<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security news January 2023</title>
	<atom:link href="http://www.epanorama.net/blog/2023/01/01/cyber-security-news-january-2023/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2023/01/01/cyber-security-news-january-2023/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Sun, 10 May 2026 10:08:58 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/01/01/cyber-security-news-january-2023/comment-page-9/#comment-1794252</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 01 Feb 2023 08:41:25 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192998#comment-1794252</guid>
		<description><![CDATA[Data Breaches
British Retailer JD Sports Discloses Data Breach Affecting 10 Million Customers
https://www.securityweek.com/british-retailer-jd-sports-discloses-data-breach-affecting-10-million-customers/

JD Sports discovers unauthorized access to information from orders placed by customers between 2018 and 2020.]]></description>
		<content:encoded><![CDATA[<p>Data Breaches<br />
British Retailer JD Sports Discloses Data Breach Affecting 10 Million Customers<br />
<a href="https://www.securityweek.com/british-retailer-jd-sports-discloses-data-breach-affecting-10-million-customers/" rel="nofollow">https://www.securityweek.com/british-retailer-jd-sports-discloses-data-breach-affecting-10-million-customers/</a></p>
<p>JD Sports discovers unauthorized access to information from orders placed by customers between 2018 and 2020.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/01/01/cyber-security-news-january-2023/comment-page-9/#comment-1794251</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 01 Feb 2023 08:41:04 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192998#comment-1794251</guid>
		<description><![CDATA[Russian Millionaire on Trial in Hack, Insider Trade Scheme
https://www.securityweek.com/russian-millionaire-on-trial-in-hack-insider-trade-scheme/

Russian Vladislav Klyushin made tens of millions of dollars by hacking into U.S. computer networks to steal insider information.

A wealthy Russian businessman and associates made tens of millions of dollars by cheating the stock market in an elaborate scheme that involved hacking into U.S. computer networks to steal insider information about companies such as Microsoft and Tesla, a prosecutor told jurors on Monday. 

Vladislav Klyushin, the owner a Moscow-based information technology company with ties to the upper levels of the Russian government, is standing in trial in a Boston federal court nearly two years after he was arrested after landing in Switzerland on a private jet for a skiing trip. 

He’s the only Russian national charged in the nearly $90 million scheme who has been arrested and extradited to the U.S.; four accused co-conspirators — including a Russian military intelligence officer who’s also been charged with meddling in the 2016 presidential election — remain at large.]]></description>
		<content:encoded><![CDATA[<p>Russian Millionaire on Trial in Hack, Insider Trade Scheme<br />
<a href="https://www.securityweek.com/russian-millionaire-on-trial-in-hack-insider-trade-scheme/" rel="nofollow">https://www.securityweek.com/russian-millionaire-on-trial-in-hack-insider-trade-scheme/</a></p>
<p>Russian Vladislav Klyushin made tens of millions of dollars by hacking into U.S. computer networks to steal insider information.</p>
<p>A wealthy Russian businessman and associates made tens of millions of dollars by cheating the stock market in an elaborate scheme that involved hacking into U.S. computer networks to steal insider information about companies such as Microsoft and Tesla, a prosecutor told jurors on Monday. </p>
<p>Vladislav Klyushin, the owner a Moscow-based information technology company with ties to the upper levels of the Russian government, is standing in trial in a Boston federal court nearly two years after he was arrested after landing in Switzerland on a private jet for a skiing trip. </p>
<p>He’s the only Russian national charged in the nearly $90 million scheme who has been arrested and extradited to the U.S.; four accused co-conspirators — including a Russian military intelligence officer who’s also been charged with meddling in the 2016 presidential election — remain at large.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/01/01/cyber-security-news-january-2023/comment-page-9/#comment-1794250</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 01 Feb 2023 08:40:37 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192998#comment-1794250</guid>
		<description><![CDATA[GitHub Revokes Code Signing Certificates Following Cyberattack
https://www.securityweek.com/github-revokes-code-signing-certificates-following-cyberattack/

GitHub this week announced the revocation of three certificates used for the GitHub Desktop and Atom applications.]]></description>
		<content:encoded><![CDATA[<p>GitHub Revokes Code Signing Certificates Following Cyberattack<br />
<a href="https://www.securityweek.com/github-revokes-code-signing-certificates-following-cyberattack/" rel="nofollow">https://www.securityweek.com/github-revokes-code-signing-certificates-following-cyberattack/</a></p>
<p>GitHub this week announced the revocation of three certificates used for the GitHub Desktop and Atom applications.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/01/01/cyber-security-news-january-2023/comment-page-9/#comment-1794249</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 01 Feb 2023 08:39:27 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192998#comment-1794249</guid>
		<description><![CDATA[Vulnerabilities
Critical QNAP Vulnerability Leads to Code Injection
https://www.securityweek.com/critical-qnap-vulnerability-leads-to-code-injection/

