Known Exploited Vulnerabilities and counting....

A known exploited vulnerability (KEV) refers to a software vulnerability that is being actively exploited by cybercriminals or threat actors. When a vulnerability becomes known to be exploited in the wild, it signals that the vulnerability poses a significant and imminent risk to organizations.

Cybersecurity Brief: May 3, 2026

Critical infrastructure faces mounting pressure as operational technology attacks surge 84% in 2025, with 96% of OT incidents traced to compromised IT systems. The convergence of IT and OT networks continues to expose industrial control systems to threats designed for enterprise environments, highlighting the inadequacy of traditional security boundaries in modern critical infrastructure. Meanwhile, a critical zero-day vulnerability in cPanel is being actively exploited, threatening web hosting infrastructure globally.

Two significant breaches underscore insider and supply chain risks. Cybersecurity vendor Trellix confirmed unauthorized access to portions of its source code repository, prompting forensic investigation and law enforcement notification. In healthcare, South Carolina's Sandhills Medical Foundation disclosed that Inc Ransom compromised data belonging to 170,000 patients. Separately, two cybersecurity professionals received four-year prison sentences for conducting ransomware attacks linked to the ALPHV BlackCat operation—a stark reminder that threat actors increasingly come from within the industry itself.

The threat landscape shows geographic escalation and platform abuse. The UAE reports facing up to 700,000 daily cyberattacks from Iran-linked actors deploying AI tools and deepfakes, prompting activation of national cyber defense operations. On the fraud front, researchers uncovered a massive phishing operation abusing Google AppSheet infrastructure to target Facebook credentials, affecting some 30,000 users. Australian financial institutions face mounting pressure as mortgage fraud reaches $3 billion, with major banks investigating compromised brokers amid what regulators describe as a "tsunami" of converging cyber and fraud risks.

Sources: AFR · The Media Line · Hackread · Cybernews · The Hacker News · TechTarget · CISO Series · SecurityWeek

Woman Looking at Computer Screen

CVEs form a database of known security vulnerabilities that are actively tracked and managed by a group of organizations, such as the U.S. National Cyber Security Alliance. CVEs are an important tool for network security management because they not only provide an inventory of existing vulnerabilities, but also provide information about how the vulnerability can be exploited and instructions on how to protect against it.

Search Known Exploits

Search for CVEs by vendor to identify known exploited vulnerabilities in your environment

Loading vendors...

Upcoming Patch Due Dates

via Binding Operational Directive 22-01

(BOD) 22-01 is a directive issued by the Cybersecurity and Infrastructure Security Agency (CISA) in the United States to federal agencies and federal contractors in order to improve their cybersecurity practices. It provides a set of guidelines and requirements that these agencies and contractors must follow to increase their defenses against cyber threats.

Loading...

News Logo

Cyber Security News

You may have missed...


📌 Pinned

*

https:betanews.comMar 5

Inside a cyberattack: How hackers steal data

The truth about cybersecurity is that it's almost impossible to keep hackers outside of an organization, particularly as the cybercrime industry ...

https://hackread.comMay 3

Google AppSheet Exploited in 30,000-User Facebook Phishing Operation - Hackread

Cybersecurity researchers at Guardio Labs have discovered a massive phishing operation that uses Google's own infrastructure to hijack Facebook ...

https://themedialine.orgMay 3

UAE Warns Up to 700,000 Daily Cyberattacks From Iran-Linked Hackers Using AI Tools and ...

In response, the UAE Cybersecurity Council has activated its National Cyber Security Operations Center and is deploying its own AI-based systems to .....

https://www.govtech.comMay 3

A Tale of Two States: The 2026 Cybersecurity Paradox - GovTech

A Tale of Two States: The 2026 Cybersecurity Paradox. The cyber threat outlooks from CIOs and CISOs at the NASCIO Midyear Conference in Philadelphia ....

https://www.theblock.coMay 1

North Korea accounts for 76% of 2026 crypto hack losses, with theft since 2017 topping $6 billion: TRM Labs

North Korean hacking groups stole $577 million across two April incidents, accounting for 76% of total crypto hack losses in 2026, with cumulative the...

https://www.news4hackers.comMay 1

Two American Cybersecurity Workers Jailed for Involvement with BlackCat Ransomware Attacks

Two US cybersecurity professionals, Ryan Goldberg and Kevin Martin, were sentenced to four years in prison for aiding the BlackCat ransomware gang and...

https://www.helpnetsecurity.comApr 30

cPanel Zero-Day CVE-2026-41940 Authentication Bypass Exploited Since February

Critical authentication bypass vulnerability in cPanel has been actively exploited in the wild since February 23, 2026, allowing remote attackers to g...

https://www.msn.comMay 3

Hacker claims massive breach of Chinese military supercomputing hub - MSN

If confirmed, the breach could be one of the largest in history, raising global concerns over cybersecurity at critical infrastructure sites.

https://thehackernews.comMay 3

CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a recently disclosed security flaw impacting various Linux ...


Updated daily