<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security news August 2022</title>
	<atom:link href="http://www.epanorama.net/blog/2022/08/01/cyber-security-news-august-2022/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2022/08/01/cyber-security-news-august-2022/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Fri, 08 May 2026 21:59:36 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: current location</title>
		<link>https://www.epanorama.net/blog/2022/08/01/cyber-security-news-august-2022/comment-page-11/#comment-1809676</link>
		<dc:creator><![CDATA[current location]]></dc:creator>
		<pubDate>Mon, 31 Jul 2023 07:32:24 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=191952#comment-1809676</guid>
		<description><![CDATA[Wow, this is so cool. I think this is one of the best blog posts ever written. The standard of your work is very good. It&#039;s a big deal.]]></description>
		<content:encoded><![CDATA[<p>Wow, this is so cool. I think this is one of the best blog posts ever written. The standard of your work is very good. It&#8217;s a big deal.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/08/01/cyber-security-news-august-2022/comment-page-11/#comment-1778770</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Sep 2022 10:26:25 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=191952#comment-1778770</guid>
		<description><![CDATA[Chrome 105 Patches Critical, High-Severity Vulnerabilities
https://www.securityweek.com/chrome-105-patches-critical-high-severity-vulnerabilities

Google this week announced the first stable release of Chrome 105, which comes with patches for 24 vulnerabilities, including 13 use-after-free and heap buffer overflow bugs.

Twenty-one of the resolved security defects were reported by external researchers, including one critical-, eight high-, nine medium-, and three low-severity vulnerabilities.

A total of nine use-after-free issues were resolved with the latest browser update, the most important of which is a critical flaw in the Network Service component, reported by Google Project Zero researcher Sergei Glazunov, the company notes in an advisory.

Chrome 105 also patches five high-severity use-after-free vulnerabilities, impacting browser components such as WebSQL, Layout, PhoneHub, and Browser Tag.

https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html]]></description>
		<content:encoded><![CDATA[<p>Chrome 105 Patches Critical, High-Severity Vulnerabilities<br />
<a href="https://www.securityweek.com/chrome-105-patches-critical-high-severity-vulnerabilities" rel="nofollow">https://www.securityweek.com/chrome-105-patches-critical-high-severity-vulnerabilities</a></p>
<p>Google this week announced the first stable release of Chrome 105, which comes with patches for 24 vulnerabilities, including 13 use-after-free and heap buffer overflow bugs.</p>
<p>Twenty-one of the resolved security defects were reported by external researchers, including one critical-, eight high-, nine medium-, and three low-severity vulnerabilities.</p>
<p>A total of nine use-after-free issues were resolved with the latest browser update, the most important of which is a critical flaw in the Network Service component, reported by Google Project Zero researcher Sergei Glazunov, the company notes in an advisory.</p>
<p>Chrome 105 also patches five high-severity use-after-free vulnerabilities, impacting browser components such as WebSQL, Layout, PhoneHub, and Browser Tag.</p>
<p><a href="https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html" rel="nofollow">https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/08/01/cyber-security-news-august-2022/comment-page-11/#comment-1778769</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Sep 2022 10:25:40 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=191952#comment-1778769</guid>
		<description><![CDATA[Cybercriminals Apparently Involved in Russia-Linked Attack on Montenegro Government
https://www.securityweek.com/cybercriminals-apparently-involved-russia-linked-attack-montenegro-government

Montenegro has been targeted in a disruptive cyberattack blamed on Russian hackers, and a known ransomware group may have been involved.

The country’s Agency for National Security announced last week that government servers had been targeted in an ongoing attack that was described as massive and coordinated.

The attack targeted government systems and other critical infrastructure, and managed to cause some disruptions. The US embassy warned citizens residing in the country that the attack could disrupt transportation, public utilities and telecommunications.]]></description>
		<content:encoded><![CDATA[<p>Cybercriminals Apparently Involved in Russia-Linked Attack on Montenegro Government<br />
<a href="https://www.securityweek.com/cybercriminals-apparently-involved-russia-linked-attack-montenegro-government" rel="nofollow">https://www.securityweek.com/cybercriminals-apparently-involved-russia-linked-attack-montenegro-government</a></p>
<p>Montenegro has been targeted in a disruptive cyberattack blamed on Russian hackers, and a known ransomware group may have been involved.</p>
<p>The country’s Agency for National Security announced last week that government servers had been targeted in an ongoing attack that was described as massive and coordinated.</p>
<p>The attack targeted government systems and other critical infrastructure, and managed to cause some disruptions. The US embassy warned citizens residing in the country that the attack could disrupt transportation, public utilities and telecommunications.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/08/01/cyber-security-news-august-2022/comment-page-11/#comment-1778768</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Sep 2022 10:24:34 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=191952#comment-1778768</guid>
		<description><![CDATA[WordPress 6.0.2 Patches Vulnerability That Could Impact Millions of Legacy Sites
https://www.securityweek.com/wordpress-602-patches-vulnerability-could-impact-millions-legacy-sites

The WordPress team this week announced the release of version 6.0.2 of the content management system (CMS), with patches for three security bugs, including a high-severity SQL injection vulnerability.

