CISA and FBI urge small office/home office (SOHO) router manufacturers to build security into the design, development, and maintenance of SOHO routers to prevent threat actors from compromising devices and using them to further compromise U.S. critical infrastructure entities.| Cybersecurity and Infrastructure Security Agency CISA
This document describes the security content of macOS Sequoia 15.5.| Apple Support
Gdzie zgłosić podatność? Przed zgłoszeniem znalezionej podatności do CERT Polska i upublicznieniem jej, zgłaszający powinien skontaktować się bezpośrednio z właścicielem podatnego systemu lub dostawcą oprogramowania. Jeśli nie jest możliwe znalezienie kontaktu, lub kontakt jest utrudniony, podatność należy zgłosić do właściwego CSIRT-u według obowiązującego zakresu odpowiedzialności, zgodnie z poniższym opisem: Do …| cert.pl
This document describes the security content of Safari 18.3.1.| Apple Support
This document describes the security content of visionOS 2.3.2.| Apple Support
This document describes the security content of macOS Sequoia 15.3.2.| Apple Support
This document describes the security content of iOS 18.3.2 and iPadOS 18.3.2.| Apple Support
CISA's CVD program coordinates multiple remediation efforts and public disclosures amongst affected vendor(s), service provider(s), and vulnerability reporter to ensure clear and actionable information is provided in a timely manner. Vulnerabilities captured by the CVD program i| Cybersecurity and Infrastructure Security Agency CISA
This document describes the security content of iOS 18.3.1 and iPadOS 18.3.1| Apple Support
This document describes the security content of iOS 18.5 and iPadOS 18.5.| Apple Support
This document describes the security content of iOS 18.3.1 and iPadOS 18.3.1| Apple Support
This document describes the security content of iOS 17.2 and iPadOS 17.2.| Apple Support
You can use repository security advisories to privately discuss, fix, and publish information about security vulnerabilities in your public repository.| GitHub Docs
Learn about the importance of CISA's Known Exploited Vulnerability (KEV) catalog and how to use it to help build a collective resilience across the cybersecurity community.| Cybersecurity and Infrastructure Security Agency CISA