CIRCL - @circl@social.circl.lu (@circl_lu) 's Twitter Profile
CIRCL - @[email protected]

@circl_lu

CIRCL is the CERT (Computer Emergency Response Team) for the private sector, communes and non-governmental entities in Luxembourg.

ID: 184762389

linkhttp://www.circl.lu/ calendar_today30-08-2010 12:32:08

11,11K Tweet

13,13K Followers

1,1K Following

Heather Adkins - Ꜻ - Spes consilium non est (@argvee) 's Twitter Profile Photo

Sunday morning musings. Many of our security "standards" are written in the form of "Have good dental hygeine" instead of "brush x2/day, floss, see dentist yearly". Then, when we get a security "cavity", we are shocked and appalled. Some examples (plz correct if I'm wrong) 1/x

hack_lu (@hack_lu) 's Twitter Profile Photo

The first wave of acceptance notifications for workshops, training sessions, and talks has been sent to the speakers. The initial version of the agenda will be published on Monday. #hacklu #infosec #conference #cybersecurity

AIL Project (@ail_project) 's Twitter Profile Photo

AIL Project version 5.7 released with many improvements with 2FA support, multi-organisation support, improved chat monitoring and more. ail-project.org/blog/2024/09/1… #darkweb #threatintelligence #threatintel #telegram #infosec

AIL Project version 5.7 released with many improvements with 2FA  support, multi-organisation support, improved chat monitoring and more.

ail-project.org/blog/2024/09/1…

#darkweb #threatintelligence #threatintel #telegram #infosec
Koen Van Impe ☕ (@cudeso) 's Twitter Profile Photo

Post by Black Lotus Labs on a large multi-tiered botnet operated by Flax Typhoon. Tier2 nodes can be identified by TLS certificate with random alphanumeric domain name in subject/issuer DN. blog.lumen.com/derailing-the-… #CTI #botnet #iot

Post by <a href="/BlackLotusLabs/">Black Lotus Labs</a> on a large multi-tiered botnet operated by Flax Typhoon. Tier2 nodes can be identified by TLS certificate with random alphanumeric domain name in subject/issuer DN. blog.lumen.com/derailing-the-… #CTI #botnet #iot
hack_lu (@hack_lu) 's Twitter Profile Photo

The first version of the #hacklu 2024 agenda is now live. Check it out here: 2024.hack.lu/agenda/ Don't miss out—join us for this year's edition! #infosec #conference #Luxembourg

hack_lu (@hack_lu) 's Twitter Profile Photo

hack.lu 2024 Wraps Up a Thrilling 18th Edition with Global Participation and Networking Highlights hack.lu/blog/hack.lu-2… #infosec #hacklu2024 #hacklu #conference #threatintelligence

CIRCL - @circl@social.circl.lu (@circl_lu) 's Twitter Profile Photo

New features in vulnerability lookup includes sighting from different sources including MISP (@[email protected]) communities. The example below is a vulnerability in Android but the CVE is not yet published. You can track the sighting evolution. vulnerability.circl.lu/vuln/CVE-2024-… #vulnerability #cve

New features in vulnerability lookup includes sighting from different sources including <a href="/MISPProject/">MISP (@misp@misp-community.org)</a> communities. The example below is a vulnerability in Android but the CVE is not yet published.  You can track the sighting evolution.

vulnerability.circl.lu/vuln/CVE-2024-…

#vulnerability #cve
The Shadowserver Foundation (@shadowserver) 's Twitter Profile Photo

CVEs have now been assigned: unit42.paloaltonetworks.com/cve-2024-0012-… security.paloaltonetworks.com/CVE-2024-0012 security.paloaltonetworks.com/CVE-2024-9474 6642 IPs found exposed on 2024-11-17 (down from around 11K): dashboard.shadowserver.org/statistics/iot… As a reminder, IP data is shared in our Device ID report daily: shadowserver.org/what-we-do/net…

CVEs have now been assigned: 
unit42.paloaltonetworks.com/cve-2024-0012-…

security.paloaltonetworks.com/CVE-2024-0012

security.paloaltonetworks.com/CVE-2024-9474

6642 IPs found exposed on 2024-11-17 (down from around 11K):  dashboard.shadowserver.org/statistics/iot…

As a reminder, IP data is shared in our Device ID report daily: shadowserver.org/what-we-do/net…
The Shadowserver Foundation (@shadowserver) 's Twitter Profile Photo

We see CVE-2024-0012 exploitation attempts since Nov 18th. We are now also observing CVE-2024-9474. IoCs: unit42.paloaltonetworks.com/cve-2024-0012-… Check for signs of compromise and patch: security.paloaltonetworks.com/CVE-2024-0012 security.paloaltonetworks.com/CVE-2024-9474 For additional background - labs.watchtowr.com/pots-and-pans-…

