<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security news September 2020</title>
	<atom:link href="http://www.epanorama.net/blog/2020/09/01/cyber-security-news-september-2020/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2020/09/01/cyber-security-news-september-2020/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Wed, 22 Apr 2026 08:40:06 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/09/01/cyber-security-news-september-2020/comment-page-6/#comment-1693556</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Oct 2020 06:17:21 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186709#comment-1693556</guid>
		<description><![CDATA[Over 247K Exchange servers unpatched for actively exploited flaw
https://www.bleepingcomputer.com/news/security/over-247k-exchange-servers-unpatched-for-actively-exploited-flaw/
More than 247, 000 Microsoft Exchange servers are yet to be patched
against the CVE-2020-0688 post-auth remote code execution (RCE)
vulnerability impacting all Exchange Server versions under support.
&quot;There are two important efforts that Exchange Administrators and
infosec teams need to undertake: verifying deployment of the update
and checking for signs of compromise, &quot;]]></description>
		<content:encoded><![CDATA[<p>Over 247K Exchange servers unpatched for actively exploited flaw<br />
<a href="https://www.bleepingcomputer.com/news/security/over-247k-exchange-servers-unpatched-for-actively-exploited-flaw/" rel="nofollow">https://www.bleepingcomputer.com/news/security/over-247k-exchange-servers-unpatched-for-actively-exploited-flaw/</a><br />
More than 247, 000 Microsoft Exchange servers are yet to be patched<br />
against the CVE-2020-0688 post-auth remote code execution (RCE)<br />
vulnerability impacting all Exchange Server versions under support.<br />
&#8220;There are two important efforts that Exchange Administrators and<br />
infosec teams need to undertake: verifying deployment of the update<br />
and checking for signs of compromise, &#8220;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/09/01/cyber-security-news-september-2020/comment-page-5/#comment-1693555</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Oct 2020 06:16:44 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186709#comment-1693555</guid>
		<description><![CDATA[FYI: If you&#039;re running HP Device Manager, anyone on your network can
get admin on your server via backdoor
https://www.theregister.com/2020/09/30/hp_device_manager_backdoor_database_account/
Hidden database account discovered, patches finally available as well
as mitigations]]></description>
		<content:encoded><![CDATA[<p>FYI: If you&#8217;re running HP Device Manager, anyone on your network can<br />
get admin on your server via backdoor<br />
<a href="https://www.theregister.com/2020/09/30/hp_device_manager_backdoor_database_account/" rel="nofollow">https://www.theregister.com/2020/09/30/hp_device_manager_backdoor_database_account/</a><br />
Hidden database account discovered, patches finally available as well<br />
as mitigations</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/09/01/cyber-security-news-september-2020/comment-page-5/#comment-1693493</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 30 Sep 2020 11:35:43 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186709#comment-1693493</guid>
		<description><![CDATA[Nämä tunkeutujat jaksavat pötköttää vaikka vuoden järjestelmissä – ja sitten alkaa tapahtua
Markku Pervilä30.9.2020 13:00&#124;päivitetty30.9.2020 13:19
TietoturvaKyberHakkeritVakoilu
Palmerwormin nimellä tunnetut valtiojohtoiset vakoojaryhmät viettävät pitkiä hiljaiselon aikoja organisaatioiden järjestelmissä ennen lopullista iskua.
https://www.tivi.fi/uutiset/tv/94515d92-6a35-4402-878a-43812f53a47d]]></description>
		<content:encoded><![CDATA[<p>Nämä tunkeutujat jaksavat pötköttää vaikka vuoden järjestelmissä – ja sitten alkaa tapahtua<br />
Markku Pervilä30.9.2020 13:00|päivitetty30.9.2020 13:19<br />
TietoturvaKyberHakkeritVakoilu<br />
Palmerwormin nimellä tunnetut valtiojohtoiset vakoojaryhmät viettävät pitkiä hiljaiselon aikoja organisaatioiden järjestelmissä ennen lopullista iskua.<br />
<a href="https://www.tivi.fi/uutiset/tv/94515d92-6a35-4402-878a-43812f53a47d" rel="nofollow">https://www.tivi.fi/uutiset/tv/94515d92-6a35-4402-878a-43812f53a47d</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/09/01/cyber-security-news-september-2020/comment-page-5/#comment-1693472</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 30 Sep 2020 08:40:47 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186709#comment-1693472</guid>
		<description><![CDATA[What Caused The Massive Microsoft Teams, Office 365 Outage Yesterday? Here’s What We Know
https://www.forbes.com/sites/daveywinder/2020/09/29/what-caused-the-massive-microsoft-teams-office-365-outage-yesterday-heres-what-we-know/?utm_campaign=forbes&amp;utm_source=facebook&amp;utm_medium=social&amp;utm_term=Valerie/#76616c657269

Cloud-based Microsoft applications, including Microsoft Teams, went down across a swathe of the U.S. yesterday.

