<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Aim at &#8211; Spress</title>
	<atom:link href="https://en.spress.net/tag/aim-at/feed/" rel="self" type="application/rss+xml" />
	<link>https://en.spress.net</link>
	<description>Spress is a general newspaper in English which is updated 24 hours a day.</description>
	<lastBuildDate>Sat, 19 Jun 2021 03:49:12 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
<site xmlns="com-wordpress:feed-additions:1">191965906</site>	<item>
		<title>Ministry of Public Security investigates cyber attack on VOV online newspaper</title>
		<link>https://en.spress.net/ministry-of-public-security-investigates-cyber-attack-on-vov-online-newspaper/</link>
		
		<dc:creator><![CDATA[Hoàng Lam]]></dc:creator>
		<pubDate>Sat, 19 Jun 2021 03:49:12 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[Aim at]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Bandwidth]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[Ddos]]></category>
		<category><![CDATA[Documentary]]></category>
		<category><![CDATA[E News]]></category>
		<category><![CDATA[Editor]]></category>
		<category><![CDATA[Electronic media]]></category>
		<category><![CDATA[FANPAGE]]></category>
		<category><![CDATA[Investigate]]></category>
		<category><![CDATA[investigates]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Ministry]]></category>
		<category><![CDATA[newspaper]]></category>
		<category><![CDATA[Ngo Thieu Phong]]></category>
		<category><![CDATA[Online]]></category>
		<category><![CDATA[Overload]]></category>
		<category><![CDATA[Police]]></category>
		<category><![CDATA[Public]]></category>
		<category><![CDATA[Rescue]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Take part]]></category>
		<category><![CDATA[VNCERT]]></category>
		<category><![CDATA[VOV]]></category>
		<category><![CDATA[VOV Electronic Newspaper]]></category>
		<category><![CDATA[VOV Newspaper]]></category>
		<category><![CDATA[Zing]]></category>
		<guid isPermaLink="false">https://en.spress.net/ministry-of-public-security-investigates-cyber-attack-on-vov-online-newspaper/</guid>

					<description><![CDATA[Website and fanpage of VOV electronic newspaper were attacked by denial of service (DDoS), causing overloaded access bandwidth. This agency has requested the Ministry of Public Security to investigate. On the morning of June 14, Ngo Thieu Phong, Editor-in-Chief of the VOV electronic newspaper, said that the agency had sent a dispatch requesting the Ministry [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Website and fanpage of VOV electronic newspaper were attacked by denial of service (DDoS), causing overloaded access bandwidth. This agency has requested the Ministry of Public Security to investigate.</strong><br />
<span id="more-25338"></span> On the morning of June 14, Ngo Thieu Phong, Editor-in-Chief of the VOV electronic newspaper, said that the agency had sent a dispatch requesting the Ministry of Public Security to investigate and clarify cyber attacks targeting the VOV website and the platform. the agency&#8217;s social media platform.</p>
<p> A leader of the Department of Cybersecurity and High-Tech Crime Prevention (Ministry of Public Security) also confirmed that he had received an official letter from VOV. Currently, the Department of Cybersecurity and High-Tech Crime Prevention and a number of professional units of the Ministry of Public Security have investigated and clarified. In addition, the Cyber ​​Emergency Response Center (VNCERT) and network operators also participate in supporting and solving problems. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_14_119_39178611/9961ece8e3aa0af453bb.jpg" width="625" height="416"> <em> At the time of the cyber attack, readers could not access the website of VOV newspaper. Photo: VOV.</em> Exchange with <em> Zing</em> , a representative of VOV&#8217;s technical department said that cyberattacks on the agency&#8217;s resource system began on June 12. At about 13:00 on June 13, the bandwidth system was overloaded, suspected of being attacked by a denial of service (DDoS). On the morning of June 14, the administrator continued to record a new attack that caused the bandwidth of the system and the website to be overloaded. This is the first time this newspaper has been attacked by DDoS. In addition to the above attacks, the VOV side also believes that the person behind the attacks also discredits the stars of the VOV electronic newspaper on Google or repeatedly makes offensive and threatening comments on the newspaper&#8217;s fanpage. The VOV side is reviewing and detecting malicious code in the system, and at the same time limiting the consequences of cyberattacks, calculating damage to coordinate with authorities to solve.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">25338</post-id>	</item>
		<item>
		<title>Large-scale cyber attack &#8211; a new trend of hackers</title>
		<link>https://en.spress.net/large-scale-cyber-attack-a-new-trend-of-hackers/</link>
		
		<dc:creator><![CDATA[DUY QUANG]]></dc:creator>
		<pubDate>Fri, 18 Jun 2021 05:06:10 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Aim at]]></category>
		<category><![CDATA[America]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[Ferry Terminal]]></category>
		<category><![CDATA[Gas price]]></category>
		<category><![CDATA[Government agencies]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Interrupt]]></category>
		<category><![CDATA[JBS SA]]></category>
		<category><![CDATA[largescale]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[nation]]></category>
		<category><![CDATA[Non governmental organizations]]></category>
		<category><![CDATA[Petroleum pipeline]]></category>
		<category><![CDATA[president]]></category>
		<category><![CDATA[Rare]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[State of Massachusetts]]></category>
		<category><![CDATA[suffered]]></category>
		<category><![CDATA[Supply]]></category>
		<category><![CDATA[Threats]]></category>
		<category><![CDATA[Trend]]></category>
		<guid isPermaLink="false">https://en.spress.net/large-scale-cyber-attack-a-new-trend-of-hackers/</guid>

					<description><![CDATA[In recent months, the world has witnessed a sharp increase in cyber attacks, causing heavy damage as well as disrupting essential services. Performing large-scale cyber attacks has gradually become a new trend for hackers. Since the beginning of 2021, the world has experienced a series of large-scale cyber attacks. (Source: Reuters) In an age where [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>In recent months, the world has witnessed a sharp increase in cyber attacks, causing heavy damage as well as disrupting essential services. Performing large-scale cyber attacks has gradually become a new trend for hackers.</strong><br />
<span id="more-24847"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_13_194_39169587/fc73c274cc3625687c27.jpg" width="625" height="427"> </p>
<p> <em> Since the beginning of 2021, the world has experienced a series of large-scale cyber attacks. (Source: Reuters)</em> In an age where technology is creeping into every aspect of life, the term cyberattack is not new. Many people think simply that a cyber attack is an attempt by a hacker to steal data or money by infiltrating a computer network, databases, network infrastructure, websites, and devices. individual or organization. But now, hackers have found a way to make a lot of money illegally by attacking physical infrastructure targets, disrupting essential services, affecting not only to a person, a company that can spread to an entire city, even a country. <strong> Cyberattacks on the rise</strong> Over the past time, the US has continuously suffered from ransomware attacks targeting large companies, non-governmental organizations and government agencies. Most recently, on June 2, a ferry terminal operator service in the US state of Massachusetts became the target of a cyber attack, partially disrupting the ferry service payment system. Previously, hackers attacked the world&#8217;s leading meat processing group JBS SA, a branch in the US. In early May, the largest US oil pipeline operator Colonial Pipeline was also attacked by ransomware and forced to shut down some systems, disrupting supplies and pushing gasoline prices to record highs. green. Not only the US, the targets of hackers are very diverse. According to data from cybersecurity company BlackFog, from the beginning of 2021 to the present, US organizations and businesses have suffered 52 ransomware attacks, three times higher than the second-ranked country, the UK (16 (16). competition), followed by France (7), Canada (7), Australia (4), the Netherlands (4) and India (3). The rest of the world suffered only 39 attacks by hackers. <strong> Danger wave</strong> According to CNN, hacker groups have found that attacking critical service infrastructure can easily make them more money, in less time. These types of attacks have the potential to cause chaos in life, which can lead to product scarcity, push prices higher&#8230; The bigger the disruption, the quicker the hacked companies pay the hacker to fix the problem soon. The US Cybersecurity and Infrastructure Agency (CISA) has listed 16 industries as critical infrastructure sectors, including energy, healthcare, financial services, water, etc. Attacks, disruption of these industries can have a dramatic impact, undermining the US economy and security. More dangerously, most companies in this industry do not consider themselves technology-focused companies, leaving the operating system defenseless against increasingly sophisticated attacks by hackers. In addition, it is no coincidence that cyber attacks have increased sharply in the context of the raging Covid-19 pandemic. Millions of people move to remote work, including employees with access to critical infrastructure, while ransomware is deployed simply by enticing victims to click a link in an email. . Eric Cole, a former cybersecurity official under President Barack Obama, said that in order to promote automation, the internal networks of critical infrastructures are now networked and make the risk more risky. higher attack. In particular, hospital systems and healthcare providers are often targeted because they are busy dealing with Covid-19 and have little time to update their defenses. In response to this new wave of danger, on June 3, the White House sent an open letter, asking essential service companies to &#8220;consider ransomware as a threat to our core business.&#8221; themselves, rather than simply risk data theft.” US Commerce Secretary Gina Raimondo on June 6 asked the private sector of the country to be vigilant against the increasing wave of cyber attacks, and said that the threat is always present and even present. may become more severe. In order to protect your safety as well as your wallet, according to <em> CNN</em> , not only the US, companies, organizations and agencies also need to quickly close potential vulnerabilities in the system, update software and ensure that the most important functions are &#8220;immune&#8221; from damage. network attacks. Individuals also need to be cautious and alert before clicking on any link on the internet.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">24847</post-id>	</item>
		<item>
		<title>Moscow is in contact with Washington about the cyber attack on JBS</title>
		<link>https://en.spress.net/moscow-is-in-contact-with-washington-about-the-cyber-attack-on-jbs/</link>
		
