<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security news January 2020</title>
	<atom:link href="http://www.epanorama.net/blog/2020/01/04/cyber-security-news-january-2020/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2020/01/04/cyber-security-news-january-2020/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Wed, 08 Apr 2026 15:02:51 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/01/04/cyber-security-news-january-2020/comment-page-4/#comment-1669439</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 04 Feb 2020 17:10:44 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=185461#comment-1669439</guid>
		<description><![CDATA[Department of Interior grounding drone fleet over cybersecurity concerns
https://www.cyberscoop.com/drone-ban-interior-department-cybersecurity/

The secretary of the Interior issued an order Wednesday grounding all of the Department of the Interior’s non-emergency drones so the agency can assess potential cybersecurity concerns before operating the devices any further.]]></description>
		<content:encoded><![CDATA[<p>Department of Interior grounding drone fleet over cybersecurity concerns<br />
<a href="https://www.cyberscoop.com/drone-ban-interior-department-cybersecurity/" rel="nofollow">https://www.cyberscoop.com/drone-ban-interior-department-cybersecurity/</a></p>
<p>The secretary of the Interior issued an order Wednesday grounding all of the Department of the Interior’s non-emergency drones so the agency can assess potential cybersecurity concerns before operating the devices any further.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/01/04/cyber-security-news-january-2020/comment-page-4/#comment-1669295</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 03 Feb 2020 10:19:11 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=185461#comment-1669295</guid>
		<description><![CDATA[Buffer overflow when pwfeedback is set in sudoers
https://www.sudo.ws/alerts/pwfeedback.html]]></description>
		<content:encoded><![CDATA[<p>Buffer overflow when pwfeedback is set in sudoers<br />
<a href="https://www.sudo.ws/alerts/pwfeedback.html" rel="nofollow">https://www.sudo.ws/alerts/pwfeedback.html</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/01/04/cyber-security-news-january-2020/comment-page-4/#comment-1669232</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 02 Feb 2020 08:19:52 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=185461#comment-1669232</guid>
		<description><![CDATA[Microsoft Says Cyber Thieves Exploiting Death of Kobe Bryant, Installing Crypto Malware in Desktop Wallpaper
https://dailyhodl.com/2020/02/01/microsoft-says-cyber-thieves-exploiting-death-of-kobe-bryant-installing-crypto-malware-in-desktop-wallpaper/amp/

Security experts at Microsoft have discovered malicious malware hiding in downloadable images of the late Kobe Bryant.

Microsoft Security Intelligence says the software is designed to hijack a computer’s CPU to mine cryptocurrency. The process is known as cryptojacking.

https://mobile.twitter.com/MsftSecIntel/status/1223032390555033600]]></description>
		<content:encoded><![CDATA[<p>Microsoft Says Cyber Thieves Exploiting Death of Kobe Bryant, Installing Crypto Malware in Desktop Wallpaper<br />
<a href="https://dailyhodl.com/2020/02/01/microsoft-says-cyber-thieves-exploiting-death-of-kobe-bryant-installing-crypto-malware-in-desktop-wallpaper/amp/" rel="nofollow">https://dailyhodl.com/2020/02/01/microsoft-says-cyber-thieves-exploiting-death-of-kobe-bryant-installing-crypto-malware-in-desktop-wallpaper/amp/</a></p>
<p>Security experts at Microsoft have discovered malicious malware hiding in downloadable images of the late Kobe Bryant.</p>
<p>Microsoft Security Intelligence says the software is designed to hijack a computer’s CPU to mine cryptocurrency. The process is known as cryptojacking.</p>
<p><a href="https://mobile.twitter.com/MsftSecIntel/status/1223032390555033600" rel="nofollow">https://mobile.twitter.com/MsftSecIntel/status/1223032390555033600</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/01/04/cyber-security-news-january-2020/comment-page-4/#comment-1669182</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 01 Feb 2020 12:21:32 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=185461#comment-1669182</guid>
		<description><![CDATA[UN hacked: Attackers got in via SharePoint vulnerability
https://www.helpnetsecurity.com/2020/01/30/un-hacked/

