Known Exploited Vulnerabilities and counting....
A known exploited vulnerability (KEV) refers to a software vulnerability that is being actively exploited by cybercriminals or threat actors. When a vulnerability becomes known to be exploited in the wild, it signals that the vulnerability poses a significant and imminent risk to organizations.
Cybersecurity Brief — April 11, 2026
Supply Chain Attack Hits Trusted Hardware Tool
The CPUID project suffered a significant API compromise that allowed attackers to modify official download links for CPU-Z and HWMonitor, two widely-used hardware monitoring utilities. Malicious executables were distributed through legitimate channels, exploiting the trust relationship between users and the established software project. This attack follows the familiar pattern of supply chain compromises targeting developer tools and trusted utilities, where attackers leverage legitimate infrastructure to distribute malware at scale. Organizations should verify the integrity of recently downloaded CPUID utilities and monitor for suspicious behavior from these tools.
Financial Sector Mobilizes on Cyber Threat Intelligence
The financial services sector is taking steps to formalize threat intelligence sharing. FINRA launched a Financial Intelligence Fusion Center designed to coordinate responses to cybersecurity and fraud threats across member firms, reflecting growing recognition that financial institutions face coordinated threats requiring coordinated defenses. Separately, US Treasury and Federal Reserve leadership convened Wall Street CEOs for urgent cybersecurity discussions, signaling elevated concern at the highest levels of financial oversight. The moves come as offensive cyber operations draw increased industry participation, with debate intensifying at major security conferences over the private sector's role in active defense and counter-hacking operations.
Sources: Bleeping Computer · Dark Reading · Nextgov
Common Vulnerability and Exposure
CVEs form a database of known security vulnerabilities that are actively tracked and managed by a group of organizations, such as the U.S. National Cyber Security Alliance. CVEs are an important tool for network security management because they not only provide an inventory of existing vulnerabilities, but also provide information about how the vulnerability can be exploited and instructions on how to protect against it.
Search Known Exploits
Search for CVEs by vendor to identify known exploited vulnerabilities in your environment
Upcoming Patch Due Dates
via Binding Operational Directive 22-01
(BOD) 22-01 is a directive issued by the Cybersecurity and Infrastructure Security Agency (CISA) in the United States to federal agencies and federal contractors in order to improve their cybersecurity practices. It provides a set of guidelines and requirements that these agencies and contractors must follow to increase their defenses against cyber threats.
Loading...
Cyber Security News
You may have missed...
*
Inside a cyberattack: How hackers steal data
The truth about cybersecurity is that it's almost impossible to keep hackers outside of an organization, particularly as the cybercrime industry ...
Anthropic's Mythos Will Force a Cybersecurity Reckoning—Just Not the One You Think
The new AI model is being heralded—and feared—as a hacker's superweapon. Experts say its arrival is a wake-up call for developers who have long ...
Healthdaq: Recruitment platform used by health trusts targeted by cyber attackers - BBC
Hackers claim to have stolen hundreds of thousands of files containing ... Hacking group XP95 are claiming to be behind the attack and are ...
'General Hospital' Star Kirsten Storms Shares An Update On Alleged Hacking Situation
“I know it's been over a month, two months since I was on Instagram, discussing my devices being hacked in the apartment I moved into in Franklin at ....
Anthropic's Mythos AI can spot weaknesses in almost every computer on earth. Uh-oh.
For instance, hackers are tapping AI to sharpen so-called phishing attacks aimed at prying loose confidential information, said Zach Lewis, the chief ...
Frightening AI advances speed race to secure critical infrastructure - Axios
Why it matters: AI models are getting so good at autonomously hacking and exploiting severe bugs that their own creators are holding them back out of ...
Hacker faux pas uncloaks North Korean IT worker scheme | brief - SC Magazine
North Korea had one of its IT worker scams' secrets unravel after a hacker inadvertently executed information-stealing malware on their own ...
'FlamingChina' hacker claims to have stolen over 10 petabytes of advanced military data ...
The breach, including schematics of aircraft, missile systems, and military simulations, could be China's largest ever.
Dutch ChipSoft Healthcare Ransomware Attack Impacts 80% of Nation's Hospitals
A ransomware attack on Dutch healthcare software vendor ChipSoft on April 7, 2026 has taken the platform offline and impacted approximately 80% of the...
Updated daily
