{"id":3797,"date":"2025-05-04T19:25:49","date_gmt":"2025-05-04T19:25:49","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=3797"},"modified":"2025-05-04T19:25:53","modified_gmt":"2025-05-04T19:25:53","slug":"%d8%a3%d8%b6%d8%a7%d9%81%d8%aa-%d9%88%d9%83%d8%a7%d9%84%d8%a9-%d8%a7%d9%84%d8%a3%d9%85%d9%86-%d8%a7%d9%84%d8%b3%d9%8a%d8%a8%d8%b1%d8%a7%d9%86%d9%8a-%d9%88%d8%a3%d9%85%d9%86-%d8%a7%d9%84%d8%a8%d9%86","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/ar\/%d8%a7%d9%84%d8%a3%d8%ae%d8%a8%d8%a7%d8%b1\/%d8%a3%d8%b6%d8%a7%d9%81%d8%aa-%d9%88%d9%83%d8%a7%d9%84%d8%a9-%d8%a7%d9%84%d8%a3%d9%85%d9%86-%d8%a7%d9%84%d8%b3%d9%8a%d8%a8%d8%b1%d8%a7%d9%86%d9%8a-%d9%88%d8%a3%d9%85%d9%86-%d8%a7%d9%84%d8%a8%d9%86\/","title":{"rendered":"CISA \u062a\u0636\u064a\u0641 \u062b\u063a\u0631\u062a\u064a\u0646 \u0639\u0627\u0644\u064a\u062a\u064a \u0627\u0644\u062e\u0637\u0648\u0631\u0629 \u0625\u0644\u0649 \u0627\u0644\u0643\u062a\u0627\u0644\u0648\u062c \u0627\u0644\u0645\u0633\u062a\u063a\u0644: \u0645\u0627 \u0627\u0644\u0630\u064a \u064a\u062c\u0628 \u0639\u0644\u0649 \u0641\u0631\u0642 \u0627\u0644\u0623\u0645\u0646 \u0641\u0639\u0644\u0647 \u0627\u0644\u0622\u0646"},"content":{"rendered":"<p>\u0642\u0627\u0645\u062a \u0648\u0643\u0627\u0644\u0629 \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a \u0648\u0623\u0645\u0646 \u0627\u0644\u0628\u0646\u064a\u0629 \u0627\u0644\u062a\u062d\u062a\u064a\u0629 (CISA) \u0645\u0631\u0629 \u0623\u062e\u0631\u0649 \u0628\u062a\u062d\u062f\u064a\u062b <a class=\"\" href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\">\u0643\u062a\u0627\u0644\u0648\u062c \u0627\u0644\u062b\u063a\u0631\u0627\u062a \u0627\u0644\u0645\u0633\u062a\u063a\u0644\u0629 \u0627\u0644\u0645\u0639\u0631\u0648\u0641\u0629 (KEV)<\/a>\u2014\u0645\u0635\u062f\u0631 \u062d\u064a\u0648\u064a \u0644\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a \u0644\u0643\u0644 \u0645\u0646 \u0627\u0644\u0645\u062f\u0627\u0641\u0639\u064a\u0646 \u0641\u064a \u0627\u0644\u0642\u0637\u0627\u0639\u064a\u0646 \u0627\u0644\u0641\u064a\u062f\u0631\u0627\u0644\u064a \u0648\u0627\u0644\u062e\u0627\u0635. \u0641\u064a 2 \u0645\u0627\u064a\u0648 2025\u060c \u062a\u0645\u062a \u0625\u0636\u0627\u0641\u0629 \u062b\u063a\u0631\u062a\u064a\u0646 \u062a\u0645 \u0627\u0644\u062a\u062d\u0642\u0642 \u0645\u0646 \u0627\u0633\u062a\u063a\u0644\u0627\u0644\u0647\u0645\u0627 \u0641\u064a \u0627\u0644\u0628\u0631\u064a\u0629:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a class=\"\" href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-34028\">CVE-2025-34028 \u2013 \u062b\u063a\u0631\u0629 \u0627\u062c\u062a\u064a\u0627\u0632 \u0627\u0644\u0645\u0633\u0627\u0631 \u0641\u064a Commvault Command Center<\/a><\/li>\n\n\n\n<li><a class=\"\" href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-58136\">CVE-2024-58136 \u2013 \u062b\u063a\u0631\u0629 \u0627\u0644\u0645\u0633\u0627\u0631 \u0627\u0644\u0628\u062f\u064a\u0644 \u0641\u064a YiiFramework: \u062d\u0645\u0627\u064a\u0629 \u063a\u064a\u0631 \u0643\u0627\u0641\u064a\u0629<\/a><\/li>\n<\/ul>\n\n\n\n<p>\u062a\u0628\u0631\u0632 \u0647\u0630\u0647 \u0627\u0644\u062a\u0648\u0633\u0639\u0627\u062a \u0627\u0644\u062d\u0627\u062c\u0629 \u0625\u0644\u0649 \u0623\u0646 \u062a\u0638\u0644 \u0627\u0644\u0645\u0646\u0638\u0645\u0627\u062a \u0641\u064a \u062c\u0645\u064a\u0639 \u0627\u0644\u0642\u0637\u0627\u0639\u0627\u062a \u064a\u0642\u0638\u0629 \u0648\u0627\u0633\u062a\u0628\u0627\u0642\u064a\u0629 \u0641\u064a \u0625\u062f\u0627\u0631\u0629 \u0627\u0644\u062b\u063a\u0631\u0627\u062a \u062d\u062a\u0649 \u0639\u0646\u062f\u0645\u0627 \u0644\u0627 \u062a\u0643\u0648\u0646 \u062a\u062d\u062a \u0645\u062a\u0637\u0644\u0628\u0627\u062a \u0641\u064a\u062f\u0631\u0627\u0644\u064a\u0629 \u0646\u0634\u0637\u0629.