<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security news July 2024</title>
	<atom:link href="http://www.epanorama.net/blog/2024/07/01/cyber-security-news-july-2024/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2024/07/01/cyber-security-news-july-2024/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Wed, 22 Apr 2026 04:56:12 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/07/01/cyber-security-news-july-2024/comment-page-7/#comment-1833633</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 07 Aug 2024 05:14:46 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=196300#comment-1833633</guid>
		<description><![CDATA[Mysterious family of malware hid in Google Play for years
Mandrake&#039;s ability to go unnoticed was the result of designs not often seen in Android malware.
https://arstechnica.com/security/2024/07/mysterious-family-of-malware-hid-in-google-play-for-years/?utm_source=facebook&amp;utm_medium=social&amp;utm_campaign=dhfacebook&amp;utm_content=null&amp;fbclid=IwZXh0bgNhZW0CMTEAAR2Of175KpFVS6FVzH6PVL50NqsPPLRap5FdIH3pzv5hef_bM0W7ZvYplPw_aem_Z5hybUxwmrMC89xpnJM6VQ

A mysterious family of Android malware with a demonstrated history of effectively concealing its myriad spying activities has once again been found in Google Play after more than two years of hiding in plain sight.

The apps, disguised as file-sharing, astronomy, and cryptocurrency apps, hosted Mandrake, a family of highly intrusive malware that security firm Bitdefender called out in 2020. Bitdefender said the apps appeared in two waves, one in 2016 through 2017 and again in 2018 through 2020.]]></description>
		<content:encoded><![CDATA[<p>Mysterious family of malware hid in Google Play for years<br />
Mandrake&#8217;s ability to go unnoticed was the result of designs not often seen in Android malware.<br />
<a href="https://arstechnica.com/security/2024/07/mysterious-family-of-malware-hid-in-google-play-for-years/?utm_source=facebook&#038;utm_medium=social&#038;utm_campaign=dhfacebook&#038;utm_content=null&#038;fbclid=IwZXh0bgNhZW0CMTEAAR2Of175KpFVS6FVzH6PVL50NqsPPLRap5FdIH3pzv5hef_bM0W7ZvYplPw_aem_Z5hybUxwmrMC89xpnJM6VQ" rel="nofollow">https://arstechnica.com/security/2024/07/mysterious-family-of-malware-hid-in-google-play-for-years/?utm_source=facebook&#038;utm_medium=social&#038;utm_campaign=dhfacebook&#038;utm_content=null&#038;fbclid=IwZXh0bgNhZW0CMTEAAR2Of175KpFVS6FVzH6PVL50NqsPPLRap5FdIH3pzv5hef_bM0W7ZvYplPw_aem_Z5hybUxwmrMC89xpnJM6VQ</a></p>
<p>A mysterious family of Android malware with a demonstrated history of effectively concealing its myriad spying activities has once again been found in Google Play after more than two years of hiding in plain sight.</p>
<p>The apps, disguised as file-sharing, astronomy, and cryptocurrency apps, hosted Mandrake, a family of highly intrusive malware that security firm Bitdefender called out in 2020. Bitdefender said the apps appeared in two waves, one in 2016 through 2017 and again in 2018 through 2020.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/07/01/cyber-security-news-july-2024/comment-page-7/#comment-1833498</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 05 Aug 2024 05:42:10 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=196300#comment-1833498</guid>
		<description><![CDATA[Buffer Over-Read (CWE-126) in DNS Response Parser

URL:
https://github.com/FreeRTOS/FreeRTOS-Plus-TCP/security/advisories/GHSA-ppcp-rg65-58mv

Classification: Critical, Solution: Official Fix, Exploit Maturity: Not Defined, CVSSv3.1: 9.6

CVEs: CVE-2024-38373

FreeRTOS-Plus-TCP versions 4.0.0 through 4.1.0 contain a buffer over-read

issue in the DNS Response Parser when parsing domain names in a DNS response.

A carefully crafted DNS response with domain name length value greater than

the actual domain name length, could cause the parser to read beyond the DNS

response buffer.

This issue affects applications using DNS functionality of the

FreeRTOS-Plus-TCP stack. Applications that do not use DNS functionality are

not affected, even when the DNS functionality is enabled.

