Changeflow GovPing Cybersecurity

Recent changes

This role tracks sources covering Guidance, Enforcement, Rule, Notice, and Consultation instruments. It currently monitors 41 sources for this role out of 2,348 total GovPing sources, with 311 changes in the last 7 days.

Recent alerts include a SAP Patchday disclosing 13 critical vulnerabilities (CVSS 9.9) and an Adobe Acrobat zero‑day (CVE‑2026‑34621) actively exploited. Also flagged are critical ArcGIS CVSS 9.8 flaws and a SharePoint flaw added to CISA's Known Exploited Vulnerabilities catalog.

Favicon for www.cert.ssi.gouv.fr

Spring Cloud Gateway Vulnerability CVE-2026-22750

CERT-FR issued advisory CERTFR-2026-AVI-0417 regarding CVE-2026-22750, a vulnerability in Spring Cloud Gateway affecting versions 4.2.x prior to 4.2.1. The flaw permits an attacker to exploit an unspecified security issue. French organizations using affected versions should consult the Spring security bulletin for available patches.

Priority review Guidance Cybersecurity
Favicon for www.cert.ssi.gouv.fr

Juniper Privilege Escalation Vulnerability in Junos OS

CERT-FR issued a security advisory alerting that Juniper Networks Junos OS and Junos OS Evolved contain a privilege escalation vulnerability (CVE-2026-33793). An attacker with local low-privileged access can exploit unsigned Python op-script configurations to compromise the system. Multiple versions of Junos OS and Junos OS Evolved across branches 22.4 through 25.2 are affected. Patches have been released by Juniper Networks.

Priority review Notice Cybersecurity
Favicon for www.cert.ssi.gouv.fr

Multiple Vulnerabilities in Tenable Security Center Allow Remote Code Execution

CERT-FR published advisory CERTFR-2026-AVI-0415 disclosing four critical vulnerabilities (CVE-2026-2003 through CVE-2026-2006) in Tenable Security Center versions 6.5.1 through 6.8.0. The vulnerabilities allow remote code execution and data confidentiality breaches without requiring authentication. Affected organizations must apply patch SC202604.1 from Tenable security bulletin tns-2026-10.

Priority review Notice Cybersecurity
Favicon for wid.cert-bund.de

Security Flaw in Dell EMC Isilon, CVSS 8.8

Security Flaw in Dell EMC Isilon, CVSS 8.8

Routine Notice
Favicon for wid.cert-bund.de

Adobe Acrobat Reader Remote Code Execution Vulnerability CVE-2026-1047

CERT-Bund issued a critical security advisory for Adobe Acrobat Reader vulnerability CVE-2026-1047 with CVSS Base Score of 9.6. The flaw allows remote, unauthenticated attackers to execute arbitrary code and gain full administrative control of affected systems running Windows, UNIX, and other operating systems. Adobe Acrobat Reader versions up to and including 26.001.21367 are affected.

Priority review Notice Cybersecurity
Favicon for wid.cert-bund.de

Red Hat Products Multiple Vulnerabilities Allow Admin Privilege Escalation

CERT-Bund issued security advisory WID-SEC-2026-1033 warning of multiple vulnerabilities in Red Hat products including Ansible Automation Platform, Enterprise Linux, OpenShift, and Process Automation Manager. Local attackers can exploit these flaws to gain administrator privileges. CVSS base score is 6.4 (medium) with temporal score of 5.9. No remote attack vector exists.

Priority review Notice Cybersecurity
Favicon for wid.cert-bund.de

Checkmk Multiple Vulnerabilities Allow Remote Attackers Unspecified Impacts

CERT-Bund issued security advisory WID-SEC-2026-1050 regarding multiple vulnerabilities in Checkmk IT monitoring software. Affected versions include those prior to 2.6.0b1, 2.5.0b4, 2.4.0p26, and 2.3.0p47. An authenticated remote attacker can exploit these vulnerabilities for unspecified impacts. CVSS Base Score is 6.3 (medium) with CVSS Temporal Score of 5.5.

Priority review Guidance Cybersecurity
Favicon for wid.cert-bund.de

Linux Kernel Vulnerability Allows Physical Access Attacks

CERT-Bund issued security advisory WID-SEC-2026-1049 warning of a vulnerability in the Linux kernel affecting versions prior to 6.1.167, 6.6.130, 6.12.78, 6.18.19, 6.19.9, and 7.0-rc4. Attackers with physical access can exploit the flaw to cause denial of service, execute arbitrary code, or disclose information. The CVSS Base Score is 6.8 (medium). Remote attack is not possible, and mitigations are available.

Priority review Guidance Cybersecurity
Favicon for wid.cert-bund.de

Multiple Vulnerabilities in Helm Allow Arbitrary Code Execution

CERT-Bund published security advisory WID-SEC-2026-1048 disclosing multiple vulnerabilities in Helm (Kubernetes package manager) with a CVSS Base Score of 8.6 (high). Affected versions include helm <4.1.4 and helm <3.20.2. An attacker can exploit these vulnerabilities to manipulate files, bypass security measures, and potentially execute arbitrary code.

