<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security news December 2022</title>
	<atom:link href="http://www.epanorama.net/blog/2022/12/01/cyber-security-news-december-2022/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2022/12/01/cyber-security-news-december-2022/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Mon, 20 Apr 2026 04:43:41 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/12/01/cyber-security-news-december-2022/comment-page-8/#comment-1791362</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 02 Jan 2023 16:56:13 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192754#comment-1791362</guid>
		<description><![CDATA[https://www.analyticsinsight.net/mysterious-python-package-becomes-a-hazard-for-all-programmers/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.analyticsinsight.net/mysterious-python-package-becomes-a-hazard-for-all-programmers/" rel="nofollow">https://www.analyticsinsight.net/mysterious-python-package-becomes-a-hazard-for-all-programmers/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/12/01/cyber-security-news-december-2022/comment-page-8/#comment-1791360</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 02 Jan 2023 16:51:28 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192754#comment-1791360</guid>
		<description><![CDATA[New Linux malware uses 30 plugin exploits to backdoor WordPress sites
https://www.bleepingcomputer.com/news/security/new-linux-malware-uses-30-plugin-exploits-to-backdoor-wordpress-sites/]]></description>
		<content:encoded><![CDATA[<p>New Linux malware uses 30 plugin exploits to backdoor WordPress sites<br />
<a href="https://www.bleepingcomputer.com/news/security/new-linux-malware-uses-30-plugin-exploits-to-backdoor-wordpress-sites/" rel="nofollow">https://www.bleepingcomputer.com/news/security/new-linux-malware-uses-30-plugin-exploits-to-backdoor-wordpress-sites/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/12/01/cyber-security-news-december-2022/comment-page-8/#comment-1791293</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 02 Jan 2023 07:55:30 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192754#comment-1791293</guid>
		<description><![CDATA[https://hackaday.com/2022/12/30/this-week-in-security-adblock-for-security-proxynotshell-lives-and-cvss-10-to-not-worry-about/
LastPass isn’t the only password manager in the news, and the problems found in Passwordstate makes the recent LastPass issues seem like the most minor of inconveniences. Passwordstate is an enterprise solution for password management. Researchers at modzero started with the browser extension, that allows a user to access saved passwords. To authenticate, a token is generated and sent to the server. Turns out, that token is just the username and other user information, XOR’d with a static, universal key. And on the server side, the only check that happens is on the username. So on any Passwordstate install anywhere, if you can talk to the API, and know a valid username, you can pull every password accessible to that account.

