www.cisa.gov Open in urlscan Pro
2600:141b:1c00:258d::447a  Public Scan

Submitted URL: https://raws.nifc.gov.humongousretail.com/
Effective URL: https://www.cisa.gov/
Submission: On February 07 via api from US — Scanned from US

Form analysis 2 forms found in the DOM

<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
  <table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
    <tbody>
      <tr>
        <td class="gsc-input">
          <div class="gsc-input-box" id="gsc-iw-id1">
            <table cellspacing="0" cellpadding="0" role="presentation" id="gs_id50" class="gstl_50 gsc-input" style="width: 100%; padding: 0px;">
              <tbody>
                <tr>
                  <td id="gs_tti50" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id1" dir="ltr" spellcheck="false"
                      style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; outline: none;"></td>
                  <td class="gsib_b">
                    <div class="gsst_b" id="gs_st50" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb50" aria-hidden="true">×</span></a></div>
                  </td>
                </tr>
              </tbody>
            </table>
          </div>
        </td>
        <td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
              <title>search</title>
              <path
                d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
              </path>
            </svg></button></td>
        <td class="gsc-clear-button">
          <div class="gsc-clear-button" title="clear results">&nbsp;</div>
        </td>
      </tr>
    </tbody>
  </table>
</form>

<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
  <table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
    <tbody>
      <tr>
        <td class="gsc-input">
          <div class="gsc-input-box" id="gsc-iw-id2">
            <table cellspacing="0" cellpadding="0" role="presentation" id="gs_id51" class="gstl_51 gsc-input" style="width: 100%; padding: 0px;">
              <tbody>
                <tr>
                  <td id="gs_tti51" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id2" dir="ltr" spellcheck="false"
                      style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; outline: none;"></td>
                  <td class="gsib_b">
                    <div class="gsst_b" id="gs_st51" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb51" aria-hidden="true">×</span></a></div>
                  </td>
                </tr>
              </tbody>
            </table>
          </div>
        </td>
        <td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
              <title>search</title>
              <path
                d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
              </path>
            </svg></button></td>
        <td class="gsc-clear-button">
          <div class="gsc-clear-button" title="clear results">&nbsp;</div>
        </td>
      </tr>
    </tbody>
  </table>
</form>

Text Content

Skip to main content

An official website of the United States government

Here’s how you know

Here’s how you know

Official websites use .gov
A .gov website belongs to an official government organization in the United
States.

Secure .gov websites use HTTPS
A lock (LockA locked padlock) or https:// means you’ve safely connected to the
.gov website. Share sensitive information only on official, secure websites.


Cybersecurity & Infrastructure Security Agency
America's Cyber Defense Agency

Search

×

search
 

Menu
Close
×

search
 

 * Topics
   Topics
   Cybersecurity Best Practices
   Cyber Threats and Advisories
   Critical Infrastructure Security and Resilience
   Election Security
   Emergency Communications
   Industrial Control Systems
   Information and Communications Technology Supply Chain Security
   Partnerships and Collaboration
   Physical Security
   Risk Management
   How can we help?
   GovernmentEducational InstitutionsIndustryState, Local, Tribal, and
   TerritorialIndividuals and FamiliesSmall and Medium BusinessesFind Help
   LocallyFaith-Based CommunityExecutives
 * Spotlight
 * Resources & Tools
   Resources & Tools
   All Resources & Tools
   Services
   Programs
   Resources
   Training
   Groups
 * News & Events
   News & Events
   News
   Events
   Cybersecurity Alerts & Advisories
   Directives
   Request a CISA Speaker
   Congressional Testimony
 * Careers
   Careers
   Benefits & Perks
   HireVue Applicant Reasonable Accommodations Process
   Hiring
   Resume & Application Tips
   Students & Recent Graduates
   Veteran and Military Spouses
   Work @ CISA
 * About
   About
   Culture
   Divisions & Offices
   Regions
   Leadership
   Doing Business with CISA
   Site Links
   Reporting Employee and Contractor Misconduct
   CISA GitHub
   2023 Year In Review
   Contact Us

Report a Cyber Issue
America's Cyber Defense Agency
Breadcrumb
 1. 

Share:




SHIELDSUP

Prepare for, respond to, and mitigate the impact of cyberattacks.

learn more


OPENING STATEMENT BY CISA DIRECTOR JEN EASTERLY

Before the House Select Committee on Strategic Competition Between the United
States and the Chinese Communist Party

Read Testimony

slide 1 of 5


PEOPLE’S REPUBLIC OF CHINA’S STATE-SPONSORED CYBERSECURITY THREATS

Today, Director Easterly is testifying on the People’s Republic of China’s
State-Sponsored Cybersecurity Threats to US Critical Infrastructure.

cisa.gov/china


CYBER HYGIENE SERVICES

These professional, no-cost assessments are provided upon request on a voluntary
basis and can help organizations manage risk and strengthening the cybersecurity
of our Nation's critical infrastructure.