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"why-these-cves-matter\"><strong>\u0644\u0645\u0627\u0630\u0627 \u062a\u0647\u0645 \u0647\u0630\u0647 \u0627\u0644\u062b\u063a\u0631\u0627\u062a CVEs<\/strong><\/h2>\n\n\n<p><a class=\"\" href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-34028\">CVE-\u0662\u0660\u0662\u0665-\u0663\u0664\u0660\u0662\u0668<\/a> \u0641\u064a Commvault Command Center \u0647\u064a \u062b\u063a\u0631\u0629 \u0627\u062c\u062a\u064a\u0627\u0632 \u0627\u0644\u0645\u0633\u0627\u0631 \u0627\u0644\u062a\u064a \u062a\u0645\u0643\u0646 \u0627\u0644\u0645\u0647\u0627\u062c\u0645\u064a\u0646 \u0645\u0646 \u0642\u0631\u0627\u0621\u0629 \u0627\u0644\u062f\u0644\u0627\u0626\u0644 \u063a\u064a\u0631 \u0627\u0644\u0645\u0635\u0631\u062d \u0628\u0647\u0627 \u0623\u0648 \u062a\u0634\u063a\u064a\u0644 \u0627\u0644\u062a\u0639\u0644\u064a\u0645\u0627\u062a \u0627\u0644\u0628\u0631\u0645\u062c\u064a\u0629 \u062e\u0627\u0631\u062c \u0647\u064a\u0627\u0643\u0644 \u0627\u0644\u0645\u0644\u0641\u0627\u062a \u0627\u0644\u0645\u0642\u0635\u0648\u062f\u0629. \u062a\u0639\u062a\u0628\u0631 \u0627\u0644\u062b\u063a\u0631\u0629 \u0645\u0642\u0644\u0642\u0629 \u0628\u0634\u0643\u0644 \u062e\u0627\u0635 \u0646\u0638\u0631\u064b\u0627 \u0644\u0644\u0637\u0628\u064a\u0639\u0629 \u0627\u0644\u062d\u0633\u0627\u0633\u0629 \u0644\u0623\u0646\u0638\u0645\u0629 \u0627\u0644\u0646\u0633\u062e \u0627\u0644\u0627\u062d\u062a\u064a\u0627\u0637\u064a \u0648\u062d\u0645\u0627\u064a\u0629 \u0627\u0644\u0628\u064a\u0627\u0646\u0627\u062a\u060c \u0648\u0627\u0644\u062a\u064a \u062a\u0639\u062a\u0628\u0631 \u0647\u062f\u0641\u064b\u0627 \u0645\u0641\u0636\u0644\u064b\u0627 \u0644\u0644\u0645\u0647\u0627\u062c\u0645\u064a\u0646 \u0628\u0628\u0631\u0627\u0645\u062c \u0627\u0644\u0641\u062f\u064a\u0629 \u0648\u0627\u0644\u0645\u0647\u0627\u062c\u0645\u064a\u0646 \u0627\u0644\u062f\u0648\u0644\u064a\u064a\u0646.<\/p>\n\n\n\n<p><a class=\"\" href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-58136\">CVE-\u0662\u0660\u0662\u0664-\u0665\u0668\u0661\u0663\u0666<\/a> \u062a\u0624\u062b\u0631 \u0639\u0644\u0649 \u0625\u0637\u0627\u0631 \u0639\u0645\u0644 Yii PHP \u0627\u0644\u0630\u064a \u064a\u064f\u0633\u062a\u062e\u062f\u0645 \u0628\u0634\u0643\u0644 \u0634\u0627\u0626\u0639 \u0641\u064a \u062a\u0637\u0628\u064a\u0642\u0627\u062a \u0627\u0644\u0648\u064a\u0628. \u0648\u0647\u064a \u0646\u062a\u064a\u062c\u0629 \u0644\u062d\u0645\u0627\u064a\u0629 \u063a\u064a\u0631 \u0643\u0627\u0641\u064a\u0629 \u0644\u0644\u0645\u0633\u0627\u0631\u0627\u062a \u0627\u0644\u0628\u062f\u064a\u0644\u0629\u060c \u0645\u0645\u0627 \u0642\u062f \u064a\u0633\u0645\u062d \u0644\u0644\u0645\u0647\u0627\u062c\u0645\u064a\u0646 \u0628\u062a\u062c\u0627\u0648\u0632 \u0636\u0648\u0627\u0628\u0637 \u0627\u0644\u0648\u0635\u0648\u0644 \u0627\u0644\u0645\u0635\u0645\u0645\u0629 \u0644\u0647\u0627. \u064a\u0645\u0643\u0646 \u0623\u0646 \u064a\u0624\u062f\u064a \u0627\u0633\u062a\u063a\u0644\u0627\u0644\u0647\u0627 \u0625\u0644\u0649 \u0627\u0633\u062a\u062e\u062f\u0627\u0645 \u063a\u064a\u0631 \u0645\u0635\u0631\u062d \u0628\u0647 \u0644\u0648\u0638\u0627\u0626\u0641 \u0623\u0648 \u0628\u064a\u0627\u0646\u0627\u062a \u062d\u0633\u0627\u0633\u0629\u060c \u0645\u0645\u0627 \u064a\u0634\u0643\u0644 \u062e\u0637\u0631\u064b\u0627 \u0643\u0628\u064a\u0631\u064b\u0627 \u0639\u0644\u0649 \u0627\u0644\u0645\u0637\u0648\u0631\u064a\u0646 \u0648\u0645\u062f\u064a\u0631\u064a \u0627\u0644\u0645\u0646\u0635\u0627\u062a.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"the-role-of-bod-2201\"><strong>\u062f\u0648\u0631 BOD 22-01<\/strong><\/h2>\n\n\n<p>\u0627\u0644\u0648\u0643\u0627\u0644\u0627\u062a \u0627\u0644\u0641\u064a\u062f\u0631\u0627\u0644\u064a\u0629 \u0644\u0644\u0641\u0631\u0639 \u0627\u0644\u062a\u0646\u0641\u064a\u0630\u064a \u0627\u0644\u0645\u062f\u0646\u064a (FCEB) \u0627\u0644\u062e\u0627\u0636\u0639\u0629 \u0644\u0640 <a class=\"\" href=\"https:\/\/www.cisa.gov\/news-events\/directives\/bod-22-01-reducing-significant-risk-known-exploited-vulnerabilities\">\u0627\u0644\u062a\u0648\u062c\u064a\u0647 \u0627\u0644\u062a\u0634\u063a\u064a\u0644\u064a \u0627\u0644\u0645\u0644\u0632\u0645 22-01<\/a> \u064a\u062c\u0628 \u0639\u0644\u064a\u0647\u0627 \u0645\u0639\u0627\u0644\u062c\u0629 \u0627\u0644\u062b\u063a\u0631\u0627\u062a \u0627\u0644\u0645\u062f\u0631\u062c\u0629 \u0641\u064a KEV \u0636\u0645\u0646 \u0627\u0644\u062c\u062f\u0627\u0648\u0644 \u0627\u0644\u0632\u0645\u0646\u064a\u0629 \u0627\u0644\u0645\u062d\u062f\u062f\u0629. \u064a\u0641\u0631\u0636 \u0627\u0644\u062a\u0648\u062c\u064a\u0647 \u0627\u0633\u062a\u062c\u0627\u0628\u0629 \u0645\u0646\u0638\u0645\u0629 \u0648\u0645\u062d\u062f\u062f\u0629 \u0627\u0644\u0623\u0648\u0644\u0648\u064a\u0627\u062a \u0644\u0644\u062b\u063a\u0631\u0627\u062a \u0627\u0644\u0645\u0633\u062a\u063a\u0644\u0629 \u0628\u0646\u0634\u0627\u0637 \u0644\u0635\u0627\u0644\u062d \u0645\u0648\u0627\u0642\u0641 \u0623\u0645\u0646\u064a\u0629 \u0623\u0643\u062b\u0631 \u0642\u0648\u0629 \u0639\u0644\u0649 \u0634\u0628\u0643\u0627\u062a \u0627\u0644\u062d\u0643\u0648\u0645\u0629.<br>\u0628\u064a\u0646\u0645\u0627 \u064a\u0633\u062a\u0647\u062f\u0641 \u0627\u0644\u062a\u0648\u062c\u064a\u0647 \u0627\u0644\u0648\u0643\u0627\u0644\u0627\u062a \u0627\u0644\u0641\u064a\u062f\u0631\u0627\u0644\u064a\u0629\u060c \u062a\u0648\u0635\u064a CISA \u0628\u0634\u062f\u0629 \u0628\u0623\u0646 \u062a\u0633\u062a\u062e\u062f\u0645 \u062c\u0645\u064a\u0639 \u0627\u0644\u0645\u0646\u0638\u0645\u0627\u062a - \u0627\u0644\u0634\u0631\u0643\u0627\u062a \u0627\u0644\u062e\u0627\u0635\u0629 \u0648\u0645\u0642\u062f\u0645\u064a \u0627\u0644\u0628\u0646\u064a\u0629 \u0627\u0644\u062a\u062d\u062a\u064a\u0629 \u0627\u0644\u062d\u064a\u0648\u064a\u0629 \u0648\u0628\u0627\u0626\u0639\u064a SaaS - \u0643\u062a\u0627\u0644\u0648\u062c KEV \u0643\u0642\u0627\u0626\u0645\u0629 \u0645\u0639\u0627\u0644\u062c\u0629 \u0639\u0627\u062c\u0644\u0629.