CIRCL - @[email protected]
@circl_lu
Followers
13K
Following
7K
Media
231
Statuses
11K
CIRCL is the CERT (Computer Emergency Response Team) for the private sector, communes and non-governmental entities in Luxembourg.
Luxembourg
Joined August 2010
For the last few days we are also scanning & reporting out exposed Ingress NGINX Controller for Kubernetes (Admission Controller feature). These may possibly be also vulnerable to CVE-2025-1974 & other recently disclosed vulnerabilities. We see around 4000 IPs exposed.
1
30
61
CFP REMINDER: D-15 Hurry up, it's time to submit your Security & Free SW talk or workshop! ➡️ https://t.co/wPiM2qvZXj 📅 deadline: sunday March, 30 midnight! ✉️ a question? send it to speaker-support@pass-the-salt.org 👍 🙏RT appreciated!
0
4
3
I created a small parser for Minimedusa (the MegaMedusa configuration, an L7 DDoS tool). It uses @teamcymru Whois, @circl_lu Passive DNS service and an RDNS lookup for enrichment. There's also a MISP JSON to import the feed in @MISPProject
https://t.co/239uhpYkf3
0
2
12
Did you know that since v3.0.0 of misp-modules and v3.0.1 of misp-docker/misp-modules it is possible to load custom misp-modules without building your own image? Just drop them in the corresponding /custom/ directory. https://t.co/xlRr5kat9R
https://t.co/5ID9j5Ppg4
0
4
11
💡Operational teams responsible for #cybersecurity in European Union countries will be equipped with an AI-based toolkit that will significantly facilitate their work. We are proud that the NASK Institute is leading the international consortium that will implement the project
1
3
5
If you’re using @letsencrypt certificates it becomes time to setup a certificate expiration monitor (if you haven’t done already).
0
12
24
There's a wealth of useful threat data available via Rösti, Repackaged Öpen Source Threat Intelligence. Formats include STIX, JSON, CSV and MISP. Provided by @viql . And now also available as a default @MISPProject feed. Check out https://t.co/2Tz7bsOqjJ
0
4
20
We’re delighted to announce the release of Vulnerability-Lookup 2.2.0, packed with enhancements, new features, and bug fixes. Online version: https://t.co/qhFE7ptHg6 Release notes: https://t.co/ilZ7r7c4vS
#cve #vulnerability #vulnerabilities #opensource #CyberSecurity
github.com
What's New Identity: Vulnerability-Lookup now has a beautiful new logo. New Statistics Namespace: The API now offers a dedicated namespace for statistics. Two new endpoints are currently ...
0
15
26
CVEs have now been assigned: https://t.co/iprcy9tHNe
https://t.co/5FXN5oVDxw
https://t.co/ivyObGqmPM 6642 IPs found exposed on 2024-11-17 (down from around 11K): https://t.co/e57XjHlcir As a reminder, IP data is shared in our Device ID report daily: https://t.co/1uPaaDBimE
Palo Alto Networks has now updated their advisory https://t.co/BVR0Vw35X1 saying they have "observed threat activity exploiting an unauthenticated remote command execution vulnerability against a limited number of firewall management interfaces which are exposed to the Internet."
0
11
32
Apple Fixes Two Exploited Vulnerabilities on Intel-based Mac System #vulnerability #vulnerabilities #cybersecurity #infosec #apple 🔗
0
2
7
MISP 2.4.200 and 2.5.2 released - Post https://t.co/zqk97AAaLz release with many new features. New feature such as Ad-Hoc Workflows, Private Custom Galaxies, Tags on Event Report, new features in event report & improved PDF export. https://t.co/F9klUMJZSz
#ThreatIntel #cti
misp-project.org
MISP Threat Intelligence & Sharing
0
13
16
We see CVE-2024-0012 exploitation attempts since Nov 18th. We are now also observing CVE-2024-9474. IoCs: https://t.co/iprcy9tHNe Check for signs of compromise and patch: https://t.co/5FXN5oVDxw
https://t.co/ivyObGqmPM For additional background -
labs.watchtowr.com
It'll be no surprise that 2024, 2023, 2022, and every other year of humanities' existence has been tough for SSLVPN appliances. Anyhow, there are new vulnerabilities (well, two of them) that are...
CVEs have now been assigned: https://t.co/iprcy9tHNe
https://t.co/5FXN5oVDxw
https://t.co/ivyObGqmPM 6642 IPs found exposed on 2024-11-17 (down from around 11K): https://t.co/e57XjHlcir As a reminder, IP data is shared in our Device ID report daily: https://t.co/1uPaaDBimE
0
9
22
New features in vulnerability lookup includes sighting from different sources including @MISPProject communities. The example below is a vulnerability in Android but the CVE is not yet published. You can track the sighting evolution. https://t.co/oD7cG1edwb
#vulnerability #cve
0
10
10
https://t.co/jIxEOJNCg1 2024 Wraps Up a Thrilling 18th Edition with Global Participation and Networking Highlights https://t.co/mwhH4iLNia
#infosec #hacklu2024 #hacklu #conference #threatintelligence
0
4
12
Omg, @_saadk , @0x4D31 , @adulau , @rafi0t, @blubbfiction, @tomchop_, @ddurvaux , @angealbertini , @_hillu and so many more. What is this, a conference or a DREAM team from all recorded speakers ever from @Ministraitor? What a line up.
The first version of the #hacklu 2024 agenda is now live. Check it out here: https://t.co/E9vGmCmOLN Don't miss out—join us for this year's edition! #infosec #conference #Luxembourg
1
7
14
The first version of the #hacklu 2024 agenda is now live. Check it out here: https://t.co/E9vGmCmOLN Don't miss out—join us for this year's edition! #infosec #conference #Luxembourg
2024.hack.lu
Agenda - Hack.lu and CTI summit 2024
0
25
36
AIL Project version 5.7 released with many improvements with 2FA support, multi-organisation support, improved chat monitoring and more. https://t.co/E84GLkIlxo
#darkweb #threatintelligence #threatintel #telegram #infosec
0
8
6
Post by @BlackLotusLabs on a large multi-tiered botnet operated by Flax Typhoon. Tier2 nodes can be identified by TLS certificate with random alphanumeric domain name in subject/issuer DN. https://t.co/Q70QVdt7gI
#CTI #botnet #iot
2
16
37
The first wave of acceptance notifications for workshops, training sessions, and talks has been sent to the speakers. The initial version of the agenda will be published on Monday. #hacklu #infosec #conference #cybersecurity
0
8
17
Sunday morning musings. Many of our security "standards" are written in the form of "Have good dental hygeine" instead of "brush x2/day, floss, see dentist yearly". Then, when we get a security "cavity", we are shocked and appalled. Some examples (plz correct if I'm wrong) 1/x
7
20
82