Known Exploited Vulnerabilities and counting....

A known exploited vulnerability (KEV) refers to a software vulnerability that is being actively exploited by cybercriminals or threat actors. When a vulnerability becomes known to be exploited in the wild, it signals that the vulnerability poses a significant and imminent risk to organizations.

Woman Looking at Computer Screen

CVEs form a database of known security vulnerabilities that are actively tracked and managed by a group of organizations, such as the U.S. National Cyber Security Alliance. CVEs are an important tool for network security management because they not only provide an inventory of existing vulnerabilities, but also provide information about how the vulnerability can be exploited and instructions on how to protect against it.

Search Known Exploits

Search for CVEs by vendor to identify known exploited vulnerabilities in your environment

Loading vendors...

Upcoming Patch Due Dates

via Binding Operational Directive 22-01

(BOD) 22-01 is a directive issued by the Cybersecurity and Infrastructure Security Agency (CISA) in the United States to federal agencies and federal contractors in order to improve their cybersecurity practices. It provides a set of guidelines and requirements that these agencies and contractors must follow to increase their defenses against cyber threats.

Loading...

News Logo

Cyber Security News

You may have missed...


📌 Pinned

*

https:betanews.comMar 5

Inside a cyberattack: How hackers steal data

The truth about cybersecurity is that it's almost impossible to keep hackers outside of an organization, particularly as the cybercrime industry ...

https://www.helpnetsecurity.comFeb 25

CISA flags exploited FileZen command injection bug, patch now! (CVE-2026-25108)

... ransomware against organizations. However, the KEV listing itself does not indicate that the vulnerability is currently linked to ransomware activ...

https://www.scworld.comFeb 25

New York City transit union purportedly targeted by Qilin - SC Media

Cybernews reports that the Qilin ransomware operation has claimed it breached the Local 100 chapter of the Transport Workers Union of America, ...

https://cryptorank.ioFeb 25

Michael Saylor Says Quantum Threat to Bitcoin Is Not Immediate - CryptoRank

He proposed that Bitcoin uses extremely sophisticated security measures in comparison compared to traditional banking systems. Then, Saylor went on .....

https://www.dlnews.comFeb 25

Vitalik Buterin backs Anthropic in White House clash after Citrini report predicts AI dystopia

OpenAI releases crypto security tool as Claude blamed for $2.7m Moonwell bug · DeFi · OpenAI releases crypto security tool as Claude blamed for $2.7m ...

https://cryptobriefing.comFeb 25

Jameson Lopp: Self-custody is essential to avoid third-party risks, phishing attacks ... - Crypto Briefing

Malware targeting devices that secure private keys poses a major threat to wallet security. Social engineering is a common tactic in phishing attacks,...

https://www.securityweek.comFeb 25

Wynn Resorts Confirms Data Breach After Hackers Remove It From Leak Site

High-end casino and hotel operator Wynn Resorts has confirmed that ShinyHunters hackers have stolen employee data.

https://www.insurancejournal.comFeb 25

Hackers Used AI to Breach 600 Firewalls in Weeks, Amazon Says - Insurance Journal

The small group of hackers – or possibly just one person – used commercial generative AI services to quickly take advantage of weak security measures,...

https://www.thestack.technologyFeb 25

L3Harris GM sold 8 hacking tools to Russian 0day broker - The Stack

A Russian exploit broker managed to buy “at least eight” stolen proprietary hacking tools made for the “exclusive use” of Five Eyes. An L3Harris.


Updated daily