Known Exploited Vulnerabilities and counting....

A known exploited vulnerability (KEV) refers to a software vulnerability that is being actively exploited by cybercriminals or threat actors. When a vulnerability becomes known to be exploited in the wild, it signals that the vulnerability poses a significant and imminent risk to organizations.

Cybersecurity Brief – April 24, 2026

Critical Patch Releases and Active Threats

Oracle has issued its April 2026 Critical Patch Update addressing 481 vulnerabilities across 28 product families, with over 300 remotely exploitable flaws requiring no authentication and approximately three dozen rated critical severity. Organizations running Oracle products face immediate exposure if patches are not deployed promptly. Meanwhile, threat actor UNC6692 continues impersonating IT helpdesk personnel via Microsoft Teams to deploy SNOW malware, demonstrating how successful social engineering tactics persist and evolve beyond the lifespan of individual threat groups. The attack chain leverages user trust in internal communication platforms to bypass traditional perimeter defenses.

Data Breaches and Nation-State Activity

France's national identity document agency ANTS confirmed a data breach after threat actors claimed possession of up to 19 million records from the organization responsible for issuing passports, driver's licenses, and vehicle registration documents. Separately, Booking.com disclosed unauthorized access to reservation data including customer names, contact details, and booking information, creating immediate phishing and fraud risks for travelers. On the nation-state front, global cybersecurity agencies issued coordinated warnings about Chinese government-linked actors establishing covert networks of compromised systems for sustained espionage and offensive operations. In Venezuela, researchers identified "Lotus Wiper," a destructive malware targeting energy and utilities infrastructure that systematically overwrites drives, deletes files, and disables recovery mechanisms—highlighting ongoing threats to critical infrastructure in geopolitically sensitive regions.

Sources: The Hacker News · Industrial Cyber · Security Week · The Hacker News · Bleeping Computer · Senthorus Blog

Woman Looking at Computer Screen

CVEs form a database of known security vulnerabilities that are actively tracked and managed by a group of organizations, such as the U.S. National Cyber Security Alliance. CVEs are an important tool for network security management because they not only provide an inventory of existing vulnerabilities, but also provide information about how the vulnerability can be exploited and instructions on how to protect against it.

Search Known Exploits

Search for CVEs by vendor to identify known exploited vulnerabilities in your environment

Loading vendors...

Upcoming Patch Due Dates

via Binding Operational Directive 22-01

(BOD) 22-01 is a directive issued by the Cybersecurity and Infrastructure Security Agency (CISA) in the United States to federal agencies and federal contractors in order to improve their cybersecurity practices. It provides a set of guidelines and requirements that these agencies and contractors must follow to increase their defenses against cyber threats.

Loading...

News Logo

Cyber Security News

You may have missed...


📌 Pinned

*

https:betanews.comMar 5

Inside a cyberattack: How hackers steal data

The truth about cybersecurity is that it's almost impossible to keep hackers outside of an organization, particularly as the cybercrime industry ...

https://www.securityweek.comApr 17

Microsoft Defender BlueHammer Zero-Day Actively Exploited in Wild

Threat actors are actively exploiting three Microsoft Defender zero-day vulnerabilities (BlueHammer, RedSun, and UnDefend) to gain elevated system pri...

https://thehackernews.comApr 25

FIRESTARTER Backdoor Hit Federal Cisco Firepower Device, Survives Security Patches

Chinese Hackers Shift From Individually Procured Infrastructure to Covert Networks ... © 2026 The Hacker News. All Rights Reserved.

https://crypto.newsApr 23

April 2026 Is Already the Worst Month for Crypto Hacks Since February 2025, With $606 Million Lost in 18 Days

Crypto protocols have suffered over $606 million in losses across 12 incidents in April 2026, with the Kelp DAO and Drift Protocol exploits accounting...

https://www.coindesk.comApr 23

Aave leads DeFi bailout push after $292M crypto exploit

Aave and major DeFi partners coordinate a recovery effort dubbed 'DeFi United' to cover losses and prevent bad debt following the $292 million Kelp DA...

https://www.cnn.comApr 22

Ransomware: The cyber experts who allegedly broke bad and worked with criminals

Three cybersecurity experts working for incident response firms pleaded guilty to deploying ransomware and helping the BlackCat gang secure ransom pay...

https://thehackernews.comApr 24

Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain Campaign - The Hacker News

Bitwarden CLI 2026.4.0 was compromised via GitHub Actions in Checkmarx campaign, exposing secrets and distributing malicious npm code.

https://phemex.comApr 23

Every Major DeFi Hack in 2026 So Far | Bridge Exploits Dominate

Analysis shows that cross-chain bridges have produced the largest single-day losses in crypto history, with Kelp DAO and Drift Protocol exploits accou...

https://www.pymnts.comApr 23

DeFi Security Suffers New Blow With $3 Million Volo Exploit

Volo Protocol confirmed a $3.5 million exploit affecting select vaults, highlighting ongoing security vulnerabilities in the DeFi sector following the...


Updated daily