75Articles
6Categories
2025-04-20Date
πŸ›
Compromise and persistent access of Fortinet FortiOS products (CVE-2022-42475, CVE-2023-27997, CVE-2024-21762)
⚠️
Vulnerability impacting Ivanti Connect Secure, Policy Secure and ZTA Gateways
⚠️
Vulnerability impacting CrushFTP
⚠️
Security considerations when using open source software (ITSAP.10.059)
⚠️
The Web is Broken
⚠️
Palantir exec defends company’s immigration surveillance work
πŸ“’
Cisco security advisory (AV25-219)
πŸ“’
Apple security advisory (AV25-218)
πŸ“’
Atlassian security advisory (AV25-217)
πŸ“’
Google Chrome security advisory (AV25-216)
πŸ“’
[Control systems] Siemens security advisory (AV25-215)
πŸ“’
Oracle security advisory – April 2025 quarterly rollup (AV25-214)
πŸ“’
Apache security advisory (AV25-213)
πŸ“’
Mozilla security advisory (AV25-212)
πŸ“’
Microsoft Edge security advisory (AV25-211)
πŸ“’
Red Hat security advisory (AV25-210)
πŸ“’
IBM security advisory (AV25-209)
πŸ“’
Dell security advisory (AV25-208)
πŸ“’
[Control systems] CISA ICS security advisories (AV25–207)
πŸ“’
Ubuntu security advisory (AV25-206)
πŸ“’
HPE security advisory (AV25-205)
πŸ“’
Drupal security advisory (AV25-204)
πŸ“’
Palo Alto Networks security advisory (AV25-203)
πŸ“’
Juniper Networks security advisory (AV25-202)
πŸ“’
Microsoft security advisory - April 2025 monthly rollup (AV25-201)
πŸ“’
Google Chrome security advisory (AV25-200)
πŸ“’
Adobe security advisory (AV25–199)
πŸ“’
Ivanti security advisory (AV25-198)
πŸ“’
Fortinet security advisory (AV25-197)
πŸ“’
VMware security advisory (AV25-196)
πŸ“’
Android security advisory – April 2025 monthly rollup (AV25-195)
πŸ“’
[Control systems] Siemens security advisory (AV25-194)
πŸ“’
[Control systems] Schneider Electric security advisory (AV25-193)
πŸ“’
SAP security advisory – April 2025 monthly rollup (AV25-192)
πŸ“’
[Control systems] ABB security advisory (AV25-191)
πŸ“’
Ubuntu security advisory (AV25-190)
πŸ“’
IBM security advisory (AV25-189)
πŸ“’
Dell security advisory (AV25-188)
πŸ“’
[Control systems] CISA ICS security advisories (AV25–187)
πŸ“’
Microsoft Edge security advisory (AV25-186)
πŸ“’
Apache security advisory (AV25-185)
πŸ“’
Ivanti security advisory (AV25-184)
πŸ“’
Jenkins security advisory (AV25-183)
πŸ“’
Cisco security advisory (AV25-182)
πŸ“’
[Control Systems] Moxa security advisory (AV25-181)
πŸ“’
VMware security advisory (AV25-180)
πŸ“’
Google Chrome security advisory (AV25-179)
πŸ“’
Mozilla security advisory (AV25-178)
πŸ“’
Apple security advisory (AV25-177)
πŸ“’
Red Hat security advisory (AV25-176)
πŸ“’
[Control systems] CISA ICS security advisories (AV25–175)
πŸ“’
Ubuntu security advisory (AV25-174)
πŸ“’
IBM security advisory (AV25-173)
πŸ•΅οΈ
Joint guidance on fast flux
πŸ•΅οΈ
APT29 Deploys GRAPELOADER Malware Targeting European Diplomats Through Wine-Tasting Lures
🌐
Cyber supply chain security for small and medium-sized organizations (ITSAP.00.070)
🌐
Communications Security Establishment Canada releases 2025 update to report on cyber threats to Canada’s democratic process
🌐
Cyber Threats to Canada's Democratic Process: 2025 Update
🌐
Cyber threat bulletin: People’s Republic of China-sponsored cyber activity against Canadian provincial, territorial, Indigenous, and municipal governments
🌐
CSE calls on Canadian organizations and critical infrastructure providers to strengthen defences on third anniversary of Russia’s invasion of Ukraine
πŸ“‘
People’s Republic of China activity targeting network edge routers: Observations and mitigation strategies
πŸ“‘
Security guidance for dark web leaks (ITSAP.00.115)
πŸ“‘
Search engine optimization poisoning (ITSAP.00.013)
πŸ“‘
Joint guidance on BADBAZAAR and MOONSHINE
πŸ“‘
Private 5G networks (ITSAP.80.117)
πŸ“‘
Protecting controlled information in non-Government of Canada systems and organizations (ITSP.10.171)
πŸ“‘
Mobile device guidance for high profile travellers (ITSAP.00.088)
πŸ“‘
Using security information and event management tools to manage cyber security risks (ITSM.80.024)
πŸ“‘
GeekWeek 10
πŸ“‘
Preparing your organization for the quantum threat to cryptography (ITSAP.00.017)
πŸ“‘
Joint guidance on building trust in artificial intelligence through a cyber risk-based approach
πŸ“‘
Five Eyes publish series to sound alarm on cyber security threats to edge devices
πŸ“‘
Security considerations for edge devices (ITSM.80.101)
πŸ“‘
Joint guidance on content credentials and strengthening multimedia integrity in the generative artificial intelligence era
πŸ“‘
Web browser security: An overview (ITSAP.40.017)