<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security August 2025</title>
	<atom:link href="http://www.epanorama.net/blog/2025/08/02/cyber-security-august-2025/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2025/08/02/cyber-security-august-2025/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Thu, 16 Apr 2026 05:11:24 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2025/08/02/cyber-security-august-2025/comment-page-6/#comment-1861409</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 04 Sep 2025 16:22:17 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=198064#comment-1861409</guid>
		<description><![CDATA[Twelve autonomous AI agents juggle 150 highly specialized security tools, from reconnaissance to zero-day exploitation, and it seems to be working.

#AI #hack #cybersecurity

Learn more: https://cnews.link/ai-brain-hexstrike-runs-cyberattacks-on-its-own/]]></description>
		<content:encoded><![CDATA[<p>Twelve autonomous AI agents juggle 150 highly specialized security tools, from reconnaissance to zero-day exploitation, and it seems to be working.</p>
<p>#AI #hack #cybersecurity</p>
<p>Learn more: <a href="https://cnews.link/ai-brain-hexstrike-runs-cyberattacks-on-its-own/" rel="nofollow">https://cnews.link/ai-brain-hexstrike-runs-cyberattacks-on-its-own/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2025/08/02/cyber-security-august-2025/comment-page-5/#comment-1861376</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 03 Sep 2025 05:03:13 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=198064#comment-1861376</guid>
		<description><![CDATA[Kuluvan vuoden lokakuu on tietoturvassa ja IT:ssä merkittävä siksi, että laajalti käytössä olevan käyttöjärjestelmä Microsoftin Windows 10:n tuki päättyy 14. lokakuuta. 

Mitä tuen päättyminen tarkoittaa yrityksille käytännössä?

https://nerdynet.com/windows-10-tuki-paattyy-lokakuussa-miksi-deadline-koskettaa-jokaista-yritysta/?utm_source=meta&amp;utm_medium=social&amp;utm_campaign=030725]]></description>
		<content:encoded><![CDATA[<p>Kuluvan vuoden lokakuu on tietoturvassa ja IT:ssä merkittävä siksi, että laajalti käytössä olevan käyttöjärjestelmä Microsoftin Windows 10:n tuki päättyy 14. lokakuuta. </p>
<p>Mitä tuen päättyminen tarkoittaa yrityksille käytännössä?</p>
<p><a href="https://nerdynet.com/windows-10-tuki-paattyy-lokakuussa-miksi-deadline-koskettaa-jokaista-yritysta/?utm_source=meta&#038;utm_medium=social&#038;utm_campaign=030725" rel="nofollow">https://nerdynet.com/windows-10-tuki-paattyy-lokakuussa-miksi-deadline-koskettaa-jokaista-yritysta/?utm_source=meta&#038;utm_medium=social&#038;utm_campaign=030725</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2025/08/02/cyber-security-august-2025/comment-page-5/#comment-1861364</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 02 Sep 2025 18:20:49 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=198064#comment-1861364</guid>
		<description><![CDATA[Cloudflare blocks largest recorded DDoS attack peaking at 11.5 Tbps
https://www.bleepingcomputer.com/news/security/cloudflare-blocks-record-breaking-115-tbps-ddos-attack/?fbclid=IwdGRjcAMkDChleHRuA2FlbQIxMQABHubu1AT74LPycuQ9zKsaQ9Sh65JIdz9UT5BgcYSenj8DX--yg5GaifoGmqBU_aem_7LMDl2yk4tNB0k3SD87CEQ

Internet infrastructure company Cloudflare said it recently blocked the largest recorded volumetric distributed denial-of-service (DDoS) attack, which peaked at 11.5 terabits per second (Tbps).

In volumetric DDoS attacks, attackers overwhelm the target with massive amounts of data, consuming the bandwidth or exhausting system resources, leaving legitimate users with no access to the targeted servers and services.

&quot;Cloudflare&#039;s defenses have been working overtime. Over the past few weeks, we&#039;ve autonomously blocked hundreds of hyper-volumetric DDoS attacks, with the largest reaching peaks of 5.1 Bpps and 11.5 Tbps,&quot; the company said in a Tuesday tweet.]]></description>
		<content:encoded><![CDATA[<p>Cloudflare blocks largest recorded DDoS attack peaking at 11.5 Tbps<br />
<a href="https://www.bleepingcomputer.com/news/security/cloudflare-blocks-record-breaking-115-tbps-ddos-attack/?fbclid=IwdGRjcAMkDChleHRuA2FlbQIxMQABHubu1AT74LPycuQ9zKsaQ9Sh65JIdz9UT5BgcYSenj8DX--yg5GaifoGmqBU_aem_7LMDl2yk4tNB0k3SD87CEQ" rel="nofollow">https://www.bleepingcomputer.com/news/security/cloudflare-blocks-record-breaking-115-tbps-ddos-attack/?fbclid=IwdGRjcAMkDChleHRuA2FlbQIxMQABHubu1AT74LPycuQ9zKsaQ9Sh65JIdz9UT5BgcYSenj8DX&#8211;yg5GaifoGmqBU_aem_7LMDl2yk4tNB0k3SD87CEQ</a></p>
<p>Internet infrastructure company Cloudflare said it recently blocked the largest recorded volumetric distributed denial-of-service (DDoS) attack, which peaked at 11.5 terabits per second (Tbps).</p>
<p>In volumetric DDoS attacks, attackers overwhelm the target with massive amounts of data, consuming the bandwidth or exhausting system resources, leaving legitimate users with no access to the targeted servers and services.</p>
<p>&#8220;Cloudflare&#8217;s defenses have been working overtime. Over the past few weeks, we&#8217;ve autonomously blocked hundreds of hyper-volumetric DDoS attacks, with the largest reaching peaks of 5.1 Bpps and 11.5 Tbps,&#8221; the company said in a Tuesday tweet.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2025/08/02/cyber-security-august-2025/comment-page-5/#comment-1861363</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 02 Sep 2025 17:27:21 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=198064#comment-1861363</guid>
		<description><![CDATA[https://aardwolfsecurity.com/cloudflare-crush-a-record-breaking-ddos-attack/

&quot;Cloud Platform Exploitation Highlights Infrastructure Risks&quot;. I kinda figured everybody was on this ship already. In fact it&#039;s the perfect platform from which to launch. Of course, if things worked like they should then the owners of these cloud accounts would be notified that they have nasties.
Imagine what a PITA it would be to have to compromise hundreds of cloud accounts just to blow it all on one DDOS attack!


TLDR: Cloudflare successfully defended against a record-breaking 11.5 terabits per second DDoS attack that lasted just 35 seconds. The massive UDP flood originated primarily from compromised resources on Google Cloud Platform and set a new industry high for network bandwidth consumed by malicious traffic.]]></description>
		<content:encoded><![CDATA[<p><a href="https://aardwolfsecurity.com/cloudflare-crush-a-record-breaking-ddos-attack/" rel="nofollow">https://aardwolfsecurity.com/cloudflare-crush-a-record-breaking-ddos-attack/</a></p>
<p>&#8220;Cloud Platform Exploitation Highlights Infrastructure Risks&#8221;. I kinda figured everybody was on this ship already. In fact it&#8217;s the perfect platform from which to launch. Of course, if things worked like they should then the owners of these cloud accounts would be notified that they have nasties.<br />
Imagine what a PITA it would be to have to compromise hundreds of cloud accounts just to blow it all on one DDOS attack!</p>
<p>TLDR: Cloudflare successfully defended against a record-breaking 11.5 terabits per second DDoS attack that lasted just 35 seconds. The massive UDP flood originated primarily from compromised resources on Google Cloud Platform and set a new industry high for network bandwidth consumed by malicious traffic.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2025/08/02/cyber-security-august-2025/comment-page-5/#comment-1861334</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 01 Sep 2025 17:41:19 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=198064#comment-1861334</guid>
		<description><![CDATA[It&#039;s no longer a hypothetical: Anthropic has discovered a hacker using its AI chatbot to plan and execute a large-scale data extortion campaign that targeted 17 organizations last month.

Read more at PCMag 
bit.ly/462n0FQ

Anthropic Warns of Hacker Weaponizing Claude AI Like Never Before
The hacker &#039;used AI to what we believe is an unprecedented degree&#039; by harnessing Claude to automate large parts of the data extortion campaign, Anthropic says.
https://uk.pcmag.com/ai/159759/anthropic-warns-of-hacker-weaponizing-claude-ai-like-never-before?fbclid=IwVERDUAMisXtleHRuA2FlbQIxMAABHrA56_3ddpHCBl-kKcw_WeQdPb58aws_XmAsoPqfhZi1DlyAzevrVdjAYY0w_aem_wx9RunK7D61DM9FH8g85vw]]></description>
		<content:encoded><![CDATA[<p>It&#8217;s no longer a hypothetical: Anthropic has discovered a hacker using its AI chatbot to plan and execute a large-scale data extortion campaign that targeted 17 organizations last month.</p>
<p>Read more at PCMag<br />
bit.ly/462n0FQ</p>
<p>Anthropic Warns of Hacker Weaponizing Claude AI Like Never Before<br />
The hacker &#8216;used AI to what we believe is an unprecedented degree&#8217; by harnessing Claude to automate large parts of the data extortion campaign, Anthropic says.<br />
<a href="https://uk.pcmag.com/ai/159759/anthropic-warns-of-hacker-weaponizing-claude-ai-like-never-before?fbclid=IwVERDUAMisXtleHRuA2FlbQIxMAABHrA56_3ddpHCBl-kKcw_WeQdPb58aws_XmAsoPqfhZi1DlyAzevrVdjAYY0w_aem_wx9RunK7D61DM9FH8g85vw" rel="nofollow">https://uk.pcmag.com/ai/159759/anthropic-warns-of-hacker-weaponizing-claude-ai-like-never-before?fbclid=IwVERDUAMisXtleHRuA2FlbQIxMAABHrA56_3ddpHCBl-kKcw_WeQdPb58aws_XmAsoPqfhZi1DlyAzevrVdjAYY0w_aem_wx9RunK7D61DM9FH8g85vw</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2025/08/02/cyber-security-august-2025/comment-page-5/#comment-1861318</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 01 Sep 2025 11:30:25 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=198064#comment-1861318</guid>
		<description><![CDATA[Lue tiivistelmä
Googlen Discover-palvelu suosittelee suomalaisille epäilyttäviä sivustoja, jotka johtavat huijauksiin.

Tiedonhaku.fi-sivusto sisältää huonoa suomen kieltä ja linkkejä sijoitushuijaussivustoille.

Google sanoo tutkineensa sivuja, mutta ei ole löytänyt palveluissaan näytettäviä mainoksia.

Kyberturvallisuuskeskuksen asiantuntija neuvoo jättämään kyseenalaiset suositukset huomiotta.


Älä mene tälle sivustolle, jota Google sinulle suosittelee – vakava vaara
https://www.is.fi/digitoday/tietoturva/art-2000011446382.html]]></description>
		<content:encoded><![CDATA[<p>Lue tiivistelmä<br />
Googlen Discover-palvelu suosittelee suomalaisille epäilyttäviä sivustoja, jotka johtavat huijauksiin.</p>
<p>Tiedonhaku.fi-sivusto sisältää huonoa suomen kieltä ja linkkejä sijoitushuijaussivustoille.</p>
<p>Google sanoo tutkineensa sivuja, mutta ei ole löytänyt palveluissaan näytettäviä mainoksia.</p>
<p>Kyberturvallisuuskeskuksen asiantuntija neuvoo jättämään kyseenalaiset suositukset huomiotta.</p>
<p>Älä mene tälle sivustolle, jota Google sinulle suosittelee – vakava vaara<br />
<a href="https://www.is.fi/digitoday/tietoturva/art-2000011446382.html" rel="nofollow">https://www.is.fi/digitoday/tietoturva/art-2000011446382.html</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2025/08/02/cyber-security-august-2025/comment-page-5/#comment-1861301</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 01 Sep 2025 07:42:59 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=198064#comment-1861301</guid>
		<description><![CDATA[Uncategorized
In Other News: Iranian Ships Hacked, Verified Android Developers, AI Used in Attacks

