<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security news April 2022</title>
	<atom:link href="http://www.epanorama.net/blog/2022/04/01/cyber-security-news-april-2022/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2022/04/01/cyber-security-news-april-2022/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Fri, 24 Apr 2026 16:26:45 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: gemmalyly</title>
		<link>https://www.epanorama.net/blog/2022/04/01/cyber-security-news-april-2022/comment-page-9/#comment-1775013</link>
		<dc:creator><![CDATA[gemmalyly]]></dc:creator>
		<pubDate>Mon, 25 Jul 2022 07:49:37 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=191126#comment-1775013</guid>
		<description><![CDATA[Cyber security news is constantly changing as new threats appear &lt;a href=&quot;https://nerdle.onl/&quot; rel=&quot;nofollow&quot;&gt;nerdle&lt;/a&gt;, major companies and organizations are targeted and the world becomes more connected.  &lt;a href=&quot;https://octordle.onl/&quot; rel=&quot;nofollow&quot;&gt;octordle&lt;/a&gt;]]></description>
		<content:encoded><![CDATA[<p>Cyber security news is constantly changing as new threats appear <a href="https://nerdle.onl/" rel="nofollow">nerdle</a>, major companies and organizations are targeted and the world becomes more connected.  <a href="https://octordle.onl/" rel="nofollow">octordle</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/04/01/cyber-security-news-april-2022/comment-page-9/#comment-1767329</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 05 May 2022 16:52:40 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=191126#comment-1767329</guid>
		<description><![CDATA[https://thehackernews.com/2022/04/microsoft-discovers-new-privilege.html]]></description>
		<content:encoded><![CDATA[<p><a href="https://thehackernews.com/2022/04/microsoft-discovers-new-privilege.html" rel="nofollow">https://thehackernews.com/2022/04/microsoft-discovers-new-privilege.html</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/04/01/cyber-security-news-april-2022/comment-page-9/#comment-1766910</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 02 May 2022 07:32:49 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=191126#comment-1766910</guid>
		<description><![CDATA[Synology, QNAP, WD Warn Users About Vulnerabilities Exploited at Hacking Contest
https://www.securityweek.com/synology-qnap-wd-warn-users-about-vulnerabilities-exploited-hacking-contest]]></description>
		<content:encoded><![CDATA[<p>Synology, QNAP, WD Warn Users About Vulnerabilities Exploited at Hacking Contest<br />
<a href="https://www.securityweek.com/synology-qnap-wd-warn-users-about-vulnerabilities-exploited-hacking-contest" rel="nofollow">https://www.securityweek.com/synology-qnap-wd-warn-users-about-vulnerabilities-exploited-hacking-contest</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/04/01/cyber-security-news-april-2022/comment-page-9/#comment-1766909</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 02 May 2022 07:32:32 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=191126#comment-1766909</guid>
		<description><![CDATA[Many Internet-Exposed Servers Affected by Exploited Redis Vulnerability
https://www.securityweek.com/many-internet-exposed-servers-affected-exploited-redis-vulnerability

Rapid7 security researchers have identified 2,000 internet-exposed Linux servers that appear to be impacted by a Redis vulnerability that has been exploited in attacks.

Tracked as CVE-2022-0543, the security hole has a CVSS score of 10 and is described as an insufficient sanitization in Lua. While Redis statically links the Lua Library, some Debian/Ubuntu packages dynamically link it, leading to a sandbox escape that can be exploited to achieve remote code execution.

Both Debian and Ubuntu announced patches for the bug on February 18. On March 8, however, Brazilian security researcher Reginaldo Silva, who was credited for finding the issue, released proof-of-concept code targeting it.

In-the-wild exploitation of this vulnerability started days later, and the US Cybersecurity and Infrastructure Security Agency (CISA) added the flaw to its Known Exploited Vulnerabilities Catalog in late March.

