SANS | The CVE's They are A-Changing!, (Wed, Apr 17th) | 19-04-2024 | 0 |
FR-CERT Avis | CERTFR-2024-AVI-0334 : Multiples vulnérabilités dans le noyau Linux de Debian (19 avril 2024) | 19-04-2024 | 1 |
FR-CERT Avis | CERTFR-2024-AVI-0333 : Multiples vulnérabilités dans le noyau Linux d’Ubuntu (19 avril 2024) | 19-04-2024 | 2 |
FR-CERT Avis | CERTFR-2024-AVI-0332 : Multiples vulnérabilités dans les produits Red Hat (19 avril 2024) | 19-04-2024 | 3 |
FR-CERT Avis | CERTFR-2024-AVI-0331 : Multiples vulnérabilités dans SolarWinds Platform (19 avril 2024) | 19-04-2024 | 4 |
CERT-Bund DE | [UPDATE] [mittel] Mitel SIP Phone: Mehrere Schwachstellen | 19-04-2024 | 5 |
US-CERT CISA | Cisco Releases Security Advisories for Cisco Integrated Management Controller | 19-04-2024 | 6 |
FR-CERT Avis | CERTFR-2024-AVI-0330 : Multiples vulnérabilités dans les produits IBM (19 avril 2024) | 19-04-2024 | 7 |
FR-CERT Avis | CERTFR-2024-AVI-0329 : Multiples vulnérabilités dans le noyau Linux de SUSE (19 avril 2024) | 19-04-2024 | 8 |
CERT-Bund DE | [UPDATE] [hoch] VMware Tanzu Spring Security: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 19-04-2024 | 9 |
CERT-Bund DE | [NEU] [mittel] Broadcom Brocade SANnav: Mehrere Schwachstellen | 19-04-2024 | 10 |
CERT-Bund DE | [NEU] [mittel] ownCloud: Mehrere Schwachstellen | 19-04-2024 | 11 |
CERT-Bund DE | [NEU] [mittel] IBM App Connect Enterprise: Schwachstelle ermöglicht Denial of Service | 19-04-2024 | 12 |
CERT-Bund DE | [NEU] [niedrig] Xpdf: Schwachstelle ermöglicht Denial of Service | 19-04-2024 | 13 |
CERT-Bund DE | [UPDATE] [mittel] Linux Kernel: Schwachstelle ermöglicht Denial of Service | 19-04-2024 | 14 |
CERT-Bund DE | [UPDATE] [mittel] Linux Kernel: Schwachstelle ermöglicht Denial of Service | 19-04-2024 | 15 |
CERT-Bund DE | [UPDATE] [mittel] Linux Kernel: Schwachstelle ermöglicht nicht spezifizierten Angriff | 19-04-2024 | 16 |
CERT-Bund DE | [UPDATE] [hoch] Red Hat Satellite: Mehrere Schwachstellen | 19-04-2024 | 17 |
CERT-Bund DE | [UPDATE] [mittel] Linux Kernel: Schwachstelle ermöglicht Denial of Service oder Offenlegung von Informationen | 19-04-2024 | 18 |
CERT-Bund DE | [UPDATE] [kritisch] Apache ActiveMQ: Schwachstelle ermöglicht Codeausführung | 19-04-2024 | 19 |
CERT-Bund DE | [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 19-04-2024 | 20 |
CERT-Bund DE | [UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen | 19-04-2024 | 21 |
CERT-Bund DE | [UPDATE] [mittel] Linux Kernel: Schwachstelle ermöglicht Denial of Service | 19-04-2024 | 22 |
CERT-Bund DE | [UPDATE] [mittel] Linux Kernel (ATA over Ethernet): Schwachstelle ermöglicht Denial of Service und Code-Ausführung | 19-04-2024 | 23 |
CERT-Bund DE | [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 19-04-2024 | 24 |
CERT-Bund DE | [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen | 19-04-2024 | 25 |
CERT-Bund DE | [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen | 19-04-2024 | 26 |
CERT-Bund DE | [UPDATE] [mittel] Apache Commons: Mehrere Schwachstellen ermöglichen Denial of Service | 19-04-2024 | 27 |
CERT-Bund DE | [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen | 19-04-2024 | 28 |
CERT-Bund DE | [UPDATE] [mittel] Linux-Kernel: Mehrere Schwachstellen ermöglichen Denial of Service und unspezifische Angriffe | 19-04-2024 | 29 |
CERT-Bund DE | [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 19-04-2024 | 30 |
CERT-Bund DE | [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service und unspezifische Angriffe | 19-04-2024 | 31 |
CERT-Bund DE | [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen | 19-04-2024 | 32 |
CERT-Bund DE | [UPDATE] [mittel] Golang Go: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 19-04-2024 | 33 |
CERT-Bund DE | [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen | 19-04-2024 | 34 |
CERT-Bund DE | [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen | 19-04-2024 | 35 |
CERT-Bund DE | [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 19-04-2024 | 36 |
CERT-Bund DE | [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen | 19-04-2024 | 37 |
CERT-Bund DE | [UPDATE] [hoch] pgAdmin: Schwachstelle ermöglicht Codeausführung | 19-04-2024 | 38 |
CERT-Bund DE | [UPDATE] [mittel] Linux Kernel: Schwachstelle ermöglicht Denial of Service | 19-04-2024 | 39 |
CERT-Bund DE | [UPDATE] [mittel] Intel Prozessor: Mehrere Schwachstellen | 19-04-2024 | 40 |
CERT-Bund DE | [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 19-04-2024 | 41 |
CERT-Bund DE | [UPDATE] [mittel] Apache Tomcat: Mehrere Schwachstellen ermöglichen Denial of Service | 19-04-2024 | 42 |
CERT-Bund DE | [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service und unspezifische Angriffe | 19-04-2024 | 43 |
CERT-Bund DE | [UPDATE] [hoch] Mozilla Firefox, Firefox ESR und Thunderbird: Mehrere Schwachstellen | 19-04-2024 | 44 |
CERT-Bund DE | [UPDATE] [mittel] GnuTLS: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen und DoS | 19-04-2024 | 45 |
CERT-Bund DE | [UPDATE] [mittel] Red Hat Enterprise Linux: Golang-Komponenten-Schwachstelle ermöglicht Denial of Service | 19-04-2024 | 46 |
CERT-Bund DE | [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 19-04-2024 | 47 |
CERT-Bund DE | [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen | 19-04-2024 | 48 |
CERT-Bund DE | [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 19-04-2024 | 49 |
CERT-Bund DE | [UPDATE] [mittel] Linux Kernel: Schwachstelle ermöglicht nicht spezifizierten Angriff | 19-04-2024 | 50 |
CERT-Bund DE | [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen | 19-04-2024 | 51 |
CERT-Bund DE | [UPDATE] [mittel] HTTP/2: Mehrere Schwachstellen ermöglichen Denial of Service | 19-04-2024 | 52 |
CERT-Bund DE | [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen | 19-04-2024 | 53 |
CERT-Bund DE | [UPDATE] [mittel] Red Hat Integration: Mehrere Schwachstellen | 19-04-2024 | 54 |
CERT-Bund DE | [UPDATE] [hoch] Oracle Java SE: Mehrere Schwachstellen | 19-04-2024 | 55 |
CERT-Bund DE | [UPDATE] [mittel] Google Chrome: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 19-04-2024 | 56 |
CERT-Bund DE | [UPDATE] [mittel] Mozilla Firefox: Mehrere Schwachstellen | 19-04-2024 | 57 |
CERT-Bund DE | [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen | 19-04-2024 | 58 |
CERT-Bund DE | [UPDATE] [mittel] IBM WebSphere Application Server: Mehrere Schwachstellen | 19-04-2024 | 59 |
CERT-Bund DE | [NEU] [mittel] Microsoft Edge: Mehrere Schwachstellen | 19-04-2024 | 60 |
CERT-Bund DE | [UPDATE] [mittel] GNU libc: Schwachstelle ermöglicht Denial of Service | 19-04-2024 | 61 |
CERT-Bund DE | [NEU] [mittel] Check Point Zone Alarm: Schwachstelle ermöglicht Privilegieneskalation | 19-04-2024 | 62 |
CERT-Bund DE | [NEU] [mittel] SolarWinds Platform: Mehrere Schwachstellen | 19-04-2024 | 63 |
CERT-Bund DE | [NEU] [mittel] Red Hat Enterprise Linux (sssd): Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 19-04-2024 | 64 |
FR-CERT Avis | CERTFR-2024-AVI-0328 : Vulnérabilité dans Citrix uberAgent (19 avril 2024) | 19-04-2024 | 65 |
CSIRT IT | Risolte vulnerabilità in prodotti Cisco
(AL04/240418/CSIRT-ITA) - Aggiornamento | 19-04-2024 | 66 |
FR-CERT Avis | CERTFR-2024-AVI-0327 : Multiples vulnérabilités dans Microsoft Edge (19 avril 2024) | 19-04-2024 | 67 |
MSRC Security Update | CVE-2024-29991 Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability | 19-04-2024 | 68 |
SANS | ISC Stormcast For Friday, April 19th, 2024 https://isc.sans.edu/podcastdetail/8946, (Fri, Apr 19th) | 19-04-2024 | 69 |
CSIRT IT | Aggiornamenti per ClamAV
(AL05/240418/CSIRT-ITA) | 18-04-2024 | 70 |
SANS | A Vuln is a Vuln, unless the CVE for it is after Feb 12, 2024, (Wed, Apr 17th) | 18-04-2024 | 71 |
FR-CERT Avis | CERTFR-2024-AVI-0326 : Multiples vulnérabilités dans Oracle MySQL (18 avril 2024) | 18-04-2024 | 72 |
FR-CERT Avis | CERTFR-2024-AVI-0325 : Multiples vulnérabilités dans Oracle PeopleSoft (18 avril 2024) | 18-04-2024 | 73 |
FR-CERT Avis | CERTFR-2024-AVI-0324 : Multiples vulnérabilités dans Oracle Systems (18 avril 2024) | 18-04-2024 | 74 |
FR-CERT Avis | CERTFR-2024-AVI-0323 : Multiples vulnérabilités dans Oracle Weblogic (18 avril 2024) | 18-04-2024 | 75 |
FR-CERT Avis | CERTFR-2024-AVI-0322 : Multiples vulnérabilités dans Oracle Database Server (18 avril 2024) | 18-04-2024 | 76 |
FR-CERT Avis | CERTFR-2024-AVI-0321 : Multiples vulnérabilités dans Oracle Java SE (18 avril 2024) | 18-04-2024 | 77 |
FR-CERT Avis | CERTFR-2024-AVI-0320 : Multiples vulnérabilités dans Oracle VirtualBox (18 avril 2024) | 18-04-2024 | 78 |
US-CERT CISA | CISA Releases Three Industrial Control Systems Advisories | 18-04-2024 | 79 |
US-CERT CISA | Unitronics Vision Series PLCs | 18-04-2024 | 80 |
US-CERT CISA | #StopRansomware: Akira Ransomware | 18-04-2024 | 81 |
US-CERT CISA | CISA and Partners Release Advisory on Akira Ransomware | 18-04-2024 | 82 |
US-CERT CISA | Oracle Releases Critical Patch Update Advisory for April 2024 | 18-04-2024 | 83 |
CERT-Bund DE | [UPDATE] [hoch] Linux "Shim": Schwachstelle ermöglicht Übernahme der Kontrolle | 18-04-2024 | 84 |
CERT-Bund DE | [UPDATE] [hoch] Red Hat Enterprise Linux (shim): Mehrere Schwachstellen | 18-04-2024 | 85 |
CERT-Bund DE | [UPDATE] [mittel] PHP: Mehrere Schwachstellen | 18-04-2024 | 86 |
CERT-Bund DE | [UPDATE] [mittel] AMD Prozessoren: Schwachstelle ermöglicht Offenlegung von Informationen | 18-04-2024 | 87 |
CERT-Bund DE | [UPDATE] [mittel] Linux Kernel: Schwachstelle ermöglicht Denial of Service | 18-04-2024 | 88 |
CERT-Bund DE | [UPDATE] [mittel] Linux Kernel: Schwachstelle ermöglicht Denial of Service | 18-04-2024 | 89 |
CERT-Bund DE | [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen | 18-04-2024 | 90 |
CERT-Bund DE | [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 18-04-2024 | 91 |
CERT-Bund DE | [UPDATE] [mittel] Apache Commons und Apache Tomcat: Schwachstelle ermöglicht Denial of Service | 18-04-2024 | 92 |
CERT-Bund DE | [UPDATE] [mittel] Apache Tomcat: Schwachstelle ermöglicht Denial of Service | 18-04-2024 | 93 |
CERT-Bund DE | [UPDATE] [mittel] Django: Schwachstelle ermöglicht Denial of Service | 18-04-2024 | 94 |
CERT-Bund DE | [UPDATE] [mittel] Golang Go: Mehrere Schwachstellen | 18-04-2024 | 95 |
CERT-Bund DE | [UPDATE] [mittel] Django: Schwachstelle ermöglicht Denial of Service | 18-04-2024 | 96 |
CERT-Bund DE | [UPDATE] [mittel] Django: Schwachstelle ermöglicht Denial of Service | 18-04-2024 | 97 |
CERT-Bund DE | [UPDATE] [mittel] Apache Tomcat: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 18-04-2024 | 98 |
CERT-Bund DE | [UPDATE] [mittel] Golang Go: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 18-04-2024 | 99 |
CERT-Bund DE | [UPDATE] [mittel] Golang Go: Schwachstelle ermöglicht Offenlegung von Informationen | 18-04-2024 | 100 |
CERT-Bund DE | [UPDATE] [mittel] SSH Protokoll: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 18-04-2024 | 101 |
CERT-Bund DE | [UPDATE] [niedrig] Python (pip): Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 18-04-2024 | 102 |
CERT-Bund DE | [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen | 18-04-2024 | 103 |
CERT-Bund DE | [UPDATE] [hoch] EDK2 NetworkPkg IP stack implementation: Mehrere Schwachstellen | 18-04-2024 | 104 |
CERT-Bund DE | [UPDATE] [mittel] Xen: Schwachstelle ermöglicht Denial of Service | 18-04-2024 | 105 |
CERT-Bund DE | [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 18-04-2024 | 106 |
CERT-Bund DE | [UPDATE] [mittel] Linux Kernel: Schwachstelle ermöglicht Offenlegung von Informationen | 18-04-2024 | 107 |
CERT-Bund DE | [UPDATE] [mittel] Django: Schwachstelle ermöglicht Denial of Service | 18-04-2024 | 108 |
CERT-Bund DE | [UPDATE] [mittel] Internet Systems Consortium BIND: Mehrere Schwachstellen ermöglichen Denial of Service | 18-04-2024 | 109 |
CERT-Bund DE | [UPDATE] [hoch] Node.js: Mehrere Schwachstellen | 18-04-2024 | 110 |
CERT-Bund DE | [UPDATE] [mittel] less: Schwachstelle ermöglicht Codeausführung | 18-04-2024 | 111 |
CERT-Bund DE | [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen | 18-04-2024 | 112 |
CERT-Bund DE | [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen | 18-04-2024 | 113 |
CERT-Bund DE | [UPDATE] [mittel] Eclipse Jetty: Schwachstelle ermöglicht Denial of Service | 18-04-2024 | 114 |
CERT-Bund DE | [UPDATE] [hoch] Red Hat Ansible Automation Platform: Mehrere Schwachstellen | 18-04-2024 | 115 |
CERT-Bund DE | [UPDATE] [mittel] Django: Schwachstelle ermöglicht Denial of Service | 18-04-2024 | 116 |
CERT-Bund DE | [UPDATE] [mittel] libvirt: Schwachstelle ermöglicht Denial of Service | 18-04-2024 | 117 |
CERT-Bund DE | [UPDATE] [mittel] libvirt: Schwachstelle ermöglicht Denial of Service | 18-04-2024 | 118 |
CERT-Bund DE | [UPDATE] [mittel] libvirt: Schwachstelle ermöglicht Denial of Service | 18-04-2024 | 119 |
CERT-Bund DE | [UPDATE] [mittel] X.Org X Server und Xming: Mehrere Schwachstellen | 18-04-2024 | 120 |
CERT-Bund DE | [UPDATE] [mittel] Apache HTTP Server: Mehrere Schwachstellen ermöglichen Manipulation von Daten | 18-04-2024 | 121 |
CERT-Bund DE | [UPDATE] [hoch] PuTTY: Schwachstelle ermöglicht Erlangen des privaten Schlüssels | 18-04-2024 | 122 |
CERT-Bund DE | [UPDATE] [hoch] Oracle Communications: Mehrere Schwachstellen | 18-04-2024 | 123 |
CERT-Bund DE | [NEU] [mittel] Dell BIOS: Schwachstelle ermöglicht Privilegieneskalation und DoS | 18-04-2024 | 124 |
CERT-Bund DE | [NEU] [hoch] ffmpeg: Mehrere Schwachstellen ermöglichen Denial of Service | 18-04-2024 | 125 |
CERT-Bund DE | [NEU] [mittel] PyTorch: Mehrere Schwachstellen ermöglichen Denial of Service | 18-04-2024 | 126 |
CERT-Bund DE | [NEU] [mittel] ClamAV: Schwachstelle ermöglicht Denial of Service | 18-04-2024 | 127 |
CERT-Bund DE | [NEU] [mittel] Broadcom Brocade SANnav: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 18-04-2024 | 128 |
CERT-Bund DE | [NEU] [mittel] SolarWinds Serv-U Managed File Transfer Server: Schwachstelle ermöglicht Codeausführung | 18-04-2024 | 129 |
CERT-Bund DE | [NEU] [hoch] Cisco Integrated Management Controller: Mehrere Schwachstellen ermöglichen Privilegieneskalation | 18-04-2024 | 130 |
CERT-Bund DE | [NEU] [mittel] Cisco IOS und IOS XE: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 18-04-2024 | 131 |
