CVE disclosures, zero-days, and vulnerability management
View CSAF
CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
No description available.
[This is a Guest Diary by James Roberts, an ISC intern as part of the SANS.edu BACS program]
Today, two different "new" requests hit our honeypots. Both appear to be recon requests and not associated with specific vulnerabilities. But as always, please let me know if you have additional information
This guidance provides a roadmap for organizations to reference as they transition toward a zero trust architecture.