Security CERT Global
- CERTFR-2024-AVI-0331 : Multiples vulnérabilités dans SolarWinds Platform (19 avril 2024)
- CERTFR-2024-AVI-0327 : Multiples vulnérabilités dans Microsoft Edge (19 avril 2024)
- CERTFR-2024-AVI-0332 : Multiples vulnérabilités dans les produits Red Hat (19 avril 2024)
- CERTFR-2024-AVI-0330 : Multiples vulnérabilités dans les produits IBM (19 avril 2024)
- CERTFR-2024-AVI-0333 : Multiples vulnérabilités dans le noyau Linux d’Ubuntu (19 avril 2024)
- CERTFR-2024-AVI-0328 : Vulnérabilité dans Citrix uberAgent (19 avril 2024)
- CERTFR-2024-AVI-0329 : Multiples vulnérabilités dans le noyau Linux de SUSE (19 avril 2024)
- CERTFR-2024-AVI-0334 : Multiples vulnérabilités dans le noyau Linux de Debian (19 avril 2024)
- Cisco Releases Security Advisories for Cisco Integrated Management Controller
- CERT-SE:s veckobrev v.16
- LINE client for iOS vulnerable to improper server certificate verification
- Armeria-saml improperly handles SAML messages
- tzdata: CVSS (Max): None
- firefox: CVSS (Max): 7.5
- sssd: CVSS (Max): 7.1
- firefox: CVSS (Max): 7.5
- tomcat: CVSS (Max): 7.5
- Migration Toolkit for Runtimes: CVSS (Max): 5.9
- firefox: CVSS (Max): 7.5
- OpenJDK 21.0.3: CVSS (Max): 3.7
- Red Hat Service Interconnect 1.5.3: CVSS (Max): 7.5
- sssd: CVSS (Max): 7.1
- firefox: CVSS (Max): 7.5
- firefox: CVSS (Max): 7.5
- firefox: CVSS (Max): 7.5
- sssd: CVSS (Max): 7.1
- firefox: CVSS (Max): 7.5
- Migration Toolkit for Runtimes: CVSS (Max): 5.9
- sssd: CVSS (Max): 7.1
- Migration Toolkit for Containers (MTC) 1.8.3: CVSS (Max): 6.5
- firefox: CVSS (Max): 7.5
- firefox: CVSS (Max): 7.5
- kernel: CVSS (Max): 6.7
- shim: CVSS (Max): 8.3
- Red Hat Update Infrastructure (RHUI): CVSS (Max): 7.5
- gnutls: CVSS (Max): 5.3
- rhc-worker-script: CVSS (Max): 5.9
- nodejs:18: CVSS (Max): 8.1
- kernel-rt: CVSS (Max): 6.7
- kernel: CVSS (Max): 7.1
- Unitronics Vision Series PLCs: CVSS (Max): 7.5
- mod_http2: CVSS (Max): 7.5
- shim: CVSS (Max): 8.3
- less: CVSS (Max): 7.0
- shim: CVSS (Max): 8.3
- CISA and Partners Release Advisory on Akira Ransomware
- #StopRansomware: Akira Ransomware
- Unitronics Vision Series PLCs
- Oracles kvartalsvisa säkerhetsuppdatering för april 2024
- CISA Releases Three Industrial Control Systems Advisories
Secure design principles: Guides for the design of Cyber Secure systems: Security design principles and virtualisation
Secure design principles:Guides for the design of Cyber Secure systems:Security design principles and virtualisationhttps://www.ncsc.gov.uk/collection/cyber-security-design-principles/examples/study-virtualisationicssecurity, infosec, cybersecurity, criticalinfrastructure, IndustrialControlSystems, virtualisation
Secure design principles: Guides for the design of Cyber Secure systems: Design principles and Operational Technology
Secure design principles:Guides for the design of Cyber Secure systems:Design principles and Operational Technologyhttps://www.ncsc.gov.uk/collection/cyber-security-design-principles/examples/study-operational-techicssecurity, infosec, cybersecurity, criticalinfrastructure, IndustrialControlSystems, OT
Strategic Efficiency Consortium Security Intelligence Data Platform: Work Flow + Content Map – Jan 2019
SEC Industrial Security Intelligence Data Platform Work Flow SEC Industrial Security Intelligence Data Platform Content Map Updated Jan 2019 Document: […]
SEC Industrial Security Intelligence Data Platform 2019 Document
Strategic Efficiency Consortium Platform Work Flow Content Map Updated for 2019. SEC Industrial Security Intelligence Data Platform 2019 Document Document: […]
Strategic Efficiency Consortium Security Intelligence Reading and References – SEC Report
Reading and References Competitive Intelligence – CI For Beginners Part 1: Insight Work “Intelligence is a set […]
SEC Threat Intelligence as a Critical Organizational Need – SEC Report
The critical need for an evidence based, automated, holistic approach of the threat landscape. These are challenging times […]
SEC Security Data Services – SEC Report
This service is specifically designed to deliver well defined deliverables into critical intelligence demands of our client. These […]