In summer 2019, hackers broke into over 40 (and possibly more) UN servers in offices in Geneva and Vienna and downloaded “sensitive data that could have far-reaching repercussions for staff, individuals, and organizations communicating with and doing business with the UN,” The New Humanitarian reported on Wednesday.]]></description>
		<content:encoded><![CDATA[<p>UN hacked: Attackers got in via SharePoint vulnerability<br />
<a href="https://www.helpnetsecurity.com/2020/01/30/un-hacked/" rel="nofollow">https://www.helpnetsecurity.com/2020/01/30/un-hacked/</a></p>
<p>In summer 2019, hackers broke into over 40 (and possibly more) UN servers in offices in Geneva and Vienna and downloaded “sensitive data that could have far-reaching repercussions for staff, individuals, and organizations communicating with and doing business with the UN,” The New Humanitarian reported on Wednesday.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/01/04/cyber-security-news-january-2020/comment-page-4/#comment-1669180</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 01 Feb 2020 11:50:51 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=185461#comment-1669180</guid>
		<description><![CDATA[Facebook to Pay $550 Million to Settle Facial Recognition Suit
https://www.nytimes.com/2020/01/29/technology/facebook-privacy-lawsuit-earnings.html

It was another black mark on the privacy record of the social network, which also reported its quarterly earnings.

Facebook said on Wednesday that it had agreed to pay $550 million to settle a class-action lawsuit over its use of facial recognition technology in Illinois, giving privacy groups a major victory that again raised questions about the social network’s data-mining practices.

The case stemmed from Facebook’s photo-labeling service, Tag Suggestions, which uses face-matching software to suggest the names of people in users’ photos.

Facebook Biometric Privacy Settlement
https://edelson.com/facebook-settlement]]></description>
		<content:encoded><![CDATA[<p>Facebook to Pay $550 Million to Settle Facial Recognition Suit<br />
<a href="https://www.nytimes.com/2020/01/29/technology/facebook-privacy-lawsuit-earnings.html" rel="nofollow">https://www.nytimes.com/2020/01/29/technology/facebook-privacy-lawsuit-earnings.html</a></p>
<p>It was another black mark on the privacy record of the social network, which also reported its quarterly earnings.</p>
<p>Facebook said on Wednesday that it had agreed to pay $550 million to settle a class-action lawsuit over its use of facial recognition technology in Illinois, giving privacy groups a major victory that again raised questions about the social network’s data-mining practices.</p>
<p>The case stemmed from Facebook’s photo-labeling service, Tag Suggestions, which uses face-matching software to suggest the names of people in users’ photos.</p>
<p>Facebook Biometric Privacy Settlement<br />
<a href="https://edelson.com/facebook-settlement" rel="nofollow">https://edelson.com/facebook-settlement</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/01/04/cyber-security-news-january-2020/comment-page-4/#comment-1669173</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 01 Feb 2020 08:02:19 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=185461#comment-1669173</guid>
		<description><![CDATA[Threat intelligence expert calls failure to disclose a ‘really bad decision’]]></description>
		<content:encoded><![CDATA[<p>Threat intelligence expert calls failure to disclose a ‘really bad decision’</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/01/04/cyber-security-news-january-2020/comment-page-4/#comment-1669172</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 01 Feb 2020 08:01:52 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=185461#comment-1669172</guid>
		<description><![CDATA[United Nations Confirms ‘Serious’ Cyberattack With 42 Core Servers Compromised
https://www.google.com/amp/s/www.forbes.com/sites/daveywinder/2020/01/30/united-nations-confirms-serious-cyberattack-with-42-core-servers-compromised/amp/

One week after the United Nations called for an investigation into the claims that Jeff Bezos&#039; smartphone was hacked by Saudi Crown Prince Mohammed bin Salman, a claim that I first reported in March 2019, another investigation has revealed that the UN itself has been hacked.

The leak of an internal UN report to investigators at The New Humanitarian shows that core infrastructure servers were compromised during a successful cyberattack last year. The report, dated September 20, 2019, was from the United Nations Office of Information and Technology. Associated Press, which has also seen the report, said that 42 servers in all were compromised and a further 25 categorized as suspicious. According to The New Humanitarian, at least some of the affected systems were at the UN human rights offices and the UN human resources department, at locations in Geneva and Vienna. The confidential report is said to show that &quot;some administrator accounts&quot; were breached, and staff told to change passwords. &quot;The &#039;core infrastructure&#039; affected included systems for user and password management, system controls, and security firewalls,&quot; The New Humanitarian said.

Although not yet attributed, attack fingerprint suggests sophisticated APT actors

--
So sophisticated a caveman could exploit it, APT is such an abused word (when convenient) that it effectively is a near meaningless short code for shit administrators https://www.rapid7.com/db/?q=CVE-2019-0604&amp;type=nexpose]]></description>
		<content:encoded><![CDATA[<p>United Nations Confirms ‘Serious’ Cyberattack With 42 Core Servers Compromised<br />
<a href="https://www.google.com/amp/s/www.forbes.com/sites/daveywinder/2020/01/30/united-nations-confirms-serious-cyberattack-with-42-core-servers-compromised/amp/" rel="nofollow">https://www.google.com/amp/s/www.forbes.com/sites/daveywinder/2020/01/30/united-nations-confirms-serious-cyberattack-with-42-core-servers-compromised/amp/</a></p>
<p>One week after the United Nations called for an investigation into the claims that Jeff Bezos&#8217; smartphone was hacked by Saudi Crown Prince Mohammed bin Salman, a claim that I first reported in March 2019, another investigation has revealed that the UN itself has been hacked.</p>
<p>The leak of an internal UN report to investigators at The New Humanitarian shows that core infrastructure servers were compromised during a successful cyberattack last year. The report, dated September 20, 2019, was from the United Nations Office of Information and Technology. Associated Press, which has also seen the report, said that 42 servers in all were compromised and a further 25 categorized as suspicious. According to The New Humanitarian, at least some of the affected systems were at the UN human rights offices and the UN human resources department, at locations in Geneva and Vienna. The confidential report is said to show that &#8220;some administrator accounts&#8221; were breached, and staff told to change passwords. &#8220;The &#8216;core infrastructure&#8217; affected included systems for user and password management, system controls, and security firewalls,&#8221; The New Humanitarian said.</p>
<p>Although not yet attributed, attack fingerprint suggests sophisticated APT actors</p>
<p>&#8211;<br />
So sophisticated a caveman could exploit it, APT is such an abused word (when convenient) that it effectively is a near meaningless short code for shit administrators <a href="https://www.rapid7.com/db/?q=CVE-2019-0604&#038;type=nexpose" rel="nofollow">https://www.rapid7.com/db/?q=CVE-2019-0604&#038;type=nexpose</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/01/04/cyber-security-news-january-2020/comment-page-4/#comment-1669134</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 31 Jan 2020 21:00:42 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=185461#comment-1669134</guid>
		<description><![CDATA[Microsoft Issues Excel Security Alert As $100 Million ‘Evil Corp’ Campaign Evolves
https://www.forbes.com/sites/daveywinder/2020/01/31/microsoft-issues-excel-threat-alert-as-100-million-evil-corp-campaign-evolves/#659dbe996044

Evil Corp may well be best known to millions of viewers of the Mr. Robot TV drama as the multi-national corporation that Elliot and FSociety hack. However, back in the real world, Evil Corp not only exists but is weaponizing Microsoft Excel to spread a malware payload. Researchers from Microsoft Security Intelligence have this week taken to Twitter to warn users to be alert to the ongoing campaign being run by Evil Corp, also known as TA505. Like most successful cybercriminals, Evil Corp is constantly evolving in terms of techniques and tools. The latest twist in this felonious tale involves Microsoft Excel as a payload delivery vehicle.]]></description>
		<content:encoded><![CDATA[<p>Microsoft Issues Excel Security Alert As $100 Million ‘Evil Corp’ Campaign Evolves<br />
<a href="https://www.forbes.com/sites/daveywinder/2020/01/31/microsoft-issues-excel-threat-alert-as-100-million-evil-corp-campaign-evolves/#659dbe996044" rel="nofollow">https://www.forbes.com/sites/daveywinder/2020/01/31/microsoft-issues-excel-threat-alert-as-100-million-evil-corp-campaign-evolves/#659dbe996044</a></p>
<p>Evil Corp may well be best known to millions of viewers of the Mr. Robot TV drama as the multi-national corporation that Elliot and FSociety hack. However, back in the real world, Evil Corp not only exists but is weaponizing Microsoft Excel to spread a malware payload. Researchers from Microsoft Security Intelligence have this week taken to Twitter to warn users to be alert to the ongoing campaign being run by Evil Corp, also known as TA505. Like most successful cybercriminals, Evil Corp is constantly evolving in terms of techniques and tools. The latest twist in this felonious tale involves Microsoft Excel as a payload delivery vehicle.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/01/04/cyber-security-news-january-2020/comment-page-4/#comment-1669000</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 31 Jan 2020 08:54:08 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=185461#comment-1669000</guid>
		<description><![CDATA[Severe ‘Perfect 10.0’ Microsoft Flaw Confirmed: ‘This Is A Cloud Security Nightmare’
https://www.forbes.com/sites/zakdoffman/2020/01/30/severe-perfect-100-microsoft-flaw-confirmed-this-is-a-cloud-security-nightmare/

Microsoft quickly fixed the vulnerability when Check Point approached them in the fall, and customers who have patched their systems are now safe. The vulnerability is as punchy as it gets, “a perfect 10.0,” Balmas says, referring to the CVE score on Microsoft’s disclosure in October. “It’s huge—I can’t even start to describe how big it is.” The reason for the hyperbole is that Balmas says his team found the first remote code execution (RCE) exploit on a major cloud platform. One user could break the cloud isolation separating themselves and others, intercepting code, manipulating programs. That isolation is the basis of cloud security, enabling the safe sharing of common hardware.

