<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security news May 2024</title>
	<atom:link href="http://www.epanorama.net/blog/2024/05/09/cyber-security-news-may-2024/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2024/05/09/cyber-security-news-may-2024/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Sun, 26 Apr 2026 19:44:01 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/05/09/cyber-security-news-may-2024/comment-page-6/#comment-1829357</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 02 Jun 2024 20:24:34 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=196103#comment-1829357</guid>
		<description><![CDATA[https://hackaday.com/2024/05/31/this-week-in-security-operation-endgame-appliance-carnage-and-router-genocide/]]></description>
		<content:encoded><![CDATA[<p><a href="https://hackaday.com/2024/05/31/this-week-in-security-operation-endgame-appliance-carnage-and-router-genocide/" rel="nofollow">https://hackaday.com/2024/05/31/this-week-in-security-operation-endgame-appliance-carnage-and-router-genocide/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/05/09/cyber-security-news-may-2024/comment-page-6/#comment-1829270</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 01 Jun 2024 20:01:52 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=196103#comment-1829270</guid>
		<description><![CDATA[https://www.bleepingcomputer.com/news/security/hackers-phish-finance-orgs-using-trojanized-minesweeper-clone/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.bleepingcomputer.com/news/security/hackers-phish-finance-orgs-using-trojanized-minesweeper-clone/" rel="nofollow">https://www.bleepingcomputer.com/news/security/hackers-phish-finance-orgs-using-trojanized-minesweeper-clone/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/05/09/cyber-security-news-may-2024/comment-page-6/#comment-1829264</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 01 Jun 2024 19:04:43 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=196103#comment-1829264</guid>
		<description><![CDATA[https://cybersecuritynews.com/detecting-phishing-attack-artificial-intelligence/]]></description>
		<content:encoded><![CDATA[<p><a href="https://cybersecuritynews.com/detecting-phishing-attack-artificial-intelligence/" rel="nofollow">https://cybersecuritynews.com/detecting-phishing-attack-artificial-intelligence/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/05/09/cyber-security-news-may-2024/comment-page-6/#comment-1829263</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 01 Jun 2024 19:03:32 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=196103#comment-1829263</guid>
		<description><![CDATA[Hacker defaces spyware app’s site, dumps database and source code
https://www.bleepingcomputer.com/news/security/hacker-defaces-spyware-apps-site-dumps-database-and-source-code/#google_vignette

​​A hacker has defaced the website of the pcTattletale spyware application, found on the booking systems of several Wyndham hotels in the United States, and leaked over a dozen archives containing database and source code data.

As Vice reported three years ago, this stalkerware app was also found leaking real-time screenshots from Android phones.

