Known Exploited Vulnerabilities and counting....

A known exploited vulnerability (KEV) refers to a software vulnerability that is being actively exploited by cybercriminals or threat actors. When a vulnerability becomes known to be exploited in the wild, it signals that the vulnerability poses a significant and imminent risk to organizations.

Cybersecurity Brief – May 16, 2026

Microsoft's May 2026 Patch Tuesday addresses a significant security load with fixes for over 120 vulnerabilities, including 17 rated critical and 14 remote code execution flaws. Notably absent are zero-day exploits, though one Exchange Server vulnerability (CVE-2026-42897) is already under active attack. The cross-site scripting flaw in Exchange Outlook Web Access requires immediate attention from organizations running on-premises Exchange deployments. Separately, a missing authentication vulnerability in PraisonAI's legacy API server (CVE-2026-44338) was exploited within hours of public disclosure, underscoring the compressed window defenders face between vulnerability announcement and active exploitation.

The education sector faces disruption as Instructure's Canvas learning management system suffered a nationwide cybersecurity incident, with the threat actor ShinyHunters claiming responsibility. The breach affects institutions relying on the widely-deployed platform, though impact details remain limited. Meanwhile, Comcast has agreed to a $117.5 million settlement over a 2023 Xfinity data breach that exposed usernames, passwords, and personal information of millions of customers—a reminder that breach consequences extend well beyond the initial compromise. On the regulatory front, NIST is finalizing enhanced security requirements for federal contractors handling Controlled Unclassified Information, particularly for high-value assets and critical programs, signaling stricter baseline controls ahead.

Sources: Bleeping Computer · Microsoft Tech Community · Cryptika · Cybersecurity Dive · Yahoo Finance · Wiley Law

Woman Looking at Computer Screen

CVEs form a database of known security vulnerabilities that are actively tracked and managed by a group of organizations, such as the U.S. National Cyber Security Alliance. CVEs are an important tool for network security management because they not only provide an inventory of existing vulnerabilities, but also provide information about how the vulnerability can be exploited and instructions on how to protect against it.

Search Known Exploits

Search for CVEs by vendor or product to identify known exploited vulnerabilities in your environment

Loading vendors and products...

Upcoming Patch Due Dates

via Binding Operational Directive 22-01

(BOD) 22-01 is a directive issued by the Cybersecurity and Infrastructure Security Agency (CISA) in the United States to federal agencies and federal contractors in order to improve their cybersecurity practices. It provides a set of guidelines and requirements that these agencies and contractors must follow to increase their defenses against cyber threats.

Loading...

News Logo

Cyber Security News

You may have missed...


📌 Pinned

*

https:betanews.comMar 5

Inside a cyberattack: How hackers steal data

The truth about cybersecurity is that it's almost impossible to keep hackers outside of an organization, particularly as the cybercrime industry ...

https://www.newsweek.comMay 16

Iran May Be Hacking Tank Readers at US Gas Stations: Report - Newsweek

Automatic Tank Gauges Hacked: What to Know. Officials briefed on the matter told CNN they suspected Iranian nationals were behind multiple breaches of...

https://www.msn.comMay 16

Suspected Iranian hackers breach US gas station tank readers - MSN

Breach details: Hackers exploited unprotected automatic tank gauge systems at US gas stations, altering display readings but not fuel levels.

https://hackread.comMay 16

The Next Cybersecurity Challenge May Be Verifying AI Agents - Hackread

For the past two decades, cybersecurity has largely been a story about protecting humans from machines blocking malware, filtering phishing emails ...

https://www.ccn.comMay 16

Crypto Hacks 2025: Full List of Scams, Exchange Exploits & DeFi Vulnerabilities [Updated October]

Comprehensive timeline documenting major crypto hacks and DeFi exploits throughout 2025, including exchange breaches and smart contract vulnerabilitie...

https://www.esecurityplanet.comNov 4

Tiny Bug, Huge Loss: $100M+ Balancer Exploit Rocks DeFi

A rounding error vulnerability in Balancer's V2 Composable Stable Pools led to a $100+ million exploit through repeated micro-gains across thousands o...

https://www.csis.orgFeb 1

Singapore's Cyber Security Agency Reveals Chinese Hackers Breached All Four Major Telecom Providers

China-linked group UNC3886 breached all four of Singapore's major telecommunications providers in a months-long espionage campaign using zero-day expl...

https://thehackernews.comMay 15

Microsoft Exchange Server XSS Vulnerability CVE-2026-42897 Under Active Exploitation

Microsoft disclosed a cross-site scripting vulnerability (CVE-2026-42897, CVSS 8.1) in on-premise Exchange Server versions that is under active exploi...

https://www.yahoo.comMay 15

Pro-Iran Hackers Claim DDoS Attack on Spotify

The Islamic Cyber Resistance in Iraq – 313 Team claimed responsibility for a massive DDoS cyberattack against Spotify's servers, causing major disrupt...


Updated daily