Known Exploited Vulnerabilities and counting....
A known exploited vulnerability (KEV) refers to a software vulnerability that is being actively exploited by cybercriminals or threat actors. When a vulnerability becomes known to be exploited in the wild, it signals that the vulnerability poses a significant and imminent risk to organizations.
Cybersecurity Brief — April 12, 2026
Supply Chain Compromise Hits Popular Hardware Monitoring Tools
CPUID, developer of widely-used system utilities CPU-Z and HWMonitor, confirmed a breach that resulted in the distribution of trojanized versions of its software. Attackers compromised the company's infrastructure to distribute STX RAT malware through both ZIP archives and standalone installers. The incident underscores persistent supply chain risks even for established utility software with millions of users. Organizations using these tools should verify file integrity and review systems that may have downloaded affected versions during the compromise window.
Targeted Campaigns and Strategic Shifts
Security researchers have identified LucidRook, a sophisticated Lua-based malware targeting Taiwanese NGOs and universities through spear-phishing campaigns using RAR and 7-Zip archive lures. The specificity of targets suggests espionage objectives. Meanwhile, the CIA has elevated its Center for Cyber Intelligence to full mission center status as of October 2025, a move recently confirmed that signals the intelligence community's recognition of cyber operations as a core national security function. On the commercial front, Cisco is in advanced acquisition talks with AI security startup Astrix for up to $350 million, seeking capabilities in managing "non-human identities"—the growing attack surface of software agents and automated processes that traditional identity management struggles to address.
Sources: The Hacker News · Bleeping Computer · CISO Series · Calcalitech
Common Vulnerability and Exposure
CVEs form a database of known security vulnerabilities that are actively tracked and managed by a group of organizations, such as the U.S. National Cyber Security Alliance. CVEs are an important tool for network security management because they not only provide an inventory of existing vulnerabilities, but also provide information about how the vulnerability can be exploited and instructions on how to protect against it.
Search Known Exploits
Search for CVEs by vendor to identify known exploited vulnerabilities in your environment
Upcoming Patch Due Dates
via Binding Operational Directive 22-01
(BOD) 22-01 is a directive issued by the Cybersecurity and Infrastructure Security Agency (CISA) in the United States to federal agencies and federal contractors in order to improve their cybersecurity practices. It provides a set of guidelines and requirements that these agencies and contractors must follow to increase their defenses against cyber threats.
Loading...
Cyber Security News
You may have missed...
*
Inside a cyberattack: How hackers steal data
The truth about cybersecurity is that it's almost impossible to keep hackers outside of an organization, particularly as the cybercrime industry ...
2025 Crypto Theft Reaches $3.4 Billion with North Korea Responsible for $2.02 Billion
Chainalysis report reveals the cryptocurrency industry witnessed over $3.4 billion in theft during 2025, with North Korean hackers stealing $2.02 bill...
Four Chinese APT Groups Target Critical Infrastructure Disruption
Four major Chinese state-sponsored APT groups—Volt Typhoon, Salt Typhoon, Flax Typhoon, and Brass Typhoon—are targeting global critical infrastructure...
Leaked technical documents show China rehearsing cyberattacks on neighbors' critical infrastructure
Leaked technical documents reveal China is using a secret training platform codenamed 'Expedition Cloud' to practice launching cyberattacks on the cri...
Chinese APT Group Exploits Dell Zero-Day for Two Years
Mandiant reveals that a Chinese APT group exploited a CVSS 10.0 zero-day vulnerability in Dell RecoverPoint for Virtual Machines to gain unauthorized ...
Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen
A massive trove of over 10 petabytes of sensitive information including classified defense documents, missile schematics, and technical files has alle...
Unknown Attackers Hijack Smart Slider 3 Pro Plugin Update System to Distribute Weaponized Backdoor
An unauthorized party gained access to the Smart Slider 3 Pro plugin update infrastructure and distributed a malicious version containing a fully weap...
Anthropic's Mythos Will Force a Cybersecurity Reckoning—Just Not the One You Think
The new AI model is being heralded—and feared—as a hacker's superweapon. Experts say its arrival is a wake-up call for developers who have long ...
Healthdaq: Recruitment platform used by health trusts targeted by cyber attackers - BBC
Hackers claim to have stolen hundreds of thousands of files containing ... Hacking group XP95 are claiming to be behind the attack and are ...
Updated daily
