Known Exploited Vulnerabilities and counting....

A known exploited vulnerability (KEV) refers to a software vulnerability that is being actively exploited by cybercriminals or threat actors. When a vulnerability becomes known to be exploited in the wild, it signals that the vulnerability poses a significant and imminent risk to organizations.

Cybersecurity Brief: April 23, 2026

AI-powered cybersecurity capabilities are drawing scrutiny as Anthropic investigates unauthorized access to Mythos, its vulnerability-detection model. A handful of individuals allegedly gained rogue access to the system, which excels at identifying cybersecurity weaknesses—raising concerns about AI tools designed for defense being exploited for offensive purposes. The incident underscores growing tensions around advanced AI models that can both strengthen and threaten security infrastructure. Meanwhile, OpenAI has reportedly briefed U.S. agencies and Five Eyes partners on a new cybersecurity product, reflecting how AI labs are positioning themselves as both security vendors and potential risk vectors in the broader threat landscape.

On the policy front, Sean Plankey has withdrawn his nomination to lead CISA after months of political deadlock, leaving the agency's leadership in continued limbo at a critical moment for federal cybersecurity operations. CISA added one new actively exploited vulnerability to its Known Exploited Vulnerabilities catalog, though specifics remain limited. In the healthcare sector, data breaches at organizations in Illinois and Texas have compromised information belonging to approximately 600,000 individuals, adding to the sector's persistent struggle with patient data protection.

Sources: Indian Express · The Guardian · CISA · Politico · Security Week

Woman Looking at Computer Screen

CVEs form a database of known security vulnerabilities that are actively tracked and managed by a group of organizations, such as the U.S. National Cyber Security Alliance. CVEs are an important tool for network security management because they not only provide an inventory of existing vulnerabilities, but also provide information about how the vulnerability can be exploited and instructions on how to protect against it.

Search Known Exploits

Search for CVEs by vendor to identify known exploited vulnerabilities in your environment

Loading vendors...

Upcoming Patch Due Dates

via Binding Operational Directive 22-01

(BOD) 22-01 is a directive issued by the Cybersecurity and Infrastructure Security Agency (CISA) in the United States to federal agencies and federal contractors in order to improve their cybersecurity practices. It provides a set of guidelines and requirements that these agencies and contractors must follow to increase their defenses against cyber threats.

Loading...

News Logo

Cyber Security News

You may have missed...


📌 Pinned

*

https:betanews.comMar 5

Inside a cyberattack: How hackers steal data

The truth about cybersecurity is that it's almost impossible to keep hackers outside of an organization, particularly as the cybercrime industry ...

https://phemex.comApr 23

Every Major DeFi Hack in 2026 So Far | Bridge Exploits Dominate

Analysis shows that cross-chain bridges have produced the largest single-day losses in crypto history, with Kelp DAO and Drift Protocol exploits accou...

https://www.pymnts.comApr 23

DeFi Security Suffers New Blow With $3 Million Volo Exploit

Volo Protocol confirmed a $3.5 million exploit affecting select vaults, highlighting ongoing security vulnerabilities in the DeFi sector following the...

https://www.coindesk.comApr 23

Volo Protocol loses $3.5 million in exploit days after KelpDAO's breach

Volo Protocol was exploited, losing about $3.5 million from three vaults holding WBTC, XAUm, and USDC, as the DeFi sector continues to face security c...

https://www.thestreet.comApr 23

Crypto hacks raise fresh concerns for Wall Street adoption

A report from Jefferies warned that major hacks like the $293-million KelpDAO and $280-million Drift Protocol breaches could slow Wall Street's blockc...

https://cryptonews.netApr 23

Mastercard joins the blockchain security push

Mastercard joined the Blockchain Security Standards Council as a Charter-level member to shape blockchain security rules and build audit standards for...

https://www.coindesk.comApr 23

UK FCA carries out coordinated crackdown on illegal peer-to-peer crypto trading

The U.K.'s Financial Conduct Authority led its first coordinated crackdown on illegal peer-to-peer crypto trading, raiding eight London sites and issu...

https://thehackernews.comMar 21

Interlock Ransomware Exploits Cisco FMC Zero-Day CVE-2026-20131 for Root Access

Interlock ransomware is actively exploiting CVE-2026-20131 (CVSS 10.0) in Cisco Firewall Management Center, enabling unauthenticated remote code execu...

https://www.theregister.comApr 8

Dutch healthcare software vendor ChipSoft hit by ransomware attack

Dutch healthcare software vendor ChipSoft was knocked offline following a ransomware attack on April 7, 2026, affecting approximately 80% of Dutch hos...


Updated daily