Brocards for vulnerability triage
https://blog.yossarian.net/2026/04/11/Brocards-for-vulnerability-triage
Enjoy when humans are using machines in unexpected ways. I break stuff and I do stuff.
The other side is at @a (photography, art and free software at large)
#infosec #opensource #threatintelligence #fedi22 #threatintel #searchable
| Website | https://www.foo.be |
| GitHub | https://github.com/adulau |
| Matrix | @adulau:matrix.circl.lu |
| ORCID | https://orcid.org/0000-0002-5437-4652 |
| PGP FP | 6BB5 6353 1D99 F112 4C00 8C4F 815D 4786 1ECB 73D5 |
| Other Mastodon | https://paperbay.org/@a |
Brocards for vulnerability triage
https://blog.yossarian.net/2026/04/11/Brocards-for-vulnerability-triage
Ransomlook 2.0 "Mira" Released - Observability, Crypto Traceability, and a Cleaner Core.
Thanks to all the contributors who helped and worked on this release. A huge thanks to @F_kZ_ for his continuous commitment to make ransomlook always better.
Ransomlook remains firmly committed to an open-source codebase and to keeping it that way. We believe security tools are most valuable when they are transparent, auditable, and usable by the community, not when “open” quietly turns into “source-visible for marketing purposes.” As always, anyone can run their own ransomlook instance and stay fully in control of their deployment. For those who prefer not to operate and maintain it themselves, an online version is also available at ransomlook.io.
🔗 Release notes https://github.com/RansomLook/RansomLook/releases/tag/2.0.0
🔗 GitHub https://github.com/RansomLook/RansomLook/
#opensource #ransomware #cti #threatintel #threatintelligence
Excited to share that the MITRE Fight Fraud Framework™ (F3) is now included in the default MISP galaxy and available across all MISP instances.
F3 is a curated knowledge base of tactics and techniques used by financial fraud actors, helping analysts structure, share, and enrich fraud-related intelligence more effectively.
A great step forward for the MISP community and for teams tracking financial fraud.
🔗 https://github.com/MISP/misp-galaxy
#misp #financialfraud #threatintel #threatintelligence #opensource
#financial
Excited to share that the MITRE Fight Fraud Framework™ (F3) is now included in the default MISP galaxy and available across all MISP instances.
F3 is a curated knowledge base of tactics and techniques used by financial fraud actors, helping analysts structure, share, and enrich fraud-related intelligence more effectively.
A great step forward for the MISP community and for teams tracking financial fraud.
🔗 https://github.com/MISP/misp-galaxy
#misp #financialfraud #threatintel #threatintelligence #opensource
#financial
@adulau And it's made worse by the fact that BSL as an identifier is actually describing another license (boost software license, OSI approved), which is why the Business Source License has been given the SPDX ID BUSL.
More than once I had people coming to me saying that Business Source License isn't as issue because BSL is marked as OSI approved on the SPDX license list 🙄
FSL and BSL belong on any list of false-promise licenses:
They are not open source. They are restrictive source-available licenses dressed up with “open” language.
Reading the code is not enough. If users cannot freely run, use, or build on the software because of field-of-use or competition restrictions, the software is not open source.
Marketing it as “open source” or even putting “open” in your name is misleading twice: first in the license, then in the messaging.
New projects added for the hackathon of next week such as misp-ghidra and also bsimvis
https://github.com/MISP/BSimVis
BSimVis is a tool to upload large quantities of decompiled binaries from Ghidra to a redis/kvrocks server for analyzing similarity, clustering and diffing functions based on Ghidra BSIM feature vectors. Binary analysis is done using Ghidra's decompiler thanks to Pyghidra scripting.
If you want to join us next week in Luxembourg at hackathon.lu -> join us at https://hackathon.lu/
#hackathon #luxembourg #opensource #cybersecurity #reversing #ghidra #bsim #cti #threatintel
Amazon wants to hold previous books "bought" as hostages. If you want to re-read a book you "own," then you need to buy a new kindle. Screw that! If there's a class action lawsuit to get us all DRM-free copies of our books, I'll sign on. I don't want a partial refund, thanks, just access to my purchases.
It's time to jailbreak older kindles. They might not work for Amazon anymore but that doesn't mean they have to stop working for the owners.
Once again, an important standard is behind a paywall: prEN 4709-02 from CENELEC. It matters for both security and safety, and could benefit everyone, yet access remains restricted.
@EUCommission do you plan to force CENELEC to publish and release publicly the standards?
Working on a prototype for collaborative CPE editing, including relationship handling. It is starting to come together, and I see a lot of potential in extending the CPE format to make it more useful.
Maybe join me at hackathon.lu if you want to be part of this.