<rss version="2.0"><channel><title>CIRCL Luxembourg - Computer Incident Response Center Luxembourg Recent News</title><link>http://www.circl.lu/</link><description>News and security alerts from CIRCL, the national CERT of Luxembourg. Computer Incident Response Center Luxembourg</description><item><title>We will do a @MISPProject training in Brussels (5/09) https://t.co/fJFrf9Auc7 if you want to learn more about the #ThreatIntel plaform</title><link>https://www.eventbrite.com/e/misp-training-the-brussels-edition-circl-certeu-tickets-26818916100</link><description>We will do a @MISPProject training in Brussels (5/09) https://t.co/fJFrf9Auc7 if you want to learn more about the #ThreatIntel plaform</description></item><item><title>Memory Permission Weakness in Citrix XenApp and XenDesktop https://t.co/63GpxI31au</title><link>https://cve.circl.lu/cve/CVE-2016-6493</link><description>Memory Permission Weakness in Citrix XenApp and XenDesktop https://t.co/63GpxI31au</description></item><item><title>RT @Secnewsbytes: MISP training, &#8220;the Brussels Edition&#8221;, CIRCL in collaboration with CERT.EU - September 5th 2016 https://t.co/hVzkhNrTSk</title><link>http://www.misp-project.org/2016/08/11/MISP-Training-in-Brussels.html</link><description>RT @Secnewsbytes: MISP training, &#8220;the Brussels Edition&#8221;, CIRCL in collaboration with CERT.EU - September 5th 2016 https://t.co/hVzkhNrTSk</description></item><item><title>RT @xanda: Locky Ransomware Distributed Via DOCM Attachments in Latest Email Campaigns https://t.co/713CxdlIQF</title><link>https://www.fireeye.com/blog/threat-research/2016/08/locky_ransomwaredis.html</link><description>RT @xanda: Locky Ransomware Distributed Via DOCM Attachments in Latest Email Campaigns https://t.co/713CxdlIQF</description></item><item><title>IOMobileFrameBuffer in Apple iOS before 9.3.4 allows attackers to execute arbitrary code in a privileged context https://t.co/s8uhJNnLxV</title><link>https://cve.circl.lu/cve/CVE-2016-4654</link><description>IOMobileFrameBuffer in Apple iOS before 9.3.4 allows attackers to execute arbitrary code in a privileged context https://t.co/s8uhJNnLxV</description></item><item><title>RT @cudeso: Next @MISPProject Training in Brussels on 5-Sep https://t.co/fhUar2btDF #misp</title><link>http://www.misp-project.org/2016/08/11/MISP-Training-in-Brussels.html</link><description>RT @cudeso: Next @MISPProject Training in Brussels on 5-Sep https://t.co/fhUar2btDF #misp</description></item><item><title>RT @MISPProject: The lead developer of MISP @Iglocska will be at #SuriCon to talk about the current NIDS integration and its future https:/&#8230;</title><link>https://twitter.com/OISFoundation/status/766259124220952576</link><description>RT @MISPProject: The lead developer of MISP @Iglocska will be at #SuriCon to talk about the current NIDS integration and its future https:/&#8230;</description></item><item><title>RT @musalbas: Here's a quick writeup. BENIGNCERTAIN: remote exploit to extract Cisco VPN private keys. Will update as info comes. https://t&#8230;</title><link>https://musalbas.com/2016/08/18/equation-group-benigncertain.html</link><description>RT @musalbas: Here's a quick writeup. BENIGNCERTAIN: remote exploit to extract Cisco VPN private keys. Will update as info comes. https://t&#8230;</description></item><item><title>RT @certbund: Following the Checkpoint report Cerber's encryption flaw got fixed. As a result the decryptor doesn't work anymore https://t.&#8230;</title><link>https://www.cerberdecrypt.com/RansomwareDecryptionTool/</link><description>RT @certbund: Following the Checkpoint report Cerber's encryption flaw got fixed. As a result the decryptor doesn't work anymore https://t.&#8230;</description></item><item><title>Want to report a vulnerability? Check our responsible vulnerability disclosure policy. https://t.co/47bk7xACfa</title><link>https://www.circl.lu/pub/responsible-vulnerability-disclosure/</link><description>Want to report a vulnerability? Check our responsible vulnerability disclosure policy. https://t.co/47bk7xACfa</description></item><item><title>RT @decalage2: https://t.co/NdniVh052J - a #malware search engine using strings, hashes, filenames indexed by @malwr @PayloadSecurity @VXSh&#8230;</title><link>http://decalage.info/mwsearch</link><description>RT @decalage2: https://t.co/NdniVh052J - a #malware search engine using strings, hashes, filenames indexed by @malwr @PayloadSecurity @VXSh&#8230;</description></item><item><title>RT @GossiTheDog: Cisco statement on Equation Group #ShadowBrokers - the ASA issues are new. https://t.co/JDr2TlTVTk #2013day</title><link>http://blogs.cisco.com/security/shadow-brokers</link><description>RT @GossiTheDog: Cisco statement on Equation Group #ShadowBrokers - the ASA issues are new. https://t.co/JDr2TlTVTk #2013day</description></item><item><title>RT @michael_yip: Operation Ghoul: targeted attacks on industrial and engineering organizations: https://t.co/YGbve6ueVf #threatintel #dfir&#8230;</title><link>https://securelist.com/blog/research/75718/operation-ghoul-targeted-attacks-on-industrial-and-engineering-organizations/</link><description>RT @michael_yip: Operation Ghoul: targeted attacks on industrial and engineering organizations: https://t.co/YGbve6ueVf #threatintel #dfir&#8230;</description></item><item><title>Cookie Parser Buffer Overflow Vulnerability in FortiGate firmware (FOS) released before Aug 2012 https://t.co/EruOuiBJWu</title><link>http://fortiguard.com/advisory/cookie-parser-buffer-overflow-vulnerability</link><description>Cookie Parser Buffer Overflow Vulnerability in FortiGate firmware (FOS) released before Aug 2012 https://t.co/EruOuiBJWu</description></item><item><title>RT @cteuschel: A new #RIPEstat widget shows when a resource was first ever seen in @RIPE_NCC RIS, https://t.co/rKDlfcl0Pq https://t.co/nNOB&#8230;</title><link>http://bit.ly/2bbVdbT</link><description>RT @cteuschel: A new #RIPEstat widget shows when a resource was first ever seen in @RIPE_NCC RIS, https://t.co/rKDlfcl0Pq https://t.co/nNOB&#8230;</description></item></channel></rss>
