<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:dc="https://purl.org/dc/elements/1.1/"
     xmlns:dcterms="http://purl.org/dc/terms/"
     xmlns:media="http://search.yahoo.com/mrss/"
     xmlns:atom="http://www.w3.org/2005/Atom"
>
    <channel>
        <atom:link href="https://www.tomshardware.com/uk/feeds/tag/security" rel="self" type="application/rss+xml" />
                    <title><![CDATA[ Latest from Tom's Hardware UK in Security ]]></title>
                <link>https://www.tomshardware.com/tag/security</link>
        <description><![CDATA[ All the latest security content from the Tom's Hardware  UK team ]]></description>
                                    <lastBuildDate>Sun, 15 Mar 2026 15:17:30 +0000</lastBuildDate>
                            <language>en</language>
                                <item>
                                                            <title><![CDATA[ Microsoft’s ‘unhackable’ Xbox One has been hacked by 'Bliss' — the 2013 console finally fell to voltage glitching, allowing the loading of unsigned code at every level ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/video-games/console-gaming/microsofts-unhackable-xbox-one-has-been-hacked-by-bliss-the-2013-console-finally-fell-to-voltage-glitching-allowing-the-loading-of-unsigned-code-at-every-level</link>
                                                                            <description>
                            <![CDATA[ A groundbreaking hack for Microsoft’s ‘unhackable’ Xbox One was revealed at the recent RE//verse 2026 conference. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">DKif3a757n6a7khnjo4mdi</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/rZ7dRyfYH7ZD7yApRmNiva-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Sun, 15 Mar 2026 15:17:30 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Console Gaming]]></category>
                                                    <category><![CDATA[Video Games]]></category>
                                                                                                                    <dc:creator><![CDATA[ Mark Tyson ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/rZ7dRyfYH7ZD7yApRmNiva-1280-80.jpg">
                                                            <media:credit><![CDATA[Markus ‘Doom’ Gaasedelen video presentation]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[The Bliss Xbox One hack]]></media:description>                                                            <media:text><![CDATA[The Bliss Xbox One hack]]></media:text>
                                <media:title type="plain"><![CDATA[The Bliss Xbox One hack]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/rZ7dRyfYH7ZD7yApRmNiva-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ DoJ dismantles botnet made of 360,000 infected routers and IOT devices spread across 163 countries that ran for 16 years — SocksEscort proxy network eliminated in joint operation with Europol   ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/doj-dismantles-socksescort-proxy-network-that-ran-for-16-years-in-joint-operation-with-europol-botnet-comprised-360-000-infected-routers-and-iot-devices-across-163-countries</link>
                                                                            <description>
                            <![CDATA[ Long-running SocksEscort proxy network brought down by US-EU operation ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">sxbW785rbtUXV2R3eWoTsT</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/vALaxXCsBdhCKNjbe9Av6d-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Sat, 14 Mar 2026 11:00:00 +0000</pubDate>                                                                                                                                <updated>Sat, 14 Mar 2026 13:21:28 +0000</updated>
                                                                                                                                            <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Bruno Ferreira ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/vALaxXCsBdhCKNjbe9Av6d-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Computer network]]></media:description>                                                            <media:text><![CDATA[Computer network]]></media:text>
                                <media:title type="plain"><![CDATA[Computer network]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/vALaxXCsBdhCKNjbe9Av6d-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ User accidentally gains control of over 6,700 robot vacuums while tinkering with their own device to enable control with a PlayStation controller — security flaw reveals floor plans and live video feeds ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/user-accidentally-gains-control-of-over-6-700-robot-vacuums-while-tinkering-with-their-own-device-to-enable-control-with-a-playstation-controller-security-flaw-reveals-floor-plans-and-live-video-feeds</link>
                                                                            <description>
                            <![CDATA[ An AI strategist used Claude Code to reverse engineer his robot vacuum and control it with a PlayStation controller, but it accidentally gave him control of thousands of similar devices spread all across the world. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">VCD8rCFcGSLEKZNNk4HgxY</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/4P6WZWu4Lfcumx83kXANq8-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 23 Feb 2026 11:00:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Jowi Morales) ]]></author>                    <dc:creator><![CDATA[ Jowi Morales ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/4P6WZWu4Lfcumx83kXANq8-1280-80.jpg">
                                                            <media:credit><![CDATA[DJI]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[DJI Romo robot vacuum]]></media:description>                                                            <media:text><![CDATA[DJI Romo robot vacuum]]></media:text>
                                <media:title type="plain"><![CDATA[DJI Romo robot vacuum]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/4P6WZWu4Lfcumx83kXANq8-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ US Air Force bans use of smart glasses among its troops — earphones and other Bluetooth devices also limited to official duties while in uniform ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/us-air-force-bans-use-of-smart-glasses-among-its-troops-earbuds-and-other-bluetooth-devices-limited-to-official-duties</link>
                                                                            <description>
                            <![CDATA[ The U.S. Air Force is banning its personnel from using smart glasses while in uniform and limited the use of earbuds for official duties. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">Uwe5w6k9N2RojALGgki58Z</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/Z2yfqRmBY4iHzYAZ9oU35g-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 09 Feb 2026 14:39:23 +0000</pubDate>                                                                                                                                <updated>Mon, 09 Feb 2026 15:04:17 +0000</updated>
                                                                                                                                            <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Jowi Morales) ]]></author>                    <dc:creator><![CDATA[ Jowi Morales ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/Z2yfqRmBY4iHzYAZ9oU35g-1280-80.jpg">
                                                            <media:credit><![CDATA[Tom&#039;s Hardware]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Ray-Ban Meta Glasses]]></media:description>                                                            <media:text><![CDATA[Ray-Ban Meta Glasses]]></media:text>
                                <media:title type="plain"><![CDATA[Ray-Ban Meta Glasses]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/Z2yfqRmBY4iHzYAZ9oU35g-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Chinese UK 'Super embassy' to feature ‘hidden chamber’ alongside ‘Britain’s most sensitive communication cables’, claims report — 'spy basement' plans cited as security concern, but true purpose unclear ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/networking/chinese-uk-super-embassy-to-feature-hidden-chamber-alongside-britains-most-sensitive-communication-cables-claims-report-spy-basement-plans-cited-as-security-concern-but-true-purpose-unclear</link>
                                                                            <description>
                            <![CDATA[ Unredacted plans for China’s new ‘super embassy’ in London suggest the CCP wants to build a 'spy bunker' in the UK's capital, says The Telegraph. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">rF2XosJHqL5aRirWJDgxd5</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/a95NXBb6nZcvh3fS9GCefX-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 13 Jan 2026 12:27:08 +0000</pubDate>                                                                                                                                <updated>Tue, 13 Jan 2026 12:27:14 +0000</updated>
                                                                                                                                            <category><![CDATA[Networking]]></category>
                                                                                                                    <dc:creator><![CDATA[ Mark Tyson ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/a95NXBb6nZcvh3fS9GCefX-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty / John Rensten]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[cable visualization]]></media:description>                                                            <media:text><![CDATA[cable visualization]]></media:text>
                                <media:title type="plain"><![CDATA[cable visualization]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/a95NXBb6nZcvh3fS9GCefX-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Samsung Magician SSD software ‘High Severity’ vulnerability patched — upgrade to the newest v9.0.0 to prevent potential DLL hijacking and privilege escalation ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/samsung-magician-ssd-software-high-severity-vulnerability-patched-upgrade-to-the-newest-v9-0-0-to-prevent-potential-dll-hijacking-and-privilege-escalation</link>
                                                                            <description>
                            <![CDATA[ Samsung has published a security advisory after a high-severity vulnerability was discovered in its Magician SSD management software on Windows. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">EDcKyCQNkY3wgwHCVk7JAb</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/bCU2J6hAEGrZ5Hwa94i38e-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 07 Jan 2026 10:00:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Mark Tyson ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/bCU2J6hAEGrZ5Hwa94i38e-1280-80.jpg">
                                                            <media:credit><![CDATA[Samsung]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Samsung Magician software]]></media:description>                                                            <media:text><![CDATA[Samsung Magician software]]></media:text>
