Known Exploited Vulnerabilities and counting....

A known exploited vulnerability (KEV) refers to a software vulnerability that is being actively exploited by cybercriminals or threat actors. When a vulnerability becomes known to be exploited in the wild, it signals that the vulnerability poses a significant and imminent risk to organizations.

Cybersecurity Brief – May 24, 2026

npm has introduced significant supply chain security enhancements, including mandatory 2FA-gated publishing and new package install controls designed to mitigate software supply chain attacks. GitHub is recommending that staged publishing be combined with trusted publishing using OpenID Connect (OIDC) for optimal protection. These measures address the growing threat to JavaScript developers, as npm remains one of the world's largest software registries and a high-value target for attackers seeking to inject malicious code into widely-used dependencies.

Active exploitation is underway targeting CVE-2026-48172, a vulnerability in the LiteSpeed cPanel plugin that allows attackers to execute malicious scripts with root-level privileges. Organizations running affected versions should prioritize patching immediately, as root access enables complete system compromise. Meanwhile, Dragos intelligence leadership is calling attention to the evolving operational technology (OT) threat landscape, emphasizing the need for contextualized risk assessment in critical infrastructure environments where the convergence of IT and OT systems continues to expand the attack surface.

Sources: The Hacker News · Hendry Adrian · Cyber Magazine

Woman Looking at Computer Screen

CVEs form a database of known security vulnerabilities that are actively tracked and managed by a group of organizations, such as the U.S. National Cyber Security Alliance. CVEs are an important tool for network security management because they not only provide an inventory of existing vulnerabilities, but also provide information about how the vulnerability can be exploited and instructions on how to protect against it.

Search Known Exploits

Search for CVEs by vendor or product to identify known exploited vulnerabilities in your environment

Loading vendors and products...

Upcoming Patch Due Dates

via Binding Operational Directive 22-01

(BOD) 22-01 is a directive issued by the Cybersecurity and Infrastructure Security Agency (CISA) in the United States to federal agencies and federal contractors in order to improve their cybersecurity practices. It provides a set of guidelines and requirements that these agencies and contractors must follow to increase their defenses against cyber threats.

Loading...

News Logo

Cyber Security News

You may have missed...


📌 Pinned

*

https:betanews.comMar 5

Inside a cyberattack: How hackers steal data

The truth about cybersecurity is that it's almost impossible to keep hackers outside of an organization, particularly as the cybercrime industry ...

https://gizmodo.comMay 24

The SolarWinds Hack Was More Humiliating for the Government Than We Thought

But we now have a few more crumbs to work with, because new revelations from Bloomberg have revealed that the hackers were in Treasury Department ...

https://www.tomshardware.comMay 24

Wi-Fi controlled hacking USB cable stealthily packs in a microcontroller, microSD storage, and more

... cybersecurity learners'. News. By Mark Tyson published 12 hours ago. The $82 Hacknect 'looks like a normal USB cable' and its makers are enjoying ...

https://cybermagazine.comMay 24

Dragos: Putting Operational Technology Risks in Perspective | Cybersecurity Magazine

In this Cyber Magazine Q&A, Magpie Graham, VP Strategic Intelligence at Dragos, examines the evolving OT threat landscape and key operational ...

https://www.kucoin.comMay 24

France Accounts for 70% of Global Crypto Wrench Attacks, Says Joe Nakamoto | KuCoin

Why This Story Matters for Crypto Security. Wrench attacks occupy a different threat category than the digital exploits most crypto users prepare for.

https://www.visualcapitalist.comMay 24

The Biggest Crypto Hacks Since 2025, Ranked by Money Lost

Analysis of the largest crypto hacks including KelpDAO and Drift, showing how attackers compromised third-party systems and verification mechanisms.

https://www.govinfosecurity.comMay 23

Iranian Hackers Using Fake Job Sites to Breach Defense Firms - GovInfoSecurity

Hackers nudged victims into downloading malicious survey files or bundled job application documents embedded with malware, which in some cases were .....

https://www.bankinfosecurity.comMay 23

Iranian Hackers Using Fake Job Sites to Breach Defense Firms - BankInfoSecurity

Researchers generally haven't seen evidence of cyberwar from Tehran nation-state hackers although Iranian cyber proxies quickly swung into action with...

https://www.fox61.comMay 23

Hacker breaks into Hartford HealthCare user accounts, accessing 22500 people's info

— Hartford HealthCare's payment accounts on the HUSKY provider portal website were hacked in March, as a criminal accessed the personal information of...


Updated daily