<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:dc="https://purl.org/dc/elements/1.1/"
     xmlns:dcterms="http://purl.org/dc/terms/"
     xmlns:media="http://search.yahoo.com/mrss/"
     xmlns:atom="http://www.w3.org/2005/Atom"
>
    <channel>
        <atom:link href="https://www.tomshardware.com/uk/feeds/tag/cyber-security" rel="self" type="application/rss+xml" />
                    <title><![CDATA[ Latest from Tom's Hardware UK in Cyber-security ]]></title>
                <link>https://www.tomshardware.com/uk/tech-industry/cyber-security</link>
        <description><![CDATA[ All the latest cyber-security content from the Tom's Hardware  UK team ]]></description>
                                    <lastBuildDate>Fri, 01 May 2026 19:15:21 +0000</lastBuildDate>
                            <language>en</language>
                                <item>
                                                            <title><![CDATA[ Canonical under sustained DDoS attack as Ubuntu 26 releases — Iranian group 313 Team claims responsibility ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/canonical-under-sustained-ddos-attack-as-ubuntu-26-releases-iranian-group-313-team-claims-responsibility</link>
                                                                            <description>
                            <![CDATA[ Canonical under sustained DDoS attack as Ubuntu 26 releases ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">WmrXUCij2ZksRJGZTjXLMS</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/8izzbmJ92toHHLyjU3ky2G-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 01 May 2026 19:15:21 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Bruno Ferreira) ]]></author>                    <dc:creator><![CDATA[ Bruno Ferreira ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/8izzbmJ92toHHLyjU3ky2G-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Data flow]]></media:description>                                                            <media:text><![CDATA[Data flow]]></media:text>
                                <media:title type="plain"><![CDATA[Data flow]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/8izzbmJ92toHHLyjU3ky2G-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Linux exploit instantly grants administrator access on most distributions since 2017 — cryptography optimization snafu grants root privileges to local users ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/linux-exploit-instantly-grants-administrator-access-on-most-distributions-since-2017-cryptography-optimization-snafu-grants-root-privileges-to-local-users</link>
                                                                            <description>
                            <![CDATA[ Zero-day exploit instantly grants administrator access on most Linux distributions since 2017 ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">5CQ9MXx7ETv3EjErv2iZbG</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/iMxEdJKjjPfdmwRbtJFnhh-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 01 May 2026 10:20:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Bruno Ferreira) ]]></author>                    <dc:creator><![CDATA[ Bruno Ferreira ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/iMxEdJKjjPfdmwRbtJFnhh-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Security vulnerability]]></media:description>                                                            <media:text><![CDATA[Security vulnerability]]></media:text>
                                <media:title type="plain"><![CDATA[Security vulnerability]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/iMxEdJKjjPfdmwRbtJFnhh-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Ransomware accidentally destroys all files larger than 128KB, preventing decryption — VECT code likely partly vibe coded with AI or used an old code base, security researchers suggest ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/ransomware-accidentally-destroys-all-files-larger-than-128kb-preventing-decryption-vect-code-likely-partly-vibe-coded-with-ai-or-used-an-old-code-base-security-researchers-suggest</link>
                                                                            <description>
                            <![CDATA[ A ransomware's major flaw meant that files cannot be decrypted because of a programming mistake. It also has several minor issues, showing that its creator may not be as sophisticated as suggested. Still, researchers point out that these can be rectified in future versions of the malware. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">Jn4Gbgu5mFDvbjP4FbeDgD</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/FRKea6agfJsYdo9T4XMVBT-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 29 Apr 2026 10:20:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Jowi Morales) ]]></author>                    <dc:creator><![CDATA[ Jowi Morales ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/FRKea6agfJsYdo9T4XMVBT-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A man receiving a ransomware attack on both his phone and laptop - a poor day for the stock image actor.]]></media:description>                                                            <media:text><![CDATA[A man receiving a ransomware attack on both his phone and laptop - a poor day for the stock image actor.]]></media:text>
                                <media:title type="plain"><![CDATA[A man receiving a ransomware attack on both his phone and laptop - a poor day for the stock image actor.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/FRKea6agfJsYdo9T4XMVBT-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Chernobyl virus turned 27 today, and it could brick your PC in ways modern malware can't by overwriting BIOS firmware ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/the-chernobyl-virus-turned-27-today-and-it-could-brick-your-pc-in-ways-modern-malware-cant</link>
                                                                            <description>
                            <![CDATA[ 27 years ago today, on April 26, 1999, a 1 KB virus called CIH detonated its payload on hundreds of thousands of Windows 9x machines worldwide. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">zMWCyFRUHXxRF8ym6zoQDH</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/s3xySUYCCzMbDfv5Ju3ze7-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Sun, 26 Apr 2026 13:36:47 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Luke James ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/s3xySUYCCzMbDfv5Ju3ze7-1280-80.jpg">
                                                            <media:credit><![CDATA[Brochure scanned by Swtpc6800]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Windows 1 brochure scan]]></media:description>                                                            <media:text><![CDATA[Windows 1 brochure scan]]></media:text>
                                <media:title type="plain"><![CDATA[Windows 1 brochure scan]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/s3xySUYCCzMbDfv5Ju3ze7-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Mobile SMS blasters in vehicles prowled Canadian streets, causing 13 million network disruptions and infiltrating tens of thousands of devices — blaster blocked 911 calls, stole cellphone data ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/sms-blasters-were-cruising-canadian-streets-stealing-cellphone-data-and-blocking-emergency-911-calls-project-lighthouse-infiltrated-tens-of-thousands-of-devices-and-caused-13-million-network-disruptions</link>
                                                                            <description>
                            <![CDATA[ The authorities say that the three individuals used the SMS blasters to send thousands of smishing messages. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">KXoWtETPhY8ZYH7DnryXef</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/buJ5cHLACxcBxRmmFQ8Sga-1280-80.png" type="image/png" length="0"></enclosure>
                                                                        <pubDate>Sun, 26 Apr 2026 11:00:00 +0000</pubDate>                                                                                                                                <updated>Sun, 26 Apr 2026 13:10:50 +0000</updated>
                                                                                                                                            <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Jowi Morales) ]]></author>                    <dc:creator><![CDATA[ Jowi Morales ]]></dc:creator>                                                                                                    <media:content type="image/png" url="https://cdn.mos.cms.futurecdn.net/buJ5cHLACxcBxRmmFQ8Sga-1280-80.png">
                                                            <media:credit><![CDATA[RDNE Stock Project/Pexels]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[a smishing text message on a phone]]></media:description>                                                            <media:text><![CDATA[a smishing text message on a phone]]></media:text>
                                <media:title type="plain"><![CDATA[a smishing text message on a phone]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/buJ5cHLACxcBxRmmFQ8Sga-1280-80.png" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ How a cavalcade of blunders gave unauthorized users access to Claude Mythos — restricted model accessed by third parties, thanks to knowledge from data breach ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/how-a-cavalcade-of-blunders-gave-unauthorized-users-access-to-claude-mythos-restricted-model-accessed-by-third-parties-thanks-to-knowledge-from-data-breach</link>
                                                                            <description>
                            <![CDATA[ Unauthorized individuals have accessed Anthropic's new Mythos cybersecurity-focused AI model, despite the developer locking it down to just a handful of companies. Considering the AI was purposefully designed to find zero-day exploits and offer viable fixes, the breach raises questions about Anthropic's own security, and why Mythos couldn't protect it. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">qfdji57PWajrXSvRH3FCam</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/oVkvRiLw6nfH6cD4HoJBhF-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 24 Apr 2026 15:12:08 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Jon Martindale ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/oVkvRiLw6nfH6cD4HoJBhF-1280-80.jpg">
                                                            <media:credit><![CDATA[Samuel Boivin/NurPhoto via Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[NSA logo with Anthropic logo on phone screen.]]></media:description>                                                            <media:text><![CDATA[NSA logo with Anthropic logo on phone screen.]]></media:text>
