<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security news August 2020</title>
	<atom:link href="http://www.epanorama.net/blog/2020/08/01/cyber-security-news-august-2020/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2020/08/01/cyber-security-news-august-2020/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Wed, 22 Apr 2026 08:40:06 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/08/01/cyber-security-news-august-2020/comment-page-5/#comment-1690412</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 07 Sep 2020 04:40:25 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186654#comment-1690412</guid>
		<description><![CDATA[A hacking course on PornHub, strange!
https://www.facebook.com/groups/2600net/permalink/2823820341174406/

They started moving over there when YouTube incorrectly started banning videos

Oh yeah that guy. https://www.reddit.com/r/IAmA/comments/azwb59/im_ryan_creamer_i_make_wholesome_sfw_videos_on/]]></description>
		<content:encoded><![CDATA[<p>A hacking course on PornHub, strange!<br />
<a href="https://www.facebook.com/groups/2600net/permalink/2823820341174406/" rel="nofollow">https://www.facebook.com/groups/2600net/permalink/2823820341174406/</a></p>
<p>They started moving over there when YouTube incorrectly started banning videos</p>
<p>Oh yeah that guy. <a href="https://www.reddit.com/r/IAmA/comments/azwb59/im_ryan_creamer_i_make_wholesome_sfw_videos_on/" rel="nofollow">https://www.reddit.com/r/IAmA/comments/azwb59/im_ryan_creamer_i_make_wholesome_sfw_videos_on/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/08/01/cyber-security-news-august-2020/comment-page-5/#comment-1689879</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 01 Sep 2020 15:32:01 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186654#comment-1689879</guid>
		<description><![CDATA[Apple has some of the strictest rules to prevent malicious software from landing in its app store, even if on occasion a bad app slips through the net. https://tcrn.ch/2YSRHLQ

Apple mistakenly approved a widely used malware to run on Macs
https://techcrunch.com/2020/08/31/apple-notarized-mac-malware/?tpcc=ECFB2020

Apple  has some of the strictest rules to prevent malicious software from landing in its app store, even if on occasion a bad app slips through the net. But last year Apple took its toughest approach yet by requiring developers to submit their apps for security checks in order to run on millions of Macs unhindered.

The process, which Apple calls “notarization,” scans an app for security issues and malicious content. If approved, the Mac’s  in-built security screening software, Gatekeeper, allows the app to run.]]></description>
		<content:encoded><![CDATA[<p>Apple has some of the strictest rules to prevent malicious software from landing in its app store, even if on occasion a bad app slips through the net. <a href="https://tcrn.ch/2YSRHLQ" rel="nofollow">https://tcrn.ch/2YSRHLQ</a></p>
<p>Apple mistakenly approved a widely used malware to run on Macs<br />
<a href="https://techcrunch.com/2020/08/31/apple-notarized-mac-malware/?tpcc=ECFB2020" rel="nofollow">https://techcrunch.com/2020/08/31/apple-notarized-mac-malware/?tpcc=ECFB2020</a></p>
<p>Apple  has some of the strictest rules to prevent malicious software from landing in its app store, even if on occasion a bad app slips through the net. But last year Apple took its toughest approach yet by requiring developers to submit their apps for security checks in order to run on millions of Macs unhindered.</p>
<p>The process, which Apple calls “notarization,” scans an app for security issues and malicious content. If approved, the Mac’s  in-built security screening software, Gatekeeper, allows the app to run.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/08/01/cyber-security-news-august-2020/comment-page-5/#comment-1689815</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 01 Sep 2020 08:18:40 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186654#comment-1689815</guid>
		<description><![CDATA[Lily Hay Newman / Wired: 	
Researcher finds a macOS adware campaign using malware notarized by Apple; after being notified, Apple shut it down, but then another notarized variant emerged  —  The ubiquitous Shlayer adware has picked up a new trick, slipping past Cupertino&#039;s “notarization” defenses for the first time.

Apple Accidentally Approved Malware to Run on MacOS
The ubiquitous Shlayer adware has picked up a new trick, slipping past Cupertino&#039;s “notarization” defenses for the first time.]]></description>
		<content:encoded><![CDATA[<p>Lily Hay Newman / Wired:<br />
Researcher finds a macOS adware campaign using malware notarized by Apple; after being notified, Apple shut it down, but then another notarized variant emerged  —  The ubiquitous Shlayer adware has picked up a new trick, slipping past Cupertino&#8217;s “notarization” defenses for the first time.</p>
<p>Apple Accidentally Approved Malware to Run on MacOS<br />
The ubiquitous Shlayer adware has picked up a new trick, slipping past Cupertino&#8217;s “notarization” defenses for the first time.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/08/01/cyber-security-news-august-2020/comment-page-5/#comment-1689800</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 01 Sep 2020 05:22:23 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186654#comment-1689800</guid>
		<description><![CDATA[Breaking: a new Firebase FCM exploit seems to have hit #MSTeams. The vulnerability was first reported on CyberNews via Abss, affecting possibly billions of users of popular apps like Hangouts, YouTube, and more.

Exposed FCM keys leaves billions of users open to mass spam and phishing notifications
https://cybernews.com/security/exposed-google-keys-leaves-billions-of-users-open-to-mass-spam-and-phishing-notifications/?utm_source=facebook&amp;utm_medium=traffic_rm&amp;utm_campaign=news&amp;utm_content=exposed_google_keys

New vulnerabilities involving Google’s Firebase Cloud Messaging (FCM) service could have allowed fraudsters to send mass spam and phishing push notifications to billions of Android users. The exploit involves Firebase, a Google platform that allows app developers to build their apps, and leverages its Firebase Cloud Messaging Service. This was discovered by Abhishek Dharani, a Bangalore-based security researcher better known as “Abss.”]]></description>
		<content:encoded><![CDATA[<p>Breaking: a new Firebase FCM exploit seems to have hit #MSTeams. The vulnerability was first reported on CyberNews via Abss, affecting possibly billions of users of popular apps like Hangouts, YouTube, and more.</p>
<p>Exposed FCM keys leaves billions of users open to mass spam and phishing notifications<br />
<a href="https://cybernews.com/security/exposed-google-keys-leaves-billions-of-users-open-to-mass-spam-and-phishing-notifications/?utm_source=facebook&#038;utm_medium=traffic_rm&#038;utm_campaign=news&#038;utm_content=exposed_google_keys" rel="nofollow">https://cybernews.com/security/exposed-google-keys-leaves-billions-of-users-open-to-mass-spam-and-phishing-notifications/?utm_source=facebook&#038;utm_medium=traffic_rm&#038;utm_campaign=news&#038;utm_content=exposed_google_keys</a></p>
<p>New vulnerabilities involving Google’s Firebase Cloud Messaging (FCM) service could have allowed fraudsters to send mass spam and phishing push notifications to billions of Android users. The exploit involves Firebase, a Google platform that allows app developers to build their apps, and leverages its Firebase Cloud Messaging Service. This was discovered by Abhishek Dharani, a Bangalore-based security researcher better known as “Abss.”</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/08/01/cyber-security-news-august-2020/comment-page-5/#comment-1689756</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 31 Aug 2020 16:21:04 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186654#comment-1689756</guid>
		<description><![CDATA[Elon Musk Says Failed Russian Ransomware Attack on Tesla Was &#039;Serious&#039;
https://www.newsweek.com/elon-musk-russian-ransomware-attack-tesla-1528524

