{"id":14047,"date":"2024-10-24T05:51:50","date_gmt":"2024-10-24T10:51:50","guid":{"rendered":"https:\/\/ndisac.org\/dibscc\/?page_id=14047"},"modified":"2025-06-05T09:43:42","modified_gmt":"2025-06-05T14:43:42","slug":"vulnerability-and-threat-information","status":"publish","type":"page","link":"https:\/\/ndisac.org\/dibscc\/cyberassist\/getting-started-with-cybersecurity\/vulnerability-and-threat-information\/","title":{"rendered":"Vulnerability and Threat Information"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; module_class=&#8221;banner-block&#8221; _builder_version=&#8221;4.0.4&#8243; height=&#8221;250px&#8221;][et_pb_fullwidth_header title=&#8221;Vulnerability and Threat Information&#8221; module_id=&#8221;Aboutpg&#8221; _builder_version=&#8221;4.9.2&#8243; title_font=&#8221;Muli|800|||||||&#8221; title_text_color=&#8221;#ffffff&#8221; title_font_size=&#8221;48px&#8221; content_font=&#8221;Muli||||||||&#8221; content_text_color=&#8221;#ffffff&#8221; content_font_size=&#8221;23px&#8221; subhead_text_color=&#8221;#ffffff&#8221; background_color=&#8221;rgba(255, 255, 255, 0)&#8221; background_image=&#8221;https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/10\/dibscc-home.jpg&#8221; background_layout=&#8221;light&#8221; height=&#8221;250px&#8221; custom_padding=&#8221;5%||10%||false|false&#8221; z_index_tablet=&#8221;500&#8243; title_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; title_text_shadow_vertical_length_tablet=&#8221;0px&#8221; title_text_shadow_blur_strength_tablet=&#8221;1px&#8221; content_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; content_text_shadow_vertical_length_tablet=&#8221;0px&#8221; content_text_shadow_blur_strength_tablet=&#8221;1px&#8221; subhead_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; subhead_text_shadow_vertical_length_tablet=&#8221;0px&#8221; subhead_text_shadow_blur_strength_tablet=&#8221;1px&#8221; content_link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; content_link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; content_link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; content_ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; content_ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; content_ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; content_ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; content_ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; content_ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; content_quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; content_quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; content_quote_text_shadow_blur_strength_tablet=&#8221;1px&#8221; button_one_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; button_one_text_shadow_vertical_length_tablet=&#8221;0px&#8221; button_one_text_shadow_blur_strength_tablet=&#8221;1px&#8221; button_two_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; button_two_text_shadow_vertical_length_tablet=&#8221;0px&#8221; button_two_text_shadow_blur_strength_tablet=&#8221;1px&#8221; box_shadow_horizontal_tablet=&#8221;0px&#8221; box_shadow_vertical_tablet=&#8221;0px&#8221; box_shadow_blur_tablet=&#8221;40px&#8221; box_shadow_spread_tablet=&#8221;0px&#8221; box_shadow_horizontal_image_tablet=&#8221;0px&#8221; box_shadow_vertical_image_tablet=&#8221;0px&#8221; box_shadow_blur_image_tablet=&#8221;40px&#8221; box_shadow_spread_image_tablet=&#8221;0px&#8221; box_shadow_horizontal_button_one_tablet=&#8221;0px&#8221; box_shadow_vertical_button_one_tablet=&#8221;0px&#8221; box_shadow_blur_button_one_tablet=&#8221;40px&#8221; box_shadow_spread_button_one_tablet=&#8221;0px&#8221; box_shadow_horizontal_button_two_tablet=&#8221;0px&#8221; box_shadow_vertical_button_two_tablet=&#8221;0px&#8221; box_shadow_blur_button_two_tablet=&#8221;40px&#8221; box_shadow_spread_button_two_tablet=&#8221;0px&#8221; text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_shadow_blur_strength_tablet=&#8221;1px&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover=&#8221;null&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover=&#8221;null&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover=&#8221;null&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover=&#8221;null&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover=&#8221;null&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover=&#8221;null&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover=&#8221;null&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover=&#8221;null&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover=&#8221;null&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover=&#8221;null&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover=&#8221;null&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover=&#8221;null&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover=&#8221;null&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover=&#8221;null&#8221;][\/et_pb_fullwidth_header][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; module_id=&#8221;dibscc-home-about&#8221; _builder_version=&#8221;3.22&#8243;][et_pb_row _builder_version=&#8221;4.1&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.0.47&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.9.2&#8243; vertical_offset_tablet=&#8221;0&#8243; horizontal_offset_tablet=&#8221;0&#8243; hover_enabled=&#8221;0&#8243; z_index_tablet=&#8221;0&#8243; text_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; text_text_shadow_vertical_length_tablet=&#8221;0px&#8221; text_text_shadow_blur_strength_tablet=&#8221;1px&#8221; link_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; link_text_shadow_vertical_length_tablet=&#8221;0px&#8221; link_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ul_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ul_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ul_text_shadow_blur_strength_tablet=&#8221;1px&#8221; ol_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; ol_text_shadow_vertical_length_tablet=&#8221;0px&#8221; ol_text_shadow_blur_strength_tablet=&#8221;1px&#8221; quote_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; quote_text_shadow_vertical_length_tablet=&#8221;0px&#8221; quote_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_2_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_2_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_2_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_3_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_3_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_3_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_4_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_4_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_4_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_5_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_5_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_5_text_shadow_blur_strength_tablet=&#8221;1px&#8221; header_6_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; header_6_text_shadow_vertical_length_tablet=&#8221;0px&#8221; header_6_text_shadow_blur_strength_tablet=&#8221;1px&#8221; box_shadow_horizontal_tablet=&#8221;0px&#8221; box_shadow_vertical_tablet=&#8221;0px&#8221; box_shadow_blur_tablet=&#8221;40px&#8221; box_shadow_spread_tablet=&#8221;0px&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>The National Institute of Standards and Technology (NIST) defines a vulnerability as a weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source. (<a href=\"https:\/\/nvlpubs.nist.gov\/nistpubs\/Legacy\/SP\/nistspecialpublication800-137.pdf\">Source<\/a>). The latest threat and vulnerability information from multiple sources including: CISA, US-Cert, SANS, National Vulnerability Database, and the MITRE Corporation.<\/p>\n<p>[\/et_pb_text][et_pb_toggle title=&#8221;CISA\/ US CERT Cyber Announcements&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; title_level=&#8221;h2&#8243; title_font_size=&#8221;30px&#8221;]<\/p>\n<!-- Beginning of Link Library Output --><div id='linklist1' class='linklist'><!-- Div Linklist -->\n<div class=\"LinkLibraryCat LinkLibraryCat590 level0\"><!-- Div Category -->\n\t<ul>\n<li><a href=\"https:\/\/www.cisa.gov\/news-events\/news\" id=\"link-1654\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">CISA\/ US CERT Cyber Announcements<\/a>\n<p>The following announcements highlight recent cybersecurity news including alerts, threats, vulnerabilities, and malicious activity. They also include up-to-date information on available updates and patches for your operating systems.