<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security news February 2021</title>
	<atom:link href="http://www.epanorama.net/blog/2021/02/01/cyber-security-news-february-2021/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2021/02/01/cyber-security-news-february-2021/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Sun, 05 Apr 2026 18:35:45 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: túi lọc bụi</title>
		<link>https://www.epanorama.net/blog/2021/02/01/cyber-security-news-february-2021/comment-page-7/#comment-1705538</link>
		<dc:creator><![CDATA[túi lọc bụi]]></dc:creator>
		<pubDate>Tue, 09 Mar 2021 08:11:30 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=187694#comment-1705538</guid>
		<description><![CDATA[This article is extremely quality from the content to the image, hope you will continue to share it in the coming time. Thank you and respect you very much.]]></description>
		<content:encoded><![CDATA[<p>This article is extremely quality from the content to the image, hope you will continue to share it in the coming time. Thank you and respect you very much.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/02/01/cyber-security-news-february-2021/comment-page-7/#comment-1705045</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 02 Mar 2021 18:14:32 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=187694#comment-1705045</guid>
		<description><![CDATA[Chinese hackers cloned attack tool belonging to NSA’s Equation Group
Updated: The Jian tool was used to exploit a Windows zero-day vulnerability years before a patch was issued.
https://www.zdnet.com/article/chinese-hackers-cloned-attack-tools-belonging-to-nsas-equation-group/?ftag=COS-05-10aaa0h&amp;utm_campaign=trueAnthem%3A+Trending+Content&amp;utm_medium=trueAnthem&amp;utm_source=facebook]]></description>
		<content:encoded><![CDATA[<p>Chinese hackers cloned attack tool belonging to NSA’s Equation Group<br />
Updated: The Jian tool was used to exploit a Windows zero-day vulnerability years before a patch was issued.<br />
<a href="https://www.zdnet.com/article/chinese-hackers-cloned-attack-tools-belonging-to-nsas-equation-group/?ftag=COS-05-10aaa0h&#038;utm_campaign=trueAnthem%3A+Trending+Content&#038;utm_medium=trueAnthem&#038;utm_source=facebook" rel="nofollow">https://www.zdnet.com/article/chinese-hackers-cloned-attack-tools-belonging-to-nsas-equation-group/?ftag=COS-05-10aaa0h&#038;utm_campaign=trueAnthem%3A+Trending+Content&#038;utm_medium=trueAnthem&#038;utm_source=facebook</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/02/01/cyber-security-news-february-2021/comment-page-7/#comment-1705003</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 02 Mar 2021 12:24:35 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=187694#comment-1705003</guid>
		<description><![CDATA[Home › SCADA / ICS
Unprotected Private Key Allows Remote Hacking of Rockwell Controllers
By Eduard Kovacs on February 26, 2021
https://www.securityweek.com/unprotected-private-key-allows-remote-hacking-rockwell-controllers

Industrial organizations have been warned this week that a critical authentication bypass vulnerability can allow hackers to remotely compromise programmable logic controllers (PLCs) made by industrial automation giant Rockwell Automation.

The vulnerability, tracked as CVE-2021-22681 with a CVSS score of 10, was independently reported to Rockwell by researchers at the Soonchunhyang University in South Korea, Kaspersky, and industrial cybersecurity firm Claroty.]]></description>
		<content:encoded><![CDATA[<p>Home › SCADA / ICS<br />
Unprotected Private Key Allows Remote Hacking of Rockwell Controllers<br />
By Eduard Kovacs on February 26, 2021<br />
<a href="https://www.securityweek.com/unprotected-private-key-allows-remote-hacking-rockwell-controllers" rel="nofollow">https://www.securityweek.com/unprotected-private-key-allows-remote-hacking-rockwell-controllers</a></p>
<p>Industrial organizations have been warned this week that a critical authentication bypass vulnerability can allow hackers to remotely compromise programmable logic controllers (PLCs) made by industrial automation giant Rockwell Automation.</p>
<p>The vulnerability, tracked as CVE-2021-22681 with a CVSS score of 10, was independently reported to Rockwell by researchers at the Soonchunhyang University in South Korea, Kaspersky, and industrial cybersecurity firm Claroty.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/02/01/cyber-security-news-february-2021/comment-page-7/#comment-1704868</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 01 Mar 2021 08:45:10 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=187694#comment-1704868</guid>
		<description><![CDATA[SHAREit fixes security bugs in app with 1 billion download
https://www.bleepingcomputer.com/news/security/shareit-fixes-security-bugs-in-app-with-1-billion-downloads/
Singapore-based Smart Media4U Technology said today that it fixed
SHAREit vulnerabilities that may have allowed attackers to execute
arbitrary code remotely on users&#039; devices. The security bugs impact
the company&#039;s SHAREit Android app, an application that downloaded more
than 1 billion times, according to Google Play Store statistics.]]></description>
		<content:encoded><![CDATA[<p>SHAREit fixes security bugs in app with 1 billion download<br />
<a href="https://www.bleepingcomputer.com/news/security/shareit-fixes-security-bugs-in-app-with-1-billion-downloads/" rel="nofollow">https://www.bleepingcomputer.com/news/security/shareit-fixes-security-bugs-in-app-with-1-billion-downloads/</a><br />
