• Platform
    • Vulnerability Management
    • Vulnerability Intelligence
    • Risk Scoring
    • Risk Reporting
    • Asset Management
  • Use Cases
    • Application Security
      • Nucleus for Github
    • Unified Vulnerability Management
    • Transformation Initiatives
    • Federal Government
      • CISA KEV Vulnerability Prioritization
      • The Australian Essential 8
  • Integrations
    • Supported Integrations
    • Technology Partners
  • Partners
    • Partner Program
    • Managed Security Service Providers
    • Deal Registration
  • Resources
    • Blog
    • Vulnerability Management: Build vs Buy
    • Customer Stories
    • Knowledge Center
    • Webinars & Videos
    • White Papers
    • Media
    • CISA KEV Dashboard
  • Contact Us
    • Platform
      • Vulnerability Management
      • Vulnerability Intelligence
      • Risk Scoring
      • Risk Reporting
      • Asset Management
    • Use Cases
      • Application Security
        • Nucleus for Github
      • Unified Vulnerability Management
      • Transformation Initiatives
      • Federal Government
        • CISA KEV Vulnerability Prioritization
        • The Australian Essential 8
    • Integrations
      • Supported Integrations
      • Technology Partners
    • Partners
      • Partner Program
      • Managed Security Service Providers
      • Deal Registration
    • Resources
      • Blog
      • Vulnerability Management: Build vs Buy
      • Customer Stories
      • Knowledge Center
      • Webinars & Videos
      • White Papers
      • Media
      • CISA KEV Dashboard
    • Contact Us

Upcoming Webinar: Understanding Prioritization Methods for Enterprise Vuln Management | June 28, 2023

Nucleus Security
Nucleus Security
  • Platform
    • Vulnerability Management
    • Vulnerability Intelligence
    • Risk Scoring
    • Risk Reporting
    • Asset Management
  • Use Cases
    • Application Security
      • Nucleus for Github
    • Unified Vulnerability Management
    • Transformation Initiatives
    • Federal Government
      • CISA KEV Vulnerability Prioritization
      • The Australian Essential 8
  • Integrations
    • Supported Integrations
    • Technology Partners
  • Partners
    • Partner Program
    • Managed Security Service Providers
    • Deal Registration
  • Resources
    • Blog
    • Vulnerability Management: Build vs Buy
    • Customer Stories
    • Knowledge Center
    • Webinars & Videos
    • White Papers
    • Media
    • CISA KEV Dashboard
  • Contact Us
WATCH DEMO

CISA KEV

Nucleus Security > CISA KEV
  • CISA KEV

June 5, 2023 CISA KEV Breakdown | Zyxel

  • Ryan Cribelar
June 5: 2 New Vulns | CVE-2023-33009, CVE-2023-33010 In this CISA KEV Breakdown, two vulnerabilities affecting the same set of Zyxel technologies as CVE-2023-28771 have been added to the...
Continue Reading
  • CISA KEV

June 2, 2023 CISA KEV Breakdown | Progress MOVEit Transfer

  • Ryan Cribelar
June 2: 1 New Vuln | CVE-2023-34362 In this CISA KEV Breakdown, only one vulnerability was added, however it has generated quite a lot of buzz within the security...
Continue Reading
  • CISA KEV

May 31, 2023 CISA KEV Breakdown | Barracuda, Zyxel

  • Ryan Cribelar
May 31 (and May 26): 2 New Vulns | CVE-2023-28771, CVE-2023-2868 In this CISA KEV Breakdown, two command injection vulnerabilities from Zyxel and Barracuda Networks were added. CVE-2023-2868, the...
Continue Reading
  • CISA KEV

May 22, 2023 CISA KEV Breakdown | Apple

  • Ryan Cribelar
May 22: 3 New Vulns | CVE-2023-32373, CVE-2023-32409, CVE-2023-28204 In this CISA KEV Breakdown, three zero-days reported to Apple just last week have been added to the Known Exploited...
Continue Reading
  • CISA KEV

May 19, 2023 CISA KEV Breakdown | Cisco, Samsung

  • Ryan Cribelar
May 19: 3 New Vulns | CVE-2004-1464, CVE-2016-6415, CVE-2023-21492 In this CISA KEV Breakdown, three vulnerabilities (only one being disclosed this year) were added to the KEV catalog. Little...
Continue Reading
Analyzing 925 Known Exploited Vulnerabilities in CISA's KEV Catalog
  • CISA KEV

Analyzing 925 Known Exploited Vulnerabilities in CISA’s KEV Catalog

  • Patrick Garrity
Analyzing 925 Known Exploited Vulnerabilities in CISA’s KEV Catalog There are currently 925 known exploited vulnerabilities on Cybersecurity and Infrastructure Security Agency’s KEV catalog, making it an excellent resource for...
Continue Reading

Posts navigation

1 2 … 9 Next

Categories

Subscribe to Blog

Recent Posts

2023 Verizon DBIR Report Actionable CIS Controls
June 5, 2023 CISA KEV Breakdown | Zyxel
June 2, 2023 CISA KEV Breakdown | Progress MOVEit Transfer
Release Spotlight: Nucleus Trends Page Update
May 31, 2023 CISA KEV Breakdown | Barracuda, Zyxel
May 22, 2023 CISA KEV Breakdown | Apple
May 19, 2023 CISA KEV Breakdown | Cisco, Samsung
Interactive CISA KEV Visualization
Nucleus Product Update 3.4
May 12, 2023 CISA KEV Breakdown | Linux, Oracle, Jenkins, Apache, Red Hat, Ruckus
Nucleus Security

Nucleus is a Risk Based Vulnerability Management (RBVM) solution that automates vulnerability management processes and workflows, enabling organizations to mitigate vulnerabilities 10 times faster, using a fraction of the resources that it takes to perform these tasks today.

Our Solutions

Vulnerability Management

Application Security

Federal Government

Managed Security Service Providers (MSSPs)

API-Only Deployment

About Nucleus

Company

Media

Careers

Contact

Get Started

© 2023 Nucleus Security - Privacy Policy

This website uses cookies to improve your experience. We encourage you to accept, but you can opt-out if you wish. Accept Reject
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT