GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Notices by Alexandre Dulaunoy (adulau@infosec.exchange)

  1. Embed this notice
    Alexandre Dulaunoy (adulau@infosec.exchange)'s status on Friday, 02-May-2025 03:23:07 JST Alexandre Dulaunoy Alexandre Dulaunoy
    • ANTIREZ

    Even if it’s @antirez saying this, it’s just too late and It doesn’t solve the issue with CLA and the trust in the organisation.

    https://antirez.com/news/151 «Redis is open source again »

    Let’s go for https://valkey.io/

    #valkey #redis #opensource

    In conversation about 10 days ago from infosec.exchange permalink

    Attachments

    1. No result found on File_thumbnail lookup.
      Valkey
  2. Embed this notice
    Alexandre Dulaunoy (adulau@infosec.exchange)'s status on Wednesday, 12-Mar-2025 19:35:58 JST Alexandre Dulaunoy Alexandre Dulaunoy
    • circl

    We are excited to announce that CIRCL has three open positions available.

    As a team strongly oriented towards open-source development, we value contributions that drive innovation and strengthen the cybersecurity community. These roles are open to EU citizens, with the workplace based in Luxembourg. If you’re passionate about cybersecurity and open-source collaboration, we encourage you to apply and make a meaningful impact.

    • CIRCL - Software Engineer and Intelligence Analyst (software-engineering-analyst)

    🔗 https://www.circl.lu/projects/position/software-engineering-analyst/

    • CIRCL - Security Analyst and Researcher (Security-Analyst-and-Researcher)

    🔗 https://www.circl.lu/projects/position/security-analyst-researcher/

    • CIRCL - Incident and Vulnerability Disclosure Coordinator/Analyst (nis2-incident-analyst)

    🔗 https://www.circl.lu/projects/position/nis2-incident-analyst/

    @circl

    #cybersecurity #opensource #europe #csirt #cert #nis2

    In conversation about 2 months ago from infosec.exchange permalink

    Attachments





  3. Embed this notice
    Alexandre Dulaunoy (adulau@infosec.exchange)'s status on Tuesday, 31-Dec-2024 04:42:50 JST Alexandre Dulaunoy Alexandre Dulaunoy
    • MISP

    Recommendations on "Naming Threat Actors" provides advice on the naming of threat actors (also known as malicious actors). The objective is to provide practical advice for organizations such as security vendors or organizations attributing incidents to a group of threat actors. It also discusses the implications of naming a threat actor for intelligence analysts and threat intelligence platforms such as MISP.

    🔗 https://www.misp-standard.org/rfc/threat-actor-naming.html
    🔗 https://www.misp-galaxy.org/threat-actor/

    #cybersecurity #opensource #threatintelligence #threatintel #standard

    @misp

    In conversation about 4 months ago from infosec.exchange permalink

    Attachments

    1. No result found on File_thumbnail lookup.
      Recommendations on Naming Threat Actors
      from Pauline Bourmeau
      This document provides advice on the naming of threat actors (also known as malicious actors). The objective is to provide practical advice for organizations such as security vendors or organizations attributing incidents to a group of threat actors. It also discusses the implications of naming a threat actor for intelligence analysts and threat intelligence platforms such as MISP .
    2. No result found on File_thumbnail lookup.
      Threat Actor - MISP galaxy
      Known or estimated adversary groups targeting organizations and employees. Adversary groups are regularly confused with their initial operation or campaign. threat-actor-classification meta can be used to clarify the understanding of the threat-actor if also considered as operation, campaign or activity group.
  4. Embed this notice
    Alexandre Dulaunoy (adulau@infosec.exchange)'s status on Thursday, 19-Dec-2024 02:48:59 JST Alexandre Dulaunoy Alexandre Dulaunoy
    in reply to
    • Kevin Beaumont
    • cR0w :cascadia:
    • screaminggoat

    @cR0w We developed the open source vulnerability-lookup project (and also the sighting part) for providing actionable intelligence in the scope of NIS2 obligation and to share the information with all CSIRTs and SOCs efficiently.

    https://www.vulnerability-lookup.org/

    about the sighting aspect https://www.vulnerability-lookup.org/tools/#sightings

    We have still plenty of ideas. If you see something missing, let us know.

