<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security news June 2022</title>
	<atom:link href="http://www.epanorama.net/blog/2022/06/01/cyber-security-news-june-2022/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2022/06/01/cyber-security-news-june-2022/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Wed, 15 Apr 2026 22:25:15 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/06/01/cyber-security-news-june-2022/comment-page-8/#comment-1773683</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 01 Jul 2022 06:16:42 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=191487#comment-1773683</guid>
		<description><![CDATA[Sergiu Gatlan / BleepingComputer:
Kaspersky researchers discovered malware used in the wild since March 2021 to backdoor Microsoft Exchange servers of government and military orgs worldwide
https://www.bleepingcomputer.com/news/security/microsoft-exchange-servers-worldwide-backdoored-with-new-malware/]]></description>
		<content:encoded><![CDATA[<p>Sergiu Gatlan / BleepingComputer:<br />
Kaspersky researchers discovered malware used in the wild since March 2021 to backdoor Microsoft Exchange servers of government and military orgs worldwide<br />
<a href="https://www.bleepingcomputer.com/news/security/microsoft-exchange-servers-worldwide-backdoored-with-new-malware/" rel="nofollow">https://www.bleepingcomputer.com/news/security/microsoft-exchange-servers-worldwide-backdoored-with-new-malware/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/06/01/cyber-security-news-june-2022/comment-page-8/#comment-1773681</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 01 Jul 2022 06:13:24 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=191487#comment-1773681</guid>
		<description><![CDATA[https://www.securityweek.com/brocade-vulnerabilities-could-impact-storage-solutions-several-major-companies]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.securityweek.com/brocade-vulnerabilities-could-impact-storage-solutions-several-major-companies" rel="nofollow">https://www.securityweek.com/brocade-vulnerabilities-could-impact-storage-solutions-several-major-companies</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/06/01/cyber-security-news-june-2022/comment-page-8/#comment-1773680</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 01 Jul 2022 06:13:08 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=191487#comment-1773680</guid>
		<description><![CDATA[SOHO Routers in North America and Europe Targeted With &#039;ZuoRAT&#039; Malware
https://www.securityweek.com/soho-routers-north-america-and-europe-targeted-zuorat-malware]]></description>
		<content:encoded><![CDATA[<p>SOHO Routers in North America and Europe Targeted With &#8216;ZuoRAT&#8217; Malware<br />
<a href="https://www.securityweek.com/soho-routers-north-america-and-europe-targeted-zuorat-malware" rel="nofollow">https://www.securityweek.com/soho-routers-north-america-and-europe-targeted-zuorat-malware</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/06/01/cyber-security-news-june-2022/comment-page-8/#comment-1773679</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 01 Jul 2022 06:12:50 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=191487#comment-1773679</guid>
		<description><![CDATA[Google Workspace Now Warns Admins of Sensitive Changes
https://www.securityweek.com/google-workspace-now-warns-admins-sensitive-changes

Google this week announced that new warnings added in the Google Workspace Alert Center will keep administrators notified of critical and sensitive configuration changes.

Previously known as G Suite, Google Workspace provides secure collaboration and productivity tools for enterprises of all sizes. Accessible from anywhere in Google Workspace, the Alert Center delivers real-time security alerts and insights, to help admins mitigate threats such as phishing and malware.

With the new alerts in place, admins will also receive notifications whenever select changes are made to their Google Workspace configurations.]]></description>
		<content:encoded><![CDATA[<p>Google Workspace Now Warns Admins of Sensitive Changes<br />
<a href="https://www.securityweek.com/google-workspace-now-warns-admins-sensitive-changes" rel="nofollow">https://www.securityweek.com/google-workspace-now-warns-admins-sensitive-changes</a></p>
<p>Google this week announced that new warnings added in the Google Workspace Alert Center will keep administrators notified of critical and sensitive configuration changes.</p>
<p>Previously known as G Suite, Google Workspace provides secure collaboration and productivity tools for enterprises of all sizes. Accessible from anywhere in Google Workspace, the Alert Center delivers real-time security alerts and insights, to help admins mitigate threats such as phishing and malware.</p>
<p>With the new alerts in place, admins will also receive notifications whenever select changes are made to their Google Workspace configurations.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/06/01/cyber-security-news-june-2022/comment-page-8/#comment-1773677</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 01 Jul 2022 06:11:30 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=191487#comment-1773677</guid>
		<description><![CDATA[North Korea Lazarus Hackers Blamed for $100 Million Horizon Bridge Heist
https://www.securityweek.com/north-korea-lazarus-hackers-blamed-100-million-horizon-bridge-heist

The infamous North Korean Lazarus hacking group is the prime suspect in the $100 million hack of Harmony’s Horizon Bridge, according to new data and research from blockchain analytics firm Elliptic.

The multi-million compromise, confirmed by Harmony earlier this month, led to the theft of ETH, BNB, USDT, USDC and Dai from the Horizon cross-chain bridge and now there’s evidence linking the heist to Lazarus, a hacking outfit linked to the North Korean government.

