28 April 2025
There are some amazing keyboards like dygma or uhk available. Beside of ergonomics they also support to have multiple function layers and custom layouts. They ship with easy to use software to customize the layouts and function layers. I am fine with my keyboard, but I always envy my friends for having keyboards that allow switching custom layers easily. So I asked a little bit around and someone recommended me the free open-source software kanata. It is a cross-platform software keyboard mapper for Linux, macOS and Windows and allows me to switch my keyboard layout dynamically. As an addition, I will also try to integrate kanata in my i3wm environment smoothly and create a custom menu with rofi.
20 November 2024
Identifier: | AIT-SA-20241114-01 |
Target: | Decidim – The participatory democracy framework |
Vendor: | Decidim |
Version: | v0.28 including v0.28.2 |
CVE: | CVE-2024-45594 |
Accessibility: | Remote |
Severity: | High |
Author: | Wolfgang Hotwagner (AIT Austrian Institute of Technology) |
20 November 2024
Identifier: | AIT-SA-20241112-01 |
Target: | decidim-module-decidim_awesome |
Vendor: | Decidim International Community Environment |
Version: | All versions including v0.11.1 |
CVE: | CVE-2024-43415 |
Accessibility: | Remote |
Severity: | Critical |
Author: | Wolfgang Hotwagner (AIT Austrian Institute of Technology) |
17 November 2024
Automating attack chains is not only necessary for testing cybersecurity mechanisms, but also very practical for cybersecurity training and pentests. Most existing tools are not primarily concerned with the attacks manifesting themselves in the logs as if they had been carried out by a human attacker. AttackMate was written with the intention of performing realistic attacks and allows attacks to be chained across all phases of the killchain. I wrote that tool as part of my work at the AIT, where we need realistic logs for anomaly detection. It is Free Open Source Software and available on GitHub
24 September 2024
This year was my first time at the balccon conference. This infosec event takes place in Serbia and is a community oriented congress very similar to the CCC Congress in Germany. I felt very comfortable there right from the start. There were incredibly good talks and fantastic installations built by the community.
12 August 2024
Identifier: | AIT-SA-20240514-04 |
Target: | FIWARE Keyrock |
Vendor: | FIWARE |
Version: | all versions including 8.4 |
CVE: | CVE-2024-42167 |
Accessibility: | Remote |
Severity: | Critical (9.1) |
Author: | Wolfgang Hotwagner (AIT Austrian Institute of Technology) |
12 August 2024
Identifier: | AIT-SA-20240514-04 |
Target: | FIWARE Keyrock |
Vendor: | FIWARE |
Version: | all versions including 8.4 |
CVE: | CVE-2024-42166 |
Accessibility: | Remote |
Severity: | Critical (9.1) |
Author: | Wolfgang Hotwagner (AIT Austrian Institute of Technology) |
12 August 2024
Identifier: | AIT-SA-20240514-03 |
Target: | FIWARE Keyrock |
Vendor: | FIWARE |
Version: | all versions including 8.4 |
CVE: | CVE-2024-42165 |
Accessibility: | Remote |
Severity: | Medium (6.3) |
Author: | Wolfgang Hotwagner (AIT Austrian Institute of Technology) |
12 August 2024
Identifier: | AIT-SA-20240514-02 |
Target: | FIWARE Keyrock |
Vendor: | FIWARE |
Version: | all versions including 8.4 |
CVE: | CVE-2024-42164 |
Accessibility: | Remote |
Severity: | Medium (4.3) |
Author: | Wolfgang Hotwagner (AIT Austrian Institute of Technology) |
12 August 2024
Identifier: | AIT-SA-20240514-01 |
Target: | FIWARE Keyrock |
Vendor: | FIWARE |
Version: | all versions including 8.4 |
CVE: | CVE-2024-42163 |
Accessibility: | Remote |
Severity: | Medium (8.3) |
Author: | Wolfgang Hotwagner (AIT Austrian Institute of Technology) |