Identified in the WordPress Link functionality, previously known as ‘Bookmarks’, the issue only impacts older installations, as the capability is disabled by default on new installations.

However, the functionality might still be enabled on millions of legacy WordPress sites even if they are running newer versions of the CMS, the Wordfence team at WordPress security company Defiant says.

With a CVSS score of 8.0, the security flaw requires administrative privileges and is not easy to exploit in default configurations, but there might be plugins or themes that allow it to be triggered by users with lower privileges (such as editor-level and below), Wordfence says.

“Vulnerable versions of WordPress failed to successfully sanitize the limit argument of the link retrieval query in the get_bookmarks function, used to ensure that only a certain number of links were returned,” Wordfence explains.

WordPress Core 6.0.2 Security &amp; Maintenance Release – What You Need to Know
https://www.wordfence.com/blog/2022/08/wordpress-core-6-0-2-security-maintenance-release-what-you-need-to-know/]]></description>
		<content:encoded><![CDATA[<p>WordPress 6.0.2 Patches Vulnerability That Could Impact Millions of Legacy Sites<br />
<a href="https://www.securityweek.com/wordpress-602-patches-vulnerability-could-impact-millions-legacy-sites" rel="nofollow">https://www.securityweek.com/wordpress-602-patches-vulnerability-could-impact-millions-legacy-sites</a></p>
<p>The WordPress team this week announced the release of version 6.0.2 of the content management system (CMS), with patches for three security bugs, including a high-severity SQL injection vulnerability.</p>
<p>Identified in the WordPress Link functionality, previously known as ‘Bookmarks’, the issue only impacts older installations, as the capability is disabled by default on new installations.</p>
<p>However, the functionality might still be enabled on millions of legacy WordPress sites even if they are running newer versions of the CMS, the Wordfence team at WordPress security company Defiant says.</p>
<p>With a CVSS score of 8.0, the security flaw requires administrative privileges and is not easy to exploit in default configurations, but there might be plugins or themes that allow it to be triggered by users with lower privileges (such as editor-level and below), Wordfence says.</p>
<p>“Vulnerable versions of WordPress failed to successfully sanitize the limit argument of the link retrieval query in the get_bookmarks function, used to ensure that only a certain number of links were returned,” Wordfence explains.</p>
<p>WordPress Core 6.0.2 Security &amp; Maintenance Release – What You Need to Know<br />
<a href="https://www.wordfence.com/blog/2022/08/wordpress-core-6-0-2-security-maintenance-release-what-you-need-to-know/" rel="nofollow">https://www.wordfence.com/blog/2022/08/wordpress-core-6-0-2-security-maintenance-release-what-you-need-to-know/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/08/01/cyber-security-news-august-2022/comment-page-11/#comment-1778767</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Sep 2022 10:23:17 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=191952#comment-1778767</guid>
		<description><![CDATA[1.4 Million Users Install Chrome Extensions That Inject Code Into eCommerce Sites
https://www.securityweek.com/14-million-users-install-chrome-extensions-inject-code-ecommerce-sites

ndpoint security company McAfee warns of five malicious Chrome extensions designed to track users’ browsing activity and inject code into ecommerce platforms.

With a total install base of over 1.4 million, the extensions can modify cookies on ecommerce websites so that their creator receives affiliate payments for the purchased items, without the victim’s knowledge.

The five malicious extensions help users watch Netflix shows together (Netflix Party and Netflix Party 2, with a combined install base of 1.1 million), enable them to track online prices and coupons (FlipShope – Price Tracker Extension and AutoBuy Flash Sales, with 100,000 installs), and capture screenshots (Full Page Screenshot Capture – Screenshotting, with 200,000 installs).

McAfee’s analysis of the extensions has revealed that the user tracking and code injection behavior resides in a script named ‘b0.js’, which contains many other functions as well.

The extensions subscribe to events triggered when the user accesses a new URL in a tab, so they can send tracking data to the creator’s server (at langhort.com), which checks if the user navigates to a site for which an affiliate ID exists.

