Security CERT Global
- WordPress Plugin "Heateor Social Login WordPress" vulnerable to cross-site scripting
- libde265: CVSS (Max): None
- git-lfs: CVSS (Max): 7.5
- SUBNET Substation Server: CVSS (Max): 8.4
- bind and dhcp: CVSS (Max): 7.5
- Red Hat JBoss Web Server 5.8.0: CVSS (Max): 7.5
- Google Chrome: CVSS (Max): None
- nghttp2: CVSS (Max): 7.5
- Linux Kernel (Live Patch 40 for SLE 15 SP2): CVSS (Max): 7.8
- IBM Security QRadar SIEM: CVSS (Max): 6.5
- libvirt: CVSS (Max): 6.2
- Red Hat JBoss Web Server 6.0.2: CVSS (Max): 7.5
- Red Hat JBoss Web Server 5.8.0: CVSS (Max): 7.5
- Red Hat JBoss Core Services Apache HTTP Server 2.4.57 SP4: CVSS (Max): 7.5
- Red Hat JBoss Web Server 6.0.2: CVSS (Max): 7.5
- Node.js: CVSS (Max): 6.5
- Jenkins Plugins: CVSS (Max): None
- bind and dhcp: CVSS (Max): 7.5
- Linux/xen-netback: CVSS (Max): None
- SUBNET Substation Server
- PTC Codebeamer
- CISA Releases Two Industrial Control Systems Advisories
- CERTFR-2024-AVI-0369 : Multiples vulnérabilités dans les produits GLPI (07 mai 2024)
- CERTFR-2024-AVI-0368 : [SCADA] Vulnérabilité dans Moxa NPort (07 mai 2024)
- Citrix frigiver rettelse til Citrix NetScaler som adressere kritisk sårbarhed i visse NetScaler komponenter
- JVN: Delta Electronics製DIAEnergieにおける複数の脆弱性
- JVN: トレンドマイクロ製ウイルスバスター クラウドにおけるファイルリンク解決処理の不備(CVE-2024-32849)
- ruby3.1: CVSS (Max): 5.5
- Android: CVSS (Max): 8.4*
- Linux Kernel (Live Patch 43 for SLE 12 SP5): CVSS (Max): 7.8
- glibc: CVSS (Max): 7.6
- SUSE Manager Salt Bundle: CVSS (Max): 7.7
- SUSE Manager Client Tools: CVSS (Max): 9.1
- SUSE Manager Salt Bundle: CVSS (Max): 7.7
- grafana and mybatis: CVSS (Max): 6.5
- SUSE Manager 4.3: Server, Proxy and Retail Branch Server: CVSS (Max): 7.5
- kpatch-patch: CVSS (Max): 7.8
- avahi: CVSS (Max): 6.2
- SUSE Manager Salt Bundle: CVSS (Max): 7.7
- Linux Kernel (Live Patch 44 for SLE 15 SP2): CVSS (Max): 7.8
- SUSE Manager 4.3: CVSS (Max): 7.5
- less: CVSS (Max): 8.6
- less: CVSS (Max): 8.6
- java-11-openjdk: CVSS (Max): 3.7
- java-17-openjdk: CVSS (Max): 3.7
- unbound: CVSS (Max): 8.0
- SUSE Manager Salt Bundle: CVSS (Max): 7.7
- SUSE Manager Client Tools: CVSS (Max): 6.5
- SUSE Manager Salt Bundle: CVSS (Max): 7.7
- linux: CVSS (Max): 8.0
Four myths about networking and cybersecurity related to operations technology (OT) systems are highlighted as well as three pillars for securing industrial networks
Industrial network security best practice advice -Four myths about networking and cybersecurity related to operations technology (OT) systems are highlighted […]
Industrial network security best practice advice
Industrial network security best practice advice Four myths about networking and cybersecurity related to operations technology (OT) systems are highlighted […]
Managing risk in today’s IoT landscape: not a one-and-done
Managing risk in today’s IoT landscape: not a one-and-done https://www.microsoft.com/security/blog/2020/04/28/managing-risk-todays-iot-landscape-not-one-and-done/ cybersecurity, iiot, scada, cloudscada, icssecurity -holistic approach to minimizing risk […]
A Cloud Based Alternative to Traditional SCADA
A Cloud Based Alternative to Traditional SCADA cybersecurity, iiot, scada, cloudscada, icssecurity -one of the benefits of leveraging the IIoT […]
Secure design principles: Guides for the design of Cyber Secure systems: Security design principles and virtualisation
