Credit: macrovector/Freepik
Cyble researchers detailed 22 vulnerabilities under active attack in a blog post today – and nine of them aren’t in CISA’s Known Exploited Vulnerabilities (KEV) catalog.
Twelve of the vulnerabilities in the Cyble blog were targeted by attack attempts picked up by the company’s honeypot sensors. Of the 12, only four are in CISA’s KEV catalog.
Cyble also detailed 10 vulnerabilities under attack by ransomware groups; nine of those are in the KEV catalog.
And new vulnerabilities are discovered every day, of course. News broke today of a SolarWinds hotfix for a new CVE (CVE-2025-26399) in SolarWinds Web Help Desk that is a patch bypass of CVE-2024-28988, which itself is a patch bypass of CVE-2024-28986. As CVE-2024-28986 is in CISA’s KEV catalog, the new 9.8-rated CVE may well draw the attention of threat actors.
Cyble detailed 12 vulnerabilities that its honeypot sensors have detected attack attempts on:
Cyble threat intelligence researchers also listed 10 vulnerabilities exploited by ransomware groups, gathered from Cyble observation and OSINT sources. Only one isn’t in the KEV catalog – CVE-2025-7771 in ThrottleStop.sys, which has reportedly been targeted by MedusaLocker.
The other vulnerabilities under attack, and the ransomware groups exploiting them, include:
Cyble said the vulnerabilities ”should be high-priority fixes by security teams if they haven’t been patched or mitigated already, and a risk-based vulnerability management program should be at the heart of every organization’s cyber defenses.”
A new paper gives an insider’s perspective into CISA’s Known Exploited Vulnerability catalog – and also offers a free tool…
The Cyber Express weekly roundup examines cyberattacks, AI misuse, data leaks, and regulatory pressure defining cybersecurity in early 2026.
This Spain Ministry of Science cyberattack incident does not exist in isolation.
The La Sapienza cyberattack shut down systems at Italy’s largest university, with reports linking the incident to BabLock malware and…
Trusted Access for Cyber is OpenAI’s new framework to expand secure use of GPT-5.3-Codex and ChatGPT for vetted cyber defenders.
Mitigating risk from End-of-Support edge devices is no longer about compliance, it’s about survival.
This website uses cookies. By continuing to use this website you are giving consent to cookies being used.
Read More