Search results Subscribe to an always-updated RSS feed. 3 items matching your search terms. Filter the results. Item type Select All/None CHIHT Entry Cloud Security Guide CSIRT Survey Report/Study Page EQR Folder EQR Issue Event File Folder Form Folder Location Image IsacsFolder IsacsFurtherReading IsacsGlossaryItem IsacsTool IsacsToolAttachment IsacsToolkit Link News Item Person Press Release Procurement Procurement Folder Video file Recruitment Folder Sub Survey Survey Survey Date Question Survey Matrix Survey Matrix Question Survey Select Question Survey Text Question Testimony Collection Universities Folder Course Vacancy ZIP Folder CIRAS Visual Tool CSIRT Inventory Tool Cybersecurity Map Tool Cyber security info note Education Map Healthcare Services Info note Interdependencies Tool IoT Tool MSM_OES Tool NCSS Map Training Training Material PSD 2 Tool Risk Level Tool Smartphone Guidelines Tool Topic ENISA Video File NCSS Evaluation Tool NIS Visual Tool New items since Yesterday Last week Last month Ever Sort by relevance · date (newest first) · alphabetically Situational Report on Microsoft Exchange Vulnerabilities This ENISA situation report provides an assessment as well as advice and mitigation measures for the MS Exchange vulnerabilities. The threat for the new updates has been assessed as severe and ENISA considers attacks probable and of high risk. The Agency calls on organisations using affected Microsoft Exchange versions to patch the flaws immediately and thoroughly investigate for potential signs of compromise. MS Exchange vulnerabilities once exploited may lead to network compromise, data exfiltration and ransomware attacks. Across the EU, an increasing number of MS Exchange installations have also been found to be the target of malicious attacks. Located in Publications Statement on Microsoft Exchange vulnerabilities The EU Agency for Cybersecurity (ENISA) has provided a statement with an assessment and advice on Microsoft Exchange vulnerabilities. Located in News / ENISA News State of Vulnerabilities 2018/2019 - Analysis of Events in the life of Vulnerabilities The purpose of this report is to provide an insight on both the opportunities and limitations the vulnerability ecosystem offers. By using the vulnerabilities published during the year of 2018 and Q1-Q2 of 2019 as a vehicle, this report goes beyond the standard exploratory analysis, which is well captured by many industry whitepapers and reports, and attempts to answer questions related to the reliability, accuracy of the vulnerability sources and the widely accepted evaluation metrics. In addition, the report leverages established vulnerability taxonomies and frameworks to explore and identify more intrinsic relationships and characteristics. Located in Publications