Known Exploited Vulnerabilities and counting....
A known exploited vulnerability (KEV) refers to a software vulnerability that is being actively exploited by cybercriminals or threat actors. When a vulnerability becomes known to be exploited in the wild, it signals that the vulnerability poses a significant and imminent risk to organizations.
Cybersecurity Brief — May 22, 2026
Federal cybersecurity policy faces competing pressures as state officials traveled to Washington this week requesting increased funding and staffing for programs including the State and Local Cybersecurity Grant Program (SLCGP) and CISA operations. Testimony from cyber leaders in Tennessee, New York, and Florida emphasized escalating threats against state and local governments, which often lack resources to defend critical infrastructure. The push comes as the Trump administration postponed signing a planned executive order on AI and cybersecurity amid concerns the regulatory framework could undermine U.S. competitiveness in artificial intelligence development.
New York's Department of Financial Services issued guidance warning regulated entities about heightened cybersecurity risks associated with frontier AI models, emphasizing that traditional vulnerability management and comprehensive security programs remain the foundation for defending against AI-enabled threats. Separately, Grafana confirmed it was compromised by the Coinbase Cartel ransomware group, with investigation ongoing into the scope and nature of data exfiltration. The incident adds to a growing list of software and service providers targeted by ransomware operators seeking high-value intellectual property and customer data.
Sources: DFS NY · GovTech · Yahoo · WSJ · SharkStriker
Common Vulnerability and Exposure
CVEs form a database of known security vulnerabilities that are actively tracked and managed by a group of organizations, such as the U.S. National Cyber Security Alliance. CVEs are an important tool for network security management because they not only provide an inventory of existing vulnerabilities, but also provide information about how the vulnerability can be exploited and instructions on how to protect against it.
Search Known Exploits
Search for CVEs by vendor or product to identify known exploited vulnerabilities in your environment
Upcoming Patch Due Dates
via Binding Operational Directive 22-01
(BOD) 22-01 is a directive issued by the Cybersecurity and Infrastructure Security Agency (CISA) in the United States to federal agencies and federal contractors in order to improve their cybersecurity practices. It provides a set of guidelines and requirements that these agencies and contractors must follow to increase their defenses against cyber threats.
Loading...
Cyber Security News
You may have missed...
*
Inside a cyberattack: How hackers steal data
The truth about cybersecurity is that it's almost impossible to keep hackers outside of an organization, particularly as the cybercrime industry ...
Google's AI is being manipulated. The search giant is quietly fighting back - BBC
A BBC investigation revealed a simple way to get AI chatbots to spit out misinformation. Google and other AI companies are now trying to fix the ...
Russian Hackers Are Inside American Home Routers. The FBI Has a 5-Step Fix - CNET
A coordinated cyberattack by Russia's GRU targeted home and small office routers across 23 states. Here's how to check yours and lock it down.
Chinese hackers target telcos with new Linux, Windows malware - Bleeping Computer
A Chinese cyber-espionage campaign has been targeting telecommunications providers with newly discovered Linux and Windows malware dubbed Showboat ...
CISA Adds Exploited Langflow and Trend Micro Apex One Vulnerabilities to KEV
The vulnerability has since been exploited by an Iranian state-sponsored hacking ... © 2026 The Hacker News. All Rights Reserved.
Trump postpones signing AI and cybersecurity order - Yahoo
US President Donald Trump on Thursday postponed signing an executive order on AI and cybersecurity over concerns it could shrink the country's AI lead...
State Cyber Leaders Ask Congress to Support SLCGP, CISA - GovTech
Cybersecurity and technology officials from the state governments of Tennessee, New York and Florida travelled to Washington, D.C., to testify before ...
House Committee Advances Small Business Cybersecurity Bill - VitalLaw.com
Legislation that would direct the Government Accountability Office to examine the cybersecurity needs of small businesses cleared the House Small ...
How France is fighting crypto wrench attacks after Sandbox case
The reported attempt to kidnap the wife of The Sandbox co-founder Sébastien Borget has shifted attention to the physical side of crypto security.
Updated daily
