Security CERT Global
- CVE-2023-0183
- CVE-2023-0182
- CVE-2023-0197
- CVE-2023-1790
- CVE-2023-0181
- CVE-2023-0187
- CVE-2023-0192
- CVE-2023-0198
- CVE-2023-0191
- CVE-2023-0194
- CVE-2023-0180
- CVE-2023-0188
- CVE-2023-0185
- CVE-2023-0195
- CVE-2023-0189
- CVE-2023-0186
- CVE-2023-0335 (wp_shamsi)
- CVE-2023-0441 (simply_gallery_blocks_with_lightbox)
- CVE-2023-0241 (pgadmin_4)
- CVE-2023-0467 (wp_dark_mode)
- CVE-2023-0395 (menu_shortcode)
- CVE-2023-0336 (ooohboi_steroids_for_elementor)
- CVE-2022-47188
- CVE-2022-47190
- CVE-2022-47189
- CVE-2023-28844
- CVE-2023-28645
- CVE-2023-26485
- CVE-2023-28845
- CVE-2022-47191
- CVE-2022-47192
- CVE-2023-24824
- Samba Releases Security Updates for Multiple Versions of Samba
- Mozilla Releases Security Update for Thunderbird 102.9.1
- CERTFR-2023-AVI-0278 : Multiples vulnérabilités dans le noyau Linux d’Ubuntu (31 mars 2023)
- CERTFR-2023-ALE-003 : Compromission de l’application 3CX Desktop App (31 mars 2023)
- CERTFR-2023-AVI-0277 : Multiples vulnérabilités dans le noyau Linux de SUSE (31 mars 2023)
- CERTFR-2023-AVI-0276 : Multiples vulnérabilités dans les produits IBM (31 mars 2023)
- CERTFR-2023-AVI-0279 : Multiples vulnérabilités dans le noyau Linux de RedHat (31 mars 2023)
- CERTFR-2023-AVI-0275 : Multiples vulnérabilités dans GitLab (31 mars 2023)
- CERT-SE:s veckobrev v.13
- Sårbarhet i VoIP-tjänsten 3CX utnyttjas för angrepp mot kunder
- Campaña de distribución de software troyanizado contra 3CX DesktopApp
- Campaña de distribución de software troyanizado contra 3CX DesktopApp
- JVN: Hitachi Energy製IEC 61850 MMS-Serverにおけるリソースの不適切なシャットダウンまたはリリースの脆弱性
- ESB-2023.1905 - [Win][UNIX/Linux] GitLab: CVSS (Max): 3.8*
- ESB-2023.1904 - [Ubuntu] musl: CVSS (Max): 9.8
- CVE-2023-1746
- CVE-2023-1670
- CVE-2023-1741
Secure design principles: Guides for the design of Cyber Secure systems: Security design principles and virtualisation
Secure design principles:Guides for the design of Cyber Secure systems:Security design principles and virtualisationhttps://www.ncsc.gov.uk/collection/cyber-security-design-principles/examples/study-virtualisationicssecurity, infosec, cybersecurity, criticalinfrastructure, IndustrialControlSystems, virtualisation
Secure design principles: Guides for the design of Cyber Secure systems: Design principles and Operational Technology
Secure design principles:Guides for the design of Cyber Secure systems:Design principles and Operational Technologyhttps://www.ncsc.gov.uk/collection/cyber-security-design-principles/examples/study-operational-techicssecurity, infosec, cybersecurity, criticalinfrastructure, IndustrialControlSystems, OT
Cybersecurity Capability Maturity Model (C2M2) Program
Cybersecurity Capability Maturity Model (C2M2) Programhttps://www.energy.gov/ceser/activities/cybersecurity-critical-energy-infrastructure/energy-sector-cybersecurity-0 icssecurity, infosec, cybersecurity, criticalinfrastructure, IndustrialControlSystems
Strategic Efficiency Consortium Security Intelligence Data Platform: Work Flow + Content Map – Jan 2019
SEC Industrial Security Intelligence Data Platform Work Flow SEC Industrial Security Intelligence Data Platform Content Map Updated Jan 2019 Document: […]
SEC Industrial Security Intelligence Data Platform 2019 Document
Strategic Efficiency Consortium Platform Work Flow Content Map Updated for 2019. SEC Industrial Security Intelligence Data Platform 2019 Document Document: […]
Strategic Efficiency Consortium Security Intelligence Reading and References – SEC Report
Reading and References Competitive Intelligence – CI For Beginners Part 1: Insight Work “Intelligence is a set […]
SEC Threat Intelligence as a Critical Organizational Need – SEC Report
The critical need for an evidence based, automated, holistic approach of the threat landscape. These are challenging times […]
SEC Security Data Services – SEC Report
This service is specifically designed to deliver well defined deliverables into critical intelligence demands of our client. These […]