<\/p>\r\n<p><div class=\"wprss_ajax\" data-id=\"rssb0e71b0082\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/wp-rss-retriever\/inc\/imgs\/ajax-loader.gif\" alt=\"Loading RSS Feed\" width=\"16\" height=\"16\"><\/div><\/p><\/li>\n\t<\/ul>\n<\/div><!-- Div End Category -->\n<script type='text\/javascript'>\njQuery(document).ready(function()\n{\njQuery('.arrow-up').hide();\njQuery('#linklist1 a.track_this_link').click(function() {\nlinkid = this.id;\nlinkid = linkid.substring(5);\npath = '';\njQuery.ajax( {    type: 'POST',    url: 'https:\/\/ndisac.org\/dibscc\/wp-admin\/admin-ajax.php',     data: { action: 'link_library_tracker',             _ajax_nonce: 'a6f209b022',             id:linkid, xpath:path }     });\nreturn true;\n});\njQuery('#linklist1 .expandlinks').click(function() {\ntarget = '.' + jQuery(this).attr('id');\nsubcattarget = '.' + jQuery(this).attr('data-subcat');\nif ( jQuery( target ).is(':visible') ) {\njQuery(target).slideUp();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/expand-32.png');\n} else {\njQuery(target).slideDown();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/collapse-32.png');\n}\n});\njQuery('#linklist1 .linklistcatclass').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\njQuery('#linklist1 .linklistcatnamedesc').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\n});\n<\/script>\n<\/div><!-- Div Linklist -->\n<!-- End of Link Library Output -->\n\n\n<p>[\/et_pb_toggle][et_pb_toggle title=&#8221;Cybersecurity and Infrastructure Security Agency Alerts&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; title_level=&#8221;h2&#8243; title_font_size=&#8221;30px&#8221;]<\/p>\n<!-- Beginning of Link Library Output --><div id='linklist1' class='linklist'><!-- Div Linklist -->\n<div class=\"LinkLibraryCat LinkLibraryCat591 level0\"><!-- Div Category -->\n\t<ul>\n<li><a href=\"https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\" id=\"link-1640\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">Cybersecurity and Infrastructure Security Agency Alerts<\/a>\n<p>Cybersecurity and Infrastructure Security Agency (CISA) alerts provide timely information about current security issues, vulnerabilities, and exploits.<div class=\"wprss_ajax\" data-id=\"rssa2f6611824\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/wp-rss-retriever\/inc\/imgs\/ajax-loader.gif\" alt=\"Loading RSS Feed\" width=\"16\" height=\"16\"><\/div><\/p><\/li>\n\t<\/ul>\n<\/div><!-- Div End Category -->\n<script type='text\/javascript'>\njQuery(document).ready(function()\n{\njQuery('.arrow-up').hide();\njQuery('#linklist1 a.track_this_link').click(function() {\nlinkid = this.id;\nlinkid = linkid.substring(5);\npath = '';\njQuery.ajax( {    type: 'POST',    url: 'https:\/\/ndisac.org\/dibscc\/wp-admin\/admin-ajax.php',     data: { action: 'link_library_tracker',             _ajax_nonce: 'a6f209b022',             id:linkid, xpath:path }     });\nreturn true;\n});\njQuery('#linklist1 .expandlinks').click(function() {\ntarget = '.' + jQuery(this).attr('id');\nsubcattarget = '.' + jQuery(this).attr('data-subcat');\nif ( jQuery( target ).is(':visible') ) {\njQuery(target).slideUp();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/expand-32.png');\n} else {\njQuery(target).slideDown();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/collapse-32.png');\n}\n});\njQuery('#linklist1 .linklistcatclass').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\njQuery('#linklist1 .linklistcatnamedesc').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\n});\n<\/script>\n<\/div><!-- Div Linklist -->\n<!-- End of Link Library Output -->\n\n\n<p>[\/et_pb_toggle][et_pb_toggle title=&#8221;SANS Internet Storm Center&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; title_level=&#8221;h2&#8243; title_font_size=&#8221;30px&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<\/p>\n<!-- Beginning of Link Library Output --><div id='linklist1' class='linklist'><!-- Div Linklist -->\n<div class=\"LinkLibraryCat LinkLibraryCat592 level0\"><!