Known Exploited Vulnerabilities and counting....

A known exploited vulnerability (KEV) refers to a software vulnerability that is being actively exploited by cybercriminals or threat actors. When a vulnerability becomes known to be exploited in the wild, it signals that the vulnerability poses a significant and imminent risk to organizations.

Cybersecurity Brief: May 13, 2026

Instructure Pays Ransom Following Massive Canvas Breach

Educational technology provider Instructure has reached a ransom agreement with the ShinyHunters hacking group following a significant breach of its Canvas learning management platform. The incident compromised data from approximately 9,000 educational institutions affecting roughly 275 million individuals, including email addresses, enrollment information, and private messages. The University of Pennsylvania alone reported 306,000 affected affiliates. Instructure agreed to the deal in exchange for assurances that the stolen data would be destroyed rather than publicly released. The decision to negotiate with cybercriminals—rather than refuse payment on principle—highlights the escalating pressures organizations face when balancing data protection obligations against ransomware threats at scale.

Supply Chain and AI-Enhanced Threats Emerge

Foxconn confirmed cyberattacks against facilities in North America, adding to growing concerns about supply chain security affecting major technology manufacturers like Apple. Separately, South Korea announced plans to expand AI cybersecurity defenses after Anthropic's Claude Mythos Preview demonstrated advanced offensive capabilities, signaling that nation-states are taking seriously the threat of AI-powered cyberattacks. The convergence of supply chain vulnerabilities and AI-enhanced attack techniques represents an evolving threat landscape requiring both traditional security controls and novel defensive approaches tailored to autonomous adversarial systems.

Sources: digitimes · UPI · The Daily Pennsylvanian · CBC

Woman Looking at Computer Screen

CVEs form a database of known security vulnerabilities that are actively tracked and managed by a group of organizations, such as the U.S. National Cyber Security Alliance. CVEs are an important tool for network security management because they not only provide an inventory of existing vulnerabilities, but also provide information about how the vulnerability can be exploited and instructions on how to protect against it.

Search Known Exploits

Search for CVEs by vendor or product to identify known exploited vulnerabilities in your environment

Loading vendors and products...

Upcoming Patch Due Dates

via Binding Operational Directive 22-01

(BOD) 22-01 is a directive issued by the Cybersecurity and Infrastructure Security Agency (CISA) in the United States to federal agencies and federal contractors in order to improve their cybersecurity practices. It provides a set of guidelines and requirements that these agencies and contractors must follow to increase their defenses against cyber threats.

Loading...

News Logo

Cyber Security News

You may have missed...


📌 Pinned

*

https:betanews.comMar 5

Inside a cyberattack: How hackers steal data

The truth about cybersecurity is that it's almost impossible to keep hackers outside of an organization, particularly as the cybercrime industry ...

https://www.security.comMay 13

Seedworm: Iran-Linked Hackers Breached Korean Electronics Maker in Global Spying Campaign

Iran-linked threat actor abused signed Fortemedia and SentinelOne binaries for DLL sideloading and exfiltrated data through a public file-transfer ...

https://www.yahoo.comMay 13

Pro-Iran hacking group targets California tech company in flurry of attacks - Yahoo

San Jose-based eBay was hammered by a massive cyberattack allegedly carried out by a pro-Iran hacking group that's now threatening some of world's ...

https://www.digitimes.comMay 13

Foxconn breach underscores rising cybersecurity threats facing Apple suppliers - digitimes

Hon Hai Precision Industry, also known as Foxconn, said some of its facilities in North America were hit by a cyberattack, according to a ...

https://www.idahoednews.orgMay 13

Canvas data breach resolved, Instructure CEO apologizes

Canvas came back online at educational institutions after Instructure reached a deal with hackers to delete stolen sensitive data.

https://www.pymnts.comApr 1

Solana-Based DeFi Exchange Suffers $285 Million Hack

Decentralized cryptocurrency exchange Drift on the Solana blockchain suffered an exploit that drained $285 million in digital assets on April 1, 2026,...

https://www.theregister.comMay 13

Foxconn confirms cyberattack after Nitrogen claims Apple, Nvidia data theft - The Register

... ransomware gang listed the electronics manufacturer on its data leak site. “Some of Foxconn's factories in North America suffered a cyberattack .....

https://www.cnet.comMay 12

5 Steps the FBI Wants You to Take to Secure Your Router Right Now - CNET

The UK's National Cyber Security Centre includes a number of TP-Link routers specifically targeted by the hackers. While that news sounds pretty ...

https://www.insidehighered.comMay 12

Instructure Pays Ransom to Canvas Hackers - Inside Higher Ed

Although the monetary value of the deal is unknown, Instructure says the cybercriminals have returned the hacked personal data and offered ...


Updated daily