<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic CISA Flags Critical Palo Alto Network Flaws Actively Exploited in the Wild in Threats</title>
    <link>https://community.isc2.org/t5/Threats/CISA-Flags-Critical-Palo-Alto-Network-Flaws-Actively-Exploited/m-p/75145#M1423</link>
    <description>&lt;P&gt;Dear all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday warned that two more flaws impacting the Palo Alto Networks Expedition have come under active exploitation in the wild.&lt;/P&gt;&lt;P&gt;To that, it has&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.cisa.gov/news-events/alerts/2024/11/14/cisa-adds-two-known-exploited-vulnerabilities-catalog" target="_blank" rel="noopener"&gt;added&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;the vulnerabilities to its Known Exploited Vulnerabilities (&lt;A href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" target="_blank" rel="noopener"&gt;KEV&lt;/A&gt;) catalog, requiring Federal Civilian Executive Branch (FCEB) agencies to apply the necessary updates by December 5, 2024.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://thehackernews.com/2024/11/cisa-flags-critical-palo-alto-network.html" target="_blank"&gt;CISA Flags Critical Palo Alto Network Flaws Actively Exploited in the Wild&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" target="_blank"&gt;Known Exploited Vulnerabilities Catalog | CISA&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 15 Nov 2024 06:04:47 GMT</pubDate>
    <dc:creator>Kyaw_Myo_Oo</dc:creator>
    <dc:date>2024-11-15T06:04:47Z</dc:date>
    <item>
      <title>CISA Flags Critical Palo Alto Network Flaws Actively Exploited in the Wild</title>
      <link>https://community.isc2.org/t5/Threats/CISA-Flags-Critical-Palo-Alto-Network-Flaws-Actively-Exploited/m-p/75145#M1423</link>
      <description>&lt;P&gt;Dear all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday warned that two more flaws impacting the Palo Alto Networks Expedition have come under active exploitation in the wild.&lt;/P&gt;&lt;P&gt;To that, it has&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.cisa.gov/news-events/alerts/2024/11/14/cisa-adds-two-known-exploited-vulnerabilities-catalog" target="_blank" rel="noopener"&gt;added&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;the vulnerabilities to its Known Exploited Vulnerabilities (&lt;A href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" target="_blank" rel="noopener"&gt;KEV&lt;/A&gt;) catalog, requiring Federal Civilian Executive Branch (FCEB) agencies to apply the necessary updates by December 5, 2024.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://thehackernews.com/2024/11/cisa-flags-critical-palo-alto-network.html" target="_blank"&gt;CISA Flags Critical Palo Alto Network Flaws Actively Exploited in the Wild&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" target="_blank"&gt;Known Exploited Vulnerabilities Catalog | CISA&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Nov 2024 06:04:47 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/CISA-Flags-Critical-Palo-Alto-Network-Flaws-Actively-Exploited/m-p/75145#M1423</guid>
      <dc:creator>Kyaw_Myo_Oo</dc:creator>
      <dc:date>2024-11-15T06:04:47Z</dc:date>
    </item>
  </channel>
</rss>

