Active UK Advisories
Vulnerabilities affecting Citrix NetScaler ADC and Citrix NetScaler Gateway
Read NCSC Advisory →Vibe check: AI may replace SaaS (but not for a while)
Read NCSC Advisory →NCSC CEO: Seize 'disruptive' vibe coding opportunity to make software more secure
Read NCSC Advisory →How to secure your online meetings
Read NCSC Advisory →International security chiefs to convene in Glasgow for flagship CYBERUK conference
Read NCSC Advisory →Alert: NCSC advises UK organisations to take action following conflict in the Middle East
Read NCSC Advisory →Known Exploited Vulnerabilities — Active in the Wild
Aquasecurity Trivy Vulnerability
Aquasecurity Trivy contains an embedded malicious code vulnerability that could allow an attacker to gain access to everything in the CI/CD environment, including all tokens, SSH keys, cloud credentials, database passwords, and any sensitive configuration in memory.
View CISA Advisory → CVE-2026-33017 — Langflow | LangflowLangflow Langflow Vulnerability
Langflow contains a code injection vulnerability that could allow building public flows without requiring authentication.
View CISA Advisory → CVE-2025-32432 — Craft CMS | Craft CMSCraft CMS Craft CMS Vulnerability
Craft CMS contains a code injection vulnerability that allows a remote attacker to execute arbitrary code.
View CISA Advisory → CVE-2025-54068 — Laravel | LivewireLaravel Livewire Vulnerability
Laravel Livewire contain a code injection vulnerability that could allow unauthenticated attackers to achieve remote command execution in specific scenarios.
View CISA Advisory → CVE-2025-43510 — Apple | Multiple ProductsApple Multiple Products Vulnerability
Apple watchOS, iOS, iPadOS, macOS, visionOS, and tvOS contain an improper locking vulnerability that could allow a malicious application to cause unexpected changes in memory shared between processes.
View CISA Advisory → CVE-2025-43520 — Apple | Multiple ProductsApple Multiple Products Vulnerability
Apple watchOS, iOS, iPadOS, macOS, visionOS, and tvOS contain a classic buffer overflow vulnerability which could allow a malicious application to cause unexpected system termination or write kernel memory.
View CISA Advisory →Is Your Business Exposed?
Many of these vulnerabilities affect software used by UK SMEs every day. A GET-IT threat intelligence scan will tell you exactly where your perimeter stands.
Book a Resilience Scan →Intelligence sourced from NCSC UK and the CISA Known Exploited Vulnerabilities Catalog. This page is updated automatically every 12 hours. For the most current advisories visit the source links directly. GET-IT Cyber Division curates this content for UK SME relevance but is not responsible for the accuracy of third-party source data.