<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security news August 2021</title>
	<atom:link href="http://www.epanorama.net/blog/2021/08/01/cyber-security-news-august-2021/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2021/08/01/cyber-security-news-august-2021/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Wed, 22 Apr 2026 22:06:23 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Jaqueline</title>
		<link>https://www.epanorama.net/blog/2021/08/01/cyber-security-news-august-2021/comment-page-7/#comment-1770561</link>
		<dc:creator><![CDATA[Jaqueline]]></dc:creator>
		<pubDate>Thu, 02 Jun 2022 10:44:14 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=189269#comment-1770561</guid>
		<description><![CDATA[Thank you for the information.]]></description>
		<content:encoded><![CDATA[<p>Thank you for the information.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/08/01/cyber-security-news-august-2021/comment-page-7/#comment-1723389</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 04 Sep 2021 11:38:21 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=189269#comment-1723389</guid>
		<description><![CDATA[T-Mobile customers are left feeling frustrated as hacker comes forward, calling the company&#039;s security &#039;awful&#039;
https://www.businessinsider.com/t-mobile-customers-frustrated-hacker-says-security-is-awful-2021-8]]></description>
		<content:encoded><![CDATA[<p>T-Mobile customers are left feeling frustrated as hacker comes forward, calling the company&#8217;s security &#8216;awful&#8217;<br />
<a href="https://www.businessinsider.com/t-mobile-customers-frustrated-hacker-says-security-is-awful-2021-8" rel="nofollow">https://www.businessinsider.com/t-mobile-customers-frustrated-hacker-says-security-is-awful-2021-8</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/08/01/cyber-security-news-august-2021/comment-page-7/#comment-1723024</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 01 Sep 2021 03:18:44 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=189269#comment-1723024</guid>
		<description><![CDATA[Unprecedented surveillance bill rushed through parliament in 24 hours.
https://tutanota.com/blog/posts/australia-surveillance-bill/

Australian police can now hack your device, collect or delete your data, take over your social media accounts - all without a judge&#039;s warrant.

The Australian government has been moving towards a surveillance state for some years already. Now they are putting the nail in the coffin with an unprecedented surveillance bill that allows the police to hack your device, collect or delete your data, and take over your social media accounts; without sufficient safeguards to prevent abuse of these new powers.]]></description>
		<content:encoded><![CDATA[<p>Unprecedented surveillance bill rushed through parliament in 24 hours.<br />
<a href="https://tutanota.com/blog/posts/australia-surveillance-bill/" rel="nofollow">https://tutanota.com/blog/posts/australia-surveillance-bill/</a></p>
<p>Australian police can now hack your device, collect or delete your data, take over your social media accounts &#8211; all without a judge&#8217;s warrant.</p>
<p>The Australian government has been moving towards a surveillance state for some years already. Now they are putting the nail in the coffin with an unprecedented surveillance bill that allows the police to hack your device, collect or delete your data, and take over your social media accounts; without sufficient safeguards to prevent abuse of these new powers.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/08/01/cyber-security-news-august-2021/comment-page-7/#comment-1723018</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 31 Aug 2021 20:02:22 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=189269#comment-1723018</guid>
		<description><![CDATA[https://www.forbes.com/sites/thomasbrewster/2021/08/31/google-dragnets-on-phone-data-across-13-kenosha-protest-arsons/
Jennifer Lynch, a lawyer at the Electronic Frontier Foundation (EFF), tweeted that hundreds of lawful protesters likely had their Google phone data handed to federal investigators as a result of the Kenosha investigations.]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.forbes.com/sites/thomasbrewster/2021/08/31/google-dragnets-on-phone-data-across-13-kenosha-protest-arsons/" rel="nofollow">https://www.forbes.com/sites/thomasbrewster/2021/08/31/google-dragnets-on-phone-data-across-13-kenosha-protest-arsons/</a><br />
Jennifer Lynch, a lawyer at the Electronic Frontier Foundation (EFF), tweeted that hundreds of lawful protesters likely had their Google phone data handed to federal investigators as a result of the Kenosha investigations.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/08/01/cyber-security-news-august-2021/comment-page-7/#comment-1722981</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 31 Aug 2021 09:54:28 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=189269#comment-1722981</guid>
		<description><![CDATA[https://hackaday.com/2021/08/27/this-week-in-security-through-the-mouse-hole-zoom-rce-and-defeating-defender/

