Known Exploited Vulnerabilities and counting....

A known exploited vulnerability (KEV) refers to a software vulnerability that is being actively exploited by cybercriminals or threat actors. When a vulnerability becomes known to be exploited in the wild, it signals that the vulnerability poses a significant and imminent risk to organizations.

Cybersecurity Brief: May 1, 2026

Critical Infrastructure Under Scrutiny

U.S. lawmakers have launched a formal inquiry into the cybersecurity risks posed by Chinese-origin AI models deployed in critical infrastructure systems. The House Homeland Security Subcommittee on Cybersecurity, led by Rep. Andrew Garbarino (R-NY), is examining potential national security implications as AI systems become increasingly embedded in essential services. Separately, the NSA joined Australia's ACSC and international partners to release guidance on "agentic AI" — autonomous AI systems that can take independent actions — warning organizations to carefully assess risks before deployment.

Active Exploitation and Major Breaches

A critical vulnerability in cPanel & WHM has been exploited as a zero-day for months, allowing attackers to modify server configurations before patches became available. The Canadian Centre for Cyber Security has confirmed the severity of the flaw affecting the widely-used web hosting control panel. In breach developments, French authorities detained a 15-year-old suspected of compromising the national ID agency (ANTS) and attempting to sell data on 12-18 million citizens. Meanwhile, Amtrak disclosed a breach exposing personal information from over 2.1 million customer accounts, including names, emails, and addresses. South Carolina's Sandhills Medical Foundation also reported a ransomware attack by Inc Ransom affecting 170,000 individuals.

Sources: Industrial Cyber · SecurityWeek · NSA · SCMP · Fox News · SecurityWeek

Woman Looking at Computer Screen

CVEs form a database of known security vulnerabilities that are actively tracked and managed by a group of organizations, such as the U.S. National Cyber Security Alliance. CVEs are an important tool for network security management because they not only provide an inventory of existing vulnerabilities, but also provide information about how the vulnerability can be exploited and instructions on how to protect against it.

Search Known Exploits

Search for CVEs by vendor to identify known exploited vulnerabilities in your environment

Loading vendors...

Upcoming Patch Due Dates

via Binding Operational Directive 22-01

(BOD) 22-01 is a directive issued by the Cybersecurity and Infrastructure Security Agency (CISA) in the United States to federal agencies and federal contractors in order to improve their cybersecurity practices. It provides a set of guidelines and requirements that these agencies and contractors must follow to increase their defenses against cyber threats.

Loading...

News Logo

Cyber Security News

You may have missed...


📌 Pinned

*

https:betanews.comMar 5

Inside a cyberattack: How hackers steal data

The truth about cybersecurity is that it's almost impossible to keep hackers outside of an organization, particularly as the cybercrime industry ...

https://therecord.mediaMay 1

Hackers earning millions from hijacked cargo, FBI says - Recorded Future News

... hackers redirected shipments. A vape company lost $1 million worth of products last year in a hacking-hijacking incident, according to Bloomberg.

https://therecord.mediaMay 1

France investigates 15-year-old over alleged hack of national ID agency

The minor was taken into police custody on April 25 on suspicion of involvement in a data breach affecting the National Agency for Secure ...

https://www.usnews.comMay 1

Chinese Hackers Vulnerable to U.S. Arrest if They Travel, FBI Official Says

US News is a recognized leader in college, grad school, hospital, mutual fund, and car rankings. Track elected officials, research health ...

https://www.securityweek.comMay 1

FBI Warns of Surge in Hacker-Enabled Cargo Theft - SecurityWeek

A new alert issued by the FBI warns of a surge in cyber-enabled cargo theft, with hackers targeting both brokers and carriers in attacks.

https://www.foxnews.comMay 1

Amtrak Data Breach Exposes Over 2.1 Million Customer Accounts

A dataset attributed to Amtrak appeared on Have I Been Pwned, exposing customer names, emails, addresses, and support interaction records from over 2....

https://www.scmp.comMay 1

France Probes Teenage Suspect in Massive French ID Agency Data Breach

French authorities detained a 15-year-old suspected of hacking the national ID agency (ANTS) and attempting to sell 12-18 million lines of stolen citi...

https://www.securityweek.comMay 1

Critical cPanel & WHM Vulnerability Exploited as Zero-Day for Months - SecurityWeek

As the Canadian Centre for Cyber Security points out, successful exploitation of the issue could allow an attacker to modify server configurations and...

https://www.japantimes.co.jpMay 1

Japan's space systems face growing cybersecurity threats - The Japan Times

Space systems depend on data links between satellites and ground infrastructure, making them inherently tied to cybersecurity.


Updated daily