Topic: binding operational directive

  • US Agencies Ordered to Replace Outdated Edge Devices

    US Agencies Ordered to Replace Outdated Edge Devices

    US federal agencies must remove all outdated public-facing network hardware within one year, as mandated by CISA's Binding Operational Directive 26-02 to address active exploitation of end-of-support devices. The directive establishes strict deadlines, requiring agencies to identify vulnerabiliti...

    Read More »
  • CISA Retires 10 Emergency Cyber Directives in Bulk Move

    CISA Retires 10 Emergency Cyber Directives in Bulk Move

    CISA has retired ten Emergency Directives, as their required security measures are now fully implemented or superseded by the broader Binding Operational Directive 22-01. BOD 22-01 mandates federal agencies to patch vulnerabilities from CISA's Known Exploited Vulnerabilities catalog, with deadlin...

    Read More »
  • CISA Concludes 10 Emergency Directives Following Federal Cyber Audits

    CISA Concludes 10 Emergency Directives Following Federal Cyber Audits

    CISA has closed ten Emergency Directives from 2019-2024 after confirming their security goals were met, signaling a strategic shift from reactive emergency measures to standardized, ongoing risk management. The retired directives' requirements are now integrated into Binding Operational Directive...

    Read More »
  • CISA Mandates Federal Patch for Actively Exploited Geoserver Flaw

    CISA Mandates Federal Patch for Actively Exploited Geoserver Flaw

    CISA has mandated federal agencies to patch a critical, actively exploited vulnerability (CVE-2025-58360) in GeoServer that allows attackers to steal files via unauthenticated XML injection. The vulnerability affects GeoServer versions 2.26.1 and earlier, and federal agencies are legally required...

    Read More »
  • Urgent CISA Alert: Active Oracle Identity Manager RCE Exploits

    Urgent CISA Alert: Active Oracle Identity Manager RCE Exploits

    A critical security vulnerability (CVE-2025-61757) in Oracle Identity Manager allows attackers to execute remote code without authentication by exploiting weaknesses in REST API security filters. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has mandated federal agencies to pat...

    Read More »
  • CISA Gives Feds 3 Days to Patch Critical Dell Vulnerability

    CISA Gives Feds 3 Days to Patch Critical Dell Vulnerability

    CISA has mandated federal agencies to patch a critical Dell vulnerability within three days, as it is under active exploitation by hackers. A suspected Chinese cyberespionage group, UNC6201, has been exploiting this flaw since mid-2024 to deploy malware, including a new backdoor called Grimbolt, ...

    Read More »
  • Urgent: CISA Confirms Active Attacks Exploiting Critical Microsoft SCCM Flaw

    Urgent: CISA Confirms Active Attacks Exploiting Critical Microsoft SCCM Flaw

    A critical SQL injection vulnerability (CVE-2024-43468) in Microsoft Configuration Manager is now being actively exploited, allowing unauthenticated attackers to execute arbitrary code with the highest privileges. The Cybersecurity and Infrastructure Security Agency (CISA) has mandated federal ag...

    Read More »
  • CISA Warns Active Exploits Target Critical VMware RCE Flaw

    CISA Warns Active Exploits Target Critical VMware RCE Flaw

    A critical security flaw (CVE-2024-37079) in VMware vCenter Server is under active exploitation, allowing remote code execution via a low-complexity attack. U.S. federal agencies are mandated to patch the vulnerability within three weeks, as there are no available workarounds, only the vendor-pro...

    Read More »
  • CISA Urges Immediate Patch for Samsung Spyware Zero-Day

    CISA Urges Immediate Patch for Samsung Spyware Zero-Day

    A critical vulnerability (CVE-2025-21042) in Samsung smartphones allows attackers to install LandFall spyware via manipulated DNG images sent through WhatsApp, affecting Android 13 and newer devices. The spyware, exploited since July 2024, can steal sensitive data like contacts, messages, and loc...

    Read More »
  • CISA Urges Immediate VMware Patch for Chinese Hacker Exploit

    CISA Urges Immediate VMware Patch for Chinese Hacker Exploit

    CISA has issued an urgent directive for U.S. government agencies to patch a critical VMware vulnerability (CVE-2025-41244) that allows privilege escalation to root level, requiring action within three weeks. The vulnerability is actively exploited by UNC5174, a Chinese state-sponsored group, whic...

    Read More »
  • Urgent: CISA Warns of Active Attacks on Critical Adobe Flaw

    Urgent: CISA Warns of Active Attacks on Critical Adobe Flaw

    CISA has issued a critical alert about active exploitation of a maximum-severity vulnerability (CVE-2025-54253) in Adobe Experience Manager, allowing attackers to execute malicious code on unpatched systems. The flaw, discovered by security researchers, enables unauthenticated attackers to bypass...

    Read More »
  • Urgent Windows SMB Flaw Actively Exploited, CISA Warns

    Urgent Windows SMB Flaw Actively Exploited, CISA Warns

    A critical Windows SMB vulnerability (CVE-2025-33073) is being actively exploited, allowing attackers to gain full SYSTEM-level control over unpatched systems. The flaw affects a wide range of Microsoft operating systems, including Windows Server, Windows 10, and Windows 11 up to version 24H2, an...

    Read More »
  • IBM API Connect flaw exposes critical authentication bypass risk

    IBM API Connect flaw exposes critical authentication bypass risk

    A critical vulnerability (CVE-2025-13915) in IBM API Connect allows attackers to bypass authentication and gain unauthorized remote access, posing a high risk to sectors like finance and healthcare. IBM urges immediate patching to specific affected versions and advises disabling the Developer Por...

    Read More »