                                <media:title type="plain"><![CDATA[Samsung Magician software]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/bCU2J6hAEGrZ5Hwa94i38e-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ PlayStation 5 ROM keys leaked — jailbreaking could be made easier with BootROM codes ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/video-games/playstation/playstation-5-rom-keys-leaked-jailbreaking-could-be-made-easier-with-bootrom-codes</link>
                                                                            <description>
                            <![CDATA[ The PlayStation 5's ROM keys have allegedly been leaked. This breach could make it easier for hackers to jailbreak the system, but they still have to deal with other security features of the console. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">dRa7insCXCF7xYRNoWCLTJ</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/Vy6yo6NzRverNeZry3FQBo-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 01 Jan 2026 13:10:37 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[PlayStation]]></category>
                                                    <category><![CDATA[Video Games]]></category>
                                                    <category><![CDATA[Console Gaming]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Jowi Morales) ]]></author>                    <dc:creator><![CDATA[ Jowi Morales ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/Vy6yo6NzRverNeZry3FQBo-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[the PlayStation 5 with its controller in the background]]></media:description>                                                            <media:text><![CDATA[the PlayStation 5 with its controller in the background]]></media:text>
                                <media:title type="plain"><![CDATA[the PlayStation 5 with its controller in the background]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/Vy6yo6NzRverNeZry3FQBo-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Interpol-led cybercrime crackdown results in 574 arrests in 19 African nations, decrypts six ransomware variants — Operation Sentinel disrupts rings that caused $21 million in losses, recovers $3 million ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/interpol-led-cybercrime-crackdown-results-in-574-arrests-in-19-african-nations-decrypts-six-ransomware-variants-operation-sentinel-disrupts-rings-that-caused-usd21-million-in-losses-recovers-usd3-million</link>
                                                                            <description>
                            <![CDATA[ Conducted between late October and November, Operation Sentinel saw international law enforcement agencies shut down cybercrime infrastructure, decrypt ransomware variants, and prevent large-scale financial losses across the region. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">mjDoRPHkrSWKy846tWiRYE</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/fb6V7B3uEXYtNoywxgCnoU-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 23 Dec 2025 16:03:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Kunal Khullar) ]]></author>                    <dc:creator><![CDATA[ Kunal Khullar ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/fb6V7B3uEXYtNoywxgCnoU-1280-80.jpg">
                                                            <media:credit><![CDATA[Interpol]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A group of people arrested in Benin for committing cyber fraud]]></media:description>                                                            <media:text><![CDATA[A group of people arrested in Benin for committing cyber fraud]]></media:text>
                                <media:title type="plain"><![CDATA[A group of people arrested in Benin for committing cyber fraud]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/fb6V7B3uEXYtNoywxgCnoU-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ North Korean infiltrator caught working in Amazon IT department thanks to lag — 110ms keystroke input raises red flags over true location [Updated] ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/north-korean-infiltrator-caught-working-in-amazon-it-department-thanks-to-lag-110ms-keystroke-input-raises-red-flags-over-true-location</link>
                                                                            <description>
                            <![CDATA[ A North Korean imposter was uncovered, working as a sysadmin at Amazon U.S., after their keystroke input lag raised suspicions with security specialists at the online retail giant. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">vgFE9A7FQ2p2YpK263XjeC</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/aRjXjMzDAN8W8sgik9JXJY-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 18 Dec 2025 13:29:42 +0000</pubDate>                                                                                                                                <updated>Sun, 21 Dec 2025 14:18:47 +0000</updated>
                                                                                                                                            <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Mark Tyson ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/aRjXjMzDAN8W8sgik9JXJY-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty / michaklootwijk]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[North Korean enter key]]></media:description>                                                            <media:text><![CDATA[North Korean enter key]]></media:text>
                                <media:title type="plain"><![CDATA[North Korean enter key]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/aRjXjMzDAN8W8sgik9JXJY-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ WWII Enigma machine sells for over half a million dollars at auction — one of the rare four-rotor 'M4' models ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/wwii-enigma-machine-sells-for-over-half-a-million-dollars-at-auction-this-was-one-of-the-rare-4-rotor-m4-models</link>
                                                                            <description>
                            <![CDATA[ A WWII Enigma encryption machine with four rotors was sold at auction earlier this week, achieving double its estimated price. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">xwnj8bio2dR2pgaaBYHq7G</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/sYWCCM8zRM3Sh6eTXEPvv6-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Sat, 22 Nov 2025 11:00:00 +0000</pubDate>                                                                                                                                <updated>Sat, 22 Nov 2025 11:45:52 +0000</updated>
                                                                                                                                            <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Mark Tyson ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/sYWCCM8zRM3Sh6eTXEPvv6-1280-80.jpg">
                                                            <media:credit><![CDATA[Creative Commons Fabio Alessandro Locati ]]></media:credit>
                                                                                                                                                                        <media:description><![CDATA[An Enigma M4 machine]]></media:description>                                                            <media:text><![CDATA[An Enigma M4 machine, but not the one sold this week]]></media:text>
                                <media:title type="plain"><![CDATA[An Enigma M4 machine, but not the one sold this week]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/sYWCCM8zRM3Sh6eTXEPvv6-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Microsoft Azure Blocks Largest DDoS Attack in History — attack equivalent to streaming 3.5 million Netflix movies at once, 15.72 Terabits per Second from 500,000 IP addresses tied to IoT botnet ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/software/security-software/microsoft-azure-blocks-largest-ddos-attack-in-history-attack-equivalent-to-streaming-3-5-million-netflix-movies-at-once-15-72-terabits-per-second-from-500-000-ip-addresses-tied-to-iot-botnet</link>
                                                                            <description>
                            <![CDATA[ Microsoft's Azure cloud has mitigated the largest DDoS attack in history at close to 16 Tbps from the Aisuru botnet. At its peak, the attack used over 500,000 connected devices to hit the Azure servers with over 3.6 million packets per second to target a single cloud endpoint in Australia. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">5ifQXgQRFFLcF7MQ4SYJuJ</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/C4DrvHxVU2gWVZL5GuqFPo-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 18 Nov 2025 13:53:59 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security Software]]></category>
                                                    <category><![CDATA[Software]]></category>
                                                                                                                    <dc:creator><![CDATA[ Jon Martindale ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/C4DrvHxVU2gWVZL5GuqFPo-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images / NurPhoto]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Microsoft Azure]]></media:description>                                                            <media:text><![CDATA[Microsoft Azure]]></media:text>
                                <media:title type="plain"><![CDATA[Microsoft Azure]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/C4DrvHxVU2gWVZL5GuqFPo-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ The NVMe Destroyinator can wipe 16 NVMe drives simultaneously at speeds up to 64 GB/s — it could be the data shredder of your dreams, or nightmares ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/pc-components/ssds/the-nvme-destroyinator-can-wipe-16-nvme-drives-simultaneously-at-speeds-up-to-64-gb-s-it-could-be-the-data-shredder-of-your-dreams-or-nightmares</link>
                                                                            <description>
                            <![CDATA[ The NVMe Destroyinator can securely wipe up to 16 NVMe drives at once at 64 GB/sec. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">eJvX3AF5JuWyjFpS494Tg</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/vhAsUbcgjFWGq4Hrf6vNeY-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Sun, 16 Nov 2025 15:25:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[SSDs]]></category>
                                                    <category><![CDATA[PC Components]]></category>
                                                    <category><![CDATA[Storage]]></category>
                                                                                                                    <dc:creator><![CDATA[ Mark Tyson ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/vhAsUbcgjFWGq4Hrf6vNeY-1280-80.jpg">
                                                            <media:credit><![CDATA[45Drives]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[THE NVMe DESTROYINATOR]]></media:description>                                                            <media:text><![CDATA[THE NVMe DESTROYINATOR]]></media:text>
                                <media:title type="plain"><![CDATA[THE NVMe DESTROYINATOR]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/vhAsUbcgjFWGq4Hrf6vNeY-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Intel software fixes stamp down privilege escalation vulnerabilities, while microcode updates clean up CPU messes — chipmaker has its own Patch Tuesday as it stomps down 30 bugs ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/software/intel-software-fixes-stamp-down-privilege-escalation-vulnerabilities-while-microcode-updates-clean-up-cpu-messes-chipmaker-has-its-own-patch-tuesday-as-it-stomps-down-30-bugs</link>
