circl.lu
Open in
urlscan Pro
185.194.93.14
Public Scan
Submitted URL: http://circl.lu/
Effective URL: https://circl.lu/
Submission: On November 22 via api from LU — Scanned from IT
Effective URL: https://circl.lu/
Submission: On November 22 via api from LU — Scanned from IT
Form analysis
1 forms found in the DOMGET https://search.circl.lu/
<form method="get" action="https://search.circl.lu/"><input type="text" name="q" value=""></form>
Text Content
* About * Team * News * Services * Training * Publications * Projects * Contact The Computer Incident Response Center Luxembourg (CIRCL) is a government-driven initiative designed to gather, review, report and respond to computer security threats and incidents. OUR SERVICES -------------------------------------------------------------------------------- MISP Threat Intelligence Sharing Platform and Private Sharing Communities -------------------------------------------------------------------------------- Dynamic Malware Analysis (DMA) -------------------------------------------------------------------------------- Clean documents from untrusted USB keys / sticks -------------------------------------------------------------------------------- Database storing historical DNS records More services RECENT HIGHLIGHTS TR-88 - Motivation, procedure and rational for leaked credential notifications - 29th August 2024 Learning from the Recent Windows/Falcon Sensor Outage - Causes and Potential Improvement Strategies in Linux with Open Source - 23rd July 2024 TR-87 - CrowdStrike Agent causing BSOD loop on Windows - Faulty Update on Falcon Sensor - 19th July 2024 TR-86 - Check Point VPN Information Disclosure (CVE-2024-24919) - Actively Exploited - 31st May 2024 TR-85 - Three vulnerabilities in Cisco ASA software/applicance and FTD software being exploited - 25th April 2024 TR-84 - PAN-OS (Palo Alto Networks) OS Command Injection Vulnerability in GlobalProtect Gateway - CVE-2024-3400 - 12th April 2024 TR-82 - backdoor discovered in xz-utils - CVE-2024-3094 - 30th March 2024 Cybersecurity Unites Across Borders - FETTA Project Launched to Strengthen EU Cyber Threat Intelligence - 31st January 2024 TR-78 - CVE-2023-46805 (Authentication Bypass) & CVE-2024-21887 (Command Injection) for Ivanti Connect Secure and Ivanti Policy Secure Gateways - 11th January 2024 TR-77 - Spear phishing and voice call scams targeting corporate executives and their accounting department - 30th August 2023 TR-76 - Multiple high severity vulnerabilities in CODESYS V3 SDK could lead to RCE or DoS - 14th August 2023 TR-75 - Unauthenticated remote code execution vulnerability in NetScaler ADC (formerly Citrix ADC) and NetScaler Gateway (formerly Citrix Gateway) - CVE-2023-3519 - 21st July 2023 TR-74 - A heap-based buffer overflow vulnerability [CWE-122] in FortiOS - CVE-2023-27997 - 5th July 2023 TR-73 - Ransomware FAQ - 7th March 2023 TR-72 - Vulnerable Microsoft Exchange server metrics leading to alarming situation - 21st February 2023 TR-70 - Vulnerabilities in Microsoft Exchange CVE-2022-41040 - CVE-2022-41082 - 30th September 2022 New online service - Pandora Document and File Analysis - 7th March 2022 TR-68 - Best practices in times of tense geopolitical situations - 1st March 2022 TR-65 - Vulnerabilities and Exploitation of Log4j (Remote code injection in Log4j) TR-64 - Exploited Exchange Servers - Mails with links to malware from known/valid senders - 10th November 2021 CIRCL hash lookup is a public API to lookup hash values against known database of files. - 8th July 2021 TR-61 - Critical vulnerabilities in Microsoft Exchange - 11th March 2021 TR-58 - CVE-2020-0796 - Critical vulnerability in Microsoft SMBv3 - status and mitigation - 11th March 2020 TR-54 - Sextortion scam emails - I know your password- 2nd August 2018 Meltdown and Spectre Bugs in modern computers leak passwords and sensitive data - 3rd January 2018 TR-50 - WPA2 handshake traffic can be manipulated to induce nonce and session key reuse - 16th October 2017 TR-49 - CVE-2017-7494 - A critical vulnerability in Samba - remote code execution from a writable share - 26th May 2017 MS17-010 is critical and patches MUST BE applied. including EOL Windows. - 12th May 2017 TR-46 - Information Leaks Affecting Luxembourg and Recommendations (regularly updated) - 22nd December 2016 TR-42 - CVE-2015-7755 - CVE-2015-7756 - Critical vulnerabilities in Juniper ScreenOS - 21st December 2015 TR-41 (fr) - Crypto Ransomware - Défenses proactives et réponse sur incident - 1st December 2015 TR-41 - Crypto Ransomware - Proactive defenses and incident response - 1st December 2015 TR-38 (fr) - Attaques visant les solutions bancaires d'entreprise - Recommandations - 28th May 2015 TR-38 - Attacks targeting enterprise banking solutions - recommendations and remediations - 19th May 2015 TR-37 - VENOM / CVE-2015-3456 - Critical vulnerability in QEMU Floppy Disk Controller (FDC) emulation - 14th May 2015 TR-36 Example setup of WordPress with static export Another approach to secure your WordPress CMS - 29th April 2015 TR-33 Analysis - CTB-Locker / Critroni - 18th February 2015 A new wave of crypto ransomware targeting Luxembourg - Une nouvelle vague de ransomware cible le Luxembourg - 5th February 2015 glibc: buffer overflow in gethostbyname - 27th January 2015 NTP (Network Time Protocol) daemon - ntpd - critical vulnerabilities - 22nd December 2014 The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, are vulnerable to critical padding oracle attack - CVE-2014-3566 TR-27 - GNU Bash Critical Vulnerability - CVE-2014-6271 - CVE-2014-7169 - 24th September 2014 CIRCL warns about spear phishing scams targeting corporate executives and their accounting department - 14th September 2014 [Previous news] LATEST CIRCL TWEETS * RT @MISPProject: New MISP workflow blueprint has been added to tag ASN based on @circl_lu BGP ranking service available on https://t.co/Kad… 2022-11-15 08:20:39 * The MeliCERTes project is concluding after 3-years of hard work to create an open platforms to collaborate on cyber… https://t.co/a5ZXDDwQOi https://twitter.com/i/web/status/1591074624250343424 2022-11-11 14:25:25 * RT @LU_CIX: Join us next week at the #Luxembourg #Internet Days for the speech of Jean-Louis HUYNEN from @circl_lu on how to model and shar… 2022-11-10 10:10:57 * "Citrix Gateway and Citrix ADC Security Bulletin for CVE-2022-27510 CVE-2022-27513 and CVE-2022-27516" One of the C… https://t.co/JkpigsMiDw https://twitter.com/i/web/status/1590326328553013248 2022-11-09 12:51:58 * RT @MISPProject: A huge thank to all participants, organisers and speakers at @FIRSTdotOrg #FIRSTCTI22 in Berlin. It was a blast. Our MISP… 2022-11-09 11:44:23 * RT @campuscodi: The Microsoft November 2022 Patch Tuesday updates are out. 68 vulnerabilities fixed. Also, 4 zero-days: -CVE-2022-41128, J… 2022-11-09 11:24:47 * RT @virusbtn: The Zimperium zLabs team write about the architecture and modus operandi of the Cloud9 malicious browser extension. https://t… 2022-11-09 11:24:26 Search ABOUT CIRCL * Mission * News * RFC2350 * Team Members * Internships * Contact * Statistics * * Opendata * Privacy SERVICES, PROJECTS AND SOFTWARE * Services * Dynamic Malware Analysis Platform * Malware Information Sharing and Threat Sharing Platform * Projects * Software PUBLICATIONS AND PRESENTATIONS * Publications * Digital First Aid Kit * Presentations PUBLIC SERVICES * Review and report malicious URLs * * BGP Ranking * Common vulnerability exposure * PGP key server * Free software Mastodon CIRCL is the CERT (Computer Emergency Response Team/Computer Security Incident Response Team) for the private sector, communes and non-governmental entities in Luxembourg. Content from this website is classified as TLP:CLEAR (previously: TLP:WHITE) information may be distributed without restriction, subject to copyright controls. Copyright 2008 - 2023 CIRCL Computer Incident Response Center Luxembourg (LHC - Luxembourg House of Cybersecurity). PGP signature of this page and How to Verify Integrity of CIRCL Web Pages