21 Followers
37 Following
21 Posts

vulnz.ch is a meetup I've been thinking about for a while. It's something I wanted to exist but couldn't find.

The idea is simple: bring together Zurich-based folks for a space dedicated to sharing knowledge about software security. That could mean presenting your analysis of an academic paper you've read, demoing a fork of an open source project you've been experimenting with, or showing off a tool you built during late-night coding sessions.

The first meetup is now being shaped, and the website is up and running. Check out vulnz.ch and sign up if you're interested in joining.

The previous Monday, @troyhunt the creator of @haveibeenpwned made another stop on his Have I Been Pwned Alpine Grand Tour, visiting countries like Germany, France, Italy, and Switzerland to discuss his work. Several Zurich user groups were fortunate to hear him speak on various topics and join him for drinks afterward. His presentation covered his experience testifying before the U.S. Congress, some of the most significant breaches tracked on the platform, and insights into how Have I Been Pwned operates

After discovering that the data is accessible via the API and noticing the lack of a visualization tool, I dedicated a few evenings to building haveibeenpwned.watch. This single-page website processes and presents data on leaks from Have I Been Pwned, with daily updates.

The site provides details on the total number of recorded breaches, the number of unique services affected, and the total accounts compromised. Charts break down the data by year, showing the number of breaches, affected accounts, average accounts breached per year, accounts by data type, and accounts by industry. Additionally, tables highlight the most recent breaches, the most significant ones, and the services with the highest number of compromised accounts.

Though simple, the website can be a useful resource for use cases like strategic security planning, cybersecurity sales, risk assessment, or simply tracking trends in the security landscape.

The website is open source, with its repository hosted on GitHub.

Feel free to share any feedback or submit a pull request if you’d like to contribute.

Troy, thank you for hosting these in-person talks and for creating this essential service that the internet relies on!

[1] https://haveibeenpwned.watch
[2] https://github.com/iosifache/haveibeenpwned.watch

The previous year, fuzzing was one of the topics I covered in my Ubuntu Summit workshop (as in The Open Source Fortress [1]). It was such a groovy experience, and I’m fortunate that I can repeat it on Ubuntu’s 20th anniversary.

Dongge Liu, Jiongchi Yu, and I were accepted to this year’s conference with a 1.5-hour workshop [2] targeting open-source projects that play a role in the overall Internet infrastructure. We will detail how such projects can get integrated into Google’s OSS-Fuzz [3] to benefit from free-of-charge continuous fuzzing. As the workshop is made possible by Jiongchi’s contributions to Google Summer of Code (more on this topic in another post) [4], he will also describe his work in integrating OpenPrinting’s projects (mostly built on C) into OSS-Fuzz.

The conference will also host two other talks on tools improving open-source security. Cristóvão Cordeiro will present his work on Chiselled Ubuntu containers (i.e., distroless-like containers intentionally trimmed down to decrease their size and attack surface) [5], and the folks from Bitergia will discuss their work on GrimoireLab (i.e., risk assessments for open-source dependencies) [6].

If you’ll be in The Hague this week for Ubuntu Summit, I hope to see you in the workshop room and hang out during the HackerSpace organised the same evening. Otherwise, the presentation and materials will be made public shortly after the conference.

[1] https://ossfortress.io
[2] https://events.canonical.com/event/51/contributions/540
[3] https://google.github.io/oss-fuzz
[4] https://summerofcode.withgoogle.com/programs/2024/projects/QX4kRWZO
[5] https://events.canonical.com/event/51/contributions/520
[6] https://events.canonical.com/event/51/contributions/594

The Open Source Fortress | The Open Source Fortress