CIRCL - @[email protected]

11K posts

CIRCL - @circl@social.circl.lu banner
CIRCL - @circl@social.circl.lu

@circl_lu

CIRCL is the CERT (Computer Emergency Response Team) for the private sector, communes and non-governmental entities in Luxembourg.

Luxembourg Katılım Ağustos 2010
1.3K Takip Edilen13.2K Takipçiler
CIRCL - @[email protected] retweetledi
The Shadowserver Foundation
The Shadowserver Foundation@Shadowserver·
For the last few days we are also scanning & reporting out exposed Ingress NGINX Controller for Kubernetes (Admission Controller feature). These may possibly be also vulnerable to CVE-2025-1974 & other recently disclosed vulnerabilities. We see around 4000 IPs exposed.
The Shadowserver Foundation tweet media
English
1
29
59
9.6K
CIRCL - @[email protected] retweetledi
Koen Van Impe ☕
Koen Van Impe ☕@cudeso·
Did you know that since v3.0.0 of misp-modules and v3.0.1 of misp-docker/misp-modules it is possible to load custom misp-modules without building your own image? Just drop them in the corresponding /custom/ directory. github.com/MISP/misp-dock… #L266" target="_blank" rel="nofollow noopener">github.com/MISP/misp-dock…
Koen Van Impe ☕ tweet media
English
0
5
12
2.5K
CIRCL - @[email protected] retweetledi
NASK
NASK@NASK_pl·
💡Operational teams responsible for #cybersecurity in European Union countries will be equipped with an AI-based toolkit that will significantly facilitate their work. We are proud that the NASK Institute is leading the international consortium that will implement the project "#AIPITCH—AI-Powered Innovative Toolkit for Cybersecurity Hubs." Nearly 8 million euros, including 4 million from a European funds grant, have been allocated for advanced technologies supporting the fight against cyber threats. Our partners in the project are: @circl_lu, @Shadowserver, @ncbj_swierk and @ABI_Lab. The project is funded by #EuropeanFunds under the DIGITAL-ECCC-2024-DEPLOY-CYBER-06-ENABLINGTEC program.
NASK tweet media
English
1
3
5
1.8K
CIRCL - @[email protected] retweetledi
Koen Van Impe ☕
Koen Van Impe ☕@cudeso·
There's a wealth of useful threat data available via Rösti, Repackaged Öpen Source Threat Intelligence. Formats include STIX, JSON, CSV and MISP. Provided by @viql . And now also available as a default @MISPProject feed. Check out rosti.bin.re
Koen Van Impe ☕ tweet mediaKoen Van Impe ☕ tweet mediaKoen Van Impe ☕ tweet mediaKoen Van Impe ☕ tweet media
English
0
4
20
2.7K
Jeremiah Grossman
Jeremiah Grossman@jeremiahg·
Total CVEs: 240,830 Total KEVs 1,218 0.5% of CVEs have been seen exploited in the wild historically. I've also asked several cyber-insurance carriers if they could share with me the CVEs that resulted in claims. Answer, less than 200 per year.
English
14
46
209
36.3K
CIRCL - @[email protected] retweetledi
The Shadowserver Foundation
The Shadowserver Foundation@Shadowserver·
CVEs have now been assigned: unit42.paloaltonetworks.com/cve-2024-0012-… security.paloaltonetworks.com/CVE-2024-0012 security.paloaltonetworks.com/CVE-2024-9474 6642 IPs found exposed on 2024-11-17 (down from around 11K): dashboard.shadowserver.org/statistics/iot… As a reminder, IP data is shared in our Device ID report daily: shadowserver.org/what-we-do/net…
The Shadowserver Foundation tweet media
The Shadowserver Foundation@Shadowserver

Palo Alto Networks has now updated their advisory security.paloaltonetworks.com/PAN-SA-2024-00… saying they have "observed threat activity exploiting an unauthenticated remote command execution vulnerability against a limited number of firewall management interfaces which are exposed to the Internet."

English
0
11
32
11.8K
CIRCL - @[email protected] retweetledi
The Shadowserver Foundation
The Shadowserver Foundation@Shadowserver·
We see CVE-2024-0012 exploitation attempts since Nov 18th. We are now also observing CVE-2024-9474. IoCs: unit42.paloaltonetworks.com/cve-2024-0012-… Check for signs of compromise and patch: security.paloaltonetworks.com/CVE-2024-0012 security.paloaltonetworks.com/CVE-2024-9474 For additional background - labs.watchtowr.com/pots-and-pans-…
The Shadowserver Foundation@Shadowserver

CVEs have now been assigned: unit42.paloaltonetworks.com/cve-2024-0012-… security.paloaltonetworks.com/CVE-2024-0012 security.paloaltonetworks.com/CVE-2024-9474 6642 IPs found exposed on 2024-11-17 (down from around 11K): dashboard.shadowserver.org/statistics/iot… As a reminder, IP data is shared in our Device ID report daily: shadowserver.org/what-we-do/net…

English
0
9
22
5.6K
CIRCL - @circl@social.circl.lu
New features in vulnerability lookup includes sighting from different sources including @MISPProject communities. The example below is a vulnerability in Android but the CVE is not yet published. You can track the sighting evolution. #sightings" target="_blank" rel="nofollow noopener">vulnerability.circl.lu/vuln/CVE-2024-… #vulnerability #cve
CIRCL - @circl@social.circl.lu tweet media
English
0
10
10
3.2K
CIRCL - @[email protected] retweetledi
Alex
Alex@alexanderjaeger·
Omg, @_saadk , @0x4D31 , @adulau , @rafi0t, @blubbfiction, @tomchop_, @ddurvaux , @angealbertini , @_hillu and so many more. What is this, a conference or a DREAM team from all recorded speakers ever from @Ministraitor? What a line up.
hack_lu@hack_lu

The first version of the #hacklu 2024 agenda is now live. Check it out here: 2024.hack.lu/agenda/ Don't miss out—join us for this year's edition! #infosec #conference #Luxembourg

English
1
7
14
4.8K