<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>vulnerabilities Archives - LIEFFIE</title>
	<atom:link href="https://lieffie.com/tag/vulnerabilities/feed/" rel="self" type="application/rss+xml" />
	<link>https://lieffie.com/tag/vulnerabilities/</link>
	<description>Digital News and Development</description>
	<lastBuildDate>Tue, 14 Jan 2025 22:14:39 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.7.2</generator>

<image>
	<url>https://lieffie.com/wp-content/uploads/2025/02/cropped-to-help-ais-understand-the-world-researchers-put-them-in-a-robot-32x32.jpg</url>
	<title>vulnerabilities Archives - LIEFFIE</title>
	<link>https://lieffie.com/tag/vulnerabilities/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Yearlong supply-chain attack targeting security pros steals 390K credentials</title>
		<link>https://lieffie.com/digital-news/yearlong-supply-chain-attack-targeting-security-pros-steals-390k-credentials/</link>
		
		<dc:creator><![CDATA[wiredgorilla]]></dc:creator>
		<pubDate>Fri, 13 Dec 2024 21:46:18 +0000</pubDate>
				<category><![CDATA[Digital News]]></category>
		<category><![CDATA[Biz & IT]]></category>
		<category><![CDATA[credential theft]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[cryptomining]]></category>
		<category><![CDATA[exploits]]></category>
		<category><![CDATA[GitHub]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[npm]]></category>
		<category><![CDATA[research]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[supply chain attacks]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<guid isPermaLink="false">https://lieffie.com/digital-news/yearlong-supply-chain-attack-targeting-security-pros-steals-390k-credentials/</guid>

					<description><![CDATA[<p>But wait, there&#8217;s more On Friday, Datadog revealed that MUT-1244 employed additional means for installing its second-stage malware. One was through a collection...</p>
<p>The post <a href="https://lieffie.com/digital-news/yearlong-supply-chain-attack-targeting-security-pros-steals-390k-credentials/">Yearlong supply-chain attack targeting security pros steals 390K credentials</a> appeared first on <a href="https://lieffie.com">LIEFFIE</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Thousands of Linux systems infected by stealthy malware since 2021</title>
		<link>https://lieffie.com/digital-news/thousands-of-linux-systems-infected-by-stealthy-malware-since-2021/</link>
		
		<dc:creator><![CDATA[wiredgorilla]]></dc:creator>
		<pubDate>Thu, 03 Oct 2024 23:42:05 +0000</pubDate>
				<category><![CDATA[Digital News]]></category>
		<category><![CDATA[Biz & IT]]></category>
		<category><![CDATA[exploits]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<guid isPermaLink="false">https://lieffie.com/website-development/thousands-of-linux-systems-infected-by-stealthy-malware-since-2021/</guid>

					<description><![CDATA[<p>This Reddit comment posted to the CentOS subreddit is typical. An admin noticed that two servers were infected with a cryptocurrency hijacker with...</p>
<p>The post <a href="https://lieffie.com/digital-news/thousands-of-linux-systems-infected-by-stealthy-malware-since-2021/">Thousands of Linux systems infected by stealthy malware since 2021</a> appeared first on <a href="https://lieffie.com">LIEFFIE</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Drupal Steward&#8217;s First Activation Report</title>
		<link>https://lieffie.com/digital-news/drupal-stewards-first-activation-report/</link>
		
		<dc:creator><![CDATA[wiredgorilla]]></dc:creator>
		<pubDate>Mon, 07 Dec 2020 20:54:34 +0000</pubDate>
				<category><![CDATA[Digital News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Strategy]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<guid isPermaLink="false">https://lieffie.com/website-development/drupal-stewards-first-activation-report/</guid>

					<description><![CDATA[<p>On November 18th, 2020, the Drupal security team released security advisory SA-CORE-2020-012, a critical remote code execution vulnerability being patched in Drupal 7,...</p>
<p>The post <a href="https://lieffie.com/digital-news/drupal-stewards-first-activation-report/">Drupal Steward&#8217;s First Activation Report</a> appeared first on <a href="https://lieffie.com">LIEFFIE</a>.</p>
]]></description>
		
		
		
			</item>
	</channel>
</rss>
