Security CERT Global
- CISA Releases Guidance on Single Sign-On (SSO) Adoption for Small and Medium-Sized Businesses: (SMBs)
- CAREL Boss-Mini
- Westermo L210-F2G
- Yokogawa CENTUM
- CISA Releases Three Industrial Control Systems Advisories
- Vulnérabilité dans Spring Cloud Function (20 juin 2024)
- Multiples vulnérabilités dans SonicWall SonicOS (20 juin 2024)
- Multiples vulnérabilités dans les produits Moxa (20 juin 2024)
- CERT-SE:s veckobrev v.25
- We're trying to cure cancer, why would anyone attack us?
- Cyber Europe tests the EU Cyber Preparedness in the Energy Sector
- JVN: 横河電機製CENTUM CAMSログサーバーにおける不十分なアクセス権設定の脆弱性
- お知らせ:標準から学ぶICSセキュリティ - #7 ICSコンポーネントに対するセキュリティ要件
- JVN: 複数のトレンドマイクロ製品における複数の脆弱性
- JVN: RAD Data Communications製SecFlow-2におけるパストラバーサルの脆弱性
- Multiples vulnérabilités dans les produits Atlassian (19 juin 2024)
- 🇬🇧 Malicious activities linked to the Nobelium intrusion set (19 juin 2024)
- Multiples vulnérabilités dans Moodle (19 juin 2024)
- Multiples vulnérabilités dans Google Chrome (19 juin 2024)
- 🇬🇧 Malicious activities linked to the Nobelium intrusion set (19 juin 2024)
- Multiples vulnérabilités dans Juniper Secure Analytics (19 juin 2024)
- Multiple vulnerabilities in multiple Trend Micro products
- JVN: Androidアプリ「ZOZOTOWN」におけるアクセス制限不備の脆弱性
- JVN: WordPress用プラグインSiteGuard WP Pluginにおける変更したログインパスが漏えいする脆弱性
- WordPress plugin "SiteGuard WP Plugin" may leak the customized path to the login page
- "ZOZOTOWN" App for Android fails to restrict custom URL schemes properly
- Weekly Report: GitLabに複数の脆弱性
- Weekly Report: 東芝テック製および沖電気製複合機(MFP)に複数の脆弱性
- Weekly Report: 複数のMozilla製品に脆弱性
- Weekly Report: 複数のマイクロソフト製品に脆弱性
- Weekly Report: IPCOMのWAF機能にサービス運用妨害(DoS)の脆弱性
- Weekly Report: Fortinet製FortiOSにスタックベースのバッファーオーバーフローの脆弱性
- Kritiska sårbarheter påverkar VMware vCenter Server
- Multiples vulnérabilités dans les produits VMware (18 juin 2024)
- CISA Releases One Industrial Control Systems Advisory
- PoC-udnyttelse tilgængelig for fejl i Ivanti Endpoint Manager
- TZCERT-SU-24-0632 (SUSE Security Update)
- TZCERT-SU-24-0636 (Chrome Security Update)
- TZCERT-SU-24-0630 (Dell Security Update)
- TZCERT-SU-24-0635 (Microsoft Security Update)
- TZCERT-SU-24-0637 (Mageia Security Update)
- TZCERT-SU-24-0638 (Palo Alto Security Update)
- TZCERT-SU-24-0633 (Adobe Security Update)
- TZCERT-SU-24-0634 (Oracle Linux Security Update)
- TZCERT-SU-24-0631 (Mozilla Security Update)
- TZCERT-SU-24-0639 (Cisco Security Update)
- VMware advarer om to kritiske vCenter-fejl
- Ny Linux malware styres gennem emojis
- Multiple vulnerabilities in Ricoh Streamline NX PC Client
- Multiple vulnerabilities in ID Link Manager and FUJITSU Software TIME CREATOR
MGS+ ICS Security Report March 2017
MGS+ ICS Security Report March 2017: Editor Picks: News Intelligence Alerts Reports
World’s Biggest Data Breaches
Selected losses greater than 30,000 records
Source: http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks
As prices rise, oil companies drill down on industrial cyber security
In recent months, more U.S. oil company boards have demanded IT managers prove refineries and drilling rigs are protected against cyberattacks, the chief of a security firm says.
Source: http://fuelfix.com/blog/2017/05/12/as-prices-rise-oil-companies-drill-down-on-industrial-cyber-security/
GOOGLE’S DUELING NEURAL NETWORKS SPAR TO GET SMARTER, NO HUMANS REQUIRED
THE DAY RICHARD Feynman died, the blackboard in his classroom read: “What I cannot create, I do not understand.”
Source: https://www.wired.com/2017/04/googles-dueling-neural-networks-spar-get-smarter-no-humans-required/
Cyber Security: The World’s Best And Worst Presented With A Well-Designed Infographic
Source: https://www.forbes.com/sites/kevinmurnane/2017/05/04/cyber-security-the-worlds-best-and-worst-presented-with-a-well-designed-infographic/#5d3fc74f4416
The Role of Big Data in IoT
IoT (the Internet of Things) refers to the automated intelligent control and command of connected devices over vast regions via sensors and other computing capabilities.
Source: https://datafloq.com/read/the-role-of-big-data-in-iot/3089
Canada Looks to Develop a New Resource: Artificial Intelligence
Initiative aims to encourage research and startups using the technology
Source: https://www.wsj.com/articles/canada-looks-to-develop-a-new-resource-artificial-intelligence-1490982372
New Threat Research Shows Vietnam a Rising Force in Cyberespionage
FireEye report on APT32 puts evidence together of a group attacking private and public targets for the sake of Vietnamese state interests.
Source: http://www.darkreading.com/attacks-breaches/new-threat-research-shows-vietnam-a-rising-force-in-cyberespionage/d/d-id/1328890
Computer security is broken from top to bottom
OVER a couple of days in February, hundreds of thousands of point-of-sale printers in restaurants around the world began behaving strangely.
Source: https://www.ascotbarclay.com/computer-security-is-broken-from-top-to-bottom/
Cybercriminals Are Building an Army of Things Creating a Tipping Point for Cybersecurity
Cybercrime is big business, and is growing at an exponential rate. British insurer Lloyd’s of London estimated the cybercrime market at $400 Billion in 2015. Today, just two years later, the World Economic Forum estimates that the total economic cost of cybercrime to currently be $3 trillion. And Cybersecurity Ventures is predicting that cybercrime will cost the world in excess of $6 trillion annually by 2021.
Source: http://blog.fortinet.com/2017/03/28/fortinet-q416-threat-landscape-report