CSIRT IT | Ivanti: risolte vulnerabilità nel prodotto Avalanche
(AL03/240418/CSIRT-ITA) | 18-04-2024 | 132 |
FR-CERT Avis | CERTFR-2024-AVI-0319 : Multiples vulnérabilités dans les produits Cisco (18 avril 2024) | 18-04-2024 | 133 |
CSIRT IT | Rilevate vulnerabilità in prodotti Atlassian
(AL02/240418/CSIRT-ITA) | 18-04-2024 | 134 |
FR-CERT Avis | CERTFR-2024-AVI-0318 : Multiples vulnérabilités dans les produits Mitel (18 avril 2024) | 18-04-2024 | 135 |
FR-CERT Avis | CERTFR-2024-AVI-0317 : Vulnérabilité dans Cisco ClamAV (18 avril 2024) | 18-04-2024 | 136 |
FR-CERT Avis | CERTFR-2024-AVI-0316 : Vulnérabilité dans les produits Xen (18 avril 2024) | 18-04-2024 | 137 |
CSIRT IT | Vulnerabilità in prodotti Solarwinds
(AL01/240418/CSIRT-ITA) | 18-04-2024 | 138 |
SANS | ISC Stormcast For Thursday, April 18th, 2024 https://isc.sans.edu/podcastdetail/8944, (Thu, Apr 18th) | 18-04-2024 | 139 |
Center of Internet Security | Oracle Quarterly Critical Patches Issued April 16, 2024 | 17-04-2024 | 140 |
Center of Internet Security | Multiple Vulnerabilities in Ivanti Avalanche Could Allow for Remote Code Execution | 17-04-2024 | 141 |
CERT-Bund DE | [UPDATE] [mittel] Grub2: Mehrere Schwachstellen ermöglichen Codeausführung | 17-04-2024 | 142 |
CERT-Bund DE | [NEU] [hoch] FreeRDP: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 17-04-2024 | 143 |
CERT-Bund DE | [NEU] [hoch] Broadcom Brocade SANnav: Mehrere Schwachstellen | 17-04-2024 | 144 |
CERT-Bund DE | [NEU] [mittel] Red Hat Enterprise Linux (keycloak): Mehrere Schwachstellen | 17-04-2024 | 145 |
CERT-Bund DE | [NEU] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 17-04-2024 | 146 |
Center of Internet Security | Multiple Vulnerabilities in Google Chrome Could Allow for Remote Code Execution | 17-04-2024 | 147 |
CERT-Bund DE | [NEU] [mittel] Red Hat Enterprise Linux (pcs): Mehrere Schwachstellen ermöglichen Denial of Service | 17-04-2024 | 148 |
CERT-Bund DE | [NEU] [hoch] Rockwell Automation ControlLogix: Schwachstelle ermöglicht Denial of Service | 17-04-2024 | 149 |
CERT-Bund DE | [NEU] [mittel] Red Hat Single Sign On: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 17-04-2024 | 150 |
CERT-Bund DE | [NEU] [niedrig] Kubernetes: Schwachstelle ermöglicht Offenlegung von Informationen | 17-04-2024 | 151 |
CERT-Bund DE | [NEU] [mittel] Checkmk: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 17-04-2024 | 152 |
FR-CERT Avis | CERTFR-2024-AVI-0315 : Vulnérabilité dans SolarWinds Serv-U (17 avril 2024) | 17-04-2024 | 153 |
CERT-Bund DE | [NEU] [mittel] Red Hat OpenShift: Schwachstelle ermöglicht Offenlegung von Informationen | 17-04-2024 | 154 |
CERT-Bund DE | [NEU] [mittel] Octopus Deploy: Schwachstelle ermöglicht Offenlegung von Informationen | 17-04-2024 | 155 |
CERT-Bund DE | [NEU] [hoch] Ivanti Avalanche: Mehrere Schwachstellen | 17-04-2024 | 156 |
CERT-Bund DE | [NEU] [hoch] Oracle Fusion Middleware: Mehrere Schwachstellen | 17-04-2024 | 157 |
CERT-Bund DE | [NEU] [mittel] Oracle Hyperion: Mehrere Schwachstellen | 17-04-2024 | 158 |
CERT-Bund DE | [NEU] [hoch] Oracle Insurance Applications: Mehrere Schwachstellen | 17-04-2024 | 159 |
CERT-Bund DE | [NEU] [mittel] Oracle Health Sciences Applications: Mehrere Schwachstellen | 17-04-2024 | 160 |
CERT-Bund DE | [NEU] [mittel] Oracle MySQL: Mehrere Schwachstellen | 17-04-2024 | 161 |
CERT-Bund DE | [NEU] [hoch] Oracle PeopleSoft: Mehrere Schwachstellen | 17-04-2024 | 162 |
CERT-Bund DE | [NEU] [hoch] Oracle Retail Applications: Mehrere Schwachstellen | 17-04-2024 | 163 |
CERT-Bund DE | [NEU] [mittel] Oracle Siebel CRM: Schwachstelle gefährdet Vertraulichkeit und Integrität | 17-04-2024 | 164 |
CERT-Bund DE | [NEU] [hoch] Oracle Supply Chain: Mehrere Schwachstellen | 17-04-2024 | 165 |
CERT-Bund DE | [NEU] [mittel] Oracle Support Tools: Mehrere Schwachstellen | 17-04-2024 | 166 |
CERT-Bund DE | [NEU] [hoch] Oracle Virtualization: Mehrere Schwachstellen | 17-04-2024 | 167 |
CERT-Bund DE | [NEU] [mittel] Oracle Utilities Applications: Mehrere Schwachstellen | 17-04-2024 | 168 |
CERT-Bund DE | [NEU] [hoch] Oracle Systems: Mehrere Schwachstellen | 17-04-2024 | 169 |
CERT-Bund DE | [NEU] [mittel] Oracle Database Server: Mehrere Schwachstellen | 17-04-2024 | 170 |
CERT-Bund DE | [NEU] [mittel] JFrog Artifactory: Schwachstelle ermöglicht Offenlegung von Informationen | 17-04-2024 | 171 |
CERT-Bund DE | [NEU] [niedrig] HPE OfficeConnect 1820 Network Switch: Schwachstelle ermöglicht Codeausführung | 17-04-2024 | 172 |
CERT-Bund DE | [NEU] [mittel] HPE Router und Switch: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 17-04-2024 | 173 |
CERT-Bund DE | [NEU] [mittel] Apache Solr: Schwachstelle ermöglicht Offenlegung von Informationen | 17-04-2024 | 174 |
CERT-Bund DE | [NEU] [mittel] IBM Security Verify Access: Mehrere Schwachstellen | 17-04-2024 | 175 |
CERT-Bund DE | [NEU] [hoch] less: Schwachstelle ermöglicht Codeausführung | 17-04-2024 | 176 |
CERT-Bund DE | [NEU] [kritisch] PaloAlto Networks PAN-OS: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Administratorrechten | 17-04-2024 | 177 |
CERT-Bund DE | [NEU] [hoch] VMware Tanzu Spring Framework: Schwachstelle ermöglicht Manipulation von Daten | 17-04-2024 | 178 |
CERT-Bund DE | [NEU] [hoch] Juniper Produkte: Mehrere Schwachstellen | 17-04-2024 | 179 |
CERT-Bund DE | [NEU] [mittel] Mitel MiCollab: Mehrere Schwachstellen | 17-04-2024 | 180 |
CERT-Bund DE | [NEU] [mittel] PaloAlto Networks PAN-OS: Mehrere Schwachstellen | 17-04-2024 | 181 |
CERT-Bund DE | [UPDATE] [hoch] Google Chrome / Microsoft Edge: Mehrere Schwachstellen | 17-04-2024 | 182 |
CERT-Bund DE | [NEU] [mittel] QEMU: Schwachstelle ermöglicht Denial of Service | 17-04-2024 | 183 |
CERT-Bund DE | [UPDATE] [mittel] Node.js: Schwachstelle ermöglicht Codeausführung | 17-04-2024 | 184 |
CERT-Bund DE | [NEU] [hoch] GitLab: Mehrere Schwachstellen | 17-04-2024 | 185 |
CERT-Bund DE | [UPDATE] [mittel] Paessler PRTG: Mehrere Schwachstellen | 17-04-2024 | 186 |
CERT-Bund DE | [NEU] [mittel] IBM QRadar SIEM: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 17-04-2024 | 187 |
CERT-Bund DE | [UPDATE] [mittel] Adobe Creative Cloud: Mehrere Schwachstellen | 17-04-2024 | 188 |
CERT-Bund DE | [UPDATE] [mittel] Red Hat OpenShift: Mehrere Schwachstellen | 17-04-2024 | 189 |
CERT-Bund DE | [UPDATE] [mittel] Linux Kernel: Schwachstelle ermöglicht Denial of Service | 17-04-2024 | 190 |
CERT-Bund DE | [UPDATE] [mittel] pgAdmin: Schwachstelle ermöglicht Codeausführung | 17-04-2024 | 191 |
CERT-Bund DE | [UPDATE] [hoch] util-linux: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 17-04-2024 | 192 |
CERT-Bund DE | [UPDATE] [hoch] Google Chrome: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 17-04-2024 | 193 |
CERT-Bund DE | [UPDATE] [mittel] cURL: Mehrere Schwachstellen | 17-04-2024 | 194 |
CERT-Bund DE | [UPDATE] [mittel] Python: Mehrere Schwachstellen ermöglichen Codeausführung und DoS | 17-04-2024 | 195 |
CERT-Bund DE | [UPDATE] [mittel] Mattermost: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 17-04-2024 | 196 |
CERT-Bund DE | [UPDATE] [mittel] Red Hat Enterprise Linux: Mehrere Schwachstellen | 17-04-2024 | 197 |
CERT-Bund DE | [UPDATE] [mittel] Foxit Reader: Mehrere Schwachstellen | 17-04-2024 | 198 |
CERT-Bund DE | [UPDATE] [mittel] QEMU: Schwachstelle ermöglicht Codeausführung | 17-04-2024 | 199 |
CERT-Bund DE | [UPDATE] [mittel] expat: Mehrere Schwachstellen ermöglichen Denial of Service | 17-04-2024 | 200 |
CERT-Bund DE | [UPDATE] [mittel] Red Hat OpenShift Container Platform: Mehrere Schwachstellen ermöglichen Denial of Service | 17-04-2024 | 201 |
CERT-Bund DE | [UPDATE] [mittel] Red Hat Enterprise Linux's oniguruma, tcpslice, c-ares: Mehrere Schwachstellen | 17-04-2024 | 202 |
CERT-Bund DE | [UPDATE] [mittel] GnuTLS: Mehrere Schwachstellen | 17-04-2024 | 203 |
CERT-Bund DE | [UPDATE] [mittel] Mozilla NSS: Schwachstelle ermöglicht Offenlegung von Informationen | 17-04-2024 | 204 |
CERT-Bund DE | [UPDATE] [mittel] QEMU: Schwachstelle ermöglicht Offenlegung von Informationen | 17-04-2024 | 205 |
CERT-Bund DE | [UPDATE] [mittel] QEMU: Schwachstelle ermöglicht Denial of Service | 17-04-2024 | 206 |
CERT-Bund DE | [UPDATE] [hoch] SMTP Implementierungen: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 17-04-2024 | 207 |
CERT-Bund DE | [UPDATE] [mittel] sudo: Schwachstelle ermöglicht Privilegieneskalation | 17-04-2024 | 208 |
CERT-Bund DE | [UPDATE] [mittel] Linux Kernel: Schwachstelle ermöglicht Denial of Service | 17-04-2024 | 209 |
CERT-Bund DE | [UPDATE] [mittel] Mozilla Firefox und Thunderbird: Mehrere Schwachstellen | 17-04-2024 | 210 |
CERT-Bund DE | [UPDATE] [mittel] OpenSSH: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 17-04-2024 | 211 |
CERT-Bund DE | [UPDATE] [hoch] Squid: Schwachstelle ermöglicht Denial of Service | 17-04-2024 | 212 |
CERT-Bund DE | [UPDATE] [mittel] cURL: Mehrere Schwachstellen | 17-04-2024 | 213 |
CERT-Bund DE | [UPDATE] [hoch] Squid: Mehrere Schwachstellen ermöglichen Denial of Service | 17-04-2024 | 214 |
CERT-Bund DE | [UPDATE] [hoch] Splunk Enterprise: Mehrere Schwachstellen | 17-04-2024 | 215 |
CERT-Bund DE | [UPDATE] [mittel] Squid: Schwachstelle ermöglicht Denial of Service | 17-04-2024 | 216 |
CERT-Bund DE | [UPDATE] [mittel] QEMU: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 17-04-2024 | 217 |
CERT-Bund DE | [UPDATE] [mittel] Mozilla NSS: Schwachstelle ermöglicht Offenlegung von Informationen | 17-04-2024 | 218 |
CERT-Bund DE | [UPDATE] [hoch] Squid: Schwachstelle ermöglicht Denial of Service | 17-04-2024 | 219 |
CERT-Bund DE | [UPDATE] [hoch] Squid: Mehrere Schwachstellen | 17-04-2024 | 220 |
CERT-Bund DE | [UPDATE] [niedrig] Red Hat Enterprise Linux: Schwachstelle ermöglicht Codeausführung | 17-04-2024 | 221 |
CERT-Bund DE | [UPDATE] [mittel] Oracle Java SE: Mehrere Schwachstellen | 17-04-2024 | 222 |
CERT-Bund DE | [UPDATE] [mittel] Samba: Mehrere Schwachstellen | 17-04-2024 | 223 |
CERT-Bund DE | [UPDATE] [mittel] cURL: Mehre Schwachstellen | 17-04-2024 | 224 |
CERT-Bund DE | [UPDATE] [mittel] Internet Systems Consortium BIND: Mehrere Schwachstellen | 17-04-2024 | 225 |
CERT-Bund DE | [UPDATE] [mittel] Apache Tomcat mod_jk Connector: Schwachstelle ermöglicht Umgehung von Sicherheitsmaßnahmen oder Offenlegung von Informationen | 17-04-2024 | 226 |
CERT-Bund DE | [UPDATE] [mittel] QEMU: Schwachstelle ermöglicht Denial of Service | 17-04-2024 | 227 |
CERT-Bund DE | [UPDATE] [hoch] Intel PROSet Wireless WiFi Software: Mehrere Schwachstellen | 17-04-2024 | 228 |
CERT-Bund DE | [UPDATE] [hoch] Python: Mehrere Schwachstellen | 17-04-2024 | 229 |
CERT-Bund DE | [UPDATE] [mittel] Samba: Mehrere Schwachstellen | 17-04-2024 | 230 |
CERT-Bund DE | [UPDATE] [niedrig] QEMU: Schwachstelle ermöglicht Denial of Service | 17-04-2024 | 231 |
CERT-Bund DE | [UPDATE] [mittel] Internet Systems Consortium BIND: Mehrere Schwachstellen ermöglichen Denial of Service | 17-04-2024 | 232 |
CERT-Bund DE | [UPDATE] [mittel] cURL: Mehrere Schwachstellen | 17-04-2024 | 233 |
CERT-Bund DE | [UPDATE] [mittel] Python: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 17-04-2024 | 234 |
CERT-Bund DE | [UPDATE] [mittel] Linux Kernel: Schwachstelle ermöglicht Privilegieneskalation | 17-04-2024 | 235 |
CERT-Bund DE | [UPDATE] [mittel] sudo: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 17-04-2024 | 236 |
CERT-Bund DE | [UPDATE] [mittel] systemd: Schwachstelle ermöglicht Privilegieneskalation | 17-04-2024 | 237 |
CERT-Bund DE | [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 17-04-2024 | 238 |
CERT-Bund DE | [UPDATE] [mittel] cURL: Mehrere Schwachstellen | 17-04-2024 | 239 |
CERT-Bund DE | [UPDATE] [mittel] Internet Systems Consortium BIND: Mehrere Schwachstellen ermöglichen Denial of Service | 17-04-2024 | 240 |
CERT-Bund DE | [UPDATE] [hoch] Python: Schwachstelle ermöglicht Denial of Service | 17-04-2024 | 241 |
CERT-Bund DE | [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 17-04-2024 | 242 |
CERT-Bund DE | [UPDATE] [mittel] RPM: Mehrere Schwachstellen | 17-04-2024 | 243 |
CERT-Bund DE | [UPDATE] [hoch] QEMU: Schwachstelle ermöglicht Denial of Service und Codeausführung | 17-04-2024 | 244 |
CERT-Bund DE | [UPDATE] [mittel] Squid: Mehrere Schwachstellen ermöglichen Denial of Service | 17-04-2024 | 245 |
CERT-Bund DE | [UPDATE] [mittel] Squid: Schwachstelle ermöglicht Denial of Service | 17-04-2024 | 246 |
CERT-Bund DE | [UPDATE] [mittel] cURL: Mehrere Schwachstellen | 17-04-2024 | 247 |
CERT-Bund DE | [UPDATE] [mittel] RPM: Schwachstelle ermöglicht Privilegieneskalation | 17-04-2024 | 248 |
CERT-Bund DE | [UPDATE] [mittel] jQuery: Schwachstelle ermöglicht Cross-Site Scripting | 17-04-2024 | 249 |
CERT-Bund DE | [UPDATE] [mittel] RPM: Schwachstelle ermöglicht Privilegieneskalation | 17-04-2024 | 250 |
CERT-Bund DE | [UPDATE] [hoch] cURL: Mehrere Schwachstellen | 17-04-2024 | 251 |
CSIRT IT | Aggiornamenti di sicurezza per prodotti Mozilla
(AL03/240417/CSIRT-ITA) | 17-04-2024 | 252 |
FR-CERT Avis | CERTFR-2024-AVI-0314 : Multiples vulnérabilités dans Ivanti Avalanche (17 avril 2024) | 17-04-2024 | 253 |
CSIRT IT | Risolte vulnerabilità in Google Chrome
(AL02/240417/CSIRT-ITA) | 17-04-2024 | 254 |
FR-CERT Avis | CERTFR-2024-AVI-0313 : Multiples vulnérabilités dans Google Chrome (17 avril 2024) | 17-04-2024 | 255 |
CERT-Bund DE | [UPDATE] [mittel] zlib: Schwachstelle ermöglicht Codeausführung | 17-04-2024 | 256 |
CERT-Bund DE | [UPDATE] [hoch] zlib: Schwachstelle ermöglicht nicht spezifizierten Angriff | 17-04-2024 | 257 |
CERT-Bund DE | [UPDATE] [hoch] Node.js: Mehrere Schwachstellen | 17-04-2024 | 258 |
CSIRT IT | Palo Alto Networks risolve vulnerabilità in PAN-OS
(AL03/240412/CSIRT-ITA) - Aggiornamento | 17-04-2024 | 259 |
CSIRT IT | Critical Patch Update di Oracle
(AL01/240417/CSIRT-ITA) | 17-04-2024 | 260 |
CERT-Bund DE | [UPDATE] [hoch] SCP in mehreren Produkten: Mehrere Schwachstellen | 17-04-2024 | 261 |
CERT-Bund DE | [UPDATE] [hoch] VMware Tanzu Spring Framework: Mehrere Schwachstellen | 17-04-2024 | 262 |
CERT-Bund DE | [UPDATE] [mittel] OpenSSL: Schwachstelle ermöglicht Denial of Service | 17-04-2024 | 263 |
CERT-Bund DE | [UPDATE] [mittel] VMware Tanzu Spring Framework: Schwachstelle ermöglicht Denial of Service | 17-04-2024 | 264 |
CERT-Bund DE | [UPDATE] [mittel] OpenSSL: Schwachstelle ermöglicht Denial of Service | 17-04-2024 | 265 |
CERT-Bund DE | [UPDATE] [mittel] OpenSSL: Schwachstelle ermöglicht Denial of Service | 17-04-2024 | 266 |
CERT-Bund DE | [UPDATE] [mittel] PostgreSQL: Mehrere Schwachstellen | 17-04-2024 | 267 |
CERT-Bund DE | [NEU] [hoch] Oracle E-Business Suite: Mehrere Schwachstellen | 17-04-2024 | 268 |
CERT-Bund DE | [NEU] [hoch] Oracle Financial Services Applications: Mehrere Schwachstellen | 17-04-2024 | 269 |
CERT-Bund DE | [NEU] [hoch] Oracle Enterprise Manager: Mehrere Schwachstellen | 17-04-2024 | 270 |
FR-CERT Avis | CERTFR-2024-AVI-0312 : Multiples vulnérabilités dans les produits Atlassian (17 avril 2024) | 17-04-2024 | 271 |
CERT-Bund DE | [UPDATE] [mittel] OpenSSH: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 17-04-2024 | 272 |
CERT-Bund DE | [UPDATE] [mittel] OpenSSH: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 17-04-2024 | 273 |
CERT-Bund DE | [UPDATE] [hoch] OpenSSH: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Administratorrechten | 17-04-2024 | 274 |
CERT-Bund DE | [UPDATE] [mittel] OpenSSH: Schwachstelle ermöglicht Privilegieneskalation | 17-04-2024 | 275 |
CERT-Bund DE | [UPDATE] [hoch] OpenSSH: Schwachstelle ermöglicht Codeausführung | 17-04-2024 | 276 |
CERT-Bund DE | [UPDATE] [hoch] expat: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 17-04-2024 | 277 |
CERT-Bund DE | [UPDATE] [mittel] libxml2: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 17-04-2024 | 278 |
CERT-Bund DE | [UPDATE] [mittel] libssh: Mehrere Schwachstellen ermöglichen Umgehung von Sicherheitsvorkehrungen | 17-04-2024 | 279 |
CERT-Bund DE | [UPDATE] [hoch] Linux Kernel (ksmbd): Mehrere Schwachstellen | 17-04-2024 | 280 |
CERT-Bund DE | [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen oder Umgehung von Sicherheitsvorkehrungen | 17-04-2024 | 281 |
CERT-Bund DE | [UPDATE] [mittel] Linux Kernel: Schwachstelle ermöglicht Umgehung oder Offenlegung von Informationen | 17-04-2024 | 282 |
CERT-Bund DE | [UPDATE] [mittel] Oracle Java SE: Mehrere Schwachstellen | 17-04-2024 | 283 |
CERT-Bund DE | [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen | 17-04-2024 | 284 |
CERT-Bund DE | [UPDATE] [hoch] Linux Kernel: Schwachstelle ermöglicht Codeausführung | 17-04-2024 | 285 |
CERT-Bund DE | [UPDATE] [hoch] http/2 Implementierungen: Schwachstelle ermöglicht Denial of Service | 17-04-2024 | 286 |
CERT-Bund DE | [UPDATE] [mittel] Apache HTTP Server: Mehrere Schwachstellen ermöglichen Denial of Service | 17-04-2024 | 287 |
CERT-Bund DE | [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen | 17-04-2024 | 288 |
CERT-Bund DE | [UPDATE] [mittel] Eclipse IDE: Schwachstelle ermöglicht Offenlegung von Informationen | 17-04-2024 | 289 |
CERT-Bund DE | [UPDATE] [mittel] Red Hat OpenShift: Mehrere Schwachstellen | 17-04-2024 | 290 |
CERT-Bund DE | [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen | 17-04-2024 | 291 |
CERT-Bund DE | [UPDATE] [mittel] Linux Kernel: Schwachstelle ermöglicht Offenlegung von Informationen | 17-04-2024 | 292 |
CERT-Bund DE | [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen Privilegieneskalation | 17-04-2024 | 293 |
CERT-Bund DE | [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen | 17-04-2024 | 294 |
CERT-Bund DE | [UPDATE] [mittel] Oracle Java SE: Mehrere Schwachstellen | 17-04-2024 | 295 |
FR-CERT Avis | CERTFR-2024-AVI-0311 : Multiples vulnérabilités dans les produits Mozilla (17 avril 2024) | 17-04-2024 | 296 |
Microsoft Security | Congratulations to the Top MSRC 2024 Q1 Security Researchers! | 17-04-2024 | 297 |
SANS | Malicious PDF File Used As Delivery Mechanism, (Wed, Apr 17th) | 17-04-2024 | 298 |
SANS | ISC Stormcast For Wednesday, April 17th, 2024 https://isc.sans.edu/podcastdetail/8942, (Wed, Apr 17th) | 17-04-2024 | 299 |
SANS | Palo Alto Networks GlobalProtect exploit public and widely exploited CVE-2024-3400, (Tue, Apr 16th) | 16-04-2024 | 300 |
Center of Internet Security | Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution | 16-04-2024 | 301 |
US-CERT CISA | RoboDK RoboDK | 16-04-2024 | 302 |
US-CERT CISA | Electrolink FM/DAB/TV Transmitter | 16-04-2024 | 303 |
US-CERT CISA | Rockwell Automation ControlLogix and GuardLogix | 16-04-2024 | 304 |
US-CERT CISA | Measuresoft ScadaPro | 16-04-2024 | 305 |
FR-CERT Avis | CERTFR-2024-AVI-0310 : Vulnérabilité dans les produits Juniper (16 avril 2024) | 16-04-2024 | 306 |
SANS | Rolling Back Packages on Ubuntu/Debian, (Tue, Apr 16th) | 16-04-2024 | 307 |
CSIRT IT | Vulnerabilità in prodotti Netgear
(AL02/240416/CSIRT-ITA) | 16-04-2024 | 308 |
FR-CERT Avis | CERTFR-2024-AVI-0309 : Vulnérabilité dans Stormshield Network Security (16 avril 2024) | 16-04-2024 | 309 |
CSIRT IT | Vulnerabilità in PuTTY
(AL01/240416/CSIRT-ITA) | 16-04-2024 | 310 |
SANS | ISC Stormcast For Tuesday, April 16th, 2024 https://isc.sans.edu/podcastdetail/8940, (Tue, Apr 16th) | 16-04-2024 | 311 |
Consiglio Federale CH |
La Cancelleria federale avvia una consultazione sul promovimento di progetti di digitalizzazione
| 16-04-2024 | 312 |
SANS | Quick Palo Alto Networks Global Protect Vulnerablity Update (CVE-2024-3400), (Mon, Apr 15th) | 15-04-2024 | 313 |
FR-CERT Avis | CERTFR-2024-AVI-0308 : Vulnérabilité dans Stormshield Network Security (15 avril 2024) | 15-04-2024 | 314 |
CSIRT IT | HTTP/2: Continuation Flood
(BL01/240408/CSIRT-ITA) - Aggiornamento | 15-04-2024 | 315 |
FR-CERT Avis | CERTFR-2024-AVI-0307 : Vulnérabilité dans Palo Alto Networks GlobalProtect (15 avril 2024) | 15-04-2024 | 316 |
FR-CERT Avis | CERTFR-2024-AVI-0306 : Multiples vulnérabilités dans Microsoft Edge (15 avril 2024) | 15-04-2024 | 317 |
CSIRT IT | Vulnerabilità in PHP
(AL01/240415/CSIRT-ITA) | 15-04-2024 | 318 |
CSIRT IT | La Settimana Cibernetica del 14 aprile 2024 | 15-04-2024 | 319 |
Unit42 | Threat Brief: Operation MidnightEclipse, Post-Exploitation Activity Related to CVE-2024-3400 (Updated April 19) | 12-04-2024 | 320 |
Center of Internet Security | A Vulnerability in PAN-OS Could Allow for Arbitrary Code Execution | 12-04-2024 | 321 |
CSIRT IT | PoC pubblico per lo sfruttamento della CVE-2024-2389
(AL09/240412/CSIRT-ITA) | 12-04-2024 | 322 |
FR-CERT Avis | CERTFR-2024-AVI-0305 : Multiples vulnérabilités dans les produits IBM (12 avril 2024) | 12-04-2024 | 323 |
FR-CERT Avis | CERTFR-2024-AVI-0304 : Multiples vulnérabilités dans Debian LTS buster (12 avril 2024) | 12-04-2024 | 324 |
FR-CERT Avis | CERTFR-2024-AVI-0303 : Multiples vulnérabilités dans le noyau Linux de SUSE (12 avril 2024) | 12-04-2024 | 325 |
FR-CERT Avis | CERTFR-2024-AVI-0302 : Multiples vulnérabilités dans le noyau Linux de RedHat (12 avril 2024) | 12-04-2024 | 326 |
FR-CERT Avis | CERTFR-2024-AVI-0301 : Multiples vulnérabilités dans le noyau Linux d’Ubuntu (12 avril 2024) | 12-04-2024 | 327 |
FR-CERT Alertes | CERTFR-2024-ALE-006 : [MàJ] Vulnérabilité dans Palo Alto Networks GlobalProtect (12 avril 2024) | 12-04-2024 | 328 |
CSIRT IT | Aggiornamenti di sicurezza per Node.js
(AL08/240412/CSIRT-ITA) | 12-04-2024 | 329 |
CSIRT IT | Aggiornamenti di sicurezza per prodotti Juniper Networks
(AL07/240412/CSIRT-ITA) | 12-04-2024 | 330 |
CSIRT IT | Aggiornamenti per VMware Spring
(AL06/240412/CSIRT-ITA) | 12-04-2024 | 331 |
CSIRT IT | Sanate vulnerabilità su GitLab CE/EE
(AL05/240412/CSIRT-ITA) | 12-04-2024 | 332 |
CSIRT IT | Vulnerabilità in Rust
(AL04/240412/CSIRT-ITA) | 12-04-2024 | 333 |
CSIRT IT | Aggiornamenti per prodotti Citrix
(AL02/240412/CSIRT-ITA) | 12-04-2024 | 334 |
CSIRT IT | Risolte vulnerabilità in Google Chrome
(AL01/240412/CSIRT-ITA) | 12-04-2024 | 335 |
FR-CERT Avis | CERTFR-2024-AVI-0300 : Multiples vulnérabilités dans PHP (12 avril 2024) | 12-04-2024 | 336 |
FR-CERT Avis | CERTFR-2024-AVI-0299 : Multiples vulnérabilités dans les produits Citrix (11 avril 2024) | 11-04-2024 | 337 |
FR-CERT Avis | CERTFR-2024-AVI-0298 : Vulnérabilité dans Spring Framework (11 avril 2024) | 11-04-2024 | 338 |
FR-CERT Avis | CERTFR-2024-AVI-0297 : Multiples vulnérabilités dans Juniper (11 avril 2024) | 11-04-2024 | 339 |
FR-CERT Avis | CERTFR-2024-AVI-0296 : Multiples vulnérabilités dans GitLab (11 avril 2024) | 11-04-2024 | 340 |
FR-CERT Avis | CERTFR-2024-AVI-0295 : Multiples vulnérabilités dans les produits Palo Alto Networks (11 avril 2024) | 11-04-2024 | 341 |
Center of Internet Security | Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution | 10-04-2024 | 342 |
CSIRT IT | Aggiornamenti Mensili Microsoft
(AL07/240409/CSIRT-ITA) - Aggiornamento | 10-04-2024 | 343 |
CSIRT IT | Adobe rilascia aggiornamenti per sanare molteplici vulnerabilità
(AL01/240410/CSIRT-ITA) | 10-04-2024 | 344 |
CSIRT IT | D-Link: PoC pubblici per lo sfruttamento delle CVE-2024-3273 e CVE-2024-3272
(AL05/240409/CSIRT-ITA) - Aggiornamento | 10-04-2024 | 345 |
Consiglio Federale CH |
René Dönni Kuoni nuovo direttore supplente dell'UFCOM
| 10-04-2024 | 346 |
Center of Internet Security | Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution | 09-04-2024 | 347 |
Center of Internet Security | Critical Patches Issued for Microsoft Products, April 09, 2024 | 09-04-2024 | 348 |
Unit42 | Muddled Libra’s Evolution to the Cloud | 09-04-2024 | 349 |
CSIRT IT | Risolte vulnerabilità in Bitdefender
(AL06/240409/CSIRT-ITA) | 09-04-2024 | 350 |
CSIRT IT | Rilevate vulnerabilità in prodotti Fortinet
(AL04/240409/CSIRT-ITA) | 09-04-2024 | 351 |
CSIRT IT | Aggiornamenti per prodotti Siemens
(AL01/240409/CSIRT-ITA) | 09-04-2024 | 352 |
CSIRT IT | Sanata vulnerabilità in Schneider Electric Easergy Studio
(AL03/240409/CSIRT-ITA) | 09-04-2024 | 353 |
CSIRT IT | SAP Security Patch Day
(AL02/240409/CSIRT-ITA) | 09-04-2024 | 354 |
Unit42 | It Was Not Me! Malware-Initiated Vulnerability Scanning Is on the Rise | 08-04-2024 | 355 |
CSIRT IT | Adobe rilascia aggiornamenti per sanare molteplici vulnerabilità
(AL02/240214/CSIRT-ITA) - Aggiornamento | 08-04-2024 | 356 |
CSIRT IT | Rilevate vulnerabilità in prodotti Splunk
(AL02/231117/CSIRT-ITA) - Aggiornamento | 08-04-2024 | 357 |
Microsoft Security | Toward greater transparency: Adopting the CWE standard for Microsoft CVEs | 08-04-2024 | 358 |
CSIRT IT | La Settimana Cibernetica del 7 aprile 2024 | 08-04-2024 | 359 |
Center of Internet Security | A Vulnerability in Broadcom Brocade Fabric OS Could Allow for Arbitrary Code Execution | 05-04-2024 | 360 |
CSIRT IT | Google Pixel: rilevato sfruttamento in rete delle CVE-2024-29745 e CVE-2024-29748
(AL03/240404/CSIRT-ITA) | 04-04-2024 | 361 |
CSIRT IT | Risolte vulnerabilità in Google Chrome
(AL01/240403/CSIRT-ITA) - Aggiornamento | 04-04-2024 | 362 |
CSIRT IT | Risolte vulnerabilità in Google Chrome
(AL01/240327/CSIRT-ITA) - Aggiornamento | 04-04-2024 | 363 |
CSIRT IT | Risolte vulnerabilità in prodotti Cisco
(AL02/240404/CSIRT-ITA) | 04-04-2024 | 364 |
CSIRT IT | Risolte vulnerabilità in prodotti Ivanti
(AL01/240404/CSIRT-ITA) | 04-04-2024 | 365 |
Consiglio Federale CH |
«Promuovete la vostra salute digitale» - lancio della campagna nazionale di sensibilizzazione alla cibersicurezza incentrata sugli aggiornamenti e sulla protezione antivirus
| 04-04-2024 | 366 |
CSIRT IT | Vulnerabilità in prodotti Hikvision
(AL04/240403/CSIRT-ITA) | 03-04-2024 | 367 |
CSIRT IT | Aggiornamenti di sicurezza Android
(AL03/240403/CSIRT-ITA) | 03-04-2024 | 368 |
CSIRT IT | Rilevata backdoor in XZ Utils
(AL01/240330/CSIRT-ITA) - Aggiornamento | 03-04-2024 | 369 |
CSIRT IT | Risolte vulnerabilità in prodotti VMware
(AL02/240403/CSIRT-ITA) | 03-04-2024 | 370 |
CSIRT IT | Imperva SecureSphere: PoC pubblico per lo sfruttamento della CVE-2023-50969
(AL02/240402/CSIRT-ITA) | 02-04-2024 | 371 |
CSIRT IT | Risolte vulnerabilità in Bitdefender
(AL01/240402/CSIRT-ITA) | 02-04-2024 | 372 |
Microsoft Security | Embracing innovation: Derrick’s transition from banking to Microsoft’s Threat Intelligence team | 02-04-2024 | 373 |
CSIRT IT | La Settimana Cibernetica del 31 marzo 2024 | 02-04-2024 | 374 |
MSRC Security Update | Chromium: CVE-2024-2883 Use after free in ANGLE | 01-04-2024 | 375 |
Unit42 | Threat Brief: Vulnerability in XZ Utils Data Compression Library Impacting Multiple Linux Distributions (CVE-2024-3094) | 31-03-2024 | 376 |
Center of Internet Security | A Vulnerability in XZ Utils Could Allow for Remote Code Execution | 29-03-2024 | 377 |
CSIRT IT | Campagna phishing a tema “liquidazione fatture”
(AL02/240329/CSIRT-ITA) | 29-03-2024 | 378 |
CSIRT IT | Aggiornamento di sicurezza per prodotti Synology
(AL01/240329/CSIRT-ITA) | 29-03-2024 | 379 |
CSIRT IT | Rilevate vulnerabilità in prodotti Splunk
(AL03/240328/CSIRT-ITA) | 28-03-2024 | 380 |
CSIRT IT | Sanate vulnerabilità su GitLab CE/EE
(AL02/240328/CSIRT-ITA) | 28-03-2024 | 381 |
CSIRT IT | Risolte vulnerabilità in prodotti Cisco
(AL01/240328/CSIRT-ITA) | 28-03-2024 | 382 |
Unit42 | Exposing a New BOLA Vulnerability in Grafana | 27-03-2024 | 383 |
Google TAG | A review of zero-day in-the-wild exploits in 2023 | 27-03-2024 | 384 |
MSRC Security Update | Chromium: CVE-2024-2883 Use after free in ANGLE | 27-03-2024 | 385 |
MSRC Security Update | Chromium: CVE-2024-2887 Type Confusion in WebAssembly | 27-03-2024 | 386 |
MSRC Security Update | Chromium: CVE-2024-2885 Use after free in Dawn | 27-03-2024 | 387 |
MSRC Security Update | Chromium: CVE-2024-2886 Use after free in WebCodecs | 27-03-2024 | 388 |
Center of Internet Security | Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution | 27-03-2024 | 389 |
Consiglio Federale CH |
Mondo del lavoro digitalizzato: opportunità e rischi per le persone con disabilità
| 27-03-2024 | 390 |
Unit42 | ASEAN Entities in the Spotlight: Chinese APT Group Targeting | 26-03-2024 | 391 |
Center of Internet Security | A Vulnerability in Multiple Apple Products Could Allow for Arbitrary Code Execution. | 26-03-2024 | 392 |
Unit42 | Large-Scale StrelaStealer Campaign in Early 2024 | 22-03-2024 | 393 |
MSRC Security Update | Chromium: CVE-2024-2627 Use after free in Canvas | 22-03-2024 | 394 |
MSRC Security Update | Chromium: CVE-2024-2628 Inappropriate implementation in Downloads | 22-03-2024 | 395 |
MSRC Security Update | Chromium: CVE-2024-2625 Object lifecycle issue in V8 | 22-03-2024 | 396 |