MISP (@misp@misp-community.org) (@mispproject) 's Twitter Profile Photo

MISP 2.4.200 and 2.5.2 released - Post Hack.lu release with many new features. New feature such as Ad-Hoc Workflows, Private Custom Galaxies, Tags on Event Report, new features in event report & improved PDF export. misp-project.org/2024/11/19/MIS… #ThreatIntel #cti

CIRCL - @circl@social.circl.lu (@circl_lu) 's Twitter Profile Photo

Apple Fixes Two Exploited Vulnerabilities on Intel-based Mac System #vulnerability #vulnerabilities #cybersecurity #infosec #apple 🔗 vulnerability.circl.lu/bundle/ad1ae2c…

CIRCL - @circl@social.circl.lu (@circl_lu) 's Twitter Profile Photo

We’re delighted to announce the release of Vulnerability-Lookup 2.2.0, packed with enhancements, new features, and bug fixes. Online version: vulnerability.circl.lu Release notes: github.com/cve-search/vul… #cve #vulnerability #vulnerabilities #opensource #CyberSecurity

Koen Van Impe ☕ (@cudeso) 's Twitter Profile Photo

There's a wealth of useful threat data available via Rösti, Repackaged Öpen Source Threat Intelligence. Formats include STIX, JSON, CSV and MISP. Provided by Johannes Bader . And now also available as a default MISP (@[email protected]) feed. Check out rosti.bin.re

There's a wealth of useful threat data available via Rösti, Repackaged Öpen Source Threat Intelligence. Formats include STIX, JSON, CSV and MISP. Provided by <a href="/viql/">Johannes Bader</a> . And now also available as a default <a href="/MISPProject/">MISP (@misp@misp-community.org)</a> feed. Check out rosti.bin.re
NASK (@nask_pl) 's Twitter Profile Photo

💡Operational teams responsible for #cybersecurity in European Union countries will be equipped with an AI-based toolkit that will significantly facilitate their work. We are proud that the NASK Institute is leading the international consortium that will implement the project

💡Operational teams responsible for #cybersecurity in European Union countries will be  equipped with an AI-based toolkit that will significantly facilitate  their work. We are proud that the NASK Institute is leading the  international consortium that will implement the project
Koen Van Impe ☕ (@cudeso) 's Twitter Profile Photo

Did you know that since v3.0.0 of misp-modules and v3.0.1 of misp-docker/misp-modules it is possible to load custom misp-modules without building your own image? Just drop them in the corresponding /custom/ directory. github.com/MISP/misp-dock… github.com/MISP/misp-dock…

Did you know that since v3.0.0 of misp-modules and v3.0.1 of misp-docker/misp-modules it is possible to load custom misp-modules without building your own image? Just drop them in the corresponding /custom/ directory. 

github.com/MISP/misp-dock…
github.com/MISP/misp-dock…
Koen Van Impe ☕ (@cudeso) 's Twitter Profile Photo

I created a small parser for Minimedusa (the MegaMedusa configuration, an L7 DDoS tool). It uses TEAM CYMRU Whois, CIRCL - @[email protected] Passive DNS service and an RDNS lookup for enrichment. There's also a MISP JSON to import the feed in MISP (@[email protected]) github.com/cudeso/tools/t…

I created a small parser for Minimedusa (the MegaMedusa configuration, an L7 DDoS tool). It uses  <a href="/teamcymru/">TEAM CYMRU</a> Whois,  <a href="/circl_lu/">CIRCL - @circl@social.circl.lu</a>  Passive DNS service and an RDNS lookup for enrichment. There's also a MISP JSON to import the feed in <a href="/MISPProject/">MISP (@misp@misp-community.org)</a>  github.com/cudeso/tools/t…
Pass the SALT Conference (@passthesaltcon) 's Twitter Profile Photo

CFP REMINDER: D-15 Hurry up, it's time to submit your Security & Free SW talk or workshop! ➡️ cfp.pass-the-salt.org/pts2025/cfp 📅 deadline: sunday March, 30 midnight! ✉️ a question? send it to [email protected] 👍 🙏RT appreciated!

The Shadowserver Foundation (@shadowserver) 's Twitter Profile Photo

For the last few days we are also scanning & reporting out exposed Ingress NGINX Controller for Kubernetes (Admission Controller feature). These may possibly be also vulnerable to CVE-2025-1974 & other recently disclosed vulnerabilities. We see around 4000 IPs exposed.

For the last few days we are also scanning &amp; reporting out exposed Ingress NGINX Controller for Kubernetes (Admission Controller feature). These may possibly be also vulnerable to CVE-2025-1974 &amp; other recently disclosed vulnerabilities.

We see around 4000 IPs exposed.