<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security news October 2023</title>
	<atom:link href="http://www.epanorama.net/blog/2023/10/01/cyber-security-news-october-2023/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2023/10/01/cyber-security-news-october-2023/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Fri, 01 May 2026 18:15:47 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/10/01/cyber-security-news-october-2023/comment-page-6/#comment-1817737</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 19 Nov 2023 18:53:00 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=194643#comment-1817737</guid>
		<description><![CDATA[https://insinoori-lehti.fi/tasta-on-kysymys/sinun-datasi-on-meidan-tuotteemme/]]></description>
		<content:encoded><![CDATA[<p><a href="https://insinoori-lehti.fi/tasta-on-kysymys/sinun-datasi-on-meidan-tuotteemme/" rel="nofollow">https://insinoori-lehti.fi/tasta-on-kysymys/sinun-datasi-on-meidan-tuotteemme/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/10/01/cyber-security-news-october-2023/comment-page-6/#comment-1816810</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 29 Oct 2023 16:22:16 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=194643#comment-1816810</guid>
		<description><![CDATA[https://www.pcgamer.com/red-cross-issues-rules-of-engagement-to-war-focused-hacker-groups-who-say-why-should-i-listen-to-the-red-cross/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.pcgamer.com/red-cross-issues-rules-of-engagement-to-war-focused-hacker-groups-who-say-why-should-i-listen-to-the-red-cross/" rel="nofollow">https://www.pcgamer.com/red-cross-issues-rules-of-engagement-to-war-focused-hacker-groups-who-say-why-should-i-listen-to-the-red-cross/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/10/01/cyber-security-news-october-2023/comment-page-6/#comment-1816775</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 29 Oct 2023 13:38:14 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=194643#comment-1816775</guid>
		<description><![CDATA[https://spectrum.ieee.org/homomorphic-encryption-rise]]></description>
		<content:encoded><![CDATA[<p><a href="https://spectrum.ieee.org/homomorphic-encryption-rise" rel="nofollow">https://spectrum.ieee.org/homomorphic-encryption-rise</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/10/01/cyber-security-news-october-2023/comment-page-6/#comment-1816773</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 29 Oct 2023 13:37:26 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=194643#comment-1816773</guid>
		<description><![CDATA[https://www.scmagazine.com/news/more-cybersecurity-firm-closures-expected-after-ironnet-shutters]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.scmagazine.com/news/more-cybersecurity-firm-closures-expected-after-ironnet-shutters" rel="nofollow">https://www.scmagazine.com/news/more-cybersecurity-firm-closures-expected-after-ironnet-shutters</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/10/01/cyber-security-news-october-2023/comment-page-6/#comment-1816741</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 29 Oct 2023 08:54:46 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=194643#comment-1816741</guid>
		<description><![CDATA[https://www.f-secure.com/en/articles/f-alert/2023-09-exposing-the-dark-web]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.f-secure.com/en/articles/f-alert/2023-09-exposing-the-dark-web" rel="nofollow">https://www.f-secure.com/en/articles/f-alert/2023-09-exposing-the-dark-web</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/10/01/cyber-security-news-october-2023/comment-page-6/#comment-1816629</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 28 Oct 2023 19:13:28 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=194643#comment-1816629</guid>
		<description><![CDATA[&#039;Looney Tunables&#039; Bug Opens Millions of Linux Systems to Root Takeover
https://www.darkreading.com/vulnerabilities-threats/millions-linux-systems-looney-tunables-bug-root-takeover

The flaw poses a significant risk of unauthorized data access, system alterations, potential data theft, and complete takeover of vulnerable systems, especially in the IoT and embedded computing space.

Attackers can now gain root privileges on millions of Linux systems — by exploiting an easy-to-exploit, newly discovered buffer overflow flaw in a common library used on most major distributions of the open source OS. Dubbed &quot;Looney Tunables,&quot; the bug could mean &quot;that&#039;s all, folks&quot; for sensitive data, and could lead to even worse ramifications.

Fedora, Ubuntu, and Debian are the systems most at risk from the bug (CVE-2023-4911 CVSS 7.8), Qualys researchers revealed in a blog post late on Oct. 3. It&#039;s found in the GNU C Library (glibc) in the GNU system, which is found in most systems running the Linux kernel, according to the firm.

Glibc is a library that defines the system calls and other basic functionalities, such as open, malloc, printf, exit, etc., that a typical program requires. The vulnerability occurs in how the dynamic loader of glibc processes the GLIBC_TUNABLES environment variable, the researchers said, thus giving the bug its name.

