<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security trends for 2022</title>
	<atom:link href="http://www.epanorama.net/blog/2021/12/31/cyber-security-trends-for-2022/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2021/12/31/cyber-security-trends-for-2022/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Sun, 19 Apr 2026 13:40:11 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/12/31/cyber-security-trends-for-2022/comment-page-62/#comment-1791473</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 04 Jan 2023 08:19:34 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=190472#comment-1791473</guid>
		<description><![CDATA[Ransomware impacts over 200 govt, edu, healthcare orgs in 2022 https://www.bleepingcomputer.com/news/security/ransomware-impacts-over-200-govt-edu-healthcare-orgs-in-2022/
Ransomware attacks in 2022 impacted more than 200 hundred larger organizations in the U.S. public sector in the government, educational, and healthcare verticals. Data collected from publicly available reports, disclosure statements, leaks on the dark web, and third-party intelligence show that hackers stole data in about half of these ransomware attacks.]]></description>
		<content:encoded><![CDATA[<p>Ransomware impacts over 200 govt, edu, healthcare orgs in 2022 <a href="https://www.bleepingcomputer.com/news/security/ransomware-impacts-over-200-govt-edu-healthcare-orgs-in-2022/" rel="nofollow">https://www.bleepingcomputer.com/news/security/ransomware-impacts-over-200-govt-edu-healthcare-orgs-in-2022/</a><br />
Ransomware attacks in 2022 impacted more than 200 hundred larger organizations in the U.S. public sector in the government, educational, and healthcare verticals. Data collected from publicly available reports, disclosure statements, leaks on the dark web, and third-party intelligence show that hackers stole data in about half of these ransomware attacks.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/12/31/cyber-security-trends-for-2022/comment-page-62/#comment-1791370</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 02 Jan 2023 17:05:05 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=190472#comment-1791370</guid>
		<description><![CDATA[Extracting Encrypted Credentials From Common Tools
Attackers are harvesting credentials from compromised systems. Here&#039;s how some commonly used tools can enable this.
https://www.darkreading.com/dr-tech/extracting-encrypted-credentials-from-common-tools]]></description>
		<content:encoded><![CDATA[<p>Extracting Encrypted Credentials From Common Tools<br />
Attackers are harvesting credentials from compromised systems. Here&#8217;s how some commonly used tools can enable this.<br />
<a href="https://www.darkreading.com/dr-tech/extracting-encrypted-credentials-from-common-tools" rel="nofollow">https://www.darkreading.com/dr-tech/extracting-encrypted-credentials-from-common-tools</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/12/31/cyber-security-trends-for-2022/comment-page-62/#comment-1791366</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 02 Jan 2023 16:59:43 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=190472#comment-1791366</guid>
		<description><![CDATA[Cyber attacks set to become ‘uninsurable’, says Zurich chief
https://www.swissinfo.ch/eng/business/cyber-attacks-set-to-become--uninsurable---says-zurich-chief/48161718]]></description>
		<content:encoded><![CDATA[<p>Cyber attacks set to become ‘uninsurable’, says Zurich chief<br />
<a href="https://www.swissinfo.ch/eng/business/cyber-attacks-set-to-become--uninsurable---says-zurich-chief/48161718" rel="nofollow">https://www.swissinfo.ch/eng/business/cyber-attacks-set-to-become&#8211;uninsurable&#8212;says-zurich-chief/48161718</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/12/31/cyber-security-trends-for-2022/comment-page-62/#comment-1791365</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 02 Jan 2023 16:59:07 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=190472#comment-1791365</guid>
		<description><![CDATA[CVE-2022-38627: A journey through SQLite Injection to compromise the whole enterprise building
https://infosecwriteups.com/cve-2022-38627-a-journey-through-sqlite-injection-to-compromise-the-whole-enterprise-building-15cebd072ed6]]></description>
		<content:encoded><![CDATA[<p>CVE-2022-38627: A journey through SQLite Injection to compromise the whole enterprise building<br />
<a href="https://infosecwriteups.com/cve-2022-38627-a-journey-through-sqlite-injection-to-compromise-the-whole-enterprise-building-15cebd072ed6" rel="nofollow">https://infosecwriteups.com/cve-2022-38627-a-journey-through-sqlite-injection-to-compromise-the-whole-enterprise-building-15cebd072ed6</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/12/31/cyber-security-trends-for-2022/comment-page-62/#comment-1791364</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 02 Jan 2023 16:57:57 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=190472#comment-1791364</guid>
		<description><![CDATA[https://www.dna.fi/yrityksille/blogi/-/blogs/vain-paranoidit-parjaavat-hybridityo-vaatii-tujumpaa-tietoturvaa]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.dna.fi/yrityksille/blogi/-/blogs/vain-paranoidit-parjaavat-hybridityo-vaatii-tujumpaa-tietoturvaa" rel="nofollow">https://www.dna.fi/yrityksille/blogi/-/blogs/vain-paranoidit-parjaavat-hybridityo-vaatii-tujumpaa-tietoturvaa</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/12/31/cyber-security-trends-for-2022/comment-page-62/#comment-1791346</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 02 Jan 2023 15:15:35 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=190472#comment-1791346</guid>
		<description><![CDATA[https://windowsir.blogspot.com/2022/09/deconstructing-florians-bicycle.html]]></description>
		<content:encoded><![CDATA[<p><a href="https://windowsir.blogspot.com/2022/09/deconstructing-florians-bicycle.html" rel="nofollow">https://windowsir.blogspot.com/2022/09/deconstructing-florians-bicycle.html</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/12/31/cyber-security-trends-for-2022/comment-page-62/#comment-1791345</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 02 Jan 2023 15:15:10 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=190472#comment-1791345</guid>
		<description><![CDATA[https://freedom-to-tinker.com/2022/09/20/cross-layer-security-a-holistic-view-of-internet-security/#respond]]></description>
		<content:encoded><![CDATA[<p><a href="https://freedom-to-tinker.com/2022/09/20/cross-layer-security-a-holistic-view-of-internet-security/#respond" rel="nofollow">https://freedom-to-tinker.com/2022/09/20/cross-layer-security-a-holistic-view-of-internet-security/#respond</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/12/31/cyber-security-trends-for-2022/comment-page-62/#comment-1791275</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 02 Jan 2023 07:03:41 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=190472#comment-1791275</guid>
		<description><![CDATA[https://www.securityweek.com/five-stories-shaped-cybersecurity-2022]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.securityweek.com/five-stories-shaped-cybersecurity-2022" rel="nofollow">https://www.securityweek.com/five-stories-shaped-cybersecurity-2022</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/12/31/cyber-security-trends-for-2022/comment-page-62/#comment-1791267</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 02 Jan 2023 06:54:32 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=190472#comment-1791267</guid>
		<description><![CDATA[SPF and DMARC use on GOV domains in different ccTLDs
https://isc.sans.edu/diary/rss/29384
To discover what percentage of second-level GOV domains actually employ the aforementioned security mechanisms, I wrote a short script that identified ccTLDs in which such domains existed, and gathered and evaluated the corresponding SPF and DMARC records, if these were published (determining whether DKIM is being used by a specific domain is unfortunately impossible without direct communication . The results wereinteresting, if not necessarily optimistic.]]></description>
		<content:encoded><![CDATA[<p>SPF and DMARC use on GOV domains in different ccTLDs<br />
<a href="https://isc.sans.edu/diary/rss/29384" rel="nofollow">https://isc.sans.edu/diary/rss/29384</a><br />
To discover what percentage of second-level GOV domains actually employ the aforementioned security mechanisms, I wrote a short script that identified ccTLDs in which such domains existed, and gathered and evaluated the corresponding SPF and DMARC records, if these were published (determining whether DKIM is being used by a specific domain is unfortunately impossible without direct communication . The results wereinteresting, if not necessarily optimistic.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/12/31/cyber-security-trends-for-2022/comment-page-62/#comment-1791242</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 01 Jan 2023 21:46:29 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=190472#comment-1791242</guid>
		<description><![CDATA[Lily Hay Newman / Wired: 	
A look at 2022&#039;s worst breaches, leaks, ransomware attacks, state-sponsored hacking campaigns, and digital takeovers, including at least two Twilio breaches  —  The year was marked by sinister new twists on cybersecurity classics, including phishing, breaches, and ransomware attacks.

https://www.wired.com/story/worst-hacks-2022/]]></description>
		<content:encoded><![CDATA[<p>Lily Hay Newman / Wired:<br />
A look at 2022&#8242;s worst breaches, leaks, ransomware attacks, state-sponsored hacking campaigns, and digital takeovers, including at least two Twilio breaches  —  The year was marked by sinister new twists on cybersecurity classics, including phishing, breaches, and ransomware attacks.</p>
<p><a href="https://www.wired.com/story/worst-hacks-2022/" rel="nofollow">https://www.wired.com/story/worst-hacks-2022/</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
