<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security news November 2025</title>
	<atom:link href="http://www.epanorama.net/blog/2025/11/05/cyber-security-news-november-2025/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2025/11/05/cyber-security-news-november-2025/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Sat, 04 Apr 2026 09:03:13 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2025/11/05/cyber-security-news-november-2025/comment-page-2/#comment-1866326</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 02 Dec 2025 21:16:00 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=198523#comment-1866326</guid>
		<description><![CDATA[Luuletko, että uusin Wi-Fi-salaus on turvallinen? 
https://etn.fi/index.php/13-news/18221-luuletko-ettae-uusin-wi-fi-salaus-on-turvallinen

Langattomien lähiverkkojen uusin salausstandardi WPA3 esiteltiin aikoinaan korjauksena kaikkiin niihin puutteisiin, jotka tekivät WPA2-suojaustavasta altin hyökkäyksille. Uuden standardin piti estää salasanojen murtaminen offline-tilassa, torjua valelaitteiden luominen ja suojata langattoman verkon ohjausliikenne, jota hyökkääjät ovat vuosia käyttäneet laitteiden pakottamiseen irti verkosta. Sveitsiläis-saksalaisen yliopiston (SGU) tuore katsaus kuitenkin muistuttaa, että todellisuus on mutkikkaampi. WPA3 on kaukana haavoittumattomasta.

Suurimmat ongelmat liittyvät WPA3:n keskeisiin turvamekanismeihin. Niistä merkittävin on Simultaneous Authentication of Equals eli SAE-kättely, jonka tarkoitus on estää salasanan löytämistä arvioimalla verkon vastauksia ulkopuolella. Tutkijat löysivät kuitenkin jo 2019 Dragonblood-nimisen haavoittuvuuden, jonka avulla kättelyä voi yhä käyttää vihjeiden keräämiseen salasanasta. Ajoituksen analysointi riittää antamaan hyökkääjälle mahdollisuuden murtaa salasana offline-hyökkäyksellä – juuri sellainen, jonka WPA3 lupasi estää.

Myös WPA3:n toinen kulmakivi, Management Frame Protection, osoittautuu käytännössä puutteelliseksi. Standardin tulkinnanvaraiset säännöt tarkoittavat, että osa laitteista hyväksyy edelleen suojaamattomia ohjausviestejä. Lisäksi niin sanotut beacon-kehykset, jotka kertovat verkon asetuksista, ovat kokonaan suojaamatta.]]></description>
		<content:encoded><![CDATA[<p>Luuletko, että uusin Wi-Fi-salaus on turvallinen?<br />
<a href="https://etn.fi/index.php/13-news/18221-luuletko-ettae-uusin-wi-fi-salaus-on-turvallinen" rel="nofollow">https://etn.fi/index.php/13-news/18221-luuletko-ettae-uusin-wi-fi-salaus-on-turvallinen</a></p>
<p>Langattomien lähiverkkojen uusin salausstandardi WPA3 esiteltiin aikoinaan korjauksena kaikkiin niihin puutteisiin, jotka tekivät WPA2-suojaustavasta altin hyökkäyksille. Uuden standardin piti estää salasanojen murtaminen offline-tilassa, torjua valelaitteiden luominen ja suojata langattoman verkon ohjausliikenne, jota hyökkääjät ovat vuosia käyttäneet laitteiden pakottamiseen irti verkosta. Sveitsiläis-saksalaisen yliopiston (SGU) tuore katsaus kuitenkin muistuttaa, että todellisuus on mutkikkaampi. WPA3 on kaukana haavoittumattomasta.</p>
<p>Suurimmat ongelmat liittyvät WPA3:n keskeisiin turvamekanismeihin. Niistä merkittävin on Simultaneous Authentication of Equals eli SAE-kättely, jonka tarkoitus on estää salasanan löytämistä arvioimalla verkon vastauksia ulkopuolella. Tutkijat löysivät kuitenkin jo 2019 Dragonblood-nimisen haavoittuvuuden, jonka avulla kättelyä voi yhä käyttää vihjeiden keräämiseen salasanasta. Ajoituksen analysointi riittää antamaan hyökkääjälle mahdollisuuden murtaa salasana offline-hyökkäyksellä – juuri sellainen, jonka WPA3 lupasi estää.</p>
<p>Myös WPA3:n toinen kulmakivi, Management Frame Protection, osoittautuu käytännössä puutteelliseksi. Standardin tulkinnanvaraiset säännöt tarkoittavat, että osa laitteista hyväksyy edelleen suojaamattomia ohjausviestejä. Lisäksi niin sanotut beacon-kehykset, jotka kertovat verkon asetuksista, ovat kokonaan suojaamatta.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2025/11/05/cyber-security-news-november-2025/comment-page-2/#comment-1866080</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 27 Nov 2025 12:34:57 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=198523#comment-1866080</guid>
		<description><![CDATA[https://www.darkreading.com/threat-intelligence/iran-exploits-cyber-domain-kinetic-strikes]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.darkreading.com/threat-intelligence/iran-exploits-cyber-domain-kinetic-strikes" rel="nofollow">https://www.darkreading.com/threat-intelligence/iran-exploits-cyber-domain-kinetic-strikes</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2025/11/05/cyber-security-news-november-2025/comment-page-2/#comment-1866079</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 27 Nov 2025 12:33:57 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=198523#comment-1866079</guid>
		<description><![CDATA[Weaponized file name flaw makes updating glob an urgent job
PLUS: CISA issues drone warning; China-linked DNS-hijacking malware; Prison for BTC Samourai; And more
https://www.theregister.com/2025/11/23/infosec_news_in_brief/

