<feed xmlns="http://www.w3.org/2005/Atom">
  <title>CIRCL</title>
  <link href="https://new.circl.lu/atom.xml" rel="self"/>
  <link href="https://new.circl.lu/"/>
  <updated>2026-03-27T08:14:20Z</updated>
  <id>https://new.circl.lu/</id>
  <author>
    <name>CIRCL</name>
  </author>
  
  <entry>
    <title>CIRCL Team Members</title>
    <link href="https://new.circl.lu/team/"/>
    <id>https://new.circl.lu/team/</id>
    <updated>2025-07-14T14:23:58Z</updated>
    <summary>&lt;h2 id=&#34;team-members&#34;&gt;Team Members&lt;/h2&gt;
&lt;p&gt;CIRCL team is composed of competent people, dedicated to their mission of improving security for the benefit of Luxembourg and the companies located on the territory.&lt;/p&gt;
&lt;p&gt;A file containing all the PGP keys listed on this page &lt;a href=&#34;/assets/files/team.asc&#34;&gt;is also available&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id=&#34;operational-core-team&#34;&gt;Operational Core Team&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th style=&#34;text-align: left&#34;&gt;Name&lt;/th&gt;
          &lt;th style=&#34;text-align: center&#34;&gt;PGP Fingerprint&lt;/th&gt;
          &lt;th style=&#34;text-align: center&#34;&gt;Matrix&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;mailto:cedric.bonhomme@circl.lu&#34;&gt;Cedric Bonhomme&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;55F5 D60E EFCA 3591 0089  18E7 A1CB 94DE &lt;a href=&#34;https://openpgp.circl.lu/pks/lookup?op=get&amp;amp;search=0xA1CB94DE57B7A70D&#34;&gt;57B7 A70D&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;@cedric:matrix.circl.lu&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;mailto:xavier.claude@circl.lu&#34;&gt;Xavier Claude&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;0BF0 0868 B612 51BD D223 74F1 7185 831A &lt;a href=&#34;https://openpgp.circl.lu/pks/lookup?op=get&amp;amp;search=0x0bf00868b61251bdd22374f17185831a9c04f715&#34;&gt;9C04 F715&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;@claudex:matrix.circl.lu&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;mailto:david.cruciani@circl.lu&#34;&gt;David Cruciani&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;A7C82 7090 996D CB96F C2AF2 D869 0CDE1 &lt;a href=&#34;https://pgp.circl.lu/pks/lookup?op=get&amp;amp;search=0xa7c827090996dcb96fc2af2d8690cde1e3994b9b&#34;&gt;E399 4B9B&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;@dacruciani:matrix.circl.lu&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;mailto:alexandre.dulaunoy@circl.lu&#34;&gt;Alexandre Dulaunoy&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;3B12 DCC2 82FA 2931 2F5B 709A 09E2 CD49 &lt;a href=&#34;https://openpgp.circl.lu/pks/lookup?op=index&amp;amp;search=0x3B12DCC282FA29312F5B709A09E2CD4944E6CBCD&#34;&gt;44E6 CBCD&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;@adulau:matrix.circl.lu&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;mailto:michael.hamm@circl.lu&#34;&gt;Michael Hamm&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;917D 0B62 1E88 BEC1 9081  792B F723 3773 &lt;a href=&#34;https://openpgp.circl.lu/pks/lookup?op=index&amp;amp;search=0x917D0B621E88BEC19081792BF7233773DB0F8DBD&#34;&gt;DB0F 8DBD&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;@michael:matrix.circl.lu&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;mailto:andras.iklody@circl.lu&#34;&gt;Andras Iklody&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;C0B2 39A5 D5D7 76A8 C2FE  322F BEA2 24F1 &lt;a href=&#34;https://openpgp.circl.lu/pks/lookup?op=get&amp;amp;search=0xBEA224F1FEF113AC&#34;&gt;FEF1 13AC&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;@andras:matrix.circl.lu&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;mailto:quentin.jerome@circl.lu&#34;&gt;Quentin Jérôme&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;C0F6 E8F2 C1AB 2799 A31F 416C 0548 A778 &lt;a href=&#34;https://openpgp.circl.lu/pks/lookup?op=index&amp;amp;search=0x0548A778D21D10AD&#34;&gt;D21D 10AD&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;@quentin:matrix.circl.lu&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;mailto:paul.jung@circl.lu&#34;&gt;Paul Jung&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;3202 40F9 B345 6CE4 616E DC8C F93A 0908 &lt;a href=&#34;https://openpgp.circl.lu/pks/lookup?op=get&amp;amp;search=0x320240f9b3456ce4616edc8cf93a09081a50dc5a&#34;&gt;1A50 DC5A&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;@thanat0s:matrix.circl.lu&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;mailto:sami.mokaddem@circl.lu&#34;&gt;Sami Mokaddem&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;F6D9 8155 94D1 2C13 84B4 4D1F 164C 473F  &lt;a href=&#34;https://openpgp.circl.lu/pks/lookup?op=get&amp;amp;search=0x164C473F627A06FA&#34;&gt;627A 06FA&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;@sami:matrix.circl.lu&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;maito:luciano.righetti@circl.lu&#34;&gt;Luciano Righetti&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;3E2D 042B B38C 5169 34A4  2CDA FB1B AC9A &lt;a href=&#34;https://openpgp.circl.lu/pks/lookup?op=get&amp;amp;search=0x3e2d042bb38c516934a42cdafb1bac9aec8a387b&#34;&gt;EC8A 387B&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;@luciano:matrix.circl.lu&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;mailto:sascha.rommelfangen@circl.lu&#34;&gt;Sascha Rommelfangen&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;85F1 E6D6 7988 03C6 5446  3133 89F7 60A9 &lt;a href=&#34;https://openpgp.circl.lu/pks/lookup?op=index&amp;amp;search=0x85F1E6D6798803C65446313389F760A9A572F306&#34;&gt;A572 F306&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;@rommelfs:matrix.circl.lu&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;mailto:deborah.servili@circl.lu&#34;&gt;Deborah Servili&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;CE50 734F DD43 E982 3864  157D 7E3A 8328 &lt;a href=&#34;https://openpgp.circl.lu/pks/lookup?op=index&amp;amp;search=0xCE50734FDD43E9823864157D7E3A832850D4D7D1&#34;&gt;50D4 D7D1&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;@deb:matrix.circl.lu&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;mailto:christian.studer@circl.lu&#34;&gt;Christian Studer&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;64ED D89D 9F0D 1AC4 309C A94B 6BBE D1B6 &lt;a href=&#34;https://openpgp.circl.lu/pks/lookup?op=index&amp;amp;search=0x64EDD89D9F0D1AC4309CA94B6BBED1B63A6D639F&#34;&gt;3A6D 639F&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;@chris:matrix.circl.lu&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;mailto:aurelien.thirion@circl.lu&#34;&gt;Aurélien Thirion&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;0001 ED96 0248 6C26 D551  8351 1E1B 1F50 &lt;a href=&#34;https://openpgp.circl.lu/pks/lookup?op=get&amp;amp;search=0x1E1B1F50D84613D0&#34;&gt;D846 13D0&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;@aurelien:matrix.circl.lu&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;mailto:gerard.wagener@circl.lu&#34;&gt;Gerard Wagener&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;41EC EDCE 3394 E3CE 3A18  98E3 D0EB 697E &lt;a href=&#34;https://openpgp.circl.lu/pks/lookup?op=index&amp;amp;search=0x41ECEDCE3394E3CE3A1898E3D0EB697ED81F0490&#34;&gt;D81F 0490&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;@gerard:matrix.circl.lu&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;business-and-legal-support-team&#34;&gt;Business and Legal Support Team&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th style=&#34;text-align: left&#34;&gt;Name&lt;/th&gt;
          &lt;th style=&#34;text-align: center&#34;&gt;PGP Fingerprint&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;mailto:rita.bressanutti@lhc.lu&#34;&gt;Rita Bressanutti&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;53FD AEB3 E4AA 286A 819C  9B24 052F FBC7 &lt;a href=&#34;https://openpgp.circl.lu/pks/lookup?op=get&amp;amp;search=0x052FFBC7912A19C9&#34;&gt;912A 19C9&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;mailto:margot.hartman@lhc.lu&#34;&gt;Margot Hartman&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;DACE 9456 1FE5 3164 8805  9812 5EBD 1A69 &lt;a href=&#34;https://openpgp.circl.lu/pks/lookup?op=get&amp;amp;search=0x5EBD1A69EDDB2252&#34;&gt;EDDB 2252&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;mailto:pascal.steichen@lhc.lu&#34;&gt;Pascal Steichen&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;D1DF 00E4 A9BD 1649 8A89 F62F 32C9 485E &lt;a href=&#34;https://openpgp.circl.lu/pks/lookup?op=index&amp;amp;search=0xD1DF00E4A9BD16498A89F62F32C9485E0549E7E1&#34;&gt;0549 E7E1&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;</summary>
    <content type="html">&lt;h2 id=&#34;team-members&#34;&gt;Team Members&lt;/h2&gt;
&lt;p&gt;CIRCL team is composed of competent people, dedicated to their mission of improving security for the benefit of Luxembourg and the companies located on the territory.&lt;/p&gt;
&lt;p&gt;A file containing all the PGP keys listed on this page &lt;a href=&#34;/assets/files/team.asc&#34;&gt;is also available&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id=&#34;operational-core-team&#34;&gt;Operational Core Team&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th style=&#34;text-align: left&#34;&gt;Name&lt;/th&gt;
          &lt;th style=&#34;text-align: center&#34;&gt;PGP Fingerprint&lt;/th&gt;
          &lt;th style=&#34;text-align: center&#34;&gt;Matrix&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;mailto:cedric.bonhomme@circl.lu&#34;&gt;Cedric Bonhomme&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;55F5 D60E EFCA 3591 0089  18E7 A1CB 94DE &lt;a href=&#34;https://openpgp.circl.lu/pks/lookup?op=get&amp;amp;search=0xA1CB94DE57B7A70D&#34;&gt;57B7 A70D&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;@cedric:matrix.circl.lu&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;mailto:xavier.claude@circl.lu&#34;&gt;Xavier Claude&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;0BF0 0868 B612 51BD D223 74F1 7185 831A &lt;a href=&#34;https://openpgp.circl.lu/pks/lookup?op=get&amp;amp;search=0x0bf00868b61251bdd22374f17185831a9c04f715&#34;&gt;9C04 F715&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;@claudex:matrix.circl.lu&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;mailto:david.cruciani@circl.lu&#34;&gt;David Cruciani&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;A7C82 7090 996D CB96F C2AF2 D869 0CDE1 &lt;a href=&#34;https://pgp.circl.lu/pks/lookup?op=get&amp;amp;search=0xa7c827090996dcb96fc2af2d8690cde1e3994b9b&#34;&gt;E399 4B9B&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;@dacruciani:matrix.circl.lu&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;mailto:alexandre.dulaunoy@circl.lu&#34;&gt;Alexandre Dulaunoy&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;3B12 DCC2 82FA 2931 2F5B 709A 09E2 CD49 &lt;a href=&#34;https://openpgp.circl.lu/pks/lookup?op=index&amp;amp;search=0x3B12DCC282FA29312F5B709A09E2CD4944E6CBCD&#34;&gt;44E6 CBCD&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;@adulau:matrix.circl.lu&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;mailto:michael.hamm@circl.lu&#34;&gt;Michael Hamm&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;917D 0B62 1E88 BEC1 9081  792B F723 3773 &lt;a href=&#34;https://openpgp.circl.lu/pks/lookup?op=index&amp;amp;search=0x917D0B621E88BEC19081792BF7233773DB0F8DBD&#34;&gt;DB0F 8DBD&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;@michael:matrix.circl.lu&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;mailto:andras.iklody@circl.lu&#34;&gt;Andras Iklody&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;C0B2 39A5 D5D7 76A8 C2FE  322F BEA2 24F1 &lt;a href=&#34;https://openpgp.circl.lu/pks/lookup?op=get&amp;amp;search=0xBEA224F1FEF113AC&#34;&gt;FEF1 13AC&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;@andras:matrix.circl.lu&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;mailto:quentin.jerome@circl.lu&#34;&gt;Quentin Jérôme&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;C0F6 E8F2 C1AB 2799 A31F 416C 0548 A778 &lt;a href=&#34;https://openpgp.circl.lu/pks/lookup?op=index&amp;amp;search=0x0548A778D21D10AD&#34;&gt;D21D 10AD&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;@quentin:matrix.circl.lu&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;mailto:paul.jung@circl.lu&#34;&gt;Paul Jung&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;3202 40F9 B345 6CE4 616E DC8C F93A 0908 &lt;a href=&#34;https://openpgp.circl.lu/pks/lookup?op=get&amp;amp;search=0x320240f9b3456ce4616edc8cf93a09081a50dc5a&#34;&gt;1A50 DC5A&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;@thanat0s:matrix.circl.lu&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;mailto:sami.mokaddem@circl.lu&#34;&gt;Sami Mokaddem&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;F6D9 8155 94D1 2C13 84B4 4D1F 164C 473F  &lt;a href=&#34;https://openpgp.circl.lu/pks/lookup?op=get&amp;amp;search=0x164C473F627A06FA&#34;&gt;627A 06FA&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;@sami:matrix.circl.lu&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;maito:luciano.righetti@circl.lu&#34;&gt;Luciano Righetti&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;3E2D 042B B38C 5169 34A4  2CDA FB1B AC9A &lt;a href=&#34;https://openpgp.circl.lu/pks/lookup?op=get&amp;amp;search=0x3e2d042bb38c516934a42cdafb1bac9aec8a387b&#34;&gt;EC8A 387B&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;@luciano:matrix.circl.lu&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;mailto:sascha.rommelfangen@circl.lu&#34;&gt;Sascha Rommelfangen&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;85F1 E6D6 7988 03C6 5446  3133 89F7 60A9 &lt;a href=&#34;https://openpgp.circl.lu/pks/lookup?op=index&amp;amp;search=0x85F1E6D6798803C65446313389F760A9A572F306&#34;&gt;A572 F306&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;@rommelfs:matrix.circl.lu&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;mailto:deborah.servili@circl.lu&#34;&gt;Deborah Servili&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;CE50 734F DD43 E982 3864  157D 7E3A 8328 &lt;a href=&#34;https://openpgp.circl.lu/pks/lookup?op=index&amp;amp;search=0xCE50734FDD43E9823864157D7E3A832850D4D7D1&#34;&gt;50D4 D7D1&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;@deb:matrix.circl.lu&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;mailto:christian.studer@circl.lu&#34;&gt;Christian Studer&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;64ED D89D 9F0D 1AC4 309C A94B 6BBE D1B6 &lt;a href=&#34;https://openpgp.circl.lu/pks/lookup?op=index&amp;amp;search=0x64EDD89D9F0D1AC4309CA94B6BBED1B63A6D639F&#34;&gt;3A6D 639F&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;@chris:matrix.circl.lu&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;mailto:aurelien.thirion@circl.lu&#34;&gt;Aurélien Thirion&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;0001 ED96 0248 6C26 D551  8351 1E1B 1F50 &lt;a href=&#34;https://openpgp.circl.lu/pks/lookup?op=get&amp;amp;search=0x1E1B1F50D84613D0&#34;&gt;D846 13D0&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;@aurelien:matrix.circl.lu&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;mailto:gerard.wagener@circl.lu&#34;&gt;Gerard Wagener&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;41EC EDCE 3394 E3CE 3A18  98E3 D0EB 697E &lt;a href=&#34;https://openpgp.circl.lu/pks/lookup?op=index&amp;amp;search=0x41ECEDCE3394E3CE3A1898E3D0EB697ED81F0490&#34;&gt;D81F 0490&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;@gerard:matrix.circl.lu&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;business-and-legal-support-team&#34;&gt;Business and Legal Support Team&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th style=&#34;text-align: left&#34;&gt;Name&lt;/th&gt;
          &lt;th style=&#34;text-align: center&#34;&gt;PGP Fingerprint&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;mailto:rita.bressanutti@lhc.lu&#34;&gt;Rita Bressanutti&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;53FD AEB3 E4AA 286A 819C  9B24 052F FBC7 &lt;a href=&#34;https://openpgp.circl.lu/pks/lookup?op=get&amp;amp;search=0x052FFBC7912A19C9&#34;&gt;912A 19C9&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;mailto:margot.hartman@lhc.lu&#34;&gt;Margot Hartman&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;DACE 9456 1FE5 3164 8805  9812 5EBD 1A69 &lt;a href=&#34;https://openpgp.circl.lu/pks/lookup?op=get&amp;amp;search=0x5EBD1A69EDDB2252&#34;&gt;EDDB 2252&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;mailto:pascal.steichen@lhc.lu&#34;&gt;Pascal Steichen&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;D1DF 00E4 A9BD 1649 8A89 F62F 32C9 485E &lt;a href=&#34;https://openpgp.circl.lu/pks/lookup?op=index&amp;amp;search=0xD1DF00E4A9BD16498A89F62F32C9485E0549E7E1&#34;&gt;0549 E7E1&lt;/a&gt;&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
</content>
  </entry>
  
  <entry>
    <title>Anonymous Incident Report Form</title>
    <link href="https://new.circl.lu/contactform/"/>
    <id>https://new.circl.lu/contactform/</id>
    <updated>0001-01-01T00:00:00Z</updated>
    <summary>&lt;div class=&#34;content&#34;&gt;
    &lt;div class=&#34;article-content&#34;&gt;
        &lt;article&gt;
            &lt;p&gt;This web-enabled form is accessible via TLS/SSL to report computer security incidents, security vulnerabilities or any inquiries related to incident handling.&lt;/p&gt;
            &lt;br /&gt;
            &lt;p&gt;Before submitting an incident, you should read the &lt;a href=&#34;/report/#guideline-for-incident-reporting&#34;&gt;guideline for incident reporting&lt;/a&gt;.&lt;/p&gt;
            &lt;br /&gt;
            &lt;p&gt;If the incident includes phishing or similar attacks relying on email, we advice to include full headers of the email as described in &lt;a href=&#34;/pub/tr-07/&#34;&gt;TR-07 - HOWTO find SMTP headers in common Email clients&lt;/a&gt;.&lt;/p&gt;
            &lt;br /&gt;
            &lt;p&gt;Please mention any contact information in your message if you wish to be contacted. If you wish to remain anonymous, don&#39;t put any personally identifiable information.&lt;/p&gt;</summary>
    <content type="html">
&lt;div class=&#34;content&#34;&gt;
    &lt;div class=&#34;article-content&#34;&gt;
        &lt;article&gt;
            &lt;p&gt;This web-enabled form is accessible via TLS/SSL to report computer security incidents, security vulnerabilities or any inquiries related to incident handling.&lt;/p&gt;
            &lt;br /&gt;
            &lt;p&gt;Before submitting an incident, you should read the &lt;a href=&#34;/report/#guideline-for-incident-reporting&#34;&gt;guideline for incident reporting&lt;/a&gt;.&lt;/p&gt;
            &lt;br /&gt;
            &lt;p&gt;If the incident includes phishing or similar attacks relying on email, we advice to include full headers of the email as described in &lt;a href=&#34;/pub/tr-07/&#34;&gt;TR-07 - HOWTO find SMTP headers in common Email clients&lt;/a&gt;.&lt;/p&gt;
            &lt;br /&gt;
            &lt;p&gt;Please mention any contact information in your message if you wish to be contacted. If you wish to remain anonymous, don&#39;t put any personally identifiable information.&lt;/p&gt;
            &lt;br /&gt;
            &lt;form method=&#34;post&#34; action=&#34;/assets/files/verify.php&#34;&gt;
                &lt;table&gt;
                    &lt;tr&gt;
                        &lt;td&gt;
                            &lt;textarea name=&#34;text&#34; rows=16 cols=80&gt;Details of the reported incident. Please be specific about time and time-zone.&lt;/textarea&gt;
                        &lt;/td&gt;
                    &lt;/tr&gt;
                    &lt;tr&gt;&lt;td&gt;&lt;input type=&#34;submit&#34; value=&#34;Send Message&#34; /&gt;&lt;/td&gt;&lt;/tr&gt;
                &lt;/table&gt;
            &lt;/form&gt;
        &lt;/article&gt;
    &lt;/div&gt;
&lt;/div&gt;