                                                                            <description>
                            <![CDATA[ Intel stomps down 30 bugs including privilege escalation vulnerabilities ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">3eL5Q6785mUyYBsdCG54Lg</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/BjNWmqcNM7rFjVLFenhs7b-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 12 Nov 2025 22:15:22 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Software]]></category>
                                                                                                                    <dc:creator><![CDATA[ Bruno Ferreira ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/BjNWmqcNM7rFjVLFenhs7b-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[vulnerability]]></media:description>                                                            <media:text><![CDATA[vulnerability]]></media:text>
                                <media:title type="plain"><![CDATA[vulnerability]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/BjNWmqcNM7rFjVLFenhs7b-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ 37 years ago this week, the Morris worm infected 10% of the Internet within 24 hours — worm slithered out and sparked a new era in cybersecurity ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/on-this-day-in-1988-the-morris-worm-slithered-out-and-sparked-a-new-era-in-cybersecurity-10-percent-of-the-internet-was-infected-within-24-hours</link>
                                                                            <description>
                            <![CDATA[ Cornell graduate student Robert Tappan Morris unleashed his eponymous worm upon the Internet 37 years ago, changing the face of cybersecurity. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">2yx5XwXvHBuRrnnp8Re97X</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/ttuF6zAsvkYiVcKNJst2TH-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 04 Nov 2025 13:45:00 +0000</pubDate>                                                                                                                                <updated>Tue, 04 Nov 2025 17:02:11 +0000</updated>
                                                                                                                                            <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Mark Tyson ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/ttuF6zAsvkYiVcKNJst2TH-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty / Tomas Knopp]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Internet worm]]></media:description>                                                            <media:text><![CDATA[Internet worm]]></media:text>
                                <media:title type="plain"><![CDATA[Internet worm]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/ttuF6zAsvkYiVcKNJst2TH-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Developer warns users that fake download site is hosting Windows 11 upgrade bypass tool — Win 10 upgraders warned of potential malicious downloads ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/software/windows/developer-warns-users-that-fake-download-site-is-hosting-windows-11-upgrade-bypass-tool-win-10-upgraders-warned-of-potential-malicious-downloads</link>
                                                                            <description>
                            <![CDATA[ Following Windows 10’s end-of-life, Flyoobe has grown in popularity for enabling safe Windows 11 upgrades on unsupported systems - but you must only download it via the official GitHub source. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">EnC2N8L9g975qsCph5GtY5</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/ySimRFAV4FPfQqYuTyEg33-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Sun, 02 Nov 2025 16:12:21 +0000</pubDate>                                                                                                                                <updated>Sun, 02 Nov 2025 16:18:03 +0000</updated>
                                                                                                                                            <category><![CDATA[Windows]]></category>
                                                    <category><![CDATA[Software]]></category>
                                                    <category><![CDATA[Operating Systems]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Kunal Khullar) ]]></author>                    <dc:creator><![CDATA[ Kunal Khullar ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/ySimRFAV4FPfQqYuTyEg33-1280-80.jpg">
                                                            <media:credit><![CDATA[Arnav Singhal/Unsplash]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Windows 10 laptop sitting on a desk in a dark room.]]></media:description>                                                            <media:text><![CDATA[Windows 10 laptop sitting on a desk in a dark room.]]></media:text>
                                <media:title type="plain"><![CDATA[Windows 10 laptop sitting on a desk in a dark room.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/ySimRFAV4FPfQqYuTyEg33-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Cops alerted by AI gun detection system arrest high school student holding bag of Doritos — eight cars sent to disarm chip-toting teen ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/artificial-intelligence/cops-alerted-by-ai-gun-detection-system-arrest-high-school-student-holding-bag-of-doritos-eight-cars-sent-to-disarm-chip-toting-teen</link>
                                                                            <description>
                            <![CDATA[ A young student was left traumatized after being ordered to the ground and handcuffed by police because an AI gun detection system erroneously called the cops on his Doritos habit. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">Ycjv5jFwwPJB55AwtNQ4oT</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/ttWRMsX2L7BJy8T5QYiLjL-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 29 Oct 2025 10:41:32 +0000</pubDate>                                                                                                                                <updated>Wed, 29 Oct 2025 23:06:46 +0000</updated>
                                                                                                                                            <category><![CDATA[Artificial Intelligence]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Mark Tyson ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/ttWRMsX2L7BJy8T5QYiLjL-1280-80.jpg">
                                                            <media:credit><![CDATA[Omnilert / Pepsico]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Omnilert’s active shooter and gun detection system misfired over Doritos]]></media:description>                                                            <media:text><![CDATA[Omnilert’s active shooter and gun detection system misfired over Doritos]]></media:text>
                                <media:title type="plain"><![CDATA[Omnilert’s active shooter and gun detection system misfired over Doritos]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/ttWRMsX2L7BJy8T5QYiLjL-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ China says it has foiled a series U.S. cyberattacks on its critical infrastructure — Ministry of State Security says it has 'irrefutable evidence' NSA tried to cause 'international time chaos' ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/china-says-it-has-foiled-a-series-u-s-cyberattacks-on-its-critical-infrastructure-ministry-of-state-security-says-it-has-irrefutable-evidence-nsa-tried-to-cause-international-time-chaos</link>
                                                                            <description>
                            <![CDATA[ China’s Ministry of State Security has taken to social media to boast about foiling a series of cyberattacks it says were directed by the U.S. National Security Agency. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">Uk6PnPtqauTZoQgvcvPjPH</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/5SaZWjJr8DwLRQJowvmwb7-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 20 Oct 2025 16:48:11 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Mark Tyson ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/5SaZWjJr8DwLRQJowvmwb7-1280-80.jpg">
                                                            <media:credit><![CDATA[China&#039;s MSS on Weibo]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Images from China&#039;s MSS on Weibo]]></media:description>                                                            <media:text><![CDATA[Images from China&#039;s MSS on Weibo]]></media:text>
                                <media:title type="plain"><![CDATA[Images from China&#039;s MSS on Weibo]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/5SaZWjJr8DwLRQJowvmwb7-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Tile exploit could let stalkers follow you with your own tracker — Bluetooth broadcasting flaw is relatively simple to exploit, researchers discover ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/tile-exploit-could-let-stalkers-follow-you-with-your-own-tracker-researchers-uncover-broadcasting-flaw-via-bluetooth</link>
                                                                            <description>
                            <![CDATA[ Georgia Institute of Technology researchers found design flaws in Tile location trackers that can be abused to stalk their owners. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">y3fzsjNmvaMV6umq67geKA</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/PbCF65s6wimy9KV26VSh4R-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 29 Sep 2025 17:31:52 +0000</pubDate>                                                                                                                                <updated>Mon, 29 Sep 2025 19:12:18 +0000</updated>
                                                                                                                                            <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Nathaniel Mott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/PbCF65s6wimy9KV26VSh4R-1280-80.jpg">
                                                            <media:credit><![CDATA[Tile]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Tile trackers]]></media:description>                                                            <media:text><![CDATA[Tile trackers]]></media:text>
                                <media:title type="plain"><![CDATA[Tile trackers]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/PbCF65s6wimy9KV26VSh4R-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ $115 million ransomware hacker arrested over extortion attacks — Scattered Spider alumnus allegedly involved in over 120 computer network intrusions targeting 47 U.S. entities ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/usd115-million-ransomware-hacker-arrested-over-extortion-attacks-scattered-spider-alumnus-allegedly-involved-in-over-120-computer-network-intrusions-targeting-47-u-s-entities</link>
                                                                            <description>
