<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security news July 2020</title>
	<atom:link href="http://www.epanorama.net/blog/2020/07/01/cyber-security-news-july-2020/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2020/07/01/cyber-security-news-july-2020/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Fri, 24 Apr 2026 07:19:17 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Mike Johnson</title>
		<link>https://www.epanorama.net/blog/2020/07/01/cyber-security-news-july-2020/comment-page-5/#comment-1723515</link>
		<dc:creator><![CDATA[Mike Johnson]]></dc:creator>
		<pubDate>Sun, 05 Sep 2021 21:24:38 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186496#comment-1723515</guid>
		<description><![CDATA[https://www.telegraph.co.uk/cyber-crime/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.telegraph.co.uk/cyber-crime/" rel="nofollow">https://www.telegraph.co.uk/cyber-crime/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Mike Johnson</title>
		<link>https://www.epanorama.net/blog/2020/07/01/cyber-security-news-july-2020/comment-page-5/#comment-1723516</link>
		<dc:creator><![CDATA[Mike Johnson]]></dc:creator>
		<pubDate>Sun, 05 Sep 2021 21:24:36 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186496#comment-1723516</guid>
		<description><![CDATA[https://www.telegraph.co.uk/cyber-crime/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.telegraph.co.uk/cyber-crime/" rel="nofollow">https://www.telegraph.co.uk/cyber-crime/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/07/01/cyber-security-news-july-2020/comment-page-5/#comment-1686868</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 03 Aug 2020 18:41:54 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186496#comment-1686868</guid>
		<description><![CDATA[Known as EMV-Bypass Cloning, a technique first described in 2008 has been seen abused in the wild this year.

Theoretical technique to abuse EMV cards detected used in the real world
https://www.zdnet.com/article/theoretical-technique-to-abuse-emv-cards-detected-used-in-the-real-world/?ftag=COS-05-10aaa0h&amp;utm_campaign=trueAnthem%3A+Trending+Content&amp;utm_medium=trueAnthem&amp;utm_source=facebook

Known as EMV-Bypass Cloning, a technique first described in 2008 has been seen abused in the wild this year.

Researchers took the data from the EMV card and created a magnetic stripe version of the same card, but without the actual chip.

This is possible because all EMV cards also come with a magnetic stripe, for fallback purposes, in case the user travels abroad to non-EMV countries, or has to use an older point-of-sale terminal.

The fact that you could create a magstripe version from EMV cards has been known since 2008; however, fears that it could be abused have been dismissed, as banks expected to move all users to EMV cards and eliminate magstripe cards from the market altogther.

But until that happened and all magstripe versions were removed, banks were supposed to follow a series of security checks before approving inter-technology payments.

This hasn&#039;t happened, however, and the loophole first described in 2008 has remained. Case and point, the Cyber R&amp;D Labs experiment, during which researchers said they were able to make valid transactions using four of the EMV-to-magstripe cloned cards.

Researchers blamed banks for failing to follow security checks when approving transactions. However, two weeks ago, the issue was thought to have remained a theoretical problem only.

But in a report published yesterday, security firm Gemini Advisory said it tracked down two instances on cybercrime forums where hackers had collected EMV card data and were offering it for sale.

Cracking the Uncrackable: Cybercriminals Deploy EMV-Bypass Cloning
https://geminiadvisory.io/cybercriminals-deploy-emv-bypass-cloning/]]></description>
		<content:encoded><![CDATA[<p>Known as EMV-Bypass Cloning, a technique first described in 2008 has been seen abused in the wild this year.</p>
<p>Theoretical technique to abuse EMV cards detected used in the real world<br />
<a href="https://www.zdnet.com/article/theoretical-technique-to-abuse-emv-cards-detected-used-in-the-real-world/?ftag=COS-05-10aaa0h&#038;utm_campaign=trueAnthem%3A+Trending+Content&#038;utm_medium=trueAnthem&#038;utm_source=facebook" rel="nofollow">https://www.zdnet.com/article/theoretical-technique-to-abuse-emv-cards-detected-used-in-the-real-world/?ftag=COS-05-10aaa0h&#038;utm_campaign=trueAnthem%3A+Trending+Content&#038;utm_medium=trueAnthem&#038;utm_source=facebook</a></p>
<p>Known as EMV-Bypass Cloning, a technique first described in 2008 has been seen abused in the wild this year.</p>
<p>Researchers took the data from the EMV card and created a magnetic stripe version of the same card, but without the actual chip.</p>
<p>This is possible because all EMV cards also come with a magnetic stripe, for fallback purposes, in case the user travels abroad to non-EMV countries, or has to use an older point-of-sale terminal.</p>
<p>The fact that you could create a magstripe version from EMV cards has been known since 2008; however, fears that it could be abused have been dismissed, as banks expected to move all users to EMV cards and eliminate magstripe cards from the market altogther.</p>
<p>But until that happened and all magstripe versions were removed, banks were supposed to follow a series of security checks before approving inter-technology payments.</p>
<p>This hasn&#8217;t happened, however, and the loophole first described in 2008 has remained. Case and point, the Cyber R&amp;D Labs experiment, during which researchers said they were able to make valid transactions using four of the EMV-to-magstripe cloned cards.</p>
<p>Researchers blamed banks for failing to follow security checks when approving transactions. However, two weeks ago, the issue was thought to have remained a theoretical problem only.</p>
<p>But in a report published yesterday, security firm Gemini Advisory said it tracked down two instances on cybercrime forums where hackers had collected EMV card data and were offering it for sale.</p>
<p>Cracking the Uncrackable: Cybercriminals Deploy EMV-Bypass Cloning<br />
<a href="https://geminiadvisory.io/cybercriminals-deploy-emv-bypass-cloning/" rel="nofollow">https://geminiadvisory.io/cybercriminals-deploy-emv-bypass-cloning/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/07/01/cyber-security-news-july-2020/comment-page-5/#comment-1686777</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 02 Aug 2020 07:49:50 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186496#comment-1686777</guid>
		<description><![CDATA[THERE’S A HOLE IN THE BOOT
https://eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/

BootHole” vulnerability in the GRUB2 bootloader opens up Windows and Linux devices using Secure Boot to attack. All operating systems using GRUB2 with Secure Boot must release new installers and bootloaders. 

Boot Hole Vulnerability - GRUB 2 boot loader - CVE-2020-10713
https://access.redhat.com/security/vulnerabilities/grub2bootloader]]></description>
		<content:encoded><![CDATA[<p>THERE’S A HOLE IN THE BOOT<br />
<a href="https://eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/" rel="nofollow">https://eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/</a></p>
<p>BootHole” vulnerability in the GRUB2 bootloader opens up Windows and Linux devices using Secure Boot to attack. All operating systems using GRUB2 with Secure Boot must release new installers and bootloaders. </p>
<p>Boot Hole Vulnerability &#8211; GRUB 2 boot loader &#8211; CVE-2020-10713<br />
<a href="https://access.redhat.com/security/vulnerabilities/grub2bootloader" rel="nofollow">https://access.redhat.com/security/vulnerabilities/grub2bootloader</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/07/01/cyber-security-news-july-2020/comment-page-5/#comment-1686727</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 01 Aug 2020 18:50:56 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186496#comment-1686727</guid>
		<description><![CDATA[Boothole vulnerability puts billions of Windows and Linux devices at risk
https://www.itproportal.com/news/boothole-vulnerability-puts-billions-of-windows-and-linux-devices-at-risk/]]></description>
		<content:encoded><![CDATA[<p>Boothole vulnerability puts billions of Windows and Linux devices at risk<br />
<a href="https://www.itproportal.com/news/boothole-vulnerability-puts-billions-of-windows-and-linux-devices-at-risk/" rel="nofollow">https://www.itproportal.com/news/boothole-vulnerability-puts-billions-of-windows-and-linux-devices-at-risk/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/07/01/cyber-security-news-july-2020/comment-page-5/#comment-1686715</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 01 Aug 2020 17:44:46 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186496#comment-1686715</guid>
		<description><![CDATA[The Hours After Twitter’s Cyberattack Can Yield Vital Clues on Hackers’ Tactics
https://www.wsj.com/articles/the-hours-after-twitters-cyberattack-can-yield-vital-clues-on-hackers-tactics-11595237402

As investigators look into the Twitter breach, other experts warn that savvy intruders could instead leave a trail of red herrings]]></description>
		<content:encoded><![CDATA[<p>The Hours After Twitter’s Cyberattack Can Yield Vital Clues on Hackers’ Tactics<br />
<a href="https://www.wsj.com/articles/the-hours-after-twitters-cyberattack-can-yield-vital-clues-on-hackers-tactics-11595237402" rel="nofollow">https://www.wsj.com/articles/the-hours-after-twitters-cyberattack-can-yield-vital-clues-on-hackers-tactics-11595237402</a></p>
<p>As investigators look into the Twitter breach, other experts warn that savvy intruders could instead leave a trail of red herrings</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/07/01/cyber-security-news-july-2020/comment-page-5/#comment-1686704</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 01 Aug 2020 16:54:50 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186496#comment-1686704</guid>
		<description><![CDATA[&quot;I&#039;m holding off dropping Tor 0days until the protests are over. (We need Tor now, even with bugs.) After protests come 0days.&quot;

Multiple Tor security issues disclosed, more to come
https://www.zdnet.com/article/multiple-tor-security-issues-disclosed-more-to-come/?ftag=COS-05-10aaa0h&amp;utm_campaign=trueAnthem%3A+Trending+Content&amp;utm_medium=trueAnthem&amp;utm_source=facebook

A security researcher has published details about two Tor security issues and promises to release three more.]]></description>
		<content:encoded><![CDATA[<p>&#8220;I&#8217;m holding off dropping Tor 0days until the protests are over. (We need Tor now, even with bugs.) After protests come 0days.&#8221;</p>
<p>Multiple Tor security issues disclosed, more to come<br />
<a href="https://www.zdnet.com/article/multiple-tor-security-issues-disclosed-more-to-come/?ftag=COS-05-10aaa0h&#038;utm_campaign=trueAnthem%3A+Trending+Content&#038;utm_medium=trueAnthem&#038;utm_source=facebook" rel="nofollow">https://www.zdnet.com/article/multiple-tor-security-issues-disclosed-more-to-come/?ftag=COS-05-10aaa0h&#038;utm_campaign=trueAnthem%3A+Trending+Content&#038;utm_medium=trueAnthem&#038;utm_source=facebook</a></p>
<p>A security researcher has published details about two Tor security issues and promises to release three more.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/07/01/cyber-security-news-july-2020/comment-page-5/#comment-1686692</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 01 Aug 2020 15:33:48 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186496#comment-1686692</guid>
		<description><![CDATA[https://arstechnica.com/information-technology/2020/07/hackers-actively-exploit-high-severity-networking-vulnerabilities/]]></description>
		<content:encoded><![CDATA[<p><a href="https://arstechnica.com/information-technology/2020/07/hackers-actively-exploit-high-severity-networking-vulnerabilities/" rel="nofollow">https://arstechnica.com/information-technology/2020/07/hackers-actively-exploit-high-severity-networking-vulnerabilities/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/07/01/cyber-security-news-july-2020/comment-page-4/#comment-1686688</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 01 Aug 2020 15:27:48 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186496#comment-1686688</guid>
		<description><![CDATA[DNS Rebinding Headless Browsers
This article describes the use of HTTP Referer headers to execute DNS rebinding attacks on AWS-hosted analytics systems, leading to a compromise of the cloud environment.
https://alex.kaskaso.li/post/dns-rebinding-headless-browsers]]></description>
		<content:encoded><![CDATA[<p>DNS Rebinding Headless Browsers<br />
This article describes the use of HTTP Referer headers to execute DNS rebinding attacks on AWS-hosted analytics systems, leading to a compromise of the cloud environment.<br />
<a href="https://alex.kaskaso.li/post/dns-rebinding-headless-browsers" rel="nofollow">https://alex.kaskaso.li/post/dns-rebinding-headless-browsers</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/07/01/cyber-security-news-july-2020/comment-page-4/#comment-1686680</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 01 Aug 2020 14:54:15 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186496#comment-1686680</guid>
		<description><![CDATA[Emotet being hijacked by another actor
https://doublepulsar.com/emotet-being-hijacked-by-another-actor-b22414352a7b]]></description>
		<content:encoded><![CDATA[<p>Emotet being hijacked by another actor<br />
<a href="https://doublepulsar.com/emotet-being-hijacked-by-another-actor-b22414352a7b" rel="nofollow">https://doublepulsar.com/emotet-being-hijacked-by-another-actor-b22414352a7b</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
