Security CERT Global
- Unitronics Vision Series PLCs
- Oracles kvartalsvisa säkerhetsuppdatering för april 2024
- CISA Releases Three Industrial Control Systems Advisories
- Stellungnahme von CERT.at zum NISG 2024
- CERTFR-2024-AVI-0317 : Vulnérabilité dans Cisco ClamAV (18 avril 2024)
- CERTFR-2024-AVI-0325 : Multiples vulnérabilités dans Oracle PeopleSoft (18 avril 2024)
- CERTFR-2024-AVI-0321 : Multiples vulnérabilités dans Oracle Java SE (18 avril 2024)
- CERTFR-2024-AVI-0319 : Multiples vulnérabilités dans les produits Cisco (18 avril 2024)
- CERTFR-2024-AVI-0326 : Multiples vulnérabilités dans Oracle MySQL (18 avril 2024)
- CERTFR-2024-AVI-0323 : Multiples vulnérabilités dans Oracle Weblogic (18 avril 2024)
- CERTFR-2024-AVI-0316 : Vulnérabilité dans les produits Xen (18 avril 2024)
- CERTFR-2024-AVI-0318 : Multiples vulnérabilités dans les produits Mitel (18 avril 2024)
- CERTFR-2024-AVI-0322 : Multiples vulnérabilités dans Oracle Database Server (18 avril 2024)
- CERTFR-2024-AVI-0320 : Multiples vulnérabilités dans Oracle VirtualBox (18 avril 2024)
- CERTFR-2024-AVI-0324 : Multiples vulnérabilités dans Oracle Systems (18 avril 2024)
- Oracle Releases Critical Patch Update Advisory for April 2024
- Allvarlig sårbarhet i Cisco IMC
- Cyber Assessment Framework 3.2
- Securing Office 365 with better configuration
- Shaping Cybersecurity Policy towards a trusted and secure Europe
- 'NCSC Cyber Series' podcast now available on Spotify
- JVN: WordPress用プラグインForminatorにおける複数の脆弱性
- JVN: PuTTY SSHクライアントのECDSA署名処理に脆弱性
- Multiple vulnerabilities in WordPress Plugin "Forminator"
- お知らせ:ソフトウェア等の脆弱性関連情報に関する届出状況[2024年第1四半期(1月~3月)]
- Red Hat Single Sign-On: CVSS (Max): 8.1
- Red Hat build of Keycloak: CVSS (Max): 8.1
- Cisco Integrated Management Controller (IMC): CVSS (Max): None
- jetty9: CVSS (Max): 7.5
- Apache HTTP Server: CVSS (Max): 7.5
- tomcat10: CVSS (Max): 7.5
- Linux Kernel: CVSS (Max): 7.8
- Red Hat Single Sign-On: CVSS (Max): 8.1
- Jenkins (core): CVSS (Max): 5.9
- Xen: CVSS (Max): 4.7
- Cisco IOS and IOS XE Software: CVSS (Max): None
- firefox-esr: CVSS (Max): 7.5*
- Red Hat build of Keycloak 22.0.10: CVSS (Max): 8.1
- Red Hat Single Sign-On: CVSS (Max): 8.1
- java-1.8.0-openjdk: CVSS (Max): 3.7
- Cisco Integrated Management Controller (IMC): CVSS (Max): 8.7
- Red Hat Single Sign-On: CVSS (Max): 8.1
- Red Hat Single Sign-On 7.6: CVSS (Max): 8.1
- お知らせ:JPCERT/CC インシデント報告対応レポート[2024年1月1日~2024年3月31日]
- お知らせ:JPCERT/CC 活動四半期レポート[2024年1月1日~2024年3月31日]
- CERTFR-2024-AVI-0315 : Vulnérabilité dans SolarWinds Serv-U (17 avril 2024)
- CERTFR-2024-AVI-0311 : Multiples vulnérabilités dans les produits Mozilla (17 avril 2024)
- CERTFR-2024-AVI-0314 : Multiples vulnérabilités dans Ivanti Avalanche (17 avril 2024)
- CERTFR-2024-CTI-003 : Grands évènements sportifs en France – Évaluation de la menace 2024 (17 avril 2024)
- CERTFR-2024-AVI-0313 : Multiples vulnérabilités dans Google Chrome (17 avril 2024)
MGS+ ICS Security Report June 2017
MGS+ ICS Security Report June 2017: Editor Picks: News Intelligence Alerts Report
Why Future Emphasis Should be on Algorithms – Not Code
We are all now in what’s called the “big data era,” and we’ve been here for quite some time. Once upon a time we were only just starting to piece together dialogue. Then when one group of people had learned this dialogue, it was up to them t pass it on the next group and so on and so on. However, as more people began to fill the Earth, more information was learned and gathered, making it too difficult to pass on in the form of dialogue. Instead, we needed to codify this information to share it all.
