KEV: Known Exploited Vulnerability Catalog
Keeping up with new vulnerabilities can be challenging. To help, CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild: the Known Exploited Vulnerability (KEV) catalog. CISA strongly recommends all organizations review and monitor the KEV catalog and prioritize remediation of the listed vulnerabilities to reduce the likelihood of compromise by [...]