Changeflow GovPing Cybersecurity

Recent changes

GovPing monitors sources for this role, covering Guidance, Enforcement, Rule, Notice, and Consultation documents. This role accounts for 41 of the 2503 sources on GovPing, with 281 changes recorded in the last 7 days.

Recent alerts include a Froxlor RCE flaw (CVSS 9.9), a FortiSandbox vulnerability (CVSS 9.8), and SAP's release of 13 critical vulnerabilities (CVSS 9.9). Adobe also patched a ColdFusion code‑execution flaw. All require immediate patching.

Favicon for changeflow.com

Monitoring in distributed computing system

USPTO granted Mastercard International Inc. Patent US12598069B2 covering methods and systems for monitoring services in distributed computing environments. The patent, with 20 claims, describes coordinated monitoring processes where computing nodes track service performance and share monitoring information across the distributed system. The patent was filed on July 2, 2024, establishing intellectual property rights in distributed monitoring technology.

Routine Notice Intellectual Property
Favicon for changeflow.com

Managing Data Encryption During System Upgrades - Red Hat Patent

The USPTO granted Patent US12598065B2 to Red Hat, Inc. covering a system for managing data encryption during system upgrades. The patent contains 20 claims related to detecting component upgrades on computing devices with encrypted data, deactivating links between PCR values and decryption keys prior to boot, provisioning alternative network server links for key authorization, and updating PCR values post-boot.

Routine Notice Intellectual Property
Favicon for wid.cert-bund.de

Red Hat Enterprise Linux crun Privilege Escalation Vulnerability, CVSS 7.8

CERT-Bund issued a security advisory regarding a high-severity vulnerability (CVSS 7.8) in Red Hat Enterprise Linux's crun container runtime. The flaw allows local attackers to escalate privileges on affected systems. Versions prior to RHEL 9 and RHEL 10 are affected. System administrators should apply available mitigations or updates immediately.

Priority review Guidance Cybersecurity
Favicon for wid.cert-bund.de

IBM Maximo Asset Management DoS Vulnerability - CVSS 5.3

CERT-Bund published security advisory WID-SEC-2026-0965 disclosing a Denial of Service vulnerability in IBM Maximo Asset Management versions prior to 7.6.1.3 IF037. The vulnerability carries a CVSS Base Score of 5.3 (medium) and a Temporal Score of 4.6. Remote anonymous attackers can exploit this flaw to conduct DoS attacks against affected installations running on Linux, UNIX, or Windows systems.

Priority review Notice Cybersecurity
Favicon for wid.cert-bund.de

Samsung Android Multiple Critical Vulnerabilities CVSS 9.8

CERT-Bund issued a critical security advisory regarding multiple vulnerabilities in Samsung Android OS versions prior to SMR-APR-2026. The vulnerabilities carry a CVSS Base Score of 9.8 (critical) and enable remote attackers to escalate privileges, bypass security measures, disclose information, and manipulate files. Organizations and consumers using affected Samsung Android devices face immediate risk of exploitation.

Urgent Guidance Cybersecurity
Favicon for wid.cert-bund.de

Keycloak Information Disclosure Vulnerability (CVSS 3.7)

CERT-Bund issued a security advisory (WID-SEC-2026-0970) reporting an information disclosure vulnerability in Keycloak, an open-source identity and access management platform. The vulnerability carries a CVSS Base Score of 3.7 (low severity) and allows remote anonymous attackers to potentially expose sensitive information. Affected systems include Keycloak deployments running on Linux and UNIX operating systems.

Priority review Guidance Cybersecurity
Favicon for wid.cert-bund.de

FasterXML Jackson Vulnerability - Security Bypass (CVSS 7.5)

CERT-Bund issued a security advisory regarding a vulnerability in FasterXML Jackson versions 3.0.0 through 3.1.0. The vulnerability, with a CVSS Base Score of 7.5, allows remote anonymous attackers to bypass security measures in the JSON processing library. Affected platforms include Linux, Windows, UNIX, and other operating systems running Java applications that utilize the library.

Priority review Notice Cybersecurity
Favicon for wid.cert-bund.de

RHEL fontforge Remote Code Execution Vulnerability - CVSS 8.8

CERT-Bund issued a security advisory regarding a critical vulnerability (CVSS 8.8) in Red Hat Enterprise Linux's fontforge component affecting versions prior to RHEL 10, RHEL 9, and RHEL Extended Update Support 9.6. The vulnerability allows remote, unauthenticated attackers to execute arbitrary code on affected systems. Organizations running affected RHEL distributions should apply available mitigations or patches immediately.

Priority review Guidance Cybersecurity
Favicon for wid.cert-bund.de

Avahi DoS Vulnerability Advisory - CVSS 5.5 Medium Severity

CERT-Bund issued advisory WID-SEC-2026-0975 regarding a denial of service vulnerability in Avahi, an open-source network service discovery implementation for Linux/UNIX systems. The vulnerability (CVSS Base Score 5.5, Temporal Score 5.0) allows a local attacker to crash the Avahi service, impacting system availability. Affected products include Open Source avahi versions prior to 0.9-rc4. Organizations running vulnerable Avahi installations should apply patches immediately.