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"expert-advice-for-security-teams\"><strong>\u0646\u0635\u0627\u0626\u062d \u0627\u0644\u062e\u0628\u0631\u0627\u0621 \u0644\u0641\u0631\u0642 \u0627\u0644\u0623\u0645\u0646<\/strong><\/h2>\n\n\n<p>\u0641\u064a Security Briefing\u060c \u0646\u062d\u062b \u0639\u0644\u0649 \u0627\u062a\u062e\u0627\u0630 \u0625\u062c\u0631\u0627\u0621\u0627\u062a \u0641\u0648\u0631\u064a\u0629 \u0644\u0644\u0645\u0633\u0624\u0648\u0644\u064a\u0646 \u0627\u0644\u0645\u0634\u0631\u0641\u064a\u0646 \u0639\u0644\u0649 \u062a\u062b\u0628\u064a\u062a\u0627\u062a Commvault \u0623\u0648 Yii:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u0642\u0645 \u0628\u062a\u062f\u0642\u064a\u0642 \u0643\u0644 \u062a\u062b\u0628\u064a\u062a \u0644\u0640 Commvault Command Center \u0648\u062a\u0637\u0628\u064a\u0642\u0627\u062a \u0627\u0644\u0648\u064a\u0628 \u0627\u0644\u0645\u0633\u062a\u0646\u062f\u0629 \u0625\u0644\u0649 Yii.<\/li>\n\n\n\n<li>\u0642\u0645 \u0628\u062a\u0637\u0628\u064a\u0642 \u0627\u0644\u062a\u0635\u062d\u064a\u062d\u0627\u062a \u0623\u0648 \u0627\u0644\u062a\u062e\u0641\u064a\u0641\u0627\u062a \u0641\u064a \u0623\u0642\u0631\u0628 \u0648\u0642\u062a \u0645\u0645\u0643\u0646. \u064a\u0645\u0643\u0646 \u0623\u0646 \u064a\u0624\u062f\u064a \u0627\u0644\u062a\u0623\u062e\u064a\u0631 \u0627\u0644\u0645\u0637\u0648\u0644 \u0641\u064a \u062a\u0635\u062d\u064a\u062d \u0627\u0644\u062b\u063a\u0631\u0627\u062a \u0627\u0644\u0645\u0633\u062a\u063a\u0644\u0629 \u0639\u0644\u0646\u064b\u0627 \u0625\u0644\u0649 \u0627\u062e\u062a\u0631\u0627\u0642 \u0645\u0628\u0627\u0634\u0631.<\/li>\n\n\n\n<li>\u0642\u0645 \u0628\u062a\u0637\u0628\u064a\u0642 \u0636\u0648\u0627\u0628\u0637 \u0627\u0644\u0648\u0635\u0648\u0644 \u0625\u0644\u0649 \u0627\u0644\u0645\u0644\u0641\u0627\u062a \u0648\u062c\u062f\u0631\u0627\u0646 \u062d\u0645\u0627\u064a\u0629 \u062a\u0637\u0628\u064a\u0642\u0627\u062a \u0627\u0644\u0648\u064a\u0628 (WAFs) \u0644\u062a\u062d\u062f\u064a\u062f \u0648\u0645\u0646\u0639 \u0645\u062d\u0627\u0648\u0644\u0627\u062a \u0627\u062c\u062a\u064a\u0627\u0632 \u0627\u0644\u0645\u0633\u0627\u0631 \u0623\u0648 \u0627\u0644\u0648\u0635\u0648\u0644 \u0625\u0644\u0649 \u0627\u0644\u0645\u0633\u0627\u0631\u0627\u062a \u0627\u0644\u0628\u062f\u064a\u0644\u0629.<\/li>\n\n\n\n<li>Track CISA\u2019s KEV Catalog on a weekly basis\u2014incorporate into automated vulnerability scanning and remediation processes.<\/li>\n\n\n\n<li>\u0642\u0645 \u0628\u062a\u062f\u0642\u064a\u0642 \u0633\u062c\u0644\u0627\u062a \u0627\u0644\u0648\u0635\u0648\u0644 \u0648\u0625\u062c\u0631\u0627\u0621 \u0627\u0644\u0628\u062d\u062b \u0639\u0646 \u0627\u0644\u062a\u0647\u062f\u064a\u062f\u0627\u062a \u0644\u0623\u064a \u0639\u0644\u0627\u0645\u0629 \u0639\u0644\u0649 \u0627\u0633\u062a\u063a\u0644\u0627\u0644 \u0633\u0627\u0628\u0642\u060c \u062e\u0627\u0635\u0629 \u0641\u064a \u0627\u0644\u0623\u0646\u0638\u0645\u0629 \u0627\u0644\u0645\u0648\u0627\u062c\u0647\u0629 \u0644\u0644\u062e\u0627\u0631\u062c.<\/li>\n<\/ul>\n\n\n\n<p><strong>\u0627\u0644\u0641\u0643\u0631\u0629 \u0627\u0644\u0646\u0647\u0627\u0626\u064a\u0629:<\/strong> CISA\u2019s continuous updates to the KEV catalog represent a vital warning system. Not responding to these warnings is the same as keeping known entry points open for cybercriminals, who are actively taking advantage of them. Regardless of whether you belong to the private or public sector, handle each KEV addition with the highest priority. Proactive vulnerability management is no longer a choice\u2014it\u2019s a necessity to securing the modern enterprise.