<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security news June 2023</title>
	<atom:link href="http://www.epanorama.net/blog/2023/06/01/cyber-security-news-june-2023/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2023/06/01/cyber-security-news-june-2023/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Thu, 30 Apr 2026 06:05:38 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Andreaa23</title>
		<link>https://www.epanorama.net/blog/2023/06/01/cyber-security-news-june-2023/comment-page-7/#comment-1808656</link>
		<dc:creator><![CDATA[Andreaa23]]></dc:creator>
		<pubDate>Fri, 21 Jul 2023 09:49:41 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=193939#comment-1808656</guid>
		<description><![CDATA[I&#039;ve read a few posts on your website and I think it&#039;s very interesting and full of useful information. https://dmvpracticetest.io/]]></description>
		<content:encoded><![CDATA[<p>I&#8217;ve read a few posts on your website and I think it&#8217;s very interesting and full of useful information. <a href="https://dmvpracticetest.io/" rel="nofollow">https://dmvpracticetest.io/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/06/01/cyber-security-news-june-2023/comment-page-7/#comment-1807528</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 03 Jul 2023 08:09:40 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=193939#comment-1807528</guid>
		<description><![CDATA[MITRE Updates CWE Top 25 Most Dangerous Software Weaknesses

Use-after-free and OS command injection vulnerabilities reach the top five most dangerous software weaknesses in the 2023 CWE Top 25 list.

https://www.securityweek.com/mitre-updates-cwe-top-25-most-dangerous-software-weaknesses/]]></description>
		<content:encoded><![CDATA[<p>MITRE Updates CWE Top 25 Most Dangerous Software Weaknesses</p>
<p>Use-after-free and OS command injection vulnerabilities reach the top five most dangerous software weaknesses in the 2023 CWE Top 25 list.</p>
<p><a href="https://www.securityweek.com/mitre-updates-cwe-top-25-most-dangerous-software-weaknesses/" rel="nofollow">https://www.securityweek.com/mitre-updates-cwe-top-25-most-dangerous-software-weaknesses/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/06/01/cyber-security-news-june-2023/comment-page-7/#comment-1807527</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 03 Jul 2023 08:09:10 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=193939#comment-1807527</guid>
		<description><![CDATA[Samsung Phone Flaws Added to CISA ‘Must Patch’ List Likely Exploited by Spyware Vendor
https://www.securityweek.com/samsung-phone-flaws-added-to-cisa-must-patch-list-likely-exploited-by-spyware-vendor/

CISA adds 6 Samsung mobile device flaws to its known exploited vulnerabilities catalog and they have likely been exploited by a spyware vendor.

The US Cybersecurity and Infrastructure Security Agency (CISA) has added half a dozen flaws affecting Samsung smartphones to its Known Exploited Vulnerabilities Catalog, and they have all likely been exploited by a commercial spyware vendor.

CISA added eight new vulnerabilities to its catalog on Thursday, including two D-Link router and access point vulnerabilities exploited by a Mirai botnet variant. The six remaining security holes impact Samsung mobile devices and they were all patched by the technology giant in 2021.

The vulnerabilities include CVE-2021-25487, an out-of-bounds read in the modem interface driver that can lead to arbitrary code execution, fixed in October 2021. Samsung has classified the bug as ‘moderate’, but its NVD advisory says it’s ‘high severity’ based on CVSS score.]]></description>
		<content:encoded><![CDATA[<p>Samsung Phone Flaws Added to CISA ‘Must Patch’ List Likely Exploited by Spyware Vendor<br />
<a href="https://www.securityweek.com/samsung-phone-flaws-added-to-cisa-must-patch-list-likely-exploited-by-spyware-vendor/" rel="nofollow">https://www.securityweek.com/samsung-phone-flaws-added-to-cisa-must-patch-list-likely-exploited-by-spyware-vendor/</a></p>
<p>CISA adds 6 Samsung mobile device flaws to its known exploited vulnerabilities catalog and they have likely been exploited by a spyware vendor.</p>
<p>The US Cybersecurity and Infrastructure Security Agency (CISA) has added half a dozen flaws affecting Samsung smartphones to its Known Exploited Vulnerabilities Catalog, and they have all likely been exploited by a commercial spyware vendor.</p>
<p>CISA added eight new vulnerabilities to its catalog on Thursday, including two D-Link router and access point vulnerabilities exploited by a Mirai botnet variant. The six remaining security holes impact Samsung mobile devices and they were all patched by the technology giant in 2021.</p>
<p>The vulnerabilities include CVE-2021-25487, an out-of-bounds read in the modem interface driver that can lead to arbitrary code execution, fixed in October 2021. Samsung has classified the bug as ‘moderate’, but its NVD advisory says it’s ‘high severity’ based on CVSS score.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/06/01/cyber-security-news-june-2023/comment-page-7/#comment-1807526</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 03 Jul 2023 08:08:26 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=193939#comment-1807526</guid>
		<description><![CDATA[200,000 WordPress Sites Exposed to Attacks Exploiting Flaw in ‘Ultimate Member’ Plugin