                                <media:title type="plain"><![CDATA[NSA logo with Anthropic logo on phone screen.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/oVkvRiLw6nfH6cD4HoJBhF-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ UK spy agency releases malware-blocking gadget for HDMI and DisplayPort cables — SilentGlass blocks malicious traffic traveling between display and computer ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/uk-spy-agency-releases-malware-blocking-gadget-for-hdmi-and-displayport-cables-silentglass-blocks-malicious-traffic-traveling-between-display-and-computer</link>
                                                                            <description>
                            <![CDATA[ The NCSC, a part of the British GCHQ, has deployed this protective gadget throughout various government estates and is now making it publicly available through Goldilock Labs. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">7BDf2MTBGEL5xBeqNXy8G6</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/CQ4CfTn7QLjSMf3oMbjYoX-1280-80.png" type="image/png" length="0"></enclosure>
                                                                        <pubDate>Thu, 23 Apr 2026 14:52:23 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Jowi Morales) ]]></author>                    <dc:creator><![CDATA[ Jowi Morales ]]></dc:creator>                                                                                                    <media:content type="image/png" url="https://cdn.mos.cms.futurecdn.net/CQ4CfTn7QLjSMf3oMbjYoX-1280-80.png">
                                                            <media:credit><![CDATA[NCSC]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[SilentGlass malware-over-HDMI/DP blocker]]></media:description>                                                            <media:text><![CDATA[SilentGlass malware-over-HDMI/DP blocker]]></media:text>
                                <media:title type="plain"><![CDATA[SilentGlass malware-over-HDMI/DP blocker]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/CQ4CfTn7QLjSMf3oMbjYoX-1280-80.png" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Ransomware negotiator pleads guilty after leaking victims' insurance details to 'BlackCat' hackers — perp gave attackers a precise picture of exactly how much each target could afford to pay ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/florida-man-pleads-guilty-after-leaking-victims-insurance-details-to-blackcat-hackers</link>
                                                                            <description>
                            <![CDATA[ Martino, of Land O’Lakes, Florida, is the third and final member of a trio of cybersecurity professionals charged in the scheme. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">Btw63xx9cNMMCqo8FLtW2Q</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/j5wSes9VymTFLBkLCAqarH-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 22 Apr 2026 12:22:35 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Luke James ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/j5wSes9VymTFLBkLCAqarH-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty / da-kuk]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[ransomware]]></media:description>                                                            <media:text><![CDATA[ransomware]]></media:text>
                                <media:title type="plain"><![CDATA[ransomware]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/j5wSes9VymTFLBkLCAqarH-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Iran claims US exploited networking equipment backdoors during strikes — says devices from Cisco and others failed despite blackout in attack that 'indicates deep sabotage' ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/iran-claims-us-exploited-networking-equipment-backdoors-during-strikes</link>
                                                                            <description>
                            <![CDATA[ Iranian state media has alleged that equipment from Cisco, Juniper, Fortinet, and MikroTik failed during U.S. and Israeli military operations against Iran. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">XuPv6SvnQu7E8g8gFjMwRF</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/3MENKrnKHBskAG4vmFGju5-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 22 Apr 2026 10:20:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Luke James ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/3MENKrnKHBskAG4vmFGju5-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty ]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Network cables and hub]]></media:description>                                                            <media:text><![CDATA[Network cables and hub]]></media:text>
                                <media:title type="plain"><![CDATA[Network cables and hub]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/3MENKrnKHBskAG4vmFGju5-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ AI cloud company Vercel breached after employee grants AI tool unrestricted access to Google Workspace — hacker seeking $2 million for stolen data  ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/vercel-breached-after-employee-grants-ai-tool-unrestricted-access-to-google-workspace</link>
                                                                            <description>
                            <![CDATA[ The breach exposed non-sensitive environment variables, and a threat actor operating under the ShinyHunters name has claimed responsibility. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">KhqPW7FcvADzCVGky7ac8b</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/JFVbbhwRYVQX9SY26qM8bd-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 20 Apr 2026 15:49:36 +0000</pubDate>                                                                                                                                <updated>Mon, 20 Apr 2026 18:07:54 +0000</updated>
                                                                                                                                            <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Luke James ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/JFVbbhwRYVQX9SY26qM8bd-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty ]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Hacker]]></media:description>                                                            <media:text><![CDATA[Hacker]]></media:text>
                                <media:title type="plain"><![CDATA[Hacker]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/JFVbbhwRYVQX9SY26qM8bd-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Bluetooth tracker hidden in a postcard and mailed to a warship exposed its location — $5 gadget put a $585 million Dutch ship at risk for 24 hours ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/bluetooth-tracker-hidden-in-a-postcard-and-mailed-to-a-warship-exposed-its-location-a-eur5-gadget-put-a-eur500-million-dutch-ship-at-risk-for-24-hours</link>
                                                                            <description>
                            <![CDATA[ A Dutch journalist mailed a postcard to a Dutch Navy ship containing a hidden Bluetooth tracker, allowing them to track its route for 24 hours before it was found and disabled. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">VAhirUkMNnMJZ6PBh2hre</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/mrDHs97dg7kKm8H7v2ZAUi-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Sat, 18 Apr 2026 14:24:07 +0000</pubDate>                                                                                                                                <updated>Sat, 18 Apr 2026 15:56:08 +0000</updated>
                                                                                                                                            <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Jowi Morales) ]]></author>                    <dc:creator><![CDATA[ Jowi Morales ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/mrDHs97dg7kKm8H7v2ZAUi-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Warship at sunset in the sea]]></media:description>                                                            <media:text><![CDATA[Warship at sunset in the sea]]></media:text>
                                <media:title type="plain"><![CDATA[Warship at sunset in the sea]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/mrDHs97dg7kKm8H7v2ZAUi-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Techie buys fake Ledger Nano S+ hardware crypto wallet and almost falls for phishing — a convincing clone would have caught newbies unaware ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/techie-buys-fake-ledger-nano-s-hardware-crypto-wallet-and-almost-falls-for-phishing-a-convincing-clone-would-have-caught-newbies-unaware</link>
                                                                            <description>
                            <![CDATA[ Cybersecurity expert finds counterfeit Ledger Nano S+ hardware wallets being sold in China. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">PhJHeJUTwYCMyoHpP3hdkX</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/yAFUwVQxy6zkrc7KSs65yD-1280-80.png" type="image/png" length="0"></enclosure>
                                                                        <pubDate>Sat, 18 Apr 2026 12:30:24 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Bruno Ferreira) ]]></author>                    <dc:creator><![CDATA[ Bruno Ferreira ]]></dc:creator>                                                                                                    <media:content type="image/png" url="https://cdn.mos.cms.futurecdn.net/yAFUwVQxy6zkrc7KSs65yD-1280-80.png">
                                                            <media:credit><![CDATA[Joje Mendes]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Fake Ledger Nano S+ hardware wallet]]></media:description>                                                            <media:text><![CDATA[Fake Ledger Nano S+ hardware wallet]]></media:text>
                                <media:title type="plain"><![CDATA[Fake Ledger Nano S+ hardware wallet]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/yAFUwVQxy6zkrc7KSs65yD-1280-80.png" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Rockstar Games confirms it was hacked by malicious group — 'ShinyHunters' takes credit, gives until April 14 to pay ransom or it will release confidential data ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/rockstar-games-confirms-it-was-hacked-by-malicious-group-shinyhunters-takes-credit-gives-until-april-14-to-pay-ransom-or-risk-leaking-confidential-data-shinyhunters</link>
                                                                            <description>
                            <![CDATA[ The hacker group "Shiny Hunters" has been able to breach Rockstar Games by accessing authentication tokens and getting inside the company's cloud infrastructure. The stolen data doesn't include any sensitive company or player information, according to a Rockstar spokesperson, but it's still being put up for ransom. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">qKdCXuCg5NsmAVv8pLma6U</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/fEhrMWXcANbZkYFRgR3UVm-1280-80.png" type="image/png" length="0"></enclosure>
                                                                        <pubDate>Sat, 11 Apr 2026 18:05:43 +0000</pubDate>                                                                                                                                <updated>Sat, 11 Apr 2026 21:14:50 +0000</updated>
                                                                                                                                            <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Hassam Nasir) ]]></author>                    <dc:creator><![CDATA[ Hassam Nasir ]]></dc:creator>                                                                                                    <media:content type="image/png" url="https://cdn.mos.cms.futurecdn.net/fEhrMWXcANbZkYFRgR3UVm-1280-80.png">
                                                            <media:credit><![CDATA[Rockstar Games]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A capture from the end of the first trailer of Rockstar Games&#039; Grand Theft Auto VI.]]></media:description>                                                            <media:text><![CDATA[A capture from the end of the first trailer of Rockstar Games&#039; Grand Theft Auto VI.]]></media:text>
                                <media:title type="plain"><![CDATA[A capture from the end of the first trailer of Rockstar Games&#039; Grand Theft Auto VI.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/fEhrMWXcANbZkYFRgR3UVm-1280-80.png" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ HWMonitor and CPU-Z developer CPUID breached by unknown attackers — cyberattack forced users to download malware instead of valid apps for six hours ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/hwmonitor-and-cpu-z-developer-cpuid-breached-by-unknown-attackers-cyberattack-forced-users-to-download-malware-instead-of-valid-apps-for-approximately-six-hours</link>
                                                                            <description>
                            <![CDATA[ Unknown attackers compromised the CPUID website, redirecting users to malware laden versions of popular tools. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">Zva4S5pQNWQnxHFpLe2QiY</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/WyRuWM6v9nNACodoiYTvYX-1280-80.png" type="image/png" length="0"></enclosure>
                                                                        <pubDate>Fri, 10 Apr 2026 16:27:15 +0000</pubDate>                                                                                                                                <updated>Fri, 10 Apr 2026 16:33:05 +0000</updated>
                                                                                                                                            <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Jowi Morales) ]]></author>                    <dc:creator><![CDATA[ Jowi Morales ]]></dc:creator>                                                                                                    <media:content type="image/png" url="https://cdn.mos.cms.futurecdn.net/WyRuWM6v9nNACodoiYTvYX-1280-80.png">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[a hand reaching out of a laptop screen]]></media:description>                                                            <media:text><![CDATA[a hand reaching out of a laptop screen]]></media:text>
                                <media:title type="plain"><![CDATA[a hand reaching out of a laptop screen]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/WyRuWM6v9nNACodoiYTvYX-1280-80.png" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ US cybersecurity agency issues an urgent alert as Iranian hackers attack critical infrastructure — CISA guidance warns organizations to immediately shield certain programmable logic controllers from the internet to thwart future attacks ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/us-cybersecurity-agency-issues-an-urgent-alert-as-iranian-hackers-attack-critical-infrastructure-cisa-guidance-warns-organizations-to-immediately-shield-certain-programmable-logic-controllers-from-the-internet-to-thwart-future-attacks</link>
                                                                            <description>
                            <![CDATA[ The U.S. Cybersecurity and Infrastructure Security Agency, in conjunction with the FBI and NSA, have issued an alert that Iranian-affiliated cyber attacks are threatening critical infrastructure, exploiting programmable logic controllers made by Rockwell Automation and Allen-Bradley to gain access. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">6ChCZD3KqmrE9gAvTbWwYF</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/Jb9RbVa8apvFGuYwvC5K24-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 10 Apr 2026 10:40:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Ben Stockton ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/Jb9RbVa8apvFGuYwvC5K24-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Cyber attacks]]></media:description>                                                            <media:text><![CDATA[Cyber attacks]]></media:text>
                                <media:title type="plain"><![CDATA[Cyber attacks]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/Jb9RbVa8apvFGuYwvC5K24-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Go maintainer joins collective klaxon about encryption-breaking quantum computers — developer urges immediate switch to post-quantum methods to prevent worldwide disaster ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/go-maintainer-joins-collective-klaxon-about-encryption-breaking-quantum-computers-developer-urges-immediate-switch-to-post-quantum-methods-to-prevent-worldwide-disaster</link>
                                                                            <description>
                            <![CDATA[ Go maintainer joins collective klaxon about encryption-breaking quantum computers and urges immediate switch to post-quantum methods to prevent disaster. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">oWU6HQGnMW3uuuMkkmWRmg</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/htHQLBnnmsjKyAaj9C44uD-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 09 Apr 2026 10:40:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Bruno Ferreira) ]]></author>                    <dc:creator><![CDATA[ Bruno Ferreira ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/htHQLBnnmsjKyAaj9C44uD-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Quantum computers]]></media:description>                                                            <media:text><![CDATA[Quantum computers]]></media:text>
                                <media:title type="plain"><![CDATA[Quantum computers]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/htHQLBnnmsjKyAaj9C44uD-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ $21 billion stolen from more than 1 million Americans due to cybercrime in 2025 — $11 billion come from stolen crypto, $8.6 billion taken from investment scams, while AI-related attacks cost $893 million ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/usd21-billion-stolen-from-more-than-1-million-americans-due-to-cybercrime-in-2025-usd11-billion-come-from-stolen-crypto-usd8-6-billion-taken-from-investment-scams-while-ai-related-attacks-cost-usd893-million</link>
                                                                            <description>
                            <![CDATA[ The FBI breaks down the $21 billion lost by over a million Americans through online scams, with more than half involving cryptocurrency. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">cMdQghS7Ng7qUqJugVMsJc</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/9YYr49MBVeBobTPW7raJWK-1280-80.png" type="image/png" length="0"></enclosure>
                                                                        <pubDate>Thu, 09 Apr 2026 10:00:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Jowi Morales) ]]></author>                    <dc:creator><![CDATA[ Jowi Morales ]]></dc:creator>                                                                                                    <media:content type="image/png" url="https://cdn.mos.cms.futurecdn.net/9YYr49MBVeBobTPW7raJWK-1280-80.png">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[a hacker calling a scam victim]]></media:description>                                                            <media:text><![CDATA[a hacker calling a scam victim]]></media:text>
                                <media:title type="plain"><![CDATA[a hacker calling a scam victim]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/9YYr49MBVeBobTPW7raJWK-1280-80.png" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ 10 petabytes of sensitive data stolen from China's National Supercomputing Center, hackers claim — daring heist would be largest ever China hack, covering 6,000 clients across science, defense, and beyond ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/10-petabytes-of-sensitive-data-stolen-from-chinas-national-supercomputing-center-hackers-claim-daring-heist-would-be-largest-ever-china-hack-covering-6-000-clients-across-science-defense-and-beyond</link>
                                                                            <description>
                            <![CDATA[ Hacker or hacker group steals secret data concerning aerospace engineering, bioinformatics, fusion modeling from China's National Supercomputing Center. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">dAuKEiJEC7ficTe2LV2ra4</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/foLY3NDKc2g2zqjwGgXPvc-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 09 Apr 2026 09:42:50 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ ashilov@gmail.com (Anton Shilov) ]]></author>                    <dc:creator><![CDATA[ Anton Shilov ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/foLY3NDKc2g2zqjwGgXPvc-1280-80.jpg">
                                                            <media:credit><![CDATA[Intel]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A security specialist]]></media:description>                                                            <media:text><![CDATA[A security specialist]]></media:text>
                                <media:title type="plain"><![CDATA[A security specialist]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/foLY3NDKc2g2zqjwGgXPvc-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Russian state hackers are hijacking TP-Link and MicroTik routers to steal Outlook credentials, cybersecurity center warns — APT28 group targets DNS and redirects traffic to attacker-controlled servers ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/ncsc-says-russian-gru-hackers-are-hijacking-tp-link-and-mikrotik-routers</link>
                                                                            <description>
                            <![CDATA[ The UK National Cyber Security Centre says that Russian state hackers have been exploiting vulnerable small office and home office routers since 2024 to overwrite their DHCP and DNS settings ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">eNvnhqHEKHDGHLu94fDBSU</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/Co6ZLWZpkb6GQGvf7VbqN9-1280-80.png" type="image/png" length="0"></enclosure>
                                                                        <pubDate>Wed, 08 Apr 2026 11:13:47 +0000</pubDate>                                                                                                                                <updated>Thu, 09 Apr 2026 16:08:22 +0000</updated>
                                                                                                                                            <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Luke James ]]></dc:creator>                                                                                                    <media:content type="image/png" url="https://cdn.mos.cms.futurecdn.net/Co6ZLWZpkb6GQGvf7VbqN9-1280-80.png">
                                                            <media:credit><![CDATA[Microsoft]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Outlook logo]]></media:description>                                                            <media:text><![CDATA[Outlook logo]]></media:text>
                                <media:title type="plain"><![CDATA[Outlook logo]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/Co6ZLWZpkb6GQGvf7VbqN9-1280-80.png" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ LinkedIn is spying on you, according to a new 'BrowserGate' security report — scripts stealthily scan visitors' browsers for over 6,000 Chrome extensions and harvest hardware data ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/software/browsers/linkedin-scans-visitors-browsers-for-over-6000-chrome-extensions-and-collects-device-data</link>
                                                                            <description>
                            <![CDATA[ LinkedIn is understood to inject a JavaScript fingerprinting script on every page load that probes visitors' browsers for 6,236 installed Chrome extensions and collects detailed device telemetry. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">TC6Bg8MX2MCRB3QtHomW8D</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/S4CAxayvctKvjehGtVneQe-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Sat, 04 Apr 2026 16:46:32 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Luke James ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/S4CAxayvctKvjehGtVneQe-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[LinkedIn]]></media:description>                                                            <media:text><![CDATA[LinkedIn]]></media:text>
                                <media:title type="plain"><![CDATA[LinkedIn]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/S4CAxayvctKvjehGtVneQe-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Google research suggests encryption technique used by Bitcoin will be cracked by quantum computers around 2029 — search giant says quantum attacks need to be prepared for now ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/google-research-suggests-encryption-technique-used-by-bitcoin-will-be-cracked-by-quantum-computers-around-2029-search-giant-says-quantum-attacks-need-to-be-prepared-for-now</link>
                                                                            <description>
                            <![CDATA[ New research from Google suggests that future quantum computers will develop quickly enough to pose a risk to elliptic-curve cryptography, used in cryptocurrencies like Bitcoin, as soon as 2029, and its researchers say action should be taken now to prepare. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">TL66qqptRetgfaCEN9WE26</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/g3kUrBQkgzFvkeeWpHuNo4-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 01 Apr 2026 09:00:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Bruno Ferreira) ]]></author>                    <dc:creator><![CDATA[ Bruno Ferreira ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/g3kUrBQkgzFvkeeWpHuNo4-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Quantum computer]]></media:description>                                                            <media:text><![CDATA[Quantum computer]]></media:text>
                                <media:title type="plain"><![CDATA[Quantum computer]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/g3kUrBQkgzFvkeeWpHuNo4-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ One of JavaScript's most popular libraries compromised by hackers — Axios npm package hit in supply chain attack that deployed a cross-platform RAT ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/axios-npm-package-compromised-in-supply-chain-attack-that-deployed-a-cross-platform-rat</link>
                                                                            <description>
                            <![CDATA[ An attacker compromised the npm account of a lead Axios maintainer on March 30, and used it to publish two malicious versions of the widely used JavaScript HTTP client library. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">v8tuDhQDoXnPFnXM5KkprH</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/S5kjaZoyn67xMew2JorcTD-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 31 Mar 2026 12:13:33 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Luke James ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/S5kjaZoyn67xMew2JorcTD-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Hacker]]></media:description>                                                            <media:text><![CDATA[Hacker]]></media:text>
                                <media:title type="plain"><![CDATA[Hacker]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/S5kjaZoyn67xMew2JorcTD-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Hong Kong border agents and police can demand device passwords, including from US citizens, under penalty of imprisonment — border controls become more invasive worldwide ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/hong-kong-border-agents-and-police-can-demand-device-passwords-under-penalty-of-imprisonment-border-controls-become-more-invasive-worldwide</link>
                                                                            <description>
                            <![CDATA[ Hong Kong border agents and police can demand device passwords under penalty of imprisonment ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">WR4YAYuh43WLLGtECb5Xbh</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/TSpSCNE2MAGpQM7j7WWNrc-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Sat, 28 Mar 2026 11:20:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Bruno Ferreira) ]]></author>                    <dc:creator><![CDATA[ Bruno Ferreira ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/TSpSCNE2MAGpQM7j7WWNrc-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Border agent checking boarding pass]]></media:description>                                                            <media:text><![CDATA[Border agent checking boarding pass]]></media:text>
                                <media:title type="plain"><![CDATA[Border agent checking boarding pass]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/TSpSCNE2MAGpQM7j7WWNrc-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ CanisterWorm malware wipes Iranian machines for no apparent reason — sophisticated attack spreads through npm packages and uses ICP canister as control surface ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/canisterworm-malware-wipes-iranian-machines-for-no-apparent-reason-sophisticated-attack-spreads-through-npm-packages-and-uses-icp-canister-as-control-surface</link>
                                                                            <description>
                            <![CDATA[ CanisterWorm malware wipes Iranian machines for no apparent reason ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">5YxqdkdEnYKnSob7DEbCFh</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/vxjuUgfLiBBpsbPbh5cmBT-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 26 Mar 2026 10:20:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Bruno Ferreira) ]]></author>                    <dc:creator><![CDATA[ Bruno Ferreira ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/vxjuUgfLiBBpsbPbh5cmBT-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Hacking]]></media:description>                                                            <media:text><![CDATA[Hacking]]></media:text>
                                <media:title type="plain"><![CDATA[Hacking]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/vxjuUgfLiBBpsbPbh5cmBT-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Flipper Zero pen-testing tool gets an AI-powered companion app — natural language interface allows for faster, easier hacking ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/flipper-zero-pen-testing-tool-gets-an-ai-powered-companion-app-natural-language-interface-allows-for-faster-easier-hacking</link>
                                                                            <description>
                            <![CDATA[ If controlling the notorious Flipper Zero pen-testing and hacking tool using its native interface is too difficult, a new AI-powered companion app for Android, called V3SP3R, is ready to help you make the most of it. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">p9amQPgNApYphjdUUwHX89</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/e6zsd7htE55ByzCT277B7Z-1280-80.png" type="image/png" length="0"></enclosure>