</content>
  </entry>
  
  <entry>
    <title>Botfree.lu - Luxembourg anti-botnet support - ACDC Luxembourg support center</title>
    <link href="https://new.circl.lu/botfree/"/>
    <id>https://new.circl.lu/botfree/</id>
    <updated>0001-01-01T00:00:00Z</updated>
    <summary>&lt;h2 id=&#34;botfreelu---luxembourg-anti-botnet-support---acdc-luxembourg-support-center&#34;&gt;Botfree.lu - Luxembourg anti-botnet support - ACDC Luxembourg support center&lt;/h2&gt;
&lt;p&gt;Infected systems are often part of a botnet which can be controlled remotely by attackers to perform criminal activities like attacking other computers, sending malicious emails or performing denial-of-service attack.&lt;/p&gt;
&lt;h2 id=&#34;my-pc-is-infected-and-i-am-looking-for-support&#34;&gt;My PC is infected and I am looking for support&lt;/h2&gt;
&lt;p&gt;If you have a strong suspicion that your machine is infected and you are looking for support to re-install the system, you can check the &lt;a href=&#34;https://cybersecurity.lu/ecosystem?tab=private-sector&amp;amp;pcdoctor_only=true&#34;&gt;PC-doctor list&lt;/a&gt; to find an SME to support you.&lt;/p&gt;</summary>
    <content type="html">&lt;h2 id=&#34;botfreelu---luxembourg-anti-botnet-support---acdc-luxembourg-support-center&#34;&gt;Botfree.lu - Luxembourg anti-botnet support - ACDC Luxembourg support center&lt;/h2&gt;
&lt;p&gt;Infected systems are often part of a botnet which can be controlled remotely by attackers to perform criminal activities like attacking other computers, sending malicious emails or performing denial-of-service attack.&lt;/p&gt;
&lt;h2 id=&#34;my-pc-is-infected-and-i-am-looking-for-support&#34;&gt;My PC is infected and I am looking for support&lt;/h2&gt;
&lt;p&gt;If you have a strong suspicion that your machine is infected and you are looking for support to re-install the system, you can check the &lt;a href=&#34;https://cybersecurity.lu/ecosystem?tab=private-sector&amp;amp;pcdoctor_only=true&#34;&gt;PC-doctor list&lt;/a&gt; to find an SME to support you.&lt;/p&gt;
&lt;h2 id=&#34;i-received-a-malicious-or-suspicious-link&#34;&gt;I received a malicious or suspicious link&lt;/h2&gt;
&lt;p&gt;Phishing links can tested without risk and reported via the &lt;a href=&#34;/urlabuse/&#34;&gt;CIRCL urlabuse interface&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id=&#34;i-have-a-security-incident-in-my-company&#34;&gt;I have a security incident in my company&lt;/h2&gt;
&lt;p&gt;If you have a security incident in your company, you can report it to &lt;a href=&#34;/report/&#34;&gt;CIRCL&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id=&#34;i-found-illegal-content-on-the-internet-what-should-i-do&#34;&gt;I found illegal content on the Internet, what should I do?&lt;/h2&gt;
&lt;p&gt;The &lt;a href=&#34;https://stopline.bee-secure.lu/index.php?id=1&amp;amp;L=2&#34;&gt;BEE SECURE Stopline&lt;/a&gt; project aims to provide a structure enabling illegal Internet content to be reported anonymously and to deal with these reports in collaboration with the relevant national and international authorities.&lt;/p&gt;
&lt;h2 id=&#34;where-can-i-find-more-documentation-about-security&#34;&gt;Where can I find more documentation about security?&lt;/h2&gt;
&lt;p&gt;You can find additional information about specific topics like &lt;em&gt;account&lt;/em&gt; &lt;em&gt;hijacking&lt;/em&gt; and &lt;em&gt;stolen&lt;/em&gt; &lt;em&gt;mobile&lt;/em&gt; &lt;em&gt;devices&lt;/em&gt; in &lt;a href=&#34;/pub/#the-digital-first-aid-kit&#34;&gt;The Digital First Aid Kit&lt;/a&gt;. You can find additional information on the &lt;a href=&#34;https://www.beesecure.lu/&#34;&gt;BEESECURE&lt;/a&gt; website, &lt;a href=&#34;https://www.nc3.lu&#34;&gt;NC3&lt;/a&gt;  or &lt;a href=&#34;https://lhc.lu/&#34;&gt;LHC&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id=&#34;i-have-a-different-information-security-incident-not-matching-any-of-the-above-categories-whom-can-i-contact&#34;&gt;I have a different information security incident, not matching any of the above categories. Whom can I contact?&lt;/h2&gt;
&lt;p&gt;You can report it to &lt;a href=&#34;/report/&#34;&gt;CIRCL&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id=&#34;about-the-european-advanced-cyber-defense-center-project&#34;&gt;About the European Advanced Cyber Defense Center project&lt;/h2&gt;
&lt;p&gt;Botfree.lu is an initiative from &lt;a href=&#34;/&#34;&gt;CIRCL&lt;/a&gt;, &lt;a href=&#34;https://www.beesecure.lu/&#34;&gt;BEE SECURE&lt;/a&gt; and &lt;a href=&#34;https://lhc.lu&#34;&gt;LHC&lt;/a&gt; gie as a part of the support centers of the &lt;a href=&#34;https://www.acdc-project.eu/&#34;&gt;European Advanced Cyber Defense Center&lt;/a&gt; (ACDC-project) on the basis of the antibotnet activities of the German ISP&amp;rsquo;s association ECO.&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;/assets/images/botfrei/logo-s.png&#34; alt=&#34;AC/DC logo&#34;&gt;&lt;/p&gt;
</content>
  </entry>
  
  <entry>
    <title>CIRCL - Contact</title>
    <link href="https://new.circl.lu/contact/"/>
    <id>https://new.circl.lu/contact/</id>
    <updated>0001-01-01T00:00:00Z</updated>
    <summary>&lt;h2 id=&#34;postal-address&#34;&gt;Postal address&lt;/h2&gt;
&lt;h3 id=&#34;important-an-appointment-is-required-for-every-meeting-in-our-offices&#34;&gt;&lt;strong&gt;Important&lt;/strong&gt;: An appointment is required for every meeting in our offices.&lt;/h3&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;  CIRCL - Computer Incident Response Center Luxembourg
  c/o &amp;#34;Luxembourg House of Cybersecurity&amp;#34; g.i.e.
  122, rue Adolphe Fischer
  L-1521 Luxembourg
  Grand-Duchy of Luxembourg
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;telephone&#34;&gt;Telephone&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;  (+352) 247 88444
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;e-mail-ticketing-system&#34;&gt;E-mail (ticketing system)&lt;/h2&gt;
&lt;p&gt;&lt;a href=&#34;mailto:info@circl.lu&#34;&gt;info@circl.lu&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;GPG fingerprint: CA57 2205 C002 4E06 BA70 BE89 EAAD CFFC &lt;a href=&#34;https://pgp.circl.lu/pks/lookup?op=index&amp;amp;search=0xCA572205C0024E06BA70BE89EAADCFFC22BD4CD5&#34;&gt;22BD 4CD5&lt;/a&gt;&lt;/p&gt;</summary>
    <content type="html">&lt;h2 id=&#34;postal-address&#34;&gt;Postal address&lt;/h2&gt;
&lt;h3 id=&#34;important-an-appointment-is-required-for-every-meeting-in-our-offices&#34;&gt;&lt;strong&gt;Important&lt;/strong&gt;: An appointment is required for every meeting in our offices.&lt;/h3&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;  CIRCL - Computer Incident Response Center Luxembourg
  c/o &amp;#34;Luxembourg House of Cybersecurity&amp;#34; g.i.e.
  122, rue Adolphe Fischer
  L-1521 Luxembourg
  Grand-Duchy of Luxembourg
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;telephone&#34;&gt;Telephone&lt;/h2&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;  (+352) 247 88444
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;e-mail-ticketing-system&#34;&gt;E-mail (ticketing system)&lt;/h2&gt;
&lt;p&gt;&lt;a href=&#34;mailto:info@circl.lu&#34;&gt;info@circl.lu&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;GPG fingerprint: CA57 2205 C002 4E06 BA70 BE89 EAAD CFFC &lt;a href=&#34;https://pgp.circl.lu/pks/lookup?op=index&amp;amp;search=0xCA572205C0024E06BA70BE89EAADCFFC22BD4CD5&#34;&gt;22BD 4CD5&lt;/a&gt;&lt;/p&gt;
</content>
  </entry>
  
  <entry>
    <title>CIRCL Situational Awareness</title>
    <link href="https://new.circl.lu/situational-awareness/"/>
    <id>https://new.circl.lu/situational-awareness/</id>
    <updated>0001-01-01T00:00:00Z</updated>
    <summary>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;In order to protect infrastructure, applying preventive measures, taking appropriate security decisions and/or security measurements are critical aspects.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Are specific threats or risks a reality?&lt;/li&gt;
&lt;li&gt;Based on the security measures, what should an organisation focus on or prioritize on?&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;CIRCLs goal is to gather objective and repeatable metrics to support the decision process in security at large. As CIRCL operates various tools (such as honeypots, black-hole monitoring, information sharing tools or active monitoring tools), we provide an automated overview of the collected information and their potential support to make a decision. This page is automatically updated to provide a basic situational awareness overview based on measured information. Topic will regularly follow new sources of information which can be measured efficiently.&lt;/p&gt;</summary>
    <content type="html">&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;In order to protect infrastructure, applying preventive measures, taking appropriate security decisions and/or security measurements are critical aspects.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Are specific threats or risks a reality?&lt;/li&gt;
&lt;li&gt;Based on the security measures, what should an organisation focus on or prioritize on?&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;CIRCLs goal is to gather objective and repeatable metrics to support the decision process in security at large. As CIRCL operates various tools (such as honeypots, black-hole monitoring, information sharing tools or active monitoring tools), we provide an automated overview of the collected information and their potential support to make a decision. This page is automatically updated to provide a basic situational awareness overview based on measured information. Topic will regularly follow new sources of information which can be measured efficiently.&lt;/p&gt;
&lt;h2 id=&#34;topic-iot-security&#34;&gt;Topic: IoT security&lt;/h2&gt;
&lt;p&gt;IoT security is an often mentioned topic, but it remains very challenging for an organisation to perceive the real risk associated with IoT devices. The metrics below show
the persistence of adversaries against specific vulnerable IoT devices, showing their dedication and regular activities targeting devices.&lt;/p&gt;
&lt;dl&gt;
&lt;dt&gt;Recommendations&lt;/dt&gt;
&lt;dd&gt;Filtering (before connecting) IoT devices is a MUST following the persistence of attackers to reach vulnerable equipments&lt;/dd&gt;
&lt;dd&gt;Reviewing equipments and devices which can be considered as IoT and ensure software updates&lt;/dd&gt;
&lt;/dl&gt;
&lt;h3 id=&#34;observed-abuse-using-udp-packets-with-shell-escaped-payload&#34;&gt;Observed abuse using UDP packets with shell escaped payload&lt;/h3&gt;
&lt;h4 id=&#34;url-lifetime-in-shell-escaped-payload&#34;&gt;URL lifetime in shell escaped payload&lt;/h4&gt;
&lt;p&gt;&lt;a href=&#34;/statjungle/iot-shellescaped/url-lifetime-20170101.png&#34;&gt;&lt;img src=&#34;/statjungle/iot-shellescaped/url-lifetime-20170101.png&#34; alt=&#34;URLs lifetime from injected shell commands in UDP packets&#34;&gt;{:height=&amp;ldquo;80%&amp;rdquo; width=&amp;ldquo;80%&amp;rdquo;}&lt;/a&gt; &lt;a href=&#34;https://www.circl.lu/statjungle/iot-shellescaped/url-lifetime-20170101.pdf&#34;&gt;PDF version&lt;/a&gt;&lt;/p&gt;
&lt;h4 id=&#34;url-activity-in-shell-escaped-payload&#34;&gt;URL activity in shell escaped payload&lt;/h4&gt;
&lt;p&gt;&lt;a href=&#34;/statjungle/iot-shellescaped/url-activity-20170101.png&#34;&gt;&lt;img src=&#34;/statjungle/iot-shellescaped/url-activity-20170101.png&#34; alt=&#34;URLs activity from injected shell commands in UDP packets&#34;&gt;{:height=&amp;ldquo;80%&amp;rdquo; width=&amp;ldquo;80%&amp;rdquo;}&lt;/a&gt; &lt;a href=&#34;https://www.circl.lu/statjungle/iot-shellescaped/url-activity-20170101.pdf&#34;&gt;PDF version&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;topic-human-errors&#34;&gt;Topic: Human errors&lt;/h2&gt;
&lt;p&gt;Human errors are often difficult to measure. In the case of our honeypot network, CIRCL collects misconfigured DNS queries leaking to honeypots. The DNS queries shown a business day pattern which demonstrates the misconfiguration aspect of the DNS in corporate environments.&lt;/p&gt;
&lt;dl&gt;
&lt;dt&gt;Recommendations&lt;/dt&gt;
&lt;dd&gt;Ensure correctness of your DNS configuration&lt;/dd&gt;
&lt;dd&gt;Disable recursive DNS queries for internal systems&lt;/dd&gt;
&lt;/dl&gt;
&lt;h4 id=&#34;dns-queries-a-received-by-honeypot&#34;&gt;DNS queries (A) received by honeypot&lt;/h4&gt;
&lt;p&gt;&lt;a href=&#34;/statjungle/iot-shellescaped/allFields-linechart-20170101.png&#34;&gt;&lt;img src=&#34;/statjungle/iot-shellescaped/allFields-linechart-20170101.png&#34; alt=&#34;DNS queries (A) received by honeypot&#34;&gt;{:height=&amp;ldquo;80%&amp;rdquo; width=&amp;ldquo;80%&amp;rdquo;}&lt;/a&gt; &lt;a href=&#34;https://www.circl.lu/statjungle/iot-shellescaped/allFields-linechart-20170101.pdf&#34;&gt;PDF version&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;classification-of-this-document&#34;&gt;Classification of this document&lt;/h2&gt;
&lt;p&gt;&lt;a href=&#34;/pub/traffic-light-protocol/&#34;&gt;TLP:CLEAR&lt;/a&gt; information may be distributed without restrictions. The document and the Open Data mentioned are licensed under &lt;a href=&#34;https://creativecommons.org/licenses/by/4.0/&#34;&gt;an international CC-BY 4.0&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;The document including graphics and diagrams can be freely reused following the &lt;a href=&#34;https://creativecommons.org/licenses/by/4.0/&#34;&gt;international CC-BY 4.0&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id=&#34;references&#34;&gt;References&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://geer.tinho.net/measuringsecurity.tutorial.pdf&#34;&gt;Measuring Security: a tutorial by Dan Geer&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://github.com/CIRCL/open-data-security&#34;&gt;open-data-security description format&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;revision&#34;&gt;Revision&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Version 1.0 September 13th, 2018 Initial version &lt;a href=&#34;/pub/traffic-light-protocol/&#34;&gt;TLP:CLEAR&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
</content>
  </entry>
  
  <entry>
    <title>Mission Statement</title>
    <link href="https://new.circl.lu/mission/"/>
    <id>https://new.circl.lu/mission/</id>
    <updated>0001-01-01T00:00:00Z</updated>
    <summary>&lt;p&gt;The Computer Incident Response Center Luxembourg (CIRCL) is a government-driven initiative designed to provide a systematic response facility to computer security threats and incidents.&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;/assets/images/circl-logo.png&#34; alt=&#34;CIRCL logo&#34;&gt;&lt;/p&gt;
&lt;p&gt;CIRCL is the CERT for the private sector, communes and non-governmental entities in Luxembourg.&lt;/p&gt;
&lt;p&gt;CIRCL provides a reliable and trusted point of contact for any users, companies and organizations based in Luxembourg, for the handling of attacks and incidents. Its team of experts acts like a fire brigade, with the ability to react promptly and efficiently whenever threats are suspected, detected or incidents occur.&lt;/p&gt;</summary>
    <content type="html">&lt;p&gt;The Computer Incident Response Center Luxembourg (CIRCL) is a government-driven initiative designed to provide a systematic response facility to computer security threats and incidents.&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;/assets/images/circl-logo.png&#34; alt=&#34;CIRCL logo&#34;&gt;&lt;/p&gt;
&lt;p&gt;CIRCL is the CERT for the private sector, communes and non-governmental entities in Luxembourg.&lt;/p&gt;
&lt;p&gt;CIRCL provides a reliable and trusted point of contact for any users, companies and organizations based in Luxembourg, for the handling of attacks and incidents. Its team of experts acts like a fire brigade, with the ability to react promptly and efficiently whenever threats are suspected, detected or incidents occur.&lt;/p&gt;
&lt;p&gt;CIRCL&amp;rsquo;s aim is to gather, review, report and respond to cyber threats in a systematic and prompt manner.&lt;/p&gt;
&lt;p&gt;CIRCL is operated by  &lt;a href=&#34;https://lhc.lu/&#34;&gt;Luxembourg House of Cybersecurity g.i.e&lt;/a&gt;, which is also the host organization for the &lt;a href=&#34;https://nc3.lu/&#34;&gt;NC3 - National Cybersecurity Competence Center&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Our mission is to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;provide&lt;/strong&gt; a systematic response facility to ICT-incidents&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;coordinate&lt;/strong&gt; communication among national and international incident response teams during security emergencies and to help prevent future incidents&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;support&lt;/strong&gt; ICT users in Luxembourg to recover quickly and efficiently from security incidents&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;minimize&lt;/strong&gt; ICT incident-based losses, theft of information and disruption of services at a national level&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;gather&lt;/strong&gt; information related to incident handling and security threats to better prepare future incidents management and provide optimized protection for systems and data&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;provide&lt;/strong&gt; a security related alert and warning system for ICT users in Luxembourg&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;foster&lt;/strong&gt; knowledge and awareness exchange in ICT security&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;rfc2350&#34;&gt;RFC2350&lt;/h2&gt;
&lt;p&gt;For more details, please take a look at our &lt;a href=&#34;./rfc2350/&#34;&gt;RFC2350 document&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id=&#34;accreditations&#34;&gt;Accreditations&lt;/h2&gt;
&lt;p&gt;CIRCL is &lt;a href=&#34;/assets/files/letter-circl-2015.pdf&#34;&gt;the CERT for the private sector, communes and non-governmental entities in Luxembourg&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;CIRCL is an accredited CERT of TF-CSIRT &lt;a href=&#34;https://tf-csirt.org/trusted-introducer/directory/teams/circl/&#34;&gt;Trusted Introducer&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;CIRCL is also a &lt;a href=&#34;https://www.first.org/members/teams/circl&#34;&gt;full member&lt;/a&gt; of &lt;a href=&#34;https://www.first.org/&#34;&gt;FIRST&lt;/a&gt; (Forum of Incident Response and Security Teams).&lt;/p&gt;
&lt;p&gt;CIRCL is RIPE member and LU-CIX member.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://www.ripe.net/&#34;&gt;&lt;img src=&#34;/assets/images/ripe.png&#34; alt=&#34;CIRCL RIPE Member&#34;&gt;&lt;/a&gt;
&lt;a href=&#34;https://www.trusted-introducer.org&#34;&gt;&lt;img src=&#34;/assets/images/ti.png&#34; alt=&#34;TI Accredited&#34;&gt;&lt;/a&gt;
&lt;a href=&#34;https://www.first.org/members/teams/circl&#34;&gt;&lt;img src=&#34;/assets/images/first-member.png&#34; alt=&#34;FIRST Member&#34;&gt;&lt;/a&gt;&lt;/p&gt;
</content>
  </entry>
  
