/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
VOICE ARCHIVE

@cisacyber

@cisacyber
22 posts
2026-02-26
🚨 Just Released: Emergency Directive 26-03 focuses on mitigating vulnerabilities in Cisco SD-WAN systems. We urge all orgs to review and implement the recommended actions immediately to protect your network. 👉 https://go.dhs.gov/iHq [video]
2026-02-26 View on X
BleepingComputer

Cisco warns of a critical SD-WAN bug that was actively exploited in zero-day attacks since 2023; CISA and its international partners issue emergency directives

Cisco is warning that a critical authentication bypass vulnerability in Cisco Catalyst SD-WAN, tracked as CVE-2026-20127 …

🛡️ We added Cisco Catalyst SD-WAN path traversal vulnerability CVE-2022-20775 & Controller and Manager authentication bypass vulnerability CVE-2026-20127 to our KEV Catalog. Visit https://go.dhs.gov/Z3Q & apply mitigations to protect your org from cyberattacks. [video]
2026-02-26 View on X
BleepingComputer

Cisco warns of a critical SD-WAN bug that was actively exploited in zero-day attacks since 2023; CISA and its international partners issue emergency directives

Cisco is warning that a critical authentication bypass vulnerability in Cisco Catalyst SD-WAN, tracked as CVE-2026-20127 …

🚨 Cyber threat actors are exploiting multiple Cisco vulnerabilities, including CVE-2026-20127 and CVE-2022-20775, to ultimately establish long-term persistence in SD-WAN systems across multinational organizations. Review our Alert & act immediately. 👉 https://go.dhs.gov/iHw [video]
2026-02-26 View on X
BleepingComputer

Cisco warns of a critical SD-WAN bug that was actively exploited in zero-day attacks since 2023; CISA and its international partners issue emergency directives

Cisco is warning that a critical authentication bypass vulnerability in Cisco Catalyst SD-WAN, tracked as CVE-2026-20127 …

2025-12-05
🚨 PRC state-sponsored actors are actively using BRICKSTORM malware to establish long-term persistence, specifically targeting VMware vSphere platforms. Act now: hunt for intrusions and apply mitigations detailed in our 🆕 Malware Analysis Report: 🔗 https://www.cisa.gov/... [video]
2025-12-05 View on X
Reuters

US and Canadian agencies warn that Chinese hackers are using Brickstorm malware to penetrate and maintain backdoor access to unnamed government and IT entities

Chinese-linked hackers used sophisticated malware to penetrate and maintain long-term access to unnamed government …

2025-09-26
🚨 Cyber threat actors are exploiting newly identified zero-day vulnerabilities in Cisco Adaptive Security Appliances via web services, posing significant risk. Federal agencies must act immediately and follow the guidance in Emergency Directive 25-03. 🔗 https://go.dhs.gov/iAK [image]
2025-09-26 View on X
BleepingComputer

CISA issues an emergency directive ordering US federal agencies to secure their Cisco firewall devices against two flaws exploited in zero-day attacks

CISA has issued a new emergency directive ordering U.S. federal agencies to secure their Cisco firewall devices against two flaws that have been exploited in zero-day attacks.

2025-07-21
We added Microsoft SharePoint server remote code execution vulnerability CVE-2025-53770 to our Known Exploited Vulnerabilities Catalog. Visit https://go.dhs.gov/Z3Q & apply mitigations to protect your org from cyberattacks. #ToolShell [image]
2025-07-21 View on X
Bloomberg

Microsoft releases a patch for a SharePoint 0-day RCE flaw exploited globally on thousands of on-prem servers and says SharePoint 2016 updates are in the works

Microsoft Corp. warned that hackers are actively targeting customers of its document management software SharePoint …

Malicious actors are exploiting RCE vulnerability CVE-2025-53770 to compromise on-prem SharePoint servers. See our Alert for info & mitigations on exploitation activity, known as #ToolShell. 👉 https://go.dhs.gov/iZZ [image]
2025-07-21 View on X
Bloomberg

Microsoft releases a patch for a SharePoint 0-day RCE flaw exploited globally on thousands of on-prem servers and says SharePoint 2016 updates are in the works

Microsoft Corp. warned that hackers are actively targeting customers of its document management software SharePoint …

2024-12-04
⚠️ A #PRC-affiliated threat actor compromised networks of major global #telecommunications providers with a broad cyber espionage campaign. Our 🆕 joint guide has guidance to help strengthen visibility & harden network devices against this activity.🔗 https://www.cisa.gov/... [image]
2024-12-04 View on X
Axios

The FBI and CISA give US telcos best practices to harden their systems against attacks, as senior US officials say Salt Typhoon hackers remain on their networks

- Officials added that they don't yet know the full scope of the intrusions, despite starting the investigation in late spring.

⚠️ A #PRC-affiliated threat actor compromised networks of major global #telecommunications providers with a broad cyber espionage campaign. Our 🆕 joint guide has guidance to help strengthen visibility & harden network devices against this activity.🔗 https://www.cisa.gov/... [image]
2024-12-04 View on X
NBC News

Amid the Salt Typhoon hacks, US officials recommend that Americans use encrypted messaging apps to ensure their communications stay hidden from foreign hackers

Stop Sending Texts Jonny Evans / Computerworld : The FBI now says encryption is good for you  —  Apple has been battling to maintain encryption for a decade. Cynthia B Brumfield / ...