    @GossiTheDog @screaminggoat

    In conversation about 5 months ago from infosec.exchange permalink

    Attachments

    1. No result found on File_thumbnail lookup.
      About
      Vulnerability-Lookup is a rewritten version of cve-search, an open-source tool initially aimed at maintaining a local CVE database. The original cve-search had design and scalability limitations, and its public instance operated by CIRCL is maxing out at 20,000 queries per second. As vulnerability sources have diversified beyond the NVD CVE, a new tool was needed to support the CVD process, allowing for bundling, commenting, publishing, and extending vulnerability information in a collaborative manner.
    2. No result found on File_thumbnail lookup.
      Tools
      Software within the Vulnerability-Lookup project.
  5. Embed this notice
    Alexandre Dulaunoy (adulau@infosec.exchange)'s status on Thursday, 19-Dec-2024 02:21:15 JST Alexandre Dulaunoy Alexandre Dulaunoy
    in reply to
    • Wary Jerry
    • screaminggoat

    @screaminggoat @jerry If you are curious about the evolution of sightings https://vulnerability.circl.lu/vuln/CVE-2023-34990#sightings

    In conversation about 5 months ago from infosec.exchange permalink

    Attachments

    1. No result found on File_thumbnail lookup.
      cvelistv5 - CVE-2023-34990
      from /humans.txt
      Vulnerability-Lookup - Fast vulnerability lookup correlation from different sources.
  6. Embed this notice
    Alexandre Dulaunoy (adulau@infosec.exchange)'s status on Friday, 15-Nov-2024 19:12:56 JST Alexandre Dulaunoy Alexandre Dulaunoy
    • IFTAS

    @iftas Do you share the hashes ? it might be useful for many other open source projects.

    In conversation about 6 months ago from infosec.exchange permalink
  7. Embed this notice
    Alexandre Dulaunoy (adulau@infosec.exchange)'s status on Friday, 15-Nov-2024 19:12:46 JST Alexandre Dulaunoy Alexandre Dulaunoy
    • Jaz (IFTAS)

    @jaz

    The importance of sharing CSAM detection indicators cannot be overstated, it significantly improves detection at scale. Despite multiple requests for #DFIR activities, we were denied access to these databases. This restriction is a missed opportunity, as it limits detection capabilities.

    Frankly, I don’t see the risks of sharing these indicators. The cybersecurity community has been sharing IoCs, malware hashes, and domains for years. Why should CSAM indicators be treated differently? With technologies like encrypted Bloom filters, even public sharing can be done securely.

    If we truly want broad and effective detection in #fediverse and other social networks, we need widespread sharing of CSAM indicators.

    In conversation about 6 months ago from infosec.exchange permalink
  8. Embed this notice
    Alexandre Dulaunoy (adulau@infosec.exchange)'s status on Thursday, 19-Sep-2024 05:52:48 JST Alexandre Dulaunoy Alexandre Dulaunoy

    A funny phishing targeting GitHub users with an email notification about a security issue on a existing repository.

    Then the captcha verification on a malicious website is trying to trick the user to run a shell command on Windows.

