Alexandre Dulaunoy
banner
adulau.infosec.exchange.ap.brid.gy
Alexandre Dulaunoy
@adulau.infosec.exchange.ap.brid.gy
Enjoy when humans are using machines in unexpected ways. I break stuff and I do stuff.

The other side is at @a (photography, art and free software at large) […]

[bridged from https://infosec.exchange/@adulau on the fediverse by https://fed.brid.gy/ ]
After #cloudflare , GitHub seems to have also some issues tonight.

#github #internet
November 18, 2025 at 9:08 PM
The MISP Galaxy now includes an updated knowledge base of UAVs and drones covering both civilian and military models.

It comes with detailed attributes such as manufacturer, cost, and technical specs.
You can now easily classify, model, and share […]

[Original post on infosec.exchange]
November 6, 2025 at 4:45 PM
New UI to RansomLook.io

The open source project providing real-time ransomware intelligence.

Thanks to @F_kZ_ for the incredible work.

#ransomware #threatintelligence #threatintel #opensource

🔗 https://www.ransomlook.io/
November 5, 2025 at 6:43 AM
I think the best summary until now about Post-quantum cryptography
is from Peter Gutmann in the cryptography mailing-list.

Given that after 20 years and hundreds of millions of dollars spent
researchers have yet to demonstrate a single legitimate […]

[Original post on infosec.exchange]
November 3, 2025 at 5:46 AM
Sometimes I understand why people design new standards or formats when the existing ones can’t be extended (whether due to practical constraints, authority, or bureaucracy) or simply aren’t flexible enough to evolve. I think the XKCD comic doesn’t include […]

[Original post on infosec.exchange]
November 2, 2025 at 11:46 AM
Imagine a threat intelligence report that concludes, ‘The target is three hops away, therefore it is the correct one.’ This is the method the Pentagon reportedly uses today: not only to identify targets, but also to justify and execute strikes.

🔗 […]

[Original post on infosec.exchange]
November 2, 2025 at 7:06 AM
Vulnerability Lookup and GCVE: A Decentralized Approach to Vulnerability Publishing and Management Workshop at Hack.lu 2025

We published all the materials from the workshop given at #hacklu 2025

#gcve #vulnerabilitymanagement #opensource #cybersecurity […]

[Original post on infosec.exchange]
October 24, 2025 at 9:02 AM
Seeing a presentation of the Kaitai project.

If you need to document or describe or decode binary format, Kaitai is clearly there to help.

https://kaitai.io/ @kaitai

#hacklu #kaitai #dfir #cybersecurity
October 22, 2025 at 5:09 PM
We added a workshop at @hack_lu 2025 about the rulezet.org project.

Collaborative Detection Engineering with Rulezet: Building a Trusted Community for Detection Rules

https://2025.hack.lu/agenda/

@suricata @cert_eu @misp @circl
October 15, 2025 at 2:33 PM
One year, I had a chat with the fine people @suricata during the @cert_eu conference, and they were wondering why we didn't create an open source website for all the different rules (YARA, Suricata, and many others) — a place to allow comments, reviews […]

[Original post on infosec.exchange]
October 14, 2025 at 3:06 PM
We are pleased to announce the release of CTI-Transmute.org, a new free and open-source service designed to facilitate conversions between MISP and STIX 2.x formats.

The service is available both through a web interface and an API, allowing users to convert […]

[Original post on infosec.exchange]
October 9, 2025 at 4:34 PM
@hrbrmstr Indeed good point. We see the same on bgpranking. I'll ping CERT-BUND.
October 8, 2025 at 2:49 PM
Seeing is Deceiving: Mirror-Based LiDAR Spoofing for Autonomous Vehicle Deception

https://arxiv.org/pdf/2509.17253

#car #safety #lidar
September 24, 2025 at 12:05 PM
I’m sad about Robert Redford’s passing. I’ve always loved the movie Sneakers, it even inspired two references in our open-source software. One is hidden in the official MISP documentation, and the other is in the tool’s very name. I’ll let you guess which […]

[Original post on infosec.exchange]
September 16, 2025 at 3:31 PM
After seeing a workshop using a crappy pseudo/proprietary forensic web capture toolkit for law enforcement, I was disappointed by the lack of open source tooling to have a sane forensic collection for web capture. Following a discussion with @rafi0t he did […]

[Original post on infosec.exchange]
September 9, 2025 at 8:59 PM
Draugnet is a lightweight, open-source tool for anonymous cyber threat reporting. Built for the MISP ecosystem, it lets users submit and track reports — no accounts, no logins, just a simple token. Supports plain text, MISP JSON, and object templates. ideal […]

[Original post on infosec.exchange]
September 2, 2025 at 8:44 AM
I’ve refreshed the “General Methodologies for Intelligence Analysis” section on threat-intelligence.eu

The page was a bit dated, so it now has cleaner references, better structure, and direct links to practical models (including MISP taxonomies).

🔗 […]

[Original post on infosec.exchange]
August 30, 2025 at 2:50 PM
@jtk I bet it's because this time, it's not only Amazon's own infrastructure...
August 29, 2025 at 2:24 PM
GCVE-BCP-04 - Recommendations and Best Practices for ID Allocation version 1.1 published.

BCP Document https://gcve.eu/bcp/gcve-bcp-04/

PDF https://gcve.eu/files/bcp/gcve-bcp-04.pdf

Comments and feedback […]

[Original post on infosec.exchange]
August 29, 2025 at 2:14 PM
By the way, we’ve never managed to get any hashes or urls from the so-called non-profit organisations that claim to share CSAM material hashes or links for detection. We’ve come to assume we’ll never receive any, so supporting actual detection was out of […]

[Original post on infosec.exchange]
August 18, 2025 at 1:32 PM
Finally a useful magic quadrant

Thanks to @wendynather for the discovery.

#cybersecurity #vulnerability
August 11, 2025 at 6:21 AM
Anyone having issue with Tor for the past few days?

It seems one of the Snowflake bridge is down (but should not impact obfs4):

https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/issues/40475

but from the number of relays […]

[Original post on infosec.exchange]
August 10, 2025 at 9:27 AM
When I added the threat-actor @misp galaxy type on Mar 4, 2016, I didn’t expect that, years later, vendors would still invent new names for already known threat actors, avoid using UUIDs, reuse similar names for different actors, and create confusing names […]

[Original post on infosec.exchange]
August 1, 2025 at 9:14 AM
I love the @github Security Advisory Database because they actually preserve the data from rejected advisories including the original information and the reason for rejection.

It’s clearly much more insightful than just having a bare ID marked as "rejected […]

[Original post on infosec.exchange]
July 25, 2025 at 8:29 AM
Curious about all the open source and projects developed by @circl ?

CIRCL Open Source tools powering SOC & CSIRT teams.

#opensource #cybersecurity #soc #csirt #threatintel #threatintelligence

🔗 https://hdoc.cnw.circl.lu/JJKFoeHrS9Wf28L4tAyCNg?view#
July 18, 2025 at 2:10 PM