<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security news November 2021</title>
	<atom:link href="http://www.epanorama.net/blog/2021/11/01/cyber-security-news-november-2021/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2021/11/01/cyber-security-news-november-2021/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Mon, 06 Apr 2026 10:20:53 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/11/01/cyber-security-news-november-2021/comment-page-8/#comment-1743221</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 02 Dec 2021 09:57:09 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=189920#comment-1743221</guid>
		<description><![CDATA[Rights groups petition Israel&#039;s top court over Omicron phone tracking
https://www.reuters.com/world/middle-east/rights-groups-petition-israels-top-court-over-omicron-phone-tracking-2021-11-29/
Rights groups petitioned Israel&#039;s top court on Monday to repeal new
COVID-19 measures that authorise the country&#039;s domestic intelligence service to use counter-terrorism phone tracking technology to contain the spread of the Omicron virus variant. Announcing the emergency measures on Saturday, Prime Minister Naftali Bennett said the phone tracking would be used to locate carriers of the new and potentially more contagious variant in order to curb its transmission to others.]]></description>
		<content:encoded><![CDATA[<p>Rights groups petition Israel&#8217;s top court over Omicron phone tracking<br />
<a href="https://www.reuters.com/world/middle-east/rights-groups-petition-israels-top-court-over-omicron-phone-tracking-2021-11-29/" rel="nofollow">https://www.reuters.com/world/middle-east/rights-groups-petition-israels-top-court-over-omicron-phone-tracking-2021-11-29/</a><br />
Rights groups petitioned Israel&#8217;s top court on Monday to repeal new<br />
COVID-19 measures that authorise the country&#8217;s domestic intelligence service to use counter-terrorism phone tracking technology to contain the spread of the Omicron virus variant. Announcing the emergency measures on Saturday, Prime Minister Naftali Bennett said the phone tracking would be used to locate carriers of the new and potentially more contagious variant in order to curb its transmission to others.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/11/01/cyber-security-news-november-2021/comment-page-8/#comment-1743219</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 02 Dec 2021 09:56:18 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=189920#comment-1743219</guid>
		<description><![CDATA[AT&amp;T takes action against DDoS botnet that hijacked VoIP servers 
https://therecord.media/att-takes-action-against-ddos-botnet-that-hijacked-voip-servers/
AT&amp;T is investigating and has taken steps to mitigate a botnet that infected more than 5, 700 VoIP servers located inside its network, a spokesperson has told The Record earlier today. All the infected devices were EdgeMarc Enterprise Session Border Controllers, a type of Voice-over-IP server designed to balance and reroute internet telephony traffic from smaller enterprise customers to upstream mobile providers. According to Netlab, a network security division of Chinese tech giant Qihoo 360, a threat actor used an old exploit
(CVE-2017-6079) to hack into unpatched EdgeMarc servers and install a modular malware strain named EwDoor.]]></description>
		<content:encoded><![CDATA[<p>AT&amp;T takes action against DDoS botnet that hijacked VoIP servers<br />
<a href="https://therecord.media/att-takes-action-against-ddos-botnet-that-hijacked-voip-servers/" rel="nofollow">https://therecord.media/att-takes-action-against-ddos-botnet-that-hijacked-voip-servers/</a><br />
AT&amp;T is investigating and has taken steps to mitigate a botnet that infected more than 5, 700 VoIP servers located inside its network, a spokesperson has told The Record earlier today. All the infected devices were EdgeMarc Enterprise Session Border Controllers, a type of Voice-over-IP server designed to balance and reroute internet telephony traffic from smaller enterprise customers to upstream mobile providers. According to Netlab, a network security division of Chinese tech giant Qihoo 360, a threat actor used an old exploit<br />
(CVE-2017-6079) to hack into unpatched EdgeMarc servers and install a modular malware strain named EwDoor.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/11/01/cyber-security-news-november-2021/comment-page-8/#comment-1743218</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 02 Dec 2021 09:56:01 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=189920#comment-1743218</guid>
