<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
  <updated>2026-04-09T15:48:53Z</updated>
  <generator>https://yabu.me</generator>

  <title>Nostr notes by Alexandre Dulaunoy</title>
  <author>
    <name>Alexandre Dulaunoy</name>
  </author>
  <link rel="self" type="application/atom+xml" href="https://yabu.me/npub1xanpgt7tl8scvww672puu3pt2ez0v6fz8ms3tatgzu638pc000jqsa9q9d.rss" />
  <link href="https://yabu.me/npub1xanpgt7tl8scvww672puu3pt2ez0v6fz8ms3tatgzu638pc000jqsa9q9d" />
  <id>https://yabu.me/npub1xanpgt7tl8scvww672puu3pt2ez0v6fz8ms3tatgzu638pc000jqsa9q9d</id>
  <icon>https://media.infosec.exchange/infosec.exchange/accounts/avatars/109/295/362/026/663/569/original/0ef3f34cedf9edaa.jpeg</icon>
  <logo>https://media.infosec.exchange/infosec.exchange/accounts/avatars/109/295/362/026/663/569/original/0ef3f34cedf9edaa.jpeg</logo>




  <entry>
    <id>https://yabu.me/nevent1qqsx4t6r3dswl97g599th92u33zxnftq4gl2jajjk8yqp0xa4tzcmzgzyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7gw59cju</id>
    
      <title type="html">FSL and BSL belong on any list of false-promise ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsx4t6r3dswl97g599th92u33zxnftq4gl2jajjk8yqp0xa4tzcmzgzyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7gw59cju" />
    <content type="html">
      FSL and BSL belong on any list of false-promise licenses:&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://fsl.software/&amp;#34&#34;&gt;https://fsl.software/&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34; translate=&amp;#34;no&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;invisible&amp;#34;&amp;gt;&lt;a href=&#34;https://&amp;lt;/span&amp;gt;&amp;lt;span&#34;&gt;https://&amp;lt;/span&amp;gt;&amp;lt;span&lt;/a&gt; class=&amp;#34;&amp;#34;&amp;gt;fsl.software/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;invisible&amp;#34;&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://mariadb.com/bsl-faq-adopting/#whatis&amp;#34&#34;&gt;https://mariadb.com/bsl-faq-adopting/#whatis&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34; translate=&amp;#34;no&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;invisible&amp;#34;&amp;gt;&lt;a href=&#34;https://&amp;lt;/span&amp;gt;&amp;lt;span&#34;&gt;https://&amp;lt;/span&amp;gt;&amp;lt;span&lt;/a&gt; class=&amp;#34;ellipsis&amp;#34;&amp;gt;mariadb.com/bsl-faq-adopting/#&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;invisible&amp;#34;&amp;gt;whatis&amp;lt;/span&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt;&lt;br/&gt;&lt;br/&gt;They are **not open source**. They are restrictive source-available licenses dressed up with “open” language.&lt;br/&gt;&lt;br/&gt;Reading the code is not enough. If users cannot freely run, use, or build on the software because of field-of-use or competition restrictions, the software is not open source.&lt;br/&gt;&lt;br/&gt;Marketing it as “open source” or even putting “open” in your name is misleading twice: first in the license, then in the messaging.&lt;br/&gt;&lt;br/&gt;#opensource #fauxopensource #license
    </content>
    <updated>2026-04-10T04:38:05Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsqlkynkg6kj9nrsn877p8xdlfjpj4plj8wa4xf0h6xukk8v5fal6szyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7gsy3u97</id>
    
      <title type="html">If someone comes to me today preaching about “post-quantum” ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsqlkynkg6kj9nrsn877p8xdlfjpj4plj8wa4xf0h6xukk8v5fal6szyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7gsy3u97" />
    <content type="html">
      If someone comes to me today preaching about “post-quantum” security issues, I’ll remind them of the current state of security: the npm ecosystem gets abused daily, CI pipelines run left and right with full access to cloud services, so-called security devices like F5 and Ivanti are exposed (and compromised) to the internet, mailboxes get compromised just to change an IBAN in a PDF, and a simple phone call is still enough to get someone to hand over an MFA code.&lt;br/&gt;&lt;br/&gt;But yes, by all means, let’s focus on post-quantum threats while handing AI tools SSH access like it’s a feature, not a confession.&lt;br/&gt;&lt;br/&gt;#cybersecurity #stateoftheworld&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/322/174/707/797/506/original/b2c8beec36c42e77.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2026-03-31T05:41:10Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsdttycmurg7cmu4qj97ya0hhpa7rw6w43vzr0veyy6vneerrn6jkgzyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7gr9xcfv</id>
    
      <title type="html">In the same level of discussions, &amp;#34;Discord Alternatives, ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsdttycmurg7cmu4qj97ya0hhpa7rw6w43vzr0veyy6vneerrn6jkgzyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7gr9xcfv" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsdhyqgvze46sxr5jf34fthkzw828w0mwxfq827y7pyka37vx22lqqls52pw&#39;&gt;nevent1q…52pw&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;In the same level of discussions, &amp;#34;Discord Alternatives, Ranked&amp;#34; is an interesting read too.&lt;br/&gt;&lt;br/&gt;🔗 &lt;a href=&#34;https://taggart-tech.com/discord-alternatives/&#34;&gt;https://taggart-tech.com/discord-alternatives/&lt;/a&gt;
    </content>
    <updated>2026-02-10T11:27:17Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsdhyqgvze46sxr5jf34fthkzw828w0mwxfq827y7pyka37vx22lqqzyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7g9gv2kd</id>
    
