+ "content": "CNA Enrichment Recognition List for February 2, 2026, with 256 CNAs listed: <ul><li>Acronis International GmbH</li><li>Adobe Systems Incorporated</li><li>Advanced Micro Devices Inc.</li><li>Airbus</li><li>AlgoSec</li><li>Altera</li><li>Altium</li><li>Amazon</li><li>AMI</li><li>ARC Informatique</li><li>Arista Networks, Inc.</li><li>Armis, Inc.</li><li>Asea Brown Boveri Ltd.</li><li>ASR Microelectronics Co., Ltd.</li><li>ASUSTeK Computer Incorporation</li><li>ASUSTOR Inc.</li><li>ATISoluciones Diseño de Sistemas Electrónicos, S.L.</li><li>Austin Hackers Anonymous</li><li>Autodesk</li><li>Automotive Security Research Group (ASRG)</li><li>Axis Communications AB</li><li>AxxonSoft Limited</li><li>Azure Access Technology</li><li>Bitdefender</li><li>Bizerba SE & Co. KG</li><li>Black Duck Software, Inc.</li><li>Black Lantern Security</li><li>BlackBerry</li><li>Bugcrowd Inc.</li><li>CA Technologies</li><li>Canon EMEA</li><li>Canon Inc.</li><li>Canonical Ltd.</li><li>Carrier Global Corporation</li><li>Centreon</li><li>CERT.PL</li><li>CERT@VDE</li><li>Check Point Software Technologies Ltd.</li><li>Checkmarx</li><li>Checkmk GmbH</li><li>Cisco Systems, Inc.</li><li>Citrix Systems, Inc.</li><li>Cloudflare, Inc.</li><li>Commvault Systems Inc</li><li>Concrete CMS</li><li>ConnectWise LLC</li><li>Crestron Electronics, Inc.</li><li>CrowdStrike Holdings, Inc.</li><li>CyberArk Labs</li><li>CyberDanube</li><li>Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government</li><li>Dahua Technologies</li><li>Danfoss</li><li>Dassault Systèmes</li><li>Delinea, Inc.</li><li>Dell EMC</li><li>Delta Electronics, Inc.</li><li>Digi International Inc.</li><li>Docker Inc.</li><li>dotCMS LLC</li><li>Dragos, Inc.</li><li>Eaton</li><li>Eclipse Foundation</li><li>Elastic</li><li>EnterpriseDB Corporation</li><li>Environmental Systems Research Institute, Inc. (Esri)</li><li>Ericsson</li><li>Erlang Ecosystem Foundation</li><li>ESET, spol. s r.o.</li><li>EU Agency for Cybersecurity (ENISA)</li><li>Extreme Networks, Inc.</li><li>F5 Networks</li><li>Fedora Project (Infrastructure Software)</li><li>Fermax Technologies SLU</li><li>Financial Security Institute (FSI)</li><li>Flexera Software LLC</li><li>floragunn GmbH</li><li>Fluid Attacks</li><li>Fortinet, Inc.</li><li>Fortra, LLC</li><li>Foxit Software Incorporated</li><li>Gallagher Group Ltd</li><li>GE Vernova</li><li>Genetec Inc.</li><li>GitHub (maintainer security advisories)</li><li>GitHub Inc, (Products Only)</li><li>GitLab Inc.</li><li>Glyph & Cog, LLC</li><li>Google Cloud</li><li>Google LLC</li><li>Gridware Cybersecurity</li><li>Hallo Welt! GmbH</li><li>Hanwha Vision Co., Ltd.</li><li>Harborist</li><li>HashiCorp Inc.</li><li>HeroDevs</li><li>HiddenLayer, Inc.</li><li>Hitachi Energy</li><li>Hitachi Vantara</li><li>Hitachi, Ltd.</li><li>Honeywell International Inc.</li><li>Honor Device Co., Ltd.</li><li>HP Inc.</li><li>HYPR Corp</li><li>IBM Corporation</li><li>ICS-CERT</li><li>Indian Computer Emergency Response Team (CERT-In)</li><li>Insyde Software</li><li>Intel Corporation</li><li>Internet Systems Consortium (ISC)</li><li>Israel National Cyber Directorate</li><li>Ivanti</li><li>Jamf</li><li>Jaspersoft</li><li>JetBrains s.r.o.</li><li>JFROG</li><li>Johnson Controls</li><li>JPCERT/CC</li><li>Juniper Networks, Inc.</li><li>Kaspersky</li><li>KNIME AG</li><li>KrCERT/CC</li><li>Kubernetes</li><li>Larry Cashdollar</li><li>Legion of the Bouncy Castle Inc.