Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Microsoft Patch Tuesday May 2026: Vulnerabilities Fixed
May 12, 2026
Critical Fortinet FortiSandbox Flaw Allows Vulnerability Enables
May 12, 2026
Fortinet Patches Five Vulnerabilities in Forti Across FortiAP
May 12, 2026
Home/CyberSecurity News/CISA Retires Ten Emergency Directives Following Milestone
CyberSecurity News

CISA Retires Ten Emergency Directives Following Milestone

The Cybersecurity and Infrastructure Security Agency (CISA) announced on January 8, 2026, the retirement of ten Emergency Directives issued between 2019 and 2024, marking a significant operational...

David kimber
David kimber
January 9, 2026 2 Min Read
7 0

The Cybersecurity and Infrastructure Security Agency (CISA) announced on January 8, 2026, the retirement of ten Emergency Directives issued between 2019 and 2024, marking a significant operational milestone for the agency.

This marks the highest number of Emergency Directives retired by the agency simultaneously, reflecting progress in federal cybersecurity efforts.

Emergency Directives are urgent orders issued by CISA to rapidly address emerging threats facing Federal Civilian Executive Branch (FCEB) agencies.

By closing these ten directives, CISA confirms that the required security measures have been successfully implemented across federal systems or are now covered by existing regulations, such as the Binding Operational Directive (BOD) 22-01.

Why Directives Were Closed

Seven directives related to specific vulnerabilities have been retired because those security issues are now tracked in CISA’s Known Exploited Vulnerabilities (KEV) catalog.

These include directives addressing Windows vulnerabilities, Netlogon elevation-of-privilege issues, and VMware security concerns.

Three additional directives, including those addressing the SolarWinds incident and Microsoft Exchange vulnerabilities.

A recent nation-state compromise of Microsoft email systems was closed after CISA determined its objectives had been achieved and practices had evolved beyond its requirements.

CISA Acting Director Madhu Gottumukkala stated that this closure demonstrates the agency’s commitment to federal cybersecurity collaboration.

“Every day, CISA’s team works with partners to eliminate persistent access, counter threats, and deliver real-time guidance,” Gottumukkala noted.

The retired directives include critical orders addressing tampering with DNS infrastructure, Windows patch vulnerabilities from 2020, Pulse Connect Secure threats, and Print Spooler service vulnerabilities.

Full List of Retired Emergency Directives

Here are the now-closed directives, each a rapid response to high-stakes threats:

  • ED 19-01: Mitigate DNS Infrastructure Tampering
  • ED 20-02: Mitigate Windows Vulnerabilities from January 2020 Patch Tuesday
  • ED 20-03: Mitigate Windows DNS Server Vulnerability from July 2020 Patch Tuesday
  • ED 20-04: Mitigate Netlogon Elevation of Privilege Vulnerability from August 2020 Patch Tuesday
  • ED 21-01: Mitigate SolarWinds Orion Code Compromise
  • ED 21-02: Mitigate Microsoft Exchange On-Premises Product Vulnerabilities
  • ED 21-03: Mitigate Pulse Connect Secure Product Vulnerabilities
  • ED 21-04: Mitigate Windows Print Spooler Service Vulnerability
  • ED 22-03: Mitigate VMware Vulnerabilities
  • ED 24-02: Mitigating the Significant Risk from Nation-State Compromise of Microsoft Corporate Email System

Rather than relying on emergency directives, these protections are now embedded in CISA’s ongoing security programs.

The agency continues advancing “Secure by Design” principles, highlighting transparency, configurability, and cross-system compatibility across federal infrastructure.

This consolidation allows CISA to streamline federal cybersecurity governance while maintaining protection against critical threats.

As cyber risks evolve, CISA remains prepared to issue new Emergency Directives when threats demand immediate action.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

CybersecurityExploitPatchSecurityThreatVulnerability

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

FBI Warns of Kimsuky Actors Leverage Malicious QR Codes to Target

Next Post

New Microsoft Teams Admin Role for External Collaboration Settings

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Open WebUI File Upload Vulnerability Allows 1 Leads Attack
May 12, 2026
SAP Patches Critical SQL Injection Flaw in S/4 Vulnerability S/4HANA
May 12, 2026
Zoom Rooms Vulnerabilities Allow Attackers to Escalate
May 12, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us