Alexandre Dulaunoy

2.7K Followers
3.4K Following
2K Posts

Enjoy when humans are using machines in unexpected ways. I break stuff and I do stuff.

The other side is at @a (photography, art and free software at large)

#infosec #opensource #threatintelligence #fedi22 #threatintel #searchable

Websitehttps://www.foo.be
GitHubhttps://github.com/adulau
Matrix@adulau:matrix.circl.lu
ORCIDhttps://orcid.org/0000-0002-5437-4652
PGP FP6BB5 6353 1D99 F112 4C00 8C4F 815D 4786 1ECB 73D5
Other Mastodonhttps://paperbay.org/@a

Influence

Le réveil sonna comme une dague entre les omoplates. Un son perçant qui vous sort de la torpeur de la nuit. Un son sec, brutal, programmé pour arracher les vivants au sommeil plutôt que les en tirer doucement.

Scott écrasa le bouton d’un geste lourd, la tête encore engluée dans un brouillard épais. Quatre heures du matin. Une heure indécente, même pour lui.

par @a

🌊 https://sillon-fictionnel.club/post/influence/
📚 https://sillon-fictionnel.club/images/influence.pdf

#influence #nouvelle #lecture #scifi #mastolivre

le sillon fictionnel | Influence

Le Sillon Fictionnel - Un espace dédié à la passion de la lecture et la culture au sein d’un club un peu atypique. Critiques - livre, art et culture.

Another cut in CISA budget for 2027, 707 million less.

#cisa #us #cybersecurity

🔗 https://www.whitehouse.gov/wp-content/uploads/2026/04/budget_fy2027.pdf

For hackathon.lu, I was initially unsure what my main project would be, but I ultimately decided to focus on implementing the future GCVE BCP-10.

GCVE-BCP-10: Improved Common Platform Enumeration for GCVE

The idea is combine it with the cpe-guesser and have a registry to facilitate the interaction with the CPE values to handle vendor and product references.

#gcve #cve #cpe #opensource #cybersecurity

🔗 Draft https://discourse.ossbase.org/t/gcve-bcp-10-improved-common-platform-enumeration-for-gcve/1042

🔗 Hackathon https://hackathon.lu/

🔗 https://github.com/vulnerability-lookup/cpe-guesser

GCVE-BCP-10 : Improved Common Platform Enumeration for GCVE

GCVE-BCP-10: Improved Common Platform Enumeration for GCVE Document ID: GCVE-BCP-10 Title: Improved Common Platform Enumeration for GCVE Status: Draft Category: Best Current Practice Updates: CPE-compatible naming and match semantics Author: GCVE.eu Intended use: Platform and product identification, applicability matching, vendor management, and synonym handling in the GCVE ecosystem Abstract This document specifies an improved platform enumeration format for GCVE. The format is intentionally ...

ossbase.org

By the way, if you want to join us at hackathon.lu 14-15 April 2026 and work on some cool stuff, don’t hesitate to join us.

I have some free vouchers for the registration, ping me.

#hackathon #opensource #cybersecurity

We are happy to announce the release of MISP v2.5.36, which includes new geolocation and map visualisation capabilities, the continued development of the Overmind UI, a new interactive CLI shell UI, important security fixes, and installer improvements.

#misp #cti #informationsharing #threatintel #opensource

https://github.com/MISP/MISP/releases/tag/v2.5.36

The page about RSS reminds me of how far computing has fallen from simplicity to the pit of unnecessary complexity. (https://www.foo.be/2026/03/bring-back-rss) I have continued to follow and parse hundreds of feeds for many years and I get far more useful information via RSS than social and other methods combined. Also old school is better than new school for many reasons I don't want to bore you with, so to say it succinctly:

In computing, software, and communications, 99 percent of the newer tools, languages, schemes, and protocols are redundant, complex, bloated, and unnecessary 'sugar' poured over the old school sugar cookie. We never needed 99 percent of the bloated features in web browsers, platforms, protocols, or DEs. These things consume inordinate amounts of time and mindshare to research, learn, and troubleshoot. These bloated computing buffets promote paradigms and agendas rather than work flow.

@[email protected] @[email protected] @[email protected] @[email protected] @[email protected] @[email protected] @[email protected] @[email protected] @[email protected] @[email protected] @[email protected] @[email protected] @[email protected] @[email protected] @[email protected] @[email protected] @[email protected] @[email protected] @[email protected] @[email protected] @[email protected] @[email protected] @[email protected]
Bring Back RSS for Operational Security

Personal webpage of Alexandre Dulaunoy - from information security to open source and art

Alexandre Dulaunoy - adulau - Home Page

RE: https://infosec.exchange/@adulau/116322184098315128

aspirational security is when you focus on future threats to avoid dealing with the failure to address current ones.
in the words of the TED poet, what makes you beleive that we will get there by doing the same things that got us here?

@adulau Thank you! And for many org, PQC issues should not even be in their threat model. But that's probably a sexy name to get some attention and budget, but indeed, should not make it into the priority list for most org...

@adulau Quantum Computing is the new block chain.

But let's face it: It's easier to babble about fuzzy threats than do something about existing ones, be this in IT-Security or Climate change. The former makes you important in a linkedin sense, the later is actually hard work.

If someone comes to me today preaching about “post-quantum” security issues, I’ll remind them of the current state of security: the npm ecosystem gets abused daily, CI pipelines run left and right with full access to cloud services, so-called security devices like F5 and Ivanti are exposed (and compromised) to the internet, mailboxes get compromised just to change an IBAN in a PDF, and a simple phone call is still enough to get someone to hand over an MFA code.

But yes, by all means, let’s focus on post-quantum threats while handing AI tools SSH access like it’s a feature, not a confession.

#cybersecurity #stateoftheworld