Robuta

Sponsor of the Day: Jerkmate
https://www.infosecurity-magazine.com/news/cisa-kev-cisco-ise/ CISA Warns of Exploited Vulnerabilities in Cisco Products - Infosecurity Magazine Apr 7, 2026 - Hackers are actively exploiting two critical flaws in Cisco Identity Services Engine, said the US Cybersecurity and Infrastructure Security Agency cisa warnsexploited vulnerabilitiescisco productsinfosecurity magazine https://dailysecurityreview.com/cyber-security/cisa-expands-known-exploited-vulnerabilities-catalog-with-microsoft-and-apple-flaws/ CISA Expands Known Exploited Vulnerabilities Catalog with Microsoft and Apple Flaws - Cybersecurity Apr 16, 2026 - CISA adds critical vulnerabilities in Microsoft SharePoint, Office Excel, Apple, Laravel, and Craft CMS to exploited vulnerabilities list. known exploitedvulnerabilities catalogcisaexpandsmicrosoft https://cloudflare.tv/this-week-in-net/bgp-hijack-detection-exploited-vulnerabilities-and-how-we-build-our-products/DvN7xPaw BGP hijack detection, exploited vulnerabilities, and how we build our products - Cloudflare TV Welcome to our weekly review of stories from our blog and other sources, covering a range of topics from product announcements, tools and features to... exploited vulnerabilitiescloudflare tvbgphijackdetection https://securityaffairs.com/tag/known-exploited-vulnerabilities-catalog Known Exploited Vulnerabilities Catalog Archives - Security Affairs archives security affairsknown exploitedvulnerabilities catalog https://www.bitsight.com/blog/rondodox-botnet-infrastructure-analysis RondoDox Botnet: From Zero to 174 Exploited Vulnerabilities | Bitsight A deep dive into the RondoDox botnet, examining its infrastructure, exploit adoption timeline, and methods used to target internet-exposed systems. exploited vulnerabilitiesbotnetzero174bitsight https://securityaffairs.com/125577/security/log4shell-known-exploited-vulnerabilities-catalog.html CISA adds Log4Shell flaw to the Known Exploited Vulnerabilities Catalog Dec 13, 2021 - US CISA added 13 new flaws to the Known Exploited Vulnerabilities Catalog, including Apache LogShell Log4j and Fortinet FortiOS bugs cisa addsknown exploitedvulnerabilities cataloglog4shellflaw https://securereading.com/cisa-kev-2026-exploited-vulnerabilities-fortinet-microsoft-adobe/ CISA Flags 6 Actively Exploited Vulnerabilities Across Fortinet, Microsoft, and Adobe |... Apr 14, 2026 - CISA adds 6 actively exploited vulnerabilities to KEV catalog, impacting Fortinet, Microsoft, and Adobe systems with critical security risks. actively exploitedvulnerabilities acrosscisaflags6 https://flashpoint.io/resources/product-updates/flashpoint-known-exploited-vulnerabilities-2/ Flashpoint Known Exploited Vulnerabilities (FP KEV) | Flashpoint Nov 7, 2025 - ‘FP KEV’ prioritizes vulnerabilities actively being exploited in the wild, ensuring your remediation efforts are efficient and targeted. known exploitedflashpointvulnerabilitiesfpkev https://www.cybersecuritydive.com/news/cisa-second-critical-flaw-ivanti-epmm-exploited/817080/ CISA adds second critical flaw in Ivanti EPMM to exploited vulnerabilities catalog | Cybersecurity... The code injection flaw is similar to a prior vulnerability that was immediately flagged in January. cisa addscritical flawivanti epmmexploited vulnerabilitiessecond https://securityaffairs.com/190044/security/u-s-cisa-adds-an-aquasecurity-trivy-flaw-to-its-known-exploited-vulnerabilities-catalog.html U.S. CISA adds an Aquasecurity Trivy flaw to its Known Exploited Vulnerabilities catalog Mar 27, 2026 - The U.S. CISA adds an Aquasecurity Trivy vulnerability to its Known Exploited Vulnerabilities catalog...... cisa addsknown exploitedvulnerabilities catalogtrivyflaw https://securityaffairs.com/190917/security/u-s-cisa-adds-a-flaw-in-apache-activemq-to-its-known-exploited-vulnerabilities-catalog.html U.S. CISA adds a flaw in Apache ActiveMQ to its Known Exploited Vulnerabilities catalog Apr 17, 2026 - The U.S. CISA adds a vulnerability (CVE-2026-34197) in Apache ActiveMQ to its Known Exploited Vulnerabilities catalog cisa addsapache activemqknown exploitedvulnerabilities catalogflaw https://www.kusari.dev/learning-center/known-exploitable-vulnerabilities Known Exploited Vulnerabilities (KEVs): Definition, Explanation & Examples | Kusari® Learn about Known Exploited Vulnerabilities (KEVs): Definition, explanation, usage examples, code samples, and relevant contributions. Understand what KEVs are... known exploiteddefinition explanationvulnerabilitiesexamples https://www.itpro.com/security/exploits/360411/top-30-most-exploited-vulnerabilities The most exploited cyber security vulnerabilities | IT Pro Jul 29, 2021 - Five Eyes alliance security agencies reveal the systems businesses should be prioritising in their patching strategy cyber securityexploitedvulnerabilitiespro https://unit42.paloaltonetworks.com/ivanti-cve-2026-1281-cve-2026-1340/ Critical Vulnerabilities in Ivanti EPMM Exploited We discuss widespread exploitation of Ivanti EPMM zero-day vulns CVE-2026-1281 and CVE-2026-1340. Attackers are deploying web shells and backdoors. critical vulnerabilitiesivanti epmmexploited https://www.infosecurity-magazine.com/news/sharepoint-toolshell-chinese/ SharePoint ‘ToolShell’ Vulnerabilities Exploited by Chinese Hackers - Infosecurity Magazine Apr 7, 2026 - Microsoft has observed three China-based threat actors, Linen Typhoon, Violet Typhoon and Storm-2603, exploiting the SharePoint vulnerabilities vulnerabilities exploitedchinese hackersinfosecurity magazinesharepoint https://www.linkedin.com/posts/ccondon_kevs-infosecurity-cybersecurity-share-7452329826373283840-CvRT/ MajorDoMo Vulnerabilities Exploited by VulnCheck Canaries | Caitlin Condon posted on the topic |... ‼️ New #KEVs: VulnCheck Canaries recently detected first-time exploitation of two vulnerabilities in MajorDoMo, a smart home automation platform.... vulnerabilities exploitedmajordomovulncheckcanariescaitlin https://www.infosecurity-magazine.com/webinars/prm/top-vulnerabilities-sophisticated/ Unpacking the Top Vulnerabilities Exploited by Sophisticated Attackers - Infosecurity Magazine During the session, our expert speakers will delve into real-world examples and case studies to illustrate the methods employed by sophisticated attackers vulnerabilities exploitedinfosecurity magazineunpackingtopsophisticated https://www.duocircle.com/email-security/microsoft-server-exchange-vulnerabilities-are-among-the-most-exploited-reports-cisa Microsoft Server Exchange Vulnerabilities are Among the Most Exploited, Reports CISA - DuoCircle microsoft serverexchangevulnerabilitiesamongexploited https://patchstack.com/rapidmitigate/ Neutralize vulnerabilities before they can be exploited - Patchstack's RapidMitigate Patchstack finds and mitigates vulnerabilities before hackers can exploit them, keeping websites safe until vulnerabilities can be officially resolved. neutralizevulnerabilitiesexploitedpatchstack https://www.itpro.com/security/two-fortinet-vulnerabilities-are-being-exploited-in-the-wild-patch-now Two Fortinet vulnerabilities are being exploited in the wild – patch now | IT Pro Dec 19, 2025 - Arctic Wolf and Rapid7 have urged security teams to act immediately to mitigate two critical Fortinet vulnerabilities. twofortinetvulnerabilitiesexploitedwild https://www.rapid7.com/blog/post/etr-critical-vulnerabilities-in-fortinet-cve-2025-59718-cve-2025-59719-exploited-in-the-wild/ Critical vulnerabilities in Fortinet CVE-2025-59718, CVE-2025-59719 exploited in the wild CVE-2025-59718 and CVE-2025-59719, critical vulnerabilities affecting FortiOS, FortiProxy, FortiSwitchManager, and FortiWeb, are actively being exploited in... critical vulnerabilitiescve 2025fortinetexploitedwild