MSRC Security Update | CVE-2024-29059 .NET Framework Information Disclosure Vulnerability | 22-03-2024 | 397 |
MSRC Security Update | CVE-2024-29057 Microsoft Edge (Chromium-based) Spoofing Vulnerability | 22-03-2024 | 398 |
MSRC Security Update | CVE-2024-26247 Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability | 22-03-2024 | 399 |
MSRC Security Update | CVE-2024-28916 Xbox Gaming Services Elevation of Privilege Vulnerability | 22-03-2024 | 400 |
MSRC Security Update | Chromium: CVE-2024-2626 Out of bounds read in Swiftshader | 22-03-2024 | 401 |
MSRC Security Update | Chromium: CVE-2024-2629 Incorrect security UI in iOS | 22-03-2024 | 402 |
MSRC Security Update | Chromium: CVE-2024-2630 Inappropriate implementation in iOS | 22-03-2024 | 403 |
MSRC Security Update | Chromium: CVE-2024-2631 Inappropriate implementation in iOS | 22-03-2024 | 404 |
Unit42 | Curious Serpens’ FalseFont Backdoor: Technical Analysis, Detection and Prevention | 21-03-2024 | 405 |
MSRC Security Update | CVE-2024-21329 Azure Connected Machine Agent Elevation of Privilege Vulnerability | 20-03-2024 | 406 |
Center of Internet Security | Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution | 19-03-2024 | 407 |
Center of Internet Security | Fortinet Releases Security Updates for Multiple Products. | 19-03-2024 | 408 |
Unit42 | Unit 42 Collaborative Research With Ukraine’s Cyber Agency To Uncover the Smoke Loader Backdoor | 19-03-2024 | 409 |
Consiglio Federale CH |
Circa l’80 per cento delle esecuzioni è espletato online
| 19-03-2024 | 410 |
Unit42 | Inside the Rabbit Hole: BunnyLoader 3.0 Unveiled | 15-03-2024 | 411 |
MSRC Security Update | CVE-2024-26163 Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability | 15-03-2024 | 412 |
MSRC Security Update | CVE-2024-26246 Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability | 15-03-2024 | 413 |
Consiglio Federale CH |
Procedimenti civili transfrontalieri: impiego agevolato della comunicazione elettronica
| 15-03-2024 | 414 |
Consiglio Federale CH |
Mercato delle telecomunicazioni: concorrenza stabile
| 15-03-2024 | 415 |
MSRC Security Update | Chromium: CVE-2024-2400 Use after free in Performance Manager | 14-03-2024 | 416 |
MSRC Security Update | CVE-2024-26246 Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability | 14-03-2024 | 417 |
MSRC Security Update | CVE-2024-26201 Microsoft Intune Linux Agent Elevation of Privilege Vulnerability | 14-03-2024 | 418 |
MSRC Security Update | CVE-2024-26167 Microsoft Edge for Android Spoofing Vulnerability | 14-03-2024 | 419 |
MSRC Security Update | CVE-2024-26163 Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability | 14-03-2024 | 420 |
Consiglio Federale CH |
La Cancelleria federale pubblica l’aggiudicazione relativa al bando OMC «ALPIN 3.0»
| 13-03-2024 | 421 |
Center of Internet Security | Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution | 12-03-2024 | 422 |
Center of Internet Security | Critical Patches Issued for Microsoft Products, March 13, 2024 | 12-03-2024 | 423 |
MSRC Security Update | CVE-2024-21443 Windows Kernel Elevation of Privilege Vulnerability | 12-03-2024 | 424 |
MSRC Security Update | CVE-2024-21441 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability | 12-03-2024 | 425 |
MSRC Security Update | CVE-2024-21442 Windows USB Print Driver Elevation of Privilege Vulnerability | 12-03-2024 | 426 |
MSRC Security Update | CVE-2024-21451 Microsoft ODBC Driver Remote Code Execution Vulnerability | 12-03-2024 | 427 |
MSRC Security Update | CVE-2024-21444 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability | 12-03-2024 | 428 |
MSRC Security Update | CVE-2024-21445 Windows USB Print Driver Elevation of Privilege Vulnerability | 12-03-2024 | 429 |
MSRC Security Update | CVE-2024-21446 NTFS Elevation of Privilege Vulnerability | 12-03-2024 | 430 |
MSRC Security Update | CVE-2024-21438 Microsoft AllJoyn API Denial of Service Vulnerability | 12-03-2024 | 431 |
MSRC Security Update | CVE-2024-21439 Windows Telephony Server Elevation of Privilege Vulnerability | 12-03-2024 | 432 |
MSRC Security Update | CVE-2024-21418 Software for Open Networking in the Cloud (SONiC) Elevation of Privilege Vulnerability | 12-03-2024 | 433 |
MSRC Security Update | CVE-2024-21430 Windows USB Attached SCSI (UAS) Protocol Remote Code Execution Vulnerability | 12-03-2024 | 434 |
MSRC Security Update | CVE-2024-21429 Windows USB Hub Driver Remote Code Execution Vulnerability | 12-03-2024 | 435 |
MSRC Security Update | CVE-2024-21426 Microsoft SharePoint Server Remote Code Execution Vulnerability | 12-03-2024 | 436 |
MSRC Security Update | CVE-2024-21421 Azure SDK Spoofing Vulnerability | 12-03-2024 | 437 |
MSRC Security Update | CVE-2024-21411 Skype for Consumer Remote Code Execution Vulnerability | 12-03-2024 | 438 |
MSRC Security Update | CVE-2024-21392 .NET and Visual Studio Denial of Service Vulnerability | 12-03-2024 | 439 |
MSRC Security Update | CVE-2024-20671 Microsoft Defender Security Feature Bypass Vulnerability | 12-03-2024 | 440 |
MSRC Security Update | ADV990001 Latest Servicing Stack Updates | 12-03-2024 | 441 |
MSRC Security Update | CVE-2024-21450 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability | 12-03-2024 | 442 |
MSRC Security Update | CVE-2024-26169 Windows Error Reporting Service Elevation of Privilege Vulnerability | 12-03-2024 | 443 |
MSRC Security Update | CVE-2024-26197 Windows Standards-Based Storage Management Service Denial of Service Vulnerability | 12-03-2024 | 444 |
MSRC Security Update | CVE-2024-26159 Microsoft ODBC Driver Remote Code Execution Vulnerability | 12-03-2024 | 445 |
MSRC Security Update | CVE-2024-21440 Microsoft ODBC Driver Remote Code Execution Vulnerability | 12-03-2024 | 446 |
MSRC Security Update | CVE-2024-21448 Microsoft Teams for Android Information Disclosure Vulnerability | 12-03-2024 | 447 |
MSRC Security Update | CVE-2024-26160 Windows Cloud Files Mini Filter Driver Information Disclosure Vulnerability | 12-03-2024 | 448 |
MSRC Security Update | CVE-2024-26162 Microsoft ODBC Driver Remote Code Execution Vulnerability | 12-03-2024 | 449 |
MSRC Security Update | CVE-2024-26166 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability | 12-03-2024 | 450 |
MSRC Security Update | CVE-2024-26170 Windows Composite Image File System (CimFS) Elevation of Privilege Vulnerability | 12-03-2024 | 451 |
MSRC Security Update | CVE-2024-26173 Windows Kernel Elevation of Privilege Vulnerability | 12-03-2024 | 452 |
MSRC Security Update | CVE-2024-26174 Windows Kernel Information Disclosure Vulnerability | 12-03-2024 | 453 |
MSRC Security Update | CVE-2024-26177 Windows Kernel Information Disclosure Vulnerability | 12-03-2024 | 454 |
MSRC Security Update | CVE-2024-21436 Windows Installer Elevation of Privilege Vulnerability | 12-03-2024 | 455 |
MSRC Security Update | CVE-2024-26178 Windows Kernel Elevation of Privilege Vulnerability | 12-03-2024 | 456 |
MSRC Security Update | CVE-2024-26181 Windows Kernel Denial of Service Vulnerability | 12-03-2024 | 457 |
MSRC Security Update | CVE-2024-26182 Windows Kernel Elevation of Privilege Vulnerability | 12-03-2024 | 458 |
MSRC Security Update | CVE-2024-26185 Windows Compressed Folder Tampering Vulnerability | 12-03-2024 | 459 |
MSRC Security Update | CVE-2023-28746 Intel: CVE-2023-28746 Register File Data Sampling (RFDS) | 12-03-2024 | 460 |
MSRC Security Update | CVE-2024-26165 Visual Studio Code Elevation of Privilege Vulnerability | 12-03-2024 | 461 |
MSRC Security Update | CVE-2023-36866 Microsoft Office Visio Remote Code Execution Vulnerability | 12-03-2024 | 462 |
MSRC Security Update | CVE-2023-35372 Microsoft Office Visio Remote Code Execution Vulnerability | 12-03-2024 | 463 |
MSRC Security Update | CVE-2024-21437 Windows Graphics Component Elevation of Privilege Vulnerability | 12-03-2024 | 464 |
MSRC Security Update | CVE-2024-26176 Windows Kernel Elevation of Privilege Vulnerability | 12-03-2024 | 465 |
MSRC Security Update | CVE-2024-21435 Windows OLE Remote Code Execution Vulnerability | 12-03-2024 | 466 |
MSRC Security Update | CVE-2024-21330 Open Management Infrastructure (OMI) Elevation of Privilege Vulnerability | 12-03-2024 | 467 |
MSRC Security Update | CVE-2024-21434 Microsoft Windows SCSI Class System File Elevation of Privilege Vulnerability | 12-03-2024 | 468 |
MSRC Security Update | CVE-2024-26190 Microsoft QUIC Denial of Service Vulnerability | 12-03-2024 | 469 |
MSRC Security Update | CVE-2024-26198 Microsoft Exchange Server Remote Code Execution Vulnerability | 12-03-2024 | 470 |
MSRC Security Update | CVE-2024-26199 Microsoft Office Elevation of Privilege Vulnerability | 12-03-2024 | 471 |
MSRC Security Update | CVE-2024-26201 Microsoft Intune Linux Agent Elevation of Privilege Vulnerability | 12-03-2024 | 472 |
MSRC Security Update | CVE-2024-26203 Azure Data Studio Elevation of Privilege Vulnerability | 12-03-2024 | 473 |
MSRC Security Update | CVE-2024-26161 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability | 12-03-2024 | 474 |
MSRC Security Update | CVE-2024-26164 Microsoft Django Backend for SQL Server Remote Code Execution Vulnerability | 12-03-2024 | 475 |
MSRC Security Update | CVE-2024-26204 Outlook for Android Information Disclosure Vulnerability | 12-03-2024 | 476 |
MSRC Security Update | CVE-2024-21334 Open Management Infrastructure (OMI) Remote Code Execution Vulnerability | 12-03-2024 | 477 |
MSRC Security Update | CVE-2024-21400 Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability | 12-03-2024 | 478 |
MSRC Security Update | CVE-2024-21407 Windows Hyper-V Remote Code Execution Vulnerability | 12-03-2024 | 479 |
MSRC Security Update | CVE-2024-21408 Windows Hyper-V Denial of Service Vulnerability | 12-03-2024 | 480 |
MSRC Security Update | CVE-2024-21419 Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability | 12-03-2024 | 481 |
MSRC Security Update | CVE-2024-21427 Windows Kerberos Security Feature Bypass Vulnerability | 12-03-2024 | 482 |
MSRC Security Update | CVE-2024-21431 Hypervisor-Protected Code Integrity (HVCI) Security Feature Bypass Vulnerability | 12-03-2024 | 483 |
MSRC Security Update | CVE-2024-21432 Windows Update Stack Elevation of Privilege Vulnerability | 12-03-2024 | 484 |
MSRC Security Update | CVE-2024-21433 Windows Print Spooler Elevation of Privilege Vulnerability | 12-03-2024 | 485 |
MSRC Security Update | CVE-2024-21390 Microsoft Authenticator Elevation of Privilege Vulnerability | 12-03-2024 | 486 |
Unit42 | Threat Group Assessment: Muddled Libra (Updated) | 08-03-2024 | 487 |
Microsoft Security | Update on Microsoft Actions Following Attack by Nation State Actor Midnight Blizzard | 08-03-2024 | 488 |
MSRC Security Update | CVE-2024-2176 | 07-03-2024 | 489 |
MSRC Security Update | CVE-2024-2174 | 07-03-2024 | 490 |
MSRC Security Update | CVE-2024-2173 | 07-03-2024 | 491 |
MSRC Security Update | CVE-2024-26167 Microsoft Edge for Android Spoofing Vulnerability | 07-03-2024 | 492 |
Consiglio Federale CH |
Attacco hacker contro Xplain: l’Ufficio federale della cibersicurezza pubblica un rapporto sull’analisi dei dati
| 07-03-2024 | 493 |
Google TAG | TAG Bulletin: Q1 2024 | 06-03-2024 | 494 |
Center of Internet Security | Multiple Vulnerabilities in Apple Products Could Allow for Privilege Escalation. | 05-03-2024 | 495 |
MSRC Security Update | CVE-2024-21378 Microsoft Outlook Remote Code Execution Vulnerability | 05-03-2024 | 496 |
Center of Internet Security | Multiple Vulnerabilities in Google Android OS Could Allow for Remote Code Execution | 05-03-2024 | 497 |
Unit42 | Wireshark Tutorial: Exporting Objects From a Pcap | 01-03-2024 | 498 |
MSRC Security Update | CVE-2024-21410 Microsoft Exchange Server Elevation of Privilege Vulnerability | 01-03-2024 | 499 |
MSRC Security Update | Chromium: CVE-2024-1939 Type Confusion in V8 | 29-02-2024 | 500 |
MSRC Security Update | Chromium: CVE-2024-1938 Type Confusion in V8 | 29-02-2024 | 501 |
Unit42 | The Art of Domain Deception: Bifrost's New Tactic to Deceive Users | 29-02-2024 | 502 |
MSRC Security Update | CVE-2024-26196 Microsoft Edge for Android (Chromium-based) Information Disclosure Vulnerability | 29-02-2024 | 503 |
Microsoft Security | Faye’s Journey: From Security PM to Diversity Advocate at Microsoft | 29-02-2024 | 504 |
Center of Internet Security | Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution | 28-02-2024 | 505 |
Unit42 | Navigating the Cloud: Exploring Lateral Movement Techniques | 28-02-2024 | 506 |
MSRC Security Update | CVE-2024-21626 GitHub: CVE-2024-21626 Container breakout through process.cwd trickery and leaked fds | 28-02-2024 | 507 |
MSRC Security Update | CVE-2024-21338 Windows Kernel Elevation of Privilege Vulnerability | 28-02-2024 | 508 |
Microsoft Security | Microsoft boosts its Microsoft 365 Insider Builds on Windows Bounty Program with higher awards and an expanded scope | 27-02-2024 | 509 |
Consiglio Federale CH |
Un impegno a favore dell’educazione, della ricerca e dell’innovazione in Svizzera
| 27-02-2024 | 510 |
Microsoft Security | From Indiana Jones to Cybersecurity: The Inspiring Journey of Devin | 26-02-2024 | 511 |
Unit42 | Data From Chinese Security Services Company i-Soon Linked to Previous Chinese APT Campaigns | 24-02-2024 | 512 |
MSRC Security Update | Chromium: CVE-2024-1676 Inappropriate implementation in Navigation | 23-02-2024 | 513 |
MSRC Security Update | Chromium: CVE-2024-1675 Insufficient policy enforcement in Download | 23-02-2024 | 514 |
MSRC Security Update | Chromium: CVE-2024-1674 Inappropriate implementation in Navigation | 23-02-2024 | 515 |
MSRC Security Update | Chromium: CVE-2024-1673 Use after free in Accessibility | 23-02-2024 | 516 |
MSRC Security Update | Chromium: CVE-2024-1672 Inappropriate implementation in Content Security Policy | 23-02-2024 | 517 |
MSRC Security Update | Chromium: CVE-2024-1671 Inappropriate implementation in Site Isolation | 23-02-2024 | 518 |
MSRC Security Update | Chromium: CVE-2024-1670 Use after free in Mojo | 23-02-2024 | 519 |
MSRC Security Update | Chromium: CVE-2024-1669 Out of bounds memory access in Blink | 23-02-2024 | 520 |
