Known Exploited Vulnerabilities and counting....

A known exploited vulnerability (KEV) refers to a software vulnerability that is being actively exploited by cybercriminals or threat actors. When a vulnerability becomes known to be exploited in the wild, it signals that the vulnerability poses a significant and imminent risk to organizations.

Woman Looking at Computer Screen

CVEs form a database of known security vulnerabilities that are actively tracked and managed by a group of organizations, such as the U.S. National Cyber Security Alliance. CVEs are an important tool for network security management because they not only provide an inventory of existing vulnerabilities, but also provide information about how the vulnerability can be exploited and instructions on how to protect against it.

Search Known Exploits

Search for CVEs by vendor to identify known exploited vulnerabilities in your environment

Loading vendors...
Loading...
Zombie hands

CVE = Common Vulnerability and Exposure

CVE OF THE WEEK:

Palo Alto Networks

PAN-OS
Patch deadline: 10 months ago on 01/20/2025

CVE-2024-3393

Palo Alto Networks PAN-OS contains a vulnerability in parsing and logging malformed DNS packets in the DNS Security feature that, when exploited, allows an unauthenticated attacker to remotely reboot the firewall. Repeated attempts to trigger this condition will cause the firewall to enter maintenance mode.

Palo Alto Networks PAN-OS Malformed DNS Packet Vulnerability

Learn more about this CVE: paloaltonetworks.com

News Logo

Cyber Security News

You may have missed...


📌 Pinned

*

https:betanews.comMar 5

Inside a cyberattack: How hackers steal data

The truth about cybersecurity is that it's almost impossible to keep hackers outside of an organization, particularly as the cybercrime industry ...

https://www.bbc.comNov 5

M&S profits halved after cyber hack left shelves empty and hit sales - BBC

Marks & Spencer's online and in-store sales were hit by a cyber attack which it said cost it ÂŁ101m.

https://www.techradar.comNov 5

Hackers are teaming up with organized crime gangs to steal cargo right from supply chains

Hackers are creating phishing attacks for logistics companies · They then gain access and redirect shipments to new destinations · Real organized crim...

https://techcrunch.comNov 5

University of Pennsylvania confirms hacker stole data during cyberattack - TechCrunch

Penn experienced a data breach on Friday as hackers sent messages boasting of the hack to the university community.

https://thehill.comNov 5

The US must not endorse Russia and China's vision for cybersecurity - The Hill

A Joint Cybersecurity Advisory published by the Cybersecurity & Infrastructure Security Agency about destructive malware that is targeting ...

https://www.youtube.comNov 5

China's hacked into U.S. critical infrastructure to preposition for future conflict - YouTube

Nicole Perlroth, 'To Catch a Thief' podcast host, 'This Is How They Tell Me The World Ends' author and former cybersecurity reporter at The New ...

https://www.youtube.comNov 5

Former CISA Director Chris Krebs on the multi-million dollar crypto hack - YouTube

Chris Krebs, former Cybersecurity and Infrastructure Security Agency director, joins 'Squawk Box' to discuss details of the multi-million dollar ...

https://www.ccn.comNov 5

Peace Through Trade: How a $100K Loss Inspired a Secure Layer-1 Blockchain - CCN.com

After losing $100K to a phishing attack, Kyleigha Beckmann built Peace Through Trade—a Layer-1 blockchain focused on security, accessibility, ...

https://vocal.mediaNov 4

The Price of Weak Security: How Small Mistakes Keep Costing Crypto Investors Millions

There's no bank manager to call if your Bitcoin disappears, and there is no fraud department to reverse a shady transaction. Once your crypto is gone,...


Updated daily