Security CERT Global
- CVE-2022-48130
- CVE-2022-48113
- CVE-2022-46842
- CVE-2022-45067
- CVE-2022-45807
- CVE-2022-44585
- CVE-2022-40692
- CVE-2023-0253
- CVE-2022-48114
- CVE-2022-46815
- CVE-2022-36401
- CVE-2023-24574
- CVE-2023-0576
- CVE-2022-48082
- CVE-2022-3560
- CVE-2022-48140
- CVE-2022-48079
- CVE-2023-23120
- CVE-2023-23119
- CVE-2022-25894 (uflo)
- CVE-2021-36539 (canvas_learning_management_service)
- CVE-2022-25882 (onnx)
- CVE-2021-33642 (byacc)
- CVE-2022-38066 (quartz-gold_firmware)
- CVE-2022-38715 (quartz-gold_firmware)
- CVE-2022-25860 (simple-git)
- CVE-2022-25631 (symantec_endpoint_protection)
- CVE-2022-38459 (quartz-gold_firmware)
- CVE-2022-38088 (quartz-gold_firmware)
- CVE-2021-26642 (xpressengine)
- CVE-2022-25962 (vagrant.js)
- CVE-2022-36279 (quartz-gold_firmware)
- CVE-2022-25908 (create-choo-electron)
- CVE-2022-25927 (ua-parser-js)
- CVE-2022-39045 (quartz-gold_firmware)
- Baicells Nova
- Delta Electronics DVW-W02W2-E2
- Delta Electronics DX-2100-L1-CN
- Delta Electronics DIAScreen
- Mitsubishi Electric GOT2000 Series and GT SoftGOT2000
- CVE-2022-35977 (redis)
- CVE-2022-40719 (dir-2150_firmware)
- CVE-2018-25078 (man-db)
- CVE-2022-40720 (dir-2150_firmware)
- CVE-2022-40718 (dir-2150_firmware)
- CVE-2022-41140 (dir-867_firmware, dir-878_firmware, dir-882-us_firmware)
- CVE-2022-39193 (mediawiki)
- CVE-2022-3918 (swift_foundation)
- CERTFR-2023-AVI-0088 : Multiples vulnérabilités dans F5 BIG-IP (02 février 2023)
- CERTFR-2023-AVI-0087 : Vulnérabilité dans les produits NetApp (02 février 2023)
What Is Threat Intelligence? Definition and Examples
Key Takeaways
Threat intelligence is the output of analysis based on identification, collection, and enrichment of relevant data and information.
Always keep quantifiable business objectives in mind, and avoid producing intelligence “just in case.”
Threat intelligence falls into two categories. Operational intelligence is produced by computers, whereas strategic intelligence is produced by human analysts.
The two types of threat intelligence are heavily interdependent, and both rely on a skilled and experienced human analyst to develop and maintain them.
Source: https://www.recordedfuture.com/threat-intelligence-definition/
Tags: Threat Intelligence,Threat Intelligence Data,Threat Intelligence Information,Threat Intelligence Platforms,