<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber prediction lists 2023</title>
	<atom:link href="http://www.epanorama.net/blog/2023/01/18/cyber-prediction-lists-2023/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2023/01/18/cyber-prediction-lists-2023/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Sat, 04 Apr 2026 21:59:57 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/01/18/cyber-prediction-lists-2023/comment-page-1/#comment-1813962</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 22 Sep 2023 12:00:31 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192922#comment-1813962</guid>
		<description><![CDATA[You Can Use An Old Tape Deck As A Distortion Pedal
https://hackaday.com/2023/09/21/you-can-use-an-old-tape-deck-as-a-distortion-pedal/

Distorted guitars were a big part of the rock revolution last century; we try to forget about the roll. As a youth, [David Hilowitz] couldn’t afford a loud aggressive amp, a distortion pedal, or even a proper electric guitar. This experience ended up teaching him that you can use random old audio hardware as a distortion effect.

[David’s] guitar journey started when he found a classical guitar on a dumpster. He learned to play, but longed for the sound of a proper electric guitar. Family friends gifted him a solitary pickup, intending he build a guitar, but he simply duct-taped it to his steel-strung classical instead. The only thing he lacked was an amp. He made do with an old stereo system and a record pre-amp. With his his faux-electric guitar plugged into the microphone input, he was blessed with a rudimentary but pleasant distortion that filled his heart with joy.

https://www.youtube.com/watch?v=FjJ9PeTciqc]]></description>
		<content:encoded><![CDATA[<p>You Can Use An Old Tape Deck As A Distortion Pedal<br />
<a href="https://hackaday.com/2023/09/21/you-can-use-an-old-tape-deck-as-a-distortion-pedal/" rel="nofollow">https://hackaday.com/2023/09/21/you-can-use-an-old-tape-deck-as-a-distortion-pedal/</a></p>
<p>Distorted guitars were a big part of the rock revolution last century; we try to forget about the roll. As a youth, [David Hilowitz] couldn’t afford a loud aggressive amp, a distortion pedal, or even a proper electric guitar. This experience ended up teaching him that you can use random old audio hardware as a distortion effect.</p>
<p>[David’s] guitar journey started when he found a classical guitar on a dumpster. He learned to play, but longed for the sound of a proper electric guitar. Family friends gifted him a solitary pickup, intending he build a guitar, but he simply duct-taped it to his steel-strung classical instead. The only thing he lacked was an amp. He made do with an old stereo system and a record pre-amp. With his his faux-electric guitar plugged into the microphone input, he was blessed with a rudimentary but pleasant distortion that filled his heart with joy.</p>
<p><a href="https://www.youtube.com/watch?v=FjJ9PeTciqc" rel="nofollow">https://www.youtube.com/watch?v=FjJ9PeTciqc</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/01/18/cyber-prediction-lists-2023/comment-page-1/#comment-1813952</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 22 Sep 2023 09:36:46 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192922#comment-1813952</guid>
		<description><![CDATA[https://www.securityweek.com/hacker-conversations-casey-ellis-hacker-and-ringmaster-at-bugcrowd/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.securityweek.com/hacker-conversations-casey-ellis-hacker-and-ringmaster-at-bugcrowd/" rel="nofollow">https://www.securityweek.com/hacker-conversations-casey-ellis-hacker-and-ringmaster-at-bugcrowd/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/01/18/cyber-prediction-lists-2023/comment-page-1/#comment-1813946</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 22 Sep 2023 09:33:38 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192922#comment-1813946</guid>
		<description><![CDATA[UK Minister Warns Meta Over End-to-End Encryption

Britain’s interior minister warned Meta that out end-to-end encryption on its platforms must “not to come at a cost to our children’s safety”.

https://www.securityweek.com/uk-minister-warns-meta-over-end-to-end-encryption/]]></description>
		<content:encoded><![CDATA[<p>UK Minister Warns Meta Over End-to-End Encryption</p>
<p>Britain’s interior minister warned Meta that out end-to-end encryption on its platforms must “not to come at a cost to our children’s safety”.</p>
<p><a href="https://www.securityweek.com/uk-minister-warns-meta-over-end-to-end-encryption/" rel="nofollow">https://www.securityweek.com/uk-minister-warns-meta-over-end-to-end-encryption/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/01/18/cyber-prediction-lists-2023/comment-page-1/#comment-1813940</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 22 Sep 2023 09:28:16 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192922#comment-1813940</guid>
		<description><![CDATA[Staying on Topic in an Off Topic World
https://www.securityweek.com/staying-on-topic-in-an-off-topic-world/

Learning how to keep discussions on-topic is an important skill for security professionals to learn, and it can allow them to continue to improve their security programs.

