Changeflow GovPing Cybersecurity

Recent changes

Favicon for changeflow.com

Syntiant Neuromorphic IC Sensor Processing Patent Application

USPTO published patent application US20260100186A1 assigned to Syntiant, covering sensor-processing systems with neuromorphic integrated circuits for keyword spotting. The application was filed December 11, 2025, with inventors Kurt F. Busch, Jeremiah H. Holleman III, Pieter Vorenkamp, Stephen W. Bailey, and David Christopher Garrett. The patent describes systems using neuromorphic ICs with neural networks to extract features from sensor data and arrive at actionable decisions for keyword spotting applications.

Routine Notice Intellectual Property
Favicon for changeflow.com

Distributed Training of Compressed Machine Learning Models

USPTO published patent application US20260099761A1 for an apparatus enabling distributed training of compressed machine learning models using quantization-based parameter compression. The invention manages compressed ML model parameters across distributed systems by cycling between compression and decompression states, allowing efficient parameter synchronization over networks. The application was filed on October 7, 2024.

Routine Notice Intellectual Property
Favicon for changeflow.com

Multi-Language Model-Based Filtering and Labeling of Datasets

The USPTO published patent application US20260100887A1 assigned to Cisco Technology, Inc. The patent covers methods for labeling telemetry data from computer network entities using a combination of N-gram models and large language models. The labeled data is then used to train predictive maintenance models for network infrastructure. The application was filed on July 28, 2025.

Routine Rule Intellectual Property
Favicon for wid.cert-bund.de

Cortex XSOAR Vulnerability, CVSS 8.1, 8th Apr

Cortex XSOAR Vulnerability, CVSS 8.1, 8th Apr

Routine Notice
Favicon for wid.cert-bund.de

GitLab CE/EE Multiple Vulnerabilities CVSS 8.5 Allow Information Disclosure and Data Manipulation

CERT-Bund issued security advisory WID-SEC-2026-1010 identifying multiple vulnerabilities in GitLab CE/EE versions below 18.9.5, 18.10.3, and 18.8.9. The vulnerabilities carry a CVSS Base Score of 8.5 (high) and a CVSS Temporal Score of 7.4 (high), with remote attack capability confirmed. An attacker could exploit these flaws to disclose information, manipulate data, bypass security measures, cause denial-of-service conditions, or execute cross-site scripting attacks.

Priority review Notice Cybersecurity
Favicon for wid.cert-bund.de

Budibase Multiple Critical Vulnerabilities Allow Root Code Execution

CERT-Bund issued security advisory WID-SEC-2026-0990 disclosing multiple critical vulnerabilities in Budibase, an open-source low-code platform. Attackers can exploit these flaws to execute arbitrary code with root privileges, escalate to administrator rights, conduct XSS attacks, manipulate data, cause denial-of-service, or disclose confidential information. CVSS Base Score is 9.6 (critical) and Temporal Score is 8.6 (high). Remote attack is possible.

Urgent Notice Cybersecurity
Favicon for wid.cert-bund.de

Apache Tomcat and Tomcat Native Multiple Vulnerabilities, CVSS 7.3

CERT-Bund issued security advisory WID-SEC-2026-1038 identifying multiple vulnerabilities in Apache Tomcat and Tomcat Native with a CVSS Base Score of 7.3 (high). Affected versions include Apache Tomcat <9.0.117, <10.1.54, <11.0.21, and Tomcat Native <1.3.7, <2.0.14. An attacker can exploit these flaws to bypass security measures, manipulate data, disclose confidential information, and conduct open-redirect attacks.

Priority review Guidance Cybersecurity
4d ago EU AI Act Updates
Favicon for digital-strategy.ec.europa.eu

EU AI Action Plan Reaches Major Milestones After One Year

European Commission releases one-year progress report on AI Continent Action Plan. EU reports 19 AI factories deployed across supercomputers with 13 regional antennas, Data Union Strategy and AI Omnibus launched to unlock data sharing and reduce compliance costs, and EU-India legal gateway office operational for ICT talent movement. Apply AI Strategy has €1 billion in funding earmarked for AI adoption across industrial and public sectors.

Routine Notice Artificial Intelligence
Favicon for changeflow.com

UFP Technologies Cybersecurity Incident Disclosure

UFP Technologies filed a Form 8-K with the SEC disclosing a cybersecurity incident pursuant to Regulation S-K Item 1.05. The disclosure notifies investors of a material cybersecurity event that has occurred at the company. As a public company, UFP Technologies is subject to SEC cybersecurity disclosure requirements that mandate timely reporting of material cybersecurity incidents.