<\/p>","protected":false},"excerpt":{"rendered":"<p>\u0642\u0627\u0645\u062a \u0648\u0643\u0627\u0644\u0629 \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a \u0648\u0623\u0645\u0646 \u0627\u0644\u0628\u0646\u064a\u0629 \u0627\u0644\u062a\u062d\u062a\u064a\u0629 (CISA) \u0645\u0631\u0629 \u0623\u062e\u0631\u0649 \u0628\u062a\u062d\u062f\u064a\u062b \u0643\u062a\u0627\u0644\u0648\u062c \u0627\u0644\u062b\u063a\u0631\u0627\u062a \u0627\u0644\u0645\u0633\u062a\u063a\u0644\u0629 \u0627\u0644\u0645\u0639\u0631\u0648\u0641\u0629 (KEV) - \u0648\u0647\u0648 \u0645\u0635\u062f\u0631 \u062d\u064a\u0648\u064a \u0644\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a \u0644\u0643\u0644 \u0645\u0646 \u0627\u0644\u0645\u062f\u0627\u0641\u0639\u064a\u0646 \u0641\u064a \u0627\u0644\u0642\u0637\u0627\u0639 \u0627\u0644\u0641\u064a\u062f\u0631\u0627\u0644\u064a \u0648\u0627\u0644\u062e\u0627\u0635. \u0641\u064a 2 \u0645\u0627\u064a\u0648 2025\u060c... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/ar\/%d8%a7%d9%84%d8%a3%d8%ae%d8%a8%d8%a7%d8%b1\/%d8%a3%d8%b6%d8%a7%d9%81%d8%aa-%d9%88%d9%83%d8%a7%d9%84%d8%a9-%d8%a7%d9%84%d8%a3%d9%85%d9%86-%d8%a7%d9%84%d8%b3%d9%8a%d8%a8%d8%b1%d8%a7%d9%86%d9%8a-%d9%88%d8%a3%d9%85%d9%86-%d8%a7%d9%84%d8%a8%d9%86\/\">\u0645\u062a\u0627\u0628\u0639\u0629 \u0627\u0644\u0642\u0631\u0627\u0621\u0629 <span class=\"screen-reader-text\">CISA \u062a\u0636\u064a\u0641 \u062b\u063a\u0631\u062a\u064a\u0646 \u0639\u0627\u0644\u064a\u062a\u064a \u0627\u0644\u062e\u0637\u0648\u0631\u0629 \u0625\u0644\u0649 \u0627\u0644\u0643\u062a\u0627\u0644\u0648\u062c \u0627\u0644\u0645\u0633\u062a\u063a\u0644: \u0645\u0627 \u0627\u0644\u0630\u064a \u064a\u062c\u0628 \u0639\u0644\u0649 \u0641\u0631\u0642 \u0627\u0644\u0623\u0645\u0646 \u0641\u0639\u0644\u0647 \u0627\u0644\u0622\u0646<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":3798,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23],"tags":[],"class_list":["post-3797","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CISA Adds Two High-Risk Vulnerabilities to Exploited Catalog: What Security Teams Should Do Now | Security Briefing<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/ar\/\u0627\u0644\u0623\u062e\u0628\u0627\u0631\/\u0623\u0636\u0627\u0641\u062a-\u0648\u0643\u0627\u0644\u0629-\u0627\u0644\u0623\u0645\u0646-\u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a-\u0648\u0623\u0645\u0646-\u0627\u0644\u0628\u0646\/\" \/>\n<meta property=\"og:locale\" content=\"ar_AR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CISA Adds Two High-Risk Vulnerabilities to Exploited Catalog: What Security Teams Should Do Now | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"The Cybersecurity and Infrastructure Security Agency (CISA) again refreshed its Known Exploited Vulnerabilities Catalog (KEV)\u2014a critical source of information for both federal and private sector defenders. On May 2, 2025,&hellip; \u0645\u062a\u0627\u0628\u0639\u0629 \u0642\u0631\u0627\u0621\u0629 CISA Adds Two High-Risk Vulnerabilities to Exploited Catalog: What Security Teams Should Do Now\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/ar\/\u0627\u0644\u0623\u062e\u0628\u0627\u0631\/\u0623\u0636\u0627\u0641\u062a-\u0648\u0643\u0627\u0644\u0629-\u0627\u0644\u0623\u0645\u0646-\u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a-\u0648\u0623\u0645\u0646-\u0627\u0644\u0628\u0646\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-04T19:25:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-04T19:25:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/05\/CISA-Adds-Two-High-Risk-Vulnerabilities-to-Exploited-Catalog.