Changeflow GovPing Cybersecurity

Recent changes

Favicon for changeflow.com

Enhanced Real-Time Linking Methods and Systems Patent Application

USPTO published patent application US20260100917A1 by Live Nation Entertainment, Inc. on April 9, 2026. The application covers systems and methods for enabling real-time linking between devices and defining assignment conditions for resource access rights.

Routine Notice Intellectual Property
Favicon for www.cisa.gov

Adobe Acrobat Code Execution Vulnerability, CVSS 8.6

CISA added CVE-2026-34621 to its Known Exploited Vulnerabilities (KEV) catalog on April 13, 2026. The vulnerability affects Adobe Acrobat Reader versions 24.001.30356, 26.001.21367 and earlier, with a CVSS score of 8.6. Successful exploitation allows arbitrary code execution via a malicious PDF file through prototype pollution. Federal agencies are subject to Binding Operational Directive 22-01 remediation timelines.

Priority review Notice Cybersecurity
Favicon for www.cisa.gov

CVE-2026-21643: FortiClientEMS SQL Injection Vulnerability

CISA has added CVE-2026-21643 to the Known Exploited Vulnerabilities (KEV) catalog. The vulnerability is a SQL injection flaw in Fortinet FortiClientEMS 7.4.4 allowing unauthenticated remote code execution via crafted HTTP requests. Exploitation is confirmed active, automatable, and achieving total technical impact. CVSS score is 9.1 (CRITICAL). Federal agencies are subject to remediation requirements under Binding Operational Directive 22-01.

Priority review Notice Cybersecurity
Favicon for www.cisa.gov

Adobe Acrobat Use-After-Free Vulnerability CVE-2020-9715

CISA added CVE-2020-9715 to the Known Exploited Vulnerabilities (KEV) catalog. The vulnerability is a use-after-free flaw in Adobe Acrobat and Reader versions 2020.009.20074 and earlier, 2020.001.30002, 2017.011.30171 and earlier, and 2015.006.30523 and earlier. Successful exploitation could lead to arbitrary code execution. The SSVC assessment rates exploitation as 'active' with total technical impact.

Priority review Notice Cybersecurity
Favicon for www.cisa.gov

Windows Common Log File System Driver Elevation of Privilege Vulnerability CVE-2023-36424

CISA has added CVE-2023-36424 to its Known Exploited Vulnerabilities catalog. The vulnerability is a Windows Common Log File System Driver elevation of privilege flaw with a CVSS 3.1 score of 7.8 (HIGH). It affects numerous Windows versions including Windows 10, 11, Server 2019-2022, and legacy systems. CISA has determined this vulnerability has been actively exploited in the wild, triggering remediation requirements for federal agencies under Binding Operational Directive 22-01.

Priority review Notice Cybersecurity
Favicon for www.cisa.gov

CVE-2023-21529: Microsoft Exchange Server RCE Vulnerability Added to Known Exploited Vulnerabilities Catalog

CISA added CVE-2023-21529, a Microsoft Exchange Server remote code execution vulnerability, to the Known Exploited Vulnerabilities (KEV) catalog. The vulnerability carries a CVSS 3.1 score of 8.8 (HIGH) and is attributed to CWE-502 (Deserialization of Untrusted Data). Exploitation is assessed as 'active' with total technical impact and no automatable exploitation vector. Affected versions span Exchange Server 2016 and 2019 across multiple build ranges. Federal agencies are subject to BOD 22-01 remediation requirements for KEV catalog entries.

Priority review Notice Cybersecurity
Favicon for www.cisa.gov

Microsoft Windows Host Process for Windows Tasks Privilege Escalation Vulnerability CVE-2025-60710

CISA added CVE-2025-60710 to the Known Exploited Vulnerabilities catalog on 2026-04-13. The vulnerability is an improper link resolution flaw in Host Process for Windows Tasks enabling local privilege escalation. CVSS 3.1 score is 7.8 (HIGH). Exploitation is active but not automatable per SSVC v2.0.3.

Priority review Notice Cybersecurity
Favicon for www.cisa.gov

CVE-2012-1854: VBA Insecure Library Loading Vulnerability

CISA has cataloged CVE-2012-1854, an untrusted search path vulnerability in VBE6.dll affecting Microsoft Office 2003 SP3, 2007 SP2/SP3, and 2010 Gold/SP1; Microsoft Visual Basic for Applications (VBA); and Summit Microsoft Visual Basic for Applications SDK. The vulnerability allows local users to gain privileges via a Trojan horse DLL in the current working directory. CISA confirms this vulnerability was exploited in the wild in July 2012. CVSS 3.1 score is 7.8 (HIGH) with exploitation status marked as 'active' in the KEV catalog.

