2026-03-14 Journal
Why using a MCP when you have a clean OpenAPI with consistent results? #ai #openapi #mcp
- Source:
paperbay.org - Time:
17:16:34 - Summary: Why using a MCP when you have a clean OpenAPI with consistent results? #ai #openapi #mcp
regarde les murs
- Source:
www.flickr.com - Time:
17:04:55 - Summary: Alexandre Dulaunoy posted a photo:

picture of life#photography #photo #drawing #blackandwhite #leica
- Source:
paperbay.org - Time:
16:44:56 - Summary: picture of life, Belgium 2016
picture of life
- Source:
www.flickr.com - Time:
16:43:40 - Summary: Alexandre Dulaunoy posted a photo:

last fight
- Source:
www.flickr.com - Time:
16:26:41 - Summary: Alexandre Dulaunoy posted a photo:

Good old memories#photography #photo #photographer #people #leica #monochrome
- Source:
paperbay.org - Time:
16:17:36 - Summary: Good old memories, Belgium 2016
good old memories
- Source:
www.flickr.com - Time:
16:13:15 - Summary: Alexandre Dulaunoy posted a photo:

At the @cert_eu conference in 2025, @cryptosec gave an insightful presentation filled with many humorous references.One particularly interesting slide addressed bureaucracy in information security, why it exists and what it really represents.Those four points alone could be the start of a book.https://cryptosec.org/docs/CERT-EU-2025/IR-CERT-EU-2025-v3-CLEAR.pdf#risk #cybersecurity #bureaucracy
- Source:
infosec.exchange - Time:
11:04:44 - Summary: What is bureaucracy the name of ? Heaviness and rigidity… it’s a form of work organization - A desperate attempt to bring certainty in a landscape of uncertainty - Monopolisation of power - Other’s processes - Another name for… lack of trust TLP: CLEAR
A new pull request for Vulnerability-Lookup adds a CSAF producer that publishes advisories for many manufacturers.This is great for defenders and researchers, as it increases the amount of detailed vulnerability information available.It will push the number of ingested feeds to more than 50 unique sources, highlighting the growing diversity of our data sources.If someone tells you there is a single source of truth for vulnerability information, they’re ignoring the reality: vulnerability intelligence comes from many different sources.Thanks to @rafi0t for the continuous work on adding CSAF and feeds to vulnerability-lookup#gcve #cve #cybersecurity #csaf #vulnerability #opendata #opensource 🔗 The new PR with many new CSAF sources https://github.com/vulnerability-lookup/vulnerability-lookup/pull/348🔗 The open source vulnerability-lookup software https://www.vulnerability-lookup.org/🔗 GCVE instance https://db.gcve.eu/@gcve @cedric
- Source:
infosec.exchange - Time:
08:57:22 - Summary: An overview of the current set of sources in the db.gcve.eu instance running the latest version of vulnerability-lookup. https://db.gcve.eu/recent#fstec
4625 kHz is not buzzing anymore 😨
- Source:
paperbay.org - Time:
08:43:00 - Summary: 4625 kHz is not buzzing anymore 😨