ICS Medical Advisory: Santesoft Sante DICOM Viewer Pro

  • Post author:
  • Post category:

View CSAF 1. EXECUTIVE SUMMARY CVSS v3 7.8 ATTENTION: Low attack complexity Vendor: Santesoft Equipment: Sante DICOM Viewer Pro Vulnerability: Out-of-Bounds Read 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to disclose information and execute arbitrary code on affected installations of the product. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following

Continue ReadingICS Medical Advisory: Santesoft Sante DICOM Viewer Pro

ICS Advisory: Mitsubishi Electric Multiple Factory Automation Products

  • Post author:
  • Post category:

View CSAF 1. EXECUTIVE SUMMARY CVSS v3 5.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: Mitsubishi Electric Corporation Equipment: MELSEC iQ-F Series Vulnerability: Insufficient Resource Pool 2. RISK EVALUATION Successful exploitation of this vulnerability could allow a remote attacker to cause a temporary denial-of-service (DoS) condition for a certain period of time in the product's Ethernet

Continue ReadingICS Advisory: Mitsubishi Electric Multiple Factory Automation Products

The race to net zero: Tracking the green industrial revolution through IP

  • Post author:
  • Post category:

Research and analysis The race to net zero: Tracking the green industrial revolution through IP A landscape analysis of IP trends relating to green technology. This looks at both patenting trends and trade mark trends. From: Intellectual Property Office Published 26 February 2024 Get emails about this page Documents The race to net zero: Tracking

Continue ReadingThe race to net zero: Tracking the green industrial revolution through IP

CISA, NCSC-UK, and Partners Release Advisory on Russian SVR Actors Targeting Cloud Infrastructure

  • Post author:
  • Post category:

CISA, in partnership with UK National Cyber Security Centre (NCSC) and other U.S. and international partners released the joint advisory, SVR Cyber Actors Adapt Tactics for Initial Cloud Access. This advisory provides recent tactics, techniques, and procedures (TTPs) used by Russian Foreign Intelligence Service (SVR) cyber actors—also known as APT29, the Dukes, CozyBear, and NOBELIUM/Midnight

Continue ReadingCISA, NCSC-UK, and Partners Release Advisory on Russian SVR Actors Targeting Cloud Infrastructure

SVR Cyber Actors Adapt Tactics for Initial Cloud Access

  • Post author:
  • Post category:

How SVR-Attributed Actors are Adapting to the Move of Government and Corporations to Cloud Infrastructure OVERVIEW This advisory details recent tactics, techniques, and procedures (TTPs) of the group commonly known as APT29, also known as Midnight Blizzard, the Dukes, or Cozy Bear. The UK National Cyber Security Centre (NCSC) and international partners assess that APT29

Continue ReadingSVR Cyber Actors Adapt Tactics for Initial Cloud Access