Known Exploited Vulnerabilities and counting....

A known exploited vulnerability (KEV) refers to a software vulnerability that is being actively exploited by cybercriminals or threat actors. When a vulnerability becomes known to be exploited in the wild, it signals that the vulnerability poses a significant and imminent risk to organizations.

Woman Looking at Computer Screen

CVEs form a database of known security vulnerabilities that are actively tracked and managed by a group of organizations, such as the U.S. National Cyber Security Alliance. CVEs are an important tool for network security management because they not only provide an inventory of existing vulnerabilities, but also provide information about how the vulnerability can be exploited and instructions on how to protect against it.

Search Known Exploits

Search for CVEs by vendor to identify known exploited vulnerabilities in your environment

Loading vendors...

Upcoming Patch Due Dates

via Binding Operational Directive 22-01

(BOD) 22-01 is a directive issued by the Cybersecurity and Infrastructure Security Agency (CISA) in the United States to federal agencies and federal contractors in order to improve their cybersecurity practices. It provides a set of guidelines and requirements that these agencies and contractors must follow to increase their defenses against cyber threats.

Loading...

News Logo

Cyber Security News

You may have missed...


📌 Pinned

*

https:betanews.comMar 5

Inside a cyberattack: How hackers steal data

The truth about cybersecurity is that it's almost impossible to keep hackers outside of an organization, particularly as the cybercrime industry ...

https://www.nbcnews.comMar 27

Iranian hackers publish emails allegedly stolen from Kash Patel

Pro-Iran hackers from the Handala group published more than 300 emails and photos from FBI Director Kash Patel's personal email account in apparent re...

https://www.bleepingcomputer.comMar 29

Critical Fortinet FortiClient EMS flaw now exploited in attacks

Attackers are actively exploiting a critical SQL injection vulnerability (CVE-2026-21643) in Fortinet's FortiClient EMS platform that allows unauthent...

https://techcrunch.comMar 27

European Commission confirms cyberattack after hackers claim data breach

The European Commission confirmed a data breach affecting its Europa.eu cloud infrastructure, claimed by the ShinyHunters extortion gang who allegedly...

https://www.bleepingcomputer.comMar 31

Google fixes fourth Chrome zero-day exploited in attacks in 2026

Google patched its fourth Chrome zero-day vulnerability being actively exploited in attacks this year, a use-after-free weakness in Dawn WebGPU implem...

https://venturebeat.comApr 1

Hackers slipped a trojan into the code library behind most of the internet. Your team ... - VentureBeat

Attackers stole a long-lived npm token from the lead axios maintainer and published two poisoned versions that drop a cross-platform RAT.

https://thehackernews.comApr 1

TrueConf Zero-Day Exploited in Attacks on Southeast Asian Government Networks

... hacking groups. Cybersecurity. On top of that, the use of Havoc has been ... © 2026 The Hacker News. All Rights Reserved.

https://cryptonews.netMar 31

AI agents like OpenClaw could drain crypto wallets via 'malicious skills': CertiK

The widespread integration of AI assistants such as OpenClaw introduces critical security risks that open up users to unauthorized actions, ...

https://research.googleMar 31

Safeguarding cryptocurrency by disclosing quantum vulnerabilities responsibly

Most blockchain technologies and cryptocurrencies currently rely on ECDLP-256 for critical aspects of their security. As we argue in our paper, PQC .....


Updated daily