<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security news April 2021</title>
	<atom:link href="http://www.epanorama.net/blog/2021/04/01/cyber-security-news-april-2021/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2021/04/01/cyber-security-news-april-2021/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Wed, 22 Apr 2026 15:53:53 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: gemmalyly</title>
		<link>https://www.epanorama.net/blog/2021/04/01/cyber-security-news-april-2021/comment-page-6/#comment-1795039</link>
		<dc:creator><![CDATA[gemmalyly]]></dc:creator>
		<pubDate>Wed, 08 Feb 2023 08:13:02 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=188177#comment-1795039</guid>
		<description><![CDATA[The study by Trend Micro on cloud-based cryptocurrency mining reveals the groupings of bad actors active in this market &lt;a href=&quot;https://contextowordle.co&quot; rel=&quot;nofollow&quot;&gt;contexto&lt;/a&gt;, their continuing conflict over cloud resources, and the precise scope of their attacks.]]></description>
		<content:encoded><![CDATA[<p>The study by Trend Micro on cloud-based cryptocurrency mining reveals the groupings of bad actors active in this market <a href="https://contextowordle.co" rel="nofollow">contexto</a>, their continuing conflict over cloud resources, and the precise scope of their attacks.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: waffle game</title>
		<link>https://www.epanorama.net/blog/2021/04/01/cyber-security-news-april-2021/comment-page-6/#comment-1777459</link>
		<dc:creator><![CDATA[waffle game]]></dc:creator>
		<pubDate>Fri, 19 Aug 2022 06:41:37 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=188177#comment-1777459</guid>
		<description><![CDATA[The tips that the article gives have helped me a lot in my daily work. I&#039;m sure everyone will find it useful]]></description>
		<content:encoded><![CDATA[<p>The tips that the article gives have helped me a lot in my daily work. I&#8217;m sure everyone will find it useful</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/04/01/cyber-security-news-april-2021/comment-page-6/#comment-1710779</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 16 May 2021 08:17:53 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=188177#comment-1710779</guid>
		<description><![CDATA[A software bug let malware bypass macOS’ security defenses
https://techcrunch.com/2021/04/26/shlayer-mac-malware-macos-security/]]></description>
		<content:encoded><![CDATA[<p>A software bug let malware bypass macOS’ security defenses<br />
<a href="https://techcrunch.com/2021/04/26/shlayer-mac-malware-macos-security/" rel="nofollow">https://techcrunch.com/2021/04/26/shlayer-mac-malware-macos-security/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/04/01/cyber-security-news-april-2021/comment-page-6/#comment-1710778</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 16 May 2021 08:17:17 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=188177#comment-1710778</guid>
		<description><![CDATA[Hacker dumps sensitive household records of 250M Americans
https://www.hackread.com/hacker-dumps-household-records-of-americans/]]></description>
		<content:encoded><![CDATA[<p>Hacker dumps sensitive household records of 250M Americans<br />
<a href="https://www.hackread.com/hacker-dumps-household-records-of-americans/" rel="nofollow">https://www.hackread.com/hacker-dumps-household-records-of-americans/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/04/01/cyber-security-news-april-2021/comment-page-6/#comment-1710731</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 16 May 2021 06:51:51 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=188177#comment-1710731</guid>
		<description><![CDATA[https://www.bleepingcomputer.com/news/security/new-stealthy-linux-malware-used-to-backdoor-systems-for-years/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.bleepingcomputer.com/news/security/new-stealthy-linux-malware-used-to-backdoor-systems-for-years/" rel="nofollow">https://www.bleepingcomputer.com/news/security/new-stealthy-linux-malware-used-to-backdoor-systems-for-years/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/04/01/cyber-security-news-april-2021/comment-page-6/#comment-1709692</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 05 May 2021 07:14:22 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=188177#comment-1709692</guid>
		<description><![CDATA[What Cybersecurity Can Learn From Video Games
https://www.securityweek.com/what-cybersecurity-can-learn-video-games

The enterprise security world is complex and confusing where we want to believe in the possibility of clean linear solutions for asymmetrical problems. Learning from past history and our current challenges should be enough of a lesson in the failure of security processes and products not delivering in their attempts to make the day-to-day routine of security professional lives easier. Each year we see more vendors with technology solutions and buzzwords that rarely live up to their hype and customers willing to believe or gamble for the chance at more visibility, lower business risk, or the chance to close a security gap. 

