{"id":302133,"date":"2024-08-26T14:08:17","date_gmt":"2024-08-26T14:08:17","guid":{"rendered":"https:\/\/www.techopedia.com\/?p=302133"},"modified":"2024-08-26T14:08:17","modified_gmt":"2024-08-26T14:08:17","slug":"exploring-the-u-s-report-a-vulnerability-act-expert-analysis","status":"publish","type":"post","link":"https:\/\/www.techopedia.com\/exploring-the-u-s-report-a-vulnerability-act-expert-analysis","title":{"rendered":"Exploring the U.S. \u2018Report a Vulnerability\u2019 Act: Expert Analysis"},"content":{"rendered":"

In 2014 and 2015, two interconnected cyberattacks<\/a> targeted and breached the U.S. Office of Personnel Management (OPM), a federal agency. Data, including social security numbers of 21.5 million people, were stolen.<\/p>\n

Six years later, in 2021, the Colonial Pipeline ransomware<\/a> attack crippled a major fuel pipeline, disrupting supply chains across the Eastern United States and indirectly impacting federal agencies.<\/p>\n

And in 2023 the SolarWinds remote trojan attack <\/a>affected about 100 organizations, driving a cyberespionage operation that targeted federal agencies and federal contractors.<\/p>\n

The list of high-profile cyberattacks that impacted federal agencies is as extensive as it is concerning. In response, the government is pushing for a new vulnerability act that would mandate all federal contractors \u2014 vital contributors to the federal government supply chain \u2014 to deploy and maintain Vulnerability Disclosure Programs (VDPs).<\/p>\n

\n

Key Takeaways<\/span><\/h2>\n