<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:dc="https://purl.org/dc/elements/1.1/"
     xmlns:dcterms="http://purl.org/dc/terms/"
     xmlns:media="http://search.yahoo.com/mrss/"
     xmlns:atom="http://www.w3.org/2005/Atom"
>
    <channel>
        <atom:link href="https://www.tomshardware.com/feeds/tag/cyber-security" rel="self" type="application/rss+xml" />
                    <title><![CDATA[ Latest from Tom's Hardware in Cyber-security ]]></title>
                <link>https://www.tomshardware.com/tech-industry/cyber-security</link>
        <description><![CDATA[ All the latest cyber-security content from the Tom's Hardware team ]]></description>
                                    <lastBuildDate>Sat, 11 Apr 2026 18:05:43 +0000</lastBuildDate>
                            <language>en</language>
                                <item>
                                                            <title><![CDATA[ Rockstar Games confirms it was hacked by malicious group — 'ShinyHunters' takes credit, gives until April 14 to pay ransom or it will release confidential data ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/rockstar-games-confirms-it-was-hacked-by-malicious-group-shinyhunters-takes-credit-gives-until-april-14-to-pay-ransom-or-risk-leaking-confidential-data-shinyhunters</link>
                                                                            <description>
                            <![CDATA[ The hacker group "Shiny Hunters" has been able to breach Rockstar Games by accessing authentication tokens and getting inside the company's cloud infrastructure. The stolen data doesn't include any sensitive company or player information, according to a Rockstar spokesperson, but it's still being put up for ransom. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">qKdCXuCg5NsmAVv8pLma6U</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/fEhrMWXcANbZkYFRgR3UVm-1280-80.png" type="image/png" length="0"></enclosure>
                                                                        <pubDate>Sat, 11 Apr 2026 18:05:43 +0000</pubDate>                                                                                                                                <updated>Sat, 11 Apr 2026 21:14:50 +0000</updated>
                                                                                                                                            <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Hassam Nasir) ]]></author>                    <dc:creator><![CDATA[ Hassam Nasir ]]></dc:creator>                                                                                                    <media:content type="image/png" url="https://cdn.mos.cms.futurecdn.net/fEhrMWXcANbZkYFRgR3UVm-1280-80.png">
                                                            <media:credit><![CDATA[Rockstar Games]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A capture from the end of the first trailer of Rockstar Games&#039; Grand Theft Auto VI.]]></media:description>                                                            <media:text><![CDATA[A capture from the end of the first trailer of Rockstar Games&#039; Grand Theft Auto VI.]]></media:text>
                                <media:title type="plain"><![CDATA[A capture from the end of the first trailer of Rockstar Games&#039; Grand Theft Auto VI.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/fEhrMWXcANbZkYFRgR3UVm-1280-80.png" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ HWMonitor and CPU-Z developer CPUID breached by unknown attackers — cyberattack forced users to download malware instead of valid apps for six hours ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/hwmonitor-and-cpu-z-developer-cpuid-breached-by-unknown-attackers-cyberattack-forced-users-to-download-malware-instead-of-valid-apps-for-approximately-six-hours</link>
                                                                            <description>
                            <![CDATA[ Unknown attackers compromised the CPUID website, redirecting users to malware laden versions of popular tools. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">Zva4S5pQNWQnxHFpLe2QiY</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/WyRuWM6v9nNACodoiYTvYX-1280-80.png" type="image/png" length="0"></enclosure>
                                                                        <pubDate>Fri, 10 Apr 2026 16:27:15 +0000</pubDate>                                                                                                                                <updated>Fri, 10 Apr 2026 16:33:05 +0000</updated>
                                                                                                                                            <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Jowi Morales) ]]></author>                    <dc:creator><![CDATA[ Jowi Morales ]]></dc:creator>                                                                                                    <media:content type="image/png" url="https://cdn.mos.cms.futurecdn.net/WyRuWM6v9nNACodoiYTvYX-1280-80.png">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[a hand reaching out of a laptop screen]]></media:description>                                                            <media:text><![CDATA[a hand reaching out of a laptop screen]]></media:text>
                                <media:title type="plain"><![CDATA[a hand reaching out of a laptop screen]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/WyRuWM6v9nNACodoiYTvYX-1280-80.png" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ US cybersecurity agency issues an urgent alert as Iranian hackers attack critical infrastructure — CISA guidance warns organizations to immediately shield certain programmable logic controllers from the internet to thwart future attacks ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/us-cybersecurity-agency-issues-an-urgent-alert-as-iranian-hackers-attack-critical-infrastructure-cisa-guidance-warns-organizations-to-immediately-shield-certain-programmable-logic-controllers-from-the-internet-to-thwart-future-attacks</link>
                                                                            <description>
                            <![CDATA[ The U.S. Cybersecurity and Infrastructure Security Agency, in conjunction with the FBI and NSA, have issued an alert that Iranian-affiliated cyber attacks are threatening critical infrastructure, exploiting programmable logic controllers made by Rockwell Automation and Allen-Bradley to gain access. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">6ChCZD3KqmrE9gAvTbWwYF</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/Jb9RbVa8apvFGuYwvC5K24-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 10 Apr 2026 10:40:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Ben Stockton ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/Jb9RbVa8apvFGuYwvC5K24-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Cyber attacks]]></media:description>                                                            <media:text><![CDATA[Cyber attacks]]></media:text>
                                <media:title type="plain"><![CDATA[Cyber attacks]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/Jb9RbVa8apvFGuYwvC5K24-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Go maintainer joins collective klaxon about encryption-breaking quantum computers — developer urges immediate switch to post-quantum methods to prevent worldwide disaster ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/go-maintainer-joins-collective-klaxon-about-encryption-breaking-quantum-computers-developer-urges-immediate-switch-to-post-quantum-methods-to-prevent-worldwide-disaster</link>
                                                                            <description>
                            <![CDATA[ Go maintainer joins collective klaxon about encryption-breaking quantum computers and urges immediate switch to post-quantum methods to prevent disaster. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">oWU6HQGnMW3uuuMkkmWRmg</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/htHQLBnnmsjKyAaj9C44uD-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 09 Apr 2026 10:40:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Bruno Ferreira) ]]></author>                    <dc:creator><![CDATA[ Bruno Ferreira ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/htHQLBnnmsjKyAaj9C44uD-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Quantum computers]]></media:description>                                                            <media:text><![CDATA[Quantum computers]]></media:text>
                                <media:title type="plain"><![CDATA[Quantum computers]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/htHQLBnnmsjKyAaj9C44uD-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ $21 billion stolen from more than 1 million Americans due to cybercrime in 2025 — $11 billion come from stolen crypto, $8.6 billion taken from investment scams, while AI-related attacks cost $893 million ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/usd21-billion-stolen-from-more-than-1-million-americans-due-to-cybercrime-in-2025-usd11-billion-come-from-stolen-crypto-usd8-6-billion-taken-from-investment-scams-while-ai-related-attacks-cost-usd893-million</link>
                                                                            <description>
                            <![CDATA[ The FBI breaks down the $21 billion lost by over a million Americans through online scams, with more than half involving cryptocurrency. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">cMdQghS7Ng7qUqJugVMsJc</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/9YYr49MBVeBobTPW7raJWK-1280-80.png" type="image/png" length="0"></enclosure>
                                                                        <pubDate>Thu, 09 Apr 2026 10:00:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Jowi Morales) ]]></author>                    <dc:creator><![CDATA[ Jowi Morales ]]></dc:creator>                                                                                                    <media:content type="image/png" url="https://cdn.mos.cms.futurecdn.net/9YYr49MBVeBobTPW7raJWK-1280-80.png">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[a hacker calling a scam victim]]></media:description>                                                            <media:text><![CDATA[a hacker calling a scam victim]]></media:text>