QNAP warns users of a critical vulnerability that allows attackers to inject malicious code on NAS devices.]]></description>
		<content:encoded><![CDATA[<p>Vulnerabilities<br />
Critical QNAP Vulnerability Leads to Code Injection<br />
<a href="https://www.securityweek.com/critical-qnap-vulnerability-leads-to-code-injection/" rel="nofollow">https://www.securityweek.com/critical-qnap-vulnerability-leads-to-code-injection/</a></p>
<p>QNAP warns users of a critical vulnerability that allows attackers to inject malicious code on NAS devices.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/01/01/cyber-security-news-january-2023/comment-page-9/#comment-1794247</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 01 Feb 2023 08:36:26 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192998#comment-1794247</guid>
		<description><![CDATA[Microsoft’s Verified Publisher Status Abused in Email Theft Campaign
https://www.securityweek.com/microsofts-verified-publisher-status-abused-in-email-theft-campaign/

Microsoft and Proofpoint are warning organizations that use cloud services about a recent consent phishing attack that abused Microsoft’s ‘verified publisher’ status.]]></description>
		<content:encoded><![CDATA[<p>Microsoft’s Verified Publisher Status Abused in Email Theft Campaign<br />
<a href="https://www.securityweek.com/microsofts-verified-publisher-status-abused-in-email-theft-campaign/" rel="nofollow">https://www.securityweek.com/microsofts-verified-publisher-status-abused-in-email-theft-campaign/</a></p>
<p>Microsoft and Proofpoint are warning organizations that use cloud services about a recent consent phishing attack that abused Microsoft’s ‘verified publisher’ status.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/01/01/cyber-security-news-january-2023/comment-page-9/#comment-1794244</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 01 Feb 2023 08:27:54 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192998#comment-1794244</guid>
		<description><![CDATA[Microsoft releases emergency updates to fix XPS display issues https://www.bleepingcomputer.com/news/microsoft/microsoft-releases-emergency-updates-to-fix-xps-display-issues/
Microsoft has released out-of-band (OOB) updates for some .NET Framework and .NET versions to address XPS display issues triggered by December 2022 cumulative security updates. Users will experience null reference exceptions and images or glyphs displaying incorrectly when viewing XPS documents rendered using affected Windows Presentation Foundation (WPF) based apps]]></description>
		<content:encoded><![CDATA[<p>Microsoft releases emergency updates to fix XPS display issues <a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-releases-emergency-updates-to-fix-xps-display-issues/" rel="nofollow">https://www.bleepingcomputer.com/news/microsoft/microsoft-releases-emergency-updates-to-fix-xps-display-issues/</a><br />
Microsoft has released out-of-band (OOB) updates for some .NET Framework and .NET versions to address XPS display issues triggered by December 2022 cumulative security updates. Users will experience null reference exceptions and images or glyphs displaying incorrectly when viewing XPS documents rendered using affected Windows Presentation Foundation (WPF) based apps</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/01/01/cyber-security-news-january-2023/comment-page-9/#comment-1794242</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 01 Feb 2023 08:26:59 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192998#comment-1794242</guid>
		<description><![CDATA[Pro-Russian DDoS attacks raise alarm in Denmark, U.S.
https://therecord.media/ddos-denmark-us-russia-killnet/
Distributed denial-of-service (DDoS) attacks by pro-Russian hacking groups are causing alarm in the U.S. and Denmark after several incidents affected websites of hospitals and government offices in both countries. On Tuesday, Denmark announced that it was raising its cyber risk alert level after weeks of attacks on banks and the countrys defense ministry]]></description>
		<content:encoded><![CDATA[<p>Pro-Russian DDoS attacks raise alarm in Denmark, U.S.<br />
<a href="https://therecord.media/ddos-denmark-us-russia-killnet/" rel="nofollow">https://therecord.media/ddos-denmark-us-russia-killnet/</a><br />
Distributed denial-of-service (DDoS) attacks by pro-Russian hacking groups are causing alarm in the U.S. and Denmark after several incidents affected websites of hospitals and government offices in both countries. On Tuesday, Denmark announced that it was raising its cyber risk alert level after weeks of attacks on banks and the countrys defense ministry</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/01/01/cyber-security-news-january-2023/comment-page-9/#comment-1794241</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 01 Feb 2023 08:26:38 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192998#comment-1794241</guid>
		<description><![CDATA[Riot Games refuses to pay ransom to avoid League of Legends leak https://www.malwarebytes.com/blog/news/2023/01/stolen-code-from-riot-games-already-being-auctioned-off
After confirming threat actors were able to steal some of its code, Riot Games has also revealed that it received a ransom email from its attacker. The attackers demanding $10 million to stop them leaking source code from League of Legend&#039;s and other games]]></description>
		<content:encoded><![CDATA[<p>Riot Games refuses to pay ransom to avoid League of Legends leak <a href="https://www.malwarebytes.com/blog/news/2023/01/stolen-code-from-riot-games-already-being-auctioned-off" rel="nofollow">https://www.malwarebytes.com/blog/news/2023/01/stolen-code-from-riot-games-already-being-auctioned-off</a><br />
After confirming threat actors were able to steal some of its code, Riot Games has also revealed that it received a ransom email from its attacker. The attackers demanding $10 million to stop them leaking source code from League of Legend&#8217;s and other games</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/01/01/cyber-security-news-january-2023/comment-page-9/#comment-1794236</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 01 Feb 2023 08:20:42 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192998#comment-1794236</guid>
		<description><![CDATA[Realtek Vulnerability Under Attack: Over 134 Million Attempts to Hack IoT Devices https://thehackernews.com/2023/01/realtek-vulnerability-under-attack-134.html
Researchers are warning about a spike in exploitation attempts weaponizing a now-patched critical remote code execution flaw in Realtek Jungle SDK since the start of August 2022. According to Palo Alto Networks Unit 42, the ongoing campaign is said to have recorded
134 million exploit attempts as of December 2022, with 97% of the attacks occurring in the past four months]]></description>
		<content:encoded><![CDATA[<p>Realtek Vulnerability Under Attack: Over 134 Million Attempts to Hack IoT Devices <a href="https://thehackernews.com/2023/01/realtek-vulnerability-under-attack-134.html" rel="nofollow">https://thehackernews.com/2023/01/realtek-vulnerability-under-attack-134.html</a><br />
Researchers are warning about a spike in exploitation attempts weaponizing a now-patched critical remote code execution flaw in Realtek Jungle SDK since the start of August 2022. According to Palo Alto Networks Unit 42, the ongoing campaign is said to have recorded<br />
134 million exploit attempts as of December 2022, with 97% of the attacks occurring in the past four months</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/01/01/cyber-security-news-january-2023/comment-page-9/#comment-1794195</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 31 Jan 2023 15:30:43 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192998#comment-1794195</guid>
		<description><![CDATA[”Olemme kaapanneet tilisi” – Hannele Laurilta kiristettiin tänä aamuna rahaa julmalla viestillä, menetti elinkeinonsa
https://www.iltalehti.fi/viihdeuutiset/a/6431acae-9971-4392-bb81-c9f4c18ab94a

