Known Exploited Vulnerabilities and counting....

A known exploited vulnerability (KEV) refers to a software vulnerability that is being actively exploited by cybercriminals or threat actors. When a vulnerability becomes known to be exploited in the wild, it signals that the vulnerability poses a significant and imminent risk to organizations.

Cybersecurity Brief: April 29, 2026

GitHub is facing a critical remote code execution vulnerability (CVE-2026-3854) that researchers warn can be exploited through a single malicious Git push. The flaw affects both GitHub.com and GitHub Enterprise Server installations, creating significant exposure for organizations relying on the platform for code repository management. Details of the vulnerability have been publicly disclosed, raising urgency for administrators to assess their exposure and apply available patches.

In the critical infrastructure sector, Itron—a major supplier of smart meters and energy and water measurement devices—has confirmed a cyberattack affecting its systems. The incident highlights the ongoing vulnerability of industrial control systems and smart grid infrastructure, which remain attractive targets for threat actors. Given Itron's role in utility monitoring across multiple sectors, the attack's scope and potential impact on measurement data integrity or operational technology systems warrant close attention from infrastructure operators and regulators.

Sources: The Hacker News · Cybersecurity Dive

Woman Looking at Computer Screen

CVEs form a database of known security vulnerabilities that are actively tracked and managed by a group of organizations, such as the U.S. National Cyber Security Alliance. CVEs are an important tool for network security management because they not only provide an inventory of existing vulnerabilities, but also provide information about how the vulnerability can be exploited and instructions on how to protect against it.

Search Known Exploits

Search for CVEs by vendor to identify known exploited vulnerabilities in your environment

Loading vendors...

Upcoming Patch Due Dates

via Binding Operational Directive 22-01

(BOD) 22-01 is a directive issued by the Cybersecurity and Infrastructure Security Agency (CISA) in the United States to federal agencies and federal contractors in order to improve their cybersecurity practices. It provides a set of guidelines and requirements that these agencies and contractors must follow to increase their defenses against cyber threats.

Loading...

News Logo

Cyber Security News

You may have missed...


📌 Pinned

*

https:betanews.comMar 5

Inside a cyberattack: How hackers steal data

The truth about cybersecurity is that it's almost impossible to keep hackers outside of an organization, particularly as the cybercrime industry ...

https://www.atmmarketplace.comApr 29

Minnesota House passes crypto ATM ban

Security. Minnesota House passes crypto ATM ban. Photo: Adobe Stock. April ... If signed, Minnesota would become the third state to ban crypto ATMs .....

https://www.coindesk.comApr 29

The Protocol: Mythos forces crypto industry to rethink security practices - CoinDesk

Also: Aave's $300 million recovery effort, crypto for AI agents, and Bitcoin proposal for Satoshi-linked tokens.

https://www.coindesk.comApr 29

Why DeFi Isn't Dead Despite Massive Exploits and $13 Billion Investor Exodus

KelpDAO's $292 million exploit triggered $13 billion in DeFi TVL losses, but much of that was leveraged positions unwinding rather than real capital d...

https://financefeeds.comApr 29

Top 5 Crypto Hacks Since January 2026 — $600M and Counting

Comprehensive analysis of the largest cryptocurrency hacks in 2026, with April accounting for $606 million in losses including the $293 million Kelp D...

https://finance.yahoo.comApr 29

Medtronic says cyberattack on IT network has not disrupted operations

Medical device maker Medtronic confirms cyberattack on corporate IT systems did not affect products or operations.

https://www.cybersecuritydive.comApr 29

Major critical infrastructure supplier reports cyberattack

Critical infrastructure supplier Itron reports cyberattack affecting smart meters and energy/water measurement devices.

https://www.techradar.comApr 29

Report finds cybersecurity workers feel underpaid, undervalued and overstressed ... - TechRadar

Cybersecurity workers are among the most affected by AI impact on jobs · Increased pressure and unsuitably low salaries are putting workers off ...

https://github.blogApr 29

Critical GitHub Vulnerability Patched in Under Two Hours

GitHub responded to a critical remote code execution vulnerability reported through its bug bounty program by validating the finding, deploying a fix,...


Updated daily