Known Exploited Vulnerabilities and counting....
A known exploited vulnerability (KEV) refers to a software vulnerability that is being actively exploited by cybercriminals or threat actors. When a vulnerability becomes known to be exploited in the wild, it signals that the vulnerability poses a significant and imminent risk to organizations.
Common Vulnerability and Exposure
CVEs form a database of known security vulnerabilities that are actively tracked and managed by a group of organizations, such as the U.S. National Cyber Security Alliance. CVEs are an important tool for network security management because they not only provide an inventory of existing vulnerabilities, but also provide information about how the vulnerability can be exploited and instructions on how to protect against it.
Search Known Exploits
Search for CVEs by vendor to identify known exploited vulnerabilities in your environment
Upcoming Patch Due Dates
via Binding Operational Directive 22-01
(BOD) 22-01 is a directive issued by the Cybersecurity and Infrastructure Security Agency (CISA) in the United States to federal agencies and federal contractors in order to improve their cybersecurity practices. It provides a set of guidelines and requirements that these agencies and contractors must follow to increase their defenses against cyber threats.
Loading...
Cyber Security News
You may have missed...
*
Inside a cyberattack: How hackers steal data
The truth about cybersecurity is that it's almost impossible to keep hackers outside of an organization, particularly as the cybercrime industry ...
Hacker Uses Fake Starlink App to Mine Crypto on Android Phones | PCMag
The hacker has been luring users in Brazil to download the fake Starlink app through phishing pages that impersonate the Google Play Store.
Suspected US Government iPhone-Hacking Toolkit now in the Hands of Criminals - WIRED
and criminal hackers. It's infected tens of thousands of phones at minimum,. and it's still likely being used against new victims. Security ...
Texas Governor orders cybersecurity audit of Chinese medical devices over data breach risks
Texas Governor Greg Abbott has directed state health agencies and universities to review cybersecurity policies and inventory Chinese-manufactured ...
Trump's new cyber strategy positions crypto as a national security priority - Cryptopolitan
... security around cryptocurrencies and blockchain networks. It also ... Washington elevates crypto security to a strategic priority. Industry ...
AI Agent Goes Rogue, Starts Mining Crypto to Amass Funds - Futurism
... security alerts. “The alerts were severe and heterogeneous, including attempts to probe or access internal-network resources and traffic patterns ...
Hacker Uses Fake Starlink App to Mine Crypto on Android Phones - PCMag UK
The fake store contained an app that pretended to come from Brazil's social security system, which Kaspersky analyzed and found to be malicious.
Bitcoin Price Prediction: 95% of All Bitcoin Has Now Been Mined — What Happens Next?
New Bitcoin Presale Raises Millions to Bring Solana Technology to Bitcoin. Bitcoin has one big problem. It is powerful and secure, but it is also slow...
Security Firm Uncovers North Korea–Linked Attack on Crypto Infrastructure | MEXC News
Security firm Ctrl-Alt-Intel reports suspected North Korea-linked hackers targeted crypto platforms using React2Shell and AWS credentials.
Updated daily