Buzzword bingo

Let&#039;s go through some historical examples. 

&quot;Big Data&quot; has been a boon to cybersecurity from the aspect of providing the ability to aggregate and store voluminous and disparate data sets. Still, getting value from that stored data has been problematic. Storing data has become more trivial, but making sense of all that data still challenges us today.

&quot;Security Orchestration&quot; was supposed to be another savior of cybersecurity by automating away mundane tasks and supplementing security teams’ bandwidth to make the hard decisions easier. The reality is these solutions were too difficult to be implemented by most customers because their technical interfaces required more software engineering skills than security skills. This created more opportunities in the security services industry than in enterprise security, with MSPs being more than happy to provide python developers to their customers to make their expensive and unwieldy orchestration solution work.

&quot;ML/AI&quot; - don&#039;t even get me started. While there are hopeful pockets of activity in the security industry here, a good majority of security vendors are more interested in applying AI/ML-themed marketing sheens on the product rather than actually putting useful working ML/AI in the product. 

Video Games and Cybersecurity

&quot;Cloud Security&quot; suffered from rampantly fast public cloud adoption by businesses and left enterprise security teams, and vendors for that matter, in the familiar position of playing from behind. Enterprise security teams scrambled to catch up with their business counterparts in securing the gaps created by cloud adoption. Initial cloud security vendors rushed to market trying to provide products to address these gaps, but many ended up with a narrow focus on product functionality or fell into the trap of trying to support multiple cloud service providers, which diluted the offering or made it unable to scale.

There are more examples, of course, but regardless of the security gap trying to be filled by a solution, the attention paid to helping the human behind the keyboard with better design and usability has always been overshadowed by more and better technological solutions with the focus on detection, integration, automation, and other security product ‘check boxes’ to increase their revenue. 

Learning from outside cybersecurity

From a design and usability perspective, it’s important to understand what is happening outside of cybersecurity to learn valuable lessons which can be adapted for our purposes. If you look outside of the cybersecurity realm you’ll find many examples where design and usability are key to the success of the industry. 

Why is this important to enterprise security? If cybersecurity tools were less designed to look like Microsoft Office applications and more designed to enable the user would interest and engagement with the tool increase?

Another perspective to think about comes from academic researcher Lori Norton-Meier in a 2005 article where she said, &quot;The video game has the potential to push an individual to learn and think cognitively, socially, and morally. Players actively create new virtual worlds; participate in complex decision-making; and think reflectively about choices that were made, including the design of the game.”

Let us remove video game references and insert cybersecurity terms and see how it reads:“Cybersecurity has the potential to push an individual to learn and think cognitively, socially, and morally. Security teams actively investigate networks; participate in complex decision-making; and think reflectively about choices that were made, including the design for the defense of their network.”  

If someone told me the second quote, but not the first, I’d find the statement insightful. How much of this quote is relevant to:  

• What we expect of our more experienced enterprise security professionals, and 

• How we can better teach and upskill our less experienced enterprise security professionals?

