<feed xmlns="http://www.w3.org/2005/Atom"><title>CIRCL Luxembourg - Computer Incident Response Center Luxembourg Recent News</title><id>http://www.circl.lu/</id><subtitle>News and security alerts from CIRCL, the national CERT of Luxembourg. Computer Incident Response Center Luxembourg</subtitle><author><name>Team CIRCL</name></author><entry><title>We will do a @MISPProject training in Brussels (5/09) https://t.co/fJFrf9Auc7 if you want to learn more about the #ThreatIntel plaform</title><id>https://www.eventbrite.com/e/misp-training-the-brussels-edition-circl-certeu-tickets-26818916100</id><link href="https://www.eventbrite.com/e/misp-training-the-brussels-edition-circl-certeu-tickets-26818916100" /><summary>We will do a @MISPProject training in Brussels (5/09) https://t.co/fJFrf9Auc7 if you want to learn more about the #ThreatIntel plaform</summary></entry><entry><title>Memory Permission Weakness in Citrix XenApp and XenDesktop https://t.co/63GpxI31au</title><id>https://cve.circl.lu/cve/CVE-2016-6493</id><link href="https://cve.circl.lu/cve/CVE-2016-6493" /><summary>Memory Permission Weakness in Citrix XenApp and XenDesktop https://t.co/63GpxI31au</summary></entry><entry><title>RT @Secnewsbytes: MISP training, &#8220;the Brussels Edition&#8221;, CIRCL in collaboration with CERT.EU - September 5th 2016 https://t.co/hVzkhNrTSk</title><id>http://www.misp-project.org/2016/08/11/MISP-Training-in-Brussels.html</id><link href="http://www.misp-project.org/2016/08/11/MISP-Training-in-Brussels.html" /><summary>RT @Secnewsbytes: MISP training, &#8220;the Brussels Edition&#8221;, CIRCL in collaboration with CERT.EU - September 5th 2016 https://t.co/hVzkhNrTSk</summary></entry><entry><title>RT @xanda: Locky Ransomware Distributed Via DOCM Attachments in Latest Email Campaigns https://t.co/713CxdlIQF</title><id>https://www.fireeye.com/blog/threat-research/2016/08/locky_ransomwaredis.html</id><link href="https://www.fireeye.com/blog/threat-research/2016/08/locky_ransomwaredis.html" /><summary>RT @xanda: Locky Ransomware Distributed Via DOCM Attachments in Latest Email Campaigns https://t.co/713CxdlIQF</summary></entry><entry><title>IOMobileFrameBuffer in Apple iOS before 9.3.4 allows attackers to execute arbitrary code in a privileged context https://t.co/s8uhJNnLxV</title><id>https://cve.circl.lu/cve/CVE-2016-4654</id><link href="https://cve.circl.lu/cve/CVE-2016-4654" /><summary>IOMobileFrameBuffer in Apple iOS before 9.3.4 allows attackers to execute arbitrary code in a privileged context https://t.co/s8uhJNnLxV</summary></entry><entry><title>RT @cudeso: Next @MISPProject Training in Brussels on 5-Sep https://t.co/fhUar2btDF #misp</title><id>http://www.misp-project.org/2016/08/11/MISP-Training-in-Brussels.html</id><link href="http://www.misp-project.org/2016/08/11/MISP-Training-in-Brussels.html" /><summary>RT @cudeso: Next @MISPProject Training in Brussels on 5-Sep https://t.co/fhUar2btDF #misp</summary></entry><entry><title>RT @MISPProject: The lead developer of MISP @Iglocska will be at #SuriCon to talk about the current NIDS integration and its future https:/&#8230;</title><id>https://twitter.com/OISFoundation/status/766259124220952576</id><link href="https://twitter.com/OISFoundation/status/766259124220952576" /><summary>RT @MISPProject: The lead developer of MISP @Iglocska will be at #SuriCon to talk about the current NIDS integration and its future https:/&#8230;</summary></entry><entry><title>RT @musalbas: Here's a quick writeup. BENIGNCERTAIN: remote exploit to extract Cisco VPN private keys. Will update as info comes. https://t&#8230;</title><id>https://musalbas.com/2016/08/18/equation-group-benigncertain.html</id><link href="https://musalbas.com/2016/08/18/equation-group-benigncertain.html" /><summary>RT @musalbas: Here's a quick writeup. BENIGNCERTAIN: remote exploit to extract Cisco VPN private keys. Will update as info comes. https://t&#8230;</summary></entry><entry><title>RT @certbund: Following the Checkpoint report Cerber's encryption flaw got fixed. As a result the decryptor doesn't work anymore https://t.