This is fixed in FreeRTOS-Plus-TCP versions 4.1.1 or later.]]></description>
		<content:encoded><![CDATA[<p>Buffer Over-Read (CWE-126) in DNS Response Parser</p>
<p>URL:<br />
<a href="https://github.com/FreeRTOS/FreeRTOS-Plus-TCP/security/advisories/GHSA-ppcp-rg65-58mv" rel="nofollow">https://github.com/FreeRTOS/FreeRTOS-Plus-TCP/security/advisories/GHSA-ppcp-rg65-58mv</a></p>
<p>Classification: Critical, Solution: Official Fix, Exploit Maturity: Not Defined, CVSSv3.1: 9.6</p>
<p>CVEs: CVE-2024-38373</p>
<p>FreeRTOS-Plus-TCP versions 4.0.0 through 4.1.0 contain a buffer over-read</p>
<p>issue in the DNS Response Parser when parsing domain names in a DNS response.</p>
<p>A carefully crafted DNS response with domain name length value greater than</p>
<p>the actual domain name length, could cause the parser to read beyond the DNS</p>
<p>response buffer.</p>
<p>This issue affects applications using DNS functionality of the</p>
<p>FreeRTOS-Plus-TCP stack. Applications that do not use DNS functionality are</p>
<p>not affected, even when the DNS functionality is enabled.</p>
<p>This is fixed in FreeRTOS-Plus-TCP versions 4.1.1 or later.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/07/01/cyber-security-news-july-2024/comment-page-7/#comment-1833404</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 03 Aug 2024 11:37:03 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=196300#comment-1833404</guid>
		<description><![CDATA[Delta CEO calls Microsoft ‘probably the most fragile platform’ while praising Apple
https://9to5mac.com/2024/08/01/delta-ceo-calls-microsoft-probably-the-most-fragile-platform-while-praising-apple/]]></description>
		<content:encoded><![CDATA[<p>Delta CEO calls Microsoft ‘probably the most fragile platform’ while praising Apple<br />
<a href="https://9to5mac.com/2024/08/01/delta-ceo-calls-microsoft-probably-the-most-fragile-platform-while-praising-apple/" rel="nofollow">https://9to5mac.com/2024/08/01/delta-ceo-calls-microsoft-probably-the-most-fragile-platform-while-praising-apple/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/07/01/cyber-security-news-july-2024/comment-page-7/#comment-1833346</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Aug 2024 15:01:25 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=196300#comment-1833346</guid>
		<description><![CDATA[https://www.bleepingcomputer.com/news/security/whatsapp-for-windows-lets-python-php-scripts-execute-with-no-warning/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.bleepingcomputer.com/news/security/whatsapp-for-windows-lets-python-php-scripts-execute-with-no-warning/" rel="nofollow">https://www.bleepingcomputer.com/news/security/whatsapp-for-windows-lets-python-php-scripts-execute-with-no-warning/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/07/01/cyber-security-news-july-2024/comment-page-7/#comment-1833335</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Aug 2024 13:16:31 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=196300#comment-1833335</guid>
		<description><![CDATA[Data breach exposes US spyware maker behind Windows, Mac, Android and Chromebook malware
The Minnesota-based Spytech snooped on thousands of devices before it was hacked.
https://techcrunch.com/2024/07/25/spytech-data-breach-windows-mac-android-chromebook-spyware/]]></description>
		<content:encoded><![CDATA[<p>Data breach exposes US spyware maker behind Windows, Mac, Android and Chromebook malware<br />
The Minnesota-based Spytech snooped on thousands of devices before it was hacked.<br />
<a href="https://techcrunch.com/2024/07/25/spytech-data-breach-windows-mac-android-chromebook-spyware/" rel="nofollow">https://techcrunch.com/2024/07/25/spytech-data-breach-windows-mac-android-chromebook-spyware/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/07/01/cyber-security-news-july-2024/comment-page-7/#comment-1833320</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Aug 2024 13:02:18 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=196300#comment-1833320</guid>
		<description><![CDATA[Russia takes aim at Sitting Ducks domains, bags 30,000+
Eight-year-old domain hijacking technique still claiming victims
https://www.theregister.com/2024/07/31/domains_with_delegated_name_service/

Dozens of Russia-affiliated criminals are right now trying to wrest control of web domains by exploiting weak DNS services.

The crooks have already hijacked an estimated 30,000 domains since 2019, by using a technique dubbed Sitting Ducks by cybersecurity outfits Infoblox and Eclypsium.

