<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security news April 2024</title>
	<atom:link href="http://www.epanorama.net/blog/2024/04/01/cyber-security-news-april-2024/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2024/04/01/cyber-security-news-april-2024/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Tue, 14 Apr 2026 11:49:02 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/04/01/cyber-security-news-april-2024/comment-page-4/#comment-1827119</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 08 May 2024 10:37:35 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=195892#comment-1827119</guid>
		<description><![CDATA[The Guardian:
An investigation finds a vast web of fake shops run from China touting designer brands that duped 800K+ people in Europe and the US into sharing personal data

Chinese network behind one of world’s ‘largest online scams’
https://www.theguardian.com/money/article/2024/may/08/chinese-network-behind-one-of-worlds-largest-online-scams

Exclusive: Vast web of fake shops touting designer brands took money and personal details from 800,000 people in Europe and US, data suggests
Carmen Aguilar García, Sarah Marsh and Philip McMahon
Wed 8 May 2024 06.00 CEST
Last modified on Wed 8 May 2024 08.09 CEST

More than 800,000 people in Europe and the US appear to have been duped into sharing card details and other sensitive personal data with a vast network of fake online designer shops apparently operated from China.

An international investigation by the Guardian, Die Zeit and Le Monde gives a rare inside look at the mechanics of what the UK’s Chartered Trading Standards Institute has described as one of the largest scams of its kind, with 76,000 fake websites created.

A trove of data examined by reporters and IT experts indicates the operation is highly organised, technically savvy – and ongoing.]]></description>
		<content:encoded><![CDATA[<p>The Guardian:<br />
An investigation finds a vast web of fake shops run from China touting designer brands that duped 800K+ people in Europe and the US into sharing personal data</p>
<p>Chinese network behind one of world’s ‘largest online scams’<br />
<a href="https://www.theguardian.com/money/article/2024/may/08/chinese-network-behind-one-of-worlds-largest-online-scams" rel="nofollow">https://www.theguardian.com/money/article/2024/may/08/chinese-network-behind-one-of-worlds-largest-online-scams</a></p>
<p>Exclusive: Vast web of fake shops touting designer brands took money and personal details from 800,000 people in Europe and US, data suggests<br />
Carmen Aguilar García, Sarah Marsh and Philip McMahon<br />
Wed 8 May 2024 06.00 CEST<br />
Last modified on Wed 8 May 2024 08.09 CEST</p>
<p>More than 800,000 people in Europe and the US appear to have been duped into sharing card details and other sensitive personal data with a vast network of fake online designer shops apparently operated from China.</p>
<p>An international investigation by the Guardian, Die Zeit and Le Monde gives a rare inside look at the mechanics of what the UK’s Chartered Trading Standards Institute has described as one of the largest scams of its kind, with 76,000 fake websites created.</p>
<p>A trove of data examined by reporters and IT experts indicates the operation is highly organised, technically savvy – and ongoing.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/04/01/cyber-security-news-april-2024/comment-page-4/#comment-1827118</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 08 May 2024 10:36:55 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=195892#comment-1827118</guid>
		<description><![CDATA[Financial Times:
The UK is investigating “potential failings” at IT contractor SSCL, which was breached by suspected Chinese hackers to expose payroll records for 272K people

https://www.ft.com/content/b21c9eba-54c4-46c6-bd99-e9554c4660d9]]></description>
		<content:encoded><![CDATA[<p>Financial Times:<br />
The UK is investigating “potential failings” at IT contractor SSCL, which was breached by suspected Chinese hackers to expose payroll records for 272K people</p>
<p><a href="https://www.ft.com/content/b21c9eba-54c4-46c6-bd99-e9554c4660d9" rel="nofollow">https://www.ft.com/content/b21c9eba-54c4-46c6-bd99-e9554c4660d9</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/04/01/cyber-security-news-april-2024/comment-page-4/#comment-1827115</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 08 May 2024 10:21:34 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=195892#comment-1827115</guid>
		<description><![CDATA[Data Breaches
University System of Georgia Says 800,000 Impacted by MOVEit Hack
https://www.securityweek.com/university-system-of-georgia-says-800000-impacted-by-moveit-hack/

University System of Georgia says Social Security numbers and bank account numbers were compromised in the May 2023 MOVEit hack.

University System of Georgia is notifying 800,000 individuals that their personal and financial information was compromised in the May 2023 MOVEit hack.

The data breach occurred after the Russia-linked Cl0p ransomware group exploited a vulnerability in Progress Software’s MOVEit Transfer managed file transfer (MFT) software and stole data from organizations using it.