Another perspective comes from a 2018 McAfee cybersecurity survey. Out of 300 managers and 650 security professionals, it was found that 92% believed skills fostered by video games -  such as tenacity, logic, and predicting hostile strategies - could make the gaming community an ideal, untapped reservoir of candidates for the current staffing shortages in enterprise security.]]></description>
		<content:encoded><![CDATA[<p>What Cybersecurity Can Learn From Video Games<br />
<a href="https://www.securityweek.com/what-cybersecurity-can-learn-video-games" rel="nofollow">https://www.securityweek.com/what-cybersecurity-can-learn-video-games</a></p>
<p>The enterprise security world is complex and confusing where we want to believe in the possibility of clean linear solutions for asymmetrical problems. Learning from past history and our current challenges should be enough of a lesson in the failure of security processes and products not delivering in their attempts to make the day-to-day routine of security professional lives easier. Each year we see more vendors with technology solutions and buzzwords that rarely live up to their hype and customers willing to believe or gamble for the chance at more visibility, lower business risk, or the chance to close a security gap. </p>
<p>Buzzword bingo</p>
<p>Let&#8217;s go through some historical examples. </p>
<p>&#8220;Big Data&#8221; has been a boon to cybersecurity from the aspect of providing the ability to aggregate and store voluminous and disparate data sets. Still, getting value from that stored data has been problematic. Storing data has become more trivial, but making sense of all that data still challenges us today.</p>
<p>&#8220;Security Orchestration&#8221; was supposed to be another savior of cybersecurity by automating away mundane tasks and supplementing security teams’ bandwidth to make the hard decisions easier. The reality is these solutions were too difficult to be implemented by most customers because their technical interfaces required more software engineering skills than security skills. This created more opportunities in the security services industry than in enterprise security, with MSPs being more than happy to provide python developers to their customers to make their expensive and unwieldy orchestration solution work.</p>
<p>&#8220;ML/AI&#8221; &#8211; don&#8217;t even get me started. While there are hopeful pockets of activity in the security industry here, a good majority of security vendors are more interested in applying AI/ML-themed marketing sheens on the product rather than actually putting useful working ML/AI in the product. </p>
<p>Video Games and Cybersecurity</p>
<p>&#8220;Cloud Security&#8221; suffered from rampantly fast public cloud adoption by businesses and left enterprise security teams, and vendors for that matter, in the familiar position of playing from behind. Enterprise security teams scrambled to catch up with their business counterparts in securing the gaps created by cloud adoption. Initial cloud security vendors rushed to market trying to provide products to address these gaps, but many ended up with a narrow focus on product functionality or fell into the trap of trying to support multiple cloud service providers, which diluted the offering or made it unable to scale.</p>
<p>There are more examples, of course, but regardless of the security gap trying to be filled by a solution, the attention paid to helping the human behind the keyboard with better design and usability has always been overshadowed by more and better technological solutions with the focus on detection, integration, automation, and other security product ‘check boxes’ to increase their revenue. </p>
<p>Learning from outside cybersecurity</p>
<p>From a design and usability perspective, it’s important to understand what is happening outside of cybersecurity to learn valuable lessons which can be adapted for our purposes. If you look outside of the cybersecurity realm you’ll find many examples where design and usability are key to the success of the industry. </p>
<p>Why is this important to enterprise security? If cybersecurity tools were less designed to look like Microsoft Office applications and more designed to enable the user would interest and engagement with the tool increase?</p>
<p>Another perspective to think about comes from academic researcher Lori Norton-Meier in a 2005 article where she said, &#8220;The video game has the potential to push an individual to learn and think cognitively, socially, and morally. Players actively create new virtual worlds; participate in complex decision-making; and think reflectively about choices that were made, including the design of the game.”</p>
<p>Let us remove video game references and insert cybersecurity terms and see how it reads:“Cybersecurity has the potential to push an individual to learn and think cognitively, socially, and morally. Security teams actively investigate networks; participate in complex decision-making; and think reflectively about choices that were made, including the design for the defense of their network.”  </p>
<p>If someone told me the second quote, but not the first, I’d find the statement insightful. How much of this quote is relevant to:  </p>
<p>• What we expect of our more experienced enterprise security professionals, and </p>
<p>• How we can better teach and upskill our less experienced enterprise security professionals?</p>
<p>Another perspective comes from a 2018 McAfee cybersecurity survey. Out of 300 managers and 650 security professionals, it was found that 92% believed skills fostered by video games &#8211;  such as tenacity, logic, and predicting hostile strategies &#8211; could make the gaming community an ideal, untapped reservoir of candidates for the current staffing shortages in enterprise security.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/04/01/cyber-security-news-april-2021/comment-page-6/#comment-1709691</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 05 May 2021 07:12:18 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=188177#comment-1709691</guid>
		<description><![CDATA[Qualys Flags Gaping Security Holes in Exim Mail Server
https://www.securityweek.com/qualys-flags-gaping-security-holes-exim-mail-server]]></description>
		<content:encoded><![CDATA[<p>Qualys Flags Gaping Security Holes in Exim Mail Server<br />
<a href="https://www.securityweek.com/qualys-flags-gaping-security-holes-exim-mail-server" rel="nofollow">https://www.securityweek.com/qualys-flags-gaping-security-holes-exim-mail-server</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/04/01/cyber-security-news-april-2021/comment-page-6/#comment-1709690</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 05 May 2021 07:12:01 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=188177#comment-1709690</guid>
		<description><![CDATA[Belgian Government, Parliament, Colleges Hit by Cyberattack
https://www.securityweek.com/belgian-government-parliament-colleges-hit-cyberattack