Center of Internet Security | A Vulnerability in Apache OFBiz Could Allow for Remote Code Execution | 23-02-2024 | 521 |
MSRC Security Update | CVE-2024-21423 Microsoft Edge (Chromium-based) Information Disclosure Vulnerability | 23-02-2024 | 522 |
MSRC Security Update | CVE-2024-20677 Microsoft Office Remote Code Execution Vulnerability | 23-02-2024 | 523 |
MSRC Security Update | CVE-2024-21307 Remote Desktop Client Remote Code Execution Vulnerability | 23-02-2024 | 524 |
MSRC Security Update | CVE-2024-26192 Microsoft Edge (Chromium-based) Information Disclosure Vulnerability | 23-02-2024 | 525 |
MSRC Security Update | CVE-2024-26188 Microsoft Edge (Chromium-based) Spoofing Vulnerability | 23-02-2024 | 526 |
Center of Internet Security | A Vulnerability in Junos OS Could Allow for Remote Code Execution | 22-02-2024 | 527 |
Center of Internet Security | Multiple Vulnerabilities in Google Android OS Could Allow for Remote Code Execution | 22-02-2024 | 528 |
Center of Internet Security | Multiple Vulnerabilities in ConnectWise ScreenConnect Could Allow for Remote Code Execution | 22-02-2024 | 529 |
Consiglio Federale CH |
Migrazione verso Microsoft 365: introduzione nelle prime unità amministrative
| 22-02-2024 | 530 |
Center of Internet Security | Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution | 21-02-2024 | 531 |
Consiglio Federale CH |
Sostegno ai media indipendente dal canale di diffusione: proposte del Consiglio federale
| 21-02-2024 | 532 |
MSRC Security Update | CVE-2024-21315 Microsoft Defender for Endpoint Protection Elevation of Privilege Vulnerability | 20-02-2024 | 533 |
Microsoft Security | An Obsession With Impact: The Inspiring Journey of a Dreamer That Led to a Career at Microsoft | 20-02-2024 | 534 |
MSRC Security Update | CVE-2023-36019 Microsoft Power Platform Connector Spoofing Vulnerability | 16-02-2024 | 535 |
FR-CERT Alertes | CERTFR-2024-ALE-005 : [MàJ] Vulnérabilité dans Microsoft Outlook (15 février 2024) | 15-02-2024 | 536 |
MSRC Security Update | CVE-2024-21329 Azure Connected Machine Agent Elevation of Privilege Vulnerability | 15-02-2024 | 537 |
MSRC Security Update | CVE-2024-21351 Windows SmartScreen Security Feature Bypass Vulnerability | 15-02-2024 | 538 |
Microsoft Security | New Security Advisory Tab Added to the Microsoft Security Update Guide | 15-02-2024 | 539 |
MSRC Security Update | CVE-2024-21413 Microsoft Outlook Remote Code Execution Vulnerability | 14-02-2024 | 540 |
MSRC Security Update | CVE-2024-21357 Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability | 14-02-2024 | 541 |
MSRC Security Update | CVE-2024-21413 Microsoft Outlook Remote Code Execution Vulnerability | 14-02-2024 | 542 |
MSRC Security Update | CVE-2024-21410 Microsoft Exchange Server Elevation of Privilege Vulnerability | 14-02-2024 | 543 |
Google TAG | Tool of First Resort: Israel-Hamas War in Cyber | 14-02-2024 | 544 |
Center of Internet Security | Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution | 13-02-2024 | 545 |
Center of Internet Security | Critical Patches Issued for Microsoft Products, February 13, 2024 | 13-02-2024 | 546 |
MSRC Security Update | CVE-2024-21393 Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability | 13-02-2024 | 547 |
MSRC Security Update | CVE-2024-21389 Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability | 13-02-2024 | 548 |
MSRC Security Update | CVE-2024-21372 Windows OLE Remote Code Execution Vulnerability | 13-02-2024 | 549 |
MSRC Security Update | CVE-2024-21386 .NET Denial of Service Vulnerability | 13-02-2024 | 550 |
MSRC Security Update | CVE-2024-21381 Microsoft Azure Active Directory B2C Spoofing Vulnerability | 13-02-2024 | 551 |
MSRC Security Update | CVE-2024-21379 Microsoft Word Remote Code Execution Vulnerability | 13-02-2024 | 552 |
MSRC Security Update | CVE-2024-21396 Dynamics 365 Sales Spoofing Vulnerability | 13-02-2024 | 553 |
MSRC Security Update | CVE-2024-21394 Dynamics 365 Field Service Spoofing Vulnerability | 13-02-2024 | 554 |
MSRC Security Update | CVE-2024-21420 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability | 13-02-2024 | 555 |
MSRC Security Update | CVE-2024-21401 Microsoft Entra Jira Single-Sign-On Plugin Elevation of Privilege Vulnerability | 13-02-2024 | 556 |
MSRC Security Update | CVE-2024-21402 Microsoft Outlook Elevation of Privilege Vulnerability | 13-02-2024 | 557 |
MSRC Security Update | CVE-2024-21404 .NET Denial of Service Vulnerability | 13-02-2024 | 558 |
MSRC Security Update | CVE-2024-21413 Microsoft Outlook Remote Code Execution Vulnerability | 13-02-2024 | 559 |
MSRC Security Update | CVE-2024-20673 Microsoft Office Remote Code Execution Vulnerability | 13-02-2024 | 560 |
MSRC Security Update | CVE-2024-20679 Azure Stack Hub Spoofing Vulnerability | 13-02-2024 | 561 |
MSRC Security Update | CVE-2024-20695 Skype for Business Information Disclosure Vulnerability | 13-02-2024 | 562 |
MSRC Security Update | CVE-2024-21375 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability | 13-02-2024 | 563 |
MSRC Security Update | ADV990001 Latest Servicing Stack Updates | 13-02-2024 | 564 |
MSRC Security Update | CVE-2024-21371 Windows Kernel Elevation of Privilege Vulnerability | 13-02-2024 | 565 |
MSRC Security Update | CVE-2024-21349 Microsoft ActiveX Data Objects Remote Code Execution Vulnerability | 13-02-2024 | 566 |
MSRC Security Update | CVE-2024-20684 Windows Hyper-V Denial of Service Vulnerability | 13-02-2024 | 567 |
MSRC Security Update | CVE-2024-20667 Azure DevOps Server Remote Code Execution Vulnerability | 13-02-2024 | 568 |
MSRC Security Update | CVE-2023-50387 MITRE: CVE-2023-50387 DNSSEC verification complexity can be exploited to exhaust CPU resources and stall DNS resolvers | 13-02-2024 | 569 |
MSRC Security Update | CVE-2024-21327 Microsoft Dynamics 365 Customer Engagement Cross-Site Scripting Vulnerability | 13-02-2024 | 570 |
MSRC Security Update | CVE-2024-21329 Azure Connected Machine Agent Elevation of Privilege Vulnerability | 13-02-2024 | 571 |
MSRC Security Update | CVE-2024-21338 Windows Kernel Elevation of Privilege Vulnerability | 13-02-2024 | 572 |
MSRC Security Update | CVE-2024-21340 Windows Kernel Information Disclosure Vulnerability | 13-02-2024 | 573 |
MSRC Security Update | CVE-2024-21350 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability | 13-02-2024 | 574 |
MSRC Security Update | CVE-2024-21369 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability | 13-02-2024 | 575 |
MSRC Security Update | CVE-2024-21351 Windows SmartScreen Security Feature Bypass Vulnerability | 13-02-2024 | 576 |
MSRC Security Update | CVE-2024-21352 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability | 13-02-2024 | 577 |
MSRC Security Update | CVE-2024-21354 Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability | 13-02-2024 | 578 |
MSRC Security Update | CVE-2024-21357 Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability | 13-02-2024 | 579 |
MSRC Security Update | CVE-2024-21358 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability | 13-02-2024 | 580 |
MSRC Security Update | CVE-2024-21360 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability | 13-02-2024 | 581 |
MSRC Security Update | CVE-2024-21361 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability | 13-02-2024 | 582 |
MSRC Security Update | CVE-2024-21366 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability | 13-02-2024 | 583 |
MSRC Security Update | CVE-2024-21328 Dynamics 365 Sales Spoofing Vulnerability | 13-02-2024 | 584 |
MSRC Security Update | CVE-2024-21304 Trusted Compute Base Elevation of Privilege Vulnerability | 13-02-2024 | 585 |
MSRC Security Update | CVE-2024-21339 Windows USB Generic Parent Driver Remote Code Execution Vulnerability | 13-02-2024 | 586 |
MSRC Security Update | CVE-2024-21406 Windows Printing Service Spoofing Vulnerability | 13-02-2024 | 587 |
MSRC Security Update | CVE-2024-21380 Microsoft Dynamics Business Central/NAV Information Disclosure Vulnerability | 13-02-2024 | 588 |
MSRC Security Update | CVE-2024-21384 Microsoft Office OneNote Remote Code Execution Vulnerability | 13-02-2024 | 589 |
MSRC Security Update | CVE-2024-21391 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability | 13-02-2024 | 590 |
MSRC Security Update | CVE-2024-21395 Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability | 13-02-2024 | 591 |
MSRC Security Update | CVE-2024-21397 Microsoft Azure File Sync Elevation of Privilege Vulnerability | 13-02-2024 | 592 |
MSRC Security Update | CVE-2024-21403 Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability | 13-02-2024 | 593 |
MSRC Security Update | CVE-2024-21341 Windows Kernel Remote Code Execution Vulnerability | 13-02-2024 | 594 |
MSRC Security Update | CVE-2024-21410 Microsoft Exchange Server Elevation of Privilege Vulnerability | 13-02-2024 | 595 |
MSRC Security Update | CVE-2024-21377 Windows DNS Information Disclosure Vulnerability | 13-02-2024 | 596 |
MSRC Security Update | CVE-2024-21412 Internet Shortcut Files Security Feature Bypass Vulnerability | 13-02-2024 | 597 |
MSRC Security Update | CVE-2024-20677 Microsoft Office Remote Code Execution Vulnerability | 13-02-2024 | 598 |
MSRC Security Update | CVE-2024-0056 Microsoft.Data.SqlClient and System.Data.SqlClient SQL Data Provider Security Feature Bypass Vulnerability | 13-02-2024 | 599 |
MSRC Security Update | CVE-2024-0057 NET, .NET Framework, and Visual Studio Security Feature Bypass Vulnerability | 13-02-2024 | 600 |
MSRC Security Update | CVE-2024-21312 .NET Framework Denial of Service Vulnerability | 13-02-2024 | 601 |
MSRC Security Update | CVE-2023-36019 Microsoft Power Platform Connector Spoofing Vulnerability | 13-02-2024 | 602 |
MSRC Security Update | CVE-2023-36558 ASP.NET Core - Security Feature Bypass Vulnerability | 13-02-2024 | 603 |
MSRC Security Update | CVE-2021-43890 Windows AppX Installer Spoofing Vulnerability | 13-02-2024 | 604 |
MSRC Security Update | CVE-2024-21378 Microsoft Outlook Remote Code Execution Vulnerability | 13-02-2024 | 605 |
MSRC Security Update | CVE-2024-21405 Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability | 13-02-2024 | 606 |
MSRC Security Update | CVE-2024-21376 Microsoft Azure Kubernetes Service Confidential Container Remote Code Execution Vulnerability | 13-02-2024 | 607 |
MSRC Security Update | CVE-2024-21355 Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability | 13-02-2024 | 608 |
MSRC Security Update | CVE-2024-21374 Microsoft Teams for Android Information Disclosure | 13-02-2024 | 609 |
MSRC Security Update | CVE-2024-21342 Windows DNS Client Denial of Service Vulnerability | 13-02-2024 | 610 |
MSRC Security Update | CVE-2024-21343 Windows Network Address Translation (NAT) Denial of Service Vulnerability | 13-02-2024 | 611 |
MSRC Security Update | CVE-2024-21344 Windows Network Address Translation (NAT) Denial of Service Vulnerability | 13-02-2024 | 612 |
MSRC Security Update | CVE-2024-21345 Windows Kernel Elevation of Privilege Vulnerability | 13-02-2024 | 613 |
MSRC Security Update | CVE-2024-21346 Win32k Elevation of Privilege Vulnerability | 13-02-2024 | 614 |
MSRC Security Update | CVE-2024-21347 Microsoft ODBC Driver Remote Code Execution Vulnerability | 13-02-2024 | 615 |
MSRC Security Update | CVE-2024-21353 Microsoft WDAC ODBC Driver Remote Code Execution Vulnerability | 13-02-2024 | 616 |
MSRC Security Update | CVE-2024-21348 Internet Connection Sharing (ICS) Denial of Service Vulnerability | 13-02-2024 | 617 |
MSRC Security Update | CVE-2024-21356 Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability | 13-02-2024 | 618 |
MSRC Security Update | CVE-2024-21359 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability | 13-02-2024 | 619 |
MSRC Security Update | CVE-2024-21362 Windows Kernel Security Feature Bypass Vulnerability | 13-02-2024 | 620 |
MSRC Security Update | CVE-2024-21363 Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability | 13-02-2024 | 621 |
MSRC Security Update | CVE-2024-21364 Microsoft Azure Site Recovery Elevation of Privilege Vulnerability | 13-02-2024 | 622 |
MSRC Security Update | CVE-2024-21365 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability | 13-02-2024 | 623 |
MSRC Security Update | CVE-2024-21367 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability | 13-02-2024 | 624 |
MSRC Security Update | CVE-2024-21368 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability | 13-02-2024 | 625 |
MSRC Security Update | CVE-2024-21370 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability | 13-02-2024 | 626 |
FR-CERT Alertes | CERTFR-2024-ALE-004 : [MàJ] Vulnérabilité dans Fortinet FortiOS (09 février 2024) | 09-02-2024 | 627 |
Center of Internet Security | Multiple Vulnerabilities in FortiOS Could Allow for Remote Code Execution | 09-02-2024 | 628 |
MSRC Security Update | Chromium: CVE-2024-1284 Use after free in Mojo | 08-02-2024 | 629 |
MSRC Security Update | Chromium: CVE-2024-1283 Heap buffer overflow in Skia | 08-02-2024 | 630 |
Consiglio Federale CH |
Il 13,3% delle persone occupate non utilizza mai strumenti informatici nello svolgimento del proprio lavoro
| 08-02-2024 | 631 |
Center of Internet Security | Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution | 06-02-2024 | 632 |
Google TAG | Buying Spying: How the commercial surveillance industry works and what can be done about it | 06-02-2024 | 633 |
FR-CERT Alertes | CERTFR-2024-ALE-003 : [MàJ] Incident affectant les solutions AnyDesk (05 février 2024) | 05-02-2024 | 634 |
Consiglio Federale CH |
«Autotest sulla naturalizzazione»: la SEM dà il via alla fase pilota
| 01-02-2024 | 635 |
Center of Internet Security | Multiple Vulnerabilities in Ivanti Products Could Allow for Remote Code Execution | 31-01-2024 | 636 |
Center of Internet Security | Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution | 30-01-2024 | 637 |
Center of Internet Security | A Vulnerability in Trend Micro uiAirSupport Could Allow for Arbitrary Code Execution | 30-01-2024 | 638 |
MSRC Security Update | CVE-2024-21388 Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability | 30-01-2024 | 639 |
Microsoft Security | Congratulations to the Top MSRC 2023 Q4 Security Researchers! | 30-01-2024 | 640 |
