Security CERT Global
- CVE-2023-43664
- CVE-2023-43044
- CVE-2023-40375
- CVE-2023-43657
- CVE-2023-5256
- CVE-2023-43663
- Cisco Releases Security Advisories for Multiple Products
- CVE-2023-5187
- CVE-2023-39195
- CVE-2023-5217
- CVE-2023-5186
- CVE-2023-30415
- CVE-2023-41861 (restrict)
- CVE-2023-43187 (nodebb)
- CVE-2023-41309 (emui, harmonyos)
- CVE-2023-41860 (travelmap)
- CVE-2023-41307 (emui, harmonyos)
- CVE-2023-41904 (manageengine_admanager_plus)
- CVE-2023-41074 (ipados, iphone_os, macos, safari, tvos, watchos)
- CVE-2023-41068 (ipados, iphone_os, tvos, watchos)
- CVE-2023-41073 (ipados, iphone_os, macos, tvos, watchos)
- CVE-2023-41242 (snap_pixel)
- CVE-2023-41078 (macos)
- CVE-2023-44206 (cyber_protect)
- CVE-2023-41232 (ipados, iphone_os, macos)
- CVE-2023-42486 (fortect)
- CVE-2023-41653 (sermon'e_-_sermons_online)
- CVE-2023-41067 (macos)
- CVE-2023-41305 (emui, harmonyos)
- CVE-2023-41306 (emui, harmonyos)
- CVE-2023-41071 (ipados, iphone_os, macos, tvos, watchos)
- Apple Releases Security Updates for Multiple Products
- CVE-2023-41310 (emui, harmonyos)
- CVE-2023-41981 (ipados, iphone_os, macos, tvos, watchos)
- CVE-2023-43232 (dedebiz)
- CVE-2023-43828 (subrion)
- CVE-2023-41996 (macos)
- CVE-2023-44043 (blackcat_cms)
- CVE-2023-43830 (subrion)
- CVE-2023-41986 (ipados, iphone_os, macos)
- CVE-2023-41995 (ipados, iphone_os, macos)
- CVE-2023-41968 (ipados, iphone_os, macos, tvos, watchos)
- CVE-2023-44205 (cyber_protect)
- CVE-2023-41312 (emui, harmonyos)
- CVE-2023-41308 (emui, harmonyos)
- CVE-2023-44044 (super_store_finder)
- CVE-2023-41979 (macos)
- CVE-2023-43856 (dreamer_cms)
- CVE-2023-41311 (emui, harmonyos)
- CVE-2023-44042 (blackcat_cms)
Data analytics for network intrusion detection
Data analytics for network intrusion detection https://www.tandfonline.com/doi/full/10.1080/23742917.2019.1703525 cybersecurity, criticalinfrastructure
ICSaaS – ICS as a cloud service is coming: Will the benefits outweigh the risks?
ICSaaS – ICS as a cloud service is coming: Will the benefits outweigh the risks? –Is plugging critical infrastructure into […]
Secure design principles: Guides for the design of Cyber Secure systems: Security design principles and virtualisation
Secure design principles:Guides for the design of Cyber Secure systems:Security design principles and virtualisationhttps://www.ncsc.gov.uk/collection/cyber-security-design-principles/examples/study-virtualisationicssecurity, infosec, cybersecurity, criticalinfrastructure, IndustrialControlSystems, virtualisation
Secure design principles: Guides for the design of Cyber Secure systems: Design principles and Operational Technology
Secure design principles:Guides for the design of Cyber Secure systems:Design principles and Operational Technologyhttps://www.ncsc.gov.uk/collection/cyber-security-design-principles/examples/study-operational-techicssecurity, infosec, cybersecurity, criticalinfrastructure, IndustrialControlSystems, OT
Cybersecurity Capability Maturity Model (C2M2) Program
Cybersecurity Capability Maturity Model (C2M2) Programhttps://www.energy.gov/ceser/activities/cybersecurity-critical-energy-infrastructure/energy-sector-cybersecurity-0 icssecurity, infosec, cybersecurity, criticalinfrastructure, IndustrialControlSystems