CISA Adds One Known Exploited Vulnerability to Catalog Original release date: August 4, 2022

Original release date: August 4, 2022 CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise. Note: to view the newly added vulnerabilities in the catalog, click […]

AA22-216A: 2021 Top Malware Strains

Original release date: August 4, 2022 Summary Immediate Actions You Can Take Now to Protect Against Malware: • Patch all systems and prioritize patching known exploited vulnerabilities. • Enforce multifactor authentication (MFA). • Secure Remote Desktop Protocol (RDP) and other risky services. • Make offline backups of your data. • Provide end-user awareness and training […]

CISA and ACSC Release Top 2021 Malware Strains

Original release date: August 2, 2022 | Last revised: August 4, 2022 CISA and the Australian Cyber Security Centre (ACSC) have published a joint Cybersecurity Advisory on the top malware strains observed in 2021. Malicious cyber actors often use malware to covertly compromise and then gain access to a computer or mobile device. As malicious […]

F5 Releases Security Updates

Original release date: August 4, 2022 F5 has released security updates to address vulnerabilities in multiple products. A privileged attacker could exploit some of these vulnerabilities to take control of an affected system.  CISA encourages users and administrators to review the F5 security advisories and apply the necessary updates. This product is provided subject to this […]

Cisco Releases Security Updates for RV Series Routers

Original release date: August 4, 2022 Cisco has released security updates to address vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers. A remote attacker could exploit some of these vulnerabilities to take control of an affected system. For updates addressing lower severity vulnerabilities, see the Cisco Security Advisories page.    CISA encourages users and […]