Elliptic, a London-based blockchain analysis firm, says the hackers have started moving funds through Tornado Cash, a mixer typically used to hide cryptocurrency transaction trails.

&quot;The Horizon Bridge hacker has so far sent 41% of the $100 million in stolen crypto assets into the Tornado Cash mixer,&quot; Elliptic said on Friday.  &quot;[We used our] Tornado demixing capability to trace all of the stolen funds through Tornado and onwards to other wallets,&quot; the company added.]]></description>
		<content:encoded><![CDATA[<p>North Korea Lazarus Hackers Blamed for $100 Million Horizon Bridge Heist<br />
<a href="https://www.securityweek.com/north-korea-lazarus-hackers-blamed-100-million-horizon-bridge-heist" rel="nofollow">https://www.securityweek.com/north-korea-lazarus-hackers-blamed-100-million-horizon-bridge-heist</a></p>
<p>The infamous North Korean Lazarus hacking group is the prime suspect in the $100 million hack of Harmony’s Horizon Bridge, according to new data and research from blockchain analytics firm Elliptic.</p>
<p>The multi-million compromise, confirmed by Harmony earlier this month, led to the theft of ETH, BNB, USDT, USDC and Dai from the Horizon cross-chain bridge and now there’s evidence linking the heist to Lazarus, a hacking outfit linked to the North Korean government.</p>
<p>Elliptic, a London-based blockchain analysis firm, says the hackers have started moving funds through Tornado Cash, a mixer typically used to hide cryptocurrency transaction trails.</p>
<p>&#8220;The Horizon Bridge hacker has so far sent 41% of the $100 million in stolen crypto assets into the Tornado Cash mixer,&#8221; Elliptic said on Friday.  &#8220;[We used our] Tornado demixing capability to trace all of the stolen funds through Tornado and onwards to other wallets,&#8221; the company added.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/06/01/cyber-security-news-june-2022/comment-page-8/#comment-1773674</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 01 Jul 2022 06:10:02 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=191487#comment-1773674</guid>
		<description><![CDATA[https://www.securityweek.com/azure-service-fabric-vulnerability-can-lead-cluster-takeover]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.securityweek.com/azure-service-fabric-vulnerability-can-lead-cluster-takeover" rel="nofollow">https://www.securityweek.com/azure-service-fabric-vulnerability-can-lead-cluster-takeover</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/06/01/cyber-security-news-june-2022/comment-page-8/#comment-1773673</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 01 Jul 2022 06:09:43 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=191487#comment-1773673</guid>
		<description><![CDATA[https://www.securityweek.com/vulnerability-amazon-photos-android-app-exposed-user-information]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.securityweek.com/vulnerability-amazon-photos-android-app-exposed-user-information" rel="nofollow">https://www.securityweek.com/vulnerability-amazon-photos-android-app-exposed-user-information</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/06/01/cyber-security-news-june-2022/comment-page-8/#comment-1773672</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 01 Jul 2022 06:09:14 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=191487#comment-1773672</guid>
		<description><![CDATA[Brocade Vulnerabilities Could Impact Storage Solutions of Several Major Companies
https://www.securityweek.com/brocade-vulnerabilities-could-impact-storage-solutions-several-major-companies

Broadcom revealed recently that some of the software provided by its storage networking subsidiary Brocade is affected by several vulnerabilities, and it seems possible that the flaws could impact the products of several major companies.

According to Broadcom, the Brocade SANnav storage area network (SAN) management application is affected by nine vulnerabilities. Patches have been made available for these security holes.

Six of them impact third-party components such as OpenSSL, Oracle Java and NGINX, and they have been rated “medium severity” or “low severity”. Exploitation of these flaws can allow an attacker — in many cases unauthenticated attacker — to manipulate data, decrypt data, and cause a denial of service (DoS) condition.

The remaining three vulnerabilities are specific to Brocade SANnav and they have been assigned a “high” severity and risk impact rating. They can allow an attacker to obtain switch and server passwords from log files, and intercept potentially sensitive information due to static key ciphers.

The security bugs (CVE-2022-28167, CVE-2022-28168 and CVE-2022-28166) were discovered internally and there is no evidence of exploitation in the wild.

However, the storage solutions of several companies that work with Brocade could be affected by these vulnerabilities.

In an advisory published this week, HPE informed customers that its B-Series SANnav Management Portal is affected by the flaws and advised them to install the latest updates.