		<description><![CDATA[DNA testing firm discloses data breach affecting 2.1 million people 
https://www.bleepingcomputer.com/news/security/dna-testing-firm-discloses-data-breach-affecting-21-million-people/
DNA Diagnostics Center (DDC), an Ohio-based DNA testing company, has disclosed a hacking incident that affects 2102436 persons.]]></description>
		<content:encoded><![CDATA[<p>DNA testing firm discloses data breach affecting 2.1 million people<br />
<a href="https://www.bleepingcomputer.com/news/security/dna-testing-firm-discloses-data-breach-affecting-21-million-people/" rel="nofollow">https://www.bleepingcomputer.com/news/security/dna-testing-firm-discloses-data-breach-affecting-21-million-people/</a><br />
DNA Diagnostics Center (DDC), an Ohio-based DNA testing company, has disclosed a hacking incident that affects 2102436 persons.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/11/01/cyber-security-news-november-2021/comment-page-8/#comment-1743217</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 02 Dec 2021 09:55:42 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=189920#comment-1743217</guid>
		<description><![CDATA[Hackers all over the world are targeting Tasmania&#039;s emergency services https://blog.malwarebytes.com/hacking-2/2021/11/hack-tasmania/
Emergency servicesunder which the police, fire, and emergency medical services departments fallis an infrastructure vital to any country or state. But when those services come under threat from either physical or cyber entities, it&#039;s as good as putting the lives of citizens at risk as well.]]></description>
		<content:encoded><![CDATA[<p>Hackers all over the world are targeting Tasmania&#8217;s emergency services <a href="https://blog.malwarebytes.com/hacking-2/2021/11/hack-tasmania/" rel="nofollow">https://blog.malwarebytes.com/hacking-2/2021/11/hack-tasmania/</a><br />
Emergency servicesunder which the police, fire, and emergency medical services departments fallis an infrastructure vital to any country or state. But when those services come under threat from either physical or cyber entities, it&#8217;s as good as putting the lives of citizens at risk as well.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/11/01/cyber-security-news-november-2021/comment-page-8/#comment-1743214</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 02 Dec 2021 09:54:01 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=189920#comment-1743214</guid>
		<description><![CDATA[8-year-old HP printer vulnerability affects 150 printer models 
https://www.bleepingcomputer.com/news/security/8-year-old-hp-printer-vulnerability-affects-150-printer-models/
Researchers have discovered several vulnerabilities affecting at least
150 multi-function (print, scan, fax) printers made by Hewlett Packard. Since the flaws discovered by F-Secure security researchers Alexander Bolshev and Timo Hirvonen date back to at least 2013, they&#039;ve likely exposed a large number of users to cyberattacks for a notable amount of time. HP has released fixes for the vulnerabilities in the form of firmware updates for two of the most critical flaws on November 1 Researchers have discovered several vulnerabilities affecting at least 150 multi-function (print, scan, fax) printers made by Hewlett Packard.
Since the flaws discovered by F-Secure security researchers Alexander Bolshev and Timo Hirvonen date back to at least 2013, they&#039;ve likely exposed a large number of users to cyberattacks for a notable amount of time.
HP has released fixes for the vulnerabilities in the form of firmware updates for two of the most critical flaws on November 1, 2021., 2021.
These are CVE-2021-39237 and CVE-2021-39238. For a complete list of the affected products, click on the tracking numbers for the corresponding advisories.
The first one concerns two exposed physical ports that grant full access to the device. Exploiting it requires physical access and could lead to potential information disclosure.
The second one is a buffer overflow vulnerability on the font parser, which is a lot more severe, having a CVSS score of 9.3. Exploiting it gives threat actors a way to remote code execution.
CVE-2021-39238 is also &quot;wormable,&quot; meaning a threat actor could quickly spread from a single printer to an entire network.
