Known Exploited Vulnerabilities and counting....
A known exploited vulnerability (KEV) refers to a software vulnerability that is being actively exploited by cybercriminals or threat actors. When a vulnerability becomes known to be exploited in the wild, it signals that the vulnerability poses a significant and imminent risk to organizations.
Cybersecurity Brief: May 19, 2026
NGINX users face immediate risk as CVE-2026-42945, a critical heap buffer overflow vulnerability with a CVSS score of 9.2, is now under active exploitation. The flaw affects NGINX versions 0.6.27 through 1.30.0 and has been weaponized within days of public disclosure, underscoring the narrow window defenders have to patch before threat actors operationalize new vulnerabilities. Organizations running vulnerable versions should treat this as a priority patching event.
The ransomware ecosystem continues its evolution away from encryption-based attacks toward data-only extortion. According to recent threat intelligence, actors are increasingly leveraging stolen data and public disclosure threats as their primary leverage, bypassing the traditional file encryption step entirely. This tactical shift reflects both improved backup hygiene among victims and the realization that data exposure alone provides sufficient extortion leverage. Meanwhile, CISA has updated its DarkSide ransomware advisory with additional indicators of compromise in STIX format, providing defenders with actionable threat intelligence for detection and mitigation.
Anthropic is reportedly preparing to brief the Financial Stability Board on cybersecurity vulnerabilities exposed by the Mythos system, following warnings from security experts that the technology could enable more sophisticated cyberattacks against the banking sector. The briefing signals growing regulatory concern about AI systems' potential to amplify existing cyber threats against critical financial infrastructure.
Sources: Reuters · CISA · WIU Cybersecurity Center · Securelist
Common Vulnerability and Exposure
CVEs form a database of known security vulnerabilities that are actively tracked and managed by a group of organizations, such as the U.S. National Cyber Security Alliance. CVEs are an important tool for network security management because they not only provide an inventory of existing vulnerabilities, but also provide information about how the vulnerability can be exploited and instructions on how to protect against it.
Search Known Exploits
Search for CVEs by vendor or product to identify known exploited vulnerabilities in your environment
Upcoming Patch Due Dates
via Binding Operational Directive 22-01
(BOD) 22-01 is a directive issued by the Cybersecurity and Infrastructure Security Agency (CISA) in the United States to federal agencies and federal contractors in order to improve their cybersecurity practices. It provides a set of guidelines and requirements that these agencies and contractors must follow to increase their defenses against cyber threats.
Loading...
Cyber Security News
You may have missed...
*
Inside a cyberattack: How hackers steal data
The truth about cybersecurity is that it's almost impossible to keep hackers outside of an organization, particularly as the cybercrime industry ...
Spotify outage caused by DDoS attack claimed by hacking group | brief | SC Media
The Islamic Cyber Resistance in Iraq-313 Team has claimed responsibility for the widespread disruption, stating they launched a distributed denial ...
NGINX CVE-2026-42945 Actively Exploited in the Wild
A heap buffer overflow vulnerability (CVE-2026-42945, CVSS 9.2) in NGINX affecting versions 0.6.27 through 1.30.0 is being actively exploited in the w...
CISA Updates DarkSide Ransomware Advisory with IOC Data
CISA added a downloadable STIX file of indicators of compromise (IOCs) to the DarkSide ransomware advisory to help network defenders find and mitigate...
Hack The Box Report Reveals AI-Driven Shift Reshaping Cybersecurity Skills and Talent Strategy
NEW YORK, May 19, 2026--Hack The Box, the global leader in AI cybersecurity readiness, today released its Cybersecurity Workforce Intelligence ...
Coinbase says real-time crypto monitoring led to UK kidnapping convictions - AMBCrypto
Coinbase says real-time blockchain monitoring helped UK authorities secure convictions in a kidnapping and robbery case.
Bitcoin Depot files for Chapter 11 bankruptcy - ATM Marketplace
In other bitcoin ATM news,Bitcoin Bancorp is expanding in California and Texas. SecurityPayments. Related Media. News. Bitcoin Depot's data breach ...
Vitalik: AI-Assisted Formal Verification Could Become the 'Final Form' of Secure Software
Buterin pointed to four areas that could see the most immediate impact: the Ethereum protocol itself, zero-knowledge systems, consensus mechanisms, .....
Vitalik Buterin Says AI-Assisted Verification Could Harden Ethereum Security
Buterin's argument does not make AI a universal fix for crypto security. Formal verification only proves that code matches the properties being ...
Updated daily
