Known Exploited Vulnerabilities and counting....
A known exploited vulnerability (KEV) refers to a software vulnerability that is being actively exploited by cybercriminals or threat actors. When a vulnerability becomes known to be exploited in the wild, it signals that the vulnerability poses a significant and imminent risk to organizations.
Common Vulnerability and Exposure
CVEs form a database of known security vulnerabilities that are actively tracked and managed by a group of organizations, such as the U.S. National Cyber Security Alliance. CVEs are an important tool for network security management because they not only provide an inventory of existing vulnerabilities, but also provide information about how the vulnerability can be exploited and instructions on how to protect against it.
Search Known Exploits
Search for CVEs by vendor to identify known exploited vulnerabilities in your environment
CVE = Common Vulnerability and Exposure
CVE OF THE WEEK:
Palo Alto Networks
PAN-OS
Patch deadline: a year ago on 01/20/2025
CVE-2024-3393
Palo Alto Networks PAN-OS contains a vulnerability in parsing and logging malformed DNS packets in the DNS Security feature that, when exploited, allows an unauthenticated attacker to remotely reboot the firewall. Repeated attempts to trigger this condition will cause the firewall to enter maintenance mode.
Palo Alto Networks PAN-OS Malformed DNS Packet Vulnerability
Learn more about this CVE: paloaltonetworks.com
Cyber Security News
You may have missed...
*
Inside a cyberattack: How hackers steal data
The truth about cybersecurity is that it's almost impossible to keep hackers outside of an organization, particularly as the cybercrime industry ...
Facebook ads spread fake Windows 11 downloads that steal passwords and crypto wallets
Before delivering the malware, the fake page checks who you are. If you connect from a data center IP address—often used by security researchers and ....
House Dems Raise National Security Alarms Over Trump Family's Crypto Bank Charter Request
House Dems Raise National Security Alarms Over Trump Family's Crypto Bank Charter Request. Sander Lutz. Fri, February 20, 2026 at 8:13 AM PST. 2 min ....
Ethereum Price and the Rising Influence of Staking - Sarasota Herald-Tribune
Security and price movements always connect in crypto. When a network performs well, confidence grows. When investors feel protected, they tend to ...
The AI security nightmare is here and it looks suspiciously like lobster | The Verge
A hacker tricked Cline's Claude-powered workflow into installing OpenClaw on computers.
FBI Reports 1,900 ATM Jackpotting Incidents Since 2020, $20M Lost in 2025 - The Hacker News
The U.S. Federal Bureau of Investigation (FBI) has warned of an increase in ATM jackpotting incidents across the country, leading to losses of ...
Why the Former Sony Head Blames Himself for the Infamous Hack - Puck
... hack. Michael walks us through the unique scenario that led to him greenlighting the film, what he should have done differently, and highlights .....
Ex Sony Pictures Boss Regrets Seth Rogen's 'The Interview' - Variety
Lynton says he spoke to President Obama eight months after the hack, when it was clear that North Korea had hacked Sony. Obama asked Lynton, “What ...
How Private Equity Debt Left a Leading VPN Open to Chinese Hackers - Bloomberg.com
Chinese spies had hacked the code and infiltrated nearly two dozen organizations. The directive applied to all civilian federal agencies, but given .....
Updated daily