The company providing internet services for Belgium’s parliament, government agencies, universities and scientific institutions said Tuesday that its network was under cyberattack, with connections to several customers disrupted.

Belnet said in a statement the attack “is still in progress and takes place in successive waves. Our teams are working hard to mitigate them.” The company has around 200 customers.

Two hours later it said “the effect of the attack seems to be diminishing,” but provided no other details.]]></description>
		<content:encoded><![CDATA[<p>Belgian Government, Parliament, Colleges Hit by Cyberattack<br />
<a href="https://www.securityweek.com/belgian-government-parliament-colleges-hit-cyberattack" rel="nofollow">https://www.securityweek.com/belgian-government-parliament-colleges-hit-cyberattack</a></p>
<p>The company providing internet services for Belgium’s parliament, government agencies, universities and scientific institutions said Tuesday that its network was under cyberattack, with connections to several customers disrupted.</p>
<p>Belnet said in a statement the attack “is still in progress and takes place in successive waves. Our teams are working hard to mitigate them.” The company has around 200 customers.</p>
<p>Two hours later it said “the effect of the attack seems to be diminishing,” but provided no other details.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/04/01/cyber-security-news-april-2021/comment-page-6/#comment-1709689</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 05 May 2021 07:09:35 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=188177#comment-1709689</guid>
		<description><![CDATA[New Variant of Buer Malware Loader Written in Rust to Evade Detection
https://www.securityweek.com/new-variant-buer-malware-loader-written-rust-evade-detection

A new variant of the Buer malware loader has been detected, written in Rust. The original version is written in C. Rust is efficient, easy-to-use, and an increasingly popular programming language – Microsoft uses it, and joined the Rust Foundation in February 2021.

Researchers at Proofpoint identified the new variant in early April 2021, and named it RustyBuer. Like Buer, it works as a downloader to distribute other malware to compromised systems. The most likely reason for the development of a Rust variant is to evade anti-malware detections that are based on features of the malware written in C.]]></description>
		<content:encoded><![CDATA[<p>New Variant of Buer Malware Loader Written in Rust to Evade Detection<br />
<a href="https://www.securityweek.com/new-variant-buer-malware-loader-written-rust-evade-detection" rel="nofollow">https://www.securityweek.com/new-variant-buer-malware-loader-written-rust-evade-detection</a></p>
<p>A new variant of the Buer malware loader has been detected, written in Rust. The original version is written in C. Rust is efficient, easy-to-use, and an increasingly popular programming language – Microsoft uses it, and joined the Rust Foundation in February 2021.</p>
<p>Researchers at Proofpoint identified the new variant in early April 2021, and named it RustyBuer. Like Buer, it works as a downloader to distribute other malware to compromised systems. The most likely reason for the development of a Rust variant is to evade anti-malware detections that are based on features of the malware written in C.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/04/01/cyber-security-news-april-2021/comment-page-6/#comment-1709688</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 05 May 2021 07:08:54 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=188177#comment-1709688</guid>
		<description><![CDATA[Pulse Secure Ships Belated Fix for VPN Zero-Day
https://www.securityweek.com/pulse-secure-ships-belated-fix-vpn-zero-day