      <title type="html">I hate Discord. The platform is proprietary, the U/X is just ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsdhyqgvze46sxr5jf34fthkzw828w0mwxfq827y7pyka37vx22lqqzyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7g9gv2kd" />
    <content type="html">
      I hate Discord. The platform is proprietary, the U/X is just completely confusing and it&amp;#39;s difficult to find anything. &lt;br/&gt;&lt;br/&gt;If you run a project, I love &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1shflyr3kdel32z4rc3ssv4a2rg3uhq9nvq2e9m632jgyg7h03ycq427zml&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;Discourse&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1shf…7zml&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; - it&amp;#39;s open source, the U/X is great and you can archive everything in markdown (and much more).&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://github.com/discourse/discourse&#34;&gt;https://github.com/discourse/discourse&lt;/a&gt;&lt;br/&gt;and we run it for GCVE &lt;a href=&#34;https://discourse.ossbase.org/c/gcve/14&#34;&gt;https://discourse.ossbase.org/c/gcve/14&lt;/a&gt; &lt;br/&gt;&lt;br/&gt;#opensource #discourse
    </content>
    <updated>2026-02-10T07:18:15Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsrl6l6vnjzc7ngap6ywzaqaa253853qzdacefrx2m9lakez9rtwzszyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7g4dldrh</id>
    
      <title type="html">The federation is open. Any matrix server or bridge is allowed.</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsrl6l6vnjzc7ngap6ywzaqaa253853qzdacefrx2m9lakez9rtwzszyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7g4dldrh" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs9y66xhh9w2gstyvleepg6zu0dgknp2g6uw4q3yvsn2rc0p8dxa9sx27k5z&#39;&gt;nevent1q…7k5z&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;The federation is open. Any matrix server or bridge is allowed.
    </content>
    <updated>2026-02-09T16:01:17Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsvzzfzn92qepwsatd2pe7dqt8khu287rxcujufgpjc37cu2ucqmmszyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7g4us2xz</id>
    
      <title type="html">You need to have an account on another public matrix server like ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsvzzfzn92qepwsatd2pe7dqt8khu287rxcujufgpjc37cu2ucqmmszyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7g4us2xz" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsr04s3dm5np7hkullql458je59jun2pkyrqekmcvwgw4m4eln6pyst2emfn&#39;&gt;nevent1q…emfn&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;You need to have an account on another public matrix server like matrix.org to join the public room. We don’t allow account creation on our server.
    </content>
    <updated>2026-02-06T21:11:03Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsw4jjau6929duzw03ua0q224277cg46u855lv58p89usduun27yvgzyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7g2jdg9j</id>
    
      <title type="html">We’ve just set up a Matrix channel for Vulnerability-Lookup and ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsw4jjau6929duzw03ua0q224277cg46u855lv58p89usduun27yvgzyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7g2jdg9j" />
    <content type="html">
      We’ve just set up a Matrix channel for Vulnerability-Lookup and GCVE discussions.&lt;br/&gt;&lt;br/&gt;Matrix public room: #vulnerability-lookup-public:matrix.circl.lu&lt;br/&gt;&lt;br/&gt;This space is intended for informal discussions. For standard and more detailed discussions, we recommend using:&lt;br/&gt;&lt;br/&gt;🔗 vulnerability-lookup discourse &lt;a href=&#34;https://discourse.ossbase.org/c/vulnerability-lookup/6&#34;&gt;https://discourse.ossbase.org/c/vulnerability-lookup/6&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;🔗 GCVE discourse &lt;a href=&#34;https://discourse.ossbase.org/c/gcve/14&#34;&gt;https://discourse.ossbase.org/c/gcve/14&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#gcve #vulnerabilitymanagement #opensource #cve #matrix &lt;br/&gt;&lt;br/&gt;&lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1pnarjrczen0087w26a9axw3jhq9wxh5cn073k0s2pjem0ura2yqqhl2y52&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;gcve.eu&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1pna…2y52&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; &lt;br/&gt;&lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub143xwtzhj6xhcxkhxzjj62cs6rs0fl7q4ufuuypcmec2xhnm4cpvqm2w0tp&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;circl&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub143x…w0tp&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt;
    </content>
    <updated>2026-02-06T13:08:17Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqszjz42zlaxn9g20ntk9wdwwk52xrcptqstxkd63gc0xkywl43u7sgzyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7g5dm9r0</id>
    
      <title type="html">Iperlane Security ?</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqszjz42zlaxn9g20ntk9wdwwk52xrcptqstxkd63gc0xkywl43u7sgzyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7g5dm9r0" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsql3ww8jl0mxkg48tz3n9cf0e3sufhqnh2ygx2e689x934z464h6cnkdzjx&#39;&gt;nevent1q…dzjx&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Iperlane Security ?
    </content>
    <updated>2026-02-01T18:03:25Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsfz88ymvy75rnw4t8u8lu57nys7rmeje2scudwgd4anydzsrkhkzczyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7gs68475</id>
    