Researchers from Sector 7, part of Computest, pulled off an impressive hack at Pwn2Own, achieving an RCE via the Zoom client. The caveat is that the attacker has to be accepted as a contact, either manually, or through being in the same organization. The central vulnerability is CVE-2021-30480, a heap buffer overflow

Citizen Lab has released an outside review of Amnesty International’s work on the NSO Group’s Pegasus Spyware program. 

Long-term Windows Defender Bypass

The research group, APTortellini has published their guide to defeating Windows Defender. A few commenters on this particular write-up scoffed at the first step, elevating to SYSTEM. You might even wonder, what’s the point if you’ve already compromised a machine to the point of being root? Getting SYSTEM access is only the beginning for an actual malicious campaign. This research is all about how to nullify Windows Defender without actually disabling it.

The first thing to know is that modern Windows systems have adopted quite a few elements from Unix, with the Windows legacy stuff bolted on top. To make that point clear, note that a Windows 10 C: drive is actually located at \Device\HarddiskVolumeX, with a series of symbolic links to make the C: notation work. One of those links is \SystemRoot, which by default points to \Device\BootDevice\Windows. Even for SYSTEM, that link can’t be modified, but it can be deleted and recreated. That particular path happens to be part of where Windows Defender looks to load its back-end driver, WdFilter.sys.]]></description>
		<content:encoded><![CDATA[<p><a href="https://hackaday.com/2021/08/27/this-week-in-security-through-the-mouse-hole-zoom-rce-and-defeating-defender/" rel="nofollow">https://hackaday.com/2021/08/27/this-week-in-security-through-the-mouse-hole-zoom-rce-and-defeating-defender/</a></p>
<p>Researchers from Sector 7, part of Computest, pulled off an impressive hack at Pwn2Own, achieving an RCE via the Zoom client. The caveat is that the attacker has to be accepted as a contact, either manually, or through being in the same organization. The central vulnerability is CVE-2021-30480, a heap buffer overflow</p>
<p>Citizen Lab has released an outside review of Amnesty International’s work on the NSO Group’s Pegasus Spyware program. </p>
<p>Long-term Windows Defender Bypass</p>
<p>The research group, APTortellini has published their guide to defeating Windows Defender. A few commenters on this particular write-up scoffed at the first step, elevating to SYSTEM. You might even wonder, what’s the point if you’ve already compromised a machine to the point of being root? Getting SYSTEM access is only the beginning for an actual malicious campaign. This research is all about how to nullify Windows Defender without actually disabling it.</p>
<p>The first thing to know is that modern Windows systems have adopted quite a few elements from Unix, with the Windows legacy stuff bolted on top. To make that point clear, note that a Windows 10 C: drive is actually located at \Device\HarddiskVolumeX, with a series of symbolic links to make the C: notation work. One of those links is \SystemRoot, which by default points to \Device\BootDevice\Windows. Even for SYSTEM, that link can’t be modified, but it can be deleted and recreated. That particular path happens to be part of where Windows Defender looks to load its back-end driver, WdFilter.sys.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/08/01/cyber-security-news-august-2021/comment-page-7/#comment-1722963</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 31 Aug 2021 08:21:56 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=189269#comment-1722963</guid>
		<description><![CDATA[Apple NeuralHash algorithm collision demo (easily generate pictures that are falsely detected as child porn)  

https://news.ycombinator.com/item?id=28305394]]></description>
		<content:encoded><![CDATA[<p>Apple NeuralHash algorithm collision demo (easily generate pictures that are falsely detected as child porn)  </p>
<p><a href="https://news.ycombinator.com/item?id=28305394" rel="nofollow">https://news.ycombinator.com/item?id=28305394</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/08/01/cyber-security-news-august-2021/comment-page-7/#comment-1722951</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 31 Aug 2021 07:53:55 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=189269#comment-1722951</guid>
		<description><![CDATA[CISA, Microsoft Issue Guidance on Recent Azure Cosmos DB Vulnerability
https://www.securityweek.com/cisa-microsoft-issue-guidance-recent-azure-cosmos-db-vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday issued an alert urging enterprises to address a newly disclosed vulnerability in Microsoft Azure Cosmos DB as soon as possible.