    🔗 Powershell to be executed by the user
    https://gist.github.com/adulau/6cf6f3e9c5bbd9106af8814d0a22f473

    🔗 File downloaded https://pandora.circl.lu/analysis/21e8f693-361b-4a04-853c-276f9dd841e4/seed-1XqUr4mADaFYlLAyrBH8oQUBgOoEbceZ586b8h05YyA - Lumma Stealer

    🔗 Malicious domain analysis. https://lookyloo.circl.lu/tree/91106035-dfec-4acc-af06-c9fc36c62774

    #malware #malwareanalysis #infosec

    In conversation about 8 months ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/113/160/470/862/757/558/original/529545749cc9d6ca.png
    2. Domain not in remote thumbnail source whitelist: github.githubassets.com
      Malicious captcha for Windows user
      from adulau
      Malicious captcha for Windows user
    3. No result found on File_thumbnail lookup.
      Pandora - Analysis of l6E.exe
    4. Domain not in remote thumbnail source whitelist: lookyloo.circl.lu
      Lookyloo capture
      URL captured: https://github-scanner.com
  9. Embed this notice
    Alexandre Dulaunoy (adulau@infosec.exchange)'s status on Thursday, 30-Nov-2023 19:18:22 JST Alexandre Dulaunoy Alexandre Dulaunoy

    Extracting Training Data from ChatGPT

    I’m wondering if OpenAI requested a CVE for the disclosure of this vulnerability.

    #llm #llms #openai #vulnerability #chatgpt

    🔗 https://not-just-memorization.github.io/extracting-training-data-from-chatgpt.html

    🔗 https://arxiv.org/abs/2311.17035

    In conversation Thursday, 30-Nov-2023 19:18:22 JST from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: not-just-memorization.github.io
      Extracting Training Data from ChatGPT
    2. Domain not in remote thumbnail source whitelist: static.arxiv.org
      Scalable Extraction of Training Data from (Production) Language Models
      This paper studies extractable memorization: training data that an adversary can efficiently extract by querying a machine learning model without prior knowledge of the training dataset. We show an adversary can extract gigabytes of training data from open-source language models like Pythia or GPT-Neo, semi-open models like LLaMA or Falcon, and closed models like ChatGPT. Existing techniques from the literature suffice to attack unaligned models; in order to attack the aligned ChatGPT, we develop a new divergence attack that causes the model to diverge from its chatbot-style generations and emit training data at a rate 150x higher than when behaving properly. Our methods show practical attacks can recover far more data than previously thought, and reveal that current alignment techniques do not eliminate memorization.
  10. Embed this notice
    Alexandre Dulaunoy (adulau@infosec.exchange)'s status on Friday, 27-Oct-2023 18:17:10 JST Alexandre Dulaunoy Alexandre Dulaunoy
    • Signal
    • jvoisin

    Digging a little bit in the some ICC profiles added in signal-app, I updated the original issue and there is clearly an issue where new ICC profiles are created from the Google skia library.

    https://github.com/signalapp/Signal-Desktop/issues/6031#issuecomment-1702432836

    This issue only appears when the media-quality is to high. Maybe an allow-list strategy like the mat2 tool written by @jvoisin would be better to be sure that new metadata created are discarded by default.

    @signalapp

    #privacy #signal #signalapp #metadata

    In conversation Friday, 27-Oct-2023 18:17:10 JST from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/110/989/239/354/120/776/original/784eef0aacd6c835.png
    2. Domain not in remote thumbnail source whitelist: opengraph.githubassets.com
      Signal Desktop inserts invalid information (including copyright information) into photo exif data · Issue #6031 · signalapp/Signal-Desktop
      I took a picture of an object, when sending a photo to Signal (in a private message) and uploading it to a PC through Signal Desktop, I get an excessive amount of metadata (exif), and the worst tag...

User actions

    Alexandre Dulaunoy

    Alexandre Dulaunoy

    Enjoy when humans are using machines in unexpected ways. I break stuff and I do stuff.The other side is at @a (photography, art and free software at large)#infosec #opensource #threatintelligence #fedi22 #threatintel #searchable

    Tags
    • (None)

    Following 0

      Followers 0

        Groups 0

          Statistics

          User ID
          204538
          Member since
          27 Oct 2023
          Notices
          10
          Daily average
          0

          Feeds

          • Atom
          • Help
          • About
          • FAQ
          • TOS
          • Privacy
          • Source
          • Version
          • Contact

          GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

          Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.