Sponsor of the Day:
Jerkmate
https://www.infosecurity-magazine.com/news/cisa-kev-cisco-ise/
CISA Warns of Exploited Vulnerabilities in Cisco Products - Infosecurity Magazine
Apr 7, 2026 - Hackers are actively exploiting two critical flaws in Cisco Identity Services Engine, said the US Cybersecurity and Infrastructure Security Agency
cisa warnsexploited vulnerabilitiescisco productsinfosecurity magazine
https://dailysecurityreview.com/cyber-security/cisa-expands-known-exploited-vulnerabilities-catalog-with-microsoft-and-apple-flaws/
CISA Expands Known Exploited Vulnerabilities Catalog with Microsoft and Apple Flaws - Cybersecurity
Apr 16, 2026 - CISA adds critical vulnerabilities in Microsoft SharePoint, Office Excel, Apple, Laravel, and Craft CMS to exploited vulnerabilities list.
known exploitedvulnerabilities catalogcisaexpandsmicrosoft
https://cloudflare.tv/this-week-in-net/bgp-hijack-detection-exploited-vulnerabilities-and-how-we-build-our-products/DvN7xPaw
BGP hijack detection, exploited vulnerabilities, and how we build our products - Cloudflare TV
Welcome to our weekly review of stories from our blog and other sources, covering a range of topics from product announcements, tools and features to...
exploited vulnerabilitiescloudflare tvbgphijackdetection
https://securityaffairs.com/tag/known-exploited-vulnerabilities-catalog
Known Exploited Vulnerabilities Catalog Archives - Security Affairs
archives security affairsknown exploitedvulnerabilities catalog
https://www.bitsight.com/blog/rondodox-botnet-infrastructure-analysis
RondoDox Botnet: From Zero to 174 Exploited Vulnerabilities | Bitsight
A deep dive into the RondoDox botnet, examining its infrastructure, exploit adoption timeline, and methods used to target internet-exposed systems.
exploited vulnerabilitiesbotnetzero174bitsight
https://securityaffairs.com/125577/security/log4shell-known-exploited-vulnerabilities-catalog.html
CISA adds Log4Shell flaw to the Known Exploited Vulnerabilities Catalog
Dec 13, 2021 - US CISA added 13 new flaws to the Known Exploited Vulnerabilities Catalog, including Apache LogShell Log4j and Fortinet FortiOS bugs
cisa addsknown exploitedvulnerabilities cataloglog4shellflaw
https://securereading.com/cisa-kev-2026-exploited-vulnerabilities-fortinet-microsoft-adobe/
CISA Flags 6 Actively Exploited Vulnerabilities Across Fortinet, Microsoft, and Adobe |...
Apr 14, 2026 - CISA adds 6 actively exploited vulnerabilities to KEV catalog, impacting Fortinet, Microsoft, and Adobe systems with critical security risks.
actively exploitedvulnerabilities acrosscisaflags6
https://flashpoint.io/resources/product-updates/flashpoint-known-exploited-vulnerabilities-2/
Flashpoint Known Exploited Vulnerabilities (FP KEV) | Flashpoint
Nov 7, 2025 - ‘FP KEV’ prioritizes vulnerabilities actively being exploited in the wild, ensuring your remediation efforts are efficient and targeted.
known exploitedflashpointvulnerabilitiesfpkev
https://www.cybersecuritydive.com/news/cisa-second-critical-flaw-ivanti-epmm-exploited/817080/
CISA adds second critical flaw in Ivanti EPMM to exploited vulnerabilities catalog | Cybersecurity...
The code injection flaw is similar to a prior vulnerability that was immediately flagged in January.
cisa addscritical flawivanti epmmexploited vulnerabilitiessecond
https://securityaffairs.com/190044/security/u-s-cisa-adds-an-aquasecurity-trivy-flaw-to-its-known-exploited-vulnerabilities-catalog.html
U.S. CISA adds an Aquasecurity Trivy flaw to its Known Exploited Vulnerabilities catalog
Mar 27, 2026 - The U.S. CISA adds an Aquasecurity Trivy vulnerability to its Known Exploited Vulnerabilities catalog......
