CISA
-
What CISA KEV Is And Isn’t And A Tool To Help Security Teams
A new paper gives an insider's perspective into CISA's Known Exploited Vulnerability catalog – and also offers a free tool…
-
End-of-Support Edge Devices Now Pose Federal Cyber Risk
The growing cyber threat from End-of-Support edge devices is no longer a technical inconvenience, it is a national cybersecurity liability.…
-
CISA Silently Updates Vulnerabilities Exploited By Ransomware Groups
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has been “silently” updating its Known Exploited Vulnerabilities (KEV) catalog when it…
-
Ivanti Patches Two Exploited Zero-Days In Mobile Manager
Two code injection vulnerabilities allowed unauthenticated attackers to execute arbitrary code and access sensitive device information across compromised networks. Ivanti…
-
CISA Chief Triggered Internal Cybersecurity Warning
The acting head of the federal government's top cyber defense agency triggered an internal cybersecurity warning last summer after uploading sensitive government…
-
Critical VMware VCenter Server Flaw CVE-2024-37079
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical vulnerability affecting VMware vCenter Server to its Known…
-
CISA Adds 5 Enterprise Software Flaws To KEV Catalog
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added five enterprise software flaws to its Known Exploited Vulnerabilities (KEV)…
-
Jen Easterly To Lead RSA Conference’s Ambitious Expansion
Former CISA Director Jen Easterly will become CEO of RSA Conference LLC and its flagship annual cybersecurity conference, RSAC announced…
-
Patch Tuesday January 2026: Exploited Zero Day, 8 High-Risk
Microsoft's Patch Tuesday January 2026 update includes fixes for one actively-exploited zero day vulnerability and eight additional high-risk flaws. In…
-
CISA Warns Of Attacks On PowerPoint And HPE Vulnerabilities
A 16-year-old Microsoft PowerPoint flaw and a new maximum-severity HPE vulnerability are the latest additions to CISA's Known Exploited Vulnerabilities…