{"id":3305,"date":"2026-05-22T17:02:26","date_gmt":"2026-05-22T17:02:26","guid":{"rendered":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/lawmakers-demand-answers-as-cisa-tries-to-contain-data-leak\/"},"modified":"2026-05-22T17:02:26","modified_gmt":"2026-05-22T17:02:26","slug":"lawmakers-demand-answers-as-cisa-tries-to-contain-data-leak","status":"publish","type":"post","link":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/lawmakers-demand-answers-as-cisa-tries-to-contain-data-leak\/","title":{"rendered":"Lawmakers Demand Answers as CISA Tries to Contain Data Leak"},"content":{"rendered":"<div>\n<p>Lawmakers in both houses of Congress are demanding answers from the <strong>U.S. Cybersecurity &amp; Infrastructure Security Agency<\/strong> (CISA) after KrebsOnSecurity reported this week that a CISA contractor intentionally published AWS GovCloud keys and a vast trove of other agency secrets on a public <strong>GitHub<\/strong> account. The inquiry comes as CISA is still struggling to contain the breach and invalidate the leaked credentials.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-73648 aligncenter\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2026\/05\/CISA-logo.png\" alt=\"\" width=\"748\" height=\"153\" srcset=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2026\/05\/CISA-logo.png 1873w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2026\/05\/CISA-logo-768x157.png 768w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2026\/05\/CISA-logo-1536x314.png 1536w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2026\/05\/CISA-logo-782x160.png 782w\" sizes=\"auto, (max-width: 748px) 100vw, 748px\"><\/p>\n<p>On May 18, KrebsOnSecurity reported that a CISA contractor with administrative access to the agency\u2019s code development platform had <a href=\"https:\/\/krebsonsecurity.com\/2026\/05\/cisa-admin-leaked-aws-govcloud-keys-on-github\/\" target=\"_blank\" rel=\"noopener\">created a public GitHub profile<\/a> called \u201c<strong>Private-CISA<\/strong>\u201d that included plaintext credentials to dozens of internal CISA systems. Experts who reviewed the exposed secrets said the commit logs for the code repository showed the CISA contractor disabled GitHub\u2019s built-in protection against publishing sensitive credentials in public repos.<\/p>\n<p>CISA acknowledged the leak but has not responded to questions about the duration of the data exposure. However, experts who reviewed the now-defunct Private-CISA archive said it was originally created in November 2025, and that it exhibits a pattern consistent with an individual operator using the repository as a working scratchpad or synchronization mechanism rather than a curated project repository.<\/p>\n<p>In a written statement, CISA said \u201cthere is no indication that any sensitive data was compromised as a result of the incident.\u201d But in a <a href=\"https:\/\/www.hassan.senate.gov\/imo\/media\/doc\/letter_to_cisa_re_data_security.pdf\" target=\"_blank\" rel=\"noopener\">May 19 a letter<\/a> (PDF) to CISA\u2019s Acting Director <strong>Nick Andersen<\/strong>, <strong>Sen. Maggie Hassan<\/strong> (D-NH) said the credential leak raises serious questions about how such a security lapse could occur at the very agency charged with helping to prevent cyber breaches.<\/p>\n<p>\u201cThis reporting raises serious concerns regarding CISA\u2019s internal policies and procedures at a time of significant cybersecurity threats against U.S. critical infrastructure,\u201d Sen. Hassan wrote.<\/p>\n<div id=\"attachment_73646\" style=\"width: 818px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-73646\" decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-73646\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2026\/05\/HassanCISAletter.png\" alt=\"\" width=\"808\" height=\"823\" srcset=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2026\/05\/HassanCISAletter.png 808w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2026\/05\/HassanCISAletter-768x782.png 768w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2026\/05\/HassanCISAletter-782x797.png 782w\" sizes=\"auto, (max-width: 808px) 100vw, 808px\"><\/p>\n<p id=\"caption-attachment-73646\" class=\"wp-caption-text\">A May 19 letter from Sen. Margaret Hassan (D-NH) to the acting director of CISA demanded answers to a dozen questions about the breach.<\/p>\n<\/div>\n<p>Sen. Hassan noted that the incident occurred against the backdrop of major disruptions internally at CISA, which <a href=\"https:\/\/www.cybersecuritydive.com\/news\/cisa-cybersecurity-division-reorganization\/812155\/\" target=\"_blank\" rel=\"noopener\">lost more than a third of it workforce<\/a> and almost all of its senior leaders after the Trump administration forced a series of early retirements, buyouts, and resignations across the agency\u2019s various divisions.<\/p>\n<p><strong>Rep. Bennie Thompson<\/strong> (D-MS), the ranking member on the House Homeland Security Committee, echoed the senator\u2019s concerns.