<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security news July 2021</title>
	<atom:link href="http://www.epanorama.net/blog/2021/07/01/cyber-security-news-july-2021/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2021/07/01/cyber-security-news-july-2021/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Mon, 20 Apr 2026 05:05:07 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/07/01/cyber-security-news-july-2021/comment-page-5/#comment-1720368</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 02 Aug 2021 18:23:10 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=189137#comment-1720368</guid>
		<description><![CDATA[Security News This Week: The Top 30 Vulnerabilities Include Plenty of Usual Suspects
Plus: A sneaky iOS app, a wiper attack in Iran, and more of the week’s top security news.
0https://www.wired.com/story/top-vulnerabilities-russia-nso-group-iran-security-news/]]></description>
		<content:encoded><![CDATA[<p>Security News This Week: The Top 30 Vulnerabilities Include Plenty of Usual Suspects<br />
Plus: A sneaky iOS app, a wiper attack in Iran, and more of the week’s top security news.<br />
0https://www.wired.com/story/top-vulnerabilities-russia-nso-group-iran-security-news/</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/07/01/cyber-security-news-july-2021/comment-page-5/#comment-1720311</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 02 Aug 2021 04:16:34 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=189137#comment-1720311</guid>
		<description><![CDATA[A new technique uses a simplified process of  DLL hijacking and mock directories to bypass Windows 10&#039;s UAC security feature and run elevated commands without alerting a user.

Windows UAC is a protection mechanism introduced in Windows Vista and above, which asks the user to confirm if they wish to run a high-risk application before it is executed.

https://www.bleepingcomputer.com/news/security/bypassing-windows-10-uac-with-mock-folders-and-dll-hijacking/]]></description>
		<content:encoded><![CDATA[<p>A new technique uses a simplified process of  DLL hijacking and mock directories to bypass Windows 10&#8242;s UAC security feature and run elevated commands without alerting a user.</p>
<p>Windows UAC is a protection mechanism introduced in Windows Vista and above, which asks the user to confirm if they wish to run a high-risk application before it is executed.</p>
<p><a href="https://www.bleepingcomputer.com/news/security/bypassing-windows-10-uac-with-mock-folders-and-dll-hijacking/" rel="nofollow">https://www.bleepingcomputer.com/news/security/bypassing-windows-10-uac-with-mock-folders-and-dll-hijacking/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/07/01/cyber-security-news-july-2021/comment-page-5/#comment-1720159</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 31 Jul 2021 20:19:17 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=189137#comment-1720159</guid>
		<description><![CDATA[740 ransomware victims named on data leak sites in Q2 2021: report
Digital Shadows&#039; Q2 ransomware report highlighted that the number of victims posted to data leak sites increased by 47% compared to Q1.
https://www.zdnet.com/article/740-ransomware-victims-named-on-data-leak-sites-in-q2-2021-report/]]></description>
		<content:encoded><![CDATA[<p>740 ransomware victims named on data leak sites in Q2 2021: report<br />
Digital Shadows&#8217; Q2 ransomware report highlighted that the number of victims posted to data leak sites increased by 47% compared to Q1.<br />
<a href="https://www.zdnet.com/article/740-ransomware-victims-named-on-data-leak-sites-in-q2-2021-report/" rel="nofollow">https://www.zdnet.com/article/740-ransomware-victims-named-on-data-leak-sites-in-q2-2021-report/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/07/01/cyber-security-news-july-2021/comment-page-5/#comment-1720157</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 31 Jul 2021 20:17:37 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=189137#comment-1720157</guid>
		<description><![CDATA[https://www.thousandeyes.com/outages/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.thousandeyes.com/outages/" rel="nofollow">https://www.thousandeyes.com/outages/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/07/01/cyber-security-news-july-2021/comment-page-5/#comment-1720150</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 31 Jul 2021 20:11:16 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=189137#comment-1720150</guid>
		<description><![CDATA[Stratospheric Balloons Take Monitoring and Surveillance to New Heights These eyes in the sky fly above drones and below satellites
https://spectrum.ieee.org/stratospheric-balloons-take-monitoring-and-surveillance-to-new-heights]]></description>
		<content:encoded><![CDATA[<p>Stratospheric Balloons Take Monitoring and Surveillance to New Heights These eyes in the sky fly above drones and below satellites<br />
<a href="https://spectrum.ieee.org/stratospheric-balloons-take-monitoring-and-surveillance-to-new-heights" rel="nofollow">https://spectrum.ieee.org/stratospheric-balloons-take-monitoring-and-surveillance-to-new-heights</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/07/01/cyber-security-news-july-2021/comment-page-5/#comment-1720147</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 31 Jul 2021 20:07:27 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=189137#comment-1720147</guid>
		<description><![CDATA[https://9to5mac.com/2021/07/22/youtuber-sends-airtag-to-tim-cook-and-apple-returns-it-with-a-letter/]]></description>
		<content:encoded><![CDATA[<p><a href="https://9to5mac.com/2021/07/22/youtuber-sends-airtag-to-tim-cook-and-apple-returns-it-with-a-letter/" rel="nofollow">https://9to5mac.com/2021/07/22/youtuber-sends-airtag-to-tim-cook-and-apple-returns-it-with-a-letter/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/07/01/cyber-security-news-july-2021/comment-page-5/#comment-1720146</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 31 Jul 2021 20:07:00 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=189137#comment-1720146</guid>
		<description><![CDATA[Hackers abuse single bit change in Intel CPU register to evade detection
Palo Alto Networks discovers that Trap Flag is being abused to notify malware it is being analyzed
https://www.itpro.co.uk/security/malware/360299/hackers-use-single-bit-change-in-intel-cpu-register-to-evade-detection]]></description>
		<content:encoded><![CDATA[<p>Hackers abuse single bit change in Intel CPU register to evade detection<br />
Palo Alto Networks discovers that Trap Flag is being abused to notify malware it is being analyzed<br />
<a href="https://www.itpro.co.uk/security/malware/360299/hackers-use-single-bit-change-in-intel-cpu-register-to-evade-detection" rel="nofollow">https://www.itpro.co.uk/security/malware/360299/hackers-use-single-bit-change-in-intel-cpu-register-to-evade-detection</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/07/01/cyber-security-news-july-2021/comment-page-5/#comment-1720109</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 31 Jul 2021 10:18:17 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=189137#comment-1720109</guid>
		<description><![CDATA[SolarWinds hackers accessed over two dozen federal prosecutors&#039; offices: DOJ
https://thehill.com/policy/cybersecurity/565751-doj-says-solarwinds-hackers-accessed-over-two-dozen-prosecutors-offices

