-
CISA adds known exploited vulnerability to its catalog
CISA has added a new vulnerability to its Catalog of Known Exploited Vulnerabilities (KEV), based on evidence of active exploitation. CVE-2026-3502 TrueConf client downloads code without integrity check vulnerability This…
-
Vulnerability in F5 Products Could Allow Remote Code Execution
MS-ISAC NOTICE NUMBER: 2026-026 ISSUE DATE(S): 03/30/2026 PREVIEW: A vulnerability has been discovered in F5 products that could allow remote code execution. F5 BIG IP APM is an access policy…
-
CISA adds known exploited vulnerability to its catalog
CISA has added a new vulnerability to its Catalog of Known Exploited Vulnerabilities (KEV), based on evidence of active exploitation. This type of vulnerability is a common attack vector for…
-
CISA adds known exploited vulnerability to its catalog
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing rapid remediation of Vulnerabilities of the KEV catalog as…
-
Several vulnerabilities in Google Chrome could allow arbitrary code execution
MS-ISAC NOTICE NUMBER: 2026-023 ISSUE DATE(S): 03/13/2026 PREVIEW: Several vulnerabilities have been discovered in Google Chrome, the most serious of which could allow the execution of arbitrary code. Successful exploitation…
-
Several vulnerabilities in Mozilla Firefox could allow arbitrary code execution
MS-ISAC NOTICE NUMBER: 2026-022 ISSUE DATE(S): 03/10/2026 PREVIEW: Several vulnerabilities have been discovered in Mozilla Firefox, the most serious of which could allow arbitrary code execution. Mozilla Firefox is a…
-
CISA adds five known exploited vulnerabilities to its catalog
CISA has added five new vulnerabilities to its Catalog of Known Exploited Vulnerabilities (KEV), based on evidence of active exploitation. CVE-2017-7921 Multiple Hikvision Products Improper Authentication Vulnerability CVE-2021-22681 Insufficient Protected…
-
Multiple vulnerabilities in Google Android operating system could allow remote code execution
Several vulnerabilities have been discovered in the Google Android operating system, the most serious of which could allow remote code execution in the context of the affected component. According to…
-
CISA adds two known exploited vulnerabilities to its catalog
CISA has added two new vulnerabilities to its Catalog of Known Exploited Vulnerabilities (KEV), based on evidence of active exploitation. CVE-2025-49113 RoundCube Webmail Deserialization Untrusted Data Vulnerability CVE-2025-68461 Cross-site scripting…