Now, Rapid7 says a Metasploit module was made available on April 26 and warns that “attackers will continue to opportunistically exploit this vulnerability as long as there are internet facing targets to exploit.”]]></description>
		<content:encoded><![CDATA[<p>Many Internet-Exposed Servers Affected by Exploited Redis Vulnerability<br />
<a href="https://www.securityweek.com/many-internet-exposed-servers-affected-exploited-redis-vulnerability" rel="nofollow">https://www.securityweek.com/many-internet-exposed-servers-affected-exploited-redis-vulnerability</a></p>
<p>Rapid7 security researchers have identified 2,000 internet-exposed Linux servers that appear to be impacted by a Redis vulnerability that has been exploited in attacks.</p>
<p>Tracked as CVE-2022-0543, the security hole has a CVSS score of 10 and is described as an insufficient sanitization in Lua. While Redis statically links the Lua Library, some Debian/Ubuntu packages dynamically link it, leading to a sandbox escape that can be exploited to achieve remote code execution.</p>
<p>Both Debian and Ubuntu announced patches for the bug on February 18. On March 8, however, Brazilian security researcher Reginaldo Silva, who was credited for finding the issue, released proof-of-concept code targeting it.</p>
<p>In-the-wild exploitation of this vulnerability started days later, and the US Cybersecurity and Infrastructure Security Agency (CISA) added the flaw to its Known Exploited Vulnerabilities Catalog in late March.</p>
<p>Now, Rapid7 says a Metasploit module was made available on April 26 and warns that “attackers will continue to opportunistically exploit this vulnerability as long as there are internet facing targets to exploit.”</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/04/01/cyber-security-news-april-2022/comment-page-9/#comment-1766893</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 02 May 2022 07:17:43 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=191126#comment-1766893</guid>
		<description><![CDATA[Atlassian doubles the number of orgs affected by two week outage https://www.bleepingcomputer.com/news/technology/atlassian-doubles-the-number-of-orgs-affected-by-two-week-outage/
Atlassian says that this month&#039;s two-week-long cloud outage has impacted almost double the number of customers it initially estimated after learning of the incident.]]></description>
		<content:encoded><![CDATA[<p>Atlassian doubles the number of orgs affected by two week outage <a href="https://www.bleepingcomputer.com/news/technology/atlassian-doubles-the-number-of-orgs-affected-by-two-week-outage/" rel="nofollow">https://www.bleepingcomputer.com/news/technology/atlassian-doubles-the-number-of-orgs-affected-by-two-week-outage/</a><br />
Atlassian says that this month&#8217;s two-week-long cloud outage has impacted almost double the number of customers it initially estimated after learning of the incident.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/04/01/cyber-security-news-april-2022/comment-page-9/#comment-1766892</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 02 May 2022 07:17:24 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=191126#comment-1766892</guid>
		<description><![CDATA[Fake Windows 10 updates infect you with Magniber ransomware https://www.bleepingcomputer.com/news/security/fake-windows-10-updates-infect-you-with-magniber-ransomware/
Fake Windows 10 updates are being used to distribute the Magniber ransomware in a massive campaign that started earlier this month.

