CISA: 2022 CWE Top 25 Most Dangerous Software Weaknesses
2022 CWE Top 25 Most Dangerous Software Weaknesses The Homeland Security Systems Engineering and Development Institute, sponsored by CISA and...
2022 CWE Top 25 Most Dangerous Software Weaknesses The Homeland Security Systems Engineering and Development Institute, sponsored by CISA and...
CISA Adds Eight Known Exploited Vulnerabilities to Catalog CISA has added eight new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based...
Citrix Releases Security Updates for Hypervisor Citrix has released security updates to address vulnerabilities that could affect Hypervisor. An attacker...
Malicious Cyber Actors Continue to Exploit Log4Shell in VMware Horizon Systems CISA and the United States Coast Guard Cyber Command...
CISA Releases Cloud Security Technical Reference Architecture CISA has released its Cloud Security (CS) Technical Reference Architecture (TRA) to guide...
CISA Releases Security Advisories Related to OT:ICEFALL (Insecure by Design) Report CISA is aware that Forescout researchers have released OT:ICEFALL,...
Keeping PowerShell: Measures to Use and Embrace Cybersecurity authorities from the United States, New Zealand, and the United Kingdom have...
CISA Requests Public Comment on CISA’s TIC 3.0 Cloud Use Case CISA has released Trusted Internet Connections (TIC) 3.0 Cloud...
SAP Releases June 2022 Security Updates SAP has released security updates to address vulnerabilities affecting multiple products. An attacker could...
Citrix Releases Security Updates for Application Delivery Management Citrix has released security updates to address vulnerabilities in Application Delivery Management....
Microsoft Releases June 2022 Security Updates Microsoft has released updates to address multiple vulnerabilities in Microsoft software. An attacker can...
CISA Adds 36 Known Exploited Vulnerabilities to Catalog CISA has added 36 new vulnerabilities to its Known Exploited Vulnerabilities Catalog,...
People’s Republic of China State-Sponsored Cyber Actors Exploit Network Providers and Devices CISA, the National Security Agency (NSA), and the...
CISA Provides Criteria and Process for Updates to the KEV Catalog CISA has updated the Known Exploited Vulnerabilities (KEV) catalog webpage...
Owl Labs Releases Security Updates for Meeting Owl Pro and Whiteboard Owl Owl Labs has released security updates to address...
Atlassian Releases New Versions of Confluence Server and Data Center to Address CVE-2022-26134 Atlassian has released new Confluence Server and...
CISA Releases Security Advisory on Dominion Voting Systems Democracy Suite ImageCast X CISA has released an Industrial Controls Systems Advisory...
CISA Adds One Known Exploited Vulnerability (CVE-2022-26134) to Catalog CISA has added one new vulnerability—CVE-2022-26134—to its Known Exploited Vulnerabilities Catalog, based...
Atlassian Releases Security Advisory for Confluence Server and Data Center, CVE-2022-26134 Atlassian has released a security advisory to address a...
CISA Releases Security Advisory on Illumina Local Run Manager CISA has released an Industrial Controls Systems Advisory (ICSA) detailing multiple...
CISA Updates Advisory on Threat Actors Chaining Unpatched VMware Vulnerabilities CISA has updated Cybersecurity Advisory AA22-138B: Threat Actors Chaining Unpatched...
Karakurt Data Extortion Group CISA, the Federal Bureau of Investigation (FBI), the Department of Treasury, and the Financial Crimes Enforcement...
Microsoft Releases Workaround Guidance for MSDT "Follina" Vulnerability Microsoft has released workaround guidance to address a remote code execution (RCE)...
CISA and DoD Release 5G Security Evaluation Process Investigation Study CISA and the Department of Defense (DoD) have released their...