The Computer Incident Response Center Luxembourg (CIRCL) is a government-driven initiative designed to gather, review, report and respond to computer security threats and incidents.
TR-33 Analysis - CTB-Locker / Critroni - 18th February 2015
glibc: buffer overflow in gethostbyname - 27th January 2015
NTP (Network Time Protocol) daemon - ntpd - critical vulnerabilities - 22nd December 2014
TR-27 - GNU Bash Critical Vulnerability - CVE-2014-6271 - CVE-2014-7169 - 24th September 2014
CIRCL needs you for a safer and stronger cyberspace in Luxembourg.
Report security incidents, malware, phishing, security vulnerabilities or malicious systems.
Latest CIRCL tweets
- RT @AntiBotnet: #Luxembourg National Anti-Botnet Support Center joins the #ACDC-Project https://t.co/BYJTBcuedg @circl_lu http://t.co/f5KZ… https://www.circl.lu/pub/press/20150326/ 2015-03-26 12:51:39
- RT @alexanderjaeger: @cudeso @circl_lu „infected“ is a good example of mail-AV-gateways catching stuff why not share it using @virustotal o… 2015-03-26 12:51:32
- RT @pinkflawd: Interesting, so fully encrypted binaries are only detected by 4 AVs as suspicious, same which also detect notepad.exe #SyScan 2015-03-26 10:32:01
- @cudeso Thanks. It happens that a lot of mail provider brute-forces ZIP password. Another good option is to use GPG with a symmetric key. 2015-03-26 08:36:21
- RT @cudeso: How to share malware with a security team? http://t.co/Nbr6dSOn6o http://www.vanimpe.eu/2015/03/26/how-to-share-malware-with-a-security-team/ 2015-03-26 08:33:12
- userlogin.jsp in SolarWinds Firewall Security Manager (FSM) allows remote attackers to gain privileges and RCE https://t.co/ICiQ0faYit https://cve.circl.lu/cve/CVE-2015-2284 2015-03-26 08:27:23
- remove_bad_chars function in cups-browsed.c (cups-filters) allows remote IPP printers to execute arbitrary commands https://t.co/EaA01oyR6q https://cve.circl.lu/cve/CVE-2015-2265 2015-03-24 21:47:53