  <entry>
    <title>News</title>
    <link href="https://new.circl.lu/news/"/>
    <id>https://new.circl.lu/news/</id>
    <updated>0001-01-01T00:00:00Z</updated>
    <summary>&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;/pub/press/20240131/&#34;&gt;Cybersecurity Unites Across Borders - FETTA Project Launched to Strengthen EU Cyber Threat Intelligence&lt;/a&gt; - 31st January 2024&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/services/hashlookup/&#34;&gt;CIRCL hash lookup is a public API to lookup hash values against known database of files&lt;/a&gt; new service available - 7th July 2021&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-58/&#34;&gt;TR-58 - CVE-2020-0796 - Critical vulnerability in Microsoft SMBv3 - status and mitigation&lt;/a&gt; published - 11th March 2020&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/services/misp-training-materials/&#34;&gt;MISP training materials updated&lt;/a&gt; to the latest version - 26th September 2019&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/opendata/circl-phishing-dataset-01&#34;&gt;circl-phishing-dataset-01&lt;/a&gt; is a dataset of 400+ pictures of verified or potential phishing websites screenshots. &lt;a href=&#34;/opendata/circl-ail-dataset-01&#34;&gt;circl-ail-dataset-01&lt;/a&gt; is a dataset of 37000+ pictures of dark-web&amp;rsquo;s websites screenshots. - 10th July 2019&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/services/forensic-training-materials/&#34;&gt;Digital Forensic - Training Materials&lt;/a&gt; Updated included new materials for Windows forensic - 23rd May 2019&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/opendata/statistics/&#34;&gt;Operational statistics published&lt;/a&gt; 2014-2018 - 14th January 2019&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-55&#34;&gt;TR-55 - SquashFu - an alternate Open Source Backup solution, resilient to Crypto Ransomware attacks&lt;/a&gt; published (for review) - 12th September 2018&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/opendata/statistics/&#34;&gt;CIRCL operational statistics&lt;/a&gt; published and updated including half of 2018 - 17th August 2018&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-54&#34;&gt;TR-54 - Sextortion scam emails - I know your password&lt;/a&gt; published - 3rd August 2018&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/summer-hackathon/&#34;&gt;Summer hackathon - Open Source Security Hackathon - Improving and integrating CERT/CSIRT tools&lt;/a&gt; is now open for registration - 10th July 2018&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/opendata/statistics/&#34;&gt;CIRCL operational statistics&lt;/a&gt; are now published including open data - 4th January 2018&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-50/&#34;&gt;TR-50 - WPA2 handshake traffic can be manipulated to induce nonce and session key reuse&lt;/a&gt;  published - 16 October 2017&lt;/li&gt;
&lt;li&gt;CIRCL now publishes &lt;a href=&#34;/opendata/statistics/&#34;&gt;operational statistics&lt;/a&gt; along with its &lt;a href=&#34;/opendata/&#34;&gt;opendata&lt;/a&gt; program - 12 October 2017&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-49/&#34;&gt;TR-49 - CVE-2017-7494 - A critical vulnerability in Samba - remote code execution from a writable share&lt;/a&gt; published - 26 May 2017&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-41/&#34;&gt;TR-41 - Updated recommendations because of new critical threat (ransomware &amp;ldquo;WannaCry&amp;rdquo;)&lt;/a&gt; - 13 May 2017&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-38/fr/&#34;&gt;TR-38 - Attaques visant les solutions bancaires d&amp;rsquo;entreprise - Recommandations&lt;/a&gt; updated - 9 May 2017&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-38/&#34;&gt;TR-38 - Attacks targeting enterprise banking solutions - recommendations and remediations&lt;/a&gt; updated - 9 May 2017&lt;/li&gt;
&lt;li&gt;New MISP training in Luxembourg will take place on Mon, March 20, 2017 &lt;a href=&#34;https://www.eventbrite.com/e/misp-training-march-edition-tickets-32112187417&#34;&gt;registration&lt;/a&gt; and Wed, April 5, 2017 in Nantes (France) &lt;a href=&#34;https://www.eventbrite.com/e/misp-training-nantes-edition-tickets-32150880148&#34;&gt;registration&lt;/a&gt; - 27th February 2017&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-47/&#34;&gt;TR-47 -  Recommendations regarding Abuse handling for ISPs and registrars&lt;/a&gt; - 23rd February 2017&lt;/li&gt;
&lt;li&gt;New MISP training in Luxembourg will take place on Tue, February 7, 2017 &lt;a href=&#34;https://www.eventbrite.com/e/misp-training-tickets-30484201066&#34;&gt;registration&lt;/a&gt; - 22nd December 2016&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-46/&#34;&gt;TR-46 - Information Leaks Affecting Luxembourg and Recommendations&lt;/a&gt; - 5th October 2016&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/projects/internships/&#34;&gt;MSc Student Internship Position Published&lt;/a&gt; - 30th September 2016&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/assets/files/massmalware-handling.pdf&#34;&gt;Mass-malware handling in a National CERT @ SCSConference&lt;/a&gt; - 14th September 2016&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/services/misp-financial-sector/&#34;&gt;MISP - Information sharing for the financial sector&lt;/a&gt; - 27th May 2016&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-45&#34;&gt;TR-45 - Data recovery techniques&lt;/a&gt; published - 12th May 2016&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/services/misp-training-materials/&#34;&gt;MISP - Malware Information Sharing Platform &amp;amp; Threat Sharing - Training Materials&lt;/a&gt; released - 24th March 2016&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-44&#34;&gt;TR-44 - Information security - laws and specific rulings in the Grand Duchy of Luxembourg&lt;/a&gt; published - 15th March 2016&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/assets/files/infosharing.pdf&#34;&gt;Information Sharing and Cyber Security - The Benefits of the Malware Information Sharing Platform (MISP)&lt;/a&gt; - 18th February 2016&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/assets/files/circl-training-2016.pdf&#34;&gt;CIRCL training catalogue 2016 published&lt;/a&gt; - 15th February 2016&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/press/20160108/&#34;&gt;MISP training in Luxembourg on March 22, 2016&lt;/a&gt; - 11th January 2016&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-43/&#34;&gt;TR-43 - Installing MPSS 3.6.1 to use a Intel Xeon Phi Coprocessor on Ubuntu Trusty 14.04 LTS&lt;/a&gt; published - 11th January 2016&lt;/li&gt;
&lt;li&gt;New MSc and PhD &lt;a href=&#34;/projects/internships/&#34;&gt;internships&lt;/a&gt; at CIRCL including &lt;a href=&#34;/projects/internships/datamining02/&#34;&gt;AIL and Crawling-Analysis Extensions&lt;/a&gt; - 4th January 2016&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-42/&#34;&gt;TR-42 - CVE-2015-7755 - CVE-2015-7756 - Critical vulnerabilities in Juniper ScreenOS&lt;/a&gt; - 21st December 2015&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-41/fr/&#34;&gt;TR-41 - Crypto Ransomware - Défenses proactives et de réponse sur incident&lt;/a&gt; - 1st December 2015&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-41/&#34;&gt;TR-41 - Crypto Ransomware - Proactive defenses and incident response&lt;/a&gt; - 1st December 2015&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/press/20151002/&#34;&gt;The first international Malware Information &amp;amp; Threat Sharing Platform Summit&lt;/a&gt; - 2nd October 2015&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/press/20150911/&#34;&gt;BGP Ranking used as key evaluation reference in an international academic paper&lt;/a&gt; - 28th September 2015&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-40/&#34;&gt;TR-40 - Allaple worm activity in 2015 and long-term persistence of worm (malware) in Local Area Networks&lt;/a&gt; - Friday 25th September 2015&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/services/passive-ssl/&#34;&gt;Passive SSL - API version 2 available with new functionalities&lt;/a&gt; - Thursday 27th August 2015&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/services/cve-search/&#34;&gt;Various fixes and updated to the CIRCL Common Vulnerabilities and Exposures search API&lt;/a&gt; - Monday 27th July 2015&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/#security-advisories&#34;&gt;4 security advisories published&lt;/a&gt; - Wednesday 1st July 2015&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/press/20150611/&#34;&gt;Meet CIRCL at FIRST Annual Conference in Berlin&lt;/a&gt; - Friday 11th June 2015&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-38/fr/&#34;&gt;TR-38 - Attaques visant les solutions bancaires d&amp;rsquo;entreprise - Recommandations&lt;/a&gt; - Thursday 28th May 2015&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/projects/CIRCLean/&#34;&gt;CIRCLean version 1.3 including critical security fix&lt;/a&gt; - Thursday 28th May 2015&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/press/20150522/&#34;&gt;Phishing-Initiative Luxembourg inauguré pendant l’ICTSpring 2015&lt;/a&gt; - Friday 22nd May 2015&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-38&#34;&gt;TR-38 - Attacks targeting enterprise banking solutions - recommendations and remediations&lt;/a&gt; - Monday 18th May 2015&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-37&#34;&gt;TR-37 - VENOM / CVE-2015-3456 - Critical vulnerability in QEMU Floppy Disk Controller (FDC) emulation&lt;/a&gt; - Thursday 14th May 2015&lt;/li&gt;
&lt;li&gt;Improving WordPress security with &lt;a href=&#34;/pub/tr-36/&#34;&gt;TR-36 Example setup of WordPress with static export&lt;/a&gt; - Tuesday 28th April 2015&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/press/20150326/&#34;&gt;Luxembourg National Anti-Botnet Support Center joins the European Advanced Cyber Defence Centre&lt;/a&gt;  - Thursday 26th March 2015&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://cve.circl.lu/&#34;&gt;cve.circl.lu&lt;/a&gt; new version released with a new &lt;a href=&#34;/services/cve-search/&#34;&gt;public API&lt;/a&gt; - Monday 23rd March 2015&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/projects/CIRCLean/&#34;&gt;CIRCLean 1.2 released - USB key sanitizer&lt;/a&gt; - Tuesday 11th March 2015&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/press/20150305/&#34;&gt;CIRCL releases the source code of its URL Abuse software&lt;/a&gt; - Thursday 5th March 2015&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-33&#34;&gt;TR-33 - Analysis - CTB-Locker / Critroni&lt;/a&gt; - Tuesday 17th February 2015&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-32/&#34;&gt;TR-32 - key-value store and NoSQL security recommendations&lt;/a&gt; - Tuesday 10th February 2015&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/press/20150205/&#34;&gt;A new wave of crypto ransomware targeting Luxembourg&lt;/a&gt; - Thursday 5th February 2015&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-31/&#34;&gt;TR-31 - GHOST / CVE-2015-0235 - glibc vulnerability - gethostbyname&lt;/a&gt; - Thursday 29th January 2015&lt;/li&gt;
&lt;li&gt;CIRCL &lt;a href=&#34;/pub/responsible-vulnerability-disclosure/&#34;&gt;Responsible Vulnerability Disclosure&lt;/a&gt; process is publicly available - Thursday 29th January 2015&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-08/&#34;&gt;TR-08 CIRCL automatic launch object detection for Mac OS X&lt;/a&gt; software updated including the fix for OS X Yosemite - Friday 23rd January 2015&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-30/&#34;&gt;TR-30 - Acquisition Support Tools for Local Incident Response Team (LIRT)&lt;/a&gt; published - Tuesday 20th January 2015&lt;/li&gt;
&lt;li&gt;New &lt;a href=&#34;/services/passive-ssl/&#34;&gt;CIRCL Passive SSL services&lt;/a&gt; available - Friday 9th January 2015&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-29/&#34;&gt;TR-29 - NTP (Network Time Protocol) daemon - ntpd - critical vulnerabilities&lt;/a&gt; published - Monday December 22nd 2014&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/press/20141211/&#34;&gt;The Inception Framework - Cloud-Hosted Targeted Malware Framework&lt;/a&gt; - Monday December 15th 2014&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/press/20141126/&#34;&gt;Hack.lu - 10 years of success and 2015 edition announced&lt;/a&gt; - Thursday November 27th 2014&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/assets/files/InternetRanking.pdf&#34;&gt;Sharing Threat Indicators and Security Ranking, an opportunity for the Internet Community&lt;/a&gt; - Tuesday November 18th 2014&lt;/li&gt;
&lt;li&gt;Two new Python libraries published to access CIRCL services: &lt;a href=&#34;/assets/files/PyMISP.pdf&#34;&gt;PyMISP&lt;/a&gt; and &lt;a href=&#34;/services/passive-dns/#python-library-to-access-the-circl-passive-dns-api&#34;&gt;Passive DNS Python Library&lt;/a&gt; - Monday November 10th 2014&lt;/li&gt;
&lt;li&gt;A new version of &lt;a href=&#34;/projects/CIRCLean/&#34;&gt;CIRCLean&lt;/a&gt;, the USB key sanitizer including major bug fixes - Tuesday October 28th 2014&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-28/&#34;&gt;TR-28 - SSLv3 vulnerability and how to disable SSLv3 - CVE-2014-3566&lt;/a&gt; - Wednesday October 15th 2014&lt;/li&gt;
&lt;li&gt;A new version of &lt;a href=&#34;/projects/CIRCLean/&#34;&gt;CIRCLean&lt;/a&gt;, the USB key sanitizer, released including NTFS support and security fixes - Tuesday October 1st 2014&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-27/&#34;&gt;TR-27 - GNU Bash Critical Vulnerability - CVE-2014-6271 - CVE-2014-7169&lt;/a&gt; published - Wednesday September 24th 2014&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/press/20140914/&#34;&gt;CIRCL warns about spear phishing scams targeting corporate executives and their accounting department&lt;/a&gt; - Monday September 15th 2014&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/projects/internships/&#34;&gt;New scholarships and internships positions&lt;/a&gt; at CIRCL published - Thursday August 28th 2014&lt;/li&gt;
&lt;li&gt;First version of &lt;a href=&#34;https://github.com/ail-project/ail-framework&#34;&gt;Analysis Information Leak framework&lt;/a&gt; released - Wednesday August 7th 2014&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-25/&#34;&gt;TR-25 - Analysis of Turla/Pfinet/Snake/Uroburos/Pfinet&lt;/a&gt; published - Thursday July 10th 2014&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-14/&#34;&gt;TR-14 - Analysis of a stage 3 Miniduke malware sample&lt;/a&gt; updated to include the loader diagram due to the F-Secure report &lt;a href=&#34;https://www.f-secure.com/weblog/archives/00002723.html&#34;&gt;CosmicDuke: Cosmu With a Twist of MiniDuke&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/press/CIRCLean-invitation/&#34;&gt;Workshop Invitation: Discover the CIRCLean – a USB key sanitizer to avoid malware infections - Tuesday July 8th 2014 (4
PM-6PM) at the Technoport Belval&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/services/cve-search/&#34;&gt;Data Feeds of Common Vulnerabilities and Exposures (CVE) with Luxembourgian Ranking&lt;/a&gt; - Thu June 19 2014&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/press/20140606/&#34;&gt;CIRCL becomes member of the international Forum of Incident Response and Security Teams&lt;/a&gt; (FIRST) and will be at the &lt;a href=&#34;https://www.first.org/conference/2014&#34;&gt;FIRST annual conference in Boston&lt;/a&gt; - Mon June 16 2014&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-22&#34;&gt;TR-22 Recommendations for Readiness to Handle Computer Security Incidents&lt;/a&gt; includes a set of practical recommendations on how to gather technical evidences (memory, filesystem or network) - Fri June 6 2014&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-24/&#34;&gt;TR-24 Analysis - Destory RAT family&lt;/a&gt; published including a comparison with all known malware family members (PlugX, Gulpix, Korplug, Destory, Thoper, Sogu, TVT) - Tue June 3 2014&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/services/misp-malware-information-sharing-platform/&#34;&gt;Malware Information Sharing Platform (MISP)&lt;/a&gt; - Thu May 22 2014&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/projects/CIRCLean/&#34;&gt;A new version of CIRCLean USB key sanitizer released. A hardware device to clean documents from untrusted USB sticks&lt;/a&gt; - Wed May 21 2014&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/assets/files/raphael-vinot-circl-DBIR-paris-20140515.pdf&#34;&gt;Information Sharing Cornerstone in Incident Detection and Handling&lt;/a&gt; at DBIR Paris - Thu May 15 2014&lt;/li&gt;
&lt;li&gt;Presentation about &lt;a href=&#34;https://warsaw2014.honeynet.org/briefings.html#dulaunoy&#34;&gt;Darknet and blackhole monitoring &lt;/a&gt; at Honeynet project in Warsaw &lt;a href=&#34;/assets/files/circl-blackhole-honeynetworkshop2014.pdf&#34;&gt;PDF&lt;/a&gt; - Mon May 12 2014&lt;/li&gt;
&lt;li&gt;CIRCL published &lt;a href=&#34;/pub/tr-23/&#34;&gt;TR-23 Analysis - NetWiredRC malware&lt;/a&gt; - Thu Apr 24 2014&lt;/li&gt;
&lt;li&gt;CIRCL &lt;a href=&#34;/pub/press/20140423/&#34;&gt;takes part&lt;/a&gt; in the 2014 Data Breach Investigation Report  - Wed Apr 23 2014&lt;/li&gt;
&lt;li&gt;Critical vulnerability in OpenSSL 1.0.1 through 1.0.1f (inclusive) or 1.0.2-beta &lt;a href=&#34;/pub/tr-21/&#34;&gt;TLS heartbeat read overrun (CVE-2014-0160)&lt;/a&gt; leaking memory (e.g. secret keys).&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/services/dynamic-malware-analysis/&#34;&gt;Dynamic Malware Analysis Platform&lt;/a&gt; info page published - Mon Apr 7 2014&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/projects/panopticon/&#34;&gt;Panopticon - A System for a Network of Trusted Proxy Servers&lt;/a&gt; project is now open to CERTs and incident handlers - Mon Apr 7 2014&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/services/ip-asn-history/&#34;&gt;IP to ASN Mapping Service with History&lt;/a&gt; is now publicly accessible - Wed Apr 2 2014&lt;/li&gt;
&lt;li&gt;In the light of the data protection day, CIRCL gave a talk &lt;a href=&#34;/assets/files/euparl-circl-march-2014.pdf&#34;&gt;&amp;ldquo;An Overview of Security Incidents Targeting Citizen How the Attackers Are Deceiving Us?&amp;rdquo;&lt;/a&gt; at the European Parliament - Tue Mar 25 2014&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-20/&#34;&gt;Port evolution: a software to find the shady IP profiles in Netflow&lt;/a&gt; published - Tue Feb 18 2014&lt;/li&gt;
&lt;li&gt;A large scale abuse of CPE equipments from &lt;a href=&#34;https://www.avm.de/en/news/artikel/2014/security_advisory.html&#34;&gt;AVM (FRITZ!Box) vulnerable to a remote authentication bypass was disclosed&lt;/a&gt; on February 2014. The &lt;a href=&#34;/pub/tr-18/&#34;&gt;&amp;ldquo;Control Management Interface&amp;rdquo; recommendation described in CIRCL technical report TR-18&lt;/a&gt; would have limited the impact of this attack.&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/assets/files/tfcsirt-zurich-passivedns-circl.pdf&#34;&gt;Passive DNS - Common Output Format&lt;/a&gt; presentation given at the &lt;a href=&#34;https://www.terena.org/activities/tf-csirt/meeting41/schedule2.html&#34;&gt;TF-CSIRT&lt;/a&gt; conference in Zurich - Thu Feb 13 2014&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/assets/files/circl-training-2014.pdf&#34;&gt;CIRCL Training And Technical Courses Catalogue 2014&lt;/a&gt; published - Wed Jan 29 2014&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-19/&#34;&gt;UDP Protocols Security - Recommendations To Avoid or Limit DDoS amplification&lt;/a&gt; - Thu Jan 23 2014&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-12/&#34;&gt;Analysis of a PlugX malware variant updated with a loader to ease analysis&lt;/a&gt; - Fri Jan 17 2014&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-18/&#34;&gt;PBX and VoIP Security - Recommendations&lt;/a&gt; published - Mon Dec 16 2013&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/projects/internships/&#34;&gt;Open internship positions in 2014&lt;/a&gt; published - Mon Dec 16 2013&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-17/&#34;&gt;Java.Tomdep (Apache Tomcat Malware) - Information, Detection and Recommendation&lt;/a&gt; published - Fri Nov 22 2013&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/projects/CIRCLean&#34;&gt;CIRCLean (USB cleaner) new version of the image&lt;/a&gt; released - Thu Oct 17 2013&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-16/&#34;&gt;HoneyBot Services - Client Data Collection&lt;/a&gt; - Mon Oct 14 2013&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-15/&#34;&gt;Hand of Thief/Hanthie Linux Malware - Detection and Remediation&lt;/a&gt; published - Wed Aug 28 2013&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/assets/files/CIRCL-MISP.pdf&#34;&gt;Malware Information Sharing Platform or How to Share Efficiently IOCs Within a Country&lt;/a&gt; - Fri Jul 26 2013&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/projects/CIRCLean&#34;&gt;CIRCLean a hardware and software solution to clean malicious documents from unknown USB drives&lt;/a&gt; released (BETA) - Fri Jul 26 2013&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-14&#34;&gt;Malware analysis report of a stage 3 Miniduke malware sample&lt;/a&gt; publicly published - Thu May 30 2013&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-13&#34;&gt;Malware analysis report of a Backdoor.Snifula variant&lt;/a&gt; publicly published - Wed May 29 2013&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://map.circl.lu/&#34;&gt;A real-time map of the attacks targeting Luxembourg&lt;/a&gt; is now published - Tue Apr 23 2013&lt;/li&gt;
&lt;li&gt;Updated version of &lt;a href=&#34;/pub/tr-08/&#34;&gt;CIRCL automatic launch object detection for Mac OS X&lt;/a&gt; released - Wed Apr 10 2013&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-12&#34;&gt;Analysis of a PlugX malware variant used for targeted attacks&lt;/a&gt; - Fri Mar 29 2013&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-11&#34;&gt;Security Flaws in Universal Plug and Play (UPnP)&lt;/a&gt; - Disable UPnP - Wed Jan 30 2013&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/assets/files/tf-csirt-first2013-circl-restena-blackhole.pdf&#34;&gt;Another Perspective to IP-Darkspace Analysis&lt;/a&gt; - presented at TF-CSIRT/FIRST 2013 - Tue Jan 29 2013&lt;/li&gt;
&lt;li&gt;How to detect &lt;a href=&#34;/pub/tr-10&#34;&gt;Red October / Sputnik malware&lt;/a&gt; published -  Wed Jan 16 2013&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-09&#34;&gt;Malware/Ransomware Discovery and potential Removal (Windows 7)&lt;/a&gt; published - Thu Nov 02 2012&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/assets/files/CIRCL-trendreport-2011.pdf&#34;&gt;CIRCL Q4 2010-2011 trend report&lt;/a&gt; released - Wed Aug 29 2012&lt;/li&gt;
&lt;li&gt;Updated version of &lt;a href=&#34;/pub/tr-08/&#34;&gt;CIRCL automatic launch object detection for Mac OS X&lt;/a&gt; released - Fri Apr 27 2012&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-08/&#34;&gt;CIRCL automatic launch object detection for Mac OS X&lt;/a&gt; released - Fri Apr 20 2012&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/report/#guideline-for-incident-reporting&#34;&gt;incident handling guidelines&lt;/a&gt; added -  Tue Mar 20 2012&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.dns-ok.lu/&#34;&gt;dns-ok.lu&lt;/a&gt; to check if you are infected with the DNS Changer malware - Wed Feb 29 2012&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-06/&#34;&gt;TR-06 - DigiNotar incident and general SSL/TLS security consequences&lt;/a&gt; - Wed Sep 7 2011&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-05/&#34;&gt;SSL/TLS Security of Servers in Luxembourg&lt;/a&gt; - Mon Aug 22 2011&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/circl_lu&#34;&gt;CIRCL is on Twitter&lt;/a&gt; - Fri May 13 2011&lt;/li&gt;
&lt;li&gt;CIRCL technical report about the security of iOS based devices: &lt;a href=&#34;/assets/files/CIRCL-TR_2011-01_iOS.pdf&#34;&gt;CIRCL-TR_2011-01_iOSi&lt;/a&gt; - Tue Feb 8 2011&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;press-release&#34;&gt;&lt;a href=&#34;/pub/press/&#34;&gt;Press release&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;All of the press content release by CIRCL.&lt;/p&gt;</summary>
    <content type="html">&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;/pub/press/20240131/&#34;&gt;Cybersecurity Unites Across Borders - FETTA Project Launched to Strengthen EU Cyber Threat Intelligence&lt;/a&gt; - 31st January 2024&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/services/hashlookup/&#34;&gt;CIRCL hash lookup is a public API to lookup hash values against known database of files&lt;/a&gt; new service available - 7th July 2021&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-58/&#34;&gt;TR-58 - CVE-2020-0796 - Critical vulnerability in Microsoft SMBv3 - status and mitigation&lt;/a&gt; published - 11th March 2020&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/services/misp-training-materials/&#34;&gt;MISP training materials updated&lt;/a&gt; to the latest version - 26th September 2019&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/opendata/circl-phishing-dataset-01&#34;&gt;circl-phishing-dataset-01&lt;/a&gt; is a dataset of 400+ pictures of verified or potential phishing websites screenshots. &lt;a href=&#34;/opendata/circl-ail-dataset-01&#34;&gt;circl-ail-dataset-01&lt;/a&gt; is a dataset of 37000+ pictures of dark-web&amp;rsquo;s websites screenshots. - 10th July 2019&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/services/forensic-training-materials/&#34;&gt;Digital Forensic - Training Materials&lt;/a&gt; Updated included new materials for Windows forensic - 23rd May 2019&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/opendata/statistics/&#34;&gt;Operational statistics published&lt;/a&gt; 2014-2018 - 14th January 2019&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-55&#34;&gt;TR-55 - SquashFu - an alternate Open Source Backup solution, resilient to Crypto Ransomware attacks&lt;/a&gt; published (for review) - 12th September 2018&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/opendata/statistics/&#34;&gt;CIRCL operational statistics&lt;/a&gt; published and updated including half of 2018 - 17th August 2018&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-54&#34;&gt;TR-54 - Sextortion scam emails - I know your password&lt;/a&gt; published - 3rd August 2018&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/summer-hackathon/&#34;&gt;Summer hackathon - Open Source Security Hackathon - Improving and integrating CERT/CSIRT tools&lt;/a&gt; is now open for registration - 10th July 2018&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/opendata/statistics/&#34;&gt;CIRCL operational statistics&lt;/a&gt; are now published including open data - 4th January 2018&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-50/&#34;&gt;TR-50 - WPA2 handshake traffic can be manipulated to induce nonce and session key reuse&lt;/a&gt;  published - 16 October 2017&lt;/li&gt;
&lt;li&gt;CIRCL now publishes &lt;a href=&#34;/opendata/statistics/&#34;&gt;operational statistics&lt;/a&gt; along with its &lt;a href=&#34;/opendata/&#34;&gt;opendata&lt;/a&gt; program - 12 October 2017&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-49/&#34;&gt;TR-49 - CVE-2017-7494 - A critical vulnerability in Samba - remote code execution from a writable share&lt;/a&gt; published - 26 May 2017&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-41/&#34;&gt;TR-41 - Updated recommendations because of new critical threat (ransomware &amp;ldquo;WannaCry&amp;rdquo;)&lt;/a&gt; - 13 May 2017&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-38/fr/&#34;&gt;TR-38 - Attaques visant les solutions bancaires d&amp;rsquo;entreprise - Recommandations&lt;/a&gt; updated - 9 May 2017&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-38/&#34;&gt;TR-38 - Attacks targeting enterprise banking solutions - recommendations and remediations&lt;/a&gt; updated - 9 May 2017&lt;/li&gt;
&lt;li&gt;New MISP training in Luxembourg will take place on Mon, March 20, 2017 &lt;a href=&#34;https://www.eventbrite.com/e/misp-training-march-edition-tickets-32112187417&#34;&gt;registration&lt;/a&gt; and Wed, April 5, 2017 in Nantes (France) &lt;a href=&#34;https://www.eventbrite.com/e/misp-training-nantes-edition-tickets-32150880148&#34;&gt;registration&lt;/a&gt; - 27th February 2017&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-47/&#34;&gt;TR-47 -  Recommendations regarding Abuse handling for ISPs and registrars&lt;/a&gt; - 23rd February 2017&lt;/li&gt;
&lt;li&gt;New MISP training in Luxembourg will take place on Tue, February 7, 2017 &lt;a href=&#34;https://www.eventbrite.com/e/misp-training-tickets-30484201066&#34;&gt;registration&lt;/a&gt; - 22nd December 2016&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-46/&#34;&gt;TR-46 - Information Leaks Affecting Luxembourg and Recommendations&lt;/a&gt; - 5th October 2016&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/projects/internships/&#34;&gt;MSc Student Internship Position Published&lt;/a&gt; - 30th September 2016&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/assets/files/massmalware-handling.pdf&#34;&gt;Mass-malware handling in a National CERT @ SCSConference&lt;/a&gt; - 14th September 2016&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/services/misp-financial-sector/&#34;&gt;MISP - Information sharing for the financial sector&lt;/a&gt; - 27th May 2016&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-45&#34;&gt;TR-45 - Data recovery techniques&lt;/a&gt; published - 12th May 2016&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/services/misp-training-materials/&#34;&gt;MISP - Malware Information Sharing Platform &amp;amp; Threat Sharing - Training Materials&lt;/a&gt; released - 24th March 2016&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-44&#34;&gt;TR-44 - Information security - laws and specific rulings in the Grand Duchy of Luxembourg&lt;/a&gt; published - 15th March 2016&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/assets/files/infosharing.pdf&#34;&gt;Information Sharing and Cyber Security - The Benefits of the Malware Information Sharing Platform (MISP)&lt;/a&gt; - 18th February 2016&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/assets/files/circl-training-2016.pdf&#34;&gt;CIRCL training catalogue 2016 published&lt;/a&gt; - 15th February 2016&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/press/20160108/&#34;&gt;MISP training in Luxembourg on March 22, 2016&lt;/a&gt; - 11th January 2016&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-43/&#34;&gt;TR-43 - Installing MPSS 3.6.1 to use a Intel Xeon Phi Coprocessor on Ubuntu Trusty 14.04 LTS&lt;/a&gt; published - 11th January 2016&lt;/li&gt;
&lt;li&gt;New MSc and PhD &lt;a href=&#34;/projects/internships/&#34;&gt;internships&lt;/a&gt; at CIRCL including &lt;a href=&#34;/projects/internships/datamining02/&#34;&gt;AIL and Crawling-Analysis Extensions&lt;/a&gt; - 4th January 2016&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-42/&#34;&gt;TR-42 - CVE-2015-7755 - CVE-2015-7756 - Critical vulnerabilities in Juniper ScreenOS&lt;/a&gt; - 21st December 2015&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-41/fr/&#34;&gt;TR-41 - Crypto Ransomware - Défenses proactives et de réponse sur incident&lt;/a&gt; - 1st December 2015&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-41/&#34;&gt;TR-41 - Crypto Ransomware - Proactive defenses and incident response&lt;/a&gt; - 1st December 2015&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/press/20151002/&#34;&gt;The first international Malware Information &amp;amp; Threat Sharing Platform Summit&lt;/a&gt; - 2nd October 2015&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/press/20150911/&#34;&gt;BGP Ranking used as key evaluation reference in an international academic paper&lt;/a&gt; - 28th September 2015&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-40/&#34;&gt;TR-40 - Allaple worm activity in 2015 and long-term persistence of worm (malware) in Local Area Networks&lt;/a&gt; - Friday 25th September 2015&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/services/passive-ssl/&#34;&gt;Passive SSL - API version 2 available with new functionalities&lt;/a&gt; - Thursday 27th August 2015&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/services/cve-search/&#34;&gt;Various fixes and updated to the CIRCL Common Vulnerabilities and Exposures search API&lt;/a&gt; - Monday 27th July 2015&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/#security-advisories&#34;&gt;4 security advisories published&lt;/a&gt; - Wednesday 1st July 2015&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/press/20150611/&#34;&gt;Meet CIRCL at FIRST Annual Conference in Berlin&lt;/a&gt; - Friday 11th June 2015&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-38/fr/&#34;&gt;TR-38 - Attaques visant les solutions bancaires d&amp;rsquo;entreprise - Recommandations&lt;/a&gt; - Thursday 28th May 2015&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/projects/CIRCLean/&#34;&gt;CIRCLean version 1.3 including critical security fix&lt;/a&gt; - Thursday 28th May 2015&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/press/20150522/&#34;&gt;Phishing-Initiative Luxembourg inauguré pendant l’ICTSpring 2015&lt;/a&gt; - Friday 22nd May 2015&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-38&#34;&gt;TR-38 - Attacks targeting enterprise banking solutions - recommendations and remediations&lt;/a&gt; - Monday 18th May 2015&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-37&#34;&gt;TR-37 - VENOM / CVE-2015-3456 - Critical vulnerability in QEMU Floppy Disk Controller (FDC) emulation&lt;/a&gt; - Thursday 14th May 2015&lt;/li&gt;
&lt;li&gt;Improving WordPress security with &lt;a href=&#34;/pub/tr-36/&#34;&gt;TR-36 Example setup of WordPress with static export&lt;/a&gt; - Tuesday 28th April 2015&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/press/20150326/&#34;&gt;Luxembourg National Anti-Botnet Support Center joins the European Advanced Cyber Defence Centre&lt;/a&gt;  - Thursday 26th March 2015&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://cve.circl.lu/&#34;&gt;cve.circl.lu&lt;/a&gt; new version released with a new &lt;a href=&#34;/services/cve-search/&#34;&gt;public API&lt;/a&gt; - Monday 23rd March 2015&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/projects/CIRCLean/&#34;&gt;CIRCLean 1.2 released - USB key sanitizer&lt;/a&gt; - Tuesday 11th March 2015&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/press/20150305/&#34;&gt;CIRCL releases the source code of its URL Abuse software&lt;/a&gt; - Thursday 5th March 2015&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-33&#34;&gt;TR-33 - Analysis - CTB-Locker / Critroni&lt;/a&gt; - Tuesday 17th February 2015&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-32/&#34;&gt;TR-32 - key-value store and NoSQL security recommendations&lt;/a&gt; - Tuesday 10th February 2015&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/press/20150205/&#34;&gt;A new wave of crypto ransomware targeting Luxembourg&lt;/a&gt; - Thursday 5th February 2015&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-31/&#34;&gt;TR-31 - GHOST / CVE-2015-0235 - glibc vulnerability - gethostbyname&lt;/a&gt; - Thursday 29th January 2015&lt;/li&gt;
&lt;li&gt;CIRCL &lt;a href=&#34;/pub/responsible-vulnerability-disclosure/&#34;&gt;Responsible Vulnerability Disclosure&lt;/a&gt; process is publicly available - Thursday 29th January 2015&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-08/&#34;&gt;TR-08 CIRCL automatic launch object detection for Mac OS X&lt;/a&gt; software updated including the fix for OS X Yosemite - Friday 23rd January 2015&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-30/&#34;&gt;TR-30 - Acquisition Support Tools for Local Incident Response Team (LIRT)&lt;/a&gt; published - Tuesday 20th January 2015&lt;/li&gt;
&lt;li&gt;New &lt;a href=&#34;/services/passive-ssl/&#34;&gt;CIRCL Passive SSL services&lt;/a&gt; available - Friday 9th January 2015&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-29/&#34;&gt;TR-29 - NTP (Network Time Protocol) daemon - ntpd - critical vulnerabilities&lt;/a&gt; published - Monday December 22nd 2014&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/press/20141211/&#34;&gt;The Inception Framework - Cloud-Hosted Targeted Malware Framework&lt;/a&gt; - Monday December 15th 2014&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/press/20141126/&#34;&gt;Hack.lu - 10 years of success and 2015 edition announced&lt;/a&gt; - Thursday November 27th 2014&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/assets/files/InternetRanking.pdf&#34;&gt;Sharing Threat Indicators and Security Ranking, an opportunity for the Internet Community&lt;/a&gt; - Tuesday November 18th 2014&lt;/li&gt;
&lt;li&gt;Two new Python libraries published to access CIRCL services: &lt;a href=&#34;/assets/files/PyMISP.pdf&#34;&gt;PyMISP&lt;/a&gt; and &lt;a href=&#34;/services/passive-dns/#python-library-to-access-the-circl-passive-dns-api&#34;&gt;Passive DNS Python Library&lt;/a&gt; - Monday November 10th 2014&lt;/li&gt;
&lt;li&gt;A new version of &lt;a href=&#34;/projects/CIRCLean/&#34;&gt;CIRCLean&lt;/a&gt;, the USB key sanitizer including major bug fixes - Tuesday October 28th 2014&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-28/&#34;&gt;TR-28 - SSLv3 vulnerability and how to disable SSLv3 - CVE-2014-3566&lt;/a&gt; - Wednesday October 15th 2014&lt;/li&gt;
&lt;li&gt;A new version of &lt;a href=&#34;/projects/CIRCLean/&#34;&gt;CIRCLean&lt;/a&gt;, the USB key sanitizer, released including NTFS support and security fixes - Tuesday October 1st 2014&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-27/&#34;&gt;TR-27 - GNU Bash Critical Vulnerability - CVE-2014-6271 - CVE-2014-7169&lt;/a&gt; published - Wednesday September 24th 2014&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/press/20140914/&#34;&gt;CIRCL warns about spear phishing scams targeting corporate executives and their accounting department&lt;/a&gt; - Monday September 15th 2014&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/projects/internships/&#34;&gt;New scholarships and internships positions&lt;/a&gt; at CIRCL published - Thursday August 28th 2014&lt;/li&gt;
&lt;li&gt;First version of &lt;a href=&#34;https://github.com/ail-project/ail-framework&#34;&gt;Analysis Information Leak framework&lt;/a&gt; released - Wednesday August 7th 2014&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-25/&#34;&gt;TR-25 - Analysis of Turla/Pfinet/Snake/Uroburos/Pfinet&lt;/a&gt; published - Thursday July 10th 2014&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-14/&#34;&gt;TR-14 - Analysis of a stage 3 Miniduke malware sample&lt;/a&gt; updated to include the loader diagram due to the F-Secure report &lt;a href=&#34;https://www.f-secure.com/weblog/archives/00002723.html&#34;&gt;CosmicDuke: Cosmu With a Twist of MiniDuke&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/press/CIRCLean-invitation/&#34;&gt;Workshop Invitation: Discover the CIRCLean – a USB key sanitizer to avoid malware infections - Tuesday July 8th 2014 (4
PM-6PM) at the Technoport Belval&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/services/cve-search/&#34;&gt;Data Feeds of Common Vulnerabilities and Exposures (CVE) with Luxembourgian Ranking&lt;/a&gt; - Thu June 19 2014&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/press/20140606/&#34;&gt;CIRCL becomes member of the international Forum of Incident Response and Security Teams&lt;/a&gt; (FIRST) and will be at the &lt;a href=&#34;https://www.first.org/conference/2014&#34;&gt;FIRST annual conference in Boston&lt;/a&gt; - Mon June 16 2014&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-22&#34;&gt;TR-22 Recommendations for Readiness to Handle Computer Security Incidents&lt;/a&gt; includes a set of practical recommendations on how to gather technical evidences (memory, filesystem or network) - Fri June 6 2014&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-24/&#34;&gt;TR-24 Analysis - Destory RAT family&lt;/a&gt; published including a comparison with all known malware family members (PlugX, Gulpix, Korplug, Destory, Thoper, Sogu, TVT) - Tue June 3 2014&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/services/misp-malware-information-sharing-platform/&#34;&gt;Malware Information Sharing Platform (MISP)&lt;/a&gt; - Thu May 22 2014&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/projects/CIRCLean/&#34;&gt;A new version of CIRCLean USB key sanitizer released. A hardware device to clean documents from untrusted USB sticks&lt;/a&gt; - Wed May 21 2014&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/assets/files/raphael-vinot-circl-DBIR-paris-20140515.pdf&#34;&gt;Information Sharing Cornerstone in Incident Detection and Handling&lt;/a&gt; at DBIR Paris - Thu May 15 2014&lt;/li&gt;
&lt;li&gt;Presentation about &lt;a href=&#34;https://warsaw2014.honeynet.org/briefings.html#dulaunoy&#34;&gt;Darknet and blackhole monitoring &lt;/a&gt; at Honeynet project in Warsaw &lt;a href=&#34;/assets/files/circl-blackhole-honeynetworkshop2014.pdf&#34;&gt;PDF&lt;/a&gt; - Mon May 12 2014&lt;/li&gt;
&lt;li&gt;CIRCL published &lt;a href=&#34;/pub/tr-23/&#34;&gt;TR-23 Analysis - NetWiredRC malware&lt;/a&gt; - Thu Apr 24 2014&lt;/li&gt;
&lt;li&gt;CIRCL &lt;a href=&#34;/pub/press/20140423/&#34;&gt;takes part&lt;/a&gt; in the 2014 Data Breach Investigation Report  - Wed Apr 23 2014&lt;/li&gt;
&lt;li&gt;Critical vulnerability in OpenSSL 1.0.1 through 1.0.1f (inclusive) or 1.0.2-beta &lt;a href=&#34;/pub/tr-21/&#34;&gt;TLS heartbeat read overrun (CVE-2014-0160)&lt;/a&gt; leaking memory (e.g. secret keys).&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/services/dynamic-malware-analysis/&#34;&gt;Dynamic Malware Analysis Platform&lt;/a&gt; info page published - Mon Apr 7 2014&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/projects/panopticon/&#34;&gt;Panopticon - A System for a Network of Trusted Proxy Servers&lt;/a&gt; project is now open to CERTs and incident handlers - Mon Apr 7 2014&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/services/ip-asn-history/&#34;&gt;IP to ASN Mapping Service with History&lt;/a&gt; is now publicly accessible - Wed Apr 2 2014&lt;/li&gt;
&lt;li&gt;In the light of the data protection day, CIRCL gave a talk &lt;a href=&#34;/assets/files/euparl-circl-march-2014.pdf&#34;&gt;&amp;ldquo;An Overview of Security Incidents Targeting Citizen How the Attackers Are Deceiving Us?&amp;rdquo;&lt;/a&gt; at the European Parliament - Tue Mar 25 2014&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-20/&#34;&gt;Port evolution: a software to find the shady IP profiles in Netflow&lt;/a&gt; published - Tue Feb 18 2014&lt;/li&gt;
&lt;li&gt;A large scale abuse of CPE equipments from &lt;a href=&#34;https://www.avm.de/en/news/artikel/2014/security_advisory.html&#34;&gt;AVM (FRITZ!Box) vulnerable to a remote authentication bypass was disclosed&lt;/a&gt; on February 2014. The &lt;a href=&#34;/pub/tr-18/&#34;&gt;&amp;ldquo;Control Management Interface&amp;rdquo; recommendation described in CIRCL technical report TR-18&lt;/a&gt; would have limited the impact of this attack.&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/assets/files/tfcsirt-zurich-passivedns-circl.pdf&#34;&gt;Passive DNS - Common Output Format&lt;/a&gt; presentation given at the &lt;a href=&#34;https://www.terena.org/activities/tf-csirt/meeting41/schedule2.html&#34;&gt;TF-CSIRT&lt;/a&gt; conference in Zurich - Thu Feb 13 2014&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/assets/files/circl-training-2014.pdf&#34;&gt;CIRCL Training And Technical Courses Catalogue 2014&lt;/a&gt; published - Wed Jan 29 2014&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-19/&#34;&gt;UDP Protocols Security - Recommendations To Avoid or Limit DDoS amplification&lt;/a&gt; - Thu Jan 23 2014&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-12/&#34;&gt;Analysis of a PlugX malware variant updated with a loader to ease analysis&lt;/a&gt; - Fri Jan 17 2014&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-18/&#34;&gt;PBX and VoIP Security - Recommendations&lt;/a&gt; published - Mon Dec 16 2013&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/projects/internships/&#34;&gt;Open internship positions in 2014&lt;/a&gt; published - Mon Dec 16 2013&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-17/&#34;&gt;Java.Tomdep (Apache Tomcat Malware) - Information, Detection and Recommendation&lt;/a&gt; published - Fri Nov 22 2013&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/projects/CIRCLean&#34;&gt;CIRCLean (USB cleaner) new version of the image&lt;/a&gt; released - Thu Oct 17 2013&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-16/&#34;&gt;HoneyBot Services - Client Data Collection&lt;/a&gt; - Mon Oct 14 2013&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-15/&#34;&gt;Hand of Thief/Hanthie Linux Malware - Detection and Remediation&lt;/a&gt; published - Wed Aug 28 2013&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/assets/files/CIRCL-MISP.pdf&#34;&gt;Malware Information Sharing Platform or How to Share Efficiently IOCs Within a Country&lt;/a&gt; - Fri Jul 26 2013&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/projects/CIRCLean&#34;&gt;CIRCLean a hardware and software solution to clean malicious documents from unknown USB drives&lt;/a&gt; released (BETA) - Fri Jul 26 2013&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-14&#34;&gt;Malware analysis report of a stage 3 Miniduke malware sample&lt;/a&gt; publicly published - Thu May 30 2013&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-13&#34;&gt;Malware analysis report of a Backdoor.Snifula variant&lt;/a&gt; publicly published - Wed May 29 2013&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://map.circl.lu/&#34;&gt;A real-time map of the attacks targeting Luxembourg&lt;/a&gt; is now published - Tue Apr 23 2013&lt;/li&gt;
&lt;li&gt;Updated version of &lt;a href=&#34;/pub/tr-08/&#34;&gt;CIRCL automatic launch object detection for Mac OS X&lt;/a&gt; released - Wed Apr 10 2013&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-12&#34;&gt;Analysis of a PlugX malware variant used for targeted attacks&lt;/a&gt; - Fri Mar 29 2013&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-11&#34;&gt;Security Flaws in Universal Plug and Play (UPnP)&lt;/a&gt; - Disable UPnP - Wed Jan 30 2013&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/assets/files/tf-csirt-first2013-circl-restena-blackhole.pdf&#34;&gt;Another Perspective to IP-Darkspace Analysis&lt;/a&gt; - presented at TF-CSIRT/FIRST 2013 - Tue Jan 29 2013&lt;/li&gt;
&lt;li&gt;How to detect &lt;a href=&#34;/pub/tr-10&#34;&gt;Red October / Sputnik malware&lt;/a&gt; published -  Wed Jan 16 2013&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-09&#34;&gt;Malware/Ransomware Discovery and potential Removal (Windows 7)&lt;/a&gt; published - Thu Nov 02 2012&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/assets/files/CIRCL-trendreport-2011.pdf&#34;&gt;CIRCL Q4 2010-2011 trend report&lt;/a&gt; released - Wed Aug 29 2012&lt;/li&gt;
&lt;li&gt;Updated version of &lt;a href=&#34;/pub/tr-08/&#34;&gt;CIRCL automatic launch object detection for Mac OS X&lt;/a&gt; released - Fri Apr 27 2012&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-08/&#34;&gt;CIRCL automatic launch object detection for Mac OS X&lt;/a&gt; released - Fri Apr 20 2012&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/report/#guideline-for-incident-reporting&#34;&gt;incident handling guidelines&lt;/a&gt; added -  Tue Mar 20 2012&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://www.dns-ok.lu/&#34;&gt;dns-ok.lu&lt;/a&gt; to check if you are infected with the DNS Changer malware - Wed Feb 29 2012&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-06/&#34;&gt;TR-06 - DigiNotar incident and general SSL/TLS security consequences&lt;/a&gt; - Wed Sep 7 2011&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-05/&#34;&gt;SSL/TLS Security of Servers in Luxembourg&lt;/a&gt; - Mon Aug 22 2011&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://twitter.com/circl_lu&#34;&gt;CIRCL is on Twitter&lt;/a&gt; - Fri May 13 2011&lt;/li&gt;
&lt;li&gt;CIRCL technical report about the security of iOS based devices: &lt;a href=&#34;/assets/files/CIRCL-TR_2011-01_iOS.pdf&#34;&gt;CIRCL-TR_2011-01_iOSi&lt;/a&gt; - Tue Feb 8 2011&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;press-release&#34;&gt;&lt;a href=&#34;/pub/press/&#34;&gt;Press release&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;All of the press content release by CIRCL.&lt;/p&gt;
&lt;h2 id=&#34;rss&#34;&gt;RSS&lt;/h2&gt;
&lt;p&gt;CIRCL &lt;a href=&#34;/rss.xml&#34;&gt;RSS Feed&lt;/a&gt;&lt;/p&gt;
</content>
  </entry>
  
