Known Exploited Vulnerabilities and counting....

A known exploited vulnerability (KEV) refers to a software vulnerability that is being actively exploited by cybercriminals or threat actors. When a vulnerability becomes known to be exploited in the wild, it signals that the vulnerability poses a significant and imminent risk to organizations.

Cybersecurity Brief — May 14, 2026

AI-Powered Vulnerability Discovery Shows Promise and Raises Stakes

Advanced AI models are demonstrating unprecedented capabilities in security research, with both Microsoft and Palo Alto Networks reporting significant results from internal testing. Palo Alto Networks disclosed finding 75 vulnerabilities in its own products using AI models including Claude Mythos—a sevenfold increase over traditional methods. Microsoft's multi-agent AI system has reportedly surpassed Anthropic's Mythos on leading cybersecurity benchmarks, while OpenAI has launched Daybreak, a dedicated initiative to integrate frontier AI into software defense workflows. These developments signal a fundamental shift in vulnerability discovery, though they also raise concerns about asymmetric advantages as both defenders and threat actors gain access to increasingly capable tools.

Major Breaches Hit Education and Manufacturing Sectors

Instructure, parent company of the Canvas learning management platform, has struck a deal with the ShinyHunters hacking group following a breach affecting nearly 9,000 schools worldwide and approximately 275 million individuals. The company's decision to negotiate with attackers underscores the severity of the compromise and raises questions about ransom payment precedents in the education sector. Separately, electronics manufacturer Foxconn has confirmed a ransomware attack impacting some North American facilities, with a threat group claiming responsibility. Meanwhile, Health-ISAC reports that cyberattacks in the healthcare sector more than doubled in 2025, with a 55% year-over-year increase by Q4—highlighting sustained targeting of critical infrastructure and sensitive data repositories.

Sources: SecurityWeek · Axios · Cybersecurity Dive · KQED · CBC · Health-ISAC

Woman Looking at Computer Screen

CVEs form a database of known security vulnerabilities that are actively tracked and managed by a group of organizations, such as the U.S. National Cyber Security Alliance. CVEs are an important tool for network security management because they not only provide an inventory of existing vulnerabilities, but also provide information about how the vulnerability can be exploited and instructions on how to protect against it.

Search Known Exploits

Search for CVEs by vendor or product to identify known exploited vulnerabilities in your environment

Loading vendors and products...

Upcoming Patch Due Dates

via Binding Operational Directive 22-01

(BOD) 22-01 is a directive issued by the Cybersecurity and Infrastructure Security Agency (CISA) in the United States to federal agencies and federal contractors in order to improve their cybersecurity practices. It provides a set of guidelines and requirements that these agencies and contractors must follow to increase their defenses against cyber threats.

Loading...

News Logo

Cyber Security News

You may have missed...


📌 Pinned

*

https:betanews.comMar 5

Inside a cyberattack: How hackers steal data

The truth about cybersecurity is that it's almost impossible to keep hackers outside of an organization, particularly as the cybercrime industry ...

https://www.cnbc.comMay 14

Google says it likely thwarted effort by hacker group to use AI for 'mass exploitation event'

Google Threat Intelligence Group reported discovering hackers using AI to identify and exploit a zero-day vulnerability for bypassing two-factor authe...

https://www.theregister.comMay 14

Disgruntled Researcher Releases Two More Microsoft Zero-Days

An anonymous researcher disclosed two new Windows zero-day vulnerabilities called YellowKey (BitLocker bypass) and GreenPlasma (privilege escalation) ...

https://cybermagazine.comMay 14

Canvas Hack: Why did Instructure Pay Ransom to ShinyHunters? | Cyber Magazine

After hackers broke into Instructure and messed with Canvas login pages, the company paid them a ransom to keep the stolen data private.

https://www.cybersecuritydive.comMay 14

Foxconn confirms cyberattack affecting some North American facilities

A ransomware group has claimed a major attack against electronics manufacturer Foxconn, impacting some North American facilities.

https://www.securityweek.comMay 14

Microsoft, Palo Alto Networks Find Many Vulnerabilities by Using AI on Their Own Code

Advanced AI models such as Claude Mythos have sparked debate in the cybersecurity industry about what the vulnerability discovery landscape will look ...

https://www.benzinga.comMay 14

Artificial Intelligence Threat To Crypto Underestimated, Says This Influential Analyst

Artificial Intelligence Threat To Crypto Underestimated, Says This Influential Analyst: Security Becoming An 'AI vs AI Arms Race'. by Aniket Verma ...

https://www.nytimes.comMay 14

Crypto Industry Pushes a Bill to Tilt Regulation in Its Favor - The New York Times

If control of Congress shifts in the midterm elections this fall, it could become much harder for the industry to secure legislation. The vote this .....

https://www.theblock.coMay 14

Flow blockchain probes security incident as FLOW token plunges over 40%

The Flow Foundation announced a security incident affecting its Layer 1 blockchain, with approximately $3.9-4 million stolen and the FLOW token plumme...


Updated daily