Known Exploited Vulnerabilities and counting....
A known exploited vulnerability (KEV) refers to a software vulnerability that is being actively exploited by cybercriminals or threat actors. When a vulnerability becomes known to be exploited in the wild, it signals that the vulnerability poses a significant and imminent risk to organizations.
Common Vulnerability and Exposure
CVEs form a database of known security vulnerabilities that are actively tracked and managed by a group of organizations, such as the U.S. National Cyber Security Alliance. CVEs are an important tool for network security management because they not only provide an inventory of existing vulnerabilities, but also provide information about how the vulnerability can be exploited and instructions on how to protect against it.
Search Known Exploits
Search for CVEs by vendor to identify known exploited vulnerabilities in your environment
Upcoming Patch Due Dates
via Binding Operational Directive 22-01
(BOD) 22-01 is a directive issued by the Cybersecurity and Infrastructure Security Agency (CISA) in the United States to federal agencies and federal contractors in order to improve their cybersecurity practices. It provides a set of guidelines and requirements that these agencies and contractors must follow to increase their defenses against cyber threats.
Loading...
Cyber Security News
You may have missed...
*
Inside a cyberattack: How hackers steal data
The truth about cybersecurity is that it's almost impossible to keep hackers outside of an organization, particularly as the cybercrime industry ...
CoinFello launches AI tool to execute crypto trades without private keys - TradingView
"If we want agents to participate meaningfully in the onchain economy, we need a security model that is better than handing an autonomous system a ...
BeatBanker Android Trojan Uses Silent Audio Loop to Steal Crypto - Hackread
Security researchers at Kaspersky have identified BeatBanker, a dual-mode Android Trojan, targeting users via a fake Google Play Store.
Ledger Uncovers Security Vulnerability That Could Affect 25% of Android Phones
The chip vulnerability makes it possible for hackers to decrypt affected Android smartphones, and steal data — including crypto wallet private ...
Quantum computing, explained: how it could change cybersecurity, healthcare, and markets
... crypto wallet “safe”, and steal the coins. That possibility strikes at the heart of bitcoin's value – the trust in the security of the network.
OpenClaw founder rips into 'mess' of GitHub's security vulnerability reporting - Cryptopolitan
This does not account for agents being deployed off the blockchain. GitHub's vulnerability reporting system was designed for a world in which humans ....
Iranian Hacktivists Strike Medical Device Maker Stryker in "Severe" Attack that Wiped Systems
A known Iranian hacktivist group named Handala posted messages on hacked systems and on social media taking credit for the hit, which they say is ...
A Foreign Hacker Accessed FBI Files on Epstein Back in 2023: Report - Gizmodo
As hackers become more sophisticated, breaches involving government ... The hack took place after a server at the Child Exploitation Forensic ...
Pro-Iran hackers claim cyberattack on major US medical device maker | CNN Politics
Email security firm Proofpoint said Wednesday that its tracking of known Iranian groups had turned up only one hacking campaign — an attempt to hack a...
Updated daily