Secure design principles:Guides for the design of Cyber Secure systems:Security design principles and virtualisationhttps://www.ncsc.gov.uk/collection/cyber-security-design-principles/examples/study-virtualisationicssecurity, infosec, cybersecurity, criticalinfrastructure, IndustrialControlSystems, virtualisation
Secure design principles: Guides for the design of Cyber Secure systems: Design principles and Operational Technology
Secure design principles:Guides for the design of Cyber Secure systems:Design principles and Operational Technologyhttps://www.ncsc.gov.uk/collection/cyber-security-design-principles/examples/study-operational-techicssecurity, infosec, cybersecurity, criticalinfrastructure, IndustrialControlSystems, OT
Cybersecurity Capability Maturity Model (C2M2) Program
Cybersecurity Capability Maturity Model (C2M2) Programhttps://www.energy.gov/ceser/activities/cybersecurity-critical-energy-infrastructure/energy-sector-cybersecurity-0 icssecurity, infosec, cybersecurity, criticalinfrastructure, IndustrialControlSystems
Research Library Updates
Feb 18-2019 Reports Added To Library: Privacy Maturity Model AICPA CICA Canada Cyber Security Centre Canada Effective Regional Cyberthreat […]
SEC Highlighted Research Reports – Jan 07
Strategic Efficiency Consortium Highlighted Research Reports – Jan 07 Editor Pick Reports: Harnessing the Ontario Cybersecurity Opportunity for Growth – […]
SEC Threat Intelligence as a Critical Organizational Need – SEC Report
The critical need for an evidence based, automated, holistic approach of the threat landscape. These are challenging times […]
SEC Security Report September 2017
SEC Security Report September 2017: Editor Picks: News Intelligence Alerts Reports WannaCry Post Mortem: Early Warning Indicators and Lessons Learned […]
SEC Vulnerabilities: Analysis of Exploitable Vulnerability Sequences in Industrial Networked Systems: A Proof of Concepts
Software vulnerabilities can affect the security of any computer and industrial networked systems are no exception. Information about known […]
MGS+ ICS Security Report August 2017
MG Strategy+ ICS Security Report August 2017: Editor Picks: News Intelligence Alerts Reports Financial malware more than twice as prevalent […]
Center for Internet Security MS-ISAC Alert Level
Center for Internet Security MS-ISAC Alert Level
Digital Attack Map Top Daily DDoS attacks worldwide
Arbor Networks Digital Attack Map Top Daily DDoS attacks worldwide
Cybermap Kaspersky
Kaspersky Cybermap
MGS+ ICS Security Report July 2017
MG Strategy+ ICS Security Report July 2017: Editor Picks: News Intelligence Alerts Reports Power plant cyber threat: Lock up your […]
MGS+ ICS Security Report June 2017
MGS+ ICS Security Report June 2017: Editor Picks: News Intelligence Alerts Report Why Future Emphasis Should be on Algorithms – […]
MGS+ ICS Security Report May 2017
MGS+ ICS Security Report May 2017: Editor Picks: News Intelligence Alerts Report ABB buys B&R to help it challenge Siemens […]
MGS+ ICS Security Report April 2017
MGS+ ICS Security Report April 2017: Editor Picks: News Intelligence Alerts Report 2017 Security 100: 20 Coolest Endpoint Security Vendors […]
MGS+ ICS Security Report March 2017
MGS+ ICS Security Report March 2017: Editor Picks: News Intelligence Alerts Reports World’s Biggest Data Breaches Selected losses greater than […]