<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security trends for 2020</title>
	<atom:link href="http://www.epanorama.net/blog/2019/12/29/cyber-security-trends-for-2020/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2019/12/29/cyber-security-trends-for-2020/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Fri, 03 Apr 2026 20:09:59 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: QA Automation testing</title>
		<link>https://www.epanorama.net/blog/2019/12/29/cyber-security-trends-for-2020/comment-page-30/#comment-1810349</link>
		<dc:creator><![CDATA[QA Automation testing]]></dc:creator>
		<pubDate>Fri, 11 Aug 2023 14:25:53 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=184910#comment-1810349</guid>
		<description><![CDATA[&lt;a href=&quot;https://www.automationqa.co/top-automation-companies-in-usa/&quot; rel=&quot;nofollow&quot;&gt;&lt;strong&gt;QA Automation Companies&lt;/strong&gt;&lt;/a&gt;  provide software testing and quality assurance services to businesses and organizations. In recent years, automation has been widely adopted as more IT businesses look to streamline their development cycle. In addition to testing your applications for bugs, we help you with proactive security testing for data security breaches. The issue of offering consulting services for automation as well as services associated with automation has been met by a large number of American enterprises.]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.automationqa.co/top-automation-companies-in-usa/" rel="nofollow"><strong>QA Automation Companies</strong></a>  provide software testing and quality assurance services to businesses and organizations. In recent years, automation has been widely adopted as more IT businesses look to streamline their development cycle. In addition to testing your applications for bugs, we help you with proactive security testing for data security breaches. The issue of offering consulting services for automation as well as services associated with automation has been met by a large number of American enterprises.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: DevOps Consulting Services</title>
		<link>https://www.epanorama.net/blog/2019/12/29/cyber-security-trends-for-2020/comment-page-30/#comment-1807508</link>
		<dc:creator><![CDATA[DevOps Consulting Services]]></dc:creator>
		<pubDate>Mon, 03 Jul 2023 07:31:08 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=184910#comment-1807508</guid>
		<description><![CDATA[Great post, please keep on sharing amazing article like this! It makes me happy reading your post. Interesting and interesting information can be found on this topic here profile worth to see it. You are so intriguing! 
You can visit my site. We provide the&lt;a href=&quot;https://www.bdccglobal.com/top-devops-companies-globally/&quot; rel=&quot;nofollow&quot;&gt;terraform consulting&lt;/a&gt;.]]></description>
		<content:encoded><![CDATA[<p>Great post, please keep on sharing amazing article like this! It makes me happy reading your post. Interesting and interesting information can be found on this topic here profile worth to see it. You are so intriguing!<br />
You can visit my site. We provide the<a href="https://www.bdccglobal.com/top-devops-companies-globally/" rel="nofollow">terraform consulting</a>.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/12/29/cyber-security-trends-for-2020/comment-page-30/#comment-1715861</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 11 Jun 2021 07:23:25 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=184910#comment-1715861</guid>
		<description><![CDATA[What is your Linux server hardware decommissioning process?
The equipment decommissioning process is often an arguable point in companies. What&#039;s your process?
https://www.redhat.com/sysadmin/decommissioning-process]]></description>
		<content:encoded><![CDATA[<p>What is your Linux server hardware decommissioning process?<br />
The equipment decommissioning process is often an arguable point in companies. What&#8217;s your process?<br />
<a href="https://www.redhat.com/sysadmin/decommissioning-process" rel="nofollow">https://www.redhat.com/sysadmin/decommissioning-process</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/12/29/cyber-security-trends-for-2020/comment-page-30/#comment-1703764</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 16 Feb 2021 14:45:34 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=184910#comment-1703764</guid>
		<description><![CDATA[The Drovorub Mystery: Malware NSA Warned About Can&#039;t Be Found
https://www.securityweek.com/drovorub-mystery-malware-nsa-warned-about-cant-be-found

A piece of malware linked by U.S. intelligence agencies to hackers believed to be backed by the Russian government remains a mystery to the private sector, which apparently hasn’t found a single sample of the malware, and one researcher went as far as suggesting that it may be a false flag set up by the United States itself.