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"966\" \/>\n\t<meta property=\"og:image:height\" content=\"425\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u0643\u064f\u062a\u0628 \u0628\u0648\u0627\u0633\u0637\u0629\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u0648\u0642\u062a \u0627\u0644\u0642\u0631\u0627\u0621\u0629 \u0627\u0644\u0645\u064f\u0642\u062f\u0651\u0631\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 \u062f\u0642\u0627\u0626\u0642\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"CISA Adds Two High-Risk Vulnerabilities to Exploited Catalog: What Security Teams Should Do Now\",\"datePublished\":\"2025-05-04T19:25:49+00:00\",\"dateModified\":\"2025-05-04T19:25:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/\"},\"wordCount\":464,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/05\/CISA-Adds-Two-High-Risk-Vulnerabilities-to-Exploited-Catalog.jpg\",\"articleSection\":[\"News\"],\"inLanguage\":\"ar\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/\",\"url\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/\",\"name\":\"CISA Adds Two High-Risk Vulnerabilities to Exploited Catalog: What Security Teams Should Do Now | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/05\/CISA-Adds-Two-High-Risk-Vulnerabilities-to-Exploited-Catalog.jpg\",\"datePublished\":\"2025-05-04T19:25:49+00:00\",\"dateModified\":\"2025-05-04T19:25:53+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/#breadcrumb\"},\"inLanguage\":\"ar\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/05\/CISA-Adds-Two-High-Risk-Vulnerabilities-to-Exploited-Catalog.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/05\/CISA-Adds-Two-High-Risk-Vulnerabilities-to-Exploited-Catalog.jpg\",\"width\":966,\"height\":425,\"caption\":\"CISA Adds Two High-Risk Vulnerabilities to Exploited Catalog\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CISA Adds Two High-Risk Vulnerabilities to Exploited Catalog: What Security Teams Should Do Now\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ar\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/ar\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u062a\u0636\u064a\u0641 CISA \u062b\u063a\u0631\u062a\u064a\u0646 \u0639\u0627\u0644\u064a\u062a\u064a \u0627\u0644\u062e\u0637\u0648\u0631\u0629 \u0625\u0644\u0649 \u0643\u062a\u0627\u0644\u0648\u062c \u0627\u0644\u062b\u063a\u0631\u0627\u062a \u0627\u0644\u0645\u0633\u062a\u063a\u0644\u0629: \u0645\u0627 \u0627\u0644\u0630\u064a \u064a\u062c\u0628 \u0623\u0646 \u062a\u0641\u0639\u0644\u0647 \u0641\u0631\u0642 \u0627\u0644\u0623\u0645\u0627\u0646 \u0627\u0644\u0622\u0646 | \u0645\u0644\u062e\u0635 \u0627\u0644\u0623\u0645\u0627\u0646","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/ar\/\u0627\u0644\u0623\u062e\u0628\u0627\u0631\/\u0623\u0636\u0627\u0641\u062a-\u0648\u0643\u0627\u0644\u0629-\u0627\u0644\u0623\u0645\u0646-\u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a-\u0648\u0623\u0645\u0646-\u0627\u0644\u0628\u0646\/","og_locale":"ar_AR","og_type":"article","og_title":"CISA