<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security news in June 2019</title>
	<atom:link href="http://www.epanorama.net/blog/2019/06/01/cyber-security-news-in-june-2019/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2019/06/01/cyber-security-news-in-june-2019/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Sun, 12 Apr 2026 21:37:09 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: ReapIt</title>
		<link>https://www.epanorama.net/blog/2019/06/01/cyber-security-news-in-june-2019/comment-page-3/#comment-1716308</link>
		<dc:creator><![CDATA[ReapIt]]></dc:creator>
		<pubDate>Wed, 16 Jun 2021 16:06:37 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=182598#comment-1716308</guid>
		<description><![CDATA[Superb article. Really informative and helpful. Thanks for sharing it with us. Appreciate it.]]></description>
		<content:encoded><![CDATA[<p>Superb article. Really informative and helpful. Thanks for sharing it with us. Appreciate it.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Alejandra</title>
		<link>https://www.epanorama.net/blog/2019/06/01/cyber-security-news-in-june-2019/comment-page-3/#comment-1688197</link>
		<dc:creator><![CDATA[Alejandra]]></dc:creator>
		<pubDate>Mon, 17 Aug 2020 11:12:55 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=182598#comment-1688197</guid>
		<description><![CDATA[Great Article. Really Informative and Helpful. Thanks for sharing it with me. Appreciate it.]]></description>
		<content:encoded><![CDATA[<p>Great Article. Really Informative and Helpful. Thanks for sharing it with me. Appreciate it.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: albert</title>
		<link>https://www.epanorama.net/blog/2019/06/01/cyber-security-news-in-june-2019/comment-page-3/#comment-1647081</link>
		<dc:creator><![CDATA[albert]]></dc:creator>
		<pubDate>Sun, 04 Aug 2019 10:05:33 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=182598#comment-1647081</guid>
		<description><![CDATA[Very good write-up. I certainly love this website. Thanks!
https://hackingblogs.com/what-is-mishing-attack/]]></description>
		<content:encoded><![CDATA[<p>Very good write-up. I certainly love this website. Thanks!<br />
<a href="https://hackingblogs.com/what-is-mishing-attack/" rel="nofollow">https://hackingblogs.com/what-is-mishing-attack/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/06/01/cyber-security-news-in-june-2019/comment-page-3/#comment-1644385</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 07 Jul 2019 19:36:19 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=182598#comment-1644385</guid>
		<description><![CDATA[https://techcrunch.com/2019/06/21/lte-flaws-spoof-presidential-alerts/]]></description>
		<content:encoded><![CDATA[<p><a href="https://techcrunch.com/2019/06/21/lte-flaws-spoof-presidential-alerts/" rel="nofollow">https://techcrunch.com/2019/06/21/lte-flaws-spoof-presidential-alerts/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/06/01/cyber-security-news-in-june-2019/comment-page-3/#comment-1644335</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 07 Jul 2019 17:29:58 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=182598#comment-1644335</guid>
		<description><![CDATA[Cyberespionage Collective Platinum Targets South Asian Governments
https://spectrum.ieee.org/tech-talk/telecom/security/cyberespionage-collective-platinum-returns-with-a-steganographybased-attack]]></description>
		<content:encoded><![CDATA[<p>Cyberespionage Collective Platinum Targets South Asian Governments<br />
<a href="https://spectrum.ieee.org/tech-talk/telecom/security/cyberespionage-collective-platinum-returns-with-a-steganographybased-attack" rel="nofollow">https://spectrum.ieee.org/tech-talk/telecom/security/cyberespionage-collective-platinum-returns-with-a-steganographybased-attack</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/06/01/cyber-security-news-in-june-2019/comment-page-3/#comment-1644321</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 07 Jul 2019 16:35:34 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=182598#comment-1644321</guid>
		<description><![CDATA[https://boingboing.net/2019/06/25/teenaged-kicks.html]]></description>
		<content:encoded><![CDATA[<p><a href="https://boingboing.net/2019/06/25/teenaged-kicks.html" rel="nofollow">https://boingboing.net/2019/06/25/teenaged-kicks.html</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/06/01/cyber-security-news-in-june-2019/comment-page-3/#comment-1644320</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 07 Jul 2019 16:35:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=182598#comment-1644320</guid>
		<description><![CDATA[https://www.ciscozine.com/bgp-route-leak-european-traffic-china/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.ciscozine.com/bgp-route-leak-european-traffic-china/" rel="nofollow">https://www.ciscozine.com/bgp-route-leak-european-traffic-china/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/06/01/cyber-security-news-in-june-2019/comment-page-3/#comment-1643622</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 30 Jun 2019 16:50:26 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=182598#comment-1643622</guid>
		<description><![CDATA[New ransomware infections are the worst drive-by attacks in recent memory
https://arstechnica.com/information-technology/2019/06/new-ransomware-infections-are-the-worst-drive-by-attacks-in-recent-memory/

