<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security news May 2026</title>
	<atom:link href="http://www.epanorama.net/blog/2026/05/03/cyber-security-news-may-2026/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2026/05/03/cyber-security-news-may-2026/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Sun, 24 May 2026 06:39:20 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2026/05/03/cyber-security-news-may-2026/comment-page-2/#comment-1878653</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 24 May 2026 06:04:34 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=199639#comment-1878653</guid>
		<description><![CDATA[Jos jompikumpi näistä on pin-koodisi, vaihda se välittömästi – Tätä et ole tullut ajatelleeksi
https://www.iltalehti.fi/digiuutiset/a/a584db4a-607b-4b4d-bc01-cb3ed7e4190c

Puhelimen pääsykoodi ei suojaa sim-korttia lainkaan. Jos varas irrottaa sim-kortin ja siirtää sen toiseen puhelimeen, voi käydä köpelösti.

Kun puhelinliittymä vaihtuu, toimittaa operaattori asiakkaalleen sim-kortin, jonka pin-koodi on oletuksena tyypillisesti 1234 tai 0000. Koodi on tarkoitettu väliaikaiseksi, mutta valitettavan moni jättää sen vaihtamatta.]]></description>
		<content:encoded><![CDATA[<p>Jos jompikumpi näistä on pin-koodisi, vaihda se välittömästi – Tätä et ole tullut ajatelleeksi<br />
<a href="https://www.iltalehti.fi/digiuutiset/a/a584db4a-607b-4b4d-bc01-cb3ed7e4190c" rel="nofollow">https://www.iltalehti.fi/digiuutiset/a/a584db4a-607b-4b4d-bc01-cb3ed7e4190c</a></p>
<p>Puhelimen pääsykoodi ei suojaa sim-korttia lainkaan. Jos varas irrottaa sim-kortin ja siirtää sen toiseen puhelimeen, voi käydä köpelösti.</p>
<p>Kun puhelinliittymä vaihtuu, toimittaa operaattori asiakkaalleen sim-kortin, jonka pin-koodi on oletuksena tyypillisesti 1234 tai 0000. Koodi on tarkoitettu väliaikaiseksi, mutta valitettavan moni jättää sen vaihtamatta.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2026/05/03/cyber-security-news-may-2026/comment-page-2/#comment-1878593</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 22 May 2026 20:28:41 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=199639#comment-1878593</guid>
		<description><![CDATA[They are pitching it as an open, pocket-sized Linux computer. More: https://cnews.link/flipper-zero-linux-ai-network-analysis-security/]]></description>
		<content:encoded><![CDATA[<p>They are pitching it as an open, pocket-sized Linux computer. More: <a href="https://cnews.link/flipper-zero-linux-ai-network-analysis-security/" rel="nofollow">https://cnews.link/flipper-zero-linux-ai-network-analysis-security/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2026/05/03/cyber-security-news-may-2026/comment-page-2/#comment-1878558</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 21 May 2026 16:03:11 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=199639#comment-1878558</guid>
		<description><![CDATA[If accuracy isn’t the goal, what is? Vibes? Emotion? Goosebumps?
Full story: https://www.headphonesty.com/2025/07/speaker-designer-hi-fi-accuracy-myth/?utm_source=fb&amp;utm_campaign=comment]]></description>
		<content:encoded><![CDATA[<p>If accuracy isn’t the goal, what is? Vibes? Emotion? Goosebumps?<br />
Full story: <a href="https://www.headphonesty.com/2025/07/speaker-designer-hi-fi-accuracy-myth/?utm_source=fb&#038;utm_campaign=comment" rel="nofollow">https://www.headphonesty.com/2025/07/speaker-designer-hi-fi-accuracy-myth/?utm_source=fb&#038;utm_campaign=comment</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2026/05/03/cyber-security-news-may-2026/comment-page-2/#comment-1878536</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 21 May 2026 05:16:54 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=199639#comment-1878536</guid>
		<description><![CDATA[https://cybernews.com/security/steam-vetting-free-game-drain-users-data/?utm_source=cn_facebook&amp;utm_medium=social&amp;utm_campaign=cybernews&amp;utm_content=post&amp;source=cn_facebook&amp;medium=social&amp;campaign=cybernews&amp;content=post&amp;fbclid=IwVERDUAR7ZuJleHRuA2FlbQIxMABzcnRjBmFwcF9pZAwzNTA2ODU1MzE3MjgAAR4FQY65s6KNca8fVbDxO7vyYtWP6eURyuURWnjkn5inAVvpuaa0_G1_GeTN6g_aem_nm2LXUOjZDWQu7rutw0QPw]]></description>
		<content:encoded><![CDATA[<p><a href="https://cybernews.com/security/steam-vetting-free-game-drain-users-data/?utm_source=cn_facebook&#038;utm_medium=social&#038;utm_campaign=cybernews&#038;utm_content=post&#038;source=cn_facebook&#038;medium=social&#038;campaign=cybernews&#038;content=post&#038;fbclid=IwVERDUAR7ZuJleHRuA2FlbQIxMABzcnRjBmFwcF9pZAwzNTA2ODU1MzE3MjgAAR4FQY65s6KNca8fVbDxO7vyYtWP6eURyuURWnjkn5inAVvpuaa0_G1_GeTN6g_aem_nm2LXUOjZDWQu7rutw0QPw" rel="nofollow">https://cybernews.com/security/steam-vetting-free-game-drain-users-data/?utm_source=cn_facebook&#038;utm_medium=social&#038;utm_campaign=cybernews&#038;utm_content=post&#038;source=cn_facebook&#038;medium=social&#038;campaign=cybernews&#038;content=post&#038;fbclid=IwVERDUAR7ZuJleHRuA2FlbQIxMABzcnRjBmFwcF9pZAwzNTA2ODU1MzE3MjgAAR4FQY65s6KNca8fVbDxO7vyYtWP6eURyuURWnjkn5inAVvpuaa0_G1_GeTN6g_aem_nm2LXUOjZDWQu7rutw0QPw</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2026/05/03/cyber-security-news-may-2026/comment-page-2/#comment-1878525</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 20 May 2026 22:34:14 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=199639#comment-1878525</guid>