Read more on Cyber Hygiene Services


WATER AND WASTEWATER CYBERSECURITY TOOLKIT

Jointly developed by CISA and EPA, this toolkit offers guidance on incident
response, vulnerability scanning services, cybersecurity performance goals and
more.

Learn About the Toolkit


ED 24-01: MITIGATE IVANTI CONNECT SECURE AND IVANTI POLICY SECURE
VULNERABILITIES

In response to observed widespread and active exploitation of vulnerabilities in
Ivanti Connect Secure and Ivanti Policy Secure appliances by malicious cyber
threat actors, CISA published Emergency Directive 24-01. 

Read more on Emergency Directive 24-01


2023 YEAR IN REVIEW

The CISA Year in Review report is a comprehensive view of our journey, the
milestones we've achieved, and the lessons we've learned in 2023. Check us out!

Read more on CISA's 2023 Year in Review
PreviousNext
15


NEWS UPDATES

Feb 06, 2024
Press Release


CISA ANNOUNCES RENEWAL OF THE INFORMATION AND COMMUNICATIONS TECHNOLOGY SUPPLY
CHAIN RISK MANAGEMENT TASK FORCE

Feb 01, 2024
Blog


CISA HOSTS SECOND CYBER RESILIENT 911 SYMPOSIUM

Jan 31, 2024
Blog


OPENING STATEMENT BY CISA DIRECTOR JEN EASTERLY

Jan 29, 2024
Blog


SAFECOM MEMBERSHIP SPOTLIGHT: MAJOR DARRYL ANDERSON, SAFECOM AT-LARGE (STARK
COUNTY SHERIFF’S OFFICE)

Jan 24, 2024
Blog


WE MUST CONSIDER SOFTWARE DEVELOPERS A KEY PART OF THE CYBERSECURITY WORKFORCE

View More News



LATEST OPERATIONAL INFORMATION

Feb 06, 2024
Alert


CISA RELEASES TWO INDUSTRIAL CONTROL SYSTEMS ADVISORIES

Feb 06, 2024
ICS Advisory | ICSA-24-037-02


HID GLOBAL READER CONFIGURATION CARDS

Feb 06, 2024
ICS Advisory | ICSA-24-037-01


HID GLOBAL ENCODERS

Feb 06, 2024
Alert


CISA ADDS ONE KNOWN EXPLOITED VULNERABILITY TO CATALOG

Feb 02, 2024
Alert


JUNIPER NETWORKS RELEASES SECURITY BULLETIN FOR JUNIPER SECURE ANALYTICS

View All Alerts & Advisories Subscribe to Updates (link is external)


HOW CAN WE HELP?

All Audiences


FIND HELP LOCALLY

Contact your Region

Assist Visits

Protected Critical Infrastructure Information


INDUSTRY

Information Sharing: A Vital Resource

PCII Program modernized

Joint Cyber Defense Collaborative expands


SMALL AND MEDIUM BUSINESSES

Cyber guidance for small businesses

Supplementing passwords

Doing business with CISA


EDUCATIONAL INSTITUTIONS

School Safety

Cybersecurity for K-12

K-12 School Security Product Suite

Protecting Our Future: Partnering to Safeguard K-12 Organizations from
Cybersecurity Threats

All Audiences

StopRansomware.gov is the U.S. Government's official one-stop location for
resources to tackle ransomware more effectively.

Learn More

The Secure Our World program offers resources and advice to stay safe online.
Each of us has a part to play; it’s easy to do and takes less time than you
think!

Learn More

SAFECOM works to improve emergency communications interoperability across local,
regional, tribal, state, territorial, international borders, and with federal
government entities. 

Learn More


ADDITIONAL CISA RESOURCES


CISA SERVICES CATALOG

A single resource that provides you with access to information on services
across CISA’s mission areas.




CISA PUBLICATIONS

Free cybersecurity tools and resources to help organizations advance their
security capabilities.




CISA REGIONS

CISA provides regional cyber and physical services to support security and
resilience across the United States.




CISA EVENTS

CISA hosts and participates in events throughout the year to engage
stakeholders, seek research partners, and communicate with the public to help
protect the homeland.


Return to top
 * Topics
 * Spotlight
 * Resources & Tools
 * News & Events
 * Careers
 * About

Cybersecurity & Infrastructure Security Agency
 * Facebook
 * Twitter
 * LinkedIn
 * YouTube
 * Instagram
 * RSS

CISA Central 888-282-0870 central@cisa.dhs.gov(link sends email)
DHS Seal
CISA.gov
An official website of the U.S. Department of Homeland Security
 * About CISA
 * Accessibility
 * Budget and Performance
 * DHS.gov
 * FOIA Requests
 * No FEAR Act
 * Office of Inspector General
 * Privacy Policy
 * Subscribe
 * The White House
 * USA.gov
 * Website Feedback