3.4K Followers
1 Following
317 Posts
CERT-EU, CERT for the EU institutions, bodies, and agencies.
Websitehttps://cert.europa.eu
Inactive EU Voice Mastodon accounthttps://social.network.europa.eu/@cert
Mandatehttps://eur-lex.europa.eu/legal-content/EN/ALL/?uri=CELEX%3A32018Q0113%2801%29

#CyberSecurity
#SupplyChain
#CERTEU

A compromised version of Trivy gave attackers access to the European Commission’s europa.eu platform hosted on AWS.

We have published our analysis – what happened, who is affected, and what to do – in full transparency and in agreement with the European Commission.

https://cert.europa.eu/blog/european-commission-cloud-breach-trivy-supply-chain

European Commission cloud breach: a supply-chain compromise

European Commission cloud breach: a supply-chain compromise

#FICLille
#CERTEU

🎪 Greetings, fellow keyboard warriors, EU policy wonks, and caffeine-dependent sentinels of the digital realm…
Pack your bags (and your YARA rules)—CERT-EU is invading Forum In Cyber in Lille next week (31 March–2 April)! 🇪🇺⚔️🐧

We’re bringing:
✅ Free advice (yes, even for non-EU entities… sometimes)
✅ A live feed of our team pretending to be extroverted at a public fair 😅
✅ Swag so good, even nation-state actors would trade their zero-days for it
✅ Lots of stickers and goodies and the best pew-pew map you have ever seen!

Swing by if you’re in town—we’ll swap cyber stories, share some wisdom, and help you justify your paranoia.

Where to find us? At the Pavillon Europe, at the E20-3.
You will see cool people wearing the coolest, blue, CERT-EU hoodies 😉

Looking forward to seeing you there!

P.S. No, we won’t fix your home router. 😉

https://europe.forum-incyber.com/partenaires-2026/

PARTENAIRES 2026 - FORUM INCYBER - EUROPE

Partenaires 2026

FORUM INCYBER - EUROPE

#CERTEU
#Cybersecurity
#AnnualConference
#CFP

Take an active role in shaping the agenda of this year #CERTEU #AnnualConfernce, by submitting your proposal at the following link:

https://cert.europa.eu/conference/steam-n-steel-the-chronicles-of-the-cyberverse/announcement

This year’s edition, ‘Steam & Steel: The Chronicles of The Cyberverse’, blends steampunk imagery with cybersecurity practice: proven fundamentals forged together with emerging tools to build durable, community-driven resilience at a time of rising geopolitical pressure.

CERT-EU Conference: Steam & Steel: The Chronicles of Cyberverse

CERT-EU Conference: Steam & Steel: The Chronicles of Cyberverse

#CERTEU
#CTI
#Framework

🚀 Today, CERT-EU is publishing https://lnkd.in/e6BhqkY5
its Cyber Threat Intelligence Framework https://lnkd.in/eGvPgHv8,
a reference we share with our constituents to classify, assess, and prioritise malicious cyber activity affecting Union entities and their ecosystem. It introduces shared CTI concepts and a clear scoring approach to support consistent reporting, alerting, and prioritisation across CERT-EU products, including Cyber Briefs and the TLR Year in Review. 🇪🇺 We are publishing it openly to increase transparency on how we structure and prioritise CTI, and to invite feedback from peers and cybersecurity professionals to further refine and strengthen it. 🦾

🤝🛡️ We welcome your feedback, suggestions, and practical observations at
[email protected] to help us continuously improve the framework for the whole community.

LinkedIn

This link will take you to a page that’s not on LinkedIn

#CybersecurityRegulation
#AnnualReport

🚀 Exciting Developments in EU Cybersecurity! 🚀

The 2025 report from the Interinstitutional Cybersecurity Board (IICB) has just dropped, and it's already creating waves in Brussels. 📈 With Regulation (EU) 2023/2841 in its second year, Union entities have achieved significant milestones in strengthening their cybersecurity frameworks.