                                <media:title type="plain"><![CDATA[a hacker calling a scam victim]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/9YYr49MBVeBobTPW7raJWK-1280-80.png" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ 10 petabytes of sensitive data stolen from China's National Supercomputing Center, hackers claim — daring heist would be largest ever China hack, covering 6,000 clients across science, defense, and beyond ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/10-petabytes-of-sensitive-data-stolen-from-chinas-national-supercomputing-center-hackers-claim-daring-heist-would-be-largest-ever-china-hack-covering-6-000-clients-across-science-defense-and-beyond</link>
                                                                            <description>
                            <![CDATA[ Hacker or hacker group steals secret data concerning aerospace engineering, bioinformatics, fusion modeling from China's National Supercomputing Center. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">dAuKEiJEC7ficTe2LV2ra4</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/foLY3NDKc2g2zqjwGgXPvc-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 09 Apr 2026 09:42:50 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ ashilov@gmail.com (Anton Shilov) ]]></author>                    <dc:creator><![CDATA[ Anton Shilov ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/foLY3NDKc2g2zqjwGgXPvc-1280-80.jpg">
                                                            <media:credit><![CDATA[Intel]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A security specialist]]></media:description>                                                            <media:text><![CDATA[A security specialist]]></media:text>
                                <media:title type="plain"><![CDATA[A security specialist]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/foLY3NDKc2g2zqjwGgXPvc-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Russian state hackers are hijacking TP-Link and MicroTik routers to steal Outlook credentials, cybersecurity center warns — APT28 group targets DNS and redirects traffic to attacker-controlled servers ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/ncsc-says-russian-gru-hackers-are-hijacking-tp-link-and-mikrotik-routers</link>
                                                                            <description>
                            <![CDATA[ The UK National Cyber Security Centre says that Russian state hackers have been exploiting vulnerable small office and home office routers since 2024 to overwrite their DHCP and DNS settings ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">eNvnhqHEKHDGHLu94fDBSU</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/Co6ZLWZpkb6GQGvf7VbqN9-1280-80.png" type="image/png" length="0"></enclosure>
                                                                        <pubDate>Wed, 08 Apr 2026 11:13:47 +0000</pubDate>                                                                                                                                <updated>Thu, 09 Apr 2026 16:08:22 +0000</updated>
                                                                                                                                            <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Luke James ]]></dc:creator>                                                                                                    <media:content type="image/png" url="https://cdn.mos.cms.futurecdn.net/Co6ZLWZpkb6GQGvf7VbqN9-1280-80.png">
                                                            <media:credit><![CDATA[Microsoft]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Outlook logo]]></media:description>                                                            <media:text><![CDATA[Outlook logo]]></media:text>
                                <media:title type="plain"><![CDATA[Outlook logo]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/Co6ZLWZpkb6GQGvf7VbqN9-1280-80.png" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ LinkedIn is spying on you, according to a new 'BrowserGate' security report — scripts stealthily scan visitors' browsers for over 6,000 Chrome extensions and harvest hardware data ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/software/browsers/linkedin-scans-visitors-browsers-for-over-6000-chrome-extensions-and-collects-device-data</link>
                                                                            <description>
                            <![CDATA[ LinkedIn is understood to inject a JavaScript fingerprinting script on every page load that probes visitors' browsers for 6,236 installed Chrome extensions and collects detailed device telemetry. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">TC6Bg8MX2MCRB3QtHomW8D</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/S4CAxayvctKvjehGtVneQe-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Sat, 04 Apr 2026 16:46:32 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Luke James ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/S4CAxayvctKvjehGtVneQe-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[LinkedIn]]></media:description>                                                            <media:text><![CDATA[LinkedIn]]></media:text>
                                <media:title type="plain"><![CDATA[LinkedIn]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/S4CAxayvctKvjehGtVneQe-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Google research suggests encryption technique used by Bitcoin will be cracked by quantum computers around 2029 — search giant says quantum attacks need to be prepared for now ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/google-research-suggests-encryption-technique-used-by-bitcoin-will-be-cracked-by-quantum-computers-around-2029-search-giant-says-quantum-attacks-need-to-be-prepared-for-now</link>
                                                                            <description>
                            <![CDATA[ New research from Google suggests that future quantum computers will develop quickly enough to pose a risk to elliptic-curve cryptography, used in cryptocurrencies like Bitcoin, as soon as 2029, and its researchers say action should be taken now to prepare. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">TL66qqptRetgfaCEN9WE26</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/g3kUrBQkgzFvkeeWpHuNo4-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 01 Apr 2026 09:00:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Bruno Ferreira) ]]></author>                    <dc:creator><![CDATA[ Bruno Ferreira ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/g3kUrBQkgzFvkeeWpHuNo4-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Quantum computer]]></media:description>                                                            <media:text><![CDATA[Quantum computer]]></media:text>
                                <media:title type="plain"><![CDATA[Quantum computer]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/g3kUrBQkgzFvkeeWpHuNo4-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ One of JavaScript's most popular libraries compromised by hackers — Axios npm package hit in supply chain attack that deployed a cross-platform RAT ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/axios-npm-package-compromised-in-supply-chain-attack-that-deployed-a-cross-platform-rat</link>
                                                                            <description>
                            <![CDATA[ An attacker compromised the npm account of a lead Axios maintainer on March 30, and used it to publish two malicious versions of the widely used JavaScript HTTP client library. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">v8tuDhQDoXnPFnXM5KkprH</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/S5kjaZoyn67xMew2JorcTD-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 31 Mar 2026 12:13:33 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Luke James ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/S5kjaZoyn67xMew2JorcTD-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Hacker]]></media:description>                                                            <media:text><![CDATA[Hacker]]></media:text>
                                <media:title type="plain"><![CDATA[Hacker]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/S5kjaZoyn67xMew2JorcTD-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Hong Kong border agents and police can demand device passwords, including from US citizens, under penalty of imprisonment — border controls become more invasive worldwide ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/hong-kong-border-agents-and-police-can-demand-device-passwords-under-penalty-of-imprisonment-border-controls-become-more-invasive-worldwide</link>
                                                                            <description>
                            <![CDATA[ Hong Kong border agents and police can demand device passwords under penalty of imprisonment ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">WR4YAYuh43WLLGtECb5Xbh</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/TSpSCNE2MAGpQM7j7WWNrc-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Sat, 28 Mar 2026 11:20:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Bruno Ferreira) ]]></author>                    <dc:creator><![CDATA[ Bruno Ferreira ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/TSpSCNE2MAGpQM7j7WWNrc-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Border agent checking boarding pass]]></media:description>                                                            <media:text><![CDATA[Border agent checking boarding pass]]></media:text>
                                <media:title type="plain"><![CDATA[Border agent checking boarding pass]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/TSpSCNE2MAGpQM7j7WWNrc-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ CanisterWorm malware wipes Iranian machines for no apparent reason — sophisticated attack spreads through npm packages and uses ICP canister as control surface ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/canisterworm-malware-wipes-iranian-machines-for-no-apparent-reason-sophisticated-attack-spreads-through-npm-packages-and-uses-icp-canister-as-control-surface</link>
                                                                            <description>
                            <![CDATA[ CanisterWorm malware wipes Iranian machines for no apparent reason ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">5YxqdkdEnYKnSob7DEbCFh</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/vxjuUgfLiBBpsbPbh5cmBT-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 26 Mar 2026 10:20:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Bruno Ferreira) ]]></author>                    <dc:creator><![CDATA[ Bruno Ferreira ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/vxjuUgfLiBBpsbPbh5cmBT-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Hacking]]></media:description>                                                            <media:text><![CDATA[Hacking]]></media:text>
