Serving Iowa & Neighboring Midwest Communities Call: (515) 978-1415

Cyber Watch Live Feed

Active cyber threat and outage awareness for businesses that cannot afford surprises.

Cyber Watch helps businesses, nonprofits, home offices, and local organizations monitor current CISA advisories, known exploited vulnerabilities, and major provider outage resources in one practical dashboard.

If your systems, software, cloud tools, or vendors appear in a major alert and your IT provider has not notified you, Sasha Digital Solutions can provide an independent investigation, remediation plan, or second-opinion review.

CISA Advisories Exploited CVEs Cloud Outages Investigation Remediation

Investigation & Remediation

Concerned about a threat, outage, suspicious email, or breached account?

Sasha Digital Solutions can review the alert, investigate potential exposure, explain the risk, and recommend remediation steps. Already have an MSP or IT provider? Ask whether they reviewed the alert, checked your environment, and notified you. If they did not, it may be time for a second opinion.

Live CISA Advisory Feed

Latest cybersecurity advisories and alerts.

This section displays recent advisories from CISA. Review official details before taking action, and contact SashaDS if you need help determining whether your environment is affected.

CISA Advisory

Siemens Siemens ROS#

Published: May 14, 2026

View CSAF Summary ROS# contains a ROS service file_server, that before version 2.2.2 contains a path traversal vulnerability which could allow an attacker to access, i.e. read and write, arbitrary files, which are accessible with the user r...

CISA Advisory

Siemens gWAP

Published: May 14, 2026

View CSAF Summary Siemens gPROMS Web Applications Publisher (gWAP) is affected by a remote code execution vulnerability introduced through a third-party component, namely the Axios HTTP client library. The vulnerability stems from a specifi...

CISA Advisory

Siemens SIMATIC

Published: May 14, 2026

View CSAF Summary SIMATIC CN 4100 contains multiple vulnerabilities which could potentially lead to a compromise in availability, integrity and confidentiality. Siemens has released a new version for SIMATIC CN 4100 and recommends to update...

CISA Advisory

Siemens Ruggedcom Rox

Published: May 14, 2026

View CSAF Summary Ruggedcom Rox contains an input validation vulnerability in the Scheduler functionality that could allow an authenticated remote attacker to execute arbitrary commands with root privileges on the underlying operating syste...

CISA Advisory

Siemens Ruggedcom Rox

Published: May 14, 2026

View CSAF Summary Ruggedcom Rox before v2.17.1 contain multiple third-party vulnerabilities. Siemens has released new versions for the affected products and recommends to update to the latest versions. The following versions of Siemens Rugg...

Known Exploited Vulnerabilities

Latest vulnerabilities known to be exploited in the wild.

CISA’s KEV catalog helps prioritize vulnerabilities that are already being exploited. If your organization uses affected vendors or products, these should be reviewed quickly.

CVE-2026-20182

Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability

Vendor: Cisco

Product: Catalyst SD-WAN

Date Added: May 14, 2026

Due Date: May 17, 2026

If your organization uses Cisco Catalyst SD-WAN, review exposure, confirm patch status, and prioritize remediation. Known exploited vulnerabilities should not wait in the normal patch queue.

CISA Action: Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlined in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s Hunt & Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.

CVE-2026-42208

BerriAI LiteLLM SQL Injection Vulnerability

Vendor: BerriAI

Product: LiteLLM

Date Added: May 8, 2026

Due Date: May 11, 2026

If your organization uses BerriAI LiteLLM, review exposure, confirm patch status, and prioritize remediation. Known exploited vulnerabilities should not wait in the normal patch queue.

CISA Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

CVE-2026-6973

Ivanti Endpoint Manager Mobile (EPMM) Improper Input Validation Vulnerability

Vendor: Ivanti

Product: Endpoint Manager Mobile (EPMM)

Date Added: May 7, 2026

Due Date: May 10, 2026

If your organization uses Ivanti Endpoint Manager Mobile (EPMM), review exposure, confirm patch status, and prioritize remediation. Known exploited vulnerabilities should not wait in the normal patch queue.