To date, more than 2,000 organizations have disclosed impact from the MOVEit hack, including roughly 900 schools in the United States. Over 60 million individuals are believed to have been affected.

University System of Georgia (USG), which was using MOVEit to “transfer and store sensitive data”, is the latest education entity to disclose impact from the attack. 

Although the data breach report has been listed on the Maine AGO’s website only this week, USG started sending the notification letters in mid-April, when it also posted an incident notice on its website.]]></description>
		<content:encoded><![CDATA[<p>Data Breaches<br />
University System of Georgia Says 800,000 Impacted by MOVEit Hack<br />
<a href="https://www.securityweek.com/university-system-of-georgia-says-800000-impacted-by-moveit-hack/" rel="nofollow">https://www.securityweek.com/university-system-of-georgia-says-800000-impacted-by-moveit-hack/</a></p>
<p>University System of Georgia says Social Security numbers and bank account numbers were compromised in the May 2023 MOVEit hack.</p>
<p>University System of Georgia is notifying 800,000 individuals that their personal and financial information was compromised in the May 2023 MOVEit hack.</p>
<p>The data breach occurred after the Russia-linked Cl0p ransomware group exploited a vulnerability in Progress Software’s MOVEit Transfer managed file transfer (MFT) software and stole data from organizations using it.</p>
<p>To date, more than 2,000 organizations have disclosed impact from the MOVEit hack, including roughly 900 schools in the United States. Over 60 million individuals are believed to have been affected.</p>
<p>University System of Georgia (USG), which was using MOVEit to “transfer and store sensitive data”, is the latest education entity to disclose impact from the attack. </p>
<p>Although the data breach report has been listed on the Maine AGO’s website only this week, USG started sending the notification letters in mid-April, when it also posted an incident notice on its website.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/04/01/cyber-security-news-april-2024/comment-page-4/#comment-1827089</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 08 May 2024 06:32:33 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=195892#comment-1827089</guid>
		<description><![CDATA[Salatuissa VPN-yhteyksissä on ollut aukko jo yli 20 vuotta 
https://etn.fi/index.php/13-news/16179-salatuissa-vpn-yhteyksissae-on-ollut-aukko-jo-yli-20-vuotta

Tieturvayritys Leviathan Security kertoo, että DHCP-protokollaan sisäänrakennettuja ominaisuuksia hyödyntäen voi hyökkääjä pakottaa dataliikenteen pois suojatusta VPN-tunnelista. Yhtiön mukaan aukko on ollut olemassa jo vuodesta 2002 lähtien.

VPN eli virtuaalinen privaattiverkko toimii luomalla salatun ja turvatun yhteyden käyttäjän laitteen ja VPN-palvelimen välille. Tämä tapahtuu käyttäen VPN-protokollia, kuten IPSec, SSL/TLS tai OpenVPN. Kun käyttäjä muodostaa yhteyden VPN-palvelimeen, kaikki käyttäjän tietoliikenne kulkee salattuna VPN-tunnelissa, joka suojaa sitä ulkopuolisilta silmiltä.

Leviathan Securityn mukaan heidän äskettäin tunnistamansa verkkotekniikka ohittaa VPN-kapseloinnin. Hyökkääjä voi käyttää tätä tekniikkaa pakottaakseen kohdekäyttäjän liikenteen pois VPN-tunnelistaan ​​käyttämällä DHCP:n (Dynamic Host Configuration Protocol) sisäänrakennettuja ominaisuuksia. Tämän seurauksena käyttäjä lähettää paketteja, joita VPN ei koskaan salaa, ja hyökkääjä voi tiedustella tätä liikennettä.

Yhtiö arvioi, että tekniikka on voinut olla mahdollinen jo vuonna 2002, ja se on voitu jo havaita ja mahdollisesti sitä on käytetty hyökkäyksissä. Linux-pohjaisissa käyttöjärjestelmissä ongelmaa on yritetty korjata. Tutkijat muistuttavat, että ongelmaa ei voida korjata yksinkertaisesti poistamalla tuki DHCP-ominaisuudesta, koska tämä voi katkaista Internet-yhteyden myös laillisissa tapauksissa.

Leviathan kertoo blogissaan tarkempia tietoja haavoittuvuudesta, jolle on annettu nimeksi TunnelVision (CVE-haavoittuvuutunnus on 2024-3661).