                                <media:title type="plain"><![CDATA[Hacking]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/vxjuUgfLiBBpsbPbh5cmBT-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Flipper Zero pen-testing tool gets an AI-powered companion app — natural language interface allows for faster, easier hacking ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/flipper-zero-pen-testing-tool-gets-an-ai-powered-companion-app-natural-language-interface-allows-for-faster-easier-hacking</link>
                                                                            <description>
                            <![CDATA[ If controlling the notorious Flipper Zero pen-testing and hacking tool using its native interface is too difficult, a new AI-powered companion app for Android, called V3SP3R, is ready to help you make the most of it. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">p9amQPgNApYphjdUUwHX89</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/e6zsd7htE55ByzCT277B7Z-1280-80.png" type="image/png" length="0"></enclosure>
                                                                        <pubDate>Wed, 25 Mar 2026 10:00:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Bruno Ferreira) ]]></author>                    <dc:creator><![CDATA[ Bruno Ferreira ]]></dc:creator>                                                                                                    <media:content type="image/png" url="https://cdn.mos.cms.futurecdn.net/e6zsd7htE55ByzCT277B7Z-1280-80.png">
                                                            <media:credit><![CDATA[Flipper Zero]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Flipper Zero]]></media:description>                                                            <media:text><![CDATA[Flipper Zero]]></media:text>
                                <media:title type="plain"><![CDATA[Flipper Zero]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/e6zsd7htE55ByzCT277B7Z-1280-80.png" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ US Departments of Justice and Defense crush four massive botnets totaling 3,000,000 devices — botnets responsible for a combined 316,000 DDoS attacks globally ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/us-departments-of-justice-and-defense-crush-four-massive-botnets-totaling-3-million-devices-botnets-responsible-for-a-combined-316-000-ddos-attacks-globally</link>
                                                                            <description>
                            <![CDATA[ U.S. Departments of Justice and Defense take out four gigantic botnets with 3 million devices ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">nqtAAvxs3wTatV2xkYCogc</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/zTnDMvpQKf6L2sUkbDAn2P-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Sat, 21 Mar 2026 11:00:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Bruno Ferreira) ]]></author>                    <dc:creator><![CDATA[ Bruno Ferreira ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/zTnDMvpQKf6L2sUkbDAn2P-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Hacker]]></media:description>                                                            <media:text><![CDATA[Hacker]]></media:text>
                                <media:title type="plain"><![CDATA[Hacker]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/zTnDMvpQKf6L2sUkbDAn2P-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ North Korean fake IT army of 100,000 nets Kim Jong-Un a cool $500 million a year — NK-aligned workers infiltrated in IT companies worldwide, feeding the nation's revenue generation ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/north-korean-fake-it-army-of-100-000-nets-kim-jong-un-a-cool-usd500-million-a-year-nk-aligned-workers-infiltrated-in-it-companies-worldwide-feeding-the-nations-revenue-generation</link>
                                                                            <description>
                            <![CDATA[ North Korean army of IT workers infiltrates western companies to make money for the nation. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">MKFxBXoEE945XogFqEVNBS</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/jdTy7ENYDniggbFQwRVHLc-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 19 Mar 2026 10:40:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Bruno Ferreira) ]]></author>                    <dc:creator><![CDATA[ Bruno Ferreira ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/jdTy7ENYDniggbFQwRVHLc-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[IT worker hidden]]></media:description>                                                            <media:text><![CDATA[IT worker hidden]]></media:text>
                                <media:title type="plain"><![CDATA[IT worker hidden]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/jdTy7ENYDniggbFQwRVHLc-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Invisible malicious code attacks 151 GitHub repos and VS Code — Glassworm attack uses blockchain to steal tokens, credentials, and secrets ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/malicious-packages-using-invisible-unicode-found-in-151-github-repos-and-vs-code</link>
                                                                            <description>
                            <![CDATA[ The technique exploits Unicode Private Use Area characters, which render as zero-width whitespace in virtually every code editor and terminal. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">hk38x2RrfD8xsKho9iEFjJ</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/2Z9rxwcvZrC34RGiyKN9Tj-1280-80.png" type="image/png" length="0"></enclosure>
                                                                        <pubDate>Sat, 14 Mar 2026 14:11:38 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Luke James ]]></dc:creator>                                                                                                    <media:content type="image/png" url="https://cdn.mos.cms.futurecdn.net/2Z9rxwcvZrC34RGiyKN9Tj-1280-80.png">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[GitHub]]></media:description>                                                            <media:text><![CDATA[GitHub]]></media:text>
                                <media:title type="plain"><![CDATA[GitHub]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/2Z9rxwcvZrC34RGiyKN9Tj-1280-80.png" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ DoJ dismantles botnet made of 360,000 infected routers and IOT devices spread across 163 countries that ran for 16 years — SocksEscort proxy network eliminated in joint operation with Europol   ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/doj-dismantles-socksescort-proxy-network-that-ran-for-16-years-in-joint-operation-with-europol-botnet-comprised-360-000-infected-routers-and-iot-devices-across-163-countries</link>
                                                                            <description>
                            <![CDATA[ Long-running SocksEscort proxy network brought down by US-EU operation ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">sxbW785rbtUXV2R3eWoTsT</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/vALaxXCsBdhCKNjbe9Av6d-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Sat, 14 Mar 2026 11:00:00 +0000</pubDate>                                                                                                                                <updated>Sat, 14 Mar 2026 13:21:28 +0000</updated>
                                                                                                                                            <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Bruno Ferreira ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/vALaxXCsBdhCKNjbe9Av6d-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Computer network]]></media:description>                                                            <media:text><![CDATA[Computer network]]></media:text>
                                <media:title type="plain"><![CDATA[Computer network]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/vALaxXCsBdhCKNjbe9Av6d-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Zombie ZIP vulnerability lets compressed malware leisurely stroll past 95% of antivirus apps — security suites are blissfully unaware of security issue ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/zombie-zip-vulnerability-lets-compressed-malware-leisurely-stroll-past-95-percent-of-antivirus-apps-security-suites-are-blissfully-unaware-of-security-issue</link>
                                                                            <description>
                            <![CDATA[ Zombie ZIP vulnerability lets malware stroll past gates of 95% of AV suites ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">h4bqqRJnmc9thgps6RHxHL</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/q43TE2jqoGT3BH55WaF9ej-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 13 Mar 2026 10:40:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Bruno Ferreira ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/q43TE2jqoGT3BH55WaF9ej-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[ZIP]]></media:description>                                                            <media:text><![CDATA[ZIP]]></media:text>
                                <media:title type="plain"><![CDATA[ZIP]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/q43TE2jqoGT3BH55WaF9ej-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Iran hacking group claims attack on med-tech company Stryker — says over 200,000 devices have been wiped clean and over 50TB of data extracted ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/iran-hacking-group-claims-attack-on-med-tech-company-stryker-says-over-200-000-devices-have-been-wiped-clean-and-over-50tb-of-data-extracted</link>
                                                                            <description>
                            <![CDATA[ Stryker, a Fortune 500 medical technology company, has been hit with a massive cyberattack that allegedly saw over 200,000 devices wiped clean, affecting employees and operations across the globe. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">siTNKm6ZkDbuBXZSqehou3</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/3McKtxsbVZdQsP3afdZcwC-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 12 Mar 2026 12:58:14 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Jowi Morales) ]]></author>                    <dc:creator><![CDATA[ Jowi Morales ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/3McKtxsbVZdQsP3afdZcwC-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[the Stryker logo on a medical light]]></media:description>                                                            <media:text><![CDATA[the Stryker logo on a medical light]]></media:text>
