Security CERT Global
- Denegación de servicio en MELSEC iQ-F series de Mitsubishi Electric
- Denegación de servicio en MELSEC iQ-F series de Mitsubishi Electric
- Apache retter Tomcat
- Critical Remote Code Execution in Zyxel Products (CERT-EU Security Advisory 2022-035)
- ESB-2022.2419 - [Debian] cifs-utils: CVSS (Max): 7.8
- ESB-2022.2420 - [Cisco] Snort application detection engine: CVSS (Max): 4.0
- ESB-2022.2418 - [HPE NonStop] WebSphere MQ for HP NonStop Server: CVSS (Max): 7.5
- ESB-2022.2416 - [Win][Linux][IBM i][HP-UX][Solaris][AIX] IBM WebSphere Application Server Liberty: CVSS (Max): 5.0
- ESB-2022.2417 - [HPE NonStop] WebSphere MQ for HP NonStop Server: CVSS (Max): 6.7
- ESB-2022.2415 - [HPE NonStop] IBM MQ for HP NonStop Server: CVSS (Max): 5.1
- ESB-2022.2414 - [HPE NonStop] IBM MQ for HP NonStop Server: CVSS (Max): 5.3
- ESB-2022.2405 - [Debian] vim: CVSS (Max): 9.8
- ESB-2022.2406 - [Debian] libxml2: CVSS (Max): 6.5
- ESB-2022.2411 - [Mac] Catalina: CVSS (Max): 9.8*
- ESB-2022.2402 - [RedHat] pcs: CVSS (Max): 7.5
- ESB-2022.2403 - [RedHat] pcs: CVSS (Max): 7.5
- ESB-2022.2412 - [Mac] macOS Big Sur 11.6.6: CVSS (Max): 9.8*
- ESB-2022.2413 - [Mac] macOS Monterey 12.4: CVSS (Max): 9.8*
- ESB-2022.2404 - [Debian] ffmpeg: CVSS (Max): None
- ESB-2022.2401 - [RedHat] pcs: CVSS (Max): 7.5
- ESB-2022.2410 - [Apple iOS] watchOS 8.6: CVSS (Max): 7.5*
- ESB-2022.2409 - [Apple iOS] tvOS 15.5: CVSS (Max): 7.5*
- ESB-2022.2407 - [Apple iOS] iOS 15.5 and iPadOS 15.5: CVSS (Max): 7.5*
- ESB-2022.2408 - [Mac] Safari 15.5: CVSS (Max): None
- JVN: 三菱電機製MELSEC iQ-FシリーズCPUユニットにおける複数の脆弱性
- ESB-2022.2399 - [Ubuntu] LibTIFF: CVSS (Max): 7.1
- ESB-2022.2398 - [Ubuntu] libxml2: CVSS (Max): 7.5
- ESB-2022.2400 - [Ubuntu] contained: CVSS (Max): 7.5
- CVE-2022-1586
- CVE-2022-23665
- CVE-2022-23666
- CVE-2022-23663
- CVE-2022-23670
- CVE-2022-23667
- CVE-2022-23662
- CVE-2022-23664
- CVE-2022-23668
- CVE-2022-1587
- ESB-2022.2394 - [SUSE] Linux Kernel: CVSS (Max): 8.8
- ESB-2022.2385 - [SUSE] jackson-databind, jackson-dataformats-binary, jackson-annotations, jackson-bom, jackson-core: CVSS (Max): 7.5
- ESB-2022.2397 - [SUSE] webkit2gtk3: CVSS (Max): 8.8
- ESB-2022.2381 - [SUSE] curl: CVSS (Max): 5.3
- ESB-2022.2387 - [SUSE] openldap2: CVSS (Max): 9.4
- ESB-2022.2388 - [SUSE] openldap2: CVSS (Max): 9.4
- ESB-2022.2384 - [SUSE] gzip: CVSS (Max): 8.4
- ESB-2022.2391 - [SUSE] Linux Kernel: CVSS (Max): 7.0
- ESB-2022.2389 - [SUSE] podofo: CVSS (Max): 5.5
- ESB-2022.2386 - [SUSE] openldap2: CVSS (Max): 9.4
- ESB-2022.2383 - [SUSE] gzip: CVSS (Max): 8.4
- ESB-2022.2392 - [SUSE] Linux Kernel: CVSS (Max): 8.8
MGS+ ICS Security Report April 2017
MGS+ ICS Security Report April 2017: Editor Picks: News Intelligence Alerts Report
2017 Security 100: 20 Coolest Endpoint Security Vendors
Source: http://www.crn.com/slide-shows/security/300084027/2017-security-100-20-coolest-endpoint-security-vendors.htm
Why Canada is well-positioned to be a global leader in cybersecurity
Cybersecurity: most IT personnel know of it. Even fewer follow up on the latest developments in the industry beyond notifications from their antivirus software that “143 latest threats” were just neutralized. Only a small handful of them actually go above and beyond, pushing the boundaries, proactively defending their organization from hundreds of new cyber threats unleashed daily.
Source: http://betakit.com/why-canada-is-well-positioned-to-be-a-global-leader-in-cybersecurity/
What the Best Transformational Leaders Do
Companies that claim to be “transforming” seem to be everywhere. But when you look more deeply into whether those organizations are truly redefining what they are and what they do, stories of successful change efforts are exceptionally rare. In a study of S&P 500 and Global 500 firms, our team found that those leading the most successful transformations, creating new offerings and business models to push into new growth markets, share common characteristics and strategies. Before describing those, let’s look at how we identified the exceptional firms that rose to the top of our ranking, a group we call the Transformation 10.
Source: https://hbr.org/2017/05/what-the-best-transformational-leaders-do
Europe Pumps Out 50% More Cybercrime Attacks Than US
Cyberattacks originating from Europe were substantially higher than nefarious activity launched from the US during the first quarter.
Source: http://www.darkreading.com/threat-intelligence/europe-pumps-out-50–more-cybercrime-attacks-than-us—/d/d-id/1328798
The Consequences of an Incomplete Threat Model
Source: https://www.carbonblack.com/2017/05/08/consequences-incomplete-threat-model/
Microsoft Calls on Governments to Stop Stockpiling Dangerous Software
In the wake of a major cyber attack that affected hospitals and other services in more than 150 countries, Microsoft has urged governments to stop their stockpiling of dangerous software that can be weaponized if leaked.
Source: http://time.com/4778646/microsoft-ransomware-cybersecurity-wannacrypt/