		<description><![CDATA[Microsoft ditches SMS codes for sign-in, says there’s a more secure way to reach your accounts
https://cybernews.com/tech/microsoft-ditch-sms-codes-sign-in/?utm_source=cn_facebook&amp;utm_medium=social&amp;utm_campaign=cybernews&amp;utm_content=post&amp;source=cn_facebook&amp;medium=social&amp;campaign=cybernews&amp;content=post&amp;fbclid=IwVERDUAR7CJZleHRuA2FlbQIxMABzcnRjBmFwcF9pZAwzNTA2ODU1MzE3MjgAAR6BU6hqsX7bZNfjEA6AW7kyrilfvfVi4E7LG58hncpGfa5NO6K8p9Hc2ZfBTw_aem_QEpY3phT0qxDrfszn-qDtQ]]></description>
		<content:encoded><![CDATA[<p>Microsoft ditches SMS codes for sign-in, says there’s a more secure way to reach your accounts<br />
<a href="https://cybernews.com/tech/microsoft-ditch-sms-codes-sign-in/?utm_source=cn_facebook&#038;utm_medium=social&#038;utm_campaign=cybernews&#038;utm_content=post&#038;source=cn_facebook&#038;medium=social&#038;campaign=cybernews&#038;content=post&#038;fbclid=IwVERDUAR7CJZleHRuA2FlbQIxMABzcnRjBmFwcF9pZAwzNTA2ODU1MzE3MjgAAR6BU6hqsX7bZNfjEA6AW7kyrilfvfVi4E7LG58hncpGfa5NO6K8p9Hc2ZfBTw_aem_QEpY3phT0qxDrfszn-qDtQ" rel="nofollow">https://cybernews.com/tech/microsoft-ditch-sms-codes-sign-in/?utm_source=cn_facebook&#038;utm_medium=social&#038;utm_campaign=cybernews&#038;utm_content=post&#038;source=cn_facebook&#038;medium=social&#038;campaign=cybernews&#038;content=post&#038;fbclid=IwVERDUAR7CJZleHRuA2FlbQIxMABzcnRjBmFwcF9pZAwzNTA2ODU1MzE3MjgAAR6BU6hqsX7bZNfjEA6AW7kyrilfvfVi4E7LG58hncpGfa5NO6K8p9Hc2ZfBTw_aem_QEpY3phT0qxDrfszn-qDtQ</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2026/05/03/cyber-security-news-may-2026/comment-page-2/#comment-1878498</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 20 May 2026 12:07:40 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=199639#comment-1878498</guid>
		<description><![CDATA[https://thehackernews.com/2026/05/miniplasma-windows-0-day-enables-system.html?m=1]]></description>
		<content:encoded><![CDATA[<p><a href="https://thehackernews.com/2026/05/miniplasma-windows-0-day-enables-system.html?m=1" rel="nofollow">https://thehackernews.com/2026/05/miniplasma-windows-0-day-enables-system.html?m=1</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2026/05/03/cyber-security-news-may-2026/comment-page-2/#comment-1878484</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 20 May 2026 11:47:52 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=199639#comment-1878484</guid>
		<description><![CDATA[Sergiu Gatlan / BleepingComputer:
GitHub confirms breach of ~3,800 internal repositories after one of its employees installed a malicious VS Code extension; TeamPCP claimed responsibility
https://www.bleepingcomputer.com/news/security/github-confirms-breach-of-3-800-repos-via-malicious-vscode-extension/]]></description>
		<content:encoded><![CDATA[<p>Sergiu Gatlan / BleepingComputer:<br />
GitHub confirms breach of ~3,800 internal repositories after one of its employees installed a malicious VS Code extension; TeamPCP claimed responsibility<br />
<a href="https://www.bleepingcomputer.com/news/security/github-confirms-breach-of-3-800-repos-via-malicious-vscode-extension/" rel="nofollow">https://www.bleepingcomputer.com/news/security/github-confirms-breach-of-3-800-repos-via-malicious-vscode-extension/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2026/05/03/cyber-security-news-may-2026/comment-page-2/#comment-1878465</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 20 May 2026 05:25:03 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=199639#comment-1878465</guid>
		<description><![CDATA[https://github.com/mvt-project/mvt?fbclid=IwdGRjcAR6F1BjbGNrBHoXS2V4dG4DYWVtAjExAHNydGMGYXBwX2lkDDM1MDY4NTUzMTcyOAABHvm1zYl4rMbh0F8RMnaPEdu8MGM3zlsgzEqL2nKD0NV7nam18tvPBEejtYUt_aem_JOuTircYg-xqlBc_5fSEAw]]></description>
		<content:encoded><![CDATA[<p><a href="https://github.com/mvt-project/mvt?fbclid=IwdGRjcAR6F1BjbGNrBHoXS2V4dG4DYWVtAjExAHNydGMGYXBwX2lkDDM1MDY4NTUzMTcyOAABHvm1zYl4rMbh0F8RMnaPEdu8MGM3zlsgzEqL2nKD0NV7nam18tvPBEejtYUt_aem_JOuTircYg-xqlBc_5fSEAw" rel="nofollow">https://github.com/mvt-project/mvt?fbclid=IwdGRjcAR6F1BjbGNrBHoXS2V4dG4DYWVtAjExAHNydGMGYXBwX2lkDDM1MDY4NTUzMTcyOAABHvm1zYl4rMbh0F8RMnaPEdu8MGM3zlsgzEqL2nKD0NV7nam18tvPBEejtYUt_aem_JOuTircYg-xqlBc_5fSEAw</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2026/05/03/cyber-security-news-may-2026/comment-page-2/#comment-1878438</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 19 May 2026 15:16:12 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=199639#comment-1878438</guid>
		<description><![CDATA[https://www.securityweek.com/unpatched-chromadb-vulnerability-can-lead-to-server-takeover/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.securityweek.com/unpatched-chromadb-vulnerability-can-lead-to-server-takeover/" rel="nofollow">https://www.securityweek.com/unpatched-chromadb-vulnerability-can-lead-to-server-takeover/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2026/05/03/cyber-security-news-may-2026/comment-page-2/#comment-1878437</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 19 May 2026 15:15:41 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=199639#comment-1878437</guid>
		<description><![CDATA[Vulnerabilities
Exploitation of Critical NGINX Vulnerability Begins
https://www.securityweek.com/exploitation-of-critical-nginx-vulnerability-begins/

