Known Exploited Vulnerabilities and counting....

A known exploited vulnerability (KEV) refers to a software vulnerability that is being actively exploited by cybercriminals or threat actors. When a vulnerability becomes known to be exploited in the wild, it signals that the vulnerability poses a significant and imminent risk to organizations.

Cybersecurity Brief: April 30, 2026

Multiple significant data breaches emerged today affecting millions of individuals across critical sectors. UK Biobank disclosed that half a million genetic, biological, and health records were offered for sale online in China, raising serious concerns about the protection of sensitive medical data. In the U.S., ADT faces a class action lawsuit after hackers compromised systems affecting 5.5 million customer accounts, while Amtrak confirmed an exposure linked to the ShinyHunters group impacting 2.1 million accounts containing customer names, emails, addresses, and support records. Critical infrastructure provider Itron, which manufactures energy and water measurement devices, also reported a cyberattack, though operations remained unaffected.

U.S. congressional leaders announced a joint investigation into national security risks posed by Chinese-developed AI models, focusing on cybersecurity vulnerabilities from low-cost, open-weight, and API-based systems. The investigation reflects growing concerns about AI's dual role in cybersecurity—both as an attack vector and defensive tool—a theme prominently featured at this week's Black Hat Asia conference. Meanwhile, CISA's ability to coordinate with the private sector faces significant disruption due to staff departures in its Stakeholder Engagement Division, creating what sources describe as a "standstill" in critical cyber partnerships. A new Resilience report confirms manufacturing remains the top global target for cyberattacks, with ransomware accounting for over 90% of total losses despite representing just 12% of claims.

Sources: Security Brief · Bloomberg Law · Fox News · Cybersecurity Dive · House Homeland Security Committee · The Economist · Federal News Network · Industrial Cyber

Woman Looking at Computer Screen

CVEs form a database of known security vulnerabilities that are actively tracked and managed by a group of organizations, such as the U.S. National Cyber Security Alliance. CVEs are an important tool for network security management because they not only provide an inventory of existing vulnerabilities, but also provide information about how the vulnerability can be exploited and instructions on how to protect against it.

Search Known Exploits

Search for CVEs by vendor to identify known exploited vulnerabilities in your environment

Loading vendors...

Upcoming Patch Due Dates

via Binding Operational Directive 22-01

(BOD) 22-01 is a directive issued by the Cybersecurity and Infrastructure Security Agency (CISA) in the United States to federal agencies and federal contractors in order to improve their cybersecurity practices. It provides a set of guidelines and requirements that these agencies and contractors must follow to increase their defenses against cyber threats.

Loading...

News Logo

Cyber Security News

You may have missed...


📌 Pinned

*

https:betanews.comMar 5

Inside a cyberattack: How hackers steal data

The truth about cybersecurity is that it's almost impossible to keep hackers outside of an organization, particularly as the cybercrime industry ...

https://www.bleepingcomputer.comApr 22

Kyber ransomware gang toys with post-quantum encryption on Windows

A new Kyber ransomware operation is targeting Windows systems and VMware ESXi endpoints with variants implementing Kyber1024 post-quantum encryption i...

https://phemex.comMay 1

Two US Cybersecurity Professionals Sentenced for ALPHV BlackCat Ransomware Attacks

Ryan Goldberg and Kevin Martin sentenced to 4 years for ALPHV BlackCat ransomware attacks, extorting $1.2M in Bitcoin.

https://cyberscoop.comMay 1

Former incident responders sentenced to 4 years in prison for committing ransomware attacks

Goldberg, who was a manager of incident response at Sygnia, and Martin, a ransomware negotiator at DigitalMint at the time, collaborated with ...

https://techcrunch.comApr 30

Hackers are actively exploiting a bug in cPanel, used by millions of websites

Critical cPanel authentication bypass vulnerability (CVE-2026-41940) is being actively exploited by hackers to gain full control of web servers hostin...

https://www.justice.govMay 1

Two Americans Who Attacked Multiple U.S. Victims Using ALPHV BlackCat Ransomware ...

Two American cybersecurity professionals were sentenced today to four years each in prison for their role in a conspiracy to obstruct, delay, ...

https://www.coindesk.comApr 26

Why DeFi isn't dead despite massive exploits and $13 billion investor exodus

CoinDesk analysis explaining that while Kelp DAO's $292 million exploit triggered $13 billion in DeFi TVL losses, much of this was leveraged positions...

https://www.helpnetsecurity.comApr 28

Alleged Chinese hacker extradited to US over cyberattacks targeting COVID-19 research

Chinese national Xu Zewei was extradited from Italy to face charges for his role in the HAFNIUM cyber espionage campaign that compromised more than 12...

https://www.justice.govApr 21

Florida Man Working as a Ransomware Negotiator Pleads Guilty to Conspiracy to Deploy Ransomware and Extort U.S. Victims

Angelo Martino, a former ransomware negotiator, pleaded guilty to conspiring with BlackCat ransomware operators to extort U.S. companies by providing ...


Updated daily