Have you ever been in a meeting where someone keeps taking the discussion off topic? Have you ever tried to get answers to straightforward questions when speaking with someone, only to have them constantly going off on what seem to be tangents? Have you ever been part of an email thread or chat group where the discussion just seems to go around in circles?

We might not want to believe it, but this is often a tactic employed by certain personality types. In other words, it is seldom the case that a person cannot focus or is scatter-brained. Rather, it is far more likely that they are deliberately trying to derail what should be a relatively straightforward discussion.

You might ask why a person would do this. Different people have different motivations, but typically people do this for one of the following reasons:

    They are looking for control/power (knowledge is power after all)
    They are looking to hide information (perhaps because they are embarrassed by something or perhaps because it undermines an ulterior motive they have)
    They do not know the answer but do not want to admit to that
    They do not want to accept responsibility for a poor decision or a mistake they may have made
    They are looking to avoid being exposed for having lied and/or hidden information in the past

This is not an exhaustive list – there may be other motivations as well, of course. My point here is that if we as security professionals find that we are having a difficult time getting straight answers, there is usually a reason. Unfortunately, we cannot expect these types of people to change. Instead, we must learn how to compensate for this type of personality in order to continue advancing the state of our security programs.]]></description>
		<content:encoded><![CDATA[<p>Staying on Topic in an Off Topic World<br />
<a href="https://www.securityweek.com/staying-on-topic-in-an-off-topic-world/" rel="nofollow">https://www.securityweek.com/staying-on-topic-in-an-off-topic-world/</a></p>
<p>Learning how to keep discussions on-topic is an important skill for security professionals to learn, and it can allow them to continue to improve their security programs.</p>
<p>Have you ever been in a meeting where someone keeps taking the discussion off topic? Have you ever tried to get answers to straightforward questions when speaking with someone, only to have them constantly going off on what seem to be tangents? Have you ever been part of an email thread or chat group where the discussion just seems to go around in circles?</p>
<p>We might not want to believe it, but this is often a tactic employed by certain personality types. In other words, it is seldom the case that a person cannot focus or is scatter-brained. Rather, it is far more likely that they are deliberately trying to derail what should be a relatively straightforward discussion.</p>
<p>You might ask why a person would do this. Different people have different motivations, but typically people do this for one of the following reasons:</p>
<p>    They are looking for control/power (knowledge is power after all)<br />
    They are looking to hide information (perhaps because they are embarrassed by something or perhaps because it undermines an ulterior motive they have)<br />
    They do not know the answer but do not want to admit to that<br />
    They do not want to accept responsibility for a poor decision or a mistake they may have made<br />
    They are looking to avoid being exposed for having lied and/or hidden information in the past</p>
<p>This is not an exhaustive list – there may be other motivations as well, of course. My point here is that if we as security professionals find that we are having a difficult time getting straight answers, there is usually a reason. Unfortunately, we cannot expect these types of people to change. Instead, we must learn how to compensate for this type of personality in order to continue advancing the state of our security programs.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/01/18/cyber-prediction-lists-2023/comment-page-1/#comment-1813938</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 22 Sep 2023 09:25:32 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192922#comment-1813938</guid>
		<description><![CDATA[Intel Launches New Attestation Service as Part of Trust Authority Portfolio
https://www.securityweek.com/intel-launches-new-attestation-service-as-part-of-trust-authority-portfolio/

Intel announces general availability of attestation service that is part of Trust Authority, a new portfolio of security software and services.

Chip giant Intel announced on the second day of its Intel Innovation 2023 event the general availability of an attestation service that is part of Trust Authority, a new portfolio of security software and services.

The new attestation software-as-a-service, codenamed Project Amber, is the first service in the Intel Trust Authority portfolio. It offers a unified and independent assessment of trusted execution environment (TEE) integrity and policy enforcement, as well as audit records. 

It enables organizations to independently verify the authenticity and integrity of an environment, and ensure that the data and workloads inside that environment have not been compromised. It also helps ensure compliance with privacy and data sovereignty regulations.

The attestation service can be used with Intel confidential computing, including on premises, in multi-cloud or hybrid environments, and at the edge.  