There was no detail when Microsoft patched the flaw, just a short explainer. “An attacker who successfully exploited this vulnerability could allow an unprivileged function run by the user to execute code,” the company said at the time, “thereby escaping the Sandbox.” This week, Microsoft confirmed Check Point’s report, telling me that “we released updates to address these issues in 2019.” The spokesperson added that “customers who have applied the updates are protected,” as covered at CVE-2019-1372 and CVE-2019-1234.]]></description>
		<content:encoded><![CDATA[<p>Severe ‘Perfect 10.0’ Microsoft Flaw Confirmed: ‘This Is A Cloud Security Nightmare’<br />
<a href="https://www.forbes.com/sites/zakdoffman/2020/01/30/severe-perfect-100-microsoft-flaw-confirmed-this-is-a-cloud-security-nightmare/" rel="nofollow">https://www.forbes.com/sites/zakdoffman/2020/01/30/severe-perfect-100-microsoft-flaw-confirmed-this-is-a-cloud-security-nightmare/</a></p>
<p>Microsoft quickly fixed the vulnerability when Check Point approached them in the fall, and customers who have patched their systems are now safe. The vulnerability is as punchy as it gets, “a perfect 10.0,” Balmas says, referring to the CVE score on Microsoft’s disclosure in October. “It’s huge—I can’t even start to describe how big it is.” The reason for the hyperbole is that Balmas says his team found the first remote code execution (RCE) exploit on a major cloud platform. One user could break the cloud isolation separating themselves and others, intercepting code, manipulating programs. That isolation is the basis of cloud security, enabling the safe sharing of common hardware.</p>
<p>There was no detail when Microsoft patched the flaw, just a short explainer. “An attacker who successfully exploited this vulnerability could allow an unprivileged function run by the user to execute code,” the company said at the time, “thereby escaping the Sandbox.” This week, Microsoft confirmed Check Point’s report, telling me that “we released updates to address these issues in 2019.” The spokesperson added that “customers who have applied the updates are protected,” as covered at CVE-2019-1372 and CVE-2019-1234.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/01/04/cyber-security-news-january-2020/comment-page-4/#comment-1668990</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 31 Jan 2020 06:00:31 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=185461#comment-1668990</guid>
		<description><![CDATA[Exonerated: Charges dropped against pentesters paid to break into Iowa courthouse
Dismissal is a victory for the security industry and the customers who rely on it.
https://arstechnica.com/information-technology/2020/01/criminal-charges-dropped-against-2-pentesters-who-broke-into-iowa-courthouse/

Prosecutors have dropped criminal charges against two security professionals who were arrested and jailed last September for breaking into an Iowa courthouse as part of a contract with Iowa’s judicial arm.

Coalfire CEO Tom McAndrew added, “With positive lessons learned, a new dialogue now begins with a focus on improving best practices and elevating the alignment between security professionals and law enforcement. We’re grateful to the global security community for their support throughout this experience.”]]></description>
		<content:encoded><![CDATA[<p>Exonerated: Charges dropped against pentesters paid to break into Iowa courthouse<br />
Dismissal is a victory for the security industry and the customers who rely on it.<br />
<a href="https://arstechnica.com/information-technology/2020/01/criminal-charges-dropped-against-2-pentesters-who-broke-into-iowa-courthouse/" rel="nofollow">https://arstechnica.com/information-technology/2020/01/criminal-charges-dropped-against-2-pentesters-who-broke-into-iowa-courthouse/</a></p>
<p>Prosecutors have dropped criminal charges against two security professionals who were arrested and jailed last September for breaking into an Iowa courthouse as part of a contract with Iowa’s judicial arm.</p>
<p>Coalfire CEO Tom McAndrew added, “With positive lessons learned, a new dialogue now begins with a focus on improving best practices and elevating the alignment between security professionals and law enforcement. We’re grateful to the global security community for their support throughout this experience.”</p>
]]></content:encoded>
	</item>
</channel>
</rss>