Users of Microsoft Office 365, Outlook, Exchange, Sharepoint, OneDrive and Azure also reported they were unable to login. Instead, they were presented with a &quot;transient error&quot; message informing them there was a problem signing them in.]]></description>
		<content:encoded><![CDATA[<p>What Caused The Massive Microsoft Teams, Office 365 Outage Yesterday? Here’s What We Know<br />
<a href="https://www.forbes.com/sites/daveywinder/2020/09/29/what-caused-the-massive-microsoft-teams-office-365-outage-yesterday-heres-what-we-know/?utm_campaign=forbes&#038;utm_source=facebook&#038;utm_medium=social&#038;utm_term=Valerie/#76616c657269" rel="nofollow">https://www.forbes.com/sites/daveywinder/2020/09/29/what-caused-the-massive-microsoft-teams-office-365-outage-yesterday-heres-what-we-know/?utm_campaign=forbes&#038;utm_source=facebook&#038;utm_medium=social&#038;utm_term=Valerie/#76616c657269</a></p>
<p>Cloud-based Microsoft applications, including Microsoft Teams, went down across a swathe of the U.S. yesterday.</p>
<p>Users of Microsoft Office 365, Outlook, Exchange, Sharepoint, OneDrive and Azure also reported they were unable to login. Instead, they were presented with a &#8220;transient error&#8221; message informing them there was a problem signing them in.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/09/01/cyber-security-news-september-2020/comment-page-5/#comment-1693449</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 30 Sep 2020 07:07:00 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186709#comment-1693449</guid>
		<description><![CDATA[Bleeping Computer: Swiss watchmaker Swatch shuts down IT systems to stop cyberattack &gt; 
https://www.bleepingcomputer.com/news/security/swiss-watchmaker-swatch-shuts-down-it-systems-to-stop-cyberattack/]]></description>
		<content:encoded><![CDATA[<p>Bleeping Computer: Swiss watchmaker Swatch shuts down IT systems to stop cyberattack &gt;<br />
<a href="https://www.bleepingcomputer.com/news/security/swiss-watchmaker-swatch-shuts-down-it-systems-to-stop-cyberattack/" rel="nofollow">https://www.bleepingcomputer.com/news/security/swiss-watchmaker-swatch-shuts-down-it-systems-to-stop-cyberattack/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/09/01/cyber-security-news-september-2020/comment-page-5/#comment-1693438</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 30 Sep 2020 06:22:29 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186709#comment-1693438</guid>
		<description><![CDATA[China-Linked &#039;BlackTech&#039; Hackers Start Targeting U.S.
https://www.securityweek.com/china-linked-blacktech-hackers-start-targeting-us

The China-linked BlackTech cyber-spies have adopted new malicious tools in recent attacks, and they have started targeting the United States, Symantec security researchers revealed on Tuesday.

Also referred to as Palmerworm, the hacking group is believed to have been active since at least 2013. The campaign analyzed by Symantec ran from August 2019 until as recently as August 2020, and it targeted organizations in construction, electronics, engineering, media, and finance in Japan, Taiwan, the U.S., and China. The threat actor was previously known to target East Asia.]]></description>
		<content:encoded><![CDATA[<p>China-Linked &#8216;BlackTech&#8217; Hackers Start Targeting U.S.<br />
<a href="https://www.securityweek.com/china-linked-blacktech-hackers-start-targeting-us" rel="nofollow">https://www.securityweek.com/china-linked-blacktech-hackers-start-targeting-us</a></p>
<p>The China-linked BlackTech cyber-spies have adopted new malicious tools in recent attacks, and they have started targeting the United States, Symantec security researchers revealed on Tuesday.</p>
<p>Also referred to as Palmerworm, the hacking group is believed to have been active since at least 2013. The campaign analyzed by Symantec ran from August 2019 until as recently as August 2020, and it targeted organizations in construction, electronics, engineering, media, and finance in Japan, Taiwan, the U.S., and China. The threat actor was previously known to target East Asia.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/09/01/cyber-security-news-september-2020/comment-page-5/#comment-1693423</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 30 Sep 2020 05:52:39 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186709#comment-1693423</guid>
		<description><![CDATA[Suspicious logins reported after ransomware attack on US govt
contractor
https://www.zdnet.com/article/suspicious-logins-rats-reported-after-ransomware-attack-on-us-govt-contractor/
Ransomware attack on Tyler Technologies is looking worse by the day.