The flaw at the heart of the matter has been known since at least 2016, when security researcher Matt Bryant detailed the takeover of 120,000 domains using a DNS vulnerability at major cloud providers such as AWS, Google, and Digital Ocean. It resurfaced in 2019 at internet service provider GoDaddy, leading to bomb threats and sextortion attempts.]]></description>
		<content:encoded><![CDATA[<p>Russia takes aim at Sitting Ducks domains, bags 30,000+<br />
Eight-year-old domain hijacking technique still claiming victims<br />
<a href="https://www.theregister.com/2024/07/31/domains_with_delegated_name_service/" rel="nofollow">https://www.theregister.com/2024/07/31/domains_with_delegated_name_service/</a></p>
<p>Dozens of Russia-affiliated criminals are right now trying to wrest control of web domains by exploiting weak DNS services.</p>
<p>The crooks have already hijacked an estimated 30,000 domains since 2019, by using a technique dubbed Sitting Ducks by cybersecurity outfits Infoblox and Eclypsium.</p>
<p>The flaw at the heart of the matter has been known since at least 2016, when security researcher Matt Bryant detailed the takeover of 120,000 domains using a DNS vulnerability at major cloud providers such as AWS, Google, and Digital Ocean. It resurfaced in 2019 at internet service provider GoDaddy, leading to bomb threats and sextortion attempts.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/07/01/cyber-security-news-july-2024/comment-page-7/#comment-1833305</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Aug 2024 12:39:46 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=196300#comment-1833305</guid>
		<description><![CDATA[https://cybernews.com/news/deleted-github-data-accessible-to-anyone/]]></description>
		<content:encoded><![CDATA[<p><a href="https://cybernews.com/news/deleted-github-data-accessible-to-anyone/" rel="nofollow">https://cybernews.com/news/deleted-github-data-accessible-to-anyone/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/07/01/cyber-security-news-july-2024/comment-page-7/#comment-1833303</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Aug 2024 12:38:02 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=196300#comment-1833303</guid>
		<description><![CDATA[https://www.bleepingcomputer.com/news/microsoft/july-windows-server-updates-break-remote-desktop-connections/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.bleepingcomputer.com/news/microsoft/july-windows-server-updates-break-remote-desktop-connections/" rel="nofollow">https://www.bleepingcomputer.com/news/microsoft/july-windows-server-updates-break-remote-desktop-connections/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/07/01/cyber-security-news-july-2024/comment-page-7/#comment-1833298</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Aug 2024 11:44:38 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=196300#comment-1833298</guid>
		<description><![CDATA[Järkyttävä hintalappu! Näin paljon miljoonia tietokoneita kaatanut sotku maksoi
https://www.is.fi/digitoday/art-2000010596407.html

Kaiken kaikkiaan Parametrixin arvioi CrowdStriken viallisen päivityksen aiheuttaneen yrityksille yhteensä 5,4 miljardia euron kustannukset. On todennäköistä, että tappiot ovat sitäkin suuremmat, sillä mukaan ei ole edes laskettu Microsoftille koituneita kustannuksia.]]></description>
		<content:encoded><![CDATA[<p>Järkyttävä hintalappu! Näin paljon miljoonia tietokoneita kaatanut sotku maksoi<br />
<a href="https://www.is.fi/digitoday/art-2000010596407.html" rel="nofollow">https://www.is.fi/digitoday/art-2000010596407.html</a></p>
<p>Kaiken kaikkiaan Parametrixin arvioi CrowdStriken viallisen päivityksen aiheuttaneen yrityksille yhteensä 5,4 miljardia euron kustannukset. On todennäköistä, että tappiot ovat sitäkin suuremmat, sillä mukaan ei ole edes laskettu Microsoftille koituneita kustannuksia.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/07/01/cyber-security-news-july-2024/comment-page-7/#comment-1833296</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Aug 2024 11:31:45 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=196300#comment-1833296</guid>
		<description><![CDATA[https://thehackernews.com/2024/07/proofpoint-email-routing-flaw-exploited.html]]></description>
		<content:encoded><![CDATA[<p><a href="https://thehackernews.com/2024/07/proofpoint-email-routing-flaw-exploited.html" rel="nofollow">https://thehackernews.com/2024/07/proofpoint-email-routing-flaw-exploited.html</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