                                <media:title type="plain"><![CDATA[the Stryker logo on a medical light]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/3McKtxsbVZdQsP3afdZcwC-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Intel's Heracles chip computes fully-encrypted data without decrypting it — chip is 1,074 to 5,547 times faster than a 24-core Intel Xeon in FHE math operations ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/intels-heracles-chip-computes-fully-encrypted-data-without-decrypting-it-chip-is-1-074-to-5-547-times-faster-than-a-24-core-intel-xeon-in-fhe-math-operations</link>
                                                                            <description>
                            <![CDATA[ Intel has revealed an 8192-way SIMD compute engine for fully homomorphic encryption math called Heracles. By operating directly on encrypted data, it has the potential to eliminate entire classes of attacks under some workloads. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">eSDGgwhF3fvgSNGpHaX8yi</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/G9hk45DFnrVKYb7Mw7DTUc-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 11 Mar 2026 11:48:33 +0000</pubDate>                                                                                                                                <updated>Wed, 11 Mar 2026 14:20:24 +0000</updated>
                                                                                                                                            <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ ashilov@gmail.com (Anton Shilov) ]]></author>                    <dc:creator><![CDATA[ Anton Shilov ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/G9hk45DFnrVKYb7Mw7DTUc-1280-80.jpg">
                                                            <media:credit><![CDATA[Intel]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Intel]]></media:description>                                                            <media:text><![CDATA[Intel]]></media:text>
                                <media:title type="plain"><![CDATA[Intel]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/G9hk45DFnrVKYb7Mw7DTUc-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Engineer receives $30,000 for exposing a vulnerability affecting 7,000 robot vacuum cleaners — tinkerer just wanted to drive his robot vacuum with a PS5 controller ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/engineer-receives-usd30-000-for-exposing-a-vulnerability-affecting-7-000-robot-vacuum-cleaners-tinkerer-just-wanted-to-drive-his-robot-vacuum-with-a-ps5-controller</link>
                                                                            <description>
                            <![CDATA[ A software engineer gets access to 7,000 DJI Romo robot vacuum cleaners while tinkering with an idea to use a gamepad to control his robotic hoover. Gets $30,000 from DJI for an undisclosed discovery. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">igT4w7jN2zS78iMkqSpWx8</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/3YLVmHEVAT526SAbBBPYMW-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Sat, 07 Mar 2026 15:12:26 +0000</pubDate>                                                                                                                                <updated>Sat, 07 Mar 2026 16:27:17 +0000</updated>
                                                                                                                                            <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ ashilov@gmail.com (Anton Shilov) ]]></author>                    <dc:creator><![CDATA[ Anton Shilov ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/3YLVmHEVAT526SAbBBPYMW-1280-80.jpg">
                                                            <media:credit><![CDATA[DJI]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[DJI]]></media:description>                                                            <media:text><![CDATA[DJI]]></media:text>
                                <media:title type="plain"><![CDATA[DJI]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/3YLVmHEVAT526SAbBBPYMW-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ DoJ, Europol, and others bring down LeakBase cybercrime site of 142,000 member, multiple arrests made — seized website reportedly among world's largest hacker forums ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/doj-europol-and-others-bring-down-leakbase-cybercrime-site-of-142-000-member-multiple-arrests-made-seized-website-reportedly-among-worlds-largest-hacker-forums</link>
                                                                            <description>
                            <![CDATA[ United States DoJ, Europol, and friends bring down LeakBase cybercrime forum ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">ho5BMGEb5hVPZn6HUHWU4F</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/RnwWfE5EESbJLbYBaiVbN3-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 06 Mar 2026 11:00:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Bruno Ferreira ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/RnwWfE5EESbJLbYBaiVbN3-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Cybercrime]]></media:description>                                                            <media:text><![CDATA[Cybercrime]]></media:text>
                                <media:title type="plain"><![CDATA[Cybercrime]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/RnwWfE5EESbJLbYBaiVbN3-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Researchers discover massive Wi-Fi vulnerability affecting multiple access points — AirSnitch lets attackers on the same network intercept data and launch machine-in-the-middle attacks ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/researchers-discover-massive-wi-fi-vulnerability-affecting-multiple-access-points-airsnitch-lets-attackers-on-the-same-network-intercept-data-and-launch-machine-in-the-middle-attacks</link>
                                                                            <description>
                            <![CDATA[ A team of researchers discovered that they can break cryptographic client isolation on a number of wireless routers by taking advantage of how Wi-Fi networks work. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">JRakozXZ9CfegyLB2FMAEj</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/XeaV8nHT7ywDCw4EZZXgdT-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 26 Feb 2026 19:02:58 +0000</pubDate>                                                                                                                                <updated>Fri, 27 Feb 2026 15:33:40 +0000</updated>
                                                                                                                                            <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Jowi Morales) ]]></author>                    <dc:creator><![CDATA[ Jowi Morales ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/XeaV8nHT7ywDCw4EZZXgdT-1280-80.jpg">
                                                            <media:credit><![CDATA[Tom&#039;s Hardware]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[TP-Link Archer BE400 Wi-Fi 7]]></media:description>                                                            <media:text><![CDATA[TP-Link Archer BE400 Wi-Fi 7]]></media:text>
                                <media:title type="plain"><![CDATA[TP-Link Archer BE400 Wi-Fi 7]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/XeaV8nHT7ywDCw4EZZXgdT-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ User accidentally gains control of over 6,700 robot vacuums while tinkering with their own device to enable control with a PlayStation controller — security flaw reveals floor plans and live video feeds ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/user-accidentally-gains-control-of-over-6-700-robot-vacuums-while-tinkering-with-their-own-device-to-enable-control-with-a-playstation-controller-security-flaw-reveals-floor-plans-and-live-video-feeds</link>
                                                                            <description>
                            <![CDATA[ An AI strategist used Claude Code to reverse engineer his robot vacuum and control it with a PlayStation controller, but it accidentally gave him control of thousands of similar devices spread all across the world. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">VCD8rCFcGSLEKZNNk4HgxY</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/4P6WZWu4Lfcumx83kXANq8-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 23 Feb 2026 11:00:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Jowi Morales) ]]></author>                    <dc:creator><![CDATA[ Jowi Morales ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/4P6WZWu4Lfcumx83kXANq8-1280-80.jpg">
                                                            <media:credit><![CDATA[DJI]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[DJI Romo robot vacuum]]></media:description>                                                            <media:text><![CDATA[DJI Romo robot vacuum]]></media:text>
                                <media:title type="plain"><![CDATA[DJI Romo robot vacuum]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/4P6WZWu4Lfcumx83kXANq8-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ $20 million lost in 'jackpotting' ATM malware attacks in 2025, FBI reports — scheme forces machines to spit out cash, targets banks and ATM operators ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/usd20-million-lost-in-jackpotting-atm-malware-attacks-in-2025-fbi-reports-scheme-forces-machines-to-spit-out-cash-targets-banks-and-atm-operators</link>
                                                                            <description>
                            <![CDATA[ The FBI released a public warning, saying that ATM "jackpotting" incidents have exponentially increased in 2025. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">WeNcNnaEpPBLLieRXk4ShJ</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/h4CyHnBws8tSaa5XjKib2K-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 20 Feb 2026 12:50:16 +0000</pubDate>                                                                                                                                <updated>Fri, 20 Feb 2026 13:39:14 +0000</updated>
