<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security news May 2021</title>
	<atom:link href="http://www.epanorama.net/blog/2021/05/01/cyber-security-news-may-2021/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2021/05/01/cyber-security-news-may-2021/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Wed, 22 Apr 2026 22:06:23 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/05/01/cyber-security-news-may-2021/comment-page-7/#comment-1714805</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 01 Jun 2021 08:02:35 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=188465#comment-1714805</guid>
		<description><![CDATA[Interpol Says 585 People Arrested in APAC Operation Against Cyber-Enabled Crime
https://www.securityweek.com/interpol-says-585-people-arrested-apac-operation-against-cyber-enabled-crime

Interpol revealed last week that specialized law enforcement officers in the Asia-Pacific (APAC) region intercepted more than $83 million in fraudulent money transfers as part of a six-month coordinated effort aimed at cyber-enabled financial crime.

Codenamed HAECHI-I, the operation mainly targeted five types of online financial crime: investment fraud, money laundering (from illegal online gaming), online sextortion, romance scams, and voice phishing (vishing).

The operation resulted in over 1,600 bank accounts worldwide being frozen as part of roughly 1,400 investigations opened between September 2020 and March 2021, with a total of 892 cases being solved.

As part of the effort, authorities arrested a total of 585 individuals, Interpol says.]]></description>
		<content:encoded><![CDATA[<p>Interpol Says 585 People Arrested in APAC Operation Against Cyber-Enabled Crime<br />
<a href="https://www.securityweek.com/interpol-says-585-people-arrested-apac-operation-against-cyber-enabled-crime" rel="nofollow">https://www.securityweek.com/interpol-says-585-people-arrested-apac-operation-against-cyber-enabled-crime</a></p>
<p>Interpol revealed last week that specialized law enforcement officers in the Asia-Pacific (APAC) region intercepted more than $83 million in fraudulent money transfers as part of a six-month coordinated effort aimed at cyber-enabled financial crime.</p>
<p>Codenamed HAECHI-I, the operation mainly targeted five types of online financial crime: investment fraud, money laundering (from illegal online gaming), online sextortion, romance scams, and voice phishing (vishing).</p>
<p>The operation resulted in over 1,600 bank accounts worldwide being frozen as part of roughly 1,400 investigations opened between September 2020 and March 2021, with a total of 892 cases being solved.</p>
<p>As part of the effort, authorities arrested a total of 585 individuals, Interpol says.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/05/01/cyber-security-news-may-2021/comment-page-7/#comment-1714803</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 01 Jun 2021 08:01:12 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=188465#comment-1714803</guid>
		<description><![CDATA[SonicWall Patches Command Injection Flaw in Firewall Management Application
https://www.securityweek.com/sonicwall-patches-command-injection-flaw-firewall-management-application]]></description>
		<content:encoded><![CDATA[<p>SonicWall Patches Command Injection Flaw in Firewall Management Application<br />
<a href="https://www.securityweek.com/sonicwall-patches-command-injection-flaw-firewall-management-application" rel="nofollow">https://www.securityweek.com/sonicwall-patches-command-injection-flaw-firewall-management-application</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/05/01/cyber-security-news-may-2021/comment-page-7/#comment-1714802</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 01 Jun 2021 08:00:57 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=188465#comment-1714802</guid>
		<description><![CDATA[Cybercriminals Target Companies With New &#039;Epsilon Red&#039; Ransomware
https://www.securityweek.com/cybercriminals-target-companies-new-epsilon-red-ransomware

A new piece of ransomware named Epsilon Red has been used to target at least one organization in the United States, and its operators have apparently already made a significant profit.

Cybersecurity firm Sophos reported last week that Epsilon Red operators have been spotted targeting a US-based company in the hospitality sector. The cryptocurrency address provided by the cybercriminals shows a bitcoin transaction for an amount worth roughly $210,000, which seems to indicate that at least one victim has agreed to pay the ransom demanded by the cybercriminals.

Sophos researchers noticed that the ransom note dropped by Epsilon Red is similar to the one displayed by the REvil ransomware, but Epsilon Red’s ransom note is better written — it does not contain some of the grammar errors in the REvil note.]]></description>
		<content:encoded><![CDATA[<p>Cybercriminals Target Companies With New &#8216;Epsilon Red&#8217; Ransomware<br />
<a href="https://www.securityweek.com/cybercriminals-target-companies-new-epsilon-red-ransomware" rel="nofollow">https://www.securityweek.com/cybercriminals-target-companies-new-epsilon-red-ransomware</a></p>
<p>A new piece of ransomware named Epsilon Red has been used to target at least one organization in the United States, and its operators have apparently already made a significant profit.</p>
<p>Cybersecurity firm Sophos reported last week that Epsilon Red operators have been spotted targeting a US-based company in the hospitality sector. The cryptocurrency address provided by the cybercriminals shows a bitcoin transaction for an amount worth roughly $210,000, which seems to indicate that at least one victim has agreed to pay the ransom demanded by the cybercriminals.</p>
<p>Sophos researchers noticed that the ransom note dropped by Epsilon Red is similar to the one displayed by the REvil ransomware, but Epsilon Red’s ransom note is better written — it does not contain some of the grammar errors in the REvil note.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/05/01/cyber-security-news-may-2021/comment-page-7/#comment-1714797</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 01 Jun 2021 07:52:06 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=188465#comment-1714797</guid>
		<description><![CDATA[CISA-FBI Alert: 350 Organizations Targeted in Attack Abusing Email Marketing Service
https://www.securityweek.com/cisa-fbi-alert-350-organizations-targeted-attack-abusing-email-marketing-service]]></description>
		<content:encoded><![CDATA[<p>CISA-FBI Alert: 350 Organizations Targeted in Attack Abusing Email Marketing Service<br />
<a href="https://www.securityweek.com/cisa-fbi-alert-350-organizations-targeted-attack-abusing-email-marketing-service" rel="nofollow">https://www.securityweek.com/cisa-fbi-alert-350-organizations-targeted-attack-abusing-email-marketing-service</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/05/01/cyber-security-news-may-2021/comment-page-7/#comment-1714781</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 01 Jun 2021 07:05:21 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=188465#comment-1714781</guid>
		<description><![CDATA[A New Bug in Siemens PLCs Could Let Hackers Run Malicious Code Remotely https://thehackernews.com/2021/05/a-new-bug-in-siemens-plcs-could-let.html
Siemens on Friday shipped firmware updates to address a severe vulnerability in SIMATIC S7-1200 and S7-1500 programmable logic controllers (PLCs) that could be exploited by a malicious actor to remotely gain access to protected areas of the memory and achieve unrestricted and undetected code execution, in what the researchers describe as an attacker&#039;s &quot;holy grail.&quot;]]></description>
		<content:encoded><![CDATA[<p>A New Bug in Siemens PLCs Could Let Hackers Run Malicious Code Remotely <a href="https://thehackernews.com/2021/05/a-new-bug-in-siemens-plcs-could-let.html" rel="nofollow">https://thehackernews.com/2021/05/a-new-bug-in-siemens-plcs-could-let.html</a><br />
Siemens on Friday shipped firmware updates to address a severe vulnerability in SIMATIC S7-1200 and S7-1500 programmable logic controllers (PLCs) that could be exploited by a malicious actor to remotely gain access to protected areas of the memory and achieve unrestricted and undetected code execution, in what the researchers describe as an attacker&#8217;s &#8220;holy grail.&#8221;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/05/01/cyber-security-news-may-2021/comment-page-7/#comment-1714780</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 01 Jun 2021 07:04:18 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=188465#comment-1714780</guid>
		<description><![CDATA[Your Amazon Devices to Automatically Share Your Wi-Fi With Neighbors https://thehackernews.com/2021/05/your-amazon-devices-to-automatically.html
Starting June 8, Amazon will automatically enable a feature on its family of hardware devices, including Echo speakers, Ring Video Doorbells, Ring Floodlight Cams, and Ring Spotlight Cams, that will share a small part of your Internet bandwidth with nearby neighbors unless you choose to opt-out.]]></description>
		<content:encoded><![CDATA[<p>Your Amazon Devices to Automatically Share Your Wi-Fi With Neighbors <a href="https://thehackernews.com/2021/05/your-amazon-devices-to-automatically.html" rel="nofollow">https://thehackernews.com/2021/05/your-amazon-devices-to-automatically.html</a><br />
Starting June 8, Amazon will automatically enable a feature on its family of hardware devices, including Echo speakers, Ring Video Doorbells, Ring Floodlight Cams, and Ring Spotlight Cams, that will share a small part of your Internet bandwidth with nearby neighbors unless you choose to opt-out.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/05/01/cyber-security-news-may-2021/comment-page-7/#comment-1714779</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 01 Jun 2021 07:03:48 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=188465#comment-1714779</guid>
		<description><![CDATA[US Army tells remote workers to switch off their IoT devices (and then withdraws advice) https://www.bitdefender.com/box/blog/iot-news/us-army-tells-remote-workers-switch-off-iot-devices-withdraws-advice/
The US Army appears to have made a strategic withdrawal from advice it issued to remote workers last week about their use of smart IoT devices. The message from the Army&#039;s Chief Information Officer Dr Raj Iyer on how to protect and safeguard Department of Defense data by making more efforts to mitigate data leaks was clear: Remove all IoT devices, with listening functions, from the work area. Furthermore, the initial announcement of the policy&#039;s existence has also been removed although a copy remains in a Google cache.]]></description>
		<content:encoded><![CDATA[<p>US Army tells remote workers to switch off their IoT devices (and then withdraws advice) <a href="https://www.bitdefender.com/box/blog/iot-news/us-army-tells-remote-workers-switch-off-iot-devices-withdraws-advice/" rel="nofollow">https://www.bitdefender.com/box/blog/iot-news/us-army-tells-remote-workers-switch-off-iot-devices-withdraws-advice/</a><br />
The US Army appears to have made a strategic withdrawal from advice it issued to remote workers last week about their use of smart IoT devices. The message from the Army&#8217;s Chief Information Officer Dr Raj Iyer on how to protect and safeguard Department of Defense data by making more efforts to mitigate data leaks was clear: Remove all IoT devices, with listening functions, from the work area. Furthermore, the initial announcement of the policy&#8217;s existence has also been removed although a copy remains in a Google cache.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/05/01/cyber-security-news-may-2021/comment-page-7/#comment-1714778</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 01 Jun 2021 07:03:30 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=188465#comment-1714778</guid>
		<description><![CDATA[Swedish Health Agency shuts down SmiNet after hacking attempts https://www.bleepingcomputer.com/news/security/swedish-health-agency-shuts-down-sminet-after-hacking-attempts/
The Swedish Public Health Agency (Folkhälsomyndigheten) has shut down SmiNet, the country&#039;s infectious diseases database, on Thursday after it was targeted in several hacking attempts. SmiNet, which is also used to store electronic reports with statistics on COVID-19 infections, was shut down on Thursday to investigate the attacks and was brought back online on Friday evening. While no evidence of unauthorized parties accessing sensitive information was found so far, the investigation will take at least a few more days until the reporting process will be restarted.]]></description>
		<content:encoded><![CDATA[<p>Swedish Health Agency shuts down SmiNet after hacking attempts <a href="https://www.bleepingcomputer.com/news/security/swedish-health-agency-shuts-down-sminet-after-hacking-attempts/" rel="nofollow">https://www.bleepingcomputer.com/news/security/swedish-health-agency-shuts-down-sminet-after-hacking-attempts/</a><br />
The Swedish Public Health Agency (Folkhälsomyndigheten) has shut down SmiNet, the country&#8217;s infectious diseases database, on Thursday after it was targeted in several hacking attempts. SmiNet, which is also used to store electronic reports with statistics on COVID-19 infections, was shut down on Thursday to investigate the attacks and was brought back online on Friday evening. While no evidence of unauthorized parties accessing sensitive information was found so far, the investigation will take at least a few more days until the reporting process will be restarted.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/05/01/cyber-security-news-may-2021/comment-page-7/#comment-1714777</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 01 Jun 2021 07:03:06 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=188465#comment-1714777</guid>
		<description><![CDATA[NSA spied on European politicians through Danish telecommunications hub https://therecord.media/nsa-spied-on-european-politicians-through-danish-telecommunications-hub/
Denmark&#039;s foreign secret service allowed the US National Security Agency to tap into a crucial internet and telecommunications hub in Denmark and spy on the communications of European politicians, a joint investigation by some of Europe&#039;s biggest news agencies revealed on Sunday. The covert spying operation, called Operation Dunhammer, took place between 2012 and 2014, based on a secret partnership signed by the two agencies.]]></description>
		<content:encoded><![CDATA[<p>NSA spied on European politicians through Danish telecommunications hub <a href="https://therecord.media/nsa-spied-on-european-politicians-through-danish-telecommunications-hub/" rel="nofollow">https://therecord.media/nsa-spied-on-european-politicians-through-danish-telecommunications-hub/</a><br />
Denmark&#8217;s foreign secret service allowed the US National Security Agency to tap into a crucial internet and telecommunications hub in Denmark and spy on the communications of European politicians, a joint investigation by some of Europe&#8217;s biggest news agencies revealed on Sunday. The covert spying operation, called Operation Dunhammer, took place between 2012 and 2014, based on a secret partnership signed by the two agencies.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/05/01/cyber-security-news-may-2021/comment-page-7/#comment-1714772</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 01 Jun 2021 04:59:38 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=188465#comment-1714772</guid>
		<description><![CDATA[https://thehackernews.com/2021/05/your-amazon-devices-to-automatically.html?m=1

Starting June 8, Amazon will automatically enable a feature on its family of hardware devices, including Echo speakers, Ring Video Doorbells, Ring Floodlight Cams, and Ring Spotlight Cams, that will share a small part of your Internet bandwidth with nearby neighbors — unless you choose to opt-out.

To that effect, the company intends to register all compatible devices that are operational in the U.S. into an ambitious location-tracking system called Sidewalk as it prepares to roll out the shared mesh network in the country.]]></description>
		<content:encoded><![CDATA[<p><a href="https://thehackernews.com/2021/05/your-amazon-devices-to-automatically.html?m=1" rel="nofollow">https://thehackernews.com/2021/05/your-amazon-devices-to-automatically.html?m=1</a></p>
<p>Starting June 8, Amazon will automatically enable a feature on its family of hardware devices, including Echo speakers, Ring Video Doorbells, Ring Floodlight Cams, and Ring Spotlight Cams, that will share a small part of your Internet bandwidth with nearby neighbors — unless you choose to opt-out.</p>
<p>To that effect, the company intends to register all compatible devices that are operational in the U.S. into an ambitious location-tracking system called Sidewalk as it prepares to roll out the shared mesh network in the country.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
