Skip to main content
Request a Demo

CIRCL

CIRCL provides a reliable and trusted point of contact for any users, companies and organizations based in Luxembourg, for the handling of attacks and incidents. Its team of experts acts like a fire brigade, with the ability to react promptly and efficiently whenever threats are suspected, detected or incidents occur.

CIRCL’s aim is to gather, review, report and respond to cyber threats in a systematic and prompt manner.

 

Integrations

CIRCL CVE

With this integration, you can retrieve the latest CVEs and their information and use it as a good starting point for ingesting vulnerability data.

The following actions are available:

  • Search CVE ID
  • Get Latest CVEs
  • Advanced Request

This app can be found in the ThreatConnect App Catalog under the name: CIRCL CVE

Keep Reading

Related Resources

dark orange ThreatConnect TC logo

Built By ThreatConnect

CIRCL Hashlookup

The Polarity - CIRCL Hashlookup integration searches the CIRCL public hash lookup API which compares hash values against a database of known files. The integration supports lookups of MD5, SHA1, and SHA256 hashes.

Examples

CIRCL Hashlookup Data Overview - Known Hashes

  • Summary Information: When an anlalyst first looks up information in CIRCL Hashlookup they will be able to quickly see if there is known or malicious information about the hash.
  • Filename Data: When an analyst drills into the details of the data for CIRCL, they will quickly be able to see information relating to the known file assocaited with the hash. Quickly understanding information on the filename, if its trusted, the file size and more. Allowing analysts to have a better understanding of the known associated hash.
  • Product Information: Not only can analysts get file context they will also be able to see any related product details. Quickly knowing what product its related to, the version associated, application type and more.
  • Additional Data: Analysts will also be able to get information on the known OS associated with the file and any other references.

CIRCL Hashlookup Data Overview - Malicious Hashes

Malicious Context: If a hash is known to be malicious analysts can quickly see the trust level as well as the what source that helped determine it.

Keep Reading

Related Resources

Built By Polarity

CVE-Search with Polarity

The Polarity - CVE-Search integration quickly enables users to have a complete understanding of what a CVE is and how it can affect them. Pulling from the circle.lu service's NIST database.

Examples

CVE Search Data Overview

  • Summary Tags: Quickly get insights into how bad a CVE is with the CVE score, if the CVE affects authorization and what the CVE is applied to.
  • CVE Summary: Get a quick synopsis on what the CVE is and how it works.
  • CVE Information: Get insights into the CVSS score, the access patterns if there are any and the impact of the CVE.
  • MITRE Attack Pattern List: Links to the different attack patterns that MITRE has defined.
Keep Reading

Related Resources

Built By Polarity

Looking for an
integration not shown?