Aggregator
US Announces Crackdown on North Koreans Posing as IT Workers
1 month 2 weeks ago
DOJ Indictments, Enforcement Actions Follow Nationwide Search for 'Laptop Farms'
Federal prosecutors announced major enforcement actions after a North Korean crime ring used stolen IDs, fake websites and U.S. shell firms to embed IT workers inside more than 100 American companies, stealing data and laundering over $5 million to fund Pyongyang's weapons programs.
Federal prosecutors announced major enforcement actions after a North Korean crime ring used stolen IDs, fake websites and U.S. shell firms to embed IT workers inside more than 100 American companies, stealing data and laundering over $5 million to fund Pyongyang's weapons programs.
Rethinking IT Risk Assessments for OT Environments
1 month 2 weeks ago
Sydney Trains' Maryam Shoraka on Identifying the Blind Spots in OT Systems
IT organizations can apply multiple frameworks to help reduce risk, but relying on them in OT environments could create blind spots. Security leaders must rethink compliance-driven strategies and adapt controls to meet the unique demands of industrial systems, said Sydney Trains' Maryam Shoraka.
IT organizations can apply multiple frameworks to help reduce risk, but relying on them in OT environments could create blind spots. Security leaders must rethink compliance-driven strategies and adapt controls to meet the unique demands of industrial systems, said Sydney Trains' Maryam Shoraka.
Another Billing Software Vendor Hacked by Ransomware
1 month 2 weeks ago
Horizon Healthcare RCM Hints at Paying Ransom in Data Theft Incident
Horizon Healthcare RCM is the latest revenue cycle management software vendor to report a health data breach involving ransomware and data theft. The firm's breach notification statement suggests that the company paid a ransom to prevent the disclosure of its stolen information.
Horizon Healthcare RCM is the latest revenue cycle management software vendor to report a health data breach involving ransomware and data theft. The firm's breach notification statement suggests that the company paid a ransom to prevent the disclosure of its stolen information.
German BSI Head: Tech Sovereignty Needs Technical Solution
1 month 2 weeks ago
Claudia Plattner Says Complete Switch to European Technologies Is Unrealistic
European ambitions to replace foreign tech solutions with domestic alternatives are "unrealistic" in the short term, warned the head of the German cybersecurity head cybersecurity agency in a call for greater technological control over cloud platforms.
European ambitions to replace foreign tech solutions with domestic alternatives are "unrealistic" in the short term, warned the head of the German cybersecurity head cybersecurity agency in a call for greater technological control over cloud platforms.
Daily Dose of Dark Web Informer - 30th of June 2025
1 month 2 weeks ago
This daily article is intended to make it easier for those who want to stay updated with my regular Dark Web Informer and X/Twitter posts.
Dark Web Informer - Cyber Threat Intelligence
CVE-2012-6435 | Rockwell ControlLogix controllers up to 20 resource management
1 month 2 weeks ago
A vulnerability, which was classified as problematic, has been found in Rockwell ControlLogix controllers up to 20. Affected by this issue is some unknown functionality. The manipulation leads to improper resource management.
This vulnerability is handled as CVE-2012-6435. The attack may be launched remotely. There is no exploit available.
vuldb.com
CVE-2012-6436 | Rockwell ControlLogix controllers up to 20 memory corruption
1 month 2 weeks ago
A vulnerability, which was classified as critical, was found in Rockwell ControlLogix controllers up to 20. This affects an unknown part. The manipulation leads to memory corruption.
This vulnerability is uniquely identified as CVE-2012-6436. It is possible to initiate the attack remotely. There is no exploit available.
vuldb.com
CVE-2012-6437 | Rockwell ControlLogix controllers up to 20 improper authentication
1 month 2 weeks ago
A vulnerability has been found in Rockwell ControlLogix controllers up to 20 and classified as critical. This vulnerability affects unknown code. The manipulation leads to improper authentication.
This vulnerability was named CVE-2012-6437. The attack can be initiated remotely. There is no exploit available.
vuldb.com
CVE-2012-6438 | Rockwell ControlLogix controllers up to 20 memory corruption
1 month 2 weeks ago
A vulnerability was found in Rockwell ControlLogix controllers up to 20 and classified as critical. This issue affects some unknown processing. The manipulation leads to memory corruption.
The identification of this vulnerability is CVE-2012-6438. The attack may be initiated remotely. There is no exploit available.
vuldb.com
CVE-2012-6441 | Rockwell ControlLogix controllers up to 20 information disclosure
1 month 2 weeks ago
A vulnerability was found in Rockwell ControlLogix controllers up to 20. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation leads to information disclosure.