-- Div Category -->\n\t<ul>\n<li><a href=\"https:\/\/isc.sans.edu\/\" id=\"link-16737\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">SANS &#8211; Internet Storm Center<\/a>\n<p>Part of the SANS Technology Institute, the Internet Storm Center (ISC) stands as a beacon of vigilance and resilience in the ever-evolving landscape of cybersecurity. <div class=\"wprss_ajax\" data-id=\"rss9ef07c61a5\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/wp-rss-retriever\/inc\/imgs\/ajax-loader.gif\" alt=\"Loading RSS Feed\" width=\"16\" height=\"16\"><\/div><\/p><\/li>\n\t<\/ul>\n<\/div><!-- Div End Category -->\n<script type='text\/javascript'>\njQuery(document).ready(function()\n{\njQuery('.arrow-up').hide();\njQuery('#linklist1 a.track_this_link').click(function() {\nlinkid = this.id;\nlinkid = linkid.substring(5);\npath = '';\njQuery.ajax( {    type: 'POST',    url: 'https:\/\/ndisac.org\/dibscc\/wp-admin\/admin-ajax.php',     data: { action: 'link_library_tracker',             _ajax_nonce: 'a6f209b022',             id:linkid, xpath:path }     });\nreturn true;\n});\njQuery('#linklist1 .expandlinks').click(function() {\ntarget = '.' + jQuery(this).attr('id');\nsubcattarget = '.' + jQuery(this).attr('data-subcat');\nif ( jQuery( target ).is(':visible') ) {\njQuery(target).slideUp();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/expand-32.png');\n} else {\njQuery(target).slideDown();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/collapse-32.png');\n}\n});\njQuery('#linklist1 .linklistcatclass').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\njQuery('#linklist1 .linklistcatnamedesc').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\n});\n<\/script>\n<\/div><!-- Div Linklist -->\n<!-- End of Link Library Output -->\n\n\n<p>[\/et_pb_toggle][et_pb_toggle title=&#8221;NVD and MITRE Databases&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; title_level=&#8221;h2&#8243; title_font_size=&#8221;30px&#8221;]<\/p>\n<!-- Beginning of Link Library Output --><div id='linklist1' class='linklist'><!-- Div Linklist -->\n<div class=\"LinkLibraryCat LinkLibraryCat593 level0\"><!-- Div Category -->\n\t<ul>\n<li><a href=\"https:\/\/nvd.nist.gov\" id=\"link-1637\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">National Vulnerability Database<\/a>\n<p>The NVD is the U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data enables automation of vulnerability management, security measurement, and compliance. The NVD includes databases of security checklist references, security-related software flaws, misconfigurations, product names, and impact metrics.<\/p><\/li>\n<li><a href=\"https:\/\/www.cve.org\/\" id=\"link-1635\" class=\"track_this_link \" rel=\"noopener noreferrer\" target=\"_blank\">The MITRE Corporation &#8211; Common Vulnerabilities Exposure<\/a>\n<p>Common Vulnerabilities Exposure is a list of entries - each containing an identification number, a description, and at least one public reference - for publicly known cybersecurity vulnerabilities.<\/p><\/li>\n\t<\/ul>\n<\/div><!-- Div End Category -->\n<script type='text\/javascript'>\njQuery(document).ready(function()\n{\njQuery('.arrow-up').hide();\njQuery('#linklist1 a.track_this_link').click(function() {\nlinkid = this.id;\nlinkid = linkid.substring(5);\npath = '';\njQuery.ajax( {    type: 'POST',    url: 'https:\/\/ndisac.org\/dibscc\/wp-admin\/admin-ajax.php',     data: { action: 'link_library_tracker',             _ajax_nonce: 'a6f209b022',             id:linkid, xpath:path }     });\nreturn true;\n});\njQuery('#linklist1 .expandlinks').click(function() {\ntarget = '.' + jQuery(this).attr('id');\nsubcattarget = '.' + jQuery(this).attr('data-subcat');\nif ( jQuery( target ).is(':visible') ) {\njQuery(target).slideUp();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/expand-32.png');\n} else {\njQuery(target).slideDown();\njQuery(subcattarget).slideToggle();\njQuery(this).children('img').attr('src', 'https:\/\/ndisac.org\/dibscc\/wp-content\/plugins\/link-library\/icons\/collapse-32.png');\n}\n});\njQuery('#linklist1 .linklistcatclass').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\njQuery('#linklist1 .linklistcatnamedesc').click(function() {\njQuery(this).siblings('.expandlinks').click();\n});\n});\n<\/script>\n<\/div><!-- Div Linklist -->\n<!