¨]]></description>
		<content:encoded><![CDATA[<p>Fake Windows 10 updates infect you with Magniber ransomware <a href="https://www.bleepingcomputer.com/news/security/fake-windows-10-updates-infect-you-with-magniber-ransomware/" rel="nofollow">https://www.bleepingcomputer.com/news/security/fake-windows-10-updates-infect-you-with-magniber-ransomware/</a><br />
Fake Windows 10 updates are being used to distribute the Magniber ransomware in a massive campaign that started earlier this month.</p>
<p>¨</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/04/01/cyber-security-news-april-2022/comment-page-9/#comment-1766891</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 02 May 2022 07:17:00 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=191126#comment-1766891</guid>
		<description><![CDATA[Internetin tulevaisuudesta tehtiin tärkeä sopimus Venäjä ja Kiina jättäytyivät pois https://www.tivi.fi/uutiset/tv/157d2ba9-8181-435a-b815-db43793e5a4c
EU, Iso-Britannia, Yhdysvallat ja 32 muuta valtiota ympäri maailman ovat sitoutuneet yhteiseen sopimukseen, joka kieltää vaaleihin kohdistuvat misinformaatiokampanjat ja ihmisten laittoman vakoilun.
Yhdysvaltain Valkoinen talo tiedotti Julistus internetin tulevaisuudesta -nimisestä sopimuksesta torstaina.]]></description>
		<content:encoded><![CDATA[<p>Internetin tulevaisuudesta tehtiin tärkeä sopimus Venäjä ja Kiina jättäytyivät pois <a href="https://www.tivi.fi/uutiset/tv/157d2ba9-8181-435a-b815-db43793e5a4c" rel="nofollow">https://www.tivi.fi/uutiset/tv/157d2ba9-8181-435a-b815-db43793e5a4c</a><br />
EU, Iso-Britannia, Yhdysvallat ja 32 muuta valtiota ympäri maailman ovat sitoutuneet yhteiseen sopimukseen, joka kieltää vaaleihin kohdistuvat misinformaatiokampanjat ja ihmisten laittoman vakoilun.<br />
Yhdysvaltain Valkoinen talo tiedotti Julistus internetin tulevaisuudesta -nimisestä sopimuksesta torstaina.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/04/01/cyber-security-news-april-2022/comment-page-9/#comment-1766889</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 02 May 2022 07:15:46 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=191126#comment-1766889</guid>
		<description><![CDATA[Google Play -kauppaan tärkeä parannus tarkista jatkossa tämä ennen kuin lataat https://www.is.fi/digitoday/mobiili/art-2000008777247.html
Kauppa alkaa kertoa, kuinka sovellukset keräävät dataa ja käyttävät sitä.]]></description>
		<content:encoded><![CDATA[<p>Google Play -kauppaan tärkeä parannus tarkista jatkossa tämä ennen kuin lataat <a href="https://www.is.fi/digitoday/mobiili/art-2000008777247.html" rel="nofollow">https://www.is.fi/digitoday/mobiili/art-2000008777247.html</a><br />
Kauppa alkaa kertoa, kuinka sovellukset keräävät dataa ja käyttävät sitä.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/04/01/cyber-security-news-april-2022/comment-page-9/#comment-1766887</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 02 May 2022 07:15:30 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=191126#comment-1766887</guid>
		<description><![CDATA[Bypassing LDAP Channel Binding with StartTLS https://offsec.almond.consulting/bypassing-ldap-channel-binding-with-starttls.html
While doing research on LDAP client certificate authentication, we realized that the LDAP implementation of Active Directory supports the StartTLS mechanism, which has interesting implications on relay attacks.]]></description>
		<content:encoded><![CDATA[<p>Bypassing LDAP Channel Binding with StartTLS <a href="https://offsec.almond.consulting/bypassing-ldap-channel-binding-with-starttls.html" rel="nofollow">https://offsec.almond.consulting/bypassing-ldap-channel-binding-with-starttls.html</a><br />
While doing research on LDAP client certificate authentication, we realized that the LDAP implementation of Active Directory supports the StartTLS mechanism, which has interesting implications on relay attacks.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/04/01/cyber-security-news-april-2022/comment-page-9/#comment-1766885</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 02 May 2022 07:14:53 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=191126#comment-1766885</guid>
		<description><![CDATA[Indian Govt Orders Organizations to Report Security Breaches Within 6 Hours to CERT-In https://thehackernews.com/2022/04/indian-govt-orders-organisations-to.html
India&#039;s computer and emergency response team, CERT-In, on Thursday published new guidelines that require service providers, intermediaries, data centers, and government entities to compulsorily report cybersecurity incidents, including data breaches, within six hours.]]></description>
		<content:encoded><![CDATA[<p>Indian Govt Orders Organizations to Report Security Breaches Within 6 Hours to CERT-In <a href="https://thehackernews.com/2022/04/indian-govt-orders-organisations-to.html" rel="nofollow">https://thehackernews.com/2022/04/indian-govt-orders-organisations-to.html</a><br />
India&#8217;s computer and emergency response team, CERT-In, on Thursday published new guidelines that require service providers, intermediaries, data centers, and government entities to compulsorily report cybersecurity incidents, including data breaches, within six hours.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