Attackers exploit critical vulnerability in the Ultimate Member plugin to create administrative accounts on WordPress websites.
https://www.securityweek.com/200000-wordpress-sites-exposed-to-attacks-exploiting-flaw-in-ultimate-member-plugin/]]></description>
		<content:encoded><![CDATA[<p>200,000 WordPress Sites Exposed to Attacks Exploiting Flaw in ‘Ultimate Member’ Plugin</p>
<p>Attackers exploit critical vulnerability in the Ultimate Member plugin to create administrative accounts on WordPress websites.<br />
<a href="https://www.securityweek.com/200000-wordpress-sites-exposed-to-attacks-exploiting-flaw-in-ultimate-member-plugin/" rel="nofollow">https://www.securityweek.com/200000-wordpress-sites-exposed-to-attacks-exploiting-flaw-in-ultimate-member-plugin/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/06/01/cyber-security-news-june-2023/comment-page-7/#comment-1807525</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 03 Jul 2023 08:07:59 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=193939#comment-1807525</guid>
		<description><![CDATA[In Other News: Hospital Infected via USB Drive, EU Cybersecurity Rules, Free Security Tools
https://www.securityweek.com/in-other-news-hospital-infected-via-usb-drive-eu-cybersecurity-rules-free-security-tools/

Weekly cybersecurity news roundup that provides a summary of noteworthy stories that might have slipped under the radar for the week of June 26, 2023.

USB drive infects hospital’s systems

Check Point provides an in-depth analysis of malware attributed to China-based espionage group Camaro Dragon that infected an European healthcare institution after an employee participated in a conference in Asia. The malware self-propagates through USB drives and landed on the healthcare organization’s systems after the employee’s drive was accidentally infected during the conference.

Political agreement reached on EU cybersecurity regulation

A political agreement has been reached between the European Parliament and the Council of the EU regarding proposed cybersecurity rules whose goal is to boost security in EU institutions, bodies, offices and agencies.]]></description>
		<content:encoded><![CDATA[<p>In Other News: Hospital Infected via USB Drive, EU Cybersecurity Rules, Free Security Tools<br />
<a href="https://www.securityweek.com/in-other-news-hospital-infected-via-usb-drive-eu-cybersecurity-rules-free-security-tools/" rel="nofollow">https://www.securityweek.com/in-other-news-hospital-infected-via-usb-drive-eu-cybersecurity-rules-free-security-tools/</a></p>
<p>Weekly cybersecurity news roundup that provides a summary of noteworthy stories that might have slipped under the radar for the week of June 26, 2023.</p>
<p>USB drive infects hospital’s systems</p>
<p>Check Point provides an in-depth analysis of malware attributed to China-based espionage group Camaro Dragon that infected an European healthcare institution after an employee participated in a conference in Asia. The malware self-propagates through USB drives and landed on the healthcare organization’s systems after the employee’s drive was accidentally infected during the conference.</p>
<p>Political agreement reached on EU cybersecurity regulation</p>
<p>A political agreement has been reached between the European Parliament and the Council of the EU regarding proposed cybersecurity rules whose goal is to boost security in EU institutions, bodies, offices and agencies.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/06/01/cyber-security-news-june-2023/comment-page-7/#comment-1807506</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 03 Jul 2023 07:18:22 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=193939#comment-1807506</guid>
		<description><![CDATA[Pro-Russian hackers upgrade DDoSia bot used to attack Ukraine, NATO countries https://therecord.media/ddosia-pro-russian-hackers-upgrades

The DDoSia project by pro-Russian hackers has seen significant growth this year as attackers continue to use the technology against countries critical of Russia&#039;s invasion of Ukraine.

DDoSia is a distributed denial-of-service attack toolkit developed and used by the pro-Russia hacktivist group NoName057(16).