TunnelVision (CVE-2024-3661): How Attackers Can Decloak Routing-Based VPNs For a Total VPN Leak
https://www.leviathansecurity.com/blog/tunnelvision

Recently, we identified a novel network technique that bypasses VPN encapsulation. An attacker can use this technique to force a target user’s traffic off their VPN tunnel using built-in features of DHCP (Dynamic Host Configuration Protocol). The result of this is the user transmits packets that are never encrypted by a VPN, and an attacker can snoop their traffic. We are using the term decloaking to refer to this effect. Importantly, the VPN control channel is maintained so features such as kill switches are never tripped, and users continue to show as connected to a VPN in all the cases we’ve observed. 

We’ve spent extensive time exploring this capability and attempting to notify as many affected parties as possible. We also know it is our responsibility as security researchers to inform the security and privacy community, as well as the general public, about this threat. We also believe this technique may have been possible as far back as 2002 and could have already been discovered* and potentially used in the wild. For that reason, we believe it is critical for us to disclose publicly because notifying every VPN provider, operating system maintainer, self-hosted VPN admin, and VPN user is far beyond the capacity of our small research team.]]></description>
		<content:encoded><![CDATA[<p>Salatuissa VPN-yhteyksissä on ollut aukko jo yli 20 vuotta<br />
<a href="https://etn.fi/index.php/13-news/16179-salatuissa-vpn-yhteyksissae-on-ollut-aukko-jo-yli-20-vuotta" rel="nofollow">https://etn.fi/index.php/13-news/16179-salatuissa-vpn-yhteyksissae-on-ollut-aukko-jo-yli-20-vuotta</a></p>
<p>Tieturvayritys Leviathan Security kertoo, että DHCP-protokollaan sisäänrakennettuja ominaisuuksia hyödyntäen voi hyökkääjä pakottaa dataliikenteen pois suojatusta VPN-tunnelista. Yhtiön mukaan aukko on ollut olemassa jo vuodesta 2002 lähtien.</p>
<p>VPN eli virtuaalinen privaattiverkko toimii luomalla salatun ja turvatun yhteyden käyttäjän laitteen ja VPN-palvelimen välille. Tämä tapahtuu käyttäen VPN-protokollia, kuten IPSec, SSL/TLS tai OpenVPN. Kun käyttäjä muodostaa yhteyden VPN-palvelimeen, kaikki käyttäjän tietoliikenne kulkee salattuna VPN-tunnelissa, joka suojaa sitä ulkopuolisilta silmiltä.</p>
<p>Leviathan Securityn mukaan heidän äskettäin tunnistamansa verkkotekniikka ohittaa VPN-kapseloinnin. Hyökkääjä voi käyttää tätä tekniikkaa pakottaakseen kohdekäyttäjän liikenteen pois VPN-tunnelistaan ​​käyttämällä DHCP:n (Dynamic Host Configuration Protocol) sisäänrakennettuja ominaisuuksia. Tämän seurauksena käyttäjä lähettää paketteja, joita VPN ei koskaan salaa, ja hyökkääjä voi tiedustella tätä liikennettä.</p>
<p>Yhtiö arvioi, että tekniikka on voinut olla mahdollinen jo vuonna 2002, ja se on voitu jo havaita ja mahdollisesti sitä on käytetty hyökkäyksissä. Linux-pohjaisissa käyttöjärjestelmissä ongelmaa on yritetty korjata. Tutkijat muistuttavat, että ongelmaa ei voida korjata yksinkertaisesti poistamalla tuki DHCP-ominaisuudesta, koska tämä voi katkaista Internet-yhteyden myös laillisissa tapauksissa.</p>
<p>Leviathan kertoo blogissaan tarkempia tietoja haavoittuvuudesta, jolle on annettu nimeksi TunnelVision (CVE-haavoittuvuutunnus on 2024-3661).</p>
<p>TunnelVision (CVE-2024-3661): How Attackers Can Decloak Routing-Based VPNs For a Total VPN Leak<br />
<a href="https://www.leviathansecurity.com/blog/tunnelvision" rel="nofollow">https://www.leviathansecurity.com/blog/tunnelvision</a></p>
<p>Recently, we identified a novel network technique that bypasses VPN encapsulation. An attacker can use this technique to force a target user’s traffic off their VPN tunnel using built-in features of DHCP (Dynamic Host Configuration Protocol). The result of this is the user transmits packets that are never encrypted by a VPN, and an attacker can snoop their traffic. We are using the term decloaking to refer to this effect. Importantly, the VPN control channel is maintained so features such as kill switches are never tripped, and users continue to show as connected to a VPN in all the cases we’ve observed. </p>
<p>We’ve spent extensive time exploring this capability and attempting to notify as many affected parties as possible. We also know it is our responsibility as security researchers to inform the security and privacy community, as well as the general public, about this threat. We also believe this technique may have been possible as far back as 2002 and could have already been discovered* and potentially used in the wild. For that reason, we believe it is critical for us to disclose publicly because notifying every VPN provider, operating system maintainer, self-hosted VPN admin, and VPN user is far beyond the capacity of our small research team.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/04/01/cyber-security-news-april-2024/comment-page-4/#comment-1827087</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 08 May 2024 06:30:28 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=195892#comment-1827087</guid>
		<description><![CDATA[https://hackaday.com/2024/05/07/imperva-report-claims-that-50-of-the-world-wide-web-is-now-bots/]]></description>
		<content:encoded><![CDATA[<p><a href="https://hackaday.com/2024/05/07/imperva-report-claims-that-50-of-the-world-wide-web-is-now-bots/" rel="nofollow">https://hackaday.com/2024/05/07/imperva-report-claims-that-50-of-the-world-wide-web-is-now-bots/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/04/01/cyber-security-news-april-2024/comment-page-3/#comment-1827084</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 08 May 2024 06:13:46 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=195892#comment-1827084</guid>
		<description><![CDATA[Georgia Butler / DatacenterDynamics: 	
Google says “rare issues at Google Cloud” caused a week-long private cloud outage at UniSuper, an Australian pension fund for the education and research sectors  —  Google problems resulting in an inadvertent misconfiguration of UniSuper&#039;s systems

