Security CERT Global
- Pathways: exploring a new way to achieve Cyber Essentials certification
- Sårbarheter i Cisco-produkter utnyttjas aktivt
- Sikkerhedsopdateringer fra Cisco
- お知らせ:インシデント報告Webフォームメンテナンス(2024/05/16)のお知らせ
- Cisco Releases Security Updates Addressing ArcaneDoor, Vulnerabilities in Cisco Firewall Platforms
- CISA Adds Three Known Exploited Vulnerabilities to Catalog
- CERTFR-2024-AVI-0343 : Multiples vulnérabilités dans Google Chrome (24 avril 2024)
- CERTFR-2024-AVI-0342 : Multiples vulnérabilités dans NagiosXI (24 avril 2024)
- Sårbarhet i Progress Flowmon
- Tager ansvar for cyberangreb på vandværk i USA
- ICS Security Conference 2024
- JVN: NETGEAR製ルーターにおけるバッファオーバーフローの脆弱性
- JVN: RoamWiFi R10における複数の脆弱性
- NETGEAR routers vulnerable to buffer overflow
- Multiple vulnerabilities in RoamWiFi R10
- Linux kernel: CVSS (Max): 7.8
- Linux Kernel (Live Patch 6 for SLE 15 SP5): CVSS (Max): 7.8
- Linux Kernel (Live Patch 10 for SLE 15 SP5): CVSS (Max): 7.8
- Linux Kernel (Live Patch 8 for SLE 15 SP5): CVSS (Max): 7.8
- Ruby: CVSS (Max): None
- jasper: CVSS (Max): 7.5
- Linux Kernel (Live Patch 47 for SLE 12 SP5): CVSS (Max): 7.8
- qemu: CVSS (Max): 8.2
- qemu: CVSS (Max): 8.2
- Linux Kernel: CVSS (Max): 7.8
- Linux Kernel: CVSS (Max): 7.8
- kubernetes1.23: CVSS (Max): 2.7
- Linux Kernel: CVSS (Max): 7.8
- Google Guest Agent and Google OS Config Agent: CVSS (Max): 5.9
- opensc: CVSS (Max): 4.4
- Linux Kernel: CVSS (Max): 7.8
- kubernetes1.24: CVSS (Max): 2.7
- glibc: CVSS (Max): 8.8
- Linux Kernel: CVSS (Max): 7.8
- Squid: CVSS (Max): 8.6
- Weekly Report: PuTTY SSHクライアントのECDSA署名処理に脆弱性
- Weekly Report: Proscend Communications製M330-WおよびM330-W5におけるOSコマンドインジェクションの脆弱性
- Weekly Report: 2024年4月Oracle Critical Patch Updateについて
- Weekly Report: WordPress用プラグインForminatorにおける複数の脆弱性
- Weekly Report: LINE client for iOSにおけるサーバ証明書の検証不備の脆弱性
- Weekly Report: 経済産業省が「工場システムにおけるサイバー・フィジカル・セキュリティ対策ガイドラインVer 1.0」および「工場システムにおけるサイバー・フィジカル・セキュリティ対策ガイドライン【別冊:スマート化を進める上でのポイント】」の英訳版を公表
- Weekly Report: TensorFlowベースのKerasモデルに含まれるLambdaレイヤにコードインジェクションが発生する問題
- Weekly Report: バッファロー製無線LANルーターに複数の脆弱性
- Weekly Report: CISAが「Deploying AI Systems Securely」を公表
- Weekly Report: IPAが「アタックサーフェスの Operational Relay Box 化を伴うネットワーク貫通型攻撃について Adobe ColdFusion の脆弱性(CVE-2023-29300)を狙う攻撃」に関する注意喚起を公表
- Weekly Report: LINEヤフー社製Armeria-samlにおけるSAMLメッセージ取り扱い不備
- CISA Adds One Known Exploited Vulnerability to Catalog
- CISA Releases Two Industrial Control Systems Advisories
- Udnyttelse af Palo Altofirewalls igang
- Microsoft: APT28 udnytter Windows-fejl
Secure design principles: Guides for the design of Cyber Secure systems: Security design principles and virtualisation
Secure design principles:Guides for the design of Cyber Secure systems:Security design principles and virtualisationhttps://www.ncsc.gov.uk/collection/cyber-security-design-principles/examples/study-virtualisationicssecurity, infosec, cybersecurity, criticalinfrastructure, IndustrialControlSystems, virtualisation
Secure design principles: Guides for the design of Cyber Secure systems: Design principles and Operational Technology
Secure design principles:Guides for the design of Cyber Secure systems:Design principles and Operational Technologyhttps://www.ncsc.gov.uk/collection/cyber-security-design-principles/examples/study-operational-techicssecurity, infosec, cybersecurity, criticalinfrastructure, IndustrialControlSystems, OT
Strategic Efficiency Consortium Security Intelligence Data Platform: Work Flow + Content Map – Jan 2019
SEC Industrial Security Intelligence Data Platform Work Flow SEC Industrial Security Intelligence Data Platform Content Map Updated Jan 2019 Document: […]
SEC Industrial Security Intelligence Data Platform 2019 Document
Strategic Efficiency Consortium Platform Work Flow Content Map Updated for 2019. SEC Industrial Security Intelligence Data Platform 2019 Document Document: […]
Strategic Efficiency Consortium Security Intelligence Reading and References – SEC Report
Reading and References Competitive Intelligence – CI For Beginners Part 1: Insight Work “Intelligence is a set […]
SEC Threat Intelligence as a Critical Organizational Need – SEC Report
The critical need for an evidence based, automated, holistic approach of the threat landscape. These are challenging times […]
SEC Security Data Services – SEC Report
This service is specifically designed to deliver well defined deliverables into critical intelligence demands of our client. These […]