Security CERT Global
- Shaping Cybersecurity Policy towards a trusted and secure Europe
- 'NCSC Cyber Series' podcast now available on Spotify
- JVN: PuTTY SSHクライアントのECDSA署名処理に脆弱性
- JVN: WordPress用プラグインForminatorにおける複数の脆弱性
- Multiple vulnerabilities in WordPress Plugin "Forminator"
- お知らせ:ソフトウェア等の脆弱性関連情報に関する届出状況[2024年第1四半期(1月~3月)]
- Linux Kernel: CVSS (Max): 7.8
- Red Hat Single Sign-On: CVSS (Max): 8.1
- Jenkins (core): CVSS (Max): 5.9
- tomcat10: CVSS (Max): 7.5
- Red Hat build of Keycloak 22.0.10: CVSS (Max): 8.1
- Apache HTTP Server: CVSS (Max): 7.5
- Red Hat Single Sign-On: CVSS (Max): 8.1
- Red Hat build of Keycloak: CVSS (Max): 8.1
- Cisco Integrated Management Controller (IMC): CVSS (Max): 8.7
- Red Hat Single Sign-On: CVSS (Max): 8.1
- Xen: CVSS (Max): 4.7
- Cisco IOS and IOS XE Software: CVSS (Max): None
- Cisco Integrated Management Controller (IMC): CVSS (Max): None
- jetty9: CVSS (Max): 7.5
- java-1.8.0-openjdk: CVSS (Max): 3.7
- Red Hat Single Sign-On: CVSS (Max): 8.1
- Red Hat Single Sign-On 7.6: CVSS (Max): 8.1
- firefox-esr: CVSS (Max): 7.5*
- お知らせ:JPCERT/CC 活動四半期レポート[2024年1月1日~2024年3月31日]
- お知らせ:JPCERT/CC インシデント報告対応レポート[2024年1月1日~2024年3月31日]
- CERTFR-2024-AVI-0312 : Multiples vulnérabilités dans les produits Atlassian (17 avril 2024)
- CERTFR-2024-AVI-0315 : Vulnérabilité dans SolarWinds Serv-U (17 avril 2024)
- CERTFR-2024-AVI-0311 : Multiples vulnérabilités dans les produits Mozilla (17 avril 2024)
- CERTFR-2024-AVI-0313 : Multiples vulnérabilités dans Google Chrome (17 avril 2024)
- CERTFR-2024-CTI-003 : Grands évènements sportifs en France – Évaluation de la menace 2024 (17 avril 2024)
- CERTFR-2024-AVI-0314 : Multiples vulnérabilités dans Ivanti Avalanche (17 avril 2024)
- Kritiska sårbarheter i Ivanti Avalance
- Watch all the plenaries from CYBERUK 2024 live, and for free
- Oracle GoldenGate: CVSS (Max): 7.5
- Oracle Health Sciences Applications: CVSS (Max): 6.5
- Oracle Financial Services Applications: CVSS (Max): 8.8
- Oracle Hospitality Applications: CVSS (Max): 7.5
- Oracle E-Business Suite: CVSS (Max): 9.1
- Oracle Fusion Middleware: CVSS (Max): 9.8
- Oracle HealthCare Applications: CVSS (Max): 9.8
- Oracle Global Lifecycle Management: CVSS (Max): 5.9
- Oracle Food and Beverage Applications: CVSS (Max): 9.9
- Oracle Enterprise Manager: CVSS (Max): 9.8
- JVN: Electrolink製FM/DAB/TV Transmitterにおける複数の脆弱性
- JVN: 複数のRockwell Automation製品における不適切な入力確認の脆弱性
- JVN: Measuresoft製ScadaProにおける不適切なアクセス制御の脆弱性
- JVN: RoboDKにおけるヒープベースのバッファオーバーフローの脆弱性
- Atlassian Products: CVSS (Max): 8.2*
- Oracle Database Server: CVSS (Max): 5.9
Secure design principles: Guides for the design of Cyber Secure systems: Security design principles and virtualisation
Secure design principles:Guides for the design of Cyber Secure systems:Security design principles and virtualisationhttps://www.ncsc.gov.uk/collection/cyber-security-design-principles/examples/study-virtualisationicssecurity, infosec, cybersecurity, criticalinfrastructure, IndustrialControlSystems, virtualisation
Secure design principles: Guides for the design of Cyber Secure systems: Design principles and Operational Technology
Secure design principles:Guides for the design of Cyber Secure systems:Design principles and Operational Technologyhttps://www.ncsc.gov.uk/collection/cyber-security-design-principles/examples/study-operational-techicssecurity, infosec, cybersecurity, criticalinfrastructure, IndustrialControlSystems, OT
Strategic Efficiency Consortium Security Intelligence Data Platform: Work Flow + Content Map – Jan 2019
SEC Industrial Security Intelligence Data Platform Work Flow SEC Industrial Security Intelligence Data Platform Content Map Updated Jan 2019 Document: […]
SEC Industrial Security Intelligence Data Platform 2019 Document
Strategic Efficiency Consortium Platform Work Flow Content Map Updated for 2019. SEC Industrial Security Intelligence Data Platform 2019 Document Document: […]
Strategic Efficiency Consortium Security Intelligence Reading and References – SEC Report
Reading and References Competitive Intelligence – CI For Beginners Part 1: Insight Work “Intelligence is a set […]
SEC Threat Intelligence as a Critical Organizational Need – SEC Report
The critical need for an evidence based, automated, holistic approach of the threat landscape. These are challenging times […]
SEC Security Data Services – SEC Report
This service is specifically designed to deliver well defined deliverables into critical intelligence demands of our client. These […]