Known Exploited Vulnerabilities and counting....

A known exploited vulnerability (KEV) refers to a software vulnerability that is being actively exploited by cybercriminals or threat actors. When a vulnerability becomes known to be exploited in the wild, it signals that the vulnerability poses a significant and imminent risk to organizations.

Cybersecurity Brief — May 8, 2026

Two significant data breaches dominate today's threat landscape, both attributed to the prolific ShinyHunters threat actor group. Instructure's Canvas learning management system has suffered a massive breach affecting approximately 275 million students, teachers, and staff across nearly 9,000 educational institutions worldwide. The incident appears to have compromised data across multiple states, with North Carolina confirming that all K-12 public schools using the platform were impacted. Separately, medical technology giant Medtronic disclosed a breach affecting nine million individuals after ShinyHunters claimed to have exfiltrated terabytes of internal corporate data. Both incidents underscore the continued effectiveness of large-scale attacks against platforms serving critical sectors.

On the defensive front, CISA has issued new preparedness guidance requiring critical infrastructure organizations to develop plans for sustained cyber outages linked to geopolitical crises. The "CI Fortify" directive emphasizes isolation and recovery objectives, reflecting growing concerns about coordinated nation-state attacks on essential services. Meanwhile, the AI security landscape continues to evolve as OpenAI's GPT-5.5 demonstrates capabilities nearly matching Anthropic's Mythos Preview in vulnerability discovery and exploitation testing. The convergence of sophisticated AI tools for both attack and defense suggests security teams will increasingly rely on autonomous systems to identify and remediate vulnerabilities at machine speed.

Sources: Axios · ClassAction · Morningstar · Federal News Network · WRAL

Woman Looking at Computer Screen

CVEs form a database of known security vulnerabilities that are actively tracked and managed by a group of organizations, such as the U.S. National Cyber Security Alliance. CVEs are an important tool for network security management because they not only provide an inventory of existing vulnerabilities, but also provide information about how the vulnerability can be exploited and instructions on how to protect against it.

Search Known Exploits

Search for CVEs by vendor to identify known exploited vulnerabilities in your environment

Loading vendors...

Upcoming Patch Due Dates

via Binding Operational Directive 22-01

(BOD) 22-01 is a directive issued by the Cybersecurity and Infrastructure Security Agency (CISA) in the United States to federal agencies and federal contractors in order to improve their cybersecurity practices. It provides a set of guidelines and requirements that these agencies and contractors must follow to increase their defenses against cyber threats.

Loading...

News Logo

Cyber Security News

You may have missed...


📌 Pinned

*

https:betanews.comMar 5

Inside a cyberattack: How hackers steal data

The truth about cybersecurity is that it's almost impossible to keep hackers outside of an organization, particularly as the cybercrime industry ...

https://unit42.paloaltonetworks.comMay 8

Copy Fail: What You Need to Know About the Most Severe Linux Threat in Years

CVE-2026-31431 (Copy Fail), a critical local privilege escalation vulnerability disclosed on April 29, 2026, affects millions of systems across mainst...

https://techcrunch.comMay 8

Hackers hack victims hacked by other hackers - TechCrunch

An unknown group of hackers is breaking into systems previously breached by the cybercrime group TeamPCP. Once inside, the hackers immediately ...

https://www.dailyprincetonian.comMay 8

Canvas down ahead of finals after Instructure hack - The Daily Princetonian

Princeton's course-management platform Canvas went dark Thursday afternoon after the cybercriminal group ShinyHunters claimed to have hacked ...

https://kstatecollegian.comMay 8

Hackers cause Canvas shutdown; K-State among 9000 schools affected

The cybercrime extortion group ShinyHunters allegedly hacked Instructure, causing Canvas outages at Kansas State and 9,000 other higher education ...

https://www.insidehighered.comMay 8

Hackers Target Canvas—Again - Inside Higher Ed

One day after Instructure said it had resolved a data breach to its learning management system, Canvas, the hackers are at it again.

https://www.wral.comMay 8

Canvas Data Breach May Have Impacted All NC Public Schools

Wake County Public School System and potentially all North Carolina K-12 schools were impacted by the Instructure Canvas cybersecurity incident with s...

https://localnews8.comMay 8

ISU and BYU-I students locked out of Canvas following major cyber incident - LocalNews8.com

... College of Eastern Idaho are among the thousands across the nation that have lost access to Canvas after a confirmed cybersecurity incident.

https://www.oit.uci.eduMay 8

Updates: Canvas Nationwide Cybersecurity Incident | Office of Information Technology

Canvas is currently down due to a wide-scale cybersecurity outage affecting multiple institutions. The vendor is aware of the issue and is providing ....


Updated daily