CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

CISA launches public nomination form for Known Exploited Vulnerabilities catalog

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

CISA introduced a public Nomination Form to streamline reporting of actively exploited vulnerabilities (KEVs) to its Known Exploited Vulnerabilities Catalog. The form enables researchers, vendors, and industry partners to submit suspected KEVs directly to CISA for validation and rapid inclusion. CISA emphasizes the role of early detection and coordinated disclosure in reducing systemic cyber risk across critical infrastructure and federal networks.

Timeline

  1. 21.05.2026 15:00 1 articles · 3h ago

    CISA launches public KEV nomination form to accelerate threat intelligence sharing

    CISA introduced a public Nomination Form to enable researchers and industry partners to report suspected exploited vulnerabilities directly to its Known Exploited Vulnerabilities (KEV) Catalog. The form integrates with existing VDP and CVD programs and complements email-based submissions. Validated KEVs are published with remediation guidance to support rapid mitigation across critical infrastructure and federal networks.

    Show sources

Information Snippets