Smart Notices

Smart Notices from previous months to be archived through this category.

April 8, 2022

CISA adds Three Vulnerabilities to “Known Exploited Vulnerabilities”

CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of...
April 8, 2022

Training Announcement: Talk with Texas RE to Highlight E-ISAC

On April 14, 2022, at 1:30 p.m. (Central), “Talk with Texas RE” will feature guest speaker Matthew Duncan from the Electricity Information Sharing and...
April 8, 2022

SERC Publishes April 2022 Newsletter

SERC published their April 2022 Newsletter. Entities within the SERC footprint should review the newsletter and glean any insights.
April 8, 2022

REMINDER: CIP Virtualization Suite of Standards Comment Period Extended

The 45-day formal comment period for the CIP Virtualization suite of standards (outlined below) has been extended and is now open through 8 p.m...
April 8, 2022

Citrix has released security updates to address a vulnerability in Hypervisor

Citrix has released security updates to address a vulnerability in Hypervisor. An attacker could exploit this vulnerability to cause...
April 8, 2022

Google Releases Security Updates for Chrome

Google has released Chrome version 100.0.4896.75 for Windows, Mac, and Linux. This version addresses vulnerabilities that an attacker could exploit...
April 7, 2022

The Critical Infrastructure Defense Project: Free Premium Cybersecurity Services Available to Hospitals and Utilities

Since NERC’s 2021 annual directives report filed on March 29, 2021, the Commission has issued one new directive related to Reliability Standards. In that tim...
April 7, 2022

CISA Bulletin (SB22-094) “Vulnerability Summary”

The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology...
April 7, 2022

REFRESHER: Facility Ratings (FAC-008) “What the Regulator Sees as The Problem”

Recent years’ audit and enforcement activities (including field verifications by the Regions and entities) have identified multiple instances...
[]