Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Urgent Replacement of Discontinued Edge Devices Advised

Urgent Replacement of Discontinued Edge Devices Advised

Posted on February 7, 2026 By CWS

Government agencies from the United States and the United Kingdom have jointly issued a warning to organizations regarding the risks associated with outdated edge devices. They are urging immediate action to replace these devices to ensure robust network security.

Understanding the Role of Edge Devices

Edge devices are crucial components in network infrastructures, including firewalls, Internet of Things (IoT) devices, load balancers, network security appliances, routers, switches, and wireless access points. These devices manage and route network traffic, playing a key role in maintaining network performance and security.

When these devices reach end-of-support (EOS) status, they no longer receive critical security updates, which makes them vulnerable to cyber threats. According to US authorities, these outdated devices are prime targets for state-sponsored threat actors aiming to gain unauthorized access to networks, establish persistence, and steal sensitive data.

Risks Posed by Outdated Edge Devices

The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the UK’s National Cyber Security Centre (NCSC) have emphasized the dangers of using EOS edge devices. They highlight that these devices can serve as entry points for attackers, jeopardizing the security of organizational data and services. Additionally, the lack of updates can lead to compatibility issues, further hindering productivity.

To mitigate these risks, organizations are advised to actively monitor their networks for outdated edge devices and replace them promptly. This proactive approach is crucial for enhancing the overall security posture of federal networks and enterprise environments.

Directive for Federal Agencies

In response to the growing threat, CISA has issued Binding Operational Directive 26-02, which mandates federal agencies to take immediate action. The directive calls for updating all supported edge devices running EOS software to supported versions and performing a comprehensive inventory of devices listed in CISA’s EOS edge device list within a three-month timeframe.

Furthermore, federal agencies are required to decommission identified devices within a year and establish a continuous discovery process for edge devices within their networks over the next 24 months. This directive underscores the urgent need for organizations to respond to the vulnerabilities posed by unsupported devices.

CISA has also noted widespread exploitation campaigns by advanced threat actors targeting these outdated devices. The agency stresses that these devices are particularly susceptible to newly disclosed security flaws that remain unpatched, thereby exposing federal networks to significant risks.

Conclusion: Proactive Measures for Enhanced Security

Replacing discontinued edge devices is not just a recommendation but a critical action for maintaining the integrity and security of networks. Organizations are urged to act swiftly to protect themselves against potential breaches and ensure compliance with security directives. By addressing the vulnerabilities of outdated devices, organizations can fortify their defenses against evolving cyber threats.

Security Week News Tags:CISA, cyber threats, edge devices, EOS devices, federal networks, IT management, network protection, network security, security updates, Threat Actors

Post navigation

Previous Post: OpenClaw Enhances AI Security with VirusTotal Partnership
Next Post: State-Backed Hackers Exploit Signal to Target Officials

Related Posts

Intel and AMD Patch Over 80 Vulnerabilities in February Intel and AMD Patch Over 80 Vulnerabilities in February Security Week News
Red Access Raises  Million for Agentless Security Platform Red Access Raises $17 Million for Agentless Security Platform Security Week News
Vibe Coding: When Everyone’s a Developer, Who Secures the Code? Vibe Coding: When Everyone’s a Developer, Who Secures the Code? Security Week News
Ransomware Attack Disrupts Local Emergency Alert System Across US Ransomware Attack Disrupts Local Emergency Alert System Across US Security Week News
Seal Security Raises  Million to Secure Software Supply Chain Seal Security Raises $13 Million to Secure Software Supply Chain Security Week News
Adobe Patches Critical Vulnerability in Connect Collaboration Suite Adobe Patches Critical Vulnerability in Connect Collaboration Suite Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News