  <entry>
    <title>Open Data at CIRCL</title>
    <link href="https://new.circl.lu/opendata/"/>
    <id>https://new.circl.lu/opendata/</id>
    <updated>0001-01-01T00:00:00Z</updated>
    <summary>&lt;h2 id=&#34;open-data-at-circl&#34;&gt;Open Data at CIRCL&lt;/h2&gt;
&lt;p&gt;CIRCL advocates data sharing and knows that sharing Open Data can lead to new research, analyses, software or services that could improve security on the long-term. We also hope that the data shared can be used for any usage including commercial or non-commercial security services within Luxembourg and abroad.&lt;/p&gt;
&lt;h2 id=&#34;open-data-definition&#34;&gt;Open Data Definition&lt;/h2&gt;
&lt;p&gt;“Open data and content can be freely used, modified, and shared by anyone for any purpose” as defined by &lt;a href=&#34;https://opendefinition.org/&#34;&gt;opendefinition.org&lt;/a&gt;.&lt;/p&gt;</summary>
    <content type="html">&lt;h2 id=&#34;open-data-at-circl&#34;&gt;Open Data at CIRCL&lt;/h2&gt;
&lt;p&gt;CIRCL advocates data sharing and knows that sharing Open Data can lead to new research, analyses, software or services that could improve security on the long-term. We also hope that the data shared can be used for any usage including commercial or non-commercial security services within Luxembourg and abroad.&lt;/p&gt;
&lt;h2 id=&#34;open-data-definition&#34;&gt;Open Data Definition&lt;/h2&gt;
&lt;p&gt;“Open data and content can be freely used, modified, and shared by anyone for any purpose” as defined by &lt;a href=&#34;https://opendefinition.org/&#34;&gt;opendefinition.org&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id=&#34;open-data-available-at-circl&#34;&gt;Open Data Available at CIRCL&lt;/h2&gt;
&lt;h3 id=&#34;cve-and-vulnerability-information-daily-json-dump&#34;&gt;CVE and vulnerability information daily JSON dump&lt;/h3&gt;
&lt;p&gt;A daily JSON dump of all the CVE (Common Vulnerabilities and Exposures) along other vulnerability information is published on &lt;a href=&#34;https://vulnerability.circl.lu/&#34;&gt;https://vulnerability.circl.lu/&lt;/a&gt;. There different files dumped by source of vulnerability:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://vulnerability.circl.lu/dumps/&#34;&gt;https://vulnerability.circl.lu/dumps/&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;bgp-ranking-data-dump-per-as-number&#34;&gt;BGP Ranking data dump per AS number&lt;/h3&gt;
&lt;p&gt;&lt;a href=&#34;https://bgpranking-ng.circl.lu/&#34;&gt;BGP Ranking&lt;/a&gt; is a public service developed and operated by CIRCL starting from 2012 until today with the ranking of malicious activities seen per BGP AS number (e.g. ISP, Hosting companies). The historical data can be queried using the following format:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;curl -X POST -d &amp;#39;{&amp;#34;asn&amp;#34;: &amp;#34;5577&amp;#34;, &amp;#34;date&amp;#34;: 2019-11-11}&amp;#39; https://bgpranking-ng.circl.lu/json/asn
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;Note: it is possible to query historical information for the last ~12 months.&lt;/p&gt;
&lt;p&gt;And if you want to see the data on the web interface: &lt;a href=&#34;https://bgpranking-ng.circl.lu/asn?asn=5577&#34;&gt;https://bgpranking-ng.circl.lu/asn?asn=5577&lt;/a&gt;.&lt;/p&gt;
&lt;h3 id=&#34;allaple-malware-infection-statistics-raw-data&#34;&gt;Allaple malware infection statistics (raw data)&lt;/h3&gt;
&lt;p&gt;&lt;a href=&#34;/pub/tr-40/&#34;&gt;Allaple worm&lt;/a&gt; is a malware family still infecting multiple systems on the Internet. The statistics collected from our honeypot are available for the year 2015 at the following location:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;/allaple/&#34;&gt;Raw statistics of infection for Allaple worm&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;classification-datasets&#34;&gt;Classification datasets&lt;/h3&gt;
&lt;p&gt;More information about each dataset is available on their dedicated page.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;./circl-phishing-dataset-01&#34;&gt;circl-phishing-dataset-01&lt;/a&gt; is a dataset of 400+ pictures of verified or potential phishing websites screenshots.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;./circl-ail-dataset-01&#34;&gt;circl-ail-dataset-01&lt;/a&gt; is a dataset of 37000+ pictures of dark-web&amp;rsquo;s websites screenshots. The final dataset will be composed of 37000+ images, the dataset is enlarged as it is classified, with part of 4000 pictures each.&lt;/p&gt;
&lt;h3 id=&#34;papers-about-image-matching&#34;&gt;Papers about Image Matching&lt;/h3&gt;
&lt;p&gt;We proposed in preprint some papers relative to Image Matching. One for the datasets, one for their classification tool, one about a framework to evaluate literature algorithms and one about the developed library which bundles relevant algorithms.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;OpenData publication : &lt;a href=&#34;https://arxiv.org/pdf/1908.02449.pdf&#34;&gt;arxiv.org/1908.02449&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;VisJS-Classificator tool : &lt;a href=&#34;https://arxiv.org/pdf/1908.02941.pdf&#34;&gt;arxiv.org/1908.02941&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Carl-Hauser framework : &lt;a href=&#34;https://arxiv.org/abs/1908.03449&#34;&gt;arxiv.org/1908.03449&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Douglas-Quaid library: &lt;a href=&#34;https://arxiv.org/abs/1908.04014&#34;&gt;arxiv.org/1908.04014&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;circl-operational-statistics&#34;&gt;CIRCL operational statistics&lt;/h2&gt;
&lt;p&gt;&lt;a href=&#34;./statistics/&#34;&gt;The operational statistics&lt;/a&gt; cover the activities related to the incident response activities of CIRCL especially in regards to the reporting (e.g. incident reports, request for analysis or support during computer security incident) and notifications (e.g. take-down notification, notification about vulnerability) from/to third parties.&lt;/p&gt;
&lt;h2 id=&#34;academic-researchers-who-used-our-open-data&#34;&gt;Academic researchers who used our Open Data&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Ralph Holz , Johanna Amann , Olivier Mehani , Matthias Wachs , Mohamed Ali Kaafar. &amp;ldquo;TLS in the wild: an Internet-wide analysis of TLS-based protocols for electronic communication&amp;rdquo;. &lt;a href=&#34;https://arxiv.org/pdf/1511.00341v2&#34;&gt;download&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Konte, Maria, Roberto Perdisci, and Nick Feamster. &amp;ldquo;ASwatch: An AS Reputation System to Expose Bulletproof Hosting ASes.&amp;rdquo; Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication. ACM, 2015. &lt;a href=&#34;https://front.sjtu.edu.cn/~jinyh/gradCourse/Paper/Security,%20Privacy%20and%20Censorship/ASwatch%20An%20AS%20Reputation%20System%20to%20Expose%20Bulletproof%20Hosting%20ASes.pdf&#34;&gt;download&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Wagner, Christoph, et al. &amp;ldquo;ASMATRA: Ranking ASs providing transit service to malware hosters.&amp;rdquo; Integrated Network Management (IM 2013), 2013 IFIP/IEEE International Symposium on. IEEE, 2013. &lt;a href=&#34;https://hal.inria.fr/hal-00846082/document&#34;&gt;download&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Ghafir, Ibrahim, and Václav Přenosil. &amp;ldquo;ADVANCED PERSISTENT THREAT AND SPEAR PHISHING EMAILS.&amp;rdquo; DISTANCE LEARNING, SIMULATION AND COMMUNICATION 2015 (2015): 34. &lt;a href=&#34;https://dlsc.unob.cz/data/Proceedings%20of%20the%20DLSC%202015%20conference.pdf#page=34&#34;&gt;download&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Ghafir, Ibrahim, and Vaclav Prenosil. &amp;ldquo;Malicious File Hash Detection and Drive-by Download Attacks.&amp;rdquo; Proceedings of the Second International Conference on Computer and Communication Technologies. Springer India, 2016. &lt;a href=&#34;https://link.springer.com/chapter/10.1007/978-81-322-2517-1_63&#34;&gt;download&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Vykopal, Jan. Flow-based Brute-force Attack Detection in Large and High-speed Networks. Diss. PhD thesis, Masaryk University, Brno, Czech Republic, 2013. &lt;a href=&#34;https://is.muni.cz/th/98724/fi_d/thesis.pdf&#34;&gt;download&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;If you used our data for your research, feel free to &lt;a href=&#34;/contact/&#34;&gt;contact us&lt;/a&gt; if you want to be listed.&lt;/p&gt;
&lt;h2 id=&#34;classification-of-this-document&#34;&gt;Classification of this document&lt;/h2&gt;
&lt;p&gt;&lt;a href=&#34;/pub/traffic-light-protocol/&#34;&gt;TLP:CLEAR&lt;/a&gt; information may be distributed without restrictions. The document and the Open Data mentioned are licensed under &lt;a href=&#34;https://creativecommons.org/licenses/by/4.0/&#34;&gt;an international CC-BY 4.0&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id=&#34;revision&#34;&gt;Revision&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Version 1.3 October 12th, 2017 Operational Statistics of CIRCL added&lt;/li&gt;
&lt;li&gt;Version 1.2 March 15th, 2016 New academics papers added &lt;a href=&#34;/pub/traffic-light-protocol/&#34;&gt;TLP:CLEAR&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Version 1.1 December 10th, 2015 CVE JSON dump added &lt;a href=&#34;/pub/traffic-light-protocol/&#34;&gt;TLP:CLEAR&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Version 1.0 October 27th, 2015 Initial version &lt;a href=&#34;/pub/traffic-light-protocol/&#34;&gt;TLP:CLEAR&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
</content>
  </entry>
  
