|
334 | 334 | </p> |
335 | 335 | </div> |
336 | 336 | <h3 class="title">CNA Enrichment Recognition List</h3> |
337 | | - <p class="cve-help-text"><span class="has-text-weight-bold">Last Updated: </span><time>March 2, 2026</time><br/> |
338 | | - <span class="has-text-weight-bold">Total CNAs: </span>259</p> |
| 337 | + <p class="cve-help-text"><span class="has-text-weight-bold">Last Updated: </span><time>April 6, 2026</time><br/> |
| 338 | + <span class="has-text-weight-bold">Total CNAs: </span>258</p> |
339 | 339 | <div> |
340 | 340 | <ul> |
| 341 | + <li>2N Telekomunikace a.s.</li> |
341 | 342 | <li>Acronis International GmbH</li> |
342 | 343 | <li>Adobe Systems Incorporated</li> |
343 | 344 | <li>Advanced Micro Devices Inc.</li> |
|
350 | 351 | <li>AMI</li> |
351 | 352 | <li>ARC Informatique</li> |
352 | 353 | <li>Arista Networks, Inc.</li> |
353 | | - <li>Armis, Inc.</li> |
354 | 354 | <li>Asea Brown Boveri Ltd.</li> |
355 | 355 | <li>ASR Microelectronics Co., Ltd.</li> |
356 | 356 | <li>ASUSTeK Computer Incorporation</li> |
|
360 | 360 | <li>Autodesk</li> |
361 | 361 | <li>Automotive Security Research Group (ASRG)</li> |
362 | 362 | <li>Axis Communications AB</li> |
363 | | - <li>AxxonSoft Limited</li> |
364 | 363 | <li>Azure Access Technology</li> |
365 | 364 | <li>BeyondTrust Inc.</li> |
366 | 365 | <li>Bitdefender</li> |
|
375 | 374 | <li>Canon Inc.</li> |
376 | 375 | <li>Canonical Ltd.</li> |
377 | 376 | <li>Carrier Global Corporation</li> |
| 377 | + <li>Cato Networks</li> |
378 | 378 | <li>CERT.PL</li> |
379 | 379 | <li>CERT@VDE</li> |
380 | 380 | <li>Check Point Software Technologies Ltd.</li> |
381 | 381 | <li>Checkmarx</li> |
382 | 382 | <li>Checkmk GmbH</li> |
383 | 383 | <li>Cisco Systems, Inc.</li> |
384 | 384 | <li>Citrix Systems, Inc.</li> |
| 385 | + <li>CODRA</li> |
385 | 386 | <li>Commvault Systems Inc</li> |
| 387 | + <li>Concrete CMS</li> |
386 | 388 | <li>ConnectWise LLC</li> |
387 | 389 | <li>Crafter CMS</li> |
388 | | - <li>Crestron Electronics, Inc.</li> |
389 | 390 | <li>CrowdStrike Holdings, Inc.</li> |
390 | | - <li>CyberDanube</li> |
391 | 391 | <li>Cybersecurity and Infrastructure Security Agency (CISA) U.S. Civilian Government</li> |
392 | 392 | <li>Dahua Technologies</li> |
393 | 393 | <li>Dassault Systèmes</li> |
394 | 394 | <li>Delinea, Inc.</li> |
395 | 395 | <li>Dell EMC</li> |
396 | | - <li>Delta Electronics, Inc.</li> |
397 | 396 | <li>Digi International Inc.</li> |
398 | 397 | <li>Docker Inc.</li> |
399 | 398 | <li>dotCMS LLC</li> |
|
406 | 405 | <li>Ericsson</li> |
407 | 406 | <li>Erlang Ecosystem Foundation</li> |
408 | 407 | <li>ESET, spol. s r.o.</li> |
| 408 | + <li>EU Agency for Cybersecurity (ENISA)</li> |
409 | 409 | <li>Extreme Networks, Inc.</li> |
410 | 410 | <li>F5 Networks</li> |
| 411 | + <li>Fedora Project (Infrastructure Software)</li> |
411 | 412 | <li>Fermax Technologies SLU</li> |
412 | 413 | <li>Financial Security Institute (FSI)</li> |
413 | 414 | <li>Flexera Software LLC</li> |
414 | 415 | <li>floragunn GmbH</li> |
