Known Exploited Vulnerabilities and counting....

A known exploited vulnerability (KEV) refers to a software vulnerability that is being actively exploited by cybercriminals or threat actors. When a vulnerability becomes known to be exploited in the wild, it signals that the vulnerability poses a significant and imminent risk to organizations.

Cybersecurity Editorial Brief — April 20, 2026

Critical infrastructure targeting escalated this week with the discovery of ZionSiphon, a newly identified malware specifically engineered to compromise Israeli water treatment and desalination systems. Researchers have confirmed the malware's operational technology (OT) focus, marking another concerning development in the ongoing targeting of utilities and essential services in the Middle East. The disclosure comes as tensions remain high following recent regional cyberattacks.

Meanwhile, medical device manufacturer Stryker confirmed full recovery from a March 11 wiper attack attributed to Iranian threat actors. The incident saw attackers leverage a compromised administrative account to deploy malicious payloads through Microsoft Intune, effectively disabling systems across the organization. The attack timeline coincides with a 47-day near-complete internet outage in Iran that ended April 17, which Palo Alto Networks' Unit 42 linked to US and Israeli military operations. Iran has begun restoring limited internet access to select population segments, though the broader implications for regional cyber operations remain unclear.

In a separate incident highlighting vulnerabilities within the security industry itself, Mexican cybersecurity firm BePrime suffered a breach exposing 12.6 GB of client data and surveillance system information. The compromise underscores persistent risks even among organizations tasked with protecting others, raising questions about third-party security assurances and the protection of sensitive client infrastructure details.

Sources: The Hacker News · Escudo Digital · Unit 42

Woman Looking at Computer Screen

CVEs form a database of known security vulnerabilities that are actively tracked and managed by a group of organizations, such as the U.S. National Cyber Security Alliance. CVEs are an important tool for network security management because they not only provide an inventory of existing vulnerabilities, but also provide information about how the vulnerability can be exploited and instructions on how to protect against it.

Search Known Exploits

Search for CVEs by vendor to identify known exploited vulnerabilities in your environment

Loading vendors...

Upcoming Patch Due Dates

via Binding Operational Directive 22-01

(BOD) 22-01 is a directive issued by the Cybersecurity and Infrastructure Security Agency (CISA) in the United States to federal agencies and federal contractors in order to improve their cybersecurity practices. It provides a set of guidelines and requirements that these agencies and contractors must follow to increase their defenses against cyber threats.

Loading...

News Logo

Cyber Security News

You may have missed...


📌 Pinned

*

https:betanews.comMar 5

Inside a cyberattack: How hackers steal data

The truth about cybersecurity is that it's almost impossible to keep hackers outside of an organization, particularly as the cybercrime industry ...

https://www.bloomberg.comApr 20

Crypto Hack Worth $290 Million Triggers DeFi Contagion Shock

Hackers exploited a cross-chain bridge on Saturday, draining nearly $300 million from Kelp DAO and setting off a ripple effect across multiple crypto ...

https://www.coindesk.comApr 20

Hack at Vercel sends crypto developers scrambling to lock down API keys

Web infrastructure provider Vercel disclosed a security breach exposing customer API keys, forcing crypto projects including Solana-based exchange Orc...

https://ambcrypto.comApr 19

Biggest DeFi hack of 2026? $294mln KelpDAO exploit hits 20+ chains

The Kelp DAO exploit affecting 20+ blockchains caused LayerZero's ZRO token to drop 22% and triggered multi-billion dollar withdrawals across DeFi len...

https://www.coindesk.comApr 20

DeFi TVL drops more than $13 billion in two days following Kelp DAO hack

Total value locked across DeFi fell $13.21 billion with Aave suffering $8.45 billion in deposit exits as attackers used stolen rsETH as collateral to ...

https://www.coindesk.comApr 19

The $292 million Kelp crypto exploit: how it happened, and what it means for DeFi

A detailed analysis of the Kelp DAO exploit showing how attackers used a misconfigured LayerZero bridge and single-signer setup to drain $292 million ...

https://www.coindesk.comApr 18

Kelp DAO exploited for $292 million with wrapped ether stranded across 20 chains

An attacker exploited Kelp DAO's LayerZero-powered bridge to drain 116,500 rsETH tokens worth approximately $292 million, affecting multiple blockchai...

https://www.coindesk.comApr 20

'DeFi is dead': Here is how crypto community is reacting after massive $292 million hack

A $292 million exploit of Kelp DAO's rsETH token exposed flaws in cross-chain verification setup and triggered widespread community concern about DeFi...

https://www.pymnts.comApr 19

Kelp DAO $293 Million Hack Largest DeFi Theft of 2026

Hackers stole nearly $300 million from Kelp DAO on Sunday, April 19, triggering a ripple effect across cryptocurrency platforms.


Updated daily