  <entry>
    <title>Privacy notice</title>
    <link href="https://new.circl.lu/privacy/"/>
    <id>https://new.circl.lu/privacy/</id>
    <updated>0001-01-01T00:00:00Z</updated>
    <summary>&lt;h1 id=&#34;privacy-notice&#34;&gt;Privacy notice&lt;/h1&gt;
&lt;p&gt;Last update: 20180504 - version 1.0 - This Privacy notice is licensed under a &lt;a href=&#34;https://creativecommons.org/licenses/by/4.0/&#34;&gt;Creative Common Attribution 4.0 International (CC BY 4.0) license&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id=&#34;about-this-privacy-notice&#34;&gt;About this privacy notice&lt;/h2&gt;
&lt;p&gt;Your privacy is very important to us and it is our view that we, CIRCL (hereafter referred to as “we”), have an exemplary role in protecting it. Therefore, this Privacy Notice is created to inform you, the user of our website (hereafter referred to as “you”), about our data processing activities and your rights as a data subject.&lt;/p&gt;</summary>
    <content type="html">&lt;h1 id=&#34;privacy-notice&#34;&gt;Privacy notice&lt;/h1&gt;
&lt;p&gt;Last update: 20180504 - version 1.0 - This Privacy notice is licensed under a &lt;a href=&#34;https://creativecommons.org/licenses/by/4.0/&#34;&gt;Creative Common Attribution 4.0 International (CC BY 4.0) license&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id=&#34;about-this-privacy-notice&#34;&gt;About this privacy notice&lt;/h2&gt;
&lt;p&gt;Your privacy is very important to us and it is our view that we, CIRCL (hereafter referred to as “we”), have an exemplary role in protecting it. Therefore, this Privacy Notice is created to inform you, the user of our website (hereafter referred to as “you”), about our data processing activities and your rights as a data subject.&lt;/p&gt;
&lt;p&gt;We collect and process your personal data in accordance with the applicable data protection legislations such as, but not limited to, Regulation (EU) 2016/679 on the protection of natural persons with regards to the processing of their personal data and the free movement of such data (“GDPR”) and the national law adopting GDPR.&lt;/p&gt;
&lt;p&gt;It may occur that we change or amend our Privacy Notice in order to ensure that its content accurately reflects regulatory developments. Any such modification, if substantial, will be clearly communicated to you, either via the website or via other appropriate means. The latest applicable version will be available on our website.&lt;/p&gt;
&lt;p&gt;This privacy notice tends to avoid legal jargon which is less accessible.&lt;/p&gt;
&lt;p&gt;Should you have any questions or remarks regarding this Privacy Notice, do not hesitate to &lt;a href=&#34;/contact/&#34;&gt;contact us&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id=&#34;processing-of-personal-data&#34;&gt;Processing of personal data&lt;/h2&gt;
&lt;p&gt;By “personal data” we understand any information that can identify you, both directly and indirectly.&lt;/p&gt;
&lt;p&gt;By “processing” we refer to anything we do with such personal data, including collection, recording, organisation, structuring, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, restriction, erasure or destruction.&lt;/p&gt;
&lt;p&gt;By “data controller” we understand the person responsible for the processing of your personal data, this is the entity which determines the means and purpose of the processing activities.
For our &lt;a href=&#34;https://www.circl.lu/&#34;&gt;website&lt;/a&gt; and all related services, the data controller is:&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;CIRCL - Computer Incident Response Center Luxembourg
c/o Luxembourg House of Cybersecurity g.i.e.
122, rue Adolphe Fischer
L-1521 Luxembourg
Grand-Duchy of Luxembourg
Tel: (+352) 247 88444
Email: info@circl.lu
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&#34;what-personal-data-do-we-collect-on-our-website-and-to-which-end&#34;&gt;What personal data do we collect on our website and to which end?&lt;/h2&gt;
&lt;p&gt;We collect and process your personal data in order to offer our services and provide you, the user, with a safe and comfortable experience when visiting our website. The following paragraphs provide a detailed indication of the personal data we collect and for which specified purposes.&lt;/p&gt;
&lt;p&gt;When you are surfing our website, we collect and process web server logs, including IP addresses, user-agents, URLs, date and time logs. We collect those logs for our legitimate interest as these logs enable the technical and functional management of our website. Furthermore, we analyse the data to ensure optimal security of our website.&lt;/p&gt;
&lt;p&gt;When you report an incident via the CIRCL report form, we process the reporter’s contact information and any other details of the reported incident (e.g. phishing email headers). We will use these details, if provided, for further case management and to facilitate our ticket system. In that case, we collect personal data for the public interest, to help our constituency handle security incidents (e.g. help with compromised websites).&lt;/p&gt;
&lt;p&gt;When you use the URL abuse service, we process the source IP address of the submitter and the submitted URL.&lt;/p&gt;
&lt;p&gt;Your public PGP key, should you choose to upload it, is collected and stored on our OpenPGP key server. We use your public PGP key to promote the use of encryption at large, for example in emails and for &lt;a href=&#34;/misp&#34;&gt;the Malware Information Sharing and Threat Intelligence Sharing Platform (MISP)&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;We confirm that we process your personal data in a fair and lawful manner and only for the explicit and legitimate purposes as above-mentioned. At all times, we strive to ensure that your personal data is adequate, relevant and not excessive in relation to the purposes for which they are processed.&lt;/p&gt;
&lt;h2 id=&#34;does-our-website-use-cookies&#34;&gt;Does our website use cookies?&lt;/h2&gt;
&lt;p&gt;No, our website does not use any cookies or analytic components.&lt;/p&gt;
&lt;h2 id=&#34;how-long-do-we-retain-your-personal-data&#34;&gt;How long do we retain your personal data?&lt;/h2&gt;
&lt;p&gt;In no circumstances, we keep your personal data for a longer period than strictly necessary to fulfil the purpose for which it was collected.&lt;/p&gt;
&lt;p&gt;As the retention period is dependent on the purpose for which the personal data were initially collected, the purpose is the criterion that is used to determine the appropriate retention period.&lt;/p&gt;
&lt;p&gt;After expiry of the retention period, we strive to securely erase, destroy or anonymize personal data that is no longer required in relation to the purpose for which they were collected.&lt;/p&gt;
&lt;h2 id=&#34;sharing-personal-data&#34;&gt;Sharing personal data&lt;/h2&gt;
&lt;p&gt;Your personal data is only processed for internal purposes within CIRCL. We formally confirm that we will not sell, rent or otherwise commercially transfer to or share with a third party the personal data we are collected from our website. However we do share the public PGP key you uploaded in the PGP network, so your public key will be publicly available on our network.&lt;/p&gt;
&lt;p&gt;Contact details of the reporter of an incident and all other information related to the incident will not be shared without the reporter’s consent, except if they are required in the scope of a legal investigation. For more information about sharing personal data in the scope of vulnerability disclosure, please refer to &lt;a href=&#34;/pub/responsible-vulnerability-disclosure/&#34;&gt;CIRCL’s responsible vulnerability disclosure statement&lt;/a&gt; and the &lt;a href=&#34;/report/#confidentiality&#34;&gt;“Confidentiality” section of CIRCL’s guide to report and incident&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;CIRCL actively participates to &lt;a href=&#34;/opendata/&#34;&gt;Open Data initiatives&lt;/a&gt; in scope to better understand threats and security at large. Information shared in Open Data are pseudo-anonymized, reduced and aggregated in order to limit risk of potential information leak. Nevertheless, if any potential leak is discovered, please &lt;a href=&#34;/contact/&#34;&gt;contact us&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;As our web server is hosted and managed in Luxembourg, your personal data is in no circumstances transferred to third countries outside the EU.&lt;/p&gt;
&lt;h2 id=&#34;security-of-your-personal-data&#34;&gt;Security of your personal data&lt;/h2&gt;
&lt;p&gt;We are striving to keep your personal data secure. To that end, we have adopted the appropriate legal, organizational and technical precautions to prevent any unauthorised access and use of your personal data. These measures include, but are not limited to the encryption of all traffic between our website and your browser.&lt;/p&gt;
&lt;p&gt;Nevertheless, please note that perfect security is very difficult to reach.&lt;/p&gt;
&lt;p&gt;Is any potential leak that you have discovered, please &lt;a href=&#34;/contact/&#34;&gt;report&lt;/a&gt; it to CIRCL.&lt;/p&gt;
&lt;p&gt;As a matter of transparency and consistency, CIRCL publishes information about leaks discovered in &lt;a href=&#34;/pub/tr-46/&#34;&gt;TR-46 - Information Leaks Affecting Luxembourg and Recommendations&lt;/a&gt; including any potential leak which could target CIRCL as is.&lt;/p&gt;
&lt;h2 id=&#34;your-rights-as-a-data-subject&#34;&gt;Your rights as a data subject&lt;/h2&gt;
&lt;p&gt;At CIRCL we aim to be transparent, not only about how we process personal data about you, but also about your rights that are linked to such processing. Therefore, we want to remind you of the existence of the following rights:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Right to request access to the personal data we hold about you;&lt;/li&gt;
&lt;li&gt;Right to rectification or erasure of such data; and&lt;/li&gt;
&lt;li&gt;Right to obtain restriction of processing or to object to such processing.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;You can exercise these rights by contacting us through &lt;a href=&#34;/contact/&#34;&gt;contact&lt;/a&gt;. In order to avoid unlawful access to your personal data, we will request you to provide a proof of your identity.&lt;/p&gt;
&lt;p&gt;If you have any queries about this Privacy Notice or experiencing any other privacy issue, we are striving to promptly dealing with any privacy-related complaints. If you have a complaint related to the processing of your personal data by CIRCL, including a data breach, please &lt;a href=&#34;/contact/&#34;&gt;contact&lt;/a&gt; us.&lt;/p&gt;
&lt;p&gt;If you have questions regarding the way your request relating to personal data protection has been dealt with, please do not hesitate to &lt;a href=&#34;/contact/&#34;&gt;contact us&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;We are kindly open to work with you on this topic.&lt;/p&gt;
</content>
  </entry>
  
