SecurityVulnerability.io
Collects, Enriches and Displays
Vulnerability Information,
for Humans 😄 and Computers 🤖
Trending
Vulnerabilities
If it's trending, then it's probably important. Patch quicker!
Fortinet FortiOS Vulnerability Allows Unauthorized Code Execution
Mozilla Firefox Vulnerability: Code Execution through Animation Timelines
Arbitrary Pipeline Access Vulnerability in GitLab EE
Unauthenticated Remote Code Execution (RCE) Vulnerability Discovered in Vulnerability Scanning Tool
Unauthorized Provisioning of Users and Access via SAML SSO Authentication Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
Bitcoin Core Vulnerability Allows Remote Denial of Service
Memory Corruption Vulnerability in Scripting Engine Could Allow for Code Execution
Default Credentials Enabled in Kubernetes Image Builder, Affecting Proxmox Virtual Machine Images
Trending Cyber News
Read about it, before you get ransomwared!
Earth Simnavaz Levies Advanced Cyberattacks Against UAE and Gulf Regions
APT & Targeted Attacks Trend Micro's investigation into the recent activity of Earth Simnavaz provides new insights into the APT group’s evolving tactics and the immediate threat it poses to critical...
Reports: China hacked Verizon and AT&T, may have accessed US wiretap systems
Chinese hackers were in networks of major ISPs “for months,” WSJ reports.
Critical Kubernetes Image Builder bug allows SSH root access
A critical bug in Kubernetes Image Builder could allow unauthorized SSH access to virtual machines (VMs) thanks to default credentials being enabled during the image build process. Image Builder is a tool...
Casio reports IT systems failure after weekend network breach
Japanese tech giant Casio has suffered a cyberattack after an unauthorized actor accessed its networks on October 5, causing system disruption that impacted some of its services.
Cybersecurity rules saw big changes in 2024. Here's what you need to know
The increasing threat of cyberattacks is prompting governments to toughen up laws and build resilience. Here are some of the regulations that came into force in 2024.
Hackers claim 'catastrophic' Internet Archive attack
Nonprofit behind the Wayback Machine has suffered a cyberattack by "pro-Palestinian hacktivists" affecting 31 million users.
European govt air-gapped systems breached using custom malware
An APT hacking group known as GoldenJackal has successfully breached air-gapped government systems in Europe using two custom toolsets to steal sensitive data, like emails, encryption keys, images, archives, and documents.
Hackers take control of robot vacuums in multiple US cities and abuse owners
Ecovacs robot vacuums in multiple US cities were hacked in the space of a few days, with the attacker physically controlling them and yelling obscenities through their onboard speakers.
From the Blog
Advice from the first line...