Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA’s Ransomware Alerts in KEV: A Silent Update Challenge

CISA’s Ransomware Alerts in KEV: A Silent Update Challenge

Posted on February 6, 2026 By CWS

The Cybersecurity and Infrastructure Security Agency (CISA) plays a crucial role in identifying vulnerabilities exploited in ransomware attacks, periodically updating its Known Exploited Vulnerabilities (KEV) catalog. However, the effectiveness of these updates is under scrutiny due to the lack of public announcements when changes occur.

Understanding CISA’s Update Mechanism

Since the latter part of 2023, CISA’s KEV catalog has included a field indicating whether a vulnerability is known to be used in ransomware operations. This information is intended to help cybersecurity defenders prioritize their patching efforts. However, these updates are often quietly made, without any public notification.

In 2025, CISA updated 59 vulnerabilities in its catalog, changing their status from ‘unknown’ to ‘known’ concerning their use in ransomware campaigns. Glenn Thorpe, a senior director at GreyNoise, highlighted that the time taken to update these entries ranged from one day to over 1,300 days.

Focus on Software Vulnerabilities

Among the vulnerabilities updated by CISA, those affecting Microsoft products were the most prevalent, accounting for over a quarter of the total updates. Other affected vendors included Ivanti, Fortinet, Palo Alto Networks, and Zimbra, with each having multiple vulnerabilities listed.

Thorpe noted that the most frequently exploited vulnerabilities involved authentication bypass and remote code execution, underscoring the importance of addressing these issues in cybersecurity strategies.

Implications for Cybersecurity Practices

Thorpe emphasized that these updates significantly impact an organization’s risk assessment. He expressed concern over the lack of alerts or announcements accompanying these updates, which are merely reflected as changes in a JSON file. This silent approach means defenders must actively monitor for changes rather than relying on headline alerts.

According to CISA’s Nick Andersen, the agency’s goal is to assist defenders in risk prioritization by tagging vulnerabilities with ransomware associations. He indicated CISA’s ongoing efforts to refine processes and enhance data through the KEV catalog, the Common Vulnerabilities and Exposures (CVE) Program, and other initiatives.

As CISA strives to make its updates more transparent, Thorpe has developed an RSS feed tool that checks for changes every hour. This tool aims to alert organizations whenever a ransomware tag in CISA’s catalog is updated, thus improving their ability to respond to evolving threats.

The evolving nature of cybersecurity threats and CISA’s role in tracking them highlight the importance of staying vigilant and responsive. As the agency works on enhancing its tools and methodologies, the cybersecurity community’s feedback remains vital to advancing vulnerability management.

Security Week News Tags:CISA, Cybersecurity, Fortinet, Glenn Thorpe, Ivanti, KEV catalog, Microsoft vulnerabilities, Nick Andersen, Palo Alto Networks, Ransomware, risk management, threat intelligence, Vulnerabilities, Zimbra

Post navigation

Previous Post: Critical CentOS 9 Flaw Enables Root Privilege Escalation
Next Post: Claude Opus 4.6 Uncovers 500+ Severe Flaws in Open-Source Software

Related Posts

AirMDR Raises .5 Million for MDR Solution AirMDR Raises $15.5 Million for MDR Solution Security Week News
Cyberwarfare Threats in 2026: Nation-State vs. Criminal Activities Cyberwarfare Threats in 2026: Nation-State vs. Criminal Activities Security Week News
Chrome Extensions With 900,000 Downloads Caught Stealing AI Chats Chrome Extensions With 900,000 Downloads Caught Stealing AI Chats Security Week News
CISO Conversations: Keith McCammon, CSO and Co-founder at Red Canary CISO Conversations: Keith McCammon, CSO and Co-founder at Red Canary Security Week News
China’s Cyber Silence is More Worrying Than Russia’s Noise, Chief Cybersecurity Strategist Says China’s Cyber Silence is More Worrying Than Russia’s Noise, Chief Cybersecurity Strategist Says Security Week News
Canon Says Subsidiary Impacted by Oracle EBS Hack  Canon Says Subsidiary Impacted by Oracle EBS Hack  Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • dYdX Packages Breached: Wallet Theft and Malware Risks
  • Spam Campaign Utilizes Fake PDFs for Remote Access
  • Chinese Threat Actor Uses DKnife Implant for Attacks
  • Hackers Exploit Screensavers for Remote Access
  • House Panel Advances Bills to Enhance Energy Cybersecurity

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • dYdX Packages Breached: Wallet Theft and Malware Risks
  • Spam Campaign Utilizes Fake PDFs for Remote Access
  • Chinese Threat Actor Uses DKnife Implant for Attacks
  • Hackers Exploit Screensavers for Remote Access
  • House Panel Advances Bills to Enhance Energy Cybersecurity

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark