<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security news June 2024</title>
	<atom:link href="http://www.epanorama.net/blog/2024/06/01/cyber-security-news-june-2024/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2024/06/01/cyber-security-news-june-2024/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Fri, 03 Apr 2026 21:03:02 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/06/01/cyber-security-news-june-2024/comment-page-4/#comment-1831343</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 01 Jul 2024 16:16:16 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=196221#comment-1831343</guid>
		<description><![CDATA[https://www.bleepingcomputer.com/news/security/critical-gitlab-bug-lets-attackers-run-pipelines-as-any-user/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.bleepingcomputer.com/news/security/critical-gitlab-bug-lets-attackers-run-pipelines-as-any-user/" rel="nofollow">https://www.bleepingcomputer.com/news/security/critical-gitlab-bug-lets-attackers-run-pipelines-as-any-user/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/06/01/cyber-security-news-june-2024/comment-page-4/#comment-1831342</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 01 Jul 2024 16:15:59 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=196221#comment-1831342</guid>
		<description><![CDATA[https://www.theregister.com/2024/06/28/teamviewer_russia/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.theregister.com/2024/06/28/teamviewer_russia/" rel="nofollow">https://www.theregister.com/2024/06/28/teamviewer_russia/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/06/01/cyber-security-news-june-2024/comment-page-4/#comment-1831306</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 01 Jul 2024 06:12:10 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=196221#comment-1831306</guid>
		<description><![CDATA[Sustaining Digital Certificate Security - Entrust Certificate Distrust 
https://security.googleblog.com/2024/06/sustaining-digital-certificate-security.html?m=1

The Chrome Root Program Policy states that CA certificates included in the Chrome Root Store must provide value to Chrome end users that exceeds the risk of their continued inclusion.

Over the past several years, publicly disclosed incident reports highlighted a pattern of concerning behaviors by Entrust that fall short of the above expectations, and has eroded confidence in their competence, reliability, and integrity as a publicly-trusted CA Owner. 

When will this action happen?

Blocking action will begin on approximately November 1, 2024, affecting certificates issued at that point or later.

Blocking action will occur in Versions of Chrome 127 and greater on Windows, macOS, ChromeOS, Android, and Linux. Apple policies prevent the Chrome Certificate Verifier and corresponding Chrome Root Store from being used on Chrome for iOS. 

What is the user impact of this action?

By default, Chrome users in the above populations who navigate to a website serving a certificate issued by Entrust or AffirmTrust after October 31, 2024 will see a full page interstitial similar to this one.

Certificates issued by other CAs are not impacted by this action.
How can a website operator tell if their website is affected?

Website operators can determine if they are affected by this issue by using the Chrome Certificate Viewer. 

I use Entrust certificates for my internal enterprise network, do I need to do anything?

Beginning in Chrome 127, enterprises can override Chrome Root Store constraints like those described for Entrust in this blog post by installing the corresponding root CA certificate as a locally-trusted root on the platform Chrome is running (e.g., installed in the Microsoft Certificate Store as a Trusted Root CA).]]></description>
		<content:encoded><![CDATA[<p>Sustaining Digital Certificate Security &#8211; Entrust Certificate Distrust<br />
<a href="https://security.googleblog.com/2024/06/sustaining-digital-certificate-security.html?m=1" rel="nofollow">https://security.googleblog.com/2024/06/sustaining-digital-certificate-security.html?m=1</a></p>
<p>The Chrome Root Program Policy states that CA certificates included in the Chrome Root Store must provide value to Chrome end users that exceeds the risk of their continued inclusion.</p>
<p>Over the past several years, publicly disclosed incident reports highlighted a pattern of concerning behaviors by Entrust that fall short of the above expectations, and has eroded confidence in their competence, reliability, and integrity as a publicly-trusted CA Owner. </p>
<p>When will this action happen?</p>
<p>Blocking action will begin on approximately November 1, 2024, affecting certificates issued at that point or later.</p>
<p>Blocking action will occur in Versions of Chrome 127 and greater on Windows, macOS, ChromeOS, Android, and Linux. Apple policies prevent the Chrome Certificate Verifier and corresponding Chrome Root Store from being used on Chrome for iOS. </p>
<p>What is the user impact of this action?</p>
<p>By default, Chrome users in the above populations who navigate to a website serving a certificate issued by Entrust or AffirmTrust after October 31, 2024 will see a full page interstitial similar to this one.</p>
<p>Certificates issued by other CAs are not impacted by this action.<br />
How can a website operator tell if their website is affected?</p>
<p>Website operators can determine if they are affected by this issue by using the Chrome Certificate Viewer. </p>
<p>I use Entrust certificates for my internal enterprise network, do I need to do anything?</p>
<p>Beginning in Chrome 127, enterprises can override Chrome Root Store constraints like those described for Entrust in this blog post by installing the corresponding root CA certificate as a locally-trusted root on the platform Chrome is running (e.g., installed in the Microsoft Certificate Store as a Trusted Root CA).</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/06/01/cyber-security-news-june-2024/comment-page-4/#comment-1831305</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 01 Jul 2024 06:09:08 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=196221#comment-1831305</guid>
		<description><![CDATA[Malware &amp; Threats
In Other News: Malware Delivered by ISP, Temu Spying, Critical Dataverse Vulnerability

Noteworthy stories that might have slipped under the radar: Korean ISP delivers malware to customers, Temu sued for allegedly spying on users, Microsoft patches a critical Dataverse vulnerability.

https://www.securityweek.com/in-other-news-malware-delivered-by-isp-temu-spying-critical-dataverse-vulnerability/


South Korean ISP delivered malware to 600,000 users

South Korean ISP KT has been accused of delivering malware to 600,000 customers in an attempt to interfere with BitTorrent traffic. The company was likely trying to ease the burden placed by torrent traffic on its network and save costs.  

Chinese shopping app Temu allegedly used for spying

The company behind the Chinese shopping app Temu has been sued by the Arkansas Attorney General. The lawsuit, which describes the application as ‘dangerous malware’, claims Temu can collect a lot of data from the devices it’s installed on, and points to the risks of providing information to a Chinese company. In response, Temu denied the accusations and said the lawsuit is based on inaccurate information. The company will defend itself against the claims. 


South Korean ISP ‘Infected’ Torrenting Subscribers with Malware
https://torrentfreak.com/south-korean-isp-infected-torrenting-subscribers-with-malware-240625/

News reports from South Korea, reveal that Internet provider KT actively installed malware on the computers of over half a million subscribers. The malware was intended to interfere with BitTorrent traffic, presumably as a network management solution. A police investigation suggests that cost savings likely played a role too, which is not surprising given local file-sharing habits.]]></description>
		<content:encoded><![CDATA[<p>Malware &amp; Threats<br />
In Other News: Malware Delivered by ISP, Temu Spying, Critical Dataverse Vulnerability</p>
<p>Noteworthy stories that might have slipped under the radar: Korean ISP delivers malware to customers, Temu sued for allegedly spying on users, Microsoft patches a critical Dataverse vulnerability.</p>
<p><a href="https://www.securityweek.com/in-other-news-malware-delivered-by-isp-temu-spying-critical-dataverse-vulnerability/" rel="nofollow">https://www.securityweek.com/in-other-news-malware-delivered-by-isp-temu-spying-critical-dataverse-vulnerability/</a></p>
<p>South Korean ISP delivered malware to 600,000 users</p>
<p>South Korean ISP KT has been accused of delivering malware to 600,000 customers in an attempt to interfere with BitTorrent traffic. The company was likely trying to ease the burden placed by torrent traffic on its network and save costs.  </p>
<p>Chinese shopping app Temu allegedly used for spying</p>
<p>The company behind the Chinese shopping app Temu has been sued by the Arkansas Attorney General. The lawsuit, which describes the application as ‘dangerous malware’, claims Temu can collect a lot of data from the devices it’s installed on, and points to the risks of providing information to a Chinese company. In response, Temu denied the accusations and said the lawsuit is based on inaccurate information. The company will defend itself against the claims. </p>
<p>South Korean ISP ‘Infected’ Torrenting Subscribers with Malware<br />
<a href="https://torrentfreak.com/south-korean-isp-infected-torrenting-subscribers-with-malware-240625/" rel="nofollow">https://torrentfreak.com/south-korean-isp-infected-torrenting-subscribers-with-malware-240625/</a></p>
<p>News reports from South Korea, reveal that Internet provider KT actively installed malware on the computers of over half a million subscribers. The malware was intended to interfere with BitTorrent traffic, presumably as a network management solution. A police investigation suggests that cost savings likely played a role too, which is not surprising given local file-sharing habits.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/06/01/cyber-security-news-june-2024/comment-page-4/#comment-1831303</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 01 Jul 2024 06:06:41 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=196221#comment-1831303</guid>
		<description><![CDATA[Cyberwarfare
Microsoft Alerts More Customers to Email Theft in Expanding Midnight Blizzard Hack

