Known Exploited Vulnerabilities and counting....

A known exploited vulnerability (KEV) refers to a software vulnerability that is being actively exploited by cybercriminals or threat actors. When a vulnerability becomes known to be exploited in the wild, it signals that the vulnerability poses a significant and imminent risk to organizations.

Woman Looking at Computer Screen

CVEs form a database of known security vulnerabilities that are actively tracked and managed by a group of organizations, such as the U.S. National Cyber Security Alliance. CVEs are an important tool for network security management because they not only provide an inventory of existing vulnerabilities, but also provide information about how the vulnerability can be exploited and instructions on how to protect against it.

Search Known Exploits

Search for CVEs by vendor to identify known exploited vulnerabilities in your environment

Loading vendors...

Upcoming Patch Due Dates

via Binding Operational Directive 22-01

(BOD) 22-01 is a directive issued by the Cybersecurity and Infrastructure Security Agency (CISA) in the United States to federal agencies and federal contractors in order to improve their cybersecurity practices. It provides a set of guidelines and requirements that these agencies and contractors must follow to increase their defenses against cyber threats.

Loading...

News Logo

Cyber Security News

You may have missed...


📌 Pinned

*

https:betanews.comMar 5

Inside a cyberattack: How hackers steal data

The truth about cybersecurity is that it's almost impossible to keep hackers outside of an organization, particularly as the cybercrime industry ...

https://www.pcmag.comMar 10

Hacker Uses Fake Starlink App to Mine Crypto on Android Phones | PCMag

The hacker has been luring users in Brazil to download the fake Starlink app through phishing pages that impersonate the Google Play Store.

https://www.wired.comMar 10

Suspected US Government iPhone-Hacking Toolkit now in the Hands of Criminals - WIRED

and criminal hackers. It's infected tens of thousands of phones at minimum,. and it's still likely being used against new victims. Security ...

https://www.fox7austin.comMar 9

Texas Governor orders cybersecurity audit of Chinese medical devices over data breach risks

Texas Governor Greg Abbott has directed state health agencies and universities to review cybersecurity policies and inventory Chinese-manufactured ...

https://www.cryptopolitan.comMar 10

Trump's new cyber strategy positions crypto as a national security priority - Cryptopolitan

... security around cryptocurrencies and blockchain networks. It also ... Washington elevates crypto security to a strategic priority. Industry ...

https://futurism.comMar 10

AI Agent Goes Rogue, Starts Mining Crypto to Amass Funds - Futurism

... security alerts. “The alerts were severe and heterogeneous, including attempts to probe or access internal-network resources and traffic patterns ...

https://uk.pcmag.comMar 10

Hacker Uses Fake Starlink App to Mine Crypto on Android Phones - PCMag UK

The fake store contained an app that pretended to come from Brazil's social security system, which Kaspersky analyzed and found to be malicious.

https://cryptonews.comMar 10

Bitcoin Price Prediction: 95% of All Bitcoin Has Now Been Mined — What Happens Next?

New Bitcoin Presale Raises Millions to Bring Solana Technology to Bitcoin. Bitcoin has one big problem. It is powerful and secure, but it is also slow...

https://www.mexc.comMar 9

Security Firm Uncovers North Korea–Linked Attack on Crypto Infrastructure | MEXC News

Security firm Ctrl-Alt-Intel reports suspected North Korea-linked hackers targeted crypto platforms using React2Shell and AWS credentials.


Updated daily