Mandiant said exploits were the most common initial access vector last year, linking software defects to 1 in 3 attacks. The most commonly exploited vulnerabilities affected network edge devices.| CyberScoop
Exploited vulnerabilities have turned up in Ivanti products 16 times since 2024. That’s more than any other vendor in the network edge device space.| CyberScoop
The logo of Aflac displayed on a smartphone. (Cheng Xin/Getty Images) | CyberScoop
Modified Analysis by NIST 11/29/2024 11:47:54 AM| nvd.nist.gov
(Photo by Patrick Lux/Getty Images) | CyberScoop
(Getty Images) | CyberScoop
Super Typhoon Yutu, strongest storm on Earth in 2018. Satellite view. Elements of this image furnished by NASA. Getty Images | CyberScoop
part of the Department of Homeland Security| CyberScoop
For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild. Organizations should use the KEV catalog as an input to their vulnerability management prioritization framework.How to use the KEV CatalogThe KEV catalog is also available in these formats:| Cybersecurity and Infrastructure Security Agency CISA