New in Nebula & OneView: CVE Tags for Ransomware-Linked Vulnerabilities 

Joana Pereira, Product Manager Asset & Email Security

Joana Pereira, Product Manager Asset & Email Security

In February 2025, ransomware groups like Cl0p and RansomHub ran riot — targeting organizations across sectors with a mix of zero-days and known vulnerabilities. (Full breakdown here

To help security teams stay ahead of threats, our Nebula and OneView consoles now display information directly from the Cybersecurity and Infrastructure Security Agency (CISA) regarding vulnerabilities exploited in ransomware campaigns.  

Why This Update Matters 

CISA curates the Known Exploited Vulnerabilities (KEV) Catalog — a trusted source for vulnerabilities confirmed to be actively exploited in the wild. 

CISA added a crucial new indicator: “Known To Be Used in Ransomware Campaigns” – (more information here). This highlights vulnerabilities that have been linked to real ransomware activity in the field. These aren’t theoretical risks — they’re the same CVEs leveraged in attacks like the ones we saw just weeks ago. 

What You’ll See in Nebula & OneView 

  • New “Ransomware Risk” label added to CVEs confirmed by CISA as used in ransomware campaigns 
  • An info icon that informs these were sourced directly from CISA’s Ransomware vulnerability warning 
  • All visible in your Vulnerabilities page and CVE detail slide-outs 

What You Can Do Now 

This integration helps your team identify and prioritize ransomware-linked CVEs faster — so you can patch what matters most, sooner. 

Login to Nebula or OneView to see which CVEs in your environment carry this extra layer of risk. And if you missed it, read our full analysis of ransomware in February 2025 to see how these threats are evolving — and what defenders need to know now. 

ThreatDown Support articles links: