Known Exploited Vulnerabilities and counting....
A known exploited vulnerability (KEV) refers to a software vulnerability that is being actively exploited by cybercriminals or threat actors. When a vulnerability becomes known to be exploited in the wild, it signals that the vulnerability poses a significant and imminent risk to organizations.
Cybersecurity Brief: April 27, 2026
Two significant data breaches emerged today involving critical infrastructure and consumer services. Home security giant ADT confirmed unauthorized access to customer and prospective customer data after the ShinyHunters extortion group publicly threatened to leak stolen information. The breach highlights ongoing risks to companies holding sensitive personal data, particularly those in the physical security sector where customer information includes home addresses and security system details.
In a more concerning development, American utility firm Itron disclosed that unauthorized third parties accessed certain internal IT systems on April 13, 2026. Itron manages critical infrastructure including electricity grids and water distribution systems across multiple regions, making any compromise of their networks a potential national security concern. The two-week delay between detection and public disclosure raises questions about notification timelines for critical infrastructure breaches. While the company has not detailed what data or systems were accessed, the incident underscores the persistent targeting of utility and infrastructure providers by threat actors.
Separately, industry analysis warns that supply chain vulnerabilities remain cybersecurity's most systemic risk, with small and medium enterprises representing persistent weak links. The assessment suggests one-off subsidies fail to address structural security gaps in SME operations that serve as entry points into larger enterprise networks.
Sources: Bleeping Computer · Bleeping Computer ·
Common Vulnerability and Exposure
CVEs form a database of known security vulnerabilities that are actively tracked and managed by a group of organizations, such as the U.S. National Cyber Security Alliance. CVEs are an important tool for network security management because they not only provide an inventory of existing vulnerabilities, but also provide information about how the vulnerability can be exploited and instructions on how to protect against it.
Search Known Exploits
Search for CVEs by vendor to identify known exploited vulnerabilities in your environment
Upcoming Patch Due Dates
via Binding Operational Directive 22-01
(BOD) 22-01 is a directive issued by the Cybersecurity and Infrastructure Security Agency (CISA) in the United States to federal agencies and federal contractors in order to improve their cybersecurity practices. It provides a set of guidelines and requirements that these agencies and contractors must follow to increase their defenses against cyber threats.
Loading...
Cyber Security News
You may have missed...
*
Inside a cyberattack: How hackers steal data
The truth about cybersecurity is that it's almost impossible to keep hackers outside of an organization, particularly as the cybercrime industry ...
Volo Protocol loses $3.5 million in exploit days after KelpDAO's breach
Volo Protocol confirmed a security breach that drained roughly $3.5 million in digital assets from three of its vaults on the Sui blockchain.
Industry leaders are pouring hundreds of millions into a rescue plan for Aave users after massive crypto hack
Industry leaders including Consensys, Lido, and EtherFi are pledging over $300 million in support for Aave's coordinated recovery effort following the...
Here is how Drift attackers drained more than $270 million using a Solana feature designed for convenience
Drift Protocol was exploited for approximately $280 million using durable nonces, a Solana transaction feature, enabling attackers to pre-sign adminis...
Axios npm Package Supply Chain Attack by State-Sponsored Actors
State-sponsored threat actors hijacked a core maintainer's npm account and published malicious versions of the Axios JavaScript library that delivered...
Microsoft Confirms Active Exploitation of Windows Shell CVE-2026-32202
The attacker cannot make changes to disclosed information (Integrity) or limit access to the resource (Availability)." Cybersecurity. On April 27, ...
'I suspected I was being socially engineered.' Why crypto's hacking epidemic is getting even worse
The $1.5 billion Bybit hack in February 2025, a January $282 million theft from a single crypto holder, and, this month, the Drift Protocol attack are...
TH: Hacker steals personal data of 350,000 engineers - DataBreaches.Net
Prof Amorn Pimanmas, a director in the council's board, said that about a week ago a hacker breached the database containing members' personal data .....
Another DeFi company loses millions in fresh exploit
Volo Protocol on Sui blockchain lost approximately $3.5 million in an exploit that follows closely behind the $292 million KelpDAO hack, linked to Nor...
Updated daily
