Security CERT Global
- Weekly Report: Panasonic製KW Watcherに複数の脆弱性
- Weekly Report: 複数のCisco製品に脆弱性
- Weekly Report: 複数のMozilla製品に脆弱性
- Weekly Report: Trend Micro Mobile Securityにクロスサイトスクリプティングの脆弱性
- Weekly Report: NISCが「サイバーセキュリティ関係法令Q&AハンドブックVer2.0」を公開
- Weekly Report: 複数のApple製品に脆弱性
- CISA Adds One Known Exploited Vulnerability to Catalog
- WordPress Security Update
- F5 Security Update
- DebianOS Security Update
- SUSE Security Update
- Gentoo Security Update
- HP Security Update
- Exim Security Update
- Mediatek Security Update
- GitLab Security Update
- IBM Security Update
- CERTFR-2023-AVI-0799 : Vulnérabilité dans les produits Microsoft (03 octobre 2023)
- CERTFR-2023-AVI-0798 : Multiples vulnérabilités dans les produits IBM (03 octobre 2023)
- ESB-2023.5651 - [Appliance] F5 BIG-IP and BIG IQ Products: CVSS (Max): 4.4
- ESB-2023.5650 - [Appliance] F5 BIG-IP and BIG-IQ Products: CVSS (Max): 2.2
- ASB-2023.0180 - Quishing attacks:
- ESB-2023.5652 - [Cisco] Cisco Routers:
- ESB-2023.5649 - [Linux] IBM Security QRadar SIEM: CVSS (Max): 7.1
- ESB-2023.5648 - [Win][Linux][AIX] IBM App Connect Enterprise: CVSS (Max): 7.1
- ESB-2023.5627 - [SUSE] iperf: CVSS (Max): 7.4
- ESB-2023.5643 - [SUSE] Linux Kernel (Live Patch 1 for SLE 15 SP5): CVSS (Max): 7.8
- ESB-2023.5630 - [SUSE] MozillaFirefox: CVSS (Max): 7.5
- ESB-2023.5631 - [Debian] libvpx: CVSS (Max): 8.8*
- ESB-2023.5644 - [SUSE] Linux Kernel (Live Patch 26 for SLE 15 SP3): CVSS (Max): 7.8
- ESB-2023.5638 - [Debian] exim4: CVSS (Max): 8.1
- ESB-2023.5634 - [Appliance] Traffix SDC: CVSS (Max): 5.5
- ESB-2023.5632 - [Debian] firefox-esr: CVSS (Max): 9.8
- ESB-2023.5646 - [SUSE] python: CVSS (Max): 7.4
- ESB-2023.5639 - [Ubuntu] LibTomMath: CVSS (Max): 9.8
- ESB-2023.5635 - [SUSE] Linux Kernel (Live Patch 13 for SLE 15 SP4): CVSS (Max): 7.8
- ESB-2023.5642 - [SUSE] Linux Kernel (Live Patch 3 for SLE 15 SP5): CVSS (Max): 7.8
- ESB-2023.5641 - Linux Kernel (Live Patch 35 for SLE 15 SP3): CVSS (Max): 7.8
- ESB-2023.5628 - [SUSE] Golang Prometheus: CVSS (Max): 7.5
- ESB-2023.5640 - [SUSE] Linux Kernel (Live Patch 2 for SLE 15 SP5): CVSS (Max): 7.8
- ESB-2023.5645 - [SUSE] bind: CVSS (Max): 7.5
- ESB-2023.5633 - [RedHat] OpenShift GitOps: CVSS (Max): 7.5
- ESB-2023.5637 - [Debian] exim4: CVSS (Max): 9.8
- ESB-2023.5629 - [SUSE] xen: CVSS (Max): 7.5
- ESB-2023.5636 - [Appliance] F5 Products: CVSS (Max): 8.8*
- ESB-2023.5622 - [SUSE] libqb: CVSS (Max): 5.9
- ESB-2023.5621 - [SUSE] Linux Kernel (Live Patch 39 for SLE 15 SP2): CVSS (Max): 7.8
- ESB-2023.5619 - [SUSE] Linux Kernel (Live Patch 23 for SLE 15 SP3): CVSS (Max): 7.8
- ESB-2023.5620 - [SUSE] xen: CVSS (Max): 7.5
- ESB-2023.5625 - [SUSE] xen: CVSS (Max): 7.5
Secure design principles: Guides for the design of Cyber Secure systems: Security design principles and virtualisation
Secure design principles:Guides for the design of Cyber Secure systems:Security design principles and virtualisationhttps://www.ncsc.gov.uk/collection/cyber-security-design-principles/examples/study-virtualisationicssecurity, infosec, cybersecurity, criticalinfrastructure, IndustrialControlSystems, virtualisation
Secure design principles: Guides for the design of Cyber Secure systems: Design principles and Operational Technology
Secure design principles:Guides for the design of Cyber Secure systems:Design principles and Operational Technologyhttps://www.ncsc.gov.uk/collection/cyber-security-design-principles/examples/study-operational-techicssecurity, infosec, cybersecurity, criticalinfrastructure, IndustrialControlSystems, OT
SCADA vulnerabilities in ICS architectures
SCADA vulnerabilities in ICS architectures infosec, cybersecurity. IIoT, ICSaaS, scada, cloudscada
Cybersecurity Capability Maturity Model (C2M2) Program
Cybersecurity Capability Maturity Model (C2M2) Programhttps://www.energy.gov/ceser/activities/cybersecurity-critical-energy-infrastructure/energy-sector-cybersecurity-0 icssecurity, infosec, cybersecurity, criticalinfrastructure, IndustrialControlSystems
Research Library Updates
