norden.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Moin! Dies ist die Mastodon-Instanz für Nordlichter, Schnacker und alles dazwischen. Folge dem Leuchtturm.

Administered by:

Server stats:

3.4K
active users

#Crowdsec

3 posts3 participants1 post today

When two open source tools join forces, your defense gets an unbeatable upgrade! 🚀

Check out this step-by-step tutorial by our amazing Ambassador Killian Prin-Abeil on integrating #CrowdSec with @wazuh, the open source XDR/SIEM platform that protects endpoints and cloud workloads.

💡 This article shows you how to centralize CrowdSec’s real-time threat alerts into Wazuh for smarter, faster security. crowdsec.net/blog/crowdsec-and

crowdsec.netDiscovering the CrowdSec and Wazuh IntegrationDiscover how to leverage the CrowdSec and Wazuh integration to centralize CrowdSec alerts into the open source Wazuh SIEM.

🚀 Want to boost your #website’s #security? Check out this awesome new tutorial!

✨ What you'll learn:
• How to set up #CrowdSec + #Caddy step by step
#Docker Compose examples
• Simple tips to improve your setup

🎥 Dive into the video here: youtu.be/jlWarrYWV1c?si=RwieKX

Big thanks to Genie AJ for sharing this with the #community! 💙

youtu.be- YouTubeEnjoy the videos and music you love, upload original content, and share it all with friends, family, and the world on YouTube.

🚨 Monday Threat Alert: CVE-2025-0108

Here’s your Monday report on immediate and emerging threats, powered by the power of the crowd.

CVE-2025-0108 exploit attempts on the rise
Opportunistic targeting of unpatched or misconfigured systems

The #CrowdSec Network has detected a significant increase in malicious activity targeting CVE-2025-0108, an authentication bypass vulnerability in Palo Alto Networks' PAN-OS software. 🧵 [1/3]

🤔 Did you know the CrowdSec WAF can detect CVE-2021-3129 with just one simple rule?

In the past month alone, the #CrowdSec Network identified nearly 1K malicious IPs attempting to exploit this vulnerability. Thanks to our Threat Intelligence feed, these IPs are now flagged and shared across the entire network, giving all users preemptive protection against this threat. 🛡️

Want to see how the CrowdSec WAF and CTI feed work together to enhance crowd-powered security?

crowdsec.net/blog/how-crowdsec

crowdsec.netCrowdSec WAF Provides New Level of Insights to CrowdSec CTIExplore how the symbiotic relationship between the CrowdSec WAF and CTI feed delivers a significant step up in crowd-powered detection.
Continued thread

Trend analysis:
The #CrowdSec analysis highlights a significant increase in attacker activity beginning in late March 2025. This aligns with historical patterns of threat actors capitalizing on disclosed vulnerabilities after initial proof-of-concept exploits circulate in underground forums.

How to protect your systems:
1️⃣ Patch immediately: If you haven’t already, ensure your systems are updated to mitigate CVE-2024-3400.
2️⃣ Monitor traffic: Look for suspicious inbound connections from IPs associated with AS200373.
3️⃣ Deploy the CrowdSec Security Engine: Our community-powered threat intelligence can help you block these malicious IPs in real time.
4️⃣ Check the CrowdSec #CTI feed: Check out a sample of Sweet Orange Gyrfalcon IoCs here: app.crowdsec.net/cti?q=classif
5️⃣ Share awareness: The more organizations take proactive action, the harder it becomes for these attackers to succeed. 🧵 [4/5]

Frage an die #Crowdsec Bubble:

So weit klar: Ich kann #Crowdsec nehmen und den #Docker Socket lesen lassen. Ich schränke ein, dass nur der #Traefik Container gelesen wird. Dann sag ich Crowdsec, dass das was er da liest ein JSON Log vom Typ Traefik ist.

So weit so klar.

Kann ich dann einfach weiter sagen jetzt aktivier darauf deine Standard-Parser für #Wordpress?

Einfach so?

Oder muss ich dazwischen noch irgendwas einstellen, dass das JSON richtig geparst wird?
Gibt es dafür einen Debugger?