  <entry>
    <title>Projects and Software Developed by CIRCL</title>
    <link href="https://new.circl.lu/projects/"/>
    <id>https://new.circl.lu/projects/</id>
    <updated>0001-01-01T00:00:00Z</updated>
    <summary>&lt;p&gt;CIRCL explores new engineering solutions to improve CSIRT operations and to predict and better react on current and future threats.&lt;/p&gt;
&lt;h2 id=&#34;projects&#34;&gt;Projects&lt;/h2&gt;
&lt;p&gt;CIRCL leads or co-leads various open source projects which include the development, design, support and future of these projects. If you want to partner with us on a specific project, don&amp;rsquo;t hesitate to &lt;a href=&#34;/contact&#34;&gt;contact us&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://www.misp-project.org/&#34;&gt;&lt;img src=&#34;/assets/images/misp-small.png&#34; alt=&#34;MISP&#34;&gt;&lt;/a&gt;
&lt;a href=&#34;https://www.vulnerability-lookup.org/&#34;&gt;&lt;img src=&#34;/assets/images/vl.png&#34; alt=&#34;vulnerability-lookup&#34;&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;other-projects&#34;&gt;Other Projects&lt;/h2&gt;
&lt;h2 id=&#34;early-detection-network&#34;&gt;Early Detection Network&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;&lt;a href=&#34;/pub/tr-16/&#34;&gt;CIRCL HoneyBot services&lt;/a&gt;&lt;/strong&gt; consist of the distributed operation and exploitation of CIRCL HoneyBots. These
services are part of a research project with the aim to improve security on Internet. A CIRCL HoneyBot is a low-interaction honeypot running on an embedded device, that is deployed in the premises of CIRCL partners. The HoneyBot listens to unused IP addresses specified by the partner. The HoneyBot sensor located in an unused network space of the partner (from one
IP address to multiple IP addresses). The unused network space has no production network traffic and the traffic reaching
such network space can be called background noise. This background noise contains malicious opportunistic attacks along with other traffic like backscatter traffic due to DDoS or misconfigurations.&lt;/p&gt;</summary>
    <content type="html">&lt;p&gt;CIRCL explores new engineering solutions to improve CSIRT operations and to predict and better react on current and future threats.&lt;/p&gt;
&lt;h2 id=&#34;projects&#34;&gt;Projects&lt;/h2&gt;
&lt;p&gt;CIRCL leads or co-leads various open source projects which include the development, design, support and future of these projects. If you want to partner with us on a specific project, don&amp;rsquo;t hesitate to &lt;a href=&#34;/contact&#34;&gt;contact us&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://www.misp-project.org/&#34;&gt;&lt;img src=&#34;/assets/images/misp-small.png&#34; alt=&#34;MISP&#34;&gt;&lt;/a&gt;
&lt;a href=&#34;https://www.vulnerability-lookup.org/&#34;&gt;&lt;img src=&#34;/assets/images/vl.png&#34; alt=&#34;vulnerability-lookup&#34;&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;other-projects&#34;&gt;Other Projects&lt;/h2&gt;
&lt;h2 id=&#34;early-detection-network&#34;&gt;Early Detection Network&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;&lt;a href=&#34;/pub/tr-16/&#34;&gt;CIRCL HoneyBot services&lt;/a&gt;&lt;/strong&gt; consist of the distributed operation and exploitation of CIRCL HoneyBots. These
services are part of a research project with the aim to improve security on Internet. A CIRCL HoneyBot is a low-interaction honeypot running on an embedded device, that is deployed in the premises of CIRCL partners. The HoneyBot listens to unused IP addresses specified by the partner. The HoneyBot sensor located in an unused network space of the partner (from one
IP address to multiple IP addresses). The unused network space has no production network traffic and the traffic reaching
such network space can be called background noise. This background noise contains malicious opportunistic attacks along with other traffic like backscatter traffic due to DDoS or misconfigurations.&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;https://github.com/CIRCL/potiron&#34;&gt;potiron&lt;/a&gt; is a front-end software deployed for our partners to access their HoneyBot data. The software is developed and maintained by CIRCL and an access is given to the partners of the &lt;a href=&#34;/pub/tr-16/&#34;&gt;HoneyBot services&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id=&#34;circlean---usb-key-sanitizer&#34;&gt;CIRCLean - USB key sanitizer&lt;/h2&gt;
&lt;p&gt;This project aims to be used by people &lt;em&gt;regularly&lt;/em&gt; receiving USB keys from untrusted
sources. While they don&amp;rsquo;t know if the files are malicious, they are still interested to see the content of the files, without having to open the original and potentially malicious files.&lt;/p&gt;
&lt;p&gt;For more information, &lt;a href=&#34;./CIRCLean/&#34;&gt;CIRCLean, the USB key sanitizer&lt;/a&gt; including software and hardware requirements.&lt;/p&gt;
&lt;h2 id=&#34;panopticon---a-system-for-a-network-of-trusted-proxy-servers&#34;&gt;Panopticon - A System for a Network of Trusted Proxy Servers&lt;/h2&gt;
&lt;p&gt;&lt;a href=&#34;/projects/panopticon/&#34;&gt;Panopticon&lt;/a&gt; is a server application which acts as a stack of proxy servers from which the user can quickly select different exit points (parent proxies). Trusted partners are welcome to use this service as long as they can collaborate by adding a proxy on their side.&lt;/p&gt;
&lt;h2 id=&#34;ail-framework---framework-for-analysis-of-information-leaks&#34;&gt;AIL framework - Framework for Analysis of Information Leaks&lt;/h2&gt;
&lt;p&gt;&lt;a href=&#34;https://github.com/ail-project/ail-framework&#34;&gt;AIL&lt;/a&gt; framework is a modular framework to analyse potential information leak from unstructured data source like pastes from Pastebin or similar services. AIL framework is flexible and can be extended to support other functionalities to mine sensitive information.&lt;/p&gt;
&lt;h2 id=&#34;free-software&#34;&gt;Free Software&lt;/h2&gt;
&lt;p&gt;CIRCL regularly contributes to free software and open source software and with a special interest in software used to improve cybersecurity. Feel free to visit &lt;a href=&#34;https://github.com/CIRCL/&#34;&gt;CIRCL github account&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id=&#34;bgp-ranking&#34;&gt;BGP Ranking&lt;/h2&gt;
&lt;p&gt;&lt;a href=&#34;./bgpranking/&#34;&gt;BGP Ranking&lt;/a&gt; is a free software to calculate the security ranking of Internet Service Provider (ASN).&lt;/p&gt;
&lt;p&gt;CIRCL operates the main public instance of &lt;a href=&#34;https://bgpranking.circl.lu/&#34;&gt;BGP Ranking&lt;/a&gt;. In complement, the &lt;a href=&#34;https://github.com/CIRCL/bgp-ranking&#34;&gt;BGP Ranking software back-end&lt;/a&gt; is available as free software. BGP Ranking API free software are also available like the &lt;a href=&#34;https://github.com/CIRCL/bgpranking-API&#34;&gt;whois-like bgpranking-API&lt;/a&gt;,  &lt;a href=&#34;https://github.com/CIRCL/bgpranking-redis-api&#34;&gt;Python API to access BGP Ranking&lt;/a&gt; - &lt;a href=&#34;https://circl.github.io/bgpranking-redis-api/code/API.html&#34;&gt;doc&lt;/a&gt; or even the &lt;a href=&#34;https://github.com/Rafiot/bgpranking-hilbert&#34;&gt;BGP Ranking visualisation&lt;/a&gt; using Hilbert map.&lt;/p&gt;
&lt;h2 id=&#34;pcapdj&#34;&gt;pcapdj&lt;/h2&gt;
&lt;p&gt;&lt;a href=&#34;https://github.com/CIRCL/pcapdj&#34;&gt;pcapdj&lt;/a&gt; is a pcap file dispatcher for processing very large set of pcap files. A use case with Suricata NIDS is included.&lt;/p&gt;
&lt;h2 id=&#34;urlquery-python-api&#34;&gt;urlquery Python API&lt;/h2&gt;
&lt;p&gt;&lt;a href=&#34;https://github.com/CIRCL/urlquery_python_api&#34;&gt;urlquery_python_api&lt;/a&gt; is a Python API to access &lt;a href=&#34;https://www.urlquery.net/&#34;&gt;urlquery service&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id=&#34;cve-search&#34;&gt;cve-search&lt;/h2&gt;
&lt;p&gt;&lt;a href=&#34;https://github.com/adulau/cve-search&#34;&gt;cve-search&lt;/a&gt; is a free software to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) in a local database for indexing, searching and processing locally vulnerability information.&lt;/p&gt;
&lt;h2 id=&#34;lnf-tools&#34;&gt;lnf-tools&lt;/h2&gt;
&lt;p&gt;&lt;a href=&#34;https://github.com/CIRCL/lnf-tools&#34;&gt;lnf-tools&lt;/a&gt; is a set of Perl, Python libraries and C code to analyze and process large set of Netflow records.&lt;/p&gt;
&lt;h2 id=&#34;virustotal-tools&#34;&gt;VirusTotal-tools&lt;/h2&gt;
&lt;p&gt;&lt;a href=&#34;https://github.com/CIRCL/vt-tools&#34;&gt;vt-tools&lt;/a&gt; set of tools to interact with the services from &lt;a href=&#34;https://www.virustotal.com/&#34;&gt;VirusTotal&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id=&#34;traceroute-circl&#34;&gt;traceroute-circl&lt;/h2&gt;
&lt;p&gt;&lt;a href=&#34;https://github.com/CIRCL/traceroute-circl&#34;&gt;traceroute-circl&lt;/a&gt; is an extended traceroute software to support the activities of
CSIRT operators.&lt;/p&gt;
&lt;p&gt;CSIRT teams often have to handle incidents based on IP addresses received, this is where traceroute-circl tries to improve the tedious task of abuse determination and collection.&lt;/p&gt;
&lt;h2 id=&#34;ip-asn-history&#34;&gt;IP-ASN-history&lt;/h2&gt;
&lt;p&gt;We developed &lt;a href=&#34;/services/ip-asn-history/&#34;&gt;a service&lt;/a&gt;, freely accessible to the whole community, to look up IP addresses announcements in the past. The software back-end of &lt;a href=&#34;https://github.com/CIRCL/IP-ASN-history&#34;&gt;IP-ASN-history is available&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id=&#34;student-jobs-and-internships&#34;&gt;Student jobs and internships&lt;/h2&gt;
&lt;p&gt;In addition to the projects listed here, CIRCL is also offering scholarships/internships for students. Please have a look at the site &lt;a href=&#34;/projects/internships/&#34;&gt;Internships page&lt;/a&gt;.&lt;/p&gt;
</content>
  </entry>
  
