Security CERT Global
- CVE-2023-0467 (wp_dark_mode)
- CVE-2023-0335 (wp_shamsi)
- CVE-2023-0441 (simply_gallery_blocks_with_lightbox)
- CVE-2023-0336 (ooohboi_steroids_for_elementor)
- CVE-2023-0395 (menu_shortcode)
- CVE-2023-0241 (pgadmin_4)
- CVE-2023-28844
- CVE-2023-24824
- CVE-2023-28845
- CVE-2022-47192
- CVE-2022-47188
- CVE-2022-47191
- CVE-2022-47189
- CVE-2023-26485
- CVE-2022-47190
- CVE-2023-28645
- Samba Releases Security Updates for Multiple Versions of Samba
- Mozilla Releases Security Update for Thunderbird 102.9.1
- CERTFR-2023-ALE-003 : Compromission de l’application 3CX Desktop App (31 mars 2023)
- CERTFR-2023-AVI-0278 : Multiples vulnérabilités dans le noyau Linux d’Ubuntu (31 mars 2023)
- CERTFR-2023-AVI-0277 : Multiples vulnérabilités dans le noyau Linux de SUSE (31 mars 2023)
- CERTFR-2023-AVI-0279 : Multiples vulnérabilités dans le noyau Linux de RedHat (31 mars 2023)
- CERTFR-2023-AVI-0275 : Multiples vulnérabilités dans GitLab (31 mars 2023)
- CERTFR-2023-AVI-0276 : Multiples vulnérabilités dans les produits IBM (31 mars 2023)
- CERT-SE:s veckobrev v.13
- Sårbarhet i VoIP-tjänsten 3CX utnyttjas för angrepp mot kunder
- Campaña de distribución de software troyanizado contra 3CX DesktopApp
- Campaña de distribución de software troyanizado contra 3CX DesktopApp
- JVN: Hitachi Energy製IEC 61850 MMS-Serverにおけるリソースの不適切なシャットダウンまたはリリースの脆弱性
- ESB-2023.1905 - [Win][UNIX/Linux] GitLab: CVSS (Max): 3.8*
- ESB-2023.1904 - [Ubuntu] musl: CVSS (Max): 9.8
- CVE-2023-1745
- CVE-2023-25587
- CVE-2023-1742
- CVE-2023-1744
- CVE-2023-1741
- CVE-2023-1746
- CVE-2023-1743
- CVE-2023-1670
- CONPROSYS HMI System(CHS) vulnerable to SQL injection
- JTEKT ELECTRONIC Screen Creator Advance 2 vulnerable to improper restriction of operations within the bounds of a memory buffer
- JVN: セイコーソリューションズ製 SkyBridge MB-A100/A110/A200/A130 および SkySpider MB-R210 における複数の脆弱性
- JVN: HAProxy における HTTP リクエストスマグリングの脆弱性
- JVN: ジェイテクトエレクトロニクス製Screen Creator Advance 2におけるメモリバッファエラーの脆弱性
- JVN: コンテック製CONPROSYS HMI System(CHS)におけるSQLインジェクションの脆弱性
- ESB-2023.1903 - [Win][UNIX/Linux] Ruby: CVSS (Max): 7.5
- ESB-2023.1898 - [Debian] libmicrohttpd: CVSS (Max): 5.9
- ESB-2023.1900 - [Debian] joblib: CVSS (Max): 9.8
- ESB-2023.1901 - [Appliance] Hitachi Energy IEC 61850 MMS-Server: CVSS (Max): 5.9
- ESB-2023.1902 - [Win][UNIX/Linux] Ruby: CVSS (Max): None
Building a Threat Intelligence Framework to Defend Against Cyberattacks
Goals Before Data
What systems, data, and other digital assets must be protected?
How do you anticipate threat intelligence will help protect those assets?
With which specific tactics are you expecting intelligence to help?
Threat Intelligence Framework Tools
Collecting: Ingesting threat data from the right sources.
Processing: Turning the data into useful information.
Analyzing: Turning the information into actionable intelligence.
Source: https://www.recordedfuture.com/threat-intelligence-framework/
Tags: Threat Intelligence,Threat Intelligence Data,Threat Intelligence Information,Threat Intelligence Platforms,