                            <![CDATA[ A British National has been arrested and accused of helping to facilitate over $155 million in exploitation and blackmail attacks against U.S. and British companies. The 19-year-old has ties to the infamous Scattered Spider hacking group. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">QsGtyWVN3m9zzcuSPWpv2R</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/sAsuZtg3jWTFzE3Dri3CmB-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 19 Sep 2025 11:56:09 +0000</pubDate>                                                                                                                                <updated>Fri, 19 Sep 2025 21:28:08 +0000</updated>
                                                                                                                                            <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Jon Martindale ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/sAsuZtg3jWTFzE3Dri3CmB-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images/Seksan Mongkhonkhamsao]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Hooded hacker with bad posture hunches over their Matrix-code workstation.]]></media:description>                                                            <media:text><![CDATA[Hooded hacker with bad posture hunches over their Matrix-code workstation.]]></media:text>
                                <media:title type="plain"><![CDATA[Hooded hacker with bad posture hunches over their Matrix-code workstation.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/sAsuZtg3jWTFzE3Dri3CmB-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ China foes get worse results using DeepSeek, research suggests — CrowdStrike finds nearly twice as many flaws in AI-generated code for IS, Falun Gong, Tibet, and Taiwan ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/artificial-intelligence/china-foes-get-worse-results-using-deepseek-research-suggests-crowdstrike-finds-nearly-twice-as-many-flaws-in-ai-generated-code-for-is-falun-gong-tibet-and-taiwan</link>
                                                                            <description>
                            <![CDATA[ Research suggests that your DeepSeek AI results can be of drastically lower quality if you trigger China’s geopolitically sensitive tripwires. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">idLipufznFPQ8EcLWgYK8d</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/GY2SUFu9EnptyCgxYtvHpT-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 18 Sep 2025 12:51:06 +0000</pubDate>                                                                                                                                <updated>Thu, 18 Sep 2025 21:53:37 +0000</updated>
                                                                                                                                            <category><![CDATA[Artificial Intelligence]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Mark Tyson ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/GY2SUFu9EnptyCgxYtvHpT-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty / Herstockart]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Deepseek logo on an iPhone]]></media:description>                                                            <media:text><![CDATA[Deepseek logo on an iPhone]]></media:text>
                                <media:title type="plain"><![CDATA[Deepseek logo on an iPhone]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/GY2SUFu9EnptyCgxYtvHpT-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ U.S. places $11 million bounty on Ukrainian ransomware mastermind — Tymoshchuk allegedly stole $18 billion from large companies over 3 years ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/u-s-places-usd11-million-bounty-on-ukrainian-ransomware-mastermind-tymoshchuk-allegedly-stole-usd18-billion-from-large-companies-over-3-years</link>
                                                                            <description>
                            <![CDATA[ Volodymyr Tymoshchuk has been indicted by the United States for his involvement in ransomware crimes that stole an estimated $18 billion from large companies from 2018 to 2021. While the U.S. waits on extradition efforts, an $11 million bounty has been placed on his head. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">iNmnLXvPsLewhPjZSmtDi3</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/FRKea6agfJsYdo9T4XMVBT-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 10 Sep 2025 18:18:58 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Security]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Sunny Grimm ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/FRKea6agfJsYdo9T4XMVBT-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A man receiving a ransomware attack on both his phone and laptop - a poor day for the stock image actor.]]></media:description>                                                            <media:text><![CDATA[A man receiving a ransomware attack on both his phone and laptop - a poor day for the stock image actor.]]></media:text>
                                <media:title type="plain"><![CDATA[A man receiving a ransomware attack on both his phone and laptop - a poor day for the stock image actor.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/FRKea6agfJsYdo9T4XMVBT-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Burger King hacked, attackers 'impressed by the commitment to terrible security practices' — systems described as 'solid as a paper Whopper wrapper in the rain,’ other RBI brands like Tim Hortons and Popeyes also vulnerable ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/burger-king-hacked-digital-platform-as-solid-as-a-paper-whopper-wrapper-in-the-rain-easy-security-bypass-exploited-catastrophic-vulnerabilities-also-worked-on-other-rbi-brands-like-tim-hortons-and-popeyes</link>
                                                                            <description>
                            <![CDATA[ Ethical hackers have detailed how they uncovered 'catastrophic' vulnerabilities in various Burger King systems. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">apFSkAFySWgXEfcucwawji</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/GynnsrKZx4274YcTZktSb6-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Sun, 07 Sep 2025 09:30:00 +0000</pubDate>                                                                                                                                <updated>Sun, 07 Sep 2025 13:05:39 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Security]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Mark Tyson ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/GynnsrKZx4274YcTZktSb6-1280-80.jpg">
                                                            <media:credit><![CDATA[Burger King on Facebook]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A Burger King outlet]]></media:description>                                                            <media:text><![CDATA[A Burger King outlet]]></media:text>
                                <media:title type="plain"><![CDATA[A Burger King outlet]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/GynnsrKZx4274YcTZktSb6-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Console repairer encounters Xbox 360 that Microsoft banned over 'bad debt' from unpaid bills — Microsoft MVP chimes in with an elegant official solution ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/video-games/xbox/console-repairer-encounters-xbox-360-that-microsoft-banned-over-bad-debt-from-unpaid-bills-microsoft-mvp-chimes-in-with-an-elegant-official-solution</link>
                                                                            <description>
                            <![CDATA[ A Microsoft Xbox 360 console that refuses to play due to ‘bad debt’ has raised more than a few eyebrows. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">Az332cWAv4m629aaSETAsG</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/7sHUx6Mkn8TDC7NbhxVrCf-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 25 Aug 2025 16:03:17 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Xbox]]></category>
                                                    <category><![CDATA[Video Games]]></category>
                                                    <category><![CDATA[Console Gaming]]></category>
                                                                                                                    <dc:creator><![CDATA[ Mark Tyson ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/7sHUx6Mkn8TDC7NbhxVrCf-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Microsoft Xbox 360]]></media:description>                                                            <media:text><![CDATA[Microsoft Xbox 360]]></media:text>
                                <media:title type="plain"><![CDATA[Microsoft Xbox 360]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/7sHUx6Mkn8TDC7NbhxVrCf-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Researcher downloaded the data of all 270,000 Intel employees from an internal business card website — massive data breach dubbed 'Intel Outside' didn't qualify for bug bounty ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/researcher-downloaded-the-data-of-all-270-000-intel-employees-from-an-internal-business-card-website-massive-data-breach-dubbed-intel-outside-didnt-qualify-for-bug-bounty</link>
                                                                            <description>
                            <![CDATA[ Security researcher Eaton was inspired to do some gentle prying of Intel websites, after considering the company's hardware security reputation. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">hRzmdUtCMoG58PnXCVNLiV</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/VCYoHpRhh5GmWeS4euUCEf-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 19 Aug 2025 13:21:54 +0000</pubDate>                                                                                                                                <updated>Tue, 19 Aug 2025 14:19:28 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Security]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Mark Tyson ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/VCYoHpRhh5GmWeS4euUCEf-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A broken lock on a PCB.]]></media:description>                                                            <media:text><![CDATA[A broken lock on a PCB.]]></media:text>
                                <media:title type="plain"><![CDATA[A broken lock on a PCB.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/VCYoHpRhh5GmWeS4euUCEf-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Booking.com customers learn the hard way that Unicode is tricky ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/booking-com-customers-learn-the-hard-way-that-unicode-is-tricky</link>
                                                                            <description>
                            <![CDATA[ A phishing campaign targeting Booking.com users relies on a technique involving the ambiguity of Unicode characters. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">hWjpvPSrBxdddA7B3JeC4D</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/fu4QoSNwXvAMtFqs73x3ki-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 15 Aug 2025 17:21:33 +0000</pubDate>                                                                                                                                <updated>Sat, 16 Aug 2025 13:01:02 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Security]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Nathaniel Mott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/fu4QoSNwXvAMtFqs73x3ki-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[asdf]]></media:description>                                                            <media:text><![CDATA[asdf]]></media:text>
                                <media:title type="plain"><![CDATA[asdf]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/fu4QoSNwXvAMtFqs73x3ki-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Russia hacked and took control of a Norwegian dam, police chief claims — released over 1,900,000 gallons of water before attack was noticed ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/russia-hacked-and-took-control-of-a-norwegian-dam-police-chief-claims-released-over-1-900-000-gallons-of-water-before-attack-was-noticed</link>
                                                                            <description>
                            <![CDATA[ Moscow is to blame for a cyberattack on a dam, which remotely opened the floodgates for a period of around four hours, says Norway's security chief. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">qXXLGUJQVKKozYMUphxh3g</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/b4VQjfizxmHKiVjPwsuPJE-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 15 Aug 2025 15:23:09 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Security]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Mark Tyson ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/b4VQjfizxmHKiVjPwsuPJE-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[hacker in front of computer]]></media:description>                                                            <media:text><![CDATA[hacker in front of computer]]></media:text>
                                <media:title type="plain"><![CDATA[hacker in front of computer]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/b4VQjfizxmHKiVjPwsuPJE-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ ChatGPT agent casually brushes aside ‘I am not a robot’ captcha —  'so now I’ll click the 'verify you are human' checkbox to complete this verification' it declared without a hint of irony ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/artificial-intelligence/chatgpt-agent-casually-brushes-aside-i-am-not-a-robot-captcha-so-now-ill-click-the-verify-you-are-human-checkbox-to-complete-this-verification-it-declared-without-a-hint-of-irony</link>
                                                                            <description>
                            <![CDATA[ A Redditor has demonstrated the ability of the recently launched ChatGPT agent to casually swat away a captcha, so that it can complete its assigned task(s). ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">EBSTVm43F2W5BoewUBwjWE</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/ZwG4srg6eYH42v84xX2SSN-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 29 Jul 2025 13:04:11 +0000</pubDate>                                                                                                                                <updated>Tue, 29 Jul 2025 13:04:17 +0000</updated>
                                                                                                                                            <category><![CDATA[Artificial Intelligence]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Mark Tyson ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/ZwG4srg6eYH42v84xX2SSN-1280-80.jpg">
                                                            <media:credit><![CDATA[OpenAI video footage]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[ChatGPT agent in action]]></media:description>                                                            <media:text><![CDATA[ChatGPT agent in action]]></media:text>
                                <media:title type="plain"><![CDATA[ChatGPT agent in action]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/ZwG4srg6eYH42v84xX2SSN-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Microsoft says China-based hackers exploiting critical SharePoint vulnerabilities to deploy Warlock ransomware — three China-affiliated threat actors seen taking advantage ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/microsoft-says-china-based-hackers-exploiting-critical-sharepoint-vulnerabilities-to-deploy-warlock-ransomware-three-china-affiliated-threat-actors-seen-taking-advantage</link>
                                                                            <description>
                            <![CDATA[ Microsoft said that critical vulnerabilities in SharePoint are being exploited by a potentially China-linked threat actor, Storm-2603, to deploy ransomware. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">EjDhG7toM2cSAexRANN9ZW</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/8wcDGraPng6PZj25racN9o-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 24 Jul 2025 15:09:43 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Security]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Nathaniel Mott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/8wcDGraPng6PZj25racN9o-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty / Bloomberg]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Microsoft logo]]></media:description>                                                            <media:text><![CDATA[Microsoft logo]]></media:text>
                                <media:title type="plain"><![CDATA[Microsoft logo]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/8wcDGraPng6PZj25racN9o-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Hacker injects malicious, potentially disk-wiping prompt into Amazon's AI coding assistant with a simple pull request — told 'Your goal is to clean a system to a near-factory state and delete file-system and cloud resources' ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/hacker-injects-malicious-potentially-disk-wiping-prompt-into-amazons-ai-coding-assistant-with-a-simple-pull-request-told-your-goal-is-to-clean-a-system-to-a-near-factory-state-and-delete-file-system-and-cloud-resources</link>
                                                                            <description>
                            <![CDATA[ A hacker injected a malicious prompt into the Q extension for VS Code that instructed Amazon's coding assistant to delete files on a user's device. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">P2KpP6yS5o5RLW43jpKQbh</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/SCPibvpUkzNBsC5BgGzijG-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 24 Jul 2025 09:30:54 +0000</pubDate>                                                                                                                                <updated>Thu, 24 Jul 2025 12:52:10 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Security]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Nathaniel Mott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/SCPibvpUkzNBsC5BgGzijG-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[hack password code stock image]]></media:description>                                                            <media:text><![CDATA[hack password code stock image]]></media:text>
                                <media:title type="plain"><![CDATA[hack password code stock image]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/SCPibvpUkzNBsC5BgGzijG-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ This new SSD will literally self destruct if you push the big red button it comes with — Team Group posts video of data destruction in action ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/pc-components/ssds/this-new-ssd-will-literally-self-destruct-if-you-push-the-big-red-button-it-comes-with-team-group-posts-video-of-data-destruction-in-action</link>
                                                                            <description>
                            <![CDATA[ Team Group's new M.2 2280 SSD comes with a big red button. Hold it one second too long, and it destroys your NAND instead of just erasing the data. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">5LVuCCvB77rLJa6VCTKRKh</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/fLxXQ9pfz45jMWSJFHneLC-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Sat, 12 Jul 2025 10:00:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[SSDs]]></category>
                                                    <category><![CDATA[PC Components]]></category>
                                                    <category><![CDATA[Storage]]></category>
                                                                                                                    <dc:creator><![CDATA[ Mark Tyson ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/fLxXQ9pfz45jMWSJFHneLC-1280-80.jpg">
                                                            <media:credit><![CDATA[Team Group]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Team Group P250Q-M80 SSDs]]></media:description>                                                            <media:text><![CDATA[Team Group P250Q-M80 SSDs]]></media:text>
                                <media:title type="plain"><![CDATA[Team Group P250Q-M80 SSDs]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/fLxXQ9pfz45jMWSJFHneLC-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Microsoft's youngest security researcher started collaboration with the company at just 13 — high school junior filed 20 vulnerability reports last summer, named MSRC Most Valuable Researcher twice ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/microsofts-youngest-security-researcher-started-collaboration-with-the-company-at-just-13-high-school-junior-filed-20-vulnerability-reports-last-summer-named-msrc-most-valuable-researcher-twice</link>
                                                                            <description>
                            <![CDATA[ Microsoft has published a blog about one of its youngest and most outstanding security researchers. Dylan started work for MSRC age 13. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">8i4i4Fjq9W9d8kJaLbxbPi</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/oB9P9zhnWtKYAs7oWhT9AS-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 02 Jul 2025 15:45:42 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Security]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Mark Tyson ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/oB9P9zhnWtKYAs7oWhT9AS-1280-80.jpg">
                                                            <media:credit><![CDATA[Microsoft MSRC Blog]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Microsoft MSRC Blog graphic - Dylan]]></media:description>                                                            <media:text><![CDATA[Microsoft MSRC Blog graphic - Dylan]]></media:text>
                                <media:title type="plain"><![CDATA[Microsoft MSRC Blog graphic - Dylan]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/oB9P9zhnWtKYAs7oWhT9AS-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Rogue IT worker gets seven months in prison over $200,000 digital rampage — technician changed all of his company's passwords after getting suspended ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/rogue-it-worker-gets-seven-months-in-prison-over-usd200-000-digital-rampage-technician-changed-all-of-his-companys-passwords-after-getting-suspended</link>
                                                                            <description>
                            <![CDATA[ A suspended IT worker who caused at least $200,000 of damage in an act of revenge upon his employer has been sentenced. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">qvwhpdCjiKXh5QoHQumrW3</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/Y6GbKEa6dZCmCSvver3Kja-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 01 Jul 2025 15:09:37 +0000</pubDate>                                                                                                                                <updated>Tue, 01 Jul 2025 16:34:36 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Security]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Mark Tyson ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/Y6GbKEa6dZCmCSvver3Kja-1280-80.jpg">
                                                            <media:credit><![CDATA[West Yorkshire Police]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Ex-employee cyberattacker sentenced]]></media:description>                                                            <media:text><![CDATA[Ex-employee cyberattacker sentenced]]></media:text>
                                <media:title type="plain"><![CDATA[Ex-employee cyberattacker sentenced]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/Y6GbKEa6dZCmCSvver3Kja-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ University researchers tout using smartwatches to steal data from air-gapped systems — SmartAttack paper proposes using wearable as a covert ultrasonic signal receiver ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/university-researchers-tout-using-smartwatches-to-steal-data-from-air-gapped-systems-smartattack-paper-proposes-using-wearable-as-a-covert-ultrasonic-signal-receiver</link>
                                                                            <description>
                            <![CDATA[ A new air-gap attack dubbed 'SmartAttack' theorizes using a smartwatch to capture covert signals and steal information. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">AgesFPfjWqfK2rYWMN3rfh</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/65KTueABkvd4J4WBitjwX9-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 13 Jun 2025 11:10:40 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Security]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ stephen.warwick@futurenet.com (Stephen Warwick) ]]></author>                    <dc:creator><![CDATA[ Stephen Warwick ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/65KTueABkvd4J4WBitjwX9-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty / iStock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[IT server]]></media:description>                                                            <media:text><![CDATA[IT server]]></media:text>
                                <media:title type="plain"><![CDATA[IT server]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/65KTueABkvd4J4WBitjwX9-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Hacker who breached 5,000 accounts to mine crypto arrested — 7-year cryptojacking scheme incurs $4.5 million in damages ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cryptomining/hacker-who-breached-5-000-accounts-to-mine-crypto-arrested-7-year-cryptojacking-scheme-incurs-usd4-5-million-in-damages</link>
                                                                            <description>
                            <![CDATA[ Ukrainian authorities nabbed a hacker who used over 5,000 compromised online hosting accounts for mining cryptocurrency. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">4CiavPnbAaz4fmTHp5ao3a</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/AZu4LJukLrh6hFk4JNqQ3H-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 05 Jun 2025 16:17:12 +0000</pubDate>                                                                                                                                <updated>Thu, 05 Jun 2025 18:55:06 +0000</updated>
                                                                                                                                            <category><![CDATA[Cryptomining]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                    <category><![CDATA[Cryptocurrency]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Jowi Morales) ]]></author>                    <dc:creator><![CDATA[ Jowi Morales ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/AZu4LJukLrh6hFk4JNqQ3H-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Hacker]]></media:description>                                                            <media:text><![CDATA[Hacker]]></media:text>
                                <media:title type="plain"><![CDATA[Hacker]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/AZu4LJukLrh6hFk4JNqQ3H-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Intel reports wave of high-severity GPU vulnerabilities — ten unique security vulnerabilities stemming from poor software hit range of graphics solutions ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/pc-components/gpus/intel-reports-wave-of-high-severity-gpu-vulnerabilities-ten-unique-security-vulnerabilities-stemming-from-poor-software-hit-range-of-graphics-solutions</link>
                                                                            <description>
                            <![CDATA[ Intel has reported ten new GPU-related security vulnerabilities affecting drivers and graphics control software across a range of its GPU offerings this week. The announcement immediately follows announcements of a Spectre workaround from ETH Zurich. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">oeZg9Rgt2saK3j4fjuq9Vj</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/kYMorhByirBxPcgSa2Q8ZB-1280-80.png" type="image/png" length="0"></enclosure>
                                                                        <pubDate>Thu, 15 May 2025 16:32:00 +0000</pubDate>                                                                                                                                <updated>Thu, 21 Aug 2025 10:08:05 +0000</updated>
                                                                                                                                            <category><![CDATA[GPUs]]></category>
                                                    <category><![CDATA[PC Components]]></category>
                                                                                                                    <dc:creator><![CDATA[ Sunny Grimm ]]></dc:creator>                                                                                                    <media:content type="image/png" url="https://cdn.mos.cms.futurecdn.net/kYMorhByirBxPcgSa2Q8ZB-1280-80.png">
                                                            <media:credit><![CDATA[Intel]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Intel]]></media:description>                                                            <media:text><![CDATA[Intel]]></media:text>
                                <media:title type="plain"><![CDATA[Intel]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/kYMorhByirBxPcgSa2Q8ZB-1280-80.png" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Crosswalks in Silicon Valley hacked to play satirical messages from Musk and Zuckerberg sound-a-likes ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/crosswalks-in-silicon-valley-hacked-to-play-satirical-messages-from-musk-and-zuckerberg-sound-a-likes</link>
                                                                            <description>
                            <![CDATA[ A number of Silicon Valley crosswalks were hacked to sound like U.S. big-tech broligarchs, according to reports published by local media this weekend. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">CWQouoJ3GFjnVuqs7iKNX6</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/oFS3tdNj9A5jTADKkyy4C6-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Sun, 13 Apr 2025 15:22:29 +0000</pubDate>                                                                                                                                <updated>Thu, 21 Aug 2025 08:57:17 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Security]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Mark Tyson ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/oFS3tdNj9A5jTADKkyy4C6-1280-80.jpg">
                                                            <media:credit><![CDATA[Palo Alto Online]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Hacked crosswalks in Silicon Valley]]></media:description>                                                            <media:text><![CDATA[Hacked crosswalks in Silicon Valley]]></media:text>
                                <media:title type="plain"><![CDATA[Hacked crosswalks in Silicon Valley]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/oFS3tdNj9A5jTADKkyy4C6-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Windows Update drops empty 'intepub' folder in system, leaves users scratching heads after April update ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/software/windows/windows-update-drops-empty-intepub-folder-in-system-leaves-users-scratching-heads-after-april-update</link>
                                                                            <description>
                            <![CDATA[ Computer security researchers have been left scratching their heads after applying Microsoft’s latest raft of Patch Tuesday updates - as an 'inetpub' folder has been left behind. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">jGjoumN3LjpN4WSTbgtfJm</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/GK9mjp88zqZGEvf5W7nfcU-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 10 Apr 2025 14:21:35 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Windows]]></category>
                                                    <category><![CDATA[Software]]></category>
                                                    <category><![CDATA[Operating Systems]]></category>
                                                                                                                    <dc:creator><![CDATA[ Mark Tyson ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/GK9mjp88zqZGEvf5W7nfcU-1280-80.jpg">
                                                            <media:credit><![CDATA[Microsoft, screenshot by Tom&#039;s Hardware]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[inetpub folder in a C:/ drive.]]></media:description>                                                            <media:text><![CDATA[inetpub folder in a C:/ drive.]]></media:text>
                                <media:title type="plain"><![CDATA[inetpub folder in a C:/ drive.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/GK9mjp88zqZGEvf5W7nfcU-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ WinRAR security flaw ignores Windows Mark of the Web security warnings ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/software/winrar-security-flaw-ignores-windows-mark-of-the-web-security-warnings</link>
                                                                            <description>
                            <![CDATA[ WinRAR users not running the latest version are subject to a security flaw that's capable of ignoring the Windows Mark of the Web security warnings. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">Czcye4Z4ZqdWw4eCpiANEX</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/8QZUbXXGbokDxvnP6Zh2v8-1280-80.png" type="image/png" length="0"></enclosure>
                                                                        <pubDate>Sun, 06 Apr 2025 16:05:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Software]]></category>
                                                                                                                    <dc:creator><![CDATA[ Ash Hill ]]></dc:creator>                                                                                                    <media:content type="image/png" url="https://cdn.mos.cms.futurecdn.net/8QZUbXXGbokDxvnP6Zh2v8-1280-80.png">
                                                            <media:credit><![CDATA[tern_et, via X]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[WinRAR bag]]></media:description>                                                            <media:text><![CDATA[WinRAR bag]]></media:text>
                                <media:title type="plain"><![CDATA[WinRAR bag]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/8QZUbXXGbokDxvnP6Zh2v8-1280-80.png" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Apartment buildings broken into with phone in minutes — IoT-connected intercoms using default creds vulnerable to anyone with Google ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/apartment-buildings-broken-into-with-phone-in-minutes-iot-connected-intercoms-using-default-creds-vulnerable-to-anyone-with-google</link>
                                                                            <description>
                            <![CDATA[ A wide list of apartment complexes using IoT-connected intercoms still use the default logins from their manuals, making them easily accessible by bad actors. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">tmxjjKk3dsQCWkYV8dKMif</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/VCYoHpRhh5GmWeS4euUCEf-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 27 Feb 2025 14:47:13 +0000</pubDate>                                                                                                                                <updated>Thu, 27 Feb 2025 14:48:44 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Security]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Dallin Grimm ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/VCYoHpRhh5GmWeS4euUCEf-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A broken lock on a PCB.]]></media:description>                                                            <media:text><![CDATA[A broken lock on a PCB.]]></media:text>
                                <media:title type="plain"><![CDATA[A broken lock on a PCB.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/VCYoHpRhh5GmWeS4euUCEf-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ CS2 fans targeted by Streamjackers — viewers swindled out of crypto and Steam valuables ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/cs2-fans-targeted-by-streamjackers-viewers-swindled-out-of-crypto-and-steam-valuables</link>
                                                                            <description>
                            <![CDATA[ Cybercriminals are targeting the CS2 community with streamjacking scams. Innocents have been lured into sharing Steam credentials, and paying into crypto-doubling scams. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">kCeXXJ8GMQNgPJZG6zSvnC</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/7bagp726qSZR8KsxzHHgyM-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Sun, 23 Feb 2025 17:13:10 +0000</pubDate>                                                                                                                                <updated>Sun, 23 Feb 2025 17:35:24 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Security]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Mark Tyson ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/7bagp726qSZR8KsxzHHgyM-1280-80.jpg">
                                                            <media:credit><![CDATA[Bitdefender Labs blog]]></media:credit>
                                                                                                                                                                        <media:description><![CDATA[Free skins scam]]></media:description>                                                            <media:text><![CDATA[Streamjackers want your digital treasures]]></media:text>
                                <media:title type="plain"><![CDATA[Streamjackers want your digital treasures]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/7bagp726qSZR8KsxzHHgyM-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Security researcher finds vulnerability in internet-connected bed, could allow access to all devices on network ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/security-researcher-finds-vulnerability-in-internet-connected-bed-could-allow-access-to-all-devices-on-network</link>
                                                                            <description>
                            <![CDATA[ Web-connected smart bed provider Eight Sleep revealed to be including an SSH backdoor in its beds, as well as exposing a live AWS key. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">eV5SAFvZpBCAAws5fwWgmb</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/7oioKDw7jdQUVfTw2zkPYf-1280-80.png" type="image/png" length="0"></enclosure>
                                                                        <pubDate>Sun, 23 Feb 2025 15:27:18 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Security]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Christopher Harper ]]></dc:creator>                                                                                                    <media:content type="image/png" url="https://cdn.mos.cms.futurecdn.net/7oioKDw7jdQUVfTw2zkPYf-1280-80.png">
                                                            <media:credit><![CDATA[Eight Sleep]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Eight Sleep&#039;s Pod 4 Ultra Smart Bed]]></media:description>                                                            <media:text><![CDATA[Eight Sleep&#039;s Pod 4 Ultra Smart Bed]]></media:text>
                                <media:title type="plain"><![CDATA[Eight Sleep&#039;s Pod 4 Ultra Smart Bed]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/7oioKDw7jdQUVfTw2zkPYf-1280-80.png" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Intel roasts AMD and Nvidia in its latest product security report, claiming AMD has vulnerabilities with no fix planned, Nvidia has only high-severity security bugs [Updated] ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/intel-roasts-amd-and-nvidia-in-its-latest-product-security-report-says-amd-has-78-vulnerabilities-with-no-fix-planned-nvidia-has-only-high-severity-security-bugs</link>
                                                                            <description>
                            <![CDATA[ Intel says that AMD and Nvidia had more vulnerabilities versus its products. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">eWoVoYBCq276LUi6a7j2NL</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/23Nu3CSRLgQy67VQFM8GPi-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 11 Feb 2025 16:26:14 +0000</pubDate>                                                                                                                                <updated>Thu, 21 Aug 2025 09:47:24 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Security]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ editors@tomshardware.com (Jowi Morales) ]]></author>                    <dc:creator><![CDATA[ Jowi Morales ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/23Nu3CSRLgQy67VQFM8GPi-1280-80.jpg">
                                                            <media:credit><![CDATA[Intel]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[13th Generation Intel CPU]]></media:description>                                                            <media:text><![CDATA[13th Generation Intel CPU]]></media:text>
                                <media:title type="plain"><![CDATA[13th Generation Intel CPU]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/23Nu3CSRLgQy67VQFM8GPi-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Nvidia's mid-January GPU driver update addresses several vulnerabilities and exploits ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/pc-components/gpu-drivers/nvidias-mid-january-gpu-driver-update-addresses-several-vulnerabilities-and-exploits</link>
                                                                            <description>
                            <![CDATA[ Nvidia releases another series of security updates for its GPU drivers. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">TEGYYBBAgjBsx8v2P2yNu7</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/5A6KRKSNjiRatojU9st8PN-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 20 Jan 2025 14:01:57 +0000</pubDate>                                                                                                                                <updated>Thu, 21 Aug 2025 12:44:12 +0000</updated>
                                                                                                                                            <category><![CDATA[GPU Drivers]]></category>
                                                    <category><![CDATA[PC Components]]></category>
                                                    <category><![CDATA[GPUs]]></category>
                                                                                                                    <dc:creator><![CDATA[ Christopher Harper ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/5A6KRKSNjiRatojU9st8PN-1280-80.jpg">
                                                            <media:credit><![CDATA[Nvidia]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[GeForce RTX 40-series GPUs]]></media:description>                                                            <media:text><![CDATA[GeForce RTX 40-series GPUs]]></media:text>
                                <media:title type="plain"><![CDATA[GeForce RTX 40-series GPUs]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/5A6KRKSNjiRatojU9st8PN-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Bambu Lab Security Update will remove OrcaSlicer’s Access ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/3d-printing/bambu-lab-security-update-will-remove-orcaslicers-access</link>
                                                                            <description>
                            <![CDATA[ The new Bambu Lab Security update will require users to install the “Bambu Connect” network plugin in order to use 3rd party slicers and accessories. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">P8HHAEXPozw2TJJjYi5MJJ</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/JETVTiZTbDXgbR4vjPESaX-1280-80.png" type="image/png" length="0"></enclosure>
                                                                        <pubDate>Sun, 19 Jan 2025 15:38:49 +0000</pubDate>                                                                                                                                <updated>Thu, 21 Aug 2025 10:08:51 +0000</updated>
                                                                                                                                            <category><![CDATA[3D Printing]]></category>
                                                                                                <author><![CDATA[ stldenise@gmail.com (Denise Bertacchi) ]]></author>                    <dc:creator><![CDATA[ Denise Bertacchi ]]></dc:creator>                                                                                                    <media:content type="image/png" url="https://cdn.mos.cms.futurecdn.net/JETVTiZTbDXgbR4vjPESaX-1280-80.png">
                                                            <media:credit><![CDATA[Tom&#039;s Hardware]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Bambu Lab Security Update]]></media:description>                                                            <media:text><![CDATA[Bambu Lab Security Update]]></media:text>
