Known Exploited Vulnerabilities and counting....

A known exploited vulnerability (KEV) refers to a software vulnerability that is being actively exploited by cybercriminals or threat actors. When a vulnerability becomes known to be exploited in the wild, it signals that the vulnerability poses a significant and imminent risk to organizations.

Cybersecurity Brief — April 14, 2026

Multiple active exploitation campaigns dominated the security landscape today as CISA added four Microsoft vulnerabilities to its Known Exploited Vulnerabilities catalog. Notably, one flaw patched 14 years ago is currently being leveraged in active ransomware operations, underscoring how legacy vulnerabilities remain viable attack vectors. The agency's action signals immediate threat activity requiring urgent patching across federal networks and critical infrastructure.

Supply chain attacks struck major targets across multiple sectors. Dutch healthcare software vendor ChipSoft suffered a ransomware incident that forced the company to disable patient services across hospitals throughout the Netherlands, directly impacting healthcare delivery. In the gaming sector, threat actor ShinyHunters executed a supply chain compromise through business analytics firm Anodot, gaining access to Rockstar Games data stored in Snowflake cloud environments and issuing extortion demands. Travel platform Booking.com disclosed unauthorized access to user information, though the scope and scale of affected accounts remains unclear.

Latin American financial institutions face sustained pressure from JanelaRAT malware, which logged 14,739 attacks in Brazil alone during 2025. Threat actors continue evolving the malware's infection chain with new features and updated versions, demonstrating active development against banking targets. Meanwhile, concerns are mounting over Anthropic's Mythos AI model, which cybersecurity experts warn could enable more sophisticated attacks against financial institutions by lowering technical barriers for complex intrusions.

Sources: The Hacker News · SecurityWeek · Reuters · CISO Platform · The Register · Check Point Research

Woman Looking at Computer Screen

CVEs form a database of known security vulnerabilities that are actively tracked and managed by a group of organizations, such as the U.S. National Cyber Security Alliance. CVEs are an important tool for network security management because they not only provide an inventory of existing vulnerabilities, but also provide information about how the vulnerability can be exploited and instructions on how to protect against it.

Search Known Exploits

Search for CVEs by vendor to identify known exploited vulnerabilities in your environment

Loading vendors...

Upcoming Patch Due Dates

via Binding Operational Directive 22-01

(BOD) 22-01 is a directive issued by the Cybersecurity and Infrastructure Security Agency (CISA) in the United States to federal agencies and federal contractors in order to improve their cybersecurity practices. It provides a set of guidelines and requirements that these agencies and contractors must follow to increase their defenses against cyber threats.

Loading...

News Logo

Cyber Security News

You may have missed...


📌 Pinned

*

https:betanews.comMar 5

Inside a cyberattack: How hackers steal data

The truth about cybersecurity is that it's almost impossible to keep hackers outside of an organization, particularly as the cybercrime industry ...

https://thehackernews.comApr 13

Russian State-Linked APT28 Exploits SOHO Routers in Global DNS Hijacking Campaign

APT28 has been exploiting vulnerable home and small office routers to hijack DNS traffic and conduct adversary-in-the-middle attacks to steal authenti...

https://gizmodo.comApr 7

Crypto Project Details Alleged 6-Month North Korean Intel Op Behind $285 Million Hack

Drift Protocol details how North Korean-linked threat actors conducted a six-month intelligence operation involving social engineering and oracle mani...

https://www.securityweek.comDec 30

Chinese APT Mustang Panda Caught Using Kernel-Mode Rootkit

Chinese espionage-focused APT Mustang Panda deployed a kernel-mode rootkit in mid-2025 attacks against Asian targets using a signed driver file to mai...

https://techcrunch.comMar 9

Salt Typhoon is hacking the world's phone and internet giants — here's everywhere that's been hit

Comprehensive overview of Salt Typhoon's global reach, showing the hacking group has compromised at least 200 companies worldwide and targeted major U...

https://thehackernews.comJan 22

China-Linked APT Exploited Sitecore Zero-Day in Critical Infrastructure Intrusion

A China-nexus APT actor (UAT-8837) exploited a critical Sitecore zero-day vulnerability (CVE-2025-53690) to gain initial access to North American crit...

https://www.acronis.comApr 7

Google Releases Emergency Patch for Chrome Zero-Day CVE-2026-5281 Being Actively Exploited

Google released an out-of-band Chrome 146 update to fix CVE-2026-5281, a use-after-free vulnerability in WebGPU with active exploit code in the wild.

https://thehackernews.comApr 12

Adobe Patches Actively Exploited Acrobat Reader Flaw CVE-2026-34621

Adobe released emergency updates to fix a critical security flaw in Acrobat Reader (CVE-2026-34621, CVSS 8.6) that is being actively exploited in the ...

https://thehackernews.comApr 10

CPUID Website Compromised to Distribute STX RAT Malware via CPU-Z and HWMonitor

Unknown threat actors compromised the CPUID website for less than 24 hours to serve malicious executables and deploy remote access trojan STX RAT thro...


Updated daily