Security CERT Global
- CVE-2023-0183
- CVE-2023-0182
- CVE-2023-0197
- CVE-2023-1790
- CVE-2023-0181
- CVE-2023-0187
- CVE-2023-0192
- CVE-2023-0198
- CVE-2023-0191
- CVE-2023-0194
- CVE-2023-0180
- CVE-2023-0188
- CVE-2023-0185
- CVE-2023-0195
- CVE-2023-0189
- CVE-2023-0186
- CVE-2023-0335 (wp_shamsi)
- CVE-2023-0441 (simply_gallery_blocks_with_lightbox)
- CVE-2023-0241 (pgadmin_4)
- CVE-2023-0467 (wp_dark_mode)
- CVE-2023-0395 (menu_shortcode)
- CVE-2023-0336 (ooohboi_steroids_for_elementor)
- CVE-2022-47188
- CVE-2022-47190
- CVE-2022-47189
- CVE-2023-28844
- CVE-2023-28645
- CVE-2023-26485
- CVE-2023-28845
- CVE-2022-47191
- CVE-2022-47192
- CVE-2023-24824
- Samba Releases Security Updates for Multiple Versions of Samba
- Mozilla Releases Security Update for Thunderbird 102.9.1
- CERTFR-2023-AVI-0278 : Multiples vulnérabilités dans le noyau Linux d’Ubuntu (31 mars 2023)
- CERTFR-2023-ALE-003 : Compromission de l’application 3CX Desktop App (31 mars 2023)
- CERTFR-2023-AVI-0277 : Multiples vulnérabilités dans le noyau Linux de SUSE (31 mars 2023)
- CERTFR-2023-AVI-0276 : Multiples vulnérabilités dans les produits IBM (31 mars 2023)
- CERTFR-2023-AVI-0279 : Multiples vulnérabilités dans le noyau Linux de RedHat (31 mars 2023)
- CERTFR-2023-AVI-0275 : Multiples vulnérabilités dans GitLab (31 mars 2023)
- CERT-SE:s veckobrev v.13
- Sårbarhet i VoIP-tjänsten 3CX utnyttjas för angrepp mot kunder
- Campaña de distribución de software troyanizado contra 3CX DesktopApp
- Campaña de distribución de software troyanizado contra 3CX DesktopApp
- JVN: Hitachi Energy製IEC 61850 MMS-Serverにおけるリソースの不適切なシャットダウンまたはリリースの脆弱性
- ESB-2023.1905 - [Win][UNIX/Linux] GitLab: CVSS (Max): 3.8*
- ESB-2023.1904 - [Ubuntu] musl: CVSS (Max): 9.8
- CVE-2023-1746
- CVE-2023-1670
- CVE-2023-1741
6 Surprising Benefits of Threat Intelligence From the Web
6 Surprising Benefits of Threat Intelligence From the Web
Key Takeaways
The internet is the single greatest learning resource ever created. Whether you’re looking into specific attack vectors or aiming to learn from others’ mistakes, the web should be your first port of call.
Keeping abreast of proprietary information leaks and “adversary chatter” from the open, deep, and dark web will help you to anticipate where and when attacks are likely to come.
Knowledge sharing and other OSINT have come on dramatically in recent years. Use it to your advantage by committing additional resources to the most likely attack routes.
Source:
https://www.recordedfuture.com/threat-intelligence-benefits/