Known Exploited Vulnerabilities and counting....
A known exploited vulnerability (KEV) refers to a software vulnerability that is being actively exploited by cybercriminals or threat actors. When a vulnerability becomes known to be exploited in the wild, it signals that the vulnerability poses a significant and imminent risk to organizations.
Cybersecurity Brief: May 2, 2026
A critical cPanel zero-day vulnerability has been added to CISA's Known Exploited Vulnerabilities catalog, requiring federal agencies to remediate by a specified deadline. The flaw poses immediate risks to web hosting infrastructure. Meanwhile, a sophisticated supply chain attack targeting SAP-related npm packages has been discovered, with attackers embedding credential-stealing malware into widely-used development dependencies. These concurrent infrastructure threats highlight continued adversary focus on compromising foundational systems that underpin enterprise operations.
Data breaches dominated the healthcare and consumer sectors this week. South Carolina's Sandhills Medical Foundation disclosed a ransomware attack by Inc Ransom affecting 170,000 patients, while ADT Inc. faces a class action lawsuit over a breach exposing personal information from 5.5 million customer accounts. The most significant breach emerged from France, where authorities detained a 15-year-old suspect allegedly responsible for compromising the national ID agency (ANTS) and attempting to sell 12-18 million citizen records on dark web markets. On the enforcement front, Swiss authorities arrested members of the Black Axe cybercrime organization, and US investigators detained a Scattered Spider hacker.
In policy developments, CISA and international partners released guidance for secure adoption of agentic AI systems, while the White House engaged tech industry leaders on defensive AI applications and cybersecurity resilience. The US CyberCorps program now mandates AI skills competency for incoming scholars, reflecting the accelerating convergence of artificial intelligence and cybersecurity operations.
Sources: CISA · CISA · SentinelOne · SecurityWeek · Bloomberg Law · SCMP · SecurityWeek · Cybersecurity Dive · Nextgov/FCW
Common Vulnerability and Exposure
CVEs form a database of known security vulnerabilities that are actively tracked and managed by a group of organizations, such as the U.S. National Cyber Security Alliance. CVEs are an important tool for network security management because they not only provide an inventory of existing vulnerabilities, but also provide information about how the vulnerability can be exploited and instructions on how to protect against it.
Search Known Exploits
Search for CVEs by vendor to identify known exploited vulnerabilities in your environment
Upcoming Patch Due Dates
via Binding Operational Directive 22-01
(BOD) 22-01 is a directive issued by the Cybersecurity and Infrastructure Security Agency (CISA) in the United States to federal agencies and federal contractors in order to improve their cybersecurity practices. It provides a set of guidelines and requirements that these agencies and contractors must follow to increase their defenses against cyber threats.
Loading...
Cyber Security News
You may have missed...
*
Inside a cyberattack: How hackers steal data
The truth about cybersecurity is that it's almost impossible to keep hackers outside of an organization, particularly as the cybercrime industry ...
North Korea accounts for 76% of 2026 crypto hack losses, with theft since 2017 topping $6 billion: TRM Labs
North Korean hacking groups stole $577 million across two April incidents, accounting for 76% of total crypto hack losses in 2026, with cumulative the...
Two American Cybersecurity Workers Jailed for Involvement with BlackCat Ransomware Attacks
Two US cybersecurity professionals, Ryan Goldberg and Kevin Martin, were sentenced to four years in prison for aiding the BlackCat ransomware gang and...
cPanel Zero-Day CVE-2026-41940 Authentication Bypass Exploited Since February
Critical authentication bypass vulnerability in cPanel has been actively exploited in the wild since February 23, 2026, allowing remote attackers to g...
Hacker claims massive breach of Chinese military supercomputing hub - MSN
If confirmed, the breach could be one of the largest in history, raising global concerns over cybersecurity at critical infrastructure sites.
CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a recently disclosed security flaw impacting various Linux ...
Facebook hack leads to safety concerns for woman in Cumberland County - ABC11
RALEIGH, N.C. (WTVD) -- If your Facebook page gets hacked, getting it back can be a struggle. Kim Moser is learning that the hard way.
cPanel zero-day exploited for months before patch release (CVE-2026-41940)
A critical authentication bypass vulnerability in cPanel has been actively exploited in the wild since February 23, with attackers gaining full contro...
US officials weigh cutting deadlines to fix digital flaws amid worries over AI-powered hacking ...
U.S. cybersecurity officials are considering sharply shorter deadlines for fixing critical flaws in government IT systems, amid concerns hackers ...
Updated daily