Center of Internet Security | Multiple Vulnerabilities in Jenkins Could Allow for Remote Code Execution | 29-01-2024 | 641 |
MSRC Security Update | CVE-2024-21336 Microsoft Edge (Chromium-based) Spoofing Vulnerability | 26-01-2024 | 642 |
MSRC Security Update | CVE-2023-36049 .NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability | 26-01-2024 | 643 |
NCSC | The near-term impact of AI on the cyber threat | 25-01-2024 | 644 |
Consiglio Federale CH |
L’Autorità federale di vigilanza sulle fondazioni offre un servizio chatbot basato sull’intelligenza artificiale
| 25-01-2024 | 645 |
Center of Internet Security | Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution | 23-01-2024 | 646 |
Center of Internet Security | Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution | 23-01-2024 | 647 |
Center of Internet Security | Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution | 23-01-2024 | 648 |
Center of Internet Security | Multiple Vulnerabilities in VMware Products Could Allow for Remote Code Execution | 22-01-2024 | 649 |
Google TAG | TAG Bulletin: Q4 2023 | 19-01-2024 | 650 |
Microsoft Security | Microsoft Actions Following Attack by Nation State Actor Midnight Blizzard | 19-01-2024 | 651 |
Center of Internet Security | Oracle Quarterly Critical Patches Issued January 16, 2024 | 18-01-2024 | 652 |
Google TAG | Russian threat group COLDRIVER expands its targeting of Western officials to include the use of malware | 18-01-2024 | 653 |
Center of Internet Security | A Vulnerability in Atlassian Confluence Data Center and Server Could Allow for Remote Code Execution | 17-01-2024 | 654 |
Center of Internet Security | Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution | 17-01-2024 | 655 |
Consiglio Federale CH |
Diverse pagine web dell’Amministrazione federale temporaneamente irraggiungibili a causa di un attacco DDoS
| 17-01-2024 | 656 |
FR-CERT Alertes | CERTFR-2024-ALE-002 : [MàJ] Multiples Vulnérabilités dans GitLab (12 janvier 2024) | 12-01-2024 | 657 |
FR-CERT Alertes | CERTFR-2024-ALE-001 : [MàJ] Multiples vulnérabilités dans Ivanti Connect Secure et Policy Secure Gateways (11 janvier 2024) | 11-01-2024 | 658 |
Center of Internet Security | A Vulnerability in Cisco Unity Connection Could Allow for Arbitrary Code Execution | 11-01-2024 | 659 |
Consiglio Federale CH |
Al via in due Cantoni pilota il nuovo sistema di accesso ai servizi delle autorità svizzere
| 11-01-2024 | 660 |
Center of Internet Security | Critical Patches Issued for Microsoft Products, January 09, 2024 | 09-01-2024 | 661 |
Microsoft Security | BlueHat India Call for Papers is Now Open! | 08-01-2024 | 662 |
Center of Internet Security | Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution | 03-01-2024 | 663 |
Microsoft Security | Microsoft addresses App Installer abuse | 28-12-2023 | 664 |
Center of Internet Security | A Vulnerability in Google Chrome Could Allow for Arbitrary Code Execution | 21-12-2023 | 665 |
Center of Internet Security | Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution | 20-12-2023 | 666 |
Microsoft Security | Azure Serial Console Attack and Defense - Part 2 | 19-12-2023 | 667 |
Consiglio Federale CH |
La BAC riconsegna la bandiera durante una cerimonia militare
| 19-12-2023 | 668 |
Consiglio Federale CH |
Il Consiglio federale vuole ridurre i rischi geopolitici legati all'infrastruttura digitale
| 15-12-2023 | 669 |
Consiglio Federale CH |
Meno aiuti indiretti per la stampa locale e regionale
| 15-12-2023 | 670 |
FR-CERT Alertes | CERTFR-2023-ALE-013 : Vulnérabilité dans Apache Struts 2 (13 décembre 2023) | 13-12-2023 | 671 |
Center of Internet Security | Multiple Vulnerabilities in Atlassian Products Could Allow for Remote Code Execution | 12-12-2023 | 672 |
Center of Internet Security | A Vulnerability in the Backup Migration Plugin for WordPress Could Allow for Remote Code Execution | 12-12-2023 | 673 |
Center of Internet Security | Critical Patches Issued for Microsoft Products, December 12, 2023 | 12-12-2023 | 674 |
Center of Internet Security | Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution | 12-12-2023 | 675 |
Center of Internet Security | Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution | 11-12-2023 | 676 |
Center of Internet Security | A Vulnerability in Apache Struts 2 Could Allow for Remote Code Execution | 11-12-2023 | 677 |
Consiglio Federale CH |
Il DDPS rinnova i suoi siti Internet
| 11-12-2023 | 678 |
Consiglio Federale CH |
Il Consiglio federale vuole un accesso Internet veloce per tutta la Svizzera
| 08-12-2023 | 679 |
Consiglio Federale CH |
Il Consiglio federale getta le basi per l’ecosistema dei dati svizzero
| 08-12-2023 | 680 |
Consiglio Federale CH |
Basi per limitare il servizio universale nel traffico postale e dei pagamenti in una situazione di grave penuria di elettricità
| 08-12-2023 | 681 |
Consiglio Federale CH |
Il Consiglio federale pone le basi per la trasformazione digitale della Svizzera
| 08-12-2023 | 682 |
Consiglio Federale CH |
Scambio di informazioni e community building per rafforzare la resilienza informatica nella Ginevra internazionale
| 30-11-2023 | 683 |
Consiglio Federale CH |
Avviso di pubblicazione
| 29-11-2023 | 684 |
Consiglio Federale CH |
Il Consiglio federale libera le frequenze per le reti mobili locali private
| 29-11-2023 | 685 |
Consiglio Federale CH |
Il Consiglio federale pone in vigore la legge federale concernente l’impiego di mezzi elettronici per l’adempimento dei compiti delle autorità
| 22-11-2023 | 686 |
Consiglio Federale CH |
Id-e: il Consiglio federale adotta il messaggio
| 22-11-2023 | 687 |
Consiglio Federale CH |
La Svizzera introduce l'USB-C come standard di ricarica unitario
| 22-11-2023 | 688 |
Consiglio Federale CH |
Nomina dei membri dell’Autorità di controllo indipendente per l’esplorazione radio e l’esplorazione di segnali via cavo
| 22-11-2023 | 689 |
Consiglio Federale CH |
Il Consiglio federale delinea la procedura per la radiocomunicazione mobile nella gamma delle onde millimetriche
| 22-11-2023 | 690 |
Consiglio Federale CH |
Intelligenza artificiale: il Consiglio federale esamina gli approcci normativi
| 22-11-2023 | 691 |
Consiglio Federale CH |
Id-e: Commento della Consigliera federale Elisabeth Baume-Schneider
| 22-11-2023 | 692 |
Microsoft Security | Introducing the Microsoft Defender Bounty Program | 21-11-2023 | 693 |
Microsoft Security | Celebrating ten years of the Microsoft Bug Bounty program and more than $60M awarded | 20-11-2023 | 694 |
Consiglio Federale CH |
Comitato consultivo Svizzera digitale: le leggi devono promuovere la digitalizzazione
| 20-11-2023 | 695 |
Microsoft Security | Reflecting on 20 years of Patch Tuesday | 17-11-2023 | 696 |
Google TAG | Zimbra 0-day used to target international government organizations | 16-11-2023 | 697 |
Consiglio Federale CH |
Rapporto conferma le misure previste contro la diffusione di discorsi di odio
| 15-11-2023 | 698 |
Consiglio Federale CH |
Le ordinanze in materia di sorveglianza del traffico delle telecomunicazioni sono adeguate ai progressi tecnologici
| 15-11-2023 | 699 |
Consiglio Federale CH |
Sorveglianza delle telecomunicazioni: importi forfettari in vigore dal 1° gennaio 2024
| 15-11-2023 | 700 |
Microsoft Security | Microsoft guidance regarding credentials leaked to GitHub Actions Logs through Azure CLI | 14-11-2023 | 701 |
Consiglio Federale CH |
Attacco hacker alla società Concevis: interessata anche l’Amministrazione federale
| 14-11-2023 | 702 |
Consiglio Federale CH |
Il Consiglio federale respinge l'«iniziativa SSR» ma il canone radio-tv deve diminuire
| 08-11-2023 | 703 |
Consiglio Federale CH |
Il consigliere federale Albert Rösti al vertice sull’intelligenza artificiale nel Regno Unito
| 02-11-2023 | 704 |
Consiglio Federale CH |
Rapporto semestrale dell’NCSC: in primo piano il cosiddetto «hacktivismo»
| 02-11-2023 | 705 |
Consiglio Federale CH |
Rafforzamento della rete mobile in caso di problemi di approvvigionamento elettrico
| 01-11-2023 | 706 |
Consiglio Federale CH |
Il consigliere federale Albert Rösti sarà a Londra e a Parigi alla fine della settimana
| 31-10-2023 | 707 |
Consiglio Federale CH |
Ultima proroga di due anni delle concessioni FM
| 25-10-2023 | 708 |
FR-CERT Alertes | CERTFR-2023-ALE-012 : [MàJ] Vulnérabilité dans Citrix NetScaler ADC et NetScaler Gateway (23 octobre 2023) | 23-10-2023 | 709 |
Google TAG | Government-backed actors exploiting WinRAR vulnerability | 18-10-2023 | 710 |
FR-CERT Alertes | CERTFR-2023-ALE-011 : [MàJ] Multiples vulnérabilités dans Cisco IOS XE (17 octobre 2023) | 17-10-2023 | 711 |
Microsoft Security | Congratulations to the Top MSRC 2023 Q3 Security Researchers! | 16-10-2023 | 712 |
Microsoft Security | Introducing the Microsoft AI Bug Bounty Program featuring the AI-powered Bing experience | 12-10-2023 | 713 |
Microsoft Security | Microsoft Response to Distributed Denial of Service (DDoS) Attacks against HTTP/2 | 10-10-2023 | 714 |
Google TAG | TAG Bulletin: Q3 2023 | 05-10-2023 | 715 |
Microsoft Security | Cybersecurity Awareness Month 2023: Elevating Security Together | 05-10-2023 | 716 |
FR-CERT Alertes | CERTFR-2023-ALE-010 : Multiples vulnérabilités dans Exim (02 octobre 2023) | 02-10-2023 | 717 |
Microsoft Security | Microsoft’s Response to Open-Source Vulnerabilities - CVE-2023-4863 and CVE-2023-5217 | 02-10-2023 | 718 |
Consiglio Federale CH |
Modifica dell’ordinanza sul coordinamento della trasformazione digitale e la governance delle TIC in seno all’Amministrazione federale
| 29-09-2023 | 719 |
Microsoft Security | Journey Down Under: How Rocco Became Australia’s Premier Hacker | 25-09-2023 | 720 |
Google TAG | 0-days exploited by commercial surveillance vendor in Egypt | 22-09-2023 | 721 |
Microsoft Security | Microsoft mitigated exposure of internal information in a storage account due to overly-permissive SAS token | 18-09-2023 | 722 |
Consiglio Federale CH |
La Confederazione dà avvio a un esperimento pilota su Mastodon
| 12-09-2023 | 723 |
Consiglio Federale CH |
Protezione contro le radiazioni della telefonia mobile: apre il servizio di consulenza
| 08-09-2023 | 724 |
Google TAG | Active North Korean campaign targeting security researchers | 07-09-2023 | 725 |
Microsoft Security | Results of Major Technical Investigations for Storm-0558 Key Acquisition | 06-09-2023 | 726 |
Consiglio Federale CH |
Oggi entra in vigore il nuovo diritto in materia di protezione dei dati
| 01-09-2023 | 727 |
Consiglio Federale CH |
Sporta una denuncia penale per la fuga di dati presso Xplain che ha interessato frammenti del programma di allestimento di giornali e di rapporti della polizia militare
| 24-08-2023 | 728 |
Consiglio Federale CH |
Attacco hacker contro la società Xplain: il Consiglio federale conferisce un mandato d’inchiesta
| 23-08-2023 | 729 |
Consiglio Federale CH |
Digitalizzazione della dogana: Svizzera e Austria concordano un processo doganale di base comune
| 18-08-2023 | 730 |
Consiglio Federale CH |
Programma nazionale per la digitalizzazione del settore sanitario: incontro del Comitato consultivo Svizzera digitale
| 17-08-2023 | 731 |
Microsoft Security | Azure Serial Console Attack and Defense - Part 1 | 10-08-2023 | 732 |
Microsoft Security | Congratulations to the MSRC 2023 Most Valuable Security Researchers! | 08-08-2023 | 733 |
Microsoft Security | Updating our Vulnerability Severity Classification for AI Systems | 08-08-2023 | 734 |
Microsoft Security | Microsoft Bug Bounty Program Year in Review: $13.8M in Rewards | 07-08-2023 | 735 |
Microsoft Security | Microsoft mitigates Power Platform Custom Code information disclosure vulnerability | 04-08-2023 | 736 |
Google TAG | TAG Bulletin: Q2 2023 | 31-07-2023 | 737 |
Google TAG | The ups and downs of 0-days | 27-07-2023 | 738 |
Microsoft Security | BlueHat October 2023 Call for Papers is Now Open! | 27-07-2023 | 739 |
FR-CERT Alertes | CERTFR-2023-ALE-009 : [MàJ] Multiples vulnérabilités dans Ivanti Endpoint Manager Mobile (26 juillet 2023) | 26-07-2023 | 740 |
NCSC | ACD - The Sixth Year | 24-07-2023 | 741 |
Microsoft Security | Updated Researcher Portal Submission Form: Discover the New Fields in the Submission Form | 20-07-2023 | 742 |
FR-CERT Alertes | CERTFR-2023-ALE-008 : [MàJ] Vulnérabilité dans Citrix NetScaler ADC et NetScaler Gateway (19 juillet 2023) | 19-07-2023 | 743 |
FR-CERT Alertes | CERTFR-2023-ALE-007 : [MàJ] Vulnérabilité dans Zimbra Collaboration Suite (17 juillet 2023) | 17-07-2023 | 744 |
Microsoft Security | From Bounty Leaderboards to Microsoft Security Researcher, Meet Cameron Vincent! | 17-07-2023 | 745 |
Microsoft Security | What to expect when reporting vulnerabilities to Microsoft | 14-07-2023 | 746 |
Microsoft Security | Congratulations to the Top MSRC 2023 Q2 Security Researchers! | 14-07-2023 | 747 |
FR-CERT Alertes | CERTFR-2023-ALE-006 : Vulnérabilité dans les produits Microsoft (12 juillet 2023) | 12-07-2023 | 748 |
Consiglio Federale CH |
Attacco hacker contro Xplain: pubblicato nel dark web un estratto del sistema d’informazione «HOOGAN» del 2015 – le persone interessate saranno informate
| 12-07-2023 | 749 |
Microsoft Security | Microsoft mitigates China-based threat actor Storm-0558 targeting of customer email | 11-07-2023 | 750 |
FR-CERT Alertes | CERTFR-2023-ALE-005 : Synthèse sur l’exploitation d’une vulnérabilité dans MOVEit Transfer (05 juillet 2023) | 05-07-2023 | 751 |
Consiglio Federale CH |
Prima borsa dell’innovazione GovTech
| 05-07-2023 | 752 |
Microsoft Security | Breaking Barriers: Aditi’s Journey Through Sight Loss to Microsoft AI Innovator | 28-06-2023 | 753 |
Consiglio Federale CH |
Il Consiglio federale prosegue i lavori per una rete a banda ultra larga in tutta la Svizzera
| 28-06-2023 | 754 |
Consiglio Federale CH |
Apertura del dominio ".swiss" alle persone fisiche
| 28-06-2023 | 755 |
Consiglio Federale CH |
Attacco hacker contro Xplain: il Consiglio federale istituisce uno stato maggiore di crisi politico-strategico per la fuga di dati
| 28-06-2023 | 756 |
Consiglio Federale CH |
CFR - I giovani e il razzismo: punto della situazione e possibili strategie di prevenzione
| 26-06-2023 | 757 |
NCSC | Cyber Threat Report: UK Legal Sector | 21-06-2023 | 758 |
