<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security news July 2023</title>
	<atom:link href="http://www.epanorama.net/blog/2023/07/01/cyber-security-news-july-2023/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2023/07/01/cyber-security-news-july-2023/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Wed, 15 Apr 2026 08:46:24 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/07/01/cyber-security-news-july-2023/comment-page-4/#comment-1810276</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 10 Aug 2023 10:06:36 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=194137#comment-1810276</guid>
		<description><![CDATA[Code Execution Vulnerability Impacts 900k MikroTik Devices

Over 900,000 devices are impacted by an arbitrary code execution vulnerability in MikroTik RouterOS.

https://www.securityweek.com/code-execution-vulnerability-impacts-900k-mikrotik-devices/

More than 900,000 MikroTik devices are impacted by a RouterOS vulnerability leading to arbitrary code execution, vulnerability intelligence provider VulnCheck reports.

Tracked as CVE-2023-30799 (CVSS score of 9.1), the issue is described as a privilege escalation bug impacting RouterOS versions before 6.49.7 and RouterOS long-term versions through 6.48.6.

“A remote and authenticated attacker can escalate privileges from admin to super-admin on the Winbox or HTTP interface. The attacker can abuse this vulnerability to execute arbitrary code on the system,” a NIST advisory reads.

The vulnerability was initially disclosed in June 2022, at the REcon conference, but no CVE identifier was assigned to it. Proof-of-concept (PoC) code demonstrating how a root shell can be obtained on a RouterOS x86 virtual machine was also published at the time.

MikroTik patched the bug in RouterOS stable 6.49.7 in October 2022, without detailing it, VulnCheck says. Patches were released for the RouterOS long-term version as well.
https://nvd.nist.gov/vuln/detail/CVE-2023-30799]]></description>
		<content:encoded><![CDATA[<p>Code Execution Vulnerability Impacts 900k MikroTik Devices</p>
<p>Over 900,000 devices are impacted by an arbitrary code execution vulnerability in MikroTik RouterOS.</p>
<p><a href="https://www.securityweek.com/code-execution-vulnerability-impacts-900k-mikrotik-devices/" rel="nofollow">https://www.securityweek.com/code-execution-vulnerability-impacts-900k-mikrotik-devices/</a></p>
<p>More than 900,000 MikroTik devices are impacted by a RouterOS vulnerability leading to arbitrary code execution, vulnerability intelligence provider VulnCheck reports.</p>
<p>Tracked as CVE-2023-30799 (CVSS score of 9.1), the issue is described as a privilege escalation bug impacting RouterOS versions before 6.49.7 and RouterOS long-term versions through 6.48.6.</p>
<p>“A remote and authenticated attacker can escalate privileges from admin to super-admin on the Winbox or HTTP interface. The attacker can abuse this vulnerability to execute arbitrary code on the system,” a NIST advisory reads.</p>
<p>The vulnerability was initially disclosed in June 2022, at the REcon conference, but no CVE identifier was assigned to it. Proof-of-concept (PoC) code demonstrating how a root shell can be obtained on a RouterOS x86 virtual machine was also published at the time.</p>
<p>MikroTik patched the bug in RouterOS stable 6.49.7 in October 2022, without detailing it, VulnCheck says. Patches were released for the RouterOS long-term version as well.<br />
<a href="https://nvd.nist.gov/vuln/detail/CVE-2023-30799" rel="nofollow">https://nvd.nist.gov/vuln/detail/CVE-2023-30799</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/07/01/cyber-security-news-july-2023/comment-page-4/#comment-1810274</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 10 Aug 2023 10:02:11 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=194137#comment-1810274</guid>
		<description><![CDATA[Exploitation of Recent Citrix ShareFile RCE Vulnerability Begins

The first attempts to exploit CVE-2023-24489, a recent critical Citrix ShareFile remote code execution vulnerability, have been observed

https://www.securityweek.com/exploitation-of-recent-citrix-sharefile-rce-vulnerability-begins/]]></description>
		<content:encoded><![CDATA[<p>Exploitation of Recent Citrix ShareFile RCE Vulnerability Begins</p>
<p>The first attempts to exploit CVE-2023-24489, a recent critical Citrix ShareFile remote code execution vulnerability, have been observed</p>
<p><a href="https://www.securityweek.com/exploitation-of-recent-citrix-sharefile-rce-vulnerability-begins/" rel="nofollow">https://www.securityweek.com/exploitation-of-recent-citrix-sharefile-rce-vulnerability-begins/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/07/01/cyber-security-news-july-2023/comment-page-4/#comment-1810273</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 10 Aug 2023 10:01:48 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=194137#comment-1810273</guid>
		<description><![CDATA[Cybercrime
CoinsPaid Blames North Korean Hackers for $37 Million Cryptocurrency Heist
https://www.securityweek.com/coinspaid-blames-north-korean-hackers-for-37-million-cryptocurrency-heist/

