Roundcube Webmail Vulnerability Under Exploitation, Patch Now

Recently, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a Roundcube webmail vulnerability to its Known Exploited Vulnerabilities (KEV) catalog. Tracked as CVE-2023-43770, this issue is a persistent cross-site scripting (XSS) ...

Mitigate Ivanti Vulnerabilities: CISA Issues Emergency Directive

In recent times, the cybersecurity landscape has witnessed a surge in threats targeting Ivanti Connect Secure and Ivanti Policy Secure solutions. The Cybersecurity and Infrastructure Security Agency (CISA) has raised a red ...

CISA and FBI Warn of AndroxGh0st Malware Threat

CISA and FBI have jointly issued a warning about the threat posed by AndroxGh0st malware, emphasizing its use in establishing a botnet for “victim identification and exploitation within target networks.” Originating in ...

CISA Adds 6 Known Exploited Vulnerabilities to Catalog

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a stark warning for organizations nationwide, adding six critical vulnerabilities to its “Known Exploited Vulnerabilities” (KEV) catalog. Six critical vulnerabilities, including flaws in ...

Insights from CISA HPH Sector Risk and Vulnerability Assessment

In an ever-evolving digital landscape, the healthcare and public health (HPH) sector faces increasing cybersecurity challenges. The United States Cybersecurity and Infrastructure Security Agency (CISA) recently conducted a Risk and Vulnerability Assessment ...

CISA Reports Adobe ColdFusion Flaw Exploitation in Federal Agency

In this dynamic field of cybersecurity, one persistent threat continues to loom over businesses that use Adobe’s ColdFusion application. Despite a patch released in March, a ColdFusion flaw is being actively exploited ...

The SLP Vulnerability KEV Alert By CISA

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued a notable update incorporating a high-severity vulnerability in the Service Location Protocol (SLP) into its Known Exploited Vulnerabilities (KEV) catalog. This decision stems ...