Routine Notice Cybersecurity
Favicon for changeflow.com

Zero-Knowledge Proof Method Patent Application US20260100838A1

USPTO published patent application US20260100838A1 for a computer-implemented zero-knowledge proof method by inventor Enrique LARRAIA. The application, filed August 16, 2023 under Application No. 19114378, covers generating zero-knowledge proofs to verify knowledge of pre-image values using compression function instances across a series of nodes. The invention is classified under H04L 9/3218, H04L 9/0643, and H04L 2209/30.

Routine Notice Intellectual Property

Showing 161–170 of 1,434 changes

1 15 16 17 18 19 144
RSS

Get daily alerts for cybersecurity

Daily digest delivered to your inbox.

Free. Unsubscribe anytime.

Filters

41 official sources tracked

CERT-Bund Security Advisories

Updated 5m ago

USPTO Patent Applications - Networking (H04L)

Updated 9h ago

USPTO Patent Applications - AI & Computing (G06N)

Updated 4m ago

CERT-FR Security Advisories

Updated 32m ago

USPTO Patent Grants - Networking (H04L)

Updated 7d ago

EPO Patent Bulletin - Networking (H04L)

Updated 5m ago

DHS Press Releases

Updated 13m ago

CISA ICS-CERT Advisories

Updated 2d ago

CSA Alerts & Advisories (Singapore)

Updated 18m ago

CISA Known Exploited Vulnerabilities (KEV)

Updated 4h ago

NIST Publications

Updated 19d ago

EDGAR: Cybersecurity Incidents (8-K 1.05)

Updated 4d ago

DHS News

Updated 9d ago

NIST AI News & Updates

Updated 12d ago

JD Supra Technology & Cyber

Updated 18d ago

DHS OIG Reports

Updated 18d ago

NIST News

Updated 18d ago

UK NCSC Alerts & Advisories

Updated 8d ago

CISA Cybersecurity Advisories

Updated 2m ago

FFIEC IT Examination Handbook Updates

Updated 26d ago

IEEE Standards News

Updated 20d ago

EU AI Act Updates

Updated 4d ago

TSA Press Releases

Updated 15d ago

ENISA News

Updated 12d ago

NCSC UK News

Updated 21d ago

NSA Cybersecurity Advisories

Updated 6d ago

FR: Office of the National Cyber Director

Updated 15d ago

Regs.gov: Office of the National Cyber Director

Updated 14d ago

NIST Cybersecurity Framework Updates

Updated 22d ago

EPO Patent Bulletin - AI & Computing (G06N)

Updated --

USPTO Patent Grants - AI & Computing (G06N)

Updated --

FedRAMP Changelog

Updated 1mo ago

Regs.gov: Cybersecurity and Infrastructure Security Agency

Updated 1mo ago

Regs.gov: First Responder Network Authority

Updated 1mo ago

Regs.gov: Privacy and Civil Liberties Oversight Board

Updated 1mo ago

Regs.gov: Information Security Oversight Office

Updated 1mo ago

FR: National Crime Prevention and Privacy Compact Council

Updated 1mo ago

FR: Information Security Oversight Office

Updated 1mo ago

PCI SSC Press Releases

Updated 1mo ago

HITRUST News & Advisories

Updated 1mo ago

NCSC UK Threat Reports

Updated 1mo ago

Frequently asked questions

What does this feed cover?

CISA Known Exploited Vulnerabilities catalog, ICS-CERT industrial control system advisories, NSA/CISA joint alerts, NIST Cybersecurity Framework updates, FedRAMP authorization changes, and ENISA EU guidance.

Who is this for?

CISOs, SOC teams, and security compliance officers who need to track government cybersecurity directives and mandatory patching deadlines.

How often is this updated?

GovPing checks source pages multiple times daily. CISA KEV catalog additions are flagged as urgent.

Does this cover NIST framework updates?

Yes. We monitor NIST CSF, 800-series publications, and FedRAMP authorization pages.

Why are KEV additions flagged as urgent?

CISA's Known Exploited Vulnerabilities catalog carries binding operational directives for federal agencies, and most organizations treat it as a mandatory patch list. A new addition means active exploitation in the wild.

Is GovPing free?

Yes. GovPing is free, and always will be. We believe government regulatory data should be accessible to everyone. For custom monitoring of pages we don't cover yet, Changeflow starts at $99/mo.

Need to monitor something else?

GovPing covers the common sources. For niche pages specific to your team, add custom URL monitoring with Changeflow.

Get Cybersecurity alerts

Daily digest of cybersecurity regulatory changes. AI-summarized, no noise.

Free. Unsubscribe anytime.