infojet
<<< <<>>
See the links below for current IT Alerts and useful user Tips/guides
US-CERT/NCAS(National Cyber Awareness System) Main Page
CERT Vulnerability Notes Database at the Carnegie Mellon University Software Engineering Institute
NATIONAL VULNERABILITY DATABASE-NIST
NVD Dashboard
CWE-Common Weakness Enumeration-Mitre
National Security Agency (NSA)-Cybersecurity
Mitre ATT&CK Framework
OWASP web app security checker
US-CERT/NCAS(National Cyber Awareness System) Main Page
CISA Cybersecurity-Combating Cybercrime
CISA Cyber Eessentials
CISA National Cyber Awareness System (NCAS)
NIST SMALL BUSINESS CYBERSECURITY CORNER
CISA - Resources for Small and Midsize Businesses (SMB)
US Small Business Administration (SBA) Cybersecurity for Small Businesses(training)
US Small Business Administration (SBA) Cybersecurity for Small Businesses(training)(direct)
US SBA Cybersecurity resources
FINRA cyber security
SEC cyber security
CISA main (US-CERT-computer emergency readiness team)
Ready.gov (Cyber security)
US Secret Service Cyber security investigations
FTC cyber security
FTC Cyber security for Small Business
US Dept. of Commerce, Cyber security for Small Business-10 tips
US FCC Small business cyber security
Palo Alto Networks (Enterprise Security)
PurpleSec cybersecurity
ATT Cybersecurity
PurpleSec cybersecurity
Cisco Cybersecurity
CERT Recently Published Vulnerability Notes
CERT publishes vulnerability advisories called "Vulnerability Notes." Vulnerability Notes include summaries, technical details, remediation information, and lists of affected vendors. Many vulnerability notes are the result of private coordination and disclosure efforts.
Last updated 2024-12-19T20:29:52.361955+00:00
Recent Vulnerabilities
DHS National Cyber Security Division_US Cert_National Vulnerability Database (Search form)
(1) VU#164934: PDQ Deploy allows reuse of deleted credentials that can compromise a device and facilitate lateral movement
(2) VU#123336: Vulnerable WiFi Alliance example code found in Arcadyan FMIMG51AX000J
(3) VU#138043: A stack-based overflow vulnerability exists in the Microchip Advanced Software Framework (ASF) implementation of the tinydhcp server
(4) VU#455367: Insecure Platform Key (PK) used in UEFI system firmware signature
(5) VU#244112: Multiple SMTP services are susceptible to spoofing attacks due to insufficient enforcement
(6) VU#312260: Use-after-free vulnerability in lighttpd version 1.4.50 and earlier
(7) VU#456537: RADIUS protocol susceptible to forgery attacks.
(8) VU#163057: BMC software fails to validate IPMI session.
(9) VU#238194: R Programming Language implementations are vulnerable to arbitrary code execution during deserialization of .rds and .rdx files
(10) VU#253266: Keras 2 Lambda Layers Allow Arbitrary Code Injection in TensorFlow Models
WordPress specific vulnerabilities in NIST NVD
Drupal specific vulnerabilities in NIST NVD
INFOJET HOME
FBI Internet Crime Complaint Center (IC3.gov)(file an Internet crime complaint Online)
US-CERT DHC Homepage
FBI
DHS(US Dept of Homeland Security)