Shockwaves from the Russian government’s hack of Microsoft’s corporate infrastructure continue to spread as the victim pool widens.
https://www.securityweek.com/microsoft-alerts-more-customers-to-email-theft-in-expanding-midnight-blizzard-hack/]]></description>
		<content:encoded><![CDATA[<p>Cyberwarfare<br />
Microsoft Alerts More Customers to Email Theft in Expanding Midnight Blizzard Hack</p>
<p>Shockwaves from the Russian government’s hack of Microsoft’s corporate infrastructure continue to spread as the victim pool widens.<br />
<a href="https://www.securityweek.com/microsoft-alerts-more-customers-to-email-theft-in-expanding-midnight-blizzard-hack/" rel="nofollow">https://www.securityweek.com/microsoft-alerts-more-customers-to-email-theft-in-expanding-midnight-blizzard-hack/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/06/01/cyber-security-news-june-2024/comment-page-4/#comment-1831302</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 01 Jul 2024 06:06:13 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=196221#comment-1831302</guid>
		<description><![CDATA[https://www.securityweek.com/microsoft-details-skeleton-key-ai-jailbreak-technique/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.securityweek.com/microsoft-details-skeleton-key-ai-jailbreak-technique/" rel="nofollow">https://www.securityweek.com/microsoft-details-skeleton-key-ai-jailbreak-technique/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/06/01/cyber-security-news-june-2024/comment-page-4/#comment-1831290</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 30 Jun 2024 22:43:13 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=196221#comment-1831290</guid>
		<description><![CDATA[https://www.bleepingcomputer.com/news/google/google-chrome-to-let-isolated-web-app-access-sensitive-usb-devices/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.bleepingcomputer.com/news/google/google-chrome-to-let-isolated-web-app-access-sensitive-usb-devices/" rel="nofollow">https://www.bleepingcomputer.com/news/google/google-chrome-to-let-isolated-web-app-access-sensitive-usb-devices/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/06/01/cyber-security-news-june-2024/comment-page-4/#comment-1831289</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 30 Jun 2024 22:42:40 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=196221#comment-1831289</guid>
		<description><![CDATA[https://www.sonatype.com/blog/exploit-creator-selling-250-reserved-npm-packages-via-telegram]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.sonatype.com/blog/exploit-creator-selling-250-reserved-npm-packages-via-telegram" rel="nofollow">https://www.sonatype.com/blog/exploit-creator-selling-250-reserved-npm-packages-via-telegram</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/06/01/cyber-security-news-june-2024/comment-page-4/#comment-1831288</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 30 Jun 2024 22:39:52 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=196221#comment-1831288</guid>
		<description><![CDATA[https://www.bleepingcomputer.com/news/security/dev-rejects-cve-severity-makes-his-github-repo-read-only/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.bleepingcomputer.com/news/security/dev-rejects-cve-severity-makes-his-github-repo-read-only/" rel="nofollow">https://www.bleepingcomputer.com/news/security/dev-rejects-cve-severity-makes-his-github-repo-read-only/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/06/01/cyber-security-news-june-2024/comment-page-4/#comment-1831287</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 30 Jun 2024 22:38:42 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/newepa/?p=196221#comment-1831287</guid>
		<description><![CDATA[https://www.neowin.net/news/windows-10-will-get-five-years-of-additional-support-thanks-to-0patch/

0patch, a service that provides micro security patches without disruptions, announced today that it plans to offer security patches for Windows 10 for at least five years after its official end of life, giving customers a chance to stick to their current devices without significant security compromises. In fact, analysts predict that the end of Windows 10 will trigger a wave of PC upgrades.]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.neowin.net/news/windows-10-will-get-five-years-of-additional-support-thanks-to-0patch/" rel="nofollow">https://www.neowin.net/news/windows-10-will-get-five-years-of-additional-support-thanks-to-0patch/</a></p>
<p>0patch, a service that provides micro security patches without disruptions, announced today that it plans to offer security patches for Windows 10 for at least five years after its official end of life, giving customers a chance to stick to their current devices without significant security compromises. In fact, analysts predict that the end of Windows 10 will trigger a wave of PC upgrades.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
