Known Exploited Vulnerabilities and counting....

A known exploited vulnerability (KEV) refers to a software vulnerability that is being actively exploited by cybercriminals or threat actors. When a vulnerability becomes known to be exploited in the wild, it signals that the vulnerability poses a significant and imminent risk to organizations.

Woman Looking at Computer Screen

CVEs form a database of known security vulnerabilities that are actively tracked and managed by a group of organizations, such as the U.S. National Cyber Security Alliance. CVEs are an important tool for network security management because they not only provide an inventory of existing vulnerabilities, but also provide information about how the vulnerability can be exploited and instructions on how to protect against it.

Search Known Exploits

Search for CVEs by vendor to identify known exploited vulnerabilities in your environment

Loading vendors...

Upcoming Patch Due Dates

via Binding Operational Directive 22-01

(BOD) 22-01 is a directive issued by the Cybersecurity and Infrastructure Security Agency (CISA) in the United States to federal agencies and federal contractors in order to improve their cybersecurity practices. It provides a set of guidelines and requirements that these agencies and contractors must follow to increase their defenses against cyber threats.

Loading...

News Logo

Cyber Security News

You may have missed...


📌 Pinned

*

https:betanews.comMar 5

Inside a cyberattack: How hackers steal data

The truth about cybersecurity is that it's almost impossible to keep hackers outside of an organization, particularly as the cybercrime industry ...

https://www.tradingview.comMar 11

CoinFello launches AI tool to execute crypto trades without private keys - TradingView

"If we want agents to participate meaningfully in the onchain economy, we need a security model that is better than handing an autonomous system a ...

https://hackread.comMar 11

BeatBanker Android Trojan Uses Silent Audio Loop to Steal Crypto - Hackread

Security researchers at Kaspersky have identified BeatBanker, a dual-mode Android Trojan, targeting users via a fake Google Play Store.

https://thedefiant.ioMar 11

Ledger Uncovers Security Vulnerability That Could Affect 25% of Android Phones

The chip vulnerability makes it possible for hackers to decrypt affected Android smartphones, and steal data — including crypto wallet private ...

https://finimize.comMar 11

Quantum computing, explained: how it could change cybersecurity, healthcare, and markets

... crypto wallet “safe”, and steal the coins. That possibility strikes at the heart of bitcoin's value – the trust in the security of the network.

https://www.cryptopolitan.comMar 11

OpenClaw founder rips into 'mess' of GitHub's security vulnerability reporting - Cryptopolitan

This does not account for agents being deployed off the blockchain. GitHub's vulnerability reporting system was designed for a world in which humans ....

https://www.zetter-zeroday.comMar 11

Iranian Hacktivists Strike Medical Device Maker Stryker in "Severe" Attack that Wiped Systems

A known Iranian hacktivist group named Handala posted messages on hacked systems and on social media taking credit for the hit, which they say is ...

https://gizmodo.comMar 11

A Foreign Hacker Accessed FBI Files on Epstein Back in 2023: Report - Gizmodo

As hackers become more sophisticated, breaches involving government ... The hack took place after a server at the Child Exploitation Forensic ...

https://www.cnn.comMar 11

Pro-Iran hackers claim cyberattack on major US medical device maker | CNN Politics

Email security firm Proofpoint said Wednesday that its tracking of known Iranian groups had turned up only one hacking campaign — an attempt to hack a...


Updated daily