mastodontech.de ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Offen für alle (über 16) und bereitgestellt von Markus'Blog

Serverstatistik:

1,4 Tsd.
aktive Profile

#opensourcesecurity

1 Beitrag1 Beteiligte*r0 Beiträge heute
Josh Bressers<p>This week on <a href="https://infosec.exchange/tags/OpenSourceSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSourceSecurity</span></a> I chat with Patrick Garrity about what's going on with <a href="https://infosec.exchange/tags/CVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE</span></a> </p><p>It's a wild couple of months, we break down where are today and where we think it's going to go soon, and why there are some difficult times ahead for vulnerability nerds</p><p><a href="https://opensourcesecurity.io/2025/2025-08-cve-patrick-garrity/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">opensourcesecurity.io/2025/202</span><span class="invisible">5-08-cve-patrick-garrity/</span></a></p>
DataDef(AE)<p>🧠 Backup is not just a technical task — it's a leadership responsibility.</p><p>As the founder of DataDef, I’ve seen too many businesses suffer from one simple mistake: they didn’t back up their data properly.</p><p>It’s not just about saving a copy. It’s about resilience.</p><p>📌 My rule — and what we follow at DataDef — is simple but powerful:<br>3-2-1-1-0</p><p>🔹 3 copies of your data<br>🔹 2 different storage types<br>🔹 1 offsite backup<br>🔹 1 immutable (read-only, ransomware-proof)<br>🔹 0 errors during recovery (because we test everything)</p><p>💡 If you don’t have a strategy like this, you’re not protected. You’re hoping for luck.<br>And hope is not a cybersecurity policy.</p><p>If you're a founder, CTO, or CISO — make backup part of your core risk strategy. Before something breaks.</p><p>DMs open.</p><p><a href="https://defcon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://defcon.social/tags/DataDef" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataDef</span></a> <a href="https://defcon.social/tags/Backup" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Backup</span></a> #32110 <a href="https://defcon.social/tags/TechLeadership" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechLeadership</span></a> <a href="https://defcon.social/tags/ImmutableBackup" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ImmutableBackup</span></a> <a href="https://defcon.social/tags/MastodonTech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MastodonTech</span></a> <a href="https://defcon.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://defcon.social/tags/OpenSourceSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSourceSecurity</span></a> <a href="https://defcon.social/tags/BusinessContinuity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BusinessContinuity</span></a> <a href="https://defcon.social/tags/DataProtection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataProtection</span></a></p>
ROLLER<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@joshbressers" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>joshbressers</span></a></span> nice <a href="https://twit.social/tags/opensourcesecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensourcesecurity</span></a> episode. This is how the sausage is made...</p>
Josh Bressers<p>I talked to Daniel Thompson-Yvetot on the latest episode of <a href="https://infosec.exchange/tags/OpenSourceSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSourceSecurity</span></a></p><p><a href="https://opensourcesecurity.io/2025/2025-07-eu-regulations-daniel-thompson/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">opensourcesecurity.io/2025/202</span><span class="invisible">5-07-eu-regulations-daniel-thompson/</span></a></p><p>The main topic was the coming regulation for software developers. While there are carve outs for open source projects, what counts as an open source project isn't as clear as I thought it was. I learned a ton from Daniel on this one. It's going to be a very interesting couple of years.</p>
Josh Bressers<p>This <a href="https://infosec.exchange/tags/OpenSourceSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSourceSecurity</span></a> episode I chatted with Jan Pleskac from Tropic Square about open source microprocessors</p><p>I learned an incredible amount about how this all works, what Tropic Square is trying to do, and what we can start to expect in the future</p><p>I would like to say it's time for open source to work its magic on the world of hardware, but it's indescribably more complicated than software</p><p><a href="https://opensourcesecurity.io/2025/2025-07-open-source-microprocessors/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">opensourcesecurity.io/2025/202</span><span class="invisible">5-07-open-source-microprocessors/</span></a></p>
anchore<p>We're LIVE! Join the Anchore Open Source team now to discuss Syft, Grype, and the latest in <a href="https://mstdn.business/tags/OpenSourceSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSourceSecurity</span></a>. Ask your questions! <a href="https://www.youtube.com/watch?v=BansvjNi9I0" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">youtube.com/watch?v=BansvjNi9I</span><span class="invisible">0</span></a></p>
OpenSSF<p>The June 2025 edition of the OpenSSF Newsletter is out! <br>📌 CRA readiness<br>📌 GUAC 1.0 release<br>📌 gittuf incubation<br>📌 CI/CD hardening<br>📌 Upcoming OSS security events</p><p>Explore updates &amp; ways to get involved: <a href="https://openssf.org/newsletter/2025/06/25/openssf-newsletter-june-2025/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">openssf.org/newsletter/2025/06</span><span class="invisible">/25/openssf-newsletter-june-2025/</span></a><br><a href="https://social.lfx.dev/tags/OpenSourceSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSourceSecurity</span></a> <a href="https://social.lfx.dev/tags/OpenSSF" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSSF</span></a></p>
The Zeek Network Security Monitor<p>We're heading to the NSF Cybersecurity Summit in Boulder (Oct 20-23) for our next in-person training ⛰️ </p><p>We hope to have more information soon and will keep the community updated on details. </p><p><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/NSF2025" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NSF2025</span></a> <a href="https://infosec.exchange/tags/OpenSourceSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSourceSecurity</span></a> <a href="https://infosec.exchange/tags/Training" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Training</span></a></p>

