Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

Cybersecurity Alert: Exploited Vulnerabilities Pile Up as Threat Actors Continue to Find New Weaknesses



A steady stream of new vulnerabilities has emerged, with threat actors leveraging these weaknesses to launch targeted attacks against unsuspecting organizations. The latest additions to the Known Exploited Vulnerabilities (KEV) catalog from CISA highlight the ongoing cat-and-mouse game between cybersecurity defenders and malicious actors. In this article, we delve into the specifics of the added vulnerabilities and their implications for organizations.

  • Cybersecurity experts are on high alert due to emerging vulnerabilities and exploits.
  • The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added several new vulnerabilities to the Known Exploited Vulnerabilities (KEV) catalog.
  • A China-based threat actor, Storm-1175, is linked to attacks deploying Medusa ransomware and exploiting vulnerabilities CVE-2024-1708 and CVE-2026-32202.
  • CISA has issued warnings about various cyber threats, including zero-day attacks targeting Ukraine and E.U. countries.
  • Organizations must remain proactive in addressing emerging threats and strengthening their defenses against exploited vulnerabilities.



  • Cybersecurity experts and officials are on high alert as a steady stream of new vulnerabilities and exploits continues to emerge, with threat actors leveraging these weaknesses to launch targeted attacks against unsuspecting organizations. The latest additions to the Known Exploited Vulnerabilities (KEV) catalog from the U.S. Cybersecurity and Infrastructure Security Agency (CISA) highlight the ongoing cat-and-mouse game between cybersecurity defenders and malicious actors.

    One of the most notable vulnerabilities added to the KEV catalog is CVE-2026-32202, a protection mechanism failure vulnerability in Microsoft Windows Shell that could allow an unauthorized attacker to perform spoofing over a network. This vulnerability was fixed in April 2026, just days before it was added to the KEV catalog. CISA attributes the addition of this vulnerability to active exploitation by threat actors.

    Interestingly, Microsoft has linked the exploitation of CVE-2024-1708 and CVE-2024-1709 to a China-based threat actor tracked as Storm-1175 in attacks deploying Medusa ransomware. Both vulnerabilities have been identified as having significant CVSS scores, with CVE-2024-1708 boasting an 8.4 score and CVE-2026-32202 scoring 4.3.

    ConnectWise ScreenConnect also made the list, with a path traversal vulnerability (CVE-2024-1708) that could allow an attacker to execute remote code or directly impact confidential data and critical systems. This vulnerability was fixed in February 2024.

    Attacks exploiting CVE-2026-21510, which is linked to CVE-2026-32202, have been reported as zero-day attacks alongside CVE-2026-21513 by the Russian hacking group APT28 targeting Ukraine and E.U. countries since December 2025.

    It's worth noting that CISA added CVE-2024-1709 to the KEV catalog on February 22, 2024. Federal Civilian Executive Branch (FCEB) agencies are required to apply the necessary fixes by May 12, 2026, to secure their networks.

    The recent additions to the KEV catalog are a sobering reminder of the ongoing threat landscape in the cybersecurity world. As organizations struggle to keep up with the ever-evolving threat actors and their tactics, it's clear that the cat-and-mouse game will continue for years to come.

    The U.S. government has issued warnings about various cyber threats. These latest additions to the KEV catalog serve as a stark reminder of the importance of staying vigilant in this ever-changing world of cybersecurity. Organizations must remain proactive and committed to staying ahead of these emerging vulnerabilities.

    Cybersecurity experts are urging organizations to take immediate action, including patching existing vulnerabilities and implementing robust security measures to prevent future breaches. With threat actors continually finding new ways to exploit weaknesses, the importance of a strong defense cannot be overstated.

    The recent additions to the KEV catalog highlight the need for ongoing vigilance in cybersecurity. Organizations must remain proactive in addressing these emerging threats and taking steps to strengthen their defenses against the growing list of exploited vulnerabilities.

    In conclusion, the latest additions to the KEV catalog serve as a stark reminder of the ever-evolving threat landscape in the cybersecurity world. As organizations continue to navigate this complex landscape, it's clear that staying vigilant and proactive is crucial in preventing future breaches.

    Related Information:
  • https://www.ethicalhackingnews.com/articles/Cybersecurity-Alert-Exploited-Vulnerabilities-Pile-Up-as-Threat-Actors-Continue-to-Find-New-Weaknesses-ehn.shtml

  • https://thehackernews.com/2026/04/cisa-adds-actively-exploited.html

  • https://www.cisa.gov/news-events/alerts/2026/04/13/cisa-adds-seven-known-exploited-vulnerabilities-catalog

  • https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-071a

  • https://attack.mitre.org/software/S1244/


  • Published: Wed Apr 29 05:23:46 2026 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us