Infosec In Brief Researchers have urged users of the glob file pattern matching library to update their installations, after discovery of a years-old remote code execution flaw in the tool&#039;s CLI.

Glob is used to find files using wildcards, is typically run as a library API, and is an all but universal part of the JavaScript stack. This vulnerability lives in glob&#039;s CLI tool – specifically the tool’s –c flag used to execute commands on matching files.

Spotted by security researchers at automated infosec outfit AISLE, the project&#039;s GitHub page describes the 7.5-rated vuln (CVE-2025-64756) as follows.]]></description>
		<content:encoded><![CDATA[<p>Weaponized file name flaw makes updating glob an urgent job<br />
PLUS: CISA issues drone warning; China-linked DNS-hijacking malware; Prison for BTC Samourai; And more<br />
<a href="https://www.theregister.com/2025/11/23/infosec_news_in_brief/" rel="nofollow">https://www.theregister.com/2025/11/23/infosec_news_in_brief/</a></p>
<p>Infosec In Brief Researchers have urged users of the glob file pattern matching library to update their installations, after discovery of a years-old remote code execution flaw in the tool&#8217;s CLI.</p>
<p>Glob is used to find files using wildcards, is typically run as a library API, and is an all but universal part of the JavaScript stack. This vulnerability lives in glob&#8217;s CLI tool – specifically the tool’s –c flag used to execute commands on matching files.</p>
<p>Spotted by security researchers at automated infosec outfit AISLE, the project&#8217;s GitHub page describes the 7.5-rated vuln (CVE-2025-64756) as follows.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2025/11/05/cyber-security-news-november-2025/comment-page-2/#comment-1866078</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 27 Nov 2025 12:32:55 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=198523#comment-1866078</guid>
		<description><![CDATA[Cryptology firm cancels elections after losing encryption key
https://www.bbc.com/news/articles/c62vl05rz0ko

A firm considered one of the leading global voices in encryption has cancelled the announcement of its leadership election results after an official lost the encrypted key needed to unlock them.

The International Association for Cryptologic Research (IACR) uses an electronic voting system which needs three members, each with part of an encrypted key, to access the results.

In a statement, the scientific organisation said one of the trustees had lost their key in &quot;an honest but unfortunate human mistake&quot;, making it impossible for them to decrypt - and uncover - the final results.

The IACR said it would rerun the election, adding &quot;new safeguards&quot; to stop similar mistakes happening again.

The Association used an open source electronic voting system called Helios for the process.

The browser-based system uses cryptography to encrypt votes

Three members of the association were chosen as independent trustees to each be given a third of the encrypted material, which when shared together would give the verdict.

Whilst two of the trustees uploaded their share of the encrypted material online, a third never did.

&#039;Irretrievably&#039; lost
The IACR said in a statement that the lack of results was due to one of the trustees &quot;irretrievably&quot; losing their private key, leaving it &quot;technically impossible&quot; for the firm to know the final verdict.

American cryptographer Bruce Schneier told the BBC that failures in cryptographic systems often lie in the fact that &quot;to provide any actual security&quot; they have to be &quot;operated by humans&quot;.

