Known Exploited Vulnerabilities and counting....
A known exploited vulnerability (KEV) refers to a software vulnerability that is being actively exploited by cybercriminals or threat actors. When a vulnerability becomes known to be exploited in the wild, it signals that the vulnerability poses a significant and imminent risk to organizations.
Common Vulnerability and Exposure
CVEs form a database of known security vulnerabilities that are actively tracked and managed by a group of organizations, such as the U.S. National Cyber Security Alliance. CVEs are an important tool for network security management because they not only provide an inventory of existing vulnerabilities, but also provide information about how the vulnerability can be exploited and instructions on how to protect against it.
Search Known Exploits
Search for CVEs by vendor to identify known exploited vulnerabilities in your environment
Upcoming Patch Due Dates
via Binding Operational Directive 22-01
(BOD) 22-01 is a directive issued by the Cybersecurity and Infrastructure Security Agency (CISA) in the United States to federal agencies and federal contractors in order to improve their cybersecurity practices. It provides a set of guidelines and requirements that these agencies and contractors must follow to increase their defenses against cyber threats.
Loading...
Cyber Security News
You may have missed...
*
Inside a cyberattack: How hackers steal data
The truth about cybersecurity is that it's almost impossible to keep hackers outside of an organization, particularly as the cybercrime industry ...
CISA flags exploited FileZen command injection bug, patch now! (CVE-2026-25108)
... ransomware against organizations. However, the KEV listing itself does not indicate that the vulnerability is currently linked to ransomware activ...
New York City transit union purportedly targeted by Qilin - SC Media
Cybernews reports that the Qilin ransomware operation has claimed it breached the Local 100 chapter of the Transport Workers Union of America, ...
Michael Saylor Says Quantum Threat to Bitcoin Is Not Immediate - CryptoRank
He proposed that Bitcoin uses extremely sophisticated security measures in comparison compared to traditional banking systems. Then, Saylor went on .....
Vitalik Buterin backs Anthropic in White House clash after Citrini report predicts AI dystopia
OpenAI releases crypto security tool as Claude blamed for $2.7m Moonwell bug · DeFi · OpenAI releases crypto security tool as Claude blamed for $2.7m ...
Jameson Lopp: Self-custody is essential to avoid third-party risks, phishing attacks ... - Crypto Briefing
Malware targeting devices that secure private keys poses a major threat to wallet security. Social engineering is a common tactic in phishing attacks,...
Wynn Resorts Confirms Data Breach After Hackers Remove It From Leak Site
High-end casino and hotel operator Wynn Resorts has confirmed that ShinyHunters hackers have stolen employee data.
Hackers Used AI to Breach 600 Firewalls in Weeks, Amazon Says - Insurance Journal
The small group of hackers – or possibly just one person – used commercial generative AI services to quickly take advantage of weak security measures,...
L3Harris GM sold 8 hacking tools to Russian 0day broker - The Stack
A Russian exploit broker managed to buy “at least eight” stolen proprietary hacking tools made for the “exclusive use” of Five Eyes. An L3Harris.
Updated daily
