|
Vulnerability Report - December 2025
|
|
0
|
10
|
January 12, 2026
|
|
Empowering the Ecosystem: MISPβs 2025 Progress and the Open Source Future
|
|
0
|
7
|
January 7, 2026
|
|
GCVE BCP-05 drafting - Best practices for the "container" format - modified CVE Record Format
|
|
44
|
418
|
January 2, 2026
|
|
The Art of Pivoting - Techniques for Intelligence Analysts to Discover New Relationships in a Complex World
|
|
0
|
11
|
December 20, 2025
|
|
Vulnerability-lookup 2.20.0 released
|
|
0
|
9
|
December 20, 2025
|
|
Flowintel v2.3.0 with computer-assisted reports, compliance and governance documentation, and more
|
|
0
|
12
|
December 15, 2025
|
|
GPU Efficiency in VLAI Model Training
|
|
0
|
13
|
December 12, 2025
|
|
AIL v6.6 β Advanced PDF Processing and Manual Crawling Support
|
|
0
|
13
|
December 12, 2025
|
|
MISP v2.5.28 released with security fixes and improvements
|
|
0
|
8
|
December 11, 2025
|
|
Vulnerability-Lookup 2.19.0
|
|
0
|
22
|
December 10, 2025
|
|
End-of-Year Threat Intelligence Sightings Forecast
|
|
0
|
42
|
December 2, 2025
|
|
Vulnerability-Lookup 2.18.0 released
|
|
0
|
59
|
November 14, 2025
|
|
UAVs and drones MISP galaxy now available
|
|
0
|
14
|
November 6, 2025
|
|
AI datasets and VLAI model
|
|
8
|
251
|
October 31, 2025
|
|
Hack your brain β Pauline Bourmeau (Cookie)
|
|
1
|
25
|
October 31, 2025
|
|
How to better identify (weaponized) file formats with ftguess β Philippe Lagadec
|
|
2
|
101
|
October 28, 2025
|
|
CLI ambush β William Robinet
|
|
1
|
38
|
October 28, 2025
|
|
Extending the GCVE Python cli with a vulnerability lookup command
|
|
3
|
80
|
October 27, 2025
|
|
DCOM Turns 20: Revisiting a Legacy Interface in the Modern Threatscape β Julien Bedel
|
|
1
|
30
|
October 24, 2025
|
|
Automotive Security Analyzer for Exploitability Risks: An Automated and Attack Graph-Based Evaluation of On-Board Networks β Martin Salfer
|
|
1
|
25
|
October 24, 2025
|
|
Exploiting Legit APIs for Covert C2: A New Perspective on Cloud-based Malware Operations β cocomelonc
|
|
1
|
22
|
October 24, 2025
|
|
Lethal Language Models: From Bit Flip to RCE in Ollama β Paul Gerste
|
|
1
|
22
|
October 24, 2025
|
|
Russian-speaking underground - changes in the risks, attack surface and modus operandi β Vladimir Kropotov
|
|
1
|
11
|
October 24, 2025
|
|
From YAML to Root: CI/CD Pipeline Attacks and Countermeasures β Hugo
|
|
1
|
28
|
October 24, 2025
|
|
Palo Alto GlobalProtect : Remote Full Compromise Exploit Chain β Maxime Escourbiac
|
|
1
|
25
|
October 24, 2025
|
|
Breaking Android IPC: A Deep Dive into AIDL Fuzzing β Rajanish Pathak
|
|
1
|
17
|
October 24, 2025
|
|
Practical intro to deeplearning: chihuahuas vs muffins β Pauline Bourmeau (Cookie), William Robinet
|
|
1
|
19
|
October 24, 2025
|
|
Livewire : remote command execution through unmarshalling β RΓ©mi Matasse (@_remsio_), Pierre Martin (@_Worty), Pierre MARTIN
|
|
1
|
23
|
October 24, 2025
|
|
2038 is gonna be epoch! β Pedro Umbelino, Trey Darley
|
|
1
|
26
|
October 24, 2025
|
|
Wyse Management Subversion : Taking over Dell's Wyse Management Suite β Alain Mowat
|
|
1
|
10
|
October 24, 2025
|