<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security news October 2021</title>
	<atom:link href="http://www.epanorama.net/blog/2021/10/01/cyber-security-news-october-2021/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2021/10/01/cyber-security-news-october-2021/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Thu, 23 Apr 2026 07:21:42 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/10/01/cyber-security-news-october-2021/comment-page-8/#comment-1740115</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 18 Nov 2021 05:49:11 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=189581#comment-1740115</guid>
		<description><![CDATA[https://www.securityinfowatch.com/video-surveillance/article/21243600/congress-passes-bill-banning-new-fcc-equipment-authorizations-for-hikvision-dahua-and-others]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.securityinfowatch.com/video-surveillance/article/21243600/congress-passes-bill-banning-new-fcc-equipment-authorizations-for-hikvision-dahua-and-others" rel="nofollow">https://www.securityinfowatch.com/video-surveillance/article/21243600/congress-passes-bill-banning-new-fcc-equipment-authorizations-for-hikvision-dahua-and-others</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/10/01/cyber-security-news-october-2021/comment-page-8/#comment-1734556</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 02 Nov 2021 06:34:51 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=189581#comment-1734556</guid>
		<description><![CDATA[Hackers Breach iOS 15, Windows 10, Google Chrome During Massive Cyber Security Onslaught
https://www.forbes.com/sites/daveywinder/2021/10/30/hackers-breach-ios-15-windows-10-google-chrome-during-massive-cyber-security-onslaught/]]></description>
		<content:encoded><![CDATA[<p>Hackers Breach iOS 15, Windows 10, Google Chrome During Massive Cyber Security Onslaught<br />
<a href="https://www.forbes.com/sites/daveywinder/2021/10/30/hackers-breach-ios-15-windows-10-google-chrome-during-massive-cyber-security-onslaught/" rel="nofollow">https://www.forbes.com/sites/daveywinder/2021/10/30/hackers-breach-ios-15-windows-10-google-chrome-during-massive-cyber-security-onslaught/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/10/01/cyber-security-news-october-2021/comment-page-8/#comment-1734255</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 01 Nov 2021 12:17:58 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=189581#comment-1734255</guid>
		<description><![CDATA[Massachusetts Health Network Hacked; Patient Info Exposed
https://www.securityweek.com/massachusetts-health-network-hacked-patient-info-exposed

A Worcester, Mass. health care network says someone hacked into its employee email system, potentially exposing the personal information of thousands of patients.

UMass Memorial Health notified patients earlier this month if their information was involved in the breach, which occurred between June 2020 and January. The personal data included Social Security numbers, insurance information and medical information, The Telegram &amp; Gazette reported Thursday.

More than 200,000 patients and health plan participants could have been affected by the breach, according to a federal database of cybersecurity incidents at medical facilities.]]></description>
		<content:encoded><![CDATA[<p>Massachusetts Health Network Hacked; Patient Info Exposed<br />
<a href="https://www.securityweek.com/massachusetts-health-network-hacked-patient-info-exposed" rel="nofollow">https://www.securityweek.com/massachusetts-health-network-hacked-patient-info-exposed</a></p>
<p>A Worcester, Mass. health care network says someone hacked into its employee email system, potentially exposing the personal information of thousands of patients.</p>
<p>UMass Memorial Health notified patients earlier this month if their information was involved in the breach, which occurred between June 2020 and January. The personal data included Social Security numbers, insurance information and medical information, The Telegram &amp; Gazette reported Thursday.</p>
<p>More than 200,000 patients and health plan participants could have been affected by the breach, according to a federal database of cybersecurity incidents at medical facilities.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/10/01/cyber-security-news-october-2021/comment-page-8/#comment-1734254</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 01 Nov 2021 12:17:27 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=189581#comment-1734254</guid>
		<description><![CDATA[Shrootless: macOS Vulnerability Found by Microsoft Allows Rootkit Installation
https://www.securityweek.com/shrootless-macos-vulnerability-found-microsoft-allows-rootkit-installation]]></description>
		<content:encoded><![CDATA[<p>Shrootless: macOS Vulnerability Found by Microsoft Allows Rootkit Installation<br />
<a href="https://www.securityweek.com/shrootless-macos-vulnerability-found-microsoft-allows-rootkit-installation" rel="nofollow">https://www.securityweek.com/shrootless-macos-vulnerability-found-microsoft-allows-rootkit-installation</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/10/01/cyber-security-news-october-2021/comment-page-8/#comment-1734253</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 01 Nov 2021 12:17:08 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=189581#comment-1734253</guid>
		<description><![CDATA[12 People Arrested Over Ransomware Attacks on Critical Infrastructure
https://www.securityweek.com/12-people-arrested-over-ransomware-attacks-critical-infrastructure

Europol and Norwegian Police on Friday announced the arrests of 12 individuals suspected of being involved in ransomware attacks launched against companies around the world, including critical infrastructure organizations.