Microsoft Security | Potential Risk of Privilege Escalation in Azure AD Applications | 20-06-2023 | 759 |
Consiglio Federale CH |
Ampliamento del sistema di chiamata d'emergenza in Svizzera
| 20-06-2023 | 760 |
Microsoft Security | Microsoft Response to Layer 7 Distributed Denial of Service (DDoS) Attacks | 16-06-2023 | 761 |
Microsoft Security | Microsoft mitigates set of cross-site scripting (XSS) vulnerabilities in Azure Bastion and Azure Container Registry | 14-06-2023 | 762 |
Consiglio Federale CH |
Attacco hacker contro Xplain: le prime analisi dei dati indicano che occorre intervenire
| 14-06-2023 | 763 |
FR-CERT Alertes | CERTFR-2023-ALE-004 : Vulnérabilité dans les produits Fortinet (13 juin 2023) | 13-06-2023 | 764 |
Consiglio Federale CH |
Attacco DDoS contro l’Amministrazione federale: diversi siti Internet e applicazioni non sono accessibili
| 12-06-2023 | 765 |
Consiglio Federale CH |
Rapporto sulla sicurezza informatica della Confederazione nel 2022
| 09-06-2023 | 766 |
Consiglio Federale CH |
Il Consiglio federale approva l’accordo tra la Confederazione e i Cantoni per il finanziamento di progetti di digitalizzazione
| 09-06-2023 | 767 |
Microsoft Security | Hey Yara, find some vulnerabilities | 08-06-2023 | 768 |
Consiglio Federale CH |
Attacco hacker alla ditta Xplain: colpita anche l’Amministrazione federale
| 08-06-2023 | 769 |
Consiglio Federale CH |
Scenari per lo sviluppo futuro di un'agenzia di stampa nazionale
| 02-06-2023 | 770 |
Consiglio Federale CH |
Servizio universale della Posta nel settore del traffico dei pagamenti: requisiti soddisfatti
| 01-06-2023 | 771 |
Consiglio Federale CH |
Preoccupazioni digitali al centro del dibattito dello Swiss IGF
| 23-05-2023 | 772 |
Microsoft Security | Announcing The BlueHat Podcast: Listen and Subscribe Now! | 17-05-2023 | 773 |
Consiglio Federale CH |
Rapporto semestrale dell’NCSC: in primo piano, la cibersicurezza presso le PMI
| 11-05-2023 | 774 |
Microsoft Security | Guidance related to Secure Boot Manager changes associated with CVE-2023-24932 | 09-05-2023 | 775 |
Consiglio Federale CH |
Avviso di pubblicazione - Rapporto sulla trasmissione di informazioni da parte dell’UFIT nel caso di decreti di edizione emanati nell’ambito di procedimenti penali
| 08-05-2023 | 776 |
Google TAG | TAG Bulletin: Q1 2023 | 01-05-2023 | 777 |
Consiglio Federale CH |
Il Consiglio federale pianifica una valutazione complessiva della SSR
| 26-04-2023 | 778 |
Consiglio Federale CH |
Definiti nuovi progetti chiave TDT
| 20-04-2023 | 779 |
NCSC | The threat from commercial cyber proliferation | 19-04-2023 | 780 |
Google TAG | Ukraine remains Russia’s biggest cyber focus in 2023 | 19-04-2023 | 781 |
Microsoft Security | Microsoft Vulnerability Severity Classification for Online Services Publication | 18-04-2023 | 782 |
Consiglio Federale CH |
Politica digitale dell'UE: analisi degli effetti sulla Svizzera
| 18-04-2023 | 783 |
Microsoft Security | Congratulations to the Top MSRC 2023 Q1 Security Researchers! | 13-04-2023 | 784 |
Consiglio Federale CH |
Il Consiglio federale e i Cantoni definiscono la nuova ciberstrategia nazionale
| 13-04-2023 | 785 |
Microsoft Security | Best practices regarding Azure Storage Keys, Azure Functions, and Azure Role Based Access | 11-04-2023 | 786 |
Google TAG | How we’re protecting users from government-backed attacks from North Korea | 05-04-2023 | 787 |
Consiglio Federale CH |
Grandi piattaforme di comunicazione: il Consiglio federale auspica una regolamentazione
| 05-04-2023 | 788 |
FR-CERT Alertes | CERTFR-2023-ALE-003 : [MàJ] Compromission de l’application 3CX Desktop App (31 mars 2023) | 31-03-2023 | 789 |
Google TAG | Spyware vendors use 0-days and n-days against popular platforms | 29-03-2023 | 790 |
Microsoft Security | Guidance on Potential Misconfiguration of Authorization of Multi-Tenant Applications that use Azure AD | 29-03-2023 | 791 |
Consiglio Federale CH |
Concluso il primo GovTech Hackathon per la trasformazione digitale della Svizzera
| 27-03-2023 | 792 |
Consiglio Federale CH |
Le attualità dell’UFPD cambiano veste
| 23-03-2023 | 793 |
Consiglio Federale CH |
CFR - Piattaforma di segnalazione dei discorsi d’odio razzisti online: un primo bilancio dopo un anno
| 21-03-2023 | 794 |
FR-CERT Alertes | CERTFR-2023-ALE-002 : [MàJ] Vulnérabilité dans Microsoft Outlook (15 mars 2023) | 15-03-2023 | 795 |
Google TAG | Magniber ransomware actors used a variant of Microsoft SmartScreen bypass | 14-03-2023 | 796 |
FR-CERT Alertes | CERTFR-2023-ALE-001 : Vulnérabilité dans Fortinet FortiOS (14 mars 2023) | 14-03-2023 | 797 |
Microsoft Security | Microsoft Mitigates Outlook Elevation of Privilege Vulnerability | 14-03-2023 | 798 |
Consiglio Federale CH |
Primo Linked Data Day dell'Amministrazione federale
| 09-03-2023 | 799 |
Consiglio Federale CH |
Commissione ONU sulla condizione delle donne: la Svizzera sottolinea l’importanza della digitalizzazione per la parità di genere
| 06-03-2023 | 800 |
Consiglio Federale CH |
L’esercito trasferirà l’informatica dell’amministrazione all’Ufficio federale dell’informatica e della telecomunicazione
| 03-03-2023 | 801 |
Consiglio Federale CH |
Sistemi d’informazione del DDPS: il Consiglio federale adegua le basi giuridiche
| 03-03-2023 | 802 |
Microsoft Security | Configuring host-level audit logging for AKS VMSS | 01-03-2023 | 803 |
Microsoft Security | Azure Kubernetes Service (AKS) Threat Hunting | 01-03-2023 | 804 |
Microsoft Security | First steps in CHERIoT Security Research | 28-02-2023 | 805 |
Consiglio Federale CH |
Importi forfettari per la sorveglianza del traffico delle telecomunicazioni: avviata la consultazione
| 22-02-2023 | 806 |
Google TAG | Fog of war: how the Ukraine conflict transformed the cyber threat landscape | 16-02-2023 | 807 |
Consiglio Federale CH |
Piattaforma per la comunicazione elettronica nella giustizia: il Consiglio federale adotta il messaggio
| 15-02-2023 | 808 |
Consiglio Federale CH |
La Confederazione introduce Microsoft 365
| 15-02-2023 | 809 |
Microsoft Security | New MSRC Blog Site | 08-02-2023 | 810 |
Microsoft Security | BlueHat 2023: Connecting the security research community with Microsoft | 06-02-2023 | 811 |
FR-CERT Alertes | CERTFR-2023-ALE-015 : [MàJ] Campagne d’exploitation d’une vulnérabilité affectant VMware ESXi (03 février 2023) | 03-02-2023 | 812 |
Microsoft Security | Microsoft Investigation - Threat actor consent phishing campaign abusing the verified publisher process | 31-01-2023 | 813 |
Consiglio Federale CH |
Radio locali e TV regionali: avvio della gara pubblica per le nuove concessioni
| 30-01-2023 | 814 |
Google TAG | Over 50,000 instances of DRAGONBRIDGE activity disrupted in 2022 | 26-01-2023 | 815 |
Microsoft Security | Congratulations to the Top MSRC 2022 Q4 Security Researchers! | 26-01-2023 | 816 |
Microsoft Security | Microsoft resolves four SSRF vulnerabilities in Azure cloud services | 17-01-2023 | 817 |
Consiglio Federale CH |
Crediti addizionali per i centri di calcolo e l’ammodernamento della sorveglianza dello spazio aereo: disponibile l’indagine indipendente
| 12-01-2023 | 818 |
Microsoft Security | Publishing CBL-Mariner CVEs on the Security Update Guide CVRF API | 06-01-2023 | 819 |
Microsoft Security | Security Update Guide Improvement – Representing Hotpatch Updates | 29-12-2022 | 820 |
Consiglio Federale CH |
Informatevi sulle pari opportunità delle persone disabili
| 20-12-2022 | 821 |
FR-CERT Alertes | CERTFR-2022-ALE-014 : Multiples vulnérabilités dans AMI MegaRAC (16 décembre 2022) | 16-12-2022 | 822 |
Consiglio Federale CH |
Avviso Pubblicazione
| 16-12-2022 | 823 |
Consiglio Federale CH |
Internet più veloce nel servizio universale
| 16-12-2022 | 824 |
Consiglio Federale CH |
Nuova strategia per la Svizzera digitale
| 16-12-2022 | 825 |
Consiglio Federale CH |
Sostegno indiretto alla stampa: riduzioni inferiori per la stampa locale e regionale
| 16-12-2022 | 826 |
Consiglio Federale CH |
Il Consiglio federale intende promuovere l’open finance
| 16-12-2022 | 827 |
Consiglio Federale CH |
Partecipazione della Svizzera alle discussioni dell'OCSE sulla politica dell'economia digitale
| 15-12-2022 | 828 |
Consiglio Federale CH |
EasyGov.swiss: rendiconto IVA e permessi di lavoro per cittadini di Paesi terzi
| 15-12-2022 | 829 |
Consiglio Federale CH |
Esecuzione delle misure collaterali: nuova piattaforma di comunicazione elettronica
| 14-12-2022 | 830 |
FR-CERT Alertes | CERTFR-2022-ALE-013 : [MàJ] Vulnérabilité dans Citrix ADC et Gateway (13 décembre 2022) | 13-12-2022 | 831 |
FR-CERT Alertes | CERTFR-2022-ALE-012 : [MàJ] Vulnérabilité dans FortiOS SSL-VPN (13 décembre 2022) | 13-12-2022 | 832 |
Consiglio Federale CH |
Monitoraggio degli sviluppi della digitalizzazione: la Svizzera è sulla buona strada
| 09-12-2022 | 833 |
Microsoft Security | BlueHat 2023: Applications to Attend NOW OPEN! | 02-12-2022 | 834 |
Consiglio Federale CH |
L’NCSC diventerà un ufficio federale del DDPS
| 02-12-2022 | 835 |
Consiglio Federale CH |
Il Consiglio federale trasmette al Parlamento il messaggio concernente l’introduzione dell’obbligo di segnalare ciberattacchi a infrastrutture critiche
| 02-12-2022 | 836 |
Consiglio Federale CH |
La Confederazione fissa obiettivi su come impiegare la scienza dei dati
| 02-12-2022 | 837 |
Microsoft Security | A Ride on the Wild Side with Hacking Heavyweight Sick Codes | 29-11-2022 | 838 |
Consiglio Federale CH |
Procedimenti civili transfrontalieri: agevolare l’impiego della comunicazione elettronica
| 23-11-2022 | 839 |
Consiglio Federale CH |
Il consigliere federale Ueli Maurer invita il settore finanziario a una tavola rotonda sull’intelligenza artificiale
| 18-11-2022 | 840 |
Consiglio Federale CH |
Digital Diplomacy – from anticipation to action (eng)
| 18-11-2022 | 841 |
Microsoft Security | Announcing the Microsoft Machine Learning Membership Inference Competition (MICO) | 16-11-2022 | 842 |
Consiglio Federale CH |
Misure per rafforzare la sicurezza delle reti di telecomunicazione
| 16-11-2022 | 843 |
Consiglio Federale CH |
Il rapporto semestrale dell’NCSC è incentrato sull’informatica nei conflitti armati
| 03-11-2022 | 844 |
Consiglio Federale CH |
Il delegato federale alla cibersicurezza ha rappresentato la Svizzera all’«International Counter Ransomware Initiative Summit» a Washington
| 03-11-2022 | 845 |
Microsoft Security | Awareness and guidance related to OpenSSL 3.0 - 3.0.6 risk (CVE-2022-3786 and CVE-2202-3602) | 02-11-2022 | 846 |
Consiglio Federale CH |
«Cloud pubblico della Confederazione»: le prestazioni possono essere acquistate
| 02-11-2022 | 847 |
Microsoft Security | Microsoft Mitigates Vulnerability in Jupyter Notebooks for Azure Cosmos DB | 01-11-2022 | 848 |
Microsoft Security | Reflecting on Cybersecurity Awareness Month: At its Core, Cybersecurity is all about People | 31-10-2022 | 849 |
Consiglio Federale CH |
Nuove storie di quotidianità digitale
| 27-10-2022 | 850 |
Microsoft Security | Congratulations to the Top MSRC 2022 Q3 Security Researchers! | 24-10-2022 | 851 |
Consiglio Federale CH |
La Dogana del futuro: risultati intermedi della digitalizzazione alla Dogana Sud
| 21-10-2022 | 852 |
Microsoft Security | Investigation Regarding Misconfigured Microsoft Storage Location | 19-10-2022 | 853 |
Microsoft Security | Awareness and guidance related to potential Service Fabric Explorer (SFX) v1 web client risk | 19-10-2022 | 854 |
Consiglio Federale CH |
Svolto il programma «bug bounty» per il sistema centrale di accesso della Confederazione eIAM
| 18-10-2022 | 855 |
FR-CERT Alertes | CERTFR-2022-ALE-011 : Vulnérabilité dans les produits Fortinet (14 octobre 2022) | 14-10-2022 | 856 |
Consiglio Federale CH |
L'UIT rafforza la Ginevra internazionale e vuole colmare il divario digitale
| 14-10-2022 | 857 |
Microsoft Security | Hunting for Cobalt Strike: Mining and plotting for fun and profit | 13-10-2022 | 858 |
Microsoft Security | BlueHat 2023 Call for Papers is Now Open! | 13-10-2022 | 859 |
Microsoft Security | Improvements in Security Update Notifications Delivery - And a New Delivery Method | 12-10-2022 | 860 |
Consiglio Federale CH |
Rapporto sulla trasformazione digitale nel servizio pubblico
| 12-10-2022 | 861 |
Consiglio Federale CH |
Il presidente della Confederazione apre il secondo vertice GESDA
| 12-10-2022 | 862 |
FR-CERT Alertes | CERTFR-2022-ALE-010 : Multiples vulnérabilités dans GLPI (07 octobre 2022) | 07-10-2022 | 863 |
FR-CERT Alertes | CERTFR-2022-ALE-009 : [MaJ] Vulnérabilité dans Zimbra Collaboration (07 octobre 2022) | 07-10-2022 | 864 |
FR-CERT Alertes | CERTFR-2022-ALE-008 : [MaJ] Multiples vulnérabilités dans Microsoft Exchange (30 septembre 2022) | 30-09-2022 | 865 |
Microsoft Security | Customer Guidance for Reported Zero-day Vulnerabilities in Microsoft Exchange Server | 30-09-2022 | 866 |
Consiglio Federale CH |
Cloud pubblico della Confederazione: contratti firmati
| 27-09-2022 | 867 |
Consiglio Federale CH |
Il Comitato consultivo discute il progetto per la strategia «Svizzera digitale» aggiornata
| 22-09-2022 | 868 |
NCSC | Decrypting diversity: Diversity and inclusion in cyber security report 2020 | 21-09-2022 | 869 |
Microsoft Security | Defense-in-Depth Updates for Azure Identity libraries and Azure Key Vault libraries within Azure SDK plus Best Practice Implementation Guidance | 20-09-2022 | 870 |
FR-CERT Alertes | CERTFR-2022-ALE-007 : Multiples vulnérabilités dans Microsoft Windows (16 septembre 2022) | 16-09-2022 | 871 |
Consiglio Federale CH |
Coinvolgimento della Svizzera nei negoziati sull'intelligenza artificiale
| 16-09-2022 | 872 |
Consiglio Federale CH |
Definite le future zone di copertura per le radio locali e le televisioni regionali
| 16-09-2022 | 873 |
Consiglio Federale CH |
Nuova versione del metodo di gestione dei progetti HERMES
| 15-09-2022 | 874 |
Microsoft Security | Curious, Innovative, Creative, Community Driven: Meet Cyb3rWard0g, Roberto Rodriquez | 07-09-2022 | 875 |
Consiglio Federale CH |
Mantenuti l'importo del canone radiotelevisivo e la concessione SSR
| 07-09-2022 | 876 |
Microsoft Security | What’s the smallest variety of CHERI? | 06-09-2022 | 877 |
Consiglio Federale CH |
Informatevi sulle pari opportunità delle persone disabili
| 06-09-2022 | 878 |
Consiglio Federale CH |
