SecurityVulnerability.io
Collecting, Enriching,
and Displaying
Cyber Security Vulnerabilities
Trending
Vulnerabilities
If it's trending, then it's probably important. Patch quicker!
Authentication Bypass in Palo Alto Networks PAN-OS Software
Authorization Issue in iPadOS and iOS by Apple
SQL Injection Vulnerability in PostgreSQL libpq Functions and Command Line Utilities
OpenSSH Vulnerability Allows Man-in-the-Middle Attack via Host Key Verification Flaw
LDAP Authentication Bypass in Xerox Products
Reverse Port Forwarding Flaw in Sliver Adversary Emulation Framework
Information Disclosure Vulnerability in AnyDesk
Privilege Escalation Vulnerability in NetScaler Console and Agent by Citrix
Stack-Based Buffer Overflow in Ivanti Connect Secure and Policy Secure
Get Notified When
SecurityVulnerability.io
Launches Alerting 🔔
Well keep you posted 📧
Trending Cyber News
Read about it, before you get ransomware!
U.S. Is Releasing Russian Cybercriminal to Moscow, Officials Say
The release is part of a swap with the Kremlin that freed an American schoolteacher being held in a Russian prison.
Top US Election Security Watchdog Forced to Stop Election Security Work
The US Cybersecurity and Infrastructure Security Agency has frozen efforts to aid states in securing elections, according to an internal memo viewed by WIRED

Hackers leak cop manuals for departments nationwide
Lexipol data leak: A 'puppygirl hacker polycule' shared thousands of files from a firm providing policy manuals to law enforcement.
I'm a security expert and I almost fell for this IT job scam
Twice, over the past two months, Dawid Moczadło has interviewed purported job seekers only to discover that these "software developers" were scammers using AI-based tools — likely to get hired at a security...

Chinese Hackers Breach Cisco Devices in Global Telecom Attacks
Salt Typhoon compromised vulnerable Cisco devices worldwide, targeting telecommunications providers across multiple countries.
China’s Salt Typhoon Spies Are Still Hacking Telecoms—Now by Exploiting Cisco Routers
Despite high-profile attention and even US sanctions, the group hasn’t stopped or even slowed its operation, including the breach of two more US telecoms.
Apple Update Mitigates “Extremely Sophisticated” Zero-Day Exploit
Apple has patched a zero-day vulnerability being exploited in targeted attacks

CISA and FBI Warn of Malicious Cyber Actors Using Buffer Overflow Vulnerabilities to Compromise Software | CISA
CISA and the Federal Bureau of Investigation (FBI) have released a Secure by Design Alert, Eliminating Buffer Overflow Vulnerabilities, as part of their cooperative Secure by Design Alert series—an ongoing...
The Blog
Advice from the first line...