<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security news October 2022</title>
	<atom:link href="http://www.epanorama.net/blog/2022/10/01/cyber-security-news-october-2022/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2022/10/01/cyber-security-news-october-2022/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Sat, 04 Apr 2026 21:59:57 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/10/01/cyber-security-news-october-2022/comment-page-8/#comment-1785019</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 01 Nov 2022 07:55:13 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192329#comment-1785019</guid>
		<description><![CDATA[Sources: Twitter froze some staff access to content moderation and policy enforcement tools, raising worries about a misinformation spike before the US midterms  —  Twitter Inc., the social network being overhauled by new owner Elon Musk, has frozen some employee access to internal tools used … 
https://www.bloomberg.com/news/articles/2022-11-01/twitter-limits-content-enforcement-tools-as-us-election-looms]]></description>
		<content:encoded><![CDATA[<p>Sources: Twitter froze some staff access to content moderation and policy enforcement tools, raising worries about a misinformation spike before the US midterms  —  Twitter Inc., the social network being overhauled by new owner Elon Musk, has frozen some employee access to internal tools used …<br />
<a href="https://www.bloomberg.com/news/articles/2022-11-01/twitter-limits-content-enforcement-tools-as-us-election-looms" rel="nofollow">https://www.bloomberg.com/news/articles/2022-11-01/twitter-limits-content-enforcement-tools-as-us-election-looms</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/10/01/cyber-security-news-october-2022/comment-page-8/#comment-1785014</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 01 Nov 2022 07:52:10 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192329#comment-1785014</guid>
		<description><![CDATA[Musk Now Gets Chance to Defeat Twitter&#039;s Many Fake Accounts
https://www.securityweek.com/musk-now-gets-chance-defeat-twitters-many-fake-accounts

Twitter’s unending fight against spam accounts is now a problem for new owner Elon Musk, who pledged in April to defeat the bot scourge or “die trying!”

He later cited bots as a reason to back out of buying the social platform. Now that the billionaire has completed the deal, he’s faced with the task of delivering on his promise to clean up the fake profiles that have preoccupied him and bedeviled Twitter since long before he expressed interest in acquiring it.]]></description>
		<content:encoded><![CDATA[<p>Musk Now Gets Chance to Defeat Twitter&#8217;s Many Fake Accounts<br />
<a href="https://www.securityweek.com/musk-now-gets-chance-defeat-twitters-many-fake-accounts" rel="nofollow">https://www.securityweek.com/musk-now-gets-chance-defeat-twitters-many-fake-accounts</a></p>
<p>Twitter’s unending fight against spam accounts is now a problem for new owner Elon Musk, who pledged in April to defeat the bot scourge or “die trying!”</p>
<p>He later cited bots as a reason to back out of buying the social platform. Now that the billionaire has completed the deal, he’s faced with the task of delivering on his promise to clean up the fake profiles that have preoccupied him and bedeviled Twitter since long before he expressed interest in acquiring it.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/10/01/cyber-security-news-october-2022/comment-page-8/#comment-1785013</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 01 Nov 2022 07:51:47 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192329#comment-1785013</guid>
		<description><![CDATA[Critical ConnectWise Vulnerability Affects Thousands of Internet-Exposed Servers
https://www.securityweek.com/critical-connectwise-vulnerability-affects-thousands-internet-exposed-servers

IT management software provider ConnectWise on Friday announced updates that patch a critical vulnerability which, according to cybersecurity professionals, exposes thousands of servers to attacks.

The flaw, described as “improper neutralization of special elements in output used by a downstream component”, affects the ConnectWise Recover backup and disaster recovery product (v2.9.7 and earlier), and the R1Soft server backup manager (v6.16.3 and earlier).

