Security CERT Global
- CISA and Partners Release Advisory on Akira Ransomware
- #StopRansomware: Akira Ransomware
- Unitronics Vision Series PLCs
- Oracles kvartalsvisa säkerhetsuppdatering för april 2024
- CISA Releases Three Industrial Control Systems Advisories
- Stellungnahme von CERT.at zum NISG 2024
- CERTFR-2024-AVI-0320 : Multiples vulnérabilités dans Oracle VirtualBox (18 avril 2024)
- CERTFR-2024-AVI-0318 : Multiples vulnérabilités dans les produits Mitel (18 avril 2024)
- CERTFR-2024-AVI-0321 : Multiples vulnérabilités dans Oracle Java SE (18 avril 2024)
- CERTFR-2024-AVI-0322 : Multiples vulnérabilités dans Oracle Database Server (18 avril 2024)
- CERTFR-2024-AVI-0317 : Vulnérabilité dans Cisco ClamAV (18 avril 2024)
- CERTFR-2024-AVI-0325 : Multiples vulnérabilités dans Oracle PeopleSoft (18 avril 2024)
- CERTFR-2024-AVI-0319 : Multiples vulnérabilités dans les produits Cisco (18 avril 2024)
- CERTFR-2024-AVI-0323 : Multiples vulnérabilités dans Oracle Weblogic (18 avril 2024)
- CERTFR-2024-AVI-0324 : Multiples vulnérabilités dans Oracle Systems (18 avril 2024)
- CERTFR-2024-AVI-0326 : Multiples vulnérabilités dans Oracle MySQL (18 avril 2024)
- CERTFR-2024-AVI-0316 : Vulnérabilité dans les produits Xen (18 avril 2024)
- Oracle Releases Critical Patch Update Advisory for April 2024
- Allvarlig sårbarhet i Cisco IMC
- Cyber Assessment Framework 3.2
- Securing Office 365 with better configuration
- Shaping Cybersecurity Policy towards a trusted and secure Europe
- 'NCSC Cyber Series' podcast now available on Spotify
- JVN: PuTTY SSHクライアントのECDSA署名処理に脆弱性
- JVN: WordPress用プラグインForminatorにおける複数の脆弱性
- Multiple vulnerabilities in WordPress Plugin "Forminator"
- お知らせ:ソフトウェア等の脆弱性関連情報に関する届出状況[2024年第1四半期(1月~3月)]
- firefox-esr: CVSS (Max): 7.5*
- Red Hat Single Sign-On: CVSS (Max): 8.1
- Jenkins (core): CVSS (Max): 5.9
- jetty9: CVSS (Max): 7.5
- Red Hat Single Sign-On: CVSS (Max): 8.1
- Apache HTTP Server: CVSS (Max): 7.5
- Red Hat Single Sign-On: CVSS (Max): 8.1
- java-1.8.0-openjdk: CVSS (Max): 3.7
- Cisco IOS and IOS XE Software: CVSS (Max): None
- Red Hat build of Keycloak 22.0.10: CVSS (Max): 8.1
- Cisco Integrated Management Controller (IMC): CVSS (Max): None
- tomcat10: CVSS (Max): 7.5
- Red Hat build of Keycloak: CVSS (Max): 8.1
- Red Hat Single Sign-On: CVSS (Max): 8.1
- Xen: CVSS (Max): 4.7
- Cisco Integrated Management Controller (IMC): CVSS (Max): 8.7
- Linux Kernel: CVSS (Max): 7.8
- Red Hat Single Sign-On 7.6: CVSS (Max): 8.1
- お知らせ:JPCERT/CC インシデント報告対応レポート[2024年1月1日~2024年3月31日]
- お知らせ:JPCERT/CC 活動四半期レポート[2024年1月1日~2024年3月31日]
- CERTFR-2024-CTI-003 : Grands évènements sportifs en France – Évaluation de la menace 2024 (17 avril 2024)
- CERTFR-2024-AVI-0312 : Multiples vulnérabilités dans les produits Atlassian (17 avril 2024)
- CERTFR-2024-AVI-0314 : Multiples vulnérabilités dans Ivanti Avalanche (17 avril 2024)
IT-OT collaboration needs context and increased visibility –
IT-OT collaboration needs context and increased visibility – Information technology (IT) and operational technology (OT) are continuing the process of […]
Secure design principles: Guides for the design of Cyber Secure systems: Security design principles and virtualisation
Secure design principles:Guides for the design of Cyber Secure systems:Security design principles and virtualisationhttps://www.ncsc.gov.uk/collection/cyber-security-design-principles/examples/study-virtualisationicssecurity, infosec, cybersecurity, criticalinfrastructure, IndustrialControlSystems, virtualisation
Secure design principles: Guides for the design of Cyber Secure systems: Design principles and Operational Technology
Secure design principles:Guides for the design of Cyber Secure systems:Design principles and Operational Technologyhttps://www.ncsc.gov.uk/collection/cyber-security-design-principles/examples/study-operational-techicssecurity, infosec, cybersecurity, criticalinfrastructure, IndustrialControlSystems, OT
Cybersecurity Capability Maturity Model (C2M2) Program
Cybersecurity Capability Maturity Model (C2M2) Programhttps://www.energy.gov/ceser/activities/cybersecurity-critical-energy-infrastructure/energy-sector-cybersecurity-0 icssecurity, infosec, cybersecurity, criticalinfrastructure, IndustrialControlSystems
Strategic Efficiency Consortium Security Intelligence Data Platform: Work Flow + Content Map – Jan 2019
SEC Industrial Security Intelligence Data Platform Work Flow SEC Industrial Security Intelligence Data Platform Content Map Updated Jan 2019 Document: […]
SEC Industrial Security Intelligence Data Platform 2019 Document
Strategic Efficiency Consortium Platform Work Flow Content Map Updated for 2019. SEC Industrial Security Intelligence Data Platform 2019 Document Document: […]
Strategic Efficiency Consortium Security Intelligence Reading and References – SEC Report
Reading and References Competitive Intelligence – CI For Beginners Part 1: Insight Work “Intelligence is a set […]
SEC Threat Intelligence as a Critical Organizational Need – SEC Report
The critical need for an evidence based, automated, holistic approach of the threat landscape. These are challenging times […]
SEC Security Data Services – SEC Report
This service is specifically designed to deliver well defined deliverables into critical intelligence demands of our client. These […]