Security CERT Global
- HPE Superdome Flex, Superdome Flex 280 and Compute Scale-up Server 3200 Servers Arbitrary Code Execution (CVE-2021-38578)
- CERTFR-2024-AVI-0329 : Multiples vulnérabilités dans le noyau Linux de SUSE (19 avril 2024)
- CERTFR-2024-AVI-0330 : Multiples vulnérabilités dans les produits IBM (19 avril 2024)
- CERTFR-2024-AVI-0332 : Multiples vulnérabilités dans les produits Red Hat (19 avril 2024)
- CERTFR-2024-AVI-0331 : Multiples vulnérabilités dans SolarWinds Platform (19 avril 2024)
- CERTFR-2024-AVI-0328 : Vulnérabilité dans Citrix uberAgent (19 avril 2024)
- CERTFR-2024-AVI-0327 : Multiples vulnérabilités dans Microsoft Edge (19 avril 2024)
- CERTFR-2024-AVI-0333 : Multiples vulnérabilités dans le noyau Linux d’Ubuntu (19 avril 2024)
- CERTFR-2024-AVI-0334 : Multiples vulnérabilités dans le noyau Linux de Debian (19 avril 2024)
- Cisco Releases Security Advisories for Cisco Integrated Management Controller
- CERT-SE:s veckobrev v.16
- LINE client for iOS vulnerable to improper server certificate verification
- Armeria-saml improperly handles SAML messages
- tzdata: CVSS (Max): None
- firefox: CVSS (Max): 7.5
- sssd: CVSS (Max): 7.1
- Migration Toolkit for Runtimes: CVSS (Max): 5.9
- firefox: CVSS (Max): 7.5
- Migration Toolkit for Containers (MTC) 1.8.3: CVSS (Max): 6.5
- Red Hat Service Interconnect 1.5.3: CVSS (Max): 7.5
- sssd: CVSS (Max): 7.1
- tomcat: CVSS (Max): 7.5
- OpenJDK 21.0.3: CVSS (Max): 3.7
- firefox: CVSS (Max): 7.5
- firefox: CVSS (Max): 7.5
- firefox: CVSS (Max): 7.5
- firefox: CVSS (Max): 7.5
- firefox: CVSS (Max): 7.5
- firefox: CVSS (Max): 7.5
- sssd: CVSS (Max): 7.1
- firefox: CVSS (Max): 7.5
- sssd: CVSS (Max): 7.1
- Migration Toolkit for Runtimes: CVSS (Max): 5.9
- nodejs:18: CVSS (Max): 8.1
- shim: CVSS (Max): 8.3
- shim: CVSS (Max): 8.3
- Unitronics Vision Series PLCs: CVSS (Max): 7.5
- mod_http2: CVSS (Max): 7.5
- Red Hat Update Infrastructure (RHUI): CVSS (Max): 7.5
- shim: CVSS (Max): 8.3
- kernel: CVSS (Max): 6.7
- gnutls: CVSS (Max): 5.3
- rhc-worker-script: CVSS (Max): 5.9
- kernel: CVSS (Max): 7.1
- kernel-rt: CVSS (Max): 6.7
- less: CVSS (Max): 7.0
- CISA and Partners Release Advisory on Akira Ransomware
- #StopRansomware: Akira Ransomware
- Unitronics Vision Series PLCs
- Oracles kvartalsvisa säkerhetsuppdatering för april 2024
SEC Conferences
Strategic Efficiency Consortium (SEC) conferences are controlled, closed, invitation only, peer review conferences of critical industrial market security, operations, compliance, engineering, research, hardware, software, services, enforcement, compliance, academia personnel and, their related stakeholders.
SEC conferences are held under SEC House Rule and Protocol based on the Chatham House Rule; attendees to the conference are free to use information from the discussion, but not allowed to reveal information sources.
This Rule and Protocol is designed to increase openness and expression of discussions, opinions and arguments; participants are free to use the information received, but neither the identity nor the affiliation of the speaker(s), nor that of any other participant, may be revealed.
SEC MetaSecCon 01 – Complete
Strategic Efficiency Consortium Meta Security Consultation 01 – Aug 8-10, 2016
SEC MetaSecCon 02 – Complete
Strategic Efficiency Consortium Meta Security Consultation 01 – Aug 14-17, 2017
SEC MetaSecCon 03 – Planned –
Strategic Efficiency Consortium Meta Security Consultation 01 – June 25-28, 2018
Tags: SEC Conferences,SEC Corporate,