2024-11-23
🛡️ We added #PaloAltoNetworks PAN-OS & #ProgressKemp LoadMaster vulnerabilities, CVE-2024-0012, CVE-2024-9474, & CVE-2024-1212 to our Known Exploited Vulnerabilities Catalog. Visit https://go.dhs.gov/Z3Q & apply mitigations to protect your org from cyberattacks. #InfoSec [image]
2024-11-23 View on X
TechCrunch

Palo Alto Networks says it has observed exploitation of two zero-days in its PAN-OS firewall OS; researchers say hackers have compromised 2,000+ firewalls

Malicious hackers have compromised potentially thousands of organizations by exploiting two new zero-day vulnerabilities found …

2024-04-25
🆕 Alert! 🚨 #Cisco Releases Security Updates Addressing ArcaneDoor, Vulnerabilities in Cisco Firewall Platforms. Update and review further guidance at: https://cisa.gov/... #cybersecurity #InfoSec
2024-04-25 View on X
Wired

Cisco details a hacking campaign that penetrated multiple governments' networks using two zero-day flaws in its VPN and firewall Adaptive Security Appliances

Change Healthcare Finally Admits It Paid Ransomware Hackers—and Still Faces a Patient Data Leak

2024-04-13
🛡️ Palo Alto Networks PAN-OS users: We added #CVE-2024-3400, a command injection vulnerability in GlobalProtect Gateway, to our Known Exploited Vulnerabilities Catalog. Apply mitigations to protect your org from cyberattacks. https://go.dhs.gov/Z3Q #Cybersecurity #InfoSec [image]
2024-04-13 View on X
The Record

Palo Alto Networks alerts customers that hackers are exploiting a zero-day in its popular GlobalProtect VPN product and promises a patch by April 14

Cybersecurity giant Palo Alto Networks is alerting customers that a zero-day vulnerability in its firewall tool is being exploited by hackers.

2024-04-12
⚠️ We are collaborating with partners to respond to a recent compromise—discovered by independent security researchers—impacting Sisense. For more info, check out: https://cisa.gov/...
2024-04-12 View on X
Krebs on Security

CISA is investigating a breach at business intelligence company Sisense; sources: the attackers copied several terabytes of customer data, including credentials

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) said today it is investigating a breach at business intelligence …

2024-03-30
We're responding to CVE-2024-3094, a reported supply chain compromise affecting XZ Utils versions 5.6.0 and 5.6.1. XZ Utils may be present in Linux distributions. See our additional guidance at https://cisa.gov/....
2024-03-30 View on X
Ars Technica

Researchers find malicious code in versions of the compression tool XZ Utils that were incorporated into Linux distributions from Red Hat, Debian, and others

Malicious code planted in xz Utils has been circulating for more than a month.  —  Researchers have found a malicious backdoor …

2024-02-08
🌐@CISAgov with our government and international partners released a joint guide to help network defenders mitigate and detect living off the land techniques exploited by the PRC-sponsored #VoltTyphoon group to target U.S. critical infrastructure. https://go.dhs.gov/JNb [image]
2024-02-08 View on X
Axios

US, UK, Australia, Canada, and New Zealand advisory: China-backed hacking group Volt Typhoon has had access to some major US infrastructure for over five years

Sam Sabin / Axios :

🚨@CISAgov, @NSACyber, @FBI, @ENERGY, @EPA, @TSA, @CyberGovAU, @cybercentre_ca, @NCSC & NCSC-NZ released a cybersecurity advisory on PRC-sponsored actors from #VoltTyphoon compromising U.S. critical infrastructure networks. #TTPs & mitigations👉 https://go.dhs.gov/JN6 [image]
2024-02-08 View on X
Axios

US, UK, Australia, Canada, and New Zealand advisory: China-backed hacking group Volt Typhoon has had access to some major US infrastructure for over five years

Sam Sabin / Axios :

2023-10-15
Cyber threat actors are exploiting an HTTP/2 protocol-based vulnerability (CVE-2023-44487) known as Rapid Reset to conduct #DoS and #DDoS attacks. Orgs providing HTTP/2 services should apply patches when available. See mitigations and read more at https://go.dhs.gov/oeh
2023-10-15 View on X
Wired

The HTTP/2 Rapid Reset flaw, which was exploited to launch record-setting DDoS attacks, requires patching every web server before the problem can be eradicated

Dubbed “HTTP/2 Rapid Reset,” the flaw requires making patches available for virtually every web server around the world before the problem can be eradicated.

2023-06-16
🚨 Progress Software discovered a critical vulnerability in MOVEit Transfer that could lead to escalated privileges and potential unauthorized access to the environment. See mitigation steps at https://www.cisa.gov/... #cybersecurity
2023-06-16 View on X
CNN

CISA confirms “several” US federal government agencies “experienced intrusions” in the hack of Progress' MOVEit Transfer tool and is providing support to them

highlighting the need modernize our cybersecurity. I am working to bolster our cybersecurity defenses & ensure that the federal government's networks are secure from future attacks...

2023-05-26
🚨@CISAgov, @FBI, @NSACyber & international partners published a joint #cybersecurity advisory highlighting a PRC cyber actor living off the land using built-in network admin tools to evade detection & conduct malicious activity. More: https://cisa.gov/... [image]
2023-05-26 View on X
CNBC

Microsoft says Chinese state-sponsored hackers compromised “critical infrastructure organizations” across US industries, with a focus on gathering intelligence

aimed @ stopping relief of Taiwan in case of blockade or kinetic conflict...Biden Regime aware of this since February—same time as the airship incursion..... https://www.cnbc.com/....

2023-05-25
🚨@CISAgov, @FBI, @NSACyber & international partners published a joint #cybersecurity advisory highlighting a PRC cyber actor living off the land using built-in network admin tools to evade detection & conduct malicious activity. More: https://cisa.gov/... [image]
2023-05-25 View on X
CNBC

Microsoft says Chinese state-sponsored hackers compromised “critical infrastructure organizations” across US industries, with a focus on gathering intelligence

- Chinese state-sponsored hackers have compromised “critical” cyber infrastructure in a variety of industries …