                                                                        <pubDate>Wed, 25 Mar 2026 10:00:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Bruno Ferreira) ]]></author>                    <dc:creator><![CDATA[ Bruno Ferreira ]]></dc:creator>                                                                                                    <media:content type="image/png" url="https://cdn.mos.cms.futurecdn.net/e6zsd7htE55ByzCT277B7Z-1280-80.png">
                                                            <media:credit><![CDATA[Flipper Zero]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Flipper Zero]]></media:description>                                                            <media:text><![CDATA[Flipper Zero]]></media:text>
                                <media:title type="plain"><![CDATA[Flipper Zero]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/e6zsd7htE55ByzCT277B7Z-1280-80.png" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ US Departments of Justice and Defense crush four massive botnets totaling 3,000,000 devices — botnets responsible for a combined 316,000 DDoS attacks globally ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/us-departments-of-justice-and-defense-crush-four-massive-botnets-totaling-3-million-devices-botnets-responsible-for-a-combined-316-000-ddos-attacks-globally</link>
                                                                            <description>
                            <![CDATA[ U.S. Departments of Justice and Defense take out four gigantic botnets with 3 million devices ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">nqtAAvxs3wTatV2xkYCogc</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/zTnDMvpQKf6L2sUkbDAn2P-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Sat, 21 Mar 2026 11:00:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Bruno Ferreira) ]]></author>                    <dc:creator><![CDATA[ Bruno Ferreira ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/zTnDMvpQKf6L2sUkbDAn2P-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Hacker]]></media:description>                                                            <media:text><![CDATA[Hacker]]></media:text>
                                <media:title type="plain"><![CDATA[Hacker]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/zTnDMvpQKf6L2sUkbDAn2P-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ North Korean fake IT army of 100,000 nets Kim Jong-Un a cool $500 million a year — NK-aligned workers infiltrated in IT companies worldwide, feeding the nation's revenue generation ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/north-korean-fake-it-army-of-100-000-nets-kim-jong-un-a-cool-usd500-million-a-year-nk-aligned-workers-infiltrated-in-it-companies-worldwide-feeding-the-nations-revenue-generation</link>
                                                                            <description>
                            <![CDATA[ North Korean army of IT workers infiltrates western companies to make money for the nation. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">MKFxBXoEE945XogFqEVNBS</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/jdTy7ENYDniggbFQwRVHLc-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 19 Mar 2026 10:40:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Bruno Ferreira) ]]></author>                    <dc:creator><![CDATA[ Bruno Ferreira ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/jdTy7ENYDniggbFQwRVHLc-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[IT worker hidden]]></media:description>                                                            <media:text><![CDATA[IT worker hidden]]></media:text>
                                <media:title type="plain"><![CDATA[IT worker hidden]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/jdTy7ENYDniggbFQwRVHLc-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Invisible malicious code attacks 151 GitHub repos and VS Code — Glassworm attack uses blockchain to steal tokens, credentials, and secrets ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/malicious-packages-using-invisible-unicode-found-in-151-github-repos-and-vs-code</link>
                                                                            <description>
                            <![CDATA[ The technique exploits Unicode Private Use Area characters, which render as zero-width whitespace in virtually every code editor and terminal. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">hk38x2RrfD8xsKho9iEFjJ</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/2Z9rxwcvZrC34RGiyKN9Tj-1280-80.png" type="image/png" length="0"></enclosure>
                                                                        <pubDate>Sat, 14 Mar 2026 14:11:38 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Luke James ]]></dc:creator>                                                                                                    <media:content type="image/png" url="https://cdn.mos.cms.futurecdn.net/2Z9rxwcvZrC34RGiyKN9Tj-1280-80.png">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[GitHub]]></media:description>                                                            <media:text><![CDATA[GitHub]]></media:text>
                                <media:title type="plain"><![CDATA[GitHub]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/2Z9rxwcvZrC34RGiyKN9Tj-1280-80.png" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ DoJ dismantles botnet made of 360,000 infected routers and IOT devices spread across 163 countries that ran for 16 years — SocksEscort proxy network eliminated in joint operation with Europol   ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/doj-dismantles-socksescort-proxy-network-that-ran-for-16-years-in-joint-operation-with-europol-botnet-comprised-360-000-infected-routers-and-iot-devices-across-163-countries</link>
                                                                            <description>
                            <![CDATA[ Long-running SocksEscort proxy network brought down by US-EU operation ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">sxbW785rbtUXV2R3eWoTsT</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/vALaxXCsBdhCKNjbe9Av6d-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Sat, 14 Mar 2026 11:00:00 +0000</pubDate>                                                                                                                                <updated>Sat, 14 Mar 2026 13:21:28 +0000</updated>
                                                                                                                                            <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Bruno Ferreira ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/vALaxXCsBdhCKNjbe9Av6d-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Computer network]]></media:description>                                                            <media:text><![CDATA[Computer network]]></media:text>
                                <media:title type="plain"><![CDATA[Computer network]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/vALaxXCsBdhCKNjbe9Av6d-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Zombie ZIP vulnerability lets compressed malware leisurely stroll past 95% of antivirus apps — security suites are blissfully unaware of security issue ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/zombie-zip-vulnerability-lets-compressed-malware-leisurely-stroll-past-95-percent-of-antivirus-apps-security-suites-are-blissfully-unaware-of-security-issue</link>
                                                                            <description>
                            <![CDATA[ Zombie ZIP vulnerability lets malware stroll past gates of 95% of AV suites ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">h4bqqRJnmc9thgps6RHxHL</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/q43TE2jqoGT3BH55WaF9ej-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 13 Mar 2026 10:40:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Bruno Ferreira ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/q43TE2jqoGT3BH55WaF9ej-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[ZIP]]></media:description>                                                            <media:text><![CDATA[ZIP]]></media:text>
                                <media:title type="plain"><![CDATA[ZIP]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/q43TE2jqoGT3BH55WaF9ej-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Iran hacking group claims attack on med-tech company Stryker — says over 200,000 devices have been wiped clean and over 50TB of data extracted ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/iran-hacking-group-claims-attack-on-med-tech-company-stryker-says-over-200-000-devices-have-been-wiped-clean-and-over-50tb-of-data-extracted</link>
                                                                            <description>
                            <![CDATA[ Stryker, a Fortune 500 medical technology company, has been hit with a massive cyberattack that allegedly saw over 200,000 devices wiped clean, affecting employees and operations across the globe. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">siTNKm6ZkDbuBXZSqehou3</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/3McKtxsbVZdQsP3afdZcwC-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 12 Mar 2026 12:58:14 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Jowi Morales) ]]></author>                    <dc:creator><![CDATA[ Jowi Morales ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/3McKtxsbVZdQsP3afdZcwC-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[the Stryker logo on a medical light]]></media:description>                                                            <media:text><![CDATA[the Stryker logo on a medical light]]></media:text>
                                <media:title type="plain"><![CDATA[the Stryker logo on a medical light]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/3McKtxsbVZdQsP3afdZcwC-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Intel's Heracles chip computes fully-encrypted data without decrypting it — chip is 1,074 to 5,547 times faster than a 24-core Intel Xeon in FHE math operations ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/intels-heracles-chip-computes-fully-encrypted-data-without-decrypting-it-chip-is-1-074-to-5-547-times-faster-than-a-24-core-intel-xeon-in-fhe-math-operations</link>
                                                                            <description>
                            <![CDATA[ Intel has revealed an 8192-way SIMD compute engine for fully homomorphic encryption math called Heracles. By operating directly on encrypted data, it has the potential to eliminate entire classes of attacks under some workloads. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">eSDGgwhF3fvgSNGpHaX8yi</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/G9hk45DFnrVKYb7Mw7DTUc-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 11 Mar 2026 11:48:33 +0000</pubDate>                                                                                                                                <updated>Wed, 11 Mar 2026 14:20:24 +0000</updated>
