Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

CISA Retires Ten Emergency Directives Following Milestone Achievement

Posted on January 9, 2026January 9, 2026 By CWS

The Cybersecurity and Infrastructure Safety Company (CISA) introduced a major milestone on January 8, 2026, by retiring ten Emergency Directives issued between 2019 and 2024.

This marks the best variety of Emergency Directives retired by the company concurrently, reflecting progress in federal cybersecurity efforts.

Emergency Directives are pressing orders issued by CISA to quickly tackle rising threats dealing with Federal Civilian Govt Department (FCEB) companies.

By closing these ten directives, CISA confirms that the required safety measures have been efficiently carried out throughout federal programs or are actually lined by current rules, such because the Binding Operational Directive (BOD) 22-01.

Why Directives Have been Closed

Seven directives associated to particular vulnerabilities have been retired as a result of these safety points are actually tracked in CISA’s Identified Exploited Vulnerabilities (KEV) catalog.

These embrace directives addressing Home windows vulnerabilities, Netlogon elevation-of-privilege points, and VMware safety issues.

Three further directives, together with these addressing the SolarWinds incident and Microsoft Trade vulnerabilities.

A current nation-state compromise of Microsoft e-mail programs was closed after CISA decided its goals had been achieved and practices had developed past its necessities.

CISA Performing Director Madhu Gottumukkala acknowledged that this closure demonstrates the company’s dedication to federal cybersecurity collaboration.

“Day-after-day, CISA’s group works with companions to eradicate persistent entry, counter threats, and ship real-time steering,” Gottumukkala famous.

The retired directives embrace important orders addressing tampering with DNS infrastructure, Home windows patch vulnerabilities from 2020, Pulse Join Safe threats, and Print Spooler service vulnerabilities.

Full Record of Retired Emergency Directives

Listed below are the now-closed directives, every a speedy response to high-stakes threats:

ED 19-01: Mitigate DNS Infrastructure Tampering

ED 20-02: Mitigate Home windows Vulnerabilities from January 2020 Patch Tuesday

ED 20-03: Mitigate Home windows DNS Server Vulnerability from July 2020 Patch Tuesday

ED 20-04: Mitigate Netlogon Elevation of Privilege Vulnerability from August 2020 Patch Tuesday

ED 21-01: Mitigate SolarWinds Orion Code Compromise

ED 21-02: Mitigate Microsoft Trade On-Premises Product Vulnerabilities

ED 21-03: Mitigate Pulse Join Safe Product Vulnerabilities

ED 21-04: Mitigate Home windows Print Spooler Service Vulnerability

ED 22-03: Mitigate VMware Vulnerabilities

ED 24-02: Mitigating the Important Danger from Nation-State Compromise of Microsoft Company E mail System

Relatively than counting on emergency directives, these protections are actually embedded in CISA’s ongoing safety applications.

The company continues advancing “Safe by Design” rules, highlighting transparency, configurability, and cross-system compatibility throughout federal infrastructure.

This consolidation permits CISA to streamline federal cybersecurity governance whereas sustaining safety towards important threats.

As cyber dangers evolve, CISA stays ready to concern new Emergency Directives when threats demand rapid motion.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Achievement, CISARetiresTenEmergencyDirectives, Milestone

Post navigation

Previous Post: Microsoft’s New Teams New Admin Role to Manage External Collaboration Settings
Next Post: CISA Closes 10 Emergency Directives as Vulnerability Catalog Takes Over

Related Posts

Russian Cybercrime Market Hub Transferring from RDP Access to Malware Stealer Logs to Access Cyber Security News
CISA and NSA Warns of BRICKSTORM Malware Attacking VMware ESXi and Windows Environments Cyber Security News
Threat Actors Could Misuse Code Assistant To Inject Backdoors and Generating Harmful Content Cyber Security News
DragonForce Ransomware Empowers Affiliates with Modular Toolkit to Create Custom Ransomware Payloads Cyber Security News
Critical FluentBit Vulnerabilities Let Attackers to Cloud Environments Remotely Cyber Security News
vLLM Vulnerability Enables Remote Code Execution Via Malicious Payloads Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark