<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber Security News December 2021</title>
	<atom:link href="http://www.epanorama.net/blog/2021/12/01/cyber-security-news-december-2021/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2021/12/01/cyber-security-news-december-2021/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Thu, 23 Apr 2026 22:07:48 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: SafeAeon Inc Inc</title>
		<link>https://www.epanorama.net/blog/2021/12/01/cyber-security-news-december-2021/comment-page-9/#comment-1851342</link>
		<dc:creator><![CDATA[SafeAeon Inc Inc]]></dc:creator>
		<pubDate>Mon, 14 Apr 2025 23:16:41 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=190247#comment-1851342</guid>
		<description><![CDATA[Nice content, thank you for sharing with us!]]></description>
		<content:encoded><![CDATA[<p>Nice content, thank you for sharing with us!</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: garrett metal detectors</title>
		<link>https://www.epanorama.net/blog/2021/12/01/cyber-security-news-december-2021/comment-page-9/#comment-1769158</link>
		<dc:creator><![CDATA[garrett metal detectors]]></dc:creator>
		<pubDate>Thu, 19 May 2022 18:37:07 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=190247#comment-1769158</guid>
		<description><![CDATA[I go to see daily some blogs and blogs to read content, but this webpage offers 
quality based writing.]]></description>
		<content:encoded><![CDATA[<p>I go to see daily some blogs and blogs to read content, but this webpage offers<br />
quality based writing.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/12/01/cyber-security-news-december-2021/comment-page-9/#comment-1750118</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 04 Jan 2022 14:09:04 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=190247#comment-1750118</guid>
		<description><![CDATA[Some Atlanta residents say Apple AirTags are tracking them &#124; What to do if this happens to you
https://www.youtube.com/watch?v=GnNJdKJQry8

Tracking your lost items is becoming easier with new technology like the Apple AirTag. You can find your missing keys, wallet or purse with the press of a button. But with the solution to one problem came the advent of another; instead of using the AirTag to track items some are using them to track people.

Police reports of unwanted tracking have surfaced in Atlanta, Gwinnett County and Cobb County.
Full story: https://bit.ly/3pSYRfE]]></description>
		<content:encoded><![CDATA[<p>Some Atlanta residents say Apple AirTags are tracking them | What to do if this happens to you<br />
<a href="https://www.youtube.com/watch?v=GnNJdKJQry8" rel="nofollow">https://www.youtube.com/watch?v=GnNJdKJQry8</a></p>
<p>Tracking your lost items is becoming easier with new technology like the Apple AirTag. You can find your missing keys, wallet or purse with the press of a button. But with the solution to one problem came the advent of another; instead of using the AirTag to track items some are using them to track people.</p>
<p>Police reports of unwanted tracking have surfaced in Atlanta, Gwinnett County and Cobb County.<br />
Full story: <a href="https://bit.ly/3pSYRfE" rel="nofollow">https://bit.ly/3pSYRfE</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/12/01/cyber-security-news-december-2021/comment-page-9/#comment-1749986</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 03 Jan 2022 15:04:51 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=190247#comment-1749986</guid>
		<description><![CDATA[noPac: A Tale of Two Vulnerabilities That Could End in Ransomware
Numerous public proof-of-concept exploits reveal that the noPac vulnerabilities (CVE-2021-42278 and CVE-2021-42287) are trivial to exploit and lead to privilege escalation.
https://www.secureworks.com/blog/nopac-a-tale-of-two-vulnerabilities-that-could-end-in-ransomware]]></description>
		<content:encoded><![CDATA[<p>noPac: A Tale of Two Vulnerabilities That Could End in Ransomware<br />
Numerous public proof-of-concept exploits reveal that the noPac vulnerabilities (CVE-2021-42278 and CVE-2021-42287) are trivial to exploit and lead to privilege escalation.<br />
<a href="https://www.secureworks.com/blog/nopac-a-tale-of-two-vulnerabilities-that-could-end-in-ransomware" rel="nofollow">https://www.secureworks.com/blog/nopac-a-tale-of-two-vulnerabilities-that-could-end-in-ransomware</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/12/01/cyber-security-news-december-2021/comment-page-9/#comment-1749918</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 03 Jan 2022 08:16:54 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=190247#comment-1749918</guid>
		<description><![CDATA[https://www.securityweek.com/norwegian-media-firm-amedia-suffers-disruption-due-cyberattack]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.securityweek.com/norwegian-media-firm-amedia-suffers-disruption-due-cyberattack" rel="nofollow">https://www.securityweek.com/norwegian-media-firm-amedia-suffers-disruption-due-cyberattack</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/12/01/cyber-security-news-december-2021/comment-page-9/#comment-1749917</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 03 Jan 2022 08:16:39 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=190247#comment-1749917</guid>
		<description><![CDATA[Another Remote Code Execution Vulnerability Patched in Log4j
https://www.securityweek.com/another-remote-code-execution-vulnerability-patched-log4j]]></description>
		<content:encoded><![CDATA[<p>Another Remote Code Execution Vulnerability Patched in Log4j<br />
<a href="https://www.securityweek.com/another-remote-code-execution-vulnerability-patched-log4j" rel="nofollow">https://www.securityweek.com/another-remote-code-execution-vulnerability-patched-log4j</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/12/01/cyber-security-news-december-2021/comment-page-9/#comment-1749916</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 03 Jan 2022 08:16:02 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=190247#comment-1749916</guid>
		<description><![CDATA[Storage Devices of Major Vendors Impacted by Encryption Software Flaws
https://www.securityweek.com/storage-devices-major-vendors-impacted-encryption-software-flaws

Storage devices from several major vendors are affected by vulnerabilities discovered by a researcher in third-party encryption software they all use.

Earlier this month, SecurityWeek reported that Western Digital had updated its SanDisk SecureAccess product to address vulnerabilities that can be exploited to gain access to user data through brute force and dictionary attacks.

SanDisk SecureAccess, recently rebranded SanDisk PrivateAccess, is a piece of software that allows users to encrypt files and folders stored in a protected vault on SanDisk USB flash drives.]]></description>
		<content:encoded><![CDATA[<p>Storage Devices of Major Vendors Impacted by Encryption Software Flaws<br />
<a href="https://www.securityweek.com/storage-devices-major-vendors-impacted-encryption-software-flaws" rel="nofollow">https://www.securityweek.com/storage-devices-major-vendors-impacted-encryption-software-flaws</a></p>
<p>Storage devices from several major vendors are affected by vulnerabilities discovered by a researcher in third-party encryption software they all use.</p>
<p>Earlier this month, SecurityWeek reported that Western Digital had updated its SanDisk SecureAccess product to address vulnerabilities that can be exploited to gain access to user data through brute force and dictionary attacks.</p>
<p>SanDisk SecureAccess, recently rebranded SanDisk PrivateAccess, is a piece of software that allows users to encrypt files and folders stored in a protected vault on SanDisk USB flash drives.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/12/01/cyber-security-news-december-2021/comment-page-9/#comment-1749915</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 03 Jan 2022 08:15:16 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=190247#comment-1749915</guid>
		<description><![CDATA[LastPass Automated Warnings Linked to ‘Credential Stuffing’ Attack
https://www.securityweek.com/lastpass-automated-warnings-linked-%E2%80%98credential-stuffing%E2%80%99-attack

Users of the popular LastPass password manager are being targeted in so-called “credential stuffing” attacks that use email addresses and passwords obtained from third-party breaches.]]></description>
		<content:encoded><![CDATA[<p>LastPass Automated Warnings Linked to ‘Credential Stuffing’ Attack<br />
<a href="https://www.securityweek.com/lastpass-automated-warnings-linked-%E2%80%98credential-stuffing%E2%80%99-attack" rel="nofollow">https://www.securityweek.com/lastpass-automated-warnings-linked-%E2%80%98credential-stuffing%E2%80%99-attack</a></p>
<p>Users of the popular LastPass password manager are being targeted in so-called “credential stuffing” attacks that use email addresses and passwords obtained from third-party breaches.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/12/01/cyber-security-news-december-2021/comment-page-9/#comment-1749914</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 03 Jan 2022 08:14:32 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=190247#comment-1749914</guid>
		<description><![CDATA[Chinese Spies Exploit Log4Shell to Hack Major Academic Institution
https://www.securityweek.com/chinese-spies-exploit-log4shell-hack-major-academic-institution


China-linked cyberespionage group Aquatic Panda was recently observed exploiting the Log4Shell vulnerability to compromise a large academic institution, CrowdStrike’s Falcon OverWatch team reports.

