Known Exploited Vulnerabilities and counting....
A known exploited vulnerability (KEV) refers to a software vulnerability that is being actively exploited by cybercriminals or threat actors. When a vulnerability becomes known to be exploited in the wild, it signals that the vulnerability poses a significant and imminent risk to organizations.
Cybersecurity Brief: April 23, 2026
AI-powered cybersecurity capabilities are drawing scrutiny as Anthropic investigates unauthorized access to Mythos, its vulnerability-detection model. A handful of individuals allegedly gained rogue access to the system, which excels at identifying cybersecurity weaknesses—raising concerns about AI tools designed for defense being exploited for offensive purposes. The incident underscores growing tensions around advanced AI models that can both strengthen and threaten security infrastructure. Meanwhile, OpenAI has reportedly briefed U.S. agencies and Five Eyes partners on a new cybersecurity product, reflecting how AI labs are positioning themselves as both security vendors and potential risk vectors in the broader threat landscape.
On the policy front, Sean Plankey has withdrawn his nomination to lead CISA after months of political deadlock, leaving the agency's leadership in continued limbo at a critical moment for federal cybersecurity operations. CISA added one new actively exploited vulnerability to its Known Exploited Vulnerabilities catalog, though specifics remain limited. In the healthcare sector, data breaches at organizations in Illinois and Texas have compromised information belonging to approximately 600,000 individuals, adding to the sector's persistent struggle with patient data protection.
Sources: Indian Express · The Guardian · CISA · Politico · Security Week
Common Vulnerability and Exposure
CVEs form a database of known security vulnerabilities that are actively tracked and managed by a group of organizations, such as the U.S. National Cyber Security Alliance. CVEs are an important tool for network security management because they not only provide an inventory of existing vulnerabilities, but also provide information about how the vulnerability can be exploited and instructions on how to protect against it.
Search Known Exploits
Search for CVEs by vendor to identify known exploited vulnerabilities in your environment
Upcoming Patch Due Dates
via Binding Operational Directive 22-01
(BOD) 22-01 is a directive issued by the Cybersecurity and Infrastructure Security Agency (CISA) in the United States to federal agencies and federal contractors in order to improve their cybersecurity practices. It provides a set of guidelines and requirements that these agencies and contractors must follow to increase their defenses against cyber threats.
Loading...
Cyber Security News
You may have missed...
*
Inside a cyberattack: How hackers steal data
The truth about cybersecurity is that it's almost impossible to keep hackers outside of an organization, particularly as the cybercrime industry ...
April 2026 Is Already the Worst Month for Crypto Hacks Since February 2025, With $606 Million Lost in 18 Days
Crypto protocols have suffered over $606 million in losses across 12 incidents in April 2026, with the Kelp DAO and Drift Protocol exploits accounting...
Aave leads DeFi bailout push after $292M crypto exploit
Aave and major DeFi partners coordinate a recovery effort dubbed 'DeFi United' to cover losses and prevent bad debt following the $292 million Kelp DA...
Ransomware: The cyber experts who allegedly broke bad and worked with criminals
Three cybersecurity experts working for incident response firms pleaded guilty to deploying ransomware and helping the BlackCat gang secure ransom pay...
Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain Campaign - The Hacker News
Bitwarden CLI 2026.4.0 was compromised via GitHub Actions in Checkmarx campaign, exposing secrets and distributing malicious npm code.
Every Major DeFi Hack in 2026 So Far | Bridge Exploits Dominate
Analysis shows that cross-chain bridges have produced the largest single-day losses in crypto history, with Kelp DAO and Drift Protocol exploits accou...
DeFi Security Suffers New Blow With $3 Million Volo Exploit
Volo Protocol confirmed a $3.5 million exploit affecting select vaults, highlighting ongoing security vulnerabilities in the DeFi sector following the...
Volo Protocol loses $3.5 million in exploit days after KelpDAO's breach
Volo Protocol was exploited, losing about $3.5 million from three vaults holding WBTC, XAUm, and USDC, as the DeFi sector continues to face security c...
Crypto hacks raise fresh concerns for Wall Street adoption
A report from Jefferies warned that major hacks like the $293-million KelpDAO and $280-million Drift Protocol breaches could slow Wall Street's blockc...
Updated daily