Priority review Notice Cybersecurity
Favicon for changeflow.com

ML Model Selects Analytics Based on Wireless Network State

The USPTO published patent application US20260100889A1 for an apparatus and method that uses machine learning models to select analytics services based on wireless network state. The system receives a request for analytics services including a use case parameter, determines an appropriate ML model based on both the use case parameter and current network conditions, and returns analytics information derived from the selected model. The inventors are Konstantinos Samdanis and Dimitrios Karampatsis, with filing date January 4, 2023 and application number 19113887.

Routine Notice Intellectual Property
1d ago DHS Press Releases
Favicon for www.dhs.gov

ICE Arrests Multiple Criminal Aliens Including Pedophiles, Rapists, and Violent Assailants Over Weekend

DHS released a press statement announcing that ICE arrested multiple criminal aliens over a weekend in April 2026. Those arrested were convicted of offenses including aggravated sexual abuse of a child, rape, corporal injuries to spouse or cohabitant, and assault with a deadly weapon. The announcement highlighted ICE enforcement activity across the country targeting individuals present in the US without legal status who had criminal convictions.

Routine Notice Immigration

Showing 91–100 of 1,434 changes

1 8 9 10 11 12 144
RSS

Get daily alerts for cybersecurity

Daily digest delivered to your inbox.

Free. Unsubscribe anytime.

Filters

41 official sources tracked

CERT-Bund Security Advisories

Updated 5m ago

USPTO Patent Applications - Networking (H04L)

Updated 9h ago

USPTO Patent Applications - AI & Computing (G06N)

Updated 4m ago

CERT-FR Security Advisories

Updated 32m ago

USPTO Patent Grants - Networking (H04L)

Updated 7d ago

EPO Patent Bulletin - Networking (H04L)

Updated 5m ago

DHS Press Releases

Updated 13m ago

CISA ICS-CERT Advisories

Updated 2d ago

CSA Alerts & Advisories (Singapore)

Updated 18m ago

CISA Known Exploited Vulnerabilities (KEV)

Updated 4h ago

NIST Publications

Updated 19d ago

EDGAR: Cybersecurity Incidents (8-K 1.05)

Updated 4d ago

DHS News

Updated 9d ago

NIST AI News & Updates

Updated 12d ago

JD Supra Technology & Cyber

Updated 18d ago

DHS OIG Reports

Updated 18d ago

NIST News

Updated 18d ago

UK NCSC Alerts & Advisories

Updated 8d ago

CISA Cybersecurity Advisories

Updated 2m ago

FFIEC IT Examination Handbook Updates

Updated 26d ago

IEEE Standards News

Updated 20d ago

EU AI Act Updates

Updated 4d ago

TSA Press Releases

Updated 15d ago

ENISA News

Updated 12d ago

NCSC UK News

Updated 21d ago

NSA Cybersecurity Advisories

Updated 6d ago

FR: Office of the National Cyber Director

Updated 15d ago

Regs.gov: Office of the National Cyber Director

Updated 14d ago

NIST Cybersecurity Framework Updates

Updated 22d ago

EPO Patent Bulletin - AI & Computing (G06N)

Updated --

USPTO Patent Grants - AI & Computing (G06N)

Updated --

FedRAMP Changelog

Updated 1mo ago

Regs.gov: Cybersecurity and Infrastructure Security Agency

Updated 1mo ago

Regs.gov: First Responder Network Authority

Updated 1mo ago

Regs.gov: Privacy and Civil Liberties Oversight Board

Updated 1mo ago

Regs.gov: Information Security Oversight Office

Updated 1mo ago

FR: National Crime Prevention and Privacy Compact Council

Updated 1mo ago

FR: Information Security Oversight Office

Updated 1mo ago

PCI SSC Press Releases

Updated 1mo ago

HITRUST News & Advisories

Updated 1mo ago

NCSC UK Threat Reports

Updated 1mo ago

Frequently asked questions

What does this feed cover?

CISA Known Exploited Vulnerabilities catalog, ICS-CERT industrial control system advisories, NSA/CISA joint alerts, NIST Cybersecurity Framework updates, FedRAMP authorization changes, and ENISA EU guidance.

Who is this for?

CISOs, SOC teams, and security compliance officers who need to track government cybersecurity directives and mandatory patching deadlines.

How often is this updated?

GovPing checks source pages multiple times daily. CISA KEV catalog additions are flagged as urgent.

Does this cover NIST framework updates?

Yes. We monitor NIST CSF, 800-series publications, and FedRAMP authorization pages.

Why are KEV additions flagged as urgent?

CISA's Known Exploited Vulnerabilities catalog carries binding operational directives for federal agencies, and most organizations treat it as a mandatory patch list. A new addition means active exploitation in the wild.

Is GovPing free?

Yes. GovPing is free, and always will be. We believe government regulatory data should be accessible to everyone. For custom monitoring of pages we don't cover yet, Changeflow starts at $99/mo.

Need to monitor something else?

GovPing covers the common sources. For niche pages specific to your team, add custom URL monitoring with Changeflow.

Get Cybersecurity alerts

Daily digest of cybersecurity regulatory changes. AI-summarized, no noise.

Free. Unsubscribe anytime.