We have a high load on the back-end, so you might have some intermittent issues. We are working on a major upgrade for the next weeks. Sorry for the inconveniences.

Sure, a team can be a single person willing to work on a specific project. You can discuss with all the other teams in chat, if you want to collaborate on a specific topic/project.

we just did. Let us know if you see something else or something missing.

We had an issue on the negotiation on a fiber converter. This was introducing some latency issues in some of our public services such MISP or cve-search, it should be back to nominal. Sorry for the inconveniences.

We just did too but we want to be sure that we don't have any specific UTF characters or alike.

No worries. We already reported the phishing URL to the hosting company for take-down. Thanks for the report.

"There is an Incorrect Authorization vulnerability in Micro Focus Service Management Automation (SMA) product affecting version 2018.05 to 2020.02. The vulnerability could be exploited to provide unauthorized access to the Container Deployment Foundation."

cve.circl.lu/cve/CVE-2020-1184 …

"Pi-hole Web v4.3.2 (aka AdminLTE) allows Remote Code Execution by privileged dashboard users via a crafted DHCP static lease."

cve.circl.lu/cve/CVE-2020-8816 …

"IBM Security Identity Governance and Intelligence 5.2.6 could allow an unauthorized user to obtain sensitive information through user enumeration."

cve.circl.lu/cve/CVE-2020-4244 …

"A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 may allow remote attackers to execute arbitrary code on affected installations. Authentication is required to exploit this vulnerability."

cve.circl.lu/cve/CVE-2020-8605 …

"Improper Access Control in the Kiosk Mode functionality of Bosch Recording Station allows a local unauthenticated attacker to escape from the Kiosk Mode and access the underlying operating system."

cve.circl.lu/cve/CVE-2020-6774 …

Check Point researchers believe they have identified the individual behind the VandaTheGod hacktivist campaigns
research.checkpoint.com/2020/v …pic.twitter.com/GiVBnwaZdq

With the new misp-opendata software, MISP datasets can be automatically extracted and published on @EU_opendata @OpenDataLU portals automatically.
github.com/MISP/misp-opendata … This work is part of the @VARIoT_project and co-funded by @inea_eu .twitter.com/qF3gcwupOO

There are a lot of ongoing phishing targeting various self-hosted mail services in Luxembourg and Europe. Please be careful and don't forget to submit any suspicious url to
circl.lu/urlabuse/  .twitter.com/gLpzS6OPVi

DFIR Training Materials by @circl_lu : Edition May 2020 computer forensic training are published. "Post-mortem Digital Forensics", "File System Forensics and Data Recovery" and "Windows-, Memory- and File Forensics".

circl.lu/services/forensic-tra … .twitter.com/y3707L3aX2

Malspam hitting mailboxes in Germany , distributing ->

GuLoader payload:

bazaar.abuse.ch/sample/98c39c4 …

AZORult payload URL:

urlhaus.abuse.ch/url/366085/ 

AZORult C2:

http://infosales.duckdns\.org/index.phppic.twitter.com/AC8wbTgMNV

Show more
OpenCloud Luxembourg Mastodon instance

A Mastodon instance for Luxembourg and beyond.