&quot;Whether it&#039;s forgetting keys, improperly sharing keys, or making some other mistake,&quot; he said, &quot;cryptographic systems often fail for very human reasons&quot;.

Voting for the IACR positions has been renewed and will run until 20 December.

https://vote.heliosvoting.org/]]></description>
		<content:encoded><![CDATA[<p>Cryptology firm cancels elections after losing encryption key<br />
<a href="https://www.bbc.com/news/articles/c62vl05rz0ko" rel="nofollow">https://www.bbc.com/news/articles/c62vl05rz0ko</a></p>
<p>A firm considered one of the leading global voices in encryption has cancelled the announcement of its leadership election results after an official lost the encrypted key needed to unlock them.</p>
<p>The International Association for Cryptologic Research (IACR) uses an electronic voting system which needs three members, each with part of an encrypted key, to access the results.</p>
<p>In a statement, the scientific organisation said one of the trustees had lost their key in &#8220;an honest but unfortunate human mistake&#8221;, making it impossible for them to decrypt &#8211; and uncover &#8211; the final results.</p>
<p>The IACR said it would rerun the election, adding &#8220;new safeguards&#8221; to stop similar mistakes happening again.</p>
<p>The Association used an open source electronic voting system called Helios for the process.</p>
<p>The browser-based system uses cryptography to encrypt votes</p>
<p>Three members of the association were chosen as independent trustees to each be given a third of the encrypted material, which when shared together would give the verdict.</p>
<p>Whilst two of the trustees uploaded their share of the encrypted material online, a third never did.</p>
<p>&#8216;Irretrievably&#8217; lost<br />
The IACR said in a statement that the lack of results was due to one of the trustees &#8220;irretrievably&#8221; losing their private key, leaving it &#8220;technically impossible&#8221; for the firm to know the final verdict.</p>
<p>American cryptographer Bruce Schneier told the BBC that failures in cryptographic systems often lie in the fact that &#8220;to provide any actual security&#8221; they have to be &#8220;operated by humans&#8221;.</p>
<p>&#8220;Whether it&#8217;s forgetting keys, improperly sharing keys, or making some other mistake,&#8221; he said, &#8220;cryptographic systems often fail for very human reasons&#8221;.</p>
<p>Voting for the IACR positions has been renewed and will run until 20 December.</p>
<p><a href="https://vote.heliosvoting.org/" rel="nofollow">https://vote.heliosvoting.org/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2025/11/05/cyber-security-news-november-2025/comment-page-2/#comment-1866025</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 26 Nov 2025 21:14:29 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=198523#comment-1866025</guid>
		<description><![CDATA[https://www.bleepingcomputer.com/news/security/hacker-claims-to-steal-23tb-data-from-italian-rail-group-almaviva/#amp_tf=L%C3%A4hde%3A%20%251%24s&amp;aoh=17637176564910&amp;referrer=https%3A%2F%2Fwww.google.com&amp;ampshare=https%3A%2F%2Fwww.bleepingcomputer.com%2Fnews%2Fsecurity%2Fhacker-claims-to-steal-23tb-data-from-italian-rail-group-almaviva%2F]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.bleepingcomputer.com/news/security/hacker-claims-to-steal-23tb-data-from-italian-rail-group-almaviva/#amp_tf=L%C3%A4hde%3A%20%251%24s&#038;aoh=17637176564910&#038;referrer=https%3A%2F%2Fwww.google.com&#038;ampshare=https%3A%2F%2Fwww.bleepingcomputer.com%2Fnews%2Fsecurity%2Fhacker-claims-to-steal-23tb-data-from-italian-rail-group-almaviva%2F" rel="nofollow">https://www.bleepingcomputer.com/news/security/hacker-claims-to-steal-23tb-data-from-italian-rail-group-almaviva/#amp_tf=L%C3%A4hde%3A%20%251%24s&#038;aoh=17637176564910&#038;referrer=https%3A%2F%2Fwww.google.com&#038;ampshare=https%3A%2F%2Fwww.bleepingcomputer.com%2Fnews%2Fsecurity%2Fhacker-claims-to-steal-23tb-data-from-italian-rail-group-almaviva%2F</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2025/11/05/cyber-security-news-november-2025/comment-page-2/#comment-1865995</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 26 Nov 2025 18:32:19 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=198523#comment-1865995</guid>
		<description><![CDATA[Hackers Replace ‘m’ with ‘rn’ in Microsoft(.)com to Steal Users’ Login Credentials
https://cybersecuritynews.com/microsoft-phishing-replace-m-with-rn/

A sophisticated phishing campaign is currently leveraging a subtle typographical trick to bypass user vigilance, deceiving victims into handing over sensitive login credentials. Attackers utilize the domain “rnicrosoft.com” to impersonate the tech giant.

