ThreatCluster
  • Feed
  • Dashboard
  • Saved
THREAT HUNTING
  • Domains
  • IP Addresses
  • File Hashes
  • CVEs
THREAT INTELLIGENCE
  • APT Groups
  • Ransomware Groups
  • Malware Families
  • Attack Types
  • MITRE ATT&CK
  • Security Standards
  • Vulnerability Types
BUSINESS INTELLIGENCE
  • Companies
  • Industry Sectors
  • Security Vendors
  • Government Agencies
  • Countries
  • Platforms
Home / Feed / Article

CISA Adds Cisco ISE and PaperCut Vulnerabilities to Known Exploited Vulnerabilities Catalog

Threat Score:
46
The Cyber Express
7 days ago
Part of cluster #1404

Overview

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical alert, adding three high-impact vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog. These include two unauthenticated remote code execution flaws in Cisco Identity Services Engine (ISE) and one cross-site request forgery (CSRF) vulnerability affecting PaperCut NG/MF software. Critical Cisco ISE Flaws: CVE‑2025‑20281 and CVE‑2025‑20337 The first two vulnerabilities , CVE‑2025‑20281 and CVE‑202...

Continue Reading on Original Site

Related Articles

5 articles
1
CVE-2025-54466: Apache OFBiz: RCE Vulnerability in scrum plugin

CVE-2025-54466: Apache OFBiz: RCE Vulnerability in scrum plugin

OSS Security • 3 hours ago

oss-secmailing list archives CVE-2025-54466: Apache OFBiz: RCE Vulnerability in scrum plugin Current thread: CVE-2025-54466: Apache OFBiz: RCE Vulnerability in scrum pluginNicolas Malin (Aug 05)

Score
90
Read more
2

APT36 Targets Indian Government: Credential Theft Campaign Uncovered

GB Hackers • 4 hours ago

APT36 Targets Indian Government: Credential Theft Campaign Uncovered A sophisticated phishing campaign attributed with medium confidence to the Pakistan-linked APT36 group, also known as Transparent Tribe or Mythic Leopard, has been uncovered targeting Indian defense organizations and government entities. This operation employs typo-squatted domains that mimic official Indian government platforms, such as mail.mgovcloud.in and virtualeoffice.cloud, to deceive users into surrendering credentials.

Score
84
Read more
3

North Korean Hackers Exploit NPM Packages to Steal Cryptocurrency and Sensitive Data

GB Hackers • 5 hours ago

North Korean Hackers Exploit NPM Packages to Steal Cryptocurrency and Sensitive Data Veracode Threat Research has uncovered a sophisticated North Korean cryptocurrency theft operation that continues to evolve, building on campaigns previously reported in February and June 2024. This latest iteration involves twelve malicious NPM packages, including cloud-binary, json-cookie-csv, cloudmedia, and nodemailer-enhancer, which were flagged by automated monitoring systems and subsequently removed from

Score
84
Read more
4

Ransomware Attack on Arkansas Oncology Group Affects 113,500 Individuals

Hipaajournal • 9 hours ago

Highlands Oncology Group, a comprehensive cancer care provider with six locations in Northwest Arkansas, has recently disclosed a cyberattack that […]

Score
84
Read more
5

A New Chapter for AI and Cybersecurity: SentinelOne Acquires Prompt Security

SentinelOne • 6 hours ago

SentinelOne acquires Prompt Security to deliver real-time AI visibility, control, and protection across enterprises. Learn more in this blog.

Score
83
Read more

Save to Folder

Choose a folder to save this article:

Article Intelligence

Key entities and indicators for this article

ATTACK TYPES
Cross-site Request Forgery
Remote Code Execution
VULNERABILITIES
CSRF
Cross-Site Request Forgery
Path Traversal
RCE
Remote Code Execution
COMPANIES
Cisco
AGENCIES
CISA
Cybersecurity and Infrastructure Security Agency
APT GROUPS
APT41
RANSOMWARE
First
Hive
One
Protected
core
ARTICLE INFORMATION
Article #5403
Published 7 days ago
The Cyber Express

We use cookies

We use cookies and similar technologies to enhance your experience, analyse site usage, and assist in our marketing efforts.

Cookie Settings

Essential Cookies

Required for the website to function. Cannot be disabled.

  • Session management and authentication
  • Security and fraud prevention
  • Cookie consent preferences

Analytics Cookies

Help us understand how visitors interact with our website.

  • Plausible Analytics - Privacy-focused usage statistics
  • PostHog - Product analytics and feature tracking
  • Page views and user journey analysis

Performance Cookies

Help us monitor and improve website performance.

  • Page load time monitoring
  • Error tracking and debugging
  • Performance optimisation

Marketing Cookies

Used to track visitors across websites for marketing purposes.

  • Conversion tracking
  • Remarketing campaigns
  • Social media integration