Embattled VPN technology vendor Pulse Secure on Monday updated an “out-of-cycle” advisory with patches for four major security vulnerabilities, including belated cover for an issue that’s already been exploited by advanced threat actors.

The most serious of the four issues — CVE-2021-22893 — covers multiple memory corruption flaws in the Pulse Connect Secure product that could allow remote, unauthenticated code execution attacks via license server web services.

When Pulse Secure released its initial advisory for the bug on April 20, FireEye reported seeing this and three other Pulse Secure VPN appliance vulnerabilities being exploited as an initial access vector by at least two sophisticated threat actors. The CVE-2021-22893 flaw was the only zero-day — the other three Pulse Secure vulnerabilities believed to have been used in these attacks (CVE-2019-11510, CVE-2020-8243 and CVE-2020-8260) were patched in 2019 and 2020. 

The attacks described at the time by FireEye were attributed to two threat groups: UNC2630, which targeted defense industrial base companies in the United States and which has been linked to the Chinese government and a group tracked as APT5; and UNC2717, which targeted global government agencies but which hasn’t been linked to any known threat group. 

FireEye has identified several new malware families associated with the exploitation of Pulse Secure VPN appliances. This malware includes trojans, backdoors and web shells tracked as SLOWPULSE, RADIALPULSE, THINBLOOD, ATRIUM, PACEMAKER, SLIGHTPULSE, PULSECHECK, HARDPULSE, QUIETPULSE, and PULSEJUMP.]]></description>
		<content:encoded><![CDATA[<p>Pulse Secure Ships Belated Fix for VPN Zero-Day<br />
<a href="https://www.securityweek.com/pulse-secure-ships-belated-fix-vpn-zero-day" rel="nofollow">https://www.securityweek.com/pulse-secure-ships-belated-fix-vpn-zero-day</a></p>
<p>Embattled VPN technology vendor Pulse Secure on Monday updated an “out-of-cycle” advisory with patches for four major security vulnerabilities, including belated cover for an issue that’s already been exploited by advanced threat actors.</p>
<p>The most serious of the four issues — CVE-2021-22893 — covers multiple memory corruption flaws in the Pulse Connect Secure product that could allow remote, unauthenticated code execution attacks via license server web services.</p>
<p>When Pulse Secure released its initial advisory for the bug on April 20, FireEye reported seeing this and three other Pulse Secure VPN appliance vulnerabilities being exploited as an initial access vector by at least two sophisticated threat actors. The CVE-2021-22893 flaw was the only zero-day — the other three Pulse Secure vulnerabilities believed to have been used in these attacks (CVE-2019-11510, CVE-2020-8243 and CVE-2020-8260) were patched in 2019 and 2020. </p>
<p>The attacks described at the time by FireEye were attributed to two threat groups: UNC2630, which targeted defense industrial base companies in the United States and which has been linked to the Chinese government and a group tracked as APT5; and UNC2717, which targeted global government agencies but which hasn’t been linked to any known threat group. </p>
<p>FireEye has identified several new malware families associated with the exploitation of Pulse Secure VPN appliances. This malware includes trojans, backdoors and web shells tracked as SLOWPULSE, RADIALPULSE, THINBLOOD, ATRIUM, PACEMAKER, SLIGHTPULSE, PULSECHECK, HARDPULSE, QUIETPULSE, and PULSEJUMP.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
