About 27,900 results
Open links in new tab
  1. Known Exploited Vulnerabilities Catalog - CISA

    For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains …

  2. Cybersecurity Best Practices | Cybersecurity and Infrastructure

    May 6, 2025 · Cyberspace is particularly difficult to secure due to a number of factors: the ability of malicious actors to operate from anywhere in the world, the linkages between cyberspace …

  3. Cyber Threats and Advisories | Cybersecurity and Infrastructure

    Nov 12, 2025 · By preventing attacks or mitigating the spread of an attack as quickly as possible, cyber threat actors lose their power. CISA diligently tracks and shares information about the …

  4. Microsoft Operating Systems BlueKeep Vulnerability | CISA

    Jun 17, 2019 · The Cybersecurity and Infrastructure Security Agency (CISA) is issuing this Activity Alert to provide information on a vulnerability, known as “BlueKeep,” that exists in the following …

  5. As Chief of the ISC, I am pleased to introduce this document, Protecting Against the Threat of Unmanned Aircraft Systems (UAS): An Interagency Security Committee Best Practice. This …

  6. Cybersecurity Alerts & Advisories - CISA

    Dec 3, 2025 · Alerts typically include information on newly exploited or disclosed vulnerabilities, newly discovered cyber threat campaigns, severe denial-of-service events or widespread …

  7. The KEV Catalog | CISA

    A list of Known Exploited Vulnerabilities.

  8. 2022 Top Routinely Exploited Vulnerabilities - CISA

    Aug 3, 2023 · Additional Routinely Exploited Vulnerabilities In addition to the 12 vulnerabilities listed in Table 1, the authoring agencies identified vulnerabilities—listed in Table 2—that were …

  9. CISA Adds One Known Exploited Vulnerability to Catalog

    5 days ago · Meta React Server Components Remote Code Execution Vulnerability This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to …

  10. Reducing the Significant Risk of Known Exploited Vulnerabilities

    Learn about the importance of CISA's Known Exploited Vulnerability (KEV) catalog and how to use it to help build a collective resilience across the cybersecurity community.