Explore global cybersecurity insights, from emerging threats to best practices. Stay informed with expert analysis, trends, and strategies to protect your organization.
In the first week of 2026, cybersecurity teams received a clear warning: attackers aren’t waiting. Threat actors continue to exploit outdated and overlooked systems, while critical infrastructure grows into an even higher-value target. CISA KEV Known Exploited Vulnerabilities (KEV) catalog expanded by nearly 20 percent in 2025, and the latest additions highlight a troubling trend. Several newly listed vulnerabilities demonstrate how quickly unpatched systems are being weaponized, including:
- A maximum-severity remote code execution (RCE) vulnerability in HPE OneView that is now confirmed as actively exploited
- A Microsoft Office PowerPoint flaw from 2009 that is still delivering successful attack payloads
- 139 GB of stolen engineering and utility project data reportedly offered for sale on underground marketplaces
Each of these entries in the CISA KEV catalog targets technologies that support infrastructure operations, and they succeed for one primary reason: patching continues to lag behind exploitation.
Below, we break down what these CISA KEV updates mean and what security leaders need to prioritize now.