<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security news April 2026</title>
	<atom:link href="http://www.epanorama.net/blog/2026/04/02/cyber-security-news-april-2026/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2026/04/02/cyber-security-news-april-2026/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Sat, 25 Apr 2026 22:35:35 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2026/04/02/cyber-security-news-april-2026/comment-page-2/#comment-1876643</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 25 Apr 2026 22:25:53 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=199485#comment-1876643</guid>
		<description><![CDATA[APT41 Delivers &#039;Zero-Detection&#039; Backdoor to Harvest Cloud Credentials
The prolific China-backed threat group is targeting AWS, Google, Azure, and Alibaba cloud environments and using typosquatting to obscure C2 communication.
https://www.darkreading.com/cloud-security/apt41-zero-detection-backdoor-harvest-cloud-credentials]]></description>
		<content:encoded><![CDATA[<p>APT41 Delivers &#8216;Zero-Detection&#8217; Backdoor to Harvest Cloud Credentials<br />
The prolific China-backed threat group is targeting AWS, Google, Azure, and Alibaba cloud environments and using typosquatting to obscure C2 communication.<br />
<a href="https://www.darkreading.com/cloud-security/apt41-zero-detection-backdoor-harvest-cloud-credentials" rel="nofollow">https://www.darkreading.com/cloud-security/apt41-zero-detection-backdoor-harvest-cloud-credentials</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2026/04/02/cyber-security-news-april-2026/comment-page-2/#comment-1876625</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 25 Apr 2026 22:13:22 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=199485#comment-1876625</guid>
		<description><![CDATA[OT Lacks the Tools for Cryptographic Readiness
OT asset owners are being asked by regulators to attest to their post-quantum cryptographic readiness without the appropriate tooling, resulting in paperwork dressed up to look like genuine security.
https://www.darkreading.com/ics-ot-security/ot-lacks-tools-cryptographic-readiness]]></description>
		<content:encoded><![CDATA[<p>OT Lacks the Tools for Cryptographic Readiness<br />
OT asset owners are being asked by regulators to attest to their post-quantum cryptographic readiness without the appropriate tooling, resulting in paperwork dressed up to look like genuine security.<br />
<a href="https://www.darkreading.com/ics-ot-security/ot-lacks-tools-cryptographic-readiness" rel="nofollow">https://www.darkreading.com/ics-ot-security/ot-lacks-tools-cryptographic-readiness</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2026/04/02/cyber-security-news-april-2026/comment-page-2/#comment-1876618</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 25 Apr 2026 22:02:30 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=199485#comment-1876618</guid>
		<description><![CDATA[MITRE releases a shared fraud-cyber framework built from real attack data
Financial fraud losses in the United States reached $16.6 billion in 2024, up from $4.2 billion in 2020. Behind those numbers is a structural problem: the teams responsible for stopping fraud, fraud investigators and cybersecurity analysts, have historically operated separately, using different tools, different terminology, and different mental models of how attacks unfold.
https://www.helpnetsecurity.com/2026/04/13/mitre-fight-fraud-framework-f3/]]></description>
		<content:encoded><![CDATA[<p>MITRE releases a shared fraud-cyber framework built from real attack data<br />
Financial fraud losses in the United States reached $16.6 billion in 2024, up from $4.2 billion in 2020. Behind those numbers is a structural problem: the teams responsible for stopping fraud, fraud investigators and cybersecurity analysts, have historically operated separately, using different tools, different terminology, and different mental models of how attacks unfold.<br />
<a href="https://www.helpnetsecurity.com/2026/04/13/mitre-fight-fraud-framework-f3/" rel="nofollow">https://www.helpnetsecurity.com/2026/04/13/mitre-fight-fraud-framework-f3/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2026/04/02/cyber-security-news-april-2026/comment-page-2/#comment-1876606</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 25 Apr 2026 21:46:40 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=199485#comment-1876606</guid>
		<description><![CDATA[https://www.darkreading.com/threat-intelligence/nist-cutbacks-nvd-handling-impacts-cyber-teams]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.darkreading.com/threat-intelligence/nist-cutbacks-nvd-handling-impacts-cyber-teams" rel="nofollow">https://www.darkreading.com/threat-intelligence/nist-cutbacks-nvd-handling-impacts-cyber-teams</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2026/04/02/cyber-security-news-april-2026/comment-page-2/#comment-1876575</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 25 Apr 2026 20:58:47 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=199485#comment-1876575</guid>
