Known Exploited Vulnerabilities and counting....

A known exploited vulnerability (KEV) refers to a software vulnerability that is being actively exploited by cybercriminals or threat actors. When a vulnerability becomes known to be exploited in the wild, it signals that the vulnerability poses a significant and imminent risk to organizations.

Cybersecurity Brief: May 2, 2026

A critical cPanel zero-day vulnerability has been added to CISA's Known Exploited Vulnerabilities catalog, requiring federal agencies to remediate by a specified deadline. The flaw poses immediate risks to web hosting infrastructure. Meanwhile, a sophisticated supply chain attack targeting SAP-related npm packages has been discovered, with attackers embedding credential-stealing malware into widely-used development dependencies. These concurrent infrastructure threats highlight continued adversary focus on compromising foundational systems that underpin enterprise operations.

Data breaches dominated the healthcare and consumer sectors this week. South Carolina's Sandhills Medical Foundation disclosed a ransomware attack by Inc Ransom affecting 170,000 patients, while ADT Inc. faces a class action lawsuit over a breach exposing personal information from 5.5 million customer accounts. The most significant breach emerged from France, where authorities detained a 15-year-old suspect allegedly responsible for compromising the national ID agency (ANTS) and attempting to sell 12-18 million citizen records on dark web markets. On the enforcement front, Swiss authorities arrested members of the Black Axe cybercrime organization, and US investigators detained a Scattered Spider hacker.

In policy developments, CISA and international partners released guidance for secure adoption of agentic AI systems, while the White House engaged tech industry leaders on defensive AI applications and cybersecurity resilience. The US CyberCorps program now mandates AI skills competency for incoming scholars, reflecting the accelerating convergence of artificial intelligence and cybersecurity operations.

Sources: CISA · CISA · SentinelOne · SecurityWeek · Bloomberg Law · SCMP · SecurityWeek · Cybersecurity Dive · Nextgov/FCW

Woman Looking at Computer Screen

CVEs form a database of known security vulnerabilities that are actively tracked and managed by a group of organizations, such as the U.S. National Cyber Security Alliance. CVEs are an important tool for network security management because they not only provide an inventory of existing vulnerabilities, but also provide information about how the vulnerability can be exploited and instructions on how to protect against it.

Search Known Exploits

Search for CVEs by vendor to identify known exploited vulnerabilities in your environment

Loading vendors...

Upcoming Patch Due Dates

via Binding Operational Directive 22-01

(BOD) 22-01 is a directive issued by the Cybersecurity and Infrastructure Security Agency (CISA) in the United States to federal agencies and federal contractors in order to improve their cybersecurity practices. It provides a set of guidelines and requirements that these agencies and contractors must follow to increase their defenses against cyber threats.

Loading...

News Logo

Cyber Security News

You may have missed...


📌 Pinned

*

https:betanews.comMar 5

Inside a cyberattack: How hackers steal data

The truth about cybersecurity is that it's almost impossible to keep hackers outside of an organization, particularly as the cybercrime industry ...

https://abc11.comMay 1

Facebook hack leads to safety concerns for woman in Cumberland County - ABC11

RALEIGH, N.C. (WTVD) -- If your Facebook page gets hacked, getting it back can be a struggle. Kim Moser is learning that the hard way.

https://www.helpnetsecurity.comMay 2

cPanel zero-day exploited for months before patch release (CVE-2026-41940)

A critical authentication bypass vulnerability in cPanel has been actively exploited in the wild since February 23, with attackers gaining full contro...

https://www.reuters.comMay 2

US officials weigh cutting deadlines to fix digital flaws amid worries over AI-powered hacking ...

U.S. cybersecurity officials are considering sharply shorter deadlines for fixing critical flaws in government IT systems, ‌amid concerns hackers ...

https://www.cp24.comMay 2

Canadians among victims defrauded out of more than US$200M in global scam - CP24

U.S. federal jury convicted 25 people for running an international hacking scheme that defrauded more than 1000 victims out of nearly US$215M from ...

https://www.cisa.govMay 2

CISA Adds One Known Exploited Vulnerability to Catalog | CISA

BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks ...

https://www.securityweek.comMay 2

Sandhills Medical Says Ransomware Breach Affects 170,000

South Carolina-based healthcare provider Sandhills Medical Foundation disclosed a data breach affecting nearly 170,000 individuals following a ransomw...

https://www.securityweek.comMay 2

In Other News: Scattered Spider Hacker Arrested, SOC Effectiveness Metrics, NSA Tool Vulnerability

SecurityWeek's weekly cybersecurity news roundup offers a concise overview of important developments that may not receive full standalone coverage but...

https://cisoseries.comMay 2

cPanel 0-day, Swiss Black Axe arrests, HHS data center questions - CISO Series

Cybersecurity Headlines. Cybersecurity News: Critical cPanel zero-day, Swiss Black Axe arrests, HHS data center questions. By. Steve Prentice. -. May ...


Updated daily