Security CERT Global
- CISA Adds One Known Exploited Vulnerability to Catalog
- Ubuntu Security Update
- Mageia Security Update
- Oracle Linux Security Update
- SUSE Security Update
- HP Security Update
- Foxit Security Update
- OpenSSL Security Update
- DebianOS Security Update
- Dell Security Update
- Chrome Security Update
- CVE-2023-32318 (nextcloud_server)
- CERTFR-2023-AVI-0430 : Multiples vulnérabilités dans Stormshield Network Security (02 juin 2023)
- CERTFR-2023-AVI-0428 : Multiples vulnérabilités dans les produits Splunk (02 juin 2023)
- CERTFR-2023-AVI-0429 : Multiples vulnérabilités dans le noyau Linux d’Ubuntu (02 juin 2023)
- CERTFR-2023-AVI-0431 : Vulnérabilité dans le noyau Linux de RedHat (02 juin 2023)
- CERT-SE:s veckobrev v.22
- 0-klik-hackangreb mod iOS-brugere
- ESB-2023.3151 - [Win][UNIX/Linux] Splunk Enterprise and Cloud Platform: CVSS (Max): 8.8
- ESB-2023.3147 - [Win][UNIX/Linux] Splunk App: CVSS (Max): 4.7
- ESB-2023.3148 - [Win][UNIX/Linux] Splunk Enterprise and Cloud Platform: CVSS (Max): 4.8
- ESB-2023.3152 - [Win][UNIX/Linux] Google Chrome: CVSS (Max): 8.8*
- ESB-2023.3149 - [Win][UNIX/Linux] Splunk App for Stream: CVSS (Max): 7.8
- ESB-2023.3143 - [Win][UNIX/Linux] Splunk Enterprise: CVSS (Max): 9.8*
- ESB-2023.3153 - [SUSE] kubernetes1.18: CVSS (Max): None
- ESB-2023.3146 - [Win][UNIX/Linux] Universal Forwarders: CVSS (Max): 9.8
- ESB-2023.3150 - [Win][UNIX/Linux] Splunk Enterprise and Cloud Platform : CVSS (Max): 7.2
- ESB-2023.3145 - [Win][UNIX/Linux] Splunk App: CVSS (Max): 8.1
- ESB-2023.3144 - [Win][UNIX/Linux] Splunk Enterprise and Cloud Platform: CVSS (Max): 4.3
- ESB-2023.3131 - [SUSE] openssl-1_1: CVSS (Max): 6.5
- ESB-2023.3134 - Splunk EnterpriseCVSS (Max): 5.4
- ESB-2023.3141 - [Win][UNIX/Linux] Splunk Enterprise and Cloud Platform: CVSS (Max): 4.3
- ESB-2023.3132 - [SUSE] ImageMagick: CVSS (Max): 3.3
- ESB-2023.3138 - [Appliance] Advantech WebAccess/SCADA: CVSS (Max): 7.2
- ESB-2023.3133 - [Debian] cups: CVSS (Max): 5.9
- ESB-2023.3139 - netatalk: CVSS (Max): 9.8
- ESB-2023.3140 - [Win][UNIX/Linux] Splunk Enterprise: CVSS (Max): 3.4
- ESB-2023.3136 - [Win][Linux] Splunk Cloud: CVSS (Max): None
- ESB-2023.3130 - [SUSE] ImageMagick: CVSS (Max): 7.5
- ESB-2023.3135 - [Win][UNIX/Linux] Splunk Enterprise and Cloud Platform: CVSS (Max): 6.5
- ESB-2023.3142 - [Win][UNIX/Linux] Splunk Enterprise and Cloud Platform: CVSS (Max): 7.7
- ESB-2023.3129 - [SUSE] openssl-1_1: CVSS (Max): 6.5
- ESB-2023.3137 - [Appliance] HID Global SAFE: CVSS (Max): 7.3
- CVE-2022-45938
- CVE-2023-28147
- CVE-2023-27745
- CVE-2023-29725
- CVE-2016-15032
- CVE-2023-29724
- CVE-2023-27744
Finding The ROI Of Threat Intelligence: 5 Steps
Finding The ROI Of Threat Intelligence: 5 Steps
Advice from a former SOC manager on how to leverage threat intel without increasing the bottom line.
Step 1. Develop Key Performance Indicators (KPI)
Step 2. Continually evaluate and reassess threat intelligence providers
Step 3. Prioritize alerts to efficiently utilizing security analysts’ time
Step 4. Foster collaboration between ALL analyst teams
Step 5. Pilot threat intelligence providers before buying