Customers of Tyler Technologies, one of the biggest software providers
for the US state and federal government, are reporting finding
suspicious logins and previously unseen remote access tools (RATs) on
their networks and servers.]]></description>
		<content:encoded><![CDATA[<p>Suspicious logins reported after ransomware attack on US govt<br />
contractor<br />
<a href="https://www.zdnet.com/article/suspicious-logins-rats-reported-after-ransomware-attack-on-us-govt-contractor/" rel="nofollow">https://www.zdnet.com/article/suspicious-logins-rats-reported-after-ransomware-attack-on-us-govt-contractor/</a><br />
Ransomware attack on Tyler Technologies is looking worse by the day.<br />
Customers of Tyler Technologies, one of the biggest software providers<br />
for the US state and federal government, are reporting finding<br />
suspicious logins and previously unseen remote access tools (RATs) on<br />
their networks and servers.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/09/01/cyber-security-news-september-2020/comment-page-5/#comment-1693419</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 30 Sep 2020 05:51:30 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186709#comment-1693419</guid>
		<description><![CDATA[Logistics giant CMA CGM goes offline to block malware attack
https://www.bleepingcomputer.com/news/security/logistics-giant-cma-cgm-goes-offline-to-block-malware-attack/
CMA CGM S.A., a French maritime transport and logistics giant, today
disclosed a malware attack affecting some servers on the edge of its
network. The attack forced CMA CGM&#039;s IT teams to cut Internet access
to some applications to block the malware from spreading to other
network devices.]]></description>
		<content:encoded><![CDATA[<p>Logistics giant CMA CGM goes offline to block malware attack<br />
<a href="https://www.bleepingcomputer.com/news/security/logistics-giant-cma-cgm-goes-offline-to-block-malware-attack/" rel="nofollow">https://www.bleepingcomputer.com/news/security/logistics-giant-cma-cgm-goes-offline-to-block-malware-attack/</a><br />
CMA CGM S.A., a French maritime transport and logistics giant, today<br />
disclosed a malware attack affecting some servers on the edge of its<br />
network. The attack forced CMA CGM&#8217;s IT teams to cut Internet access<br />
to some applications to block the malware from spreading to other<br />
network devices.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/09/01/cyber-security-news-september-2020/comment-page-5/#comment-1693418</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 30 Sep 2020 05:50:59 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186709#comment-1693418</guid>
		<description><![CDATA[REvil ransomware deposits $1 million in hacker recruitment drive
https://www.bleepingcomputer.com/news/security/revil-ransomware-deposits-1-million-in-hacker-recruitment-drive/
The REvil Ransomware (Sodinokibi) operation has deposited $1 million
in bitcoins on a Russian-speaking hacker forum to prove to potential
affiliates that they mean business. also:
https://nakedsecurity.sophos.com/2020/09/28/revil-ransomware-crew-dangles-1000000-cybercrime-carrot/]]></description>
		<content:encoded><![CDATA[<p>REvil ransomware deposits $1 million in hacker recruitment drive<br />
<a href="https://www.bleepingcomputer.com/news/security/revil-ransomware-deposits-1-million-in-hacker-recruitment-drive/" rel="nofollow">https://www.bleepingcomputer.com/news/security/revil-ransomware-deposits-1-million-in-hacker-recruitment-drive/</a><br />
The REvil Ransomware (Sodinokibi) operation has deposited $1 million<br />
in bitcoins on a Russian-speaking hacker forum to prove to potential<br />
affiliates that they mean business. also:<br />
<a href="https://nakedsecurity.sophos.com/2020/09/28/revil-ransomware-crew-dangles-1000000-cybercrime-carrot/" rel="nofollow">https://nakedsecurity.sophos.com/2020/09/28/revil-ransomware-crew-dangles-1000000-cybercrime-carrot/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/09/01/cyber-security-news-september-2020/comment-page-5/#comment-1693417</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 30 Sep 2020 05:50:44 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186709#comment-1693417</guid>
		<description><![CDATA[UK, US hospital computers are down, early unofficial diagnosis is a
suspected outbreak of Ryuk ransomware
https://www.theregister.com/2020/09/28/united_health_services_ransomware/
We&#039;ve switched to back-up offline procedures, says Universal Health
Services. Universal Health Services, which operates over 400 hospitals
and healthcare facilities in the US, Puerto Rico, and the UK, said on
Monday that its IT network was offline due to an unspecified
cybersecurity issue.]]></description>
		<content:encoded><![CDATA[<p>UK, US hospital computers are down, early unofficial diagnosis is a<br />
suspected outbreak of Ryuk ransomware<br />
<a href="https://www.theregister.com/2020/09/28/united_health_services_ransomware/" rel="nofollow">https://www.theregister.com/2020/09/28/united_health_services_ransomware/</a><br />
We&#8217;ve switched to back-up offline procedures, says Universal Health<br />
Services. Universal Health Services, which operates over 400 hospitals<br />
and healthcare facilities in the US, Puerto Rico, and the UK, said on<br />
Monday that its IT network was offline due to an unspecified<br />
cybersecurity issue.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
