Known Exploited Vulnerabilities and counting....

A known exploited vulnerability (KEV) refers to a software vulnerability that is being actively exploited by cybercriminals or threat actors. When a vulnerability becomes known to be exploited in the wild, it signals that the vulnerability poses a significant and imminent risk to organizations.

Cybersecurity Brief – April 5, 2026

Active Exploitation and Critical Infrastructure Vulnerabilities

Fortinet has confirmed active exploitation of CVE-2026-35616 affecting FortiClient EMS and released an emergency hotfix ahead of the full patch in version 7.4.7. The company has not disclosed exploitation details or attacker attribution, but the rapid response suggests significant risk to enterprise environments relying on the endpoint management platform. Organizations should prioritize applying the hotfix immediately while awaiting the complete remediation.

Government and Healthcare Sector Incidents

Massachusetts' emergency communications system was compromised in a cyberattack affecting critical state infrastructure, though the full scope of the breach remains unclear. Separately, the Department of Transportation's inspector general identified systemic cybersecurity failures at the FAA, noting inadequate governance and transparency in protecting the National Airspace System—findings that elevate concerns about aviation infrastructure resilience. In the healthcare sector, TriZetto disclosed a breach exposing 3.4 million patient records including names, birth dates, Social Security numbers, and insurance information, marking another significant compromise of sensitive healthcare data. These incidents underscore persistent security gaps across critical infrastructure sectors that require coordinated remediation efforts.

Sources: The Hacker News · The Record · FedScoop · Fox News

Woman Looking at Computer Screen

CVEs form a database of known security vulnerabilities that are actively tracked and managed by a group of organizations, such as the U.S. National Cyber Security Alliance. CVEs are an important tool for network security management because they not only provide an inventory of existing vulnerabilities, but also provide information about how the vulnerability can be exploited and instructions on how to protect against it.

Search Known Exploits

Search for CVEs by vendor to identify known exploited vulnerabilities in your environment

Loading vendors...

Upcoming Patch Due Dates

via Binding Operational Directive 22-01

(BOD) 22-01 is a directive issued by the Cybersecurity and Infrastructure Security Agency (CISA) in the United States to federal agencies and federal contractors in order to improve their cybersecurity practices. It provides a set of guidelines and requirements that these agencies and contractors must follow to increase their defenses against cyber threats.

Loading...

News Logo

Cyber Security News

You may have missed...


📌 Pinned

*

https:betanews.comMar 5

Inside a cyberattack: How hackers steal data

The truth about cybersecurity is that it's almost impossible to keep hackers outside of an organization, particularly as the cybercrime industry ...

https://thehackernews.comApr 5

36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants

Cybersecurity researchers have discovered 36 malicious packages in the npm registry that are disguised as Strapi CMS plugins but come with ...

https://www.tradingview.comApr 3

Bitcoin Mining Not As Globally Decentralized As It Appears — Here's Why - TradingView

Bitcoin is often celebrated as a decentralized network, with mining power distributed globally to ensure security and neutrality.

https://news.bitcoin.comApr 3

Charles Schwab Announces Crypto Accounts Are 'Coming Soon' - Bitcoin.com News

Social platform X is rolling out a new security measure aimed at tackling one of the most persistent threats in crypto: account takeovers used to ...

https://www.msn.comApr 4

Quantum risk to crypto is advancing, Google paper warns - MSN

The tech giant recently announced its own timeline to migrate all security systems to post-quantum cryptography by 2029. The company has been working ...

https://cryptonews.netApr 4

Solana's quantum-threat readiness reveals harsh tradeoff: security vs speed - Cryptonews.net

Crypto has spent years obsessing over speed, fees and scalability. Now it may have to confront a more existential question: what happens when its ...

https://techcrunch.comApr 3

Europe's cyber agency blames hacking gangs for massive data breach and leak

CERT-EU attributed the European Commission cloud hack to TeamPCP threat group, with 92 gigabytes of data stolen from AWS including emails and personal...

https://www.ccn.comApr 2

Drift Protocol Hit by $285M Exploit: Crypto's Biggest Hack of 2026 Unfolds on April Fool's Day

Solana-based Drift Protocol suffered a $285 million exploit on April 1, 2026, the largest crypto hack of the year, using a fake token and compromised ...

https://thehackernews.comApr 1

CERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million Emails

Threat actors tracked as UAC-0255 impersonated Ukraine's CERT-UA on March 26-27, 2026, distributing AGEWHEEZE remote access trojan to state organizati...


Updated daily