415 | 416 | <li>Fluid Attacks</li> |
| 417 | + <li>Forcepoint</li> |
416 | 418 | <li>Fortinet, Inc.</li> |
417 | 419 | <li>Fortra, LLC</li> |
418 | 420 | <li>Foxit Software Incorporated</li> |
419 | 421 | <li>Gallagher Group Ltd</li> |
| 422 | + <li>Gen Digital Inc.</li> |
420 | 423 | <li>Genetec Inc.</li> |
| 424 | + <li>GeoVision Inc.</li> |
421 | 425 | <li>GitHub (maintainer security advisories)</li> |
422 | 426 | <li>GitHub Inc, (Products Only)</li> |
423 | 427 | <li>GitLab Inc.</li> |
|
431 | 435 | <li>Hanwha Vision Co., Ltd.</li> |
432 | 436 | <li>Harborist</li> |
433 | 437 | <li>HashiCorp Inc.</li> |
| 438 | + <li>HCL Software</li> |
434 | 439 | <li>HeroDevs</li> |
435 | 440 | <li>HiddenLayer, Inc.</li> |
436 | 441 | <li>Hillstone Networks Inc.</li> |
|
439 | 444 | <li>Hitachi, Ltd.</li> |
440 | 445 | <li>Honeywell International Inc.</li> |
441 | 446 | <li>Honor Device Co., Ltd.</li> |
442 | | - <li>HP Inc.</li> |
443 | 447 | <li>Huawei Technologies</li> |
444 | 448 | <li>HYPR Corp</li> |
445 | | - <li>IBM Corporation</li> |
446 | 449 | <li>ICS-CERT</li> |
447 | 450 | <li>Indian Computer Emergency Response Team (CERT-In)</li> |
448 | 451 | <li>Insyde Software</li> |
|
452 | 455 | <li>Israel National Cyber Directorate</li> |
453 | 456 | <li>Ivanti</li> |
454 | 457 | <li>Jamf</li> |
455 | | - <li>Jaspersoft</li> |
456 | 458 | <li>JetBrains s.r.o.</li> |
457 | 459 | <li>JFROG</li> |
458 | 460 | <li>Johnson Controls</li> |
|
467 | 469 | <li>Legion of the Bouncy Castle Inc.</li> |
468 | 470 | <li>Lenovo Group Ltd.</li> |
469 | 471 | <li>Lexmark International Inc.</li> |
470 | | - <li>LG Electronics</li> |
471 | 472 | <li>Liferay, Inc.</li> |
472 | 473 | <li>M-Files Corporation</li> |
473 | 474 | <li>Maritime Hacking Village</li> |
474 | 475 | <li>Mattermost, Inc</li> |
475 | 476 | <li>Mautic</li> |
476 | 477 | <li>Medtronic</li> |
477 | 478 | <li>Microchip Technology</li> |
478 | | - <li>Microsoft Corporation</li> |
479 | 479 | <li>Milestone Systems A/S</li> |
480 | 480 | <li>Mitsubishi Electric Corporation</li> |
481 | 481 | <li>Monash University - Cyber Security Incident Response Team</li> |
| 482 | + <li>MongoDB</li> |
482 | 483 | <li>Moxa Inc.</li> |
483 | 484 | <li>N-able</li> |
484 | 485 | <li>National Cyber Security Centre Finland</li> |
| 486 | + <li>National Cyber Security Centre SK-CERT</li> |
485 | 487 | <li>National Instruments</li> |
486 | 488 | <li>NEC Corporation</li> |
487 | 489 | <li>Neo4j</li> |
488 | 490 | <li>NETGEAR</li> |
489 | 491 | <li>Netskope</li> |
490 | 492 | <li>NLnet Labs</li> |
491 | | - <li>NortonLifeLock Inc</li> |
492 | 493 | <li>Nozomi Networks Inc.</li> |
493 | 494 | <li>Nvidia Corporation</li> |
494 | 495 | <li>Omnissa, LLC</li> |
495 | | - <li>OMRON Corporation</li> |
496 | | - <li>ONEKEY GmbH</li> |
497 | 496 | <li>Open Design Alliance</li> |
| 497 | + <li>OpenHarmony</li> |
498 | 498 | <li>OpenJS Foundation</li> |
499 | 499 | <li>OpenText (formerly Micro Focus)</li> |
500 | 500 | <li>OpenVPN Inc.</li> |
501 | 501 | <li>OPPO</li> |