Described by its developers as an &quot;employee and child monitoring software,&quot; pcTattletale is a consumer-grade spyware solution that was leaking guest details and customer information captured from the hotels&#039; check-in systems because of an API security vulnerability, according to TechCrunch.]]></description>
		<content:encoded><![CDATA[<p>Hacker defaces spyware app’s site, dumps database and source code<br />
<a href="https://www.bleepingcomputer.com/news/security/hacker-defaces-spyware-apps-site-dumps-database-and-source-code/#google_vignette" rel="nofollow">https://www.bleepingcomputer.com/news/security/hacker-defaces-spyware-apps-site-dumps-database-and-source-code/#google_vignette</a></p>
<p>​​A hacker has defaced the website of the pcTattletale spyware application, found on the booking systems of several Wyndham hotels in the United States, and leaked over a dozen archives containing database and source code data.</p>
<p>As Vice reported three years ago, this stalkerware app was also found leaking real-time screenshots from Android phones.</p>
<p>Described by its developers as an &#8220;employee and child monitoring software,&#8221; pcTattletale is a consumer-grade spyware solution that was leaking guest details and customer information captured from the hotels&#8217; check-in systems because of an API security vulnerability, according to TechCrunch.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/05/09/cyber-security-news-may-2024/comment-page-6/#comment-1829228</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 01 Jun 2024 16:49:09 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=196103#comment-1829228</guid>
		<description><![CDATA[https://www.cloudflare.com/learning/access-management/what-is-mutual-tls/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.cloudflare.com/learning/access-management/what-is-mutual-tls/" rel="nofollow">https://www.cloudflare.com/learning/access-management/what-is-mutual-tls/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/05/09/cyber-security-news-may-2024/comment-page-6/#comment-1829227</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 01 Jun 2024 16:48:36 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=196103#comment-1829227</guid>
		<description><![CDATA[https://www.bleepingcomputer.com/news/security/hacker-defaces-spyware-apps-site-dumps-database-and-source-code/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.bleepingcomputer.com/news/security/hacker-defaces-spyware-apps-site-dumps-database-and-source-code/" rel="nofollow">https://www.bleepingcomputer.com/news/security/hacker-defaces-spyware-apps-site-dumps-database-and-source-code/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/05/09/cyber-security-news-may-2024/comment-page-6/#comment-1829215</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 01 Jun 2024 14:38:07 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=196103#comment-1829215</guid>
		<description><![CDATA[https://thehackernews.com/2024/05/ms-exchange-server-flaws-exploited-to.html?m=1]]></description>
		<content:encoded><![CDATA[<p><a href="https://thehackernews.com/2024/05/ms-exchange-server-flaws-exploited-to.html?m=1" rel="nofollow">https://thehackernews.com/2024/05/ms-exchange-server-flaws-exploited-to.html?m=1</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/05/09/cyber-security-news-may-2024/comment-page-5/#comment-1829214</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 01 Jun 2024 14:37:46 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=196103#comment-1829214</guid>
		<description><![CDATA[https://www.dna.fi/yrityksille/blogi/-/blogs/tekoaly-on-sita-mita-teemme-siita-ja-samaan-aikaan-seka-uhka-etta-mahdollisuus?utm_source=facebook&amp;utm_medium=linkad&amp;utm_content=JUJO-artikkeli-tekoaly-on-sita-mita-teemme-siita-ja-samaan-aikaan-seka-uhka-etta-mahdollisuus&amp;utm_campaign=H_JUJO_LAS_24-18-22_artikkelikampanja&amp;fbclid=IwAR1dgheZA-iyWQy0OpKkLwBODpVGXrJ-YQUJMm-cZ_3myD65pDZBOQ5lECI_aem_eN5tje_1JlJou4RsT3MKMQ]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.dna.fi/yrityksille/blogi/-/blogs/tekoaly-on-sita-mita-teemme-siita-ja-samaan-aikaan-seka-uhka-etta-mahdollisuus?utm_source=facebook&#038;utm_medium=linkad&#038;utm_content=JUJO-artikkeli-tekoaly-on-sita-mita-teemme-siita-ja-samaan-aikaan-seka-uhka-etta-mahdollisuus&#038;utm_campaign=H_JUJO_LAS_24-18-22_artikkelikampanja&#038;fbclid=IwAR1dgheZA-iyWQy0OpKkLwBODpVGXrJ-YQUJMm-cZ_3myD65pDZBOQ5lECI_aem_eN5tje_1JlJou4RsT3MKMQ" rel="nofollow">https://www.dna.fi/yrityksille/blogi/-/blogs/tekoaly-on-sita-mita-teemme-siita-ja-samaan-aikaan-seka-uhka-etta-mahdollisuus?utm_source=facebook&#038;utm_medium=linkad&#038;utm_content=JUJO-artikkeli-tekoaly-on-sita-mita-teemme-siita-ja-samaan-aikaan-seka-uhka-etta-mahdollisuus&#038;utm_campaign=H_JUJO_LAS_24-18-22_artikkelikampanja&#038;fbclid=IwAR1dgheZA-iyWQy0OpKkLwBODpVGXrJ-YQUJMm-cZ_3myD65pDZBOQ5lECI_aem_eN5tje_1JlJou4RsT3MKMQ</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/05/09/cyber-security-news-may-2024/comment-page-5/#comment-1829190</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 01 Jun 2024 13:16:46 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=196103#comment-1829190</guid>
		<description><![CDATA[How Researchers Cracked an 11-Year-Old Password to a $3 Million Crypto Wallet
Thanks to a flaw in a decade-old version of the RoboForm password manager and a bit of luck, researchers were able to unearth the password to a crypto wallet containing a fortune.
https://www.wired.com/story/roboform-password-3-million-dollar-crypto-wallet/]]></description>
		<content:encoded><![CDATA[<p>How Researchers Cracked an 11-Year-Old Password to a $3 Million Crypto Wallet<br />
Thanks to a flaw in a decade-old version of the RoboForm password manager and a bit of luck, researchers were able to unearth the password to a crypto wallet containing a fortune.<br />
<a href="https://www.wired.com/story/roboform-password-3-million-dollar-crypto-wallet/" rel="nofollow">https://www.wired.com/story/roboform-password-3-million-dollar-crypto-wallet/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/05/09/cyber-security-news-may-2024/comment-page-5/#comment-1829167</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 01 Jun 2024 09:37:48 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=196103#comment-1829167</guid>
		<description><![CDATA[Helsinki teki merkittävän päätöksen etäyhteyksistä – syynä tietomurto
https://www.tivi.fi/uutiset/helsinki-teki-merkittavan-paatoksen-etayhteyksista-syyna-tietomurto/c06ad6e6-734f-4005-a0ea-4586f6e61374

Tietomurron jälkeen Helsingissä ei haluta enää todeta etäyhteyksien olleen reikäjuustoa.

Helsingin kaupungin digitalisaatiojohtaja Hannu Heikkinen on päättänyt, että kaupunki laittaa nyt kerralla kuntoon etäyhteys- ja etäkäyttöratkaisunsa. Tiukka päätös koskee kaikkia kaupungin toimialoja, liikelaitoksia sekä virastoja.]]></description>
		<content:encoded><![CDATA[<p>Helsinki teki merkittävän päätöksen etäyhteyksistä – syynä tietomurto<br />
<a href="https://www.tivi.fi/uutiset/helsinki-teki-merkittavan-paatoksen-etayhteyksista-syyna-tietomurto/c06ad6e6-734f-4005-a0ea-4586f6e61374" rel="nofollow">https://www.tivi.fi/uutiset/helsinki-teki-merkittavan-paatoksen-etayhteyksista-syyna-tietomurto/c06ad6e6-734f-4005-a0ea-4586f6e61374</a></p>
<p>Tietomurron jälkeen Helsingissä ei haluta enää todeta etäyhteyksien olleen reikäjuustoa.</p>
<p>Helsingin kaupungin digitalisaatiojohtaja Hannu Heikkinen on päättänyt, että kaupunki laittaa nyt kerralla kuntoon etäyhteys- ja etäkäyttöratkaisunsa. Tiukka päätös koskee kaikkia kaupungin toimialoja, liikelaitoksia sekä virastoja.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
