Recent highlights
TR-70 - Vulnerabilities in Microsoft Exchange CVE-2022-41040 - CVE-2022-41082 - 30th September 2022
New online service - Pandora Document and File Analysis - 7th March 2022
TR-68 - Best practices in times of tense geopolitical situations - 1st March 2022
TR-65 - Vulnerabilities and Exploitation of Log4j (Remote code injection in Log4j)
CIRCL hash lookup is a public API to lookup hash values against known database of files. - 8th July 2021
TR-61 - Critical vulnerabilities in Microsoft Exchange - 11th March 2021
TR-58 - CVE-2020-0796 - Critical vulnerability in Microsoft SMBv3 - status and mitigation - 11th March 2020
TR-54 - Sextortion scam emails - I know your password- 2nd August 2018
Meltdown and Spectre Bugs in modern computers leak passwords and sensitive data - 3rd January 2018
TR-50 - WPA2 handshake traffic can be manipulated to induce nonce and session key reuse - 16th October 2017
TR-49 - CVE-2017-7494 - A critical vulnerability in Samba - remote code execution from a writable share - 26th May 2017
MS17-010 is critical and patches MUST BE applied. including EOL Windows. - 12th May 2017
TR-46 - Information Leaks Affecting Luxembourg and Recommendations (regularly updated) - 22nd December 2016
TR-42 - CVE-2015-7755 - CVE-2015-7756 - Critical vulnerabilities in Juniper ScreenOS - 21st December 2015
TR-41 (fr) - Crypto Ransomware - Défenses proactives et réponse sur incident - 1st December 2015
TR-41 - Crypto Ransomware - Proactive defenses and incident response - 1st December 2015
TR-38 (fr) - Attaques visant les solutions bancaires d'entreprise - Recommandations - 28th May 2015
TR-38 - Attacks targeting enterprise banking solutions - recommendations and remediations - 19th May 2015
TR-37 - VENOM / CVE-2015-3456 - Critical vulnerability in QEMU Floppy Disk Controller (FDC) emulation - 14th May 2015
TR-36 Example setup of WordPress with static export Another approach to secure your WordPress CMS - 29th April 2015
TR-33 Analysis - CTB-Locker / Critroni - 18th February 2015
A new wave of crypto ransomware targeting Luxembourg - Une nouvelle vague de ransomware cible le Luxembourg - 5th February 2015
glibc: buffer overflow in gethostbyname - 27th January 2015
NTP (Network Time Protocol) daemon - ntpd - critical vulnerabilities - 22nd December 2014
TR-27 - GNU Bash Critical Vulnerability - CVE-2014-6271 - CVE-2014-7169 - 24th September 2014
CIRCL warns about spear phishing scams targeting corporate executives and their accounting department - 14th September 2014
Latest CIRCL tweets
- RT @MISPProject: New MISP workflow blueprint has been added to tag ASN based on @circl_lu BGP ranking service available on https://t.co/Kad… 2022-11-15 08:20:39
- The MeliCERTes project is concluding after 3-years of hard work to create an open platforms to collaborate on cyber… https://t.co/a5ZXDDwQOi https://twitter.com/i/web/status/1591074624250343424 2022-11-11 14:25:25
- RT @LU_CIX: Join us next week at the #Luxembourg #Internet Days for the speech of Jean-Louis HUYNEN from @circl_lu on how to model and shar… 2022-11-10 10:10:57
- "Citrix Gateway and Citrix ADC Security Bulletin for CVE-2022-27510 CVE-2022-27513 and CVE-2022-27516" One of the C… https://t.co/JkpigsMiDw https://twitter.com/i/web/status/1590326328553013248 2022-11-09 12:51:58
- RT @MISPProject: A huge thank to all participants, organisers and speakers at @FIRSTdotOrg #FIRSTCTI22 in Berlin. It was a blast. Our MISP… 2022-11-09 11:44:23
- RT @campuscodi: The Microsoft November 2022 Patch Tuesday updates are out. 68 vulnerabilities fixed. Also, 4 zero-days: -CVE-2022-41128, J… 2022-11-09 11:24:47
- RT @virusbtn: The Zimperium zLabs team write about the architecture and modus operandi of the Cloud9 malicious browser extension. https://t… 2022-11-09 11:24:26