Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA’s Ransomware Alerts in KEV: A Silent Update Challenge

CISA’s Ransomware Alerts in KEV: A Silent Update Challenge

Posted on February 6, 2026 By CWS

The Cybersecurity and Infrastructure Security Agency (CISA) plays a crucial role in identifying vulnerabilities exploited in ransomware attacks, periodically updating its Known Exploited Vulnerabilities (KEV) catalog. However, the effectiveness of these updates is under scrutiny due to the lack of public announcements when changes occur.

Understanding CISA’s Update Mechanism

Since the latter part of 2023, CISA’s KEV catalog has included a field indicating whether a vulnerability is known to be used in ransomware operations. This information is intended to help cybersecurity defenders prioritize their patching efforts. However, these updates are often quietly made, without any public notification.

In 2025, CISA updated 59 vulnerabilities in its catalog, changing their status from ‘unknown’ to ‘known’ concerning their use in ransomware campaigns. Glenn Thorpe, a senior director at GreyNoise, highlighted that the time taken to update these entries ranged from one day to over 1,300 days.

Focus on Software Vulnerabilities

Among the vulnerabilities updated by CISA, those affecting Microsoft products were the most prevalent, accounting for over a quarter of the total updates. Other affected vendors included Ivanti, Fortinet, Palo Alto Networks, and Zimbra, with each having multiple vulnerabilities listed.

Thorpe noted that the most frequently exploited vulnerabilities involved authentication bypass and remote code execution, underscoring the importance of addressing these issues in cybersecurity strategies.

Implications for Cybersecurity Practices

Thorpe emphasized that these updates significantly impact an organization’s risk assessment. He expressed concern over the lack of alerts or announcements accompanying these updates, which are merely reflected as changes in a JSON file. This silent approach means defenders must actively monitor for changes rather than relying on headline alerts.

According to CISA’s Nick Andersen, the agency’s goal is to assist defenders in risk prioritization by tagging vulnerabilities with ransomware associations. He indicated CISA’s ongoing efforts to refine processes and enhance data through the KEV catalog, the Common Vulnerabilities and Exposures (CVE) Program, and other initiatives.

As CISA strives to make its updates more transparent, Thorpe has developed an RSS feed tool that checks for changes every hour. This tool aims to alert organizations whenever a ransomware tag in CISA’s catalog is updated, thus improving their ability to respond to evolving threats.

The evolving nature of cybersecurity threats and CISA’s role in tracking them highlight the importance of staying vigilant and responsive. As the agency works on enhancing its tools and methodologies, the cybersecurity community’s feedback remains vital to advancing vulnerability management.

Security Week News Tags:CISA, Cybersecurity, Fortinet, Glenn Thorpe, Ivanti, KEV catalog, Microsoft vulnerabilities, Nick Andersen, Palo Alto Networks, Ransomware, risk management, threat intelligence, Vulnerabilities, Zimbra

Post navigation

Previous Post: Critical CentOS 9 Flaw Enables Root Privilege Escalation
Next Post: Claude Opus 4.6 Uncovers 500+ Severe Flaws in Open-Source Software

Related Posts

Chrome Sandbox Escape Earns Researcher 0,000 Chrome Sandbox Escape Earns Researcher $250,000 Security Week News
Nippon Steel Subsidiary Blames Data Breach on Zero-Day Attack Nippon Steel Subsidiary Blames Data Breach on Zero-Day Attack Security Week News
Flaw Allowing Website Takeover Found in WordPress Plugin With 400k Installations Flaw Allowing Website Takeover Found in WordPress Plugin With 400k Installations Security Week News
Google Warns UK Retailer Hackers Now Targeting US Google Warns UK Retailer Hackers Now Targeting US Security Week News
Train Hack Gets Proper Attention After 20 Years: Researcher  Train Hack Gets Proper Attention After 20 Years: Researcher  Security Week News
Over 1,400 MongoDB Databases Ransacked by Threat Actor Over 1,400 MongoDB Databases Ransacked by Threat Actor Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Tool Analyzes LinkedIn Contacts with Epstein Files
  • Claude Opus 4.6 Uncovers 500+ Severe Flaws in Open-Source Software
  • CISA’s Ransomware Alerts in KEV: A Silent Update Challenge
  • Critical CentOS 9 Flaw Enables Root Privilege Escalation
  • Zscaler Expands with SquareX Acquisition for Enhanced Browser Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Tool Analyzes LinkedIn Contacts with Epstein Files
  • Claude Opus 4.6 Uncovers 500+ Severe Flaws in Open-Source Software
  • CISA’s Ransomware Alerts in KEV: A Silent Update Challenge
  • Critical CentOS 9 Flaw Enables Root Privilege Escalation
  • Zscaler Expands with SquareX Acquisition for Enhanced Browser Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark