<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Looking back last decade 2010-2019</title>
	<atom:link href="http://www.epanorama.net/blog/2020/01/09/looking-back-last-decade-2010-2019/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2020/01/09/looking-back-last-decade-2010-2019/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Thu, 23 Apr 2026 09:04:35 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/01/09/looking-back-last-decade-2010-2019/comment-page-2/#comment-1683768</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 28 Jun 2020 12:20:47 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=185466#comment-1683768</guid>
		<description><![CDATA[https://www.infosecurity-magazine.com/news/ransomware-demands-soared-950-in/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.infosecurity-magazine.com/news/ransomware-demands-soared-950-in/" rel="nofollow">https://www.infosecurity-magazine.com/news/ransomware-demands-soared-950-in/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/01/09/looking-back-last-decade-2010-2019/comment-page-2/#comment-1683583</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 26 Jun 2020 20:12:11 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=185466#comment-1683583</guid>
		<description><![CDATA[https://techcrunch.com/2020/06/14/where-are-all-the-robots/]]></description>
		<content:encoded><![CDATA[<p><a href="https://techcrunch.com/2020/06/14/where-are-all-the-robots/" rel="nofollow">https://techcrunch.com/2020/06/14/where-are-all-the-robots/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/01/09/looking-back-last-decade-2010-2019/comment-page-2/#comment-1683351</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 25 Jun 2020 08:52:04 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=185466#comment-1683351</guid>
		<description><![CDATA[OneZero :
Inside DayLife Army, a social media cult, spun off from a Facebook group, that seduces young people with empty promises of a better worldF

Inside the Social Media Cult That Convinces Young People to Give Up Everything
The DayLife Army always seemed like a troll. Then it became a nightmare.
https://onezero.medium.com/inside-the-social-media-cult-that-convinces-young-people-to-give-up-everything-f3878fbec632]]></description>
		<content:encoded><![CDATA[<p>OneZero :<br />
Inside DayLife Army, a social media cult, spun off from a Facebook group, that seduces young people with empty promises of a better worldF</p>
<p>Inside the Social Media Cult That Convinces Young People to Give Up Everything<br />
The DayLife Army always seemed like a troll. Then it became a nightmare.<br />
<a href="https://onezero.medium.com/inside-the-social-media-cult-that-convinces-young-people-to-give-up-everything-f3878fbec632" rel="nofollow">https://onezero.medium.com/inside-the-social-media-cult-that-convinces-young-people-to-give-up-everything-f3878fbec632</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/01/09/looking-back-last-decade-2010-2019/comment-page-2/#comment-1683064</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 22 Jun 2020 07:58:27 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=185466#comment-1683064</guid>
		<description><![CDATA[Joseph Cox / VICE:
In 2019, just days after NSO Group unveiled a human rights policy for the use of its malware, Amnesty International says an activist was hacked with NSO tools

Days After New Human Rights Policy, NSO Client Hacked an Activist
https://www.vice.com/en_us/article/v7gbpj/nso-group-human-rights-hacked-activist

The finding comes as part of a new technical report into a series of NSO attacks from Amnesty International.]]></description>
		<content:encoded><![CDATA[<p>Joseph Cox / VICE:<br />
In 2019, just days after NSO Group unveiled a human rights policy for the use of its malware, Amnesty International says an activist was hacked with NSO tools</p>
<p>Days After New Human Rights Policy, NSO Client Hacked an Activist<br />
<a href="https://www.vice.com/en_us/article/v7gbpj/nso-group-human-rights-hacked-activist" rel="nofollow">https://www.vice.com/en_us/article/v7gbpj/nso-group-human-rights-hacked-activist</a></p>
<p>The finding comes as part of a new technical report into a series of NSO attacks from Amnesty International.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/01/09/looking-back-last-decade-2010-2019/comment-page-2/#comment-1682989</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 21 Jun 2020 19:42:54 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=185466#comment-1682989</guid>
		<description><![CDATA[Assessing Kurzweil predictions about 2019: the results
https://www.lesswrong.com/posts/NcGBmDEe5qXB7dFBF/assessing-kurzweil-predictions-about-2019-the-results]]></description>
		<content:encoded><![CDATA[<p>Assessing Kurzweil predictions about 2019: the results<br />
<a href="https://www.lesswrong.com/posts/NcGBmDEe5qXB7dFBF/assessing-kurzweil-predictions-about-2019-the-results" rel="nofollow">https://www.lesswrong.com/posts/NcGBmDEe5qXB7dFBF/assessing-kurzweil-predictions-about-2019-the-results</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/01/09/looking-back-last-decade-2010-2019/comment-page-2/#comment-1682590</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 18 Jun 2020 05:58:14 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=185466#comment-1682590</guid>
		<description><![CDATA[Operation In(ter)ception: Aerospace and military companies in the
crosshairs of cyberspies
https://www.welivesecurity.com/2020/06/17/operation-interception-aerospace-military-companies-cyberspies/
At the end of last year, we discovered targeted attacks against
aerospace and military companies in Europe and the Middle East, active
from September to December 2019. A collaborative investigation with
two of the affected European companies allowed us to gain insight into
the operation and uncover previously undocumented malware. This
blogpost will shed light on how the attacks unfolded. The full
research can be found in our white paper, Operation In(ter)ception:
Targeted attacks against European aerospace and military companies.
While we did not find strong evidence connecting the attacks to a
known threat actor, we discovered several hints suggesting a possible
link to the Lazarus group, including similarities in targeting,
development environment, and anti-analysis techniques used. PDF
report:
https://www.welivesecurity.com/wp-content/uploads/2020/06/ESET_Operation_Interception.pdf]]></description>
		<content:encoded><![CDATA[<p>Operation In(ter)ception: Aerospace and military companies in the<br />
crosshairs of cyberspies<br />
<a href="https://www.welivesecurity.com/2020/06/17/operation-interception-aerospace-military-companies-cyberspies/" rel="nofollow">https://www.welivesecurity.com/2020/06/17/operation-interception-aerospace-military-companies-cyberspies/</a><br />
At the end of last year, we discovered targeted attacks against<br />
aerospace and military companies in Europe and the Middle East, active<br />
from September to December 2019. A collaborative investigation with<br />
two of the affected European companies allowed us to gain insight into<br />
the operation and uncover previously undocumented malware. This<br />
blogpost will shed light on how the attacks unfolded. The full<br />
research can be found in our white paper, Operation In(ter)ception:<br />
Targeted attacks against European aerospace and military companies.<br />
While we did not find strong evidence connecting the attacks to a<br />
known threat actor, we discovered several hints suggesting a possible<br />
link to the Lazarus group, including similarities in targeting,<br />
development environment, and anti-analysis techniques used. PDF<br />
report:<br />
<a href="https://www.welivesecurity.com/wp-content/uploads/2020/06/ESET_Operation_Interception.pdf" rel="nofollow">https://www.welivesecurity.com/wp-content/uploads/2020/06/ESET_Operation_Interception.pdf</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/01/09/looking-back-last-decade-2010-2019/comment-page-2/#comment-1681346</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 11 Jun 2020 06:58:18 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=185466#comment-1681346</guid>
		<description><![CDATA[Ransomware attacks spike by 140%, 57% of organizations agree to pay
https://atlasvpn.com/blog/ransomware-attacks-spike-by-140-57-of-organizations-agree-to-pay
Data extracted and analyzed by Atlas VPN reveals, the amounts of
demanded ransom payments increased by 140%, comparing the numbers of
2018 to 2019. More and more organizations succumb to blackmail: 57% of
organizations settled and paid the ransom during the last 12 months.]]></description>
		<content:encoded><![CDATA[<p>Ransomware attacks spike by 140%, 57% of organizations agree to pay<br />
<a href="https://atlasvpn.com/blog/ransomware-attacks-spike-by-140-57-of-organizations-agree-to-pay" rel="nofollow">https://atlasvpn.com/blog/ransomware-attacks-spike-by-140-57-of-organizations-agree-to-pay</a><br />
Data extracted and analyzed by Atlas VPN reveals, the amounts of<br />
demanded ransom payments increased by 140%, comparing the numbers of<br />
2018 to 2019. More and more organizations succumb to blackmail: 57% of<br />
organizations settled and paid the ransom during the last 12 months.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/01/09/looking-back-last-decade-2010-2019/comment-page-1/#comment-1681203</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 09 Jun 2020 10:56:32 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=185466#comment-1681203</guid>
		<description><![CDATA[Nearly 1,000 Vulnerabilities Found in Popular Open Source Projects in 2019
https://www.securityweek.com/nearly-1000-vulnerabilities-found-popular-open-source-projects-2019

Nearly 1,000 vulnerabilities were found in popular open source projects in 2019, more than double compared to the previous year, according to a report published on Monday by risk management company RiskSense.

RiskSense has analyzed 54 open source projects in which nearly 2,700 vulnerabilities were reported between 2015 and March 2020. Overall, the Jenkins automation server and MySQL had the most vulnerabilities reported during this timeframe, with more than 600 flaws each. For each of these pieces of software, 15 vulnerabilities were weaponized (i.e. public exploit code exists).

Some projects, such as Vagrant, Alfresco and Artifactory have only a few vulnerabilities, but high weaponization rates.]]></description>
		<content:encoded><![CDATA[<p>Nearly 1,000 Vulnerabilities Found in Popular Open Source Projects in 2019<br />
<a href="https://www.securityweek.com/nearly-1000-vulnerabilities-found-popular-open-source-projects-2019" rel="nofollow">https://www.securityweek.com/nearly-1000-vulnerabilities-found-popular-open-source-projects-2019</a></p>
<p>Nearly 1,000 vulnerabilities were found in popular open source projects in 2019, more than double compared to the previous year, according to a report published on Monday by risk management company RiskSense.</p>
<p>RiskSense has analyzed 54 open source projects in which nearly 2,700 vulnerabilities were reported between 2015 and March 2020. Overall, the Jenkins automation server and MySQL had the most vulnerabilities reported during this timeframe, with more than 600 flaws each. For each of these pieces of software, 15 vulnerabilities were weaponized (i.e. public exploit code exists).</p>
<p>Some projects, such as Vagrant, Alfresco and Artifactory have only a few vulnerabilities, but high weaponization rates.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/01/09/looking-back-last-decade-2010-2019/comment-page-1/#comment-1676593</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 27 Apr 2020 14:02:57 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=185466#comment-1676593</guid>
		<description><![CDATA[It is human stupidity that started reveals the data was a major issue:
&#039;The words &quot;unsecured database&quot; seemed to run on repeat through security journalism in 2019.&#039;
https://www.cnet.com/news/2019-data-breach-hall-of-shame-these-were-the-biggest-data-breaches-of-the-year/]]></description>
		<content:encoded><![CDATA[<p>It is human stupidity that started reveals the data was a major issue:<br />
&#8216;The words &#8220;unsecured database&#8221; seemed to run on repeat through security journalism in 2019.&#8217;<br />
<a href="https://www.cnet.com/news/2019-data-breach-hall-of-shame-these-were-the-biggest-data-breaches-of-the-year/" rel="nofollow">https://www.cnet.com/news/2019-data-breach-hall-of-shame-these-were-the-biggest-data-breaches-of-the-year/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/01/09/looking-back-last-decade-2010-2019/comment-page-1/#comment-1676448</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 27 Apr 2020 04:53:36 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=185466#comment-1676448</guid>
		<description><![CDATA[2019 Data Breach Hall of Shame: These were the biggest data breaches of the year
We never want to hear the words &quot;unsecured database&quot; ever again.
https://www.cnet.com/news/2019-data-breach-hall-of-shame-these-were-the-biggest-data-breaches-of-the-year/]]></description>
		<content:encoded><![CDATA[<p>2019 Data Breach Hall of Shame: These were the biggest data breaches of the year<br />
We never want to hear the words &#8220;unsecured database&#8221; ever again.<br />
<a href="https://www.cnet.com/news/2019-data-breach-hall-of-shame-these-were-the-biggest-data-breaches-of-the-year/" rel="nofollow">https://www.cnet.com/news/2019-data-breach-hall-of-shame-these-were-the-biggest-data-breaches-of-the-year/</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
