Skip to content
TheCyberThrone

Thinking Security ! Always

  • Latest Story
  • AI
  • Application Security
  • Cloud Security
    • AWS Security
    • Azure Security
    • Google Security
  • Container Security
  • Data Breaches
  • Email Security
  • Mobile Security
  • Security Acquisition
  • ZeroDay
  • Certification Guide
    • Cloud Certifications
    • Network Certifications
    • Security Certifications
  • Security NewsLetter
  • About Author
  • facebook.com
  • twitter.com
  • t.me
  • instagram.com
  • youtube.com
Subscribe

Known Vulnerability

  • Home
  • Known Vulnerability
CISA Known Exploited Vulnerability Catalog Update

CISA Known Exploited Vulnerability Catalog Update

CISA has added thirteen new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence that threat actors are actively exploiting the vulnerabilities listed in the table below. These types of…
Posted by PravinKarthik December 11, 2021
Trending post
  • CVE-2026-34621: Adobe Acrobat Reader Prototype Pollution RCE
    CVE-2026-34621: Adobe Acrobat Reader Prototype Pollution RCE
  • BlueHammer: When MSRC Process Failures Become Zero-Days
    BlueHammer: When MSRC Process Failures Become Zero-Days
  • CISSP Executive Briefing: Adversary Speed vs Enterprise Speed
    CISSP Executive Briefing: Adversary Speed vs Enterprise Speed
  • CISSP Domain 2: Zero Hour Cram Series
    CISSP Domain 2: Zero Hour Cram Series
  • Google Device Bound Session Credentials  — Now GA in Chrome 146
    Google Device Bound Session Credentials  — Now GA in Chrome 146
  • CISSP Domain 2 – Data Retention & Privacy – Why Keeping Data Too Long Is a Risk
    CISSP Domain 2 – Data Retention & Privacy – Why Keeping Data Too Long Is a Risk
Archives

Click to Subscribe

Follow Us

  • Facebook
  • Twitter
  • Instagram
Copyright 2026 — TheCyberThrone. All rights reserved. Bloghash WordPress Theme
Scroll to Top