Known Exploited Vulnerabilities and counting....

A known exploited vulnerability (KEV) refers to a software vulnerability that is being actively exploited by cybercriminals or threat actors. When a vulnerability becomes known to be exploited in the wild, it signals that the vulnerability poses a significant and imminent risk to organizations.

Cybersecurity Brief — April 12, 2026

Supply Chain Compromise Hits Popular Hardware Monitoring Tools

CPUID, developer of widely-used system utilities CPU-Z and HWMonitor, confirmed a breach that resulted in the distribution of trojanized versions of its software. Attackers compromised the company's infrastructure to distribute STX RAT malware through both ZIP archives and standalone installers. The incident underscores persistent supply chain risks even for established utility software with millions of users. Organizations using these tools should verify file integrity and review systems that may have downloaded affected versions during the compromise window.

Targeted Campaigns and Strategic Shifts

Security researchers have identified LucidRook, a sophisticated Lua-based malware targeting Taiwanese NGOs and universities through spear-phishing campaigns using RAR and 7-Zip archive lures. The specificity of targets suggests espionage objectives. Meanwhile, the CIA has elevated its Center for Cyber Intelligence to full mission center status as of October 2025, a move recently confirmed that signals the intelligence community's recognition of cyber operations as a core national security function. On the commercial front, Cisco is in advanced acquisition talks with AI security startup Astrix for up to $350 million, seeking capabilities in managing "non-human identities"—the growing attack surface of software agents and automated processes that traditional identity management struggles to address.

Sources: The Hacker News · Bleeping Computer · CISO Series · Calcalitech

Woman Looking at Computer Screen

CVEs form a database of known security vulnerabilities that are actively tracked and managed by a group of organizations, such as the U.S. National Cyber Security Alliance. CVEs are an important tool for network security management because they not only provide an inventory of existing vulnerabilities, but also provide information about how the vulnerability can be exploited and instructions on how to protect against it.

Search Known Exploits

Search for CVEs by vendor to identify known exploited vulnerabilities in your environment

Loading vendors...

Upcoming Patch Due Dates

via Binding Operational Directive 22-01

(BOD) 22-01 is a directive issued by the Cybersecurity and Infrastructure Security Agency (CISA) in the United States to federal agencies and federal contractors in order to improve their cybersecurity practices. It provides a set of guidelines and requirements that these agencies and contractors must follow to increase their defenses against cyber threats.

Loading...

News Logo

Cyber Security News

You may have missed...


📌 Pinned

*

https:betanews.comMar 5

Inside a cyberattack: How hackers steal data

The truth about cybersecurity is that it's almost impossible to keep hackers outside of an organization, particularly as the cybercrime industry ...

https://www.chainalysis.comDec 18

2025 Crypto Theft Reaches $3.4 Billion with North Korea Responsible for $2.02 Billion

Chainalysis report reveals the cryptocurrency industry witnessed over $3.4 billion in theft during 2025, with North Korean hackers stealing $2.02 bill...

https://rhisac.orgDec 16

Four Chinese APT Groups Target Critical Infrastructure Disruption

Four major Chinese state-sponsored APT groups—Volt Typhoon, Salt Typhoon, Flax Typhoon, and Brass Typhoon—are targeting global critical infrastructure...

https://therecord.mediaFeb 9

Leaked technical documents show China rehearsing cyberattacks on neighbors' critical infrastructure

Leaked technical documents reveal China is using a secret training platform codenamed 'Expedition Cloud' to practice launching cyberattacks on the cri...

https://www.infosecurity-magazine.comFeb 18

Chinese APT Group Exploits Dell Zero-Day for Two Years

Mandiant reveals that a Chinese APT group exploited a CVSS 10.0 zero-day vulnerability in Dell RecoverPoint for Virtual Machines to gain unauthorized ...

https://www.securitymagazine.comApr 9

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

A massive trove of over 10 petabytes of sensitive information including classified defense documents, missile schematics, and technical files has alle...

https://thehackernews.comApr 7

Unknown Attackers Hijack Smart Slider 3 Pro Plugin Update System to Distribute Weaponized Backdoor

An unauthorized party gained access to the Smart Slider 3 Pro plugin update infrastructure and distributed a malicious version containing a fully weap...

https://www.wired.comApr 10

Anthropic's Mythos Will Force a Cybersecurity Reckoning—Just Not the One You Think

The new AI model is being heralded—and feared—as a hacker's superweapon. Experts say its arrival is a wake-up call for developers who have long ...

https://www.bbc.comApr 11

Healthdaq: Recruitment platform used by health trusts targeted by cyber attackers - BBC

Hackers claim to have stolen hundreds of thousands of files containing ... Hacking group XP95 are claiming to be behind the attack and are ...


Updated daily