Security CERT Global
- PTC Codebeamer
- SUBNET Substation Server
- CISA Releases Two Industrial Control Systems Advisories
- CERTFR-2024-AVI-0368 : [SCADA] Vulnérabilité dans Moxa NPort (07 mai 2024)
- CERTFR-2024-AVI-0369 : Multiples vulnérabilités dans les produits GLPI (07 mai 2024)
- Citrix frigiver rettelse til Citrix NetScaler som adressere kritisk sårbarhed i visse NetScaler komponenter
- JVN: Delta Electronics製DIAEnergieにおける複数の脆弱性
- JVN: トレンドマイクロ製ウイルスバスター クラウドにおけるファイルリンク解決処理の不備(CVE-2024-32849)
- ruby3.1: CVSS (Max): 5.5
- Android: CVSS (Max): 8.4*
- SUSE Manager Salt Bundle: CVSS (Max): 7.7
- SUSE Manager Client Tools: CVSS (Max): 6.5
- Linux Kernel (Live Patch 44 for SLE 15 SP2): CVSS (Max): 7.8
- kpatch-patch: CVSS (Max): 7.8
- glibc: CVSS (Max): 7.6
- SUSE Manager 4.3: CVSS (Max): 7.5
- less: CVSS (Max): 8.6
- SUSE Manager 4.3: Server, Proxy and Retail Branch Server: CVSS (Max): 7.5
- SUSE Manager Salt Bundle: CVSS (Max): 7.7
- less: CVSS (Max): 8.6
- unbound: CVSS (Max): 8.0
- SUSE Manager Client Tools: CVSS (Max): 9.1
- java-11-openjdk: CVSS (Max): 3.7
- grafana and mybatis: CVSS (Max): 6.5
- avahi: CVSS (Max): 6.2
- Linux Kernel (Live Patch 43 for SLE 12 SP5): CVSS (Max): 7.8
- SUSE Manager Salt Bundle: CVSS (Max): 7.7
- SUSE Manager Salt Bundle: CVSS (Max): 7.7
- SUSE Manager Salt Bundle: CVSS (Max): 7.7
- java-17-openjdk: CVSS (Max): 3.7
- Linux Kernel RT (Live Patch 1 for SLE 15 SP5): CVSS (Max): 7.1
- flatpak: CVSS (Max): 8.4
- Linux Kernel (Live Patch 42 for SLE 15 SP2): CVSS (Max): 7.8
- skopeo: CVSS (Max): None
- linux: CVSS (Max): 8.0
- flatpak: CVSS (Max): 8.4
- linux: CVSS (Max): 7.0
- curl: CVSS (Max): 6.5
- varnish: CVSS (Max): 7.5
- git-lfs: CVSS (Max): 7.5
- UPDATE ALERT GlobalProtect feature of PAN-OS: CVSS (Max): 10.0
- CERTFR-2024-ACT-020 : Bulletin d’actualité CERTFR-2024-ACT-020 (06 mai 2024)
- CERTFR-2024-AVI-0367 : Vulnérabilité dans SolarWinds Serv-U (06 mai 2024)
- TZCERT-SU-24-0461 (HP Security Update)
- TZCERT-SU-24-0463 (Lenovo Security Update)
- TZCERT-SU-24-0459 (NVIDIA Security Update)
- TZCERT-SU-24-0460 (IBM Security Update)
- TZCERT-SU-24-0462 (Red Hat Security Update)
- TZCERT-SU-24-0467 (Chrome Security Update)
- TZCERT-SU-24-0458 (Jenkins Security Update)
Secure design principles: Guides for the design of Cyber Secure systems: Security design principles and virtualisation
Secure design principles:Guides for the design of Cyber Secure systems:Security design principles and virtualisationhttps://www.ncsc.gov.uk/collection/cyber-security-design-principles/examples/study-virtualisationicssecurity, infosec, cybersecurity, criticalinfrastructure, IndustrialControlSystems, virtualisation
Secure design principles: Guides for the design of Cyber Secure systems: Design principles and Operational Technology
Secure design principles:Guides for the design of Cyber Secure systems:Design principles and Operational Technologyhttps://www.ncsc.gov.uk/collection/cyber-security-design-principles/examples/study-operational-techicssecurity, infosec, cybersecurity, criticalinfrastructure, IndustrialControlSystems, OT
Strategic Efficiency Consortium Security Intelligence Data Platform: Work Flow + Content Map – Jan 2019
SEC Industrial Security Intelligence Data Platform Work Flow SEC Industrial Security Intelligence Data Platform Content Map Updated Jan 2019 Document: […]
SEC Industrial Security Intelligence Data Platform 2019 Document
Strategic Efficiency Consortium Platform Work Flow Content Map Updated for 2019. SEC Industrial Security Intelligence Data Platform 2019 Document Document: […]
Strategic Efficiency Consortium Security Intelligence Reading and References – SEC Report
Reading and References Competitive Intelligence – CI For Beginners Part 1: Insight Work “Intelligence is a set […]
SEC Threat Intelligence as a Critical Organizational Need – SEC Report
The critical need for an evidence based, automated, holistic approach of the threat landscape. These are challenging times […]
SEC Security Data Services – SEC Report
This service is specifically designed to deliver well defined deliverables into critical intelligence demands of our client. These […]