Feb 18-2019 Reports Added To Library: Privacy Maturity Model AICPA CICA Canada Cyber Security Centre Canada Effective Regional Cyberthreat […]
Strategic Efficiency Consortium Security Intelligence Data Platform: Work Flow + Content Map – Jan 2019
SEC Industrial Security Intelligence Data Platform Work Flow SEC Industrial Security Intelligence Data Platform Content Map Updated Jan 2019 Document: […]
SEC Industrial Security Intelligence Data Platform 2019 Document
Strategic Efficiency Consortium Platform Work Flow Content Map Updated for 2019. SEC Industrial Security Intelligence Data Platform 2019 Document Document: […]
7 Habits of Highly Successful Competitive Intelligence Analysts
1) Be Organized and Disciplined 2) Communicate with Confidence, Clarity, and Credibility 3) Find Meaningful Patterns in Meaningless Noise […]
Top 5 Competitive Intelligence Deliverables to Drive your Project Forward
Running a Competitive Intelligence monitoring project is similar putting oil into your car. First, you need to identify what […]
Strategic Efficiency Consortium Security Intelligence Reading and References – SEC Report
Reading and References Competitive Intelligence – CI For Beginners Part 1: Insight Work “Intelligence is a set […]
SEC Threat Intelligence as a Critical Organizational Need – SEC Report
The critical need for an evidence based, automated, holistic approach of the threat landscape. These are challenging times […]
7 Practical Steps to Get Started with Security Intelligence
…What Practical Steps Can I Take to Get Started with Security Intelligence?… Source: https://securityintelligence.com/7-practical-steps-to-get-started-with-security-intelligence/
SEC Security Data Services – SEC Report
This service is specifically designed to deliver well defined deliverables into critical intelligence demands of our client. These […]
Threat Intelligence, Information, and Data: What Is the Difference?
Threat Intelligence, Information, and Data: What Is the Difference? Key Takeaways There’s a huge difference between threat data, information, and […]
SEC Automation: Choosing the Right Systems Integrator for your Automation Project
Choosing the Right Systems Integrator for your Automation Project – Industrial Control Systems: SCADA – Systems Integrators Many automation system projects […]
Competitive Intelligence – CI For Beginners Part 2: Engaging the Process
How do we take this academic model of intelligence, and put it to work? …Each path you decide to […]
Competitive Intelligence – CI For Beginners Part 1: Insight Work
It is much easier to answer what intelligence work DOES — it provides a 360-degree view of the past, present, and potential […]
Threat Intelligence could turn the tide against cybercriminals
Threat Intelligence could turn the tide against cybercriminals Now that many security tools are generating alerts about possible […]
How Do Security Intelligence Solutions Differ from First-Gen SIEM Products
….let’s draw a clear picture of how modern Security Intelligence solutions evolved – and differ – from first-generation SIEM products…. […]
What Is Security Intelligence and Why Does It Matter Today?
… “Security intelligence is the real-time collection, normalization, and analysis of the data generated by users, applications and infrastructure that […]
Six Things You Always Wanted to Know about Security Intelligence but Were Afraid to Ask
Clear answers to practical questions about Security Intelligence: What is Security Intelligence and why does it matter today? How […]
How Quickly Can You Realize ROI on Your Security Intelligence Deployment?
Today’s Security Intelligence solutions learned from the mistakes of the past and are delivering value in days. Here’s how… […]
The Definition of Security Intelligence
IBM Security Intelligence Product Expert offers strategy guidance to help IT security teams detect and respond to threats in today’s […]
What Are the Benefits of Security Intelligence?
…let’s get down to brass tacks and review the benefits organizations are gaining from their SI deployments. Here are several […]