<\/p>\n<p>\u201cWe are concerned that this incident reflects a diminished security culture and\/or an inability for CISA to adequately manage its contract support,\u201d Thompson wrote in <a href=\"https:\/\/federalnewsnetwork.com\/wp-content\/uploads\/2026\/05\/2026.05.19-T_Andrersen_F_BGT_DR_CISA-AWS-Credentials-Final.pdf\" target=\"_blank\" rel=\"noopener\">a May 19 letter<\/a> to the acting CISA chief that was co-signed by <strong>Rep. Delia Ramirez<\/strong> (D-Ill), the ranking member of the panel\u2019s Subcommittee on Cybersecurity and Infrastructure Protection. \u201cIt\u2019s no secret that our adversaries \u2014 like China, Russia, and Iran \u2014 seek to gain access to and persistence on federal networks. The files contained in the \u2018Private-CISA\u2019 repository provided the information, access, and roadmap to do just that.\u201d<\/p>\n<p>KrebsOnSecurity has learned that more a week after CISA was first notified of the data leak by the security firm <strong>GitGuardian<\/strong>, the agency is still working to invalidate and replace many of the exposed keys and secrets.<\/p>\n<p>On May 20, KrebsOnSecurity heard from <strong>Dylan Ayrey<\/strong>, the creator of <strong>TruffleHog<\/strong>, an open-source tool for discovering private keys and other secrets buried in code hosted at GitHub and other public platforms. Ayrey said CISA still hadn\u2019t invalidated an RSA private key exposed in the Private-CISA repo that granted access to a GitHub app which is owned by the CISA enterprise account and installed on the CISA-IT GitHub organization with full access to all code repositories.<\/p>\n<p>\u201cAn attacker with this key can read source code from every repository in the CISA-IT organization, including private repos, register rogue self-hosted runners to hijack CI\/CD pipelines and access repository secrets, and modify repository admin settings including branch protection rules, webhooks, and deploy keys,\u201d Ayrey told KrebsOnSecurity. CI\/CD stands for Continuous Integration and Continuous Delivery, and it refers to a set of practices used to automate the building, testing and deployment of software.<span id=\"more-73638\"><\/span><\/p>\n<p>KrebsOnSecurity notified CISA about Ayrey\u2019s findings on May 20. CISA acknowledged receipt of that report, but has not responded to follow-up inquiries. Ayrey said CISA appears to have invalidated the exposed RSA private key sometime after that notification. But he noted that CISA still hasn\u2019t rotated leaked credentials tied to other critical security technologies that are deployed across the agency\u2019s technology portfolio (KrebsOnSecurity is not naming those technologies publicly for the time being).<\/p>\n<p>Ayrey said his company Truffle Security monitors GitHub and a number of other code platforms for exposed keys, and attempts to alert affected accounts to the sensitive data exposure(s). They can do easily on GitHub because the platform publishes a live feed which includes a record of all commits and changes to public code repositories. But he said cybercriminal actors also monitor these public feeds, and are often quick to pounce on API or SSH keys that get inadvertently published in code commits.<\/p>\n<div id=\"attachment_73615\" style=\"width: 762px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-73615\" decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-73615\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2026\/05\/privatecisa-filelist.png\" alt=\"The Private CISA GitHub repo exposed dozens of plaintext credentials to important CISA GovCloud resources. The filenames include AWS-Workspace-Bookmarks-April-6-2026.html, AWS-Workspace-Firefox-Passwords.csv, Important AWS Tokens.txt, kube-config.txt, etc.\" width=\"752\" height=\"329\"><\/p>\n<p id=\"caption-attachment-73615\" class=\"wp-caption-text\">The Private-CISA GitHub repo exposed dozens of plaintext credentials to important CISA GovCloud resources.<\/p>\n<\/div>\n<p>In practical terms, it is likely that cybercrime groups or foreign adversaries also noticed the publication of these CISA secrets, the most egregious of which appears to have happened in late April 2025, Ayrey said.<\/p>\n<p>\u201cWe monitor that firehose of data for keys, and we have tools to try to figure out whose they are,\u201d he said. \u201cWe have evidence attackers monitor that firehose as well. Anyone monitoring GitHub events could be sitting on this information.\u201d<\/p>\n<p><strong>James Wilson<\/strong>, the enterprise technology editor for the <em>Risky Business<\/em> security podcast, said organizations using GitHub to manage code projects can set top-down policies that prevent employees from disabling GitHub\u2019s protections against publishing secret keys and credentials. But Wilson\u2019s co-host <strong>Adam Boileau<\/strong> said it\u2019s not clear that any technology could stop employees from opening their own personal GitHub account and using it to store sensitive and proprietary information.<\/p>\n<p>\u201cUltimately, this is a thing you can\u2019t solve with a technical control,\u201d Boileau said on <a href=\"https:\/\/risky.biz\/RB838\/\" target=\"_blank\" rel=\"noopener\">this week\u2019s podcast<\/a>. \u201cThis is a human problem where you\u2019ve hired a contractor to do this work and they have decided of their own volition to use GitHub to synchronize content from a work machine to a home machine. I don\u2019t know what technical controls you could put in place given that this is being done presumably outside of anything CISA managed or even had visibility on.