Known Exploited Vulnerabilities and counting....

A known exploited vulnerability (KEV) refers to a software vulnerability that is being actively exploited by cybercriminals or threat actors. When a vulnerability becomes known to be exploited in the wild, it signals that the vulnerability poses a significant and imminent risk to organizations.

Cybersecurity Brief – April 4, 2026

North Korean State Actors Execute Year's Largest Crypto Heist

North Korean state-sponsored hackers successfully exploited Solana-based Drift Protocol for $285 million on April 1st, marking 2026's largest cryptocurrency breach. TRM Labs analysis indicates attackers conducted on-chain staging beginning March 11, ultimately compromising multisig controls through social engineering. The incident follows established patterns of DPRK-linked groups targeting decentralized finance platforms to circumvent international sanctions and fund state operations.

Supply Chain Compromises Expose Critical Infrastructure

CERT-EU attributed the theft of 92GB of European Commission data to the TeamPCP hacking group, which exploited a Trivy supply-chain compromise to access AWS infrastructure. The stolen data was subsequently leaked by ShinyHunters. In a separate incident, Anthropic's accidental release of over 512,000 lines of Claude Code source code through a misconfigured npm package is now being actively weaponized—threat actors are deploying fake GitHub repositories distributing Vidar infostealer malware and conducting typosquatting campaigns targeting exposed internal dependencies.

Mobile Platforms Under Active Attack

Kaspersky identified a sophisticated SparkCat malware variant infiltrating both Apple App Store and Google Play that uses OCR technology to extract cryptocurrency recovery phrases from users' photo galleries. WhatsApp separately notified approximately 200 users, predominantly in Italy, who were tricked into installing a counterfeit iOS app containing spyware developed by Italian firm Asigint. Meanwhile, China-linked APT group TA416 has intensified operations against European government entities using PlugX malware and OAuth-based phishing, deploying DLL side-loading techniques to establish persistence.

Sources: The Crimson · The Hacker News · CCN · TRM Labs · TechCrunch · Bloomberg · Bleeping Computer · Security Week

Woman Looking at Computer Screen

CVEs form a database of known security vulnerabilities that are actively tracked and managed by a group of organizations, such as the U.S. National Cyber Security Alliance. CVEs are an important tool for network security management because they not only provide an inventory of existing vulnerabilities, but also provide information about how the vulnerability can be exploited and instructions on how to protect against it.

Search Known Exploits

Search for CVEs by vendor to identify known exploited vulnerabilities in your environment

Loading vendors...

Upcoming Patch Due Dates

via Binding Operational Directive 22-01

(BOD) 22-01 is a directive issued by the Cybersecurity and Infrastructure Security Agency (CISA) in the United States to federal agencies and federal contractors in order to improve their cybersecurity practices. It provides a set of guidelines and requirements that these agencies and contractors must follow to increase their defenses against cyber threats.

Loading...

News Logo

Cyber Security News

You may have missed...


📌 Pinned

*

https:betanews.comMar 5

Inside a cyberattack: How hackers steal data

The truth about cybersecurity is that it's almost impossible to keep hackers outside of an organization, particularly as the cybercrime industry ...

https://www.tradingview.comApr 3

Bitcoin Mining Not As Globally Decentralized As It Appears — Here's Why - TradingView

Bitcoin is often celebrated as a decentralized network, with mining power distributed globally to ensure security and neutrality.

https://news.bitcoin.comApr 3

Charles Schwab Announces Crypto Accounts Are 'Coming Soon' - Bitcoin.com News

Social platform X is rolling out a new security measure aimed at tackling one of the most persistent threats in crypto: account takeovers used to ...

https://www.msn.comApr 4

Quantum risk to crypto is advancing, Google paper warns - MSN

The tech giant recently announced its own timeline to migrate all security systems to post-quantum cryptography by 2029. The company has been working ...

https://cryptonews.netApr 4

Solana's quantum-threat readiness reveals harsh tradeoff: security vs speed - Cryptonews.net

Crypto has spent years obsessing over speed, fees and scalability. Now it may have to confront a more existential question: what happens when its ...

https://techcrunch.comApr 3

Europe's cyber agency blames hacking gangs for massive data breach and leak

CERT-EU attributed the European Commission cloud hack to TeamPCP threat group, with 92 gigabytes of data stolen from AWS including emails and personal...

https://www.ccn.comApr 2

Drift Protocol Hit by $285M Exploit: Crypto's Biggest Hack of 2026 Unfolds on April Fool's Day

Solana-based Drift Protocol suffered a $285 million exploit on April 1, 2026, the largest crypto hack of the year, using a fake token and compromised ...

https://thehackernews.comApr 1

CERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million Emails

Threat actors tracked as UAC-0255 impersonated Ukraine's CERT-UA on March 26-27, 2026, distributing AGEWHEEZE remote access trojan to state organizati...

https://socradar.ioApr 2

Progress ShareFile Flaws CVE-2026-2699 & CVE-2026-2701 RCE

Newly disclosed Progress ShareFile pre-auth RCE chain allows attackers to move from unauthenticated access to server-side compromise affecting custome...


Updated daily