Malicious Cookie Stuffing Chrome Extensions with 1.4 Million Users
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/malicious-cookie-stuffing-chrome-extensions-with-1-4-million-users/]]></description>
		<content:encoded><![CDATA[<p>1.4 Million Users Install Chrome Extensions That Inject Code Into eCommerce Sites<br />
<a href="https://www.securityweek.com/14-million-users-install-chrome-extensions-inject-code-ecommerce-sites" rel="nofollow">https://www.securityweek.com/14-million-users-install-chrome-extensions-inject-code-ecommerce-sites</a></p>
<p>ndpoint security company McAfee warns of five malicious Chrome extensions designed to track users’ browsing activity and inject code into ecommerce platforms.</p>
<p>With a total install base of over 1.4 million, the extensions can modify cookies on ecommerce websites so that their creator receives affiliate payments for the purchased items, without the victim’s knowledge.</p>
<p>The five malicious extensions help users watch Netflix shows together (Netflix Party and Netflix Party 2, with a combined install base of 1.1 million), enable them to track online prices and coupons (FlipShope – Price Tracker Extension and AutoBuy Flash Sales, with 100,000 installs), and capture screenshots (Full Page Screenshot Capture – Screenshotting, with 200,000 installs).</p>
<p>McAfee’s analysis of the extensions has revealed that the user tracking and code injection behavior resides in a script named ‘b0.js’, which contains many other functions as well.</p>
<p>The extensions subscribe to events triggered when the user accesses a new URL in a tab, so they can send tracking data to the creator’s server (at langhort.com), which checks if the user navigates to a site for which an affiliate ID exists.</p>
<p>Malicious Cookie Stuffing Chrome Extensions with 1.4 Million Users<br />
<a href="https://www.mcafee.com/blogs/other-blogs/mcafee-labs/malicious-cookie-stuffing-chrome-extensions-with-1-4-million-users/" rel="nofollow">https://www.mcafee.com/blogs/other-blogs/mcafee-labs/malicious-cookie-stuffing-chrome-extensions-with-1-4-million-users/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/08/01/cyber-security-news-august-2022/comment-page-11/#comment-1778766</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Sep 2022 10:21:50 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=191952#comment-1778766</guid>
		<description><![CDATA[iOS 12 Update for Older iPhones Patches Exploited Vulnerability
https://www.securityweek.com/ios-12-update-older-iphones-patches-exploited-vulnerability

Apple on Wednesday started shipping patches for older iPhone and iPad devices to address a recent, actively exploited vulnerability.

Tracked as CVE-2022-32893, the vulnerability impacts WebKit and it can be exploited to achieve arbitrary code execution when the user visits a malicious website.

“Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited,” Apple notes in an advisory.

The security flaw was resolved with the release of iOS 12.5.6, which is now rolling out to iPhone 5s, iPhone 6, iPhone 6 Plus, iPad Air, iPad mini 2, iPad mini 3, and iPod touch (6th generation).

The Cupertino-based company, which has credited an anonymous researcher for reporting the vulnerability, shipped the initial batch of patches for this zero-day roughly two weeks ago.