As such, organizations must upgrade their printer firmware as soon as possible to avoid large-scale infections that start from this often ignored point of entry.]]></description>
		<content:encoded><![CDATA[<p>8-year-old HP printer vulnerability affects 150 printer models<br />
<a href="https://www.bleepingcomputer.com/news/security/8-year-old-hp-printer-vulnerability-affects-150-printer-models/" rel="nofollow">https://www.bleepingcomputer.com/news/security/8-year-old-hp-printer-vulnerability-affects-150-printer-models/</a><br />
Researchers have discovered several vulnerabilities affecting at least<br />
150 multi-function (print, scan, fax) printers made by Hewlett Packard. Since the flaws discovered by F-Secure security researchers Alexander Bolshev and Timo Hirvonen date back to at least 2013, they&#8217;ve likely exposed a large number of users to cyberattacks for a notable amount of time. HP has released fixes for the vulnerabilities in the form of firmware updates for two of the most critical flaws on November 1 Researchers have discovered several vulnerabilities affecting at least 150 multi-function (print, scan, fax) printers made by Hewlett Packard.<br />
Since the flaws discovered by F-Secure security researchers Alexander Bolshev and Timo Hirvonen date back to at least 2013, they&#8217;ve likely exposed a large number of users to cyberattacks for a notable amount of time.<br />
HP has released fixes for the vulnerabilities in the form of firmware updates for two of the most critical flaws on November 1, 2021., 2021.<br />
These are CVE-2021-39237 and CVE-2021-39238. For a complete list of the affected products, click on the tracking numbers for the corresponding advisories.<br />
The first one concerns two exposed physical ports that grant full access to the device. Exploiting it requires physical access and could lead to potential information disclosure.<br />
The second one is a buffer overflow vulnerability on the font parser, which is a lot more severe, having a CVSS score of 9.3. Exploiting it gives threat actors a way to remote code execution.<br />
CVE-2021-39238 is also &#8220;wormable,&#8221; meaning a threat actor could quickly spread from a single printer to an entire network.<br />
As such, organizations must upgrade their printer firmware as soon as possible to avoid large-scale infections that start from this often ignored point of entry.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/11/01/cyber-security-news-november-2021/comment-page-8/#comment-1743212</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 02 Dec 2021 09:52:06 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=189920#comment-1743212</guid>
		<description><![CDATA[8-year-old HP printer vulnerability affects 150 printer models 
https://www.bleepingcomputer.com/news/security/8-year-old-hp-printer-vulnerability-affects-150-printer-models/
Researchers have discovered several vulnerabilities affecting at least
150 multi-function (print, scan, fax) printers made by Hewlett Packard. Since the flaws discovered by F-Secure security researchers Alexander Bolshev and Timo Hirvonen date back to at least 2013, they&#039;ve likely exposed a large number of users to cyberattacks for a notable amount of time. HP has released fixes for the vulnerabilities in the form of firmware updates for two of the most critical flaws on November 1, 2021.]]></description>
		<content:encoded><![CDATA[<p>8-year-old HP printer vulnerability affects 150 printer models<br />
<a href="https://www.bleepingcomputer.com/news/security/8-year-old-hp-printer-vulnerability-affects-150-printer-models/" rel="nofollow">https://www.bleepingcomputer.com/news/security/8-year-old-hp-printer-vulnerability-affects-150-printer-models/</a><br />
Researchers have discovered several vulnerabilities affecting at least<br />
150 multi-function (print, scan, fax) printers made by Hewlett Packard. Since the flaws discovered by F-Secure security researchers Alexander Bolshev and Timo Hirvonen date back to at least 2013, they&#8217;ve likely exposed a large number of users to cyberattacks for a notable amount of time. HP has released fixes for the vulnerabilities in the form of firmware updates for two of the most critical flaws on November 1, 2021.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/11/01/cyber-security-news-november-2021/comment-page-8/#comment-1743210</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 02 Dec 2021 09:49:36 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=189920#comment-1743210</guid>
		<description><![CDATA[Telegram channel admins who sold fake vaccine cards arrested 
https://www.bleepingcomputer.com/news/legal/telegram-channel-admins-who-sold-fake-vaccine-cards-arrested/
The Italian financial crime agency (Guardia di Finanza GdF) has announced the arrest of several individuals suspected of managing Telegram channels to promote fake vaccine certificates, aka &#039;Green Passes.&#039;. The operation was supported by evidence collected by investigators at Group-IB&#039;s high-tech crime unit, who managed to unmask the criminals despite measures to keep their identities hidden.]]></description>
		<content:encoded><![CDATA[<p>Telegram channel admins who sold fake vaccine cards arrested<br />
<a href="https://www.bleepingcomputer.com/news/legal/telegram-channel-admins-who-sold-fake-vaccine-cards-arrested/" rel="nofollow">https://www.bleepingcomputer.com/news/legal/telegram-channel-admins-who-sold-fake-vaccine-cards-arrested/</a><br />
The Italian financial crime agency (Guardia di Finanza GdF) has announced the arrest of several individuals suspected of managing Telegram channels to promote fake vaccine certificates, aka &#8216;Green Passes.&#8217;. The operation was supported by evidence collected by investigators at Group-IB&#8217;s high-tech crime unit, who managed to unmask the criminals despite measures to keep their identities hidden.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/11/01/cyber-security-news-november-2021/comment-page-8/#comment-1743208</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 02 Dec 2021 09:49:01 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=189920#comment-1743208</guid>
		<description><![CDATA[Zoom finally adds automatic updates to Windows, macOS clients 
https://www.bleepingcomputer.com/news/security/zoom-finally-adds-automatic-updates-to-windows-macos-clients/
Zoom has announced today the launch of an automatic update feature designed to streamline the update process for desktop clients. The new feature is currently available only for desktop Zoom clients on Windows and macOS, with the Linux platform not currently supported.