-- End of Link Library Output -->\n\n\n<p>[\/et_pb_toggle][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; module_class=&#8221;banner-block&#8221; _builder_version=&#8221;4.0.4&#8243; height=&#8221;250px&#8221;][et_pb_fullwidth_header title=&#8221;Vulnerability and Threat Information&#8221; module_id=&#8221;Aboutpg&#8221; _builder_version=&#8221;4.9.2&#8243; title_font=&#8221;Muli|800|||||||&#8221; title_text_color=&#8221;#ffffff&#8221; title_font_size=&#8221;48px&#8221; content_font=&#8221;Muli||||||||&#8221; content_text_color=&#8221;#ffffff&#8221; content_font_size=&#8221;23px&#8221; subhead_text_color=&#8221;#ffffff&#8221; background_color=&#8221;rgba(255, 255, 255, 0)&#8221; background_image=&#8221;https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/10\/dibscc-home.jpg&#8221; background_layout=&#8221;light&#8221; height=&#8221;250px&#8221; custom_padding=&#8221;5%||10%||false|false&#8221; z_index_tablet=&#8221;500&#8243; title_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; title_text_shadow_vertical_length_tablet=&#8221;0px&#8221; [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":0,"parent":14043,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"Welcome to National Defense ISAC Sites. This is your first post. Edit or delete it, then start blogging!","_et_gb_content_width":"","footnotes":""},"class_list":["post-14047","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Vulnerability and Threat Information - DIB SCC CyberAssist<\/title>\n<meta name=\"description\" content=\"Helpful information and links are provided to assist organizations with cybersecurity vulnerability and threat information.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/getting-started-with-cybersecurity\/vulnerability-and-threat-information\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vulnerability and Threat Information - DIB SCC CyberAssist\" \/>\n<meta property=\"og:description\" content=\"Helpful information and links are provided to assist organizations with cybersecurity vulnerability and threat information.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ndisac.org\/dibscc\/cyberassist\/getting-started-with-cybersecurity\/vulnerability-and-threat-information\/\" \/>\n<meta property=\"og:site_name\" content=\"DIB SCC CyberAssist\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-05T14:43:42+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/cyberassist\/getting-started-with-cybersecurity\/vulnerability-and-threat-information\/\",\"url\":\"https:\/\/ndisac.org\/dibscc\/cyberassist\/getting-started-with-cybersecurity\/vulnerability-and-threat-information\/\",\"name\":\"Vulnerability and Threat Information - DIB SCC CyberAssist\",\"isPartOf\":{\"@id\":\"https:\/\/ndisac.org\/dibscc\/#website\"},\"datePublished\":\"2024-10-24T10:51:50+00:00\",\"dateModified\":\"2025-06-05T14:43:42+00:00\",\"description\":\"Helpful information and links are provided to assist organizations with cybersecurity vulnerability and threat information.\",\"breadcrumb\":{\"@id\":\"https:\/\/ndisac.org\/dibscc\/cyberassist\/getting-started-with-cybersecurity\/vulnerability-and-threat-information\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ndisac.org\/dibscc\/cyberassist\/getting-started-with-cybersecurity\/vulnerability-and-threat-information\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/cyberassist\/getting-started-with-cybersecurity\/vulnerability-and-threat-information\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ndisac.org\/dibscc\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CyberAssist\",\"item\":\"https:\/\/ndisac.org\/dibscc\/cyberassist\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Getting Started with Cybersecurity\",\"item\":\"https:\/\/ndisac.org\/dibscc\/cyberassist\/getting-started-with-cybersecurity\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Vulnerability and Threat Information\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/#website\",\"url\":\"https:\/\/ndisac.org\/dibscc\/\",\"name\":\"DIB SCC CyberAssist\",\"description\":\"Cybersecurity Resources for DIB companies and suppliers\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ndisac.org\/dibscc\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vulnerability and Threat Information - DIB SCC CyberAssist","description":"Helpful information and links are provided to assist organizations with cybersecurity vulnerability and threat information.