Also: Bitfinex Hacker Lichtenstein's Social Media Post From Prison This week's stories include updates on hackers in the DMM Bitcoin and Bitfnex cases, South Korea sanctioning North Korean hackers, Trump naming an exec director for Digital Assets Council, Craig Wright's prison sentence and the Interpol's red notice for Hex founder.
2024 Marked the Government's Increasing Role Mandating Cybersecurity Australia announced a flurry of cybersecurity legislation and regulations in 2024, spotlighting the government's intent to fortify the nation's cybersecurity in the wake of the Medibank and Optus incidents. The government vowed to transform the country into the world's "most cyber-secure."
Federal 'Rip-and-Replace' Program Gets Funding Boost in Defense Bill The 2025 National Defense Authorization Act includes $3 billion to fund an FCC program aimed at replacing Chinese-made telecommunications equipment across the country amid heightened threats from Beijing following the discovery of the Salt Typhoon cyberespionage campaign.
The 'Eagle S' Forms Part of Sanctions-Busting Russian Shadow Fleet, Says EU Finnish police boarded Thursday an oil tanker suspected of rupturing telecommunications and electricity cables running beneath the Baltic Sea in a Christmas Day incident. They escorted the tanker, the Eagle S, into Finnish waters as part of a criminal investigation into damage caused on Wednesday.
A vulnerability was found in Lotus Domino 5.0.8/5.0.9/5.0.9a. It has been classified as problematic. This affects an unknown part of the component Banner Grabbing Handler. The manipulation leads to information disclosure.
This vulnerability is uniquely identified as CVE-2002-2191. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability classified as critical was found in Tom K Forum Userbar Plugin 2.2. Affected by this vulnerability is an unknown functionality of the file userbarsettings.php. The manipulation of the argument image2 leads to sql injection.
This vulnerability is known as CVE-2011-4569. The attack can be launched remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as problematic, was found in Linux Kernel up to 4.13.10. This affects an unknown part of the file net/xfrm/xfrm_user.c of the component XFRM Dump Policy. The manipulation leads to improper access controls.
This vulnerability is uniquely identified as CVE-2017-16939. The attack needs to be approached locally. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Remote Clinic 2.0. It has been declared as problematic. This vulnerability affects unknown code of the file patients/register-report.php. The manipulation of the argument Fever/Blood Pressure leads to cross site scripting.
This vulnerability was named CVE-2021-30039. The attack can be initiated remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as very critical, was found in Microsoft Windows up to Server 2022. Affected is an unknown function of the component HTTP Protocol Stack. The manipulation leads to Remote Code Execution.
This vulnerability is traded as CVE-2022-21907. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in HexChat 2.10.2. It has been classified as critical. This affects the function inbound_cap_ls of the file common/inbound.c of the component CAP LS Message Handler. The manipulation leads to memory corruption.
This vulnerability is uniquely identified as CVE-2016-2233. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability was found in Printix Secure Cloud Print Management 1.3.1035.0. It has been declared as problematic. This vulnerability affects unknown code of the component API. The manipulation leads to Privilege Escalation.
This vulnerability was named CVE-2022-25089. The attack needs to be initiated within the local network. Furthermore, there is an exploit available.