Known Exploited Vulnerabilities and counting....

A known exploited vulnerability (KEV) refers to a software vulnerability that is being actively exploited by cybercriminals or threat actors. When a vulnerability becomes known to be exploited in the wild, it signals that the vulnerability poses a significant and imminent risk to organizations.

Cybersecurity Brief: April 27, 2026

Two significant data breaches emerged today involving critical infrastructure and consumer services. Home security giant ADT confirmed unauthorized access to customer and prospective customer data after the ShinyHunters extortion group publicly threatened to leak stolen information. The breach highlights ongoing risks to companies holding sensitive personal data, particularly those in the physical security sector where customer information includes home addresses and security system details.

In a more concerning development, American utility firm Itron disclosed that unauthorized third parties accessed certain internal IT systems on April 13, 2026. Itron manages critical infrastructure including electricity grids and water distribution systems across multiple regions, making any compromise of their networks a potential national security concern. The two-week delay between detection and public disclosure raises questions about notification timelines for critical infrastructure breaches. While the company has not detailed what data or systems were accessed, the incident underscores the persistent targeting of utility and infrastructure providers by threat actors.

Separately, industry analysis warns that supply chain vulnerabilities remain cybersecurity's most systemic risk, with small and medium enterprises representing persistent weak links. The assessment suggests one-off subsidies fail to address structural security gaps in SME operations that serve as entry points into larger enterprise networks.

Sources: Bleeping Computer · Bleeping Computer ·

Woman Looking at Computer Screen

CVEs form a database of known security vulnerabilities that are actively tracked and managed by a group of organizations, such as the U.S. National Cyber Security Alliance. CVEs are an important tool for network security management because they not only provide an inventory of existing vulnerabilities, but also provide information about how the vulnerability can be exploited and instructions on how to protect against it.

Search Known Exploits

Search for CVEs by vendor to identify known exploited vulnerabilities in your environment

Loading vendors...

Upcoming Patch Due Dates

via Binding Operational Directive 22-01

(BOD) 22-01 is a directive issued by the Cybersecurity and Infrastructure Security Agency (CISA) in the United States to federal agencies and federal contractors in order to improve their cybersecurity practices. It provides a set of guidelines and requirements that these agencies and contractors must follow to increase their defenses against cyber threats.

Loading...

News Logo

Cyber Security News

You may have missed...


📌 Pinned

*

https:betanews.comMar 5

Inside a cyberattack: How hackers steal data

The truth about cybersecurity is that it's almost impossible to keep hackers outside of an organization, particularly as the cybercrime industry ...

https://www.binance.comApr 27

'I suspected I was being socially engineered.' Why crypto's hacking epidemic is getting even worse

The $1.5 billion Bybit hack in February 2025, a January $282 million theft from a single crypto holder, and, this month, the Drift Protocol attack are...

https://databreaches.netApr 27

TH: Hacker steals personal data of 350,000 engineers - DataBreaches.Net

Prof Amorn Pimanmas, a director in the council's board, said that about a week ago a hacker breached the database containing members' personal data .....

https://www.thestreet.comApr 27

Another DeFi company loses millions in fresh exploit

Volo Protocol on Sui blockchain lost approximately $3.5 million in an exploit that follows closely behind the $292 million KelpDAO hack, linked to Nor...

https://cryptonews.netApr 27

Why DeFi isn't dead despite massive exploits and $13 billion investor exodus

Analysis explains that despite the $292 million KelpDAO exploit and $13 billion TVL withdrawal, DeFi has survived worse crises and capital is rotating...

https://www.indexbox.ioApr 27

Crypto Hacks in April 2026: $606M Lost, DeFi Exodus

In the initial 48 hours after April 2026 attacks, more than $8.4 billion in deposits left Aave and total DeFi TVL dropped by over $13 billion due to c...

https://247wallst.comApr 27

The Crypto Industry Just Had Its Worst Month of Hacks in Over a Year — And the Bigger Threat Is Still Coming

April 2026 records $606 million in cryptocurrency hacks across 12 incidents, making it the worst month in over a year, with North Korean Lazarus Group...

https://cyberscoop.comApr 23

A dozen allied agencies say China is building covert hacker networks out of everyday routers

Global cybersecurity agencies issue a major warning on China-nexus covert networks exploiting SOHO routers and IoT devices to target critical infrastr...

https://www.helpnetsecurity.comApr 17

Researcher Drops Two More Microsoft Defender Zero-Days, All Three Now Exploited in the Wild

Security researcher Chaotic Eclipse released RedSun and UnDefend proof-of-concept exploits for Microsoft Defender, with all three vulnerabilities now ...


Updated daily