Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

FIRST Forecasts Record-Breaking 50,000+ CVEs in 2026

February 11, 2026

Eclipse Foundation Mandates Pre-Publish Security Checks for Open VSX Extensions

February 11, 2026

North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms

February 11, 2026
Facebook X (Twitter) Instagram
Wednesday, February 11
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»US Agencies Told to Scrap End of Support Edge Devices
Cyber Security

US Agencies Told to Scrap End of Support Edge Devices

Team-CWDBy Team-CWDFebruary 9, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Amid exploitation campaigns targeting end of support (EOS) edge devices, the US’ leading cybersecurity agency has issued a directive to decommission all such devices within 12 months.

On February 5, the Cybersecurity and Infrastructure Security Agency (CISA) published Binding Operational Directive 26-02: Mitigating Risk From End-of-Support Edge Devices.

The directive applies to all civil federal, executive branch, departments and agencies.

“The imminent threat of exploitation to agency information systems running EOS edge devices is substantial and constant, resulting in a significant threat to federal property,” said CISA in a statement.

The agency noted that, unlike other attack vectors, this issue can be remediated by following lifecycle management practices, which are outlined in the directive.

EOS devices deployed on the “edge” or public-facing areas of federal networks, exposed to external environments such as the internet are being specifically targeted by the decommissioning.

CISA noted that EOS devices ought not to reside elsewhere on federal networks.

End‑of‑life devices have become attractive targets for nation‑state threat actors, who increasingly exploit outdated or unsupported hardware as an entry point into networks.

Timeline for End-of-Life Device Decommissioning

To first support agencies identify EOS devices, CISA has developed an EOS Edge Device List.

Using this list, federal agencies are required to identify and remediate vulnerabilities within the first three months of directive issuance. 

All devices with an EOS date on or before 12 months from the issuance of the directive must be decommissioned and the action reported to CISA.

All edge devices with an EOS within the following 12 months must be inventoried.

Within 18 months from the directive issue date, all identified d EOS edge devices from agency networks, replacing devices as needed with vendor-supported devices that can receive current security updates.

Next, agencies must, within two years, establish a process for continuous discovery of all edge devices within their environments and maintain an inventory of those that are EOS or will become EOS within twelve months.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleSocial Media Platforms Earn Billions from Scam Ads
Next Article Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos
Team-CWD
  • Website

Related Posts

Cyber Security

New Mobile Spyware ZeroDayRAT Targets Android and iOS

February 10, 2026
Cyber Security

NCSC Issues Warning Over “Severe” Cyber-Attacks Targeting CNI

February 10, 2026
Cyber Security

Two Connecticut Men Charged In Alleged $3m Gambling Fraud Scheme

February 9, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Can password managers get hacked? Here’s what to know

November 14, 2025

What if your romantic AI chatbot can’t keep a secret?

November 18, 2025

The WhatsApp screen-sharing scam you didn’t see coming

November 6, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.