Referred to as ChaosDB, the security hole was publicly disclosed last week by researchers with the cloud security firm Wiz. Microsoft had been notified of the issue roughly one week before, and immediately took the necessary steps to address it.

Residing in the Jupyter Notebook feature of Cosmos DB, the bug could have been exploited to obtain valid credentials that would have allowed for the takeover of Cosmos DB accounts, with full administrative rights.]]></description>
		<content:encoded><![CDATA[<p>CISA, Microsoft Issue Guidance on Recent Azure Cosmos DB Vulnerability<br />
<a href="https://www.securityweek.com/cisa-microsoft-issue-guidance-recent-azure-cosmos-db-vulnerability" rel="nofollow">https://www.securityweek.com/cisa-microsoft-issue-guidance-recent-azure-cosmos-db-vulnerability</a></p>
<p>The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday issued an alert urging enterprises to address a newly disclosed vulnerability in Microsoft Azure Cosmos DB as soon as possible.</p>
<p>Referred to as ChaosDB, the security hole was publicly disclosed last week by researchers with the cloud security firm Wiz. Microsoft had been notified of the issue roughly one week before, and immediately took the necessary steps to address it.</p>
<p>Residing in the Jupyter Notebook feature of Cosmos DB, the bug could have been exploited to obtain valid credentials that would have allowed for the takeover of Cosmos DB accounts, with full administrative rights.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/08/01/cyber-security-news-august-2021/comment-page-7/#comment-1722950</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 31 Aug 2021 07:52:41 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=189269#comment-1722950</guid>
		<description><![CDATA[Exploitation of Flaws in Delta Energy Management System Could Have &#039;Dire Consequences&#039;
https://www.securityweek.com/exploitation-flaws-delta-energy-management-system-could-have-dire-consequences

An industrial energy management system made by Delta Electronics is affected by several vulnerabilities whose exploitation could have serious consequences in a real world environment, according to the researcher who discovered the flaws.

The existence of the vulnerabilities affecting Delta’s DIAEnergie product was disclosed last week by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the researcher who identified them, Michael Heinzl.

The security holes were reported to the vendor, through CISA, in April, but they have yet to be patched. CISA says patches are expected to become available on September 15. In the meantime, organizations using the affected product have been advised to implement mitigations to reduce the risk of exploitation.

DIAEnergie vulnerabilitiesHeinzl told SecurityWeek that the eight DIAEnergie vulnerabilities disclosed last week are just some of the issues he reported to the vendor. The remaining flaws will be disclosed at a later date.

https://awesec.com/advisories.html]]></description>
		<content:encoded><![CDATA[<p>Exploitation of Flaws in Delta Energy Management System Could Have &#8216;Dire Consequences&#8217;<br />
<a href="https://www.securityweek.com/exploitation-flaws-delta-energy-management-system-could-have-dire-consequences" rel="nofollow">https://www.securityweek.com/exploitation-flaws-delta-energy-management-system-could-have-dire-consequences</a></p>
<p>An industrial energy management system made by Delta Electronics is affected by several vulnerabilities whose exploitation could have serious consequences in a real world environment, according to the researcher who discovered the flaws.</p>
<p>The existence of the vulnerabilities affecting Delta’s DIAEnergie product was disclosed last week by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the researcher who identified them, Michael Heinzl.</p>
<p>The security holes were reported to the vendor, through CISA, in April, but they have yet to be patched. CISA says patches are expected to become available on September 15. In the meantime, organizations using the affected product have been advised to implement mitigations to reduce the risk of exploitation.</p>
<p>DIAEnergie vulnerabilitiesHeinzl told SecurityWeek that the eight DIAEnergie vulnerabilities disclosed last week are just some of the issues he reported to the vendor. The remaining flaws will be disclosed at a later date.</p>
<p><a href="https://awesec.com/advisories.html" rel="nofollow">https://awesec.com/advisories.html</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/08/01/cyber-security-news-august-2021/comment-page-7/#comment-1722948</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 31 Aug 2021 07:51:29 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=189269#comment-1722948</guid>
		<description><![CDATA[T-Mobile Hack Involved Exposed Router, Specialized Tools and Brute Force Attacks
https://www.securityweek.com/t-mobile-hack-involved-exposed-router-specialized-tools-and-brute-force-attacks

