|
295 | 295 | </p> |
296 | 296 | </div> |
297 | 297 | <h3 class="title">CNA Enrichment Recognition List</h3> |
298 | | - <p class="cve-help-text"><span class="has-text-weight-bold">Last Updated: </span><time>April 7, 2025</time><br/> |
299 | | - <span class="has-text-weight-bold">Total CNAs: </span>249</p> |
| 298 | + <p class="cve-help-text"><span class="has-text-weight-bold">Last Updated: </span><time>May 5, 2025</time><br/> |
| 299 | + <span class="has-text-weight-bold">Total CNAs: </span>251</p> |
300 | 300 | <div> |
301 | 301 | <ul> |
302 | 302 | <li>1E Limited</li> |
|
311 | 311 | <li>ARC Informatique</li> |
312 | 312 | <li>Arista Networks, Inc.</li> |
313 | 313 | <li>Asea Brown Boveri Ltd.</li> |
314 | | - <li>ASR Microelectronics Co., Ltd.</li> |
315 | 314 | <li>ASUSTeK Computer Incorporation</li> |
316 | 315 | <li>ATISoluciones Diseño de Sistemas Electrónicos, S.L.</li> |
317 | 316 | <li>Austin Hackers Anonymous</li> |
|
332 | 331 | <li>Brocade Communications Systems LLC, a Broadcom Company</li> |
333 | 332 | <li>Canon EMEA</li> |
334 | 333 | <li>Canon Inc.</li> |
335 | | - <li>Canonical Ltd.</li> |
336 | 334 | <li>Carrier Global Corporation</li> |
337 | 335 | <li>Cato Networks</li> |
| 336 | + <li>Centreon</li> |
338 | 337 | <li>CERT.PL</li> |
339 | 338 | <li>CERT@VDE</li> |
340 | 339 | <li>Check Point Software Technologies Ltd.</li> |
341 | 340 | <li>Checkmarx</li> |
342 | 341 | <li>Checkmk GmbH</li> |
343 | 342 | <li>cirosec GmbH</li> |
344 | 343 | <li>Cisco Systems, Inc.</li> |
345 | | - <li>ClickHouse, Inc.</li> |
346 | 344 | <li>Cloudflare, Inc.</li> |
347 | 345 | <li>Concrete CMS</li> |
| 346 | + <li>ConnectWise LLC</li> |
348 | 347 | <li>Crafter CMS</li> |
349 | 348 | <li>CrowdStrike Holdings, Inc.</li> |
350 | 349 | <li>CyberArk Labs</li> |
351 | 350 | <li>CyberDanube</li> |
352 | | - <li>Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government</li> |
| 351 | + <li>Dahua Technologies</li> |
353 | 352 | <li>Dassault Systèmes</li> |
354 | 353 | <li>Delinea, Inc.</li> |
355 | 354 | <li>Dell EMC</li> |
356 | | - <li>Delta Electronics, Inc.</li> |
357 | 355 | <li>Dfinity Foundation</li> |
358 | | - <li>DirectCyber</li> |
359 | 356 | <li>Docker Inc.</li> |
360 | 357 | <li>dotCMS LLC</li> |
361 | | - <li>Dragos, Inc.</li> |
| 358 | + <li>Dremio Corporation</li> |
362 | 359 | <li>Dutch Institute for Vulnerability Disclosure (DIVD)</li> |
363 | 360 | <li>Eaton</li> |
364 | 361 | <li>Eclipse Foundation</li> |
|
370 | 367 | <li>EU Agency for Cybersecurity (ENISA)</li> |
371 | 368 | <li>Exodus Intelligence</li> |
372 | 369 | <li>F5 Networks</li> |
373 | | - <li>Fedora Project (Infrastructure Software)</li> |
| 370 | + <li>Financial Security Institute (FSI)</li> |
374 | 371 | <li>Fluid Attacks</li> |
375 | 372 | <li>Forcepoint</li> |
376 | 373 | <li>Forescout Technologies</li> |
|
403 | 400 | <li>HYPR Corp</li> |
404 | 401 | <li>IBM Corporation</li> |