Singapore-based Smart Media4U Technology said today that it fixed<br />
SHAREit vulnerabilities that may have allowed attackers to execute<br />
arbitrary code remotely on users&#8217; devices. The security bugs impact<br />
the company&#8217;s SHAREit Android app, an application that downloaded more<br />
than 1 billion times, according to Google Play Store statistics.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/02/01/cyber-security-news-february-2021/comment-page-7/#comment-1704867</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 01 Mar 2021 08:44:42 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=187694#comment-1704867</guid>
		<description><![CDATA[Python programming language hurries out update to tackle remote code
vulnerability
https://www.zdnet.com/article/python-programming-language-hurries-out-update-to-tackle-remote-code-vulnerability
The Python Software Foundation (PSF) has rushed out Python 3.9.2 and
3.8.8 to address two notable security flaws, including one that is
remotely exploitable but in practical terms can only be used to knock
a machine offline.]]></description>
		<content:encoded><![CDATA[<p>Python programming language hurries out update to tackle remote code<br />
vulnerability<br />
<a href="https://www.zdnet.com/article/python-programming-language-hurries-out-update-to-tackle-remote-code-vulnerability" rel="nofollow">https://www.zdnet.com/article/python-programming-language-hurries-out-update-to-tackle-remote-code-vulnerability</a><br />
The Python Software Foundation (PSF) has rushed out Python 3.9.2 and<br />
3.8.8 to address two notable security flaws, including one that is<br />
remotely exploitable but in practical terms can only be used to knock<br />
a machine offline.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/02/01/cyber-security-news-february-2021/comment-page-7/#comment-1704864</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 01 Mar 2021 08:43:44 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=187694#comment-1704864</guid>
		<description><![CDATA[Jian The Chinese Double-edged Cyber Sword
https://blog.checkpoint.com/2021/02/22/jian-the-chinese-double-edged-cyber-sword/
In the last few months, Check Point Research (CPR) focused on recent
Windows Local Privilege Escalation (LPE) exploits attributed to
Chinese actors. An LPE is used by attackers to acquire Administrator
rights on a Windows machine. During this investigation, our malware
and vulnerability researchers managed to unravel the hidden story and
origins behind &quot;Jian&quot;, an exploit that was previously attributed to
the Chinese-affiliated attack group named APT31 (Zirconium)]]></description>
		<content:encoded><![CDATA[<p>Jian The Chinese Double-edged Cyber Sword<br />
<a href="https://blog.checkpoint.com/2021/02/22/jian-the-chinese-double-edged-cyber-sword/" rel="nofollow">https://blog.checkpoint.com/2021/02/22/jian-the-chinese-double-edged-cyber-sword/</a><br />
In the last few months, Check Point Research (CPR) focused on recent<br />
Windows Local Privilege Escalation (LPE) exploits attributed to<br />
Chinese actors. An LPE is used by attackers to acquire Administrator<br />
rights on a Windows machine. During this investigation, our malware<br />
and vulnerability researchers managed to unravel the hidden story and<br />
origins behind &#8220;Jian&#8221;, an exploit that was previously attributed to<br />
the Chinese-affiliated attack group named APT31 (Zirconium)</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/02/01/cyber-security-news-february-2021/comment-page-7/#comment-1704863</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 01 Mar 2021 08:42:54 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=187694#comment-1704863</guid>
		<description><![CDATA[Google shares PoC exploit for critical Windows 10 Graphics RCE bug
https://www.bleepingcomputer.com/news/security/google-shares-poc-exploit-for-critical-windows-10-graphics-rce-bug/
Project Zero, Google&#039;s 0day bug-hunting team, shared technical details
and proof-of-concept (PoC) exploit code for a critical remote code
execution (RCE) bug affecting a Windows graphics component.. They
reported the bug to the Microsoft Security Response Center in
November. The company released security updates to address it on all
vulnerable platforms on February 9, during this month&#039;s Patch Tuesday.]]></description>
		<content:encoded><![CDATA[<p>Google shares PoC exploit for critical Windows 10 Graphics RCE bug<br />
<a href="https://www.bleepingcomputer.com/news/security/google-shares-poc-exploit-for-critical-windows-10-graphics-rce-bug/" rel="nofollow">https://www.bleepingcomputer.com/news/security/google-shares-poc-exploit-for-critical-windows-10-graphics-rce-bug/</a><br />
Project Zero, Google&#8217;s 0day bug-hunting team, shared technical details<br />
and proof-of-concept (PoC) exploit code for a critical remote code<br />
execution (RCE) bug affecting a Windows graphics component.. They<br />
reported the bug to the Microsoft Security Response Center in<br />
November. The company released security updates to address it on all<br />
vulnerable platforms on February 9, during this month&#8217;s Patch Tuesday.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/02/01/cyber-security-news-february-2021/comment-page-7/#comment-1704862</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 01 Mar 2021 08:42:31 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=187694#comment-1704862</guid>