IoT devices running in a Linux environment in particular are extremely vulnerable to an exploit of the flaw, &quot;due to their extensive use of the Linux kernel within custom operating systems,&quot; warns John Gallagher,]]></description>
		<content:encoded><![CDATA[<p>&#8216;Looney Tunables&#8217; Bug Opens Millions of Linux Systems to Root Takeover<br />
<a href="https://www.darkreading.com/vulnerabilities-threats/millions-linux-systems-looney-tunables-bug-root-takeover" rel="nofollow">https://www.darkreading.com/vulnerabilities-threats/millions-linux-systems-looney-tunables-bug-root-takeover</a></p>
<p>The flaw poses a significant risk of unauthorized data access, system alterations, potential data theft, and complete takeover of vulnerable systems, especially in the IoT and embedded computing space.</p>
<p>Attackers can now gain root privileges on millions of Linux systems — by exploiting an easy-to-exploit, newly discovered buffer overflow flaw in a common library used on most major distributions of the open source OS. Dubbed &#8220;Looney Tunables,&#8221; the bug could mean &#8220;that&#8217;s all, folks&#8221; for sensitive data, and could lead to even worse ramifications.</p>
<p>Fedora, Ubuntu, and Debian are the systems most at risk from the bug (CVE-2023-4911 CVSS 7.8), Qualys researchers revealed in a blog post late on Oct. 3. It&#8217;s found in the GNU C Library (glibc) in the GNU system, which is found in most systems running the Linux kernel, according to the firm.</p>
<p>Glibc is a library that defines the system calls and other basic functionalities, such as open, malloc, printf, exit, etc., that a typical program requires. The vulnerability occurs in how the dynamic loader of glibc processes the GLIBC_TUNABLES environment variable, the researchers said, thus giving the bug its name.</p>
<p>IoT devices running in a Linux environment in particular are extremely vulnerable to an exploit of the flaw, &#8220;due to their extensive use of the Linux kernel within custom operating systems,&#8221; warns John Gallagher,</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/10/01/cyber-security-news-october-2023/comment-page-6/#comment-1816619</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 28 Oct 2023 18:28:42 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=194643#comment-1816619</guid>
		<description><![CDATA[https://thehackernews.com/2023/10/alert-poc-exploits-released-for-citrix.html]]></description>
		<content:encoded><![CDATA[<p><a href="https://thehackernews.com/2023/10/alert-poc-exploits-released-for-citrix.html" rel="nofollow">https://thehackernews.com/2023/10/alert-poc-exploits-released-for-citrix.html</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/10/01/cyber-security-news-october-2023/comment-page-6/#comment-1816602</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 28 Oct 2023 17:02:58 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=194643#comment-1816602</guid>
		<description><![CDATA[https://www.windowscentral.com/software-apps/winrar-has-a-major-security-bug-and-you-have-to-install-its-fix-manually]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.windowscentral.com/software-apps/winrar-has-a-major-security-bug-and-you-have-to-install-its-fix-manually" rel="nofollow">https://www.windowscentral.com/software-apps/winrar-has-a-major-security-bug-and-you-have-to-install-its-fix-manually</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/10/01/cyber-security-news-october-2023/comment-page-6/#comment-1816569</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 28 Oct 2023 16:14:13 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=194643#comment-1816569</guid>
		<description><![CDATA[https://thehackernews.com/2023/10/backdoor-implant-on-hacked-cisco.html]]></description>
		<content:encoded><![CDATA[<p><a href="https://thehackernews.com/2023/10/backdoor-implant-on-hacked-cisco.html" rel="nofollow">https://thehackernews.com/2023/10/backdoor-implant-on-hacked-cisco.html</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/10/01/cyber-security-news-october-2023/comment-page-6/#comment-1816568</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 28 Oct 2023 16:13:50 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=194643#comment-1816568</guid>
		<description><![CDATA[https://securityonline.info/microsoft-exchange-server-rce-cve-2023-36745-flaw-gets-poc-exploit/]]></description>
		<content:encoded><![CDATA[<p><a href="https://securityonline.info/microsoft-exchange-server-rce-cve-2023-36745-flaw-gets-poc-exploit/" rel="nofollow">https://securityonline.info/microsoft-exchange-server-rce-cve-2023-36745-flaw-gets-poc-exploit/</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
