All Google kernelCTF Instances And Debian 12 With A 0-Day For $82k: A RBTree Family Drama (Part One: LTS & COS) CVE-2025-38001 is a Use-After-Free vulnerability in the Linux network packet scheduler, specifically in the HFSC queuing discipline. When the HFSC qdisc is utilized with NETEM and NETEM packet duplication is enabled, using HFSC_RSC it is possible to cause a double class insertion in the HFSC eligible tree. Under normal conditions, this would lead to an infinite loop in hfsc_dequeue() due to an RBTree cycle. However, by adding TBF as root qdisc, it is possible to prevent packets from being dequeued, bypass the infinite loop, free the class, and trigger a Use-After-Free.

Obscure kernel bug use-after-free and then the VLAI severity told me "maybe important" before I read the drama https://syst3mfailure.io/rbtree-family-drama/

#kernel #linux #exploitation #vulnerability

🔗 https://vulnerability.circl.lu/vuln/CVE-2025-38001#sightings

13.07.2025 20:53 — 👍 1    🔁 1    💬 0    📌 0
Comment - Pre-Auth SQL Injection to RCE - Fortinet FortiWeb Fabric Connector (CVE-2025-25257) Vulnerability-Lookup - Fast vulnerability lookup correlation from different sources.

Vulnerability cve-2025-25257 has received a comment on Vulnerability-Lookup:

Pre-Auth SQL Injection to RCE - Fortinet FortiWeb Fabric Connector (CVE-2025-25257)
http://vulnerability.circl.lu/comment/94b37950-f479-444b-bff8-5571bd15eac5

#VulnerabilityLookup #Vulnerability #Cybersecurity #bot

11.07.2025 12:39 — 👍 0    🔁 1    💬 0    📌 0
ESIM Security Comments

In a result of its research investigation efforts, Security Explorations, a research lab of AG Security Research company, conducted security analysis of eSIM technology.

#esim #cybersecurity #mobilesecurity #mobile

🔗 https://security-explorations.com/esim-security.html

09.07.2025 14:51 — 👍 0    🔁 0    💬 0    📌 0
Original post on infosec.exchange

📢 Exciting Announcement! 📢

Join us tomorrow at 14:00 CET for the Kunai Workshop Virtual Summer School (VSS) organized by CIRCL! 🌟

🔍 What You'll Learn:
- The basics of Kunai
- Using Kunai tools (https://github.com/kunai-project/pykunai#)
- Configuring Kunai with MISP IoCs
- Building advanced […]

08.07.2025 12:34 — 👍 1    🔁 1    💬 0    📌 0
Original post on infosec.exchange

VLAI: A RoBERTa-Based Model for Automated Vulnerability Severity Classification.

This paper presents VLAI, a transformer-based model that predicts software vulnerability severity levels directly from text descriptions. Built on RoBERTa, VLAI is fine-tuned on over 600,000 real-world […]

08.07.2025 08:57 — 👍 2    🔁 5    💬 0    📌 0
Original post on infosec.exchange

Weekend Reads

* A new RPKI design https://arxiv.org/abs/2507.01465
* Finding New IP KVMs https://www.runzero.com/blog/oob-p1-ip-kvm/
* Burner phone basics https://www.hackerfactor.com/blog/index.php?/archives/1071-Feel-the-Burn.html
* Radio frequency basics […]

05.07.2025 13:03 — 👍 1    🔁 2    💬 0    📌 0

Sometimes I really enjoy revisiting an old open source project I created looking at it with fresh eyes, fixing things, and making it better.

#opensource

04.07.2025 20:48 — 👍 3    🔁 3    💬 1    📌 0

@vegard I just found one ;-) It’s indeed the good question and the variability of scoring is due to the configuration.

04.07.2025 18:10 — 👍 0    🔁 0    💬 0    📌 0
vulnerability lookup

vulnerability lookup

Who is right with this sudo vulnerability? The CVSS reported or the VLAI severity model?

#sudo #vulnerability #vulnerabilitymanagement #threatintel

🔗 https://vulnerability.circl.lu/vuln/CVE-2025-32462#sightings

04.07.2025 16:04 — 👍 0    🔁 0    💬 1    📌 0
Original post on infosec.exchange

We had the pleasure of presenting at FIRST.org 2025, showcasing the Vulnerability-Lookup and GCVE.eu initiatives.

Slides are now available.

#cybersecurity #vulnerability #cve #threatintel

@gcve @circl
@firstdotorg

🔗 […]

25.06.2025 20:06 — 👍 2    🔁 3    💬 0    📌 0
Original post on infosec.exchange

Love it when regulation kicks us in the ass.

The new Pangu-Pro-MoE model from Ascend Tribe (Huawei) ships with a license that forbids use inside the EU.

Why? Probably to dodge any messy GDPR debates.

After the WHOIS debacle sparked by GDPR, we can add yet another item to the ever-growing list […]

02.07.2025 09:12 — 👍 3    🔁 0    💬 1    📌 0
Original post on infosec.exchange

The Python-based data-exfiltration utility used by the Cl0p ransomware group (commonly distributed as part of the toolset during the 2023 – 2024 MoveIt campaigns) constructs operating-system commands by directly concatenating attacker-supplied strings without input sanitization. An authenticated […]

01.07.2025 09:46 — 👍 0    🔁 0    💬 0    📌 0
Vulnerability lookup with CNVD imported

Vulnerability lookup with CNVD imported

Curious about the Chinese vulnerability database? It's now included on https://vulnerability-lookup.org!
Big thanks to @rafi0t for the awesome work and the clever LookyLoo import!

🔗 https://vulnerability.circl.lu/recent#cnvd

#vulnerability […]

[Original post on infosec.exchange]

25.06.2025 20:29 — 👍 0    🔁 2    💬 0    📌 0

@adulau.infosec.exchange.ap.brid.gy is following 11 prominent accounts