The group and its followers are actively deploying the tool against government agencies, media, and private companies in Lithuania, Ukraine, Poland, Italy, and other European countries, according to a report released by cybersecurity company Sekoia this week.]]></description>
		<content:encoded><![CDATA[<p>Pro-Russian hackers upgrade DDoSia bot used to attack Ukraine, NATO countries <a href="https://therecord.media/ddosia-pro-russian-hackers-upgrades" rel="nofollow">https://therecord.media/ddosia-pro-russian-hackers-upgrades</a></p>
<p>The DDoSia project by pro-Russian hackers has seen significant growth this year as attackers continue to use the technology against countries critical of Russia&#8217;s invasion of Ukraine.</p>
<p>DDoSia is a distributed denial-of-service attack toolkit developed and used by the pro-Russia hacktivist group NoName057(16).</p>
<p>The group and its followers are actively deploying the tool against government agencies, media, and private companies in Lithuania, Ukraine, Poland, Italy, and other European countries, according to a report released by cybersecurity company Sekoia this week.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/06/01/cyber-security-news-june-2023/comment-page-7/#comment-1807504</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 03 Jul 2023 07:16:37 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=193939#comment-1807504</guid>
		<description><![CDATA[TSMC denies LockBit hack as ransomware gang demands $70 million https://www.bleepingcomputer.com/news/security/tsmc-denies-lockbit-hack-as-ransomware-gang-demands-70-million/

Chipmaking giant TSMC (Taiwan Semiconductor Manufacturing Company) denied being hacked after the LockBit ransomware gang demanded $70 million not to release stolen data.

TSMC is one of the world&#039;s largest semiconductor manufacturers, with its products used in a wide variety of devices, including smartphones, high performance computing, IoT devices, automotive, and digital consumer electronics.]]></description>
		<content:encoded><![CDATA[<p>TSMC denies LockBit hack as ransomware gang demands $70 million <a href="https://www.bleepingcomputer.com/news/security/tsmc-denies-lockbit-hack-as-ransomware-gang-demands-70-million/" rel="nofollow">https://www.bleepingcomputer.com/news/security/tsmc-denies-lockbit-hack-as-ransomware-gang-demands-70-million/</a></p>
<p>Chipmaking giant TSMC (Taiwan Semiconductor Manufacturing Company) denied being hacked after the LockBit ransomware gang demanded $70 million not to release stolen data.</p>
<p>TSMC is one of the world&#8217;s largest semiconductor manufacturers, with its products used in a wide variety of devices, including smartphones, high performance computing, IoT devices, automotive, and digital consumer electronics.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/06/01/cyber-security-news-june-2023/comment-page-7/#comment-1807410</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 02 Jul 2023 17:24:48 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=193939#comment-1807410</guid>
		<description><![CDATA[Security experts bypass BIOS-locked laptop using just a screwdriver
There are some caveats, however
https://www.techspot.com/news/99091-security-experts-bypassed-bios-locked-laptop-using-screwdriver.html]]></description>
		<content:encoded><![CDATA[<p>Security experts bypass BIOS-locked laptop using just a screwdriver<br />
There are some caveats, however<br />
<a href="https://www.techspot.com/news/99091-security-experts-bypassed-bios-locked-laptop-using-screwdriver.html" rel="nofollow">https://www.techspot.com/news/99091-security-experts-bypassed-bios-locked-laptop-using-screwdriver.html</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/06/01/cyber-security-news-june-2023/comment-page-7/#comment-1807378</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 01 Jul 2023 21:35:51 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=193939#comment-1807378</guid>
		<description><![CDATA[https://www.bleepingcomputer.com/news/security/us-govt-offers-10-million-bounty-for-info-on-clop-ransomware/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.bleepingcomputer.com/news/security/us-govt-offers-10-million-bounty-for-info-on-clop-ransomware/" rel="nofollow">https://www.bleepingcomputer.com/news/security/us-govt-offers-10-million-bounty-for-info-on-clop-ransomware/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/06/01/cyber-security-news-june-2023/comment-page-7/#comment-1807368</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 01 Jul 2023 21:16:15 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=193939#comment-1807368</guid>
		<description><![CDATA[https://www.bleepingcomputer.com/news/security/vmware-fixes-vcenter-server-bugs-allowing-code-execution-auth-bypass/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.bleepingcomputer.com/news/security/vmware-fixes-vcenter-server-bugs-allowing-code-execution-auth-bypass/" rel="nofollow">https://www.bleepingcomputer.com/news/security/vmware-fixes-vcenter-server-bugs-allowing-code-execution-auth-bypass/</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