Hannele Laurin nyt jo poistuneella Instagram-käyttäjällä oli yli 22 tuhatta seuraajaa. 

Näyttelijä Hannele Lauri sai tiistaina 31. tammikuuta pelottavan viestin puhelimeensa. Tuntematon numero kirjoitti Whatsapp-viestissä Laurille, että hänen täytyy lähettää rahaa tai hänen Instagram-tilinsä poistuu.

– Olemme kaapanneet tilisi. Jos haluat tilisi takaisin, joudut maksamaan. Ota yhteyttä, viestissä luki englanniksi.

Lauri ei suostunut kiristykseen, ja pian hän huomasi Instagram-tilinsä olevan poissa. Lauri kertoo Iltalehdelle olevansa todella raivoissaan tilanteen takia.]]></description>
		<content:encoded><![CDATA[<p>”Olemme kaapanneet tilisi” – Hannele Laurilta kiristettiin tänä aamuna rahaa julmalla viestillä, menetti elinkeinonsa<br />
<a href="https://www.iltalehti.fi/viihdeuutiset/a/6431acae-9971-4392-bb81-c9f4c18ab94a" rel="nofollow">https://www.iltalehti.fi/viihdeuutiset/a/6431acae-9971-4392-bb81-c9f4c18ab94a</a></p>
<p>Hannele Laurin nyt jo poistuneella Instagram-käyttäjällä oli yli 22 tuhatta seuraajaa. </p>
<p>Näyttelijä Hannele Lauri sai tiistaina 31. tammikuuta pelottavan viestin puhelimeensa. Tuntematon numero kirjoitti Whatsapp-viestissä Laurille, että hänen täytyy lähettää rahaa tai hänen Instagram-tilinsä poistuu.</p>
<p>– Olemme kaapanneet tilisi. Jos haluat tilisi takaisin, joudut maksamaan. Ota yhteyttä, viestissä luki englanniksi.</p>
<p>Lauri ei suostunut kiristykseen, ja pian hän huomasi Instagram-tilinsä olevan poissa. Lauri kertoo Iltalehdelle olevansa todella raivoissaan tilanteen takia.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
