Security CERT Global
- CISA Adds One Known Exploited Vulnerability to Catalog
- Ubuntu Security Update
- Mageia Security Update
- Oracle Linux Security Update
- SUSE Security Update
- HP Security Update
- Foxit Security Update
- OpenSSL Security Update
- DebianOS Security Update
- Dell Security Update
- Chrome Security Update
- CVE-2023-32318 (nextcloud_server)
- CERTFR-2023-AVI-0430 : Multiples vulnérabilités dans Stormshield Network Security (02 juin 2023)
- CERTFR-2023-AVI-0428 : Multiples vulnérabilités dans les produits Splunk (02 juin 2023)
- CERTFR-2023-AVI-0429 : Multiples vulnérabilités dans le noyau Linux d’Ubuntu (02 juin 2023)
- CERTFR-2023-AVI-0431 : Vulnérabilité dans le noyau Linux de RedHat (02 juin 2023)
- CERT-SE:s veckobrev v.22
- 0-klik-hackangreb mod iOS-brugere
- ESB-2023.3151 - [Win][UNIX/Linux] Splunk Enterprise and Cloud Platform: CVSS (Max): 8.8
- ESB-2023.3147 - [Win][UNIX/Linux] Splunk App: CVSS (Max): 4.7
- ESB-2023.3148 - [Win][UNIX/Linux] Splunk Enterprise and Cloud Platform: CVSS (Max): 4.8
- ESB-2023.3152 - [Win][UNIX/Linux] Google Chrome: CVSS (Max): 8.8*
- ESB-2023.3149 - [Win][UNIX/Linux] Splunk App for Stream: CVSS (Max): 7.8
- ESB-2023.3143 - [Win][UNIX/Linux] Splunk Enterprise: CVSS (Max): 9.8*
- ESB-2023.3153 - [SUSE] kubernetes1.18: CVSS (Max): None
- ESB-2023.3146 - [Win][UNIX/Linux] Universal Forwarders: CVSS (Max): 9.8
- ESB-2023.3150 - [Win][UNIX/Linux] Splunk Enterprise and Cloud Platform : CVSS (Max): 7.2
- ESB-2023.3145 - [Win][UNIX/Linux] Splunk App: CVSS (Max): 8.1
- ESB-2023.3144 - [Win][UNIX/Linux] Splunk Enterprise and Cloud Platform: CVSS (Max): 4.3
- ESB-2023.3131 - [SUSE] openssl-1_1: CVSS (Max): 6.5
- ESB-2023.3134 - Splunk EnterpriseCVSS (Max): 5.4
- ESB-2023.3141 - [Win][UNIX/Linux] Splunk Enterprise and Cloud Platform: CVSS (Max): 4.3
- ESB-2023.3132 - [SUSE] ImageMagick: CVSS (Max): 3.3
- ESB-2023.3138 - [Appliance] Advantech WebAccess/SCADA: CVSS (Max): 7.2
- ESB-2023.3133 - [Debian] cups: CVSS (Max): 5.9
- ESB-2023.3139 - netatalk: CVSS (Max): 9.8
- ESB-2023.3140 - [Win][UNIX/Linux] Splunk Enterprise: CVSS (Max): 3.4
- ESB-2023.3136 - [Win][Linux] Splunk Cloud: CVSS (Max): None
- ESB-2023.3130 - [SUSE] ImageMagick: CVSS (Max): 7.5
- ESB-2023.3135 - [Win][UNIX/Linux] Splunk Enterprise and Cloud Platform: CVSS (Max): 6.5
- ESB-2023.3142 - [Win][UNIX/Linux] Splunk Enterprise and Cloud Platform: CVSS (Max): 7.7
- ESB-2023.3129 - [SUSE] openssl-1_1: CVSS (Max): 6.5
- ESB-2023.3137 - [Appliance] HID Global SAFE: CVSS (Max): 7.3
- CVE-2022-45938
- CVE-2023-28147
- CVE-2023-27745
- CVE-2023-29725
- CVE-2016-15032
- CVE-2023-29724
- CVE-2023-27744
Threat Intelligence’s Big Data Problem
Threat Intelligence’s Big Data Problem
Security teams are drowning in often useless threat intel data, but signs of maturity are emerging in what IT-Harvest predicts will be a $1.5 billion market by 2018
Threat intelligence platform products such as those of ThreatConnect, ThreatStream (now Anomali), ThreatQuotient, and BrightPoint Security, made up $61 million of 2015’s total threat intel market revenues, according to IT-Harvest. The market is on track to hit $1.5 billion in 2018 at the current rate of growth, according to the report, which includes a look at more than 20 threat intelligence vendors, including FireEye’s iSIGHT Partners, Cyveillance+LookingGlass, Digital Shadows, and Flashpoint Intel.
Source: https://www.darkreading.com/threat-intelligence/threat-intelligences-big-data-problem/d/d-id/1324702
Tags: Threat Intelligence,Threat Intelligence Data,Threat Intelligence Information,Threat Intelligence Platforms,