\u201d<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Lawmakers in both houses of Congress are demanding answers from the U.S. Cybersecurity &amp; Infrastructure Security Agency (CISA) after KrebsOnSecurity reported this week that a CISA contractor intentionally published AWS GovCloud keys and a vast trove of other agency secrets on a public GitHub account. The inquiry comes as CISA is still struggling to contain [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-container-style":"default","site-container-layout":"default","site-sidebar-layout":"default","disable-article-header":"default","disable-site-header":"default","disable-site-footer":"default","disable-content-area-spacing":"default","footnotes":""},"categories":[113,1192,582,1193,90,567,1194,296,782,143,1195,1196,789,1197,176,1198,1199],"tags":[91],"class_list":["post-3305","post","type-post","status-publish","format-standard","hentry","category-a-little-sunshine","category-adam-boileau","category-cisa","category-crowdstrike-falcon","category-cybersecurity","category-data-breaches","category-dylan-ayrey","category-github","category-james-wilson","category-latest-warnings","category-nick-andersen","category-rep-bennie-thompson","category-risky-business","category-sen-maggie-hassan","category-the-coming-storm","category-trufflehog","category-u-s-cybersecurity-infrastructure-security-agency","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Lawmakers Demand Answers as CISA Tries to Contain Data Leak - Imperative Business Ventures Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/lawmakers-demand-answers-as-cisa-tries-to-contain-data-leak\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Lawmakers Demand Answers as CISA Tries to Contain Data Leak - Imperative Business Ventures Limited\" \/>\n<meta property=\"og:description\" content=\"Lawmakers in both houses of Congress are demanding answers from the U.S. Cybersecurity &amp; Infrastructure Security Agency (CISA) after KrebsOnSecurity reported this week that a CISA contractor intentionally published AWS GovCloud keys and a vast trove of other agency secrets on a public GitHub account. The inquiry comes as CISA is still struggling to contain [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/lawmakers-demand-answers-as-cisa-tries-to-contain-data-leak\/\" \/>\n<meta property=\"og:site_name\" content=\"Imperative Business Ventures Limited\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-22T17:02:26+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/lawmakers-demand-answers-as-cisa-tries-to-contain-data-leak\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/lawmakers-demand-answers-as-cisa-tries-to-contain-data-leak\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"headline\":\"Lawmakers Demand Answers as CISA Tries to Contain Data Leak\",\"datePublished\":\"2026-05-22T17:02:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/lawmakers-demand-answers-as-cisa-tries-to-contain-data-leak\/\"},\"wordCount\":1070,\"image\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/lawmakers-demand-answers-as-cisa-tries-to-contain-data-leak\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2026\/05\/CISA-logo.png\",\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"A Little Sunshine\",\"Adam Boileau\",\"CISA\",\"Crowdstrike Falcon\",\"Cybersecurity\",\"Data Breaches\",\"Dylan Ayrey\",\"GitHub\",\"James Wilson\",\"Latest Warnings\",\"Nick Andersen\",\"Rep. Bennie Thompson\",\"Risky Business\",\"Sen. Maggie Hassan\",\"The Coming Storm\",\"TruffleHog\",\"U.S. Cybersecurity &amp; Infrastructure Security Agency\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/lawmakers-demand-answers-as-cisa-tries-to-contain-data-leak\/\",\"url\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/lawmakers-demand-answers-as-cisa-tries-to-contain-data-leak\/\",\"name\":\"Lawmakers Demand Answers as CISA Tries to Contain Data Leak - Imperative Business Ventures Limited\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/lawmakers-demand-answers-as-cisa-tries-to-contain-data-leak\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/lawmakers-demand-answers-as-cisa-tries-to-contain-data-leak\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2026\/05\/CISA-logo.png\",\"datePublished\":\"2026-05-22T17:02:26+00:00\",\"author\":{\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/lawmakers-demand-answers-as-cisa-tries-to-contain-data-leak\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/lawmakers-demand-answers-as-cisa-tries-to-contain-data-leak\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/lawmakers-demand-answers-as-cisa-tries-to-contain-data-leak\/#primaryimage\",\"url\":\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2026\/05\/CISA-logo.png\",\"contentUrl\":\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2026\/05\/CISA-logo.