Known Exploited Vulnerabilities and counting....

A known exploited vulnerability (KEV) refers to a software vulnerability that is being actively exploited by cybercriminals or threat actors. When a vulnerability becomes known to be exploited in the wild, it signals that the vulnerability poses a significant and imminent risk to organizations.

Cybersecurity Editorial Brief – April 18, 2026

CISA has added a high-severity Apache ActiveMQ vulnerability to its Known Exploited Vulnerabilities catalog following confirmed active exploitation in the wild. CVE-2026-34197, which remained hidden for 13 years before being patched earlier this month, represents a significant supply chain risk given ActiveMQ's widespread deployment in enterprise messaging infrastructure. Organizations running ActiveMQ should prioritize patching immediately, as the vulnerability's long dormancy suggests potential exposure across legacy systems that may have escaped regular security audits.

This month's Patch Tuesday brought critical fixes across multiple major vendors, including SAP, Adobe, Microsoft, and Fortinet. Several disclosed vulnerabilities enable remote code execution and data theft, underscoring the importance of prompt patch deployment. Separately, CISA flagged ongoing exploitation attempts targeting TP-Link routers through CVE-2023-33538, a command injection flaw that continues to present risks in network perimeter devices. The convergence of these advisories highlights persistent challenges in both enterprise application security and consumer-grade networking equipment that often operates outside formal patch management processes.

Sources: BleepingComputer · Cybersecurity Dive · The Hacker News

Woman Looking at Computer Screen

CVEs form a database of known security vulnerabilities that are actively tracked and managed by a group of organizations, such as the U.S. National Cyber Security Alliance. CVEs are an important tool for network security management because they not only provide an inventory of existing vulnerabilities, but also provide information about how the vulnerability can be exploited and instructions on how to protect against it.

Search Known Exploits

Search for CVEs by vendor to identify known exploited vulnerabilities in your environment

Loading vendors...

Upcoming Patch Due Dates

via Binding Operational Directive 22-01

(BOD) 22-01 is a directive issued by the Cybersecurity and Infrastructure Security Agency (CISA) in the United States to federal agencies and federal contractors in order to improve their cybersecurity practices. It provides a set of guidelines and requirements that these agencies and contractors must follow to increase their defenses against cyber threats.

Loading...

News Logo

Cyber Security News

You may have missed...


📌 Pinned

*

https:betanews.comMar 5

Inside a cyberattack: How hackers steal data

The truth about cybersecurity is that it's almost impossible to keep hackers outside of an organization, particularly as the cybercrime industry ...

https://cybersecurityventures.comApr 18

He Pled Guilty To Blackmailing Apple. What Really Happened. - Cybercrime Magazine

This week in cybersecurity from the editors at Cybercrime Magazine ... Kerem Albayrak from north London threatened to wipe 319 million accounts unless...

https://www.cybersecuritydive.comApr 18

TP-Link routers face exploitation attempt linked to high-severity flaw | Cybersecurity Dive

The Cybersecurity and Infrastructure Security Agency previously added the command injection vulnerability, tracked as CVE-2023-33538, to its Known ...

https://cybernews.comApr 18

Angry researcher drops second Windows Defender zero-day exploit: "They mopped the floor with me"

A second Windows Defender zero-day exploit enabling privilege escalation has been released publicly, with the researcher threatening to release additi...

https://techcrunch.comApr 18

Man who hacked US Supreme Court filing system sentenced to probation - TechCrunch

Nicholas Moore hacked into three U.S. government networks using stolen credentials, and then bragged about it and posted victims' personal data on ...

https://www.theage.com.auApr 18

'It's the vibe': Court brawl hinges on alleged industrial-scale data hack - The Age

Was it industrial espionage on a massive scale, or is an Australian property data giant just hiding behind a case inspired by 'The Castle' in this ...

https://www.hcinnovationgroup.comApr 18

Navigating FDA's Updated Cybersecurity Guidance for Medical Devices

Pre-market submissions are a key opportunity for the FDA to evaluate cybersecurity measures, expert says.

https://www.pymnts.comApr 18

Tether Gives Drift $147 Million to Help Address Crypto Hack

Drift Protocol announced a reboot with Tether's USDT stablecoin as its settlement layer and received up to $147.5 million in new funding from Tether a...

https://www.coindesk.comApr 18

Crypto exchange Kraken targeted in extortion attempt but says there was no breach and no client funds at risk

Kraken disclosed two insider-related security incidents involving support staff access to limited client data, followed by an extortion attempt by a c...


Updated daily