Known Exploited Vulnerabilities and counting....

A known exploited vulnerability (KEV) refers to a software vulnerability that is being actively exploited by cybercriminals or threat actors. When a vulnerability becomes known to be exploited in the wild, it signals that the vulnerability poses a significant and imminent risk to organizations.

Cybersecurity Brief — April 6, 2026

Ransomware operators escalate evasion tactics as Qilin and Warlock groups deploy vulnerable kernel-mode drivers to disable over 300 EDR and security tools before deploying encryption. Analysis shows attackers are maintaining persistence for an average of six days post-compromise before executing ransomware, providing a critical window for detection that many organizations are failing to exploit. This "bring your own vulnerable driver" (BYOVD) technique continues to prove effective against enterprise security stacks, highlighting gaps in driver validation and endpoint hardening practices.

Fortinet issued emergency patches for an actively exploited zero-day vulnerability allowing unauthenticated attackers to bypass API authentication and authorization mechanisms. The vendor's rapid response underscores active exploitation in the wild, though details on targeting and scope remain limited. Separately, the EU's CERT-EU attributed the recent European Commission cloud breach to the TeamPCP threat group, confirming that the incident exposed data from at least 29 Union entities. The breach represents a significant intelligence gathering operation against European government infrastructure and raises questions about cloud security postures across member state systems.

Sources: The Hacker News · SecurityWeek · Bleeping Computer

Woman Looking at Computer Screen

CVEs form a database of known security vulnerabilities that are actively tracked and managed by a group of organizations, such as the U.S. National Cyber Security Alliance. CVEs are an important tool for network security management because they not only provide an inventory of existing vulnerabilities, but also provide information about how the vulnerability can be exploited and instructions on how to protect against it.

Search Known Exploits

Search for CVEs by vendor to identify known exploited vulnerabilities in your environment

Loading vendors...

Upcoming Patch Due Dates

via Binding Operational Directive 22-01

(BOD) 22-01 is a directive issued by the Cybersecurity and Infrastructure Security Agency (CISA) in the United States to federal agencies and federal contractors in order to improve their cybersecurity practices. It provides a set of guidelines and requirements that these agencies and contractors must follow to increase their defenses against cyber threats.

Loading...

News Logo

Cyber Security News

You may have missed...


📌 Pinned

*

https:betanews.comMar 5

Inside a cyberattack: How hackers steal data

The truth about cybersecurity is that it's almost impossible to keep hackers outside of an organization, particularly as the cybercrime industry ...

https://www.tradingview.comApr 5

Robert Kiyosaki recommends Bitcoin, gold as 1974 shift comes full circle - TradingView

He also mentioned the passage of the Employee Retirement Income Security ... Bearish sentiment around Bitcoin has climbed to its highest level since ....

https://www.coindesk.comApr 5

Why the mind-bending physics of quantum computing is terrifying for bitcoin and crypto

Ledger's Charles Guillemet says artificial intelligence is making hacks cheaper and faster, forcing a rethink of how crypto systems stay secure. What ...

https://www.bitget.comApr 5

Bitcoin security questioned after Google report highlights quantum computing threat - Bitget

This alarming projection not only brings Bitcoin's security under renewed scrutiny but also raises urgent questions for other cryptocurrencies such as...

https://www.tradingview.comApr 5

Crypto attorney says Drift incident may qualify as 'civil negligence' - TradingView

The hack of the Solana-based decentralized finance (DeFi) platform Drift Protocol could have been prevented if standard operational security ...

https://thehackernews.comApr 6

$285 Million Drift Hack Traced to Six-Month DPRK Social Engineering Operation

In an assessment published in late January 2026, cybersecurity company CrowdStrike described Golden Chollima as an offshoot of Labyrinth Chollima ...

https://cybersecuritynews.comApr 2

New Chrome Zero-Day Vulnerability Actively Exploited in Attacks — Patch Now

Google released an emergency security update for Chrome patching a zero-day use-after-free vulnerability in Dawn that is already being actively exploi...

https://finance.yahoo.comApr 6

North Korean Hackers Spent Six Months Infiltrating Drift Before $285M Exploit

"Crypto teams are now facing adversaries that operate more like intelligence units than hackers, and most organizations are not structurally prepared ...

https://thehackernews.comApr 6

BKA Identifies REvil Leaders Behind 130 German Ransomware Attacks - The Hacker News

Germany's Federal Criminal Police Office (aka BKA or the Bundeskriminalamt) has unmasked the real identities of two of the key figures associated ...


Updated daily