Alexandre Dulaunoy
adulau.bsky.social
Alexandre Dulaunoy
@adulau.bsky.social
More on fediverse at @adulau@infosec.exchange and @a@paperbay.org

Or following @adulau.infosec.exchange.ap.brid.gy or @a.paperbay.org.ap.brid.gy
Reposted by Alexandre Dulaunoy
The MISP Galaxy now includes an updated knowledge base of UAVs and drones covering both civilian and military models.

It comes with detailed attributes such as manufacturer, cost, and technical specs.
You can now easily classify, model, and share […]

[Original post on infosec.exchange]
November 6, 2025 at 4:45 PM
Reposted by Alexandre Dulaunoy
Gestion des vulnérabilités par @adulau.bsky.social et C.Bonhomme du #CIRCL🇱🇺 à #UYBHYS2025, agrègent et corrèlent 27 sources 🇺🇸 🇨🇳 🇪🇺...👍🏻
Prédiction par IA de la sévérité à partir des descriptions textes 🤩
#GCVE permet à chacun de publier des vulnérabilités gcve.eu
www.vulnerability-lookup.org
November 8, 2025 at 10:49 AM
Reposted by Alexandre Dulaunoy
What might one pay for this amount of excellence? Google suggests to me that $136,365.99 will get you ONE ENTIRE YEAR of the ability to use the product.
January 17, 2024 at 7:56 PM
Reposted by Alexandre Dulaunoy
🚀 Kunai pushes further integration with MISP!

This week, we've made significant progress in bridging Kunai with @misp to enhance threat intelligence sharing. Our focus has been on developing kunai-to-misp, a new tool available at […]

[Original post on infosec.exchange]
February 7, 2025 at 10:17 AM
Reposted by Alexandre Dulaunoy
During the hackathon.lu, we thought about making large datasets available locally to enable participants to conduct experiments or develop new open-source security tools.

A full Common Crawl dataset will be accessible, along with extensive passive DNS dumps.

If you think of a large open […]
Original post on infosec.exchange
infosec.exchange
February 9, 2025 at 9:11 AM
Reposted by Alexandre Dulaunoy
Sonicwall (SonicOS) vulnerabilities.

SonicOS SSLVPN Authentication Bypass Vulnerability. CVE-2024-53704 sounds not very good but the others seem quite critical too.

Bundle created in @vulnerability_lookup from a imgur reference.

🔗 […]
Original post on infosec.exchange
infosec.exchange
January 7, 2025 at 12:45 PM
A relative path traversal in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specially crafted web requests.

vulnerability.circl.lu/cve/CVE-2023...

#vulnerability #fortinet #cybersecurity
cvelistv5 - CVE-2023-34990
Vulnerability-Lookup - Fast vulnerability lookup correlation from different sources.
vulnerability.circl.lu
December 18, 2024 at 2:49 PM
New blog post: Improving Cybersecurity Taxonomies Describing Impact and Cyber Harms Against Organizations

I’ve introduced a new MISP taxonomy & shared insights into the critical role of impact description in information sharing.

#CyberSecurity #MISP #taxonomies #taxonomy

foo.be/2024/12/Impr...
Improving Cybersecurity Impact Taxonomies
Personal webpage of Alexandre Dulaunoy - from information security to open source and art
foo.be
December 8, 2024 at 1:06 PM
Ever wondered what happens to rejected CVEs that still appear in other sources? Tools like vulnerability-lookup highlight these cases...

#vulnerability #cve #cybersecurity #opensource #opendata #linuxkernel

🔗 vulnerability.circl.lu/vuln/cve-202...
November 29, 2024 at 9:28 AM