American Living in Turkey Takes Credit for T-Mobile Hack 

T-Mobile’s CEO and an individual who claims to be behind the recent hacking of the mobile carrier’s systems have shared some information about how the attack was carried out.

In a statement issued on Friday, Mike Sievert, CEO of T-Mobile, said that while the company’s investigation into the incident was “substantially complete,” he could not share too many technical details due to the criminal investigation conducted by law enforcement. He did, however, share a high-level summary of the attack.

“What we can share is that, in simplest terms, the bad actor leveraged their knowledge of technical systems, along with specialized tools and capabilities, to gain access to our testing environments and then used brute force attacks and other methods to make their way into other IT servers that included customer data,” he said. “In short, this individual’s intent was to break in and steal data, and they succeeded.”]]></description>
		<content:encoded><![CDATA[<p>T-Mobile Hack Involved Exposed Router, Specialized Tools and Brute Force Attacks<br />
<a href="https://www.securityweek.com/t-mobile-hack-involved-exposed-router-specialized-tools-and-brute-force-attacks" rel="nofollow">https://www.securityweek.com/t-mobile-hack-involved-exposed-router-specialized-tools-and-brute-force-attacks</a></p>
<p>American Living in Turkey Takes Credit for T-Mobile Hack </p>
<p>T-Mobile’s CEO and an individual who claims to be behind the recent hacking of the mobile carrier’s systems have shared some information about how the attack was carried out.</p>
<p>In a statement issued on Friday, Mike Sievert, CEO of T-Mobile, said that while the company’s investigation into the incident was “substantially complete,” he could not share too many technical details due to the criminal investigation conducted by law enforcement. He did, however, share a high-level summary of the attack.</p>
<p>“What we can share is that, in simplest terms, the bad actor leveraged their knowledge of technical systems, along with specialized tools and capabilities, to gain access to our testing environments and then used brute force attacks and other methods to make their way into other IT servers that included customer data,” he said. “In short, this individual’s intent was to break in and steal data, and they succeeded.”</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/08/01/cyber-security-news-august-2021/comment-page-6/#comment-1722947</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 31 Aug 2021 07:50:00 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=189269#comment-1722947</guid>
		<description><![CDATA[New Mirai Variant Targets WebSVN Command Injection Vulnerability
(CVE-2021-32305)
https://unit42.paloaltonetworks.com/cve-2021-32305-websvn/
We have observed exploits in the wild for a recently disclosed command injection vulnerability affecting WebSVN, an open-source web application for browsing source code. The critical command injection vulnerability was discovered and patched in May 2021. A proof of concept was released and within a week, on June 26, 2021, attackers exploited the vulnerability to deploy variants of the Mirai DDoS malware. We strongly recommend that WebSVN users upgrade to the latest software version.]]></description>
		<content:encoded><![CDATA[<p>New Mirai Variant Targets WebSVN Command Injection Vulnerability<br />
(CVE-2021-32305)<br />
<a href="https://unit42.paloaltonetworks.com/cve-2021-32305-websvn/" rel="nofollow">https://unit42.paloaltonetworks.com/cve-2021-32305-websvn/</a><br />
We have observed exploits in the wild for a recently disclosed command injection vulnerability affecting WebSVN, an open-source web application for browsing source code. The critical command injection vulnerability was discovered and patched in May 2021. A proof of concept was released and within a week, on June 26, 2021, attackers exploited the vulnerability to deploy variants of the Mirai DDoS malware. We strongly recommend that WebSVN users upgrade to the latest software version.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