UniSuper private cloud outage caused by Google Cloud issues
https://www.datacenterdynamics.com/en/news/unisuper-private-cloud-outage-caused-by-google-cloud-issues/
Google problems resulting in an inadvertent misconfiguration of UniSuper&#039;s systems]]></description>
		<content:encoded><![CDATA[<p>Georgia Butler / DatacenterDynamics:<br />
Google says “rare issues at Google Cloud” caused a week-long private cloud outage at UniSuper, an Australian pension fund for the education and research sectors  —  Google problems resulting in an inadvertent misconfiguration of UniSuper&#8217;s systems</p>
<p>UniSuper private cloud outage caused by Google Cloud issues<br />
<a href="https://www.datacenterdynamics.com/en/news/unisuper-private-cloud-outage-caused-by-google-cloud-issues/" rel="nofollow">https://www.datacenterdynamics.com/en/news/unisuper-private-cloud-outage-caused-by-google-cloud-issues/</a><br />
Google problems resulting in an inadvertent misconfiguration of UniSuper&#8217;s systems</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/04/01/cyber-security-news-april-2024/comment-page-3/#comment-1827080</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 08 May 2024 06:09:22 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=195892#comment-1827080</guid>
		<description><![CDATA[Lauren Forristal / TechCrunch: 	
President Biden signs the REPORT Act into law, which levies hefty fines against companies that neglect to report CSAM on their sites to the NCMEC&#039;s CyberTipline  —  On April 29, Senators Jon Ossoff (D-GA) and Marsha Blackburn (R-SC) proposed a bipartisan bill to protect children from online sexual exploitation.

Biden signs bill to protect children from online sexual abuse and exploitation
https://techcrunch.com/2024/05/07/biden-signs-bill-to-protect-children-from-online-sexual-abuse-and-exploitation/]]></description>
		<content:encoded><![CDATA[<p>Lauren Forristal / TechCrunch:<br />
President Biden signs the REPORT Act into law, which levies hefty fines against companies that neglect to report CSAM on their sites to the NCMEC&#8217;s CyberTipline  —  On April 29, Senators Jon Ossoff (D-GA) and Marsha Blackburn (R-SC) proposed a bipartisan bill to protect children from online sexual exploitation.</p>
<p>Biden signs bill to protect children from online sexual abuse and exploitation<br />
<a href="https://techcrunch.com/2024/05/07/biden-signs-bill-to-protect-children-from-online-sexual-abuse-and-exploitation/" rel="nofollow">https://techcrunch.com/2024/05/07/biden-signs-bill-to-protect-children-from-online-sexual-abuse-and-exploitation/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/04/01/cyber-security-news-april-2024/comment-page-3/#comment-1827066</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 08 May 2024 05:51:25 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=195892#comment-1827066</guid>
		<description><![CDATA[ICS/OT
From Warnings to Action: Preparing America’s Infrastructure for Imminent Cyber Threats

