Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

us-cert.gov

US-CERT Alerts

Get the latest updates from US-CERT Alerts directly as they happen.

Follow now 1051 followers

Latest posts

Last updated 17 days ago

#StopRansomware: Medusa Ransomware

18 days ago

Summary Note: This joint Cybersecurity Advisory is part of an ongoing #StopRansomware...

#StopRansomware: Ghost (Cring) Ransomware

about 1 month ago

Summary Note: This joint Cybersecurity Advisory is part of an ongoing #StopRansomware...

Threat Actors Chained Vulnerabilities in Ivanti Cloud Service Applications

2 months ago

Note: The CVEs in this advisory are unrelated to vulnerabilities (CVE-2025-0282 and...

2023 Top Routinely Exploited Vulnerabilities

5 months ago

Summary The following cybersecurity agencies coauthored this joint Cybersecurity Advisory (hereafter collectively...

Microsoft Releases October 2024 Security Updates

6 months ago

Microsoft released security updates to address vulnerabilities in multiple products. A cyber...

Iranian Cyber Actors’ Brute Force and Credential Access Activity Compromises Critical Infrastructure Organizations

6 months ago

Summary The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security...

CISA Adds One Known Exploited Vulnerability to Catalog

6 months ago

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog...

Russian Military Cyber Actors Target US and Global Critical Infrastructure

7 months ago

Summary The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency...

#StopRansomware: RansomHub Ransomware

7 months ago

Summary Note: This joint Cybersecurity Advisory is part of an ongoing #StopRansomware...

Iran-based Cyber Actors Enabling Ransomware Attacks on US Organizations

7 months ago

Summary The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency...

Best Practices for Event Logging and Threat Detection

7 months ago

Executive Summary This publication defines a baseline for event logging best practices...

CISA Adds Six Known Exploited Vulnerabilities to Catalog

8 months ago

CISA has added six new vulnerabilities to its Known Exploited Vulnerabilities Catalog...