Security CERT Global
- CERTFR-2024-AVI-0230 : Vulnérabilité dans Kaspersky Password Manager (18 mars 2024)
- CERTFR-2024-ACT-013 : Bulletin d’actualité CERTFR-2024-ACT-013 (18 mars 2024)
- CERTFR-2024-AVI-0229 : Vulnérabilité dans Tenable Nessus (18 mars 2024)
- Repository for Software Attestation and Artifacts Now Live
- API Security through Contract-Driven Programming
- JVN: FitNesse における複数の脆弱性
- SCADA 'in the cloud': new guidance for OT organisations
- unadf: CVSS (Max): 9.8
- composer: CVSS (Max): 8.8
- Multiple vulnerabilities in FitNesse
- お知らせ:JPCERT/CC Eyes「JSAC2024開催レポート~Workshop & Lightning Talk~」
- spip: CVSS (Max): 6.1
- Red Hat OpenShift GitOps: CVSS (Max): 8.9
- curl: CVSS (Max): 8.8
- Red Hat OpenShift GitOps: CVSS (Max): 8.9
- Nessus Products: CVSS (Max): 7.8
- CERTFR-2024-AVI-0224 : Multiples vulnérabilités dans Microsoft Edge (15 mars 2024)
- CERTFR-2024-AVI-0228 : Multiples vulnérabilités dans IBM (15 mars 2024)
- CERTFR-2024-AVI-0225 : Multiples vulnérabilités dans Juniper Secure Analytics (15 mars 2024)
- CERTFR-2024-AVI-0227 : Multiples vulnérabilités dans le noyau Linux de RedHat (15 mars 2024)
- CERTFR-2024-AVI-0226 : Multiples vulnérabilités dans le noyau Linux d’Ubuntu (15 mars 2024)
- CERTFR-2024-AVI-0223 : Vulnérabilité dans Spring Framework (15 mars 2024)
- Sårbarheder i Cisco IOS RX-software
- Kritisk sårbarhet i Juniper Secure Analytics
- CERT-SE:s veckobrev v.11
- Kritisk sårbarhet i Arcserve UDP
- Delta Electronics DIAEnergie: CVSS (Max): 8.8
- 8Base-Openshift-Serverless-1.32: CVSS (Max): 6.5
- JVN: Android アプリ「ABEMA(アベマ)」におけるアクセス制限不備の脆弱性
- JVN: Delta Electronics製DIAEnergieにおける複数の脆弱性
- "ABEMA" App for Android fails to restrict access permissions
- Softing edgeConnector: CVSS (Max): 8.0
- Db2 Web Query for i: CVSS (Max): 9.1
- JSA Series: CVSS (Max): 9.8
- Expat: CVSS (Max): 7.5
- gimp:2.8: CVSS (Max): 7.8
- TeX Live: CVSS (Max): 9.8*
- kernel-rt: CVSS (Max): 8.1
- Red Hat Advanced Cluster Management 2.9.3: CVSS (Max): 7.5
- openvswitch: CVSS (Max): 7.5
- MELSEC-Q/L Series: CVSS (Max): 9.8
- node-xml2js: CVSS (Max): 5.3
- Sinteso EN, Cerberus PRO EN Fire Protection Systems: CVSS (Max): 10.0
- dnsmasq: CVSS (Max): 7.5
- Siemens RUGGEDCOM APE1808: CVSS (Max): 9.8
- Siemens Siveillance Control: CVSS (Max): 5.5
- ACS 4.3: CVSS (Max): 8.1
- dnsmasq: CVSS (Max): 7.5
- Siemens SENTRON: CVSS (Max): 7.5
- python-cryptography: CVSS (Max): 7.5
Four myths about networking and cybersecurity related to operations technology (OT) systems are highlighted as well as three pillars for securing industrial networks
Industrial network security best practice advice -Four myths about networking and cybersecurity related to operations technology (OT) systems are highlighted […]
Strategic Efficiency Consortium Security Intelligence Data Platform: Work Flow + Content Map – Jan 2019
SEC Industrial Security Intelligence Data Platform Work Flow SEC Industrial Security Intelligence Data Platform Content Map Updated Jan 2019 Document: […]
SEC Industrial Security Intelligence Data Platform 2019 Document
Strategic Efficiency Consortium Platform Work Flow Content Map Updated for 2019. SEC Industrial Security Intelligence Data Platform 2019 Document Document: […]
Building a Threat Intelligence Framework to Defend Against Cyberattacks
Goals Before Data What systems, data, and other digital assets must be protected? How do you anticipate threat intelligence will […]
Threat Intelligence’s Big Data Problem
Threat Intelligence’s Big Data Problem Security teams are drowning in often useless threat intel data, but signs of maturity are […]
Finding The ROI Of Threat Intelligence: 5 Steps
Finding The ROI Of Threat Intelligence: 5 Steps Advice from a former SOC manager on how to leverage threat intel […]
6 Surprising Benefits of Threat Intelligence From the Web
6 Surprising Benefits of Threat Intelligence From the Web Key Takeaways The internet is the single greatest learning resource ever […]
Threat Intelligence, Information, and Data: What Is the Difference?
Threat Intelligence, Information, and Data: What Is the Difference? Key Takeaways There’s a huge difference between threat data, information, and […]
SEC Automation: Choosing the Right Systems Integrator for your Automation Project
Choosing the Right Systems Integrator for your Automation Project – Industrial Control Systems: SCADA – Systems Integrators Many automation system projects […]