Cybersecurity and Infrastructure Security Agency
@CISAgov
Official communications from CISA on X will always originate from this account. No other accounts are authorized to convey info from CISA or senior CISA staff.
#DYK 95% of data breaches are caused by human error. 😬Clicking sketchy links, using weak passwords, or skipping MFA. Yikes! 💻@CISAgov’s tools can help you protect your business, teams, & customers.🛡️Check them out: go.dhs.gov/3P8 #FunFactFriday
Teamwork makes the dream work!🤝The @CISAgov team connected with TOP cloud service partners to help increase federal civilian network defense for the nation! 🇺🇸 It’s time to secure our cloud identity infrastructure! #AmericaFirst 🛡️💪
We are working side-by-side with cloud service providers to foster discovery and discussion of best practices for strengthening cloud identity security. See how we’re helping to secure cloud identity infrastructure: 👉 go.dhs.gov/wvX
Thanks to approximately 50 tech reps from partner cloud orgs who joined our Cloud Identity Security Tech Exchange. This event facilitated vital knowledge transfer to harden cloud identity infrastructure, raising the cybersecurity & bolstering network defense.
We are working side-by-side with cloud service providers to foster discovery and discussion of best practices for strengthening cloud identity security. See how we’re helping to secure cloud identity infrastructure: 👉 go.dhs.gov/wvX
Interested in becoming a cyber assessor? Our AES Program offers free, on-demand assessment training courses that provide you with the skills you need to safeguard the nation’s critical infrastructure. Learn more: cisa.gov/aes

Update: See newly added info to our #ToolShell Alert. We’ve included info on ransomware deployment, new webshells involved in exploitation, & detection guidance 👉 go.dhs.gov/i4J
CISA Acting Director Gottumukkala hosted Mr. David Koh, Chief Executive, Cyber Security Agency of Singapore @CSAsingapore. We are working to strengthen our partnership with Singapore and continue collaborating on cybersecurity issues.

Update: As we continue to monitor the scope & impact of #ToolShell, we’ll update our related Alert with new info. Today, we’ve added info on new CVEs & additional mitigations on exploitation activity. 👉 go.dhs.gov/i4J
🛡️We added 4️⃣ CVEs—affecting CrushFTP, Google Chrome, & SysAid On-Prem—to our Known Exploited Vulnerabilities Catalog. Visit go.dhs.gov/Z3Q & apply mitigations to protect your org from cyberattacks. #Cybersecurity #InfoSec
🚨Business Owners: Interlock ransomware is hitting hard across North America & Europe. Protect your operations: 🔧Patch exposed systems 🔐Use MFA 🧱Segment networks 🧑💼Lock down access Get the full advisory 👇
🛡️Interlock ransomware actors continue to target businesses and #CriticalInfrastructure organizations in North America and Europe. Review known TTPs & IOCs in our joint Cybersecurity Advisory. 👉go.dhs.gov/i4o #StopRansomware
🛡️Interlock ransomware actors continue to target businesses and #CriticalInfrastructure organizations in North America and Europe. Review known TTPs & IOCs in our joint Cybersecurity Advisory. 👉go.dhs.gov/i4o #StopRansomware

Secure by Design products use static and dynamic application security testing. These tools can be incorporated into development processes and run automatically to ensure products comply with expected security requirements. Learn more: go.dhs.gov/wy7

We added Microsoft SharePoint server remote code execution vulnerability CVE-2025-53770 to our Known Exploited Vulnerabilities Catalog. Visit go.dhs.gov/Z3Q & apply mitigations to protect your org from cyberattacks. #ToolShell
This exploitation activity, publicly reported as “ToolShell,” provides unauthenticated access to systems and enables malicious actors to fully access SharePoint content. Take action now 👉 go.dhs.gov/iZZ
Malicious actors are exploiting RCE vulnerability CVE-2025-53770 to compromise on-prem SharePoint servers. See our Alert for info & mitigations on exploitation activity, known as #ToolShell. 👉go.dhs.gov/iZZ
A known exploited vulnerability is a weakness in software, hardware, or applications that attackers use to gain access to these systems. Check out our KEV Catalog to better manage vulnerabilities and keep pace with threat activity: go.dhs.gov/Z3Q

We created a series of customizable CISA Tabletop Exercise Packages (CTEPs) for our critical infrastructure partners to improve their cybersecurity. The CTEPs cover various cyber threat topics such as ransomware, insider threats, and phishing. See more: go.dhs.gov/ozP

💡Did you know – the X platform gives official government accounts grey badges. Remember to check an account’s profile to ensure that you’re sharing a post from a confirmed official account.
⚠️@CISAgov issued six NEW public #ICS advisories. These advisories provide info about current security issues, vulnerabilities, & exploits surrounding ICS. More at go.dhs.gov/wtv
Our free cybersecurity services are designed to help individuals and organizations build and maintain a robust and resilient cyber framework. Learn more: go.dhs.gov/42y

"How can my kiddo break into the cyber workforce?"👩💻 I remember the thrill of starting out in this field & I'm excited to help others! @CISAgov’s NICCS tool offers top-notch training & career roadmaps to help them get started.📚go.dhs.gov/wt7 #CareerDevelopment
As #K12 threats evolve, there is greater potential for disruptions to cascade to many functions within a school. It’s critical that schools take a layered approach to security to reduce single points of failure. Read more in our interview with @EdTech_K12: edtechmagazine.com/k12/article/20…