      <title type="html">French government always talks about technological sovereignty… ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsfz88ymvy75rnw4t8u8lu57nys7rmeje2scudwgd4anydzsrkhkzczyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7gs68475" />
    <content type="html">
      French government always talks about technological sovereignty…&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.lemonde.fr/en/france/article/2025/12/15/us-tech-firm-palantir-extends-deal-with-french-intelligence-agency_6748523_7.html&#34;&gt;https://www.lemonde.fr/en/france/article/2025/12/15/us-tech-firm-palantir-extends-deal-with-french-intelligence-agency_6748523_7.html&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#palantir #french #sovereignty&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/115/735/888/485/402/567/original/c60344041442b80d.jpeg&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-12-17T16:41:09Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsydkgl3ud2ssalhxfkw5xxlv9tv8727k9akead3puqhj3w49lzl6qzyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7g799yyh</id>
    
      <title type="html">Why it matters to create and maintain open-source infrastructure ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsydkgl3ud2ssalhxfkw5xxlv9tv8727k9akead3puqhj3w49lzl6qzyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7g799yyh" />
    <content type="html">
      Why it matters to create and maintain open-source infrastructure for security monitoring including collection of forums and malicious communication channels.&lt;br/&gt;&lt;br/&gt;This is a strong example (Google dark web report is discontinued)  of the risks of relying solely on commercial vendors. If a capability does not align with their business interests or generate sufficient revenue, it can be discontinued at any time. Open-source infrastructure helps ensure continuity, transparency, and long-term access to critical monitoring capabilities that are essential for the security community.&lt;br/&gt;&lt;br/&gt;If you want to run your own &amp;#34;darkweb&amp;#34; monitoring, we develop open source tooling supporting such monitoring&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://www.ail-project.org/&amp;#34&#34;&gt;https://www.ail-project.org/&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34; translate=&amp;#34;no&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;invisible&amp;#34;&amp;gt;&lt;a href=&#34;https://www.&amp;lt;/span&amp;gt;&amp;lt;span&#34;&gt;https://www.&amp;lt;/span&amp;gt;&amp;lt;span&lt;/a&gt; class=&amp;#34;&amp;#34;&amp;gt;ail-project.org/&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;invisible&amp;#34;&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/a&amp;gt; &amp;lt;span class=&amp;#34;h-card&amp;#34; translate=&amp;#34;no&amp;#34;&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://infosec.exchange/@ail_project&amp;#34&#34;&gt;https://infosec.exchange/@ail_project&amp;#34&lt;/a&gt;; class=&amp;#34;u-url mention&amp;#34;&amp;gt;@&amp;lt;span&amp;gt;ail_project&amp;lt;/span&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;/span&amp;gt; &amp;lt;/li&amp;gt;&amp;lt;li&amp;gt;&amp;lt;a href=&amp;#34;&lt;a href=&#34;https://github.com/ail-project&amp;#34&#34;&gt;https://github.com/ail-project&amp;#34&lt;/a&gt;; target=&amp;#34;_blank&amp;#34; rel=&amp;#34;nofollow noopener&amp;#34; translate=&amp;#34;no&amp;#34;&amp;gt;&amp;lt;span class=&amp;#34;invisible&amp;#34;&amp;gt;&lt;a href=&#34;https://&amp;lt;/span&amp;gt;&amp;lt;span&#34;&gt;https://&amp;lt;/span&amp;gt;&amp;lt;span&lt;/a&gt; class=&amp;#34;&amp;#34;&amp;gt;github.com/ail-project&amp;lt;/span&amp;gt;&amp;lt;span class=&amp;#34;invisible&amp;#34;&amp;gt;&amp;lt;/span&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;/li&amp;gt;&lt;br/&gt;&lt;br/&gt;#darkweb #opensource #osint #cybersecurity &lt;br/&gt;&lt;br/&gt;🔗  &lt;a href=&#34;https://support.google.com/websearch/answer/16767242?hl=en&amp;amp;ref_topic=7028834&amp;amp;co=GENIE.Platform%3DiOS&#34;&gt;https://support.google.com/websearch/answer/16767242?hl=en&amp;amp;ref_topic=7028834&amp;amp;co=GENIE.Platform%3DiOS&lt;/a&gt;
    </content>
    <updated>2025-12-17T12:09:00Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsrgdwkqsyy4ut4cv363z7w5d8lerv4w7gxnpv2gct69rtcywyg0dczyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7gwvqw9g</id>
    
      <title type="html">Can you share the indicators? we can give you an access to a ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsrgdwkqsyy4ut4cv363z7w5d8lerv4w7gxnpv2gct69rtcywyg0dczyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7gwvqw9g" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsf2rsm2uvdvfek0e5968rsell832pc2hnd42zv3e2yjsyzs2pjpwgy084jm&#39;&gt;nevent1q…84jm&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Can you share the indicators? we can give you an access to a &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1mlypv5xgnd6zxu8ssyzc485ussa5a0mwf3g4t6sz2jtgts2qsuqq6arl2t&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;MISP&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1mly…rl2t&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; community if needed
    </content>
    <updated>2025-11-04T14:11:40Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsrxuu252wrehc34k8n6k7yw33q8qx8yn4ddrqvxtqv50lt9drs6xszyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7g7flr9e</id>
    