In August 2020, the NSA and the FBI released a joint cybersecurity advisory detailing a piece of malware they named Drovorub. According to the agencies, Drovorub was designed to target Linux systems as part of cyber espionage operations conducted by Russia’s General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (GTsSS) military unit 26165, which has been linked to attacks conducted by the threat actor tracked as APT 28, Fancy Bear, Sednit and Strontium.

The 45-page report released by the NSA and FBI describes Drovorub as a “Linux malware toolset” that consists of an implant with a kernel module rootkit, a file transfer and port forwarding tool, and a command and control (C&amp;C) server.

“When deployed on a victim machine, the Drovorub implant (client) provides the capability for direct communications with actor-controlled C2 infrastructure; file download and upload capabilities; execution of arbitrary commands as ‘root’; and port forwarding of network traffic to other hosts on the network,” the agencies wrote in their advisory.

The advisory shares information on how Drovorub works, how it can be detected, and how organizations can protect their systems against attacks involving the malware.]]></description>
		<content:encoded><![CDATA[<p>The Drovorub Mystery: Malware NSA Warned About Can&#8217;t Be Found<br />
<a href="https://www.securityweek.com/drovorub-mystery-malware-nsa-warned-about-cant-be-found" rel="nofollow">https://www.securityweek.com/drovorub-mystery-malware-nsa-warned-about-cant-be-found</a></p>
<p>A piece of malware linked by U.S. intelligence agencies to hackers believed to be backed by the Russian government remains a mystery to the private sector, which apparently hasn’t found a single sample of the malware, and one researcher went as far as suggesting that it may be a false flag set up by the United States itself.</p>
<p>In August 2020, the NSA and the FBI released a joint cybersecurity advisory detailing a piece of malware they named Drovorub. According to the agencies, Drovorub was designed to target Linux systems as part of cyber espionage operations conducted by Russia’s General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (GTsSS) military unit 26165, which has been linked to attacks conducted by the threat actor tracked as APT 28, Fancy Bear, Sednit and Strontium.</p>
<p>The 45-page report released by the NSA and FBI describes Drovorub as a “Linux malware toolset” that consists of an implant with a kernel module rootkit, a file transfer and port forwarding tool, and a command and control (C&amp;C) server.</p>
<p>“When deployed on a victim machine, the Drovorub implant (client) provides the capability for direct communications with actor-controlled C2 infrastructure; file download and upload capabilities; execution of arbitrary commands as ‘root’; and port forwarding of network traffic to other hosts on the network,” the agencies wrote in their advisory.</p>
<p>The advisory shares information on how Drovorub works, how it can be detected, and how organizations can protect their systems against attacks involving the malware.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/12/29/cyber-security-trends-for-2020/comment-page-30/#comment-1702453</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 28 Jan 2021 16:51:04 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=184910#comment-1702453</guid>
		<description><![CDATA[https://learnlinuxandlibreoffice.org/news/the-fight-for-a-secure-linux-bios]]></description>
		<content:encoded><![CDATA[<p><a href="https://learnlinuxandlibreoffice.org/news/the-fight-for-a-secure-linux-bios" rel="nofollow">https://learnlinuxandlibreoffice.org/news/the-fight-for-a-secure-linux-bios</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/12/29/cyber-security-trends-for-2020/comment-page-30/#comment-1701853</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 21 Jan 2021 16:36:26 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=184910#comment-1701853</guid>
		<description><![CDATA[https://makeameme.org/meme/humans-2020-cant]]></description>
		<content:encoded><![CDATA[<p><a href="https://makeameme.org/meme/humans-2020-cant" rel="nofollow">https://makeameme.org/meme/humans-2020-cant</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/12/29/cyber-security-trends-for-2020/comment-page-30/#comment-1700618</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 05 Jan 2021 19:50:50 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=184910#comment-1700618</guid>
		<description><![CDATA[Healthcare Industry Sees 45% Surge in Cyber Attacks Since November 20
https://www.theaegisalliance.com/2021/01/05/healthcare-industry-45-surge-cyber-attacks-november/]]></description>
		<content:encoded><![CDATA[<p>Healthcare Industry Sees 45% Surge in Cyber Attacks Since November 20<br />
<a href="https://www.theaegisalliance.com/2021/01/05/healthcare-industry-45-surge-cyber-attacks-november/" rel="nofollow">https://www.theaegisalliance.com/2021/01/05/healthcare-industry-45-surge-cyber-attacks-november/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/12/29/cyber-security-trends-for-2020/comment-page-30/#comment-1700594</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 05 Jan 2021 15:12:24 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=184910#comment-1700594</guid>
		<description><![CDATA[SolarWinds: The more we learn, the worse it looks
https://www.zdnet.com/article/solarwinds-the-more-we-learn-the-worse-it-looks/

