The logo of Aflac displayed on a smartphone. (Cheng Xin/Getty Images) | CyberScoop
CVE CISA KEV Update by Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government 5/02/2025 9:00:02 PM| nvd.nist.gov
(Photo by Patrick Lux/Getty Images) | CyberScoop
(Getty Images) | CyberScoop
The commitments are voluntary, but CISA officials said they are committed to measuring progress by the signatories across key commitments over the next year.| CyberScoop
Super Typhoon Yutu, strongest storm on Earth in 2018. Satellite view. Elements of this image furnished by NASA. Getty Images | CyberScoop
U.S. Sen. Ron Wyden, D-Ore., speaks to reporters at the U.S. Capitol on July 8. (Photo by Kevin Dietsch/Getty Images) | CyberScoop
part of the Department of Homeland Security| CyberScoop
Safe Mode | CyberScoop
For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild. Organizations should use the KEV catalog as an input to their vulnerability management prioritization framework.How to use the KEV CatalogThe KEV catalog is also available in these formats:| Cybersecurity and Infrastructure Security Agency CISA