Set up CrowdSec IPDEX on OPNsense to enhance threat detection, response, and intelligence gathering.

Follow this guide by CrowdSec Ambassador Flaviu to start running CrowdSec IPDEX, a simple CLI tool that gathers insights on IP addresses, on @opnsense, the open source FreeBSD-based firewall.

Get started 👉 vlaicu.io/posts/crowdsec-ipdex/

Flaviu Vlaicu · Crowdsec IPDEX on OPNsenseIPDEX a simple CLI tool to gather insight about a list of IPs or an IP using the CrowdSec CTI
Fortgeführter Thread

As the image shows, we see that inside the results, many actors are classified as benign, which confirms that although the exploit is dangerous, the actual campaign is not. This level of enrichment provided by CrowdSec CTI helps security teams prioritize alerts, and IPDEX supports this workflow, allowing analysts to filter out harmless campaigns such as the one by the Shadowserver Foundation. You can also add a filter within IPDEX to remove those benign actors and filter on the date of last activity.

You can get started with IPDEX by heading over to the CrowdSec GitHub 👉 github.com/crowdsecurity/ipdex

🧵[2/2]

#CrowdSec#CyberSecurity#CTI

🚨Spike in Fortinet CVE-2024-55591 vulnerability rapidly increased in the past week 👇

The #CrowdSec Network has detected a wave of exploitation attempts targeting CVE-2024-55591, a Fortinet vulnerability that affects FortiWAN versions before 5.3.2. First seen on April 23rd, the CrowdSec Network still sees elevated levels of probing and exploitation.

ℹ️ About the exploit:
This flaw allows remote attackers to perform unauthenticated command injection on exposed FortiWAN instances. This vulnerability affects FortiWAN versions prior to 5.3.2. It enables attackers to execute arbitrary commands via crafted HTTP requests — no authentication required.

🔎 Trend analysis:
🔹 April 23rd: The CrowdSec Network detects a shift in the long-term trend of CVE-2024-55591 exploits.
🔹 April 23rd - April 28th: Activity increases rapidly from 30 to about 80 malicious IPs reported daily, producing over 400 distinct attack events.
🔹 April 29 - May 2nd: The attackers take a break. This provides a key point of insight into the nature of this attack campaign.
🔹 May 3rd - May 19th: The attack picks back up with increased intensity. It now originates from around 200 unique IP addresses per day and produces about 900 attack events per day.
🔹 May 19th: The CrowdSec Network still sees elevated levels of probing and exploitation attempts.

✅ How to protect your systems:
🔹 You can use CrowdSec’s open CTI search bar and blocklists to stay ahead of the curve. app.crowdsec.net/cti?q=cves%3A
🔹 Alternatively, you can use CrowdSec’s newest tool, IPDEX, to build instant reports for this particular CVE and explore the data CrowdSec has aggregated. crowdsec.net/blog/introducing-

For more information, visit 👉 crowdsec.net 🧵[1/2]

#CyberSecurity#CTI#Fortinet

🧩 The #SBOMlearningWeek series concludes! We've covered fundamentals, implementation, scaling, expert insights, and now the crucial intersections with compliance, #opensourcesecurity, and #DevSecOps. Software supply chain attacks continue to escalate—is your org prepared? anchore.com/blog/sboms-as-the- (Miss any? Start at day #1: anchore.com/blog/sbom-fundamen) #AppSec

🚀 Looking to break into #Cybersecurity or gain hands-on experience in #OpenSourceSecurity? The OpenSSF BEAR WG is teaming up with LFX Mentorship for the Summer 2025 program — and applications are now open!

Projects include #RSTUF and #gittuf, with a stipend for mentees!
🗓️ Deadline: May 18, 2025
📖 Read the blog for details + tips to apply: openssf.org/blog/2025/05/08/an
📝 Apply now: mentorship.lfx.linuxfoundation