<?xml version='1.0' encoding='UTF-8'?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://infosecradar.com/</loc><changefreq>hourly</changefreq><priority>1.0</priority></url><url><loc>https://infosecradar.com/about/</loc><changefreq>monthly</changefreq><priority>0.3</priority></url><url><loc>https://infosecradar.com/contact/</loc><changefreq>monthly</changefreq><priority>0.3</priority></url><url><loc>https://infosecradar.com/methodology/</loc><changefreq>monthly</changefreq><priority>0.3</priority></url><url><loc>https://infosecradar.com/fair-use/</loc><changefreq>monthly</changefreq><priority>0.3</priority></url><url><loc>https://infosecradar.com/privacy/</loc><changefreq>monthly</changefreq><priority>0.3</priority></url><url><loc>https://infosecradar.com/archive/</loc><changefreq>monthly</changefreq><priority>0.3</priority></url><url><loc>https://infosecradar.com/category/vulnerabilities/</loc><changefreq>hourly</changefreq><priority>0.7</priority></url><url><loc>https://infosecradar.com/category/malware/</loc><changefreq>hourly</changefreq><priority>0.7</priority></url><url><loc>https://infosecradar.com/category/breaches/</loc><changefreq>hourly</changefreq><priority>0.7</priority></url><url><loc>https://infosecradar.com/category/threat-actors/</loc><changefreq>hourly</changefreq><priority>0.7</priority></url><url><loc>https://infosecradar.com/category/policy/</loc><changefreq>hourly</changefreq><priority>0.7</priority></url><url><loc>https://infosecradar.com/category/industry/</loc><changefreq>hourly</changefreq><priority>0.7</priority></url><url><loc>https://infosecradar.com/category/tools/</loc><changefreq>hourly</changefreq><priority>0.7</priority></url><url><loc>https://infosecradar.com/category/cloud/</loc><changefreq>hourly</changefreq><priority>0.7</priority></url><url><loc>https://infosecradar.com/category/ai-cybersecurity/</loc><changefreq>hourly</changefreq><priority>0.7</priority></url><url><loc>https://infosecradar.com/category/privacy-surveillance/</loc><changefreq>hourly</changefreq><priority>0.7</priority></url><url><loc>https://infosecradar.com/category/signal-school/</loc><changefreq>hourly</changefreq><priority>0.7</priority></url><url><loc>https://infosecradar.com/friend/</loc><changefreq>hourly</changefreq><priority>0.6</priority></url><url><loc>https://infosecradar.com/foe/</loc><changefreq>hourly</changefreq><priority>0.6</priority></url><url><loc>https://infosecradar.com/stories/2026/04/03/security-lapse-lets-researchers-view-react2shell-hackers-dashboard/</loc><lastmod>2026-04-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/03/a-core-infrastructure-engineer-pleads-guilty-to-federal-charges-in-insider-attac/</loc><lastmod>2026-04-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/03/hims-hers-warns-of-data-breach-after-zendesk-support-ticket-breach/</loc><lastmod>2026-04-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/03/tech-nonprofits-to-feds-dont-weaponize-procurement-to-undermine-ai-trust-and-saf/</loc><lastmod>2026-04-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/03/china-linked-ta416-targets-european-governments-with-plugx-and-oauth-based-phish/</loc><lastmod>2026-04-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/03/google-patches-fourth-chrome-zero-day-so-far-this-year/</loc><lastmod>2026-04-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/03/internet-bug-bounty-program-hits-pause-on-payouts/</loc><lastmod>2026-04-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/03/apple-breaks-precedent-patches-darksword-for-ios-18/</loc><lastmod>2026-04-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/03/claude-code-is-still-vulnerable-to-an-attack-anthropic-has-already-fixed/</loc><lastmod>2026-04-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/03/die-linke-german-political-party-confirms-data-stolen-by-qilin-ransomware/</loc><lastmod>2026-04-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/03/cert-eu-blames-trivy-supply-chain-attack-for-europaeu-data-breach/</loc><lastmod>2026-04-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/03/hybrid-work-expanded-risk-what-needs-to-change/</loc><lastmod>2026-04-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/03/double-shot-of-privacys-defender-in-dc/</loc><lastmod>2026-04-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/03/microsoft-details-cookie-controlled-php-web-shells-persisting-via-cron-on-linux/</loc><lastmod>2026-04-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/03/blast-radius-of-teampcp-attacks-expands-amid-hacker-infighting/</loc><lastmod>2026-04-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/03/evolution-of-ransomware-multi-extortion-ransomware-attacks/</loc><lastmod>2026-04-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/03/sophos-gartner-peer-insights-mdr/</loc><lastmod>2026-04-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/03/picking-up-skull-vibrations-could-be-xr-headset-authentication/</loc><lastmod>2026-04-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/03/teampcp-supply-chain-campaign-update-006-cert-eu-confirms-european-commission-cl/</loc><lastmod>2026-04-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/03/source-code-leaks-highlight-lack-of-supply-chain-oversight/</loc><lastmod>2026-04-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/03/chainguard-unveils-factory-20-to-automate-hardening-the-software-supply-chain/</loc><lastmod>2026-04-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/03/trueconf-zero-day-exploited-in-asian-government-attacks/</loc><lastmod>2026-04-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/03/in-other-news-chatgpt-data-leak-android-rootkit-water-facility-hit-by-ransomware/</loc><lastmod>2026-04-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/03/critical-sharefile-flaws-lead-to-unauthenticated-rce/</loc><lastmod>2026-04-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/03/crowdstrike-next-gen-siem-can-now-ingest-microsoft-defender-telemetry/</loc><lastmod>2026-04-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/03/microsoft-still-working-to-fix-exchange-online-mailbox-access-issues/</loc><lastmod>2026-04-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/03/company-that-secretly-records-and-publishes-zoom-meetings/</loc><lastmod>2026-04-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/03/unc1069-social-engineering-of-axios-maintainer-led-to-npm-supply-chain-attack/</loc><lastmod>2026-04-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/03/why-third-party-risk-is-the-biggest-gap-in-your-clients-security-posture/</loc><lastmod>2026-04-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/03/mobile-attack-surface-expands-as-enterprises-lose-control/</loc><lastmod>2026-04-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/03/react2shell-exploited-in-large-scale-credential-harvesting-campaign/</loc><lastmod>2026-04-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/03/t-mobile-sets-the-record-straight-on-latest-data-breach-filing/</loc><lastmod>2026-04-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/03/north-korean-hackers-drain-285-million-from-drift-in-10-seconds/</loc><lastmod>2026-04-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/03/new-sparkcat-variant-in-ios-android-apps-steals-crypto-wallet-recovery-phrase-im/</loc><lastmod>2026-04-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/03/man-admits-to-locking-thousands-of-windows-devices-in-extortion-plot/</loc><lastmod>2026-04-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/03/12-cyber-industry-trends-revealed-at-rsac-2026/</loc><lastmod>2026-04-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/03/drift-loses-285-million-in-durable-nonce-social-engineering-attack-linked-to-dpr/</loc><lastmod>2026-04-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/03/microsoft-now-force-upgrades-unmanaged-windows-11-24h2-pcs/</loc><lastmod>2026-04-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/03/cert-eu-european-commission-hack-exposes-data-of-30-eu-entities/</loc><lastmod>2026-04-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/03/die-besten-xdr-tools/</loc><lastmod>2026-04-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/03/cloudflares-new-cms-is-not-a-wordpress-killer-its-a-wordpress-alternative/</loc><lastmod>2026-04-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/03/risky-bulletin-russia-will-revoke-licenses-for-unruly-isps/</loc><lastmod>2026-04-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/03/sophos-named-a-2026-gartner-peer-insights-customers-choice-for-managed-detection/</loc><lastmod>2026-04-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/02/weakening-speech-protections-will-punish-all-of-usnot-just-meta/</loc><lastmod>2026-04-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/02/cisco-fixes-critical-imc-auth-bypass-present-in-many-products/</loc><lastmod>2026-04-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/02/a-baseless-copyright-claim-against-a-web-hostand-why-it-failed/</loc><lastmod>2026-04-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/02/claude-code-leak-used-to-push-infostealer-malware-on-github/</loc><lastmod>2026-04-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/02/not-toying-around-hasbro-attack-may-take-weeks-to-remediate/</loc><lastmod>2026-04-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/02/hackers-exploit-cve-2025-55182-to-breach-766-nextjs-hosts-steal-credentials/</loc><lastmod>2026-04-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/02/security-bosses-are-all-in-on-ai-heres-why/</loc><lastmod>2026-04-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/02/drift-loses-280-million-north-korean-hackers-seize-security-council-powers/</loc><lastmod>2026-04-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/02/drift-loses-280-million-as-hackers-seize-security-council-powers/</loc><lastmod>2026-04-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/02/critical-vulnerability-in-claude-code-emerges-days-after-source-leak/</loc><lastmod>2026-04-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/02/print-blocking-wont-work-permission-to-print-part-2/</loc><lastmod>2026-04-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/02/print-blocking-is-anti-consumer-permission-to-print-part-1/</loc><lastmod>2026-04-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/02/they-thought-they-were-downloading-claude-code-source-they-got-a-nasty-dose-of-m/</loc><lastmod>2026-04-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/02/us-bans-all-foreign-made-consumer-routers/</loc><lastmod>2026-04-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/02/new-rowhammer-attacks-give-complete-control-of-machines-running-nvidia-gpus/</loc><lastmod>2026-04-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/02/apple-rolls-out-darksword-exploit-protection-to-more-devices/</loc><lastmod>2026-04-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/02/geopolitics-ai-and-cybersecurity-insights-from-rsac-2026/</loc><lastmod>2026-04-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/02/rsac-2026-ai-dominates-but-community-remains-key-to-security/</loc><lastmod>2026-04-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/02/residential-proxies-evaded-ip-reputation-checks-in-78-of-4b-sessions/</loc><lastmod>2026-04-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/02/cisco-patches-98-cvss-imc-and-ssm-flaws-allowing-remote-system-compromise/</loc><lastmod>2026-04-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/02/google-and-amazon-acknowledged-risks-and-ignored-responsibilities/</loc><lastmod>2026-04-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/02/attempts-to-exploit-exposed-vite-installs-cve-2025-30208-thu-apr-2nd/</loc><lastmod>2026-04-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/02/cybersecurity-ma-roundup-38-deals-announced-in-march-2026/</loc><lastmod>2026-04-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/02/adversaries-exploit-vacant-homes-to-intercept-mail-in-hybrid-cybercrime/</loc><lastmod>2026-04-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/02/new-progress-sharefile-flaws-can-be-chained-in-pre-auth-rce-attacks/</loc><lastmod>2026-04-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/02/medtech-giant-stryker-fully-operational-after-data-wiping-attack/</loc><lastmod>2026-04-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/02/bank-trojan-casbaneiro-worms-through-latin-america/</loc><lastmod>2026-04-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/02/threatsday-bulletin-pre-auth-chains-android-rootkits-cloudtrail-evasion-10-more/</loc><lastmod>2026-04-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/02/eviltokens-abuses-microsoft-device-code-flow-for-account-takeovers/</loc><lastmod>2026-04-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/02/cisco-patches-critical-and-high-severity-vulnerabilities/</loc><lastmod>2026-04-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/02/cisa-adds-one-known-exploited-vulnerability-to-catalog/</loc><lastmod>2026-04-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/02/yokogawa-centum-vp/</loc><lastmod>2026-04-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/02/hitachi-energy-ellipse/</loc><lastmod>2026-04-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/02/siemens-sicam-8-products/</loc><lastmod>2026-04-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/02/250000-affected-by-data-breach-at-nacogdoches-memorial-hospital/</loc><lastmod>2026-04-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/02/researchers-uncover-mining-operation-using-iso-lures-to-spread-rats-and-crypto-m/</loc><lastmod>2026-04-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/02/the-state-of-trusted-open-source-report/</loc><lastmod>2026-04-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/02/effs-submission-to-the-un-ohchr-on-protection-of-human-rights-defenders-in-the-d/</loc><lastmod>2026-04-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/02/critical-cisco-imc-auth-bypass-gives-attackers-admin-access/</loc><lastmod>2026-04-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/02/mercor-hit-by-litellm-supply-chain-attack/</loc><lastmod>2026-04-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/02/possible-us-government-iphone-hacking-tool-leaked/</loc><lastmod>2026-04-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/02/sophisticated-crystalx-rat-emerges/</loc><lastmod>2026-04-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/02/whatsapp-alerts-200-users-after-fake-ios-app-installed-spyware-italian-firm-face/</loc><lastmod>2026-04-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/02/microsoft-links-classic-outlook-issue-to-email-delivery-problems/</loc><lastmod>2026-04-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/02/cybersecurity-in-the-age-of-instant-software/</loc><lastmod>2026-04-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/02/over-14000-f5-big-ip-apm-instances-still-exposed-to-rce-attacks/</loc><lastmod>2026-04-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/02/variance-raises-215m-for-compliance-investigation-platform-powered-by-ai-agents/</loc><lastmod>2026-04-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/02/the-companys-biggest-security-hole-lived-in-the-breakroom/</loc><lastmod>2026-04-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/02/apple-expands-ios-1877-update-to-more-devices-to-block-darksword-exploit/</loc><lastmod>2026-04-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/02/linx-security-raises-50-million-for-identity-security-and-governance/</loc><lastmod>2026-04-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/02/tools-um-mcp-server-abzusichern/</loc><lastmod>2026-04-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/02/srsly-risky-biz-americas-next-top-cyber-model/</loc><lastmod>2026-04-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/02/ai-recruiting-biz-mercor-says-it-was-one-of-thousands-hit-in-litellm-supply-chai/</loc><lastmod>2026-04-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/02/amazon-guardduty-enhances-detection-efficacy-with-sophos-threat-intelligence/</loc><lastmod>2026-04-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/02/latin-america-and-the-caribbean-cybercrime-landscape/</loc><lastmod>2026-04-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/01/new-crystalrat-malware-adds-rat-stealer-and-prankware-features/</loc><lastmod>2026-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/01/ransomware-will-hit-hospitals-rehearsals-are-key-to-defense/</loc><lastmod>2026-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/01/apple-expands-ios-18-updates-to-more-iphones-to-block-darksword-attacks/</loc><lastmod>2026-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/01/hackers-exploit-trueconf-zero-day-to-push-malicious-software-updates/</loc><lastmod>2026-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/01/amazon-security-boss-ai-makes-pentesting-40-more-efficient/</loc><lastmod>2026-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/01/new-eviltokens-service-fuels-microsoft-device-code-phishing-attacks/</loc><lastmod>2026-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/01/7-ways-to-improve-your-business-resilience-with-backup-and-recovery/</loc><lastmod>2026-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/01/5-steps-to-break-free-from-alert-fatigue-and-build-resilient-security-operations/</loc><lastmod>2026-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/01/5-essential-steps-to-bulletproof-your-endpoint-security-and-avoid-the-biggest-mi/</loc><lastmod>2026-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/01/6-critical-mistakes-that-undermine-cyber-resilience-and-how-to-fix-them/</loc><lastmod>2026-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/01/6-metrics-it-leaders-cant-afford-to-ignore-for-business-resilience/</loc><lastmod>2026-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/01/5-critical-steps-to-achieve-business-resilience-in-cybersecurity/</loc><lastmod>2026-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/01/latams-self-taught-cyber-talent-overlooked-amid-cyberattack-glut/</loc><lastmod>2026-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/01/novoice-android-malware-on-google-play-infected-23-million-devices/</loc><lastmod>2026-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/01/vim-and-gnu-emacs-claude-code-helpfully-found-zero-day-exploits-for-both/</loc><lastmod>2026-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/01/is-hackback-official-us-cybersecurity-strategy/</loc><lastmod>2026-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/01/cyberattacks-intensify-pressure-on-latin-american-governments/</loc><lastmod>2026-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/01/depthfirst-raises-80-million-in-series-b-funding/</loc><lastmod>2026-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/01/cert-ua-impersonation-campaign-spread-agewheeze-malware-to-1-million-emails/</loc><lastmod>2026-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/01/toy-giant-hasbro-hit-by-cyberattack/</loc><lastmod>2026-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/01/new-deepload-malware-dropped-in-clickfix-attacks/</loc><lastmod>2026-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/01/venom-stealer-maas-platform-commoditizes-clickfix-attacks/</loc><lastmod>2026-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/01/exploited-zero-day-among-21-vulnerabilities-patched-in-chrome/</loc><lastmod>2026-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/01/peoples-panel-to-check-if-uk-wants-controversial-digital-id-will-cost-630k/</loc><lastmod>2026-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/01/routine-access-is-powering-modern-intrusions-a-new-threat-report-finds/</loc><lastmod>2026-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/01/fbi-warns-of-data-security-risks-from-china-made-mobile-apps/</loc><lastmod>2026-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/01/us-charges-uranium-crypto-exchange-hacker/</loc><lastmod>2026-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/01/webinar-today-agentic-ai-vs-identitys-last-mile-problem/</loc><lastmod>2026-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/01/teampcp-supply-chain-campaign-update-005-first-confirmed-victim-disclosure-post/</loc><lastmod>2026-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/01/block-the-prompt-not-the-work-the-end-of-doctor-no/</loc><lastmod>2026-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/01/casbaneiro-phishing-targets-latin-america-and-europe-using-dynamic-pdf-lures/</loc><lastmod>2026-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/01/cisa-adds-one-known-exploited-vulnerability-to-catalog/</loc><lastmod>2026-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/01/microsoft-warns-of-whatsapp-delivered-vbs-malware-hijacking-windows-via-uac-bypa/</loc><lastmod>2026-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/01/new-chrome-zero-day-cve-2026-5281-under-active-exploitation-patch-released/</loc><lastmod>2026-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/01/fbi-warns-against-using-chinese-mobile-apps-due-to-privacy-risks/</loc><lastmod>2026-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/01/whatsapp-malware-campaign-uses-malicious-vbs-files-to-gain-persistent-access/</loc><lastmod>2026-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/01/3-reasons-attackers-are-using-your-trusted-tools-against-you-and-why-you-dont-se/</loc><lastmod>2026-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/01/hacker-zielen-auf-exilportal-iranwire/</loc><lastmod>2026-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/01/malicious-script-that-gets-rid-of-ads-wed-apr-1st/</loc><lastmod>2026-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/01/are-we-training-ai-too-late/</loc><lastmod>2026-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/01/google-fixes-fourth-chrome-zero-day-exploited-in-attacks-in-2026/</loc><lastmod>2026-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/01/a-taxonomy-of-cognitive-security/</loc><lastmod>2026-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/01/9-ways-cisos-can-combat-ai-hallucinations/</loc><lastmod>2026-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/01/security-awareness-is-not-a-control-rethinking-human-risk-in-enterprise-security/</loc><lastmod>2026-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/01/axios-npm-package-breached-in-north-korean-supply-chain-attack/</loc><lastmod>2026-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/01/uk-manufacturers-under-cyber-fire-with-80-reporting-attacks/</loc><lastmod>2026-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/01/google-attributes-axios-npm-supply-chain-attack-to-north-korean-group-unc1069/</loc><lastmod>2026-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/01/google-addresses-vertex-security-issues-after-researchers-weaponize-ai-agents/</loc><lastmod>2026-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/01/im-fokus-it-leadership/</loc><lastmod>2026-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/01/google-drive-ransomware-detection-now-on-by-default-for-paying-users/</loc><lastmod>2026-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/01/claude-code-source-leaked-via-npm-packaging-error-anthropic-confirms/</loc><lastmod>2026-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/01/risky-bulletin-iranian-password-sprays-came-first-then-came-the-missiles/</loc><lastmod>2026-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/01/new-windows-11-emergency-update-fixes-preview-update-install-issues/</loc><lastmod>2026-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/01/attack-surface-management-ein-kaufratgeber/</loc><lastmod>2026-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/01/anthropic-employee-error-exposes-claude-code-source/</loc><lastmod>2026-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/01/claude-code-source-code-accidentally-leaked-in-npm-package/</loc><lastmod>2026-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/04/01/industrialization-of-the-fraud-ecosystem-blog/</loc><lastmod>2026-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/31/proton-launches-new-meet-privacy-focused-conferencing-platform/</loc><lastmod>2026-03-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/31/gigabyte-control-center-vulnerable-to-arbitrary-file-write-flaw/</loc><lastmod>2026-03-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/31/the-forgotten-endpoint-security-risks-of-dormant-devices/</loc><lastmod>2026-03-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/31/claude-ai-finds-vim-emacs-rce-bugs-that-trigger-on-file-open/</loc><lastmod>2026-03-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/31/dont-open-that-whatsapp-message-microsoft-warns/</loc><lastmod>2026-03-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/31/axios-npm-package-compromised-in-precision-attack/</loc><lastmod>2026-03-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/31/attackers-trojanize-axios-http-library-in-highest-impact-npm-supply-chain-attack/</loc><lastmod>2026-03-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/31/googles-vertex-ai-has-an-over-privileged-problem/</loc><lastmod>2026-03-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/31/teampcp-breaches-cloud-saas-instances-with-stolen-credentials/</loc><lastmod>2026-03-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/31/iran-targets-m365-accounts-with-password-spraying-attacks/</loc><lastmod>2026-03-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/31/5-month-old-f5-big-ip-dos-bug-becomes-critical-rce-exploited-in-the-wild/</loc><lastmod>2026-03-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/31/android-developer-verification-rollout-begins-ahead-of-september-enforcement/</loc><lastmod>2026-03-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/31/quantum-computers-need-vastly-fewer-resources-than-thought-to-break-vital-encryp/</loc><lastmod>2026-03-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/31/cisco-source-code-stolen-in-trivy-linked-dev-environment-breach/</loc><lastmod>2026-03-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/31/trueconf-zero-day-exploited-in-attacks-on-southeast-asian-government-networks/</loc><lastmod>2026-03-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/31/black-hat-usa/</loc><lastmod>2026-03-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