Skip to content
TheCyberThrone

Thinking Security ! Always

  • Latest Story
  • AI
  • Application Security
  • Cloud Security
    • AWS Security
    • Azure Security
    • Google Security
  • Container Security
  • Data Breaches
  • Email Security
  • Mobile Security
  • Security Acquisition
  • ZeroDay
  • Certification Guide
    • Cloud Certifications
    • Network Certifications
    • Security Certifications
  • Security NewsLetter
  • About Author
  • facebook.com
  • twitter.com
  • t.me
  • instagram.com
  • youtube.com
Subscribe

Paessler PRTG

  • Home
  • Paessler PRTG
CISA KEV Catalog Update Part I – February 2025

CISA KEV Catalog Update Part I – February 2025

The Cybersecurity and Infrastructure Security Agency (CISA) recently updated its Known Exploited Vulnerabilities (KEV) catalog on February 4, 2025, adding four new vulnerabilities that have been actively exploited in the…
Posted by PravinKarthik February 5, 2025
Trending post
  • NIST Limits NVD Enrichment to High-Priority CVEs
    NIST Limits NVD Enrichment to High-Priority CVEs
  • Beyond Detection: Engineering the AI Incident Response Control Plane
    Beyond Detection: Engineering the AI Incident Response Control Plane
  • Booking.com Confirms Data Breach
    Booking.com Confirms Data Breach
  • CVE-2026-34621: Adobe Acrobat Reader Prototype Pollution RCE
    CVE-2026-34621: Adobe Acrobat Reader Prototype Pollution RCE
  • McGraw Hill Data Breach — 13.5 Million Records Exposed
    McGraw Hill Data Breach — 13.5 Million Records Exposed
  • CISSP Domain 2 – Privacy Roles – Data Controller vs Processor vs Subject
    CISSP Domain 2 – Privacy Roles – Data Controller vs Processor vs Subject
Archives

Click to Subscribe

Follow Us

  • Facebook
  • Twitter
  • Instagram
Copyright 2026 — TheCyberThrone. All rights reserved. Bloghash WordPress Theme
Scroll to Top