Aristotelis Tzafalias

@aristot73@infosec.exchange
76 Followers
246 Following
344 Posts

The European Commission is putting together an "Expert Group for a Technology Roadmap on Encryption": https://ec.europa.eu/transparency/expert-groups-register/screen/expert-groups/consult?lang=en&groupID=4005

The group will include 12 members plus one member of ENISA (Cybersecurity Agency), EUROPOL (Police) and EDPS (Data protection Supervisor).

"The group shall be co-chaired by a representative of DG CNECT and a representative of DG HOME"

Applications are open until September 1st.

RE: https://infosec.exchange/@aristot73/114756135579776190

#EUGoingDark #encryption #privacy

The NLnet Foundation has announced a new list of 62 projects receiving funding through the Next Generation Internet (NGI) Zero Commons Fund: open hardware security key Nitrokey, open hardware microscope OpenFlexure... https://nlnet.nl/news/2025/20250624-announcement-grants-CommonsFund.html
NLnet; 62 new projects contribute to digital commons

Report from Unwanted Witness.

‘Surveillance/Spyware: An Impediment to Civil Society, HRDs and Journalists in East
& Southern Africa’

https://www.unwantedwitness.org/wp-content/uploads/2025/06/Report-06.06.2025-FINAL.pdf

European Commission- Call for applications - Expert Group for a Technology Roadmap on Encryption (E04005) ACTIVE - deadline 1 September 2025.
#dataretention #lawfulinterception #digitalforensics #encryption

"The selection shall prioritise experts with technical profiles, coming from either public or private sector, whilst aiming to ensure proportional representation across the following fields of expertise: • Home affairs, ideally with an experience in fighting high-tech crime, and/or a background in the area of decryption and artifact extraction, computer forensics, network forensics, smartphone forensics, cloud forensics, IoT forensics, memory forensics and/or lawful interception; • Cybersecurity. with diverse backgrounds including but not limited to vulnerability management, evaluation of cybersecurity risks and certification and encryption (including quantum and post-quantum cryptography); • Telecommunication, including with experience in computer networks/Internet, 5G/6G, IoT, VoIP, Satellite, Quantum communication and/or encrypted communication applications; • Big data analysis, including with expertise in AI technologies; • Standardisation, notably in relation with cybersecurity and/or telecommunication technologies, including protocol networks, exchanges of digital data, and lawful interception; • Justice and fundamental rights, including experience in data protection and privacy, as well as experience in criminal justice, such as cyber-enabled and/or cyber-dependent crimes"

https://ec.europa.eu/transparency/expert-groups-register/screen/expert-groups/consult?lang=en&groupID=4005

@GossiTheDog That's contingent on Defender following the same rules, though...otherwise it's an antitrust minefield. Defender itself isn't always a good citizen and bad definition updates frequently bring down systems.

Help request. My brother has Stage 4 colorectal cancer.

His life insurance has refused to pay out on a technicality, meaning he and his loved ones cannot afford the mortgage on their home.

I've never asked for anything in return for infosec stuff, but if you have anything spare, please chuck it this direction instead:

https://gofund.me/b9a0d8f4

We had the pleasure of presenting at FIRST.org 2025, showcasing the Vulnerability-Lookup and GCVE.eu initiatives.

Slides are now available.

#cybersecurity #vulnerability #cve #threatintel

@gcve @circl
@firstdotorg

🔗 https://www.vulnerability-lookup.org/2025/06/25/beyond-cve-mastering-the-landscape-with-vulnerability-lookup/

Beyond CVEs: Mastering the Landscape with Vulnerability-Lookup

We had the pleasure of presenting at FIRST.org 2025, showcasing the Vulnerability-Lookup and GCVE.eu initiatives. Although CVEs are a cornerstone of vulnerability management, they often provide an incomplete view of the security landscape. Vulnerability-Lookup, a new open-source project developed by CIRCL, addresses this limitation by offering a comprehensive and enriched vulnerability intelligence platform that goes beyond basic CVE data. The platform aggregates and correlates information from diverse sources, including exploit databases, vulnerability scanners, product advisories, and community contributions. This integration delivers a more complete picture of vulnerability threats. We demonstrate how this enhanced level of detail empowers security professionals to move beyond simple patch management and adopt proactive, actionable, risk-based strategies.

Curious about the Chinese vulnerability database? It's now included on https://vulnerability-lookup.org!
Big thanks to @rafi0t for the awesome work and the clever LookyLoo import!

🔗 https://vulnerability.circl.lu/recent#cnvd

#vulnerability #vulnerabilitymanagement #threatintel #cybersecurity #china