CISA has introduced a new nomination form that lets researchers, vendors, and industry partners outside the U.S. government report vulnerabilities for possible inclusion in the Known Exploited Vulnerabilities catalog. The move is intended to speed up validation, disclosure, and patching of actively exploited bugs, including those tracked in the KEV, as AI accelerates vulnerability discovery and exploitation. #CISA #KEV
Keypoints
- CISA launched a new form for reporting exploited vulnerabilities.
- Researchers, vendors, and industry partners can now submit evidence of exploitation.
- The Known Exploited Vulnerabilities catalog helps prioritize urgent patching.
- Organizations remediate KEV-listed bugs faster than non-KEV vulnerabilities.
- Experts say the new process could improve validation, timeliness, and defensive action.
Read More: https://therecord.media/cisa-to-allow-researchers-to-report-vulnerabilities-kev