/31/censys-raises-70-million-for-internet-intelligence-platform/</loc><lastmod>2026-03-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/31/rethinking-vulnerability-management-strategies-for-mid-market-security/</loc><lastmod>2026-03-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/31/the-next-cybersecurity-crisis-isnt-breachesits-data-you-cant-trust/</loc><lastmod>2026-03-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/31/ai-and-quantum-are-forcing-a-rethink-of-digital-trust/</loc><lastmod>2026-03-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/31/stolen-logins-are-fueling-everything-from-ransomware-to-nation-state-cyberattack/</loc><lastmod>2026-03-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/31/venom-stealer-raises-stakes-with-continuous-credential-harvesting/</loc><lastmod>2026-03-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/31/how-to-categorize-ai-agents-and-prioritize-risk/</loc><lastmod>2026-03-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/31/hackers-compromise-axios-npm-package-to-drop-cross-platform-malware/</loc><lastmod>2026-03-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/31/teampcp-moves-from-oss-to-aws-environments/</loc><lastmod>2026-03-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/31/irans-hackers-are-on-the-offensive-against-the-us-and-israel/</loc><lastmod>2026-03-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/31/crewai-vulnerabilities-expose-devices-to-hacking/</loc><lastmod>2026-03-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/31/iran-deploys-pseudo-ransomware-revives-pay2key-operations/</loc><lastmod>2026-03-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/31/vertex-ai-vulnerability-exposes-google-cloud-data-and-private-artifacts/</loc><lastmod>2026-03-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/31/openai-patches-twin-leaks-as-codex-slips-and-chatgpt-spills/</loc><lastmod>2026-03-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/31/microsoft-fixes-outlook-classic-crashes-caused-by-teams-meeting-add-in/</loc><lastmod>2026-03-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/31/anritsu-remote-spectrum-monitor/</loc><lastmod>2026-03-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/31/px4-autopilot/</loc><lastmod>2026-03-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/31/google-slashes-quantum-resource-requirements-for-breaking-cryptocurrency-encrypt/</loc><lastmod>2026-03-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/31/the-ai-arms-race-why-unified-exposure-management-is-becoming-a-boardroom-priorit/</loc><lastmod>2026-03-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/31/silver-fox-expands-asia-cyber-campaign-with-atlascross-rat-and-fake-domains/</loc><lastmod>2026-03-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/31/exploitation-of-critical-fortinet-forticlient-ems-flaw-begins/</loc><lastmod>2026-03-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/31/inventors-of-quantum-cryptography-win-turing-award/</loc><lastmod>2026-03-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/31/supply-chain-blast-top-npm-package-backdoored-to-drop-dirty-rat-on-dev-machines/</loc><lastmod>2026-03-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/31/strongswan-flaw-allows-unauthenticated-attackers-to-crash-vpns/</loc><lastmod>2026-03-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/31/lloyds-data-security-incident-impacts-450000-individuals/</loc><lastmod>2026-03-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/31/hacker-charged-with-stealing-53-million-from-uranium-crypto-exchange/</loc><lastmod>2026-03-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/31/8-ways-to-bolster-your-security-posture-on-the-cheap/</loc><lastmod>2026-03-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/31/the-external-pressures-redefining-cybersecurity-risk/</loc><lastmod>2026-03-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/31/6-key-takeaways-from-rsa-conference-2026/</loc><lastmod>2026-03-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/31/dutch-finance-ministry-takes-treasury-banking-portal-offline-after-breach/</loc><lastmod>2026-03-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/31/application-control-bypass-for-data-exfiltration-tue-mar-31st/</loc><lastmod>2026-03-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/31/fahndung-nach-cyberkriminellen-130-firmen-attackiert/</loc><lastmod>2026-03-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/31/cisa-orders-feds-to-patch-actively-exploited-citrix-flaw-by-thursday/</loc><lastmod>2026-03-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/31/critical-vulnerability-in-openai-codex-allowed-github-token-compromise/</loc><lastmod>2026-03-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/31/axios-supply-chain-attack-pushes-cross-platform-rat-via-compromised-npm-account/</loc><lastmod>2026-03-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/31/axios-npm-package-compromised-to-deploy-malware/</loc><lastmod>2026-03-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/31/the-high-cost-of-low-trust-our-commitment-to-radical-transparency/</loc><lastmod>2026-03-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/31/the-cybersecurity-trust-reality-in-2026/</loc><lastmod>2026-03-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/30/fortinet-hit-by-another-exploited-cybersecurity-flaw/</loc><lastmod>2026-03-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/30/healthcare-tech-firm-carecloud-says-hackers-stole-patient-data/</loc><lastmod>2026-03-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/30/ai-powered-deepload-malware-steals-credentials-evades-detection/</loc><lastmod>2026-03-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/30/new-roadk1ll-websocket-implant-used-to-pivot-on-breached-networks/</loc><lastmod>2026-03-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/30/what-would-we-all-say-if-iran-razed-mit-because-of-military-related-research/</loc><lastmod>2026-03-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/30/openai-patches-chatgpt-flaw-that-smuggled-data-over-dns/</loc><lastmod>2026-03-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/30/welcome-daily-show-viewers-learn-more-about-eff-and-privacys-defender/</loc><lastmod>2026-03-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/30/biometric-update-ftc-can-do-better-on-age-assurance-say-privacy-rights-groups/</loc><lastmod>2026-03-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/30/ai-driven-code-surge-is-forcing-a-rethink-of-appsec/</loc><lastmod>2026-03-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/30/critical-citrix-netscaler-memory-flaw-actively-exploited-in-attacks/</loc><lastmod>2026-03-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/30/f5-big-ip-vulnerability-reclassified-as-rce-under-exploitation/</loc><lastmod>2026-03-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/30/f5-big-ip-vulnerability-reclassified-as-rce-under-exploitation/</loc><lastmod>2026-03-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/30/openai-patches-chatgpt-data-exfiltration-flaw-and-codex-github-token-vulnerabili/</loc><lastmod>2026-03-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/30/telnyx-joins-litellm-in-latest-pypi-package-poisoning-tied-to-trivy-breach/</loc><lastmod>2026-03-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/30/manufacturing-and-healthcare-share-struggles-with-passwords/</loc><lastmod>2026-03-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/30/deepload-malware-uses-clickfix-and-wmi-persistence-to-steal-browser-credentials/</loc><lastmod>2026-03-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/30/effs-cindy-cohn-on-the-daily-show-tonight-monday-march-30/</loc><lastmod>2026-03-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/30/storm-brews-over-critical-no-click-telegram-flaw/</loc><lastmod>2026-03-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/30/teampcp-supply-chain-campaign-update-004-databricks-investigating-alleged-compro/</loc><lastmod>2026-03-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/30/apple-adds-macos-terminal-warning-to-block-clickfix-attacks/</loc><lastmod>2026-03-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/30/healthcare-it-platform-carecloud-probing-potential-data-breach/</loc><lastmod>2026-03-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/30/silent-drift-how-llms-are-quietly-breaking-organizational-access-control/</loc><lastmod>2026-03-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/30/how-to-evaluate-ai-soc-agents-7-questions-gartner-says-you-should-be-asking/</loc><lastmod>2026-03-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/30/weekly-recap-telecom-sleeper-cells-llm-jailbreaks-apple-forces-uk-age-checks-an/</loc><lastmod>2026-03-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/30/citrix-netscaler-bug-exploited-in-days-may-be-multiple-flaws-in-a-trench-coat/</loc><lastmod>2026-03-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/30/3-soc-process-fixes-that-unlock-tier-1-productivity/</loc><lastmod>2026-03-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/30/huskeys-emerges-from-stealth-with-8-million-in-funding/</loc><lastmod>2026-03-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/30/langchain-path-traversal-bug-adds-to-input-validation-woes-in-ai-pipelines/</loc><lastmod>2026-03-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/30/cisa-adds-one-known-exploited-vulnerability-to-catalog/</loc><lastmod>2026-03-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/30/russian-apt-star-blizzard-adopts-darksword-ios-exploit-kit/</loc><lastmod>2026-03-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/30/leak-reveals-anthropics-mythos-a-powerful-ai-model-aimed-at-cybersecurity-use-ca/</loc><lastmod>2026-03-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/30/the-state-of-secrets-sprawl-2026-9-takeaways-for-cisos/</loc><lastmod>2026-03-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/30/european-commission-reports-cyber-intrusion-and-data-theft/</loc><lastmod>2026-03-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/30/hacked-hospitals-hidden-spyware-iran-conflict-shows-how-digital-fight-is-ingrain/</loc><lastmod>2026-03-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/30/apples-camera-indicator-lights/</loc><lastmod>2026-03-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/30/hackers-now-exploit-critical-f5-big-ip-flaw-in-attacks-patch-now/</loc><lastmod>2026-03-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/30/telnyx-targeted-in-growing-teampcp-supply-chain-attack/</loc><lastmod>2026-03-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/30/european-commission-admits-attackers-broke-into-public-web-systems-but-says-litt/</loc><lastmod>2026-03-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/30/apis-are-the-new-perimeter-heres-how-cisos-are-securing-them/</loc><lastmod>2026-03-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/30/russian-ctrl-toolkit-delivered-via-malicious-lnk-files-hijacks-rdp-via-frp-tunne/</loc><lastmod>2026-03-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/30/microsoft-pulls-kb5079391-windows-update-over-install-issues/</loc><lastmod>2026-03-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/30/exploitation-of-fresh-citrix-netscaler-vulnerability-begins/</loc><lastmod>2026-03-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/30/why-kubernetes-controllers-are-the-perfect-backdoor/</loc><lastmod>2026-03-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/30/fbi-confirms-kash-patel-email-hack-as-us-offers-10m-reward-for-hackers/</loc><lastmod>2026-03-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/30/critical-fortinet-forticlient-ems-flaw-now-exploited-in-attacks/</loc><lastmod>2026-03-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/30/security-contractor-blew-the-whistle-on-support-crews-viral-indifference/</loc><lastmod>2026-03-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/30/f5-big-ip-dos-flaw-upgraded-to-critical-rce-now-exploited-in-the-wild/</loc><lastmod>2026-03-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/30/three-china-linked-clusters-target-southeast-asian-government-in-2025-cyber-camp/</loc><lastmod>2026-03-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/30/european-commission-confirms-data-breach-after-europaeu-hack/</loc><lastmod>2026-03-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/30/us-foreign-router-ban-criticized-for-being-industrial-policy-disguised-as-cybers/</loc><lastmod>2026-03-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/30/risky-bulletin-apple-adds-clickfix-warning-to-macos-terminal/</loc><lastmod>2026-03-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/30/data-security-posture-management-die-besten-dspm-tools/</loc><lastmod>2026-03-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/30/dshield-cowrie-honeypot-stats-and-when-sessions-disconnect-mon-mar-30th/</loc><lastmod>2026-03-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/30/where-ai-in-the-soc-is-actually-delivering-and-where-it-isnt/</loc><lastmod>2026-03-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/30/incident-responders-sil-vous-plait-invites-lead-to-odd-malware-events/</loc><lastmod>2026-03-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/29/fbi-confirms-hack-of-director-patels-personal-email-inbox/</loc><lastmod>2026-03-29</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/29/file-read-flaw-in-smart-slider-plugin-impacts-500k-wordpress-sites/</loc><lastmod>2026-03-29</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/28/iran-linked-hackers-breach-fbi-directors-personal-email-hit-stryker-with-wiper-a/</loc><lastmod>2026-03-28</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/28/teampcp-supply-chain-campaign-update-003-operational-tempo-shift-as-campaign-ent/</loc><lastmod>2026-03-28</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/28/new-infinity-stealer-malware-grabs-macos-data-via-clickfix-lures/</loc><lastmod>2026-03-28</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/28/cloudflare-themed-clickfix-attack-drops-infiniti-stealer-on-macs/</loc><lastmod>2026-03-28</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/28/ice-at-airports-trains-us-to-accept-being-terrorized-in-our-daily-lives/</loc><lastmod>2026-03-28</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/28/citrix-netscaler-under-active-recon-for-cve-2026-3055-cvss-93-memory-overread-bu/</loc><lastmod>2026-03-28</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/28/ta446-deploys-leaked-darksword-ios-exploit-kit-in-targeted-spear-phishing-campai/</loc><lastmod>2026-03-28</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/28/cisa-adds-cve-2025-53521-to-kev-after-active-f5-big-ip-apm-exploitation/</loc><lastmod>2026-03-28</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/27/us-tech-companies-must-be-accountable-in-us-courts-for-facilitating-persecution/</loc><lastmod>2026-03-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/27/incident-responders-sil-vous-plait-invites-lead-to-odd-malware-events/</loc><lastmod>2026-03-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/27/backdoored-telnyx-pypi-package-pushes-malware-hidden-in-wav-audio/</loc><lastmod>2026-03-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/27/european-commission-data-stolen-in-a-cyberattack-on-the-infrastructure-hosting-i/</loc><lastmod>2026-03-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/27/epic-joins-amicus-brief-urging-scotus-to-hold-wireless-carriers-accountable-for/</loc><lastmod>2026-03-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/27/reason-magazine-trump-backs-section-702-reauthorization-after-once-calling-to-ki/</loc><lastmod>2026-03-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/27/lloyds-bank-reveals-how-it-bug-exposed-transaction-data/</loc><lastmod>2026-03-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/27/apple-sends-lock-screen-alerts-to-outdated-iphones-over-active-web-based-exploit/</loc><lastmod>2026-03-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/27/teampcp-pushes-malicious-telnyx-versions-to-pypi-hides-stealer-in-wav-files/</loc><lastmod>2026-03-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/27/fake-vs-code-alerts-on-github-spread-malware-to-developers/</loc><lastmod>2026-03-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/27/china-upgrades-the-backdoor-it-uses-to-spy-on-telcos-globally/</loc><lastmod>2026-03-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/27/pro-iranian-hacking-group-claims-credit-for-hack-of-fbi-director-kash-patels-per/</loc><lastmod>2026-03-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/27/epic-urges-amendments-to-maryland-chatbots-bill/</loc><lastmod>2026-03-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/27/are-ip-addresses-personal-data/</loc><lastmod>2026-03-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/27/wartime-usage-of-compromised-ip-cameras-highlight-their-danger/</loc><lastmod>2026-03-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/27/teampcp-supply-chain-campaign-update-002-telnyx-pypi-compromise-vect-ransomware/</loc><lastmod>2026-03-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/27/in-other-news-palo-alto-recruiter-scam-anti-deepfake-chip-google-sets-2029-quant/</loc><lastmod>2026-03-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/27/agentic-grc-teams-get-the-tech-the-mindset-shift-is-whats-missing/</loc><lastmod>2026-03-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/27/open-vsx-bug-let-malicious-vs-code-extensions-bypass-pre-publish-security-checks/</loc><lastmod>2026-03-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/27/openai-launches-bug-bounty-program-for-abuse-and-safety-risks/</loc><lastmod>2026-03-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/27/afc-ajax-drops-ball-as-flaws-let-hackers-play-admin-with-tickets-and-bans/</loc><lastmod>2026-03-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/27/european-commission-investigating-breach-after-amazon-cloud-account-hack/</loc><lastmod>2026-03-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/27/european-commission-investigating-breach-after-amazon-cloud-hack/</loc><lastmod>2026-03-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/27/attackers-exploit-critical-langflow-rce-within-hours-as-cisa-sounds-alarm/</loc><lastmod>2026-03-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/27/aitm-phishing-targets-tiktok-business-accounts-using-cloudflare-turnstile-evasio/</loc><lastmod>2026-03-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/27/google-sets-2029-deadline-for-quantum-safe-cryptography/</loc><lastmod>2026-03-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/27/cisa-adds-one-known-exploited-vulnerability-to-catalog/</loc><lastmod>2026-03-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/27/tp-link-patches-high-severity-router-vulnerabilities/</loc><lastmod>2026-03-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/27/iran-war-drives-urgent-need-to-counter-underwater-attack-drones/</loc><lastmod>2026-03-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/27/we-are-at-war/</loc><lastmod>2026-03-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/27/cyberangriff-auf-die-linke/</loc><lastmod>2026-03-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/27/rsac-2026-conference-announcements-summary-days-3-4/</loc><lastmod>2026-03-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/27/anti-piracy-coalition-takes-down-animeplay-app-with-5-million-users/</loc><lastmod>2026-03-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/27/coruna-ios-exploit-kit-likely-an-update-to-operation-triangulation/</loc><lastmod>2026-03-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/27/bearlyfy-hits-70-russian-firms-with-custom-genielocker-ransomware/</loc><lastmod>2026-03-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/27/8-steps-cisos-can-take-to-empower-their-teams/</loc><lastmod>2026-03-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/27/cisa-flags-critical-ptc-vulnerability-that-had-german-police-mobilized/</loc><lastmod>2026-03-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/27/windows-11-kb5079391-update-rolls-out-smart-app-control-improvements/</loc><lastmod>2026-03-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/27/dutch-police-discloses-security-breach-after-phishing-attack/</loc><lastmod>2026-03-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/27/langchain-langgraph-flaws-expose-files-secrets-databases-in-widely-used-ai-frame/</loc><lastmod>2026-03-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/27/security-boffins-scoured-the-web-and-found-hundreds-of-valid-api-keys/</loc><lastmod>2026-03-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/27/was-ist-social-engineering/</loc><lastmod>2026-03-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/27/risky-bulletin-russia-to-use-custom-crypto-algorithm-for-its-5g-network/</loc><lastmod>2026-03-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/27/google-the-quantum-apocalypse-is-coming-sooner-than-we-thought/</loc><lastmod>2026-03-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/26/internet-yiff-machine-we-hacked-93gb-of-anonymous-crime-tips/</loc><lastmod>2026-03-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/26/ajax-football-club-hack-exposed-fan-data-enabled-ticket-hijack/</loc><lastmod>2026-03-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/26/infrastructure-attacks-with-physical-consequences-down-25/</loc><lastmod>2026-03-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/26/traffic-violation-license-plate-reader-mission-creep-is-already-here/</loc><lastmod>2026-03-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/26/coruna-darksword-amp-democratizing-nation-state-exploit-kits/</loc><lastmod>2026-03-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/26/is-the-fccs-router-ban-the-wrong-fix/</loc><lastmod>2026-03-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/26/automotive-cybersecurity-threats-grow-in-era-of-connected-autonomous-vehicles/</loc><lastmod>2026-03-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/26/cisa-new-langflow-flaw-actively-exploited-to-hijack-ai-workflows/</loc><lastmod>2026-03-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/26/critical-flaw-in-langflow-ai-platform-under-attack/</loc><lastmod>2026-03-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/26/the-cisos-guide-to-responding-to-shadow-ai/</loc><lastmod>2026-03-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/26/yahoo-tech-i-review-routers-for-a-living-dont-buy-a-router-right-now/</loc><lastmod>2026-03-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/26/teampcp-supply-chain-campaign-update-001-checkmarx-scope-wider-than-reported-cis/</loc><lastmod>2026-03-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/26/china-linked-red-menshen-uses-stealthy-bpfdoor-implants-to-spy-via-telecom-netwo/</loc><lastmod>2026-03-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/26/the-high-cost-of-low-trust-our-commitment-to-radical-transparency/</loc><lastmod>2026-03-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/26/supreme-court-agrees-with-eff-isps-dont-have-to-be-copyright-enforcers/</loc><lastmod>2026-03-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/26/uk-sanctions-xinbi-marketplace-linked-to-asian-scam-centers/</loc><lastmod>2026-03-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/26/how-organizations-can-use-blunders-to-level-up-their-security-programs/</loc><lastmod>2026-03-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/26/ai-powered-dependency-decisions-introduce-ignore-security-bugs/</loc><lastmod>2026-03-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/26/tiktok-for-business-accounts-targeted-in-new-phishing-campaign/</loc><lastmod>2026-03-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/26/hightower-holding-data-breach-impacts-130000/</loc><lastmod>2026-03-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/26/whatsapp-rolls-out-more-ai-features-ios-multi-account-support/</loc><lastmod>2026-03-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/26/inside-a-modern-fraud-attack-from-bot-signups-to-account-takeovers/</loc><lastmod>2026-03-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/26/bind-updates-patch-high-severity-vulnerabilities/</loc><lastmod>2026-03-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/26/claude-extension-flaw-enabled-zero-click-xss-prompt-injection-via-any-website/</loc><lastmod>2026-03-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/26/coruna-ios-exploit-framework-linked-to-triangulation-attacks/</loc><lastmod>2026-03-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/26/chinese-hackers-caught-deep-within-telecom-backbone-infrastructure/</loc><lastmod>2026-03-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/26/russia-arrests-suspected-owner-of-leakbase-cybercrime-forum/</loc><lastmod>2026-03-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/26/databricks-pitches-lakewatch-as-a-cheaper-siem-but-is-it-really/</loc><lastmod>2026-03-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/26/cisco-patches-multiple-vulnerabilities-in-ios-software/</loc><lastmod>2026-03-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/26/intermediaries-driving-global-spyware-market-expansion/</loc><lastmod>2026-03-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/26/cisa-adds-one-known-exploited-vulnerability-to-catalog/</loc><lastmod>2026-03-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/26/opencode-systems-oc-messaging-and-ussd-gateway/</loc><lastmod>2026-03-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/26/ptc-windchill-product-lifecycle-management/</loc><lastmod>2026-03-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/26/wago-gmbh-co-kg-industrial-managed-switches/</loc><lastmod>2026-03-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/26/masters-of-imitation-how-hackers-and-art-forgers-perfect-the-art-of-deception/</loc><lastmod>2026-03-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/26/suspected-redline-infostealer-malware-admin-extradited-to-us/</loc><lastmod>2026-03-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/26/brit-lawmaker-targeted-by-ai-deepfake-fails-to-get-answers-from-us-big-tech/</loc><lastmod>2026-03-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/26/threatsday-bulletin-pqc-push-ai-vuln-hunting-pirated-traps-phishing-kits-20-more/</loc><lastmod>2026-03-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/26/github-phishers-use-fake-openclaw-tokens-to-drain-crypto-wallets/</loc><lastmod>2026-03-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/26/coruna-ios-kit-reuses-2023-triangulation-exploit-code-in-new-mass-attacks/</loc><lastmod>2026-03-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/26/webinar-stop-guessing-learn-to-validate-your-defenses-against-real-attacks/</loc><lastmod>2026-03-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/26/as-the-us-midterms-approach-ai-is-going-to-emerge-as-a-key-issue-concerning-vote/</loc><lastmod>2026-03-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/26/alleged-redline-malware-administrator-extradited-to-us/</loc><lastmod>2026-03-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/26/dell-and-hp-roll-out-quantum-resistant-device-security-and-ai-era-cyber-resilien/</loc><lastmod>2026-03-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/26/webrtc-skimmer-bypasses-csp-to-steal-payment-data-from-e-commerce-sites/</loc><lastmod>2026-03-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/26/10-essenzielle-maßnahmen-für-physische-sicherheit/</loc><lastmod>2026-03-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/26/indian-government-probes-cctv-espionage-operation-linked-to-pakistan/</loc><lastmod>2026-03-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/26/srsly-risky-biz-fbi-says-why-get-a-warrant-when-you-have-kash/</loc><lastmod>2026-03-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/new-critical-citrix-netscaler-hole-of-similar-severity-to-citrixbleed2-says-expe/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/github-adds-ai-powered-bug-detection-to-expand-security-coverage/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/at-rsac-the-eu-leads-while-us-officials-are-sidelined/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/polyshell-attacks-target-56-of-all-vulnerable-magento-stores/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/apple-patches-almost-everything-again-march-2026-edition-wed-mar-25th/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/ai-supply-chain-attacks-dont-even-require-malwarejust-post-poisoned-documentatio/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/scammers-have-virtual-smartphones-on-speed-dial-for-fraud/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/bubble-ai-app-builder-abused-to-steal-microsoft-account-credentials/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/jen-easterly-cybersecuritys-relentless-optimist-hopes-feds-come-back-to-rsac-nex/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/jury-finds-meta-and-google-negligent-in-landmark-social-media-addiction-case/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/only-trump-can-decide-when-cyberwar-turns-into-real-war/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/new-torg-grabber-infostealer-malware-targets-728-crypto-wallets/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/chained-vulnerabilities-in-cisco-catalyst-switches-could-induce-denial-of-servic/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/the-33-data-brokers-selling-us-data-to-foreign-actors-according-to-california/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/npr-your-data-is-everywhere-the-government-is-buying-it-without-a-warrant/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/leakbase-admin-arrested-in-russia-over-massive-stolen-credential-marketplace/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/eff-sues-for-answers-about-medicares-ai-experiment/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/pi-seeks-to-inform-inquiry-of-uk-joint-committee-on-human-rights-on-human-rights/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/the-cybersecurity-trust-reality-in-2026/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/blame-game-why-public-cyber-attribution-carries-risks/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/onit-security-raises-11-million-for-exposure-management-platform/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/citrix-urges-admins-to-patch-netscaler-flaws-as-soon-as-possible/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/google-bumps-up-q-day-estimate-to-2029-far-sooner-than-previously-thought/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/whos-really-watching-what-smartglasses-see-effector-386/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/phishers-pose-as-palo-alto-networks-recruiters-for-months-in-job-scam/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/sans-top-5-most-dangerous-new-attack-techniques-to-watch/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/russian-cybercriminal-gets-2-year-prison-sentence-in-us/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/glassworm-malware-uses-solana-dead-drops-to-deliver-rat-and-steal-browser-crypto/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/ai-speeds-attacks-but-identity-remains-cybersecuritys-weakest-link/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/why-a-near-miss-database-is-key-to-improving-information-sharing/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/paid-ai-accounts-are-now-a-hot-underground-commodity/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/ios-macos-264-roll-out-with-fresh-security-patches/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/fcc-bans-new-routers-made-outside-the-us-over-national-security-risks/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/kali-linux-20261-released-with-8-new-tools-new-backtrack-mode/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/ai-native-security-is-a-must-to-counter-ai-based-attacks/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/how-to-keep-ice-agents-out-of-your-devices-at-airports/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/rsac-2026-conference-announcements-summary-day-2/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/trivy-supply-chain-breach-compromises-over-1000-saas-environments-lapsus-joins-t/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/cisa-adds-one-known-exploited-vulnerability-to-catalog/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/the-kill-chain-is-obsolete-when-your-ai-agent-is-the-threat/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/ex-nsa-directors-discuss-red-line-for-offensive-cyberattacks/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/from-trivy-to-broad-oss-compromise-teampcp-hits-docker-hub-vs-code-pypi/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/russian-hacker-sentenced-to-2-years-for-ta551-botnet-driven-ransomware-attacks/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/device-code-phishing-hits-340-microsoft-365-orgs-across-five-countries-via-oauth/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/tp-link-warns-users-to-patch-critical-router-auth-bypass-flaw/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/pypi-warns-developers-after-litellm-malware-found-stealing-cloud-and-cicd-creden/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/digital-hopes-real-power-reflecting-on-the-legacy-of-the-arab-spring/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/sen-wyden-warns-of-another-section-702-abuse/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/transparency-and-explainability-for-algorithmic-decisions-at-work/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/6-key-trends-reshaping-the-iam-market/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/us-prisons-russian-access-broker-for-aiding-ransomware-attacks/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/ai-is-breaking-traditional-security-models-heres-where-they-fail-first/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/manager-of-botnet-used-in-ransomware-attacks-gets-2-years-in-prison/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/hackerone-employee-data-exposed-in-massive-navia-breach/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/enterprise-pcs-are-unreliable-unpatched-and-unloved-compared-to-macs/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/fcc-bans-new-foreign-made-routers-over-supply-chain-and-cyber-risk-concerns/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/iran-hacktivists-make-noise-but-have-little-impact-on-war/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/empathie-trifft-it-sicherheit-der-weg-zu-gelebter-compliance/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/risky-bulletin-the-intellexa-ceo-is-pissed/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/smartapesg-campaign-pushes-remcos-rat-netsupport-rat-stealc-and-sectop-rat-arech/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/25/clickfix-campaigns-targeting-windows-and-macos/</loc><lastmod>2026-03-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/ptc-warns-of-imminent-threat-from-critical-windchill-flexplm-rce-bug/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/csa-launches-csai-foundation-for-ai-security/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/popular-litellm-pypi-package-backdoored-to-steal-credentials-auth-tokens/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/checkmarx-kics-code-scanner-targeted-in-widening-supply-chain-hit/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/how-ai-coding-tools-crushed-the-endpoint-security-fortress/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/eff-has-a-new-boss-to-lead-the-fight-against-privacy-sucking-forces-of-doom/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/nicole-ozer-named-as-electronic-frontier-foundations-executive-director/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/fcc-bans-new-routers-made-outside-the-usa-over-security-risks/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/1k-cloud-environments-infected-following-trivy-supply-chain-attack/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/doe-publishes-5-year-energy-security-plan/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/litellm-loses-game-of-trivy-pursuit-gets-compromised/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/why-agentic-ai-systems-need-better-governance-lessons-from-openclaw/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/teampcp-backdoors-litellm-versions-18271828-likely-via-trivy-cicd-compromise/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/poland-faced-a-surge-in-cyberattacks-in-2025-including-a-major-assault-on-the-en/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/firefox-now-has-a-free-built-in-vpn-with-50gb-monthly-data-limit/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/tax-search-ads-deliver-screenconnect-malware-using-huawei-driver-to-disable-edr/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/hackers-use-fake-resumes-to-steal-enterprise-credentials-and-deploy-crypto-miner/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/palantir-will-no-longer-profit-off-of-new-yorkers-health-data/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/rsac-2026-conference-announcements-summary-day-1/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/microsoft-fixes-bug-causing-classic-outlook-sync-issues-with-gmail/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/github-openclaw-deployer-repo-delivers-trojan-instead/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/digital-hopes-real-power-from-revolution-to-regulation/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/zero-trust-bridging-the-gap-between-authentication-and-trust/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/hackerone-discloses-employee-data-breach-after-navia-hack/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/detecting-ip-kvms-tue-mar-24th/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/extortion-group-claims-it-hacked-astrazeneca/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/infinite-campus-warns-of-breach-after-shinyhunters-claims-data-theft/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/ddos-angriffe-haben-sich-verdoppelt/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/uk-politicians-continue-to-miss-the-point-in-latest-social-media-ban-proposal/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/chrome-146-update-patches-high-severity-vulnerabilities/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/hp-launches-tpm-guard-to-help-defeat-physical-tpm-attacks/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/hackerone-slams-supplier-for-delayed-breach-notice-after-staff-data-exposed/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/how-a-large-bank-uses-ai-digital-twins-for-threat-hunting/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/the-global-ciso-landscape-a-leadership-gap-too-large-to-ignore/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/yanluowang-ransomware-access-broker-gets-81-months-in-prison/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/self-propagating-malware-poisons-open-source-software-and-wipes-iran-based-machi/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/webinar-today-putting-cis-controls-and-benchmarks-into-practice/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/microsoft-proposes-better-identity-guardrails-for-ai-agents/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/31-million-impacted-by-qualderm-data-breach/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/country-that-put-backdoors-into-cisco-routers-to-spy-on-world-bans-foreign-route/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/iran-built-a-vast-camera-network-to-control-dissent-israel-turned-it-into-a-targ/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/dutch-ministry-of-finance-discloses-breach-affecting-employees/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/pharos-controls-mosaic-show-controller/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/grassroots-dicom-gdcm/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/schneider-electric-ecostruxure-foxboro-dcs/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/schneider-electric-plant-itbrewmaxx/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/ghost-campaign-uses-7-npm-packages-to-steal-crypto-wallets-and-credentials/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/new-stoatwaffle-malware-autoexecutes-attacks-on-developers/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/5-learnings-from-the-first-ever-gartner-market-guide-for-guardian-agents/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/russian-initial-access-broker-who-fed-ransomware-crews-gets-81-months-in-us-pris/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/critical-citrix-netscaler-vulnerability-poised-for-exploitation-security-firms-w/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/team-mirai-and-democracy/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/mazda-says-employee-partner-information-stolen-in-cyberattack/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/the-hidden-cost-of-cybersecurity-specialization-losing-foundational-skills/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/stryker-says-malicious-file-found-during-probe-into-iran-linked-attack/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/autonomous-ai-adoption-is-on-the-rise-but-its-risky/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/teampcp-hacks-checkmarx-github-actions-using-stolen-ci-credentials/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/streamline-physical-security-to-enable-data-center-growth-in-the-era-of-ai/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/why-cisos-should-embrace-ai-honeypots/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/us-sentences-russian-hacker-to-675-years-for-role-in-9m-ransomware-damage/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/citrix-urges-patching-critical-netscaler-flaw-allowing-unauthenticated-data-leak/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/iso-und-isms-darum-gehen-security-zertifizierungen-schief/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/palo-alto-updates-security-platform-to-discover-ai-agents/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/sophos-firewall-ranked-the-1-overall-firewall-solution-in-g2s-spring-2026-report/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/24/cybersecurity-for-education-sophos-protected-classroom/</loc><lastmod>2026-03-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/23/openai-rolls-out-chatgpt-library-to-store-your-personal-files/</loc><lastmod>2026-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/23/epic-testifies-in-support-of-dcs-proposed-personal-health-data-security-amendmen/</loc><lastmod>2026-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/23/claude-attacks-were-rorschach-test-for-infosec-community-scaring-former-nsa-boss/</loc><lastmod>2026-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/23/mazda-discloses-security-breach-exposing-employee-and-partner-data/</loc><lastmod>2026-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/23/ai-in-the-soc-what-could-go-wrong/</loc><lastmod>2026-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/23/public-private-partnerships-vital-in-disrupting-chinas-typhoons-says-rsa-panel-w/</loc><lastmod>2026-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/23/tycoon2fa-phishing-platform-returns-after-recent-police-disruption/</loc><lastmod>2026-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/23/trivy-supply-chain-attack-targets-cicd-secrets/</loc><lastmod>2026-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/23/ransomwares-new-era-moving-at-ai-speed/</loc><lastmod>2026-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/23/after-hackers-hit-an-iowa-company-cars-around-the-country-failed-to-start/</loc><lastmod>2026-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/23/lightning-fast-exploits-make-it-essential-to-patch-fast-ask-questions-later/</loc><lastmod>2026-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/23/tool-updates-lots-of-security-and-logic-fixes-mon-mar-23rd/</loc><lastmod>2026-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/23/cisos-debate-human-role-in-ai-powered-security/</loc><lastmod>2026-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/23/teampcp-deploys-iran-targeted-wiper-in-kubernetes-attacks/</loc><lastmod>2026-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/23/crunchyroll-probes-breach-after-hacker-claims-to-steal-68m-users-data/</loc><lastmod>2026-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/23/north-korean-hackers-abuse-vs-code-auto-run-tasks-to-deploy-stoatwaffle-malware/</loc><lastmod>2026-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/23/portland-press-herald-portland-sea-dogs-maine-mariners-worry-about-democratic-le/</loc><lastmod>2026-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/23/trivy-supply-chain-attack-spreads-to-docker-github-repos/</loc><lastmod>2026-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/23/rsac-2026-conference-announcements-summary-pre-event/</loc><lastmod>2026-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/23/canisterworm-springs-wiper-attack-targeting-iran/</loc><lastmod>2026-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/23/faster-attacks-and-recovery-denial-ransomware-reshape-threat-landscape/</loc><lastmod>2026-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/23/attackers-hide-infostealer-in-copyright-infringement-notices/</loc><lastmod>2026-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/23/google-unleashes-gemini-ai-agents-on-the-dark-web/</loc><lastmod>2026-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/23/smooth-criminals-talking-their-way-into-cloud-environments-google-says/</loc><lastmod>2026-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/23/m-trends-2026-initial-access-handoff-shrinks-from-hours-to-22-seconds/</loc><lastmod>2026-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/23/chip-services-firm-trio-tech-says-subsidiary-hit-by-ransomware/</loc><lastmod>2026-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/23/varonis-atlas-securing-ai-and-the-data-that-powers-it/</loc><lastmod>2026-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/23/aquas-trivy-vulnerability-scanner-hit-by-supply-chain-attack/</loc><lastmod>2026-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/23/weekly-recap-cicd-backdoor-fbi-buys-location-data-whatsapp-ditches-numbers-more/</loc><lastmod>2026-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/23/us-chip-testing-firm-shrugged-off-ransomware-hit-as-minor-then-came-the-data-lea/</loc><lastmod>2026-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/23/rsac-2026-uncle-sam-backs-out-and-ai-agents-are-everywhere/</loc><lastmod>2026-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/23/microsoft-exchange-online-service-change-causes-email-access-issues/</loc><lastmod>2026-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/23/reflections-from-the-second-nist-cyber-ai-profile-workshop/</loc><lastmod>2026-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/23/nickel-alley-strategy-fake-it-til-you-make-it/</loc><lastmod>2026-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/23/we-found-eight-attack-vectors-inside-aws-bedrock-heres-what-attackers-can-do-wit/</loc><lastmod>2026-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/23/chrome-abe-bypass-discovered-new-voidstealer-malware-steals-passwords-and-cookie/</loc><lastmod>2026-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/23/microsoft-fixes-broken-windows-update-days-after-vowing-fewer-broken-updates/</loc><lastmod>2026-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/23/qnap-patches-four-vulnerabilities-exploited-at-pwn2own/</loc><lastmod>2026-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/23/microsoft-xbox-one-hacked/</loc><lastmod>2026-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/23/microsoft-warns-irs-phishing-hits-29000-users-deploys-rmm-malware/</loc><lastmod>2026-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/23/tycoon-2fa-fully-operational-despite-law-enforcement-takedown/</loc><lastmod>2026-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/23/the-drone-swarm-is-coming-and-nato-air-defenses-are-too-expensive-to-cope/</loc><lastmod>2026-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/23/fbi-warns-of-handala-hackers-using-telegram-in-malware-attacks/</loc><lastmod>2026-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/23/behavioral-xdr-and-threat-intel-nab-north-korean-fake-it-worker-within-10-days-o/</loc><lastmod>2026-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/23/democrats-might-save-mike-johnsons-push-to-give-trump-domestic-spying-power/</loc><lastmod>2026-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/23/why-us-companies-must-be-ready-for-quantum-by-2030-a-practical-roadmap/</loc><lastmod>2026-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/23/cisa-orders-feds-to-patch-darksword-ios-flaws-exploited-attacks/</loc><lastmod>2026-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/23/trivy-hack-spreads-infostealer-via-docker-triggers-worm-and-kubernetes-wiper/</loc><lastmod>2026-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/23/new-kb5085516-emergency-update-fixes-microsoft-account-sign-in/</loc><lastmod>2026-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/23/the-insider-threat-rises-again/</loc><lastmod>2026-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/23/hackers-exploit-cve-2025-32975-cvss-100-to-hijack-unpatched-quest-kace-sma-syste/</loc><lastmod>2026-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/23/oracle-releases-emergency-patch-for-critical-identity-manager-vulnerability/</loc><lastmod>2026-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/23/risky-bulletin-github-is-starting-to-have-a-real-malware-problem/</loc><lastmod>2026-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/23/high-five-sophos-ranked-number-1-overall-in-endpoint-edr-xdr-mdr-and-firewall-in/</loc><lastmod>2026-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/23/oracle-vulnerability-cve-2026-21992-impacts-core-products/</loc><lastmod>2026-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/23/nickel-alley-strategy-fake-it-til-you-make-it/</loc><lastmod>2026-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/22/russians-are-posing-as-signal-support-to-launch-phishing-attacks/</loc><lastmod>2026-03-22</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/22/voidstealer-malware-steals-chrome-master-key-via-debugger-trick/</loc><lastmod>2026-03-22</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/22/ai-dominates-rsac-innovation-sandbox/</loc><lastmod>2026-03-22</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/21/trivy-vulnerability-scanner-breach-pushed-infostealer-via-github-actions/</loc><lastmod>2026-03-21</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/21/google-adds-advanced-flow-for-safe-apk-sideloading-on-android/</loc><lastmod>2026-03-21</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/21/microsoft-azure-monitor-alerts-abused-in-callback-phishing-campaigns/</loc><lastmod>2026-03-21</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/21/fbi-warns-russian-hackers-target-signal-whatsapp-in-mass-phishing-attacks/</loc><lastmod>2026-03-21</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/21/critical-quest-kace-vulnerability-potentially-exploited-in-attacks/</loc><lastmod>2026-03-21</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/21/oracle-patches-critical-cve-2026-21992-enabling-unauthenticated-rce-in-identity/</loc><lastmod>2026-03-21</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/21/cisa-flags-apple-craft-cms-laravel-bugs-in-kev-orders-patching-by-april-3-2026/</loc><lastmod>2026-03-21</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/21/trivy-supply-chain-attack-triggers-self-spreading-canisterworm-across-47-npm-pac/</loc><lastmod>2026-03-21</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/21/trivy-vulnerability-scanner-backdoored-with-credential-stealer-in-supply-chain-a/</loc><lastmod>2026-03-21</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/21/are-nations-ready-to-be-the-cybersecurity-insurers-of-last-resort/</loc><lastmod>2026-03-21</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/20/congress-is-dropping-the-ball-with-a-clean-extension-of-fisa/</loc><lastmod>2026-03-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/20/cryptographers-engage-in-war-of-words-over-rustsec-bug-reports-and-subsequent-ba/</loc><lastmod>2026-03-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/20/friday-squid-blogging-jumbo-flying-squid-in-the-south-pacific/</loc><lastmod>2026-03-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/20/widely-used-trivy-scanner-compromised-in-ongoing-supply-chain-attack/</loc><lastmod>2026-03-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/20/fbi-links-signal-phishing-attacks-to-russian-intelligence-services/</loc><lastmod>2026-03-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/20/patch-now-oracles-fusion-middleware-has-critical-rce-flaw/</loc><lastmod>2026-03-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/20/oracle-pushes-emergency-fix-for-critical-identity-manager-rce-flaw/</loc><lastmod>2026-03-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/20/water-utilities-strengthen-cybersecurity-through-cooperation/</loc><lastmod>2026-03-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/20/trivy-security-scanner-github-actions-breached-75-tags-hijacked-to-steal-cicd-se/</loc><lastmod>2026-03-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/20/white-house-ai-framework-protects-ai-companies-not-people/</loc><lastmod>2026-03-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/20/police-take-down-373000-fake-csam-sites-in-operation-alice/</loc><lastmod>2026-03-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/20/stop-using-ai-to-submit-bug-reports-says-google/</loc><lastmod>2026-03-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/20/cyber-opsec-fail-beast-gang-exposes-ransomware-server/</loc><lastmod>2026-03-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/20/in-other-news-new-android-safeguards-operation-alice-uk-toughens-cyber-reporting/</loc><lastmod>2026-03-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/20/critical-langflow-flaw-cve-2026-33017-triggers-attacks-within-20-hours-of-disclo/</loc><lastmod>2026-03-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/20/cisa-orders-feds-to-patch-max-severity-cisco-flaw-by-sunday/</loc><lastmod>2026-03-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/20/3-men-charged-with-conspiring-to-smuggle-us-artificial-intelligence-to-china/</loc><lastmod>2026-03-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/20/how-cisos-can-survive-the-era-of-geopolitical-cyberattacks/</loc><lastmod>2026-03-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/20/uk-police-force-presses-pause-on-live-facial-recognition-after-study-finds-racia/</loc><lastmod>2026-03-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/20/eclypsium-raises-25-million-for-device-supply-chain-security/</loc><lastmod>2026-03-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/20/feds-disrupt-monster-iot-botnets-behind-record-breaking-ddos-attacks/</loc><lastmod>2026-03-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/20/interlock-ransomware-targets-cisco-enterprise-firewalls/</loc><lastmod>2026-03-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/20/jaguar-land-rovers-cyber-bailout-sets-worrying-precedent-watchdog-warns/</loc><lastmod>2026-03-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/20/us-confirms-handala-link-to-iran-government-amid-takedown-of-hackers-sites/</loc><lastmod>2026-03-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/20/russian-intelligence-services-target-commercial-messaging-application-accounts/</loc><lastmod>2026-03-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/20/all-aboard-the-nist-cybersecurity-for-iot-program-is-headed-to-our-next-stop-sha/</loc><lastmod>2026-03-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/20/cisa-adds-five-known-exploited-vulnerabilities-to-catalog/</loc><lastmod>2026-03-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/20/ddos-attacken-schlag-gegen-internationale-cyberkriminelle/</loc><lastmod>2026-03-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/20/cape-raises-100-million-for-protection-against-cellular-security-threats/</loc><lastmod>2026-03-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/20/proton-mail-shared-user-information-with-the-police/</loc><lastmod>2026-03-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/20/navia-data-breach-impacts-27-million/</loc><lastmod>2026-03-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/20/google-adds-24-hour-wait-for-unverified-app-sideloading-to-reduce-malware-and-sc/</loc><lastmod>2026-03-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/20/thousands-of-magento-sites-hit-in-ongoing-defacement-campaign/</loc><lastmod>2026-03-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/20/starmers-digital-id-reboot-raises-same-old-questions-as-its-blair-era-ancestor/</loc><lastmod>2026-03-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/20/the-importance-of-behavioral-analytics-in-ai-enabled-cyber-attacks/</loc><lastmod>2026-03-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/20/musician-admits-to-10m-streaming-royalty-fraud-using-ai-bots/</loc><lastmod>2026-03-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/20/magento-polyshell-flaw-enables-unauthenticated-uploads-rce-and-account-takeover/</loc><lastmod>2026-03-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/20/allure-security-raises-17-million-for-online-brand-protection/</loc><lastmod>2026-03-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/20/data-centers-are-military-targets-now/</loc><lastmod>2026-03-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/20/gsocket-backdoor-delivered-through-bash-script-fri-mar-20th/</loc><lastmod>2026-03-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/20/critical-langflow-vulnerability-exploited-hours-after-public-disclosure/</loc><lastmod>2026-03-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/20/international-joint-action-disrupts-worlds-largest-ddos-botnets/</loc><lastmod>2026-03-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/20/microsoft-march-windows-updates-break-teams-onedrive-sign-ins/</loc><lastmod>2026-03-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/20/aisuru-and-kimwolf-ddos-botnets-disrupted-in-international-operation/</loc><lastmod>2026-03-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/20/while-youre-here-could-you-go-out-of-your-way-to-do-an-impossible-job/</loc><lastmod>2026-03-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/20/the-espionage-reality-your-infrastructure-is-already-in-the-collection-path/</loc><lastmod>2026-03-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/20/ex-data-analyst-stole-company-data-in-25m-extortion-scheme/</loc><lastmod>2026-03-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/20/doj-disrupts-3-million-device-iot-botnets-behind-record-314-tbps-global-ddos-att/</loc><lastmod>2026-03-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/20/apple-warns-older-iphones-vulnerable-to-coruna-darksword-exploit-kit-attacks/</loc><lastmod>2026-03-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/20/die-besten-iam-tools/</loc><lastmod>2026-03-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/20/risky-bulletin-aws-kills-bucketsquatting/</loc><lastmod>2026-03-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/20/feds-disrupt-iot-botnets-behind-huge-ddos-attacks/</loc><lastmod>2026-03-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/20/the-global-ciso-landscape-a-leadership-gap-too-large-to-ignore/</loc><lastmod>2026-03-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/cisa-urges-it-to-harden-endpoint-management-systems-after-cyberattack-by-pro-ira/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/that-cheap-kvm-device-could-expose-your-network-to-remote-compromise/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/ai-conundrum-why-mcp-security-cant-be-patched-away/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/navia-discloses-data-breach-impacting-27-million-people/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/with-governments-role-uncertain-businesses-unite-to-combat-fraud/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/millions-of-iphones-can-be-hacked-with-a-new-tool-found-in-the-wild/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/native-launches-with-security-control-plane-for-multicloud/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/new-polyshell-flaw-allows-unauthenticated-rce-on-magento-e-stores/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/speagle-malware-hijacks-cobra-docguard-to-steal-data-via-compromised-servers/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/unknown-attackers-exploit-yet-another-critical-sharepoint-bug/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/epic-endorses-bipartisan-government-surveillance-reform-act-to-rein-in-runaway-w/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/54-edr-killers-use-byovd-to-exploit-34-signed-vulnerable-drivers-and-disable-sec/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/epic-urges-house-financial-services-committee-to-protect-financial-privacy/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/google-gives-android-users-a-way-to-install-unverified-apps-if-they-prove-they-r/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/ransomware-group-exploited-cisco-firewall-vulnerability-as-a-zero-day-weeks-befo/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/oasis-security-raises-120-million-for-agentic-access-management/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/post-quantum-web-could-be-safer-faster/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/1stprotect-emerges-from-stealth-with-20-million-in-funding/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/critical-screenconnect-vulnerability-exposes-machine-keys/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/privacy-platform-cloaked-raises-375m-to-expand-enterprise-reach/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/google-details-new-24-hour-process-to-sideload-unverified-android-apps/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/bitrefill-blames-north-korean-lazarus-group-for-cyberattack/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/beijing-wants-its-own-quantum-resistant-encryption-standards-rather-than-adopt-n/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/android-devices-ship-with-firmware-level-malware/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/fbi-seizes-handala-data-leak-site-after-stryker-cyberattack/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/lock-down-microsoft-intune-feds-warn-after-stryker-attack/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/iran-readied-cyberattack-capabilities-for-response-prior-to-epic-fury/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/marquis-data-breach-affects-672000-individuals/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/russian-hackers-exploit-zimbra-flaw-in-ukrainian-govt-attacks/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/telnet-vulnerability-opens-door-to-remote-code-execution-as-root/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/threatsday-bulletin-fortigate-raas-citrix-exploits-mcp-abuse-livechat-phish-more/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/security-firm-aura-discloses-data-breach-impacting-900000-records/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/7-ways-to-prevent-privilege-escalation-via-password-resets/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/hacker-conversations-ben-harris-from-unintentional-young-hacker-to-intentional-a/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/russian-apt-exploits-zimbra-vulnerability-against-ukraine/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/max-severity-ubiquiti-unifi-flaw-may-allow-account-takeover/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/spyclouds-2026-identity-exposure-report-reveals-explosion-of-non-human-identity/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/new-perseus-android-banking-malware-monitors-notes-apps-to-extract-sensitive-dat/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/cisa-adds-one-known-exploited-vulnerability-to-catalog/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/schneider-electric-ecostruxure-automation-expert/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/schneider-electric-modicon-m241-m251-and-m262/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/mitsubishi-electric-cnc-series/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/ctek-chargeportal/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/automated-logic-webctrl-premium-server/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/igl-technologies-eparkingfi/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/schneider-electric-ecostruxure-pme-and-epo/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/schneider-electric-modicon-controllers-m241-m251-m258-and-lmc058/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/cisa-urges-us-orgs-to-secure-microsoft-intune-systems-after-stryker-breach/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/how-ceros-gives-security-teams-visibility-and-control-in-claude-code/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/raven-emerges-from-stealth-with-20-million-in-funding/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/new-perseus-android-malware-checks-user-notes-for-secrets/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/critical-microsoft-sharepoint-flaw-now-exploited-in-attacks/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/5-key-priorities-for-your-rsac-2026-agenda/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/the-multi-billion-dollar-mistake-why-cloud-misconfigurations-are-your-biggest-se/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/hacking-a-robot-vacuum/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/cisa-warns-of-attacks-exploiting-recent-sharepoint-vulnerability/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/darksword-ios-exploit-kit-uses-6-flaws-3-zero-days-for-full-device-takeover/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/your-mfa-isnt-broken-its-being-bypassed-and-your-employees-cant-tell-the-differe/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/cisco-firewall-vulnerability-exploited-as-zero-day-in-interlock-ransomware-attac/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/eu-sanctions-companies-in-china-iran-for-cyberattacks/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/anthropic-ban-heralds-new-era-of-supply-chain-risk-with-no-clear-playbook/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/cisa-warns-of-zimbra-sharepoint-flaw-exploits-cisco-zero-day-hit-in-ransomware-a/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/cloud-access-security-broker-ein-kaufratgeber/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/srsly-risky-biz-successful-war-leaves-iran-with-one-option-cyber/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/interesting-message-stored-in-cowrie-logs-wed-mar-18th/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/android-devices-ship-with-firmware-level-malware/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/19/2025-year-in-review-malicious-infrastructure/</loc><lastmod>2026-03-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/18/okta-made-a-nightmare-micromanager-for-your-ai-agents/</loc><lastmod>2026-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/18/aura-confirms-data-breach-exposing-900000-marketing-contacts/</loc><lastmod>2026-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/18/state-snoops-and-spyware-vendors-planting-info-stealing-malware-on-iphones-googl/</loc><lastmod>2026-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/18/darksword-iphone-exploit-kit-serves-spies-amp-thieves-alike/</loc><lastmod>2026-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/18/c2-implant-snappyclient-targets-crypto-wallets/</loc><lastmod>2026-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/18/cisa-orders-feds-to-patch-zimbra-xss-flaw-exploited-in-attacks/</loc><lastmod>2026-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/18/the-collapse-of-predictive-security-in-the-age-of-machine-speed-attacks/</loc><lastmod>2026-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/18/connectwise-patches-new-flaw-allowing-screenconnect-hijacking/</loc><lastmod>2026-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/18/autonomous-offensive-security-firm-xbow-raises-120m-at-1b-valuation/</loc><lastmod>2026-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/18/amazon-security-boss-says-crims-abused-max-security-cisco-firewall-flaw-weeks-be/</loc><lastmod>2026-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/18/ofac-sanctions-dprk-it-worker-network-funding-wmd-programs-through-fake-remote-j/</loc><lastmod>2026-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/18/ransomware-gang-exploits-cisco-flaw-in-zero-day-attacks-since-january/</loc><lastmod>2026-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/18/interlock-ransomware-exploits-cisco-fmc-zero-day-cve-2026-20131-for-root-access/</loc><lastmod>2026-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/18/cloud-security-startup-native-exits-stealth-with-42-million-in-funding/</loc><lastmod>2026-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/18/marquis-ransomware-gang-stole-data-of-672k-people-in-cyberattack/</loc><lastmod>2026-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/18/darksword-ios-exploit-kit-used-by-state-sponsored-hackers-spyware-vendors/</loc><lastmod>2026-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/18/claudy-day-trio-of-flaws-exposes-claude-users-to-data-theft/</loc><lastmod>2026-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/18/virtual-summit-today-supply-chain-third-party-risk-summit/</loc><lastmod>2026-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/18/eu-sanctions-chinese-iranian-firms-supporting-hacking-operations/</loc><lastmod>2026-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/18/senators-demand-answers-on-metas-plans-for-facial-recognition-smart-glasses-foll/</loc><lastmod>2026-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/18/the-refund-fraud-economy-exploiting-major-retailers-and-payment-platforms/</loc><lastmod>2026-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/18/new-darksword-ios-exploit-used-in-infostealer-attack-on-iphones/</loc><lastmod>2026-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/18/shadow-ai-risk-how-saas-apps-are-quietly-enabling-massive-breaches/</loc><lastmod>2026-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/18/manifold-raises-8-million-for-ai-detection-and-response/</loc><lastmod>2026-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/18/north-koreas-100000-strong-fake-it-worker-army-rake-in-500m-a-year-for-kim-jong/</loc><lastmod>2026-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/18/nordstroms-email-system-abused-to-send-crypto-scams-to-customers/</loc><lastmod>2026-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/18/scans-for-adminer-wed-mar-18th/</loc><lastmod>2026-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/18/meta-tiktok-steal-personal-amp-financial-info-when-users-click-ads/</loc><lastmod>2026-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/18/sidewinder-espionage-campaign-expands-across-southeast-asia/</loc><lastmod>2026-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/18/iranian-hackers-likely-used-malware-stolen-credentials-in-stryker-breach/</loc><lastmod>2026-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/18/apple-debuts-background-security-improvements-with-fresh-webkit-patches/</loc><lastmod>2026-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/18/britains-satellite-watching-gap-to-be-plugged-with-175m-eyeball-in-cyprus/</loc><lastmod>2026-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/18/cisa-urges-endpoint-management-system-hardening-after-cyberattack-against-us-org/</loc><lastmod>2026-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/18/cisa-adds-one-known-exploited-vulnerability-to-catalog/</loc><lastmod>2026-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/18/cisa-adds-one-known-exploited-vulnerability-to-catalog/</loc><lastmod>2026-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/18/reco-targets-ai-agent-blind-spots-with-new-security-capability/</loc><lastmod>2026-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/18/claude-code-security-and-magecart-getting-the-threat-model-right/</loc><lastmod>2026-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/18/9-critical-ip-kvm-flaws-enable-unauthenticated-root-access-across-four-vendors/</loc><lastmod>2026-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/18/metas-ai-glasses-and-privacy/</loc><lastmod>2026-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/18/researcher-discovers-4th-whatsapp-view-once-bypass-meta-wont-patch/</loc><lastmod>2026-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/18/bsi-moniert-software-sicherheit-im-gesundheitswesen/</loc><lastmod>2026-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/18/product-walkthrough-how-mesh-csma-reveals-and-breaks-attack-paths-to-crown-jewel/</loc><lastmod>2026-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/18/press-release-ftc-should-develop-privacy-protective-age-assurance-standards-lead/</loc><lastmod>2026-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/18/can-you-prove-the-person-on-the-other-side-is-real/</loc><lastmod>2026-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/18/clickfix-treibt-neue-infostealer-kampagnen-an/</loc><lastmod>2026-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/18/cybersecurity-and-privacy-priorities-for-2026-the-legal-risk-map/</loc><lastmod>2026-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/18/ubuntu-cve-2026-3888-bug-lets-attackers-gain-root-via-systemd-cleanup-timing-exp/</loc><lastmod>2026-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/18/irans-cyberattack-against-med-tech-firm-is-just-the-beginning/</loc><lastmod>2026-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/18/cisos-rethink-their-data-protection-strategies/</loc><lastmod>2026-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/18/apple-fixes-webkit-vulnerability-enabling-same-origin-policy-bypass-on-ios-and-m/</loc><lastmod>2026-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/18/critical-unpatched-telnetd-flaw-cve-2026-32746-enables-unauthenticated-root-rce/</loc><lastmod>2026-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/18/linux-foundation-kicks-off-effort-to-shield-foss-maintainers-from-ai-slop-bug-re/</loc><lastmod>2026-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/18/die-besten-hacker-filme/</loc><lastmod>2026-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/18/japan-to-allow-proactive-cyber-defense-from-october-1st/</loc><lastmod>2026-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/18/risky-bulletin-eu-finally-imposes-more-cyber-sanctions/</loc><lastmod>2026-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/18/apple-pushes-first-background-security-improvements-update-to-fix-webkit-flaw/</loc><lastmod>2026-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/17/more-attackers-are-logging-in-not-breaking-in/</loc><lastmod>2026-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/17/glassworm-malware-hits-400-code-repos-on-github-npm-vscode-openvsx/</loc><lastmod>2026-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/17/clear-communication-the-missing-link-in-cybersecurity-success/</loc><lastmod>2026-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/17/less-lucrative-ransomware-market-makes-attackers-alter-methods/</loc><lastmod>2026-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/17/how-world-id-wants-to-put-a-unique-human-identity-on-every-ai-agent/</loc><lastmod>2026-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/17/worldscoinss-newest-pitch-scan-your-eyeballs-to-prove-ai-agents-really-represent/</loc><lastmod>2026-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/17/epic-joins-coalition-to-urge-openai-to-withdraw-california-ai-safety-ballot-init/</loc><lastmod>2026-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/17/hackers-target-cybersecurity-firm-outpost24-in-7-stage-phish/</loc><lastmod>2026-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/17/nvidia-nemoclaw-promises-to-run-openclaw-agents-securely/</loc><lastmod>2026-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/17/trump-wants-to-put-you-in-a-massive-secret-government-database/</loc><lastmod>2026-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/17/europe-sanctions-chinese-and-iranian-firms-for-cyberattacks/</loc><lastmod>2026-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/17/researchers-disclose-vulnerabilities-in-ip-kvms-from-four-manufacturers/</loc><lastmod>2026-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/17/ai-flaws-in-amazon-bedrock-langsmith-and-sglang-enable-data-exfiltration-and-rce/</loc><lastmod>2026-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/17/eu-sanctions-iranian-cyber-front-over-election-meddling-charlie-hebdo-breach/</loc><lastmod>2026-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/17/tech-giants-invest-125-million-in-open-source-security/</loc><lastmod>2026-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/17/uk-companies-house-exposed-details-of-millions-of-firms/</loc><lastmod>2026-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/17/warlock-ransomware-group-augments-post-exploitation-activities/</loc><lastmod>2026-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/17/leaknet-ransomware-uses-clickfix-via-hacked-sites-deploys-deno-in-memory-loader/</loc><lastmod>2026-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/17/surf-ai-raises-57-million-for-agentic-security-operations-platform/</loc><lastmod>2026-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/17/top-5-things-cisos-need-to-do-today-to-secure-ai-agents/</loc><lastmod>2026-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/17/new-font-rendering-trick-hides-malicious-commands-from-ai-tools/</loc><lastmod>2026-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/17/microsoft-stops-force-installing-the-microsoft-365-copilot-app/</loc><lastmod>2026-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/17/robotic-surgery-giant-intuitive-discloses-cyberattack/</loc><lastmod>2026-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/17/cyber-attacken-fluten-eon-netz-angriffe-verzehnfacht/</loc><lastmod>2026-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