Tracked as CVE 2021-44228 and also referred to as Log4Shell and LogJam, the security hole affects the Apache Log4j Java logging framework and has been exploited in targeted attacks since early December.

As part of a recent campaign, the OverWatch security researchers observed Aquatic Panda leveraging a modified version of the Log4j exploit for initial access, and then performing various post-exploitation operations, including reconnaissance and credential harvesting.

In their attempt to compromise the unnamed academic institution, the attackers targeted a VMware Horizon instance that employed the vulnerable Log4j library. The exploit used in this attack was initially published on GitHub on December 13.]]></description>
		<content:encoded><![CDATA[<p>Chinese Spies Exploit Log4Shell to Hack Major Academic Institution<br />
<a href="https://www.securityweek.com/chinese-spies-exploit-log4shell-hack-major-academic-institution" rel="nofollow">https://www.securityweek.com/chinese-spies-exploit-log4shell-hack-major-academic-institution</a></p>
<p>China-linked cyberespionage group Aquatic Panda was recently observed exploiting the Log4Shell vulnerability to compromise a large academic institution, CrowdStrike’s Falcon OverWatch team reports.</p>
<p>Tracked as CVE 2021-44228 and also referred to as Log4Shell and LogJam, the security hole affects the Apache Log4j Java logging framework and has been exploited in targeted attacks since early December.</p>
<p>As part of a recent campaign, the OverWatch security researchers observed Aquatic Panda leveraging a modified version of the Log4j exploit for initial access, and then performing various post-exploitation operations, including reconnaissance and credential harvesting.</p>
<p>In their attempt to compromise the unnamed academic institution, the attackers targeted a VMware Horizon instance that employed the vulnerable Log4j library. The exploit used in this attack was initially published on GitHub on December 13.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/12/01/cyber-security-news-december-2021/comment-page-9/#comment-1749906</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 03 Jan 2022 07:31:10 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=190247#comment-1749906</guid>
		<description><![CDATA[PulseTV discloses potential compromise of 200, 000 credit cards https://www.bleepingcomputer.com/news/security/pulsetv-discloses-potential-compromise-of-200-000-credit-cards/
U.S. online store PulseTV has disclosed a large-scale customer credit card compromise. As per the notification letter shared with the Office of the Maine Attorney General, more than 200, 000 shoppers have been impacted. The platform found out about a potential breach from VISA on March 8, 2021, who informed them that unauthorized credit card transactions were taking place on the site. After running some security checks and scanning for malware, PulseTV was unable to pinpoint any issues on its e-commerce website. However, the problem persisted as law enforcement contacted them a few months later regarding payment card compromises that appeared to have originated from pulsetv.com.]]></description>
		<content:encoded><![CDATA[<p>PulseTV discloses potential compromise of 200, 000 credit cards <a href="https://www.bleepingcomputer.com/news/security/pulsetv-discloses-potential-compromise-of-200-000-credit-cards/" rel="nofollow">https://www.bleepingcomputer.com/news/security/pulsetv-discloses-potential-compromise-of-200-000-credit-cards/</a><br />
U.S. online store PulseTV has disclosed a large-scale customer credit card compromise. As per the notification letter shared with the Office of the Maine Attorney General, more than 200, 000 shoppers have been impacted. The platform found out about a potential breach from VISA on March 8, 2021, who informed them that unauthorized credit card transactions were taking place on the site. After running some security checks and scanning for malware, PulseTV was unable to pinpoint any issues on its e-commerce website. However, the problem persisted as law enforcement contacted them a few months later regarding payment card compromises that appeared to have originated from pulsetv.com.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
