Known Exploited Vulnerabilities and counting....

A known exploited vulnerability (KEV) refers to a software vulnerability that is being actively exploited by cybercriminals or threat actors. When a vulnerability becomes known to be exploited in the wild, it signals that the vulnerability poses a significant and imminent risk to organizations.

Cybersecurity Brief – April 10, 2026

Critical Infrastructure Under Active Attack

Federal agencies are warning of ongoing cyberattacks targeting internet-connected programmable logic controllers (PLCs) in US critical infrastructure. Attackers are exploiting weak configurations and exposed industrial control systems to gain initial access, with potential to escalate toward operational disruption. The threat underscores persistent vulnerabilities in operational technology environments where internet-facing assets remain inadequately secured. Separately, CISA has added a second critical vulnerability in Ivanti Endpoint Manager Mobile (EPMM) to its Known Exploited Vulnerabilities catalog, indicating active exploitation in the wild. Organizations running Ivanti EPMM should prioritize patching immediately.

Healthcare Ransomware and Geopolitical Threats

Dutch healthcare software vendor ChipSoft has been hit by a ransomware attack, forcing the company to take its website and digital services offline. The incident affects patient portals and healthcare provider access, highlighting the healthcare sector's continued appeal to ransomware operators. Meanwhile, Iran-linked hacking groups say a fragile ceasefire between Iran and the US won't stop their cyber operations. The Handala group has announced only a temporary pause in attacks, with cybersecurity experts warning of likely future disruptions to critical infrastructure as geopolitical tensions persist.

Policy Development

The US Treasury Department is extending cybersecurity threat intelligence sharing to the digital asset industry, giving eligible cryptocurrency firms and organizations access to the same information regularly provided to traditional financial institutions. The initiative aims to strengthen defenses across an increasingly targeted sector.

Sources: Cybersecurity Dive · PBS NewsHour · BleepingComputer · Industrial Cyber · Finextra

Woman Looking at Computer Screen

CVEs form a database of known security vulnerabilities that are actively tracked and managed by a group of organizations, such as the U.S. National Cyber Security Alliance. CVEs are an important tool for network security management because they not only provide an inventory of existing vulnerabilities, but also provide information about how the vulnerability can be exploited and instructions on how to protect against it.

Search Known Exploits

Search for CVEs by vendor to identify known exploited vulnerabilities in your environment

Loading vendors...

Upcoming Patch Due Dates

via Binding Operational Directive 22-01

(BOD) 22-01 is a directive issued by the Cybersecurity and Infrastructure Security Agency (CISA) in the United States to federal agencies and federal contractors in order to improve their cybersecurity practices. It provides a set of guidelines and requirements that these agencies and contractors must follow to increase their defenses against cyber threats.

Loading...

News Logo

Cyber Security News

You may have missed...


📌 Pinned

*

https:betanews.comMar 5

Inside a cyberattack: How hackers steal data

The truth about cybersecurity is that it's almost impossible to keep hackers outside of an organization, particularly as the cybercrime industry ...

https://www.cnn.comMar 31

North Korean hackers bug software used by thousands of US companies in potential crypto heist attempt

Pyongyang-linked hackers compromised the open-source Axios software and sent malicious updates to organizations for three hours before being detected,...

https://fortune.comApr 2

Latest crypto hack sees thieves make off with $280 million from Solana DeFi platform Drift

A $280 million hack of Drift Protocol on Solana was attributed to North Korean-backed actors who exploited a novel attack involving durable nonces to ...

https://cyberscoop.comFeb 20

FBI: Threats from Salt Typhoon are 'still very much ongoing'

FBI cyber official states that Salt Typhoon, the Chinese cyber espionage group behind widespread U.S. telecommunications infrastructure compromise in ...

https://www.tomshardware.comApr 9

10 petabytes of sensitive data stolen from China's National Supercomputing Center, hackers claim

Hackers claim to have stolen approximately 10 petabytes of sensitive data from China's National Supercomputing Center including defense, aerospace, an...

https://industrialcyber.coApr 9

Chinese APTs running persistent campaign target critical infrastructure, telecom networks

Global cybersecurity agencies published a joint advisory warning of deliberate and sustained campaigns by PRC state-sponsored APT actors to gain long-...

https://thehackernews.comApr 7

China-Linked Storm-1175 Exploits Zero-Days to Rapidly Deploy Medusa Ransomware

The financially motivated threat actor Storm-1175 is exploiting zero-day and N-day vulnerabilities to rapidly deploy Medusa ransomware within 24 hours...

https://thehackernews.comApr 9

Adobe Reader Zero-Day Exploited via Malicious PDFs Since December 2025

Threat actors have been exploiting a previously unknown zero-day vulnerability in Adobe Reader using maliciously crafted PDF documents to harvest sens...

https://www.theregister.comApr 8

Criminal wannabes even more dangerous than the pros - The Register

Over the last couple of months, her team has investigated ransomware infections ranging from an attack against a US healthcare organization attributed...


Updated daily