Known Exploited Vulnerabilities and counting....
A known exploited vulnerability (KEV) refers to a software vulnerability that is being actively exploited by cybercriminals or threat actors. When a vulnerability becomes known to be exploited in the wild, it signals that the vulnerability poses a significant and imminent risk to organizations.
Cybersecurity Brief – April 5, 2026
Active Exploitation and Critical Infrastructure Vulnerabilities
Fortinet has confirmed active exploitation of CVE-2026-35616 affecting FortiClient EMS and released an emergency hotfix ahead of the full patch in version 7.4.7. The company has not disclosed exploitation details or attacker attribution, but the rapid response suggests significant risk to enterprise environments relying on the endpoint management platform. Organizations should prioritize applying the hotfix immediately while awaiting the complete remediation.
Government and Healthcare Sector Incidents
Massachusetts' emergency communications system was compromised in a cyberattack affecting critical state infrastructure, though the full scope of the breach remains unclear. Separately, the Department of Transportation's inspector general identified systemic cybersecurity failures at the FAA, noting inadequate governance and transparency in protecting the National Airspace System—findings that elevate concerns about aviation infrastructure resilience. In the healthcare sector, TriZetto disclosed a breach exposing 3.4 million patient records including names, birth dates, Social Security numbers, and insurance information, marking another significant compromise of sensitive healthcare data. These incidents underscore persistent security gaps across critical infrastructure sectors that require coordinated remediation efforts.
Sources: The Hacker News · The Record · FedScoop · Fox News
Common Vulnerability and Exposure
CVEs form a database of known security vulnerabilities that are actively tracked and managed by a group of organizations, such as the U.S. National Cyber Security Alliance. CVEs are an important tool for network security management because they not only provide an inventory of existing vulnerabilities, but also provide information about how the vulnerability can be exploited and instructions on how to protect against it.
Search Known Exploits
Search for CVEs by vendor to identify known exploited vulnerabilities in your environment
Upcoming Patch Due Dates
via Binding Operational Directive 22-01
(BOD) 22-01 is a directive issued by the Cybersecurity and Infrastructure Security Agency (CISA) in the United States to federal agencies and federal contractors in order to improve their cybersecurity practices. It provides a set of guidelines and requirements that these agencies and contractors must follow to increase their defenses against cyber threats.
Loading...
Cyber Security News
You may have missed...
*
Inside a cyberattack: How hackers steal data
The truth about cybersecurity is that it's almost impossible to keep hackers outside of an organization, particularly as the cybercrime industry ...
36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants
Cybersecurity researchers have discovered 36 malicious packages in the npm registry that are disguised as Strapi CMS plugins but come with ...
Bitcoin Mining Not As Globally Decentralized As It Appears — Here's Why - TradingView
Bitcoin is often celebrated as a decentralized network, with mining power distributed globally to ensure security and neutrality.
Charles Schwab Announces Crypto Accounts Are 'Coming Soon' - Bitcoin.com News
Social platform X is rolling out a new security measure aimed at tackling one of the most persistent threats in crypto: account takeovers used to ...
Quantum risk to crypto is advancing, Google paper warns - MSN
The tech giant recently announced its own timeline to migrate all security systems to post-quantum cryptography by 2029. The company has been working ...
Solana's quantum-threat readiness reveals harsh tradeoff: security vs speed - Cryptonews.net
Crypto has spent years obsessing over speed, fees and scalability. Now it may have to confront a more existential question: what happens when its ...
Europe's cyber agency blames hacking gangs for massive data breach and leak
CERT-EU attributed the European Commission cloud hack to TeamPCP threat group, with 92 gigabytes of data stolen from AWS including emails and personal...
Drift Protocol Hit by $285M Exploit: Crypto's Biggest Hack of 2026 Unfolds on April Fool's Day
Solana-based Drift Protocol suffered a $285 million exploit on April 1, 2026, the largest crypto hack of the year, using a fake token and compromised ...
CERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million Emails
Threat actors tracked as UAC-0255 impersonated Ukraine's CERT-UA on March 26-27, 2026, distributing AGEWHEEZE remote access trojan to state organizati...
Updated daily