Zoom says that mobile device users can also keep their apps automatically updated through their respective app stores&#039; built-in automated updaters.]]></description>
		<content:encoded><![CDATA[<p>Zoom finally adds automatic updates to Windows, macOS clients<br />
<a href="https://www.bleepingcomputer.com/news/security/zoom-finally-adds-automatic-updates-to-windows-macos-clients/" rel="nofollow">https://www.bleepingcomputer.com/news/security/zoom-finally-adds-automatic-updates-to-windows-macos-clients/</a><br />
Zoom has announced today the launch of an automatic update feature designed to streamline the update process for desktop clients. The new feature is currently available only for desktop Zoom clients on Windows and macOS, with the Linux platform not currently supported.<br />
Zoom says that mobile device users can also keep their apps automatically updated through their respective app stores&#8217; built-in automated updaters.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/11/01/cyber-security-news-november-2021/comment-page-8/#comment-1743206</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 02 Dec 2021 09:48:24 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=189920#comment-1743206</guid>
		<description><![CDATA[Dark web market Cannazon shuts down after massive DDoS attack 
https://www.bleepingcomputer.com/news/security/dark-web-market-cannazon-shuts-down-after-massive-ddos-attack/
Cannazon, one of the largest dark web marketplaces for buying marijuana products, shut down last week after suffering a debilitating distributed denial of service attack. As the admins explained in a message signed with the market&#039;s PGP key, they are officially retiring and claim not to be pulling an exit scam on their vendors. The admins posted that message on November 23, 2021, and today, Cannazon went offline, allegedly forever.]]></description>
		<content:encoded><![CDATA[<p>Dark web market Cannazon shuts down after massive DDoS attack<br />
<a href="https://www.bleepingcomputer.com/news/security/dark-web-market-cannazon-shuts-down-after-massive-ddos-attack/" rel="nofollow">https://www.bleepingcomputer.com/news/security/dark-web-market-cannazon-shuts-down-after-massive-ddos-attack/</a><br />
Cannazon, one of the largest dark web marketplaces for buying marijuana products, shut down last week after suffering a debilitating distributed denial of service attack. As the admins explained in a message signed with the market&#8217;s PGP key, they are officially retiring and claim not to be pulling an exit scam on their vendors. The admins posted that message on November 23, 2021, and today, Cannazon went offline, allegedly forever.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/11/01/cyber-security-news-november-2021/comment-page-8/#comment-1743205</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 02 Dec 2021 09:48:09 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=189920#comment-1743205</guid>
		<description><![CDATA[Hackers plant card-stealing malware on website that sells baron and duke titles 
https://therecord.media/hackers-plant-card-stealing-malware-on-website-that-sells-baron-and-duke-titles/
A threat actor has hacked the website of the Principality of Sealand, a micronation in the North Sea, and planted malicious code on its web store, which the government is using to sell baron, count, duke, and other nobility titles. Called a &quot;web skimmer&quot;, the malicious code allowed the hackers to collect user and payment card details for anyone who purchased products, such as nobility titles, from the country&#039;s online store.]]></description>
		<content:encoded><![CDATA[<p>Hackers plant card-stealing malware on website that sells baron and duke titles<br />
<a href="https://therecord.media/hackers-plant-card-stealing-malware-on-website-that-sells-baron-and-duke-titles/" rel="nofollow">https://therecord.media/hackers-plant-card-stealing-malware-on-website-that-sells-baron-and-duke-titles/</a><br />
A threat actor has hacked the website of the Principality of Sealand, a micronation in the North Sea, and planted malicious code on its web store, which the government is using to sell baron, count, duke, and other nobility titles. Called a &#8220;web skimmer&#8221;, the malicious code allowed the hackers to collect user and payment card details for anyone who purchased products, such as nobility titles, from the country&#8217;s online store.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
