Security CERT Global
- CISA Releases Guidance on Single Sign-On (SSO) Adoption for Small and Medium-Sized Businesses: (SMBs)
- CAREL Boss-Mini
- Westermo L210-F2G
- Yokogawa CENTUM
- CISA Releases Three Industrial Control Systems Advisories
- Vulnérabilité dans Spring Cloud Function (20 juin 2024)
- Multiples vulnérabilités dans SonicWall SonicOS (20 juin 2024)
- Multiples vulnérabilités dans les produits Moxa (20 juin 2024)
- CERT-SE:s veckobrev v.25
- We're trying to cure cancer, why would anyone attack us?
- Cyber Europe tests the EU Cyber Preparedness in the Energy Sector
- JVN: 横河電機製CENTUM CAMSログサーバーにおける不十分なアクセス権設定の脆弱性
- お知らせ:標準から学ぶICSセキュリティ - #7 ICSコンポーネントに対するセキュリティ要件
- JVN: 複数のトレンドマイクロ製品における複数の脆弱性
- JVN: RAD Data Communications製SecFlow-2におけるパストラバーサルの脆弱性
- Multiples vulnérabilités dans les produits Atlassian (19 juin 2024)
- 🇬🇧 Malicious activities linked to the Nobelium intrusion set (19 juin 2024)
- Multiples vulnérabilités dans Moodle (19 juin 2024)
- Multiples vulnérabilités dans Google Chrome (19 juin 2024)
- 🇬🇧 Malicious activities linked to the Nobelium intrusion set (19 juin 2024)
- Multiples vulnérabilités dans Juniper Secure Analytics (19 juin 2024)
- Multiple vulnerabilities in multiple Trend Micro products
- JVN: Androidアプリ「ZOZOTOWN」におけるアクセス制限不備の脆弱性
- JVN: WordPress用プラグインSiteGuard WP Pluginにおける変更したログインパスが漏えいする脆弱性
- WordPress plugin "SiteGuard WP Plugin" may leak the customized path to the login page
- "ZOZOTOWN" App for Android fails to restrict custom URL schemes properly
- Weekly Report: GitLabに複数の脆弱性
- Weekly Report: 東芝テック製および沖電気製複合機(MFP)に複数の脆弱性
- Weekly Report: 複数のMozilla製品に脆弱性
- Weekly Report: 複数のマイクロソフト製品に脆弱性
- Weekly Report: IPCOMのWAF機能にサービス運用妨害(DoS)の脆弱性
- Weekly Report: Fortinet製FortiOSにスタックベースのバッファーオーバーフローの脆弱性
- Kritiska sårbarheter påverkar VMware vCenter Server
- Multiples vulnérabilités dans les produits VMware (18 juin 2024)
- CISA Releases One Industrial Control Systems Advisory
- PoC-udnyttelse tilgængelig for fejl i Ivanti Endpoint Manager
- TZCERT-SU-24-0632 (SUSE Security Update)
- TZCERT-SU-24-0636 (Chrome Security Update)
- TZCERT-SU-24-0630 (Dell Security Update)
- TZCERT-SU-24-0635 (Microsoft Security Update)
- TZCERT-SU-24-0637 (Mageia Security Update)
- TZCERT-SU-24-0638 (Palo Alto Security Update)
- TZCERT-SU-24-0633 (Adobe Security Update)
- TZCERT-SU-24-0634 (Oracle Linux Security Update)
- TZCERT-SU-24-0631 (Mozilla Security Update)
- TZCERT-SU-24-0639 (Cisco Security Update)
- VMware advarer om to kritiske vCenter-fejl
- Ny Linux malware styres gennem emojis
- Multiple vulnerabilities in Ricoh Streamline NX PC Client
- Multiple vulnerabilities in ID Link Manager and FUJITSU Software TIME CREATOR
MGS+ ICS Security Report April 2017
MGS+ ICS Security Report April 2017: Editor Picks: News Intelligence Alerts Report
2017 Security 100: 20 Coolest Endpoint Security Vendors
Source: http://www.crn.com/slide-shows/security/300084027/2017-security-100-20-coolest-endpoint-security-vendors.htm
Why Canada is well-positioned to be a global leader in cybersecurity
Cybersecurity: most IT personnel know of it. Even fewer follow up on the latest developments in the industry beyond notifications from their antivirus software that “143 latest threats” were just neutralized. Only a small handful of them actually go above and beyond, pushing the boundaries, proactively defending their organization from hundreds of new cyber threats unleashed daily.
Source: http://betakit.com/why-canada-is-well-positioned-to-be-a-global-leader-in-cybersecurity/
What the Best Transformational Leaders Do
Companies that claim to be “transforming” seem to be everywhere. But when you look more deeply into whether those organizations are truly redefining what they are and what they do, stories of successful change efforts are exceptionally rare. In a study of S&P 500 and Global 500 firms, our team found that those leading the most successful transformations, creating new offerings and business models to push into new growth markets, share common characteristics and strategies. Before describing those, let’s look at how we identified the exceptional firms that rose to the top of our ranking, a group we call the Transformation 10.
Source: https://hbr.org/2017/05/what-the-best-transformational-leaders-do
Europe Pumps Out 50% More Cybercrime Attacks Than US
Cyberattacks originating from Europe were substantially higher than nefarious activity launched from the US during the first quarter.
Source: http://www.darkreading.com/threat-intelligence/europe-pumps-out-50–more-cybercrime-attacks-than-us—/d/d-id/1328798
The Consequences of an Incomplete Threat Model
Source: https://www.carbonblack.com/2017/05/08/consequences-incomplete-threat-model/
Microsoft Calls on Governments to Stop Stockpiling Dangerous Software
In the wake of a major cyber attack that affected hospitals and other services in more than 150 countries, Microsoft has urged governments to stop their stockpiling of dangerous software that can be weaponized if leaked.
Source: http://time.com/4778646/microsoft-ransomware-cybersecurity-wannacrypt/