Security CERT Global
- CVE-2022-48130
- CVE-2022-48113
- CVE-2022-46842
- CVE-2022-45067
- CVE-2022-45807
- CVE-2022-44585
- CVE-2022-40692
- CVE-2023-0253
- CVE-2022-48114
- CVE-2022-46815
- CVE-2022-36401
- CVE-2023-24574
- CVE-2023-0576
- CVE-2022-48082
- CVE-2022-3560
- CVE-2022-48140
- CVE-2022-48079
- CVE-2023-23120
- CVE-2023-23119
- CVE-2022-25894 (uflo)
- CVE-2021-36539 (canvas_learning_management_service)
- CVE-2022-25882 (onnx)
- CVE-2021-33642 (byacc)
- CVE-2022-38066 (quartz-gold_firmware)
- CVE-2022-38715 (quartz-gold_firmware)
- CVE-2022-25860 (simple-git)
- CVE-2022-25631 (symantec_endpoint_protection)
- CVE-2022-38459 (quartz-gold_firmware)
- CVE-2022-38088 (quartz-gold_firmware)
- CVE-2021-26642 (xpressengine)
- CVE-2022-25962 (vagrant.js)
- CVE-2022-36279 (quartz-gold_firmware)
- CVE-2022-25908 (create-choo-electron)
- CVE-2022-25927 (ua-parser-js)
- CVE-2022-39045 (quartz-gold_firmware)
- Baicells Nova
- Delta Electronics DVW-W02W2-E2
- Delta Electronics DX-2100-L1-CN
- Delta Electronics DIAScreen
- Mitsubishi Electric GOT2000 Series and GT SoftGOT2000
- CVE-2022-35977 (redis)
- CVE-2022-40719 (dir-2150_firmware)
- CVE-2018-25078 (man-db)
- CVE-2022-40720 (dir-2150_firmware)
- CVE-2022-40718 (dir-2150_firmware)
- CVE-2022-41140 (dir-867_firmware, dir-878_firmware, dir-882-us_firmware)
- CVE-2022-39193 (mediawiki)
- CVE-2022-3918 (swift_foundation)
- CERTFR-2023-AVI-0088 : Multiples vulnérabilités dans F5 BIG-IP (02 février 2023)
- CERTFR-2023-AVI-0087 : Vulnérabilité dans les produits NetApp (02 février 2023)
IT-OT collaboration needs context and increased visibility –
IT-OT collaboration needs context and increased visibility – Information technology (IT) and operational technology (OT) are continuing the process of […]
Secure design principles: Guides for the design of Cyber Secure systems: Security design principles and virtualisation
Secure design principles:Guides for the design of Cyber Secure systems:Security design principles and virtualisationhttps://www.ncsc.gov.uk/collection/cyber-security-design-principles/examples/study-virtualisationicssecurity, infosec, cybersecurity, criticalinfrastructure, IndustrialControlSystems, virtualisation
Secure design principles: Guides for the design of Cyber Secure systems: Design principles and Operational Technology
Secure design principles:Guides for the design of Cyber Secure systems:Design principles and Operational Technologyhttps://www.ncsc.gov.uk/collection/cyber-security-design-principles/examples/study-operational-techicssecurity, infosec, cybersecurity, criticalinfrastructure, IndustrialControlSystems, OT
Cybersecurity Capability Maturity Model (C2M2) Program
Cybersecurity Capability Maturity Model (C2M2) Programhttps://www.energy.gov/ceser/activities/cybersecurity-critical-energy-infrastructure/energy-sector-cybersecurity-0 icssecurity, infosec, cybersecurity, criticalinfrastructure, IndustrialControlSystems
Strategic Efficiency Consortium Security Intelligence Data Platform: Work Flow + Content Map – Jan 2019
SEC Industrial Security Intelligence Data Platform Work Flow SEC Industrial Security Intelligence Data Platform Content Map Updated Jan 2019 Document: […]
SEC Industrial Security Intelligence Data Platform 2019 Document
Strategic Efficiency Consortium Platform Work Flow Content Map Updated for 2019. SEC Industrial Security Intelligence Data Platform 2019 Document Document: […]
Strategic Efficiency Consortium Security Intelligence Reading and References – SEC Report
Reading and References Competitive Intelligence – CI For Beginners Part 1: Insight Work “Intelligence is a set […]
SEC Threat Intelligence as a Critical Organizational Need – SEC Report
The critical need for an evidence based, automated, holistic approach of the threat landscape. These are challenging times […]
SEC Security Data Services – SEC Report
This service is specifically designed to deliver well defined deliverables into critical intelligence demands of our client. These […]