🔒 Key Highlights:

▪️ Establishing robust cybersecurity risk-management frameworks

▪️Assessing cybersecurity maturity levels

▪️Tailoring measures to manage cybersecurity risks

▪️Leveraging the FREIA framework contract for trusted service outsourcing

CERT-EU continues to play a critical role in defending against advanced threats, identifying over thirty malicious actors targeting Union entities. As the threat landscape becomes more complex, our collective resilience is paramount.

Don't miss out—grab a cup of your favorite beverage and dive into the IICB report to discover how these efforts are keeping our Union strong and secure for the future. 🛡️

https://www.cert.europa.eu/blog/another-year-another-blast

Another year, another blast!

Regulation (EU) 2023/2841, the Cybersecurity Regulation for Union entities, entered into force on 7 January 2024. Two years later, the IICB released its annual report for 2025.

Critical Vulnerability in Cisco Secure Email and Web Manager (CERT-EU Security Advisory 2025-042)

On December 17, 2025, Cisco released a security advisory for a critical vulnerability affecting Cisco Secure Email Gateway and Cisco Secure Email and Web Manager products.
It is recommended to follow Cisco's recommendations to check whether vulnerable appliances have been compromised, and to remediate the issue. There is no patch available for this vulnerability yet.

https://www.cert.europa.eu/publications/security-advisories/2025-042/

Critical Vulnerability in Cisco Secure Email and Web Manager

Critical Vulnerability in Cisco Secure Email and Web Manager

Critical Security Vulnerability in React Server Components (CERT-EU Security Advisory 2025-041)

On December 3, 2025, the React Team publicly disclosed a critical security vulnerability affecting React Server Components (RSC) and related packages. The vulnerability allows for unauthenticated remote code execution (RCE) via maliciously crafted HTTP requests.
It is recommended to update all affected component packages and any frameworks that integrate them.

https://www.cert.europa.eu/publications/security-advisories/2025-041/

Critical Security Vulnerability in React Server Components

Critical Security Vulnerability in React Server Components

UPDATE: Critical Vulnerabilities in Cisco ASA and FTD (CERT-EU Security Advisory 2025-036)

On September 25, 2025, Cisco released several security advisories addressing 3 vulnerabilities, 2 of which are critical. Cisco warns that some of those vulnerabilities are exploited in the wild and assesses with high confidence that this new activity is related to the same threat actor as the ArcaneDoor attack campaign that Cisco reported in early 2024.
It is recommended running compromise assessment on Internet facing vulnerable devices, and update as soon as possible.

https://www.cert.europa.eu/publications/security-advisories/2025-036/

Critical Vulnerabilities in Cisco ASA and FTD

Critical Vulnerabilities in Cisco ASA and FTD

Critical Vulnerabilities in Cisco ASA and FTD (CERT-EU Security Advisory 2025-036)

On September 25, 2025, Cisco released several security advisories addressing 3 vulnerabilities, 2 of which are critical. Cisco warns that some of those vulnerabilities are exploited in the wild and assesses with high confidence that this new activity is related to the same threat actor as the ArcaneDoor attack campaign that Cisco reported in early 2024.
It is recommended running compromise assessment on Internet facing vulnerable devices, and update as soon as possible.

https://www.cert.europa.eu/publications/security-advisories/2025-036/

Critical Vulnerabilities in Cisco ASA and FTD

Critical Vulnerabilities in Cisco ASA and FTD

High Vulnerability in Cisco IOS and IOS XE Software (CERT-EU Security Advisory 2025-035)

On September 24, 2025, Cisco released a security advisory regarding a high severity vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS Software and Cisco IOS XE Software. The vulnerability is being exploited in the wild.
It is recommended updating as soon as possible and conduct a compromise assessment on devices that are exposing SNMP on the Internet. It is also recommended not allowing access to SNMP over untrusted network (i.e. on the Internet).

https://www.cert.europa.eu/publications/security-advisories/2025-035/

High Vulnerability in Cisco IOS and IOS XE Software

High Vulnerability in Cisco IOS and IOS XE Software