Adds Two High-Risk Vulnerabilities to Exploited Catalog: What Security Teams Should Do Now | Security Briefing","og_description":"The Cybersecurity and Infrastructure Security Agency (CISA) again refreshed its Known Exploited Vulnerabilities Catalog (KEV)\u2014a critical source of information for both federal and private sector defenders. On May 2, 2025,&hellip; \u0645\u062a\u0627\u0628\u0639\u0629 \u0642\u0631\u0627\u0621\u0629 CISA Adds Two High-Risk Vulnerabilities to Exploited Catalog: What Security Teams Should Do Now","og_url":"https:\/\/securitybriefing.net\/ar\/\u0627\u0644\u0623\u062e\u0628\u0627\u0631\/\u0623\u0636\u0627\u0641\u062a-\u0648\u0643\u0627\u0644\u0629-\u0627\u0644\u0623\u0645\u0646-\u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a-\u0648\u0623\u0645\u0646-\u0627\u0644\u0628\u0646\/","og_site_name":"Security Briefing","article_published_time":"2025-05-04T19:25:49+00:00","article_modified_time":"2025-05-04T19:25:53+00:00","og_image":[{"width":966,"height":425,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/05\/CISA-Adds-Two-High-Risk-Vulnerabilities-to-Exploited-Catalog.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"\u0643\u064f\u062a\u0628 \u0628\u0648\u0627\u0633\u0637\u0629":"C\u00e9sar Daniel Barreto","\u0648\u0642\u062a \u0627\u0644\u0642\u0631\u0627\u0621\u0629 \u0627\u0644\u0645\u064f\u0642\u062f\u0651\u0631":"3 \u062f\u0642\u0627\u0626\u0642"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"CISA Adds Two High-Risk Vulnerabilities to Exploited Catalog: What Security Teams Should Do Now","datePublished":"2025-05-04T19:25:49+00:00","dateModified":"2025-05-04T19:25:53+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/"},"wordCount":464,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/05\/CISA-Adds-Two-High-Risk-Vulnerabilities-to-Exploited-Catalog.jpg","articleSection":["News"],"inLanguage":"ar"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/","url":"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/","name":"\u062a\u0636\u064a\u0641 CISA \u062b\u063a\u0631\u062a\u064a\u0646 \u0639\u0627\u0644\u064a\u062a\u064a \u0627\u0644\u062e\u0637\u0648\u0631\u0629 \u0625\u0644\u0649 \u0643\u062a\u0627\u0644\u0648\u062c \u0627\u0644\u062b\u063a\u0631\u0627\u062a \u0627\u0644\u0645\u0633\u062a\u063a\u0644\u0629: \u0645\u0627 \u0627\u0644\u0630\u064a \u064a\u062c\u0628 \u0623\u0646 \u062a\u0641\u0639\u0644\u0647 \u0641\u0631\u0642 \u0627\u0644\u0623\u0645\u0627\u0646 \u0627\u0644\u0622\u0646 | \u0645\u0644\u062e\u0635 \u0627\u0644\u0623\u0645\u0627\u0646","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/05\/CISA-Adds-Two-High-Risk-Vulnerabilities-to-Exploited-Catalog.jpg","datePublished":"2025-05-04T19:25:49+00:00","dateModified":"2025-05-04T19:25:53+00:00","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/#breadcrumb"},"inLanguage":"ar","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/"]}]},{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/05\/CISA-Adds-Two-High-Risk-Vulnerabilities-to-Exploited-Catalog.