According to Europol, the suspects played various roles in ransomware attacks that impacted more than 1,800 victims across 71 countries, including many major corporations that suffered significant disruptions due to the attacks.

The law enforcement operation targeting the 12 suspects was carried out on October 26 in Ukraine and Switzerland, and it resulted in the seizure of cash, luxury vehicles and electronic devices.

“Most of these suspects are considered high-value targets because they are being investigated in multiple high-profile cases in different jurisdictions,” Europol said.]]></description>
		<content:encoded><![CDATA[<p>12 People Arrested Over Ransomware Attacks on Critical Infrastructure<br />
<a href="https://www.securityweek.com/12-people-arrested-over-ransomware-attacks-critical-infrastructure" rel="nofollow">https://www.securityweek.com/12-people-arrested-over-ransomware-attacks-critical-infrastructure</a></p>
<p>Europol and Norwegian Police on Friday announced the arrests of 12 individuals suspected of being involved in ransomware attacks launched against companies around the world, including critical infrastructure organizations.</p>
<p>According to Europol, the suspects played various roles in ransomware attacks that impacted more than 1,800 victims across 71 countries, including many major corporations that suffered significant disruptions due to the attacks.</p>
<p>The law enforcement operation targeting the 12 suspects was carried out on October 26 in Ukraine and Switzerland, and it resulted in the seizure of cash, luxury vehicles and electronic devices.</p>
<p>“Most of these suspects are considered high-value targets because they are being investigated in multiple high-profile cases in different jurisdictions,” Europol said.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/10/01/cyber-security-news-october-2021/comment-page-8/#comment-1734210</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 01 Nov 2021 10:12:47 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=189581#comment-1734210</guid>
		<description><![CDATA[Misconfigured Database Leaks 880 Million Medical Records https://www.infosecurity-magazine.com/news/misconfigured-database-leaks-880-m/
Researchers have found an unsecured database leaking over 886 million patient records online, although it&#039;s now confirmed that this was dummy data.. The non-password-protected data trove was found by Jeremiah Fowler and Website Planet and traced to healthcare AI firm Deep 6 AI, which fixed the privacy snafu promptly after it was responsibly disclosed.]]></description>
		<content:encoded><![CDATA[<p>Misconfigured Database Leaks 880 Million Medical Records <a href="https://www.infosecurity-magazine.com/news/misconfigured-database-leaks-880-m/" rel="nofollow">https://www.infosecurity-magazine.com/news/misconfigured-database-leaks-880-m/</a><br />
Researchers have found an unsecured database leaking over 886 million patient records online, although it&#8217;s now confirmed that this was dummy data.. The non-password-protected data trove was found by Jeremiah Fowler and Website Planet and traced to healthcare AI firm Deep 6 AI, which fixed the privacy snafu promptly after it was responsibly disclosed.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/10/01/cyber-security-news-october-2021/comment-page-8/#comment-1734207</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 01 Nov 2021 10:12:03 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=189581#comment-1734207</guid>
		<description><![CDATA[Chaos ransomware targets gamers via fake Minecraft alt lists https://www.bleepingcomputer.com/news/security/chaos-ransomware-targets-gamers-via-fake-minecraft-alt-lists/
The Chaos Ransomware gang encrypts gamers&#039; Windows devices through fake Minecraft alt lists promoted on gaming forums.