		<dc:creator><![CDATA[Cao Phương Thảo (Theo Sputnik)]]></dc:creator>
		<pubDate>Sat, 05 Jun 2021 21:57:11 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Aim at]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[Group]]></category>
		<category><![CDATA[JBS]]></category>
		<category><![CDATA[JBS USA]]></category>
		<category><![CDATA[Moscow]]></category>
		<category><![CDATA[Washington]]></category>
		<guid isPermaLink="false">https://en.spress.net/moscow-is-in-contact-with-washington-about-the-cyber-attack-on-jbs/</guid>

					<description><![CDATA[JBS USA &#8211; the US branch of the world&#8217;s largest meat supplier JBS, had to close its operations in North America and Australia due to a cyber attack since last weekend. On June 2, Russian Deputy Foreign Minister Sergey Ryabkov said that Moscow and Washington still maintain contact to discuss the cyber attack on JBS [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>JBS USA &#8211; the US branch of the world&#8217;s largest meat supplier JBS, had to close its operations in North America and Australia due to a cyber attack since last weekend.</strong><br />
<span id="more-20923"></span> On June 2, Russian Deputy Foreign Minister Sergey Ryabkov said that Moscow and Washington still maintain contact to discuss the cyber attack on JBS USA &#8211; the Brazilian branch of JBS meat processing group.</p>
<p> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_02_11_39050867/b91e8bbb9af973a72ae8.jpg" width="625" height="416"> <em> JBS USA, the US arm of the world&#8217;s largest meat supplier JBS, was targeted in a cyber attack last weekend. Photo: AP</em> &#8220;Discussed about the cyberattack on JBS meat processing group took place yesterday through the Russian Foreign Ministry and the Russian Embassy in Washington. As far as we know, the US authorities are also involved directly with the Russian government on this issue,&#8221; Deputy Minister Ryabkov said. The White House announced on June 1 that the United States was in contact with Russian officials, because the ransomware attack &#8220;potentially stemmed from a criminal organization based in Russia&#8221;. In a statement on May 31, JBS USA said it detected an organized cyberattack that affected several servers that support the corporation&#8217;s information technology systems at its North American facilities. and Australia. The headquarters of meat processing group JBS in Brazil has shut down the systems affected in the attack and notified the authorities. The company also convened a team of its own and third-party information technology experts to coordinate handling the case. JBS Group said it will take a long time to resolve this issue, and as a result some transactions with customers and suppliers may be disrupted. Meanwhile, JBS facilities in Australia were also affected following the attack, forcing about 10,000 workers to take unpaid leave. Australian Agriculture Minister David Littleproud said authorities were aware of the incident. The White House said on Monday that JBS had notified the US government that it was a ransomware attack by a criminal organization possibly based in Russia. JBS is the world&#8217;s largest meat processing company, with operations scattered in many countries such as the US, Australia, Canada, Mexico, New Zealand and the UK. Previously, in early May, Colonial Pipeline &#8211; the largest oil pipeline operator in the US was also attacked by ransomware and forced to close some systems. Colonial Pipeline has publicly confirmed paying a ransom of up to $ 4.4 million to be able to restore the computer network. Meanwhile, the US Federal Bureau of Investigation (FBI) identified DarkSide as the hacker group behind the attack.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">20923</post-id>	</item>
		<item>
		<title>Nearly 1 million customers of Canada Post are at risk of having their personal data exposed</title>
		<link>https://en.spress.net/nearly-1-million-customers-of-canada-post-are-at-risk-of-having-their-personal-data-exposed/</link>
		
