Security CERT Global
- CERTFR-2024-AVI-0331 : Multiples vulnérabilités dans SolarWinds Platform (19 avril 2024)
- CERTFR-2024-AVI-0327 : Multiples vulnérabilités dans Microsoft Edge (19 avril 2024)
- CERTFR-2024-AVI-0332 : Multiples vulnérabilités dans les produits Red Hat (19 avril 2024)
- CERTFR-2024-AVI-0330 : Multiples vulnérabilités dans les produits IBM (19 avril 2024)
- CERTFR-2024-AVI-0333 : Multiples vulnérabilités dans le noyau Linux d’Ubuntu (19 avril 2024)
- CERTFR-2024-AVI-0328 : Vulnérabilité dans Citrix uberAgent (19 avril 2024)
- CERTFR-2024-AVI-0329 : Multiples vulnérabilités dans le noyau Linux de SUSE (19 avril 2024)
- CERTFR-2024-AVI-0334 : Multiples vulnérabilités dans le noyau Linux de Debian (19 avril 2024)
- Cisco Releases Security Advisories for Cisco Integrated Management Controller
- CERT-SE:s veckobrev v.16
- LINE client for iOS vulnerable to improper server certificate verification
- Armeria-saml improperly handles SAML messages
- tzdata: CVSS (Max): None
- firefox: CVSS (Max): 7.5
- sssd: CVSS (Max): 7.1
- firefox: CVSS (Max): 7.5
- tomcat: CVSS (Max): 7.5
- Migration Toolkit for Runtimes: CVSS (Max): 5.9
- firefox: CVSS (Max): 7.5
- OpenJDK 21.0.3: CVSS (Max): 3.7
- Red Hat Service Interconnect 1.5.3: CVSS (Max): 7.5
- sssd: CVSS (Max): 7.1
- firefox: CVSS (Max): 7.5
- firefox: CVSS (Max): 7.5
- firefox: CVSS (Max): 7.5
- sssd: CVSS (Max): 7.1
- firefox: CVSS (Max): 7.5
- Migration Toolkit for Runtimes: CVSS (Max): 5.9
- sssd: CVSS (Max): 7.1
- Migration Toolkit for Containers (MTC) 1.8.3: CVSS (Max): 6.5
- firefox: CVSS (Max): 7.5
- firefox: CVSS (Max): 7.5
- kernel: CVSS (Max): 6.7
- shim: CVSS (Max): 8.3
- Red Hat Update Infrastructure (RHUI): CVSS (Max): 7.5
- gnutls: CVSS (Max): 5.3
- rhc-worker-script: CVSS (Max): 5.9
- nodejs:18: CVSS (Max): 8.1
- kernel-rt: CVSS (Max): 6.7
- kernel: CVSS (Max): 7.1
- Unitronics Vision Series PLCs: CVSS (Max): 7.5
- mod_http2: CVSS (Max): 7.5
- shim: CVSS (Max): 8.3
- less: CVSS (Max): 7.0
- shim: CVSS (Max): 8.3
- CISA and Partners Release Advisory on Akira Ransomware
- #StopRansomware: Akira Ransomware
- Unitronics Vision Series PLCs
- Oracles kvartalsvisa säkerhetsuppdatering för april 2024
- CISA Releases Three Industrial Control Systems Advisories
3 Keys to Securing Converged IT/OT Environments
3 Keys to Securing Converged IT/OT Environments -Securing the newly converged IT/OT environment requires a solid strategy https://www.industryweek.com/technology-and-iiot/article/21127438/3-keys-to-securing-converged-itot-environments ITOT, iiot, […]
Industrial network security best practice advice
Industrial network security best practice advice Four myths about networking and cybersecurity related to operations technology (OT) systems are highlighted […]
Data flow is no longer hierarchical
Data flow is no longer hierarchical Can industrial edge computing fit into the Purdue model? edgecomputing, iiot, SCADA, cloudscada, industrialautomation, […]
IT-OT collaboration needs context and increased visibility –
IT-OT collaboration needs context and increased visibility – Information technology (IT) and operational technology (OT) are continuing the process of […]
Trends for Industry 4.0 in 2020 and Beyond
Trends for Industry 4.0 in 2020 and Beyond – Greater flexibility, virtual validation, industrial controllers, and edge computing are some […]
The IoT Really Does Work in the Factory
The IoT Really Does Work in the Factory – Industrial IoT pays off big in terms of reduced maintenance and […]
ICSaaS – ICS as a cloud service is coming: Will the benefits outweigh the risks?
ICSaaS – ICS as a cloud service is coming: Will the benefits outweigh the risks? –Is plugging critical infrastructure into […]
Managing risk in today’s IoT landscape: not a one-and-done
Managing risk in today’s IoT landscape: not a one-and-done https://www.microsoft.com/security/blog/2020/04/28/managing-risk-todays-iot-landscape-not-one-and-done/ cybersecurity, iiot, scada, cloudscada, icssecurity -holistic approach to minimizing risk […]
Introduce analytics best practices into industrial environments
Introduce analytics best practices into industrial environments -Put analytics in the hands of the process experts who understand the data […]
A Cloud Based Alternative to Traditional SCADA
A Cloud Based Alternative to Traditional SCADA cybersecurity, iiot, scada, cloudscada, icssecurity -one of the benefits of leveraging the IIoT […]
SCADA: Alive and Well in the Age of IoT
SCADA: Alive and Well in the Age of IoT – Despite the onslaught of the Internet of Things within the […]
SEC Security Report September 2017
SEC Security Report September 2017: Editor Picks: News Intelligence Alerts Reports WannaCry Post Mortem: Early Warning Indicators and Lessons Learned […]
SEC Vulnerabilities: Analysis of Exploitable Vulnerability Sequences in Industrial Networked Systems: A Proof of Concepts
Software vulnerabilities can affect the security of any computer and industrial networked systems are no exception. Information about known […]
MGS+ ICS Security Report July 2017
MG Strategy+ ICS Security Report July 2017: Editor Picks: News Intelligence Alerts Reports Power plant cyber threat: Lock up your […]
MGS+ ICS Security Report March 2017
MGS+ ICS Security Report March 2017: Editor Picks: News Intelligence Alerts Reports World’s Biggest Data Breaches Selected losses greater than […]