TA575 criminal group using &#039;Squid Game&#039; lures for Dridex malware https://www.zdnet.com/article/ta575-criminal-group-using-squid-game-lures-for-dridex-malware/
The emails come with subject lines saying things like &quot;Squid Game is back, watch new season before anyone else, &quot; or pretend to offer victims a spot in the cast of the show&#039;s second season.]]></description>
		<content:encoded><![CDATA[<p>Chaos ransomware targets gamers via fake Minecraft alt lists <a href="https://www.bleepingcomputer.com/news/security/chaos-ransomware-targets-gamers-via-fake-minecraft-alt-lists/" rel="nofollow">https://www.bleepingcomputer.com/news/security/chaos-ransomware-targets-gamers-via-fake-minecraft-alt-lists/</a><br />
The Chaos Ransomware gang encrypts gamers&#8217; Windows devices through fake Minecraft alt lists promoted on gaming forums.</p>
<p>TA575 criminal group using &#8216;Squid Game&#8217; lures for Dridex malware <a href="https://www.zdnet.com/article/ta575-criminal-group-using-squid-game-lures-for-dridex-malware/" rel="nofollow">https://www.zdnet.com/article/ta575-criminal-group-using-squid-game-lures-for-dridex-malware/</a><br />
The emails come with subject lines saying things like &#8220;Squid Game is back, watch new season before anyone else, &#8221; or pretend to offer victims a spot in the cast of the show&#8217;s second season.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/10/01/cyber-security-news-october-2021/comment-page-8/#comment-1734206</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 01 Nov 2021 10:11:36 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=189581#comment-1734206</guid>
		<description><![CDATA[Remote Desktop Protocol (RDP) Discovery
https://isc.sans.edu/forums/diary/Remote+Desktop+Protocol+RDP+Discovery/27984/
I have noticed a surge in probe against the RDP service in the past 2 weeks. In August, a remote code execution (RCE) critical patch was released to fix an exploit related to CVE-2021-34535 which include a POC to exploit this vulnerability. This vulnerability is also affecting Microsoft Hyper-V Manager &quot;Enhanced Session Mode&quot; [5] and Microsoft Defender&#039;s Application Guard (WDAG).]]></description>
		<content:encoded><![CDATA[<p>Remote Desktop Protocol (RDP) Discovery<br />
<a href="https://isc.sans.edu/forums/diary/Remote+Desktop+Protocol+RDP+Discovery/27984/" rel="nofollow">https://isc.sans.edu/forums/diary/Remote+Desktop+Protocol+RDP+Discovery/27984/</a><br />
I have noticed a surge in probe against the RDP service in the past 2 weeks. In August, a remote code execution (RCE) critical patch was released to fix an exploit related to CVE-2021-34535 which include a POC to exploit this vulnerability. This vulnerability is also affecting Microsoft Hyper-V Manager &#8220;Enhanced Session Mode&#8221; [5] and Microsoft Defender&#8217;s Application Guard (WDAG).</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/10/01/cyber-security-news-october-2021/comment-page-8/#comment-1734205</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 01 Nov 2021 10:11:04 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=189581#comment-1734205</guid>
		<description><![CDATA[APTs, Teleworking, and Advanced VPN Exploits: The Perfect Storm https://www.darkreading.com/threat-intelligence/apts-teleworking-and-advanced-vpn-exploits-the-perfect-storm
A Mandiant researcher shares the details of an investigation into the misuse of Pulse Secure VPN devices by suspected state-sponsored threat actors.

Security News This Week: The SolarWinds Hackers Are Looking for Their Next Big Score https://www.wired.com/story/solarwinds-hackers-iran-gas-station-hack-ransomware-security-news/
Plus: Gas station hacks in Iran, ransomware arrests in Europe, and more of the week&#039;s top security news.]]></description>
		<content:encoded><![CDATA[<p>APTs, Teleworking, and Advanced VPN Exploits: The Perfect Storm <a href="https://www.darkreading.com/threat-intelligence/apts-teleworking-and-advanced-vpn-exploits-the-perfect-storm" rel="nofollow">https://www.darkreading.com/threat-intelligence/apts-teleworking-and-advanced-vpn-exploits-the-perfect-storm</a><br />
A Mandiant researcher shares the details of an investigation into the misuse of Pulse Secure VPN devices by suspected state-sponsored threat actors.</p>
<p>Security News This Week: The SolarWinds Hackers Are Looking for Their Next Big Score <a href="https://www.wired.com/story/solarwinds-hackers-iran-gas-station-hack-ransomware-security-news/" rel="nofollow">https://www.wired.com/story/solarwinds-hackers-iran-gas-station-hack-ransomware-security-news/</a><br />
Plus: Gas station hacks in Iran, ransomware arrests in Europe, and more of the week&#8217;s top security news.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/10/01/cyber-security-news-october-2021/comment-page-8/#comment-1734204</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 01 Nov 2021 10:10:17 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=189581#comment-1734204</guid>
		<description><![CDATA[Hackers Breach iOS 15, Windows 10, Google Chrome During Massive Cyber Security Onslaught https://www.forbes.com/sites/daveywinder/2021/10/30/hackers-breach-ios-15-windows-10-google-chrome-during-massive-cyber-security-onslaught/
During the weekend of 16-17 October, Chinese hackers went on something of a rampage that saw all but three of the 15 target products breached during the exploit onslaught that was the Tianfu Cup. This annual competition, held in the Sichuan province of Chengdu, has been the go-to for China&#039;s elite hackers since they were banned from participating in similar competitive hacking events outside of the country.]]></description>
		<content:encoded><![CDATA[<p>Hackers Breach iOS 15, Windows 10, Google Chrome During Massive Cyber Security Onslaught <a href="https://www.forbes.com/sites/daveywinder/2021/10/30/hackers-breach-ios-15-windows-10-google-chrome-during-massive-cyber-security-onslaught/" rel="nofollow">https://www.forbes.com/sites/daveywinder/2021/10/30/hackers-breach-ios-15-windows-10-google-chrome-during-massive-cyber-security-onslaught/</a><br />
During the weekend of 16-17 October, Chinese hackers went on something of a rampage that saw all but three of the 15 target products breached during the exploit onslaught that was the Tianfu Cup. This annual competition, held in the Sichuan province of Chengdu, has been the go-to for China&#8217;s elite hackers since they were banned from participating in similar competitive hacking events outside of the country.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