CISA Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

CVE-2026-0300

Palo Alto Networks PAN-OS Out-of-bounds Write Vulnerability

Vendor: Palo Alto Networks

Product: PAN-OS

Date Added: May 6, 2026

Due Date: May 9, 2026

If your organization uses Palo Alto Networks PAN-OS, review exposure, confirm patch status, and prioritize remediation. Known exploited vulnerabilities should not wait in the normal patch queue.

CISA Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. Until the vendor releases an official fix, the following workaround should be implemented: - Restrict User-ID Authentication Portal access to only trusted zones. - Disable User-ID Authentication Portal if not required. 5/13/2026: Palo Alto has released a variety of patches. If these are relevant to your environment, please apply the designated patch.

CVE-2026-31431

Linux Kernel Incorrect Resource Transfer Between Spheres Vulnerability

Vendor: Linux

Product: Kernel

Date Added: May 1, 2026

Due Date: May 15, 2026

If your organization uses Linux Kernel, review exposure, confirm patch status, and prioritize remediation. Known exploited vulnerabilities should not wait in the normal patch queue.

CISA Action: "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

CVE-2026-41940

WebPros cPanel & WHM and WP2 (WordPress Squared) Missing Authentication for Critical Function Vulnerability

Vendor: WebPros

Product: cPanel & WHM and WP2 (WordPress Squared)

Date Added: Apr 30, 2026

Due Date: May 3, 2026

If your organization uses WebPros cPanel & WHM and WP2 (WordPress Squared), review exposure, confirm patch status, and prioritize remediation. Known exploited vulnerabilities should not wait in the normal patch queue.

CISA Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Major Service Outage Watch

Official provider status resources for major cloud and platform outages.

Public status pages can help identify major incidents, but they may not show every tenant-specific or account-specific problem. If your business is affected and your provider has not notified you, SashaDS can perform an independent review.

Microsoft

Microsoft Azure Status

Public status information for Azure services and regions. Microsoft 365 tenant-specific service health may require admin-center access.

Open Status Page
Microsoft 365

Microsoft 365 Service Health

Microsoft 365 service health for tenant-specific issues is normally reviewed inside the Microsoft 365 admin center.

Open Status Page
AWS

AWS Health Dashboard

Public AWS service health and regional outage information.

Open Status Page
Google

Google Cloud Status

Public Google Cloud service health and incident information.

Open Status Page
Cloudflare

Cloudflare Status

Cloudflare network, DNS, CDN, WAF, and platform status information.

Open Status Page
Shopify

Shopify Status

Shopify platform status for stores, checkout, admin, and related services.

Open Status Page

Already Have an MSP?

Your provider should not be silent during major alerts.

If your business uses software, cloud services, firewall products, remote access tools, or platforms listed in major advisories, your IT provider should help determine whether you are affected.

If you are learning about threats from the news before your provider contacts you, Sasha Digital Solutions can provide a second-opinion review.

No MSP or IT Provider?

We can help investigate and prioritize next steps.

SashaDS can help review suspicious activity, exposed systems, breach notices, vulnerability alerts, account compromise concerns, website issues, and cloud-service problems.

The goal is not panic. The goal is triage, containment, remediation, and better prevention going forward.

Trusted Cybersecurity Resources

Reliable places to learn, report, and verify.

Cyber Watch highlights trusted resources for awareness and reporting. These resources are useful for businesses, nonprofits, and home users.

Government

CISA Cybersecurity Advisories

CISA provides cybersecurity advisories, alerts, and guidance for organizations, businesses, and the public.

Visit CISA Advisories
Vulnerabilities

CISA KEV Catalog

CISA’s Known Exploited Vulnerabilities catalog helps organizations prioritize vulnerabilities known to be exploited.

Visit KEV Catalog
Reporting

FBI Internet Crime Complaint Center

IC3 is used to report internet crimes including fraud, business email compromise, ransomware, and online scams.

Visit IC3
Consumer Safety

FTC Consumer Alerts

The FTC publishes scam alerts and consumer guidance related to fraud, impersonation, identity theft, and online threats.

Visit FTC Alerts

Need investigation, remediation, or a second opinion?

Let’s review the threat, outage, vulnerability, account issue, or suspicious activity and identify practical next steps.

Request Cyber Watch Investigation