https://www.intel.com/content/www/us/en/security/project-amber.html]]></description>
		<content:encoded><![CDATA[<p>Intel Launches New Attestation Service as Part of Trust Authority Portfolio<br />
<a href="https://www.securityweek.com/intel-launches-new-attestation-service-as-part-of-trust-authority-portfolio/" rel="nofollow">https://www.securityweek.com/intel-launches-new-attestation-service-as-part-of-trust-authority-portfolio/</a></p>
<p>Intel announces general availability of attestation service that is part of Trust Authority, a new portfolio of security software and services.</p>
<p>Chip giant Intel announced on the second day of its Intel Innovation 2023 event the general availability of an attestation service that is part of Trust Authority, a new portfolio of security software and services.</p>
<p>The new attestation software-as-a-service, codenamed Project Amber, is the first service in the Intel Trust Authority portfolio. It offers a unified and independent assessment of trusted execution environment (TEE) integrity and policy enforcement, as well as audit records. </p>
<p>It enables organizations to independently verify the authenticity and integrity of an environment, and ensure that the data and workloads inside that environment have not been compromised. It also helps ensure compliance with privacy and data sovereignty regulations.</p>
<p>The attestation service can be used with Intel confidential computing, including on premises, in multi-cloud or hybrid environments, and at the edge.  </p>
<p><a href="https://www.intel.com/content/www/us/en/security/project-amber.html" rel="nofollow">https://www.intel.com/content/www/us/en/security/project-amber.html</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/01/18/cyber-prediction-lists-2023/comment-page-1/#comment-1813818</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 21 Sep 2023 06:23:24 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192922#comment-1813818</guid>
		<description><![CDATA[Attacks on 5G Infrastructure From Users’ Devices https://www.trendmicro.com/en_us/research/23/i/attacks-on-5g-infrastructure-from-users-devices.html

With the growing spectrum for commercial use, usage and popularization of private 5G networks are on the rise. The manufacturing, defense, ports, energy, logistics, and mining industries are just some of the earliest adopters of these private networks, especially for companies rapidly leaning on the internet of things (IoT) for digitizing production systems and supply chains. Unlike public grids, the cellular infrastructure equipment in private 5G might be owned and operated by the user-enterprise themselves, system integrators, or by carriers. However, given the growing study and exploration of the use of 5G for the development of various technologies, cybercriminals are also looking into exploiting the threats and risks that can be used to intrude into the systems and networks of both users and organizations via this new communication standard. This entry explores how normal user devices can be abused in relation to 5G’s network infrastructure and use cases.]]></description>
		<content:encoded><![CDATA[<p>Attacks on 5G Infrastructure From Users’ Devices <a href="https://www.trendmicro.com/en_us/research/23/i/attacks-on-5g-infrastructure-from-users-devices.html" rel="nofollow">https://www.trendmicro.com/en_us/research/23/i/attacks-on-5g-infrastructure-from-users-devices.html</a></p>
<p>With the growing spectrum for commercial use, usage and popularization of private 5G networks are on the rise. The manufacturing, defense, ports, energy, logistics, and mining industries are just some of the earliest adopters of these private networks, especially for companies rapidly leaning on the internet of things (IoT) for digitizing production systems and supply chains. Unlike public grids, the cellular infrastructure equipment in private 5G might be owned and operated by the user-enterprise themselves, system integrators, or by carriers. However, given the growing study and exploration of the use of 5G for the development of various technologies, cybercriminals are also looking into exploiting the threats and risks that can be used to intrude into the systems and networks of both users and organizations via this new communication standard. This entry explores how normal user devices can be abused in relation to 5G’s network infrastructure and use cases.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/01/18/cyber-prediction-lists-2023/comment-page-1/#comment-1813817</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 21 Sep 2023 06:23:09 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192922#comment-1813817</guid>
		<description><![CDATA[Chinese Malware Appears in Earnest Across Cybercrime Threat Landscape https://www.proofpoint.com/us/blog/threat-insight/chinese-malware-appears-earnest-across-cybercrime-threat-landscape

Proofpoint has observed an increase in activity from specific malware families targeting Chinese-language speakers. Campaigns include Chinese-language lures and malware typically associated with Chinese cybercrime activity.

Newly observed ValleyRAT is emerging as a new malware among Chinese-themed cybercrime activity, while Sainbox RAT and related variants are recently active as well. The increase in Chinese language malware activity indicates an expansion of the Chinese malware ecosystem, either through increased availability or ease of access to payloads and target lists, as well as potentially increased activity by Chinese speaking cybercrime operators.]]></description>
		<content:encoded><![CDATA[<p>Chinese Malware Appears in Earnest Across Cybercrime Threat Landscape <a href="https://www.proofpoint.com/us/blog/threat-insight/chinese-malware-appears-earnest-across-cybercrime-threat-landscape" rel="nofollow">https://www.proofpoint.com/us/blog/threat-insight/chinese-malware-appears-earnest-across-cybercrime-threat-landscape</a></p>
<p>Proofpoint has observed an increase in activity from specific malware families targeting Chinese-language speakers. Campaigns include Chinese-language lures and malware typically associated with Chinese cybercrime activity.</p>
<p>Newly observed ValleyRAT is emerging as a new malware among Chinese-themed cybercrime activity, while Sainbox RAT and related variants are recently active as well. The increase in Chinese language malware activity indicates an expansion of the Chinese malware ecosystem, either through increased availability or ease of access to payloads and target lists, as well as potentially increased activity by Chinese speaking cybercrime operators.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/01/18/cyber-prediction-lists-2023/comment-page-1/#comment-1813815</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 21 Sep 2023 06:21:36 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192922#comment-1813815</guid>
		<description><![CDATA[Marvell disputes claim Cavium backdoored chips for Uncle Sam https://www.theregister.com/2023/09/19/marvell_disputes_claim_that_cavium/

Cavium, a maker of semiconductors acquired in 2018 by Marvell, was allegedly identified in documents leaked in 2013 by Edward Snowden as a vendor of semiconductors backdoored for US intelligence. Marvell denies it or Cavium placed backdoors in products at the behest of the US government.

