
Known Exploited Vulnerabilities Catalog - CISA
For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains …
Cybersecurity Best Practices | Cybersecurity and Infrastructure
May 6, 2025 · Cyberspace is particularly difficult to secure due to a number of factors: the ability of malicious actors to operate from anywhere in the world, the linkages between cyberspace …
Cyber Threats and Advisories | Cybersecurity and Infrastructure
Nov 12, 2025 · By preventing attacks or mitigating the spread of an attack as quickly as possible, cyber threat actors lose their power. CISA diligently tracks and shares information about the …
Microsoft Operating Systems BlueKeep Vulnerability | CISA
Jun 17, 2019 · The Cybersecurity and Infrastructure Security Agency (CISA) is issuing this Activity Alert to provide information on a vulnerability, known as “BlueKeep,” that exists in the following …
As Chief of the ISC, I am pleased to introduce this document, Protecting Against the Threat of Unmanned Aircraft Systems (UAS): An Interagency Security Committee Best Practice. This …
Cybersecurity Alerts & Advisories - CISA
Dec 3, 2025 · Alerts typically include information on newly exploited or disclosed vulnerabilities, newly discovered cyber threat campaigns, severe denial-of-service events or widespread …
The KEV Catalog | CISA
A list of Known Exploited Vulnerabilities.
2022 Top Routinely Exploited Vulnerabilities - CISA
Aug 3, 2023 · Additional Routinely Exploited Vulnerabilities In addition to the 12 vulnerabilities listed in Table 1, the authoring agencies identified vulnerabilities—listed in Table 2—that were …
CISA Adds One Known Exploited Vulnerability to Catalog
5 days ago · Meta React Server Components Remote Code Execution Vulnerability This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to …
Reducing the Significant Risk of Known Exploited Vulnerabilities
Learn about the importance of CISA's Known Exploited Vulnerability (KEV) catalog and how to use it to help build a collective resilience across the cybersecurity community.