The issue is a critical remote code execution vulnerability. The vendor has assigned it a priority rating of 1, which indicates that the vulnerability is either being targeted by hackers or it’s at high risk of being exploited in the wild.]]></description>
		<content:encoded><![CDATA[<p>Critical ConnectWise Vulnerability Affects Thousands of Internet-Exposed Servers<br />
<a href="https://www.securityweek.com/critical-connectwise-vulnerability-affects-thousands-internet-exposed-servers" rel="nofollow">https://www.securityweek.com/critical-connectwise-vulnerability-affects-thousands-internet-exposed-servers</a></p>
<p>IT management software provider ConnectWise on Friday announced updates that patch a critical vulnerability which, according to cybersecurity professionals, exposes thousands of servers to attacks.</p>
<p>The flaw, described as “improper neutralization of special elements in output used by a downstream component”, affects the ConnectWise Recover backup and disaster recovery product (v2.9.7 and earlier), and the R1Soft server backup manager (v6.16.3 and earlier).</p>
<p>The issue is a critical remote code execution vulnerability. The vendor has assigned it a priority rating of 1, which indicates that the vulnerability is either being targeted by hackers or it’s at high risk of being exploited in the wild.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/10/01/cyber-security-news-october-2022/comment-page-8/#comment-1785012</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 01 Nov 2022 07:50:19 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192329#comment-1785012</guid>
		<description><![CDATA[Label Giant Multi-Color Corporation Discloses Data Breach
https://www.securityweek.com/label-giant-multi-color-corporation-discloses-data-breach]]></description>
		<content:encoded><![CDATA[<p>Label Giant Multi-Color Corporation Discloses Data Breach<br />
<a href="https://www.securityweek.com/label-giant-multi-color-corporation-discloses-data-breach" rel="nofollow">https://www.securityweek.com/label-giant-multi-color-corporation-discloses-data-breach</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/10/01/cyber-security-news-october-2022/comment-page-8/#comment-1785008</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 01 Nov 2022 07:41:41 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192329#comment-1785008</guid>
		<description><![CDATA[Rovaniemen kaupunki luopuu WhatsAppin käytöstä https://www.epressi.com/tiedotteet/kaupungit-ja-kunnat/rovaniemen-kaupunki-luopuu-whatsappin-kaytosta.html
Aiemmin kaupunki on suositellut WhatsAppin välttämistä.. Rovaniemen kaupunki on kieltänyt työntekijöiltään kaupallisten pikaviestisovellusten käytön työasioissa ja työntekijän laitteilla.
Kielto koskee esimerkiksi WhatsApp-, Signal- ja Telegram-sovelluksia sekä muita vastaavia kaupallisia pikaviestisovelluksia, joita ei ole erikseen hyväksytty käytettäväksi]]></description>
		<content:encoded><![CDATA[<p>Rovaniemen kaupunki luopuu WhatsAppin käytöstä <a href="https://www.epressi.com/tiedotteet/kaupungit-ja-kunnat/rovaniemen-kaupunki-luopuu-whatsappin-kaytosta.html" rel="nofollow">https://www.epressi.com/tiedotteet/kaupungit-ja-kunnat/rovaniemen-kaupunki-luopuu-whatsappin-kaytosta.html</a><br />
Aiemmin kaupunki on suositellut WhatsAppin välttämistä.. Rovaniemen kaupunki on kieltänyt työntekijöiltään kaupallisten pikaviestisovellusten käytön työasioissa ja työntekijän laitteilla.<br />
Kielto koskee esimerkiksi WhatsApp-, Signal- ja Telegram-sovelluksia sekä muita vastaavia kaupallisia pikaviestisovelluksia, joita ei ole erikseen hyväksytty käytettäväksi</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/10/01/cyber-security-news-october-2022/comment-page-8/#comment-1785007</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 01 Nov 2022 07:41:13 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192329#comment-1785007</guid>
		<description><![CDATA[UK officials call for investigation following reports that government hid Liz Truss phone hack https://therecord.media/uk-officials-call-for-investigation-following-reports-that-government-hid-liz-truss-phone-hack/