  <entry>
    <title>Publications and Presentations</title>
    <link href="https://new.circl.lu/pub/"/>
    <id>https://new.circl.lu/pub/</id>
    <updated>0001-01-01T00:00:00Z</updated>
    <summary>&lt;h2 id=&#34;publications&#34;&gt;Publications&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th style=&#34;text-align: left&#34;&gt;Description&lt;/th&gt;
          &lt;th style=&#34;text-align: center&#34;&gt;Last update&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-98&#34;&gt;TR-98 - Security Advisory Ivanti Endpoint Manager Mobile (EPMM) (CVE-2026-1281 &amp;amp; CVE-2026-1340) - Active Exploitation&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;9 February 2026&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-97&#34;&gt;TR-97 - Supply Chain Compromise Propagating Through the npm Ecosystem (Shai-Hulud)&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;28 November 2025&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-96&#34;&gt;TR-96 - Multiple Vulnerabilities in F5 Devices and Products - Impact and Mitigation&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;15 October 2025&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-95&#34;&gt;TR-95 - Critical vulnerability - Deserialization of untrusted data in on-premises Microsoft SharePoint Server allows an unauthorized attacker to execute code over a network. CVE-2025-53770 - CVE-2025-53771&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;20 July 2025&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-94&#34;&gt;TR-94 - Ongoing Phishing Campaigns Targeting Microsoft 365 Tenants Lacking Multi-Factor Authentication&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;22 May 2025&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-93&#34;&gt;TR-93 - Financial transaction fraud after system compromise via Remote Management and Monitoring tools&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;26 February 2025&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-93/de/&#34;&gt;TR-93 (de) - Finanzbetrug nach Systemkompromittierung über Remote-Management- und Monitoring-Tools&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;26 February 2025&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-93/fr/&#34;&gt;TR-93 (fr) - Fraude financière après compromission du système via des outils de gestion et de surveillance à distance&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;26 February 2025&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-92&#34;&gt;TR-92 - Unused Domain Names and the Risks of Missing DNS SPF Records&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;22 January 2025&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-91&#34;&gt;TR-91 - Vulnerability identified as CVE-2024-0012, affecting Palo Alto Networks PAN-OS software&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;20 December 2024&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-90&#34;&gt;TR-90 - Vulnerability identified as CVE-2023-34990, affecting Fortinet FortiWLM&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;20 December 2024&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-89&#34;&gt;TR-89 - Guidelines for Notifying CSIRT/CERT of Red Teaming and Penetration Testing Exercises&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;12 November 2024&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-88&#34;&gt;TR-88 - Motivation, procedure and rational for leaked credential notifications&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;30 August 2024&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./learning-from-falcon-sensor-outage/&#34;&gt;Learning from the Recent Windows/Falcon Sensor Outage: Causes and Potential Improvement Strategies in Linux Using Open Source Solutions&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;23rd July 2024&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-87&#34;&gt;TR-87 - CrowdStrike Agent causing BSOD loop on Windows - Faulty Update on Falcon Sensor&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;19th July 2024&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-86&#34;&gt;TR-86 - Check Point VPN Information Disclosure (CVE-2024-24919) - Actively Exploited&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;31st May 2024&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-85&#34;&gt;TR-85 - Three vulnerabilities in Cisco ASA software/applicance and FTD software being exploited&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;25th April 2024&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-84&#34;&gt;TR-84 - PAN-OS (Palo Alto Networks) OS Command Injection Vulnerability in GlobalProtect Gateway - CVE-2024-3400&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;12th April 2024&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-83&#34;&gt;TR-83 - Linux Boot Hardening HOWTO&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;3rd April 2024&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-82&#34;&gt;TR-82 - backdoor discovered in xz-utils - CVE-2024-3094&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;30th March 2024&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-81&#34;&gt;TR-81 - Critical FortiOS vulnerabilities in sslvpnd and fgfmd &lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;9 February 2024&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-80&#34;&gt;TR-80 - Targeted SMS and fake phone center call targeting financial/banking services&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;7 February 2024&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-79&#34;&gt;TR-79 - AnyDesk Incident and Potential Associated Supply Chain Attack&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;5 February 2024&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-78&#34;&gt;TR-78 - CVE-2023-46805 (Authentication Bypass) &amp;amp; CVE-2024-21887 (Command Injection) for Ivanti Connect Secure and Ivanti Policy Secure Gateways&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;11 January 2024&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-77&#34;&gt;TR-77 - Spear phishing and voice call scams targeting corporate executives and their accounting department&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;30 August 2023&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-76&#34;&gt;TR-76 - Multiple high severity vulnerabilities in CODESYS V3 SDK could lead to RCE or DoS&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;14 August 2023&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-75&#34;&gt;TR-75 - Unauthenticated remote code execution vulnerability in NetScaler ADC (formerly Citrix ADC) and NetScaler Gateway (formerly Citrix Gateway) - CVE-2023-3519&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;21 July 2023&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-74&#34;&gt;TR-74 - A heap-based buffer overflow vulnerability (CWE-122) in FortiOS - CVE-2023-27997&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;5 July 2023&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-73&#34;&gt;TR-73 - Ransomware FAQ&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;7 March 2023&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-72&#34;&gt;TR-72 - Vulnerable Microsoft Exchange server metrics leading to alarming situation&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;21 February 2023&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-71&#34;&gt;TR-71 - FortiOS - heap-based buffer overflow in sslvpnd (exploited) - FortiOS SSL-VPN - CVE-2022-42475&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;13 December 2022&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-70&#34;&gt;TR-70 - Vulnerabilities in Microsoft Exchange CVE-2022-41040 - CVE-2022-41082&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;30 September 2022&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-69&#34;&gt;TR-69 - How to choose an ICT supplier from a security perspective&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;13 June 2022&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-68&#34;&gt;TR-68 - Best practices in times of tense geopolitical situations&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;28 February 2022&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-67&#34;&gt;TR-67 - local privilege escalation vulnerability in polkit&amp;rsquo;s pkexec utility&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;26 January 2022&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-66&#34;&gt;TR-66 - Webservers with mod_status like debug modules publicly available leak information&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;15 December 2021&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-65&#34;&gt;TR-65 - Vulnerabilities and Exploitation of Log4j (Remote code injection in Log4j)&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;10 December 2021&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-64&#34;&gt;TR-64 - Exploited Exchange Servers - Mails with links to malware from known/valid senders&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;10 November 2021&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-63&#34;&gt;TR-63 - Vulnerabilities and Exploitation of Pulse Connect Secure&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;21 April 2021&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-62&#34;&gt;TR-62 - Leak of Facebook Data from 533 Million Users&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;6 April 2021&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-61&#34;&gt;TR-61 - Critical vulnerabilities in Microsoft Exchange&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;12 March 2021&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-60&#34;&gt;TR-60 - Phishing - Effects and precautions&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;26 June 2020&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-59&#34;&gt;TR-59 - Remote Work - In times of a crisis&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;18 March 2020&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-58&#34;&gt;TR-58 - CVE-2020-0796 - Critical vulnerability in Microsoft SMBv3 - status and mitigation&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;11 March 2020&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-57&#34;&gt;TR-57 - Ransomware - Effects and precautions&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;10 December 2019&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-56&#34;&gt;TR-56 - HTTP Strict Transport Security&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;19 March 2019&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-55&#34;&gt;TR-55 - SquashFu - an alternate Open Source Backup solution, resilient to Crypto Ransomware attacks&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;12 September 2018&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-54&#34;&gt;TR-54 - Sextortion scam emails - I know your password&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;3 August 2018&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-53&#34;&gt;TR-53 - Statement about WHOIS and GDPR&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;12 April 2018&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-52&#34;&gt;TR-52 - Forensic Analysis of an HID Attack&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;5 February 2018&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-51&#34;&gt;TR-51 - How to react to fraudulent acts of third party invoicing or requesting funds without showing any purchase order&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;23 November 2017&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-50&#34;&gt;TR-50 - WPA2 handshake traffic can be manipulated to induce nonce and session key reuse&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;16 October 2017&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-49&#34;&gt;TR-49 - CVE-2017-7494 - A critical vulnerability in Samba - remote code execution from a writable share&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;26 May 2017&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-48&#34;&gt;TR-48 - Cyber-Threats Indicators Sharing, security-related actionable information and future of Personal Data Protection framework in the EU - MISP and GDPR&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;6 March 2017&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-47&#34;&gt;TR-47 - Recommendations regarding Abuse handling for ISPs and registrars&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;23 February 2017&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-46&#34;&gt;TR-46 - Information Leaks Affecting Luxembourg and Recommendations&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;17 February 2017&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-45&#34;&gt;TR-45 - Data recovery techniques&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;12 May 2016&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-44&#34;&gt;TR-44 - Information security - laws and specific rulings in the Grand Duchy of Luxembourg&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;15 March 2016&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-43&#34;&gt;TR-43 - Installing MPSS 3.6.1 to use a Intel Xeon Phi Coprocessor on Ubuntu Trusty 14.04 LTS&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;11 January 2016&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-42/&#34;&gt;TR-42 - CVE-2015-7755 - CVE-2015-7756 - Critical vulnerabilities in Juniper ScreenOS&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;21 December 2015&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-41/de/&#34;&gt;TR-41 (de) - Crypto Ransomware - Vorsichtsmaßnahmen und Verhalten im Infektionsfall&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;19 May 2016&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-41/fr/&#34;&gt;TR-41 (fr) - Crypto Ransomware - Défenses proactives et de réponse sur incident&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;19 May 2016&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-41/&#34;&gt;TR-41 - Crypto Ransomware - Proactive defenses and incident response&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;13 May 2017&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-40/&#34;&gt;TR-40 - Allaple worm activity in 2015 and long-term persistence of worm (malware) in Local Area Networks&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;24 September 2015&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-39&#34;&gt;TR-39 - CIRCL-SOPs Standard Operational Procedures&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;30 July 2015&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-38&#34;&gt;TR-38 - Attacks targeting enterprise banking solutions - recommendations and remediations&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;9 May 2017&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-37&#34;&gt;TR-37 - VENOM / CVE-2015-3456 - Critical vulnerability in QEMU Floppy Disk Controller (FDC) emulation&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;14 May 2015&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-36/&#34;&gt;TR-36 - Example setup of WordPress with static export&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;28 April 2015&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-34&#34;&gt;TR-34 - How to view and extract raw messages in common email clients&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;13 March 2015&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-33&#34;&gt;TR-33 - Analysis - CTB-Locker / Critroni&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;17 February 2015&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-32&#34;&gt;TR-32 - key-value store and NoSQL security recommendations&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;10 February 2015&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-31&#34;&gt;TR-31 - GHOST / CVE-2015-0235 - glibc vulnerability - gethostbyname&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;29 January 2015&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-30&#34;&gt;TR-30 - Acquisition Support Tools for Local Incident Response Teams (LIRT)&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;16 December 2020&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-29&#34;&gt;TR-29 - NTP (Network Time Protocol) daemon - ntpd - critical vulnerabilities&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;2 January 2015&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-28&#34;&gt;TR-28 - The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, are vulnerable to critical padding oracle attack - CVE-2014-3566&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;15 October 2014&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-27&#34;&gt;TR-27 - GNU Bash Critical Vulnerability - CVE-2014-6271 - CVE-2014-7169&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;10 October 2014&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-26&#34;&gt;TR-26 - Security Recommendations for Web Content Management Systems and Web Servers&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;28 April 2015&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-25&#34;&gt;TR-25 - Analysis - Turla/Pfinet/Snake/Uroburos/Pfinet&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;10 July 2014&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-24&#34;&gt;TR-24 - Analysis - Destory RAT family&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;3 June 2014&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-23&#34;&gt;TR-23 - Analysis - NetWiredRC malware&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;26 November 2014&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-22&#34;&gt;TR-22 - Practical Recommendations for Readiness to Handle Computer Security Incidents&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;15 December 2020&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-21&#34;&gt;TR-21 - OpenSSL Heartbeat Critical Vulnerability&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;17 April 2014&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-20/&#34;&gt;TR-20 - Port evolution: a software to find the shady IP profiles in Netflow&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt; 18 February 2014&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/circl-training-2014.pdf&#34;&gt;Training And Technical Courses Catalogue 2014&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt; 29 January 2014&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-19/&#34;&gt;TR-19 - UDP Protocols Security - Recommendations To Avoid or Limit DDoS amplification&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt; 8 July 2015&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-18/&#34;&gt;TR-18 - PBX and VoIP Security - Recommendations&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt; 19 February 2014&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-17/&#34;&gt;TR-17 - Java.Tomdep (Apache Tomcat Malware) - Information, Detection and Recommendation&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt; 22 November 2013&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-16/&#34;&gt;TR-16 - HoneyBot Services - Client Data Collection&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt; 14 October 2013&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-15/&#34;&gt;TR-15 - Hand of Thief/Hanthie Linux Malware - Detection and Remediation&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt; 29 August 2013&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-14/&#34;&gt;TR-14 - Analysis of a stage 3 Miniduke malware sample&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt; 3 July 2014&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-13/&#34;&gt;TR-13 - Malware analysis report of a Backdoor.Snifula variant&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;29 May 2013 &lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-12/&#34;&gt;TR-12 - Analysis of a PlugX malware variant used for targeted attacks&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;17 January 2014&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-11/&#34;&gt;TR-11 - Security Flaws in Universal Plug and Play (UPnP)&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;30 January 2013&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-10/&#34;&gt;TR-10 - Red October / Sputnik malware&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;16 January 2013&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-09/&#34;&gt;TR-09 - Malware Discovery and potential Removal (Windows 7)&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;31 August 2012&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/CIRCL-trendreport-2011.pdf&#34;&gt;CIRCL 2011 trend report&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;29 August 2012&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-08/&#34;&gt;TR-08 - CIRCL automatic launch object detection for Mac OS X&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;23 January 2015&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-07/&#34;&gt;TR-07 - HOWTO find SMTP headers in common Email clients&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;13 March 2015&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-06/&#34;&gt;TR-06 - DigiNotar incident and general SSL/TLS security consequences&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;7 September 2011&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-05/&#34;&gt;TR-05 - SSL/TLS Security of Servers in Luxembourg&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;22 August 2011&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;presentations&#34;&gt;Presentations&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th style=&#34;text-align: left&#34;&gt;Description&lt;/th&gt;
          &lt;th style=&#34;text-align: center&#34;&gt;Last update&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/csirt-tooling-policy.pdf&#34;&gt;CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;8th November 2018&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/20171207-FIRST-OASIS-CTI-Prague.pdf&#34;&gt;Fail frequently to avoid disaster or how to organically build a threat intel sharing standard&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;7th December 2017&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/20171115-LIDS-DDOS-workshop.pdf&#34;&gt;How to better understand DDoS attacks from a post-mortem analysis perspective using backscatter traffic Luxembourg Internet Days 2017&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;15th November 2017&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/20171115-LIDS-DDOS-NorthKorea.pdf&#34;&gt;DDoS and Attribution: Observations of Attacks against North Korea&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;15th November 2017&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/20171024-meetup-datascience.pdf&#34;&gt;IoT dinosaurs - don’t die out&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;24 October 2017&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/tnc17_paper_Fullpaper-IoTBlackholeCW.pdf&#34;&gt;An extended analysis of an IoT malware from a blackhole network&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;1st June 2017&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/files/20170512-Legalink.pdf&#34;&gt;Challenges for law firms: IT security threats and incidents for law firms - practical examples&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;12 May 2017&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/circl-isaca-lux-20170315.pdf&#34;&gt;Honeypots Observations and Their Usefulness&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;15 March 2017&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/hamm-forensic-2016.pdf&#34;&gt;Introduction to Forensic at the #cybersecurity4success conference&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;3 October 2016&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/circl-datamining-incidentresponse.pdf&#34;&gt;Data Mining in Incident Response - Challenges and Opportunities&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;13 May 2016&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/201603owasp_circl.pdf&#34;&gt;Experiences with Paste-Monitoring&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;18 March 2016&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/2016-FIRST-TC-Munich-MISP-Threat-Sharing.pdf&#34;&gt;Four years of practical information sharing MISP - Malware Information Sharing Platform &amp;amp; Threat Sharing&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;25th February 2016&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/2016-FIRST-MISP-taxonomies.pdf&#34;&gt;Information Sharing and Taxonomies Practical Classification of Threat Indicators using MISP&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;26th January 2016&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/circl-eupi-ncsra2015.pdf&#34;&gt;Improving Data Sharing to Increase Security Research Opportunities&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;2nd November 2015&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/brucon2015-cve-search.pdf&#34;&gt;cve-search - a free software to collect, search and analyse common vulnerabilities and exposures in software&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;9th October 2015&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/20150919-DataDestructionDay.pdf&#34;&gt;Protect your data, protect your life. Data Destruction Day&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;22nd September 2015&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/circl-misp-zmq.pdf&#34;&gt;New ZeroMQ functionality in MISP&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;2nd July 2015&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/InternetRanking.pdf&#34;&gt;Sharing Threat Indicators and Security Ranking, an opportunity for the Internet Community&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;18 November 2014&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/ictspring2014-attackers-infosharing.pdf&#34;&gt;Attackers benefit from sharing information. How can you benefit, too?&lt;/a&gt; at ICTSpring&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;4 July 2014&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;http://www.terena.org/publications/tnc2014-proceedings/12-cynthia-wagner-Darkspace.pdf&#34;&gt;The void - An interesting place for network security monitoring&lt;/a&gt; Cynthia Wagner, Marc Stiefer (RESTENA), Alexandre Dulaunoy, Gérard Wagener (CIRCL) at &lt;a href=&#34;http://www.terena.org/publications/tnc2014-proceedings/&#34;&gt;TNC 2014&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;19 May 2014&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/raphael-vinot-circl-DBIR-paris-20140515.pdf&#34;&gt;Information Sharing Cornerstone in Incident Detection and Handling&lt;/a&gt; at DBIR presentation in Paris&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;15 May 2014&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/circl-blackhole-honeynetworkshop2014.pdf&#34;&gt;Darknet and Black Hole Monitoring a Journey into Typographic Errors&lt;/a&gt; at Honeynet Project Workshop in Warsaw&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;12 May 2014&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/euparl-circl-march-2014.pdf&#34;&gt;An Overview of Security Incidents Targeting Citizen How the Attackers Are Deceiving Us?&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;15 March 2014&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/tfcsirt-zurich-passivedns-circl.pdf&#34;&gt;Passive DNS - Common Output Format&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;14 February 2014&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/circl-who-targets-the-journalists.pdf&#34;&gt;Who targets the journalists? and how?  A review of the attack surface in our digital society&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;7 February 2014&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/CIRCL-MISP.pdf&#34;&gt;Malware Information Sharing Platform or How to Share Efficiently IOCs Within a Country&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;26 July 2013&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/bgp-ranking-first2013.pdf&#34;&gt;BGP Ranking Scoring ASNs Based on Their Potential Maliciousness&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;23 June 2013&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/im2013-bgpranking.pdf&#34;&gt;ASMATRA: Ranking ASs Providing Transit Service to Malware Hosters&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;29 May 2013&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/tf-csirt-first2013-circl-restena-blackhole.pdf&#34;&gt;Another Perspective to IP-Darkspace Analysis&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;29 January 2013&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;the-digital-first-aid-kit&#34;&gt;The Digital First Aid Kit&lt;/h2&gt;
&lt;p&gt;The Digital First Aid Kit aims to provide preliminary support for people facing the most common types of digital threats.
The Kit offers a set of self-diagnostic tools for citizen, human rights defenders, bloggers, activists and journalists fac
ing attacks themselves, as well as providing guidelines for digital first responders to assist a person under threat.&lt;/p&gt;</summary>
    <content type="html">&lt;h2 id=&#34;publications&#34;&gt;Publications&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th style=&#34;text-align: left&#34;&gt;Description&lt;/th&gt;
          &lt;th style=&#34;text-align: center&#34;&gt;Last update&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-98&#34;&gt;TR-98 - Security Advisory Ivanti Endpoint Manager Mobile (EPMM) (CVE-2026-1281 &amp;amp; CVE-2026-1340) - Active Exploitation&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;9 February 2026&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-97&#34;&gt;TR-97 - Supply Chain Compromise Propagating Through the npm Ecosystem (Shai-Hulud)&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;28 November 2025&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-96&#34;&gt;TR-96 - Multiple Vulnerabilities in F5 Devices and Products - Impact and Mitigation&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;15 October 2025&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-95&#34;&gt;TR-95 - Critical vulnerability - Deserialization of untrusted data in on-premises Microsoft SharePoint Server allows an unauthorized attacker to execute code over a network. CVE-2025-53770 - CVE-2025-53771&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;20 July 2025&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-94&#34;&gt;TR-94 - Ongoing Phishing Campaigns Targeting Microsoft 365 Tenants Lacking Multi-Factor Authentication&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;22 May 2025&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-93&#34;&gt;TR-93 - Financial transaction fraud after system compromise via Remote Management and Monitoring tools&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;26 February 2025&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-93/de/&#34;&gt;TR-93 (de) - Finanzbetrug nach Systemkompromittierung über Remote-Management- und Monitoring-Tools&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;26 February 2025&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-93/fr/&#34;&gt;TR-93 (fr) - Fraude financière après compromission du système via des outils de gestion et de surveillance à distance&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;26 February 2025&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-92&#34;&gt;TR-92 - Unused Domain Names and the Risks of Missing DNS SPF Records&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;22 January 2025&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-91&#34;&gt;TR-91 - Vulnerability identified as CVE-2024-0012, affecting Palo Alto Networks PAN-OS software&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;20 December 2024&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-90&#34;&gt;TR-90 - Vulnerability identified as CVE-2023-34990, affecting Fortinet FortiWLM&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;20 December 2024&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-89&#34;&gt;TR-89 - Guidelines for Notifying CSIRT/CERT of Red Teaming and Penetration Testing Exercises&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;12 November 2024&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-88&#34;&gt;TR-88 - Motivation, procedure and rational for leaked credential notifications&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;30 August 2024&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./learning-from-falcon-sensor-outage/&#34;&gt;Learning from the Recent Windows/Falcon Sensor Outage: Causes and Potential Improvement Strategies in Linux Using Open Source Solutions&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;23rd July 2024&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-87&#34;&gt;TR-87 - CrowdStrike Agent causing BSOD loop on Windows - Faulty Update on Falcon Sensor&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;19th July 2024&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-86&#34;&gt;TR-86 - Check Point VPN Information Disclosure (CVE-2024-24919) - Actively Exploited&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;31st May 2024&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-85&#34;&gt;TR-85 - Three vulnerabilities in Cisco ASA software/applicance and FTD software being exploited&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;25th April 2024&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-84&#34;&gt;TR-84 - PAN-OS (Palo Alto Networks) OS Command Injection Vulnerability in GlobalProtect Gateway - CVE-2024-3400&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;12th April 2024&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-83&#34;&gt;TR-83 - Linux Boot Hardening HOWTO&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;3rd April 2024&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-82&#34;&gt;TR-82 - backdoor discovered in xz-utils - CVE-2024-3094&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;30th March 2024&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-81&#34;&gt;TR-81 - Critical FortiOS vulnerabilities in sslvpnd and fgfmd &lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;9 February 2024&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-80&#34;&gt;TR-80 - Targeted SMS and fake phone center call targeting financial/banking services&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;7 February 2024&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-79&#34;&gt;TR-79 - AnyDesk Incident and Potential Associated Supply Chain Attack&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;5 February 2024&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-78&#34;&gt;TR-78 - CVE-2023-46805 (Authentication Bypass) &amp;amp; CVE-2024-21887 (Command Injection) for Ivanti Connect Secure and Ivanti Policy Secure Gateways&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;11 January 2024&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-77&#34;&gt;TR-77 - Spear phishing and voice call scams targeting corporate executives and their accounting department&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;30 August 2023&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-76&#34;&gt;TR-76 - Multiple high severity vulnerabilities in CODESYS V3 SDK could lead to RCE or DoS&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;14 August 2023&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-75&#34;&gt;TR-75 - Unauthenticated remote code execution vulnerability in NetScaler ADC (formerly Citrix ADC) and NetScaler Gateway (formerly Citrix Gateway) - CVE-2023-3519&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;21 July 2023&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-74&#34;&gt;TR-74 - A heap-based buffer overflow vulnerability (CWE-122) in FortiOS - CVE-2023-27997&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;5 July 2023&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-73&#34;&gt;TR-73 - Ransomware FAQ&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;7 March 2023&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-72&#34;&gt;TR-72 - Vulnerable Microsoft Exchange server metrics leading to alarming situation&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;21 February 2023&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-71&#34;&gt;TR-71 - FortiOS - heap-based buffer overflow in sslvpnd (exploited) - FortiOS SSL-VPN - CVE-2022-42475&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;13 December 2022&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-70&#34;&gt;TR-70 - Vulnerabilities in Microsoft Exchange CVE-2022-41040 - CVE-2022-41082&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;30 September 2022&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-69&#34;&gt;TR-69 - How to choose an ICT supplier from a security perspective&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;13 June 2022&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-68&#34;&gt;TR-68 - Best practices in times of tense geopolitical situations&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;28 February 2022&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-67&#34;&gt;TR-67 - local privilege escalation vulnerability in polkit&amp;rsquo;s pkexec utility&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;26 January 2022&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-66&#34;&gt;TR-66 - Webservers with mod_status like debug modules publicly available leak information&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;15 December 2021&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-65&#34;&gt;TR-65 - Vulnerabilities and Exploitation of Log4j (Remote code injection in Log4j)&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;10 December 2021&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-64&#34;&gt;TR-64 - Exploited Exchange Servers - Mails with links to malware from known/valid senders&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;10 November 2021&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-63&#34;&gt;TR-63 - Vulnerabilities and Exploitation of Pulse Connect Secure&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;21 April 2021&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-62&#34;&gt;TR-62 - Leak of Facebook Data from 533 Million Users&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;6 April 2021&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-61&#34;&gt;TR-61 - Critical vulnerabilities in Microsoft Exchange&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;12 March 2021&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-60&#34;&gt;TR-60 - Phishing - Effects and precautions&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;26 June 2020&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-59&#34;&gt;TR-59 - Remote Work - In times of a crisis&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;18 March 2020&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-58&#34;&gt;TR-58 - CVE-2020-0796 - Critical vulnerability in Microsoft SMBv3 - status and mitigation&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;11 March 2020&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-57&#34;&gt;TR-57 - Ransomware - Effects and precautions&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;10 December 2019&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-56&#34;&gt;TR-56 - HTTP Strict Transport Security&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;19 March 2019&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-55&#34;&gt;TR-55 - SquashFu - an alternate Open Source Backup solution, resilient to Crypto Ransomware attacks&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;12 September 2018&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-54&#34;&gt;TR-54 - Sextortion scam emails - I know your password&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;3 August 2018&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-53&#34;&gt;TR-53 - Statement about WHOIS and GDPR&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;12 April 2018&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-52&#34;&gt;TR-52 - Forensic Analysis of an HID Attack&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;5 February 2018&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-51&#34;&gt;TR-51 - How to react to fraudulent acts of third party invoicing or requesting funds without showing any purchase order&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;23 November 2017&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-50&#34;&gt;TR-50 - WPA2 handshake traffic can be manipulated to induce nonce and session key reuse&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;16 October 2017&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-49&#34;&gt;TR-49 - CVE-2017-7494 - A critical vulnerability in Samba - remote code execution from a writable share&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;26 May 2017&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-48&#34;&gt;TR-48 - Cyber-Threats Indicators Sharing, security-related actionable information and future of Personal Data Protection framework in the EU - MISP and GDPR&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;6 March 2017&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-47&#34;&gt;TR-47 - Recommendations regarding Abuse handling for ISPs and registrars&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;23 February 2017&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-46&#34;&gt;TR-46 - Information Leaks Affecting Luxembourg and Recommendations&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;17 February 2017&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-45&#34;&gt;TR-45 - Data recovery techniques&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;12 May 2016&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-44&#34;&gt;TR-44 - Information security - laws and specific rulings in the Grand Duchy of Luxembourg&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;15 March 2016&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-43&#34;&gt;TR-43 - Installing MPSS 3.6.1 to use a Intel Xeon Phi Coprocessor on Ubuntu Trusty 14.04 LTS&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;11 January 2016&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-42/&#34;&gt;TR-42 - CVE-2015-7755 - CVE-2015-7756 - Critical vulnerabilities in Juniper ScreenOS&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;21 December 2015&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-41/de/&#34;&gt;TR-41 (de) - Crypto Ransomware - Vorsichtsmaßnahmen und Verhalten im Infektionsfall&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;19 May 2016&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-41/fr/&#34;&gt;TR-41 (fr) - Crypto Ransomware - Défenses proactives et de réponse sur incident&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;19 May 2016&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-41/&#34;&gt;TR-41 - Crypto Ransomware - Proactive defenses and incident response&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;13 May 2017&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-40/&#34;&gt;TR-40 - Allaple worm activity in 2015 and long-term persistence of worm (malware) in Local Area Networks&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;24 September 2015&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-39&#34;&gt;TR-39 - CIRCL-SOPs Standard Operational Procedures&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;30 July 2015&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-38&#34;&gt;TR-38 - Attacks targeting enterprise banking solutions - recommendations and remediations&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;9 May 2017&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-37&#34;&gt;TR-37 - VENOM / CVE-2015-3456 - Critical vulnerability in QEMU Floppy Disk Controller (FDC) emulation&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;14 May 2015&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-36/&#34;&gt;TR-36 - Example setup of WordPress with static export&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;28 April 2015&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-34&#34;&gt;TR-34 - How to view and extract raw messages in common email clients&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;13 March 2015&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-33&#34;&gt;TR-33 - Analysis - CTB-Locker / Critroni&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;17 February 2015&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-32&#34;&gt;TR-32 - key-value store and NoSQL security recommendations&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;10 February 2015&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-31&#34;&gt;TR-31 - GHOST / CVE-2015-0235 - glibc vulnerability - gethostbyname&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;29 January 2015&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-30&#34;&gt;TR-30 - Acquisition Support Tools for Local Incident Response Teams (LIRT)&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;16 December 2020&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-29&#34;&gt;TR-29 - NTP (Network Time Protocol) daemon - ntpd - critical vulnerabilities&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;2 January 2015&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-28&#34;&gt;TR-28 - The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, are vulnerable to critical padding oracle attack - CVE-2014-3566&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;15 October 2014&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-27&#34;&gt;TR-27 - GNU Bash Critical Vulnerability - CVE-2014-6271 - CVE-2014-7169&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;10 October 2014&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-26&#34;&gt;TR-26 - Security Recommendations for Web Content Management Systems and Web Servers&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;28 April 2015&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-25&#34;&gt;TR-25 - Analysis - Turla/Pfinet/Snake/Uroburos/Pfinet&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;10 July 2014&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-24&#34;&gt;TR-24 - Analysis - Destory RAT family&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;3 June 2014&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-23&#34;&gt;TR-23 - Analysis - NetWiredRC malware&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;26 November 2014&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-22&#34;&gt;TR-22 - Practical Recommendations for Readiness to Handle Computer Security Incidents&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;15 December 2020&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-21&#34;&gt;TR-21 - OpenSSL Heartbeat Critical Vulnerability&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;17 April 2014&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-20/&#34;&gt;TR-20 - Port evolution: a software to find the shady IP profiles in Netflow&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt; 18 February 2014&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/circl-training-2014.pdf&#34;&gt;Training And Technical Courses Catalogue 2014&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt; 29 January 2014&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-19/&#34;&gt;TR-19 - UDP Protocols Security - Recommendations To Avoid or Limit DDoS amplification&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt; 8 July 2015&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-18/&#34;&gt;TR-18 - PBX and VoIP Security - Recommendations&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt; 19 February 2014&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-17/&#34;&gt;TR-17 - Java.Tomdep (Apache Tomcat Malware) - Information, Detection and Recommendation&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt; 22 November 2013&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-16/&#34;&gt;TR-16 - HoneyBot Services - Client Data Collection&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt; 14 October 2013&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-15/&#34;&gt;TR-15 - Hand of Thief/Hanthie Linux Malware - Detection and Remediation&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt; 29 August 2013&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-14/&#34;&gt;TR-14 - Analysis of a stage 3 Miniduke malware sample&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt; 3 July 2014&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-13/&#34;&gt;TR-13 - Malware analysis report of a Backdoor.Snifula variant&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;29 May 2013 &lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-12/&#34;&gt;TR-12 - Analysis of a PlugX malware variant used for targeted attacks&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;17 January 2014&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-11/&#34;&gt;TR-11 - Security Flaws in Universal Plug and Play (UPnP)&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;30 January 2013&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-10/&#34;&gt;TR-10 - Red October / Sputnik malware&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;16 January 2013&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-09/&#34;&gt;TR-09 - Malware Discovery and potential Removal (Windows 7)&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;31 August 2012&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/CIRCL-trendreport-2011.pdf&#34;&gt;CIRCL 2011 trend report&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;29 August 2012&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-08/&#34;&gt;TR-08 - CIRCL automatic launch object detection for Mac OS X&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;23 January 2015&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-07/&#34;&gt;TR-07 - HOWTO find SMTP headers in common Email clients&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;13 March 2015&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-06/&#34;&gt;TR-06 - DigiNotar incident and general SSL/TLS security consequences&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;7 September 2011&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;./tr-05/&#34;&gt;TR-05 - SSL/TLS Security of Servers in Luxembourg&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;22 August 2011&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;presentations&#34;&gt;Presentations&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th style=&#34;text-align: left&#34;&gt;Description&lt;/th&gt;
          &lt;th style=&#34;text-align: center&#34;&gt;Last update&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/csirt-tooling-policy.pdf&#34;&gt;CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;8th November 2018&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/20171207-FIRST-OASIS-CTI-Prague.pdf&#34;&gt;Fail frequently to avoid disaster or how to organically build a threat intel sharing standard&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;7th December 2017&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/20171115-LIDS-DDOS-workshop.pdf&#34;&gt;How to better understand DDoS attacks from a post-mortem analysis perspective using backscatter traffic Luxembourg Internet Days 2017&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;15th November 2017&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/20171115-LIDS-DDOS-NorthKorea.pdf&#34;&gt;DDoS and Attribution: Observations of Attacks against North Korea&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;15th November 2017&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/20171024-meetup-datascience.pdf&#34;&gt;IoT dinosaurs - don’t die out&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;24 October 2017&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/tnc17_paper_Fullpaper-IoTBlackholeCW.pdf&#34;&gt;An extended analysis of an IoT malware from a blackhole network&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;1st June 2017&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/files/20170512-Legalink.pdf&#34;&gt;Challenges for law firms: IT security threats and incidents for law firms - practical examples&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;12 May 2017&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/circl-isaca-lux-20170315.pdf&#34;&gt;Honeypots Observations and Their Usefulness&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;15 March 2017&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/hamm-forensic-2016.pdf&#34;&gt;Introduction to Forensic at the #cybersecurity4success conference&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;3 October 2016&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/circl-datamining-incidentresponse.pdf&#34;&gt;Data Mining in Incident Response - Challenges and Opportunities&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;13 May 2016&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/201603owasp_circl.pdf&#34;&gt;Experiences with Paste-Monitoring&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;18 March 2016&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/2016-FIRST-TC-Munich-MISP-Threat-Sharing.pdf&#34;&gt;Four years of practical information sharing MISP - Malware Information Sharing Platform &amp;amp; Threat Sharing&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;25th February 2016&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/2016-FIRST-MISP-taxonomies.pdf&#34;&gt;Information Sharing and Taxonomies Practical Classification of Threat Indicators using MISP&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;26th January 2016&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/circl-eupi-ncsra2015.pdf&#34;&gt;Improving Data Sharing to Increase Security Research Opportunities&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;2nd November 2015&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/brucon2015-cve-search.pdf&#34;&gt;cve-search - a free software to collect, search and analyse common vulnerabilities and exposures in software&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;9th October 2015&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/20150919-DataDestructionDay.pdf&#34;&gt;Protect your data, protect your life. Data Destruction Day&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;22nd September 2015&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/circl-misp-zmq.pdf&#34;&gt;New ZeroMQ functionality in MISP&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;2nd July 2015&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/InternetRanking.pdf&#34;&gt;Sharing Threat Indicators and Security Ranking, an opportunity for the Internet Community&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;18 November 2014&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/ictspring2014-attackers-infosharing.pdf&#34;&gt;Attackers benefit from sharing information. How can you benefit, too?&lt;/a&gt; at ICTSpring&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;4 July 2014&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;http://www.terena.org/publications/tnc2014-proceedings/12-cynthia-wagner-Darkspace.pdf&#34;&gt;The void - An interesting place for network security monitoring&lt;/a&gt; Cynthia Wagner, Marc Stiefer (RESTENA), Alexandre Dulaunoy, Gérard Wagener (CIRCL) at &lt;a href=&#34;http://www.terena.org/publications/tnc2014-proceedings/&#34;&gt;TNC 2014&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;19 May 2014&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/raphael-vinot-circl-DBIR-paris-20140515.pdf&#34;&gt;Information Sharing Cornerstone in Incident Detection and Handling&lt;/a&gt; at DBIR presentation in Paris&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;15 May 2014&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/circl-blackhole-honeynetworkshop2014.pdf&#34;&gt;Darknet and Black Hole Monitoring a Journey into Typographic Errors&lt;/a&gt; at Honeynet Project Workshop in Warsaw&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;12 May 2014&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/euparl-circl-march-2014.pdf&#34;&gt;An Overview of Security Incidents Targeting Citizen How the Attackers Are Deceiving Us?&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;15 March 2014&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/tfcsirt-zurich-passivedns-circl.pdf&#34;&gt;Passive DNS - Common Output Format&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;14 February 2014&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/circl-who-targets-the-journalists.pdf&#34;&gt;Who targets the journalists? and how?  A review of the attack surface in our digital society&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;7 February 2014&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/CIRCL-MISP.pdf&#34;&gt;Malware Information Sharing Platform or How to Share Efficiently IOCs Within a Country&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;26 July 2013&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/bgp-ranking-first2013.pdf&#34;&gt;BGP Ranking Scoring ASNs Based on Their Potential Maliciousness&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;23 June 2013&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/im2013-bgpranking.pdf&#34;&gt;ASMATRA: Ranking ASs Providing Transit Service to Malware Hosters&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;29 May 2013&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/assets/files/tf-csirt-first2013-circl-restena-blackhole.pdf&#34;&gt;Another Perspective to IP-Darkspace Analysis&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;29 January 2013&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;the-digital-first-aid-kit&#34;&gt;The Digital First Aid Kit&lt;/h2&gt;
&lt;p&gt;The Digital First Aid Kit aims to provide preliminary support for people facing the most common types of digital threats.
The Kit offers a set of self-diagnostic tools for citizen, human rights defenders, bloggers, activists and journalists fac
ing attacks themselves, as well as providing guidelines for digital first responders to assist a person under threat.&lt;/p&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th style=&#34;text-align: left&#34;&gt;Description&lt;/th&gt;
          &lt;th style=&#34;text-align: center&#34;&gt;Last update&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/pub/dfak/AccountHijacking/&#34;&gt;&lt;img src=&#34;/assets/images/dfak/LOGO-HIJACKING.png&#34; alt=&#34;Digital First Aid Kit - Account Hijacking&#34;&gt;&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;2nd September 2014&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/pub/dfak/DDoSMitigation/&#34;&gt;&lt;img src=&#34;/assets/images/dfak/LOGO-DDOS.png&#34; alt=&#34;Digital First Aid Kit - DDoS Mitigation&#34;&gt;&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;2nd September 2014&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/pub/dfak/DevicesSeized/&#34;&gt;&lt;img src=&#34;/assets/images/dfak/LOGO-LOST.png&#34; alt=&#34;Digital First Aid Kit - Devices Lost? Stolen? Seized?&#34;&gt;&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;2nd September 2014&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/pub/dfak/Glossary/&#34;&gt;&lt;img src=&#34;/assets/images/dfak/LOGO-GLOSSARY.png&#34; alt=&#34;Digital First Aid Kit - Glossary&#34;&gt;&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;2nd September 2014&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/pub/dfak/Malware/&#34;&gt;&lt;img src=&#34;/assets/images/dfak/LOGO-MALWARE.png&#34; alt=&#34;Digital First Aid Kit - Malware&#34;&gt;&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;2nd September 2014&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/pub/dfak/SecureCommunication&#34;&gt;&lt;img src=&#34;/assets/images/dfak/LOGO-SECURE-COM.png&#34; alt=&#34;Digital First Aid Kit - Secure Communication&#34;&gt;&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;2nd September 2014&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;the-digital-first-aid-kit-german-edition&#34;&gt;The Digital First Aid Kit (German Edition)&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th style=&#34;text-align: left&#34;&gt;Description&lt;/th&gt;
          &lt;th style=&#34;text-align: center&#34;&gt;Last update&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/pub/dfak/de/AccountHijacking/&#34;&gt;&lt;img src=&#34;/assets/images/dfak/LOGO-HIJACKING.png&#34; alt=&#34;Digital First Aid Kit - Konto-Diebstahl &#34;&gt;&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;18th March 2015&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/pub/dfak/de/DevicesSeized/&#34;&gt;&lt;img src=&#34;/assets/images/dfak/LOGO-LOST.png&#34; alt=&#34;Digital First Aid Kit - Devices Lost? Stolen? Seized?&#34;&gt;&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;26th March 2015&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;security-advisories&#34;&gt;Security Advisories&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th style=&#34;text-align: left&#34;&gt;Description&lt;/th&gt;
          &lt;th style=&#34;text-align: center&#34;&gt;Last update&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/advisory/CVE-2017-13671/&#34;&gt;CVE-2017-13671 - Vulnerability in MISP (Malware Information Sharing Platform) and Threat Sharing - potential persistent cross site scripting vulnerability in the comments&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;25th August 2017&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/advisory/CVE-2015-5721/&#34;&gt;CVE-2015-5721 - Vulnerability in MISP (Malware Information Sharing Platform) - potential PHP Object injection vulnerability&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;4th August 2015&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/advisory/CVE-2015-5720/&#34;&gt;CVE-2015-5720 - Vulnerability in MISP (Malware Information Sharing Platform) - XSS in template creation&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;4th August 2015&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/advisory/CVE-2015-5719/&#34;&gt;CVE-2015-5719 - Vulnerability in MISP (Malware Information Sharing Platform) - Incorrect validation of temporary filenames&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;4th August 2015&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/projects/CIRCLean/security/advisory-01/&#34;&gt;CVE-2015-4096 - Vulnerability in CIRCLean where security measure can be bypassed with polyglot files&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;30th June 2015&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/advisory/CVE-2015-1035/&#34;&gt;CVE-2015-1035 - Vulnerability in HRIS software (HRMS product) - Reflective XSS&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;30th June 2015&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/advisory/CVE-2015-1036/&#34;&gt;CVE-2015-1036 - Vulnerability in HRIS software (HRMS product) - SQL injection (as an authenticated user)&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;30th June 2015&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/advisory/CVE-2015-4099/&#34;&gt;CVE-2015-4099 - SysAid &amp;ldquo;Service Desk&amp;rdquo; - security advisory 02 - Improper Neutralization of Special Elements in Output Used by a Downstream Component (&amp;lsquo;Injection&amp;rsquo;)&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;30th June 2015&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id=&#34;other-publications&#34;&gt;Other publications&lt;/h2&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th style=&#34;text-align: left&#34;&gt;Description&lt;/th&gt;
          &lt;th style=&#34;text-align: center&#34;&gt;Last update&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/pub/coordinated-vulnerability-disclosure/&#34;&gt;Coordinated Vulnerability Disclosure (CVD) Policy&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;18th June 2025&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/pub/taxonomy&#34;&gt;CIRCL Taxonomy - Schemes of Classification in Incident Response and Detection&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;15th March 2018&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/pub/responsible-vulnerability-disclosure/&#34;&gt;Responsible Vulnerability Disclosure&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;10th January 2015&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/pub/traffic-light-protocol/&#34;&gt;Traffic Light Protocol (TLP) - Classification and Sharing of Sensitive Information&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;March 2014&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;a href=&#34;/pub/request-for-proposals/&#34;&gt;CIRCL - Request for Proposals&lt;/a&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: center&#34;&gt;Regularly Updated&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
</content>
  </entry>
  