While you&#039;ve been distracted by the holidays, coronavirus, and politics, the more we learn about the SolarWinds security fiasco, the worse it looks.]]></description>
		<content:encoded><![CDATA[<p>SolarWinds: The more we learn, the worse it looks<br />
<a href="https://www.zdnet.com/article/solarwinds-the-more-we-learn-the-worse-it-looks/" rel="nofollow">https://www.zdnet.com/article/solarwinds-the-more-we-learn-the-worse-it-looks/</a></p>
<p>While you&#8217;ve been distracted by the holidays, coronavirus, and politics, the more we learn about the SolarWinds security fiasco, the worse it looks.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/12/29/cyber-security-trends-for-2020/comment-page-30/#comment-1700582</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 05 Jan 2021 13:28:43 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=184910#comment-1700582</guid>
		<description><![CDATA[Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST Backdoor
https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html]]></description>
		<content:encoded><![CDATA[<p>Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST Backdoor<br />
<a href="https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html" rel="nofollow">https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2019/12/29/cyber-security-trends-for-2020/comment-page-30/#comment-1700581</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 05 Jan 2021 13:28:08 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=184910#comment-1700581</guid>
		<description><![CDATA[SolarWinds cybersecurity expert warned management in 2017 about risk of &#039;catastrophic&#039; breach - as it&#039;s revealed cost-saving move to Eastern Europe could have exposed firm to major Russian hack
https://www.dailymail.co.uk/news/article-9108511/SolarWinds-warned-potential-cyber-attack-cost-saving-Europe-exposed-firm.html

SolarWinds cybersecurity expert Ian Thornton-Trump warned the company to improve its internal security to prevent a &#039;catastrophic&#039; episode in 2017
When his recommendations were ignored, he left the firm a month later
US officials say Russian hackers were behind the massive attack that affected more than 250 federal agencies and businesses
The hack is believed to have started as early as October 2019
Employees say SolarWinds CEO Kevin Thompson cut common security practices to save costs and his approach almost tripled SolarWinds&#039; annual profit margins  
Some engineering offices were moved to Eastern Europe, where the Orion software, which was compromised by the hackers, was partially developed]]></description>
		<content:encoded><![CDATA[<p>SolarWinds cybersecurity expert warned management in 2017 about risk of &#8216;catastrophic&#8217; breach &#8211; as it&#8217;s revealed cost-saving move to Eastern Europe could have exposed firm to major Russian hack<br />
<a href="https://www.dailymail.co.uk/news/article-9108511/SolarWinds-warned-potential-cyber-attack-cost-saving-Europe-exposed-firm.html" rel="nofollow">https://www.dailymail.co.uk/news/article-9108511/SolarWinds-warned-potential-cyber-attack-cost-saving-Europe-exposed-firm.html</a></p>
<p>SolarWinds cybersecurity expert Ian Thornton-Trump warned the company to improve its internal security to prevent a &#8216;catastrophic&#8217; episode in 2017<br />
When his recommendations were ignored, he left the firm a month later<br />
US officials say Russian hackers were behind the massive attack that affected more than 250 federal agencies and businesses<br />
The hack is believed to have started as early as October 2019<br />
Employees say SolarWinds CEO Kevin Thompson cut common security practices to save costs and his approach almost tripled SolarWinds&#8217; annual profit margins<br />
Some engineering offices were moved to Eastern Europe, where the Orion software, which was compromised by the hackers, was partially developed</p>
]]></content:encoded>
	</item>
</channel>
</rss>
