CISA Includes Twilio Authy and Internet Explorer Vulnerabilities in Exploited Vulnerabilities List
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has recently updated its Known Exploited Vulnerabilities (KEV) catalog, adding two significant security vulnerabilities linked to active exploitation. These vulnerabilities highlight persistent risks for organizations, particularly those within the federal sphere, and…