                                                                                                                                            <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Jowi Morales) ]]></author>                    <dc:creator><![CDATA[ Jowi Morales ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/h4CyHnBws8tSaa5XjKib2K-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[person using ATM at night]]></media:description>                                                            <media:text><![CDATA[person using ATM at night]]></media:text>
                                <media:title type="plain"><![CDATA[person using ATM at night]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/h4CyHnBws8tSaa5XjKib2K-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ A 16-year-old intern helped Netgear catch scammers in India for $800 — Culprits would pose as Netgear employees & sell fake support packages to customers ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/a-16-year-old-intern-helped-netgear-catch-scammers-in-india-for-usd800-culprits-would-pose-as-netgear-employees-and-sell-fake-support-packages-to-customers</link>
                                                                            <description>
                            <![CDATA[ After scammers were successfully able to phish their way through Netgear customers for months, the company was forced to adopt a more unconventional cybersecurity measure: a 16-year-old intern named Wyatt. He was able to eventually lead the law firm to the source bank accounts of these scammers back in India. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">LwaKmZysgQ2W6RQ78cNgLG</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/XFasYVY2BDPZzNNSHQijmJ-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 19 Feb 2026 11:00:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Hassam Nasir) ]]></author>                    <dc:creator><![CDATA[ Hassam Nasir ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/XFasYVY2BDPZzNNSHQijmJ-1280-80.jpg">
                                                            <media:credit><![CDATA[Tom&#039;s Hardware]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Netgear Orbi 870]]></media:description>                                                            <media:text><![CDATA[Netgear Orbi 870]]></media:text>
                                <media:title type="plain"><![CDATA[Netgear Orbi 870]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/XFasYVY2BDPZzNNSHQijmJ-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Google reports that state hackers from China, Russia and Iran are using Gemini in 'all stages' of attacks — phishing lures, coding and vulnerability testing get AI underpinnings from hostile actors ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/google-reports-that-state-hackers-from-china-russia-and-iran-are-using-gemini-in-all-stages-of-attacks-phishing-lures-coding-and-vulnerability-testing-get-ai-underpinnings-from-hostile-actors</link>
                                                                            <description>
                            <![CDATA[ Hackers from Russian, China, India, North Korea, and elsewhere are using Google's Gemini AI to augment their attacks, Google says. From generating phishing lures, to translating text, coding, and vulnerability testing, Gemini is a core component of their hack attempts. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">RENSGSjPHYP9Z6uuqLoCff</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/zSTmkxn6F52i7GHFac5Wac-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 13 Feb 2026 14:06:42 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Jon Martindale ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/zSTmkxn6F52i7GHFac5Wac-1280-80.jpg">
                                                            <media:credit><![CDATA[Nur Photo via Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Gemini AI on a phone.]]></media:description>                                                            <media:text><![CDATA[Gemini AI on a phone.]]></media:text>
                                <media:title type="plain"><![CDATA[Gemini AI on a phone.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/zSTmkxn6F52i7GHFac5Wac-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Unofficial 7-zip.com website served up malware-laden downloads for over a week — infected PCs forced into a proxy botnet ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/unofficial-7-zip-com-website-served-up-malware-for-10-days-files-turned-pcs-into-a-proxy-botnet</link>
                                                                            <description>
                            <![CDATA[ Always get your wares from reputable sources. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">UhUiXtbL5mFrr3wjxKGE4m</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/MgvjDybqUb2CUUwwo9R23K-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 12 Feb 2026 11:20:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Bruno Ferreira ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/MgvjDybqUb2CUUwwo9R23K-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Trojan horse]]></media:description>                                                            <media:text><![CDATA[Trojan horse]]></media:text>
                                <media:title type="plain"><![CDATA[Trojan horse]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/MgvjDybqUb2CUUwwo9R23K-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ US Air Force bans use of smart glasses among its troops — earphones and other Bluetooth devices also limited to official duties while in uniform ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/us-air-force-bans-use-of-smart-glasses-among-its-troops-earbuds-and-other-bluetooth-devices-limited-to-official-duties</link>
                                                                            <description>
                            <![CDATA[ The U.S. Air Force is banning its personnel from using smart glasses while in uniform and limited the use of earbuds for official duties. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">Uwe5w6k9N2RojALGgki58Z</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/Z2yfqRmBY4iHzYAZ9oU35g-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 09 Feb 2026 14:39:23 +0000</pubDate>                                                                                                                                <updated>Mon, 09 Feb 2026 15:04:17 +0000</updated>
                                                                                                                                            <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Jowi Morales) ]]></author>                    <dc:creator><![CDATA[ Jowi Morales ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/Z2yfqRmBY4iHzYAZ9oU35g-1280-80.jpg">
                                                            <media:credit><![CDATA[Tom&#039;s Hardware]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Ray-Ban Meta Glasses]]></media:description>                                                            <media:text><![CDATA[Ray-Ban Meta Glasses]]></media:text>
                                <media:title type="plain"><![CDATA[Ray-Ban Meta Glasses]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/Z2yfqRmBY4iHzYAZ9oU35g-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Nitrogen ransomware programmers lock themselves out of a payment — key management bug encrypts victims' data forever ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/nitrogen-ransomware-programmers-lock-themselves-out-of-a-payment-key-management-bug-encrypts-victims-data-forever</link>
                                                                            <description>
                            <![CDATA[ Bug in Nitrogen ransomware locks victims' data way forever ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">WvUZh7ddG7VXjrjXoEiSnc</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/45vX9DjTwtJrXsYdnnGQFS-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Sat, 07 Feb 2026 12:00:00 +0000</pubDate>                                                                                                                                <updated>Sat, 07 Feb 2026 12:02:24 +0000</updated>
                                                                                                                                            <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Bruno Ferreira ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/45vX9DjTwtJrXsYdnnGQFS-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Keyboard random letters]]></media:description>                                                            <media:text><![CDATA[Keyboard random letters]]></media:text>
                                <media:title type="plain"><![CDATA[Keyboard random letters]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/45vX9DjTwtJrXsYdnnGQFS-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Security researcher says AMD auto-updater downloads software insecurely, enabling remote code execution — company rep reportedly said man-in-the-middle attacks are "out of scope," ignored bug ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/security-researcher-says-amd-auto-updater-downloads-software-insecurely-enabling-remote-code-execution-company-rep-reportedly-said-man-in-the-middle-attacks-are-out-of-scope-ignored-bug</link>
                                                                            <description>
                            <![CDATA[ AMD auto-update delivers software insecurely, company says MITM attacks are "out of scope" ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">fMERFeoLLeYkp2UxsoAHJh</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/yCcRs6y64wPXUdn4aVnG74-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Sat, 07 Feb 2026 11:54:51 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Bruno Ferreira ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/yCcRs6y64wPXUdn4aVnG74-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Cybersecurity - digital lock]]></media:description>                                                            <media:text><![CDATA[Cybersecurity - digital lock]]></media:text>
                                <media:title type="plain"><![CDATA[Cybersecurity - digital lock]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/yCcRs6y64wPXUdn4aVnG74-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ $40 million worth of crypto stolen from Step Finance — hackers compromise executives’ devices to gain illicit access ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/usd40-million-worth-of-crypto-stolen-from-step-finance-hackers-compromise-executives-devices-to-gain-illicit-access</link>
                                                                            <description>
