ICS Advisory: Hitachi Energy eSOMS

  • Post author:
  • Post category:

View CSAF 1. EXECUTIVE SUMMARY CVSS v3 5.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: Hitachi Energy Equipment: eSOMS Vulnerabilities: Generation of Error Message Containing Sensitive Information, Exposure of Sensitive System Information to an Unauthorized Control Sphere 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker to disclose sensitive information related to eSOMS

Continue ReadingICS Advisory: Hitachi Energy eSOMS

ICS Advisory: Johnson Controls Quantum HD Unity

  • Post author:
  • Post category:

View CSAF 1. EXECUTIVE SUMMARY CVSS v3 10.0 ATTENTION: Exploitable Remotely/Low attack complexity Vendor: Johnson Controls Inc. Equipment: Quantum HD Unity Vulnerability: Active Debug Code 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an unauthorized user to access debug features that were accidentally exposed. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following Johnson

Continue ReadingICS Advisory: Johnson Controls Quantum HD Unity

US Department of Labor provides states with new guidance on improving access to unemployment insurance systems

  • Post author:
  • Post category:

WASHINGTON  – The U.S. Department of Labor has released guidance to states on how to promote equitable access for all workers and jobseekers to unemployment insurance programs. In a Nov. 8, 2023, letter to unemployment insurance systems across the nation, the department’s Employment and Training Administration shared best practices for evaluating and enhancing equitable access

Continue ReadingUS Department of Labor provides states with new guidance on improving access to unemployment insurance systems

Study on the essence of fundamental rights to privacy and to protection of personal data

  • Post author:
  • Post category:

Other Documents Study on the Essence of the fundamental rights to privacy and to the protection of personal data File size: 808.76 KB File type: pdf English Download Available languages: English study_en.pdf Topics Charter of Fundamental Rights General Data Protection Regulation

Continue ReadingStudy on the essence of fundamental rights to privacy and to protection of personal data

CISA Adds One Known Exploited Vulnerability to Catalog

  • Post author:
  • Post category:

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2023-29552 Service Location Protocol (SLP) Denial-of-Service Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise. Note: To view other newly added vulnerabilities in the catalog, click on the arrow

Continue ReadingCISA Adds One Known Exploited Vulnerability to Catalog