"There is an Incorrect Authorization vulnerability in Micro Focus Service Management Automation (SMA) product affecting version 2018.05 to 2020.02. The vulnerability could be exploited to provide unauthorized access to the Container Deployment Foundation."
"Pi-hole Web v4.3.2 (aka AdminLTE) allows Remote Code Execution by privileged dashboard users via a crafted DHCP static lease."
"IBM Security Identity Governance and Intelligence 5.2.6 could allow an unauthorized user to obtain sensitive information through user enumeration."
"A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 may allow remote attackers to execute arbitrary code on affected installations. Authentication is required to exploit this vulnerability."
"Improper Access Control in the Kiosk Mode functionality of Bosch Recording Station allows a local unauthenticated attacker to escape from the Kiosk Mode and access the underlying operating system."
Check Point researchers believe they have identified the individual behind the VandaTheGod hacktivist campaigns
https://research.checkpoint.com/2020/vandathegod/ …pic.twitter.com/GiVBnwaZdq
With the new misp-opendata software, MISP datasets can be automatically extracted and published on @EU_opendata @OpenDataLU portals automatically. #threatintel #opendata
https://github.com/MISP/misp-opendata … This work is part of the @VARIoT_project and co-funded by @inea_eu #CEFtelecom #PODpic.twitter.com/qF3gcwupOO
There are a lot of ongoing phishing targeting various self-hosted mail services in Luxembourg and Europe. Please be careful and don't forget to submit any suspicious url to
https://www.circl.lu/urlabuse/ #phishing #infosecpic.twitter.com/gLpzS6OPVi
DFIR Training Materials by @circl_lu : Edition May 2020 computer forensic training are published. "Post-mortem Digital Forensics", "File System Forensics and Data Recovery" and "Windows-, Memory- and File Forensics".
https://www.circl.lu/services/forensic-training-materials/ … #DFIR #Forensicpic.twitter.com/y3707L3aX2
Malspam hitting mailboxes in Germany , distributing #GuLoader -> #AZORult
GuLoader payload:
https://bazaar.abuse.ch/sample/98c39c41a62349078a4b09ae665ed9945dd207b7c02b38fa58a639089721bc5e/ …
AZORult payload URL:
https://urlhaus.abuse.ch/url/366085/
AZORult C2:
http://infosales.duckdns\.org/index.phppic.twitter.com/AC8wbTgMNV
CIRCL is the #CERT (Computer Emergency Response Team) for the private sector, communes and non-governmental entities in #Luxembourg.