cisa addsknown exploitedvulnerabilities catalogtrivyflaw
https://securityaffairs.com/190917/security/u-s-cisa-adds-a-flaw-in-apache-activemq-to-its-known-exploited-vulnerabilities-catalog.html
U.S. CISA adds a flaw in Apache ActiveMQ to its Known Exploited Vulnerabilities catalog
Apr 17, 2026 - The U.S. CISA adds a vulnerability (CVE-2026-34197) in Apache ActiveMQ to its Known Exploited Vulnerabilities catalog
cisa addsapache activemqknown exploitedvulnerabilities catalogflaw
https://www.kusari.dev/learning-center/known-exploitable-vulnerabilities
Known Exploited Vulnerabilities (KEVs): Definition, Explanation & Examples | Kusari®
Learn about Known Exploited Vulnerabilities (KEVs): Definition, explanation, usage examples, code samples, and relevant contributions. Understand what KEVs are...
known exploiteddefinition explanationvulnerabilitiesexamples
https://www.itpro.com/security/exploits/360411/top-30-most-exploited-vulnerabilities
The most exploited cyber security vulnerabilities | IT Pro
Jul 29, 2021 - Five Eyes alliance security agencies reveal the systems businesses should be prioritising in their patching strategy
cyber securityexploitedvulnerabilitiespro
https://unit42.paloaltonetworks.com/ivanti-cve-2026-1281-cve-2026-1340/
Critical Vulnerabilities in Ivanti EPMM Exploited
We discuss widespread exploitation of Ivanti EPMM zero-day vulns CVE-2026-1281 and CVE-2026-1340. Attackers are deploying web shells and backdoors.
critical vulnerabilitiesivanti epmmexploited
https://www.infosecurity-magazine.com/news/sharepoint-toolshell-chinese/
SharePoint ‘ToolShell’ Vulnerabilities Exploited by Chinese Hackers - Infosecurity Magazine
Apr 7, 2026 - Microsoft has observed three China-based threat actors, Linen Typhoon, Violet Typhoon and Storm-2603, exploiting the SharePoint vulnerabilities
vulnerabilities exploitedchinese hackersinfosecurity magazinesharepoint
https://www.linkedin.com/posts/ccondon_kevs-infosecurity-cybersecurity-share-7452329826373283840-CvRT/
MajorDoMo Vulnerabilities Exploited by VulnCheck Canaries | Caitlin Condon posted on the topic |...
‼️ New #KEVs: VulnCheck Canaries recently detected first-time exploitation of two vulnerabilities in MajorDoMo, a smart home automation platform....
vulnerabilities exploitedmajordomovulncheckcanariescaitlin
https://www.infosecurity-magazine.com/webinars/prm/top-vulnerabilities-sophisticated/
Unpacking the Top Vulnerabilities Exploited by Sophisticated Attackers - Infosecurity Magazine
During the session, our expert speakers will delve into real-world examples and case studies to illustrate the methods employed by sophisticated attackers
vulnerabilities exploitedinfosecurity magazineunpackingtopsophisticated
https://www.duocircle.com/email-security/microsoft-server-exchange-vulnerabilities-are-among-the-most-exploited-reports-cisa
Microsoft Server Exchange Vulnerabilities are Among the Most Exploited, Reports CISA - DuoCircle
microsoft serverexchangevulnerabilitiesamongexploited
https://patchstack.com/rapidmitigate/
Neutralize vulnerabilities before they can be exploited - Patchstack's RapidMitigate
Patchstack finds and mitigates vulnerabilities before hackers can exploit them, keeping websites safe until vulnerabilities can be officially resolved.
neutralizevulnerabilitiesexploitedpatchstack
https://www.itpro.com/security/two-fortinet-vulnerabilities-are-being-exploited-in-the-wild-patch-now
Two Fortinet vulnerabilities are being exploited in the wild – patch now | IT Pro
Dec 19, 2025 - Arctic Wolf and Rapid7 have urged security teams to act immediately to mitigate two critical Fortinet vulnerabilities.
twofortinetvulnerabilitiesexploitedwild
https://www.rapid7.com/blog/post/etr-critical-vulnerabilities-in-fortinet-cve-2025-59718-cve-2025-59719-exploited-in-the-wild/
Critical vulnerabilities in Fortinet CVE-2025-59718, CVE-2025-59719 exploited in the wild
CVE-2025-59718 and CVE-2025-59719, critical vulnerabilities affecting FortiOS, FortiProxy, FortiSwitchManager, and FortiWeb, are actively being exploited in...
critical vulnerabilitiescve 2025fortinetexploitedwild