405 | 402 | <li>ICS-CERT</li> |
| 403 | + <li>iManage LLC</li> |
406 | 404 | <li>Indian Computer Emergency Response Team (CERT-In)</li> |
407 | 405 | <li>Intel Corporation</li> |
408 | 406 | <li>Internet Systems Consortium (ISC)</li> |
|
413 | 411 | <li>JFROG</li> |
414 | 412 | <li>Johnson Controls</li> |
415 | 413 | <li>JPCERT/CC</li> |
416 | | - <li>Juniper Networks, Inc.</li> |
417 | 414 | <li>Kaspersky</li> |
418 | 415 | <li>KrCERT/CC</li> |
419 | 416 | <li>Kubernetes</li> |
|
429 | 426 | <li>Microsoft Corporation</li> |
430 | 427 | <li>Milestone Systems A/S</li> |
431 | 428 | <li>Mitsubishi Electric Corporation</li> |
| 429 | + <li>Monash University - Cyber Security Incident Response Team</li> |
432 | 430 | <li>MongoDB</li> |
433 | 431 | <li>Moxa Inc.</li> |
434 | 432 | <li>N-able</li> |
|
456 | 454 | <li>OPPO</li> |
457 | 455 | <li>OTRS AG</li> |
458 | 456 | <li>Palantir Technologies</li> |
459 | | - <li>Palo Alto Networks</li> |
460 | 457 | <li>Panasonic Holdings Corporation</li> |
461 | 458 | <li>Pandora FMS</li> |
462 | 459 | <li>PaperCut Software Pty Ltd</li> |
463 | 460 | <li>Patchstack OÜ</li> |
464 | 461 | <li>Pegasystems</li> |
465 | 462 | <li>Pentraze Cybersecurity</li> |
466 | 463 | <li>Perforce</li> |
| 464 | + <li>Philips</li> |
467 | 465 | <li>Phoenix Technologies, Inc.</li> |
468 | 466 | <li>Ping Identity Corporation</li> |
469 | 467 | <li>PlexTrac, Inc.</li> |
|
483 | 481 | <li>SailPoint Technologies</li> |
484 | 482 | <li>Samsung TV & Appliance</li> |
485 | 483 | <li>SAP SE</li> |
| 484 | + <li>Saviynt Inc.</li> |
486 | 485 | <li>SBA Research gGmbH</li> |
487 | 486 | <li>Schneider Electric SE</li> |
488 | 487 | <li>Seal Security</li> |
|
505 | 504 | <li>STAR Labs SG Pte. Ltd.</li> |
506 | 505 | <li>Super Micro Computer, Inc.</li> |
507 | 506 | <li>Suse</li> |
508 | | - <li>Switzerland National Cyber Security Centre (NCSC)</li> |
| 507 | + <li>Symantec - A Division of Broadcom</li> |
509 | 508 | <li>Synaptics</li> |
510 | 509 | <li>Synology Inc.</li> |
511 | 510 | <li>Talos</li> |
|
515 | 514 | <li>Tenable Network Security, Inc.</li> |
516 | 515 | <li>Thales Group</li> |
517 | 516 | <li>The Document Foundation</li> |
| 517 | + <li>The Qt Company</li> |
518 | 518 | <li>The Tcpdump Group</li> |
| 519 | + <li>The Wikimedia Foundation</li> |
519 | 520 | <li>TianoCore.org</li> |
520 | | - <li>Tigera</li> |
521 | 521 | <li>Toshiba Corporation</li> |
| 522 | + <li>TP-Link Systems Inc.</li> |
522 | 523 | <li>TR-CERT (Computer Emergency Response Team of the Republic of Turkey)</li> |
523 | 524 | <li>Trellix</li> |
524 | 525 | <li>TWCERT/CC</li> |
525 | 526 | <li>TXOne Networks, Inc.</li> |
526 | 527 | <li>upKeeper Solutions</li> |
527 | 528 | <li>Vivo Mobile Communication Technology Co., LTD.</li> |
| 529 | + <li>VMware</li> |
528 | 530 | <li>VulDB</li> |
529 | 531 | <li>VulnCheck</li> |
530 | 532 | <li>VULSec Labs</li> |
|
0 commit comments