<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security news December 2025</title>
	<atom:link href="http://www.epanorama.net/blog/2025/12/02/cyber-security-news-december-2025/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2025/12/02/cyber-security-news-december-2025/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Thu, 16 Apr 2026 09:52:49 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2025/12/02/cyber-security-news-december-2025/comment-page-3/#comment-1868091</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 02 Jan 2026 22:14:08 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=198588#comment-1868091</guid>
		<description><![CDATA[https://www.uusiteknologia.fi/2025/12/29/aanesi-paljastaa-enemman-kuin-uskotkaan/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.uusiteknologia.fi/2025/12/29/aanesi-paljastaa-enemman-kuin-uskotkaan/" rel="nofollow">https://www.uusiteknologia.fi/2025/12/29/aanesi-paljastaa-enemman-kuin-uskotkaan/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2025/12/02/cyber-security-news-december-2025/comment-page-3/#comment-1868042</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Jan 2026 19:58:58 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=198588#comment-1868042</guid>
		<description><![CDATA[Hackers Claim Breach of WIRED Database Containing 2.3 million Subscriber Records
https://cybersecuritynews.com/wired-database-breach/#google_vignette]]></description>
		<content:encoded><![CDATA[<p>Hackers Claim Breach of WIRED Database Containing 2.3 million Subscriber Records<br />
<a href="https://cybersecuritynews.com/wired-database-breach/#google_vignette" rel="nofollow">https://cybersecuritynews.com/wired-database-breach/#google_vignette</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2025/12/02/cyber-security-news-december-2025/comment-page-3/#comment-1868022</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Jan 2026 19:24:01 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=198588#comment-1868022</guid>
		<description><![CDATA[&quot;Post-quantum encryption is not the end&quot; – NordVPN aims for world-first security milestones in 2026
Features
By Chiara Castro published December 28, 2025
NordVPN strives for cryptographic agility

https://www.techradar.com/vpn/vpn-privacy-security/post-quantum-encryption-is-not-the-end-nordvpn-aims-for-world-first-security-milestones-in-2026]]></description>
		<content:encoded><![CDATA[<p>&#8220;Post-quantum encryption is not the end&#8221; – NordVPN aims for world-first security milestones in 2026<br />
Features<br />
By Chiara Castro published December 28, 2025<br />
NordVPN strives for cryptographic agility</p>
<p><a href="https://www.techradar.com/vpn/vpn-privacy-security/post-quantum-encryption-is-not-the-end-nordvpn-aims-for-world-first-security-milestones-in-2026" rel="nofollow">https://www.techradar.com/vpn/vpn-privacy-security/post-quantum-encryption-is-not-the-end-nordvpn-aims-for-world-first-security-milestones-in-2026</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2025/12/02/cyber-security-news-december-2025/comment-page-3/#comment-1867989</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Jan 2026 16:45:54 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=198588#comment-1867989</guid>
		<description><![CDATA[Microsoft will finally kill obsolete cipher that has wreaked decades of havoc
The weak RC4 for administrative authentication has been a hacker holy grail for decades.
https://arstechnica.com/security/2025/12/microsoft-will-finally-kill-obsolete-cipher-that-has-wreaked-decades-of-havoc/]]></description>
		<content:encoded><![CDATA[<p>Microsoft will finally kill obsolete cipher that has wreaked decades of havoc<br />
The weak RC4 for administrative authentication has been a hacker holy grail for decades.<br />
<a href="https://arstechnica.com/security/2025/12/microsoft-will-finally-kill-obsolete-cipher-that-has-wreaked-decades-of-havoc/" rel="nofollow">https://arstechnica.com/security/2025/12/microsoft-will-finally-kill-obsolete-cipher-that-has-wreaked-decades-of-havoc/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2025/12/02/cyber-security-news-december-2025/comment-page-3/#comment-1867988</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Jan 2026 16:45:16 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=198588#comment-1867988</guid>
		<description><![CDATA[Massiivinen tietovuoto: ”Koskee toden­näköisesti jopa satoja­tuhansia suomalaisia”
Vahinko on valtava, mutta sen seurauksia on vaikea arvioida, Cybernews kertoo.
https://www.is.fi/digitoday/tietoturva/art-2000011692754.html

Internetistä paljastui erittäin iso kokoelma tietoja, joissa on mukana myös runsaasti LinkedInistä kerättyjä käyttäjätietoja. Kokoelman löytänyt Cybernews laskee tietojen vievän tilaa yli 16 teratavua, mikä vastaa yli 16 000 gigatavua. Vertailun vuoksi tyypillisen tietokoneen tallennustila on noin 512–1024 gigatavua.

Tietojen joukossa on 4,3 miljardia tietuetta ja 732 miljoonaa ainutkertaista käyttäjäprofiilia. Näiden ilmeisesti suurelta osin LinkedInistä peräisin olevien tietojen joukossa on esimerkiksi:

Koko nimet.

Sähköpostit ja puhelinnumerot.

LinkedIn-verkko-osoitteet ja profiilien nimet.

Asemat organisaatiossa, työnantajat ja aiemmat työpaikat.

Koulutus, tutkinnot ja sertifikaatit.

Sijaintitiedot.

Kielitaidot ja muu osaaminen.

Sosiaalisen median tilit.

