Known Exploited Vulnerabilities and counting....

A known exploited vulnerability (KEV) refers to a software vulnerability that is being actively exploited by cybercriminals or threat actors. When a vulnerability becomes known to be exploited in the wild, it signals that the vulnerability poses a significant and imminent risk to organizations.

Cybersecurity Brief — May 22, 2026

Federal cybersecurity policy faces competing pressures as state officials traveled to Washington this week requesting increased funding and staffing for programs including the State and Local Cybersecurity Grant Program (SLCGP) and CISA operations. Testimony from cyber leaders in Tennessee, New York, and Florida emphasized escalating threats against state and local governments, which often lack resources to defend critical infrastructure. The push comes as the Trump administration postponed signing a planned executive order on AI and cybersecurity amid concerns the regulatory framework could undermine U.S. competitiveness in artificial intelligence development.

New York's Department of Financial Services issued guidance warning regulated entities about heightened cybersecurity risks associated with frontier AI models, emphasizing that traditional vulnerability management and comprehensive security programs remain the foundation for defending against AI-enabled threats. Separately, Grafana confirmed it was compromised by the Coinbase Cartel ransomware group, with investigation ongoing into the scope and nature of data exfiltration. The incident adds to a growing list of software and service providers targeted by ransomware operators seeking high-value intellectual property and customer data.

Sources: DFS NY · GovTech · Yahoo · WSJ · SharkStriker

Woman Looking at Computer Screen

CVEs form a database of known security vulnerabilities that are actively tracked and managed by a group of organizations, such as the U.S. National Cyber Security Alliance. CVEs are an important tool for network security management because they not only provide an inventory of existing vulnerabilities, but also provide information about how the vulnerability can be exploited and instructions on how to protect against it.

Search Known Exploits

Search for CVEs by vendor or product to identify known exploited vulnerabilities in your environment

Loading vendors and products...

Upcoming Patch Due Dates

via Binding Operational Directive 22-01

(BOD) 22-01 is a directive issued by the Cybersecurity and Infrastructure Security Agency (CISA) in the United States to federal agencies and federal contractors in order to improve their cybersecurity practices. It provides a set of guidelines and requirements that these agencies and contractors must follow to increase their defenses against cyber threats.

Loading...

News Logo

Cyber Security News

You may have missed...


📌 Pinned

*

https:betanews.comMar 5

Inside a cyberattack: How hackers steal data

The truth about cybersecurity is that it's almost impossible to keep hackers outside of an organization, particularly as the cybercrime industry ...

https://www.bbc.comMay 22

Google's AI is being manipulated. The search giant is quietly fighting back - BBC

A BBC investigation revealed a simple way to get AI chatbots to spit out misinformation. Google and other AI companies are now trying to fix the ...

https://www.cnet.comMay 22

Russian Hackers Are Inside American Home Routers. The FBI Has a 5-Step Fix - CNET

A coordinated cyberattack by Russia's GRU targeted home and small office routers across 23 states. Here's how to check yours and lock it down.

https://www.bleepingcomputer.comMay 22

Chinese hackers target telcos with new Linux, Windows malware - Bleeping Computer

A Chinese cyber-espionage campaign has been targeting telecommunications providers with newly discovered Linux and Windows malware dubbed Showboat ...

https://thehackernews.comMay 22

CISA Adds Exploited Langflow and Trend Micro Apex One Vulnerabilities to KEV

The vulnerability has since been exploited by an Iranian state-sponsored hacking ... © 2026 The Hacker News. All Rights Reserved.

https://www.yahoo.comMay 22

Trump postpones signing AI and cybersecurity order - Yahoo

US President Donald Trump on Thursday postponed signing an executive order on AI and cybersecurity over concerns it could shrink the country's AI lead...

https://www.govtech.comMay 22

State Cyber Leaders Ask Congress to Support SLCGP, CISA - GovTech

Cybersecurity and technology officials from the state governments of Tennessee, New York and Florida travelled to Washington, D.C., to testify before ...

https://www.vitallaw.comMay 22

House Committee Advances Small Business Cybersecurity Bill - VitalLaw.com

Legislation that would direct the Government Accountability Office to examine the cybersecurity needs of small businesses cleared the House Small ...

https://crypto.newsMay 22

How France is fighting crypto wrench attacks after Sandbox case

The reported attempt to kidnap the wife of The Sandbox co-founder Sébastien Borget has shifted attention to the physical side of crypto security.


Updated daily