Security CERT Global
- CERT/CC Reports R Programming Language Vulnerability
- CISA and Partners Release Fact Sheet on Defending OT Operations Against Ongoing Pro-Russia Hacktivist Activity
- CISA Adds One Known Exploited Vulnerability to Catalog
- JVN: Rプログラミング言語の実装において、安全でないデータのデシリアライゼーションが発生する問題(CVE-2024-27322)
- JVN: BMCソフトウェアのIPMIにおけるセッションハイジャックの脆弱性
- JVN: Delta Electronics製CNCSoft-G2におけるスタックベースのバッファオーバーフローの脆弱性
- Advanced Mobile Solutions (AMS) guidance trailer
- freerdp: CVSS (Max): 7.5
- libvirt: CVSS (Max): 5.0
- zziplib: CVSS (Max): 5.5
- python-jinja2: CVSS (Max): 5.4
- skopeo: CVSS (Max): 7.5
- container-tools:3.0: CVSS (Max): 7.5
- freeglut: CVSS (Max): 5.3
- pcp: CVSS (Max): 6.0
- motif: CVSS (Max): 5.5
- libnbd: CVSS (Max): 5.3
- mingw components: CVSS (Max): 7.0
- kernel: CVSS (Max): 7.8
- mod_http2: CVSS (Max): 7.5
- linux-firmware: CVSS (Max): 8.2
- perl: CVSS (Max): 7.0
- tcpdump: CVSS (Max): 5.5
- podman: CVSS (Max): 7.5
- xorg-x11-server-Xwayland: CVSS (Max): 9.8
- rhc-worker-script: CVSS (Max): 7.5
- buildah: CVSS (Max): 7.5
- libreswan: CVSS (Max): 5.0
- pmix: CVSS (Max): 8.1
- libreswan: CVSS (Max): 5.0
- podman: CVSS (Max): 8.6
- Gerbv: CVSS (Max): 5.5
- runc: CVSS (Max): 7.5
- kernel-rt: CVSS (Max): 7.1
- xorg-x11-server: CVSS (Max): 9.8
- frr: CVSS (Max): 7.5
- python3.11-urllib3: CVSS (Max): 5.9
- IBM MQ container software: CVSS (Max): 7.5
- container-tools:rhel8: CVSS (Max): 8.6
- F5 Products: CVSS (Max): 7.8
- libreswan: CVSS (Max): 5.0
- libsndfile: CVSS (Max): 7.8
- toolbox: CVSS (Max): 6.1
- libtiff: CVSS (Max): 6.5
- gstreamer1-plugins-bad-free: CVSS (Max): 6.3
- qt5-qtbase: CVSS (Max): 7.5
- python311: CVSS (Max): 8.4
- tigervnc: CVSS (Max): 7.0
- gstreamer1-plugins-base: CVSS (Max): 5.5
- python3.11: CVSS (Max): 5.3
Secure design principles: Guides for the design of Cyber Secure systems: Security design principles and virtualisation
Secure design principles:Guides for the design of Cyber Secure systems:Security design principles and virtualisationhttps://www.ncsc.gov.uk/collection/cyber-security-design-principles/examples/study-virtualisationicssecurity, infosec, cybersecurity, criticalinfrastructure, IndustrialControlSystems, virtualisation
Secure design principles: Guides for the design of Cyber Secure systems: Design principles and Operational Technology
Secure design principles:Guides for the design of Cyber Secure systems:Design principles and Operational Technologyhttps://www.ncsc.gov.uk/collection/cyber-security-design-principles/examples/study-operational-techicssecurity, infosec, cybersecurity, criticalinfrastructure, IndustrialControlSystems, OT
Strategic Efficiency Consortium Security Intelligence Data Platform: Work Flow + Content Map – Jan 2019
SEC Industrial Security Intelligence Data Platform Work Flow SEC Industrial Security Intelligence Data Platform Content Map Updated Jan 2019 Document: […]
SEC Industrial Security Intelligence Data Platform 2019 Document
Strategic Efficiency Consortium Platform Work Flow Content Map Updated for 2019. SEC Industrial Security Intelligence Data Platform 2019 Document Document: […]
Strategic Efficiency Consortium Security Intelligence Reading and References – SEC Report
Reading and References Competitive Intelligence – CI For Beginners Part 1: Insight Work “Intelligence is a set […]
SEC Threat Intelligence as a Critical Organizational Need – SEC Report
The critical need for an evidence based, automated, holistic approach of the threat landscape. These are challenging times […]
SEC Security Data Services – SEC Report
This service is specifically designed to deliver well defined deliverables into critical intelligence demands of our client. These […]