CIRCL

@circl_lu

CIRCL is the CERT (Computer Emergency Response Team) for the private sector, communes and non-governmental entities in Luxembourg.

Luxembourg
Vrijeme pridruživanja: kolovoz 2010.

Tweetovi

Blokirali ste korisnika/cu @circl_lu

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @circl_lu

  1. prije 7 sati

    "An issue was discovered in Squid before 4.10. It allows a crafted FTP server to trigger disclosure of sensitive information from heap memory, such as information associated with other users' sessions or non-Squid processes."

    Poništi
  2. proslijedio/la je Tweet
    4. velj

    We ( and from ) will be at the FIRST Cyber Threat Intelligence Symposium in Zurich (9-11 March) to talk about "Turning Data into Actionable Intelligence - Advanced Features in MISP Supporting Your Analysts and Tools"

    Poništi
  3. proslijedio/la je Tweet
    3. velj

    AIL Framework version 2.9 released with a critical security fix (CVE-2020-8545) and minor bugs fixed. We strongly recommend everyone to upgrade asap. cc

    Poništi
  4. 3. velj

    "The daemon in Tor through 0.4.1.8 and 0.4.2.x through 0.4.2.6 does not verify that a rendezvous node is known before attempting to connect to it, which might make it easier for remote attackers to discover circuit information"

    Poništi
  5. proslijedio/la je Tweet
    3. velj

    RDG Scanner for Vulnerability CVE-2020-0609 & CVE-2020-0610 - multi-threaded - CIDR support

    Poništi
  6. 3. velj

    "nsak64.sys in Norman Malware Cleaner 2.08.08 allows users to call arbitrary kernel functions because the passing of function pointers between user and kernel mode is mishandled."

    Poništi
  7. proslijedio/la je Tweet
    31. sij

    Systems patched for Citrix -2019-19781 may still be compromised. See 's latest Activity Alert at for procedures for detecting a compromise.

    Poništi
  8. proslijedio/la je Tweet
    31. sij
    Poništi
  9. proslijedio/la je Tweet
    31. sij

    Don’t let vulnerabilities punch holes in your Adobe; patch them today at .

    Poništi
  10. proslijedio/la je Tweet
    31. sij

    Be careful, there is a newphishing campaign via email aimed at Proximus customers! They use a survey and a prize (a free mobile phone) as incentive to lure their victims into a monthly payment scheme. Do not give out your personal information or banking data

    Poništi
  11. 31. sij

    "A Review of Cybersecurity Incidents in the Water Sector"

    Poništi
  12. 31. sij

    "In Kronos Web Time and Attendance (webTA) 3.8.x and later 3.x versions before 4.0, the com.threeis.webta.H402editUser servlet allows an attacker with Timekeeper, Master Timekeeper, or HR Admin privileges to gain unauthorized administrative privileges"

    Poništi
  13. 31. sij

    Microsoft SharePoint contains a Remote Code Execution vulnerability known as CVE-2019-0604 (), which is currently being exploited. We informed organisations in Luxembourg about 16 vulnerable machines. Please verify your infrastructure is up to date.

    Poništi
  14. proslijedio/la je Tweet
    30. sij

    Do you trust who has shared the data with you? Andras Iklody and Sami Mokaddem said does! Sharing knowledge of source reliability sharing and data intelligence

    Poništi
  15. proslijedio/la je Tweet
    29. sij

    Forensic tools expect proper data in a proper way. So, modifying a USB stick... # hexedit /dev/sdb And change some bytes... What could go wrong? To create a loop of extended partitions and break those tools! Nice demo by Michael Hamm from

    Poništi
  16. proslijedio/la je Tweet
    27. sij

    If you are a new ISAC and want to start a sharing community, don't forget we have a document made with X-ISAC "Guidelines to setting up an information sharing community such as an ISAC or ISAO"

    Prikaži ovu nit
    Poništi
  17. 27. sij

    "Intellian Aptus Web 1.24 has a hardcoded password of 12345678 for the intellian account."

    Poništi
  18. proslijedio/la je Tweet
    26. sij

    I will be at next week if you want to discuss about open source security or even threat intelligence. Booth G10

    Poništi
  19. 26. sij

    "Multiple vulnerabilities in the implementation of Border Gateway Protocol (BGP) Ethernet VPN (EVPN) functionality in Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition."

    Poništi
  20. proslijedio/la je Tweet
    24. sij

    Angreifer nutzen die bei aktuell noch immer verwundbaren Systemen aus, um darüber in interne Netzwerke der Opfer einzudringen und die / auszurollen.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·