Better Make Sure Your Password Manager Is Secure
Or Someone Else Will
https://www.modzero.com/modlog/archives/2022/12/19/better_make_sure_your_password_manager_is_secure/index.html]]></description>
		<content:encoded><![CDATA[<p><a href="https://hackaday.com/2022/12/30/this-week-in-security-adblock-for-security-proxynotshell-lives-and-cvss-10-to-not-worry-about/" rel="nofollow">https://hackaday.com/2022/12/30/this-week-in-security-adblock-for-security-proxynotshell-lives-and-cvss-10-to-not-worry-about/</a><br />
LastPass isn’t the only password manager in the news, and the problems found in Passwordstate makes the recent LastPass issues seem like the most minor of inconveniences. Passwordstate is an enterprise solution for password management. Researchers at modzero started with the browser extension, that allows a user to access saved passwords. To authenticate, a token is generated and sent to the server. Turns out, that token is just the username and other user information, XOR’d with a static, universal key. And on the server side, the only check that happens is on the username. So on any Passwordstate install anywhere, if you can talk to the API, and know a valid username, you can pull every password accessible to that account.</p>
<p>Better Make Sure Your Password Manager Is Secure<br />
Or Someone Else Will<br />
<a href="https://www.modzero.com/modlog/archives/2022/12/19/better_make_sure_your_password_manager_is_secure/index.html" rel="nofollow">https://www.modzero.com/modlog/archives/2022/12/19/better_make_sure_your_password_manager_is_secure/index.html</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/12/01/cyber-security-news-december-2022/comment-page-8/#comment-1791292</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 02 Jan 2023 07:52:58 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192754#comment-1791292</guid>
		<description><![CDATA[Guardian hit by serious IT incident believed to be ransomware attack
https://www.theguardian.com/media/2022/dec/21/guardian-hit-by-serious-it-incident-believed-to-be-ransomware-attack
Incident has hit parts of media company’s technology infrastructure, with staff told to work from home]]></description>
		<content:encoded><![CDATA[<p>Guardian hit by serious IT incident believed to be ransomware attack<br />
<a href="https://www.theguardian.com/media/2022/dec/21/guardian-hit-by-serious-it-incident-believed-to-be-ransomware-attack" rel="nofollow">https://www.theguardian.com/media/2022/dec/21/guardian-hit-by-serious-it-incident-believed-to-be-ransomware-attack</a><br />
Incident has hit parts of media company’s technology infrastructure, with staff told to work from home</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/12/01/cyber-security-news-december-2022/comment-page-8/#comment-1791280</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 02 Jan 2023 07:05:45 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192754#comment-1791280</guid>
		<description><![CDATA[https://www.securityweek.com/data-breach-louisiana-healthcare-provider-impacts-270000-patients]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.securityweek.com/data-breach-louisiana-healthcare-provider-impacts-270000-patients" rel="nofollow">https://www.securityweek.com/data-breach-louisiana-healthcare-provider-impacts-270000-patients</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/12/01/cyber-security-news-december-2022/comment-page-7/#comment-1791279</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 02 Jan 2023 07:05:30 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192754#comment-1791279</guid>
		<description><![CDATA[Netwrix Acquires Remediant for PAM Technology
https://www.securityweek.com/netwrix-acquires-remediant-pam-technology

Data security software vendor Netwrix has acquired Remediant, an early-stage startup working on technology in the PAM (privileged access management) category.

Financial terms of the acquisition were not disclosed.]]></description>
		<content:encoded><![CDATA[<p>Netwrix Acquires Remediant for PAM Technology<br />
<a href="https://www.securityweek.com/netwrix-acquires-remediant-pam-technology" rel="nofollow">https://www.securityweek.com/netwrix-acquires-remediant-pam-technology</a></p>
<p>Data security software vendor Netwrix has acquired Remediant, an early-stage startup working on technology in the PAM (privileged access management) category.</p>
<p>Financial terms of the acquisition were not disclosed.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/12/01/cyber-security-news-december-2022/comment-page-7/#comment-1791278</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 02 Jan 2023 07:04:59 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192754#comment-1791278</guid>
		<description><![CDATA[EarSpy: Spying on Phone Calls via Ear Speaker Vibrations Captured by Accelerometer
https://www.securityweek.com/earspy-spying-phone-calls-ear-speaker-vibrations-captured-accelerometer]]></description>
		<content:encoded><![CDATA[<p>EarSpy: Spying on Phone Calls via Ear Speaker Vibrations Captured by Accelerometer<br />
<a href="https://www.securityweek.com/earspy-spying-phone-calls-ear-speaker-vibrations-captured-accelerometer" rel="nofollow">https://www.securityweek.com/earspy-spying-phone-calls-ear-speaker-vibrations-captured-accelerometer</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/12/01/cyber-security-news-december-2022/comment-page-7/#comment-1791277</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 02 Jan 2023 07:04:35 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192754#comment-1791277</guid>
		<description><![CDATA[North Korean Hackers Created 70 Fake Bank, Venture Capital Firm Domains
https://www.securityweek.com/north-korean-hackers-created-70-fake-bank-venture-capital-firm-domains]]></description>
		<content:encoded><![CDATA[<p>North Korean Hackers Created 70 Fake Bank, Venture Capital Firm Domains<br />
<a href="https://www.securityweek.com/north-korean-hackers-created-70-fake-bank-venture-capital-firm-domains" rel="nofollow">https://www.securityweek.com/north-korean-hackers-created-70-fake-bank-venture-capital-firm-domains</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/12/01/cyber-security-news-december-2022/comment-page-7/#comment-1791276</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 02 Jan 2023 07:04:20 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192754#comment-1791276</guid>
		<description><![CDATA[CISA Says Two Old JasperReports Vulnerabilities Exploited in Attacks
https://www.securityweek.com/cisa-says-two-old-jasperreports-vulnerabilities-exploited-attacks

The US Cybersecurity and Infrastructure Security Agency (CISA) has added two JasperReports flaws to its Known Exploited Vulnerabilities Catalog.

