Exploited Vulnerabilities

The US government Cybersecurity and Infrastructure Security Agency (CISA) has added a number of products to its Known Exploited Vulnerabilities Catalog, including products from Microsoft, Red Hat, Arm and Google.

Known Exploited Vulnerabilities Catalog | CISA

Our penetration testing suite and this database is probably one of my most visited resources when it comes to helping clients determine if they have a problem.

Clive Catton MSc (Cyber Security) – by-line and other articles

CISA also releases industrial control system advisories – if you are responsible for these types of systems you should monitor their news page:

Current Activity | CISA

My advice: Either you or your IT support need to check whether these issues impact your systems. You need to have a master document that details your systems, hardware, software, online, networks, back-ups, suppliers etc – so when cyber security (or operational) issues arise you and your support teams can quickly check if you are affected. From there you can take fast, effective action.