Known Exploited Vulnerabilities

Keeping track of the software and hardware you use, that then are discovered to have security flaws in them is important, especially if those flaws are being exploited by threat actors. The quicker you or the people responsible for your cyber security know there are issues, the quicker any available patches can be applied.

That is why we use the the US government Cybersecurity and Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities database. They have recently alerted everyone to eight issues covering both hardware and software including, Samsung, Zyxel, Realtek, MinIO, Laravel, and Owl Labs.

Known Exploited Vulnerabilities Catalog | CISA

My advice: Either you or your IT support need to check whether these issues impact your systems. You need to have a master document that details your systems, hardware, software, online, networks, back-ups, suppliers etc – so when cyber security (or operational) issues arise you and your support teams can quickly check if you are affected. From there you can take fast, effective action.

CISA also releases industrial control system advisories – if you are responsible for these types of systems you should monitor their news page:

Current Activity | CISA

Clive Catton MSc (Cyber Security) – by-line and other articles