Noteworthy stories that might have slipped under the radar: communications of dozens of Iranian ships disrupted, only apps from verified developers will run on Android devices, and AI used across multiple phases of malicious attacks.

https://www.securityweek.com/in-other-news-iranian-ships-hacked-verified-android-developers-ai-used-in-attacks/]]></description>
		<content:encoded><![CDATA[<p>Uncategorized<br />
In Other News: Iranian Ships Hacked, Verified Android Developers, AI Used in Attacks</p>
<p>Noteworthy stories that might have slipped under the radar: communications of dozens of Iranian ships disrupted, only apps from verified developers will run on Android devices, and AI used across multiple phases of malicious attacks.</p>
<p><a href="https://www.securityweek.com/in-other-news-iranian-ships-hacked-verified-android-developers-ai-used-in-attacks/" rel="nofollow">https://www.securityweek.com/in-other-news-iranian-ships-hacked-verified-android-developers-ai-used-in-attacks/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2025/08/02/cyber-security-august-2025/comment-page-5/#comment-1861300</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 01 Sep 2025 07:42:37 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=198064#comment-1861300</guid>
		<description><![CDATA[Uncategorized
Google Confirms Workspace Accounts Also Hit in Salesforce–Salesloft Drift Data Theft Campaign

Google says the same OAuth token compromise that enabled Salesforce data theft also let hackers access a small number of Workspace accounts via the Salesloft Drift integration.

https://www.securityweek.com/google-confirms-workspace-accounts-also-hit-in-salesforce-salesloft-drift-data-theft-campaign/]]></description>
		<content:encoded><![CDATA[<p>Uncategorized<br />
Google Confirms Workspace Accounts Also Hit in Salesforce–Salesloft Drift Data Theft Campaign</p>
<p>Google says the same OAuth token compromise that enabled Salesforce data theft also let hackers access a small number of Workspace accounts via the Salesloft Drift integration.</p>
<p><a href="https://www.securityweek.com/google-confirms-workspace-accounts-also-hit-in-salesforce-salesloft-drift-data-theft-campaign/" rel="nofollow">https://www.securityweek.com/google-confirms-workspace-accounts-also-hit-in-salesforce-salesloft-drift-data-theft-campaign/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2025/08/02/cyber-security-august-2025/comment-page-5/#comment-1861299</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 01 Sep 2025 07:42:22 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=198064#comment-1861299</guid>
		<description><![CDATA[Cybercrime
VerifTools Fake ID Operation Dismantled by Law Enforcement

Authorities say VerifTools sold fake driver’s licenses and passports worldwide, enabling fraudsters to bypass KYC checks and access online accounts.

https://www.securityweek.com/veriftools-fake-id-operation-dismantled-by-law-enforcement/]]></description>
		<content:encoded><![CDATA[<p>Cybercrime<br />
VerifTools Fake ID Operation Dismantled by Law Enforcement</p>
<p>Authorities say VerifTools sold fake driver’s licenses and passports worldwide, enabling fraudsters to bypass KYC checks and access online accounts.</p>
<p><a href="https://www.securityweek.com/veriftools-fake-id-operation-dismantled-by-law-enforcement/" rel="nofollow">https://www.securityweek.com/veriftools-fake-id-operation-dismantled-by-law-enforcement/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2025/08/02/cyber-security-august-2025/comment-page-5/#comment-1861298</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 01 Sep 2025 07:42:02 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=198064#comment-1861298</guid>
		<description><![CDATA[Artificial Intelligence
PromptLock: First AI-Powered Ransomware Emerges

Proof-of-concept ransomware uses AI models to generate attack scripts in real time.

https://www.securityweek.com/promptlock-first-ai-powered-ransomware-emerges/]]></description>
		<content:encoded><![CDATA[<p>Artificial Intelligence<br />
PromptLock: First AI-Powered Ransomware Emerges</p>
<p>Proof-of-concept ransomware uses AI models to generate attack scripts in real time.</p>
<p><a href="https://www.securityweek.com/promptlock-first-ai-powered-ransomware-emerges/" rel="nofollow">https://www.securityweek.com/promptlock-first-ai-powered-ransomware-emerges/</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
