Before submitting one or more talks to @passthesaltcon 2026, I wrote a blog post based on my 2024 presentation: Bring Back RSS for Operational Security.
#rss #infosec #cybersecurity #cti #threatintel #osint #opensource #atom
Enjoy when humans are using machines in unexpected ways. I break stuff and I do stuff.
The other side is at @a (photography, art and free software at large)
#infosec #opensource #threatintelligence #fedi22 #threatintel #searchable
| Website | https://www.foo.be |
| GitHub | https://github.com/adulau |
| Matrix | @adulau:matrix.circl.lu |
| ORCID | https://orcid.org/0000-0002-5437-4652 |
| PGP FP | 6BB5 6353 1D99 F112 4C00 8C4F 815D 4786 1ECB 73D5 |
| Other Mastodon | https://paperbay.org/@a |
Before submitting one or more talks to @passthesaltcon 2026, I wrote a blog post based on my 2024 presentation: Bring Back RSS for Operational Security.
#rss #infosec #cybersecurity #cti #threatintel #osint #opensource #atom
cpe-guesser 2.0 released - Multi-Source CPE Imports, Better Ranking, and Greater Autonomy Beyond NVD
Version 2.0 brings major improvements to CPE import, ranking, and CVE v5 data handling. This release focuses on better import performance, broader format support, improved search relevance, and more robust indexing for vendor and product matching.
A notable change in this release is that cpe-guesser is no longer limited to NVD as its only practical CPE source. In addition to the NVD feeds, it can also leverage the Vulnerability-Lookup dump available at https://vulnerability.circl.lu/dumps/ , providing additional CPE sources and more autonomy from the previously NVD-only source model.
This release lays an important foundation for improving the GCVE ecosystem, especially by strengthening vendor and product references through better CPE source diversity, indexing, and matching capabilities. If you have ideas for further improvements, additional data sources, or better ways to refine vendor and product identification, we would be very happy to hear your feedback.
https://www.vulnerability-lookup.org/2026/03/22/cpe-guesser-2.0-released/
https://github.com/vulnerability-lookup/cpe-guesser
#gcve #cve #opensource #cpe #vulnerability #vulnerabilitymanagement
gcve-eu-kev updated — a CISA KEV and ENISA CNW/EUVD to GCVE BCP-07 converter.
It now also includes a generic RSS/Atom exporter for any GCVE KEV BCP-07 feed.
#cybersecurity #gcve #kev #cve #vulnerability #vulnerabilitymanagement
🔗 https://github.com/gcve-eu/gcve-eu-kev
🔗 https://gcve.eu/bcp/gcve-bcp-07/
I just published The Open Contributions Descriptor format as an IETF Internet-Draft.
#opensource #opendata #openstandard
https://datatracker.ietf.org/doc/draft-dulaunoy-open-contributions-descriptor/
This document defines the Open Contributions Descriptor (OCD), a JSON format for publishing machine-readable metadata about an organization's participation in the open ecosystem. OCD allows organizations to publish a single discovery document describing open source projects, open data publications, open standards participation, contact information, governance material, and declared relationships to external organizations and projects. OCD is intended to be published at a predictable well-known location to support automated discovery, indexing, and ecosystem analysis.
@r Great work! I was curious and added the distance calculation (basic stupid Euclidian distance) to compare two images:
https://github.com/adulau/open-alleged-photodna/commit/c0275801088442cd4f5693b6403678daf5f75b7a
and the results are surprisingly good with rescaled images.
adulau@blakley:~/git/open-alleged-photodna$ python3.10 oaphotodna.py /home/adulau/Downloads/55147310088_ced977bdee_c.jpg /home/adulau/Downloads/55147310088_45f9e4b2cc_k.jpg
Distance (euclidean): 8.4261
Similarity: 0.997246
The source image https://www.flickr.com/photos/adulau/55147310088/
I just did PR (feel free to discard it if you think it's out-of-scope ;-)
A new bundle, The Most Organized Threat Actors Use Your ITSM (BMC FootPrints Pre-Auth Remote Code Execution Chains), has been published on Vulnerability-Lookup:
http://vulnerability.circl.lu/bundle/8b291831-2785-48c5-bce6-8e1ad5925260
With the recent integration of CERT-VDE’s CSAF advisories, it becomes even clearer why diverse vulnerability data sources are essential.
CSAF delivers direct vendor remediation information, and when correlated with the CVE Program , it highlights how important federation and data correlation are for remediation efforts and vulnerability management as a whole. (See example below)
🔗 https://db.gcve.eu/vuln/vde-2025-066
#gcve #cve #vulnerabilitymanagement #cybersecurity #opensource
Man threatening to leave NATO, and invade member states, demands NATO reciprocity in a war he started. 🤡
The Onion couldn't have done a better job.
So, I recently saw some quiet discussion about a paper where researchers reverse-engineered and disclosed some attacks against PhotoDNA, the very-super-duper-secret algorithm used by tech megacorps to scan for illegal images.
They didn't make any code public, and so... I did: https://github.com/ArcaneNibble/open-alleged-photodna
A _complete_ reverse-engineering and commented Python reimplementation of the algorithm from publicly-leaked binaries.
This means that studying the algorithm and any potential flaws is now much more accessible.
This took only about two days (once I knew that there even _was_ a leaked binary to compare against), which just goes to again show that security through obscurity never works.
🔁 encouraged