CISA FLAGS SEVEN ACTIVELY EXPLOITED VULNERABILITIES ACROSS MICROSOFT, ADOBE, AND FORTINET SYSTEMS Blogging
KEV CATALOG EXPANSION — F5 BIG-IP REMOTE CODE EXECUTION VULNERABILITY ADDED AFTER ACTIVE EXPLOITATION CONFIRMED Blogging