                            <![CDATA[ DeFi platform Step Finance has been hit with a $40 million breach stemming from compromised devices used by its executive team. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">XokkUK499q98DxoHH2mKyL</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/gNYoHeSzjeAtyMtP9zbet9-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 05 Feb 2026 11:00:00 +0000</pubDate>                                                                                                                                <updated>Thu, 05 Feb 2026 13:45:17 +0000</updated>
                                                                                                                                            <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Jowi Morales) ]]></author>                    <dc:creator><![CDATA[ Jowi Morales ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/gNYoHeSzjeAtyMtP9zbet9-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Crypto Hacker]]></media:description>                                                            <media:text><![CDATA[Crypto Hacker]]></media:text>
                                <media:title type="plain"><![CDATA[Crypto Hacker]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/gNYoHeSzjeAtyMtP9zbet9-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Notepad++ update server hijacked in targeted attacks — outfit claims Chinese state-sponsored hackers may be to blame ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/notepad-update-server-hijacked-in-targeted-attacks</link>
                                                                            <description>
                            <![CDATA[ The Notepad++ project yesterday disclosed that its update server was covertly hijacked in a targeted supply chain attack that began in June 2025, ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">4d2vUvgCU58j44EyfAHtFN</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/N8oYPfZkxUfy8GAtCVHFkX-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 03 Feb 2026 11:14:56 +0000</pubDate>                                                                                                                                <updated>Tue, 03 Feb 2026 14:21:16 +0000</updated>
                                                                                                                                            <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Luke James ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/N8oYPfZkxUfy8GAtCVHFkX-1280-80.jpg">
                                                            <media:credit><![CDATA[Notepad++]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Notepad++]]></media:description>                                                            <media:text><![CDATA[Notepad++]]></media:text>
                                <media:title type="plain"><![CDATA[Notepad++]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/N8oYPfZkxUfy8GAtCVHFkX-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Malicious OpenClaw ‘skill’ targets crypto users on ClawHub — 14 malicious skills were uploaded to ClawHub last month  ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/malicious-moltbot-skill-targets-crypto-users-on-clawhub</link>
                                                                            <description>
                            <![CDATA[ Security researchers are warning that the growing ecosystem around ‘OpenClaw,’ the self-hosted AI assistant formerly known as Clawdbot, has already become a target for malware distribution. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">jrUA8hMxqy6PgUtXA2KbEK</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/87XEnkqpfZMn9mVWZqkXCg-1280-80.png" type="image/png" length="0"></enclosure>
                                                                        <pubDate>Sun, 01 Feb 2026 12:00:00 +0000</pubDate>                                                                                                                                <updated>Sun, 01 Feb 2026 12:43:55 +0000</updated>
                                                                                                                                            <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Luke James ]]></dc:creator>                                                                                                    <media:content type="image/png" url="https://cdn.mos.cms.futurecdn.net/87XEnkqpfZMn9mVWZqkXCg-1280-80.png">
                                                            <media:credit><![CDATA[OpenClaw]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[OpenClaw]]></media:description>                                                            <media:text><![CDATA[OpenClaw]]></media:text>
                                <media:title type="plain"><![CDATA[OpenClaw]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/87XEnkqpfZMn9mVWZqkXCg-1280-80.png" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ WinRAR exploit reportedly remains widely-used by China and Russia state actors despite patch — vulnerability allows malicious archives to deliver a hidden payload to Windows Startup folder ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/winrar-exploit-reportedly-remains-widely-used-by-china-and-russia-state-actors-despite-patch-vulnerability-allows-malicious-archives-to-deliver-hidden-payload-to-windows-startup-folder</link>
                                                                            <description>
                            <![CDATA[ Google says that a WinRAR exploit that has been patched six months ago remain a popular attack vector, especially for state-sponsored threat actors. The vulnerability allows malicious archives to install malware on critical Windows folders. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">rEwoWAuxhiw5pzbqTi7ivJ</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/2cW4WBmwu5gqLoyun4iXSe-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 29 Jan 2026 12:20:00 +0000</pubDate>                                                                                                                                <updated>Thu, 29 Jan 2026 12:44:37 +0000</updated>
                                                                                                                                            <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Jowi Morales) ]]></author>                    <dc:creator><![CDATA[ Jowi Morales ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/2cW4WBmwu5gqLoyun4iXSe-1280-80.jpg">
                                                            <media:credit><![CDATA[Tom&#039;s Hardware]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[WinRAR on Windows 11]]></media:description>                                                            <media:text><![CDATA[WinRAR on Windows 11]]></media:text>
                                <media:title type="plain"><![CDATA[WinRAR on Windows 11]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/2cW4WBmwu5gqLoyun4iXSe-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ AI-assisted cybersecurity team discovers 12 OpenSSL vulnerabilities, claims humans are the limiting factor — some vulnerabilities have been around for decades ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/ai-assisted-cybersecurity-team-discovers-12-openssl-vulnerabilities-claims-humans-are-the-limiting-factor-some-vulnerabilities-have-been-around-for-decades</link>
                                                                            <description>
                            <![CDATA[ OpenSSL is a security standard that protects most of the internet, and cybersecurity researchers have recently discovered vulnerabilities in the standard that have been lying undetected for decades. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">4NcwJhksgHpPV5ABpRdcfK</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/2MZ9jHEUzG2wRFR3gvSuNc-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 29 Jan 2026 11:40:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Aaron Klotz) ]]></author>                    <dc:creator><![CDATA[ Aaron Klotz ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/2MZ9jHEUzG2wRFR3gvSuNc-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[typing on keyboard]]></media:description>                                                            <media:text><![CDATA[typing on keyboard]]></media:text>
                                <media:title type="plain"><![CDATA[typing on keyboard]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/2MZ9jHEUzG2wRFR3gvSuNc-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Microsoft gave customers' BitLocker encryption keys to the FBI — Redmond confirms that it provides recovery keys to government agencies with valid legal orders ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/microsoft-gave-customers-bitlocker-encryption-keys-to-the-fbi-redmond-confirms-that-it-provides-recovery-keys-to-government-agencies-with-valid-legal-orders</link>
                                                                            <description>
                            <![CDATA[ Microsoft is said to have cooperated with the FBI and released the backup BitLocker encryption key of one user stored in its servers to the agency after receiving a valid search warrant. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">XEXGid6uhFdSNaqEPaLzVD</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/dExorkvrtUcUJXVm9qiaMC-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Sat, 24 Jan 2026 12:20:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Jowi Morales) ]]></author>                    <dc:creator><![CDATA[ Jowi Morales ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/dExorkvrtUcUJXVm9qiaMC-1280-80.jpg">
                                                            <media:credit><![CDATA[Microsoft]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Microsoft Bitlocker]]></media:description>                                                            <media:text><![CDATA[Microsoft Bitlocker]]></media:text>
                                <media:title type="plain"><![CDATA[Microsoft Bitlocker]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/dExorkvrtUcUJXVm9qiaMC-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Steam client allegedly continues sharing your status with your friends even if you set it ‘Offline,’ report claims — setting is a ‘UI illusion’ and your friends still receive real-time updates when you log on or log off ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/steam-client-allegedly-continues-sharing-your-status-with-your-friends-even-if-you-set-it-offline-report-claims-setting-is-a-ui-illusion-and-your-friends-still-receive-real-time-updates-when-you-log-on-or-log-off</link>
                                                                            <description>