&#8230;</title><id>https://www.cerberdecrypt.com/RansomwareDecryptionTool/</id><link href="https://www.cerberdecrypt.com/RansomwareDecryptionTool/" /><summary>RT @certbund: Following the Checkpoint report Cerber's encryption flaw got fixed. As a result the decryptor doesn't work anymore https://t.&#8230;</summary></entry><entry><title>Want to report a vulnerability? Check our responsible vulnerability disclosure policy. https://t.co/47bk7xACfa</title><id>https://www.circl.lu/pub/responsible-vulnerability-disclosure/</id><link href="https://www.circl.lu/pub/responsible-vulnerability-disclosure/" /><summary>Want to report a vulnerability? Check our responsible vulnerability disclosure policy. https://t.co/47bk7xACfa</summary></entry><entry><title>RT @decalage2: https://t.co/NdniVh052J - a #malware search engine using strings, hashes, filenames indexed by @malwr @PayloadSecurity @VXSh&#8230;</title><id>http://decalage.info/mwsearch</id><link href="http://decalage.info/mwsearch" /><summary>RT @decalage2: https://t.co/NdniVh052J - a #malware search engine using strings, hashes, filenames indexed by @malwr @PayloadSecurity @VXSh&#8230;</summary></entry><entry><title>RT @GossiTheDog: Cisco statement on Equation Group #ShadowBrokers - the ASA issues are new. https://t.co/JDr2TlTVTk #2013day</title><id>http://blogs.cisco.com/security/shadow-brokers</id><link href="http://blogs.cisco.com/security/shadow-brokers" /><summary>RT @GossiTheDog: Cisco statement on Equation Group #ShadowBrokers - the ASA issues are new. https://t.co/JDr2TlTVTk #2013day</summary></entry><entry><title>RT @michael_yip: Operation Ghoul: targeted attacks on industrial and engineering organizations: https://t.co/YGbve6ueVf #threatintel #dfir&#8230;</title><id>https://securelist.com/blog/research/75718/operation-ghoul-targeted-attacks-on-industrial-and-engineering-organizations/</id><link href="https://securelist.com/blog/research/75718/operation-ghoul-targeted-attacks-on-industrial-and-engineering-organizations/" /><summary>RT @michael_yip: Operation Ghoul: targeted attacks on industrial and engineering organizations: https://t.co/YGbve6ueVf #threatintel #dfir&#8230;</summary></entry><entry><title>Cookie Parser Buffer Overflow Vulnerability in FortiGate firmware (FOS) released before Aug 2012 https://t.co/EruOuiBJWu</title><id>http://fortiguard.com/advisory/cookie-parser-buffer-overflow-vulnerability</id><link href="http://fortiguard.com/advisory/cookie-parser-buffer-overflow-vulnerability" /><summary>Cookie Parser Buffer Overflow Vulnerability in FortiGate firmware (FOS) released before Aug 2012 https://t.co/EruOuiBJWu</summary></entry><entry><title>RT @cteuschel: A new #RIPEstat widget shows when a resource was first ever seen in @RIPE_NCC RIS, https://t.co/rKDlfcl0Pq https://t.co/nNOB&#8230;</title><id>http://bit.ly/2bbVdbT</id><link href="http://bit.ly/2bbVdbT" /><summary>RT @cteuschel: A new #RIPEstat widget shows when a resource was first ever seen in @RIPE_NCC RIS, https://t.co/rKDlfcl0Pq https://t.co/nNOB&#8230;</summary></entry></feed>
