<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security news August 2023</title>
	<atom:link href="http://www.epanorama.net/blog/2023/07/31/cyber-security-news-august-2023/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2023/07/31/cyber-security-news-august-2023/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Sun, 05 Apr 2026 16:05:18 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/07/31/cyber-security-news-august-2023/comment-page-7/#comment-1812374</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 02 Sep 2023 05:17:54 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=194303#comment-1812374</guid>
		<description><![CDATA[The average Starlink user probably doesn&#039;t spend a lot of time thinking about their hardware after getting the dish aligned and wiring run. To security researchers, however, it&#039;s another fascinating device to tinker with as they reverse-engineer the firmware and try to both find out what makes it tick, as well as how to break it. This is essentially the subject of &#039;s article over at Quarkslab as he…...

DIVING INTO STARLINK’S USER TERMINAL FIRMWARE
https://hackaday.com/2023/08/31/diving-into-starlinks-user-terminal-firmware/?fbclid=IwAR2l-AHY10L7pvcLPDz_w8UydA44htT_g2oynRH4dveaYNOG1nfRyMvbHho

The user terminal hardware itself is a quite standard AArch64 ARM-based SoC, along with the proprietary communication interface, all of which is controlled by the Linux-based firmware. Dumping the firmware itself was made easy thanks to existing work by researchers at the KU Leuven, involving dumping the contents of the onboard eMMC storage. After this the firmware architecture could be analyzed, which turned out to consist out of mostly C++-based binaries, but with a single big binary for the user front-end written in Go.

https://blog.quarkslab.com/starlink.html]]></description>
		<content:encoded><![CDATA[<p>The average Starlink user probably doesn&#8217;t spend a lot of time thinking about their hardware after getting the dish aligned and wiring run. To security researchers, however, it&#8217;s another fascinating device to tinker with as they reverse-engineer the firmware and try to both find out what makes it tick, as well as how to break it. This is essentially the subject of &#8216;s article over at Quarkslab as he…&#8230;</p>
<p>DIVING INTO STARLINK’S USER TERMINAL FIRMWARE<br />
<a href="https://hackaday.com/2023/08/31/diving-into-starlinks-user-terminal-firmware/?fbclid=IwAR2l-AHY10L7pvcLPDz_w8UydA44htT_g2oynRH4dveaYNOG1nfRyMvbHho" rel="nofollow">https://hackaday.com/2023/08/31/diving-into-starlinks-user-terminal-firmware/?fbclid=IwAR2l-AHY10L7pvcLPDz_w8UydA44htT_g2oynRH4dveaYNOG1nfRyMvbHho</a></p>
<p>The user terminal hardware itself is a quite standard AArch64 ARM-based SoC, along with the proprietary communication interface, all of which is controlled by the Linux-based firmware. Dumping the firmware itself was made easy thanks to existing work by researchers at the KU Leuven, involving dumping the contents of the onboard eMMC storage. After this the firmware architecture could be analyzed, which turned out to consist out of mostly C++-based binaries, but with a single big binary for the user front-end written in Go.</p>
<p><a href="https://blog.quarkslab.com/starlink.html" rel="nofollow">https://blog.quarkslab.com/starlink.html</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/07/31/cyber-security-news-august-2023/comment-page-7/#comment-1812356</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 01 Sep 2023 11:49:44 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=194303#comment-1812356</guid>
		<description><![CDATA[VPN
TunnelCrack attack may cause vulnerable VPNs to leak traffic • The Register
There&#039;s a good chance your VPN is vulnerable to privacy-menacing TunnelCrack attack https://www.theregister.com/2023/08/10/tunnelcrack_vpn/

A couple of techniques collectively known as TunnelCrack can, in the right circumstances, be used by snoops to force victims&#039; network traffic to go outside their encrypted VPNs, it was demonstrated this week.

A team of academics on Tuesday explained how the attacks work, released proof-of-concept exploits, and reckoned &quot;every VPN product is vulnerable on at least one device.&quot;
The researchers said they tested more than 60 VPN clients, and found that &quot;all VPN apps&quot; on iOS are vulnerable. Android appears to be most secure of the bunch.
This Week In Security: TunnelCrack, Mutant, And Not Discord
https://hackaday.com/2023/08/18/this-week-in-security-tunnelcrack-mutant-and-not-discord/

Up first is a clever attack against VPNs, using some clever DNS and routing tricks. The technique is known as TunnelCrack (PDF), and every VPN tested was vulnerable to one of the two attacks, on at least one supported platform.

The first attack assumes an attacker is on the same network as the victim, and works by manipulating the victim’s routing tables. How? DHCP. We’re used to DHCP giving out local network addresses, but there’s nothing to prevent giving a client a fully routable address. Now here’s the trick: Many VPN clients make an exception for traffic sent to the local network. An attacker just hands out an address and subnet telling the victim machine that the entire Internet is on the local network. The attacker can capture all that traffic, route it correctly, and the VPN user doesn’t know the difference.

TunnelCrack
https://tunnelcrack.mathyvanhoef.com/
8 August 2023 — TunnelCrack is a combination of two widespread security vulnerabilities in VPNs. An adversary can abuse these vulnerabilities to leak traffic outside the VPN tunnel. Our tests indicate that every VPN product is vulnerable on at least one device. We found that VPNs for iPhones, iPads, MacBooks, and macOS are extremely likely to be vulnerable, that a majority of VPNs on Windows and Linux are vulnerable, and that Android is the most secure with roughly one-quarter of VPN apps being vulnerable. The discovered vulnerabilities can be abused regardless of the security protocol used by the VPN.

In the LocalNet attack, the adversary acts as a malicious Wi-Fi or Ethernet network, and tricks the victim into connecting to this network. An easy way to accomplish this is by cloning a popular Wi-Fi hotspot such as &quot;starbucks&quot;. Once connected, the adversary assigns a public IP address and subnet to the victim.

In the ServerIP attack, we abuse the observation that many VPNs don&#039;t encrypt traffic towards the IP address of the VPN server. This is done to avoid re-encryption of packets. As an example, say the VPN server is identified by the hostname vpn.com and the real IP address of the VPN server is 2.2.2.2. Let&#039;s assume the adversary wants to intercept traffic to target.com which has IP address 1.2.3.4.

We found that the built-in VPN clients of Windows, macOS, and iOS are vulnerable. Android 12 and higher is not affected. A significant number of Linux VPNs are also vulnerable. Additionally, we found that most OpenVPN profiles, when used with a vulnerable VPN client, use a hostname to identify the VPN server and therefore may result in vulnerable behavior. For more details about the ServerIP experiments, see our paper. To prevent the attack, VPN clients should be updated to send all traffic through the VPN tunnel, except traffic generated by the VPN app itself.

Bypassing Tunnels: Leaking VPN Client Traffic by Abusing Routing Tables
https://papers.mathyvanhoef.com/usenix2023-tunnelcrack.pdf

How to fix TunnelCrack VPN leaks
What caused a mass vulnerability in VPN clients, and how to keep them working.
https://www.kaspersky.com/blog/how-to-fix-tunnelcrack-vpn-leak/48788/

What to do as a VPN user

    Check your VPN service for updates. Peruse the official website and contact technical support. It’s possible that your provider has already updated its applications and settings, so it may be enough to install an update to fix the problem. Note that there may not be an update for iOS due to VPN configuration restrictions on Apple’s side.
    For services based on pure OpenVPN (of which there are plenty) you can use any OpenVPN client in which the vulnerabilities are fixed. The researchers recommend Windscribe.
    Check the exclusions in the VPN service settings. If there is an option to “route local traffic without VPN” or “allow access to local network,” disable it. In other words, all traffic must go through the VPN. The obvious downside of this setting is that you won’t be able to log in from the computer to a local NAS or manage smart devices via Wi-Fi over a local network

What to do as a corporate VPN administrator

    Check if your VPN clients are exposed to this vulnerability. A manual testing method is described by the researchers on GitHub. Test all versions of VPN clients used in your company for all relevant platforms.

Testing LocalNet Attacks and ServerIP Attacks
https://github.com/vanhoefm/vpnleaks#id-testlocalnet

LocalNet and ServerIP attack
https://forums.openvpn.net/viewtopic.php?t=36077

by MatejKovacic » Wed Aug 09, 2023 9:57 am
TunnelCrack is a combination of two widespread security vulnerabilities in VPNs. An adversary can abuse these vulnerabilities to leak traffic outside the VPN tunnel. Our tests indicate that every VPN product is vulnerable on at least one device.

https://tunnelcrack.mathyvanhoef.com

Any suggestion for mitigation?

I would say it helps using static IP addresses (and not FQDN) and strict certificate checking on a client side. What else?


TunnelCrack: Widespread design flaws in VPN clients
https://www.reddit.com/r/VPN/comments/15mgoiv/tunnelcrack_widespread_design_flaws_in_vpn_clients/?rdt=38060

TunnelCrack, a combination of two widespread security vulnerabilities in VPNs. Although a VPN is supposed to protect all data that a user transmits, our attacks can bypass the protection of a VPN. For instance, an adversary can abuse our vulnerabilities to leak and read user traffic, steal user information, or attack user devices. 

Crappy paper.

    Assumes that OpenVPN clients aren&#039;t using &quot;redirect def1&quot;.

    Assumes that servers aren&#039;t using secure dns for reverse-dns load balancing or direct IPs on the clients.

    Assumes that there are no firewalls.

These are all known issues that VPN companies have been working on for 10+ years.

Of course all of the crappy ones are affected.

The only major finding is that the mitigations don&#039;t seem to be working on iOS.

I thought it was a useful paper, given that so many clients are vulnerable. I&#039;d like to know if Linux&#039;s built-in (Network Manager) OpenVPN client is vulnerable.

It would be if you set it up wrong.

You need to set up redirect def1 to force everything through the tunnel device. If you want to be doubly careful set up firewall rules as well.

To me, this paper is about as novel as writing a paper about DNS leaks and then testing a bunch of crappy VPNs and talking about what a huge problem it is.]]></description>
		<content:encoded><![CDATA[<p>VPN<br />
TunnelCrack attack may cause vulnerable VPNs to leak traffic • The Register<br />
There&#8217;s a good chance your VPN is vulnerable to privacy-menacing TunnelCrack attack <a href="https://www.theregister.com/2023/08/10/tunnelcrack_vpn/" rel="nofollow">https://www.theregister.com/2023/08/10/tunnelcrack_vpn/</a></p>
<p>A couple of techniques collectively known as TunnelCrack can, in the right circumstances, be used by snoops to force victims&#8217; network traffic to go outside their encrypted VPNs, it was demonstrated this week.</p>
<p>A team of academics on Tuesday explained how the attacks work, released proof-of-concept exploits, and reckoned &#8220;every VPN product is vulnerable on at least one device.&#8221;<br />
The researchers said they tested more than 60 VPN clients, and found that &#8220;all VPN apps&#8221; on iOS are vulnerable. Android appears to be most secure of the bunch.<br />
This Week In Security: TunnelCrack, Mutant, And Not Discord<br />
<a href="https://hackaday.com/2023/08/18/this-week-in-security-tunnelcrack-mutant-and-not-discord/" rel="nofollow">https://hackaday.com/2023/08/18/this-week-in-security-tunnelcrack-mutant-and-not-discord/</a></p>
<p>Up first is a clever attack against VPNs, using some clever DNS and routing tricks. The technique is known as TunnelCrack (PDF), and every VPN tested was vulnerable to one of the two attacks, on at least one supported platform.</p>
<p>The first attack assumes an attacker is on the same network as the victim, and works by manipulating the victim’s routing tables. How? DHCP. We’re used to DHCP giving out local network addresses, but there’s nothing to prevent giving a client a fully routable address. Now here’s the trick: Many VPN clients make an exception for traffic sent to the local network. An attacker just hands out an address and subnet telling the victim machine that the entire Internet is on the local network. The attacker can capture all that traffic, route it correctly, and the VPN user doesn’t know the difference.</p>
<p>TunnelCrack<br />
<a href="https://tunnelcrack.mathyvanhoef.com/" rel="nofollow">https://tunnelcrack.mathyvanhoef.com/</a><br />
8 August 2023 — TunnelCrack is a combination of two widespread security vulnerabilities in VPNs. An adversary can abuse these vulnerabilities to leak traffic outside the VPN tunnel. Our tests indicate that every VPN product is vulnerable on at least one device. We found that VPNs for iPhones, iPads, MacBooks, and macOS are extremely likely to be vulnerable, that a majority of VPNs on Windows and Linux are vulnerable, and that Android is the most secure with roughly one-quarter of VPN apps being vulnerable. The discovered vulnerabilities can be abused regardless of the security protocol used by the VPN.</p>
<p>In the LocalNet attack, the adversary acts as a malicious Wi-Fi or Ethernet network, and tricks the victim into connecting to this network. An easy way to accomplish this is by cloning a popular Wi-Fi hotspot such as &#8220;starbucks&#8221;. Once connected, the adversary assigns a public IP address and subnet to the victim.</p>
<p>In the ServerIP attack, we abuse the observation that many VPNs don&#8217;t encrypt traffic towards the IP address of the VPN server. This is done to avoid re-encryption of packets. As an example, say the VPN server is identified by the hostname vpn.com and the real IP address of the VPN server is 2.2.2.2. Let&#8217;s assume the adversary wants to intercept traffic to target.com which has IP address 1.2.3.4.</p>
<p>We found that the built-in VPN clients of Windows, macOS, and iOS are vulnerable. Android 12 and higher is not affected. A significant number of Linux VPNs are also vulnerable. Additionally, we found that most OpenVPN profiles, when used with a vulnerable VPN client, use a hostname to identify the VPN server and therefore may result in vulnerable behavior. For more details about the ServerIP experiments, see our paper. To prevent the attack, VPN clients should be updated to send all traffic through the VPN tunnel, except traffic generated by the VPN app itself.</p>
<p>Bypassing Tunnels: Leaking VPN Client Traffic by Abusing Routing Tables<br />
<a href="https://papers.mathyvanhoef.com/usenix2023-tunnelcrack.pdf" rel="nofollow">https://papers.mathyvanhoef.com/usenix2023-tunnelcrack.pdf</a></p>
<p>How to fix TunnelCrack VPN leaks<br />
What caused a mass vulnerability in VPN clients, and how to keep them working.<br />
<a href="https://www.kaspersky.com/blog/how-to-fix-tunnelcrack-vpn-leak/48788/" rel="nofollow">https://www.kaspersky.com/blog/how-to-fix-tunnelcrack-vpn-leak/48788/</a></p>
<p>What to do as a VPN user</p>
<p>    Check your VPN service for updates. Peruse the official website and contact technical support. It’s possible that your provider has already updated its applications and settings, so it may be enough to install an update to fix the problem. Note that there may not be an update for iOS due to VPN configuration restrictions on Apple’s side.<br />
    For services based on pure OpenVPN (of which there are plenty) you can use any OpenVPN client in which the vulnerabilities are fixed. The researchers recommend Windscribe.<br />