                            <![CDATA[ An anonymous blog claims that your Steam client continues broadcasting your log-on and log-off times, regardless of your privacy status. Your friends' clients just hide your profile, but your log data is still stored on the devices of other people. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">mVQishfr9efhGC2jHaHrtg</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/56wTpWdP4bS6k6CiZm3oQG-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 21 Jan 2026 15:41:36 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Jowi Morales) ]]></author>                    <dc:creator><![CDATA[ Jowi Morales ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/56wTpWdP4bS6k6CiZm3oQG-1280-80.jpg">
                                                            <media:credit><![CDATA[Future]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Steam privacy]]></media:description>                                                            <media:text><![CDATA[Steam privacy]]></media:text>
                                <media:title type="plain"><![CDATA[Steam privacy]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/56wTpWdP4bS6k6CiZm3oQG-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Beijing blocks Chinese entities from using U.S. and Israeli cybersecurity software — VMWare and Fortinet among the affected vendors ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/beijing-blocks-chinese-entities-from-using-u-s-and-israeli-cybersecurity-software-vmware-and-fortinet-among-the-affected-vendors</link>
                                                                            <description>
                            <![CDATA[ China tells entities to ditch U.S. and Israeli cybersecurity software ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">GNVbFGRttS4meW2pq2oGx4</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/x3QbQfcy6tC5YTipAR5Fzb-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 15 Jan 2026 11:40:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Bruno Ferreira ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/x3QbQfcy6tC5YTipAR5Fzb-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty / d3sign]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Smartphone user]]></media:description>                                                            <media:text><![CDATA[Smartphone user]]></media:text>
                                <media:title type="plain"><![CDATA[Smartphone user]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/x3QbQfcy6tC5YTipAR5Fzb-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Samsung Magician SSD software ‘High Severity’ vulnerability patched — upgrade to the newest v9.0.0 to prevent potential DLL hijacking and privilege escalation ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/samsung-magician-ssd-software-high-severity-vulnerability-patched-upgrade-to-the-newest-v9-0-0-to-prevent-potential-dll-hijacking-and-privilege-escalation</link>
                                                                            <description>
                            <![CDATA[ Samsung has published a security advisory after a high-severity vulnerability was discovered in its Magician SSD management software on Windows. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">EDcKyCQNkY3wgwHCVk7JAb</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/bCU2J6hAEGrZ5Hwa94i38e-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 07 Jan 2026 10:00:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Mark Tyson ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/bCU2J6hAEGrZ5Hwa94i38e-1280-80.jpg">
                                                            <media:credit><![CDATA[Samsung]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Samsung Magician software]]></media:description>                                                            <media:text><![CDATA[Samsung Magician software]]></media:text>
                                <media:title type="plain"><![CDATA[Samsung Magician software]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/bCU2J6hAEGrZ5Hwa94i38e-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ U.S. cybersecurity experts plead guilty for ransomware attacks, face 20 years in prison each — group demanded up to $10 million from each victim ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/u-s-cybersecurity-experts-plead-guilty-for-ransomware-attacks-face-20-years-in-prison-each-group-demanded-up-to-usd10-million-from-each-victim</link>
                                                                            <description>
                            <![CDATA[ Two former cybersecurity experts pled guilty to conspiracy to obstruct commerce by extortion for deploying ransomware against several victims. The perpetrators are facing 20 years in prison each, with sentencing set in March 2026. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">R3T86qN6HQiuS8jLHYrWYK</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/j5wSes9VymTFLBkLCAqarH-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 30 Dec 2025 17:28:55 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Jowi Morales) ]]></author>                    <dc:creator><![CDATA[ Jowi Morales ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/j5wSes9VymTFLBkLCAqarH-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty / da-kuk]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[ransomware]]></media:description>                                                            <media:text><![CDATA[ransomware]]></media:text>
                                <media:title type="plain"><![CDATA[ransomware]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/j5wSes9VymTFLBkLCAqarH-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ FBI issues wanted notice for alleged North Korean remote IT workers accused of $900,000 crypto theft — $5 million reward up for grabs for information on DPRK-linked suspects ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/fbi-issues-wanted-notice-for-alleged-dprk-linked-remote-it-workers-accused-of-900k-crypto-theft</link>
                                                                            <description>
                            <![CDATA[ The FBI has published a public wanted notice naming four individuals accused of operating as fraudulent remote IT workers on behalf of North Korea. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">CJGLb8Um3KHwJVEftanUec</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/BB4m6F7puiNySjYkU5stDY-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 29 Dec 2025 12:00:00 +0000</pubDate>                                                                                                                                <updated>Mon, 29 Dec 2025 13:25:22 +0000</updated>
                                                                                                                                            <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Luke James ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/BB4m6F7puiNySjYkU5stDY-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[North Korean IT workers]]></media:description>                                                            <media:text><![CDATA[North Korean IT workers]]></media:text>
                                <media:title type="plain"><![CDATA[North Korean IT workers]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/BB4m6F7puiNySjYkU5stDY-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Interpol-led cybercrime crackdown results in 574 arrests in 19 African nations, decrypts six ransomware variants — Operation Sentinel disrupts rings that caused $21 million in losses, recovers $3 million ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/interpol-led-cybercrime-crackdown-results-in-574-arrests-in-19-african-nations-decrypts-six-ransomware-variants-operation-sentinel-disrupts-rings-that-caused-usd21-million-in-losses-recovers-usd3-million</link>
                                                                            <description>
                            <![CDATA[ Conducted between late October and November, Operation Sentinel saw international law enforcement agencies shut down cybercrime infrastructure, decrypt ransomware variants, and prevent large-scale financial losses across the region. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">mjDoRPHkrSWKy846tWiRYE</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/fb6V7B3uEXYtNoywxgCnoU-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 23 Dec 2025 16:03:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Kunal Khullar) ]]></author>                    <dc:creator><![CDATA[ Kunal Khullar ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/fb6V7B3uEXYtNoywxgCnoU-1280-80.jpg">
                                                            <media:credit><![CDATA[Interpol]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A group of people arrested in Benin for committing cyber fraud]]></media:description>                                                            <media:text><![CDATA[A group of people arrested in Benin for committing cyber fraud]]></media:text>
                                <media:title type="plain"><![CDATA[A group of people arrested in Benin for committing cyber fraud]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/fb6V7B3uEXYtNoywxgCnoU-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ US smart home company accused of rebranding footage-leaking Chinese cameras — Nebraska AG to sue Resideo over selling banned security cameras ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/us-smart-home-company-accused-of-rebranding-footage-leaking-chinese-cameras-nebraska-ag-to-sue-resideo-over-selling-banned-security-cameras</link>
                                                                            <description>
                            <![CDATA[ Resideo sued by Nebraska AG over rebranding footage-leaking Chinese cameras ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">vAbqtJW7hRGSEsSqds335P</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/iZ37YEjhD23SAXTnWdZUpG-1280-80.png" type="image/png" length="0"></enclosure>
                                                                        <pubDate>Tue, 23 Dec 2025 11:00:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Bruno Ferreira ]]></dc:creator>                                                                                                    <media:content type="image/png" url="https://cdn.mos.cms.futurecdn.net/iZ37YEjhD23SAXTnWdZUpG-1280-80.png">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Cybersecurity]]></media:description>                                                            <media:text><![CDATA[Cybersecurity]]></media:text>
                                <media:title type="plain"><![CDATA[Cybersecurity]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/iZ37YEjhD23SAXTnWdZUpG-1280-80.png" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ 1,000 computers taken offline in Romanian water management authority hack — ransomware takes Bitlocker-encrypted systems down ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/1-000-computers-taken-offline-in-romanian-water-management-authority-hack-ransomware-takes-bitlocker-encrypted-systems-down</link>
                                                                            <description>
                            <![CDATA[ No group has claimed the attack yet, and thankfully, water is still flowing in Romania. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">oSquCyPQctsoUwSZvfwzDn</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/QYAmhgoatrbDUvyD8ifkLA-1280-80.png" type="image/png" length="0"></enclosure>
                                                                        <pubDate>Mon, 22 Dec 2025 18:49:44 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Bruno Ferreira ]]></dc:creator>                                                                                                    <media:content type="image/png" url="https://cdn.mos.cms.futurecdn.net/QYAmhgoatrbDUvyD8ifkLA-1280-80.png">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Water pipes and valve]]></media:description>                                                            <media:text><![CDATA[Water pipes and valve]]></media:text>
                                <media:title type="plain"><![CDATA[Water pipes and valve]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/QYAmhgoatrbDUvyD8ifkLA-1280-80.png" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Over 1,800 North Korean applicants flood Amazon — suspected illicit applicants blocked by the company since April 2024 ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/north-korean-applicants-flood-amazon-over-1-800-suspected-illicit-applicants-blocked-by-the-company-since-april-2024</link>
                                                                            <description>
                            <![CDATA[ The Amazon CSO reported that the company has seen over 1,800 applicants that it suspects are North Koreans posing as Americans. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">EpGB6zFAGYZfAoACDcTHZc</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/BB4m6F7puiNySjYkU5stDY-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Sun, 21 Dec 2025 12:00:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Jowi Morales) ]]></author>                    <dc:creator><![CDATA[ Jowi Morales ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/BB4m6F7puiNySjYkU5stDY-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[North Korean IT workers]]></media:description>                                                            <media:text><![CDATA[North Korean IT workers]]></media:text>
                                <media:title type="plain"><![CDATA[North Korean IT workers]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/BB4m6F7puiNySjYkU5stDY-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ French authorities arrest man for installing malware on a passenger ferry on behalf of 'a foreign power' — could have enabled external control of systems, including navigation ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/french-ferry-malware-arrest-exposes-fragile-boundaries-between-ship-it-and-navigation-systems</link>
                                                                            <description>
                            <![CDATA[ French authorities have arrested a Latvian national suspected of installing malware aboard an Italian passenger ferry while it was docked in southern France. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">KaaqgBh7huG3KQUA2dgm8g</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/HsGBQQERBGFAZ95k4mKiMG-1280-80.png" type="image/png" length="0"></enclosure>
                                                                        <pubDate>Fri, 19 Dec 2025 11:30:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Luke James ]]></dc:creator>                                                                                                    <media:content type="image/png" url="https://cdn.mos.cms.futurecdn.net/HsGBQQERBGFAZ95k4mKiMG-1280-80.png">
                                                            <media:credit><![CDATA[Nicolas Parent/L&#039;Independant/MAXPPP]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[An Italian ferry, operated by GNV, docked in the South of France]]></media:description>                                                            <media:text><![CDATA[An Italian ferry, operated by GNV, docked in the South of France]]></media:text>
                                <media:title type="plain"><![CDATA[An Italian ferry, operated by GNV, docked in the South of France]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/HsGBQQERBGFAZ95k4mKiMG-1280-80.png" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ North Korean infiltrator caught working in Amazon IT department thanks to lag — 110ms keystroke input raises red flags over true location [Updated] ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/north-korean-infiltrator-caught-working-in-amazon-it-department-thanks-to-lag-110ms-keystroke-input-raises-red-flags-over-true-location</link>
                                                                            <description>
                            <![CDATA[ A North Korean imposter was uncovered, working as a sysadmin at Amazon U.S., after their keystroke input lag raised suspicions with security specialists at the online retail giant. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">vgFE9A7FQ2p2YpK263XjeC</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/aRjXjMzDAN8W8sgik9JXJY-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 18 Dec 2025 13:29:42 +0000</pubDate>                                                                                                                                <updated>Sun, 21 Dec 2025 14:18:47 +0000</updated>
                                                                                                                                            <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Mark Tyson ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/aRjXjMzDAN8W8sgik9JXJY-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty / michaklootwijk]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[North Korean enter key]]></media:description>                                                            <media:text><![CDATA[North Korean enter key]]></media:text>
                                <media:title type="plain"><![CDATA[North Korean enter key]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/aRjXjMzDAN8W8sgik9JXJY-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Germany summons Russian ambassador over GRU-linked cyberattacks — air traffic control and elections systems targeted ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/germany-summons-russian-ambassador-over-gru-linked-cyberattacks-on-atc-and-elections</link>
                                                                            <description>
                            <![CDATA[ Germany has formally summoned Russia’s ambassador in Berlin after publicly attributing a series of cyber and influence operations to Moscow’s GRU military intelligence agency. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">25wQwS6dQxaDmMebkXobnm</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/LAh9cyr7a9BiXv3zXTurZK-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Sat, 13 Dec 2025 13:00:00 +0000</pubDate>                                                                                                                                <updated>Sat, 13 Dec 2025 13:15:34 +0000</updated>
                                                                                                                                            <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Luke James ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/LAh9cyr7a9BiXv3zXTurZK-1280-80.jpg">
                                                            <media:credit><![CDATA[Microsoft]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[747 Flying through clouds]]></media:description>                                                            <media:text><![CDATA[747 Flying through clouds]]></media:text>
                                <media:title type="plain"><![CDATA[747 Flying through clouds]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/LAh9cyr7a9BiXv3zXTurZK-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ February report from researcher found Chinese KVM had an unclearly documented microphone and communicated with China-based servers, but many of the security issues are now addressed [Updated] ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/researcher-finds-undocumented-microphone-and-major-security-flaws-in-sipeed-nanokvm</link>
                                                                            <description>
                            <![CDATA[ A Slovenian security researcher published an analysis of Sipeed’s NanoKVM in Feburary that raises far-reaching concerns about the €30-€60 remote management device. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">PhB5J8WKHsd5qPHfgbPgUd</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/yPQ68jSZjWofH2ejud8y5G-1280-80.png" type="image/png" length="0"></enclosure>
                                                                        <pubDate>Mon, 08 Dec 2025 16:55:13 +0000</pubDate>                                                                                                                                <updated>Wed, 17 Dec 2025 11:39:22 +0000</updated>
                                                                                                                                            <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Luke James ]]></dc:creator>                                                                                                    <media:content type="image/png" url="https://cdn.mos.cms.futurecdn.net/yPQ68jSZjWofH2ejud8y5G-1280-80.png">
                                                            <media:credit><![CDATA[telefoncek.si]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A NanoKVM PCIe]]></media:description>                                                            <media:text><![CDATA[A NanoKVM PCIe]]></media:text>
                                <media:title type="plain"><![CDATA[A NanoKVM PCIe]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/yPQ68jSZjWofH2ejud8y5G-1280-80.png" />
                                                                                        </item>
            </channel>
</rss>