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ndisac.org\/dibscc\/cyberassist\/getting-started-with-cybersecurity\/vulnerability-and-threat-information\/","og_locale":"en_US","og_type":"article","og_title":"Vulnerability and Threat Information - DIB SCC CyberAssist","og_description":"Helpful information and links are provided to assist organizations with cybersecurity vulnerability and threat information.","og_url":"https:\/\/ndisac.org\/dibscc\/cyberassist\/getting-started-with-cybersecurity\/vulnerability-and-threat-information\/","og_site_name":"DIB SCC CyberAssist","article_modified_time":"2025-06-05T14:43:42+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ndisac.org\/dibscc\/cyberassist\/getting-started-with-cybersecurity\/vulnerability-and-threat-information\/","url":"https:\/\/ndisac.org\/dibscc\/cyberassist\/getting-started-with-cybersecurity\/vulnerability-and-threat-information\/","name":"Vulnerability and Threat Information - DIB SCC CyberAssist","isPartOf":{"@id":"https:\/\/ndisac.org\/dibscc\/#website"},"datePublished":"2024-10-24T10:51:50+00:00","dateModified":"2025-06-05T14:43:42+00:00","description":"Helpful information and links are provided to assist organizations with cybersecurity vulnerability and threat information.","breadcrumb":{"@id":"https:\/\/ndisac.org\/dibscc\/cyberassist\/getting-started-with-cybersecurity\/vulnerability-and-threat-information\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ndisac.org\/dibscc\/cyberassist\/getting-started-with-cybersecurity\/vulnerability-and-threat-information\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/ndisac.org\/dibscc\/cyberassist\/getting-started-with-cybersecurity\/vulnerability-and-threat-information\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ndisac.org\/dibscc\/"},{"@type":"ListItem","position":2,"name":"CyberAssist","item":"https:\/\/ndisac.org\/dibscc\/cyberassist\/"},{"@type":"ListItem","position":3,"name":"Getting Started with Cybersecurity","item":"https:\/\/ndisac.org\/dibscc\/cyberassist\/getting-started-with-cybersecurity\/"},{"@type":"ListItem","position":4,"name":"Vulnerability and Threat Information"}]},{"@type":"WebSite","@id":"https:\/\/ndisac.org\/dibscc\/#website","url":"https:\/\/ndisac.org\/dibscc\/","name":"DIB SCC CyberAssist","description":"Cybersecurity Resources for DIB companies and suppliers","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ndisac.org\/dibscc\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"rttpg_featured_image_url":null,"rttpg_author":{"display_name":"markcarr","author_link":"https:\/\/ndisac.org\/dibscc\/author\/markcarr\/"},"rttpg_comment":0,"rttpg_category":null,"rttpg_excerpt":"[et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; module_class=&#8221;banner-block&#8221; _builder_version=&#8221;4.0.4&#8243; height=&#8221;250px&#8221;][et_pb_fullwidth_header title=&#8221;Vulnerability and Threat Information&#8221; module_id=&#8221;Aboutpg&#8221; _builder_version=&#8221;4.9.2&#8243; title_font=&#8221;Muli|800|||||||&#8221; title_text_color=&#8221;#ffffff&#8221; title_font_size=&#8221;48px&#8221; content_font=&#8221;Muli||||||||&#8221; content_text_color=&#8221;#ffffff&#8221; content_font_size=&#8221;23px&#8221; subhead_text_color=&#8221;#ffffff&#8221; background_color=&#8221;rgba(255, 255, 255, 0)&#8221; background_image=&#8221;https:\/\/ndisac.org\/dibscc\/wp-content\/uploads\/sites\/2\/2019\/10\/dibscc-home.jpg&#8221; background_layout=&#8221;light&#8221; height=&#8221;250px&#8221; custom_padding=&#8221;5%||10%||false|false&#8221; z_index_tablet=&#8221;500&#8243; title_text_shadow_horizontal_length_tablet=&#8221;0px&#8221; title_text_shadow_vertical_length_tablet=&#8221;0px&#8221; [&hellip;]","_links":{"self":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/pages\/14047"}],"collection":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/comments?post=14047"}],"version-history":[{"count":15,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/pages\/14047\/revisions"}],"predecessor-version":[{"id":16740,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/pages\/14047\/revisions\/16740"}],"up":[{"embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/pages\/14043"}],"wp:attachment":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/media?parent=14047"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}