Beware of websites booby-trapped by newly energized ShadowGate group, researchers warn.

The attacks install three pieces of malware using an exploit kit called GreenFlash Sundown, which researchers identified in 2015 and have continued to follow since. 

The most notable compromise is of an ad server belonging to onlinevideoconverter[.]com, a site with more than 200 million visitors per month that converts YouTube videos into video files that can be stored on a computer hard drive.

The best way to protect against this campaign is to be sure to keep browsers, browser add-ons, and operating systems updated, since the attackss this group is known to use almost always exploit known vulnerabilities for which patches are available. Antivirus protection is also effective, since most engines detect both the exploits and the payloads. Additionally, it&#039;s almost never a bad idea to uninstall stand-alone versions of Flash.]]></description>
		<content:encoded><![CDATA[<p>New ransomware infections are the worst drive-by attacks in recent memory<br />
<a href="https://arstechnica.com/information-technology/2019/06/new-ransomware-infections-are-the-worst-drive-by-attacks-in-recent-memory/" rel="nofollow">https://arstechnica.com/information-technology/2019/06/new-ransomware-infections-are-the-worst-drive-by-attacks-in-recent-memory/</a></p>
<p>Beware of websites booby-trapped by newly energized ShadowGate group, researchers warn.</p>
<p>The attacks install three pieces of malware using an exploit kit called GreenFlash Sundown, which researchers identified in 2015 and have continued to follow since. </p>
<p>The most notable compromise is of an ad server belonging to onlinevideoconverter[.]com, a site with more than 200 million visitors per month that converts YouTube videos into video files that can be stored on a computer hard drive.</p>
<p>The best way to protect against this campaign is to be sure to keep browsers, browser add-ons, and operating systems updated, since the attackss this group is known to use almost always exploit known vulnerabilities for which patches are available. Antivirus protection is also effective, since most engines detect both the exploits and the payloads. Additionally, it&#8217;s almost never a bad idea to uninstall stand-alone versions of Flash.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/06/01/cyber-security-news-in-june-2019/comment-page-3/#comment-1643613</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 30 Jun 2019 13:59:56 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=182598#comment-1643613</guid>
		<description><![CDATA[Firefox Will Help You ‘Fool’ Ad Trackers By Opening Up 100 Useless Tabs
https://fossbytes.com/firefox-fool-ad-trackers-track-this-project/]]></description>
		<content:encoded><![CDATA[<p>Firefox Will Help You ‘Fool’ Ad Trackers By Opening Up 100 Useless Tabs<br />
<a href="https://fossbytes.com/firefox-fool-ad-trackers-track-this-project/" rel="nofollow">https://fossbytes.com/firefox-fool-ad-trackers-track-this-project/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/06/01/cyber-security-news-in-june-2019/comment-page-2/#comment-1643477</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 28 Jun 2019 18:42:31 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=182598#comment-1643477</guid>
		<description><![CDATA[https://www.vice.com/en_us/article/xwnkj3/prisons-are-banning-books-that-teach-prisoners-how-to-code]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.vice.com/en_us/article/xwnkj3/prisons-are-banning-books-that-teach-prisoners-how-to-code" rel="nofollow">https://www.vice.com/en_us/article/xwnkj3/prisons-are-banning-books-that-teach-prisoners-how-to-code</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
