Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA: CVE Program to Focus on Vulnerability Data Quality

CISA: CVE Program to Focus on Vulnerability Data Quality

Posted on September 12, 2025September 12, 2025 By CWS

The US cybersecurity company CISA believes that expanded partnerships, authorities sponsorships, transparency, modernization, and higher vulnerability information high quality are the subsequent step in advancing the Widespread Vulnerabilities and Exposures (CVE) Program.

Geared toward figuring out, defining, and indexing publicly disclosed safety defects, the CVE Program turned 25 final 12 months, when the variety of CVE Numbering Authorities (CNAs) surpassed 400, and greater than 28,000 new CVE data had been produced.

The variety of CNAs has grown to over 460 as of 2025, and the CVE Program is now able to transition to a brand new section, following the expansion period it went via throughout the previous decade, CISA says.

“Because the CVE Program evolves to fulfill the wants of this world cybersecurity neighborhood, it should transition into a brand new period centered above all on belief, responsiveness, and vulnerability information high quality,” CISA notes in a contemporary doc (PDF) presenting its imaginative and prescient concerning this system’s future.

In line with the company, the CVE Program is likely one of the most “enduring and trusted cybersecurity public items” and should keep its worth via “conflict-free and vendor-neutral stewardship, broad multi-sector engagement, clear processes, and accountable management”.

This system, it says, shouldn’t be taken personal, ought to promote transparency to downstream customers, and will make sure that CVE information stays free and overtly accessible.

“This precept underpins coordinated cyber protection, permits innovation in safety tooling, and empowers defenders throughout business and authorities worldwide. CVE Program stewardship should replicate this and be managed as a public good with world participation in its governance,” CISA says.

CVE’s future priorities embody extra diversified and worldwide neighborhood partnerships, ongoing investments from authorities businesses (primarily from CISA), the modernization of CVE infrastructure via automation and different capabilities, and enhancements throughout visibility, responsiveness, and information enrichment.Commercial. Scroll to proceed studying.

The company can even give attention to implementing minimal requirements for CVE Document high quality and on the event of mechanisms to scale enrichment, to attain higher vulnerability information high quality and enhance the CVE schema.

“With this strategic imaginative and prescient, CISA is reaffirming our management position and seizing the chance to modernize the CVE Program, solidifying it because the cornerstone of worldwide cybersecurity protection. In collaboration with the worldwide cybersecurity neighborhood, CISA is dedicated to delivering a well-governed, trusted, and responsive CVE Program aimed to boost the standard of vulnerability information and world cybersecurity resilience,” CISA government assistant director of cybersecurity Nick Andersen mentioned.

This comes as NIST’s Nationwide Vulnerability Database (NVD) continues to be coping with a major and rising backlog of vulnerabilities. 

Associated: Invoice Goals to Create Nationwide Technique for Quantum Cybersecurity Migration

Associated: Senator Urges FTC Probe of Microsoft Over Safety Failures

Associated: Encrypted Messaging Apps Promise Privateness. Authorities Transparency Is Typically the Value

Associated: UK Sanctions Russian Hackers Tied to Assassination Makes an attempt

Security Week News Tags:CISA, CVE, Data, Focus, Program, Quality, Vulnerability

Post navigation

Previous Post: VMScape: Academics Break Cloud Isolation With New Spectre Attack
Next Post: Critical CVE-2025-5086 in DELMIA Apriso Actively Exploited, CISA Issues Warning

Related Posts

Lanscope Endpoint Manager Zero-Day Exploited in the Wild Lanscope Endpoint Manager Zero-Day Exploited in the Wild Security Week News
React2Shell Attacks Linked to North Korean Hackers React2Shell Attacks Linked to North Korean Hackers Security Week News
Thousands of SaaS Apps Could Still Be Susceptible to nOAuth Thousands of SaaS Apps Could Still Be Susceptible to nOAuth Security Week News
Hackers Start Exploiting Critical Cisco ISE Vulnerabilities Hackers Start Exploiting Critical Cisco ISE Vulnerabilities Security Week News
Ivanti Releases Crucial Patches for Endpoint Manager Ivanti Releases Crucial Patches for Endpoint Manager Security Week News
Fuji Electric HMI Configurator Flaws Expose Industrial Organizations to Hacking Fuji Electric HMI Configurator Flaws Expose Industrial Organizations to Hacking Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News