Security CERT Global
- TZCERT-SU-24-0435 (Chrome Security Update)
- TZCERT-SU-24-0442 (Ubuntu Security Update)
- TZCERT-SU-24-0440 (Dell Security Update)
- TZCERT-SU-24-0437 (IBM Security Update)
- TZCERT-SU-24-0441 (SUSE Security Update)
- TZCERT-SU-24-0434 (ABB Security Update)
- TZCERT-SU-24-0439 (Huawei Security Update)
- TZCERT-SU-24-0436 (Jenkins Security Update)
- TZCERT-SU-24-0443 (Firefox Security Update)
- TZCERT-SU-24-0438 (Oracle Security Update)
- HPE Superdome Flex, Superdome Flex 280 and Compute Scale-up Server 3200 Servers Arbitrary Code Execution (CVE-2021-38578)
- CERTFR-2024-AVI-0333 : Multiples vulnérabilités dans le noyau Linux d’Ubuntu (19 avril 2024)
- CERTFR-2024-AVI-0332 : Multiples vulnérabilités dans les produits Red Hat (19 avril 2024)
- CERTFR-2024-AVI-0327 : Multiples vulnérabilités dans Microsoft Edge (19 avril 2024)
- CERTFR-2024-AVI-0328 : Vulnérabilité dans Citrix uberAgent (19 avril 2024)
- CERTFR-2024-AVI-0334 : Multiples vulnérabilités dans le noyau Linux de Debian (19 avril 2024)
- CERTFR-2024-AVI-0331 : Multiples vulnérabilités dans SolarWinds Platform (19 avril 2024)
- CERTFR-2024-AVI-0330 : Multiples vulnérabilités dans les produits IBM (19 avril 2024)
- CERTFR-2024-AVI-0329 : Multiples vulnérabilités dans le noyau Linux de SUSE (19 avril 2024)
- Cisco Releases Security Advisories for Cisco Integrated Management Controller
- CERT-SE:s veckobrev v.16
- Armeria-saml improperly handles SAML messages
- LINE client for iOS vulnerable to improper server certificate verification
- tzdata: CVSS (Max): None
- firefox: CVSS (Max): 7.5
- Migration Toolkit for Runtimes: CVSS (Max): 5.9
- firefox: CVSS (Max): 7.5
- Migration Toolkit for Runtimes: CVSS (Max): 5.9
- firefox: CVSS (Max): 7.5
- firefox: CVSS (Max): 7.5
- Red Hat Service Interconnect 1.5.3: CVSS (Max): 7.5
- Migration Toolkit for Containers (MTC) 1.8.3: CVSS (Max): 6.5
- OpenJDK 21.0.3: CVSS (Max): 3.7
- sssd: CVSS (Max): 7.1
- tomcat: CVSS (Max): 7.5
- firefox: CVSS (Max): 7.5
- firefox: CVSS (Max): 7.5
- firefox: CVSS (Max): 7.5
- sssd: CVSS (Max): 7.1
- sssd: CVSS (Max): 7.1
- firefox: CVSS (Max): 7.5
- sssd: CVSS (Max): 7.1
- firefox: CVSS (Max): 7.5
- kernel: CVSS (Max): 6.7
- less: CVSS (Max): 7.0
- shim: CVSS (Max): 8.3
- mod_http2: CVSS (Max): 7.5
- shim: CVSS (Max): 8.3
- Unitronics Vision Series PLCs: CVSS (Max): 7.5
- rhc-worker-script: CVSS (Max): 5.9
Four myths about networking and cybersecurity related to operations technology (OT) systems are highlighted as well as three pillars for securing industrial networks
Industrial network security best practice advice -Four myths about networking and cybersecurity related to operations technology (OT) systems are highlighted […]
Strategic Efficiency Consortium Security Intelligence Data Platform: Work Flow + Content Map – Jan 2019
SEC Industrial Security Intelligence Data Platform Work Flow SEC Industrial Security Intelligence Data Platform Content Map Updated Jan 2019 Document: […]
SEC Industrial Security Intelligence Data Platform 2019 Document
Strategic Efficiency Consortium Platform Work Flow Content Map Updated for 2019. SEC Industrial Security Intelligence Data Platform 2019 Document Document: […]
Building a Threat Intelligence Framework to Defend Against Cyberattacks
Goals Before Data What systems, data, and other digital assets must be protected? How do you anticipate threat intelligence will […]
Threat Intelligence’s Big Data Problem
Threat Intelligence’s Big Data Problem Security teams are drowning in often useless threat intel data, but signs of maturity are […]
Finding The ROI Of Threat Intelligence: 5 Steps
Finding The ROI Of Threat Intelligence: 5 Steps Advice from a former SOC manager on how to leverage threat intel […]
6 Surprising Benefits of Threat Intelligence From the Web
6 Surprising Benefits of Threat Intelligence From the Web Key Takeaways The internet is the single greatest learning resource ever […]
Threat Intelligence, Information, and Data: What Is the Difference?
Threat Intelligence, Information, and Data: What Is the Difference? Key Takeaways There’s a huge difference between threat data, information, and […]
SEC Automation: Choosing the Right Systems Integrator for your Automation Project
Choosing the Right Systems Integrator for your Automation Project – Industrial Control Systems: SCADA – Systems Integrators Many automation system projects […]