    Check the exclusions in the VPN service settings. If there is an option to “route local traffic without VPN” or “allow access to local network,” disable it. In other words, all traffic must go through the VPN. The obvious downside of this setting is that you won’t be able to log in from the computer to a local NAS or manage smart devices via Wi-Fi over a local network</p>
<p>What to do as a corporate VPN administrator</p>
<p>    Check if your VPN clients are exposed to this vulnerability. A manual testing method is described by the researchers on GitHub. Test all versions of VPN clients used in your company for all relevant platforms.</p>
<p>Testing LocalNet Attacks and ServerIP Attacks<br />
<a href="https://github.com/vanhoefm/vpnleaks#id-testlocalnet" rel="nofollow">https://github.com/vanhoefm/vpnleaks#id-testlocalnet</a></p>
<p>LocalNet and ServerIP attack<br />
<a href="https://forums.openvpn.net/viewtopic.php?t=36077" rel="nofollow">https://forums.openvpn.net/viewtopic.php?t=36077</a></p>
<p>by MatejKovacic » Wed Aug 09, 2023 9:57 am<br />
TunnelCrack is a combination of two widespread security vulnerabilities in VPNs. An adversary can abuse these vulnerabilities to leak traffic outside the VPN tunnel. Our tests indicate that every VPN product is vulnerable on at least one device.</p>
<p><a href="https://tunnelcrack.mathyvanhoef.com" rel="nofollow">https://tunnelcrack.mathyvanhoef.com</a></p>
<p>Any suggestion for mitigation?</p>
<p>I would say it helps using static IP addresses (and not FQDN) and strict certificate checking on a client side. What else?</p>
<p>TunnelCrack: Widespread design flaws in VPN clients<br />
<a href="https://www.reddit.com/r/VPN/comments/15mgoiv/tunnelcrack_widespread_design_flaws_in_vpn_clients/?rdt=38060" rel="nofollow">https://www.reddit.com/r/VPN/comments/15mgoiv/tunnelcrack_widespread_design_flaws_in_vpn_clients/?rdt=38060</a></p>
<p>TunnelCrack, a combination of two widespread security vulnerabilities in VPNs. Although a VPN is supposed to protect all data that a user transmits, our attacks can bypass the protection of a VPN. For instance, an adversary can abuse our vulnerabilities to leak and read user traffic, steal user information, or attack user devices. </p>
<p>Crappy paper.</p>
<p>    Assumes that OpenVPN clients aren&#8217;t using &#8220;redirect def1&#8243;.</p>
<p>    Assumes that servers aren&#8217;t using secure dns for reverse-dns load balancing or direct IPs on the clients.</p>
<p>    Assumes that there are no firewalls.</p>
<p>These are all known issues that VPN companies have been working on for 10+ years.</p>
<p>Of course all of the crappy ones are affected.</p>
<p>The only major finding is that the mitigations don&#8217;t seem to be working on iOS.</p>
<p>I thought it was a useful paper, given that so many clients are vulnerable. I&#8217;d like to know if Linux&#8217;s built-in (Network Manager) OpenVPN client is vulnerable.</p>
<p>It would be if you set it up wrong.</p>
<p>You need to set up redirect def1 to force everything through the tunnel device. If you want to be doubly careful set up firewall rules as well.</p>
<p>To me, this paper is about as novel as writing a paper about DNS leaks and then testing a bunch of crappy VPNs and talking about what a huge problem it is.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/07/31/cyber-security-news-august-2023/comment-page-7/#comment-1812348</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 01 Sep 2023 09:36:00 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=194303#comment-1812348</guid>
		<description><![CDATA[LockBit 3.0 Ransomware Builder Leak Gives Rise to Hundreds of New Variants
https://thehackernews.com/2023/08/lockbit-30-ransomware-builder-leak.html
https://thehackernews.com/2023/06/lockbit-ransomware-extorts-91-million.html]]></description>
		<content:encoded><![CDATA[<p>LockBit 3.0 Ransomware Builder Leak Gives Rise to Hundreds of New Variants<br />
<a href="https://thehackernews.com/2023/08/lockbit-30-ransomware-builder-leak.html" rel="nofollow">https://thehackernews.com/2023/08/lockbit-30-ransomware-builder-leak.html</a><br />
<a href="https://thehackernews.com/2023/06/lockbit-ransomware-extorts-91-million.html" rel="nofollow">https://thehackernews.com/2023/06/lockbit-ransomware-extorts-91-million.html</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/07/31/cyber-security-news-august-2023/comment-page-7/#comment-1812343</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 01 Sep 2023 09:34:05 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=194303#comment-1812343</guid>
		<description><![CDATA[https://www.securityweek.com/north-korean-apt-hacks-internet-infrastructure-provider-via-manageengine-flaw/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.securityweek.com/north-korean-apt-hacks-internet-infrastructure-provider-via-manageengine-flaw/" rel="nofollow">https://www.securityweek.com/north-korean-apt-hacks-internet-infrastructure-provider-via-manageengine-flaw/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/07/31/cyber-security-news-august-2023/comment-page-7/#comment-1812337</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 01 Sep 2023 09:28:18 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=194303#comment-1812337</guid>
		<description><![CDATA[Chinese-Backed APT ‘Flax Typhoon’ Hacks Taiwan With Minimal Malware Footprint
https://www.securityweek.com/chinese-backed-apt-flax-typhoon-hacks-taiwan-with-minimal-malware-footprint/