                                                                                                                                            <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ ashilov@gmail.com (Anton Shilov) ]]></author>                    <dc:creator><![CDATA[ Anton Shilov ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/G9hk45DFnrVKYb7Mw7DTUc-1280-80.jpg">
                                                            <media:credit><![CDATA[Intel]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Intel]]></media:description>                                                            <media:text><![CDATA[Intel]]></media:text>
                                <media:title type="plain"><![CDATA[Intel]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/G9hk45DFnrVKYb7Mw7DTUc-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Engineer receives $30,000 for exposing a vulnerability affecting 7,000 robot vacuum cleaners — tinkerer just wanted to drive his robot vacuum with a PS5 controller ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/engineer-receives-usd30-000-for-exposing-a-vulnerability-affecting-7-000-robot-vacuum-cleaners-tinkerer-just-wanted-to-drive-his-robot-vacuum-with-a-ps5-controller</link>
                                                                            <description>
                            <![CDATA[ A software engineer gets access to 7,000 DJI Romo robot vacuum cleaners while tinkering with an idea to use a gamepad to control his robotic hoover. Gets $30,000 from DJI for an undisclosed discovery. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">igT4w7jN2zS78iMkqSpWx8</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/3YLVmHEVAT526SAbBBPYMW-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Sat, 07 Mar 2026 15:12:26 +0000</pubDate>                                                                                                                                <updated>Sat, 07 Mar 2026 16:27:17 +0000</updated>
                                                                                                                                            <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ ashilov@gmail.com (Anton Shilov) ]]></author>                    <dc:creator><![CDATA[ Anton Shilov ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/3YLVmHEVAT526SAbBBPYMW-1280-80.jpg">
                                                            <media:credit><![CDATA[DJI]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[DJI]]></media:description>                                                            <media:text><![CDATA[DJI]]></media:text>
                                <media:title type="plain"><![CDATA[DJI]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/3YLVmHEVAT526SAbBBPYMW-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ DoJ, Europol, and others bring down LeakBase cybercrime site of 142,000 member, multiple arrests made — seized website reportedly among world's largest hacker forums ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/doj-europol-and-others-bring-down-leakbase-cybercrime-site-of-142-000-member-multiple-arrests-made-seized-website-reportedly-among-worlds-largest-hacker-forums</link>
                                                                            <description>
                            <![CDATA[ United States DoJ, Europol, and friends bring down LeakBase cybercrime forum ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">ho5BMGEb5hVPZn6HUHWU4F</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/RnwWfE5EESbJLbYBaiVbN3-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 06 Mar 2026 11:00:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Bruno Ferreira ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/RnwWfE5EESbJLbYBaiVbN3-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Cybercrime]]></media:description>                                                            <media:text><![CDATA[Cybercrime]]></media:text>
                                <media:title type="plain"><![CDATA[Cybercrime]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/RnwWfE5EESbJLbYBaiVbN3-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Researchers discover massive Wi-Fi vulnerability affecting multiple access points — AirSnitch lets attackers on the same network intercept data and launch machine-in-the-middle attacks ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/researchers-discover-massive-wi-fi-vulnerability-affecting-multiple-access-points-airsnitch-lets-attackers-on-the-same-network-intercept-data-and-launch-machine-in-the-middle-attacks</link>
                                                                            <description>
                            <![CDATA[ A team of researchers discovered that they can break cryptographic client isolation on a number of wireless routers by taking advantage of how Wi-Fi networks work. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">JRakozXZ9CfegyLB2FMAEj</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/XeaV8nHT7ywDCw4EZZXgdT-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 26 Feb 2026 19:02:58 +0000</pubDate>                                                                                                                                <updated>Fri, 27 Feb 2026 15:33:40 +0000</updated>
                                                                                                                                            <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Jowi Morales) ]]></author>                    <dc:creator><![CDATA[ Jowi Morales ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/XeaV8nHT7ywDCw4EZZXgdT-1280-80.jpg">
                                                            <media:credit><![CDATA[Tom&#039;s Hardware]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[TP-Link Archer BE400 Wi-Fi 7]]></media:description>                                                            <media:text><![CDATA[TP-Link Archer BE400 Wi-Fi 7]]></media:text>
                                <media:title type="plain"><![CDATA[TP-Link Archer BE400 Wi-Fi 7]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/XeaV8nHT7ywDCw4EZZXgdT-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ User accidentally gains control of over 6,700 robot vacuums while tinkering with their own device to enable control with a PlayStation controller — security flaw reveals floor plans and live video feeds ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/user-accidentally-gains-control-of-over-6-700-robot-vacuums-while-tinkering-with-their-own-device-to-enable-control-with-a-playstation-controller-security-flaw-reveals-floor-plans-and-live-video-feeds</link>
                                                                            <description>
                            <![CDATA[ An AI strategist used Claude Code to reverse engineer his robot vacuum and control it with a PlayStation controller, but it accidentally gave him control of thousands of similar devices spread all across the world. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">VCD8rCFcGSLEKZNNk4HgxY</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/4P6WZWu4Lfcumx83kXANq8-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 23 Feb 2026 11:00:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Jowi Morales) ]]></author>                    <dc:creator><![CDATA[ Jowi Morales ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/4P6WZWu4Lfcumx83kXANq8-1280-80.jpg">
                                                            <media:credit><![CDATA[DJI]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[DJI Romo robot vacuum]]></media:description>                                                            <media:text><![CDATA[DJI Romo robot vacuum]]></media:text>
                                <media:title type="plain"><![CDATA[DJI Romo robot vacuum]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/4P6WZWu4Lfcumx83kXANq8-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ $20 million lost in 'jackpotting' ATM malware attacks in 2025, FBI reports — scheme forces machines to spit out cash, targets banks and ATM operators ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/usd20-million-lost-in-jackpotting-atm-malware-attacks-in-2025-fbi-reports-scheme-forces-machines-to-spit-out-cash-targets-banks-and-atm-operators</link>
                                                                            <description>
                            <![CDATA[ The FBI released a public warning, saying that ATM "jackpotting" incidents have exponentially increased in 2025. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">WeNcNnaEpPBLLieRXk4ShJ</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/h4CyHnBws8tSaa5XjKib2K-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 20 Feb 2026 12:50:16 +0000</pubDate>                                                                                                                                <updated>Fri, 20 Feb 2026 13:39:14 +0000</updated>
                                                                                                                                            <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Jowi Morales) ]]></author>                    <dc:creator><![CDATA[ Jowi Morales ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/h4CyHnBws8tSaa5XjKib2K-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[person using ATM at night]]></media:description>                                                            <media:text><![CDATA[person using ATM at night]]></media:text>
                                <media:title type="plain"><![CDATA[person using ATM at night]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/h4CyHnBws8tSaa5XjKib2K-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ A 16-year-old intern helped Netgear catch scammers in India for $800 — Culprits would pose as Netgear employees & sell fake support packages to customers ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/a-16-year-old-intern-helped-netgear-catch-scammers-in-india-for-usd800-culprits-would-pose-as-netgear-employees-and-sell-fake-support-packages-to-customers</link>
                                                                            <description>
