cybersecurity

5997 readers
38 users here now

An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!

Community Rules

Enjoy!

founded 2 years ago
MODERATORS
1
2
 
 

Just released #BurpAnonymizer, a Burp Suite extension that redacts PII, credentials, tokens and other sensitive data from HTTP requests/responses.

With one click, safely share requests and responses in reports, presentations, team reviews, or AI workflows, without exposing secrets and minimizing manual redactions.

🔗 Explore it here: https://github.com/sv1sjp/BurpAnonymizer

#CyberSecurity #BurpSuite #AppSec #Privacy #SecurityTools #web PortSwigger

3
4
2
cpe-guesser 2.0 released (www.vulnerability-lookup.org)
submitted 10 hours ago by cm0002@literature.cafe to c/cybersecurity
5
 
 

Le Monde revealed that France’s aircraft carrier Charles de Gaulle was tracked in real time through an officer’s activity on the Strava app. A sailor unknowingly shared running data from the ship, exposing its location in the Mediterranean. The French sailor’s public Strava profile, set as “public,” revealed the near real-time location of the aircraft carrier in the Mediterranean, near Cyprus and Turkey.

6
7
 
 

cross-posted from: https://infosec.pub/post/43738524

Rust security maintainers contend Nadim Kobeissi's vulnerability claims are too much Since February, cryptographer Nadim Kobeissi has been trying to get code fixes applied to Rust cryptography libraries to address what he says are critical bugs. For his efforts, he's been dismissed, ignored, and banned from Rust security channels.…

8
 
 

It is our honour to announce the release of Vulnerability-Lookup 4.2.0!

This version brings a large number of new CSAF-based vulnerability advisory sources, improvements to the web interface, and several bug fixes.

What's New

New CSAF-based sources

As the number of GNA keeps growing and the interest around the GCVE-EU initiative increases, these UI improvements and filtering capabilities are becoming essential to efficiently explore the various available sources.

Below is the list of CSAF-based sources available by default. You can enable or disable each feeder via the config/modules.cfg configuration file. The display in the web interface is also configurable through the config/website.py configuration file.

Improvements

  • Enriched CSAF view
    The generic CSAF view now includes severity, vulnerabilities, references, and acknowledgments.
    d528da8

  • Enriched OSV view
    Added severity and references to the generic OSV view.
    65de73e

  • Date published in CVE records
    If known, the datePublic field of CVE records is now displayed.
    861a082

  • Boost recent sightings enabled by default
    The boost recent sightings switch is now checked by default.
    4eed4c4

  • New source argument for the full-text indexer
    Added a source argument to the indexer for more targeted indexing.
    d4e6e1f

  • Less verbose indexing
    Reduced the verbosity of the full-text search indexing process.
    a563dff

  • Configuration improvements
    Reorganized the default SOURCES_TO_SHOW config variable and updated the sample website.py configuration with examples for the new configuration options.
    f699400, 6e8fb6c

  • Documentation updates
    Various improvements to the documentation, including GCVE publication as a GNA and Known Exploited Vulnerabilities Catalogs.
    58a4d83, 143f5f5, 1f6d6d3, 52c774f

  • Updated Python dependencies
    6e30dc2

Fixes

  • Fixed incorrect vulnerability ID passed in various Jinja macros. cf1b209
  • Fixed the default product option so the form correctly re-submits its value when changing sort/order controls. 7373f8f
  • Suppressed spurious config warnings for disabled features. c82e911
  • Fixed a variable shadowing issue in parse_vuln_payload() where the local source variable was overriding the function parameter. cb03721

Changelog

📂 For the full list of changes, check the GitHub release:
https://github.com/vulnerability-lookup/vulnerability-lookup/releases/tag/v4.2.0

🙏 Thank you to all contributors and testers!

Special thanks to Raphaël Vinot for adding the new sources.

Feedback and Support

If you encounter any issues or have suggestions, feel free to open a ticket on our GitHub repository:
https://github.com/vulnerability-lookup/vulnerability-lookup/issues/
Your feedback is always appreciated!

Follow Us on Fediverse/Mastodon

You can follow us on Mastodon and get real-time information about security advisories:
https://social.circl.lu/@vulnerability_lookup/

9
10
11
12
 
 

Weekly thread for any and all career, learning and general guidance questions. Thinking of taking a training or going for a cert? Wondering how to level up your career? Wondering what NOT to do? Got other questions? This is the time and place to ask!

13
14
15
16
4
Off-Topic Friday (self.cybersecurity)
submitted 1 week ago by shellsharks to c/cybersecurity
 
 

Wanna chat about something non-infosec amongst those of us who frequent /c/cybersecurity? Here’s your chance! (Keep things civil & respectful please)

17
18
 
 

Weekly thread to discuss whatever you’re working on, big or small, at work or in your free time.

19
20
 
 

Weekly thread for any and all career, learning and general guidance questions. Thinking of taking a training or going for a cert? Wondering how to level up your career? Wondering what NOT to do? Got other questions? This is the time and place to ask!

21
22
23
3
Off-Topic Friday (self.cybersecurity)
submitted 2 weeks ago by shellsharks to c/cybersecurity
 
 

Wanna chat about something non-infosec amongst those of us who frequent /c/cybersecurity? Here’s your chance! (Keep things civil & respectful please)

24
25
view more: next ›