Priority review Guidance Cybersecurity
Favicon for wid.cert-bund.de

CUPS Vulnerability Allows Code Execution with Administrator Rights

CERT-Bund issued a security advisory regarding a vulnerability in CUPS (Common Unix Printing System) that allows local attackers to execute arbitrary code with administrator privileges. The vulnerability has a CVSS Base Score of 5.2 (medium) and affects multiple operating systems including Linux, UNIX, and Windows. Organizations using CUPS should assess their exposure and apply available patches or workarounds.

Priority review Guidance Cybersecurity

Showing 351–360 of 1,352 changes

1 34 35 36 37 38 136
RSS

Get daily alerts for cybersecurity

Daily digest delivered to your inbox.

Free. Unsubscribe anytime.

Filters

42 official sources tracked

CERT-Bund Security Advisories

Updated 31m ago

USPTO Patent Applications - Networking (H04L)

Updated 1d ago

USPTO Patent Applications - AI & Computing (G06N)

Updated 5m ago

USPTO Patent Grants - Networking (H04L)

Updated 8d ago

CERT-FR Security Advisories

Updated 32m ago

DHS Press Releases

Updated 19m ago

CISA ICS-CERT Advisories

Updated 3d ago

CSA Alerts & Advisories (Singapore)

Updated 4m ago

CISA Known Exploited Vulnerabilities (KEV)

Updated 1d ago

NIST Publications

Updated 20d ago

DHS News

Updated 10d ago

EDGAR: Cybersecurity Incidents (8-K 1.05)

Updated 5d ago

UK NCSC Alerts & Advisories

Updated 9d ago

NIST AI News & Updates

Updated 13d ago

JD Supra Technology & Cyber

Updated 19d ago

DHS OIG Reports

Updated 19d ago

NIST News

Updated 19d ago

CISA Cybersecurity Advisories

Updated 1d ago

FFIEC IT Examination Handbook Updates

Updated 27d ago

IEEE Standards News

Updated 21d ago

EU AI Act Updates

Updated 5d ago

TSA Press Releases

Updated 16d ago

EPO Patent Bulletin - Networking (H04L)

Updated 17m ago

NCSC UK News

Updated 22d ago

NSA Cybersecurity Advisories

Updated 7d ago

NIST Cybersecurity Framework Updates

Updated 23d ago

ENISA News

Updated 13d ago

FR: Office of the National Cyber Director

Updated 16d ago

Regs.gov: Office of the National Cyber Director

Updated 15d ago

Regs.gov: Information Security Oversight Office

Updated 1mo ago

FedRAMP Changelog

Updated 1mo ago

FR: National Crime Prevention and Privacy Compact Council

Updated 1mo ago

FR: Information Security Oversight Office

Updated 1mo ago

Regs.gov: Cybersecurity and Infrastructure Security Agency

Updated 1mo ago

Regs.gov: First Responder Network Authority

Updated 1mo ago

Regs.gov: Privacy and Civil Liberties Oversight Board

Updated 1mo ago

PCI SSC Press Releases

Updated 1mo ago

HITRUST News & Advisories

Updated 1mo ago

EPO Patent Bulletin - AI & Computing (G06N)

Updated --

USPTO Patent Grants - AI & Computing (G06N)

Updated --

NCSC UK Threat Reports

Updated 1mo ago

Saudi NCA

Updated --

Frequently asked questions

What does this feed cover?

CISA Known Exploited Vulnerabilities catalog, ICS-CERT industrial control system advisories, NSA/CISA joint alerts, NIST Cybersecurity Framework updates, FedRAMP authorization changes, and ENISA EU guidance.

Who is this for?

CISOs, SOC teams, and security compliance officers who need to track government cybersecurity directives and mandatory patching deadlines.

How often is this updated?

GovPing checks source pages multiple times daily. CISA KEV catalog additions are flagged as urgent.

Does this cover NIST framework updates?

Yes. We monitor NIST CSF, 800-series publications, and FedRAMP authorization pages.

Why are KEV additions flagged as urgent?

CISA's Known Exploited Vulnerabilities catalog carries binding operational directives for federal agencies, and most organizations treat it as a mandatory patch list. A new addition means active exploitation in the wild.

Is GovPing free?

Yes. GovPing is free, and always will be. We believe government regulatory data should be accessible to everyone. For custom monitoring of pages we don't cover yet, Changeflow starts at $99/mo.

Need to monitor something else?

GovPing covers the common sources. For niche pages specific to your team, add custom URL monitoring with Changeflow.

Get Cybersecurity alerts

Daily digest of cybersecurity regulatory changes. AI-summarized, no noise.

Free. Unsubscribe anytime.