infojet

<<<   <<>>

See the links below for current IT Alerts and useful user Tips/guides

US-CERT/NCAS(National Cyber Awareness System) Main Page

CERT Vulnerability Notes Database at the Carnegie Mellon University Software Engineering Institute







NATIONAL VULNERABILITY DATABASE-NIST

NVD Dashboard

CWE-Common Weakness Enumeration-Mitre

National Security Agency (NSA)-Cybersecurity

Mitre ATT&CK Framework

OWASP web app security checker

US-CERT/NCAS(National Cyber Awareness System) Main Page

CISA Cybersecurity-Combating Cybercrime

CISA Cyber Eessentials

CISA National Cyber Awareness System (NCAS)



NIST SMALL BUSINESS CYBERSECURITY CORNER

CISA - Resources for Small and Midsize Businesses (SMB)

US Small Business Administration (SBA) Cybersecurity for Small Businesses(training)



US Small Business Administration (SBA) Cybersecurity for Small Businesses(training)(direct)



US SBA Cybersecurity resources



FINRA cyber security







SEC cyber security





CISA main (US-CERT-computer emergency readiness team)





Ready.gov (Cyber security)





US Secret Service Cyber security investigations





FTC cyber security







FTC Cyber security for Small Business





US Dept. of Commerce, Cyber security for Small Business-10 tips







US FCC Small business cyber security



















Palo Alto Networks (Enterprise Security)



PurpleSec cybersecurity

ATT Cybersecurity



PurpleSec cybersecurity

Cisco Cybersecurity



















CERT Recently Published Vulnerability Notes
CERT publishes vulnerability advisories called "Vulnerability Notes." Vulnerability Notes include summaries, technical details, remediation information, and lists of affected vendors. Many vulnerability notes are the result of private coordination and disclosure efforts.
Last updated 2024-04-15T11:46:41.862629+00:00
Recent Vulnerabilities
DHS National Cyber Security Division_US Cert_National Vulnerability Database (Search form)

(1) VU#123335: Multiple programming languages fail to escape arguments properly in Microsoft Windows
(2) VU#155143: Linux kernel on Intel systems is susceptible to Spectre v2 attacks
(3) VU#421644: HTTP/2 CONTINUATION frames can be utilized for DoS attacks
(4) VU#417980: Implementations of UDP-based application protocols are vulnerable to network loops
(5) VU#488902: CPU hardware utilizing speculative execution may be vulnerable to speculative race conditions
(6) VU#949046: Sceiner firmware locks and associated devices are vulnerable to encryption downgrade and arbitrary file upload attacks
(7) VU#446598: GPU kernel implementations susceptible to memory leak
(8) VU#302671: SMTP end-of-data uncertainty can be abused to spoof emails and bypass policies
(9) VU#132380: Vulnerabilities in EDK2 NetworkPkg IP stack implementation.
(10) VU#811862: Image files in UEFI can be abused to modify boot behavior





Tweets by @USCERT_gov



Search the NIST NVD for Vulnerabilities
Enter vendor, software, or keyword or press Go without entering any search terms to get all recent vulnerabilies from any vendor


WordPress specific vulnerabilities in NIST NVD

Drupal specific vulnerabilities in NIST NVD







INFOJET HOME



FBI Internet Crime Complaint Center (IC3.gov)(file an Internet crime complaint Online)

US-CERT DHC Homepage

FBI

DHS(US Dept of Homeland Security)