Serving Iowa & Neighboring Midwest Communities Call: (515) 978-1415

Cyber Watch Live Feed

Active cyber threat and outage awareness for businesses that cannot afford surprises.

Cyber Watch helps businesses, nonprofits, home offices, and local organizations monitor current CISA advisories, known exploited vulnerabilities, and major provider outage resources in one practical dashboard.

If your systems, software, cloud tools, or vendors appear in a major alert and your IT provider has not notified you, Sasha Digital Solutions can provide an independent investigation, remediation plan, or second-opinion review.

CISA Advisories Exploited CVEs Cloud Outages Investigation Remediation

Investigation & Remediation

Concerned about a threat, outage, suspicious email, or breached account?

Sasha Digital Solutions can review the alert, investigate potential exposure, explain the risk, and recommend remediation steps. Already have an MSP or IT provider? Ask whether they reviewed the alert, checked your environment, and notified you. If they did not, it may be time for a second opinion.

Live CISA Advisory Feed

Latest cybersecurity advisories and alerts.

This section displays recent advisories from CISA. Review official details before taking action, and contact SashaDS if you need help determining whether your environment is affected.

CISA Advisory

CISA Adds Seven Known Exploited Vulnerabilities to Catalog

Published: May 20, 2026

CISA has added seven new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2008-4250 Microsoft Windows Buffer Overflow Vulnerability CVE-2009-1537 Microsoft DirectX NULL Byt...

CISA Advisory

Kieback & Peter DDC Building Controllers

Published: May 19, 2026

View CSAF Summary Successful exploitation of this vulnerability could allow an attacker to take control of the victim's browser. The following versions of Kieback & Peter DDC Building Controllers are affected: DDC4002 <=1.12.14 (CVE...

CISA Advisory

ZKTeco CCTV Cameras

Published: May 19, 2026

View CSAF Summary Successful exploitation of this vulnerability could result in information disclosure, including capture of camera account credentials. The following versions of ZKTeco CCTV Cameras are affected: SSC335-GC2063-Face-0b77 So...

CISA Advisory

Siemens RUGGEDCOM APE1808 Devices

Published: May 19, 2026

View CSAF Summary A buffer overflow vulnerability in the User-ID™ Authentication Portal (aka Captive Portal) service of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to execute arbitrary code with root privileges on ...

CISA Advisory

ABB CoreSense HM and CoreSense M10

Published: May 19, 2026

View CSAF Summary An update is available that resolves vulnerability in the product versions listed as affected in this advisory. A path traversal vulnerability in these products can allow unauthenticated users to gain access to restricted ...

Known Exploited Vulnerabilities

Latest vulnerabilities known to be exploited in the wild.

CISAââ"šÂ¬Ã¢"žÂ¢s KEV catalog helps prioritize vulnerabilities that are already being exploited. If your organization uses affected vendors or products, these should be reviewed quickly.

CVE-2008-4250

Microsoft Windows Buffer Overflow Vulnerability

Vendor: Microsoft

Product: Windows

Date Added: May 20, 2026

Due Date: Jun 3, 2026

If your organization uses Microsoft Windows, review exposure, confirm patch status, and prioritize remediation. Known exploited vulnerabilities should not wait in the normal patch queue.

CISA Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

CVE-2009-1537

Microsoft DirectX NULL Byte Overwrite Vulnerability

Vendor: Microsoft

Product: DirectX

Date Added: May 20, 2026

Due Date: Jun 3, 2026

If your organization uses Microsoft DirectX, review exposure, confirm patch status, and prioritize remediation. Known exploited vulnerabilities should not wait in the normal patch queue.

CISA Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

CVE-2009-3459

Adobe Acrobat and Reader Heap-Based Buffer Overflow Vulnerability

Vendor: Adobe

Product: Acrobat and Reader

Date Added: May 20, 2026

Due Date: Jun 3, 2026

If your organization uses Adobe Acrobat and Reader, review exposure, confirm patch status, and prioritize remediation. Known exploited vulnerabilities should not wait in the normal patch queue.

