Known Exploited Vulnerabilities and counting....

A known exploited vulnerability (KEV) refers to a software vulnerability that is being actively exploited by cybercriminals or threat actors. When a vulnerability becomes known to be exploited in the wild, it signals that the vulnerability poses a significant and imminent risk to organizations.

Woman Looking at Computer Screen

CVEs form a database of known security vulnerabilities that are actively tracked and managed by a group of organizations, such as the U.S. National Cyber Security Alliance. CVEs are an important tool for network security management because they not only provide an inventory of existing vulnerabilities, but also provide information about how the vulnerability can be exploited and instructions on how to protect against it.

Search Known Exploits

Search for CVEs by vendor to identify known exploited vulnerabilities in your environment

Loading vendors...
Loading...
Zombie hands

CVE = Common Vulnerability and Exposure

CVE OF THE WEEK:

Palo Alto Networks

PAN-OS
Patch deadline: a year ago on 01/20/2025

CVE-2024-3393

Palo Alto Networks PAN-OS contains a vulnerability in parsing and logging malformed DNS packets in the DNS Security feature that, when exploited, allows an unauthenticated attacker to remotely reboot the firewall. Repeated attempts to trigger this condition will cause the firewall to enter maintenance mode.

Palo Alto Networks PAN-OS Malformed DNS Packet Vulnerability

Learn more about this CVE: paloaltonetworks.com

News Logo

Cyber Security News

You may have missed...


📌 Pinned

*

https:betanews.comMar 5

Inside a cyberattack: How hackers steal data

The truth about cybersecurity is that it's almost impossible to keep hackers outside of an organization, particularly as the cybercrime industry ...

https://www.msn.comFeb 14

Ransomware hackers demand victims justify their jobs, or pay up - MSN

This new ransomware attack is asking victims to list five bullet points from their working week, like Musk did recently.

https://www.sophos.comFeb 15

The State of Ransomware in Retail 2025 - Sophos

The report examines how both the causes and consequences of ransomware attacks on retail organizations have evolved over time. This year's edition ...

https://www.fox5atlanta.comFeb 16

City of Marietta hit by nationwide ransomware attack | FOX 5 Atlanta

The city of Marietta says it can't process certain online credit card payments after a nationwide ransomware attack.

https://www.wsbradio.comFeb 16

Ransomware attack disrupts online payments for City of Marietta - 95.5 WSB

The City of Marietta is dealing with a ransomware attack that is impacting its online payment services.

https://www.msn.comFeb 15

Cybersecurity spending may pay off: Study links readiness to stronger returns - MSN

The infamous Target data breach during the 2013 holiday shopping season, which cost the company more than $200 million in damages, has since been ...

https://thehackernews.comFeb 16

The Uncomfortable Truth About "More Visibility" - The Hacker News

If 2025 was the year attackers blended channels and accelerated execution, 2026 will reward cybersecurity professionals who operationalize action. The...

https://floridapolitics.comFeb 16

House Subcommittee OKs measure to enhance cybersecurity at Florida financial institutions

A House bill designed to increase cybersecurity among financial institutions in Florida earned unanimous approval in its second of three committee ...

https://www.binance.comFeb 16

Scammers Target Ledger and Trezor Users with Phishing Letters - Binance

According to NS3.AI, these fraudulent letters are part of a broader scheme to compromise cryptocurrency security. Users are advised to avoid ...


Updated daily