Known Exploited Vulnerabilities and counting....

A known exploited vulnerability (KEV) refers to a software vulnerability that is being actively exploited by cybercriminals or threat actors. When a vulnerability becomes known to be exploited in the wild, it signals that the vulnerability poses a significant and imminent risk to organizations.

Woman Looking at Computer Screen

CVEs form a database of known security vulnerabilities that are actively tracked and managed by a group of organizations, such as the U.S. National Cyber Security Alliance. CVEs are an important tool for network security management because they not only provide an inventory of existing vulnerabilities, but also provide information about how the vulnerability can be exploited and instructions on how to protect against it.

Search Known Exploits

Search for CVEs by vendor to identify known exploited vulnerabilities in your environment

Loading vendors...

Upcoming Patch Due Dates

via Binding Operational Directive 22-01

(BOD) 22-01 is a directive issued by the Cybersecurity and Infrastructure Security Agency (CISA) in the United States to federal agencies and federal contractors in order to improve their cybersecurity practices. It provides a set of guidelines and requirements that these agencies and contractors must follow to increase their defenses against cyber threats.

Loading...

News Logo

Cyber Security News

You may have missed...


📌 Pinned

*

https:betanews.comMar 5

Inside a cyberattack: How hackers steal data

The truth about cybersecurity is that it's almost impossible to keep hackers outside of an organization, particularly as the cybercrime industry ...

https://www.msn.comMar 21

FBI seizes Iranian hacker domains after Stryker attack - MSN

The FBI has seized four domains linked to Iran's Ministry of Intelligence and Security, tied to the pro-Iranian hacktivist group Handala, after a ...

https://cybernews.comMar 21

Intoxalock breathalyzer hack leaves drivers unable to start their cars across 46 states

Drivers across 46 states say the Intoxalock hack has locked them out and left their cars unable to start. The outage has disrupted towing ...

https://cybernews.comMar 22

Most wanted hackers hide in plain sight – and there's nothing police can do - Cybernews

Why hackers never get caught: Russia and China shield cybercriminals as FBI struggles with $12.5B in losses.

https://www.telegraph.co.ukMar 21

Baptist church website turned into online casino by hackers - The Telegraph

Virtual roulette tables and digital slot machines were the last thing parishioners expected to find when they logged on to their church's website.

https://nypost.comMar 22

LA Metro computer hack causes commuter chaos - New York Post

LA Metro computer hack causes commuter chaos. By. Daniel Farr. Published March 21, 2026, 9:43 p.m. ET. Comments. A security breach to Los Angeles ...

https://www.youtube.comMar 22

US Flags Russian Hackers Targeting Messaging Apps, Thousands Compromised | WION

The US government warns of a large-scale Russian hacking campaign targeting messaging apps like Signal, compromising thousands of accounts.

https://www.economist.comMar 22

America tells private firms to “hack back” - The Economist

Its aggressive new strategy comes as Iranian hackers threaten cyber-warfare | United States.

https://drugscontrol.orgMar 21

FDA Tightens Cybersecurity Rules for Medical Devices - Drugs Control Media Services

Washington, D.C., March 21, 2026 — The U.S. Food and Drug Administration has issued a major update to its cybersecurity guidance for medical ...


Updated daily