		<dc:creator><![CDATA[Hương Giang (P/v TTXVN tại Ottawa)]]></dc:creator>
		<pubDate>Mon, 31 May 2021 13:35:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Aim at]]></category>
		<category><![CDATA[Anticipation]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[Customer]]></category>
		<category><![CDATA[Customers]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Declaration]]></category>
		<category><![CDATA[exposed]]></category>
		<category><![CDATA[Got]]></category>
		<category><![CDATA[Group]]></category>
		<category><![CDATA[Help them]]></category>
		<category><![CDATA[Malicious software]]></category>
		<category><![CDATA[million]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[parcel]]></category>
		<category><![CDATA[Parcels]]></category>
		<category><![CDATA[Personal]]></category>
		<category><![CDATA[Post]]></category>
		<category><![CDATA[Postal]]></category>
		<category><![CDATA[Receiver]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[Sender]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[Supplier]]></category>
		<guid isPermaLink="false">https://en.spress.net/nearly-1-million-customers-of-canada-post-are-at-risk-of-having-their-personal-data-exposed/</guid>

					<description><![CDATA[The malware attack against Commport Communications, one of Canada Post&#8217;s providers, put nearly a million people at risk of having their personal data exposed. A malware attack against Commport Communications puts 1 million of Canada Post&#8217;s customers at risk of having their personal data exposed. Illustration: VNA A malware attack targeting Commport Communications, one of [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The malware attack against Commport Communications, one of Canada Post&#8217;s providers, put nearly a million people at risk of having their personal data exposed.</strong><br />
<span id="more-19552"></span> <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_28_324_38994277/1a5ceb88f3ca1a9443db.jpg" width="625" height="416"> </p>
<p> <em> A malware attack against Commport Communications puts 1 million of Canada Post&#8217;s customers at risk of having their personal data exposed. Illustration: VNA</em> A malware attack targeting Commport Communications, one of Canada Post&#8217;s providers, has affected 44 of Canada&#8217;s largest business customers, Canada Post, Canada&#8217;s national postal group, said. Canada Post across the country and nearly a million people are at risk of having their personal data exposed. Commport Communications operates in the field of electronic data exchange, management of shipping declaration data of large parcel delivery businesses. Commport Communications&#8217; systems have access to information such as the names and addresses of senders and recipients when large parcels are shipped. Canada Post said the cyberattack obtained information about delivery activity between July 2016 and March 2019. According to Canada Post, 97% of the information stolen was names and addresses. This attack did not have access to financial information. Canada Post is currently working closely with Commport Communications and has invited external cybersecurity experts to fully investigate and take appropriate action. Canada Post said it proactively notified affected business customers and provided the information and support needed to help them determine next steps. At the same time, the Privacy Commissioner&#8217;s Office was notified of the incident.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">19552</post-id>	</item>
	</channel>
</rss>