Security CERT Global
- Unitronics Vision Series PLCs: CVSS (Max): 7.5
- nodejs:18: CVSS (Max): 8.1
- gnutls: CVSS (Max): 5.3
- shim: CVSS (Max): 8.3
- shim: CVSS (Max): 8.3
- kernel: CVSS (Max): 6.7
- Red Hat Update Infrastructure (RHUI): CVSS (Max): 7.5
- shim: CVSS (Max): 8.3
- kernel-rt: CVSS (Max): 6.7
- kernel: CVSS (Max): 7.1
- rhc-worker-script: CVSS (Max): 5.9
- mod_http2: CVSS (Max): 7.5
- less: CVSS (Max): 7.0
- CISA and Partners Release Advisory on Akira Ransomware
- #StopRansomware: Akira Ransomware
- Unitronics Vision Series PLCs
- Oracles kvartalsvisa säkerhetsuppdatering för april 2024
- CISA Releases Three Industrial Control Systems Advisories
- Stellungnahme von CERT.at zum NISG 2024
- CERTFR-2024-AVI-0326 : Multiples vulnérabilités dans Oracle MySQL (18 avril 2024)
- CERTFR-2024-AVI-0319 : Multiples vulnérabilités dans les produits Cisco (18 avril 2024)
- CERTFR-2024-AVI-0325 : Multiples vulnérabilités dans Oracle PeopleSoft (18 avril 2024)
- CERTFR-2024-AVI-0316 : Vulnérabilité dans les produits Xen (18 avril 2024)
- CERTFR-2024-AVI-0318 : Multiples vulnérabilités dans les produits Mitel (18 avril 2024)
- CERTFR-2024-AVI-0324 : Multiples vulnérabilités dans Oracle Systems (18 avril 2024)
- CERTFR-2024-AVI-0320 : Multiples vulnérabilités dans Oracle VirtualBox (18 avril 2024)
- CERTFR-2024-AVI-0317 : Vulnérabilité dans Cisco ClamAV (18 avril 2024)
- CERTFR-2024-AVI-0321 : Multiples vulnérabilités dans Oracle Java SE (18 avril 2024)
- CERTFR-2024-AVI-0323 : Multiples vulnérabilités dans Oracle Weblogic (18 avril 2024)
- CERTFR-2024-AVI-0322 : Multiples vulnérabilités dans Oracle Database Server (18 avril 2024)
- Oracle Releases Critical Patch Update Advisory for April 2024
- Allvarlig sårbarhet i Cisco IMC
- Cyber Assessment Framework 3.2
- Securing Office 365 with better configuration
- Shaping Cybersecurity Policy towards a trusted and secure Europe
- 'NCSC Cyber Series' podcast now available on Spotify
- JVN: WordPress用プラグインForminatorにおける複数の脆弱性
- JVN: PuTTY SSHクライアントのECDSA署名処理に脆弱性
- Multiple vulnerabilities in WordPress Plugin "Forminator"
- お知らせ:ソフトウェア等の脆弱性関連情報に関する届出状況[2024年第1四半期(1月~3月)]
- firefox-esr: CVSS (Max): 7.5*
- Cisco Integrated Management Controller (IMC): CVSS (Max): 8.7
- Xen: CVSS (Max): 4.7
- Red Hat Single Sign-On: CVSS (Max): 8.1
- Cisco Integrated Management Controller (IMC): CVSS (Max): None
- jetty9: CVSS (Max): 7.5
- Jenkins (core): CVSS (Max): 5.9
- tomcat10: CVSS (Max): 7.5
- Red Hat build of Keycloak: CVSS (Max): 8.1
- Red Hat build of Keycloak 22.0.10: CVSS (Max): 8.1
3 Keys to Securing Converged IT/OT Environments
3 Keys to Securing Converged IT/OT Environments -Securing the newly converged IT/OT environment requires a solid strategy https://www.industryweek.com/technology-and-iiot/article/21127438/3-keys-to-securing-converged-itot-environments ITOT, iiot, […]
Industrial network security best practice advice
Industrial network security best practice advice Four myths about networking and cybersecurity related to operations technology (OT) systems are highlighted […]
Managing risk in today’s IoT landscape: not a one-and-done
Managing risk in today’s IoT landscape: not a one-and-done https://www.microsoft.com/security/blog/2020/04/28/managing-risk-todays-iot-landscape-not-one-and-done/ cybersecurity, iiot, scada, cloudscada, icssecurity -holistic approach to minimizing risk […]
A Cloud Based Alternative to Traditional SCADA
A Cloud Based Alternative to Traditional SCADA cybersecurity, iiot, scada, cloudscada, icssecurity -one of the benefits of leveraging the IIoT […]
Secure design principles: Guides for the design of Cyber Secure systems: Security design principles and virtualisation
Secure design principles:Guides for the design of Cyber Secure systems:Security design principles and virtualisationhttps://www.ncsc.gov.uk/collection/cyber-security-design-principles/examples/study-virtualisationicssecurity, infosec, cybersecurity, criticalinfrastructure, IndustrialControlSystems, virtualisation
Secure design principles: Guides for the design of Cyber Secure systems: Design principles and Operational Technology
Secure design principles:Guides for the design of Cyber Secure systems:Design principles and Operational Technologyhttps://www.ncsc.gov.uk/collection/cyber-security-design-principles/examples/study-operational-techicssecurity, infosec, cybersecurity, criticalinfrastructure, IndustrialControlSystems, OT
Cybersecurity Capability Maturity Model (C2M2) Program
Cybersecurity Capability Maturity Model (C2M2) Programhttps://www.energy.gov/ceser/activities/cybersecurity-critical-energy-infrastructure/energy-sector-cybersecurity-0 icssecurity, infosec, cybersecurity, criticalinfrastructure, IndustrialControlSystems