                            <![CDATA[ After scammers were successfully able to phish their way through Netgear customers for months, the company was forced to adopt a more unconventional cybersecurity measure: a 16-year-old intern named Wyatt. He was able to eventually lead the law firm to the source bank accounts of these scammers back in India. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">LwaKmZysgQ2W6RQ78cNgLG</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/XFasYVY2BDPZzNNSHQijmJ-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 19 Feb 2026 11:00:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Hassam Nasir) ]]></author>                    <dc:creator><![CDATA[ Hassam Nasir ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/XFasYVY2BDPZzNNSHQijmJ-1280-80.jpg">
                                                            <media:credit><![CDATA[Tom&#039;s Hardware]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Netgear Orbi 870]]></media:description>                                                            <media:text><![CDATA[Netgear Orbi 870]]></media:text>
                                <media:title type="plain"><![CDATA[Netgear Orbi 870]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/XFasYVY2BDPZzNNSHQijmJ-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Google reports that state hackers from China, Russia and Iran are using Gemini in 'all stages' of attacks — phishing lures, coding and vulnerability testing get AI underpinnings from hostile actors ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/google-reports-that-state-hackers-from-china-russia-and-iran-are-using-gemini-in-all-stages-of-attacks-phishing-lures-coding-and-vulnerability-testing-get-ai-underpinnings-from-hostile-actors</link>
                                                                            <description>
                            <![CDATA[ Hackers from Russian, China, India, North Korea, and elsewhere are using Google's Gemini AI to augment their attacks, Google says. From generating phishing lures, to translating text, coding, and vulnerability testing, Gemini is a core component of their hack attempts. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">RENSGSjPHYP9Z6uuqLoCff</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/zSTmkxn6F52i7GHFac5Wac-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 13 Feb 2026 14:06:42 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Jon Martindale ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/zSTmkxn6F52i7GHFac5Wac-1280-80.jpg">
                                                            <media:credit><![CDATA[Nur Photo via Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Gemini AI on a phone.]]></media:description>                                                            <media:text><![CDATA[Gemini AI on a phone.]]></media:text>
                                <media:title type="plain"><![CDATA[Gemini AI on a phone.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/zSTmkxn6F52i7GHFac5Wac-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Unofficial 7-zip.com website served up malware-laden downloads for over a week — infected PCs forced into a proxy botnet ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/unofficial-7-zip-com-website-served-up-malware-for-10-days-files-turned-pcs-into-a-proxy-botnet</link>
                                                                            <description>
                            <![CDATA[ Always get your wares from reputable sources. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">UhUiXtbL5mFrr3wjxKGE4m</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/MgvjDybqUb2CUUwwo9R23K-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 12 Feb 2026 11:20:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Bruno Ferreira ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/MgvjDybqUb2CUUwwo9R23K-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Trojan horse]]></media:description>                                                            <media:text><![CDATA[Trojan horse]]></media:text>
                                <media:title type="plain"><![CDATA[Trojan horse]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/MgvjDybqUb2CUUwwo9R23K-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ US Air Force bans use of smart glasses among its troops — earphones and other Bluetooth devices also limited to official duties while in uniform ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/us-air-force-bans-use-of-smart-glasses-among-its-troops-earbuds-and-other-bluetooth-devices-limited-to-official-duties</link>
                                                                            <description>
                            <![CDATA[ The U.S. Air Force is banning its personnel from using smart glasses while in uniform and limited the use of earbuds for official duties. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">Uwe5w6k9N2RojALGgki58Z</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/Z2yfqRmBY4iHzYAZ9oU35g-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 09 Feb 2026 14:39:23 +0000</pubDate>                                                                                                                                <updated>Mon, 09 Feb 2026 15:04:17 +0000</updated>
                                                                                                                                            <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Jowi Morales) ]]></author>                    <dc:creator><![CDATA[ Jowi Morales ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/Z2yfqRmBY4iHzYAZ9oU35g-1280-80.jpg">
                                                            <media:credit><![CDATA[Tom&#039;s Hardware]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Ray-Ban Meta Glasses]]></media:description>                                                            <media:text><![CDATA[Ray-Ban Meta Glasses]]></media:text>
                                <media:title type="plain"><![CDATA[Ray-Ban Meta Glasses]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/Z2yfqRmBY4iHzYAZ9oU35g-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Nitrogen ransomware programmers lock themselves out of a payment — key management bug encrypts victims' data forever ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/nitrogen-ransomware-programmers-lock-themselves-out-of-a-payment-key-management-bug-encrypts-victims-data-forever</link>
                                                                            <description>
                            <![CDATA[ Bug in Nitrogen ransomware locks victims' data way forever ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">WvUZh7ddG7VXjrjXoEiSnc</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/45vX9DjTwtJrXsYdnnGQFS-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Sat, 07 Feb 2026 12:00:00 +0000</pubDate>                                                                                                                                <updated>Sat, 07 Feb 2026 12:02:24 +0000</updated>
                                                                                                                                            <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Bruno Ferreira ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/45vX9DjTwtJrXsYdnnGQFS-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Keyboard random letters]]></media:description>                                                            <media:text><![CDATA[Keyboard random letters]]></media:text>
                                <media:title type="plain"><![CDATA[Keyboard random letters]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/45vX9DjTwtJrXsYdnnGQFS-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Security researcher says AMD auto-updater downloads software insecurely, enabling remote code execution — company rep reportedly said man-in-the-middle attacks are "out of scope," ignored bug ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/security-researcher-says-amd-auto-updater-downloads-software-insecurely-enabling-remote-code-execution-company-rep-reportedly-said-man-in-the-middle-attacks-are-out-of-scope-ignored-bug</link>
                                                                            <description>
                            <![CDATA[ AMD auto-update delivers software insecurely, company says MITM attacks are "out of scope" ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">fMERFeoLLeYkp2UxsoAHJh</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/yCcRs6y64wPXUdn4aVnG74-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Sat, 07 Feb 2026 11:54:51 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Bruno Ferreira ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/yCcRs6y64wPXUdn4aVnG74-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Cybersecurity - digital lock]]></media:description>                                                            <media:text><![CDATA[Cybersecurity - digital lock]]></media:text>
                                <media:title type="plain"><![CDATA[Cybersecurity - digital lock]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/yCcRs6y64wPXUdn4aVnG74-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ $40 million worth of crypto stolen from Step Finance — hackers compromise executives’ devices to gain illicit access ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/usd40-million-worth-of-crypto-stolen-from-step-finance-hackers-compromise-executives-devices-to-gain-illicit-access</link>
                                                                            <description>
                            <![CDATA[ DeFi platform Step Finance has been hit with a $40 million breach stemming from compromised devices used by its executive team. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">XokkUK499q98DxoHH2mKyL</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/gNYoHeSzjeAtyMtP9zbet9-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 05 Feb 2026 11:00:00 +0000</pubDate>                                                                                                                                <updated>Thu, 05 Feb 2026 13:45:17 +0000</updated>
                                                                                                                                            <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Jowi Morales) ]]></author>                    <dc:creator><![CDATA[ Jowi Morales ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/gNYoHeSzjeAtyMtP9zbet9-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Crypto Hacker]]></media:description>                                                            <media:text><![CDATA[Crypto Hacker]]></media:text>
                                <media:title type="plain"><![CDATA[Crypto Hacker]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/gNYoHeSzjeAtyMtP9zbet9-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Notepad++ update server hijacked in targeted attacks — outfit claims Chinese state-sponsored hackers may be to blame ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/notepad-update-server-hijacked-in-targeted-attacks</link>
