circl_lu Profile Banner
CIRCL - @circl@social.circl.lu Profile

@circl_lu

Followers
13K
Following
7K
Media
231
Statuses
11K

CIRCL is the CERT (Computer Emergency Response Team) for the private sector, communes and non-governmental entities in Luxembourg.

Luxembourg
Joined August 2010
Don't wanna be here? Send us removal request.
@Shadowserver
The Shadowserver Foundation
8 months
For the last few days we are also scanning & reporting out exposed Ingress NGINX Controller for Kubernetes (Admission Controller feature). These may possibly be also vulnerable to CVE-2025-1974 & other recently disclosed vulnerabilities. We see around 4000 IPs exposed.
1
30
61
@passthesaltcon
Pass the SALT Conference
8 months
CFP REMINDER: D-15 Hurry up, it's time to submit your Security & Free SW talk or workshop! ➡️ https://t.co/wPiM2qvZXj 📅 deadline: sunday March, 30 midnight! ✉️ a question? send it to speaker-support@pass-the-salt.org 👍 🙏RT appreciated!
0
4
3
@cudeso
Koen Van Impe ☕
8 months
I created a small parser for Minimedusa (the MegaMedusa configuration, an L7 DDoS tool). It uses @teamcymru Whois, @circl_lu Passive DNS service and an RDNS lookup for enrichment. There's also a MISP JSON to import the feed in @MISPProject https://t.co/239uhpYkf3
0
2
12
@cudeso
Koen Van Impe ☕
8 months
Did you know that since v3.0.0 of misp-modules and v3.0.1 of misp-docker/misp-modules it is possible to load custom misp-modules without building your own image? Just drop them in the corresponding /custom/ directory. https://t.co/xlRr5kat9R https://t.co/5ID9j5Ppg4
0
4
11
@NASK_pl
NASK
9 months
💡Operational teams responsible for #cybersecurity in European Union countries will be equipped with an AI-based toolkit that will significantly facilitate their work. We are proud that the NASK Institute is leading the international consortium that will implement the project
1
3
5
@cudeso
Koen Van Impe ☕
9 months
If you’re using @letsencrypt certificates it becomes time to setup a certificate expiration monitor (if you haven’t done already).
0
12
24
@cudeso
Koen Van Impe ☕
9 months
There's a wealth of useful threat data available via Rösti, Repackaged Öpen Source Threat Intelligence. Formats include STIX, JSON, CSV and MISP. Provided by @viql . And now also available as a default @MISPProject feed. Check out https://t.co/2Tz7bsOqjJ
0
4
20
@Shadowserver
The Shadowserver Foundation
1 year
CVEs have now been assigned: https://t.co/iprcy9tHNe https://t.co/5FXN5oVDxw https://t.co/ivyObGqmPM 6642 IPs found exposed on 2024-11-17 (down from around 11K): https://t.co/e57XjHlcir As a reminder, IP data is shared in our Device ID report daily: https://t.co/1uPaaDBimE
@Shadowserver
The Shadowserver Foundation
1 year
Palo Alto Networks has now updated their advisory https://t.co/BVR0Vw35X1 saying they have "observed threat activity exploiting an unauthenticated remote command execution vulnerability against a limited number of firewall management interfaces which are exposed to the Internet."
0
11
32
Apple Fixes Two Exploited Vulnerabilities on Intel-based Mac System #vulnerability #vulnerabilities #cybersecurity #infosec #apple 🔗
0
2
7
MISP 2.4.200 and 2.5.2 released - Post https://t.co/zqk97AAaLz release with many new features. New feature such as Ad-Hoc Workflows, Private Custom Galaxies, Tags on Event Report, new features in event report & improved PDF export. https://t.co/F9klUMJZSz #ThreatIntel #cti
Tweet card summary image
misp-project.org
MISP Threat Intelligence & Sharing
0
13
16
@Shadowserver
The Shadowserver Foundation
1 year
We see CVE-2024-0012 exploitation attempts since Nov 18th. We are now also observing CVE-2024-9474. IoCs: https://t.co/iprcy9tHNe Check for signs of compromise and patch: https://t.co/5FXN5oVDxw https://t.co/ivyObGqmPM For additional background -
Tweet card summary image
labs.watchtowr.com
It'll be no surprise that 2024, 2023, 2022, and every other year of humanities' existence has been tough for SSLVPN appliances. Anyhow, there are new vulnerabilities (well, two of them) that are...
@Shadowserver
The Shadowserver Foundation
1 year
CVEs have now been assigned: https://t.co/iprcy9tHNe https://t.co/5FXN5oVDxw https://t.co/ivyObGqmPM 6642 IPs found exposed on 2024-11-17 (down from around 11K): https://t.co/e57XjHlcir As a reminder, IP data is shared in our Device ID report daily: https://t.co/1uPaaDBimE
0
9
22
New features in vulnerability lookup includes sighting from different sources including @MISPProject communities. The example below is a vulnerability in Android but the CVE is not yet published. You can track the sighting evolution. https://t.co/oD7cG1edwb #vulnerability #cve
0
10
10
@hack_lu
hack_lu
1 year
https://t.co/jIxEOJNCg1 2024 Wraps Up a Thrilling 18th Edition with Global Participation and Networking Highlights https://t.co/mwhH4iLNia #infosec #hacklu2024 #hacklu #conference #threatintelligence
0
4
12
@alexanderjaeger
Alex
1 year
Omg, @_saadk , @0x4D31 , @adulau , @rafi0t, @blubbfiction, @tomchop_, @ddurvaux , @angealbertini , @_hillu and so many more. What is this, a conference or a DREAM team from all recorded speakers ever from @Ministraitor? What a line up.
@hack_lu
hack_lu
1 year
The first version of the #hacklu 2024 agenda is now live. Check it out here: https://t.co/E9vGmCmOLN Don't miss out—join us for this year's edition! #infosec #conference #Luxembourg
1
7
14
@hack_lu
hack_lu
1 year
The first version of the #hacklu 2024 agenda is now live. Check it out here: https://t.co/E9vGmCmOLN Don't miss out—join us for this year's edition! #infosec #conference #Luxembourg
2024.hack.lu
Agenda - Hack.lu and CTI summit 2024
0
25
36
@ail_project
AIL Project
1 year
AIL Project version 5.7 released with many improvements with 2FA support, multi-organisation support, improved chat monitoring and more. https://t.co/E84GLkIlxo #darkweb #threatintelligence #threatintel #telegram #infosec
0
8
6
@cudeso
Koen Van Impe ☕
1 year
Post by @BlackLotusLabs on a large multi-tiered botnet operated by Flax Typhoon. Tier2 nodes can be identified by TLS certificate with random alphanumeric domain name in subject/issuer DN. https://t.co/Q70QVdt7gI #CTI #botnet #iot
2
16
37
@hack_lu
hack_lu
1 year
The first wave of acceptance notifications for workshops, training sessions, and talks has been sent to the speakers. The initial version of the agenda will be published on Monday. #hacklu #infosec #conference #cybersecurity
0
8
17
@argvee
Heather Adkins - Ꜻ - Spes consilium non est
1 year
Sunday morning musings. Many of our security "standards" are written in the form of "Have good dental hygeine" instead of "brush x2/day, floss, see dentist yearly". Then, when we get a security "cavity", we are shocked and appalled. Some examples (plz correct if I'm wrong) 1/x
7
20
82