		<description><![CDATA[Microsoft fixes Windows 10 drive corruption bug  what you need to know
https://www.bleepingcomputer.com/news/microsoft/microsoft-fixes-windows-10-drive-corruption-bug-what-you-need-to-know/
With this week&#039;s release of Windows 10 Insider build 21322, Microsoft
has included an undocumented fix that prevents the path from being
accessed.]]></description>
		<content:encoded><![CDATA[<p>Microsoft fixes Windows 10 drive corruption bug  what you need to know<br />
<a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-fixes-windows-10-drive-corruption-bug-what-you-need-to-know/" rel="nofollow">https://www.bleepingcomputer.com/news/microsoft/microsoft-fixes-windows-10-drive-corruption-bug-what-you-need-to-know/</a><br />
With this week&#8217;s release of Windows 10 Insider build 21322, Microsoft<br />
has included an undocumented fix that prevents the path from being<br />
accessed.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/02/01/cyber-security-news-february-2021/comment-page-7/#comment-1704861</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 01 Mar 2021 08:42:15 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=187694#comment-1704861</guid>
		<description><![CDATA[https://www.forbes.com/sites/thomasbrewster/2021/02/25/exclusive-hackers-break-into-biochemical-systems-at-oxford-uni-lab-studying-covid-19/
Oxford University confirmed on Thursday it had detected and isolated
an incident at the Division of Structural Biology (known as Strubi)
after Forbes disclosed that hackers were showing off access to a
number of systems. These included machines used to prepare biochemical
samples, though the university said it couldnt comment further on the
scale of the breach. It has contacted the . National Cyber Security
Center (NCSC), a branch of the British intelligence agency GCHQ, which
will now investigate the attack.. The crew, according to [Hold
Security&#039;s Alex] Holden, is highly sophisticated and has been
privately selling stolen data from a number of its victims, and has
previously sold to advanced persistent threat groups, a term for
nation-state-backed hackers. He noted that the hackers spoke
Portuguese. Some of the groups other victims include Brazilian
universities, Holden added, and they also . use ransomware to extort
some victims.]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.forbes.com/sites/thomasbrewster/2021/02/25/exclusive-hackers-break-into-biochemical-systems-at-oxford-uni-lab-studying-covid-19/" rel="nofollow">https://www.forbes.com/sites/thomasbrewster/2021/02/25/exclusive-hackers-break-into-biochemical-systems-at-oxford-uni-lab-studying-covid-19/</a><br />
Oxford University confirmed on Thursday it had detected and isolated<br />
an incident at the Division of Structural Biology (known as Strubi)<br />
after Forbes disclosed that hackers were showing off access to a<br />
number of systems. These included machines used to prepare biochemical<br />
samples, though the university said it couldnt comment further on the<br />
scale of the breach. It has contacted the . National Cyber Security<br />
Center (NCSC), a branch of the British intelligence agency GCHQ, which<br />
will now investigate the attack.. The crew, according to [Hold<br />
Security's Alex] Holden, is highly sophisticated and has been<br />
privately selling stolen data from a number of its victims, and has<br />
previously sold to advanced persistent threat groups, a term for<br />
nation-state-backed hackers. He noted that the hackers spoke<br />
Portuguese. Some of the groups other victims include Brazilian<br />
universities, Holden added, and they also . use ransomware to extort<br />
some victims.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/02/01/cyber-security-news-february-2021/comment-page-7/#comment-1704858</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 01 Mar 2021 08:40:20 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=187694#comment-1704858</guid>
		<description><![CDATA[Former SolarWinds CEO blames intern for &#039;solarwinds123&#039; password leak
https://edition.cnn.com/2021/02/26/politics/solarwinds123-password-intern/
The researcher who discovered the leaked password, Vinoth Kumar,
previously told CNN that before the company corrected the issue in
November 2019, the password had been accessible online since at least
June 2018.. Emails between Kumar and SolarWinds showed that the leaked
password allowed Kumar to log in and successfully deposit files on the
company&#039;s server. Using that tactic, Kumar warned the company, any
hacker could upload malicious programs to SolarWinds.]]></description>
		<content:encoded><![CDATA[<p>Former SolarWinds CEO blames intern for &#8216;solarwinds123&#8242; password leak<br />
<a href="https://edition.cnn.com/2021/02/26/politics/solarwinds123-password-intern/" rel="nofollow">https://edition.cnn.com/2021/02/26/politics/solarwinds123-password-intern/</a><br />
The researcher who discovered the leaked password, Vinoth Kumar,<br />
previously told CNN that before the company corrected the issue in<br />
November 2019, the password had been accessible online since at least<br />
June 2018.. Emails between Kumar and SolarWinds showed that the leaked<br />
password allowed Kumar to log in and successfully deposit files on the<br />
company&#8217;s server. Using that tactic, Kumar warned the company, any<br />
hacker could upload malicious programs to SolarWinds.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
