24 Followers
90 Following
33 Posts
@nopatience
I'll be interested tbh. Sorry what is ORLYSEC? Looks like I have missed something 🙃
@da_667
Same dude on LinkedIn reached out for SOC role in EMEA.
@GossiTheDog
Sorry to hear!

Finding CVEs that technically "don't exist" yet. 🕵️‍♂️

Ghost CVEs are live. A "Ghost CVE" is a vulnerability identifier that’s already popped up in the wild—think GitHub commits or security advisories—but is still listed as RESERVED or NOT_FOUND in official registries like NVD or MITRE.

It catches the threats that are already out there, even if the paperwork says they aren't. 📝💨

Admittedly, there are a lot more sources to add—this was just a quick weekend POV—but I plan on extending it soon.

Check out the latest ghost report here: https://github.com/RogoLabs/GhostCVEs/blob/main/reports/ghost_report.md

#InfoSec #ThreatIntel #OpenSource #GhostCVEs

GhostCVEs/reports/ghost_report.md at main · RogoLabs/GhostCVEs

GhostCVEs. Contribute to RogoLabs/GhostCVEs development by creating an account on GitHub.

GitHub
@0xCDE
I'll avoid companies like that as it is waste of time!

Proofpoint threat researchers have designed an open-source tool—named PDF Object Hashing—to track and detect the unique characteristics of PDFs used by threat actors... similar to a digital fingerprint. 🫆

We use this tool internally to help track multiple threat actors with high confidence, improving attribution in many cases.

The tool has been released in the Proofpoint Emerging Threats public #GitHub for other defenders to leverage.

Learn more about it here: https://www.proofpoint.com/us/blog/threat-insight/proofpoint-releases-innovative-detections-threat-hunting-pdf-object-hashing

#PDF #threatdetection #cyberthreat

@anders I can do that with help of GPT/Grok :)
@anders No sorry at all! Thanks for the post anyway!
@anders would you mind to share the n8n template?
@hal_pomeranz
What non-systemd distros would you recommend to look at?