The flaw leads to denial-of-service on default configurations and to remote code execution if ASLR is disabled.


Nginx vulnerability	

The first in-the-wild attacks exploiting a critical-severity NGINX vulnerability patched last week have occurred over the weekend, VulnCheck warns.

Tracked as CVE-2026-42945 (CVSS score of 9.2) and dubbed Nginx Rift, the flaw is described as a heap buffer overflow in the ngx_http_rewrite_module component. It lurked in the NGINX code for 16 years.

Shortly after F5 released patches for the bug, Depthfirst published technical details and proof-of-concept (PoC) code targeting it. Now, VulnCheck says threat actors are already exploiting the issue in attacks.

“We’re seeing active exploitation of CVE-2026-42945 in F5 NGINX, a heap buffer overflow affecting both NGINX Plus and NGINX Open Source on VulnCheck Canaries just days after the CVE was published,” VulnCheck researcher Patrick Garrity warned.]]></description>
		<content:encoded><![CDATA[<p>Vulnerabilities<br />
Exploitation of Critical NGINX Vulnerability Begins<br />
<a href="https://www.securityweek.com/exploitation-of-critical-nginx-vulnerability-begins/" rel="nofollow">https://www.securityweek.com/exploitation-of-critical-nginx-vulnerability-begins/</a></p>
<p>The flaw leads to denial-of-service on default configurations and to remote code execution if ASLR is disabled.</p>
<p>Nginx vulnerability	</p>
<p>The first in-the-wild attacks exploiting a critical-severity NGINX vulnerability patched last week have occurred over the weekend, VulnCheck warns.</p>
<p>Tracked as CVE-2026-42945 (CVSS score of 9.2) and dubbed Nginx Rift, the flaw is described as a heap buffer overflow in the ngx_http_rewrite_module component. It lurked in the NGINX code for 16 years.</p>
<p>Shortly after F5 released patches for the bug, Depthfirst published technical details and proof-of-concept (PoC) code targeting it. Now, VulnCheck says threat actors are already exploiting the issue in attacks.</p>
<p>“We’re seeing active exploitation of CVE-2026-42945 in F5 NGINX, a heap buffer overflow affecting both NGINX Plus and NGINX Open Source on VulnCheck Canaries just days after the CVE was published,” VulnCheck researcher Patrick Garrity warned.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