502 | 502 | <li>Palantir Technologies</li> |
503 | | - <li>Panasonic Holdings Corporation</li> |
| 503 | + <li>Palo Alto Networks</li> |
504 | 504 | <li>PaperCut Software Pty Ltd</li> |
505 | 505 | <li>Payara</li> |
506 | 506 | <li>Pegasystems</li> |
|
512 | 512 | <li>Project Black</li> |
513 | 513 | <li>Proofpoint Inc.</li> |
514 | 514 | <li>Protect AI</li> |
| 515 | + <li>PTC Inc.</li> |
515 | 516 | <li>Pure Storage, Inc.</li> |
516 | 517 | <li>QNAP Systems, Inc.</li> |
517 | 518 | <li>Qualcomm, Inc.</li> |
|
521 | 522 | <li>Rapid7, Inc.</li> |
522 | 523 | <li>Real-Time Innovations, Inc.</li> |
523 | 524 | <li>Red Hat CNA-LR</li> |
524 | | - <li>Red Hat, Inc.</li> |
525 | 525 | <li>Ribose Limited</li> |
526 | 526 | <li>Robert Bosch GmbH</li> |
527 | 527 | <li>Rockwell Automation</li> |
528 | 528 | <li>S21sec Cyber Solutions by Thales</li> |
529 | 529 | <li>SailPoint Technologies</li> |
530 | 530 | <li>Samsung TV & Appliance</li> |
531 | 531 | <li>SAP SE</li> |
| 532 | + <li>SBA Research gGmbH</li> |
532 | 533 | <li>Schneider Electric SE</li> |
533 | | - <li>Seagate Technology</li> |
| 534 | + <li>Secomea</li> |
534 | 535 | <li>Security Risk Advisors</li> |
535 | 536 | <li>ServiceNow</li> |
536 | 537 | <li>SICK AG</li> |
|
542 | 543 | <li>SolarWinds</li> |
543 | 544 | <li>Solidigm</li> |
544 | 545 | <li>Sonatype Inc.</li> |
545 | | - <li>Sophos</li> |
546 | 546 | <li>Spanish National Cybersecurity Institute, S.A.</li> |
547 | 547 | <li>Spartans Security</li> |
548 | 548 | <li>Suse</li> |
|
555 | 555 | <li>TCS-CERT </li> |
556 | 556 | <li>TeamViewer Germany GmbH</li> |
557 | 557 | <li>Temporal Technologies Inc.</li> |
558 | | - <li>Tenable Network Security, Inc.</li> |
559 | 558 | <li>Teradyne Robotics</li> |
560 | 559 | <li>Thales Group</li> |
561 | 560 | <li>The Browser Company of New York</li> |
562 | 561 | <li>The Document Foundation</li> |
563 | 562 | <li>The Joomla! Project</li> |
564 | 563 | <li>The Missing Link Australia (TML)</li> |
565 | 564 | <li>The Qt Company</li> |
566 | | - <li>The Rust Project</li> |
567 | 565 | <li>The Tcpdump Group</li> |
568 | 566 | <li>TianoCore.org</li> |
569 | | - <li>TIBCO Software Inc.</li> |
570 | 567 | <li>Toreon</li> |
571 | 568 | <li>TP-Link Systems Inc.</li> |
572 | 569 | <li>TR-CERT (Computer Emergency Response Team of the Republic of Turkey)</li> |
573 | 570 | <li>Trellix</li> |
574 | 571 | <li>Trend Micro, Inc.</li> |
| 572 | + <li>Turan Security</li> |
575 | 573 | <li>TWCERT/CC</li> |
576 | 574 | <li>TYPO3 Association</li> |
577 | 575 | <li>upKeeper Solutions</li> |
578 | 576 | <li>Vaadin Ltd.</li> |
579 | 577 | <li>Vivo Mobile Communication Technology Co., LTD.</li> |
580 | 578 | <li>VulDB</li> |
| 579 | + <li>VulnCheck</li> |
| 580 | + <li>VULSec Labs</li> |
581 | 581 | <li>WatchGuard Technologies, Inc.</li> |
582 | 582 | <li>Western Digital</li> |
583 | | - <li>Wind River Systems Inc.</li> |
584 | 583 | <li>Wiz, Inc.</li> |
585 | 584 | <li>wolfSSL Inc.</li> |
586 | 585 | <li>Wordfence</li> |
|
0 commit comments