Known Exploited Vulnerabilities and counting....

A known exploited vulnerability (KEV) refers to a software vulnerability that is being actively exploited by cybercriminals or threat actors. When a vulnerability becomes known to be exploited in the wild, it signals that the vulnerability poses a significant and imminent risk to organizations.

Woman Looking at Computer Screen

CVEs form a database of known security vulnerabilities that are actively tracked and managed by a group of organizations, such as the U.S. National Cyber Security Alliance. CVEs are an important tool for network security management because they not only provide an inventory of existing vulnerabilities, but also provide information about how the vulnerability can be exploited and instructions on how to protect against it.

Search Known Exploits

Search for CVEs by vendor to identify known exploited vulnerabilities in your environment

Loading vendors...

Upcoming Patch Due Dates

via Binding Operational Directive 22-01

(BOD) 22-01 is a directive issued by the Cybersecurity and Infrastructure Security Agency (CISA) in the United States to federal agencies and federal contractors in order to improve their cybersecurity practices. It provides a set of guidelines and requirements that these agencies and contractors must follow to increase their defenses against cyber threats.

Loading...

News Logo

Cyber Security News

You may have missed...


📌 Pinned

*

https:betanews.comMar 5

Inside a cyberattack: How hackers steal data

The truth about cybersecurity is that it's almost impossible to keep hackers outside of an organization, particularly as the cybercrime industry ...

https://www.theregister.comMar 18

Japan to allow 'proactive cyber-defense' from October 1st - The Register

In less polite places, this is called 'hacking back' or 'offensive cyber-ops' ... The regulations enabling Japan to hack back will allow attacks to .....

https://www.theregister.comMar 18

Iran cyberattack against med tech firm 'just the beginning' - The Register

"The Stryker hack marks the first time that Iran executed a successful full-blown disruptive attack against a major US corporation, especially against...

https://www.securityweek.comMar 18

Iranian Hackers Likely Used Malware-Stolen Credentials in Stryker Breach - SecurityWeek

The medtech giant has been working on restoring systems affected by the cyberattack conducted by the Handala hackers.

https://www.wired.comMar 18

Hundreds of Millions of iPhones Can Be Hacked With a New Tool Found in the Wild

A powerful iPhone-hacking technique known as DarkSword has been discovered in use by Russian hackers. It can take over devices running iOS 18 that ...

https://au.pcmag.comMar 18

Hackers Hit Aura, an Identity Protection Provider, Stealing 900K Records - PCMag Australia

The hacking group, ShinyHunters, says it's behind the compromise. Aura is indicating some current and former users had their data stolen.

https://nypost.comMar 18

Denver crosswalk devices hacked with vile anti-Trump messages - NY Post

Pedestrian crosswalks were hacked in Denver, Colorado, to deliver vile messages attacking President Trump.

https://www.securityweek.comMar 18

EU Sanctions Chinese, Iranian Firms Supporting Hacking Operations - SecurityWeek

The European Union has announced sanctions against four Chinese and one Iranian entity involved in hacking activities against member states.

https://www.vanityfair.comMar 17

Crypto's True Believers Demand to Be Taken Seriously | Vanity Fair

OFF THE BLOCKCHAIN The faces behind crypto's faceless industry lost billions and kept the faith anyway. ... security, a mysterious figure under the .....


Updated daily