Microsoft warns that Chinese spies are hacking into Taiwanese organizations with minimal use of malware and by abusing legitimate software.]]></description>
		<content:encoded><![CDATA[<p>Chinese-Backed APT ‘Flax Typhoon’ Hacks Taiwan With Minimal Malware Footprint<br />
<a href="https://www.securityweek.com/chinese-backed-apt-flax-typhoon-hacks-taiwan-with-minimal-malware-footprint/" rel="nofollow">https://www.securityweek.com/chinese-backed-apt-flax-typhoon-hacks-taiwan-with-minimal-malware-footprint/</a></p>
<p>Microsoft warns that Chinese spies are hacking into Taiwanese organizations with minimal use of malware and by abusing legitimate software.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/07/31/cyber-security-news-august-2023/comment-page-7/#comment-1812336</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 01 Sep 2023 09:28:02 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=194303#comment-1812336</guid>
		<description><![CDATA[https://www.securityweek.com/university-of-minnesota-confirms-data-breach-says-ransomware-not-involved/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.securityweek.com/university-of-minnesota-confirms-data-breach-says-ransomware-not-involved/" rel="nofollow">https://www.securityweek.com/university-of-minnesota-confirms-data-breach-says-ransomware-not-involved/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/07/31/cyber-security-news-august-2023/comment-page-7/#comment-1812335</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 01 Sep 2023 09:27:39 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=194303#comment-1812335</guid>
		<description><![CDATA[https://www.securityweek.com/cisco-patches-vulnerabilities-exposing-switches-firewalls-to-dos-attacks/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.securityweek.com/cisco-patches-vulnerabilities-exposing-switches-firewalls-to-dos-attacks/" rel="nofollow">https://www.securityweek.com/cisco-patches-vulnerabilities-exposing-switches-firewalls-to-dos-attacks/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/07/31/cyber-security-news-august-2023/comment-page-7/#comment-1812332</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 01 Sep 2023 09:23:37 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=194303#comment-1812332</guid>
		<description><![CDATA[In Other News: Africa Cybercrime Crackdown, Unpatched macOS Flaw, Investor Disclosures

