Comprehensive Threat Exposure Management Platform

HiveForce Labs
For a detailed CISA’s KEV Catalog, download the pdf file here

The Known Exploited Vulnerability (KEV) catalog, maintained by CISA, is the authoritative source of vulnerabilities that have been exploited in the wild.
It is recommended that all organizations review and monitor the KEV catalog, prioritize remediation of listed vulnerabilities, and reduce the likelihood of compromise by threat actors. In January 2026, 17 vulnerabilities met the criteria for inclusion in the CISA’s KEV catalog. Of these, seven are zero-day vulnerabilities; one has been exploited by a threat actor and employed in attacks.
Dive into our library of resources for expert insights, guides, and in-depth analysis on maximizing Uni5 Xposure’s capabilities