Known Exploited Vulnerabilities and counting....

A known exploited vulnerability (KEV) refers to a software vulnerability that is being actively exploited by cybercriminals or threat actors. When a vulnerability becomes known to be exploited in the wild, it signals that the vulnerability poses a significant and imminent risk to organizations.

Cybersecurity Editorial Brief — May 4, 2026

Active Exploitation and Critical Infrastructure Threats Dominate Weekend Activity

Over 40,000 cPanel servers have been compromised in an ongoing exploitation campaign targeting CVE-2026-41940, a critical authentication bypass vulnerability that CISA added to its Known Exploited Vulnerabilities catalog last week. Evidence suggests threat actors have been actively exploiting this flaw since at least February 23, months before the patch was released. Meanwhile, the Chinese-nexus Shadow-Earth-053 APT group continues targeting Asian government, defense, and critical infrastructure sectors through vulnerabilities in Microsoft Exchange and IIS servers. A separate analysis of operational technology security reveals that 96% of OT incidents in 2025 originated from IT network compromises, while attacks specifically targeting OT protocols increased 84% year-over-year — underscoring the persistent challenge of securing convergent IT/OT environments.

Insider Threats and Enforcement Actions

Two U.S. cybersecurity professionals were sentenced to four years in federal prison for their roles in ALPHV BlackCat ransomware attacks that extorted more than $1.2 million from victims. The case highlights the ongoing threat of insider expertise being weaponized for criminal operations. In parallel enforcement action, a global law enforcement operation resulted in 276 arrests, the shutdown of nine cryptocurrency scam centers, and the seizure of $701 million in assets. On the corporate side, Trellix confirmed a security breach that allowed unauthorized access to a portion of its source code repository, though the company reports no evidence of exploitation at this time. The MITRE ATT&CK framework released version 19 with structural updates emphasizing industrial system visibility and detection strategies as AI-driven attack techniques continue to emerge.

Sources: SecurityWeek · Industrial Cyber · TechTarget · Justice.gov · The Hacker News · The Hacker News

Woman Looking at Computer Screen

CVEs form a database of known security vulnerabilities that are actively tracked and managed by a group of organizations, such as the U.S. National Cyber Security Alliance. CVEs are an important tool for network security management because they not only provide an inventory of existing vulnerabilities, but also provide information about how the vulnerability can be exploited and instructions on how to protect against it.

Search Known Exploits

Search for CVEs by vendor to identify known exploited vulnerabilities in your environment

Loading vendors...

Upcoming Patch Due Dates

via Binding Operational Directive 22-01

(BOD) 22-01 is a directive issued by the Cybersecurity and Infrastructure Security Agency (CISA) in the United States to federal agencies and federal contractors in order to improve their cybersecurity practices. It provides a set of guidelines and requirements that these agencies and contractors must follow to increase their defenses against cyber threats.

Loading...

News Logo

Cyber Security News

You may have missed...


📌 Pinned

*

https:betanews.comMar 5

Inside a cyberattack: How hackers steal data

The truth about cybersecurity is that it's almost impossible to keep hackers outside of an organization, particularly as the cybercrime industry ...

https://news.bitcoin.comMay 1

Defillama Confirms April 2026 as Crypto's Most-Hacked Month With 30 Incidents

Defillama confirmed April 2026 as cryptocurrency's most-hacked month with 30 incidents and over $600 million in losses, with the KelpDAO hack triggeri...

https://thedefiant.ioMay 2

DeFi Sets New Hack Record as April Logs 28 Exploits with $635M Stolen

DeFi protocols suffered 28 separate exploits totaling $635.2 million in April, the highest monthly incident count ever recorded, with social engineeri...

https://beincrypto.comApr 19

April's $606 Million Crypto Hack Losses Top Q1 by Nearly 4x

April 2026 crypto hack losses reached $606 million as KelpDAO and Drift exploits drove the worst month since the Bybit breach, with record hack freque...

https://www.gncrypto.newsMay 1

April 2026: 30 Crypto Hacks, $625M Stolen, Bridges Hit

April 2026 saw 30 crypto exploits steal $625M+, led by the $285M Drift Protocol and $293M KelpDAO bridge attacks, prompting massive DeFi withdrawals.

https://therecord.mediaFeb 19

Researchers warn Volt Typhoon still active in critical infrastructure, continues embedding in U.S. utilities through 2025

Dragos reports in its annual report that Volt Typhoon continued to attack U.S. utilities through 2025 and remains active despite increased scrutiny, w...

https://www.justice.govMay 5

Global ransomware group negotiator involved in $56 million cyberattacks sentenced to 8.5 ...

CINCINNATI – A Latvian national was sentenced in federal court here today to 102 months in prison for his role as a negotiator in one of the most ...

https://databreaches.netMay 5

Latvian national involved with Karakurt and other ransomware gangs sentenced for his role ...

According to court documents, Deniss Zolotarjovs (Денисс Золотарёвс), 35, of Moscow, Russia, was a member of a ransomware organization led by former ....

https://cybernews.comMay 4

Hackers claim Liberty Mutual breach exposed thousands of individual insurance records

The Everest ransomware group claims to have breached Liberty Mutual and is threatening to leak thousands of policyholders' data within days.


Updated daily