CISA executed the option period on MITRE’s contract to keep the essential CVE cybersecurity database running. The nonprofit organization MITRE, which maintains the Common Vulnerabilities and Exposures ...
Federal agencies have two weeks to patch their SharePoint servers, and everyone else should be moving just as fast. On May 12 ...
Yesterday the organization operating the Common Vulnerabilities and Exposures database (CVE) announced that government funding was about to end. The US Cybersecurity and Infrastructure Security Agency ...
In an 11th-hour reprieve, the US government last night agreed to continue funding the globally used Common Vulnerabilities and Exposures (CVE) program.… This comes after the Feds decided not to renew ...
The U.S. government today extended a contract through which it finances the CVE Program, the cybersecurity industry’s go-to database of software vulnerabilities. The U.S. Cybersecurity and ...
The Common Vulnerability and Exposures, or CVE, repository holds the answers to some of information security’s most vital questions. Namely, which security issue are we talking about, exactly, and how ...
Juhan Lepassaar, Executive Director at ENISA. Image: Hubert Burda Media/Flickr The announcement comes after concerns that the US government would stop funding the operations of MITRE, the nonprofit ...
After the U.S. government initially cut its funding of the CVE database, used to track security vulnerabilities in operating systems and software, CISA has said it will continue to be funded for ...
Were the CVE program to be discontinued, security teams would have a hard time finding one resource that would function with the same impact across the board. Here are current issues of relying on CVE ...
This voice experience is generated by AI. Learn more. This voice experience is generated by AI. Learn more. A new vulnerability database has launched in the EU, in a bid to reduce dependence on the ...
CVE-2026-42208 exploited within 36 hours of disclosure, exposing LiteLLM credentials, risking cloud account compromise.