As cyber threats grow more sophisticated, America cannot afford complacency. The time for decisive action and enhanced cyber resilience is now.

https://www.securityweek.com/from-warnings-to-action-preparing-americas-infrastructure-for-imminent-cyber-threats/]]></description>
		<content:encoded><![CDATA[<p>ICS/OT<br />
From Warnings to Action: Preparing America’s Infrastructure for Imminent Cyber Threats</p>
<p>As cyber threats grow more sophisticated, America cannot afford complacency. The time for decisive action and enhanced cyber resilience is now.</p>
<p><a href="https://www.securityweek.com/from-warnings-to-action-preparing-americas-infrastructure-for-imminent-cyber-threats/" rel="nofollow">https://www.securityweek.com/from-warnings-to-action-preparing-americas-infrastructure-for-imminent-cyber-threats/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/04/01/cyber-security-news-april-2024/comment-page-3/#comment-1827065</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 08 May 2024 05:50:55 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=195892#comment-1827065</guid>
		<description><![CDATA[The UK Says a Huge Payroll Data Breach by a ‘Malign Actor’ Has Exposed Details of Military Personnel

The UK Ministry of Defense said a breach at a third-party payroll system exposed as many as 272,000 armed forces personnel and veterans.

https://www.securityweek.com/the-uk-says-a-huge-payroll-data-breach-by-a-malign-actor-has-exposed-details-of-military-personnel/

The names and bank details of thousands of serving British soldiers, sailors and air force members have been exposed in a data breach by a “malign actor” who may have had state help, defense officials said Tuesday.

The Ministry of Defense said the breach occurred at a third-party payroll system holding bank details of as many as 272,000 serving armed forces personnel and recent veterans. In a few cases, addresses may also have been exposed.

Defense Secretary Grant Shapps said officials had “immediately taken the system offline” and launched an investigation into the breach and possible failings by the contractor, SSCL, which describes itself as “the largest provider of critical business support services for government.”

“We cannot rule out state involvement,” Shapps told lawmakers in the House of Commons, though he said the government did not yet have evidence to make that conclusion.]]></description>
		<content:encoded><![CDATA[<p>The UK Says a Huge Payroll Data Breach by a ‘Malign Actor’ Has Exposed Details of Military Personnel</p>
<p>The UK Ministry of Defense said a breach at a third-party payroll system exposed as many as 272,000 armed forces personnel and veterans.</p>
<p><a href="https://www.securityweek.com/the-uk-says-a-huge-payroll-data-breach-by-a-malign-actor-has-exposed-details-of-military-personnel/" rel="nofollow">https://www.securityweek.com/the-uk-says-a-huge-payroll-data-breach-by-a-malign-actor-has-exposed-details-of-military-personnel/</a></p>
<p>The names and bank details of thousands of serving British soldiers, sailors and air force members have been exposed in a data breach by a “malign actor” who may have had state help, defense officials said Tuesday.</p>
<p>The Ministry of Defense said the breach occurred at a third-party payroll system holding bank details of as many as 272,000 serving armed forces personnel and recent veterans. In a few cases, addresses may also have been exposed.</p>
<p>Defense Secretary Grant Shapps said officials had “immediately taken the system offline” and launched an investigation into the breach and possible failings by the contractor, SSCL, which describes itself as “the largest provider of critical business support services for government.”</p>
<p>“We cannot rule out state involvement,” Shapps told lawmakers in the House of Commons, though he said the government did not yet have evidence to make that conclusion.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/04/01/cyber-security-news-april-2024/comment-page-3/#comment-1827064</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 08 May 2024 05:50:24 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=195892#comment-1827064</guid>
		<description><![CDATA[MITRE Hack: China-Linked Group Breached Systems in December 2023

MITRE has shared more details on the recent hack, including the new malware involved in the attack and a timeline of the attacker’s activities.

https://www.securityweek.com/mitre-hack-china-linked-group-breached-systems-in-december-2023/]]></description>
		<content:encoded><![CDATA[<p>MITRE Hack: China-Linked Group Breached Systems in December 2023</p>
<p>MITRE has shared more details on the recent hack, including the new malware involved in the attack and a timeline of the attacker’s activities.</p>
<p><a href="https://www.securityweek.com/mitre-hack-china-linked-group-breached-systems-in-december-2023/" rel="nofollow">https://www.securityweek.com/mitre-hack-china-linked-group-breached-systems-in-december-2023/</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
