Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Retires Ten Emergency Directives Following Milestone Achievement

CISA Retires Ten Emergency Directives Following Milestone Achievement

Posted on January 9, 2026January 9, 2026 By CWS

The Cybersecurity and Infrastructure Safety Company (CISA) introduced a major milestone on January 8, 2026, by retiring ten Emergency Directives issued between 2019 and 2024.

This marks the best variety of Emergency Directives retired by the company concurrently, reflecting progress in federal cybersecurity efforts.

Emergency Directives are pressing orders issued by CISA to quickly tackle rising threats dealing with Federal Civilian Govt Department (FCEB) companies.

By closing these ten directives, CISA confirms that the required safety measures have been efficiently carried out throughout federal programs or are actually lined by current rules, such because the Binding Operational Directive (BOD) 22-01.

Why Directives Have been Closed

Seven directives associated to particular vulnerabilities have been retired as a result of these safety points are actually tracked in CISA’s Identified Exploited Vulnerabilities (KEV) catalog.

These embrace directives addressing Home windows vulnerabilities, Netlogon elevation-of-privilege points, and VMware safety issues.

Three further directives, together with these addressing the SolarWinds incident and Microsoft Trade vulnerabilities.

A current nation-state compromise of Microsoft e-mail programs was closed after CISA decided its goals had been achieved and practices had developed past its necessities.

CISA Performing Director Madhu Gottumukkala acknowledged that this closure demonstrates the company’s dedication to federal cybersecurity collaboration.

“Day-after-day, CISA’s group works with companions to eradicate persistent entry, counter threats, and ship real-time steering,” Gottumukkala famous.

The retired directives embrace important orders addressing tampering with DNS infrastructure, Home windows patch vulnerabilities from 2020, Pulse Join Safe threats, and Print Spooler service vulnerabilities.

Full Record of Retired Emergency Directives

Listed below are the now-closed directives, every a speedy response to high-stakes threats:

ED 19-01: Mitigate DNS Infrastructure Tampering

ED 20-02: Mitigate Home windows Vulnerabilities from January 2020 Patch Tuesday

ED 20-03: Mitigate Home windows DNS Server Vulnerability from July 2020 Patch Tuesday

ED 20-04: Mitigate Netlogon Elevation of Privilege Vulnerability from August 2020 Patch Tuesday

ED 21-01: Mitigate SolarWinds Orion Code Compromise

ED 21-02: Mitigate Microsoft Trade On-Premises Product Vulnerabilities

ED 21-03: Mitigate Pulse Join Safe Product Vulnerabilities

ED 21-04: Mitigate Home windows Print Spooler Service Vulnerability

ED 22-03: Mitigate VMware Vulnerabilities

ED 24-02: Mitigating the Important Danger from Nation-State Compromise of Microsoft Company E mail System

Relatively than counting on emergency directives, these protections are actually embedded in CISA’s ongoing safety applications.

The company continues advancing “Safe by Design” rules, highlighting transparency, configurability, and cross-system compatibility throughout federal infrastructure.

This consolidation permits CISA to streamline federal cybersecurity governance whereas sustaining safety towards important threats.

As cyber dangers evolve, CISA stays ready to concern new Emergency Directives when threats demand rapid motion.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Achievement, CISARetiresTenEmergencyDirectives, Milestone

Post navigation

Previous Post: Microsoft’s New Teams New Admin Role to Manage External Collaboration Settings
Next Post: CISA Closes 10 Emergency Directives as Vulnerability Catalog Takes Over

Related Posts

Attacker Context and Historical iOS Zero-Click Similarities Attacker Context and Historical iOS Zero-Click Similarities Cyber Security News
WordPress Plugin Vulnerability Let Attackers Bypass Authentication via Social Login WordPress Plugin Vulnerability Let Attackers Bypass Authentication via Social Login Cyber Security News
INE Security Partners with Abadnet Institute for Cybersecurity Training Programs in Saudi Arabia INE Security Partners with Abadnet Institute for Cybersecurity Training Programs in Saudi Arabia Cyber Security News
EmEditor Editor Website Hacked to Deliver Infostealer Malware in Supply Chain Attack EmEditor Editor Website Hacked to Deliver Infostealer Malware in Supply Chain Attack Cyber Security News
New Phishing Kit Automates Generation of ClickFix Attack Bypassing Security Measures New Phishing Kit Automates Generation of ClickFix Attack Bypassing Security Measures Cyber Security News
Detego Global Launches Case Management Platform for Digital Forensics and Incident Response Teams Detego Global Launches Case Management Platform for Digital Forensics and Incident Response Teams Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News