Known Exploited Vulnerabilities and counting....
A known exploited vulnerability (KEV) refers to a software vulnerability that is being actively exploited by cybercriminals or threat actors. When a vulnerability becomes known to be exploited in the wild, it signals that the vulnerability poses a significant and imminent risk to organizations.
Cybersecurity Brief – April 28, 2026
Application security vendor Checkmarx confirmed that data from its GitHub repositories was posted to the dark web following a March 23 security incident. The company has acknowledged the breach and is working to assess the full scope of compromised data. While details remain limited, the incident underscores ongoing risks to software supply chains when development infrastructure is targeted, particularly for security vendors whose tools are widely integrated into enterprise environments.
Insurance giant Aflac has become the latest victim in an accelerating wave of cyberattacks targeting the insurance sector. The attack follows a pattern of intrusions against insurance companies, which hold vast repositories of sensitive personal and financial data. The concentration of attacks on this industry suggests threat actors are either exploiting common vulnerabilities in insurance sector infrastructure or specifically targeting these firms for their high-value data holdings. No details on the attack vector or data exposure have been disclosed.
Sources: The Hacker News · ABC News
Common Vulnerability and Exposure
CVEs form a database of known security vulnerabilities that are actively tracked and managed by a group of organizations, such as the U.S. National Cyber Security Alliance. CVEs are an important tool for network security management because they not only provide an inventory of existing vulnerabilities, but also provide information about how the vulnerability can be exploited and instructions on how to protect against it.
Search Known Exploits
Search for CVEs by vendor to identify known exploited vulnerabilities in your environment
Upcoming Patch Due Dates
via Binding Operational Directive 22-01
(BOD) 22-01 is a directive issued by the Cybersecurity and Infrastructure Security Agency (CISA) in the United States to federal agencies and federal contractors in order to improve their cybersecurity practices. It provides a set of guidelines and requirements that these agencies and contractors must follow to increase their defenses against cyber threats.
Loading...
Cyber Security News
You may have missed...
*
Inside a cyberattack: How hackers steal data
The truth about cybersecurity is that it's almost impossible to keep hackers outside of an organization, particularly as the cybercrime industry ...
Medical Device Maker Medtronic Says It's Been Hacked - GovInfoSecurity
Medtronic has told federal authorities that cybercriminals hacked its corporate IT systems, but said the incident did not affect the medical ...
Checkmarx Confirms GitHub Repository Data Posted on Dark Web After March 23 Attack
Get the latest news, expert insights, exclusive resources, and strategies from industry leaders – all for free. Email. Cybersecurity Webinars.
Aflac Latest Victim in String of Cyberattacks Against Insurance Firms
Aflac has been identified as the latest target in a series of cyberattacks targeting insurance companies.
PBSD victim of $3.2 million cybersecurity incident - Pine Bluff Commercial
The Pine Bluff School District lost more than $3.2 million in a Dec. 17 cybersecurity incident that has since come under federal investigation, ...
TRON is preparing quantum security by 2026 - Coinspot.io
“It is important for crypto projects to look not only at the benefits ... It will deal with quantum risks and blockchain security. Google has ...
The $606 Million Problem: Why DeFi's Security Crisis Is Crypto's Biggest Obstacle to Mass Adoption
More than $606 million was stolen from crypto protocols in just 18 days, with the Drift Protocol and KelpDAO exploits accounting for nearly all losses...
Latest $290M exploit hit DeFi so hard it forced Aave onto Solana as part of rescue efforts
Aave has launched a major coordinated DeFi recovery effort with over $300 million in pledged support following the Kelp DAO exploit, with AAVE now ava...
Volo Protocol loses $3.5 million in exploit days after KelpDAO's breach
Volo Protocol confirmed a security breach that drained roughly $3.5 million in digital assets from three of its vaults on the Sui blockchain.
Updated daily