CoinsPaid says North Korean hacking group Lazarus is likely responsible for the recent theft of $37 million in cryptocurrency.]]></description>
		<content:encoded><![CDATA[<p>Cybercrime<br />
CoinsPaid Blames North Korean Hackers for $37 Million Cryptocurrency Heist<br />
<a href="https://www.securityweek.com/coinspaid-blames-north-korean-hackers-for-37-million-cryptocurrency-heist/" rel="nofollow">https://www.securityweek.com/coinspaid-blames-north-korean-hackers-for-37-million-cryptocurrency-heist/</a></p>
<p>CoinsPaid says North Korean hacking group Lazarus is likely responsible for the recent theft of $37 million in cryptocurrency.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/07/01/cyber-security-news-july-2023/comment-page-4/#comment-1810221</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 09 Aug 2023 15:48:47 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=194137#comment-1810221</guid>
		<description><![CDATA[Apple demands app makers explain use of sensitive APIs https://www.theregister.com/2023/07/29/apple_developer_api/

Apple has told developers writing apps for its shiny stuff that they will soon have to explain why their programs use certain sensitive APIs.

Cupertino claims it&#039;s doing so to discourage app makers from trying to track users through digital fingerprinting.]]></description>
		<content:encoded><![CDATA[<p>Apple demands app makers explain use of sensitive APIs <a href="https://www.theregister.com/2023/07/29/apple_developer_api/" rel="nofollow">https://www.theregister.com/2023/07/29/apple_developer_api/</a></p>
<p>Apple has told developers writing apps for its shiny stuff that they will soon have to explain why their programs use certain sensitive APIs.</p>
<p>Cupertino claims it&#8217;s doing so to discourage app makers from trying to track users through digital fingerprinting.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/07/01/cyber-security-news-july-2023/comment-page-4/#comment-1810220</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 09 Aug 2023 15:48:12 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=194137#comment-1810220</guid>
		<description><![CDATA[Zimbra patches zero-day vulnerability exploited in XSS attacks https://www.bleepingcomputer.com/news/security/zimbra-patches-zero-day-vulnerability-exploited-in-xss-attacks/

Two weeks after the initial disclosure, Zimbra has released security updates that patch a zero-day vulnerability exploited in attacks targeting Zimbra Collaboration Suite (ZCS) email servers.

Now tracked as CVE-2023-38750, the security flaw is a reflected Cross-Site Scripting (XSS) discovered by security researcher Clément Lecigne of Google Threat Analysis Group.]]></description>
		<content:encoded><![CDATA[<p>Zimbra patches zero-day vulnerability exploited in XSS attacks <a href="https://www.bleepingcomputer.com/news/security/zimbra-patches-zero-day-vulnerability-exploited-in-xss-attacks/" rel="nofollow">https://www.bleepingcomputer.com/news/security/zimbra-patches-zero-day-vulnerability-exploited-in-xss-attacks/</a></p>
<p>Two weeks after the initial disclosure, Zimbra has released security updates that patch a zero-day vulnerability exploited in attacks targeting Zimbra Collaboration Suite (ZCS) email servers.</p>
<p>Now tracked as CVE-2023-38750, the security flaw is a reflected Cross-Site Scripting (XSS) discovered by security researcher Clément Lecigne of Google Threat Analysis Group.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/07/01/cyber-security-news-july-2023/comment-page-4/#comment-1810214</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 09 Aug 2023 15:45:28 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=194137#comment-1810214</guid>
		<description><![CDATA[BreachForums database and private chats for sale in hacker data breach https://www.bleepingcomputer.com/news/security/breachforums-database-and-private-chats-for-sale-in-hacker-data-breach/

While consumers are usually the ones worried about their information being exposed in data breaches, it&#039;s now the hacker&#039;s turn, as the notorious Breached cybercrime forum&#039;s database is up for sale and member data shared with Have I Been Pwned.

Yesterday, the Have I Been Pwned data breach notification service announced that visitors can check if their information was exposed in a data breach of the Breached cybercrime forum.]]></description>
		<content:encoded><![CDATA[<p>BreachForums database and private chats for sale in hacker data breach <a href="https://www.bleepingcomputer.com/news/security/breachforums-database-and-private-chats-for-sale-in-hacker-data-breach/" rel="nofollow">https://www.bleepingcomputer.com/news/security/breachforums-database-and-private-chats-for-sale-in-hacker-data-breach/</a></p>
<p>While consumers are usually the ones worried about their information being exposed in data breaches, it&#8217;s now the hacker&#8217;s turn, as the notorious Breached cybercrime forum&#8217;s database is up for sale and member data shared with Have I Been Pwned.</p>
<p>Yesterday, the Have I Been Pwned data breach notification service announced that visitors can check if their information was exposed in a data breach of the Breached cybercrime forum.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/07/01/cyber-security-news-july-2023/comment-page-4/#comment-1810212</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 09 Aug 2023 15:44:47 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=194137#comment-1810212</guid>
		<description><![CDATA[Medical files of 8M-plus people fall into hands of Clop via MOVEit mega-bug https://www.theregister.com/2023/07/27/maximus_deloitte_moveit_hack/