Routine Notice Cybersecurity
6d ago DHS Press Releases
Favicon for www.dhs.gov

ICE Arrests Criminal Illegal Aliens Convicted of Child Abuse, Assault, and Robbery

ICE announced arrests of criminal illegal aliens convicted of injury to a child, assault with a semiautomatic firearm, aggravated assault with a deadly weapon, robbery, and other crimes. The announcement coincides with the one-year anniversary of the reopening of the VOICE Office, which provides resources to victims of crimes with an immigration nexus.

Routine Notice Immigration

Showing 241–250 of 1,457 changes

1 23 24 25 26 27 146
RSS

Get daily alerts for cybersecurity

Daily digest delivered to your inbox.

Free. Unsubscribe anytime.

Filters

41 official sources tracked

CERT-Bund Security Advisories

Updated 4m ago

USPTO Patent Applications - Networking (H04L)

Updated 9h ago

USPTO Patent Applications - AI & Computing (G06N)

Updated 4m ago

CERT-FR Security Advisories

Updated 32m ago

USPTO Patent Grants - Networking (H04L)

Updated 7d ago

EPO Patent Bulletin - Networking (H04L)

Updated 39m ago

DHS Press Releases

Updated 13m ago

CISA ICS-CERT Advisories

Updated 2d ago

CSA Alerts & Advisories (Singapore)

Updated 18m ago

CISA Known Exploited Vulnerabilities (KEV)

Updated 4h ago

NIST Publications

Updated 19d ago

EDGAR: Cybersecurity Incidents (8-K 1.05)

Updated 4d ago

DHS News

Updated 9d ago

NIST AI News & Updates

Updated 12d ago

JD Supra Technology & Cyber

Updated 18d ago

DHS OIG Reports

Updated 18d ago

NIST News

Updated 18d ago

UK NCSC Alerts & Advisories

Updated 8d ago

CISA Cybersecurity Advisories

Updated 2m ago

FFIEC IT Examination Handbook Updates

Updated 26d ago

IEEE Standards News

Updated 20d ago

EU AI Act Updates

Updated 4d ago

TSA Press Releases

Updated 15d ago

ENISA News

Updated 12d ago

NCSC UK News

Updated 21d ago

NSA Cybersecurity Advisories

Updated 6d ago

FR: Office of the National Cyber Director

Updated 15d ago

Regs.gov: Office of the National Cyber Director

Updated 14d ago

NIST Cybersecurity Framework Updates

Updated 22d ago

EPO Patent Bulletin - AI & Computing (G06N)

Updated --

USPTO Patent Grants - AI & Computing (G06N)

Updated --

FedRAMP Changelog

Updated 1mo ago

Regs.gov: Cybersecurity and Infrastructure Security Agency

Updated 1mo ago

Regs.gov: First Responder Network Authority

Updated 1mo ago

Regs.gov: Privacy and Civil Liberties Oversight Board

Updated 1mo ago

Regs.gov: Information Security Oversight Office

Updated 1mo ago

FR: National Crime Prevention and Privacy Compact Council

Updated 1mo ago

FR: Information Security Oversight Office

Updated 1mo ago

PCI SSC Press Releases

Updated 1mo ago

HITRUST News & Advisories

Updated 1mo ago

NCSC UK Threat Reports

Updated 1mo ago

Frequently asked questions

What does this feed cover?

CISA Known Exploited Vulnerabilities catalog, ICS-CERT industrial control system advisories, NSA/CISA joint alerts, NIST Cybersecurity Framework updates, FedRAMP authorization changes, and ENISA EU guidance.

Who is this for?

CISOs, SOC teams, and security compliance officers who need to track government cybersecurity directives and mandatory patching deadlines.

How often is this updated?

GovPing checks source pages multiple times daily. CISA KEV catalog additions are flagged as urgent.

Does this cover NIST framework updates?

Yes. We monitor NIST CSF, 800-series publications, and FedRAMP authorization pages.

Why are KEV additions flagged as urgent?

CISA's Known Exploited Vulnerabilities catalog carries binding operational directives for federal agencies, and most organizations treat it as a mandatory patch list. A new addition means active exploitation in the wild.

Is GovPing free?

Yes. GovPing is free, and always will be. We believe government regulatory data should be accessible to everyone. For custom monitoring of pages we don't cover yet, Changeflow starts at $99/mo.

Need to monitor something else?

GovPing covers the common sources. For niche pages specific to your team, add custom URL monitoring with Changeflow.

Get Cybersecurity alerts

Daily digest of cybersecurity regulatory changes. AI-summarized, no noise.

Free. Unsubscribe anytime.