      <title type="html">I think the best summary until now about Post-quantum ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsrxuu252wrehc34k8n6k7yw33q8qx8yn4ddrqvxtqv50lt9drs6xszyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7g7flr9e" />
    <content type="html">
      I think the best summary until now about Post-quantum cryptography is from Peter Gutmann in the cryptography mailing-list.&amp;lt;code&amp;gt;Given that after 20 years and hundreds of millions of dollars spent researchers have yet to demonstrate a single legitimate cryptanalysis result using a quantum physics experiment, it&amp;#39;s a bit like arguing over which brand of unicorn repellent is the most cromulent.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;The current state of things in terms of pure vs. hybrid systems seems to be:&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;- Governments = Pure: “We’re putting all our eggs in one basket and hoping that the dial stops spinning at ‘not broken’”&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;- Everyone else = Hybrid: “We trust this new stuff so little that we’re requiring you use the crypto that we claim is broken alongside it”&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Peter.&amp;lt;br&amp;gt;&amp;lt;/code&amp;gt;&lt;br/&gt;&lt;br/&gt;#cryptography #pq #postquantum #postquantumcryptography &lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.metzdowd.com/pipermail/cryptography/2025-October/039129.html&#34;&gt;https://www.metzdowd.com/pipermail/cryptography/2025-October/039129.html&lt;/a&gt;&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/115/484/165/861/731/308/original/37fde305bc3b500f.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-11-03T05:46:21Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs93p60u7xhlru5s2ezpesmx5xcr5vgwc6zluzc8srqxpjnf9pu3yczyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7gfdyd4h</id>
    
      <title type="html">I’m just wondering are you sure of the test? I remember we got ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs93p60u7xhlru5s2ezpesmx5xcr5vgwc6zluzc8srqxpjnf9pu3yczyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7gfdyd4h" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqswthsvjmvevehyh83uuyvfy8fetmw67qmm3g6c4w2f2qsqmml9rdgnacwre&#39;&gt;nevent1q…cwre&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;I’m just wondering are you sure of the test? I remember we got trapped in an ASA scanning script which was expecting an HTTP 200 while the patch gives a redirect but this was also a 200.
    </content>
    <updated>2025-10-28T11:54:49Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsfjrxvlzs7dmgggz22atnztjhjg3qwh3w5rw4e6f2vnr2l7hjp0nczyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7ga7kjj5</id>
    
      <title type="html">Imagine working in your country’s cybersecurity center or CERT, ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsfjrxvlzs7dmgggz22atnztjhjg3qwh3w5rw4e6f2vnr2l7hjp0nczyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7ga7kjj5" />
    <content type="html">
      Imagine working in your country’s cybersecurity center or CERT, and suddenly being reassigned to border control and deportation duties. Something is clearly broken and dangerously so.&lt;br/&gt;&lt;br/&gt;What will you do as a cybersecurity professional?&lt;br/&gt;&lt;br/&gt;#us #cybersecurity #dhs #cisa &lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://techcrunch.com/2025/10/10/homeland-security-reassigns-hundreds-of-cisa-cyber-staffers-to-support-trumps-deportation-crackdown/&#34;&gt;https://techcrunch.com/2025/10/10/homeland-security-reassigns-hundreds-of-cisa-cyber-staffers-to-support-trumps-deportation-crackdown/&lt;/a&gt;
    </content>
    <updated>2025-10-11T06:32:08Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs8k5txv9eu67v9cxcnr8qj84hxu2vrwg7c70wj86qcz2fpwlazqnszyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7gy7f6j6</id>
    
      <title type="html">Finally a useful magic quadrant Thanks to @npub1udn…3tjr for ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs8k5txv9eu67v9cxcnr8qj84hxu2vrwg7c70wj86qcz2fpwlazqnszyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7gy7f6j6" />
    <content type="html">
      Finally a useful magic quadrant&lt;br/&gt;&lt;br/&gt;Thanks to &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1udn9dsz5hxu4akxgjk7q8ax3g6jmujaamarukkxt096mjxt8vaqsnl3tjr&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;Wendy Nather&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1udn…3tjr&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; for the discovery.&lt;br/&gt;&lt;br/&gt;#cybersecurity #vulnerability&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/115/008/670/175/980/149/original/6909f753c4ce0b8c.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-08-11T06:20:08Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsgq5c8awtwmnp3ljsy6f06kv86wfkr7ykf36g48pa20yzkkt3d63qzyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7ge747x9</id>
    
      <title type="html">When I added the threat-actor @npub1mly…rl2t galaxy type on Mar ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsgq5c8awtwmnp3ljsy6f06kv86wfkr7ykf36g48pa20yzkkt3d63qzyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7ge747x9" />
    <content type="html">
      When I added the threat-actor &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1mlypv5xgnd6zxu8ssyzc485ussa5a0mwf3g4t6sz2jtgts2qsuqq6arl2t&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;MISP&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1mly…rl2t&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; galaxy type on Mar 4, 2016, I didn’t expect that, years later, vendors would still invent new names for already known threat actors, avoid using UUIDs, reuse similar names for different actors, and create confusing names by mixing tools or software used by the actors.&lt;br/&gt;&lt;br/&gt;That’s why we continue the tedious work of maintaining a proper threat-actor database, with relationships to other galaxies such as MITRE ATT&amp;amp;CK, Malpedia, and more.&lt;br/&gt;&lt;br/&gt;After years of this monastic effort, we’re seeing the benefits—many open-source and proprietary tools now rely on the MISP galaxy, which serves as both an open standard and a public knowledge base.&lt;br/&gt;&lt;br/&gt;We also maintain a dedicated website for all MISP galaxies. Here’s an example from the threat-actor database:&lt;br/&gt;&lt;a href=&#34;https://www.misp-galaxy.org/threat-actor/relations/fa80877c-f509-4daf-8b62-20aba1635f68/&#34;&gt;https://www.misp-galaxy.org/threat-actor/relations/fa80877c-f509-4daf-8b62-20aba1635f68/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;:github: Repository &lt;a href=&#34;https://github.com/MISP/misp-galaxy/&#34;&gt;https://github.com/MISP/misp-galaxy/&lt;/a&gt;&lt;br/&gt;🌐 Public website &lt;a href=&#34;https://www.misp-galaxy.org/threat-actor/&#34;&gt;https://www.misp-galaxy.org/threat-actor/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;If you’d like to become a monk (just kidding!) and contribute, feel free to open an issue or submit a pull request on the misp-galaxy repo.&lt;br/&gt;&lt;br/&gt;In MISP, you can directly benefit from all the galaxies, and you also have advanced functionalities like forking and maintaining an up-to-date private version of the threat-actor database.&lt;br/&gt;&lt;br/&gt;#threatintel #threatintelligence #opensource #tip #cti #misp&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/952/712/373/425/103/original/999229c7f8449349.png&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/952/712/316/970/288/original/0928ff88ed5595a2.png&#34;&gt; &lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/952/733/039/839/174/original/eb4687037f0d17bb.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-08-01T09:14:32Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsdc3nawkrpr6a7mw55w3l2w2ssyjuw3w7cyegdqxpra5wv2wwmpvgzyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7gkx784k</id>
    
