<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security news August 2024</title>
	<atom:link href="http://www.epanorama.net/blog/2024/08/01/cyber-security-news-august-2024/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2024/08/01/cyber-security-news-august-2024/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Wed, 15 Apr 2026 22:25:15 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/08/01/cyber-security-news-august-2024/comment-page-4/#comment-1835139</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 01 Sep 2024 11:20:42 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=196456#comment-1835139</guid>
		<description><![CDATA[Exploiting Jenkins RCE Vulnerability (CVE-2024-43044) Via Agents – Technical Analysis
https://cybersecuritynews.com/exploiting-jenkins-remote-code-vulnerability/]]></description>
		<content:encoded><![CDATA[<p>Exploiting Jenkins RCE Vulnerability (CVE-2024-43044) Via Agents – Technical Analysis<br />
<a href="https://cybersecuritynews.com/exploiting-jenkins-remote-code-vulnerability/" rel="nofollow">https://cybersecuritynews.com/exploiting-jenkins-remote-code-vulnerability/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/08/01/cyber-security-news-august-2024/comment-page-4/#comment-1835138</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 01 Sep 2024 11:18:45 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=196456#comment-1835138</guid>
		<description><![CDATA[Cloudflare Introduces Automatic SSL/TLS to Secure and Simplify Origin Server Connectivity
https://www.infoq.com/news/2024/08/cloudflare-automatic-ssl-origin/

Cloudflare recently introduced new Automatic SSL/TLS settings to simplify the provider&#039;s encryption modes for communication with origin servers. This feature offers automatic configuration, ensuring security without risking site downtime.

Automatic SSL/TLS strengthens the encryption modes between Cloudflare and origin servers by utilizing the Cloudflare SSL/TLS Recommender. This recommender automatically performs a series of requests from Cloudflare to the customer’s origin(s) with different SSL/TLS settings to determine if the backend communication can be upgraded beyond the current configuration.]]></description>
		<content:encoded><![CDATA[<p>Cloudflare Introduces Automatic SSL/TLS to Secure and Simplify Origin Server Connectivity<br />
<a href="https://www.infoq.com/news/2024/08/cloudflare-automatic-ssl-origin/" rel="nofollow">https://www.infoq.com/news/2024/08/cloudflare-automatic-ssl-origin/</a></p>
<p>Cloudflare recently introduced new Automatic SSL/TLS settings to simplify the provider&#8217;s encryption modes for communication with origin servers. This feature offers automatic configuration, ensuring security without risking site downtime.</p>
<p>Automatic SSL/TLS strengthens the encryption modes between Cloudflare and origin servers by utilizing the Cloudflare SSL/TLS Recommender. This recommender automatically performs a series of requests from Cloudflare to the customer’s origin(s) with different SSL/TLS settings to determine if the backend communication can be upgraded beyond the current configuration.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/08/01/cyber-security-news-august-2024/comment-page-4/#comment-1835137</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 01 Sep 2024 11:17:33 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=196456#comment-1835137</guid>
		<description><![CDATA[Breaking Down AD CS Vulnerabilities: Insights for InfoSec Professionals
https://thehackernews.com/2024/08/breaking-down-ad-cs-vulnerabilities.html

What is Active Directory Certificate Services?#
Active Directory Certificate Services (&quot;AD CS&quot;), as defined by Microsoft is, &quot;a Windows Server role for issuing and managing public key infrastructure (PKI) certificates used in secure communication and authentication protocols.&quot; Some common features and services that rely on AD CS are:

The Windows Logon Process
Enterprise VPN and Wireless Networks
Email Encryption and Digital Signatures
Smart Card Authentication
As companies continue to increase the variety of technologies available within their organizations, AD CS will become more common and more necessary, especially as companies continue to host their services in the cloud. Many AWS, Azure and GCP services require certificate-based authentication to function, so it is expected that AD CS will become an increasingly prominent and required service in modern multi-cloud networks.]]></description>
		<content:encoded><![CDATA[<p>Breaking Down AD CS Vulnerabilities: Insights for InfoSec Professionals<br />
<a href="https://thehackernews.com/2024/08/breaking-down-ad-cs-vulnerabilities.html" rel="nofollow">https://thehackernews.com/2024/08/breaking-down-ad-cs-vulnerabilities.html</a></p>
<p>What is Active Directory Certificate Services?#<br />
Active Directory Certificate Services (&#8220;AD CS&#8221;), as defined by Microsoft is, &#8220;a Windows Server role for issuing and managing public key infrastructure (PKI) certificates used in secure communication and authentication protocols.&#8221; Some common features and services that rely on AD CS are:</p>
<p>The Windows Logon Process<br />
Enterprise VPN and Wireless Networks<br />
Email Encryption and Digital Signatures<br />
Smart Card Authentication<br />
As companies continue to increase the variety of technologies available within their organizations, AD CS will become more common and more necessary, especially as companies continue to host their services in the cloud. Many AWS, Azure and GCP services require certificate-based authentication to function, so it is expected that AD CS will become an increasingly prominent and required service in modern multi-cloud networks.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/08/01/cyber-security-news-august-2024/comment-page-4/#comment-1835136</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 01 Sep 2024 10:52:54 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=196456#comment-1835136</guid>
		<description><![CDATA[https://www.bleepingcomputer.com/news/google/google-increases-chrome-bug-bounty-rewards-up-to-250-000/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.bleepingcomputer.com/news/google/google-increases-chrome-bug-bounty-rewards-up-to-250-000/" rel="nofollow">https://www.bleepingcomputer.com/news/google/google-increases-chrome-bug-bounty-rewards-up-to-250-000/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/08/01/cyber-security-news-august-2024/comment-page-4/#comment-1835109</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 31 Aug 2024 12:37:06 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=196456#comment-1835109</guid>
		<description><![CDATA[https://thehackernews.com/2024/08/cisa-flags-critical-apache-ofbiz-flaw.html]]></description>
		<content:encoded><![CDATA[<p><a href="https://thehackernews.com/2024/08/cisa-flags-critical-apache-ofbiz-flaw.html" rel="nofollow">https://thehackernews.com/2024/08/cisa-flags-critical-apache-ofbiz-flaw.html</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/08/01/cyber-security-news-august-2024/comment-page-4/#comment-1835108</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 31 Aug 2024 12:36:50 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=196456#comment-1835108</guid>
		<description><![CDATA[https://arstechnica.com/security/2024/08/unpatchable-0-day-in-surveillance-cam-is-being-exploited-to-install-mirai/]]></description>
		<content:encoded><![CDATA[<p><a href="https://arstechnica.com/security/2024/08/unpatchable-0-day-in-surveillance-cam-is-being-exploited-to-install-mirai/" rel="nofollow">https://arstechnica.com/security/2024/08/unpatchable-0-day-in-surveillance-cam-is-being-exploited-to-install-mirai/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/08/01/cyber-security-news-august-2024/comment-page-4/#comment-1835107</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 31 Aug 2024 12:36:12 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=196456#comment-1835107</guid>
		<description><![CDATA[https://www.forbes.com/sites/daveywinder/2024/08/29/new-password-hacking-warning-for-gmail-facebook-and-amazon-users/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.forbes.com/sites/daveywinder/2024/08/29/new-password-hacking-warning-for-gmail-facebook-and-amazon-users/" rel="nofollow">https://www.forbes.com/sites/daveywinder/2024/08/29/new-password-hacking-warning-for-gmail-facebook-and-amazon-users/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/08/01/cyber-security-news-august-2024/comment-page-4/#comment-1835106</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 31 Aug 2024 12:34:58 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=196456#comment-1835106</guid>
		<description><![CDATA[PoC Exploit for Zero-Click Vulnerability Made Available to the Masses
The exploit can be accessed on GitHub and makes it easier for the flaw to be exploited by threat actors.
https://www.darkreading.com/vulnerabilities-threats/poc-exploit-for-zero-click-vulnerability-made-available-to-the-masses]]></description>
		<content:encoded><![CDATA[<p>PoC Exploit for Zero-Click Vulnerability Made Available to the Masses<br />
The exploit can be accessed on GitHub and makes it easier for the flaw to be exploited by threat actors.<br />
<a href="https://www.darkreading.com/vulnerabilities-threats/poc-exploit-for-zero-click-vulnerability-made-available-to-the-masses" rel="nofollow">https://www.darkreading.com/vulnerabilities-threats/poc-exploit-for-zero-click-vulnerability-made-available-to-the-masses</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/08/01/cyber-security-news-august-2024/comment-page-4/#comment-1835104</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 31 Aug 2024 12:32:09 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=196456#comment-1835104</guid>
		<description><![CDATA[https://cybernews.com/privacy/denmark-ban-telegram-signal-whatsapp/]]></description>
		<content:encoded><![CDATA[<p><a href="https://cybernews.com/privacy/denmark-ban-telegram-signal-whatsapp/" rel="nofollow">https://cybernews.com/privacy/denmark-ban-telegram-signal-whatsapp/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/08/01/cyber-security-news-august-2024/comment-page-4/#comment-1835101</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 31 Aug 2024 12:23:43 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=196456#comment-1835101</guid>
		<description><![CDATA[https://www.bleepingcomputer.com/news/security/how-to-identify-unknown-assets-while-pen-testing/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.bleepingcomputer.com/news/security/how-to-identify-unknown-assets-while-pen-testing/" rel="nofollow">https://www.bleepingcomputer.com/news/security/how-to-identify-unknown-assets-while-pen-testing/</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