Accounting giant Deloitte, pizza and birthday party chain Chuck E. Cheese, government contractor Maximus, and the Hallmark Channel are among the latest victims that the Russian ransomware crew Clop claims to have compromised via the MOVEit vulnerability.]]></description>
		<content:encoded><![CDATA[<p>Medical files of 8M-plus people fall into hands of Clop via MOVEit mega-bug <a href="https://www.theregister.com/2023/07/27/maximus_deloitte_moveit_hack/" rel="nofollow">https://www.theregister.com/2023/07/27/maximus_deloitte_moveit_hack/</a></p>
<p>Accounting giant Deloitte, pizza and birthday party chain Chuck E. Cheese, government contractor Maximus, and the Hallmark Channel are among the latest victims that the Russian ransomware crew Clop claims to have compromised via the MOVEit vulnerability.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/07/01/cyber-security-news-july-2023/comment-page-4/#comment-1810211</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 09 Aug 2023 15:44:31 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=194137#comment-1810211</guid>
		<description><![CDATA[Ryanair haastettiin oikeuteen kasvontunnistuksen käytöstä – vaadittiin tietyiltä asiakkailta
https://www.tivi.fi/uutiset/tv/8df0a65b-cede-46ef-8232-b9626e4671e5

Halpalentoyhtiö Ryanair on haastettu oikeuteen häiritsevästä kasvojentunnistusteknologian käytöstä. Reutersin mukaan syyte on nostettu Espanjassa Euroopan digitaalisten oikeuksien keskuksen (NYOB) toimesta.

Kasvojentunnistus vaaditaan tietyiltä asiakkailta. NYOB:n mukaan vaatimukset ilmenevät silloin, kun asiakas on ostanut yhtiön lennon matkatoimistolta heidän omien nettisivujen tai sovelluksen sijasta.]]></description>
		<content:encoded><![CDATA[<p>Ryanair haastettiin oikeuteen kasvontunnistuksen käytöstä – vaadittiin tietyiltä asiakkailta<br />
<a href="https://www.tivi.fi/uutiset/tv/8df0a65b-cede-46ef-8232-b9626e4671e5" rel="nofollow">https://www.tivi.fi/uutiset/tv/8df0a65b-cede-46ef-8232-b9626e4671e5</a></p>
<p>Halpalentoyhtiö Ryanair on haastettu oikeuteen häiritsevästä kasvojentunnistusteknologian käytöstä. Reutersin mukaan syyte on nostettu Espanjassa Euroopan digitaalisten oikeuksien keskuksen (NYOB) toimesta.</p>
<p>Kasvojentunnistus vaaditaan tietyiltä asiakkailta. NYOB:n mukaan vaatimukset ilmenevät silloin, kun asiakas on ostanut yhtiön lennon matkatoimistolta heidän omien nettisivujen tai sovelluksen sijasta.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/07/01/cyber-security-news-july-2023/comment-page-4/#comment-1810210</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 09 Aug 2023 15:44:15 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=194137#comment-1810210</guid>
		<description><![CDATA[Kenya reports cyber attacks causing government system outages https://www.semafor.com/article/07/28/2023/kenya-cyber-attacks-claimed-by-sudan-hackers

NAIROBI — Cyber attackers targeted a digital platform used by Kenya’s government to deliver services, the country’s technology minister said, highlighting the vulnerabilities of the system.

The attack on the e-Citizen platform in recent days caused system outages that left users unable to access a broad range of government services, ranging from passport applications to electricity payments. Some private companies were also affected.]]></description>
		<content:encoded><![CDATA[<p>Kenya reports cyber attacks causing government system outages <a href="https://www.semafor.com/article/07/28/2023/kenya-cyber-attacks-claimed-by-sudan-hackers" rel="nofollow">https://www.semafor.com/article/07/28/2023/kenya-cyber-attacks-claimed-by-sudan-hackers</a></p>
<p>NAIROBI — Cyber attackers targeted a digital platform used by Kenya’s government to deliver services, the country’s technology minister said, highlighting the vulnerabilities of the system.</p>
<p>The attack on the e-Citizen platform in recent days caused system outages that left users unable to access a broad range of government services, ranging from passport applications to electricity payments. Some private companies were also affected.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/07/01/cyber-security-news-july-2023/comment-page-4/#comment-1810207</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 09 Aug 2023 15:42:35 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=194137#comment-1810207</guid>
		<description><![CDATA[N. Korea-linked operation combines US military lures, S. Korean e-commerce sites https://therecord.media/north-korea-hackers-us-military-mnrs-south-korean-ecommerce

Hackers allegedly connected to the North Korean government are using fake U.S.
military job-recruitment documents to lure people into downloading malware staged on legitimate — but compromised — South Korean e-commerce sites.]]></description>
		<content:encoded><![CDATA[<p>N. Korea-linked operation combines US military lures, S. Korean e-commerce sites <a href="https://therecord.media/north-korea-hackers-us-military-mnrs-south-korean-ecommerce" rel="nofollow">https://therecord.media/north-korea-hackers-us-military-mnrs-south-korean-ecommerce</a></p>
<p>Hackers allegedly connected to the North Korean government are using fake U.S.<br />
military job-recruitment documents to lure people into downloading malware staged on legitimate — but compromised — South Korean e-commerce sites.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