      <title type="html">« Cloudflare 1.1.1.1 Incident on July 14, 2025 » Perhaps it’s ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsdc3nawkrpr6a7mw55w3l2w2ssyjuw3w7cyegdqxpra5wv2wwmpvgzyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7gkx784k" />
    <content type="html">
      « Cloudflare 1.1.1.1 Incident on July 14, 2025 »&lt;br/&gt;&lt;br/&gt;Perhaps it’s time to return to DNS’s original distributed design.&lt;br/&gt;&lt;br/&gt;#dns #distributed #cloudflare &lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://blog.cloudflare.com/cloudflare-1-1-1-1-incident-on-july-14-2025/&#34;&gt;https://blog.cloudflare.com/cloudflare-1-1-1-1-incident-on-july-14-2025/&lt;/a&gt;
    </content>
    <updated>2025-07-16T05:27:24Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs8v0k8xx84rk6jfdgf9w9p43ndt64n8puy9sg3ppjztrgkquyy9eqzyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7gdtq66v</id>
    
      <title type="html">Something that’s been bothering me for years in the security ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs8v0k8xx84rk6jfdgf9w9p43ndt64n8puy9sg3ppjztrgkquyy9eqzyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7gdtq66v" />
    <content type="html">
      Something that’s been bothering me for years in the security world: why do researchers demand bug bounties for vulnerabilities in open source projects, when the very contributors maintaining and fixing those issues get nothing, just goodwill?&lt;br/&gt;&lt;br/&gt;It feels deeply unfair. The burden falls on unpaid maintainers, yet bounty hunters get rewarded. If you want a paid bounty, maybe help fund the people who actually fix the mess too.&lt;br/&gt;&lt;br/&gt;#opensource #security #bugbounty
    </content>
    <updated>2025-06-17T19:46:46Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsggf6hawa3qn6xhwj0x2nkas0lmww6fkw7y95404srqknkypgkv0gzyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7gf7x24m</id>
    
      <title type="html">Just a reminder: Vulnerability Lookup isn’t just about finding ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsggf6hawa3qn6xhwj0x2nkas0lmww6fkw7y95404srqknkypgkv0gzyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7gf7x24m" />
    <content type="html">
      Just a reminder: Vulnerability Lookup isn’t just about finding CVEs. It supports the full chain, collection from multiple sources, continuous distribution, and allocation within a coordinated vulnerability disclosure (CVD) process. 100% open source.&lt;br/&gt;&lt;br/&gt;🔗 An online version maintained by &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub143xwtzhj6xhcxkhxzjj62cs6rs0fl7q4ufuuypcmec2xhnm4cpvqm2w0tp&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;circl&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub143x…w0tp&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; &lt;a href=&#34;https://vulnerability.circl.lu/&#34;&gt;https://vulnerability.circl.lu/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;🔗 &lt;a href=&#34;https://www.vulnerability-lookup.org/&#34;&gt;https://www.vulnerability-lookup.org/&lt;/a&gt; &lt;br/&gt;&lt;br/&gt;🔗 &lt;a href=&#34;https://github.com/vulnerability-lookup/vulnerability-lookup&#34;&gt;https://github.com/vulnerability-lookup/vulnerability-lookup&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#opensource #cve #vulnerability #cna #cvd #cybersecurity
    </content>
    <updated>2025-04-15T19:45:12Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsfqdnqnz9r73fpkny6dnygphyfj03g55c6mfyum8uve368uffk35czyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7g6s9ypk</id>
    
      <title type="html">If you want to join an open source #hackathon for open source ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsfqdnqnz9r73fpkny6dnygphyfj03g55c6mfyum8uve368uffk35czyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7g6s9ypk" />
    <content type="html">
      If you want to join an open source #hackathon for open source security tools, it’s next week (on April 8th and 9th, 2025) in Luxembourg.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://hackathon.lu&#34;&gt;https://hackathon.lu&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#opensource #infosec #cybersecurity&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/286/793/736/838/662/original/9d5a38a7d5817b1c.jpeg&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-04-05T18:37:39Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs8d0ru2jjx7gcqt3059mqmq0d0cpdr93q4u2j7dm7u325wvfjevegzyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7g07aqut</id>
    