CISA Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

CVE-2010-0249

Microsoft Internet Explorer Use-After-Free Vulnerability

Vendor: Microsoft

Product: Internet Explorer

Date Added: May 20, 2026

Due Date: Jun 3, 2026

If your organization uses Microsoft Internet Explorer, review exposure, confirm patch status, and prioritize remediation. Known exploited vulnerabilities should not wait in the normal patch queue.

CISA Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

CVE-2010-0806

Microsoft Internet Explorer Use-After-Free Vulnerability

Vendor: Microsoft

Product: Internet Explorer

Date Added: May 20, 2026

Due Date: Jun 3, 2026

If your organization uses Microsoft Internet Explorer, review exposure, confirm patch status, and prioritize remediation. Known exploited vulnerabilities should not wait in the normal patch queue.

CISA Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

CVE-2026-41091

Microsoft Defender Link Following Vulnerability

Vendor: Microsoft

Product: Defender

Date Added: May 20, 2026

Due Date: Jun 3, 2026

If your organization uses Microsoft Defender, review exposure, confirm patch status, and prioritize remediation. Known exploited vulnerabilities should not wait in the normal patch queue.

CISA Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Major Service Outage Watch

Official provider status resources for major cloud and platform outages.

Public status pages can help identify major incidents, but they may not show every tenant-specific or account-specific problem. If your business is affected and your provider has not notified you, SashaDS can perform an independent review.

Microsoft

Microsoft Azure Status

Public status information for Azure services and regions. Microsoft 365 tenant-specific service health may require admin-center access.

Open Status Page
Microsoft 365

Microsoft 365 Service Health

Microsoft 365 service health for tenant-specific issues is normally reviewed inside the Microsoft 365 admin center.

Open Status Page
AWS

AWS Health Dashboard

Public AWS service health and regional outage information.

Open Status Page
Google

Google Cloud Status

Public Google Cloud service health and incident information.

Open Status Page
Cloudflare

Cloudflare Status

Cloudflare network, DNS, CDN, WAF, and platform status information.

Open Status Page
Shopify

Shopify Status

Shopify platform status for stores, checkout, admin, and related services.

Open Status Page

Already Have an MSP?

Your provider should not be silent during major alerts.

If your business uses software, cloud services, firewall products, remote access tools, or platforms listed in major advisories, your IT provider should help determine whether you are affected.

If you are learning about threats from the news before your provider contacts you, Sasha Digital Solutions can provide a second-opinion review.

No MSP or IT Provider?

We can help investigate and prioritize next steps.

SashaDS can help review suspicious activity, exposed systems, breach notices, vulnerability alerts, account compromise concerns, website issues, and cloud-service problems.

The goal is not panic. The goal is triage, containment, remediation, and better prevention going forward.

Trusted Cybersecurity Resources

Reliable places to learn, report, and verify.

Cyber Watch highlights trusted resources for awareness and reporting. These resources are useful for businesses, nonprofits, and home users.

Government

CISA Cybersecurity Advisories

CISA provides cybersecurity advisories, alerts, and guidance for organizations, businesses, and the public.

Visit CISA Advisories
Vulnerabilities

CISA KEV Catalog

CISAââ"šÂ¬Ã¢"žÂ¢s Known Exploited Vulnerabilities catalog helps organizations prioritize vulnerabilities known to be exploited.

Visit KEV Catalog
Reporting

FBI Internet Crime Complaint Center

IC3 is used to report internet crimes including fraud, business email compromise, ransomware, and online scams.

Visit IC3
Consumer Safety

FTC Consumer Alerts

The FTC publishes scam alerts and consumer guidance related to fraud, impersonation, identity theft, and online threats.

Visit FTC Alerts

Need investigation, remediation, or a second opinion?

Letââ"šÂ¬Ã¢"žÂ¢s review the threat, outage, vulnerability, account issue, or suspicious activity and identify practical next steps.

Request Cyber Watch Investigation