Lancio della campagna nazionale di sensibilizzazione alla cibersicurezza
| 05-09-2022 | 879 |
Microsoft Security | Vulnerability Fixed in Azure Synapse Spark | 01-09-2022 | 880 |
Consiglio Federale CH |
Avviso di pubblicazione
| 31-08-2022 | 881 |
Consiglio Federale CH |
Cibersicurezza dei dispositivi senza filo
| 25-08-2022 | 882 |
Consiglio Federale CH |
Nuovo software per i siti Internet della Confederazione
| 23-08-2022 | 883 |
Consiglio Federale CH |
Conclusione del dialogo sui media
| 23-08-2022 | 884 |
Microsoft Security | Microsoft Bug Bounty Programs Year in Review: $13.7M in Rewards | 11-08-2022 | 885 |
Consiglio Federale CH |
Ora la Cancelleria federale pubblica il diritto federale anche sotto forma di dati leggibili elettronicamente
| 11-08-2022 | 886 |
Consiglio Federale CH |
Visita di lavoro in India del consigliere federale Ueli Maurer
| 10-08-2022 | 887 |
Consiglio Federale CH |
L’Amministrazione federale testa la video identificazione per l’accesso a suoi sistemi interni
| 10-08-2022 | 888 |
Microsoft Security | Security Update Guide Notification System News: Create your profile now | 09-08-2022 | 889 |
Microsoft Security | Microsoft Office to publish symbols starting August 2022 | 08-08-2022 | 890 |
Microsoft Security | Congratulations to the MSRC 2022 Most Valuable Researchers! | 08-08-2022 | 891 |
Consiglio Federale CH |
L’Amministrazione federale acquisisce una piattaforma per i programmi «bug bounty»
| 03-08-2022 | 892 |
Microsoft Security | Anatomy of a Cloud-Service Security Update | 28-07-2022 | 893 |
Microsoft Security | Congratulations to the Top MSRC 2022 Q2 Security Researchers! | 19-07-2022 | 894 |
Microsoft Security | Mitigation for Azure Storage SDK Client-Side Encryption Padding Oracle Vulnerability | 18-07-2022 | 895 |
Microsoft Security | All Hands-on Deck: A Whole-of-Society Approach for Cybersecurity | 13-07-2022 | 896 |
Microsoft Security | Microsoft Mitigates Azure Site Recovery Vulnerabilities | 12-07-2022 | 897 |
Consiglio Federale CH |
Piattaforma per la comunicazione elettronica: disegno di legge entro fine 2022
| 29-06-2022 | 898 |
Consiglio Federale CH |
Id-e: il Consiglio federale avvia la consultazione
(ultima modifica: 29.06.2022)
| 29-06-2022 | 899 |
Consiglio Federale CH |
Le procedure relative all’imposta sul valore aggiunto dovranno essere svolte per via elettronica
| 29-06-2022 | 900 |
Microsoft Security | Service Fabric Privilege Escalation from Containerized Workloads on Linux | 28-06-2022 | 901 |
Consiglio Federale CH |
Vielfalt als Treiber von Innovation oder das Geheimnis des Schweizers Melting Pot (de)
| 27-06-2022 | 902 |
Microsoft Security | A Man of Action: Meet Callum Carney | 24-06-2022 | 903 |
NCSC | ACD - The Fifth Year | 15-06-2022 | 904 |
Consiglio Federale CH |
Primo rapporto sul monitoraggio delle radiazioni non ionizzanti: l’esposizione è inferiore al valore limite
| 15-06-2022 | 905 |
Consiglio Federale CH |
Il Consiglio federale valuta i georegistri nazionali per una Svizzera digitale
| 10-06-2022 | 906 |
Consiglio Federale CH |
Servizi di pagamento: nel 2021 la Posta ha adempiuto il suo mandato di servizio universale
| 09-06-2022 | 907 |
FR-CERT Alertes | CERTFR-2022-ALE-006 : [MàJ] Vulnérabilité dans Atlassian Confluence (03 juin 2022) | 03-06-2022 | 908 |
Consiglio Federale CH |
Informatevi sulle pari opportunità delle persone disabili
| 02-06-2022 | 909 |
FR-CERT Alertes | CERTFR-2022-ALE-005 : [MàJ] Vulnérabilité dans Microsoft Windows (31 mai 2022) | 31-05-2022 | 910 |
Microsoft Security | Guidance for CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability | 30-05-2022 | 911 |
Consiglio Federale CH |
Voto elettronico: entrata in vigore delle nuove basi legali
| 25-05-2022 | 912 |
Consiglio Federale CH |
Il Consiglio federale prende atto del rapporto «Svizzera 2035»
| 25-05-2022 | 913 |
Consiglio Federale CH |
EasyGov.swiss sostiene la digitalizzazione dell’AVF e permette di presentare online le domande di permessi per frontalieri
| 24-05-2022 | 914 |
Microsoft Security | New Research Paper: Pre-hijacking Attacks on Web User Accounts | 23-05-2022 | 915 |
Microsoft Security | Researcher Spotlight: Hector Peralta’s Evolution from Popcorn Server to the MSRC Leaderboards | 19-05-2022 | 916 |
Consiglio Federale CH |
Dibattiti aperti su Internet e digitalizzazione al prossimo Swiss IGF
| 19-05-2022 | 917 |
Consiglio Federale CH |
Il Centro nazionale per la cibersicurezza diventa un ufficio federale
| 18-05-2022 | 918 |
Consiglio Federale CH |
Strategia nazionale contro i cyber-rischi: l’attuazione procede con successo e viene ulteriormente rafforzata
| 18-05-2022 | 919 |
Microsoft Security | Anatomy of a Security Update | 13-05-2022 | 920 |
FR-CERT Alertes | CERTFR-2022-ALE-004 : Vulnérabilité dans F5 BIG-IP (11 mai 2022) | 11-05-2022 | 921 |
NCSC | Organisational use of Enterprise Connected Devices | 10-05-2022 | 922 |
Microsoft Security | Vulnerability mitigated in the third-party Data Connector used in Azure Synapse pipelines and Azure Data Factory (CVE-2022-29972) | 09-05-2022 | 923 |
Consiglio Federale CH |
L’ultimo rapporto semestrale del Centro nazionale per la cibersicurezza (NCSC) è incentrato sugli attacchi alle catene di approvvigionamento
| 05-05-2022 | 924 |
NCSC | Threat report on application stores | 04-05-2022 | 925 |
Microsoft Security | Azure Database for PostgreSQL Flexible Server Privilege Escalation and Remote Code Execution | 28-04-2022 | 926 |
NCSC | Malware analysis report on SparrowDoor malware | 25-04-2022 | 927 |
Microsoft Security | Congratulations and New Swag Awards for the Top MSRC 2022 Q1 Security Researchers! | 21-04-2022 | 928 |
Consiglio Federale CH |
Voto elettronico: disponibili i risultati della prima verifica indipendente
| 20-04-2022 | 929 |
Microsoft Security | Expanding High Impact Scenario Awards for Microsoft Bug Bounty Programs | 14-04-2022 | 930 |
FR-CERT Alertes | CERTFR-2022-ALE-003 : [MàJ] Vulnérabilité dans l’implémentation du protocole RPC par Microsoft (13 avril 2022) | 13-04-2022 | 931 |
Consiglio Federale CH |
Avviso di pubblicazione
| 13-04-2022 | 932 |
Consiglio Federale CH |
Consigliera federale Sommaruga: «La digitalizzazione richiede fiducia da parte della popolazione»
| 13-04-2022 | 933 |
Consiglio Federale CH |
5G e fibra ottica: verso una società della banda larga in Svizzera
| 13-04-2022 | 934 |
Consiglio Federale CH |
Conclusa l’organizzazione della trasformazione digitale dell’Amministrazione federale
| 13-04-2022 | 935 |
NCSC | Vendor Security Assessment | 12-04-2022 | 936 |
Consiglio Federale CH |
Servizio pubblico di collocamento: modernizzato COLSTA, il sistema IT degli URC
| 07-04-2022 | 937 |
Microsoft Security | Microsoft’s Response to CVE-2022-22965 Spring Framework | 05-04-2022 | 938 |
Microsoft Security | On-Premises Servers Products are Here! Introducing the Applications and On-Premises Servers Bug Bounty Program | 05-04-2022 | 939 |
Microsoft Security | Randomizing the KUSER_SHARED_DATA Structure on Windows | 05-04-2022 | 940 |
Consiglio Federale CH |
Costituzione di un’associazione per aumentare la ciber-resilienza nel mercato finanziario svizzero
| 05-04-2022 | 941 |
Consiglio Federale CH |
Estratto di dati Zefix pubblicato per la prima volta come Linked Data
| 04-04-2022 | 942 |
Consiglio Federale CH |
Le raccomandazioni sulla sicurezza informatica della RUAG sono attuate
| 01-04-2022 | 943 |
Microsoft Security | Increasing Representation of Women in Security Research | 31-03-2022 | 944 |
Microsoft Security | Randomizing the KUSER_SHARED_DATA Structure on Windows | 30-03-2022 | 945 |
Consiglio Federale CH |
Promozione di data room affidabili e dell'autodeterminazione digitale
| 30-03-2022 | 946 |
Microsoft Security | Exploring a New Class of Kernel Exploit Primitive | 22-03-2022 | 947 |
Consiglio Federale CH |
Informatevi sulle pari opportunità delle persone disabili
| 10-03-2022 | 948 |
Microsoft Security | Guidance for CVE-2022-23278 spoofing in Microsoft Defender for Endpoint | 08-03-2022 | 949 |
Microsoft Security | Disclosure of Vulnerability in Azure Automation Managed Identity Tokens | 07-03-2022 | 950 |
Consiglio Federale CH |
La gestione dei dati di base delle imprese e l’accesso alle informazioni della Confederazione sugli edifici saranno semplificati
| 04-03-2022 | 951 |
Consiglio Federale CH |
Il Consiglio federale licenzia il messaggio sulla legge federale concernente l’impiego di mezzi elettronici per l’adempimento dei compiti delle autorità
| 04-03-2022 | 952 |
FR-CERT Alertes | CERTFR-2022-ALE-002 : Vulnérabilité dans VMware Spring Cloud Gateway (03 mars 2022) | 03-03-2022 | 953 |
Consiglio Federale CH |
Cloud pubblico della Confederazione: si stanno negoziando i contratti con gli offerenti
| 01-03-2022 | 954 |
Microsoft Security | Cyber threat activity in Ukraine: analysis and resources | 28-02-2022 | 955 |
Consiglio Federale CH |
Collaborazione in ambito doganale: firmato un Memorandum of Understanding con il Regno Unito
| 28-02-2022 | 956 |
Consiglio Federale CH |
La Commissione di esperti chiede la modernizzazione del servizio postale universale
| 24-02-2022 | 957 |
Consiglio Federale CH |
La Confederazione prolunga la fase di test di Microsoft 365
| 22-02-2022 | 958 |
Consiglio Federale CH |
Nominati tre nuovi membri nella Commissione federale dei media
| 16-02-2022 | 959 |
Microsoft Security | Researcher Spotlight: Cyber Viking Nate Warfield is Here to Help | 11-02-2022 | 960 |
Consiglio Federale CH |
Il Consiglio federale definisce le attuali priorità per la digitalizzazione
| 02-02-2022 | 961 |
Consiglio Federale CH |
Finanza digitale: il Consiglio federale definisce i settori di attività per i prossimi anni
| 02-02-2022 | 962 |
Microsoft Security | Expanding the Microsoft Researcher Recognition Program | 01-02-2022 | 963 |
Microsoft Security | Congratulations to the Top MSRC 2021 Q4 Security Researchers! | 01-02-2022 | 964 |
Microsoft Security | An Armful of CHERIs | 20-01-2022 | 965 |
Consiglio Federale CH |
Accedere alle prestazioni delle autorità della Confederazione mediante le identità elettroniche dei Cantoni e delle scuole universitarie
| 13-01-2022 | 966 |
FR-CERT Alertes | CERTFR-2022-ALE-001 : [MaJ] Vulnérabilité dans Microsoft Windows (12 janvier 2022) | 12-01-2022 | 967 |
Consiglio Federale CH |
Avvio della procedura di consultazione concernente l’introduzione dell’obbligo di notifica dei ciberattacchi
| 12-01-2022 | 968 |
Microsoft Security | Coming Soon: New Security Update Guide Notification System | 11-01-2022 | 969 |
NCSC | Decrypting diversity: Diversity and inclusion in cyber security report 2021 | 06-01-2022 | 970 |
Microsoft Security | Azure App Service Linux source repository exposure | 22-12-2021 | 971 |
Consiglio Federale CH |
Cyber Defence Campus: cooperazione internazionale con l’Autorità tedesca per la sicurezza nell’ambito della tecnologia dell’informazione
| 20-12-2021 | 972 |
Consiglio Federale CH |
Informatevi sulle pari opportunità delle persone disabili
| 20-12-2021 | 973 |
Consiglio Federale CH |
La pandemia accelera l’utilizzo dell’e-government
| 15-12-2021 | 974 |
Microsoft Security | Researcher Spotlight: Dr. Nestori Syynimaa’s Constant Mission Protecting Identities | 14-12-2021 | 975 |
Microsoft Security | Microsoft’s Response to CVE-2021-44228 Apache Log4j 2 | 12-12-2021 | 976 |
FR-CERT Alertes | CERTFR-2021-ALE-022 : [MaJ] Vulnérabilité dans Apache Log4j (10 décembre 2021) | 10-12-2021 | 977 |
Consiglio Federale CH |
Sostegno indiretto alla stampa: riduzione invariata per il 2022
| 10-12-2021 | 978 |
Consiglio Federale CH |
La Confederazione istituisce le basi della politica dei dati
| 10-12-2021 | 979 |
Consiglio Federale CH |
Velocità Internet più elevata nel servizio universale
| 10-12-2021 | 980 |
Consiglio Federale CH |
Internet Governance Forum dell'ONU: la consigliera federale Sommaruga esorta a una digitalizzazione sostenibile e sociale
| 06-12-2021 | 981 |
Consiglio Federale CH |
Nominati i rappresentanti della Confederazione per la piattaforma «Amministrazione digitale Svizzera»
| 03-12-2021 | 982 |
Consiglio Federale CH |
Avviso Pubblicazione
| 03-12-2021 | 983 |
Consiglio Federale CH |
Misure per rafforzare la sicurezza delle reti di telecomunicazione: avviata la consultazione
| 03-12-2021 | 984 |
Consiglio Federale CH |
Pacchetto di misure a favore dei media nazionali: Consiglio federale e Parlamento raccomandano il SÌ
| 02-12-2021 | 985 |
Consiglio Federale CH |
Giornata internazionale delle persone con disabilità: convegno «Partecipazione e accessibilità»
| 30-11-2021 | 986 |
Consiglio Federale CH |
www.reportonlineracism.ch, la nuova piattaforma per segnalare discorsi d’odio razzisti online
| 30-11-2021 | 987 |
Consiglio Federale CH |
Il Consiglio federale intende adeguare le basi per il trattamento dei dati personali nei sistemi d’informazione del DDPS
| 24-11-2021 | 988 |
Consiglio Federale CH |
Florian Schütz nominato presidente del gruppo di lavoro dell’OCSE «Security in the Digital Economy»
| 23-11-2021 | 989 |
Microsoft Security | Guidance for Azure Active Directory (AD) keyCredential property Information Disclosure in Application and Service Principal APIs | 17-11-2021 | 990 |
Consiglio Federale CH |
Riduzione delle tasse amministrative nel settore della radiocomunicazione mobile
| 17-11-2021 | 991 |
Consiglio Federale CH |
Il Consiglio federale vuole un'ampia discussione sulla regolamentazione delle piattaforme di comunicazione
| 17-11-2021 | 992 |
Consiglio Federale CH |
Localizzazione delle chiamate d'emergenza via reti radiomobili
| 17-11-2021 | 993 |
Microsoft Security | BlueHat is Back! | 11-11-2021 | 994 |
Consiglio Federale CH |
"Analogico e digitale mano nella mano"
| 11-11-2021 | 995 |
Consiglio Federale CH |
Accesso al Catasto RDPP per tutti i Cantoni
| 11-11-2021 | 996 |
FR-CERT Alertes | CERTFR-2021-ALE-021 : Vulnérabilité dans Microsoft Exchange (10 novembre 2021) | 10-11-2021 | 997 |
Consiglio Federale CH |
Attuazione della strategia cloud dell'Amministrazione federale: per un utilizzo ordinato ed efficiente dei cloud
| 10-11-2021 | 998 |
Consiglio Federale CH |
Promozione della libertà d'espressione e dei media: la consigliera federale Sommaruga incontra la rappresentante dell'OSCE per i media
| 08-11-2021 | 999 |