High vulnerability in Lustre: CVE-2023-51786

There is a vulnerability in Lustre where users may gain access to files and/or folders which they should not have permission to access based on their user or group ID. This may lead to data compromise or possible privilege escalation. Please see...

PuTTY vulnerability vuln-p521-bias

PuTTY tools from 0.68 to 0.80 inclusive have a critical vulnerability in the code that generates signatures from ECDSA private keys which use the NIST P521 curve. PuTTY, or Pageant, generates a signature from a key when using it to authenticate you to an SSH server.)...

EGI-CSIRT at ISGC2024 in Taipei

EGI CSIRT will participate at International Symposium of Grids and Clouds. Together with eduGAIN CSIRT, EGI CSIRT will run an Incident Response table top exercise where participants will have to take on the roles of IdP, SP, Federation Operators and solve a fictitious...

SOC Hackaton in CERN

This week, CERN is hosting the second SOC WG Hackathon, a 2.5 day workshop focused on work to deploy Security Operations Centres at R&E organisation through the use of reference designs and documentation. The topics will include: Zeek  MISP Documentation...