Security CERT Global
- pcs: CVSS (Max): 5.3
- linux-firmware: CVSS (Max): 5.6
- postgresql-jdbc: CVSS (Max): 9.8
- gnutls: CVSS (Max): 5.3
- grub2: CVSS (Max): 8.2
- kernel: CVSS (Max): 7.8
- golang: CVSS (Max): 7.5
- kpatch-patch: CVSS (Max): 7.8
- kernel-rt: CVSS (Max): 7.8
- Satellite Client Async: CVSS (Max): 8.1
- kernel-rt: CVSS (Max): 7.8
- opencryptoki: CVSS (Max): 5.9
- thunderbird: CVSS (Max): 7.5
- libreswan: CVSS (Max): 5.0
- kernel: CVSS (Max): 7.8
- go-toolset:rhel8: CVSS (Max): 7.5
- less: CVSS (Max): 7.0
- kpatch-patch: CVSS (Max): 7.8
- container-tools:rhel8: CVSS (Max): 7.5
- CERTFR-2024-AVI-0345 : Vulnérabilité dans les produits Palo Alto Networks (25 avril 2024)
- CERTFR-2024-AVI-0348 : Vulnérabilité dans les produits MongoDB (25 avril 2024)
- CERTFR-2024-AVI-0344 : Multiples vulnérabilités dans les produits Mitel (25 avril 2024)
- CERTFR-2024-AVI-0346 : Multiples vulnérabilités dans GitLab (25 avril 2024)
- CERTFR-2024-AVI-0347 : Multiples vulnérabilités dans les produits Cisco (25 avril 2024)
- CERTFR-2024-ALE-007 : Multiples vulnérabilités dans les produits Cisco (25 avril 2024)
- Siemens RUGGEDCOM APE1808 Devices Configured with Palo Alto Networks Virtual NGFW
- Multiple Vulnerabilities in Hitachi Energy RTU500 Series
- Hitachi Energy MACH SCM
- Honeywell Experion PKS, Experion LX, PlantCruise by Experion, Safety Manager, Safety Manager SC
- CISA Releases Eight Industrial Control Systems Advisories
- Pathways: exploring a new way to achieve Cyber Essentials certification
- Sårbarheter i Cisco-produkter utnyttjas aktivt
- Sikkerhedsopdateringer fra Cisco
- お知らせ:インシデント報告Webフォームメンテナンス(2024/05/16)のお知らせ
- Cisco Releases Security Updates Addressing ArcaneDoor, Vulnerabilities in Cisco Firewall Platforms
- CISA Adds Three Known Exploited Vulnerabilities to Catalog
- CERTFR-2024-AVI-0343 : Multiples vulnérabilités dans Google Chrome (24 avril 2024)
- CERTFR-2024-AVI-0342 : Multiples vulnérabilités dans NagiosXI (24 avril 2024)
- Sårbarhet i Progress Flowmon
- Tager ansvar for cyberangreb på vandværk i USA
- ICS Security Conference 2024
- JVN: NETGEAR製ルーターにおけるバッファオーバーフローの脆弱性
- JVN: RoamWiFi R10における複数の脆弱性
- NETGEAR routers vulnerable to buffer overflow
- Multiple vulnerabilities in RoamWiFi R10
- jasper: CVSS (Max): 7.5
- Linux Kernel (Live Patch 10 for SLE 15 SP5): CVSS (Max): 7.8
- qemu: CVSS (Max): 8.2
- Linux kernel: CVSS (Max): 7.8
- qemu: CVSS (Max): 8.2
SEC Security Report September 2017
SEC Security Report September 2017: Editor Picks: News Intelligence Alerts Reports
WannaCry Post Mortem: Early Warning Indicators and Lessons Learned for the Healthcare Industry
As the saying goes, “those who don’t learn from history are doomed to repeat it.” Some very recent history that’s worth tuning in to is the story of the WannaCry attacks that took place this past April and May. ….