Tibco’s JasperReports Library is advertised as the world’s most popular open source reporting engine. The JasperReports Server software is designed to enable non-technical users to create reports, dashboards, and visualizations.

CISA has learned that two JasperReports vulnerabilities discovered in 2018 have been exploited in attacks.

One of them is CVE-2018-18809, a critical directory traversal issue in JasperReports Library that can allow webserver users to access data on the host system, which can include credentials for accessing other systems. The flaw was addressed in March 2019.

CVE-2018-18809 has been found to affect the products of major vendors that use the JasperReports Library, including IBM products.

The second vulnerability is CVE-2018-5430, a high-severity information disclosure issue affecting JasperReports Server. The security hole was addressed in April 2018.]]></description>
		<content:encoded><![CDATA[<p>CISA Says Two Old JasperReports Vulnerabilities Exploited in Attacks<br />
<a href="https://www.securityweek.com/cisa-says-two-old-jasperreports-vulnerabilities-exploited-attacks" rel="nofollow">https://www.securityweek.com/cisa-says-two-old-jasperreports-vulnerabilities-exploited-attacks</a></p>
<p>The US Cybersecurity and Infrastructure Security Agency (CISA) has added two JasperReports flaws to its Known Exploited Vulnerabilities Catalog.</p>
<p>Tibco’s JasperReports Library is advertised as the world’s most popular open source reporting engine. The JasperReports Server software is designed to enable non-technical users to create reports, dashboards, and visualizations.</p>
<p>CISA has learned that two JasperReports vulnerabilities discovered in 2018 have been exploited in attacks.</p>
<p>One of them is CVE-2018-18809, a critical directory traversal issue in JasperReports Library that can allow webserver users to access data on the host system, which can include credentials for accessing other systems. The flaw was addressed in March 2019.</p>
<p>CVE-2018-18809 has been found to affect the products of major vendors that use the JasperReports Library, including IBM products.</p>
<p>The second vulnerability is CVE-2018-5430, a high-severity information disclosure issue affecting JasperReports Server. The security hole was addressed in April 2018.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2022/12/01/cyber-security-news-december-2022/comment-page-7/#comment-1791274</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 02 Jan 2023 07:02:27 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192754#comment-1791274</guid>
		<description><![CDATA[LockBit ransomware claims attack on Port of Lisbon in Portugal https://www.bleepingcomputer.com/news/security/lockbit-ransomware-claims-attack-on-port-of-lisbon-in-portugal/
A cyberattack hitting the Port of Lisbon Administration (APL), the third-largest port in Portugal, on Christmas day, has been claimed by the LockBit ransomware gang. According to a company statement shared with local media outlets on Monday, the cyberattack did not impact the port&#039;s operations.]]></description>
		<content:encoded><![CDATA[<p>LockBit ransomware claims attack on Port of Lisbon in Portugal <a href="https://www.bleepingcomputer.com/news/security/lockbit-ransomware-claims-attack-on-port-of-lisbon-in-portugal/" rel="nofollow">https://www.bleepingcomputer.com/news/security/lockbit-ransomware-claims-attack-on-port-of-lisbon-in-portugal/</a><br />
A cyberattack hitting the Port of Lisbon Administration (APL), the third-largest port in Portugal, on Christmas day, has been claimed by the LockBit ransomware gang. According to a company statement shared with local media outlets on Monday, the cyberattack did not impact the port&#8217;s operations.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
