infojet

<<<   <<>>

See the links below for current IT Alerts and useful user Tips/guides

US-CERT/NCAS(National Cyber Awareness System) Main Page

CERT Vulnerability Notes Database at the Carnegie Mellon University Software Engineering Institute







NATIONAL VULNERABILITY DATABASE-NIST

NVD Dashboard

CWE-Common Weakness Enumeration-Mitre

National Security Agency (NSA)-Cybersecurity

Mitre ATT&CK Framework

OWASP web app security checker

US-CERT/NCAS(National Cyber Awareness System) Main Page

CISA Cybersecurity-Combating Cybercrime

CISA Cyber Eessentials

CISA National Cyber Awareness System (NCAS)



NIST SMALL BUSINESS CYBERSECURITY CORNER

CISA - Resources for Small and Midsize Businesses (SMB)

US Small Business Administration (SBA) Cybersecurity for Small Businesses(training)



US Small Business Administration (SBA) Cybersecurity for Small Businesses(training)(direct)



US SBA Cybersecurity resources



FINRA cyber security







SEC cyber security





CISA main (US-CERT-computer emergency readiness team)





Ready.gov (Cyber security)





US Secret Service Cyber security investigations





FTC cyber security







FTC Cyber security for Small Business





US Dept. of Commerce, Cyber security for Small Business-10 tips







US FCC Small business cyber security



















Palo Alto Networks (Enterprise Security)



PurpleSec cybersecurity

ATT Cybersecurity



PurpleSec cybersecurity

Cisco Cybersecurity



















CERT Recently Published Vulnerability Notes
CERT publishes vulnerability advisories called "Vulnerability Notes." Vulnerability Notes include summaries, technical details, remediation information, and lists of affected vendors. Many vulnerability notes are the result of private coordination and disclosure efforts.
Last updated 2024-12-19T20:29:52.361955+00:00
Recent Vulnerabilities
DHS National Cyber Security Division_US Cert_National Vulnerability Database (Search form)

(1) VU#164934: PDQ Deploy allows reuse of deleted credentials that can compromise a device and facilitate lateral movement
(2) VU#123336: Vulnerable WiFi Alliance example code found in Arcadyan FMIMG51AX000J
(3) VU#138043: A stack-based overflow vulnerability exists in the Microchip Advanced Software Framework (ASF) implementation of the tinydhcp server
(4) VU#455367: Insecure Platform Key (PK) used in UEFI system firmware signature
(5) VU#244112: Multiple SMTP services are susceptible to spoofing attacks due to insufficient enforcement
(6) VU#312260: Use-after-free vulnerability in lighttpd version 1.4.50 and earlier
(7) VU#456537: RADIUS protocol susceptible to forgery attacks.
(8) VU#163057: BMC software fails to validate IPMI session.
(9) VU#238194: R Programming Language implementations are vulnerable to arbitrary code execution during deserialization of .rds and .rdx files
(10) VU#253266: Keras 2 Lambda Layers Allow Arbitrary Code Injection in TensorFlow Models





Tweets by @USCERT_gov



Search the NIST NVD for Vulnerabilities
Enter vendor, software, or keyword or press Go without entering any search terms to get all recent vulnerabilies from any vendor


WordPress specific vulnerabilities in NIST NVD

Drupal specific vulnerabilities in NIST NVD







INFOJET HOME



FBI Internet Crime Complaint Center (IC3.gov)(file an Internet crime complaint Online)

US-CERT DHC Homepage

FBI

DHS(US Dept of Homeland Security)