Known Exploited Vulnerabilities and counting....

A known exploited vulnerability (KEV) refers to a software vulnerability that is being actively exploited by cybercriminals or threat actors. When a vulnerability becomes known to be exploited in the wild, it signals that the vulnerability poses a significant and imminent risk to organizations.

Cybersecurity Editorial Brief — April 9, 2026

State-Sponsored Activity and Critical Infrastructure Under Pressure

The UK's National Cyber Security Centre issued an advisory warning that Russian state hacking group APT28 is exploiting vulnerabilities in TP-Link and MikroTik routers to facilitate credential theft and network infiltration. Simultaneously, U.S. agencies warned of ongoing attacks targeting internet-connected programmable logic controllers (PLCs) in critical infrastructure environments, highlighting persistent exposure of operational technology to external threats. The FBI's 2025 Internet Crime Report underscores the broader trend: U.S. cybercrime losses reached $21 billion, with ransomware attacks significantly outpacing traditional data breaches as the dominant threat vector.

AI in Cybersecurity: Dual-Use Concerns Emerge

Anthropic unveiled "Claude Mythos" and Project Glasswing, a frontier AI model designed to identify security vulnerabilities at scale. The company is restricting public access due to concerns the tool could enable sophisticated attacks if widely distributed, making it available only to vetted cybersecurity specialists. CrowdStrike's CEO echoed similar concerns, warning that AI-driven vulnerability discovery will likely trigger a surge in attacks as both defenders and adversaries gain capability. Meanwhile, a new variant of Chaos malware is exploiting misconfigured cloud deployments and now includes SOCKS proxy functionality, demonstrating how threat actors continue to evolve against cloud-native infrastructure.

Breaches Impact Healthcare and Financial Services

CareCloud disclosed a security incident in which attackers accessed systems storing electronic health records for over eight hours. Separately, Figure Technology confirmed a breach affecting nearly one million users following a social engineering attack attributed to the ShinyHunters group, resulting in 2.5 gigabytes of stolen data. At the local government level, a cyberattack on Winona County, Minnesota prompted Governor Tim Walz to authorize National Guard assistance after the incident significantly impaired emergency and municipal services.

Sources: Tom's Hardware · The Hacker News · Industrial Cyber · Industrial Cyber · The Guardian · Security Week · CNBC · WFIN · Top Class Actions · MPR News

Woman Looking at Computer Screen

CVEs form a database of known security vulnerabilities that are actively tracked and managed by a group of organizations, such as the U.S. National Cyber Security Alliance. CVEs are an important tool for network security management because they not only provide an inventory of existing vulnerabilities, but also provide information about how the vulnerability can be exploited and instructions on how to protect against it.

Search Known Exploits

Search for CVEs by vendor to identify known exploited vulnerabilities in your environment

Loading vendors...

Upcoming Patch Due Dates

via Binding Operational Directive 22-01

(BOD) 22-01 is a directive issued by the Cybersecurity and Infrastructure Security Agency (CISA) in the United States to federal agencies and federal contractors in order to improve their cybersecurity practices. It provides a set of guidelines and requirements that these agencies and contractors must follow to increase their defenses against cyber threats.

Loading...

News Logo

Cyber Security News

You may have missed...


📌 Pinned

*

https:betanews.comMar 5

Inside a cyberattack: How hackers steal data

The truth about cybersecurity is that it's almost impossible to keep hackers outside of an organization, particularly as the cybercrime industry ...

https://www.theregister.comApr 8

Criminal wannabes even more dangerous than the pros - The Register

Over the last couple of months, her team has investigated ransomware infections ranging from an attack against a US healthcare organization attributed...

https://cybernews.comApr 9

Dutch hospitals disconnect systems after patient software cyberattack - Cybernews

ChipSoft ransomware attack hits 70% of Dutch hospitals, patient data potentially stolen.

https://www.nsa.govAug 27

NSA and Others Provide Guidance to Counter China State-Sponsored Actors Targeting Critical Infrastructure

The NSA and other U.S. and foreign organizations released a joint Cybersecurity Advisory exposing advanced persistent threat actors sponsored by the C...

https://cybernews.comApr 9

Dutch hospitals disconnect systems after patient software cyberattack - Cybernews

ChipSoft ransomware attack hits 70% of Dutch hospitals, patient data potentially stolen.

https://arstechnica.comApr 9

Thousands of consumer routers hacked by Russia's military - Ars Technica

End-of-life routers in homes and small offices hacked in 120 countries.

https://arstechnica.comApr 9

Iran-linked hackers disrupt operations at US critical infrastructure sites - Ars Technica

Hackers working on behalf of the Iranian government are disrupting operations at multiple US critical infrastructure sites, likely in response to ...

https://www.axios.comApr 8

Anthropic Announces Project Glasswing: AI-Powered Vulnerability Discovery Initiative

Anthropic announced Project Glasswing, providing its Claude Mythos frontier model to over 40 organizations including major tech giants to discover and...

https://www.wired.comApr 8

Men Are Buying Hacking Tools to Use Against Their Wives and Friends | WIRED

Thousands of men are members of Telegram groups and channels that advertise and sell hacking and surveillance services that can be used to harass ...


Updated daily