Weekly cybersecurity news roundup that provides a summary of noteworthy stories that might have slipped under the radar for the week of August 21, 2023.

https://www.securityweek.com/in-other-news-africa-cybercrime-crackdown-unpatched-macos-flaw-investor-disclosures/

Facebook expands end-to-end encryption in Messenger

Facebook parent company Meta is expanding end-to-end encryption (E2EE) testing in Messenger, in preparation for enabling it by default for all one-to-one friends and family chats by the end of the year. To access default E2EE, users will need to update the application to newer builds, the internet giant announced.  

EY analyzes investor cyber disclosures

EY’s analysis of proxy statements and 10‑K filings over the past six years has shown “steady and significant increases in the percentage of disclosures in certain categories of cyber management and oversight.” The report also shows increases in the frequency of management reporting to the board, cybersecurity as a sought for area of expertise, and in the use of external independent advisors.  

CISA publishes first VDP Platform report

In its inaugural VDP Platform Annual Report, the US Cybersecurity and Infrastructure Security Agency (CISA) said its VPD platform facilitated the remediation of more than 1,000 vulnerabilities through December 2022, including nearly 200 critical issues.]]></description>
		<content:encoded><![CDATA[<p>In Other News: Africa Cybercrime Crackdown, Unpatched macOS Flaw, Investor Disclosures</p>
<p>Weekly cybersecurity news roundup that provides a summary of noteworthy stories that might have slipped under the radar for the week of August 21, 2023.</p>
<p><a href="https://www.securityweek.com/in-other-news-africa-cybercrime-crackdown-unpatched-macos-flaw-investor-disclosures/" rel="nofollow">https://www.securityweek.com/in-other-news-africa-cybercrime-crackdown-unpatched-macos-flaw-investor-disclosures/</a></p>
<p>Facebook expands end-to-end encryption in Messenger</p>
<p>Facebook parent company Meta is expanding end-to-end encryption (E2EE) testing in Messenger, in preparation for enabling it by default for all one-to-one friends and family chats by the end of the year. To access default E2EE, users will need to update the application to newer builds, the internet giant announced.  </p>
<p>EY analyzes investor cyber disclosures</p>
<p>EY’s analysis of proxy statements and 10‑K filings over the past six years has shown “steady and significant increases in the percentage of disclosures in certain categories of cyber management and oversight.” The report also shows increases in the frequency of management reporting to the board, cybersecurity as a sought for area of expertise, and in the use of external independent advisors.  </p>
<p>CISA publishes first VDP Platform report</p>
<p>In its inaugural VDP Platform Annual Report, the US Cybersecurity and Infrastructure Security Agency (CISA) said its VPD platform facilitated the remediation of more than 1,000 vulnerabilities through December 2022, including nearly 200 critical issues.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/07/31/cyber-security-news-august-2023/comment-page-7/#comment-1812331</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 01 Sep 2023 09:22:21 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=194303#comment-1812331</guid>
		<description><![CDATA[North Korean APT Hacks Internet Infrastructure Provider via ManageEngine Flaw
https://www.securityweek.com/north-korean-apt-hacks-internet-infrastructure-provider-via-manageengine-flaw/

North Korea-linked Lazarus Group exploited a ManageEngine vulnerability to compromise an internet backbone infrastructure provider.]]></description>
		<content:encoded><![CDATA[<p>North Korean APT Hacks Internet Infrastructure Provider via ManageEngine Flaw<br />
<a href="https://www.securityweek.com/north-korean-apt-hacks-internet-infrastructure-provider-via-manageengine-flaw/" rel="nofollow">https://www.securityweek.com/north-korean-apt-hacks-internet-infrastructure-provider-via-manageengine-flaw/</a></p>
<p>North Korea-linked Lazarus Group exploited a ManageEngine vulnerability to compromise an internet backbone infrastructure provider.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/07/31/cyber-security-news-august-2023/comment-page-7/#comment-1812326</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 01 Sep 2023 09:14:20 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=194303#comment-1812326</guid>
		<description><![CDATA[https://www.securityweek.com/3-cryptocurrency-firms-suffer-data-breach-after-kroll-sim-swapping-attack/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.securityweek.com/3-cryptocurrency-firms-suffer-data-breach-after-kroll-sim-swapping-attack/" rel="nofollow">https://www.securityweek.com/3-cryptocurrency-firms-suffer-data-breach-after-kroll-sim-swapping-attack/</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
