Known Exploited Vulnerabilities and counting....

A known exploited vulnerability (KEV) refers to a software vulnerability that is being actively exploited by cybercriminals or threat actors. When a vulnerability becomes known to be exploited in the wild, it signals that the vulnerability poses a significant and imminent risk to organizations.

Cybersecurity Brief — April 25, 2026

CISA added four actively exploited vulnerabilities to its Known Exploited Vulnerabilities catalog on Friday, affecting SimpleHelp remote support software and Samsung MagicINFO 9 digital signage platform. Federal agencies must patch these flaws by the May 2026 deadline. The addition underscores ongoing exploitation of enterprise remote access and IoT-adjacent systems, with threat actors continuing to target software commonly deployed in corporate and critical infrastructure environments.

A supply chain compromise hit Checkmarx's KICS (Keeping Infrastructure as Code Secure) project, with malicious Docker images and Visual Studio Code extensions distributed through the tool's ecosystem. The compromised components enabled data exfiltration and exposed infrastructure secrets, highlighting persistent vulnerabilities in developer toolchain security. Separately, a Discord group's breach of Anthropic's internal systems has raised concerns about AI-powered attack capabilities. The incident demonstrates that AI tools can now identify and exploit vulnerabilities faster than traditional methods, potentially narrowing the critical window organizations have to apply patches after disclosure. Meanwhile, U.S. and allied cybersecurity agencies issued warnings about China-linked threat actors employing sophisticated covert networks to conduct espionage and offensive cyber operations, indicating continued state-sponsored activity targeting sensitive systems.

Sources: The Hacker News · Fortune · The Hacker News · Industrial Cyber

Woman Looking at Computer Screen

CVEs form a database of known security vulnerabilities that are actively tracked and managed by a group of organizations, such as the U.S. National Cyber Security Alliance. CVEs are an important tool for network security management because they not only provide an inventory of existing vulnerabilities, but also provide information about how the vulnerability can be exploited and instructions on how to protect against it.

Search Known Exploits

Search for CVEs by vendor to identify known exploited vulnerabilities in your environment

Loading vendors...

Upcoming Patch Due Dates

via Binding Operational Directive 22-01

(BOD) 22-01 is a directive issued by the Cybersecurity and Infrastructure Security Agency (CISA) in the United States to federal agencies and federal contractors in order to improve their cybersecurity practices. It provides a set of guidelines and requirements that these agencies and contractors must follow to increase their defenses against cyber threats.

Loading...

News Logo

Cyber Security News

You may have missed...


📌 Pinned

*

https:betanews.comMar 5

Inside a cyberattack: How hackers steal data

The truth about cybersecurity is that it's almost impossible to keep hackers outside of an organization, particularly as the cybercrime industry ...

https://www.cnn.comApr 25

North Korean Hackers Bug Software Used by Thousands of US Companies in Supply Chain Attack

Pyongyang-linked hackers compromised the Axios open-source software account and distributed malicious updates to thousands of US companies, with exper...

https://hackread.comApr 25

Grinex Crypto Exchange Shuts Down After $13.7M Breach, Blames Western Agencies

Kyrgyzstan-based crypto exchange Grinex went offline after a $13.7 million breach, blaming Western intelligence agencies though Chainalysis flagged po...

https://techcrunch.comApr 25

North Korean Hackers Blamed for $290M Kelp DAO Crypto Theft

LayerZero accused North Korea of executing a $290 million heist against Kelp DAO, citing preliminary indicators pointing to the North Korean hacking g...

https://www.securityweek.comApr 17

Microsoft Defender BlueHammer Zero-Day Actively Exploited in Wild

Threat actors are actively exploiting three Microsoft Defender zero-day vulnerabilities (BlueHammer, RedSun, and UnDefend) to gain elevated system pri...

https://thehackernews.comApr 25

FIRESTARTER Backdoor Hit Federal Cisco Firepower Device, Survives Security Patches

Chinese Hackers Shift From Individually Procured Infrastructure to Covert Networks ... © 2026 The Hacker News. All Rights Reserved.

https://crypto.newsApr 23

April 2026 Is Already the Worst Month for Crypto Hacks Since February 2025, With $606 Million Lost in 18 Days

Crypto protocols have suffered over $606 million in losses across 12 incidents in April 2026, with the Kelp DAO and Drift Protocol exploits accounting...

https://www.coindesk.comApr 23

Aave leads DeFi bailout push after $292M crypto exploit

Aave and major DeFi partners coordinate a recovery effort dubbed 'DeFi United' to cover losses and prevent bad debt following the $292 million Kelp DA...

https://www.cnn.comApr 22

Ransomware: The cyber experts who allegedly broke bad and worked with criminals

Three cybersecurity experts working for incident response firms pleaded guilty to deploying ransomware and helping the BlackCat gang secure ransom pay...


Updated daily