British opposition politicians are calling for an &quot;urgent investigation&quot; into allegations the government covered up a security incident in which the personal phone of Liz Truss, while serving as Foreign Secretary, was hacked by &quot;agents suspected of working for Russian President Vladimir Putin.&quot;. The attackers stole &quot;up to a year&#039;s worth of messages&quot; as reported by the Mail on Sunday, including &quot;highly sensitive discussions with senior international foreign ministers about the war in Ukraine, including detailed discussions about arms shipments.&quot;]]></description>
		<content:encoded><![CDATA[<p>UK officials call for investigation following reports that government hid Liz Truss phone hack <a href="https://therecord.media/uk-officials-call-for-investigation-following-reports-that-government-hid-liz-truss-phone-hack/" rel="nofollow">https://therecord.media/uk-officials-call-for-investigation-following-reports-that-government-hid-liz-truss-phone-hack/</a><br />
British opposition politicians are calling for an &#8220;urgent investigation&#8221; into allegations the government covered up a security incident in which the personal phone of Liz Truss, while serving as Foreign Secretary, was hacked by &#8220;agents suspected of working for Russian President Vladimir Putin.&#8221;. The attackers stole &#8220;up to a year&#8217;s worth of messages&#8221; as reported by the Mail on Sunday, including &#8220;highly sensitive discussions with senior international foreign ministers about the war in Ukraine, including detailed discussions about arms shipments.&#8221;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/10/01/cyber-security-news-october-2022/comment-page-8/#comment-1785006</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 01 Nov 2022 07:40:55 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192329#comment-1785006</guid>
		<description><![CDATA[Fodcha DDoS Botnet Resurfaces with New Capabilities https://thehackernews.com/2022/10/fodcha-ddos-botnet-resurfaces-with-new.html
The threat actor behind the Fodcha distributed denial-of-service
(DDoS) botnet has resurfaced with new capabilities, researchers reveal. This includes changes to its communication protocol and the ability to extort cryptocurrency payments in exchange for stopping the DDoS attack against a target, Qihoo 360&#039;s Network Security Research Lab said in a report published last week. Fodcha first came to light earlier this April, with the malware propagating through known vulnerabilities in Android and IoT devices as well as weak Telnet or SSH passwords.]]></description>
		<content:encoded><![CDATA[<p>Fodcha DDoS Botnet Resurfaces with New Capabilities <a href="https://thehackernews.com/2022/10/fodcha-ddos-botnet-resurfaces-with-new.html" rel="nofollow">https://thehackernews.com/2022/10/fodcha-ddos-botnet-resurfaces-with-new.html</a><br />
The threat actor behind the Fodcha distributed denial-of-service<br />
(DDoS) botnet has resurfaced with new capabilities, researchers reveal. This includes changes to its communication protocol and the ability to extort cryptocurrency payments in exchange for stopping the DDoS attack against a target, Qihoo 360&#8242;s Network Security Research Lab said in a report published last week. Fodcha first came to light earlier this April, with the malware propagating through known vulnerabilities in Android and IoT devices as well as weak Telnet or SSH passwords.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/10/01/cyber-security-news-october-2022/comment-page-8/#comment-1785005</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 01 Nov 2022 07:40:26 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192329#comment-1785005</guid>
		<description><![CDATA[Hacking group abuses antivirus software to launch LODEINFO malware https://www.bleepingcomputer.com/news/security/hacking-group-abuses-antivirus-software-to-launch-lodeinfo-malware/
The Chinese Cicada hacking group, tracked as APT10, was observed abusing security software to install a new version of the LODEINFO malware against Japanese organizations. The targeted entities are media groups, diplomatic agencies, government and public sector organizations, and think tanks in Japan, all high-interest targets for cyberespionage.]]></description>
		<content:encoded><![CDATA[<p>Hacking group abuses antivirus software to launch LODEINFO malware <a href="https://www.bleepingcomputer.com/news/security/hacking-group-abuses-antivirus-software-to-launch-lodeinfo-malware/" rel="nofollow">https://www.bleepingcomputer.com/news/security/hacking-group-abuses-antivirus-software-to-launch-lodeinfo-malware/</a><br />
