Known Exploited Vulnerabilities and counting....

A known exploited vulnerability (KEV) refers to a software vulnerability that is being actively exploited by cybercriminals or threat actors. When a vulnerability becomes known to be exploited in the wild, it signals that the vulnerability poses a significant and imminent risk to organizations.

Cybersecurity Brief: May 19, 2026

NGINX users face immediate risk as CVE-2026-42945, a critical heap buffer overflow vulnerability with a CVSS score of 9.2, is now under active exploitation. The flaw affects NGINX versions 0.6.27 through 1.30.0 and has been weaponized within days of public disclosure, underscoring the narrow window defenders have to patch before threat actors operationalize new vulnerabilities. Organizations running vulnerable versions should treat this as a priority patching event.

The ransomware ecosystem continues its evolution away from encryption-based attacks toward data-only extortion. According to recent threat intelligence, actors are increasingly leveraging stolen data and public disclosure threats as their primary leverage, bypassing the traditional file encryption step entirely. This tactical shift reflects both improved backup hygiene among victims and the realization that data exposure alone provides sufficient extortion leverage. Meanwhile, CISA has updated its DarkSide ransomware advisory with additional indicators of compromise in STIX format, providing defenders with actionable threat intelligence for detection and mitigation.

Anthropic is reportedly preparing to brief the Financial Stability Board on cybersecurity vulnerabilities exposed by the Mythos system, following warnings from security experts that the technology could enable more sophisticated cyberattacks against the banking sector. The briefing signals growing regulatory concern about AI systems' potential to amplify existing cyber threats against critical financial infrastructure.

Sources: Reuters · CISA · WIU Cybersecurity Center · Securelist

Woman Looking at Computer Screen

CVEs form a database of known security vulnerabilities that are actively tracked and managed by a group of organizations, such as the U.S. National Cyber Security Alliance. CVEs are an important tool for network security management because they not only provide an inventory of existing vulnerabilities, but also provide information about how the vulnerability can be exploited and instructions on how to protect against it.

Search Known Exploits

Search for CVEs by vendor or product to identify known exploited vulnerabilities in your environment

Loading vendors and products...

Upcoming Patch Due Dates

via Binding Operational Directive 22-01

(BOD) 22-01 is a directive issued by the Cybersecurity and Infrastructure Security Agency (CISA) in the United States to federal agencies and federal contractors in order to improve their cybersecurity practices. It provides a set of guidelines and requirements that these agencies and contractors must follow to increase their defenses against cyber threats.

Loading...

News Logo

Cyber Security News

You may have missed...


📌 Pinned

*

https:betanews.comMar 5

Inside a cyberattack: How hackers steal data

The truth about cybersecurity is that it's almost impossible to keep hackers outside of an organization, particularly as the cybercrime industry ...

https://www.scworld.comMay 19

Spotify outage caused by DDoS attack claimed by hacking group | brief | SC Media

The Islamic Cyber Resistance in Iraq-313 Team has claimed responsibility for the widespread disruption, stating they launched a distributed denial ...

https://www.wiu.eduMay 19

NGINX CVE-2026-42945 Actively Exploited in the Wild

A heap buffer overflow vulnerability (CVE-2026-42945, CVSS 9.2) in NGINX affecting versions 0.6.27 through 1.30.0 is being actively exploited in the w...

https://www.cisa.govMay 19

CISA Updates DarkSide Ransomware Advisory with IOC Data

CISA added a downloadable STIX file of indicators of compromise (IOCs) to the DarkSide ransomware advisory to help network defenders find and mitigate...

https://finance.yahoo.comMay 19

Hack The Box Report Reveals AI-Driven Shift Reshaping Cybersecurity Skills and Talent Strategy

NEW YORK, May 19, 2026--Hack The Box, the global leader in AI cybersecurity readiness, today released its Cybersecurity Workforce Intelligence ...

https://ambcrypto.comMay 18

Coinbase says real-time crypto monitoring led to UK kidnapping convictions - AMBCrypto

Coinbase says real-time blockchain monitoring helped UK authorities secure convictions in a kidnapping and robbery case.

https://www.atmmarketplace.comMay 19

Bitcoin Depot files for Chapter 11 bankruptcy - ATM Marketplace

In other bitcoin ATM news,Bitcoin Bancorp is expanding in California and Texas. SecurityPayments. Related Media. News. Bitcoin Depot's data breach ...

https://cryptonews.netMay 19

Vitalik: AI-Assisted Formal Verification Could Become the 'Final Form' of Secure Software

Buterin pointed to four areas that could see the most immediate impact: the Ethereum protocol itself, zero-knowledge systems, consensus mechanisms, .....

https://cryptoadventure.comMay 19

Vitalik Buterin Says AI-Assisted Verification Could Harden Ethereum Security

Buterin's argument does not make AI a universal fix for crypto security. Formal verification only proves that code matches the properties being ...


Updated daily