The allegations surfaced in the PhD thesis of Dr Jacob Appelbaum, &quot;Communication in a world of pervasive surveillance: Sources and methods:
Counter-strategies against pervasive surveillance architecture.&quot; Appelbaum&#039;s thesis was published in March 2022 and received little public attention until mentioned in security blog Electrospaces.net last week.]]></description>
		<content:encoded><![CDATA[<p>Marvell disputes claim Cavium backdoored chips for Uncle Sam <a href="https://www.theregister.com/2023/09/19/marvell_disputes_claim_that_cavium/" rel="nofollow">https://www.theregister.com/2023/09/19/marvell_disputes_claim_that_cavium/</a></p>
<p>Cavium, a maker of semiconductors acquired in 2018 by Marvell, was allegedly identified in documents leaked in 2013 by Edward Snowden as a vendor of semiconductors backdoored for US intelligence. Marvell denies it or Cavium placed backdoors in products at the behest of the US government.</p>
<p>The allegations surfaced in the PhD thesis of Dr Jacob Appelbaum, &#8220;Communication in a world of pervasive surveillance: Sources and methods:<br />
Counter-strategies against pervasive surveillance architecture.&#8221; Appelbaum&#8217;s thesis was published in March 2022 and received little public attention until mentioned in security blog Electrospaces.net last week.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/01/18/cyber-prediction-lists-2023/comment-page-1/#comment-1813814</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 21 Sep 2023 06:21:16 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192922#comment-1813814</guid>
		<description><![CDATA[China Accuses U.S. of Hacking Huawei Servers as Far Back as 2009 https://time.com/6315912/huawei-us-china-hacking/

China accused the U.S. of infiltrating Huawei Technologies Co. servers beginning in 2009, part of a broad-based effort to steal data that culminated in tens of thousands of cyber-attacks against Chinese targets last year.

The Tailored Access Operations unit of the National Security Agency carried out the attacks in 2009, which then continuously monitored the servers, China’s Ministry of State Security said in a post on its official WeChat account on Wednesday. It didn’t provide details of attacks since 2009.]]></description>
		<content:encoded><![CDATA[<p>China Accuses U.S. of Hacking Huawei Servers as Far Back as 2009 <a href="https://time.com/6315912/huawei-us-china-hacking/" rel="nofollow">https://time.com/6315912/huawei-us-china-hacking/</a></p>
<p>China accused the U.S. of infiltrating Huawei Technologies Co. servers beginning in 2009, part of a broad-based effort to steal data that culminated in tens of thousands of cyber-attacks against Chinese targets last year.</p>
<p>The Tailored Access Operations unit of the National Security Agency carried out the attacks in 2009, which then continuously monitored the servers, China’s Ministry of State Security said in a post on its official WeChat account on Wednesday. It didn’t provide details of attacks since 2009.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/01/18/cyber-prediction-lists-2023/comment-page-1/#comment-1798437</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 20 Mar 2023 09:44:22 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=192922#comment-1798437</guid>
		<description><![CDATA[THE FUTURE OF CYBER IS AUTOMATED MOVING TARGET DEFENSE https://blog.morphisec.com/automated-moving-target-defense-gartner
Moving Target Defense (MTD) technology is the next evolution in cybersecurity, and unlike the technologies that came before it, rather than focusing on detection and reaction, it is preventive. MTD is based on a basic premise taken from military strategy, that a moving target is harder to attack than a stationary one. MTD uses strategies that orchestrate movement or changes in IT environments across the attack surface to increase uncertainty and complexity for attackers.]]></description>
		<content:encoded><![CDATA[<p>THE FUTURE OF CYBER IS AUTOMATED MOVING TARGET DEFENSE <a href="https://blog.morphisec.com/automated-moving-target-defense-gartner" rel="nofollow">https://blog.morphisec.com/automated-moving-target-defense-gartner</a><br />
Moving Target Defense (MTD) technology is the next evolution in cybersecurity, and unlike the technologies that came before it, rather than focusing on detection and reaction, it is preventive. MTD is based on a basic premise taken from military strategy, that a moving target is harder to attack than a stationary one. MTD uses strategies that orchestrate movement or changes in IT environments across the attack surface to increase uncertainty and complexity for attackers.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