</li><li>Lenovo Group Ltd.</li><li>Lexmark International Inc.</li><li>LG Electronics</li><li>Liferay, Inc.</li><li>M-Files Corporation</li><li>Maritime Hacking Village</li><li>Mattermost, Inc</li><li>Mautic</li><li>Medtronic</li><li>Microchip Technology</li><li>Microsoft Corporation</li><li>Milestone Systems A/S</li><li>Mitsubishi Electric Corporation</li><li>Monash University - Cyber Security Incident Response Team</li><li>Moxa Inc.</li><li>N-able</li><li>National Cyber Security Centre Finland</li><li>National Instruments</li><li>NEC Corporation</li><li>Neo4j</li><li>NETGEAR</li><li>Netskope</li><li>NLnet Labs</li><li>NortonLifeLock Inc</li><li>Nozomi Networks Inc.</li><li>Nvidia Corporation</li><li>Omnissa, LLC</li><li>OMRON Corporation</li><li>ONEKEY GmbH</li><li>Open Design Alliance</li><li>Open-Xchange</li><li>OpenHarmony</li><li>OpenJS Foundation</li><li>OpenText (formerly Micro Focus)</li><li>OpenVPN Inc.</li><li>OPPO</li><li>Palantir Technologies</li><li>Palo Alto Networks</li><li>Panasonic Holdings Corporation</li><li>PaperCut Software Pty Ltd</li><li>Pegasystems</li><li>PHP Group</li><li>Ping Identity Corporation</li><li>Progress Software Corporation</li><li>Proofpoint Inc.</li><li>Protect AI</li><li>Pure Storage, Inc.</li><li>QNAP Systems, Inc.</li><li>Qualcomm, Inc.</li><li>Qualys, Inc.</li><li>Radiometer Medical ApS</li><li>rami.io GmbH</li><li>Rapid7, Inc.</li><li>Real-Time Innovations, Inc.</li><li>Red Hat CNA-LR</li><li>Red Hat, Inc.</li><li>Ribose Limited</li><li>Robert Bosch GmbH</li><li>Roche Diagnostics</li><li>Rockwell Automation</li><li>S21sec Cyber Solutions by Thales</li><li>SailPoint Technologies</li><li>SAP SE</li><li>Schneider Electric SE</li><li>Seagate Technology</li><li>Security Risk Advisors</li><li>ServiceNow</li><li>SICK AG</li><li>Siemens</li><li>Silicon Labs</li><li>Snyk</li><li>Softing</li><li>SoftIron</li><li>SolarWinds</li><li>Solidigm</li><li>Sonatype Inc.</li><li>Sophos</li><li>StrongDM</li><li>Super Micro Computer, Inc.</li><li>Suse</li><li>Switzerland National Cyber Security Centre (NCSC)</li><li>Symantec - A Division of Broadcom</li><li>Synaptics</li><li>Synology Inc.</li><li>Talos</li><li>Tanium Inc.</li><li>TeamViewer Germany GmbH</li><li>Temporal Technologies Inc.</li><li>Tenable Network Security, Inc.</li><li>Teradyne Robotics</li><li>Thales Group</li><li>The Browser Company of New York</li><li>The Document Foundation</li><li>The Joomla! Project</li><li>The Missing Link Australia (TML)</li><li>The Qt Company</li><li>The Rust Project</li><li>The Tcpdump Group</li><li>The Wikimedia Foundation</li><li>TianoCore.org</li><li>TIBCO Software Inc.</li><li>Toreon</li><li>TP-Link Systems Inc.</li><li>TR-CERT (Computer Emergency Response Team of the Republic of Turkey)</li><li>Trend Micro, Inc.</li><li>TWCERT/CC</li><li>TYPO3 Association</li><li>upKeeper Solutions</li><li>Vaadin Ltd.</li><li>VMware</li><li>VulDB</li><li>VulnCheck</li><li>WatchGuard Technologies, Inc.</li><li>Western Digital</li><li>Wind River Systems Inc.</li><li>Wiz, Inc.</li><li>wolfSSL Inc.</li><li>Wordfence</li><li>WSO2 LLC</li><li>Xerox Corporation</li><li>Yandex N.V.</li><li>Yugabyte, Inc.</li><li>Zabbix</li><li>Zephyr Project</li><li>Zero Day Initiative</li><li>Zohocorp</li><li>Zoom Video Communications, Inc.</li><li>Zscaler, Inc.</li><li>ZTE Corporation</li><li>ZUSO Advanced Research Team (ZUSO ART)</li><li>Zyxel Corporation</li></ul>"
0 commit comments