<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security news November 2024</title>
	<atom:link href="http://www.epanorama.net/blog/2024/11/02/cyber-security-news-november-2024/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2024/11/02/cyber-security-news-november-2024/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Mon, 27 Apr 2026 05:22:17 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/11/02/cyber-security-news-november-2024/comment-page-5/#comment-1842649</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 26 Dec 2024 18:33:39 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=196615#comment-1842649</guid>
		<description><![CDATA[300 Drinking Water Systems in US Exposed to Disruptive, Damaging Hacker Attacks

 

EPA flags security vulnerabilities in more than 300 drinking water systems that serve roughly 110 million individuals.

 

https://www.securityweek.com/300-drinking-water-systems-in-us-exposed-to-disruptive-damaging-hacker-attacks/]]></description>
		<content:encoded><![CDATA[<p>300 Drinking Water Systems in US Exposed to Disruptive, Damaging Hacker Attacks</p>
<p>EPA flags security vulnerabilities in more than 300 drinking water systems that serve roughly 110 million individuals.</p>
<p><a href="https://www.securityweek.com/300-drinking-water-systems-in-us-exposed-to-disruptive-damaging-hacker-attacks/" rel="nofollow">https://www.securityweek.com/300-drinking-water-systems-in-us-exposed-to-disruptive-damaging-hacker-attacks/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/11/02/cyber-security-news-november-2024/comment-page-5/#comment-1840440</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 04 Dec 2024 07:00:20 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=196615#comment-1840440</guid>
		<description><![CDATA[CISO Strategy
Cybersecurity Aphorisms: A Humorous and Insightful Look at the Industry’s Truths

The aphorism is a valuable cultural phenomenon for spreading the wisdom of experience — and cybersecurity, with its complexities, nuances, contradictions, and perpetual stress, is a fertile field.

https://www.securityweek.com/cybersecurity-aphorisms-a-humorous-and-insightful-look-at-industrys-truths/]]></description>
		<content:encoded><![CDATA[<p>CISO Strategy<br />
Cybersecurity Aphorisms: A Humorous and Insightful Look at the Industry’s Truths</p>
<p>The aphorism is a valuable cultural phenomenon for spreading the wisdom of experience — and cybersecurity, with its complexities, nuances, contradictions, and perpetual stress, is a fertile field.</p>
<p><a href="https://www.securityweek.com/cybersecurity-aphorisms-a-humorous-and-insightful-look-at-industrys-truths/" rel="nofollow">https://www.securityweek.com/cybersecurity-aphorisms-a-humorous-and-insightful-look-at-industrys-truths/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/11/02/cyber-security-news-november-2024/comment-page-5/#comment-1840439</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 04 Dec 2024 07:00:03 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=196615#comment-1840439</guid>
		<description><![CDATA[Application Security
Low-Code, High Risk: Millions of Records Exposed via Misconfigured Microsoft Power Pages

Security researcher investigated Microsoft Power Pages installations and found several with misconfigurations allowing unintentional access to confidential data.

https://www.securityweek.com/low-code-high-risk-millions-of-records-exposed-via-misconfigured-microsoft-power-pages/]]></description>
		<content:encoded><![CDATA[<p>Application Security<br />
Low-Code, High Risk: Millions of Records Exposed via Misconfigured Microsoft Power Pages</p>
<p>Security researcher investigated Microsoft Power Pages installations and found several with misconfigurations allowing unintentional access to confidential data.</p>
<p><a href="https://www.securityweek.com/low-code-high-risk-millions-of-records-exposed-via-misconfigured-microsoft-power-pages/" rel="nofollow">https://www.securityweek.com/low-code-high-risk-millions-of-records-exposed-via-misconfigured-microsoft-power-pages/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/11/02/cyber-security-news-november-2024/comment-page-5/#comment-1840287</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 02 Dec 2024 06:54:14 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=196615#comment-1840287</guid>
		<description><![CDATA[Source Code of $3,000-a-Month macOS Malware ‘Banshee Stealer’ Leaked

The Banshee Stealer macOS malware operation, which emerged earlier this year, was reportedly shut down following a source code leak. 

https://www.securityweek.com/source-code-of-3000-a-month-macos-malware-banshee-stealer-leaked/]]></description>
		<content:encoded><![CDATA[<p>Source Code of $3,000-a-Month macOS Malware ‘Banshee Stealer’ Leaked</p>
<p>The Banshee Stealer macOS malware operation, which emerged earlier this year, was reportedly shut down following a source code leak. </p>
<p><a href="https://www.securityweek.com/source-code-of-3000-a-month-macos-malware-banshee-stealer-leaked/" rel="nofollow">https://www.securityweek.com/source-code-of-3000-a-month-macos-malware-banshee-stealer-leaked/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/11/02/cyber-security-news-november-2024/comment-page-5/#comment-1840286</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 02 Dec 2024 06:53:30 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=196615#comment-1840286</guid>
		<description><![CDATA[Microsoft Patches Exploited Vulnerability in Partner Network Website

Microsoft informed customers that vulnerabilities affecting cloud, AI and other services have been patched, including an exploited flaw.

https://www.securityweek.com/microsoft-patches-exploited-vulnerability-in-partner-network-website/]]></description>
		<content:encoded><![CDATA[<p>Microsoft Patches Exploited Vulnerability in Partner Network Website</p>
<p>Microsoft informed customers that vulnerabilities affecting cloud, AI and other services have been patched, including an exploited flaw.</p>
<p><a href="https://www.securityweek.com/microsoft-patches-exploited-vulnerability-in-partner-network-website/" rel="nofollow">https://www.securityweek.com/microsoft-patches-exploited-vulnerability-in-partner-network-website/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/11/02/cyber-security-news-november-2024/comment-page-5/#comment-1840250</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 01 Dec 2024 17:27:53 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=196615#comment-1840250</guid>
		<description><![CDATA[https://www.tomshardware.com/tech-industry/chinese-scientists-use-starlink-signals-to-detect-stealth-aircraft-and-drones]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.tomshardware.com/tech-industry/chinese-scientists-use-starlink-signals-to-detect-stealth-aircraft-and-drones" rel="nofollow">https://www.tomshardware.com/tech-industry/chinese-scientists-use-starlink-signals-to-detect-stealth-aircraft-and-drones</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/11/02/cyber-security-news-november-2024/comment-page-5/#comment-1840248</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 01 Dec 2024 17:26:27 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=196615#comment-1840248</guid>
		<description><![CDATA[https://www.helpnetsecurity.com/2024/11/21/linux-backdoors-wolfsbane-firewood/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.helpnetsecurity.com/2024/11/21/linux-backdoors-wolfsbane-firewood/" rel="nofollow">https://www.helpnetsecurity.com/2024/11/21/linux-backdoors-wolfsbane-firewood/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/11/02/cyber-security-news-november-2024/comment-page-5/#comment-1840222</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 01 Dec 2024 16:52:13 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=196615#comment-1840222</guid>
		<description><![CDATA[https://cybersecuritynews.com/zabbix-sql-injection-vulnerability/]]></description>
		<content:encoded><![CDATA[<p><a href="https://cybersecuritynews.com/zabbix-sql-injection-vulnerability/" rel="nofollow">https://cybersecuritynews.com/zabbix-sql-injection-vulnerability/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/11/02/cyber-security-news-november-2024/comment-page-5/#comment-1840221</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 01 Dec 2024 16:26:52 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=196615#comment-1840221</guid>
		<description><![CDATA[https://www.bleepingcomputer.com/news/microsoft/microsoft-shares-more-details-on-windows-11-admin-protection/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-shares-more-details-on-windows-11-admin-protection/" rel="nofollow">https://www.bleepingcomputer.com/news/microsoft/microsoft-shares-more-details-on-windows-11-admin-protection/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2024/11/02/cyber-security-news-november-2024/comment-page-5/#comment-1840220</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 01 Dec 2024 16:26:35 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=196615#comment-1840220</guid>
		<description><![CDATA[https://www.bleepingcomputer.com/news/microsoft/windows-quick-machine-recovery-lets-admins-remotely-fix-unbootable-devices/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.bleepingcomputer.com/news/microsoft/windows-quick-machine-recovery-lets-admins-remotely-fix-unbootable-devices/" rel="nofollow">https://www.bleepingcomputer.com/news/microsoft/windows-quick-machine-recovery-lets-admins-remotely-fix-unbootable-devices/</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