                                                                            <description>
                            <![CDATA[ The Notepad++ project yesterday disclosed that its update server was covertly hijacked in a targeted supply chain attack that began in June 2025, ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">4d2vUvgCU58j44EyfAHtFN</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/N8oYPfZkxUfy8GAtCVHFkX-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 03 Feb 2026 11:14:56 +0000</pubDate>                                                                                                                                <updated>Tue, 03 Feb 2026 14:21:16 +0000</updated>
                                                                                                                                            <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Luke James ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/N8oYPfZkxUfy8GAtCVHFkX-1280-80.jpg">
                                                            <media:credit><![CDATA[Notepad++]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Notepad++]]></media:description>                                                            <media:text><![CDATA[Notepad++]]></media:text>
                                <media:title type="plain"><![CDATA[Notepad++]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/N8oYPfZkxUfy8GAtCVHFkX-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Malicious OpenClaw ‘skill’ targets crypto users on ClawHub — 14 malicious skills were uploaded to ClawHub last month  ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/malicious-moltbot-skill-targets-crypto-users-on-clawhub</link>
                                                                            <description>
                            <![CDATA[ Security researchers are warning that the growing ecosystem around ‘OpenClaw,’ the self-hosted AI assistant formerly known as Clawdbot, has already become a target for malware distribution. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">jrUA8hMxqy6PgUtXA2KbEK</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/87XEnkqpfZMn9mVWZqkXCg-1280-80.png" type="image/png" length="0"></enclosure>
                                                                        <pubDate>Sun, 01 Feb 2026 12:00:00 +0000</pubDate>                                                                                                                                <updated>Sun, 01 Feb 2026 12:43:55 +0000</updated>
                                                                                                                                            <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Luke James ]]></dc:creator>                                                                                                    <media:content type="image/png" url="https://cdn.mos.cms.futurecdn.net/87XEnkqpfZMn9mVWZqkXCg-1280-80.png">
                                                            <media:credit><![CDATA[OpenClaw]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[OpenClaw]]></media:description>                                                            <media:text><![CDATA[OpenClaw]]></media:text>
                                <media:title type="plain"><![CDATA[OpenClaw]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/87XEnkqpfZMn9mVWZqkXCg-1280-80.png" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ WinRAR exploit reportedly remains widely-used by China and Russia state actors despite patch — vulnerability allows malicious archives to deliver a hidden payload to Windows Startup folder ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/winrar-exploit-reportedly-remains-widely-used-by-china-and-russia-state-actors-despite-patch-vulnerability-allows-malicious-archives-to-deliver-hidden-payload-to-windows-startup-folder</link>
                                                                            <description>
                            <![CDATA[ Google says that a WinRAR exploit that has been patched six months ago remain a popular attack vector, especially for state-sponsored threat actors. The vulnerability allows malicious archives to install malware on critical Windows folders. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">rEwoWAuxhiw5pzbqTi7ivJ</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/2cW4WBmwu5gqLoyun4iXSe-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 29 Jan 2026 12:20:00 +0000</pubDate>                                                                                                                                <updated>Thu, 29 Jan 2026 12:44:37 +0000</updated>
                                                                                                                                            <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Jowi Morales) ]]></author>                    <dc:creator><![CDATA[ Jowi Morales ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/2cW4WBmwu5gqLoyun4iXSe-1280-80.jpg">
                                                            <media:credit><![CDATA[Tom&#039;s Hardware]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[WinRAR on Windows 11]]></media:description>                                                            <media:text><![CDATA[WinRAR on Windows 11]]></media:text>
                                <media:title type="plain"><![CDATA[WinRAR on Windows 11]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/2cW4WBmwu5gqLoyun4iXSe-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ AI-assisted cybersecurity team discovers 12 OpenSSL vulnerabilities, claims humans are the limiting factor — some vulnerabilities have been around for decades ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/ai-assisted-cybersecurity-team-discovers-12-openssl-vulnerabilities-claims-humans-are-the-limiting-factor-some-vulnerabilities-have-been-around-for-decades</link>
                                                                            <description>
                            <![CDATA[ OpenSSL is a security standard that protects most of the internet, and cybersecurity researchers have recently discovered vulnerabilities in the standard that have been lying undetected for decades. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">4NcwJhksgHpPV5ABpRdcfK</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/2MZ9jHEUzG2wRFR3gvSuNc-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 29 Jan 2026 11:40:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Aaron Klotz) ]]></author>                    <dc:creator><![CDATA[ Aaron Klotz ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/2MZ9jHEUzG2wRFR3gvSuNc-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[typing on keyboard]]></media:description>                                                            <media:text><![CDATA[typing on keyboard]]></media:text>
                                <media:title type="plain"><![CDATA[typing on keyboard]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/2MZ9jHEUzG2wRFR3gvSuNc-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Microsoft gave customers' BitLocker encryption keys to the FBI — Redmond confirms that it provides recovery keys to government agencies with valid legal orders ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/microsoft-gave-customers-bitlocker-encryption-keys-to-the-fbi-redmond-confirms-that-it-provides-recovery-keys-to-government-agencies-with-valid-legal-orders</link>
                                                                            <description>
                            <![CDATA[ Microsoft is said to have cooperated with the FBI and released the backup BitLocker encryption key of one user stored in its servers to the agency after receiving a valid search warrant. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">XEXGid6uhFdSNaqEPaLzVD</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/dExorkvrtUcUJXVm9qiaMC-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Sat, 24 Jan 2026 12:20:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Jowi Morales) ]]></author>                    <dc:creator><![CDATA[ Jowi Morales ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/dExorkvrtUcUJXVm9qiaMC-1280-80.jpg">
                                                            <media:credit><![CDATA[Microsoft]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Microsoft Bitlocker]]></media:description>                                                            <media:text><![CDATA[Microsoft Bitlocker]]></media:text>
                                <media:title type="plain"><![CDATA[Microsoft Bitlocker]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/dExorkvrtUcUJXVm9qiaMC-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Steam client allegedly continues sharing your status with your friends even if you set it ‘Offline,’ report claims — setting is a ‘UI illusion’ and your friends still receive real-time updates when you log on or log off ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/steam-client-allegedly-continues-sharing-your-status-with-your-friends-even-if-you-set-it-offline-report-claims-setting-is-a-ui-illusion-and-your-friends-still-receive-real-time-updates-when-you-log-on-or-log-off</link>
                                                                            <description>
                            <![CDATA[ An anonymous blog claims that your Steam client continues broadcasting your log-on and log-off times, regardless of your privacy status. Your friends' clients just hide your profile, but your log data is still stored on the devices of other people. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">mVQishfr9efhGC2jHaHrtg</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/56wTpWdP4bS6k6CiZm3oQG-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 21 Jan 2026 15:41:36 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Jowi Morales) ]]></author>                    <dc:creator><![CDATA[ Jowi Morales ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/56wTpWdP4bS6k6CiZm3oQG-1280-80.jpg">
                                                            <media:credit><![CDATA[Future]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Steam privacy]]></media:description>                                                            <media:text><![CDATA[Steam privacy]]></media:text>
                                <media:title type="plain"><![CDATA[Steam privacy]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/56wTpWdP4bS6k6CiZm3oQG-1280-80.jpg" />
                                                                                        </item>
            </channel>
</rss>