Known Exploited Vulnerabilities and counting....

A known exploited vulnerability (KEV) refers to a software vulnerability that is being actively exploited by cybercriminals or threat actors. When a vulnerability becomes known to be exploited in the wild, it signals that the vulnerability poses a significant and imminent risk to organizations.

Woman Looking at Computer Screen

CVEs form a database of known security vulnerabilities that are actively tracked and managed by a group of organizations, such as the U.S. National Cyber Security Alliance. CVEs are an important tool for network security management because they not only provide an inventory of existing vulnerabilities, but also provide information about how the vulnerability can be exploited and instructions on how to protect against it.

Search Known Exploits

Search for CVEs by vendor to identify known exploited vulnerabilities in your environment

Loading vendors...

Upcoming Patch Due Dates

via Binding Operational Directive 22-01

(BOD) 22-01 is a directive issued by the Cybersecurity and Infrastructure Security Agency (CISA) in the United States to federal agencies and federal contractors in order to improve their cybersecurity practices. It provides a set of guidelines and requirements that these agencies and contractors must follow to increase their defenses against cyber threats.

Loading...

News Logo

Cyber Security News

You may have missed...


📌 Pinned

*

https:betanews.comMar 5

Inside a cyberattack: How hackers steal data

The truth about cybersecurity is that it's almost impossible to keep hackers outside of an organization, particularly as the cybercrime industry ...

https://cybernews.comFeb 26

Suspects arrested in bitcoin theft from South Korean police - Cybernews

Crypto security experts have already raised concerns that police may be slow to catch up with crypto criminals. However, recent crypto-related ...

https://www.binance.comFeb 26

12 years ago: 850,000 Bitcoin were lost in a single | Giannis Andreou on Binance Square

Gox collapse didn't kill Bitcoin, it became a turning point that reshaped crypto security, self-custody awareness, and the entire exchange industry.

https://www.govinfosecurity.comFeb 26

Medical Device Maker Reports Data Theft Hack to SEC

UFP Technologies, a Massachusetts-based maker of single-use medical devices and other healthcare supplies, has notified the U.S. Securities and ...

https://www.silicon.co.ukFeb 26

Hacker Steals Huge Data Trove From Mexico Using Anthropic's Claude - Silicon UK

Researchers say Spanish-language hacker manipulated Claude, ChatGPT into carrying out detailed hacks into numerous government agencies.

https://www.syracuse.comFeb 26

Soap opera star asks public for help amidst 'concerning' security breach: 'Really freaking me out'

The 41-year-old actress said that she is stuck in an ongoing hacking situation that has compromised her personal devices and digital accounts.

https://www.aarp.orgFeb 26

Hacking case hits 134,000 enrolled in certain state run health care programs - AARP.org

If you participate in certain programs run through the Massachusetts Executive Office of Health and Human Services, you may have been notified you ...

https://www.emergingtechbrew.comFeb 26

Claude's hack at it - Tech Brew

TL;DR: A hacker stole 150GB of Mexican government data—including taxpayer records, voter info, and government employee credentials—in a massive ...

https://www.pcmag.comFeb 25

Google: This Chinese Hacking Group Hit 42 Countries to Spy on Specific Targets | PCMag

The Chinese spying group, dubbed UNC2814, is quite prolific and has been targeting telecom firms, though it's separate from China's notorious Salt ...


Updated daily