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/lawmakers-demand-answers-as-cisa-tries-to-contain-data-leak\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.ibvl.in\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Lawmakers Demand Answers as CISA Tries to Contain Data Leak\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.ibvl.in\/#website\",\"url\":\"https:\/\/blog.ibvl.in\/\",\"name\":\"Imperative Business Ventures Limited\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.ibvl.in\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/blog.ibvl.in\"],\"url\":\"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Lawmakers Demand Answers as CISA Tries to Contain Data Leak - Imperative Business Ventures Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/lawmakers-demand-answers-as-cisa-tries-to-contain-data-leak\/","og_locale":"en_US","og_type":"article","og_title":"Lawmakers Demand Answers as CISA Tries to Contain Data Leak - Imperative Business Ventures Limited","og_description":"Lawmakers in both houses of Congress are demanding answers from the U.S. Cybersecurity &amp; Infrastructure Security Agency (CISA) after KrebsOnSecurity reported this week that a CISA contractor intentionally published AWS GovCloud keys and a vast trove of other agency secrets on a public GitHub account. The inquiry comes as CISA is still struggling to contain [&hellip;]","og_url":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/lawmakers-demand-answers-as-cisa-tries-to-contain-data-leak\/","og_site_name":"Imperative Business Ventures Limited","article_published_time":"2026-05-22T17:02:26+00:00","author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/lawmakers-demand-answers-as-cisa-tries-to-contain-data-leak\/#article","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/lawmakers-demand-answers-as-cisa-tries-to-contain-data-leak\/"},"author":{"name":"admin","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"headline":"Lawmakers Demand Answers as CISA Tries to Contain Data Leak","datePublished":"2026-05-22T17:02:26+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/lawmakers-demand-answers-as-cisa-tries-to-contain-data-leak\/"},"wordCount":1070,"image":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/lawmakers-demand-answers-as-cisa-tries-to-contain-data-leak\/#primaryimage"},"thumbnailUrl":"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2026\/05\/CISA-logo.png","keywords":["Cybersecurity"],"articleSection":["A Little Sunshine","Adam Boileau","CISA","Crowdstrike Falcon","Cybersecurity","Data Breaches","Dylan Ayrey","GitHub","James Wilson","Latest Warnings","Nick Andersen","Rep. Bennie Thompson","Risky Business","Sen. Maggie Hassan","The Coming Storm","TruffleHog","U.S. Cybersecurity &amp; Infrastructure Security Agency"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/lawmakers-demand-answers-as-cisa-tries-to-contain-data-leak\/","url":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/lawmakers-demand-answers-as-cisa-tries-to-contain-data-leak\/","name":"Lawmakers Demand Answers as CISA Tries to Contain Data Leak - Imperative Business Ventures Limited","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/lawmakers-demand-answers-as-cisa-tries-to-contain-data-leak\/#primaryimage"},"image":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/lawmakers-demand-answers-as-cisa-tries-to-contain-data-leak\/#primaryimage"},"thumbnailUrl":"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2026\/05\/CISA-logo.png","datePublished":"2026-05-22T17:02:26+00:00","author":{"@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"breadcrumb":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/lawmakers-demand-answers-as-cisa-tries-to-contain-data-leak\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/lawmakers-demand-answers-as-cisa-tries-to-contain-data-leak\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/lawmakers-demand-answers-as-cisa-tries-to-contain-data-leak\/#primaryimage","url":"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2026\/05\/CISA-logo.png","contentUrl":"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2026\/05\/CISA-logo.png"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/22\/lawmakers-demand-answers-as-cisa-tries-to-contain-data-leak\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.ibvl.in\/"},{"@type":"ListItem","position":2,"name":"Lawmakers Demand Answers as CISA Tries to Contain Data Leak"}]},{"@type":"WebSite","@id":"https:\/\/blog.ibvl.in\/#website","url":"https:\/\/blog.ibvl.in\/","name":"Imperative Business Ventures Limited","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.ibvl.in\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/blog.ibvl.in"],"url":"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/3305","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/comments?post=3305"}],"version-history":[{"count":0,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/3305\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/media?parent=3305"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/categories?post=3305"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/tags?post=3305"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}