11 May 2026
11 May 2026
11 May 2026
11 May 2026
11 May 2026
11 May 2026
11 May 2026
11 May 2026
11 May 2026
11 May 2026
11 May 2026
11 May 2026
11 May 2026
11 May 2026
11 May 2026
11 May 2026
10 May 2026
10 May 2026
10 May 2026
10 May 2026
10 May 2026
10 May 2026
09 May 2026
08 May 2026
08 May 2026
08 May 2026
08 May 2026
08 May 2026
07 May 2026
07 May 2026
07 May 2026
07 May 2026
07 May 2026
07 May 2026
07 May 2026
07 May 2026
07 May 2026
07 May 2026
This chart provides an indication of state sponsored activity suspected or known to be actively targetting vulnerabilities recently.
05 May 2026
05 May 2026
30 Apr 2026
28 Apr 2026
23 Apr 2026
23 Apr 2026
CISA KEVs (known exploited vulnerabilities) identified as a priroty to mitigate over the past three months.
11 May 2026
08 May 2026
08 May 2026
07 May 2026
07 May 2026
06 May 2026
05 May 2026
02 May 2026
01 May 2026
30 Apr 2026
30 Apr 2026
30 Apr 2026
17 Apr 2026
17 Apr 2026
Top 10 Adverserial groups suspected or known to be actively targetting vulnerabilities.
08 May 2026
08 May 2026
04 May 2026
30 Apr 2026
23 Apr 2026
17 Apr 2026
15 Apr 2026
14 Apr 2026
14 Apr 2026
13 Apr 2026
09 Apr 2026
08 Apr 2026
Today’s top cybersecurity headlines typically include actively exploited vulnerabilities, ransomware campaigns, major data breaches, zero-day disclosures, nation-state activity, and critical vendor security advisories. Security teams should prioritise threat alerts involving KEVs, remote code execution vulnerabilities, cloud platform attacks, and vulnerabilities affecting internet-facing systems.
COOKIE / PRIVACY POLICY: This website uses essential cookies required for basic site functionality. We also use analytics cookies to understand how the website is used. We do not use cookies for marketing or personalization, and we do not sell or share any personal data with third parties.