Kriuchkov allegedly offered to pay the unnamed Russian-speaking employee—who worked at the Tesla &quot;Gigafactory&quot; in Reno, Nevada—$1 million to install the malware. The employee instead notified Tesla, which contacted the FBI. Agents then ran a sting operation using the employee to catch Kriuchkov, who was arrested Tuesday.]]></description>
		<content:encoded><![CDATA[<p>Elon Musk Says Failed Russian Ransomware Attack on Tesla Was &#8216;Serious&#8217;<br />
<a href="https://www.newsweek.com/elon-musk-russian-ransomware-attack-tesla-1528524" rel="nofollow">https://www.newsweek.com/elon-musk-russian-ransomware-attack-tesla-1528524</a></p>
<p>Kriuchkov allegedly offered to pay the unnamed Russian-speaking employee—who worked at the Tesla &#8220;Gigafactory&#8221; in Reno, Nevada—$1 million to install the malware. The employee instead notified Tesla, which contacted the FBI. Agents then ran a sting operation using the employee to catch Kriuchkov, who was arrested Tuesday.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/08/01/cyber-security-news-august-2020/comment-page-5/#comment-1689725</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 31 Aug 2020 06:58:06 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186654#comment-1689725</guid>
		<description><![CDATA[https://www.securityweek.com/new-attacks-allow-bypassing-emv-card-pin-verification]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.securityweek.com/new-attacks-allow-bypassing-emv-card-pin-verification" rel="nofollow">https://www.securityweek.com/new-attacks-allow-bypassing-emv-card-pin-verification</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/08/01/cyber-security-news-august-2020/comment-page-5/#comment-1689724</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 31 Aug 2020 06:57:43 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186654#comment-1689724</guid>
		<description><![CDATA[https://www.securityweek.com/researchers-analyze-traffic-statistics-popular-cybercrime-forums]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.securityweek.com/researchers-analyze-traffic-statistics-popular-cybercrime-forums" rel="nofollow">https://www.securityweek.com/researchers-analyze-traffic-statistics-popular-cybercrime-forums</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/08/01/cyber-security-news-august-2020/comment-page-5/#comment-1689722</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 31 Aug 2020 06:55:15 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186654#comment-1689722</guid>
		<description><![CDATA[Ex-employee hacked Cisco&#039;s AWS Infrastructure; erased virtual machines
https://www.hackread.com/ex-employee-hacked-cisco-cloud-erased-virtual-machines/
A former Cisco employee, Sudhish Kasaba Ramesh has pleaded guilty for
damaging and exploiting the company&#039;s internal networks. His reckless
action resulted in obliterating more than 16, 000 Webex Teams
application. In order to ensue remedial measures, Cisco had to spend a
whopping $1.4 million and refund $1 million to the affected customers.]]></description>
		<content:encoded><![CDATA[<p>Ex-employee hacked Cisco&#8217;s AWS Infrastructure; erased virtual machines<br />
<a href="https://www.hackread.com/ex-employee-hacked-cisco-cloud-erased-virtual-machines/" rel="nofollow">https://www.hackread.com/ex-employee-hacked-cisco-cloud-erased-virtual-machines/</a><br />
A former Cisco employee, Sudhish Kasaba Ramesh has pleaded guilty for<br />
damaging and exploiting the company&#8217;s internal networks. His reckless<br />
action resulted in obliterating more than 16, 000 Webex Teams<br />
application. In order to ensue remedial measures, Cisco had to spend a<br />
whopping $1.4 million and refund $1 million to the affected customers.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/08/01/cyber-security-news-august-2020/comment-page-5/#comment-1689721</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 31 Aug 2020 06:54:43 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186654#comment-1689721</guid>
		<description><![CDATA[Major internet outage: Dozens of websites and apps are down
https://edition.cnn.com/2020/08/30/tech/internet-outage-cloudflare/index.html
Cloudflare, an internet service that is supposed to keep websites up
and running, was down itself Sunday, taking dozens of websites and
online services along with it. Hulu, the PlayStation Network, Xbox
Live, Feedly, Discord, and dozens of other services reported
connectivity problems Sunday morning. Cloudflare said the problem was
with a third-party &quot;transit provider, &quot; and its service was becoming
increasingly stable over the course of the day. CenturyLink, formerly
known as Level 3, confirmed there was an IP outage impacting Content
Delivery Networks (CDN), and that all services had been restored as of
11:12 am ET. also: https://isc.sans.edu/forums/diary/]]></description>
		<content:encoded><![CDATA[<p>Major internet outage: Dozens of websites and apps are down<br />
<a href="https://edition.cnn.com/2020/08/30/tech/internet-outage-cloudflare/index.html" rel="nofollow">https://edition.cnn.com/2020/08/30/tech/internet-outage-cloudflare/index.html</a><br />
Cloudflare, an internet service that is supposed to keep websites up<br />
and running, was down itself Sunday, taking dozens of websites and<br />
online services along with it. Hulu, the PlayStation Network, Xbox<br />
Live, Feedly, Discord, and dozens of other services reported<br />
connectivity problems Sunday morning. Cloudflare said the problem was<br />
with a third-party &#8220;transit provider, &#8221; and its service was becoming<br />
increasingly stable over the course of the day. CenturyLink, formerly<br />
known as Level 3, confirmed there was an IP outage impacting Content<br />
Delivery Networks (CDN), and that all services had been restored as of<br />
11:12 am ET. also: <a href="https://isc.sans.edu/forums/diary/" rel="nofollow">https://isc.sans.edu/forums/diary/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/08/01/cyber-security-news-august-2020/comment-page-5/#comment-1689720</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 31 Aug 2020 06:54:12 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186654#comment-1689720</guid>
		<description><![CDATA[New Zealand bourse resumes trade after cyber attacks, government
activates security systems
https://www.reuters.com/article/uk-nzx-cyber/new-zealand-bourse-resumes-trade-after-cyber-attacks-government-activates-security-systems-idUSKBN25O03Q
New Zealand&#039;s stock exchange resumed trading on Friday, after facing
disruptions for four consecutive days in the wake of cyber attacks
this week, while the government said national security systems had
been activated to support the bourse. Finance Minister Grant Robertson
said the Government Communications Security Bureau and the national
agency fighting cyber crime had been called in to help the bourse. &quot;I
can&#039;t go into much more in terms of specific details other than to say
that we as a government are treating this very seriously, &quot; Robertson
said in a media briefing in Wellington.There is no clarity on who was
behind these two &quot;offshore&quot; attacks, but the failure to stop them has
raised questions about New Zealand&#039;s security systems, experts said.]]></description>
		<content:encoded><![CDATA[<p>New Zealand bourse resumes trade after cyber attacks, government<br />
activates security systems<br />
<a href="https://www.reuters.com/article/uk-nzx-cyber/new-zealand-bourse-resumes-trade-after-cyber-attacks-government-activates-security-systems-idUSKBN25O03Q" rel="nofollow">https://www.reuters.com/article/uk-nzx-cyber/new-zealand-bourse-resumes-trade-after-cyber-attacks-government-activates-security-systems-idUSKBN25O03Q</a><br />
New Zealand&#8217;s stock exchange resumed trading on Friday, after facing<br />
disruptions for four consecutive days in the wake of cyber attacks<br />
this week, while the government said national security systems had<br />
been activated to support the bourse. Finance Minister Grant Robertson<br />
said the Government Communications Security Bureau and the national<br />
agency fighting cyber crime had been called in to help the bourse. &#8220;I<br />
can&#8217;t go into much more in terms of specific details other than to say<br />
that we as a government are treating this very seriously, &#8221; Robertson<br />
said in a media briefing in Wellington.There is no clarity on who was<br />
behind these two &#8220;offshore&#8221; attacks, but the failure to stop them has<br />
raised questions about New Zealand&#8217;s security systems, experts said.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
