Known Exploited Vulnerabilities and counting....

A known exploited vulnerability (KEV) refers to a software vulnerability that is being actively exploited by cybercriminals or threat actors. When a vulnerability becomes known to be exploited in the wild, it signals that the vulnerability poses a significant and imminent risk to organizations.

Cybersecurity Editorial Brief — May 4, 2026

Active Exploitation and Critical Infrastructure Threats Dominate Weekend Activity

Over 40,000 cPanel servers have been compromised in an ongoing exploitation campaign targeting CVE-2026-41940, a critical authentication bypass vulnerability that CISA added to its Known Exploited Vulnerabilities catalog last week. Evidence suggests threat actors have been actively exploiting this flaw since at least February 23, months before the patch was released. Meanwhile, the Chinese-nexus Shadow-Earth-053 APT group continues targeting Asian government, defense, and critical infrastructure sectors through vulnerabilities in Microsoft Exchange and IIS servers. A separate analysis of operational technology security reveals that 96% of OT incidents in 2025 originated from IT network compromises, while attacks specifically targeting OT protocols increased 84% year-over-year — underscoring the persistent challenge of securing convergent IT/OT environments.

Insider Threats and Enforcement Actions

Two U.S. cybersecurity professionals were sentenced to four years in federal prison for their roles in ALPHV BlackCat ransomware attacks that extorted more than $1.2 million from victims. The case highlights the ongoing threat of insider expertise being weaponized for criminal operations. In parallel enforcement action, a global law enforcement operation resulted in 276 arrests, the shutdown of nine cryptocurrency scam centers, and the seizure of $701 million in assets. On the corporate side, Trellix confirmed a security breach that allowed unauthorized access to a portion of its source code repository, though the company reports no evidence of exploitation at this time. The MITRE ATT&CK framework released version 19 with structural updates emphasizing industrial system visibility and detection strategies as AI-driven attack techniques continue to emerge.

Sources: SecurityWeek · Industrial Cyber · TechTarget · Justice.gov · The Hacker News · The Hacker News

Woman Looking at Computer Screen

CVEs form a database of known security vulnerabilities that are actively tracked and managed by a group of organizations, such as the U.S. National Cyber Security Alliance. CVEs are an important tool for network security management because they not only provide an inventory of existing vulnerabilities, but also provide information about how the vulnerability can be exploited and instructions on how to protect against it.

Search Known Exploits

Search for CVEs by vendor to identify known exploited vulnerabilities in your environment

Loading vendors...

Upcoming Patch Due Dates

via Binding Operational Directive 22-01

(BOD) 22-01 is a directive issued by the Cybersecurity and Infrastructure Security Agency (CISA) in the United States to federal agencies and federal contractors in order to improve their cybersecurity practices. It provides a set of guidelines and requirements that these agencies and contractors must follow to increase their defenses against cyber threats.

Loading...

News Logo

Cyber Security News

You may have missed...


📌 Pinned

*

https:betanews.comMar 5

Inside a cyberattack: How hackers steal data

The truth about cybersecurity is that it's almost impossible to keep hackers outside of an organization, particularly as the cybercrime industry ...

https://cybernews.comMay 4

Hackers claim Liberty Mutual breach exposed thousands of individual insurance records

The Everest ransomware group claims to have breached Liberty Mutual and is threatening to leak thousands of policyholders' data within days.

https://www.bitdefender.comMay 4

Teenager alleged to be Scattered Spider hacker arrested in Finland, faces US extradition

Here's a tip for you all. Unless you want to draw attention to yourself as a cybercriminal, don't flaunt your diamond-encrusted "HACK THE PLANET" ...

https://www.binance.comMay 4

North Korea Denies Involvement in Cryptocurrency Hacks - Binance

North Korea has dismissed accusations linking it to recent global cryptocurrency hacking incidents. According to NS3.AI, estimates suggest that ...

https://www.securityweek.comMay 4

Over 40,000 Servers Compromised in Ongoing cPanel Exploitation - SecurityWeek

The US cybersecurity agency CISA added CVE-2026-41940 to its Known Exploited Vulnerabilities (KEV) catalog on Thursday, urging federal agencies to ...

https://www.darkreading.comMay 4

When Identity Isn't Enough: Strengthening Agent Security - Dark Reading

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or ...

https://www.cybersecuritydive.comMay 4

How OpenClaw's agent skills become an attack surface | Cybersecurity Dive

AI agent gateways like OpenClaw feel like a portal to a future that, even a few months ago, felt impossibly distant. That future is genuinely ...

https://www.semi.orgMay 4

Why Semiconductor Cybersecurity Is at a Breaking Point | SEMI

At SEMICON West, cybersecurity leaders outlined a threat landscape defined by interconnected systems, legacy equipment, expanding supply chains, and ....

https://thehackernews.comMay 4

Global Crackdown Arrests 276, Shuts 9 Crypto Scam Centers, Seizes $701M

They also encouraged their victims to borrow money from friends and family and take out loans, to be able to 'invest' more." Cybersecurity. But as ...


Updated daily