      <title type="html">We are excited to announce that CIRCL has three open positions ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs8d0ru2jjx7gcqt3059mqmq0d0cpdr93q4u2j7dm7u325wvfjevegzyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7g07aqut" />
    <content type="html">
      We are excited to announce that CIRCL has three open positions available.&lt;br/&gt;&lt;br/&gt;As a team strongly oriented towards open-source development, we value contributions that drive innovation and strengthen the cybersecurity community. These roles are open to EU citizens, with the workplace based in Luxembourg. If you’re passionate about cybersecurity and open-source collaboration, we encourage you to apply and make a meaningful impact.&amp;lt;li&amp;gt;CIRCL - Software Engineer and Intelligence Analyst (software-engineering-analyst) &amp;lt;/li&amp;gt;&lt;br/&gt;&lt;br/&gt;🔗 &lt;a href=&#34;https://www.circl.lu/projects/position/software-engineering-analyst/&amp;lt;li&amp;gt;CIRCL&#34;&gt;https://www.circl.lu/projects/position/software-engineering-analyst/&amp;lt;li&amp;gt;CIRCL&lt;/a&gt; - Security Analyst and Researcher (Security-Analyst-and-Researcher)&amp;lt;/li&amp;gt;&lt;br/&gt;&lt;br/&gt;🔗 &lt;a href=&#34;https://www.circl.lu/projects/position/security-analyst-researcher/&amp;lt;li&amp;gt;CIRCL&#34;&gt;https://www.circl.lu/projects/position/security-analyst-researcher/&amp;lt;li&amp;gt;CIRCL&lt;/a&gt; - Incident and Vulnerability Disclosure Coordinator/Analyst (nis2-incident-analyst)&amp;lt;/li&amp;gt;&lt;br/&gt;&lt;br/&gt;🔗 &lt;a href=&#34;https://www.circl.lu/projects/position/nis2-incident-analyst/&#34;&gt;https://www.circl.lu/projects/position/nis2-incident-analyst/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;&lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub143xwtzhj6xhcxkhxzjj62cs6rs0fl7q4ufuuypcmec2xhnm4cpvqm2w0tp&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;circl&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub143x…w0tp&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; &lt;br/&gt;&lt;br/&gt;#cybersecurity #opensource #europe #csirt #cert #nis2
    </content>
    <updated>2025-03-12T10:05:18Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsfefqmwnzuyvlavvzgtqxqrwq36pek9a64uvnfznwtm6qr2yj2scqzyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7gj23lu8</id>
    
      <title type="html">I find this vulnerability hilarious « The GDPR Cookie Compliance ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsfefqmwnzuyvlavvzgtqxqrwq36pek9a64uvnfznwtm6qr2yj2scqzyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7gj23lu8" />
    <content type="html">
      I find this vulnerability hilarious&lt;br/&gt;&lt;br/&gt;« The GDPR Cookie Compliance – Cookie Banner, Cookie Consent, Cookie Notice – CCPA, DSGVO, RGPD plugin for WordPress is vulnerable to Stored Cross-Site Scripting »&lt;br/&gt;&lt;br/&gt;Often, websites only use cookies necessary for normal operation and don’t require explicit user consent. However, some legal teams insist on having it “to be on the safe side.” Now it’s very safe indeed. ;-)&lt;br/&gt;&lt;br/&gt;This particular vulnerability isn’t a big deal since it requires admin rights on WordPress to inject. If you’re already an admin, you can do worse things. The only advantage for attackers is that the injection spreads everywhere.&lt;br/&gt;&lt;br/&gt;#infosec #gdpr #cybersecurity #vulnerability #wordpress &lt;br/&gt;&lt;br/&gt;🔗 &lt;a href=&#34;https://vulnerability.circl.lu/vuln/CVE-2025-2205&#34;&gt;https://vulnerability.circl.lu/vuln/CVE-2025-2205&lt;/a&gt;
    </content>
    <updated>2025-03-12T06:26:28Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsf72qxmqrvc0wwfx79asj4h0mjs6ds39ym7rhld7vr3jxh803s9gszyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7gafpp54</id>
    
      <title type="html">The « bias » one is hilarious. So many reports, manuals, and ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsf72qxmqrvc0wwfx79asj4h0mjs6ds39ym7rhld7vr3jxh803s9gszyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7gafpp54" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqswsech2zam5333scyxuvkqnsfg9g6sm6fmw8l8zs8rr7d2lu3s3hs70qhl7&#39;&gt;nevent1q…qhl7&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;The « bias » one is hilarious. So many reports, manuals, and memos mention the word. From Europe, it just looks like ignorance is tearing everything down, like a massive autodafé.
    </content>
    <updated>2025-02-10T17:44:09Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsqlyx88mg86ns2hem78dwf2yfsx9uqwt56gcgqm4a28glkuddj87qzyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7g9vy6l2</id>
    