The Department of Justice (DOJ) said Friday that the hackers behind the major SolarWinds attack compromised employee accounts in more than two dozen federal prosecutors’ offices.

The DOJ said in an update that the hackers are believed to have compromised the accounts from May 7 to Dec. 27, 2020. The data includes “all sent, received, and stored emails and attachments found within those accounts during that time.”

In total, hackers gained access to “one or more employees’ ” emails in 27 office across 15 states and the District of Columbia, the DOJ said Friday.

The hack, which was first discovered in December, involved Russian hackers exploiting software from IT group SolarWinds to gain access to about 18,000 customers, compromising nine federal agencies and 100 private-sector groups.

The incident is believed to be one of the largest cyber espionage attacks in U.S. history.]]></description>
		<content:encoded><![CDATA[<p>SolarWinds hackers accessed over two dozen federal prosecutors&#8217; offices: DOJ<br />
<a href="https://thehill.com/policy/cybersecurity/565751-doj-says-solarwinds-hackers-accessed-over-two-dozen-prosecutors-offices" rel="nofollow">https://thehill.com/policy/cybersecurity/565751-doj-says-solarwinds-hackers-accessed-over-two-dozen-prosecutors-offices</a></p>
<p>The Department of Justice (DOJ) said Friday that the hackers behind the major SolarWinds attack compromised employee accounts in more than two dozen federal prosecutors’ offices.</p>
<p>The DOJ said in an update that the hackers are believed to have compromised the accounts from May 7 to Dec. 27, 2020. The data includes “all sent, received, and stored emails and attachments found within those accounts during that time.”</p>
<p>In total, hackers gained access to “one or more employees’ ” emails in 27 office across 15 states and the District of Columbia, the DOJ said Friday.</p>
<p>The hack, which was first discovered in December, involved Russian hackers exploiting software from IT group SolarWinds to gain access to about 18,000 customers, compromising nine federal agencies and 100 private-sector groups.</p>
<p>The incident is believed to be one of the largest cyber espionage attacks in U.S. history.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/07/01/cyber-security-news-july-2021/comment-page-5/#comment-1720094</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 31 Jul 2021 09:03:46 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=189137#comment-1720094</guid>
		<description><![CDATA[Microsoft Warns of LemonDuck Malware Targeting Windows and Linux Systems
https://thehackernews.com/2021/07/microsoft-warns-of-lemonduck-malware.html

An infamous cross-platform crypto-mining malware has continued to refine and improve upon its techniques to strike both Windows and Linux operating systems by setting its sights on older vulnerabilities, while simultaneously latching on to a variety of spreading mechanisms to maximize the effectiveness of its campaigns.

&quot;LemonDuck, an actively updated and robust malware that&#039;s primarily known for its botnet and cryptocurrency mining objectives, followed the same trajectory when it adopted more sophisticated behavior and escalated its operations,&quot; Microsoft said in a technical write-up published last week. &quot;Today, beyond using resources for its traditional bot and mining activities, LemonDuck steals credentials, removes security controls, spreads via emails, moves laterally, and ultimately drops more tools for human-operated activity.&quot;]]></description>
		<content:encoded><![CDATA[<p>Microsoft Warns of LemonDuck Malware Targeting Windows and Linux Systems<br />
<a href="https://thehackernews.com/2021/07/microsoft-warns-of-lemonduck-malware.html" rel="nofollow">https://thehackernews.com/2021/07/microsoft-warns-of-lemonduck-malware.html</a></p>
<p>An infamous cross-platform crypto-mining malware has continued to refine and improve upon its techniques to strike both Windows and Linux operating systems by setting its sights on older vulnerabilities, while simultaneously latching on to a variety of spreading mechanisms to maximize the effectiveness of its campaigns.</p>
<p>&#8220;LemonDuck, an actively updated and robust malware that&#8217;s primarily known for its botnet and cryptocurrency mining objectives, followed the same trajectory when it adopted more sophisticated behavior and escalated its operations,&#8221; Microsoft said in a technical write-up published last week. &#8220;Today, beyond using resources for its traditional bot and mining activities, LemonDuck steals credentials, removes security controls, spreads via emails, moves laterally, and ultimately drops more tools for human-operated activity.&#8221;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/07/01/cyber-security-news-july-2021/comment-page-5/#comment-1720063</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 30 Jul 2021 21:46:13 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=189137#comment-1720063</guid>
		<description><![CDATA[https://wccftech.com/apple-demands-leaker-to-reveal-source-of-stolen-iphone-prototypes/]]></description>
		<content:encoded><![CDATA[<p><a href="https://wccftech.com/apple-demands-leaker-to-reveal-source-of-stolen-iphone-prototypes/" rel="nofollow">https://wccftech.com/apple-demands-leaker-to-reveal-source-of-stolen-iphone-prototypes/</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
