Why CISA Accepting KEV Nominations Is So Important Jordyn Alger May 22, 2026 CISA announced that it will be accepting nominations to its Known Exploited Vulnerabilities (KEV) catalog. Read More
Security Experts Discuss Proposed Government Patching Deadlines Jordyn Alger May 6, 2026 U.S. cyber officials are considering shortening the deadline for fixing critical vulnerabilities in government IT, and security experts are sharing their thoughts. Read More
Iranian-Linked Cyber Actors Target US Critical Infrastructure, Security Leaders Respond Jordyn Alger April 8, 2026 CISA warns that Iranian-connected cyber actors are focusing U.S. critical infrastructure. Read More
New Trump Administration Budget Cuts $707M from CISA Funding Jordyn Alger April 7, 2026 The White House plans to cut $707M from CISA funding. Read More
Is Renewing CISA Enough to Restore Confidence for Cyber Threat Reporters? Jordyn Alger January 30, 2026 Stop-and-go authorizations undermine real-time threat sharing. Read More
WhatsApp Flaw Added to CISA’s Known Exploited Vulnerabilities Catalog Jordyn Alger September 5, 2025 CISA has announced the addition of two vulnerabilities to its Known Exploited Vulnerabilities catalog. Read More
CISA Releases TTPs of Chinese State-Sponsored Threat Actors Security Staff August 29, 2025 CISA has released an advisory detailing the tactics, techniques, and procedures (TTPs) utilized by Chinese state-sponsored threat actors. Read More
CISA Issues Software Bill of Materials Draft, Encourages Public Comments Security Staff August 25, 2025 CISA published a Minimum Elements for a Software Bill of Materials (SBOM) draft and has encouraged the public to offer comments. Read More
CISA Releases a Malware and Forensic Analysis Platform Security Staff August 8, 2025 CISA has released a malware and forensic analysis platform. Read More
4 Critical, Known Exploited Vulnerabilities Added to KEV Catalog Jordyn Alger July 14, 2025 CISA added 4 new vulnerabilities to the Known Exploited Vulnerabilities (KEV) Catalogue, citing evidence of active exploitation. Read More