This vulnerability is handled as CVE-2012-6441. The attack may be launched remotely. There is no exploit available.
vuldb.com
CVE-2012-6442 | Rockwell ControlLogix controllers up to 20 memory corruption
1 month 2 weeks ago
A vulnerability classified as problematic has been found in Rockwell ControlLogix controllers up to 20. This affects an unknown part. The manipulation leads to memory corruption.
This vulnerability is uniquely identified as CVE-2012-6442. It is possible to initiate the attack remotely. There is no exploit available.
vuldb.com
CVE-2025-6733 | UTT HiPER 840G up to 3.1.1-190328 API formConfigDnsFilterGlobal sub_416928 GroupName buffer overflow (EUVD-2025-19245)
1 month 2 weeks ago
A vulnerability was found in UTT HiPER 840G up to 3.1.1-190328. It has been declared as critical. This vulnerability affects the function sub_416928 of the file /goform/formConfigDnsFilterGlobal of the component API. The manipulation of the argument GroupName leads to buffer overflow.
This vulnerability was named CVE-2025-6733. The attack can be initiated remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
vuldb.com
CVE-2025-6734 | UTT HiPER 840G up to 3.1.1-190328 API formP2PLimitConfig sub_484E40 except buffer overflow (EUVD-2025-19243)
1 month 2 weeks ago
A vulnerability was found in UTT HiPER 840G up to 3.1.1-190328. It has been rated as critical. This issue affects the function sub_484E40 of the file /goform/formP2PLimitConfig of the component API. The manipulation of the argument except leads to buffer overflow.
The identification of this vulnerability is CVE-2025-6734. The attack may be initiated remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
vuldb.com
CVE-2025-6735 | juzaweb CMS 3.4.2 Import Page /admin-cp/imports improper authorization (EUVD-2025-19248)
1 month 2 weeks ago
A vulnerability classified as critical has been found in juzaweb CMS 3.4.2. Affected is an unknown function of the file /admin-cp/imports of the component Import Page. The manipulation leads to improper authorization.
This vulnerability is traded as CVE-2025-6735. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
vuldb.com
CVE-2025-6736 | juzaweb CMS 3.4.2 Add New Themes Page /admin-cp/theme/install improper authorization (EUVD-2025-19247)
1 month 2 weeks ago
A vulnerability classified as critical was found in juzaweb CMS 3.4.2. Affected by this vulnerability is an unknown functionality of the file /admin-cp/theme/install of the component Add New Themes Page. The manipulation leads to improper authorization.
This vulnerability is known as CVE-2025-6736. The attack can be launched remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
vuldb.com
CVE-2025-6738 | huija bicycleSharingServer up to 7b8a3ba48ad618604abd4797d2e7cf3b5ac7625a UserServiceImpl.java userDao.selectUserByUserNameLike Username sql injection (EUVD-2025-19246)
1 month 2 weeks ago
A vulnerability, which was classified as critical, has been found in huija bicycleSharingServer up to 7b8a3ba48ad618604abd4797d2e7cf3b5ac7625a. Affected by this issue is the function userDao.selectUserByUserNameLike of the file UserServiceImpl.java. The manipulation of the argument Username leads to sql injection.
This vulnerability is handled as CVE-2025-6738. The attack may be launched remotely. Furthermore, there is an exploit available.
This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available.
vuldb.com
CVE-2025-3699 | Mitsubishi Electric G-50 missing authentication (EUVD-2025-19244)
1 month 2 weeks ago
A vulnerability has been found in Mitsubishi Electric G-50, G-50-W, G-50A, GB-50, GB-50A, GB-24A, G-150AD, AG-150A-A, AG-150A-J, GB-50AD, GB-50ADA-A, GB-50ADA-J, EB-50GU-A, EB-50GU-J, AE-200J, AE-200A, AE-200E, AE-50J, AE-50A, AE-50E, EW-50J, EW-50A, EW-50E, TE-200A, TE-50A, TW-50A and CMS-RMD-J and classified as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to missing authentication.
This vulnerability is known as CVE-2025-3699. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
Threat Attack Daily - 30th of June 2025
1 month 2 weeks ago
Threat Attack Daily - 30th of June 2025
Dark Web Informer - Cyber Threat Intelligence
CVE-2018-5992 | Staff Master up to 1.0 on Joomla Parameter sql injection (EDB-44129)
1 month 2 weeks ago
A vulnerability, which was classified as critical, has been found in Staff Master up to 1.0 on Joomla. Affected by this issue is some unknown functionality. The manipulation as part of Parameter leads to sql injection.
This vulnerability is handled as CVE-2018-5992. The attack may be launched remotely. Furthermore, there is an exploit available.
vuldb.com