snabelen.no er en av mange uavhengige Mastodon-servere du kan bruke for å delta i det desentraliserte sosiale nettet.
Ein norsk heimstad for den desentraliserte mikroblogge-plattformen.

Administrert av:

Serverstatistikk:

368
aktive brukere

#CTI

6 innlegg6 deltakereett innlegg i dag

🚀 From C to Python to Rust: How We Built a Fast URL Parser in 3 Days ⚡

When our @ail_project (github.com/ail-project) started hitting performance walls with URL processing, we knew we needed a change. We were using Faup (github.com/stricaud/faup), a capable C library, but faced two growing pains: 🔄 architectural portability issues and cumbersome Python binding installations. Our first attempt was rewriting it in Python - which solved the installation problems but created new performance bottlenecks when processing millions of URLs. 🐢

That's when we decided to try Rust. Three days later, we had faup-rs (github.com/ail-project/faup-rs) - a zero-allocation URL parser with full Python bindings (pypi.org/project/pyfaup-rs/). 🎉

What made this possible? Two incredible Rust ecosystem tools:
- Pest (github.com/pest-parser/pest) - it might look a bit hostile at first, but this parser generator has consistently saved us weeks of development time across multiple projects. You define the grammar, and Pest handles a lot of the parsing magic. ✨
- PyO3 (github.com/PyO3) - which made creating Python bindings almost effortless. 🤝

The result speaks for itself:
- ⚡ Fast URL parsing callable from Python
- 🌍 True cross-platform compatibility
- 📦 Simple pip installation
- 🗑️ Zero allocations during parsing

This experience reinforced an important lesson: when you hit fundamental performance limits, sometimes the fastest solution is rewriting your bottleneck in Rust. The language's combination of speed, safety, and growing ecosystem makes these kinds of transformations not just possible, but practical even on tight timelines. 💡

You can try it today:
- Rust crate: crates.io/crates/faup-rs
- Python package: pypi.org/project/pyfaup-rs

As always, it is open-source and you can check it out: github.com/ail-project/faup-rs 🏗️

AIL Project is an open source project to collect and analyse data to produce security intelligence. - ail project
GitHubail projectAIL Project is an open source project to collect and analyse data to produce security intelligence. - ail project
#Rust#Python#CTI

“The Beginning and Ending of Threat Actors” by @jfslowik

“Instead, Volt Typhoon becomes a construct: a cluster of linked actions, behavioral tendencies, and targeting preferences linked to PRC interests.”

This article provides a concise and clear overview of what often happens with threat actor labeling. If you are working in “threat intelligence,” read it carefully, then read it again, and review all the labels you use for different threat actors. You might be surprised to discover that many of them fall into the category of “constructed intelligence.”

This blog post could be the start of a book about accurate threat intelligence.

#cti #threatintel #threatintelligence #voltyphoon #cybersecurity

pylos.co/2025/08/29/the-beginn

Stranded on Pylos · The Beginning and Ending of Threat ActorsIn July 2025, NSA officials at a conference in New York City made a surprising claim: “The good news is, [Volt Typhoon] really failed. They wanted to persist in domestic networks very quietly for a…
Fortsettelse av samtale

“While many people see sovereign citizens and others of their ilk as odd but not overtly threatening, this belies the real #risk they may pose.

It’s true that most are non-violent in nature, but their entrenched and #ExtremeBeliefs and their #distrust of the state and authority renders them a group of interest for #LawEnforcement due to the potential for #escalation into #AntiSociality and #violence, especially when they link with other fringe right-wing extremists.

More than a third of all counter-terror investigations in #Australia now focus on #extreme #RightWing groups and individuals, including those associated with the #SovereignCitizen movement.” — Ahona Guha

#AhonaGuha #PhD / #Forensic / #Psychology / #CT #CTI <theage.com.au/politics/victori> (paywall) / <archive.md/ygO8Y>

The Age · I’ve worked with so-called sovereign citizens. They all believe they’re specialAv Ahona Guha

@cR0w BlackBasta liked Stark Industries based on my chat leak analysis of their root server ASNs. Here’s a list of their top 30 ASNs by IP count, absolutely zero surprises:

432, AS206728 (Media Land LLC - Russia)
126, AS20473 (The Constant Company - US)
97, AS215376 (Media Land Cloud - Russia)
54, AS24940 (Hetzner Online GmbH - Germany)
19, AS210644 (AEZA International Ltd. - Great Britian)
18, AS142036 (Hosteons Pte. Ltd. - Singapore)
16, AS200019 (Alexhost SRL - Moldova)
15, AS62904 (Eonix Corporation - US)
13, AS204601 (Zomro B.V. - Netherlands)
12, AS58061 (Scalaxy B.V. - Latvia)
12, AS14061 (Digital Ocean - US)
11, AS39568 (Asia Wireless Group MChJ QK - Uzbekistan)
11, AS174 (Cogent Communications - US)
10, AS51765 (Oy Crea Nova Hosting Solution Ltd - Finland)
10, AS216024 (Aleksei Fedorov PR Krusevac - Serbia)
8, AS47583 (Hostinger International - Cyprus)
6, AS16276 (OVH SAS - France)
5, AS44477 (PQ Hosting Plus S.R.L. - Moldova)
5, AS36352 (HostPapa - US)
5, AS29802 (Hivelocity - US)
5, AS206804 (EstNOC OY - Estonia)
5, AS16276 (OVH SAS - France)
4, AS395954 (Leaseweb USA - US)
4, AS29551 (Aixit GmbH - Germany)
4, AS216300 (Closed Joint Stock Company AbkhazMedia - Georgia)
4, AS213230 (Hetzner Online GmbH - Germany)
4, AS212317 (Hetzner Online GmbH - Germany)
4, AS209132 (Alviva Holding Limited - Seychelles)
4, AS202015 (HZ Hosting Ltd. - Bulgaria)
4, AS19148 (LeaseWeb USA, Inc. - US)

When I added the threat-actor @misp galaxy type on Mar 4, 2016, I didn’t expect that, years later, vendors would still invent new names for already known threat actors, avoid using UUIDs, reuse similar names for different actors, and create confusing names by mixing tools or software used by the actors.

That’s why we continue the tedious work of maintaining a proper threat-actor database, with relationships to other galaxies such as MITRE ATT&CK, Malpedia, and more.

After years of this monastic effort, we’re seeing the benefits—many open-source and proprietary tools now rely on the MISP galaxy, which serves as both an open standard and a public knowledge base.

We also maintain a dedicated website for all MISP galaxies. Here’s an example from the threat-actor database:
misp-galaxy.org/threat-actor/r

:github: Repository github.com/MISP/misp-galaxy/
🌐 Public website misp-galaxy.org/threat-actor/

If you’d like to become a monk (just kidding!) and contribute, feel free to open an issue or submit a pull request on the misp-galaxy repo.

In MISP, you can directly benefit from all the galaxies, and you also have advanced functionalities like forking and maintaining an up-to-date private version of the threat-actor database.