The Computer Incident Response Center Luxembourg (CIRCL) is a government-driven initiative designed to gather, review, report and respond to computer security threats and incidents.

OUR SERVICES
MISP Logo
Malware Information Sharing Platform (MISP) and Threat Sharing Platform
DMA Logo
Dynamic Malware Analysis Platform (DMA)
USB Logo
Clean documents from untrusted USB keys / sticks
DNS Logo
Database storing historical DNS records

Recent highlights

TR-46 - Information Leaks Affecting Luxembourg and Recommendations (regularly updated) - 22nd December 2016

TR-42 - CVE-2015-7755 - CVE-2015-7756 - Critical vulnerabilities in Juniper ScreenOS - 21st December 2015

TR-41 (fr) - Crypto Ransomware - Défenses proactives et réponse sur incident - 1st December 2015

TR-41 - Crypto Ransomware - Proactive defenses and incident response - 1st December 2015

TR-38 (fr) - Attaques visant les solutions bancaires d'entreprise - Recommandations - 28th May 2015

TR-38 - Attacks targeting enterprise banking solutions - recommendations and remediations - 19th May 2015

TR-37 - VENOM / CVE-2015-3456 - Critical vulnerability in QEMU Floppy Disk Controller (FDC) emulation - 14th May 2015

TR-36 Example setup of WordPress with static export Another approach to secure your WordPress CMS - 29th April 2015

TR-33 Analysis - CTB-Locker / Critroni - 18th February 2015

A new wave of crypto ransomware targeting Luxembourg - Une nouvelle vague de ransomware cible le Luxembourg - 5th February 2015

glibc: buffer overflow in gethostbyname - 27th January 2015

NTP (Network Time Protocol) daemon - ntpd - critical vulnerabilities - 22nd December 2014

The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, are vulnerable to critical padding oracle attack - CVE-2014-3566

TR-27 - GNU Bash Critical Vulnerability - CVE-2014-6271 - CVE-2014-7169 - 24th September 2014

CIRCL warns about spear phishing scams targeting corporate executives and their accounting department - 14th September 2014

[Previous news]

Latest CIRCL tweets

  • CIRCL TR-47 - Recommendations regarding abuse handling for ISPs and registrars published https://t.co/KnQIipyDgs #infosec #bestpractices https://www.circl.lu/pub/tr-47/ 2017-02-23 11:12:53
  • RT @martijn_grooten: Mating RATs: new PlugX variant includes code from PoisonIvy https://t.co/qcA3EfRaXP http://blog.jpcert.or.jp/2017/02/plugx-poison-iv-919a.html 2017-02-23 08:12:51
  • @martijn_grooten Interesting one, we are just missing the hash of the sample. 2017-02-23 07:35:16
  • RT @MISPProject: Next @MISPProject training will be in #Luxembourg 20th March https://t.co/sNGY2KAI3l don't forget to join us. #ThreatHunti… https://www.eventbrite.com/e/misp-training-march-edition-tickets-32112187417 2017-02-20 15:37:27
  • RT @dan_crowley: I found a way to chain five low/medium bugs into pre-auth code execution from the Internet without needing to SE anyone. D… 2017-02-18 17:39:48
  • SQL injection vulnerability in inc/lib/Control/Backend/menus.control.php in GeniXCMS https://t.co/pHJzcJNx0O https://cve.circl.lu/cve/CVE-2017-6065 2017-02-18 15:11:30
  • RT @MISPProject: MISP 2.4.66 released with new extended sighting support for expiration and false-positive notification https://t.co/mdOJ02… 2017-02-17 19:29:00

Search