Skip to content

Commit

Permalink
chg: Added post for Shadowserver foundation.
Browse files Browse the repository at this point in the history
  • Loading branch information
cedricbonhomme committed Jan 22, 2025
1 parent 15244fc commit 935efb9
Show file tree
Hide file tree
Showing 3 changed files with 59 additions and 0 deletions.
59 changes: 59 additions & 0 deletions content/news/2025-01-22-shadowserver.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,59 @@
---
title: "The Shadowserver Foundation Honeypot Feed is now integrated as a source of sightings in Vulnerability-Lookup"
slug: shadowserver-sightings-in-vulnerability-lookup
layout: news
date: 2025-01-22
tags:
- Sightings
- Honeypot
- Shadowserver
---


We are glad to announce the immediate availability of vulnerability-related observations from
[The Shadowserver Foundation](https://www.shadowserver.org) within vulnerability-lookup.

This milestone wouldn’t have been possible without [Piotr Kijewski](https://www.linkedin.com/in/piotrkijewski/).
We developed a new sighting client, ShadowSight. This new client gathers vulnerability-related data directly from The Shadowserver Foundation, then reports the collected data to the Vulnerability-Lookup API as sightings.

ShadowSight leverages insights on common vulnerabilities and exploited vulnerabilities from Shadowserver’s honeypot source. Source code of ShadowSight is available:

👉 https://github.com/CIRCL/ShadowSight

Explore our sightings collected from this source:

- Exploited vulnerabilities (type: exploited):
https://vulnerability.circl.lu/sightings/?query=honeypot%2Fexploited-vulnerabilities
- Common vulnerabilities (type: seen):
https://vulnerability.circl.lu/sightings/?query=honeypot%2Fcommon-vulnerabilities


The Shadowserver Foundation remains a cornerstone resource for security researchers, providing an extensive wealth of data on real-world exploits and their associated vulnerabilities, complete with daily statistics and geographical insights.

Widely used by incident response teams, security researchers, analysts, and other cybersecurity professionals, Shadowserver is recognized as a highly credible and impactful project in the cybersecurity landscape. The Shadowserver Foundation delivers particularly valuable insights into security issues, including vulnerabilities in unpatched IoT devices, various types of internet-facing services, and even services that should not be exposed to the internet.

For us, it has quickly become a reliable sources for sightings. It's also a way to diversify our sources and improve situational awareness.

🔗 Explore all our sighting sources (such as Mastodon, Bluesky, [MISP](https://www.misp-project.org), etc.) and tools here:

👉 https://www.vulnerability-lookup.org/tools/#sightings


## 📖 References

* https://www.shadowserver.org
* https://vulnerability.circl.lu
* https://github.com/cve-search/vulnerability-lookup
* https://github.com/CIRCL/ShadowSight
* https://www.vulnerability-lookup.org/documentation/sightings.html


## 🤝 Contribute

If you want to benefit from more features of Vulnerability-Lookup like sharing comments, bundles, or sightings, you can create an account to the instance operated by [CIRCL](https://www.circl.lu):

👉 https://vulnerability.circl.lu/user/signup


![Sightings correlations](/images/news/2025/2025-01-22-sightings-correlations.png)
![Sightings](/images/news/2025/2025-01-22-sightings.png)
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added static/images/news/2025/2025-01-22-sightings.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.

0 comments on commit 935efb9

Please sign in to comment.