Recent changes
This role tracks sources covering Guidance, Enforcement, Rule, Notice, and Consultation instruments. It currently monitors 41 sources for this role out of 2,348 total GovPing sources, with 311 changes in the last 7 days.
Recent alerts include a SAP Patchday disclosing 13 critical vulnerabilities (CVSS 9.9) and an Adobe Acrobat zero‑day (CVE‑2026‑34621) actively exploited. Also flagged are critical ArcGIS CVSS 9.8 flaws and a SharePoint flaw added to CISA's Known Exploited Vulnerabilities catalog.
IEEE Medical Device Registry Enhances Healthcare Cybersecurity
The IEEE Standards Association has launched the IEEE Medical Device Registry, a public database of medical devices that have successfully completed cybersecurity certification under the IEEE 2621 framework. This initiative aims to enhance transparency and trust in healthcare by providing verifiable information on device cybersecurity performance.
Joint Advisory on SD-WAN Appliance Exploitation
The NSA, CISA, and international cybersecurity agencies have issued a joint advisory regarding the exploitation of Cisco SD-WAN appliances. Threat actors are exploiting a specific vulnerability (CVE-2026-20127) to gain root access and establish persistence. The advisory includes a threat hunt guide and mitigation recommendations.
NIST Cybersecurity Framework 2.0 Profiles and Resources
The National Institute of Standards and Technology (NIST) has released updated resources for its Cybersecurity Framework (CSF) 2.0, including organizational profile templates and community profiles. These resources aim to help organizations assess and improve their cybersecurity posture.
NIST Cybersecurity Framework (CSF) 2.0 Anniversary and Updates
NIST is celebrating the two-year anniversary of the Cybersecurity Framework (CSF) 2.0. The blog post highlights updates and resources released over the past two years, including expanded guidance on governance and informative references to other standards, emphasizing the framework's widespread adoption and ongoing development.
NIST CSF 2.0 Cybersecurity Risk Management Guidance
The National Institute of Standards and Technology (NIST) has released version 2.0 of its Cybersecurity Framework (CSF). This updated guidance provides a comprehensive taxonomy for organizations of all sizes and sectors to manage cybersecurity risks, offering a flexible approach to assessing and communicating cybersecurity efforts.
NIST Cybersecurity Framework 2.0 Implementation Resources
The National Institute of Standards and Technology (NIST) has released quick start guides and implementation resources for the Cybersecurity Framework (CSF) 2.0. These resources aim to help organizations of all sizes, including small businesses, understand and implement the updated framework.
SolarWinds Web Help Desk RCE Vulnerability CVE-2025-26399
CISA has added CVE-2025-26399, a critical remote code execution vulnerability in SolarWinds Web Help Desk, to its Known Exploited Vulnerabilities (KEV) catalog. The vulnerability affects versions 12.8.7 and below and allows unauthenticated attackers to run commands on the host machine.
Ivanti EPM Authentication Bypass Vulnerability
CISA has added a vulnerability (CVE-2026-1603) in Ivanti Endpoint Manager (EPM) to its Known Exploited Vulnerabilities (KEV) catalog. The vulnerability, an authentication bypass allowing credential data leakage, affects versions before 2024 SU5.
n8n RCE Vulnerability CVE-2025-68613
CISA has added CVE-2025-68613, a critical Remote Code Execution vulnerability in n8n's workflow evaluation system, to its Known Exploited Vulnerabilities (KEV) catalog. The vulnerability affects versions prior to 1.120.4, 1.121.1, and 1.122.0 and allows authenticated attackers to execute arbitrary code.
Apple Use-After-Free Vulnerability Fixed in iOS/iPadOS 17
CISA has added a use-after-free vulnerability (CVE-2023-41974) affecting Apple iOS and iPadOS to its Known Exploited Vulnerabilities (KEV) catalog. The vulnerability, which could allow an app to execute arbitrary code with kernel privileges, has been fixed by Apple in iOS 17, iPadOS 17, iOS 15.8.7, and iPadOS 15.8.7.
Get daily alerts for cybersecurity
Daily digest delivered to your inbox.
Free. Unsubscribe anytime.
Latest high priority updates
41 official sources tracked
Regs.gov: Cybersecurity and Infrastructure Security Agency
Frequently asked questions
What does this feed cover?
CISA Known Exploited Vulnerabilities catalog, ICS-CERT industrial control system advisories, NSA/CISA joint alerts, NIST Cybersecurity Framework updates, FedRAMP authorization changes, and ENISA EU guidance.
Who is this for?
CISOs, SOC teams, and security compliance officers who need to track government cybersecurity directives and mandatory patching deadlines.
How often is this updated?
GovPing checks source pages multiple times daily. CISA KEV catalog additions are flagged as urgent.
Does this cover NIST framework updates?
Yes. We monitor NIST CSF, 800-series publications, and FedRAMP authorization pages.
Why are KEV additions flagged as urgent?
CISA's Known Exploited Vulnerabilities catalog carries binding operational directives for federal agencies, and most organizations treat it as a mandatory patch list. A new addition means active exploitation in the wild.
Is GovPing free?
Yes. GovPing is free, and always will be. We believe government regulatory data should be accessible to everyone. For custom monitoring of pages we don't cover yet, Changeflow starts at $99/mo.
Need to monitor something else?
GovPing covers the common sources. For niche pages specific to your team, add custom URL monitoring with Changeflow.
Get Cybersecurity alerts
Daily digest of cybersecurity regulatory changes. AI-summarized, no noise.
Free. Unsubscribe anytime.