Known Exploited Vulnerabilities and counting....

A known exploited vulnerability (KEV) refers to a software vulnerability that is being actively exploited by cybercriminals or threat actors. When a vulnerability becomes known to be exploited in the wild, it signals that the vulnerability poses a significant and imminent risk to organizations.

Woman Looking at Computer Screen

CVEs form a database of known security vulnerabilities that are actively tracked and managed by a group of organizations, such as the U.S. National Cyber Security Alliance. CVEs are an important tool for network security management because they not only provide an inventory of existing vulnerabilities, but also provide information about how the vulnerability can be exploited and instructions on how to protect against it.

Search Known Exploits

Search for CVEs by vendor to identify known exploited vulnerabilities in your environment

Loading vendors...

Upcoming Patch Due Dates

via Binding Operational Directive 22-01

(BOD) 22-01 is a directive issued by the Cybersecurity and Infrastructure Security Agency (CISA) in the United States to federal agencies and federal contractors in order to improve their cybersecurity practices. It provides a set of guidelines and requirements that these agencies and contractors must follow to increase their defenses against cyber threats.

Loading...

News Logo

Cyber Security News

You may have missed...


📌 Pinned

*

https:betanews.comMar 5

Inside a cyberattack: How hackers steal data

The truth about cybersecurity is that it's almost impossible to keep hackers outside of an organization, particularly as the cybercrime industry ...

https://www.bleepingcomputer.comMar 5

FBI arrests suspect linked to $46M crypto theft from US Marshals - Bleeping Computer

... security keys. Daghita's arrest and seized assets (FBI). John Daghita (who uses the "Lick" online handle) is ...

https://thedefiant.ioMar 5

Crypto Crime Hits Record $154 Billion as Sanctioned States Turn to Blockchain

... crypto crime. By: The Defiant Team •. Security. Crypto Crime Hits Record $154 Billion as Sanctioned States Turn to Blockchain. Illicit cryptocurre...

https://www.latimes.comMar 5

How our AI bots are ignoring their programming and giving hackers superpowers

Cybercriminals are exploiting AI chatbots to launch sophisticated hacking attacks, with hackers recently stealing 195 million identities from Mexican ...

https://www.schneier.comMar 5

Hacked App Part of US/Israeli Propaganda Campaign Against Iran - Schneier on Security

They came not from the government advising caution, but from an apparently hacked prayer-timing app called BadeSaba Calendar that has been downloaded ...

https://www.yahoo.comMar 5

FBI warns hackers are forcing ATMs to spit out cash after Connecticut bank was targeted

The pair's charges stem from an ongoing federal investigation into a nationwide "ATM jackpotting" conspiracy in which malware is used to steal money ....

https://www.ndtv.comMar 5

X Exposes Pakistan Man Using 31 Accounts To Post AI Videos Amid US-Israel-Iran Conflict

X's head of product revealed that a Pakistani user hacked 31 accounts to spread AI-generated war videos during the USA, Israel, and Iran conflict.

https://therecord.mediaMar 5

Phobos ransomware leader facing 20 years in prison after pleading guilty to hacking charges

Ptitsyn and several others began using the Phobos ransomware in November 2020, attacking more than 1000 organizations around the world.

https://www.jpost.comMar 5

How Israel's cyber chief fights back in the AI cyber era | The Jerusalem Post

Israel's cyber chief Yossi Karadi warns AI is supercharging hackers, deepfakes, and mass attacks. In an exclusive interview, he outlines new ...


Updated daily