The Chinese Cicada hacking group, tracked as APT10, was observed abusing security software to install a new version of the LODEINFO malware against Japanese organizations. The targeted entities are media groups, diplomatic agencies, government and public sector organizations, and think tanks in Japan, all high-interest targets for cyberespionage.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/10/01/cyber-security-news-october-2022/comment-page-8/#comment-1785004</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 01 Nov 2022 07:40:09 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192329#comment-1785004</guid>
		<description><![CDATA[Hackers selling access to 576 corporate networks for $4 million https://www.bleepingcomputer.com/news/security/hackers-selling-access-to-576-corporate-networks-for-4-million/
A new report shows that hackers are selling access to 576 corporate networks worldwide for a total cumulative sales price of $4, 000, 000, fueling attacks on the enterprise. The research comes from Israeli cyber-intelligence firm KELA which published its Q3 2022 ransomware report, reflecting stable activity in the sector of initial access sales but a steep rise in the value of the offerings.]]></description>
		<content:encoded><![CDATA[<p>Hackers selling access to 576 corporate networks for $4 million <a href="https://www.bleepingcomputer.com/news/security/hackers-selling-access-to-576-corporate-networks-for-4-million/" rel="nofollow">https://www.bleepingcomputer.com/news/security/hackers-selling-access-to-576-corporate-networks-for-4-million/</a><br />
A new report shows that hackers are selling access to 576 corporate networks worldwide for a total cumulative sales price of $4, 000, 000, fueling attacks on the enterprise. The research comes from Israeli cyber-intelligence firm KELA which published its Q3 2022 ransomware report, reflecting stable activity in the sector of initial access sales but a steep rise in the value of the offerings.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/10/01/cyber-security-news-october-2022/comment-page-8/#comment-1785003</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 01 Nov 2022 07:39:50 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192329#comment-1785003</guid>
		<description><![CDATA[October 31, 202211:12 AM GMT+2Last Updated 10 hours ago https://www.reuters.com/technology/cyber-officials-37-countries-13-companies-meet-ransomware-washington-2022-10-31/
Cyber officials from 37 countries, 13 companies to meet on ransomware in Washington. The White House will host officials from 37 countries and 13 global companies in Washington this week to address the growing threat of ransomware and other cyber crime, including the illicit use of cryptocurrencies, a senior U.S. official said. Countries participating in addition to the United States include: Australia, Austria, Belgium Brazil, Bulgaria, Canada, Croatia, Czech Republic, the Dominican Republic, Estonia, European Commission, France,.
Germany, India, Ireland, Israel, Italy, Japan, Kenya, Lithuania, Mexico, the Netherlands, New Zealand, Nigeria, Norway Poland, South Korea, Romania, Singapore, South Africa, Spain, Sweden, Switzerland, Ukraine, United Arab Emirates and Britain.]]></description>
		<content:encoded><![CDATA[<p>October 31, 202211:12 AM GMT+2Last Updated 10 hours ago <a href="https://www.reuters.com/technology/cyber-officials-37-countries-13-companies-meet-ransomware-washington-2022-10-31/" rel="nofollow">https://www.reuters.com/technology/cyber-officials-37-countries-13-companies-meet-ransomware-washington-2022-10-31/</a><br />
Cyber officials from 37 countries, 13 companies to meet on ransomware in Washington. The White House will host officials from 37 countries and 13 global companies in Washington this week to address the growing threat of ransomware and other cyber crime, including the illicit use of cryptocurrencies, a senior U.S. official said. Countries participating in addition to the United States include: Australia, Austria, Belgium Brazil, Bulgaria, Canada, Croatia, Czech Republic, the Dominican Republic, Estonia, European Commission, France,.<br />
Germany, India, Ireland, Israel, Italy, Japan, Kenya, Lithuania, Mexico, the Netherlands, New Zealand, Nigeria, Norway Poland, South Korea, Romania, Singapore, South Africa, Spain, Sweden, Switzerland, Ukraine, United Arab Emirates and Britain.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
