CISA provides secure means for constituents and partners to report incidents, phishing attempts, malware, and vulnerabilities. To submit a report, please select the appropriate method from below:
Submit cyber threat indicators and defensive measures with DHS and the Federal Government (includes sharing under the Cybersecurity Information Sharing Act of 2015).
Report software vulnerabilities or ICS vulnerabilities
Software vulnerabilities or ICS vulnerabilities are defects that allow an attacker to violate an explicit (or implicit) security policy to achieve some impact (or consequence). In particular, defects that allow intruders to gain increased levels of access or interfere with the normal operation of systems are vulnerabilities. Insecure configurations, design choices, and changing environmental conditions can also cause vulnerabilities.
Report Vulnerabilities in U.S. Government websites
Website vulnerabilities are defects that may allow an attacker to violate a security policy to cause some impact or consequence, particularly those vulnerabilities that allow increased levels of access or the ability to interfere with the normal operation of the server or site.
Need CISA's help but don't know where to start?
Organizations can also report anomalous cyber activity and/or cyber incidents by calling +1 (917) 960 3523.