Source: https://blog.hitrustalliance.net/wannacry-post-mortem-early-warning-indicators-lessons-learned-healthcare-industry/
The State of SCADA HMI Vulnerabilities
Attacking SCADA Through HMIs: SCADA systems run the world’s various critical infrastructure sectors and are thus inherently attractive to different threat actors. Threat actors can use their access to SCADA systems to gather information such as a facility’s layout, critical thresholds, or device settings for use in later attacks.
Source: https://www.trendmicro.com/vinfo/us/security/news/vulnerabilities-and-exploits/the-state-of-scada-hmi-vulnerabilities
The future of being human
One of our great debates is whether we are on the cusp of a robot-and-artificial intelligence apocalypse that renders many humans jobless, at least in the sense of work as we know it today: Is super-human intelligence coming soon? Is it coming at all? Are humans in danger? The reality is that, despite great certitude on all sides, no one really knows…
Source: https://www.axios.com/the-future-of-being-human-2476364075.html
GE shifts strategy, financial targets for digital business after missteps
“There was a lot of money spent on Predix,” said a former senior financial executive at GE who worked with Flannery. “They are going to tighten the grip and ensure there’s a return.”
Source: https://www.reuters.com/article/us-ge-digital-outlook-insight/ge-shifts-strategy-financial-targets-for-digital-business-after-missteps-idUSKCN1B80CB
How Machine Learning Enhances The Value Of Industrial Internet of Things
Industrial Internet of Things (IIoT) is already revolutionizing domains such as manufacturing, automobiles and healthcare. But the real value of IIoT will be realized only when Machine Learning (ML) is applied to the sensor data.
Source: https://www.forbes.com/sites/janakirammsv/2017/08/27/how-machine-learning-enhances-the-value-of-industrial-internet-of-things/#c30569b3f389
Threat Intelligence’s Big Data Problem
Security teams are drowning in often useless threat intel data, but signs of maturity are emerging in what IT-Harvest predicts will be a $1.5 billion market by 2018.
Source: https://www.darkreading.com/threat-intelligence/threat-intelligences-big-data-problem/d/d-id/1324702
SANS Institute Survey Finds Unprotected Devices and Ransomware are Top Threats to Industrial Control Systems
SANS Institute’s annual survey of industrial control systems (ICS) has revealed that the introduction of unprotected devices into sensitive ICS networks and ransomware are now among the top threats that organizations face in securing critical infrastructure. In addition, 69% of respondents stated that the level of threats to control systems is now high or severely critical.
Source: http://www.globalsecuritymag.com/SANS-Institute-Survey-Finds,20170814,73115.html
What Is Threat Intelligence? Definition and Examples
Everybody in the security world knows the term “threat intelligence.” At this point, even some non-security folks have started talking about it. But it’s still very poorly understood.
Source: https://www.recordedfuture.com/threat-intelligence-definition/
Ukraine Cyberattack Was Meant to Paralyze, not Profit, Evidence Shows
Cybersecurity experts based their reasoning partly on having identified the group of Ukrainian users who were initially and improbably targeted: tax accountants.
Source: https://www.nytimes.com/2017/06/28/world/europe/ukraine-ransomware-cyberbomb-accountants-russia.html
Shodan and Censys: the ominous guides through the Internet of Things Snapchat caught in phishing campaign
Look around — we are living in the Internet of Things. In our day-to-day life, we encounter things connected to the Internet, starting with our home Wi-Fi routers and leading up to traffic light management systems and street security cameras. Since they are connected, all of them can be found in two worlds — both in the real world and in the Web.
Source: https://www.kaspersky.com/blog/shodan-censys/11430/
Tags: Automation,Big Data,Critical Infrastructure,CyberSecurity,HMI Vulnerabilities,IIot,Industrial Control Systems,Machine Learning,Predix,SCADA,Threat Intelligence,WannaCry,