安裝中文字典英文字典辭典工具!
安裝中文字典英文字典辭典工具!
|
- Home Page | CISA
Home Page | CISA
- Cyber Threats and Response - CISA
By preventing attacks or mitigating the spread of an attack as quickly as possible, cyber threat actors lose their power CISA diligently tracks and shares information about the latest cybersecurity risks, attacks, and vulnerabilities, providing our nation with the tools and resources needed to defend against these threats
- 2023 Top Routinely Exploited Vulnerabilities - CISA
Technical Details Key Findings In 2023, malicious cyber actors exploited more zero-day vulnerabilities to compromise enterprise networks compared to 2022, allowing them to conduct cyber operations against higher-priority targets In 2023, the majority of the most frequently exploited vulnerabilities were initially exploited as a zero-day, which is an increase from 2022, when less than half of
- ED 26-03: Mitigate Vulnerabilities in Cisco SD-WAN Systems
V1: ED 26-03: Mitigate Vulnerabilities in Cisco SD-WAN Systems V1 This V1 supersedes the required actions in Emergency Directive (ED) 26-03: Mitigate Vulnerabilities in Cisco SD-WAN Systems and applies to any federal agency running affected products This V1 includes updated and new required actions and an additional reporting requirement
- Known Exploited Vulnerabilities Catalog - CISA
Ivanti Pulse Connect Secure Collaboration Suite contains a buffer overflow vulnerabilities that allows a remote authenticated users to execute code as the root user via maliciously crafted meeting room Apply updates per vendor instructions
- CISA Adds Two Known Exploited Vulnerabilities to Catalog
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise
- 2025 CWE Top 25 Most Dangerous Software Weaknesses - CISA
By shining a light on the most dangerous software weaknesses, CISA and MITRE reinforce collective efforts to reduce vulnerabilities at the source, strengthen national cybersecurity, and improve long-term resilience
- Top 10 Routinely Exploited Vulnerabilities - CISA
This alert provides details on vulnerabilities routinely exploited by foreign cyber actors—primarily Common Vulnerabilities and Exposures (CVEs) [1] —to help organizations reduce the risk of these foreign threats
|
|
|