  <entry>
    <title>Report an Incident</title>
    <link href="https://new.circl.lu/report/"/>
    <id>https://new.circl.lu/report/</id>
    <updated>0001-01-01T00:00:00Z</updated>
    <summary>&lt;h2 id=&#34;report-an-incident&#34;&gt;Report an Incident&lt;/h2&gt;
&lt;p&gt;Incidents can be reported via e-mail or phone. See our &lt;a href=&#34;/contact/&#34;&gt;contact page&lt;/a&gt; for details including OpenPGP information.&lt;/p&gt;
&lt;h2 id=&#34;what-is-an-incident&#34;&gt;What is an Incident&lt;/h2&gt;
&lt;p&gt;&lt;em&gt;Any adverse event whereby some aspect of security could be threatened&lt;/em&gt;, as described in ITU-T E.409.&lt;/p&gt;
&lt;p&gt;Some examples of computer security incidents are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Unauthorized use of a computer system&lt;/li&gt;
&lt;li&gt;Compromised systems with malware&lt;/li&gt;
&lt;li&gt;Phishing attempts&lt;/li&gt;
&lt;li&gt;Website defacement&lt;/li&gt;
&lt;li&gt;Software vulnerabilities (check our &lt;a href=&#34;/pub/responsible-vulnerability-disclosure/&#34;&gt;Responsible Vulnerability Disclosure&lt;/a&gt; procedure)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;If you want to review a website/phishing URL before submitting a notification to us, you can use CIRCL &lt;a href=&#34;https://www.circl.lu/urlabuse/&#34;&gt;URL Abuse&lt;/a&gt;.&lt;/p&gt;</summary>
    <content type="html">&lt;h2 id=&#34;report-an-incident&#34;&gt;Report an Incident&lt;/h2&gt;
&lt;p&gt;Incidents can be reported via e-mail or phone. See our &lt;a href=&#34;/contact/&#34;&gt;contact page&lt;/a&gt; for details including OpenPGP information.&lt;/p&gt;
&lt;h2 id=&#34;what-is-an-incident&#34;&gt;What is an Incident&lt;/h2&gt;
&lt;p&gt;&lt;em&gt;Any adverse event whereby some aspect of security could be threatened&lt;/em&gt;, as described in ITU-T E.409.&lt;/p&gt;
&lt;p&gt;Some examples of computer security incidents are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Unauthorized use of a computer system&lt;/li&gt;
&lt;li&gt;Compromised systems with malware&lt;/li&gt;
&lt;li&gt;Phishing attempts&lt;/li&gt;
&lt;li&gt;Website defacement&lt;/li&gt;
&lt;li&gt;Software vulnerabilities (check our &lt;a href=&#34;/pub/responsible-vulnerability-disclosure/&#34;&gt;Responsible Vulnerability Disclosure&lt;/a&gt; procedure)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;If you want to review a website/phishing URL before submitting a notification to us, you can use CIRCL &lt;a href=&#34;https://www.circl.lu/urlabuse/&#34;&gt;URL Abuse&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id=&#34;guideline-for-incident-reporting&#34;&gt;Guideline for Incident Reporting&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;DISCLAIMER: If you consider criminal prosecution by filing a complaint, contact the &lt;a href=&#34;https://annuaire.public.lu/index.php?idMin=7290&#34;&gt;police at first&lt;/a&gt;.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;If you believe you encountered or identified an incident, please complete - as detailed as possible - the form available at&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;/contactform/&#34;&gt;Anonymous contact form&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;or send an - preferably GPG/PGP encrypted - email to&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;mailto:info@circl.lu&#34;&gt;info@circl.lu&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;In case of emergency, you reach CIRCL on their direct phone line&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;(+352) 247 88444&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;All reported information will be treated confidentially.&lt;/p&gt;
&lt;h2 id=&#34;recommendations&#34;&gt;Recommendations&lt;/h2&gt;
&lt;p&gt;CIRCL encourages you to implement the following guidelines:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;CIRCL should be informed as soon as possible once an incident has been detected or suspected&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The first action to undertake should be contacting CIRCL&lt;/li&gt;
&lt;li&gt;CIRCL may act as support for advising you on emergency actions that could be performed&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;As far as possible, actions performed on systems/services should aim to preserve evidences&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Once an incident has been detected, every actions undertaken in relation with this incident should be noted&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;who, what, when,  why, expected outcome of the action and actual outcome&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;This implies actions that are dedicated to be performed on systems/services or not&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;The crime scene should neither be altered nor modified (as far as possible)&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Instead of turning off a system, unplugging the network connection is usually the better choice regarding the possibility of evidence collection&lt;/li&gt;
&lt;li&gt;Software, applications, files, data or logs should not be installed, re-installed, copied, moved or deleted from the impacted system/services&lt;/li&gt;
&lt;li&gt;This guideline applies also to systems/services other than those impacted by the incident: in case of incident, other systems/services can be helpful for the collection of (additional) evidences or to understand/identify the root cause of the incident&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;No major changes should be implemented on the impacted systems/services&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;No actions other than those dedicated to contain the incident should be performed&lt;/li&gt;
&lt;li&gt;The eradication of the root cause of the incident/the recovery from the incident should not be performed without evaluating the impact on the evidence&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;When reporting, please be specific about time and time-zone.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Don&amp;rsquo;t forget to include contact details including phone numbers or PGP keys if available.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;In the scope of collecting evidences, we advise to have a look at the following technical procedure:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-39/&#34;&gt;TR-39 - CIRCL-SOPs Standard Operational Procedures&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-34/&#34;&gt;TR-34 How to view and extract raw messages in common email clients&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-22/&#34;&gt;TR-22 - Recommendations for Readiness to Handle Computer Security Incidents - memory and disk acquisitions&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/pub/tr-07/&#34;&gt;TR-07 - HOWTO find SMTP headers in common Email clients&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;confidentiality&#34;&gt;Confidentiality&lt;/h2&gt;
&lt;p&gt;The primary goal of CIRCL is to help the victims of information security
incidents (mainly in Luxembourg), respecting the strict
confidentiality of the reported incidents at the same time. CIRCL will not give any details
to third-parties without the prior consent of the victims.&lt;/p&gt;
&lt;p&gt;In case of legal complaints, CIRCL helps the Luxembourgish law
enforcement agencies. A search warrant is one of the techniques used by
law enforcement agencies to clear out a current legal investigation.&lt;/p&gt;
&lt;p&gt;CIRCL&amp;rsquo;s role is to respond to information security incidents along with
its coordination. CIRCL is on the front line for the sole interest
of the information security in Luxembourg.&lt;/p&gt;
</content>
  </entry>
  
  <entry>
    <title>Security Advisories</title>
    <link href="https://new.circl.lu/advisory/"/>
    <id>https://new.circl.lu/advisory/</id>
    <updated>0001-01-01T00:00:00Z</updated>
    <summary></summary>
    <content type="html"></content>
  </entry>
  
  <entry>
    <title>Services</title>
    <link href="https://new.circl.lu/services/"/>
    <id>https://new.circl.lu/services/</id>
    <updated>0001-01-01T00:00:00Z</updated>
    <summary>&lt;p&gt;CIRCL provides a large range of services on a national scale:&lt;/p&gt;
&lt;h2 id=&#34;incident-coordination-and-incident-handling&#34;&gt;Incident Coordination and Incident Handling&lt;/h2&gt;
&lt;p&gt;The available services are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;/report/&#34;&gt;Reporting&lt;/a&gt; of security incidents&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Incident identification, triage, analysis and response&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Technical investigation:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Incident correlation&lt;/li&gt;
&lt;li&gt;Malware analysis and reverse engineering&lt;/li&gt;
&lt;li&gt;System and network forensic analysis&lt;/li&gt;
&lt;li&gt;Security vulnerability assessment&lt;/li&gt;
&lt;li&gt;Information leak analysis and data mining&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Online services to support incident response and analysis&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://pandora.circl.lu/&#34;&gt;https://pandora.circl.lu/&lt;/a&gt; - quick, private and simple suspicious document analysis.&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://lookyloo.circl.lu/&#34;&gt;https://lookyloo.circl.lu/&lt;/a&gt; - check and review URLs and website.&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://hashlookup.circl.lu/&#34;&gt;https://hashlookup.circl.lu/&lt;/a&gt; - &lt;a href=&#34;/services/hashlookup/&#34;&gt;hashlookup&lt;/a&gt; online service to check the existence of a file in known public distributions.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;/services/misp-malware-information-sharing-platform/&#34;&gt;Threat indicators and intelligence sharing platform for the private sector - MISP&lt;/a&gt;&lt;/p&gt;</summary>
    <content type="html">&lt;p&gt;CIRCL provides a large range of services on a national scale:&lt;/p&gt;
&lt;h2 id=&#34;incident-coordination-and-incident-handling&#34;&gt;Incident Coordination and Incident Handling&lt;/h2&gt;
&lt;p&gt;The available services are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;/report/&#34;&gt;Reporting&lt;/a&gt; of security incidents&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Incident identification, triage, analysis and response&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Technical investigation:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Incident correlation&lt;/li&gt;
&lt;li&gt;Malware analysis and reverse engineering&lt;/li&gt;
&lt;li&gt;System and network forensic analysis&lt;/li&gt;
&lt;li&gt;Security vulnerability assessment&lt;/li&gt;
&lt;li&gt;Information leak analysis and data mining&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Online services to support incident response and analysis&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://pandora.circl.lu/&#34;&gt;https://pandora.circl.lu/&lt;/a&gt; - quick, private and simple suspicious document analysis.&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://lookyloo.circl.lu/&#34;&gt;https://lookyloo.circl.lu/&lt;/a&gt; - check and review URLs and website.&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://hashlookup.circl.lu/&#34;&gt;https://hashlookup.circl.lu/&lt;/a&gt; - &lt;a href=&#34;/services/hashlookup/&#34;&gt;hashlookup&lt;/a&gt; online service to check the existence of a file in known public distributions.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;/services/misp-malware-information-sharing-platform/&#34;&gt;Threat indicators and intelligence sharing platform for the private sector - MISP&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;International and national CERT/CSIRT cooperation and also with Local Incident Response Teams (LIRT)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Incident coordination might also include vulnerability handling and responsible vulnerability disclosure on incident reporter&amp;rsquo;s request&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Access to the CIRCL newsletter&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href=&#34;/services/training/&#34;&gt;Training And Technical Courses&lt;/a&gt; (&lt;a href=&#34;/assets/files/circl-training-2014.pdf&#34;&gt;PDF Catalogue&lt;/a&gt;)&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;incident-handling-support-tools-and-services&#34;&gt;Incident Handling Support Tools and Services&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;./pandora-document-analysis/&#34;&gt;Pandora&lt;/a&gt; is an analysis framework to discover if a file is suspicious and conveniently show the results.&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;/urlabuse&#34;&gt;URL Abuse&lt;/a&gt; and &lt;a href=&#34;https://lookyloo.circl.lu/&#34;&gt;LookyLoo&lt;/a&gt; to check and review security of URLs&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;./cve-search/&#34;&gt;cve-search Common Vulnerabilities and Exposures (CVE)&lt;/a&gt; web interface and API&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;./ip-asn-history/&#34;&gt;IP address to ASN mapping whois service&lt;/a&gt; including 4 years of historical data&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;./passive-dns/&#34;&gt;Passive DNS&lt;/a&gt;, historical DNS records database (access on request, &lt;a href=&#34;/contact/&#34;&gt;contact us&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;./passive-ssl/&#34;&gt;Passive SSL services&lt;/a&gt;, historical database of SSL certificate per IP address (access on request, &lt;a href=&#34;/contact/&#34;&gt;contact us&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;./dynamic-malware-analysis/&#34;&gt;Dynamic malware analysis platform&lt;/a&gt; (access on request, &lt;a href=&#34;/contact/&#34;&gt;contact us&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;./misp-malware-information-sharing-platform/&#34;&gt;Threat indicators sharing platform for private sector - MISP&lt;/a&gt; (access on request, &lt;a href=&#34;/contact/&#34;&gt;contact us&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;./network-change-detection/&#34;&gt;Network services exposure change detection&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;data-feeds-and-early-detection-network&#34;&gt;Data Feeds and Early Detection Network&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Private and public organizations in Luxembourg can benefit from our early detection network by &lt;a href=&#34;/pub/tr-16/&#34;&gt;hosting a sensor&lt;/a&gt; in their unused network spaces&lt;/li&gt;
&lt;li&gt;CIRCL provides a &lt;a href=&#34;./cve-search/&#34;&gt;contextual feed containing all software vulnerabilities&lt;/a&gt; including visibility ranking in Luxembourg&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;additional-request-or-research-project-partnership&#34;&gt;Additional Request or Research Project Partnership&lt;/h2&gt;
&lt;p&gt;CIRCL is also working with private and public organizations in order to foster research in the security field. Don&amp;rsquo;t hesitate to &lt;a href=&#34;/contact/&#34;&gt;contact us&lt;/a&gt;, if you would like to discuss a research partnership.&lt;/p&gt;
&lt;p&gt;CIRCL is actively working on &lt;a href=&#34;/projects&#34;&gt;different projects&lt;/a&gt; where contributors are welcome to participate and reuse software in their own organizations.&lt;/p&gt;
</content>
  </entry>
  
</feed>