By replacing the letter ‘m’ with the combination of ‘r’ and ‘n’, fraudsters create a visual doppleganger that is nearly indistinguishable from the legitimate domain at a casual glance.]]></description>
		<content:encoded><![CDATA[<p>Hackers Replace ‘m’ with ‘rn’ in Microsoft(.)com to Steal Users’ Login Credentials<br />
<a href="https://cybersecuritynews.com/microsoft-phishing-replace-m-with-rn/" rel="nofollow">https://cybersecuritynews.com/microsoft-phishing-replace-m-with-rn/</a></p>
<p>A sophisticated phishing campaign is currently leveraging a subtle typographical trick to bypass user vigilance, deceiving victims into handing over sensitive login credentials. Attackers utilize the domain “rnicrosoft.com” to impersonate the tech giant.</p>
<p>By replacing the letter ‘m’ with the combination of ‘r’ and ‘n’, fraudsters create a visual doppleganger that is nearly indistinguishable from the legitimate domain at a casual glance.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2025/11/05/cyber-security-news-november-2025/comment-page-2/#comment-1865940</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 26 Nov 2025 11:34:45 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=198523#comment-1865940</guid>
		<description><![CDATA[https://etn.fi/index.php/13-news/18216-finen-ratkaisu-paljasti-oudon-riskin-androidin-piilotettu-asetus-auttoi-pankkihuijareita]]></description>
		<content:encoded><![CDATA[<p><a href="https://etn.fi/index.php/13-news/18216-finen-ratkaisu-paljasti-oudon-riskin-androidin-piilotettu-asetus-auttoi-pankkihuijareita" rel="nofollow">https://etn.fi/index.php/13-news/18216-finen-ratkaisu-paljasti-oudon-riskin-androidin-piilotettu-asetus-auttoi-pankkihuijareita</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2025/11/05/cyber-security-news-november-2025/comment-page-2/#comment-1865935</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 26 Nov 2025 11:20:21 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=198523#comment-1865935</guid>
		<description><![CDATA[https://fortune.com/brandstudio/varonis/the-new-rules-for-data-security]]></description>
		<content:encoded><![CDATA[<p><a href="https://fortune.com/brandstudio/varonis/the-new-rules-for-data-security" rel="nofollow">https://fortune.com/brandstudio/varonis/the-new-rules-for-data-security</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2025/11/05/cyber-security-news-november-2025/comment-page-2/#comment-1865934</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 26 Nov 2025 11:19:08 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=198523#comment-1865934</guid>
		<description><![CDATA[https://www.namecheap.com/blog/could-cloudflares-bot-blocker-impact-your-brands-discoverability/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.namecheap.com/blog/could-cloudflares-bot-blocker-impact-your-brands-discoverability/" rel="nofollow">https://www.namecheap.com/blog/could-cloudflares-bot-blocker-impact-your-brands-discoverability/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2025/11/05/cyber-security-news-november-2025/comment-page-2/#comment-1865933</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 26 Nov 2025 11:18:41 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=198523#comment-1865933</guid>
		<description><![CDATA[From locked data to live insights: how the EU Data Act transforms industrial analytics
The EU Data Act changes how industrial IoT data can be accessed and used. Read our article on what this means for your business.
https://nortal.com/insights/from-locked-data-to-live-insights-how-the-eu-data-act-transforms-industrial-analytics]]></description>
		<content:encoded><![CDATA[<p>From locked data to live insights: how the EU Data Act transforms industrial analytics<br />
The EU Data Act changes how industrial IoT data can be accessed and used. Read our article on what this means for your business.<br />
<a href="https://nortal.com/insights/from-locked-data-to-live-insights-how-the-eu-data-act-transforms-industrial-analytics" rel="nofollow">https://nortal.com/insights/from-locked-data-to-live-insights-how-the-eu-data-act-transforms-industrial-analytics</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