                                <media:title type="plain"><![CDATA[Bambu Lab Security Update]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/JETVTiZTbDXgbR4vjPESaX-1280-80.png" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Raspberry Pi's RP2350 Hacking Challenge results announced — four winners are each awarded the full $20K prize ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/raspberry-pi/raspberry-pis-rp2350-hacking-challenge-results-announced-four-winners-are-each-awarded-the-full-usd20k-prize</link>
                                                                            <description>
                            <![CDATA[ The official winners of the $20,000 Raspberry Pi and Hextree RP2350 Hacking Challenge have been announced. With four successful claimants each awarded the full prize amount. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">qeZp89BfKx99mgWjmTH2Em</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/ZGRqKARPn5ZpNr7coyoYVG-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 14 Jan 2025 17:45:05 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Raspberry Pi]]></category>
                                                                                                                    <dc:creator><![CDATA[ Mark Tyson ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/ZGRqKARPn5ZpNr7coyoYVG-1280-80.jpg">
                                                            <media:credit><![CDATA[Aedan Cullen ]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[RP2350 Hacking Challenge]]></media:description>                                                            <media:text><![CDATA[RP2350 Hacking Challenge]]></media:text>
                                <media:title type="plain"><![CDATA[RP2350 Hacking Challenge]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/ZGRqKARPn5ZpNr7coyoYVG-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Chinese hackers target US Treasury computers used for sanctions — Committee on Foreign Investment specifically targeted ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/chinese-hackers-target-us-treasury-computers-used-for-sanctions-committee-on-foreign-investment-specifically-targeted</link>
                                                                            <description>
                            <![CDATA[ Chinese hackers gained access to an unclassified CFIUS system. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">uvnFzyKPRdXvtzaiGuZ9xh</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/foLY3NDKc2g2zqjwGgXPvc-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 10 Jan 2025 20:52:34 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Security]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                                    <dc:creator><![CDATA[ Anton Shilov ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/foLY3NDKc2g2zqjwGgXPvc-1280-80.jpg">
                                                            <media:credit><![CDATA[Intel]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A security specialist]]></media:description>                                                            <media:text><![CDATA[A security specialist]]></media:text>
                                <media:title type="plain"><![CDATA[A security specialist]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/foLY3NDKc2g2zqjwGgXPvc-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ U.S. uncovers hacking campaign targeting Guam's critical infrastructure — suspected Chinese Volt Typhoon hacks could disrupt the defense of Taiwan ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/tech-industry/cyber-security/u-s-uncovers-hacking-campaign-targeting-guams-critical-infrastructure-suspected-chinese-volt-typhoon-hacks-could-disrupt-the-defense-of-taiwan</link>
                                                                            <description>
                            <![CDATA[ The U.S. government has uncovered a Chinese hacking campaign targeting Guam's critical infrastructure, according to Bloomberg. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">bou8W74U6qrhUXAU2GYaka</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/giGTAonqhcvSTiF2F68UXH-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Sun, 05 Jan 2025 17:35:39 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cybersecurity]]></category>
                                                    <category><![CDATA[Tech Industry]]></category>
                                                                                                <author><![CDATA[ ashilov@gmail.com (Anton Shilov) ]]></author>                    <dc:creator><![CDATA[ Anton Shilov ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/giGTAonqhcvSTiF2F68UXH-1280-80.jpg">
                                                            <media:credit><![CDATA[United States Navy]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Guam harbor]]></media:description>                                                            <media:text><![CDATA[Guam harbor]]></media:text>
                                <media:title type="plain"><![CDATA[Guam harbor]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/giGTAonqhcvSTiF2F68UXH-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ It looks like the Raspberry Pi RP2350 Hacking Challenge may have been beaten — Hacker gains access to the OTP secret by glitching the RISC-V cores to enable debugging ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/raspberry-pi/it-looks-like-the-raspberry-pi-rp2350-hacking-challenge-has-been-beaten-hacker-gains-access-to-the-otp-secret-by-glitching-the-risc-v-cores-to-enable-debugging</link>
                                                                            <description>
                            <![CDATA[ We may have a winner for the $20,000 Raspberry Pi and Hextree RP2350 Hacking Challenge after engineer Aedan Cullen went public with his Hacking the RP2350 presentation at the recent 38C3. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">nQ4sTaGVvBq3RDynH4YwZQ</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/yB6wiDWXxE5MZmYV7D2CSG-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Sat, 04 Jan 2025 12:05:00 +0000</pubDate>                                                                                                                                <updated>Wed, 09 Apr 2025 13:17:34 +0000</updated>
                                                                                                                                            <category><![CDATA[Raspberry Pi]]></category>
                                                                                                                    <dc:creator><![CDATA[ Mark Tyson ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/yB6wiDWXxE5MZmYV7D2CSG-1280-80.jpg">
                                                            <media:credit><![CDATA[Aedan Cullen ]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[RP2350 Hacking Challenge]]></media:description>                                                            <media:text><![CDATA[RP2350 Hacking Challenge]]></media:text>
                                <media:title type="plain"><![CDATA[RP2350 Hacking Challenge]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/yB6wiDWXxE5MZmYV7D2CSG-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Microsoft Recall screenshots credit cards and Social Security numbers, even with the "sensitive information" filter enabled ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/software/windows/microsoft-recall-screenshots-credit-cards-and-social-security-numbers-even-with-the-sensitive-information-filter-enabled</link>
                                                                            <description>
                            <![CDATA[ Despite promising to filter personal data out, Recall still captures it. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">tbEeKQ57ATUGUnUKRir5vA</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/975UqEyQpEE6RNxsQCVvXL-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 12 Dec 2024 16:20:17 +0000</pubDate>                                                                                                                                <updated>Wed, 09 Apr 2025 13:17:43 +0000</updated>
                                                                                                                                            <category><![CDATA[Windows]]></category>
                                                    <category><![CDATA[Software]]></category>
                                                    <category><![CDATA[Operating Systems]]></category>
                                                                                                                    <dc:creator><![CDATA[ Avram Piltch ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/975UqEyQpEE6RNxsQCVvXL-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock (1025458759)]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Computer with recall]]></media:description>                                                            <media:text><![CDATA[Computer with recall]]></media:text>
                                <media:title type="plain"><![CDATA[Computer with recall]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/975UqEyQpEE6RNxsQCVvXL-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ BadRAM attack breaches AMD secure VMs using a Raspberry Pi Pico, DDR socket, and a 9V battery ]]></title>
                                                                                                                                                                                                <link>https://www.tomshardware.com/software/security-software/badram-attack-breaches-amd-secure-vms-using-a-raspberry-pi-pico-ddr-socket-and-a-9v-battery</link>
                                                                            <description>
                            <![CDATA[ Researchers have described the BadRAM attack, which is claimed to facilitate the breaching of processor security via rogue memory modules. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">zig3oadpX9AtYNeNvkzcM9</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/djsZNhGid755sskrVRxpVV-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 11 Dec 2024 14:00:33 +0000</pubDate>                                                                                                                                <updated>Thu, 21 Aug 2025 12:56:43 +0000</updated>
                                                                                                                                            <category><![CDATA[Security Software]]></category>
                                                    <category><![CDATA[Software]]></category>
                                                                                                                    <dc:creator><![CDATA[ Mark Tyson ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/djsZNhGid755sskrVRxpVV-1280-80.jpg">
                                                            <media:credit><![CDATA[BadRAM]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[BadRAM exploit]]></media:description>                                                            <media:text><![CDATA[BadRAM exploit]]></media:text>
                                <media:title type="plain"><![CDATA[BadRAM exploit]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/djsZNhGid755sskrVRxpVV-1280-80.jpg" />
                                                                                        </item>
            </channel>
</rss>