WhatsApp Flaw Added to CISA’s Known Exploited Vulnerabilities Catalog Jordyn Alger September 5, 2025 CISA has announced the addition of two vulnerabilities to its Known Exploited Vulnerabilities catalog. Read More
CISA Releases TTPs of Chinese State-Sponsored Threat Actors Security Staff August 29, 2025 CISA has released an advisory detailing the tactics, techniques, and procedures (TTPs) utilized by Chinese state-sponsored threat actors. Read More
CISA Issues Software Bill of Materials Draft, Encourages Public Comments Security Staff August 25, 2025 CISA published a Minimum Elements for a Software Bill of Materials (SBOM) draft and has encouraged the public to offer comments. Read More
CISA Releases a Malware and Forensic Analysis Platform Security Staff August 8, 2025 CISA has released a malware and forensic analysis platform. Read More
4 Critical, Known Exploited Vulnerabilities Added to KEV Catalog Jordyn Alger July 14, 2025 CISA added 4 new vulnerabilities to the Known Exploited Vulnerabilities (KEV) Catalogue, citing evidence of active exploitation. Read More
Iranian Cyber Actors May Target “Entities of Interest” in US, Warns CISA Jordyn Alger July 2, 2025 CISA warns that Iranian cyber actors may target critical infrastructure in the United States. Read More
5 ICS advisories released by CISA, security leaders discuss Jordyn Alger April 28, 2025 CISA warns of flaws in Siemens, Schneider Electric, and ABB hardware.Read More
MITRE support extended 11 more months, yet uncertainty remains Security Staff April 17, 2025 Although MITRE’s contact has been extended for 11 more months, uncertainty remains un the cyber community. Read More
MITRE set to lose funding today, CISA intervenes Jordyn Alger April 16, 2025 CISA has extended MITRE’s funding, and security leaders are sharing their thoughts. Read More
Security Talk Shifts in cybersecurity Insights from a leading security expert on the recent developments in the cybersecurity sector. Rachelle Blair-Frasier April 11, 2025 Insights from a leading security expert on the recent developments in the cybersecurity sector.Read More