Source: http://trendintech.com/2017/03/26/why-future-emphasis-should-be-on-algorithms-not-code/
The previous industrial revolutions broke the environment. Can the current one fix it?
We live in a world that was largely shaped by industrialists, but which is increasingly being transformed by technologists. Innovations are getting faster and more efficient, technology is becoming more and more interconnected, and we are starting to see a merging of our digital and physical realms. This is the Fourth Industrial Revolution
Source: https://www.weforum.org/agenda/2017/04/fix-the-environment-there-s-an-app-for-that/
Artificial Intelligence Tech Will Arrive in Three Waves
I’ve done a lot of writing and research recently about the bright future of AI: that it’ll be able to analyze human emotions, understand social nuances, conduct medical treatments and diagnoses that overshadow the best human physicians, and in general make many human workers redundant and unnecessary.
Source: https://futurism.com/artificial-intelligence-tech-will-arrive-in-three-waves/
How Singapore Is Creating More Land for Itself
The island off the southern tip of Malaysia reveals the future of building in an epoch of dwindling territory.
Source: https://www.nytimes.com/2017/04/20/magazine/how-singapore-is-creating-more-land-for-itself.html
US energy systems at the mercy of cyberattack, warns report
The digital systems that run the electricity grid, gas pipelines and other critical infrastructure in the US have 25 years’ worth of fundamental weaknesses to hacking that need fixing.
Source: https://www.newscientist.com/article/2126050-us-energy-systems-at-the-mercy-of-cyberattack-warns-report/#.WNqYlDKUNek.twitter
America’s $4tn infrastructure time bomb
Source: http://www.bbc.com/news/world-us-canada-39410561
3,000 Industrial Plants Per Year Infected with Malware
Targeted industrial control systems-themed malware is less prevalent yet persistent, including one variant posing as Siemens PLC firmware that has been in action since 2013, researchers find.
Source: http://www.darkreading.com/threat-intelligence/3000-industrial-plants-per-year-infected-with-malware-/d/d-id/1328444
Australia’s bold plan for cybersecurity growth
Australian Cyber Security Growth Network has set its goals, fleshed out its board, and announced a detailed plan for success.
Source: http://www.zdnet.com/article/australias-bold-plan-for-cybersecurity-growth/
Source: Machine Learning For Cybersecurity Not Cybercrime
Cybercriminals have yet to adopt machine learning for offensive attack strategies – and they probably won’t for a long time.
Source: http://www.darkreading.com/partner-perspectives/bitdefender/machine-learning-for-cybersecurity-not-cybercrime/a/d-id/1327904
Cloud Security & IoT: A Look At What Lies Ahead
In the brave new world of cloud, security teams must be as agile as possible. This means leveraging proactive monitoring tools, locking down access points, and forecasting requirements
Source: http://www.darkreading.com/cloud/cloud-security-and-iot-a-look-at-what-lies-ahead/a/d-id/1327900
2017 Security 100: 25 Coolest Network Security Vendors
Source: http://www.crn.com/slide-shows/security/300084000/2017-security-100-25-coolest-network-security-vendors.htm
20 Questions To Explore With Security-as-a-Service Providers
This list will help you leverage the niche expertise of security-as-a-service providers, and assess which vendor can best meet your needs
Source: http://www.darkreading.com/vulnerabilities—threats/20-questions-to-explore-with-security-as-a-service-providers/a/d-id/1327101