techelements.co
Free Resources - Tech Elements | IT Security Consulting
http://www.techelements.co/security-resources/free-resources
US DoD IAVM List. Tech Elements supports the use of:. Is currently compatible only with XCCDF format files. All Tech Elements Cyber Security benchmarks are in XCCDF format. STIG viewer also has the ability to do checklists this gives you the ease of uses and see what checks have bean closed and what are still open. Stig Viwer is GOTS – Government invented, owned, and supported software. Download here: http:/ iase.disa.mil/stigs/Pages/stig-viewing-guidance.aspx. 8211; Here is a list of visual threat maps.
circl.lu
CIRCL » Traffic Light Protocol (TLP) - Classification and Sharing of Sensitive Information
https://www.circl.lu/pub/traffic-light-protocol
Traffic Light Protocol (TLP) - Classification and Sharing of Sensitive Information. Traffic Light Protocol (TLP) - Classification and Sharing of Sensitive Information. Back to Publications and Presentations. Traffic Light Protocol - TLP. Chatham House Rule (CHR) in addition to TLP. Where is the Traffic Light Protocol used? How do you use the Traffic Light Protocol in a document? You can report incidents. Via our official contact including e-mail, phone. Or use the Anonymous reporting form. Chatham House ...
circl.lu
CIRCL » TR-27 - GNU Bash Critical Vulnerability - CVE-2014-6271 - CVE-2014-7169
http://www.circl.lu/pub/tr-27
TR-27 - GNU Bash Critical Vulnerability - CVE-2014-6271 - CVE-2014-7169. TR-27 - GNU Bash Critical Vulnerability - CVE-2014-6271 - CVE-2014-7169. Back to Publications and Presentations. How to test if your bash is vulnerable. Disabling the vulnerable bash functionality. Classification of this document. You can report incidents. Via our official contact including e-mail, phone. Or use the Anonymous reporting form. How to test if your bash is vulnerable. Env x='() { :;}; echo vulnerable' bash -c "echo test".
circl.lu
CIRCL » TR-37 - VENOM / CVE-2015-3456 - Critical vulnerability in QEMU Floppy Disk Controller (FDC) emulation
http://www.circl.lu/pub/tr-37
TR-37 - VENOM / CVE-2015-3456 - Critical vulnerability in QEMU Floppy Disk Controller (FDC) emulation. TR-37 - VENOM / CVE-2015-3456 - Critical vulnerability in QEMU Floppy Disk Controller (FDC) emulation. Back to Publications and Presentations. Impact of such vulnerability in virtualization technologies. Classification of this document. You can report incidents. Via our official contact including e-mail, phone. Or use the Anonymous reporting form. Is a kind of ‘buffer overflow’ vulnerability in the QEMU.
circl.lu
CIRCL » TR-20 - Port evolution, a software to find the shady IP profiles in Netflow
http://www.circl.lu/pub/tr-20
TR-20 - Port evolution, a software to find the shady IP profiles in Netflow. TR-20 - Port evolution, a software to find the shady IP profiles in Netflow. Back to Publications and Presentations. Classification of this document. You can report incidents. Via our official contact including e-mail, phone. Or use the Anonymous reporting form. Incident response teams or abuse handling teams including the technical support teams have often limited resources and some tasks must be prioritized. In addition, a...
circl.lu
CIRCL » TR-28 - The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, are vulnerable to a critical padding oracle attack - CVE-2014-3566
http://www.circl.lu/pub/tr-28
TR-28 - The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, are vulnerable to a critical padding oracle attack - CVE-2014-3566. TR-28 - The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, are vulnerable to a critical padding oracle attack - CVE-2014-3566. Back to Publications and Presentations. Disambiguation of names and protocols. How to Disable SSLv3? Microsoft IIS Internet Information Server. Classification of this document. You can report incidents.
circl.lu
CIRCL » Training and Technical Courses
http://www.circl.lu/services/training
Training and Technical Courses. Training and Technical Courses. Introduction to Incident Response. File-system Post-mortem Forensic Analysis. Introduction to Penetration Testing. Introduction to (Malware) Reverse Engineering. MISP Malware Information Sharing Platform - Threat Sharing. How can I register for a training. You can report incidents. Via our official contact including e-mail, phone. Or use the Anonymous reporting form. To its members and organizations based in Luxembourg. Courses can be held a...
circl.lu
CIRCL » A new wave of crypto ransomware targeting Luxembourg
http://www.circl.lu/pub/press/20150205
A new wave of crypto ransomware targeting Luxembourg. A new wave of crypto ransomware targeting Luxembourg. Back to CIRCL Newsroom - Press Release. You can report incidents. Via our official contact including e-mail, phone. Or use the Anonymous reporting form. The main recommendation CIRCL makes is to always perform regular backups of the personal files. Such malware also impacts USB drives and network attached servers. We strongly recommend to keep the backups on separate devices. Do not open attachment...
circl.lu
CIRCL » CIRCL Team Members
http://www.circl.lu/team
Business and Legal Support Team. You can report incidents. Via our official contact including e-mail, phone. Or use the Anonymous reporting form. CIRCL team is composed of competent people, dedicated to their mission of improving security for the benefit of Luxembourg and the companies located on the territory. A file containing all the PGP keys listed on this page is also available. 3F4D 8CF6 08F9 4F88 2815 2CB1 69A2 0F50 9BE4 AEE9. 1D02A8CC 5464280D 70C30D9B B66EDB67 188ED144. D920 2C05 1A90 32EE 1F7D ...