circl.lu
CIRCL » Traffic Light Protocol (TLP) - Classification and Sharing of Sensitive Information
https://www.circl.lu/pub/traffic-light-protocol
Traffic Light Protocol (TLP) - Classification and Sharing of Sensitive Information. Traffic Light Protocol (TLP) - Classification and Sharing of Sensitive Information. Back to Publications and Presentations. Traffic Light Protocol - TLP. Chatham House Rule (CHR) in addition to TLP. Where is the Traffic Light Protocol used? How do you use the Traffic Light Protocol in a document? You can report incidents. Via our official contact including e-mail, phone. Or use the Anonymous reporting form. Chatham House ...
circl.lu
CIRCL » TR-27 - GNU Bash Critical Vulnerability - CVE-2014-6271 - CVE-2014-7169
http://www.circl.lu/pub/tr-27
TR-27 - GNU Bash Critical Vulnerability - CVE-2014-6271 - CVE-2014-7169. TR-27 - GNU Bash Critical Vulnerability - CVE-2014-6271 - CVE-2014-7169. Back to Publications and Presentations. How to test if your bash is vulnerable. Disabling the vulnerable bash functionality. Classification of this document. You can report incidents. Via our official contact including e-mail, phone. Or use the Anonymous reporting form. How to test if your bash is vulnerable. Env x='() { :;}; echo vulnerable' bash -c "echo test".
circl.lu
CIRCL » TR-37 - VENOM / CVE-2015-3456 - Critical vulnerability in QEMU Floppy Disk Controller (FDC) emulation
http://www.circl.lu/pub/tr-37
TR-37 - VENOM / CVE-2015-3456 - Critical vulnerability in QEMU Floppy Disk Controller (FDC) emulation. TR-37 - VENOM / CVE-2015-3456 - Critical vulnerability in QEMU Floppy Disk Controller (FDC) emulation. Back to Publications and Presentations. Impact of such vulnerability in virtualization technologies. Classification of this document. You can report incidents. Via our official contact including e-mail, phone. Or use the Anonymous reporting form. Is a kind of ‘buffer overflow’ vulnerability in the QEMU.
circl.lu
CIRCL » TR-20 - Port evolution, a software to find the shady IP profiles in Netflow
http://www.circl.lu/pub/tr-20
TR-20 - Port evolution, a software to find the shady IP profiles in Netflow. TR-20 - Port evolution, a software to find the shady IP profiles in Netflow. Back to Publications and Presentations. Classification of this document. You can report incidents. Via our official contact including e-mail, phone. Or use the Anonymous reporting form. Incident response teams or abuse handling teams including the technical support teams have often limited resources and some tasks must be prioritized. In addition, a...
circl.lu
CIRCL » TR-28 - The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, are vulnerable to a critical padding oracle attack - CVE-2014-3566
http://www.circl.lu/pub/tr-28
TR-28 - The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, are vulnerable to a critical padding oracle attack - CVE-2014-3566. TR-28 - The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, are vulnerable to a critical padding oracle attack - CVE-2014-3566. Back to Publications and Presentations. Disambiguation of names and protocols. How to Disable SSLv3? Microsoft IIS Internet Information Server. Classification of this document. You can report incidents.
circl.lu
CIRCL » Training and Technical Courses
http://www.circl.lu/services/training
Training and Technical Courses. Training and Technical Courses. Introduction to Incident Response. File-system Post-mortem Forensic Analysis. Introduction to Penetration Testing. Introduction to (Malware) Reverse Engineering. MISP Malware Information Sharing Platform - Threat Sharing. How can I register for a training. You can report incidents. Via our official contact including e-mail, phone. Or use the Anonymous reporting form. To its members and organizations based in Luxembourg. Courses can be held a...
circl.lu
CIRCL » A new wave of crypto ransomware targeting Luxembourg
http://www.circl.lu/pub/press/20150205
A new wave of crypto ransomware targeting Luxembourg. A new wave of crypto ransomware targeting Luxembourg. Back to CIRCL Newsroom - Press Release. You can report incidents. Via our official contact including e-mail, phone. Or use the Anonymous reporting form. The main recommendation CIRCL makes is to always perform regular backups of the personal files. Such malware also impacts USB drives and network attached servers. We strongly recommend to keep the backups on separate devices. Do not open attachment...
circl.lu
CIRCL » CIRCL Team Members
http://www.circl.lu/team
Business and Legal Support Team. You can report incidents. Via our official contact including e-mail, phone. Or use the Anonymous reporting form. CIRCL team is composed of competent people, dedicated to their mission of improving security for the benefit of Luxembourg and the companies located on the territory. A file containing all the PGP keys listed on this page is also available. 3F4D 8CF6 08F9 4F88 2815 2CB1 69A2 0F50 9BE4 AEE9. 1D02A8CC 5464280D 70C30D9B B66EDB67 188ED144. D920 2C05 1A90 32EE 1F7D ...
circl.lu
CIRCL » Publications and Presentations
http://www.circl.lu/pub
The Digital First Aid Kit. The Digital First Aid Kit (German Edition). You can report incidents. Via our official contact including e-mail, phone. Or use the Anonymous reporting form. TR-45 - Data recovery techniques. TR-44 - Information security - laws and specific rulings in the Grand Duchy of Luxembourg. TR-43 - Installing MPSS 3.6.1 to use a Intel Xeon Phi Coprocessor on Ubuntu Trusty 14.04 LTS. TR-42 - CVE-2015-7755 - CVE-2015-7756 - Critical vulnerabilities in Juniper ScreenOS. TR-29 - NTP (Network...