<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security news May 2023</title>
	<atom:link href="http://www.epanorama.net/blog/2023/05/02/cyber-security-news-may-2023/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2023/05/02/cyber-security-news-may-2023/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Fri, 17 Apr 2026 22:58:49 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/05/02/cyber-security-news-may-2023/comment-page-8/#comment-1804867</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 03 Jun 2023 09:47:36 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=193722#comment-1804867</guid>
		<description><![CDATA[https://www.reuters.com/technology/ai-means-everyone-can-now-be-programmer-nvidia-chief-says-2023-05-29/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.reuters.com/technology/ai-means-everyone-can-now-be-programmer-nvidia-chief-says-2023-05-29/" rel="nofollow">https://www.reuters.com/technology/ai-means-everyone-can-now-be-programmer-nvidia-chief-says-2023-05-29/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/05/02/cyber-security-news-may-2023/comment-page-8/#comment-1804866</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 03 Jun 2023 09:46:34 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=193722#comment-1804866</guid>
		<description><![CDATA[Viisi tietomurtoa samaan aikaan – pelottava ilmiö tuli kerralla näkyväksi
Uhkatutkijan uutiset järjestäytyneestä verkkorikollisuudesta ovat huonoja.
https://www.is.fi/digitoday/tietoturva/art-2000009618361.html]]></description>
		<content:encoded><![CDATA[<p>Viisi tietomurtoa samaan aikaan – pelottava ilmiö tuli kerralla näkyväksi<br />
Uhkatutkijan uutiset järjestäytyneestä verkkorikollisuudesta ovat huonoja.<br />
<a href="https://www.is.fi/digitoday/tietoturva/art-2000009618361.html" rel="nofollow">https://www.is.fi/digitoday/tietoturva/art-2000009618361.html</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/05/02/cyber-security-news-may-2023/comment-page-8/#comment-1804784</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 02 Jun 2023 12:59:52 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=193722#comment-1804784</guid>
		<description><![CDATA[https://www.bleepingcomputer.com/news/security/android-apps-with-spyware-installed-421-million-times-from-google-play/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.bleepingcomputer.com/news/security/android-apps-with-spyware-installed-421-million-times-from-google-play/" rel="nofollow">https://www.bleepingcomputer.com/news/security/android-apps-with-spyware-installed-421-million-times-from-google-play/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/05/02/cyber-security-news-may-2023/comment-page-8/#comment-1804783</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 02 Jun 2023 12:59:36 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=193722#comment-1804783</guid>
		<description><![CDATA[Google Issues Android TV Security Warning https://www.forbes.com/sites/daveywinder/2023/05/30/google-issues-security-warning-for-android-tv-users/

Google has issued a warning to users of Android TV OS devices to be aware that some TV boxes are not what they appear, certainly when it comes to the security implications for their users.

In an official Google Android TV OS support forum posting, a Google employee confirms that the company has “recently received questions regarding TV boxes that are built with Android Open Source Project and are being marketed to appear as Android TV OS devices.”

However, as we all know, appearances can be deceptive. Even though, the warning continues, these may have Google apps and even the Play Store installed, that doesn’t mean these are licensed by Google. Which means, it continues, “these devices are not Play Protect certified.”

Alkup.
https://support.google.com/androidtv/thread/217840369?hl=en&amp;sjid=6644248032415929751-NA]]></description>
		<content:encoded><![CDATA[<p>Google Issues Android TV Security Warning <a href="https://www.forbes.com/sites/daveywinder/2023/05/30/google-issues-security-warning-for-android-tv-users/" rel="nofollow">https://www.forbes.com/sites/daveywinder/2023/05/30/google-issues-security-warning-for-android-tv-users/</a></p>
<p>Google has issued a warning to users of Android TV OS devices to be aware that some TV boxes are not what they appear, certainly when it comes to the security implications for their users.</p>
<p>In an official Google Android TV OS support forum posting, a Google employee confirms that the company has “recently received questions regarding TV boxes that are built with Android Open Source Project and are being marketed to appear as Android TV OS devices.”</p>
<p>However, as we all know, appearances can be deceptive. Even though, the warning continues, these may have Google apps and even the Play Store installed, that doesn’t mean these are licensed by Google. Which means, it continues, “these devices are not Play Protect certified.”</p>
<p>Alkup.<br />
<a href="https://support.google.com/androidtv/thread/217840369?hl=en&#038;sjid=6644248032415929751-NA" rel="nofollow">https://support.google.com/androidtv/thread/217840369?hl=en&#038;sjid=6644248032415929751-NA</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/05/02/cyber-security-news-may-2023/comment-page-8/#comment-1804649</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Jun 2023 07:18:16 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=193722#comment-1804649</guid>
		<description><![CDATA[Nearly 9 million people affected by data breach from cyberattack on dental insurer https://therecord.media/nearly-nine-million-affected-by-mcna-breach

A ransomware attack on a major dental insurance provider leaked the personal information of nearly nine million people across the United States, according to documents filed with state regulators.

Managed Care of North America (MCNA) is the largest dental insurer in the nation for government-sponsored Medicaid and Children’s Health Insurance Programs, providing services to more than five million members across eight states.

On March 6, its IT team became aware of a hack and later discovered that “certain systems within the network may have been infected with malicious code.”

On March 27, the LockBit ransomware group took credit for the attack, claiming to have stolen 700 gigabytes of data. An investigation — completed on May 3 and led by a cybersecurity firm — revealed that hackers had been in MCNA’s systems from February 26 to March 7 and had made copies of information.

LockBit published all of the files on April 6 after a $10 million ransom was not paid.

In a notice on their website, the company said the information stolen included more specific information about patient visits, like a dentist&#039;s name, X-rays, photos, treatment and bills. Some of the information was for the parents or guardians of patients.]]></description>
		<content:encoded><![CDATA[<p>Nearly 9 million people affected by data breach from cyberattack on dental insurer <a href="https://therecord.media/nearly-nine-million-affected-by-mcna-breach" rel="nofollow">https://therecord.media/nearly-nine-million-affected-by-mcna-breach</a></p>
<p>A ransomware attack on a major dental insurance provider leaked the personal information of nearly nine million people across the United States, according to documents filed with state regulators.</p>
<p>Managed Care of North America (MCNA) is the largest dental insurer in the nation for government-sponsored Medicaid and Children’s Health Insurance Programs, providing services to more than five million members across eight states.</p>
<p>On March 6, its IT team became aware of a hack and later discovered that “certain systems within the network may have been infected with malicious code.”</p>
<p>On March 27, the LockBit ransomware group took credit for the attack, claiming to have stolen 700 gigabytes of data. An investigation — completed on May 3 and led by a cybersecurity firm — revealed that hackers had been in MCNA’s systems from February 26 to March 7 and had made copies of information.</p>
<p>LockBit published all of the files on April 6 after a $10 million ransom was not paid.</p>
<p>In a notice on their website, the company said the information stolen included more specific information about patient visits, like a dentist&#8217;s name, X-rays, photos, treatment and bills. Some of the information was for the parents or guardians of patients.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/05/02/cyber-security-news-may-2023/comment-page-8/#comment-1804648</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Jun 2023 07:18:01 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=193722#comment-1804648</guid>
		<description><![CDATA[Russia’s ‘Silicon Valley’ hit by cyberattack; Ukrainian group claims deep access https://therecord.media/skolkovo-foundation-cyberattack-russia-ukraine

Ukrainian hackers have breached the systems of Skolkovo Foundation, the agency which oversees the high-tech business area located on the outskirts of Moscow.
The Foundation was founded and charged by Russian former President Dmitry Medvedev to rival Silicon Valley in the U.S.

According to Skolkovo&#039;s statement, the hackers managed to gain limited access to certain information systems of the organization, including its file hosting service on physical servers.

A group of Ukrainian hacktivists took credit for the attack last week and shared screenshots on Telegram of systems they managed to access.]]></description>
		<content:encoded><![CDATA[<p>Russia’s ‘Silicon Valley’ hit by cyberattack; Ukrainian group claims deep access <a href="https://therecord.media/skolkovo-foundation-cyberattack-russia-ukraine" rel="nofollow">https://therecord.media/skolkovo-foundation-cyberattack-russia-ukraine</a></p>
<p>Ukrainian hackers have breached the systems of Skolkovo Foundation, the agency which oversees the high-tech business area located on the outskirts of Moscow.<br />
The Foundation was founded and charged by Russian former President Dmitry Medvedev to rival Silicon Valley in the U.S.</p>
<p>According to Skolkovo&#8217;s statement, the hackers managed to gain limited access to certain information systems of the organization, including its file hosting service on physical servers.</p>
<p>A group of Ukrainian hacktivists took credit for the attack last week and shared screenshots on Telegram of systems they managed to access.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/05/02/cyber-security-news-may-2023/comment-page-8/#comment-1804646</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Jun 2023 07:17:17 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=193722#comment-1804646</guid>
		<description><![CDATA[Cyberattack disrupts Greek national high school exams https://therecord.media/cyberattack-disrupts-greek-exams

End-of-year high school exams in Greece were disrupted this week by &quot;one of the most extensive cyberattacks in the country’s history,&quot; according to the country’s Education Ministry.

The distributed denial-of-service attack, or DDoS, targeted Greece’s online examination platform, which is designed to set a uniform exam standard nationwide. In a DDoS attack, a server is flooded with internet traffic from a variety of sources simultaneously.]]></description>
		<content:encoded><![CDATA[<p>Cyberattack disrupts Greek national high school exams <a href="https://therecord.media/cyberattack-disrupts-greek-exams" rel="nofollow">https://therecord.media/cyberattack-disrupts-greek-exams</a></p>
<p>End-of-year high school exams in Greece were disrupted this week by &#8220;one of the most extensive cyberattacks in the country’s history,&#8221; according to the country’s Education Ministry.</p>
<p>The distributed denial-of-service attack, or DDoS, targeted Greece’s online examination platform, which is designed to set a uniform exam standard nationwide. In a DDoS attack, a server is flooded with internet traffic from a variety of sources simultaneously.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/05/02/cyber-security-news-may-2023/comment-page-8/#comment-1804645</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Jun 2023 07:16:54 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=193722#comment-1804645</guid>
		<description><![CDATA[Critical Firmware Vulnerability in Gigabyte Systems Exposes ~7 Million Devices https://thehackernews.com/2023/05/critical-firmware-vulnerability-in.html

Cybersecurity researchers have found &quot;backdoor-like behavior&quot; within Gigabyte systems, which they say enables the UEFI firmware of the devices to drop a Windows executable and retrieve updates in an unsecure format.

Firmware security firm Eclypsium said it first detected the anomaly in April 2023. Gigabyte has since acknowledged and addressed the issue.]]></description>
		<content:encoded><![CDATA[<p>Critical Firmware Vulnerability in Gigabyte Systems Exposes ~7 Million Devices <a href="https://thehackernews.com/2023/05/critical-firmware-vulnerability-in.html" rel="nofollow">https://thehackernews.com/2023/05/critical-firmware-vulnerability-in.html</a></p>
<p>Cybersecurity researchers have found &#8220;backdoor-like behavior&#8221; within Gigabyte systems, which they say enables the UEFI firmware of the devices to drop a Windows executable and retrieve updates in an unsecure format.</p>
<p>Firmware security firm Eclypsium said it first detected the anomaly in April 2023. Gigabyte has since acknowledged and addressed the issue.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/05/02/cyber-security-news-may-2023/comment-page-8/#comment-1804644</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Jun 2023 07:16:19 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=193722#comment-1804644</guid>
		<description><![CDATA[RomCom malware spread via Google Ads for ChatGPT, GIMP, more https://www.bleepingcomputer.com/news/security/romcom-malware-spread-via-google-ads-for-chatgpt-gimp-more/

A new campaign distributing the RomCom backdoor malware is impersonating the websites of well-known or fictional software, tricking users into downloading and launching malicious installers.

The latest campaign was uncovered by Trend Micro, who have followed RomCom since the summer of 2022. The researchers report that the threat actors behind the malware have escalated its evasion by using payload encryption and obfuscation and expanded the tool&#039;s capabilities by introducing new and powerful commands.

Most websites used for distributing RomCom to victims concern remote desktop management applications, which increases the likelihood of attackers employing phishing or social engineering to approach their targets.]]></description>
		<content:encoded><![CDATA[<p>RomCom malware spread via Google Ads for ChatGPT, GIMP, more <a href="https://www.bleepingcomputer.com/news/security/romcom-malware-spread-via-google-ads-for-chatgpt-gimp-more/" rel="nofollow">https://www.bleepingcomputer.com/news/security/romcom-malware-spread-via-google-ads-for-chatgpt-gimp-more/</a></p>
<p>A new campaign distributing the RomCom backdoor malware is impersonating the websites of well-known or fictional software, tricking users into downloading and launching malicious installers.</p>
<p>The latest campaign was uncovered by Trend Micro, who have followed RomCom since the summer of 2022. The researchers report that the threat actors behind the malware have escalated its evasion by using payload encryption and obfuscation and expanded the tool&#8217;s capabilities by introducing new and powerful commands.</p>
<p>Most websites used for distributing RomCom to victims concern remote desktop management applications, which increases the likelihood of attackers employing phishing or social engineering to approach their targets.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/05/02/cyber-security-news-may-2023/comment-page-8/#comment-1804643</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Jun 2023 07:15:39 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=193722#comment-1804643</guid>
		<description><![CDATA[WordPress plugin ‘Gravity Forms’ vulnerable to PHP object injection https://www.bleepingcomputer.com/news/security/wordpress-plugin-gravity-forms-vulnerable-to-php-object-injection/

The premium WordPress plugin &#039;Gravity Forms,&#039; currently used by over 930,000 websites, is vulnerable to unauthenticated PHP Object Injection.

Gravity Forms is a custom form builder website owners use for creating payment, registration, file upload, or any other form required for visitor-site interactions or transactions.

On its website, Gravity Forms claims it is used by a wide variety of large companies, including Airbnb, ESPN, Nike, NASA, PennState, and Unicef.]]></description>
		<content:encoded><![CDATA[<p>WordPress plugin ‘Gravity Forms’ vulnerable to PHP object injection <a href="https://www.bleepingcomputer.com/news/security/wordpress-plugin-gravity-forms-vulnerable-to-php-object-injection/" rel="nofollow">https://www.bleepingcomputer.com/news/security/wordpress-plugin-gravity-forms-vulnerable-to-php-object-injection/</a></p>
<p>The premium WordPress plugin &#8216;Gravity Forms,&#8217; currently used by over 930,000 websites, is vulnerable to unauthenticated PHP Object Injection.</p>
<p>Gravity Forms is a custom form builder website owners use for creating payment, registration, file upload, or any other form required for visitor-site interactions or transactions.</p>
<p>On its website, Gravity Forms claims it is used by a wide variety of large companies, including Airbnb, ESPN, Nike, NASA, PennState, and Unicef.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
