Known Exploited Vulnerabilities and counting....

A known exploited vulnerability (KEV) refers to a software vulnerability that is being actively exploited by cybercriminals or threat actors. When a vulnerability becomes known to be exploited in the wild, it signals that the vulnerability poses a significant and imminent risk to organizations.

Cybersecurity Brief: May 19, 2026

NGINX users face immediate risk as CVE-2026-42945, a critical heap buffer overflow vulnerability with a CVSS score of 9.2, is now under active exploitation. The flaw affects NGINX versions 0.6.27 through 1.30.0 and has been weaponized within days of public disclosure, underscoring the narrow window defenders have to patch before threat actors operationalize new vulnerabilities. Organizations running vulnerable versions should treat this as a priority patching event.

The ransomware ecosystem continues its evolution away from encryption-based attacks toward data-only extortion. According to recent threat intelligence, actors are increasingly leveraging stolen data and public disclosure threats as their primary leverage, bypassing the traditional file encryption step entirely. This tactical shift reflects both improved backup hygiene among victims and the realization that data exposure alone provides sufficient extortion leverage. Meanwhile, CISA has updated its DarkSide ransomware advisory with additional indicators of compromise in STIX format, providing defenders with actionable threat intelligence for detection and mitigation.

Anthropic is reportedly preparing to brief the Financial Stability Board on cybersecurity vulnerabilities exposed by the Mythos system, following warnings from security experts that the technology could enable more sophisticated cyberattacks against the banking sector. The briefing signals growing regulatory concern about AI systems' potential to amplify existing cyber threats against critical financial infrastructure.

Sources: Reuters · CISA · WIU Cybersecurity Center · Securelist

Woman Looking at Computer Screen

CVEs form a database of known security vulnerabilities that are actively tracked and managed by a group of organizations, such as the U.S. National Cyber Security Alliance. CVEs are an important tool for network security management because they not only provide an inventory of existing vulnerabilities, but also provide information about how the vulnerability can be exploited and instructions on how to protect against it.

Search Known Exploits

Search for CVEs by vendor or product to identify known exploited vulnerabilities in your environment

Loading vendors and products...

Upcoming Patch Due Dates

via Binding Operational Directive 22-01

(BOD) 22-01 is a directive issued by the Cybersecurity and Infrastructure Security Agency (CISA) in the United States to federal agencies and federal contractors in order to improve their cybersecurity practices. It provides a set of guidelines and requirements that these agencies and contractors must follow to increase their defenses against cyber threats.

Loading...

News Logo

Cyber Security News

You may have missed...


📌 Pinned

*

https:betanews.comMar 5

Inside a cyberattack: How hackers steal data

The truth about cybersecurity is that it's almost impossible to keep hackers outside of an organization, particularly as the cybercrime industry ...

https://www.theregister.comMay 20

Microsoft disrupts alleged malware-signing operation used by ransomware gangs

Microsoft shuts down illegal code-signing operation used by ransomware crims to mask their malware. 'Thousands' of US victims, including 12+ ...

https://www.cxodigitalpulse.comMay 20

Microsoft Disrupts Fox Tempest Malware-Signing Operation Used by Ransomware Groups

Microsoft has disrupted a major cybercrime operation known as Fox Tempest, a “malware-signing-as-a-service” platform that helped ransomware.

https://techcrunch.comMay 20

US cyber agency CISA exposed reams of passwords and cloud keys to the open web

The federal cybersecurity agency left plaintext passwords in a spreadsheet uploaded to a public GitHub repository, per a report by independent ...

https://thehackernews.comMay 20

GitHub Breached — Employee Device Hack Led to Exfiltration of 3,800+ Internal Repos

GitHub is investigating unauthorized access to internal repositories after TeamPCP listed alleged source code and internal organizations for sale.

https://www.scworld.comMay 19

Spotify outage caused by DDoS attack claimed by hacking group | brief | SC Media

The Islamic Cyber Resistance in Iraq-313 Team has claimed responsibility for the widespread disruption, stating they launched a distributed denial ...

https://www.wiu.eduMay 19

NGINX CVE-2026-42945 Actively Exploited in the Wild

A heap buffer overflow vulnerability (CVE-2026-42945, CVSS 9.2) in NGINX affecting versions 0.6.27 through 1.30.0 is being actively exploited in the w...

https://www.cisa.govMay 19

CISA Updates DarkSide Ransomware Advisory with IOC Data

CISA added a downloadable STIX file of indicators of compromise (IOCs) to the DarkSide ransomware advisory to help network defenders find and mitigate...

https://finance.yahoo.comMay 19

Hack The Box Report Reveals AI-Driven Shift Reshaping Cybersecurity Skills and Talent Strategy

NEW YORK, May 19, 2026--Hack The Box, the global leader in AI cybersecurity readiness, today released its Cybersecurity Workforce Intelligence ...


Updated daily