HPESBST04329 rev.1 - HPE B-Series SANnav Management Portal, Multiple Vulnerabilities
https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=hpesbst04329en_us]]></description>
		<content:encoded><![CDATA[<p>Brocade Vulnerabilities Could Impact Storage Solutions of Several Major Companies<br />
<a href="https://www.securityweek.com/brocade-vulnerabilities-could-impact-storage-solutions-several-major-companies" rel="nofollow">https://www.securityweek.com/brocade-vulnerabilities-could-impact-storage-solutions-several-major-companies</a></p>
<p>Broadcom revealed recently that some of the software provided by its storage networking subsidiary Brocade is affected by several vulnerabilities, and it seems possible that the flaws could impact the products of several major companies.</p>
<p>According to Broadcom, the Brocade SANnav storage area network (SAN) management application is affected by nine vulnerabilities. Patches have been made available for these security holes.</p>
<p>Six of them impact third-party components such as OpenSSL, Oracle Java and NGINX, and they have been rated “medium severity” or “low severity”. Exploitation of these flaws can allow an attacker — in many cases unauthenticated attacker — to manipulate data, decrypt data, and cause a denial of service (DoS) condition.</p>
<p>The remaining three vulnerabilities are specific to Brocade SANnav and they have been assigned a “high” severity and risk impact rating. They can allow an attacker to obtain switch and server passwords from log files, and intercept potentially sensitive information due to static key ciphers.</p>
<p>The security bugs (CVE-2022-28167, CVE-2022-28168 and CVE-2022-28166) were discovered internally and there is no evidence of exploitation in the wild.</p>
<p>However, the storage solutions of several companies that work with Brocade could be affected by these vulnerabilities.</p>
<p>In an advisory published this week, HPE informed customers that its B-Series SANnav Management Portal is affected by the flaws and advised them to install the latest updates.</p>
<p>HPESBST04329 rev.1 &#8211; HPE B-Series SANnav Management Portal, Multiple Vulnerabilities<br />
<a href="https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&#038;docId=hpesbst04329en_us" rel="nofollow">https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&#038;docId=hpesbst04329en_us</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/06/01/cyber-security-news-june-2022/comment-page-8/#comment-1773671</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 01 Jul 2022 06:07:50 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=191487#comment-1773671</guid>
		<description><![CDATA[Järkeä älykotiin
https://www.tivi.fi/uutiset/tv/bbf54e5b-64b3-40c3-b04b-e83208f056d9
Yksi älykodin rakentajan ongelmista on ollut eri valmistajien laitteiden yhteensopivuuden puute. Kehitteillä oleva Matter-standardi lupaa tuoda järkeä sekasortoon. Sillä on hyvä mahdollisuus parantaa tilannetta, sillä kaikki isoimmat pelurit ovat mukana. Matter ei välttämättä lopulta näy käyttäjille muutoin kuin ehkä logona älyvalopaketin kyljessä merkkinä sertifioinnista. Matter on sovellustason kerros, joka rakentuu alkuvaiheessa wlanin ja ZigBeeta korvaavan Thread-verkon päälle ja määrittelee sen, miten laitteet viestivät keskenään.]]></description>
		<content:encoded><![CDATA[<p>Järkeä älykotiin<br />
<a href="https://www.tivi.fi/uutiset/tv/bbf54e5b-64b3-40c3-b04b-e83208f056d9" rel="nofollow">https://www.tivi.fi/uutiset/tv/bbf54e5b-64b3-40c3-b04b-e83208f056d9</a><br />
Yksi älykodin rakentajan ongelmista on ollut eri valmistajien laitteiden yhteensopivuuden puute. Kehitteillä oleva Matter-standardi lupaa tuoda järkeä sekasortoon. Sillä on hyvä mahdollisuus parantaa tilannetta, sillä kaikki isoimmat pelurit ovat mukana. Matter ei välttämättä lopulta näy käyttäjille muutoin kuin ehkä logona älyvalopaketin kyljessä merkkinä sertifioinnista. Matter on sovellustason kerros, joka rakentuu alkuvaiheessa wlanin ja ZigBeeta korvaavan Thread-verkon päälle ja määrittelee sen, miten laitteet viestivät keskenään.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/06/01/cyber-security-news-june-2022/comment-page-8/#comment-1773669</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 01 Jul 2022 05:46:05 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=191487#comment-1773669</guid>
		<description><![CDATA[The SessionManager IIS backdoor
https://securelist.com/the-sessionmanager-iis-backdoor/106868/
Following on from our earlier Owowa discovery, we continued to hunt for more backdoors potentially set up as malicious modules within IIS, a popular web server edited by Microsoft. In 2021, we noticed a trend among several threat actors for deploying a backdoor within IIS after exploiting one of the ProxyLogon-type vulnerabilities within Microsoft Exchange servers. In early 2022, we investigated one such IIS
backdoor: SessionManager. In late April 2022, most of the samples we identified were still not flagged as malicious in a popular online file scanning service, and SessionManager was still deployed in over
20 organizations.]]></description>
		<content:encoded><![CDATA[<p>The SessionManager IIS backdoor<br />
<a href="https://securelist.com/the-sessionmanager-iis-backdoor/106868/" rel="nofollow">https://securelist.com/the-sessionmanager-iis-backdoor/106868/</a><br />
Following on from our earlier Owowa discovery, we continued to hunt for more backdoors potentially set up as malicious modules within IIS, a popular web server edited by Microsoft. In 2021, we noticed a trend among several threat actors for deploying a backdoor within IIS after exploiting one of the ProxyLogon-type vulnerabilities within Microsoft Exchange servers. In early 2022, we investigated one such IIS<br />
backdoor: SessionManager. In late April 2022, most of the samples we identified were still not flagged as malicious in a popular online file scanning service, and SessionManager was still deployed in over<br />
20 organizations.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