/17/174-vulnerabilities-targeted-by-rondodox-botnet/</loc><lastmod>2026-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/17/google-meta-microsoft-among-signatories-of-pact-to-combat-scams/</loc><lastmod>2026-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/17/leaknet-ransomware-uses-clickfix-deno-runtime-in-stealthy-attacks/</loc><lastmod>2026-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/17/microsoft-shares-fix-for-windows-c-drive-access-issues-on-samsung-pcs/</loc><lastmod>2026-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/17/schneider-electric-scadapack-and-remoteconnect/</loc><lastmod>2026-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/17/schneider-electric-ecostruxure-data-center-expert/</loc><lastmod>2026-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/17/siemens-sicam-siapp-sdk/</loc><lastmod>2026-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/17/codesys-in-festo-automation-suite/</loc><lastmod>2026-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/17/tracebit-raises-20m-for-cloud-native-deception-technology/</loc><lastmod>2026-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/17/ipv4-mapped-ipv6-addresses-tue-mar-17th/</loc><lastmod>2026-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/17/ai-is-everywhere-but-cisos-are-still-securing-it-with-yesterdays-skills-and-tool/</loc><lastmod>2026-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/17/aws-bedrocks-isolated-sandbox-comes-with-a-dns-escape-hatch/</loc><lastmod>2026-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/17/new-windows-11-hotpatch-fixes-bluetooth-device-visibility-issue/</loc><lastmod>2026-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/17/cisa-flags-year-old-wing-ftp-vulnerability-as-exploited/</loc><lastmod>2026-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/17/microsoft-enabling-teams-meeting-add-in-breaks-outlook-classic/</loc><lastmod>2026-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/17/ai-apis-and-ddos-collide-in-new-era-of-coordinated-cyberattacks/</loc><lastmod>2026-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/17/south-korean-police-accidentally-post-cryptocurrency-wallet-password/</loc><lastmod>2026-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/17/konni-deploys-endrat-through-phishing-uses-kakaotalk-to-propagate-malware/</loc><lastmod>2026-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/17/too-big-to-ignore-too-small-to-be-served-the-midmarket-security-gap/</loc><lastmod>2026-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/17/switzerland-built-a-secure-alternative-to-bgp-the-rest-of-the-world-hasnt-notice/</loc><lastmod>2026-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/17/bonus-podcast-episode-privacys-defender-cindy-cohn-with-cory-doctorow/</loc><lastmod>2026-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/17/runtime-the-new-frontier-of-ai-agent-security/</loc><lastmod>2026-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/17/cisa-flags-actively-exploited-wing-ftp-vulnerability-leaking-server-paths/</loc><lastmod>2026-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/17/gartner-suggests-friday-afternoon-copilot-ban-because-users-may-be-too-lazy-to-c/</loc><lastmod>2026-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/17/6-risk-assessment-frameworks-im-vergleich/</loc><lastmod>2026-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/17/was-ist-ein-keylogger/</loc><lastmod>2026-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/17/bank-built-its-own-threat-hunting-agent-because-vendors-cant-keep-pace-with-new/</loc><lastmod>2026-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/17/china-nexus-hackers-skulk-in-southeast-asian-military-orgs-for-years/</loc><lastmod>2026-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/16/glassworm-malware-evolves-to-hide-in-dependencies/</loc><lastmod>2026-03-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/16/the-associated-press-tax-scams-are-on-the-rise-heres-what-to-know/</loc><lastmod>2026-03-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/16/inside-olympic-cybersecurity-lessons-from-paris-2024-to-milan-cortina-2026/</loc><lastmod>2026-03-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/16/robotics-surgical-biz-intuitive-discloses-phishing-attack/</loc><lastmod>2026-03-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/16/glassworm-attack-uses-stolen-github-tokens-to-force-push-malware-into-python-rep/</loc><lastmod>2026-03-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/16/epic-testifies-in-support-of-colorado-bill-on-surveillance-pricing-and-wages/</loc><lastmod>2026-03-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/16/blocking-the-internet-archive-wont-stop-ai-but-it-will-erase-the-webs-historical/</loc><lastmod>2026-03-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/16/stryker-attack-wiped-tens-of-thousands-of-devices-no-malware-needed/</loc><lastmod>2026-03-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/16/cybercrime-has-skyrocketed-245-since-the-start-of-the-iran-war/</loc><lastmod>2026-03-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/16/cisa-flags-wing-ftp-server-flaw-as-actively-exploited-in-attacks/</loc><lastmod>2026-03-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/16/uks-companies-house-confirms-security-flaw-exposed-business-data/</loc><lastmod>2026-03-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/16/ai-finally-delivers-those-elusive-productivity-gains-for-cybercriminals/</loc><lastmod>2026-03-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/16/microsoft-exchange-online-outage-blocks-access-to-mailboxes/</loc><lastmod>2026-03-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/16/oracle-ebs-hack-only-4-corporate-giants-still-silent-on-potential-impact/</loc><lastmod>2026-03-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/16/security-firm-executive-targeted-in-sophisticated-phishing-attack/</loc><lastmod>2026-03-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/16/weekly-recap-chrome-0-days-router-botnets-aws-breach-rogue-ai-agents-more/</loc><lastmod>2026-03-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/16/attackers-abuse-livechat-to-phish-credit-card-personal-data/</loc><lastmod>2026-03-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/16/shadow-ai-is-everywhere-heres-how-to-find-and-secure-it/</loc><lastmod>2026-03-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/16/proxy-url-scans-with-ip-addresses-mon-mar-16th/</loc><lastmod>2026-03-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/16/china-linked-hackers-hit-asian-militaries-in-patient-espionage-operation/</loc><lastmod>2026-03-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/16/threat-actor-targeting-vpn-users-in-new-credential-theft-campaign/</loc><lastmod>2026-03-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/16/flaw-in-uks-corporate-registry-let-directors-rummage-through-rival-records/</loc><lastmod>2026-03-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/16/cisa-adds-one-known-exploited-vulnerability-to-catalog/</loc><lastmod>2026-03-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/16/why-security-validation-is-becoming-agentic/</loc><lastmod>2026-03-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/16/forcememo-python-repositories-compromised-in-glassworm-aftermath/</loc><lastmod>2026-03-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/16/clickfix-campaigns-spread-macsync-macos-infostealer-via-fake-ai-tool-installers/</loc><lastmod>2026-03-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/16/open-vsx-extensions-hijacked-glassworm-malware-spreads-via-dependency-abuse/</loc><lastmod>2026-03-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/16/nine-critical-vulnerabilities-in-linux-apparmor-put-over-12m-enterprise-systems/</loc><lastmod>2026-03-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/16/possible-new-result-in-quantum-factorization/</loc><lastmod>2026-03-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/16/drillapp-backdoor-targets-ukraine-abuses-microsoft-edge-debugging-for-stealth-es/</loc><lastmod>2026-03-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/16/hacking-attempt-reported-at-polands-nuclear-research-center/</loc><lastmod>2026-03-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/16/what-it-takes-to-win-that-cso-role/</loc><lastmod>2026-03-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/16/clickfix-techniques-evolve-in-new-infostealer-campaigns/</loc><lastmod>2026-03-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/16/android-17-blocks-non-accessibility-apps-from-accessibility-api-to-prevent-malwa/</loc><lastmod>2026-03-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/16/genai-security-als-checkliste/</loc><lastmod>2026-03-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/16/risky-bulletin-meta-disrupts-mexican-cartels/</loc><lastmod>2026-03-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/16/2025-identity-threat-landscape-report-inside-the-infostealer-economy-credential/</loc><lastmod>2026-03-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/15/outsourcer-telus-admits-to-attack-may-have-lost-a-petabyte-of-data-to-shinyhunte/</loc><lastmod>2026-03-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/15/openai-says-chatgpt-ads-are-not-rolling-out-globally-for-now/</loc><lastmod>2026-03-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/15/the-guardian-hacked-data-shines-light-on-homeland-securitys-ai-surveillance-ambi/</loc><lastmod>2026-03-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/15/the-foilies-2026/</loc><lastmod>2026-03-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/15/betterleaks-a-new-open-source-secrets-scanner-to-replace-gitleaks/</loc><lastmod>2026-03-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/15/loblaw-data-breach-impacts-customer-information/</loc><lastmod>2026-03-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/15/crypto-spends-big-in-illinois-house-races-to-say-consumer-rights-supporters-are/</loc><lastmod>2026-03-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/14/microsoft-releases-windows-11-oob-hotpatch-to-fix-rras-rce-flaw/</loc><lastmod>2026-03-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/14/openclaw-ai-agent-flaws-could-enable-prompt-injection-and-data-exfiltration/</loc><lastmod>2026-03-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/14/upcoming-speaking-engagements/</loc><lastmod>2026-03-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/14/appsflyer-web-sdk-hijacked-to-spread-crypto-stealing-javascript-code/</loc><lastmod>2026-03-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/14/glassworm-supply-chain-attack-abuses-72-open-vsx-extensions-to-target-developers/</loc><lastmod>2026-03-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/14/critical-hpe-aos-cx-vulnerability-allows-admin-password-resets/</loc><lastmod>2026-03-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/14/smartapesg-campaign-uses-clickfix-page-to-push-remcos-rat-sat-mar-14th/</loc><lastmod>2026-03-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/microsoft-windows-11-users-cant-access-c-drive-on-some-samsung-pcs/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/friday-squid-blogging-increased-squid-population-in-the-falklands/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/fbi-seeks-victims-of-steam-games-used-to-spread-malware/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/supply-chain-attack-using-invisible-code-hits-github-and-other-repositories/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/league-of-women-voters-epic-urge-court-to-protect-privacy-and-voting-rights-by-r/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/google-warns-of-two-actively-exploited-chrome-zero-days/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/fake-pocs-misunderstood-risks-cause-cisco-sd-wan-chaos/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/epic-testifies-in-support-of-maryland-chatbots-bill/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/eff-launches-new-fight-to-free-the-law/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/the-data-gap-why-nonprofit-cyber-incidents-go-underreported/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/chinese-hackers-target-southeast-asian-militaries-with-applechris-and-memfun-mal/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/credential-stealing-crew-spoofs-vpn-clients-from-cisco-fortinet-and-others/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/cyberattackers-dont-care-about-good-causes/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/polands-nuclear-research-centre-targeted-by-cyberattack/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/meta-to-shut-down-instagram-end-to-end-encrypted-chat-support-starting-may-2026/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/microsoft-investigates-classic-outlook-sync-and-connection-issues/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/in-mccarthy-v-amazon-ninth-circuit-allows-suicide-kit-lawsuits-against-amazon-to/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/initial-access-techniques-used-by-iran-based-threat-actors/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/cyber-criminals-too-are-working-from-home-your-home/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/will-ai-save-consumers-from-smartphone-based-phishing-attacks/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/starbucks-data-breach-impacts-employees/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/interpol-dismantles-45000-malicious-ips-arrests-94-in-global-cybercrime/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/i-wrote-a-movie-review-cops-took-it-from-a-protesters-home-to-make-the-case-that/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/in-other-news-n8n-flaw-exploited-slopoly-malware-interpol-cybercrime-crackdown/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/from-vmware-to-whats-next-protecting-data-during-hypervisor-migration/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/bloomberg-law-complying-with-california-kids-code-is-suddenly-more-complicated/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/storm-2561-spreads-trojan-vpn-clients-via-seo-poisoning-to-steal-credentials/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/police-sinkholes-45000-ip-addresses-in-cybercrime-crackdown/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/investigating-a-new-click-fix-variant/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/fake-enterprise-vpn-downloads-used-to-steal-company-credentials/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/most-google-cloud-attacks-start-with-bug-exploitation/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/real-time-banking-trojan-strikes-brazils-pix-users/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/interpol-cybercrime-crackdown-leads-to-94-arrests-45000-ip-takedowns/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/iran-linked-hackers-take-aim-at-us-and-other-targets-raising-risk-of-cyberattack/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/veeam-warns-admins-to-patch-now-as-critical-rce-flaws-hit-backup-replication/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/cisa-adds-two-known-exploited-vulnerabilities-to-catalog/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/nanoclaw-latches-onto-docker-sandboxes-for-safer-ai-agents/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/bold-security-emerges-from-stealth-with-40-million-in-funding/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/google-rushes-chrome-update-fixing-two-zero-days-already-under-attack/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/google-paid-out-17-million-in-bug-bounty-rewards-in-2025/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/academia-and-the-ai-brain-drain/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/iran-linked-hacker-attack-on-stryker-disrupted-manufacturing-and-shipping/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/onyx-security-launches-with-40-million-in-funding/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/google-fixes-two-chrome-zero-days-exploited-in-the-wild-affecting-skia-and-v8/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/hybrid-resilience-designing-incident-response-across-on-prem-cloud-and-saas-with/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/storm-2561-targets-enterprise-vpn-users-with-seo-poisoning-fake-clients/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/authorities-disrupt-socksescort-proxy-service-powered-by-avrecon-botnet/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/nine-crackarmor-flaws-in-linux-apparmor-enable-root-escalation-bypass-container/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/starbucks-discloses-data-breach-affecting-hundreds-of-employees/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/chrome-146-update-patches-two-exploited-zero-days/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/a-react-based-phishing-page-with-credential-exfiltration-via-emailjs-fri-mar-13t/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/the-cyber-perimeter-was-never-dead-we-just-abandoned-it/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/google-fixes-two-new-chrome-zero-days-exploited-in-attacks/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/authorities-disrupt-socksescort-proxy-botnet-exploiting-369000-ips-across-163-co/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/veeam-patches-7-critical-backup-replication-flaws-allowing-remote-code-execution/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/10-kennzahlen-die-cisos-weiterbringen/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/risky-bulletin-another-residential-proxy-provider-falls-as-authorities-continue/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/telus-digital-hit-with-massive-data-breach/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/march-patch-tuesday-visits-15-product-families/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/13/initial-access-techniques-used-by-iran-based-threat-actors/</loc><lastmod>2026-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/rogue-ai-agents-can-work-together-to-hack-systems-and-steal-secrets/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/ninth-circuit-deals-another-blow-to-big-techs-campaign-for-broad-immunity-from-r/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/the-who-what-and-why-of-the-attack-that-has-shut-down-strykers-windows-network/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/why-post-quantum-cryptography-cant-wait/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/canadian-retail-giant-loblaw-notifies-customers-of-data-breach/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/iran-mois-colludes-with-criminals-to-boost-cyberattacks/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/england-hockey-investigating-ransomware-data-breach/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/commercial-spyware-opponents-fear-us-policy-shifting/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/ai-generated-slopoly-malware-used-in-interlock-ransomware-attack/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/iphones-and-ipads-approved-for-nato-classified-data/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/ab-1043s-internet-age-gates-hurt-everyone/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/rep-finke-was-right-age-gating-isnt-about-kids-its-about-control/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/medical-giant-stryker-crippled-after-iranian-hackers-remotely-wipe-computers/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/rust-based-venon-malware-targets-33-brazilian-banks-with-credential-stealing-ove/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/delineas-strongdm-acquisition-highlights-the-changing-role-of-pam/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/hive0163-uses-ai-assisted-slopoly-malware-for-persistent-access-in-ransomware-at/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/veeam-warns-of-critical-flaws-exposing-backup-servers-to-rce-attacks/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/why-strykers-outage-is-a-disaster-recovery-wake-up-call/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/operating-lightning-takes-down-socksescort-proxy-network-blamed-for-tens-of-mill/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/us-disrupts-socksescort-proxy-network-powered-by-linux-malware/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/google-paid-171-million-for-vulnerability-reports-in-2025/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/apple-updates-legacy-ios-versions-to-patch-coruna-exploits/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/telus-digital-confirms-breach-after-hacker-claims-1-petabyte-data-theft/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/what-orgs-can-learn-from-olympics-world-cup-ir-plans/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/going-the-extra-mile-travel-rewards-turn-into-underground-currency/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/building-resilient-cloud-security-architectures-for-todays-threat-landscape/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/apple-patches-older-iphones-and-ipads-against-coruna-exploits/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/cisa-warns-max-severity-n8n-bug-is-being-exploited-in-the-wild/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/how-to-scale-phishing-detection-in-your-soc-3-steps-for-cisos/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/meta-launches-new-protection-tools-as-it-helps-disrupt-scam-centers/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/threatsday-bulletin-oauth-trap-edr-killer-signal-phishing-zombie-zip-ai-platform/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/doj-wants-sensitive-voter-data-but-cant-be-bothered-to-protect-it/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/ally-wordpress-plugin-flaw-exposes-over-200000-websites-to-attacks/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/the-human-ioc-why-security-professionals-struggle-with-social-vetting/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/splunk-zoom-patch-severe-vulnerabilities/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/siemens-heliox-ev-chargers/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/inductive-automation-ignition-software/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/trane-tracer-sc-tracer-sc-and-tracer-concierge/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/siemens-ruggedcom-ape1808-devices/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/siemens-simatic/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/siemens-sidis-prime/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/phantomraven-returns-to-npm-with-88-bad-packages/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/us-charges-another-ransomware-negotiator-linked-to-blackcat-attacks/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/attackers-dont-just-send-phishing-emails-they-weaponize-your-socs-workload/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/cisco-patches-high-severity-ios-xr-vulnerabilities/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/apple-issues-security-updates-for-older-ios-devices-targeted-by-coruna-webkit-ex/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/critical-n8n-vulnerabilities-allowed-server-takeover/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/polyfill-supply-chain-attack-impacting-100k-sites-linked-to-north-korea/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/north-korean-fake-it-worker-tradecraft-exposed/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/six-android-malware-families-target-pix-payments-banking-apps-and-crypto-wallets/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/ai-use-is-changing-how-much-companies-pay-for-cyber-insurance/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/zombie-zip-neue-angriffstechnik-täuscht-virenscanner/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/cisa-flags-actively-exploited-n8n-rce-bug-as-24700-instances-remain-exposed/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/wie-cisos-schlechte-angebote-enttarnen/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/srsly-risky-biz-trumps-cyber-strategy-great-amazing-the-best-yet/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/chinas-cert-warns-openclaw-can-inflict-nasty-wounds/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/when-your-iot-device-logs-in-as-admin-itx3fs-too-latex21-x5bguest-diaryx5d-wed-m/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/12/february-2026-cve-landscape-13-critical-vulnerabilities-mark-43-drop-from-januar/</loc><lastmod>2026-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/resumés-with-malicious-iso-attachments-are-circulating-says-aryaka/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/cisa-warns-of-actively-exploited-ivanti-epm-and-cisco-sd-wan-flaws/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/certbot-and-lets-encrypt-now-support-ip-address-certificates/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/iran-plots-infrastructure-warfare-against-us-tech-giants/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/a-guy-who-wrote-the-code-died-in-2005-i-still-have-to-secure-it/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/trumps-ai-powered-world-wars/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/inc-ransomware-group-holds-healthcare-hostage-in-oceania/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/14000-routers-are-infected-by-malware-thats-highly-resistant-to-takedowns/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/iran-linked-cyber-crew-says-they-hit-us-med-tech-firm/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/xygeni-github-action-compromised-via-tag-poison/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/whatsapp-introduces-parent-managed-accounts-for-pre-teens/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/sqli-flaw-in-elementor-ally-plugin-impacts-250k-wordpress-sites/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/senate-confirms-joshua-rudd-to-lead-nsa-and-us-cyber-command/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/cisa-orders-feds-to-patch-n8n-rce-flaw-exploited-in-attacks/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/meta-international-cops-use-handcuffs-and-ai-to-stop-scammers/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/medtech-giant-stryker-offline-after-iran-linked-wiper-malware-attack/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/new-phantomraven-npm-attack-wave-steals-dev-data-via-88-packages/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/researchers-trick-perplexitys-comet-ai-browser-into-phishing-scam-in-under-four/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/iran-backed-hackers-claim-wiper-attack-on-medtech-firm-stryker/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/medtech-giant-stryker-crippled-by-iran-linked-hacker-attack/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/critical-n8n-flaws-allow-remote-code-execution-and-exposure-of-stored-credential/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/government-spying-targeted-advertising-effector-385/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/chinese-nexus-actors-shift-focus-to-qatar-amid-iranian-conflict/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/wiz-joins-google-cloud-as-landmark-acquisition-closes/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/ico-fines-police-scotland-over-data-sharing-debacle-in-gross-misconduct-case/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/ciso-conversations-aimee-cardwell/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/238000-impacted-by-bell-ambulance-data-breach/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/meta-adds-new-whatsapp-facebook-and-messenger-anti-scam-tools/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/scanner-raises-22-million-for-ai-powered-threat-hunting/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/meta-disables-150k-accounts-linked-to-southeast-asia-scam-centers-in-global-crac/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/aws-expands-security-hub-for-multicloud-security-operations/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/swiss-e-voting-pilot-cant-count-2048-ballots-after-usb-keys-fail-to-decrypt-them/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/dozens-of-vendors-patch-security-flaws-across-enterprise-software-and-network-de/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/openai-to-acquire-ai-security-startup-promptfoo/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/dutch-cops-bust-teen-suspected-of-posing-as-bank-staff-to-steal-cards/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/fortinet-ivanti-intel-patch-high-severity-vulnerabilities/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/cisa-adds-one-known-exploited-vulnerability-to-catalog/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/how-to-10x-your-vulnerability-management-program-in-the-agentic-era/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/overly-permissive-guest-settings-put-salesforce-customers-at-risk/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/what-boards-must-demand-in-the-age-of-ai-automated-exploitation/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/eu-legal-eagle-says-banks-should-refund-cybercrime-victims-first-argue-later/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/michelin-confirms-data-breach-linked-to-oracle-ebs-attack/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/canada-needs-nationalized-public-ai/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/why-zero-trust-breaks-down-in-iot-and-ot-environments/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/did-cybersecurity-recently-have-its-gatling-gun-moment/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/quantro-security-emerges-from-stealth-with-25-million-in-funding/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/critical-flaw-in-hpe-aruba-cx-switches-lets-attackers-seize-admin-control-withou/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/cso-awards-2026-celebrates-world-class-security-strategies/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/announcing-the-2026-cso-hall-of-fame-honorees/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/a-5-step-approach-to-taming-shadow-ai/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/analyzing-zombie-zip-files-cve-2026-0866-wed-mar-11th/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/blacksanta-malware-activates-edr-and-av-killer-before-detonating-payload/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/microsoft-patches-84-flaws-in-march-patch-tuesday-including-two-public-zero-days/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/building-the-uks-next-generation-of-cyber-talent/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/privacy-internationals-remarks-at-the-side-event-of-the-61st-session-of-the-un-h/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/ics-patch-tuesday-vulnerabilities-fixed-by-siemens-schneider-moxa-mitsubishi-ele/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/unc6426-exploits-nx-npm-supply-chain-attack-to-gain-aws-admin-access-in-72-hours/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/12-ways-attackers-abuse-cloud-services-to-hack-your-enterprise/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/five-malicious-rust-crates-and-ai-bot-exploit-cicd-pipelines-to-steal-developer/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/6-mittel-gegen-security-tool-wildwuchs/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/jack-jill-went-up-the-hill-and-an-ai-tried-to-hack-them/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/middle-east-conflict-highlights-cloud-resilience-gaps/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/microsoft-patches-83-cves-in-march-update/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/microsoft-patch-tuesday-march-2026-edition/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/11/evil-evolution-clickfix-and-macos-infostealers/</loc><lastmod>2026-03-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/march-patch-tuesday-three-high-severity-holes-in-microsoft-office/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/copyright-bullying-vs-religious-freedom/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/new-blacksanta-edr-killer-spotted-targeting-hr-departments/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/risky-bulletin-gen-joshua-rudd-confirmed-as-next-cybercom-and-nsa-head/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/epic-leads-group-of-law-technology-scholars-in-rebutting-social-media-companies/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/new-beatbanker-android-malware-poses-as-starlink-app-to-hijack-devices/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/overly-permissive-salesforce-cloud-configs-in-the-crosshairs/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/think-twice-before-buying-or-using-metas-ray-bans/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/maine-senate-passes-strong-privacy-bill/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/the-government-must-not-force-companies-to-participate-in-ai-powered-surveillanc/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/critical-microsoft-excel-bug-weaponizes-copilot-agent-for-zero-click-information/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/new-zombie-zip-technique-lets-malware-slip-past-security-tools/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/threat-intelligence-by-eset-is-a-game-changer/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/the-cso-role-is-evolving-fast-with-ai-in-cyber-defense-strategy/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/microsoft-patches-83-vulnerabilities/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/russian-threat-actor-sednit-resurfaces-with-sophisticated-toolkit/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/cybercrime-isnt-just-a-cover-for-irans-government-goons-its-a-key-part-of-their/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/microsoft-releases-windows-10-kb5078885-extended-security-update/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/adobe-patches-80-vulnerabilities-across-eight-products/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/microsoft-march-2026-patch-tuesday-fixes-2-zero-days-79-flaws/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/jazz-emerges-from-stealth-with-61m-in-funding-for-ai-powered-dlp/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/windows-11-kb5079473-kb5078883-cumulative-updates-released/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/microsoft-patch-tuesday-march-2026-tue-mar-10th/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/hpe-warns-of-critical-aos-cx-flaw-allowing-admin-password-resets/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/crooks-compromise-wordpress-sites-to-push-infostealers-via-fake-captcha-prompts/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/fortigate-devices-exploited-to-breach-networks-and-steal-service-account-credent/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/kadnap-malware-infects-14000-edge-devices-to-power-stealth-proxy-botnet/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/microsoft-brings-phishing-resistant-windows-sign-ins-via-entra-passkeys/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/kai-emerges-from-stealth-with-125m-in-funding-for-ai-platform-bridging-it-and-ot/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/webinar-today-securing-fragile-ot-in-an-exposed-world/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/new-kadnap-botnet-hijacks-asus-routers-to-fuel-cybercrime-proxy-network/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/evil-evolution-clickfix-and-macos-infostealers/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/sap-patches-critical-fs-quo-netweaver-vulnerabilities/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/thousands-affected-by-ericsson-data-breach/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/epic-leads-coalition-demanding-the-government-reverse-illegal-data-grab-again/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/the-new-turing-test-how-threats-use-geometry-to-prove-humanness/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/fake-job-applications-pack-malware-that-kills-edr-before-stealing-data/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/blacksanta-edr-killer-targets-hr-workflows/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/openai-rolls-out-codex-security-vulnerability-scanner/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/kevin-mandias-armadin-launches-with-190-million-in-funding/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/new-leakylooker-flaws-in-google-looker-studio-could-enable-cross-tenant-sql-quer/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/hundreds-of-salesforce-customers-allegedly-targeted-in-new-data-theft-campaign/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/ericsson-blames-vendor-vishing-slip-up-for-breach-exposing-thousands-of-records/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/protecting-democracy-means-democratizing-cybersecurity-bring-on-the-hackers/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/honeywell-iq4x-bms-controller/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/ceragon-siklu-multihaul-and-etherhaul-series/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/apeman-cameras/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/lantronix-eds3000ps-and-eds5000/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/escape-raises-18-million-to-automate-pentesting/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/recent-ivanti-endpoint-manager-flaw-exploited-in-attacks/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/how-to-stop-ai-data-leaks-a-webinar-guide-to-auditing-modern-agentic-workflows/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/polish-cops-bust-alleged-teen-ddos-kit-sellers-youngest-just-12/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/cisa-recently-patched-ivanti-epm-flaw-now-actively-exploited/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/devs-looking-for-openclaw-get-served-a-ghostclaw-rat/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/sim-swaps-expose-a-critical-flaw-in-identity-security/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/the-zero-day-scramble-is-avoidable-a-guide-to-attack-surface-reduction/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/apt28-uses-beardshell-and-covenant-malware-to-spy-on-ukrainian-military/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/microsoft-to-enable-windows-hotpatch-security-updates-by-default/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/apt28-hackers-deploy-customized-variant-of-covenant-open-source-tool/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/the-ot-security-time-bomb-why-legacy-industrial-systems-are-the-biggest-cyber-ri/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/jailbreaking-the-f-35-fighter-jet/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/openai-to-acquire-promptfoo-to-strengthen-ai-agent-security-testing/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/why-access-decisions-are-becoming-the-weakest-link-in-identity-security/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/i-replaced-manual-pen-tests-with-automation-heres-what-i-learned/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/threat-actors-mass-scan-salesforce-experience-cloud-via-modified-aurainspector-t/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/cylake-raises-45-million-to-secure-organizations-barred-from-cloud/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/when-ai-safety-constrains-defenders-more-than-attackers/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/cisa-flags-solarwinds-ivanti-and-workspace-one-vulnerabilities-as-actively-explo/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/security-tools-für-ki-infrastrukturen-ein-kaufratgeber/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/10/hacker-abusing-arpa-domain-to-evade-phishing-detection-says-infoblox/</loc><lastmod>2026-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/09/microsoft-teams-phishing-targets-employees-with-a0backdoor-malware/</loc><lastmod>2026-03-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/09/ai-vs-ai-agent-hacked-mckinseys-chatbot-and-gained-full-read-write-access-in-jus/</loc><lastmod>2026-03-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/09/google-cloud-attacks-exploit-flaws-more-than-weak-credentials/</loc><lastmod>2026-03-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/09/dutch-govt-warns-of-signal-whatsapp-account-hijacking-attacks/</loc><lastmod>2026-03-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/09/white-house-cyber-strategy-prioritizes-offense/</loc><lastmod>2026-03-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/09/installfix-attacks-spread-fake-claude-code-sites/</loc><lastmod>2026-03-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/09/the-safe-act-is-an-imperfect-vehicle-for-real-section-702-reform/</loc><lastmod>2026-03-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/09/privacys-defender-launch-party-in-berkeley/</loc><lastmod>2026-03-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/09/ericsson-us-discloses-data-breach-after-service-provider-hack/</loc><lastmod>2026-03-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/09/malicious-npm-package-posing-as-openclaw-installer-deploys-rat-steals-macos-cred/</loc><lastmod>2026-03-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/09/shinyhunters-claims-more-high-profile-victims-in-latest-salesforce-customers-dat/</loc><lastmod>2026-03-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/09/cve-program-funding-secured-easing-fears-of-repeat-crisis/</loc><lastmod>2026-03-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/09/effecting-change-privacys-defender/</loc><lastmod>2026-03-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/09/microsoft-teams-will-tag-third-party-bots-trying-to-join-meetings/</loc><lastmod>2026-03-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/09/shinyhunters-claims-ongoing-salesforce-aura-data-theft-attacks/</loc><lastmod>2026-03-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/09/ev-charger-biz-elecq-zapped-by-ransomware-crooks-customer-contact-data-stolen/</loc><lastmod>2026-03-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/09/cybersecurity-ma-roundup-42-deals-announced-in-february-2026/</loc><lastmod>2026-03-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/09/fbi-warns-of-phishing-attacks-impersonating-us-city-county-officials/</loc><lastmod>2026-03-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/09/encrypted-client-hello-ready-for-prime-timex3f-mon-mar-9th/</loc><lastmod>2026-03-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/09/unc4899-breached-crypto-firm-after-developer-airdropped-trojanized-file-to-work/</loc><lastmod>2026-03-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/09/why-password-audits-miss-the-accounts-attackers-actually-want/</loc><lastmod>2026-03-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/09/microsoft-still-working-to-fix-windows-explorer-white-flashes/</loc><lastmod>2026-03-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/09/weekly-recap-qualcomm-0-day-ios-exploit-chains-airsnitch-attack-vibe-coded-malw/</loc><lastmod>2026-03-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/09/dutch-cops-warn-100-alleged-scammers-turn-yourselves-in-or-we-tell-grandma/</loc><lastmod>2026-03-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/09/clickfix-attack-uses-windows-terminal-to-evade-detection/</loc><lastmod>2026-03-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/09/russian-cybercrims-phish-their-way-into-officials-signal-and-whatsapp-accounts/</loc><lastmod>2026-03-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/09/internet-infrastructure-tld-arpa-abused-in-phishing-attacks/</loc><lastmod>2026-03-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/09/chinese-cyber-threat-lurks-in-critical-asian-sectors-for-years/</loc><lastmod>2026-03-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/09/cisa-adds-three-known-exploited-vulnerabilities-to-catalog/</loc><lastmod>2026-03-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/09/microsoft-azure-cto-set-claude-on-his-1986-apple-ii-code-says-it-found-vulns/</loc><lastmod>2026-03-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/09/openai-says-codex-security-found-11000-high-impact-bugs-in-a-month/</loc><lastmod>2026-03-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/09/can-the-security-platform-finally-deliver-for-the-mid-market/</loc><lastmod>2026-03-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/09/cloned-ai-tool-sites-distribute-malware-in-installfix-campaign/</loc><lastmod>2026-03-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/09/new-attack-against-wi-fi/</loc><lastmod>2026-03-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/09/nis-2-tausende-reißen-bsi-frist-und-riskieren-strafen/</loc><lastmod>2026-03-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/09/chrome-extension-turns-malicious-after-ownership-transfer-enabling-code-injectio/</loc><lastmod>2026-03-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/09/royal-navy-races-to-arm-ships-against-drone-threat/</loc><lastmod>2026-03-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/09/rogues-gallery-15-worst-ransomware-groups-active-today/</loc><lastmod>2026-03-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/09/web-server-exploits-and-mimikatz-used-in-attacks-targeting-asian-critical-infras/</loc><lastmod>2026-03-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/09/4-ways-to-prepare-your-soc-for-agentic-ai/</loc><lastmod>2026-03-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/09/pqc-roadmap-remains-hazy-as-vendors-race-for-early-advantage/</loc><lastmod>2026-03-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/09/tarnung-als-taktik-warum-ransomware-angriffe-raffinierter-werden/</loc><lastmod>2026-03-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/09/iran-is-the-first-out-loud-cyberwar-the-us-has-fought/</loc><lastmod>2026-03-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/09/risky-bulletin-new-white-house-eo-prioritizes-fight-against-scams-and-cybercrime/</loc><lastmod>2026-03-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/08/how-ai-assistants-are-moving-the-security-goalposts/</loc><lastmod>2026-03-08</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/08/fbi-is-investigating-breach-that-may-have-hit-its-wiretapping-tools/</loc><lastmod>2026-03-08</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/08/eu-court-adviser-says-banks-must-immediately-refund-phishing-victims/</loc><lastmod>2026-03-08</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/08/hackers-abuse-arpa-dns-and-ipv6-to-evade-phishing-defenses/</loc><lastmod>2026-03-08</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/08/recent-cisco-catalyst-sd-wan-vulnerability-now-widely-exploited/</loc><lastmod>2026-03-08</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/08/openai-on-surveillance-and-autonomous-killings-youre-going-to-have-to-trust-us/</loc><lastmod>2026-03-08</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/08/ai-agents-now-help-attackers-including-north-korea-manage-their-drudge-work/</loc><lastmod>2026-03-08</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/08/columbia-flouted-its-own-policies-and-let-ice-into-university-buildings/</loc><lastmod>2026-03-08</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/07/openai-codex-security-scanned-12-million-commits-and-found-10561-high-severity-i/</loc><lastmod>2026-03-07</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/07/termite-ransomware-breaches-linked-to-clickfix-castlerat-attacks/</loc><lastmod>2026-03-07</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/07/us-cyber-strategy-targets-adversaries-critical-infrastructure-and-emerging-techn/</loc><lastmod>2026-03-07</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/07/microsoft-hackers-abusing-ai-at-every-stage-of-cyberattacks/</loc><lastmod>2026-03-07</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/07/over-100-github-repositories-distributing-boryptgrab-stealer/</loc><lastmod>2026-03-07</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/07/pentagons-chief-tech-officer-says-he-clashed-with-ai-company-anthropic-over-auto/</loc><lastmod>2026-03-07</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/07/from-iran-to-ukraine-everyones-trying-to-hack-security-cameras/</loc><lastmod>2026-03-07</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/07/anthropic-finds-22-firefox-vulnerabilities-using-claude-opus-46-ai-model/</loc><lastmod>2026-03-07</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/07/yara-x-1140-release-sat-mar-7th/</loc><lastmod>2026-03-07</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/07/fbi-investigating-suspicious-cyber-activity-on-system-holding-sensitive-surveill/</loc><lastmod>2026-03-07</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/07/admiring-our-heroes-for-international-womens-day-celebrating-women-who-have-rece/</loc><lastmod>2026-03-07</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/06/trumps-cyber-strategy-emphasizes-offensive-operations-deregulation-ai/</loc><lastmod>2026-03-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/06/admiring-our-heroes-for-international-womens-day-five-women-in-tech-that-eff-adm/</loc><lastmod>2026-03-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/06/clickfix-attackers-using-new-tactic-to-evade-detection-says-microsoft/</loc><lastmod>2026-03-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/06/firefox-taps-anthropic-ai-bug-hunter-but-rancid-ram-still-flipping-bits/</loc><lastmod>2026-03-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/06/cognizant-trizetto-breach-exposes-health-data-of-34-million-patients/</loc><lastmod>2026-03-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/06/feds-take-notice-of-ios-vulnerabilities-exploited-under-mysterious-circumstances/</loc><lastmod>2026-03-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/06/cylake-offers-ai-native-security-without-relying-on-cloud-services/</loc><lastmod>2026-03-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/06/spyware-disguised-as-emergency-alert-app-sent-to-israeli-smartphones/</loc><lastmod>2026-03-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/06/dems-need-to-wise-up-ice-is-a-threat-to-our-elections/</loc><lastmod>2026-03-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/06/only-30-minutes-per-quarter-on-cyber-risk-why-ciso-board-conversations-are-falli/</loc><lastmod>2026-03-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/06/north-korean-apts-use-ai-to-enhance-it-worker-scams/</loc><lastmod>2026-03-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/06/anthropic-and-the-pentagon/</loc><lastmod>2026-03-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/06/fbi-wiretap-system-tapped-by-hackers/</loc><lastmod>2026-03-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/06/oauth-vulnerability-in-n8n-automation-platform-could-lead-to-system-compromise/</loc><lastmod>2026-03-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/06/armorcode-raises-16-million-for-exposure-management-platform/</loc><lastmod>2026-03-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/06/weasel-words-openais-pentagon-deal-wont-stop-aipowered-surveillance/</loc><lastmod>2026-03-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/06/weasel-words-openais-pentagon-deal-wont-stop-aipowered-surveillance/</loc><lastmod>2026-03-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/06/cisa-warns-of-apple-flaws-exploited-in-spyware-crypto-theft-attacks/</loc><lastmod>2026-03-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/06/in-other-news-fbi-hacked-us-security-pro-killed-in-iran-war-hijacked-cameras-use/</loc><lastmod>2026-03-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/06/transparent-tribe-uses-ai-to-mass-produce-malware-implants-in-campaign-targeting/</loc><lastmod>2026-03-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/06/eu-auto-rules-shift-gears-on-cybersecurity-standards/</loc><lastmod>2026-03-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/06/cisco-warns-of-two-more-sd-wan-bugs-under-active-attack/</loc><lastmod>2026-03-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/06/ec-council-expands-ai-certification-portfolio-to-strengthen-us-ai-workforce-read/</loc><lastmod