<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber Security News October 2020</title>
	<atom:link href="http://www.epanorama.net/blog/2020/10/01/cyber-security-news-october-2020/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2020/10/01/cyber-security-news-october-2020/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Tue, 14 Apr 2026 22:35:42 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: rọ túi lọc</title>
		<link>https://www.epanorama.net/blog/2020/10/01/cyber-security-news-october-2020/comment-page-5/#comment-1701156</link>
		<dc:creator><![CDATA[rọ túi lọc]]></dc:creator>
		<pubDate>Fri, 15 Jan 2021 09:04:03 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186828#comment-1701156</guid>
		<description><![CDATA[The article is very good, the content and accompanying images are also of good quality, I read and feel very helpful, I hope that I can read more articles in the future, respect you and thank you. .]]></description>
		<content:encoded><![CDATA[<p>The article is very good, the content and accompanying images are also of good quality, I read and feel very helpful, I hope that I can read more articles in the future, respect you and thank you. .</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/10/01/cyber-security-news-october-2020/comment-page-5/#comment-1696628</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 01 Nov 2020 20:10:57 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186828#comment-1696628</guid>
		<description><![CDATA[https://news.sophos.com/en-us/2020/10/13/top-reason-to-apply-october-2020s-microsoft-patches-ping-of-death-redux/]]></description>
		<content:encoded><![CDATA[<p><a href="https://news.sophos.com/en-us/2020/10/13/top-reason-to-apply-october-2020s-microsoft-patches-ping-of-death-redux/" rel="nofollow">https://news.sophos.com/en-us/2020/10/13/top-reason-to-apply-october-2020s-microsoft-patches-ping-of-death-redux/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/10/01/cyber-security-news-october-2020/comment-page-5/#comment-1696541</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 01 Nov 2020 16:51:48 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186828#comment-1696541</guid>
		<description><![CDATA[Google’s Project Zero discloses Windows 0day that’s been under active exploit
Security flaw lets attackers escape sandboxes designed to contain malicious code.
https://arstechnica.com/information-technology/2020/10/googles-project-zero-discloses-windows-0day-thats-been-under-active-exploit/]]></description>
		<content:encoded><![CDATA[<p>Google’s Project Zero discloses Windows 0day that’s been under active exploit<br />
Security flaw lets attackers escape sandboxes designed to contain malicious code.<br />
<a href="https://arstechnica.com/information-technology/2020/10/googles-project-zero-discloses-windows-0day-thats-been-under-active-exploit/" rel="nofollow">https://arstechnica.com/information-technology/2020/10/googles-project-zero-discloses-windows-0day-thats-been-under-active-exploit/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/10/01/cyber-security-news-october-2020/comment-page-5/#comment-1696389</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 31 Oct 2020 14:01:47 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186828#comment-1696389</guid>
		<description><![CDATA[Over 100,000 machines remain vulnerable to SMBGhost exploitation
https://www.welivesecurity.com/2020/10/29/over-100000-machines-remain-vulnerable-smbghost-exploitation/

The patch for the critical flaw that allows malware to spread across machines without any user interaction was released months ago

Although Microsoft issued a patch for the critical SMBGhost vulnerability in the Server Message Block (SMB) protocol back in March, over 100,000 machines remain susceptible to attacks exploiting the flaw. This wormable Remote Code Execution (RCE) vulnerability could allow black hats to spread malware across machines without any need for user interaction.

The severity of the bug affecting Windows 10 and Windows Server (versions 1903 and 1909) should have convinced everybody to patch their machines immediately. However, according to Jan Kopriva, who disclosed his findings on the SANS ISC Infosec Forums, that doesn’t seem to be the case.]]></description>
		<content:encoded><![CDATA[<p>Over 100,000 machines remain vulnerable to SMBGhost exploitation<br />
<a href="https://www.welivesecurity.com/2020/10/29/over-100000-machines-remain-vulnerable-smbghost-exploitation/" rel="nofollow">https://www.welivesecurity.com/2020/10/29/over-100000-machines-remain-vulnerable-smbghost-exploitation/</a></p>
<p>The patch for the critical flaw that allows malware to spread across machines without any user interaction was released months ago</p>
<p>Although Microsoft issued a patch for the critical SMBGhost vulnerability in the Server Message Block (SMB) protocol back in March, over 100,000 machines remain susceptible to attacks exploiting the flaw. This wormable Remote Code Execution (RCE) vulnerability could allow black hats to spread malware across machines without any need for user interaction.</p>
<p>The severity of the bug affecting Windows 10 and Windows Server (versions 1903 and 1909) should have convinced everybody to patch their machines immediately. However, according to Jan Kopriva, who disclosed his findings on the SANS ISC Infosec Forums, that doesn’t seem to be the case.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/10/01/cyber-security-news-october-2020/comment-page-5/#comment-1696375</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 31 Oct 2020 07:09:52 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186828#comment-1696375</guid>
		<description><![CDATA[Vandana Verma: why do we need psychologists in the infosecurity?
https://cybernews.com/editorial/vandana-verma-why-do-we-need-psychologists-in-the-infosecurity/?utm_source=facebook&amp;utm_medium=cpc&amp;utm_campaign=rm&amp;utm_content=vandana_verma&amp;fbclid=IwAR2T6btdBFPMghjKR3Nm0B6Ip601_ogTRGro_ELdl0-vs4Hkr7Ala3klAq0

Vandana Verma, an IBM security architect, believes in diversity in the infosecurity field. By diversity, she means including not only more women but also people of different races, ages, or educational backgrounds, as well as people with disabilities.

“Growing up, I didn’t know that cybersecurity was a career,” Vandana Verma once said. Now, she is an IBM security engineer, founder of InfosecGirls, the only woman on The OWASP Foundation Global Board, and a keynote speaker at various conferences.]]></description>
		<content:encoded><![CDATA[<p>Vandana Verma: why do we need psychologists in the infosecurity?<br />
<a href="https://cybernews.com/editorial/vandana-verma-why-do-we-need-psychologists-in-the-infosecurity/?utm_source=facebook&#038;utm_medium=cpc&#038;utm_campaign=rm&#038;utm_content=vandana_verma&#038;fbclid=IwAR2T6btdBFPMghjKR3Nm0B6Ip601_ogTRGro_ELdl0-vs4Hkr7Ala3klAq0" rel="nofollow">https://cybernews.com/editorial/vandana-verma-why-do-we-need-psychologists-in-the-infosecurity/?utm_source=facebook&#038;utm_medium=cpc&#038;utm_campaign=rm&#038;utm_content=vandana_verma&#038;fbclid=IwAR2T6btdBFPMghjKR3Nm0B6Ip601_ogTRGro_ELdl0-vs4Hkr7Ala3klAq0</a></p>
<p>Vandana Verma, an IBM security architect, believes in diversity in the infosecurity field. By diversity, she means including not only more women but also people of different races, ages, or educational backgrounds, as well as people with disabilities.</p>
<p>“Growing up, I didn’t know that cybersecurity was a career,” Vandana Verma once said. Now, she is an IBM security engineer, founder of InfosecGirls, the only woman on The OWASP Foundation Global Board, and a keynote speaker at various conferences.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/10/01/cyber-security-news-october-2020/comment-page-5/#comment-1696363</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 30 Oct 2020 22:00:34 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186828#comment-1696363</guid>
		<description><![CDATA[https://www.bleepingcomputer.com/news/security/hpe-fixes-maximum-severity-remote-auth-bypass-bug-in-ssmc-console/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.bleepingcomputer.com/news/security/hpe-fixes-maximum-severity-remote-auth-bypass-bug-in-ssmc-console/" rel="nofollow">https://www.bleepingcomputer.com/news/security/hpe-fixes-maximum-severity-remote-auth-bypass-bug-in-ssmc-console/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/10/01/cyber-security-news-october-2020/comment-page-5/#comment-1696349</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 30 Oct 2020 21:43:15 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186828#comment-1696349</guid>
		<description><![CDATA[New Attack Exfiltrates Sensitive Data From Voice Assistants Using &quot;Inaudible&quot; Telephone Calls
https://www.hackster.io/news/new-attack-exfiltrates-sensitive-data-from-voice-assistants-using-inaudible-telephone-calls-38c750dd5ae4

By encoding data as DTMF tones and then modulating them to inaudible frequencies, an Alexa becomes an unwitting carrier for stolen data.]]></description>
		<content:encoded><![CDATA[<p>New Attack Exfiltrates Sensitive Data From Voice Assistants Using &#8220;Inaudible&#8221; Telephone Calls<br />
<a href="https://www.hackster.io/news/new-attack-exfiltrates-sensitive-data-from-voice-assistants-using-inaudible-telephone-calls-38c750dd5ae4" rel="nofollow">https://www.hackster.io/news/new-attack-exfiltrates-sensitive-data-from-voice-assistants-using-inaudible-telephone-calls-38c750dd5ae4</a></p>
<p>By encoding data as DTMF tones and then modulating them to inaudible frequencies, an Alexa becomes an unwitting carrier for stolen data.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/10/01/cyber-security-news-october-2020/comment-page-5/#comment-1696338</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 30 Oct 2020 21:28:14 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186828#comment-1696338</guid>
		<description><![CDATA[Google reveals a new Windows zero-day bug it says is under active attack
https://techcrunch.com/2020/10/30/google-microsoft-windows-bug-attack/?tpcc=ECFB2020&amp;fbclid=IwAR1aUOaNGGnKLhDwgzuzrJs5a5NjCjD9QuBJIvcuV74c5ZrdhtqONBz-fUc]]></description>
		<content:encoded><![CDATA[<p>Google reveals a new Windows zero-day bug it says is under active attack<br />
<a href="https://techcrunch.com/2020/10/30/google-microsoft-windows-bug-attack/?tpcc=ECFB2020&#038;fbclid=IwAR1aUOaNGGnKLhDwgzuzrJs5a5NjCjD9QuBJIvcuV74c5ZrdhtqONBz-fUc" rel="nofollow">https://techcrunch.com/2020/10/30/google-microsoft-windows-bug-attack/?tpcc=ECFB2020&#038;fbclid=IwAR1aUOaNGGnKLhDwgzuzrJs5a5NjCjD9QuBJIvcuV74c5ZrdhtqONBz-fUc</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/10/01/cyber-security-news-october-2020/comment-page-5/#comment-1696311</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 30 Oct 2020 16:41:56 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186828#comment-1696311</guid>
		<description><![CDATA[Microsoft said on Wednesday that it detected and worked to stop a series of cyberattacks from the threat actor Phosphorous masquerading as conference organizers to target more than 100 high-profile individuals.

Iran-linked actor targeted international security conference, Microsoft says
https://cybernews.com/news/microsoft-detects-cyberattacks-from-iran-linked-actor/?utm_source=facebook&amp;utm_medium=cpc&amp;utm_campaign=rm&amp;utm_content=microsoft_cyberattacks&amp;fbclid=IwAR1i5kAs7lOTAUOxPZw8oNVYQAlelMpvaeCvhyv1rj3JGqHpJf3zTxJ3wFI]]></description>
		<content:encoded><![CDATA[<p>Microsoft said on Wednesday that it detected and worked to stop a series of cyberattacks from the threat actor Phosphorous masquerading as conference organizers to target more than 100 high-profile individuals.</p>
<p>Iran-linked actor targeted international security conference, Microsoft says<br />
<a href="https://cybernews.com/news/microsoft-detects-cyberattacks-from-iran-linked-actor/?utm_source=facebook&#038;utm_medium=cpc&#038;utm_campaign=rm&#038;utm_content=microsoft_cyberattacks&#038;fbclid=IwAR1i5kAs7lOTAUOxPZw8oNVYQAlelMpvaeCvhyv1rj3JGqHpJf3zTxJ3wFI" rel="nofollow">https://cybernews.com/news/microsoft-detects-cyberattacks-from-iran-linked-actor/?utm_source=facebook&#038;utm_medium=cpc&#038;utm_campaign=rm&#038;utm_content=microsoft_cyberattacks&#038;fbclid=IwAR1i5kAs7lOTAUOxPZw8oNVYQAlelMpvaeCvhyv1rj3JGqHpJf3zTxJ3wFI</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2020/10/01/cyber-security-news-october-2020/comment-page-5/#comment-1696305</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 30 Oct 2020 15:25:09 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=186828#comment-1696305</guid>
		<description><![CDATA[Why the extortion of Vastaamo matters far beyond Finland — and how cyber pros are responding
https://www.cyberscoop.com/finland-vastaamo-hack-response/]]></description>
		<content:encoded><![CDATA[<p>Why the extortion of Vastaamo matters far beyond Finland — and how cyber pros are responding<br />
<a href="https://www.cyberscoop.com/finland-vastaamo-hack-response/" rel="nofollow">https://www.cyberscoop.com/finland-vastaamo-hack-response/</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