– Kaikkiaan käyttäjiä LinkedIn-palvelussa on noin 1,2 miljardia, joten tämä koskee todennäköisesti jopa satojatuhansia suomalaisia]]></description>
		<content:encoded><![CDATA[<p>Massiivinen tietovuoto: ”Koskee toden­näköisesti jopa satoja­tuhansia suomalaisia”<br />
Vahinko on valtava, mutta sen seurauksia on vaikea arvioida, Cybernews kertoo.<br />
<a href="https://www.is.fi/digitoday/tietoturva/art-2000011692754.html" rel="nofollow">https://www.is.fi/digitoday/tietoturva/art-2000011692754.html</a></p>
<p>Internetistä paljastui erittäin iso kokoelma tietoja, joissa on mukana myös runsaasti LinkedInistä kerättyjä käyttäjätietoja. Kokoelman löytänyt Cybernews laskee tietojen vievän tilaa yli 16 teratavua, mikä vastaa yli 16 000 gigatavua. Vertailun vuoksi tyypillisen tietokoneen tallennustila on noin 512–1024 gigatavua.</p>
<p>Tietojen joukossa on 4,3 miljardia tietuetta ja 732 miljoonaa ainutkertaista käyttäjäprofiilia. Näiden ilmeisesti suurelta osin LinkedInistä peräisin olevien tietojen joukossa on esimerkiksi:</p>
<p>Koko nimet.</p>
<p>Sähköpostit ja puhelinnumerot.</p>
<p>LinkedIn-verkko-osoitteet ja profiilien nimet.</p>
<p>Asemat organisaatiossa, työnantajat ja aiemmat työpaikat.</p>
<p>Koulutus, tutkinnot ja sertifikaatit.</p>
<p>Sijaintitiedot.</p>
<p>Kielitaidot ja muu osaaminen.</p>
<p>Sosiaalisen median tilit.</p>
<p>– Kaikkiaan käyttäjiä LinkedIn-palvelussa on noin 1,2 miljardia, joten tämä koskee todennäköisesti jopa satojatuhansia suomalaisia</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2025/12/02/cyber-security-news-december-2025/comment-page-3/#comment-1867985</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Jan 2026 16:43:00 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=198588#comment-1867985</guid>
		<description><![CDATA[Denmark says Russia was behind two ‘destructive and disruptive’ cyber-attacks
Intelligence service says attacks were work of groups connected to Russian state in ‘clear evidence’ of hybrid war
https://www.theguardian.com/world/2025/dec/18/denmark-says-russia-was-behind-two-destructive-and-disruptive-cyber-attacks]]></description>
		<content:encoded><![CDATA[<p>Denmark says Russia was behind two ‘destructive and disruptive’ cyber-attacks<br />
Intelligence service says attacks were work of groups connected to Russian state in ‘clear evidence’ of hybrid war<br />
<a href="https://www.theguardian.com/world/2025/dec/18/denmark-says-russia-was-behind-two-destructive-and-disruptive-cyber-attacks" rel="nofollow">https://www.theguardian.com/world/2025/dec/18/denmark-says-russia-was-behind-two-destructive-and-disruptive-cyber-attacks</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2025/12/02/cyber-security-news-december-2025/comment-page-3/#comment-1867983</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Jan 2026 16:41:55 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=198588#comment-1867983</guid>
		<description><![CDATA[https://www.bleepingcomputer.com/news/security/zeroday-cloud-hacking-event-awards-320-0000-for-11-zero-days/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.bleepingcomputer.com/news/security/zeroday-cloud-hacking-event-awards-320-0000-for-11-zero-days/" rel="nofollow">https://www.bleepingcomputer.com/news/security/zeroday-cloud-hacking-event-awards-320-0000-for-11-zero-days/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2025/12/02/cyber-security-news-december-2025/comment-page-3/#comment-1867981</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Jan 2026 16:40:14 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=198588#comment-1867981</guid>
		<description><![CDATA[Let’s Encrypt Unveils New “Generation Y” Root and 45-Day Certificates
https://cybersecuritynews.com/lets-encrypt-unveils-new-generation-y-root/]]></description>
		<content:encoded><![CDATA[<p>Let’s Encrypt Unveils New “Generation Y” Root and 45-Day Certificates<br />
<a href="https://cybersecuritynews.com/lets-encrypt-unveils-new-generation-y-root/" rel="nofollow">https://cybersecuritynews.com/lets-encrypt-unveils-new-generation-y-root/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2025/12/02/cyber-security-news-december-2025/comment-page-3/#comment-1867979</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Jan 2026 16:39:24 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=198588#comment-1867979</guid>
		<description><![CDATA[In Cybersecurity, Claude Leaves Other LLMs in the Dust
Anthropic proves that LLMs can be fairly resistant to abuse. Most developers are either incapable of building safer tools, or unwilling to invest in doing so.
https://www.darkreading.com/cybersecurity-analytics/cybersecurity-claude-llms]]></description>
		<content:encoded><![CDATA[<p>In Cybersecurity, Claude Leaves Other LLMs in the Dust<br />
Anthropic proves that LLMs can be fairly resistant to abuse. Most developers are either incapable of building safer tools, or unwilling to invest in doing so.<br />
<a href="https://www.darkreading.com/cybersecurity-analytics/cybersecurity-claude-llms" rel="nofollow">https://www.darkreading.com/cybersecurity-analytics/cybersecurity-claude-llms</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2025/12/02/cyber-security-news-december-2025/comment-page-3/#comment-1867978</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Jan 2026 16:38:33 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=198588#comment-1867978</guid>
		<description><![CDATA[https://www.microsoft.com/en-us/security/blog/2025/12/15/defending-against-the-cve-2025-55182-react2shell-vulnerability-in-react-server-components/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.microsoft.com/en-us/security/blog/2025/12/15/defending-against-the-cve-2025-55182-react2shell-vulnerability-in-react-server-components/" rel="nofollow">https://www.microsoft.com/en-us/security/blog/2025/12/15/defending-against-the-cve-2025-55182-react2shell-vulnerability-in-react-server-components/</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