		<description><![CDATA[https://cybersecuritynews.com/defender-0-day-redsun/]]></description>
		<content:encoded><![CDATA[<p><a href="https://cybersecuritynews.com/defender-0-day-redsun/" rel="nofollow">https://cybersecuritynews.com/defender-0-day-redsun/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2026/04/02/cyber-security-news-april-2026/comment-page-2/#comment-1876558</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 25 Apr 2026 20:14:18 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=199485#comment-1876558</guid>
		<description><![CDATA[https://www.tivi.fi/uutiset/a/6a646521-e454-4233-8a62-d65dff10d70f]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.tivi.fi/uutiset/a/6a646521-e454-4233-8a62-d65dff10d70f" rel="nofollow">https://www.tivi.fi/uutiset/a/6a646521-e454-4233-8a62-d65dff10d70f</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2026/04/02/cyber-security-news-april-2026/comment-page-2/#comment-1876535</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 25 Apr 2026 09:38:24 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=199485#comment-1876535</guid>
		<description><![CDATA[https://thehackernews.com/2026/04/china-linked-gopherwhisper-infects-12.html]]></description>
		<content:encoded><![CDATA[<p><a href="https://thehackernews.com/2026/04/china-linked-gopherwhisper-infects-12.html" rel="nofollow">https://thehackernews.com/2026/04/china-linked-gopherwhisper-infects-12.html</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2026/04/02/cyber-security-news-april-2026/comment-page-2/#comment-1876524</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 25 Apr 2026 06:21:41 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=199485#comment-1876524</guid>
		<description><![CDATA[Pankki varoittaa: Älä käytä tällaista laitetta asiointiin
https://www.is.fi/digitoday/tietoturva/art-2000011964888.html

Yksi suurimmista riskitekijöistä digiasioinnissa ovat päivittämättömät älypuhelimet ja käyttöjärjestelmät, Danske Bank varoittaa.]]></description>
		<content:encoded><![CDATA[<p>Pankki varoittaa: Älä käytä tällaista laitetta asiointiin<br />
<a href="https://www.is.fi/digitoday/tietoturva/art-2000011964888.html" rel="nofollow">https://www.is.fi/digitoday/tietoturva/art-2000011964888.html</a></p>
<p>Yksi suurimmista riskitekijöistä digiasioinnissa ovat päivittämättömät älypuhelimet ja käyttöjärjestelmät, Danske Bank varoittaa.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2026/04/02/cyber-security-news-april-2026/comment-page-2/#comment-1876480</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 24 Apr 2026 15:56:09 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=199485#comment-1876480</guid>
		<description><![CDATA[https://www.darkreading.com/ics-ot-security/serial-ip-devices-thousands-of-bugs]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.darkreading.com/ics-ot-security/serial-ip-devices-thousands-of-bugs" rel="nofollow">https://www.darkreading.com/ics-ot-security/serial-ip-devices-thousands-of-bugs</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2026/04/02/cyber-security-news-april-2026/comment-page-2/#comment-1876415</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 24 Apr 2026 05:17:08 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=199485#comment-1876415</guid>
		<description><![CDATA[Police investigate after claims ‘hair dryer used to manipulate weather sensor to win $34k bet’
Agencies suspect that a sensor at Charles de Gaulle airport in Paris was tampered with after suspicious bets were placed on Polymarket
https://www.independent.co.uk/news/world/europe/hair-dryer-bet-polymarket-france-police-b2963620.html?fbclid=IwdGRjcARXzu1jbGNrBFfOzmV4dG4DYWVtAjExAHNydGMGYXBwX2lkDDM1MDY4NTUzMTcyOAABHjLzxDm1iPBZNlHX5WX6OsctRHD50BYOJSADRJOX_TgVjEmYiafgjxzIwx_0_aem_c8M7hvDyynGEgbgQ4oQ7rQ

French officials are investigating after $34,000 (£25,100) was won on a weather bet, following claims that a temperature sensor at Charles de Gaulle airport in Paris was tampered with.]]></description>
		<content:encoded><![CDATA[<p>Police investigate after claims ‘hair dryer used to manipulate weather sensor to win $34k bet’<br />
Agencies suspect that a sensor at Charles de Gaulle airport in Paris was tampered with after suspicious bets were placed on Polymarket<br />
<a href="https://www.independent.co.uk/news/world/europe/hair-dryer-bet-polymarket-france-police-b2963620.html?fbclid=IwdGRjcARXzu1jbGNrBFfOzmV4dG4DYWVtAjExAHNydGMGYXBwX2lkDDM1MDY4NTUzMTcyOAABHjLzxDm1iPBZNlHX5WX6OsctRHD50BYOJSADRJOX_TgVjEmYiafgjxzIwx_0_aem_c8M7hvDyynGEgbgQ4oQ7rQ" rel="nofollow">https://www.independent.co.uk/news/world/europe/hair-dryer-bet-polymarket-france-police-b2963620.html?fbclid=IwdGRjcARXzu1jbGNrBFfOzmV4dG4DYWVtAjExAHNydGMGYXBwX2lkDDM1MDY4NTUzMTcyOAABHjLzxDm1iPBZNlHX5WX6OsctRHD50BYOJSADRJOX_TgVjEmYiafgjxzIwx_0_aem_c8M7hvDyynGEgbgQ4oQ7rQ</a></p>
<p>French officials are investigating after $34,000 (£25,100) was won on a weather bet, following claims that a temperature sensor at Charles de Gaulle airport in Paris was tampered with.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