      <title type="html">We developed the open source vulnerability-lookup project (and ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsqlyx88mg86ns2hem78dwf2yfsx9uqwt56gcgqm4a28glkuddj87qzyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7g9vy6l2" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsqvrjx3ag78eqdwhjdjx4xq2ng7lt5w0lgwc649h8ckg78yy7hkeg7n2f5x&#39;&gt;nevent1q…2f5x&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;We developed the open source vulnerability-lookup project (and also the sighting part) for providing actionable intelligence in the scope of NIS2 obligation and to share the information with all CSIRTs and SOCs efficiently. &lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.vulnerability-lookup.org/&#34;&gt;https://www.vulnerability-lookup.org/&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;about the sighting aspect &lt;a href=&#34;https://www.vulnerability-lookup.org/tools/#sightings&#34;&gt;https://www.vulnerability-lookup.org/tools/#sightings&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;We have still plenty of ideas. If you see something missing, let us know.&lt;br/&gt;&lt;br/&gt;&lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1lcc6wn885u6k395x5j5tmdm94r6dh9zajxm8gyk82pv2s2j3el7sc6lcye&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;Kevin Beaumont&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1lcc…lcye&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub14g0mj0fmn0sepfuhp2wupyk7d8xyz7rezpmrx2gfsav9vxlwxypq4xznd6&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;Not Simon 🐐&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub14g0…znd6&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt;
    </content>
    <updated>2024-12-18T17:37:38Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqswum76r99gycjd9lwdv9dfq5hu6n7hegnre4dh8cqha70swl88uxszyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7gs77wyg</id>
    
      <title type="html">If you are curious about the evolution of sightings ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqswum76r99gycjd9lwdv9dfq5hu6n7hegnre4dh8cqha70swl88uxszyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7gs77wyg" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqswjdye4l3684ypklsxsg2eucn5tx4pduahavxypaus0lfhn9dqm9qcxxkvm&#39;&gt;nevent1q…xkvm&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;If you are curious about the evolution of sightings &lt;a href=&#34;https://vulnerability.circl.lu/vuln/CVE-2023-34990#sightings&#34;&gt;https://vulnerability.circl.lu/vuln/CVE-2023-34990#sightings&lt;/a&gt;
    </content>
    <updated>2024-12-18T17:05:39Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsykjjqk5rv9vjlxfeehyyjhdw83fjzvheqddjvrmtt7lqwy50gsvqzyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7gwc2n7w</id>
    
      <title type="html">If you are wondering about the unpublished CVE-2024-49848... ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsykjjqk5rv9vjlxfeehyyjhdw83fjzvheqddjvrmtt7lqwy50gsvqzyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7gwc2n7w" />
    <content type="html">
      If you are wondering about the unpublished CVE-2024-49848... there is a PoC.&lt;br/&gt;&lt;br/&gt;#vulnerability &lt;br/&gt;&lt;br/&gt;🔗  &lt;a href=&#34;https://vulnerability.circl.lu/comment/23fd524b-475e-4b9f-8dc2-7b67f4cec409&#34;&gt;https://vulnerability.circl.lu/comment/23fd524b-475e-4b9f-8dc2-7b67f4cec409&lt;/a&gt;
    </content>
    <updated>2024-12-18T15:00:08Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs94cqee3amrk6pzvntu8usn48x6g9n94m4rv26kwdqjryg4mc6kggzyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7gtc3ssx</id>
    
      <title type="html">Post-Quantum Cryptography in OpenPGP - an IETF draft #openpgp ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs94cqee3amrk6pzvntu8usn48x6g9n94m4rv26kwdqjryg4mc6kggzyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7gtc3ssx" />
    <content type="html">
      Post-Quantum Cryptography in OpenPGP - an IETF draft&lt;br/&gt;&lt;br/&gt;#openpgp #pgp #postquantum &lt;br/&gt;&lt;br/&gt;🔗  &lt;a href=&#34;https://datatracker.ietf.org/doc/draft-ietf-openpgp-pqc/&#34;&gt;https://datatracker.ietf.org/doc/draft-ietf-openpgp-pqc/&lt;/a&gt;
    </content>
    <updated>2024-11-07T05:43:59Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsv0nk96q0rc946n2mgmeqpj3rq53ecgnu4vytxtp5shc8sc9vq8vgzyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7gu0nhe3</id>
    
      <title type="html">The latest proposal from @npub1djq…zj5f poses significant risks ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsv0nk96q0rc946n2mgmeqpj3rq53ecgnu4vytxtp5shc8sc9vq8vgzyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7gu0nhe3" />
    <content type="html">
      The latest proposal from &lt;span itemprop=&#34;mentions&#34; itemscope itemtype=&#34;https://schema.org/Person&#34;&gt;&lt;a itemprop=&#34;url&#34; href=&#34;/npub1djqmz389kefncr7cu2c5p07yh4fmv70pamkmxxyxk6ht97funs2srdzj5f&#34; class=&#34;bg-lavender dark:prose:text-neutral-50 dark:text-neutral-50 dark:bg-garnet px-1&#34;&gt;&lt;span&gt;Open Source Initiative :osi:&lt;/span&gt; (&lt;span class=&#34;italic&#34;&gt;npub1djq…zj5f&lt;/span&gt;)&lt;/a&gt;&lt;/span&gt; poses significant risks to the true principles of open source. This concern reminds me of my primary issue with EPSS, where the model is documented in a paper, yet relies on proprietary data sources that aren’t accessible for reproduction. It&amp;#39;s like having free/open source software without the entire build chain needed to create the executable code.&lt;br/&gt;&lt;br/&gt;What’s the actual reasoning behind this clause?&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://opensource.org/ai/drafts/the-open-source-ai-definition-1-0-rc2&#34;&gt;https://opensource.org/ai/drafts/the-open-source-ai-definition-1-0-rc2&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#opensource #fauxpensource #ai&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/113/378/496/382/426/809/original/55195ea4179000cc.jpeg&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2024-10-27T08:49:46Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsg7hg8297qhnucg63pjmyfw2u6kalc4tnhkhp23wlt64qv9kvd9tszyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7gylw4su</id>
    
