Aggregator
伦敦国王学院 | 恶意LLM对话式AI诱使用户泄露个人信息
Физики 50 лет верили в плоские магнитные вихри на слово. Пришлось заморозить атомарный кристалл, чтобы увидеть теорию вживую
Project Compass Targets 764 Network as 30 Arrested and Victims Rescued
Choose the Right GPU on Akamai Cloud for Your AI Workload
How to Cut MTTR by Improving Threat Visibility in Your SOC
In boardrooms and security operations centers alike, one metric has risen from a niche KPI to a defining measure of organizational resilience: Mean Time to Respond (MTTR). But why has this particular number captured so much attention, and does it deserve the hype? MTTR measures the average time elapsed between the moment a threat is […]
The post How to Cut MTTR by Improving Threat Visibility in Your SOC appeared first on Cyber Security News.
AI Agent Overload: How to Solve the Workload Identity Crisis
Built a free live CVE intelligence dashboard — looking for feedback
«Мамонт» в твоем подъезде. Теперь мошенники грабят россиян через мессенджер MAX
亚马逊证实AWS位于中东多处数据中心遭无人机袭击 多个可用区临时中断
NASA: “Луна подождет”. Астронавты Artemis III готовились топтать лунную пыль… но пока покружат вокруг Земли
On Moltbook
Sviluppo software, intelligenza artificiale e sicurezza
CISA Adds Two Known Exploited Vulnerabilities to Catalog
CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
- CVE-2026-21385 Qualcomm Multiple Chipsets Memory Corruption Vulnerability
- CVE-2026-22719 Broadcom VMware Aria Operations Command Injection Vulnerability
These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.