sueden.social ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Eine Community für alle, die sich dem Süden hingezogen fühlen. Wir können alles außer Hochdeutsch.

Serverstatistik:

1,8 Tsd.
aktive Profile

#opensourcesecurity

0 Beiträge0 Beteiligte0 Beiträge heute

New from Ossprey: PyPI is cracking down on domain resurrection attacks by invalidating expired maintainer domains.

1,800 accounts un-verified in just 2 months.
Time to check if your dependencies rely on revoked maintainers.

Full blog:
www.ossprey.com/blog/pypi-domain-vigilance

How do you secure thousands of open-source projects?

At the June 2025 FreeBSD Developer Summit, Michael Winser shared three years of lessons from the Alpha-Omega project—covering supply chain risk, rapid audits, and sustainable funding.

📺 Watch here: Lessons From Funding Open Source Security Over the Past 3 Years, What’s Ahead
youtu.be/6DoT-eFH6tY?si=M_zlAf

🧠 Backup is not just a technical task — it's a leadership responsibility.

As the founder of DataDef, I’ve seen too many businesses suffer from one simple mistake: they didn’t back up their data properly.

It’s not just about saving a copy. It’s about resilience.

📌 My rule — and what we follow at DataDef — is simple but powerful:
3-2-1-1-0

🔹 3 copies of your data
🔹 2 different storage types
🔹 1 offsite backup
🔹 1 immutable (read-only, ransomware-proof)
🔹 0 errors during recovery (because we test everything)

💡 If you don’t have a strategy like this, you’re not protected. You’re hoping for luck.
And hope is not a cybersecurity policy.

If you're a founder, CTO, or CISO — make backup part of your core risk strategy. Before something breaks.

DMs open.

#CyberSecurity #DataDef #Backup #32110 #TechLeadership #ImmutableBackup #MastodonTech #InfoSec #OpenSourceSecurity #BusinessContinuity #DataProtection

Set up CrowdSec IPDEX on OPNsense to enhance threat detection, response, and intelligence gathering.

Follow this guide by CrowdSec Ambassador Flaviu to start running CrowdSec IPDEX, a simple CLI tool that gathers insights on IP addresses, on @opnsense, the open source FreeBSD-based firewall.

Get started 👉 vlaicu.io/posts/crowdsec-ipdex/

Flaviu Vlaicu · Crowdsec IPDEX on OPNsenseIPDEX a simple CLI tool to gather insight about a list of IPs or an IP using the CrowdSec CTI
Fortgeführter Thread

As the image shows, we see that inside the results, many actors are classified as benign, which confirms that although the exploit is dangerous, the actual campaign is not. This level of enrichment provided by CrowdSec CTI helps security teams prioritize alerts, and IPDEX supports this workflow, allowing analysts to filter out harmless campaigns such as the one by the Shadowserver Foundation. You can also add a filter within IPDEX to remove those benign actors and filter on the date of last activity.

You can get started with IPDEX by heading over to the CrowdSec GitHub 👉 github.com/crowdsecurity/ipdex

🧵[2/2]

#CrowdSec#CyberSecurity#CTI

🚨Spike in Fortinet CVE-2024-55591 vulnerability rapidly increased in the past week 👇

The #CrowdSec Network has detected a wave of exploitation attempts targeting CVE-2024-55591, a Fortinet vulnerability that affects FortiWAN versions before 5.3.2. First seen on April 23rd, the CrowdSec Network still sees elevated levels of probing and exploitation.

ℹ️ About the exploit:
This flaw allows remote attackers to perform unauthenticated command injection on exposed FortiWAN instances. This vulnerability affects FortiWAN versions prior to 5.3.2. It enables attackers to execute arbitrary commands via crafted HTTP requests — no authentication required.

🔎 Trend analysis:
🔹 April 23rd: The CrowdSec Network detects a shift in the long-term trend of CVE-2024-55591 exploits.
🔹 April 23rd - April 28th: Activity increases rapidly from 30 to about 80 malicious IPs reported daily, producing over 400 distinct attack events.
🔹 April 29 - May 2nd: The attackers take a break. This provides a key point of insight into the nature of this attack campaign.
🔹 May 3rd - May 19th: The attack picks back up with increased intensity. It now originates from around 200 unique IP addresses per day and produces about 900 attack events per day.
🔹 May 19th: The CrowdSec Network still sees elevated levels of probing and exploitation attempts.

✅ How to protect your systems:
🔹 You can use CrowdSec’s open CTI search bar and blocklists to stay ahead of the curve. app.crowdsec.net/cti?q=cves%3A
🔹 Alternatively, you can use CrowdSec’s newest tool, IPDEX, to build instant reports for this particular CVE and explore the data CrowdSec has aggregated. crowdsec.net/blog/introducing-

For more information, visit 👉 crowdsec.net 🧵[1/2]

#CyberSecurity#CTI#Fortinet

Thank you Brittany Day, Linux Security for your insightful coverage of #VulnCon25!

This article highlights critical developments in vulnerability management including metadata improvements, supply chain security measures, EU Cyber Resilience Act impacts and emerging security baseline standards.

Read more: go.first.org/zeokh

Linux SecurityKey Trends & Takeaways from VulnCon 2025VulnCon 2025, recently held in Raleigh, NC, created a dynamic stage for security professionals and open-source advocates to connect, share, and...