      <title type="html">We announce the release of onion-lookup v0.1. This open source ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsg7hg8297qhnucg63pjmyfw2u6kalc4tnhkhp23wlt64qv9kvd9tszyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7gylw4su" />
    <content type="html">
      We announce the release of onion-lookup v0.1. This open source tool and service is designed to help you search for Tor hidden services / .onion services quickly and efficiently. With its sleek API and user-friendly online interface, onion-lookup simplifies the process of querying and exploring onion addresses without browsing Tor and gather more information.&lt;br/&gt;&lt;br/&gt;🔗 Online version &lt;a href=&#34;https://onion.ail-project.org/&#34;&gt;https://onion.ail-project.org/&lt;/a&gt;&lt;br/&gt;🔗 Source code &lt;a href=&#34;https://github.com/ail-project/onion-lookup&#34;&gt;https://github.com/ail-project/onion-lookup&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#tor #darkweb #osint #opensource #infosec #onion &lt;br/&gt;&lt;br/&gt;The information is relying on a [@ail_project](&lt;a href=&#34;https://infosec.exchange/@ail_project&#34;&gt;https://infosec.exchange/@ail_project&lt;/a&gt; ) instance operated by the AIL project.&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/113/266/500/768/615/308/original/cb454d72770f561b.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2024-10-07T14:05:28Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsrtmrq24jw3sxp0cdyxaw4mvwk5veha9670ve840ehf08040p4fkczyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7gw26zaj</id>
    
      <title type="html">If you are curious about the history of vulnerabilities in cups ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsrtmrq24jw3sxp0cdyxaw4mvwk5veha9670ve840ehf08040p4fkczyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7gw26zaj" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsqg87gad8ftgq3k2pw6cnhuntnyc4gq82c8678m3kd74ck2rpwjdgm5kl7m&#39;&gt;nevent1q…kl7m&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;If you are curious about the history of vulnerabilities in cups &lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://vulnerability.circl.lu/search?vendor=cups&amp;amp;product=cups&amp;amp;vendor_vuln=&#34;&gt;https://vulnerability.circl.lu/search?vendor=cups&amp;amp;product=cups&amp;amp;vendor_vuln=&lt;/a&gt;
    </content>
    <updated>2024-09-26T20:37:13Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsqg87gad8ftgq3k2pw6cnhuntnyc4gq82c8678m3kd74ck2rpwjdgzyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7gj9x9hc</id>
    
      <title type="html">« A series of bugs in the CUPS printers discovery mechanism ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsqg87gad8ftgq3k2pw6cnhuntnyc4gq82c8678m3kd74ck2rpwjdgzyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7gj9x9hc" />
    <content type="html">
      « A series of bugs in the CUPS printers discovery mechanism (cups-browsed) and in other components of the CUPS system, can be chained together to allow a remote attacker to automatically install a malicious printer (or hijack an existing one via mDNS) to execute arbitrary code on the target host as the lp user when a print job is sent to it. »&lt;br/&gt;&lt;br/&gt;Ok…. don’t expose your print server to the Internet. Wait for the update from your favorite open source operating system. Nothing new under the sun.&lt;br/&gt;&lt;br/&gt;#cups #vulnerability #infosec &lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://gist.github.com/stong/c8847ef27910ae344a7b5408d9840ee1&#34;&gt;https://gist.github.com/stong/c8847ef27910ae344a7b5408d9840ee1&lt;/a&gt;
    </content>
    <updated>2024-09-26T20:06:04Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqswdapkmhv7patkg7w59j6ssady78a4f4hgjgfcl2u4ycmhh78v84gzyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7gh4f4p5</id>
    
      <title type="html">A funny phishing targeting GitHub users with an email ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqswdapkmhv7patkg7w59j6ssady78a4f4hgjgfcl2u4ycmhh78v84gzyqmkv9p0e0u7rp3emteg8njy9dtyfanfyglwz904dqtn2yu8paa7gh4f4p5" />
    <content type="html">
      A funny phishing targeting GitHub users with an email notification about a security issue on a existing repository.&lt;br/&gt;&lt;br/&gt;Then the captcha verification on a malicious website is trying to trick the user to run a shell command on Windows.&lt;br/&gt;&lt;br/&gt;🔗 Powershell to be executed by the user &lt;br/&gt;&lt;a href=&#34;https://gist.github.com/adulau/6cf6f3e9c5bbd9106af8814d0a22f473&#34;&gt;https://gist.github.com/adulau/6cf6f3e9c5bbd9106af8814d0a22f473&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;🔗 File downloaded &lt;a href=&#34;https://pandora.circl.lu/analysis/21e8f693-361b-4a04-853c-276f9dd841e4/seed-1XqUr4mADaFYlLAyrBH8oQUBgOoEbceZ586b8h05YyA&#34;&gt;https://pandora.circl.lu/analysis/21e8f693-361b-4a04-853c-276f9dd841e4/seed-1XqUr4mADaFYlLAyrBH8oQUBgOoEbceZ586b8h05YyA&lt;/a&gt; - Lumma Stealer  &lt;br/&gt;&lt;br/&gt;🔗 Malicious domain analysis. &lt;a href=&#34;https://lookyloo.circl.lu/tree/91106035-dfec-4acc-af06-c9fc36c62774&#34;&gt;https://lookyloo.circl.lu/tree/91106035-dfec-4acc-af06-c9fc36c62774&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;#malware #malwareanalysis #infosec&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/113/160/470/862/757/558/original/529545749cc9d6ca.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2024-09-18T20:48:23Z</updated>
  </entry>

</feed>