Known Exploited Vulnerabilities and counting....

A known exploited vulnerability (KEV) refers to a software vulnerability that is being actively exploited by cybercriminals or threat actors. When a vulnerability becomes known to be exploited in the wild, it signals that the vulnerability poses a significant and imminent risk to organizations.

Cybersecurity Brief: April 8, 2026

U.S. critical infrastructure faces an escalating threat as Iran-linked APT groups actively exploit programmable logic controllers (PLCs) and SCADA systems at energy and water facilities nationwide. Federal agencies issued urgent warnings after confirming operational disruptions at multiple sites, marking a concerning shift from reconnaissance to active manipulation of industrial control systems. The attacks target the operational technology layer that directly controls physical processes, presenting risks beyond data theft to include potential service interruptions and safety hazards.

Meanwhile, Russia's APT28 continues leveraging compromised routers for DNS hijacking campaigns, according to new technical details from the UK's National Cyber Security Centre. The group exploits network infrastructure devices to redirect traffic and intercept communications. On the healthcare front, Brockton Hospital reported a system-wide cyberattack forcing service cancellations and patient diversions, while telehealth provider Hims & Hers disclosed customer data theft via social engineering. A new analysis from Push Security identifies browser-based attack vectors—including adversary-in-the-middle phishing, ClickFix techniques, malicious OAuth applications, and session hijacking—as the dominant methods behind current major breaches, reflecting attackers' adaptation to cloud-centric environments where traditional perimeter defenses offer limited protection.

Sources: CyberScoop · National Cyber Security Centre · WHDH · Cybersecurity Dive · BleepingComputer

Woman Looking at Computer Screen

CVEs form a database of known security vulnerabilities that are actively tracked and managed by a group of organizations, such as the U.S. National Cyber Security Alliance. CVEs are an important tool for network security management because they not only provide an inventory of existing vulnerabilities, but also provide information about how the vulnerability can be exploited and instructions on how to protect against it.

Search Known Exploits

Search for CVEs by vendor to identify known exploited vulnerabilities in your environment

Loading vendors...

Upcoming Patch Due Dates

via Binding Operational Directive 22-01

(BOD) 22-01 is a directive issued by the Cybersecurity and Infrastructure Security Agency (CISA) in the United States to federal agencies and federal contractors in order to improve their cybersecurity practices. It provides a set of guidelines and requirements that these agencies and contractors must follow to increase their defenses against cyber threats.

Loading...

News Logo

Cyber Security News

You may have missed...


📌 Pinned

*

https:betanews.comMar 5

Inside a cyberattack: How hackers steal data

The truth about cybersecurity is that it's almost impossible to keep hackers outside of an organization, particularly as the cybercrime industry ...

https://www.epa.govApr 7

EPA, FBI, CISA, NSA Issue Joint Cybersecurity Advisory to Water System Regarding Iranian ...

... joint advisory warning to U.S. organizations, including those in the water sector, for an urgent and ongoing Iranian-affiliated cybersecurity thre...

https://www.politico.comApr 8

Iranian hackers are targeting US energy and water sectors, federal agencies warn - Politico

... Cybersecurity and Infrastructure Security Agency on Tuesday. The guidance warns that Iran-linked hackers are targeting internet-connected ...

https://www.cnn.comApr 8

A hacker has allegedly breached one of China's supercomputers and is attempting to sell a ... - CNN

A hacker has allegedly stolen a massive trove of sensitive data – including highly classified defense documents and missile schematics – from a ...

https://www.coindesk.comApr 8

Grayscale says bitcoin's quantum problem is governance, not engineering - CoinDesk

"The potential threat to digital security from quantum therefore presents both a challenge and an opportunity." ... Most crypto privacy models weaken ...

https://www.trendingtopics.euApr 8

US-Iran Ceasefire Sends Bitcoin Surging Past $72,000 as Oil Crashes - Trending Topics

... security vulnerabilities in software. The model is said to surpass the capabilities of all but the best human security experts. Due to its threat ...

https://finance.yahoo.comApr 8

Google Quantum Warning Puts Coinbase Crypto Security Plans In Focus - Yahoo Finance

Google issued a public warning about the long term security risks quantum computing could pose to mainstream cryptocurrencies such as Bitcoin and ...

https://www.elliptic.coApr 2

Drift Protocol exploited for $286 million in suspected DPRK-linked attack

Elliptic blockchain intelligence firm identified indicators linking the $286 million Drift Protocol exploit to North Korea (DPRK), making it the large...

https://www.bleepingcomputer.comApr 6

Microsoft links Medusa ransomware affiliate to zero-day attacks

Microsoft reports that Storm-1175, a China-based threat group, has been weaponizing zero-day and N-day vulnerabilities in high-velocity Medusa ransomw...


Updated daily