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2025\/05\/CISA-Adds-Two-High-Risk-Vulnerabilities-to-Exploited-Catalog.jpg","width":966,"height":425,"caption":"CISA Adds Two High-Risk Vulnerabilities to Exploited Catalog"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/news\/cisa-adds-two-high-risk-vulnerabilities-to-exploited-catalog-what-security-teams-should-do-now\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"CISA Adds Two High-Risk Vulnerabilities to Exploited Catalog: What Security Teams Should Do Now"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"\u0627\u0644\u0625\u062d\u0627\u0637\u0629 \u0627\u0644\u0623\u0645\u0646\u064a\u0629","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ar"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"\u0627\u0644\u0625\u062d\u0627\u0637\u0629 \u0627\u0644\u0623\u0645\u0646\u064a\u0629","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"\u0633\u064a\u0632\u0627\u0631 \u062f\u0627\u0646\u064a\u064a\u0644 \u0628\u0627\u0631\u064a\u062a\u0648","image":{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"\u0633\u064a\u0632\u0627\u0631 \u062f\u0627\u0646\u064a\u064a\u0644 \u0628\u0627\u0631\u064a\u062a\u0648 \u0643\u0627\u062a\u0628 \u0648\u062e\u0628\u064a\u0631 \u0645\u0631\u0645\u0648\u0642 \u0641\u064a \u0645\u062c\u0627\u0644 \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a\u060c \u0645\u0639\u0631\u0648\u0641 \u0628\u0645\u0639\u0631\u0641\u062a\u0647 \u0627\u0644\u0639\u0645\u064a\u0642\u0629 \u0648\u0642\u062f\u0631\u062a\u0647 \u0639\u0644\u0649 \u062a\u0628\u0633\u064a\u0637 \u0645\u0648\u0627\u0636\u064a\u0639 \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a \u0627\u0644\u0645\u0639\u0642\u062f\u0629. \u0648\u0628\u0641\u0636\u0644 \u062e\u0628\u0631\u062a\u0647 \u0627\u0644\u0648\u0627\u0633\u0639\u0629 \u0641\u064a \u0645\u062c\u0627\u0644 \u0623\u0645\u0646 \u0627\u0644\u0634\u0628\u0643\u0627\u062a \u0648\u062d\u0645\u0627\u064a\u0629 \u0627\u0644\u0628\u064a\u0627\u0646\u0627\u062a\u060c \u064a\u0633\u0627\u0647\u0645 \u0628\u0627\u0646\u062a\u0638\u0627\u0645 \u0628\u0645\u0642\u0627\u0644\u0627\u062a \u0648\u062a\u062d\u0644\u064a\u0644\u0627\u062a \u062b\u0627\u0642\u0628\u0629 \u062d\u0648\u0644 \u0623\u062d\u062f\u062b \u0627\u062a\u062c\u0627\u0647\u0627\u062a \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a\u060c \u0645\u0645\u0627 \u064a\u062b\u0642\u0641 \u0627\u0644\u0645\u062d\u062a\u0631\u0641\u064a\u0646 \u0648\u0627\u0644\u062c\u0645\u0647\u0648\u0631.","url":"https:\/\/securitybriefing.net\/ar\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/ar\/wp-json\/wp\/v2\/posts\/3797","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/ar\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/ar\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ar\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ar\/wp-json\/wp\/v2\/comments?post=3797"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/ar\/wp-json\/wp\/v2\/posts\/3797\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ar\/wp-json\/wp\/v2\/media\/3798"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/ar\/wp-json\/wp\/v2\/media?parent=3797"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/ar\/wp-json\/wp\/v2\/categories?post=3797"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/ar\/wp-json\/wp\/v2\/tags?post=3797"}],"curies":[{"name":"\u0648\u0648\u0631\u062f\u0628\u0631\u064a\u0633","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}