A second zero-day addressed at the time (with iOS 15.6.1, iPadOS 15.6.1, and macOS Monterey 12.5.1) could lead to arbitrary code execution with kernel privileges. Tracked as CVE-2022-32894, the bug does not impact iOS 12, Apple says.]]></description>
		<content:encoded><![CDATA[<p>iOS 12 Update for Older iPhones Patches Exploited Vulnerability<br />
<a href="https://www.securityweek.com/ios-12-update-older-iphones-patches-exploited-vulnerability" rel="nofollow">https://www.securityweek.com/ios-12-update-older-iphones-patches-exploited-vulnerability</a></p>
<p>Apple on Wednesday started shipping patches for older iPhone and iPad devices to address a recent, actively exploited vulnerability.</p>
<p>Tracked as CVE-2022-32893, the vulnerability impacts WebKit and it can be exploited to achieve arbitrary code execution when the user visits a malicious website.</p>
<p>“Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited,” Apple notes in an advisory.</p>
<p>The security flaw was resolved with the release of iOS 12.5.6, which is now rolling out to iPhone 5s, iPhone 6, iPhone 6 Plus, iPad Air, iPad mini 2, iPad mini 3, and iPod touch (6th generation).</p>
<p>The Cupertino-based company, which has credited an anonymous researcher for reporting the vulnerability, shipped the initial batch of patches for this zero-day roughly two weeks ago.</p>
<p>A second zero-day addressed at the time (with iOS 15.6.1, iPadOS 15.6.1, and macOS Monterey 12.5.1) could lead to arbitrary code execution with kernel privileges. Tracked as CVE-2022-32894, the bug does not impact iOS 12, Apple says.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/08/01/cyber-security-news-august-2022/comment-page-11/#comment-1778755</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Sep 2022 07:05:22 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=191952#comment-1778755</guid>
		<description><![CDATA[Ransomware Gang Accessed Water Supplier&#039;s Control System https://www.vice.com/en/article/4axaeq/ransomware-gang-accessed-water-suppliers-control-system
Now, security researchers who specialize in industrial control systems cybersecurity (ICS) and who have analyzed the data published by Cl0p think the gang could potentially have interfered with the systems of South Staff Water (SSW), a UK water supply provider.]]></description>
		<content:encoded><![CDATA[<p>Ransomware Gang Accessed Water Supplier&#8217;s Control System <a href="https://www.vice.com/en/article/4axaeq/ransomware-gang-accessed-water-suppliers-control-system" rel="nofollow">https://www.vice.com/en/article/4axaeq/ransomware-gang-accessed-water-suppliers-control-system</a><br />
Now, security researchers who specialize in industrial control systems cybersecurity (ICS) and who have analyzed the data published by Cl0p think the gang could potentially have interfered with the systems of South Staff Water (SSW), a UK water supply provider.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/08/01/cyber-security-news-august-2022/comment-page-11/#comment-1778754</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Sep 2022 07:04:48 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=191952#comment-1778754</guid>
		<description><![CDATA[Chile says gov&#039;t agency struggling with ransomware attack https://therecord.media/chile-says-govt-agency-struggling-with-ransomware-attack/
Chile&#039;s cybersecurity incident response team said an unnamed government agency is dealing with a ransomware attack that targeted the organization&#039;s Microsoft tools and VMware ESXi servers.]]></description>
		<content:encoded><![CDATA[<p>Chile says gov&#8217;t agency struggling with ransomware attack <a href="https://therecord.media/chile-says-govt-agency-struggling-with-ransomware-attack/" rel="nofollow">https://therecord.media/chile-says-govt-agency-struggling-with-ransomware-attack/</a><br />
Chile&#8217;s cybersecurity incident response team said an unnamed government agency is dealing with a ransomware attack that targeted the organization&#8217;s Microsoft tools and VMware ESXi servers.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/08/01/cyber-security-news-august-2022/comment-page-11/#comment-1778753</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Sep 2022 07:04:31 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=191952#comment-1778753</guid>
		<description><![CDATA[Ukraine takes down cybercrime group hitting crypto fraud victims https://www.bleepingcomputer.com/news/security/ukraine-takes-down-cybercrime-group-hitting-crypto-fraud-victims/
The National Police of Ukraine (NPU) took down a network of call centers used by a cybercrime group focused on financial scams and targeting victims of cryptocurrency scams under the guise of helping them recover their stolen funds. Lisäksi:
https://www.npu.gov.ua/news/kiberzlochini/naczpolicziya-vikrila-merezhu-call-czentriv-figuranti-speczializuvalisya-na-finansovix-aferax/]]></description>
		<content:encoded><![CDATA[<p>Ukraine takes down cybercrime group hitting crypto fraud victims <a href="https://www.bleepingcomputer.com/news/security/ukraine-takes-down-cybercrime-group-hitting-crypto-fraud-victims/" rel="nofollow">https://www.bleepingcomputer.com/news/security/ukraine-takes-down-cybercrime-group-hitting-crypto-fraud-victims/</a><br />
The National Police of Ukraine (NPU) took down a network of call centers used by a cybercrime group focused on financial scams and targeting victims of cryptocurrency scams under the guise of helping them recover their stolen funds. Lisäksi:<br />
<a href="https://www.npu.gov.ua/news/kiberzlochini/naczpolicziya-vikrila-merezhu-call-czentriv-figuranti-speczializuvalisya-na-finansovix-aferax/" rel="nofollow">https://www.npu.gov.ua/news/kiberzlochini/naczpolicziya-vikrila-merezhu-call-czentriv-figuranti-speczializuvalisya-na-finansovix-aferax/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/08/01/cyber-security-news-august-2022/comment-page-11/#comment-1778752</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Sep 2022 07:04:16 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=191952#comment-1778752</guid>
		<description><![CDATA[Ragnar Locker ransomware claims attack on Portugal&#039;s flag airline https://www.bleepingcomputer.com/news/security/ragnar-locker-ransomware-claims-attack-on-portugals-flag-airline/
The Ragnar Locker ransomware gang has claimed an attack on the flag carrier of Portugal, TAP Air Portugal, disclosed by the airline after its systems were hit on Thursday night.]]></description>
		<content:encoded><![CDATA[<p>Ragnar Locker ransomware claims attack on Portugal&#8217;s flag airline <a href="https://www.bleepingcomputer.com/news/security/ragnar-locker-ransomware-claims-attack-on-portugals-flag-airline/" rel="nofollow">https://www.bleepingcomputer.com/news/security/ragnar-locker-ransomware-claims-attack-on-portugals-flag-airline/</a><br />
The Ragnar Locker ransomware gang has claimed an attack on the flag carrier of Portugal, TAP Air Portugal, disclosed by the airline after its systems were hit on Thursday night.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