>2026-03-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/06/fake-claude-code-install-guides-push-infostealers-in-installfix-attacks/</loc><lastmod>2026-03-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/06/multi-stage-voidgeist-malware-delivering-xworm-asyncrat-and-xeno-rat/</loc><lastmod>2026-03-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/06/microsoft-365-backup-to-add-file-level-restore-for-faster-recovery/</loc><lastmod>2026-03-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/06/what-does-it-mean-when-big-tech-goes-to-war/</loc><lastmod>2026-03-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/06/irans-cyber-kinetic-war-doctrine-takes-shape/</loc><lastmod>2026-03-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/06/cyberattack-on-mexicos-govt-agencies-highlight-ai-threat/</loc><lastmod>2026-03-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/06/microsoft-spots-clickfix-campaign-getting-users-to-self-pwn-on-windows-terminal/</loc><lastmod>2026-03-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/06/targeted-advertising-is-also-targeting-malware/</loc><lastmod>2026-03-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/06/cisa-adds-ios-flaws-from-coruna-exploit-kit-to-kev-list/</loc><lastmod>2026-03-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/06/privacy-international-women-on-web-securing-reproductive-justice-a-guide-to-digi/</loc><lastmod>2026-03-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/06/rockwell-vulnerability-allowing-remote-ics-hacking-exploited-in-attacks/</loc><lastmod>2026-03-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/06/son-of-government-contractor-arrested-after-alleged-46m-crypto-heist-from-us-mar/</loc><lastmod>2026-03-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/06/claude-used-to-hack-mexican-government/</loc><lastmod>2026-03-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/06/james-aaron-bishop-tapped-to-serve-as-new-pentagon-ciso/</loc><lastmod>2026-03-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/06/microsoft-finally-gets-around-to-fixing-windows-10-recovery-environment-after-br/</loc><lastmod>2026-03-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/06/iranian-apt-hacked-us-airport-bank-software-company/</loc><lastmod>2026-03-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/06/the-msp-guide-to-using-ai-powered-risk-management-to-scale-cybersecurity/</loc><lastmod>2026-03-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/06/iran-linked-muddywater-hackers-target-us-networks-with-new-dindoor-backdoor/</loc><lastmod>2026-03-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/06/transport-for-london-says-2024-breach-affected-7m-customers-not-5000/</loc><lastmod>2026-03-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/06/ghanain-man-pleads-guilty-to-role-in-100-million-fraud-ring/</loc><lastmod>2026-03-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/06/data-security-firm-evervault-raises-25-million-in-series-b-funding/</loc><lastmod>2026-03-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/06/teenage-hacker-myth-primed-for-a-middle-age-criminal-makeover/</loc><lastmod>2026-03-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/06/fbi-investigates-breach-of-surveillance-and-wiretap-systems/</loc><lastmod>2026-03-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/06/china-linked-hackers-use-terndoor-peertime-bruteentry-in-south-american-telecom/</loc><lastmod>2026-03-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/06/challenges-and-projects-for-the-ciso-in-2026/</loc><lastmod>2026-03-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/06/zero-day-exploits-hit-enterprises-faster-and-harder/</loc><lastmod>2026-03-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/06/microsoft-reveals-clickfix-campaign-using-windows-terminal-to-deploy-lumma-steal/</loc><lastmod>2026-03-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/06/hikvision-and-rockwell-automation-cvss-98-flaws-added-to-cisa-kev-catalog/</loc><lastmod>2026-03-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/06/europa-im-visier-von-cyber-identitätsdieben/</loc><lastmod>2026-03-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/06/7-anzeichen-für-akuten-mssp-bedarf/</loc><lastmod>2026-03-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/06/risky-bulletin-iranian-hackers-are-scanning-for-security-cameras-to-aid-missile/</loc><lastmod>2026-03-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/06/leakbase-marketplace-unplugged-by-cops-in-14-countries/</loc><lastmod>2026-03-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/google-says-spyware-makers-and-china-linked-groups-dominated-zero-day-attacks-la/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/chinese-state-hackers-target-telcos-with-new-malware-toolkit/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/bing-ai-promoted-fake-openclaw-github-repo-pushing-info-stealing-malware/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/nation-state-actor-embraces-ai-malware-assembly-line/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/tycoon-2fa-goes-boom-as-europol-vendors-bust-phishing-platform/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/wikipedia-hit-by-self-propagating-javascript-worm-that-vandalized-pages/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/epic-testifies-in-support-of-three-tech-policy-bills-in-maryland/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/cisco-drops-48-new-firewall-vulnerabilities-2-critical/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/iran-intelligence-backdoored-us-bank-airport-software-outfit-networks/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/wordpress-membership-plugin-bug-exploited-to-create-admin-accounts/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/fbi-arrests-suspect-linked-to-46m-crypto-theft-from-us-marshals/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/epic-testifies-in-support-of-michigan-kids-code/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/israel-hacked-traffic-cameras-in-iran/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/congress-is-considering-abolishing-your-right-to-be-anonymous-online/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/cisco-issues-emergency-patches-for-critical-firewall-vulnerabilities/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/privacy-internationals-response-to-the-uk-home-office-consultation-on-facial-rec/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/fig-security-emerges-from-stealth-to-fix-broken-security-operations/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/nida-allam-concedes-to-valerie-foushee-with-razor-thin-loss-for-progressives-in/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/software-development-practices-help-enterprises-tackle-real-life-risks/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/privacy-internationals-submission-on-the-impact-of-digital-and-ai-assisted-surve/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/cisco-confirms-active-exploitation-of-two-catalyst-sd-wan-manager-vulnerabilitie/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/google-says-90-zero-days-were-exploited-in-attacks-last-year/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/2026-browser-data-reveals-major-enterprise-security-blind-spots/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/google-half-of-2025s-90-exploited-zero-days-aimed-at-enterprises/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/coruna-ios-exploit-kit-moved-from-spy-tool-to-mass-criminal-campaign-in-under-a/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/the-government-uses-targeted-advertising-to-track-your-location-heres-what-we-ne/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/the-government-uses-targeted-advertising-to-track-your-location-heres-what-we-ne/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/latam-now-faces-2x-more-cyberattacks-than-us/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/threatsday-bulletin-ddr5-bot-scalping-samsung-tv-tracking-reddit-privacy-fine-mo/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/europol-großer-markt-für-gestohlene-daten-geschlossen/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/preparing-for-the-quantum-era-post-quantum-cryptography-webinar-for-security-lea/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/russian-ransomware-operator-pleads-guilty-in-us/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/police-dismantles-online-gambling-ring-exploiting-ukrainian-women/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/uk-watchdog-eyes-metas-smart-glasses-after-workers-say-they-see-everything/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/cisco-warns-of-more-catalyst-sd-wan-flaws-exploited-in-the-wild/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/dust-specter-targets-iraqi-officials-with-new-splitdrop-and-ghostform-malware/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/cisa-adds-five-known-exploited-vulnerabilities-to-catalog/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/delta-electronics-cncsoft-g2/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/europol-schließt-riesigen-markt-für-gestohlene-daten/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/hacked-app-part-of-usisraeli-propaganda-campaign-against-iran/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/reclaim-security-raises-20-million-to-accelerate-remediation/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/where-multi-factor-authentication-stops-and-credential-abuse-starts/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/federal-agents-are-intimidating-legal-observers-at-their-homes-they-know-where-y/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/leakbase-cybercrime-forum-shut-down-suspects-arrested/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/cisco-flags-more-sd-wan-flaws-as-actively-exploited-in-attacks/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/apt28-linked-campaign-deploys-badpaw-loader-and-meowmeow-backdoor-in-ukraine/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/cisco-patches-critical-vulnerabilities-in-enterprise-networking-products/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/phobos-ransomware-admin-pleads-guilty-to-wire-fraud-conspiracy/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/on-the-effectiveness-of-mutational-grammar-fuzzing/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/state-affiliated-hackers-set-up-for-critical-ot-attacks-that-operators-may-not-d/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/europol-led-operation-takes-down-tycoon-2fa-phishing-as-a-service-linked-to-6400/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/fbi-and-europol-seize-leakbase-forum-used-to-trade-stolen-credentials/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/14-old-software-bugs-that-took-way-too-long-to-squash/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/die-besten-cyber-recovery-lösungen/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/nation-state-ios-exploit-kit-coruna-found-powering-global-attacks/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/srsly-risky-biz-the-four-hour-cyber-war-on-iran/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/microsoft-leads-takedown-of-tycoon2fa-phishing-service-infrastructure/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/differentiating-between-a-targeted-intrusion-and-an-automated-opportunistic-scan/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/05/optimize-your-sophos-firewall-security/</loc><lastmod>2026-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/04/hundreds-of-iranian-hacking-attempts-have-hit-surveillance-cameras-since-the-mis/</loc><lastmod>2026-03-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/04/bitwarden-adds-support-for-passkey-login-on-windows-11/</loc><lastmod>2026-03-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/04/scotus-to-hear-case-over-proper-scope-of-the-video-privacy-protection-act-vppa/</loc><lastmod>2026-03-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/04/mail2shell-zero-click-attack-lets-hackers-hijack-freescout-mail-servers/</loc><lastmod>2026-03-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/04/vmware-aria-operations-bug-exploited-cloud-resources-at-risk/</loc><lastmod>2026-03-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/04/windows-10-kb5075039-update-fixes-broken-recovery-environment/</loc><lastmod>2026-03-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/04/malware-laced-openclaw-installers-get-bing-ai-search-boost/</loc><lastmod>2026-03-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/04/fake-lastpass-support-email-threads-try-to-steal-vault-passwords/</loc><lastmod>2026-03-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/04/epic-urges-virginia-governor-to-sign-bill-banning-sale-of-location-data/</loc><lastmod>2026-03-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/04/speaking-freely-shin-yang/</loc><lastmod>2026-03-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/04/speaking-freely-shin-yang/</loc><lastmod>2026-03-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/04/why-ai-zero-trust-and-modern-security-require-deep-visibility/</loc><lastmod>2026-03-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/04/the-10-hour-problem-how-visibility-gaps-are-burning-out-the-soc/</loc><lastmod>2026-03-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/04/cisco-warns-of-max-severity-secure-fmc-flaws-giving-root-access/</loc><lastmod>2026-03-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/04/spyware-grade-coruna-ios-exploit-kit-now-used-in-crypto-theft-attacks/</loc><lastmod>2026-03-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/04/hacker-mass-mails-hungerrush-extortion-emails-to-restaurant-patrons/</loc><lastmod>2026-03-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/04/tycoon-2fa-phishing-platform-dismantled-in-global-takedown/</loc><lastmod>2026-03-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/04/fbi-seizes-leakbase-cybercrime-forum-data-of-142000-members/</loc><lastmod>2026-03-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/04/new-lexisnexis-data-breach-confirmed-after-hackers-leak-files/</loc><lastmod>2026-03-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/04/149-hacktivist-ddos-attacks-hit-110-organizations-in-16-countries-after-middle-e/</loc><lastmod>2026-03-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/04/stranger-things-meets-cybersecurity-lessons-from-the-hive-mind/</loc><lastmod>2026-03-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/04/europol-coordinated-action-disrupts-tycoon2fa-phishing-platform/</loc><lastmod>2026-03-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/04/are-we-ready-for-auto-remediation-with-agentic-ai/</loc><lastmod>2026-03-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/04/lexisnexis-confirms-data-breach-at-legal-amp-professional-arm-some-customer-reco/</loc><lastmod>2026-03-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/04/zurich-acquires-beazley-in-11-billion-deal-to-lead-cyberinsurance/</loc><lastmod>2026-03-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/04/mississippi-medical-center-reopens-clinics-hit-by-ransomware-attack/</loc><lastmod>2026-03-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/04/how-a-brute-force-attack-unmasked-a-ransomware-infrastructure-network/</loc><lastmod>2026-03-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/04/hacker-conversations-inti-de-ceukelaire-raging-against-the-machine-creatively/</loc><lastmod>2026-03-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/04/epic-tells-supreme-court-that-geofence-searches-need-a-warrant-with-particulariz/</loc><lastmod>2026-03-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/04/kaspersky-dismisses-claims-coruna-iphone-exploit-kit-is-connected-to-nsa-linked/</loc><lastmod>2026-03-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/04/coruna-ios-exploit-kit-uses-23-exploits-across-five-chains-targeting-ios-131721/</loc><lastmod>2026-03-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/04/iranian-cyberattacks-fail-to-materialize-but-threat-remains-acute/</loc><lastmod>2026-03-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/04/how-pirated-software-turns-helpful-employees-into-malware-delivery-agents/</loc><lastmod>2026-03-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/04/ai-security-firm-jetstream-launches-with-34-million-in-seed-funding/</loc><lastmod>2026-03-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/04/manipulating-ai-summarization-features/</loc><lastmod>2026-03-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/04/lastpass-warns-of-new-phishing-campaign/</loc><lastmod>2026-03-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/04/webinar-today-designing-an-ot-soc-for-safety-reliability-and-business-continuity/</loc><lastmod>2026-03-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/04/google-plans-two-week-release-schedule-for-chrome/</loc><lastmod>2026-03-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/04/new-rfp-template-for-ai-usage-control-and-ai-governance/</loc><lastmod>2026-03-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/04/chinas-silver-dragon-razes-governments-in-eu-se-asia/</loc><lastmod>2026-03-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/04/global-coalition-publishes-6g-security-and-resilience-principles/</loc><lastmod>2026-03-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/04/want-more-xwormx3f-wed-mar-4th/</loc><lastmod>2026-03-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/04/fake-laravel-packages-on-packagist-deploy-rat-on-windows-macos-and-linux/</loc><lastmod>2026-03-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/04/anthropic-ai-ultimatums-and-ip-theft-the-unspoken-risk/</loc><lastmod>2026-03-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/04/critical-freescout-vulnerability-leads-to-full-server-compromise/</loc><lastmod>2026-03-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/04/apt41-linked-silver-dragon-targets-governments-using-cobalt-strike-and-google-dr/</loc><lastmod>2026-03-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/04/vmware-aria-operations-vulnerability-exploited-in-the-wild/</loc><lastmod>2026-03-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/04/how-to-know-youre-a-real-deal-cso-and-whether-that-job-opening-truly-seeks-one/</loc><lastmod>2026-03-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/04/cisa-adds-actively-exploited-vmware-aria-operations-flaw-cve-2026-22719-to-kev-c/</loc><lastmod>2026-03-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/04/ai-powered-attack-kits-go-open-source-and-cyberstrikeai-may-be-just-the-beginnin/</loc><lastmod>2026-03-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/04/google-feels-the-need-for-security-speed-so-will-ship-chrome-updates-every-two-w/</loc><lastmod>2026-03-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/04/dark-reading-confidential-this-threat-hunter-helped-cops-bust-up-an-african-cybe/</loc><lastmod>2026-03-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/04/ongoing-iran-conflict-what-you-need-to-know/</loc><lastmod>2026-03-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/eff-to-third-circuit-electronic-device-searches-at-the-border-require-a-warrant/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/eff-to-third-circuit-electronic-device-searches-at-the-border-require-a-warrant/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/cisa-flags-vmware-aria-operations-rce-flaw-as-exploited-in-attacks/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/dev-stunned-by-82k-gemini-bill-after-unknown-api-key-thief-goes-to-town/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/risky-bulletin-cyber-command-conducted-cyberattacks-ahead-of-iran-strikes/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/paint-maker-giant-akzonobel-confirms-cyberattack-on-us-site/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/facebook-accounts-unavailable-in-worldwide-outage/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/indian-apt-sloppy-lemming-targets-defense-critical-infrastructure/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/the-anthropic-dod-conflict-privacy-protections-shouldnt-depend-on-the-decisions/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/the-anthropic-dod-conflict-privacy-protections-shouldnt-depend-on-the-decisions/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/microsoft-hackers-abuse-oauth-error-flows-to-spread-malware/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/chat-at-your-own-risk-data-brokers-are-selling-deeply-personal-bot-transcripts/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/vehicle-tire-pressure-sensors-enable-silent-tracking/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/qualcomm-zero-day-exploited-in-targeted-android-attacks/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/iranian-strikes-on-amazon-data-centers-highlight-industrys-vulnerability-to-phys/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/hacktivist-campaigns-increase-as-united-states-iran-and-israel-conflict-intensif/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/cyberwarriors-elevated-to-big-leagues-in-us-war-with-iran/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/speakeasies-to-shadow-ai-banning-ai-browsers-will-fail/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/fake-tech-support-spam-deploys-customized-havoc-c2-across-organizations/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/google-chrome-shifts-to-two-week-release-cycle-for-increased-stability/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/fig-security-launches-with-38-million-to-bolster-secops-resilience/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/eff-to-supreme-court-shut-down-unconstitutional-geofence-searches/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/eff-to-supreme-court-shut-down-unconstitutional-geofence-searches/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/lexisnexis-confirms-data-breach-as-hackers-leak-stolen-files/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/honeywell-researcher-clash-over-impact-of-building-controller-vulnerability/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/turns-out-most-cybercriminals-are-old-enough-to-know-better/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/bruteforce-scans-for-crushftp-tue-mar-3rd/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/compromised-site-management-panels-are-a-hot-item-in-cybercrime-markets/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/building-a-high-impact-tier-1-the-3-steps-cisos-must-follow/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/open-source-cyberstrikeai-deployed-in-ai-driven-fortigate-attacks-across-55-coun/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/until-last-month-attackers-couldve-stolen-info-from-perplexity-comet-users-just/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/quantum-decryption-of-rsa-is-much-closer-than-expected/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/new-airsnitch-attack-shows-wi-fi-client-isolation-could-be-a-false-sense-of-secu/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/12-million-affected-by-university-of-hawaii-cancer-center-data-breach/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/oauth-phishers-make-check-where-the-link-points-advice-ineffective/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/ai-agent-overload-how-to-solve-the-workload-identity-crisis/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/jetzt-staats-ciso-werden-für-unter-160000-euro/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/android-update-patches-exploited-qualcomm-zero-day/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/llms-can-unmask-pseudonymous-users-at-scale-with-surprising-accuracy/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/iran-cyber-front-hacktivist-activity-rises-but-state-sponsored-attacks-stay-low/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/on-moltbook/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/cisa-adds-two-known-exploited-vulnerabilities-to-catalog/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/hitachi-energy-relion-reb500-product/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/portwell-engineering-toolkits/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/labkotec-lid-3300ip/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/everon-ocpp-backends/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/epower-epowerie/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/mobiliti-e-mobihu/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/mitsubishi-electric-melsec-iq-f-series-ethernetip-module-and-ethernet-module/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/hitachi-energy-rtu500-product/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/amazon-drone-strikes-damaged-aws-data-centers-in-middle-east/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/chrome-gemini-panel-became-privilege-escalator-for-rogue-extensions/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/as-war-continues-pro-iranian-actors-launch-barrage-of-cyberattacks/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/ai-agents-the-next-wave-identity-dark-matter-powerful-invisible-and-unmanaged/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/starkiller-phishing-suite-uses-aitm-reverse-proxy-to-bypass-multi-factor-authent/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/cybercriminals-swipe-158m-medical-records-from-french-doctors-ministry/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/star-citizen-game-dev-discloses-breach-affecting-user-data/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/vulnerability-in-ms-agent-ai-framework-can-allow-full-system-compromise/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/studie-hacker-legen-betrieb-bei-vielen-unternehmen-lahm/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/epic-fury-introduces-new-layer-of-enterprise-risk/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/uh-cancer-center-data-breach-affects-nearly-12-million-people/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/researchers-uncover-method-to-track-cars-via-tire-sensors/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/microsoft-warns-oauth-redirect-abuse-delivers-malware-to-government-targets/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/android-gets-patches-for-qualcomm-zero-day-exploited-in-attacks/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/google-confirms-cve-2026-21385-in-qualcomm-android-component-exploited/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/7-factors-impacting-the-cyber-skills-gap/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/sloppylemming-targets-pakistan-and-bangladesh-governments-using-dual-malware-cha/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/gamers-furious-as-brit-studio-cloud-imperium-quietly-admits-to-data-breach/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/das-gehört-in-ihr-security-toolset/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/phish-of-the-day-microsoft-oauth-scams-abuse-redirects-for-malware-delivery/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/cyberstrikeai-tool-adopted-by-hackers-for-ai-powered-attacks/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/03/hacktivist-campaigns-increase-as-united-states-iran-and-israel-conflict-intensif/</loc><lastmod>2026-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/02/eff-to-court-dont-make-embedding-illegal/</loc><lastmod>2026-03-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/02/eff-to-court-dont-make-embedding-illegal/</loc><lastmod>2026-03-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/02/critical-openclaw-vulnerability-exposes-ai-agent-risks/</loc><lastmod>2026-03-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/02/the-tug-of-war-over-firewall-backlogs-in-the-ai-driven-development-era/</loc><lastmod>2026-03-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/02/irans-cyberwar-has-begun/</loc><lastmod>2026-03-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/02/30-alleged-members-of-the-com-arrested-in-project-compass/</loc><lastmod>2026-03-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/02/fake-google-security-site-uses-pwa-app-to-steal-credentials-mfa-codes/</loc><lastmod>2026-03-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/02/epic-urges-hhs-to-prioritize-patient-privacy-in-clinical-care-ai-uses/</loc><lastmod>2026-03-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/02/vulnerability-monitoring-service-secures-public-sector-websites-faster/</loc><lastmod>2026-03-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/02/alabama-man-pleads-guilty-to-hacking-extorting-hundreds-of-women/</loc><lastmod>2026-03-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/02/uk-businesses-told-to-brace-cyber-defenses-amid-iran-conflict-risk/</loc><lastmod>2026-03-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/02/florida-woman-imprisoned-for-massive-microsoft-license-fraud-scheme/</loc><lastmod>2026-03-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/02/new-chrome-vulnerability-let-malicious-extensions-escalate-privileges-via-gemini/</loc><lastmod>2026-03-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/02/google-develops-merkle-tree-certificates-to-enable-quantum-resistant-https-in-ch/</loc><lastmod>2026-03-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/02/national-book-tour-for-cindy-cohns-memoir-privacys-defender/</loc><lastmod>2026-03-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/02/national-book-tour-for-cindy-cohns-memoir-privacys-defender/</loc><lastmod>2026-03-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/02/uk-warns-of-iranian-cyberattack-risks-amid-middle-east-conflict/</loc><lastmod>2026-03-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/02/vulnerability-allowed-hijacking-chromes-gemini-live-ai-assistant/</loc><lastmod>2026-03-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/02/how-deepfakes-and-injection-attacks-are-breaking-identity-verification/</loc><lastmod>2026-03-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/02/openclaw-vulnerability-allowed-websites-to-hijack-ai-agents/</loc><lastmod>2026-03-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/02/memory-scalpers-hunt-scarce-dram-with-bot-blitz/</loc><lastmod>2026-03-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/02/madison-square-garden-data-breach-confirmed-months-after-hacker-attack/</loc><lastmod>2026-03-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/02/scammers-try-to-sim-swap-dubai-citizens-hours-after-iranian-missile-strikes/</loc><lastmod>2026-03-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/02/weekly-recap-sd-wan-0-day-critical-cves-telegram-probe-smart-tv-proxy-sdk-and-m/</loc><lastmod>2026-03-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/02/quantum-resistant-data-diode-secures-sensitive-data-on-edge-devices-critical-sys/</loc><lastmod>2026-03-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/02/nick-andersen-appointed-acting-director-of-cisa/</loc><lastmod>2026-03-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/02/aws-expands-security-hub-into-a-cross-domain-security-platform/</loc><lastmod>2026-03-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/02/anthropic-confirms-claude-is-down-in-a-worldwide-outage/</loc><lastmod>2026-03-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/02/llm-assisted-deanonymization/</loc><lastmod>2026-03-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/02/how-to-protect-your-saas-from-bot-attacks-with-safeline-waf/</loc><lastmod>2026-03-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/02/north-korean-apt-targets-air-gapped-systems-in-recent-campaign/</loc><lastmod>2026-03-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/02/google-working-towards-quantum-safe-chrome-https-certificates/</loc><lastmod>2026-03-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/02/quick-howto-zip-files-inside-rtf-mon-mar-2nd/</loc><lastmod>2026-03-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/02/wireshark-464-released-mon-mar-2nd/</loc><lastmod>2026-03-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/02/us-israel-and-iran-trade-cyberattacks-pro-west-hacks-cause-disruption-as-tehran/</loc><lastmod>2026-03-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/02/innovation-without-exposure-a-cisos-secure-by-design-framework-for-business-outc/</loc><lastmod>2026-03-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/02/apt28-tied-to-cve-2026-21513-mshtml-0-day-exploited-before-feb-2026-patch-tuesda/</loc><lastmod>2026-03-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/02/bug-in-googles-gemini-ai-panel-opens-door-to-hijacking/</loc><lastmod>2026-03-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/02/a-scorecard-for-cyber-and-risk-culture/</loc><lastmod>2026-03-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/02/north-korean-hackers-publish-26-npm-packages-hiding-pastebin-c2-for-cross-platfo/</loc><lastmod>2026-03-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/02/hacker-erpressen-weniger-lösegeld/</loc><lastmod>2026-03-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/02/how-cisos-can-build-a-resilient-workforce/</loc><lastmod>2026-03-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/02/im-fokus-rz-modernisierung/</loc><lastmod>2026-03-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/02/im-fokus-rz-modernisierung/</loc><lastmod>2026-03-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/02/kubernetes-security-wie-sie-ihre-cluster-besser-absichern/</loc><lastmod>2026-03-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/02/uk-governments-vulnerability-monitoring-system-is-working-fixes-flow-far-faster/</loc><lastmod>2026-03-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/02/risky-bulletin-llms-can-deanonymize-internet-users-based-on-their-past-comments/</loc><lastmod>2026-03-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/02/south-koreas-tax-office-apologizes-for-leaking-seed-phrase-to-seized-crypto/</loc><lastmod>2026-03-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/02/latin-americas-cybersecurity-turning-point-from-reactive-defense-to-threat-intel/</loc><lastmod>2026-03-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/02/ongoing-iran-conflict-what-you-need-to-know/</loc><lastmod>2026-03-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/01/clawjacked-attack-let-malicious-websites-hijack-openclaw-to-steal-data/</loc><lastmod>2026-03-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/01/samsung-tvs-to-stop-collecting-texans-data-without-express-consent/</loc><lastmod>2026-03-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/01/hackers-weaponize-claude-code-in-mexican-government-cyberattack/</loc><lastmod>2026-03-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/03/01/cyber-advisory-increased-cyber-risk-amid-usisraeliran-escalation/</loc><lastmod>2026-03-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/28/quicklens-chrome-extension-steals-crypto-shows-clickfix-attack/</loc><lastmod>2026-02-28</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/28/clawjacked-flaw-lets-malicious-sites-hijack-local-openclaw-ai-agents-via-websock/</loc><lastmod>2026-02-28</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/28/48m-in-crypto-stolen-after-korean-tax-agency-exposes-wallet-seed/</loc><lastmod>2026-02-28</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/28/who-is-the-kimwolf-botmaster-dort/</loc><lastmod>2026-02-28</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/28/canadian-tire-data-breach-impacts-38-million-accounts/</loc><lastmod>2026-02-28</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/28/denizens-of-def-con-are-fed-up-with-government/</loc><lastmod>2026-02-28</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/28/thousands-of-public-google-cloud-api-keys-exposed-with-gemini-access-after-api-e/</loc><lastmod>2026-02-28</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/28/pentagon-designates-anthropic-supply-chain-risk-over-ai-military-dispute/</loc><lastmod>2026-02-28</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/28/google-quantum-proofs-https-by-squeezing-25kb-of-data-into-64-byte-space/</loc><lastmod>2026-02-28</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/27/double-whammy-steaelite-rat-bundles-data-theft-ransomware-in-one-evil-tool/</loc><lastmod>2026-02-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/27/connecticut-ag-issues-report-on-how-existing-state-law-applies-to-ai/</loc><lastmod>2026-02-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/27/friday-squid-blogging-squid-fishing-in-peru/</loc><lastmod>2026-02-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/27/security-hole-could-let-hackers-take-over-juniper-networks-ptx-core-routers/</loc><lastmod>2026-02-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/27/trump-orders-all-federal-agencies-to-phase-out-use-of-anthropic-technology/</loc><lastmod>2026-02-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/27/life-mirrors-art-ransomware-hits-hospitals-on-tv-amp-irl/</loc><lastmod>2026-02-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/27/silent-google-api-key-change-exposed-gemini-ai-data/</loc><lastmod>2026-02-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/27/cities-hosting-major-events-need-more-focus-on-wireless-drone-defense/</loc><lastmod>2026-02-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/27/flaw-finding-ai-assistants-face-criticism-for-speed-accuracy/</loc><lastmod>2026-02-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/27/microsoft-testing-windows-11-batch-file-security-improvements/</loc><lastmod>2026-02-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/27/suspected-nork-digital-intruders-caught-breaking-into-us-healthcare-education-or/</loc><lastmod>2026-02-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/27/apt37-hackers-use-new-malware-to-breach-air-gapped-networks/</loc><lastmod>2026-02-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/27/europol-led-crackdown-on-the-com-hackers-leads-to-30-arrests/</loc><lastmod>2026-02-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/27/doj-seizes-61-million-in-tether-linked-to-pig-butchering-crypto-scams/</loc><lastmod>2026-02-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/27/900-sangoma-freepbx-instances-compromised-in-ongoing-web-shell-attacks/</loc><lastmod>2026-02-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/27/the-case-for-why-better-breach-transparency-matters/</loc><lastmod>2026-02-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/27/ransomware-payments-cratered-in-2025-but-attacks-surged-to-record-highs/</loc><lastmod>2026-02-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/27/cisa-warns-that-resurge-malware-can-be-dormant-on-ivanti-devices/</loc><lastmod>2026-02-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/27/malicious-go-crypto-module-steals-passwords-deploys-rekoobe-backdoor/</loc><lastmod>2026-02-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/27/in-other-news-attck-advisory-council-russian-cyberattacks-aid-missile-strikes-pr/</loc><lastmod>2026-02-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/27/french-diy-etailer-manomano-admits-customer-data-stolen/</loc><lastmod>2026-02-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/27/third-party-patching-and-the-business-footprint-we-all-share/</loc><lastmod>2026-02-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/27/the-anthropic-and-us-government-conflict-is-larger-than-you-think/</loc><lastmod>2026-02-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/27/claude-code-security-shows-promise-not-perfection/</loc><lastmod>2026-02-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/27/cops-back-dutch-telco-odido-after-second-wave-of-shinyhunters-leaks/</loc><lastmod>2026-02-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/27/38-million-allegedly-impacted-by-manomano-data-breach/</loc><lastmod>2026-02-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/27/one-of-the-most-influential-cybersecurity-roles-will-pay-under-175000/</loc><lastmod>2026-02-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/27/900-sangoma-freepbx-instances-infected-with-web-shells/</loc><lastmod>2026-02-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/27/scarcruft-uses-zoho-workdrive-and-usb-malware-to-breach-air-gapped-networks/</loc><lastmod>2026-02-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/27/chilean-carding-shop-operator-extradited-to-us/</loc><lastmod>2026-02-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/27/anthropic-refuses-to-bend-to-pentagon-on-ai-safeguards-as-dispute-nears-deadline/</loc><lastmod>2026-02-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/27/ukrainian-man-pleads-guilty-to-running-ai-powered-fake-id-site/</loc><lastmod>2026-02-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/27/fake-fedex-email-delivers-donutsx21-fri-feb-27th/</loc><lastmod>2026-02-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/27/why-tehrans-two-tiered-internet-is-so-dangerous/</loc><lastmod>2026-02-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/27/phishing-attacks-against-people-seeking-programming-jobs/</loc><lastmod>2026-02-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/27/aeternum-botnet-loader-employs-polygon-blockchain-cc-to-boost-resilience/</loc><lastmod>2026-02-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/27/your-personal-openclaw-agent-may-also-be-taking-orders-from-malicious-websites/</loc><lastmod>2026-02-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/27/us-authorities-punish-sellers-of-malware-and-spyware/</loc><lastmod>2026-02-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/27/why-application-security-must-start-at-the-load-balancer/</loc><lastmod>2026-02-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/27/juniper-networks-ptx-routers-affected-by-critical-vulnerability/</loc><lastmod>2026-02-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/27/trojanized-gaming-tools-spread-java-based-rat-via-browser-and-chat-platforms/</loc><lastmod>2026-02-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/27/how-to-make-llms-a-defensive-advantage-without-creating-a-new-attack-surface/</loc><lastmod>2026-02-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/27/meta-files-lawsuits-against-brazil-china-vietnam-advertisers-over-celeb-bait-sca/</loc><lastmod>2026-02-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/27/critical-flaws-exposed-gardyn-smart-gardens-to-remote-hacking/</loc><lastmod>2026-02-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/27/the-cso-guide-to-top-security-conferences/</loc><lastmod>2026-02-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/27/ransomware-groups-switch-to-stealthy-attacks-and-long-term-access/</loc><lastmod>2026-02-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/27/victory-tenth-circuit-finds-fourth-amendment-doesnt-support-broad-search-of-prot/</loc><lastmod>2026-02-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/27/victory-tenth-circuit-finds-fourth-amendment-doesnt-support-broad-search-of-prot/</loc><lastmod>2026-02-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/27/risky-bulletin-russian-man-investigated-for-extorting-conti-ransomware-group/</loc><lastmod>2026-02-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/the-verge-ftc-declines-to-enforce-a-kids-privacy-law-for-data-collected-to-verif/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/marquis-v-sonicwall-lawsuit-ups-the-breach-blame-game/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/cisco-sd-wan-zero-day-under-exploitation-for-3-years/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/previously-harmless-google-api-keys-now-expose-gemini-ai-data/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/epic-oti-urge-ftc-not-to-ignore-full-scope-of-data-driven-harms/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/apple-iphone-and-ipad-cleared-for-classified-nato-use/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/aeternum-c2-botnet-stores-encrypted-commands-on-polygon-blockchain-to-evade-take/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/trend-micro-warns-of-critical-apex-one-code-execution-flaws/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/european-dyi-chain-manomano-data-breach-impacts-38-million-customers/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/four-risks-boards-cannot-treat-as-background-noise/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/critical-juniper-networks-ptx-flaw-allows-full-router-takeover/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/zohran-mamdani-kept-columbia-student-in-new-york-then-phoned-with-trump-to-secur/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/olympique-marseille-confirms-attempted-cyberattack-after-data-leak/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/new-airsnitch-attack-breaks-wi-fi-encryption-in-homes-offices-and-enterprises/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/rapid-ai-driven-development-makes-security-unattainable-warns-veracode/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/uat-10027-targets-us-education-and-healthcare-with-dohdoor-backdoor/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/threatsday-bulletin-kali-linux-claude-chrome-crash-traps-winrar-flaws-lockbit-15/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/ransomware-payment-rate-drops-to-record-low-as-attacks-surge/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/claude-code-flaws-exposed-developer-devices-to-silent-hacking/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/microsoft-expands-windows-restore-to-more-enterprise-devices/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/gambit-security-emerges-from-stealth-with-61-million-in-funding/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/scattered-lapsus-hunters-auditioning-female-voices-to-sharpen-social-engineering/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/hackers-compromise-networks-faster-and-faster/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/zyxel-patches-critical-vulnerability-in-many-device-models/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/llms-generate-predictable-passwords/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/expert-recommends-prepare-for-pqc-right-now/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/pelco-inc-sarix-pro-3-series-ip-cameras/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/ev2go-ev2goio/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/ev-energy-evenergy/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/chargemap-chargemapcom/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/mobility46-mobility46se/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/switch-ev-swtchenergycom/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/cloudcharge-cloudchargese/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/yokogawa-centum-vp-r6-r7/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/johnson-controls-inc-frick-controls-quantum-hd/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/copeland-xweb-and-xweb-pro/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/new-york-sues-valve-for-promoting-illegal-gambling-via-game-loot-boxes/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/five-eyes-warn-patch-your-cisco-sd-wan-or-risk-root-takeover/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/china-linked-hackers-used-google-sheets-to-spy-on-telecoms-and-governments-acros/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/florida-might-make-its-own-spy-squad-muslims-think-they-have-a-pretty-good-idea/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/microsoft-warns-developers-of-fake-nextjs-job-repos-delivering-in-memory-malware/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/us-sanctions-russian-exploit-broker-operation-zero/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/malicious-stripeapi-nuget-package-mimicked-official-library-and-stole-api-tokens/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/the-farmers-and-the-mercenaries-rethinking-the-human-layer-in-security/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/trend-micro-patches-critical-apex-one-vulnerabilities/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/cisco-patches-catalyst-sd-wan-zero-day-exploited-by-highly-sophisticated-hackers/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/a-deep-dive-into-the-getprocesshandlefromhwnd-api/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/5-trends-that-should-top-cisos-rsa-2026-agendas/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/cisco-sd-wan-zero-day-cve-2026-20127-exploited-since-2023-for-admin-access/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/9-essential-open-source-security-tools/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/how-to-justify-your-security-investments/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/finding-signal-in-the-noise-lessons-learned-running-a-honeypot-with-ai-assistanc/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/srsly-risky-biz-is-claude-too-woke-for-war/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/claude-collaboration-tools-left-the-door-wide-open-to-remote-code-execution/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/steaelite-rat-combines-data-theft-and-ransomware-management-capability-in-one-to/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/cisco-sd-wan-vulnerabilities-cve-2026-20127-cve-2022-20775-in-active-exploitatio/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/sophos-workspace-protection-is-now-available/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/recorded-future-expands-coverage-of-scams-and-financial-fraud-with-money-mule-in/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/26/chinese-police-use-chatgpt-to-smear-japan-pm-takaichi/</loc><lastmod>2026-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/medical-device-maker-ufp-technologies-warns-of-data-stolen-in-cyberattack/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/five-eyes-issue-emergency-directive-on-exploited-cisco-sd-wan-zero-day/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/flaws-in-claude-code-put-developers-machines-at-risk/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/fake-nextjs-job-interview-tests-backdoor-developers-devices/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/ramp-forum-seizure-fractures-ransomware-ecosystem/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/the-clair-model-a-synthesized-conceptual-framework-for-mapping-critical-infrastr/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/google-catches-beijing-spies-using-sheets-to-spread-espionage-across-4-continent/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/pci-council-says-threats-to-payments-systems-are-speeding-up/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/trust-us-with-your-face-effector-384/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/trust-us-with-your-face-effector-384/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/critical-cisco-sd-wan-bug-exploited-in-zero-day-attacks-since-2023/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/google-disrupts-unc2814-gridtide-campaign-after-53-breaches-across-42-countries/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/how-to-pick-your-password-manager/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/how-to-pick-your-password-manager/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/how-to-pick-your-password-manager/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/chinese-cyberspies-breached-dozens-of-telecom-firms-govt-agencies/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/claude-code-flaws-allow-remote-code-execution-and-api-key-exfiltration/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/fake-interview-repos-lure-nextjs-devs-into-running-secret-stealing-malware/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/malicious-nextjs-repos-target-developers-via-fake-job-interviews/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/the-blast-radius-problem-stolen-credentials-are-weaponizing-agentic-ai/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/analysis-of-the-disclosures-following-the-ico-enforcement-notice-on-gps-tagging/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/google-disrupts-chinese-cyberespionage-campaign-targeting-telecoms-governments/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/marquis-sues-sonicwall-over-backup-breach-that-led-to-ransomware-attack/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/solarwinds-patches-four-critical-serv-u-vulnerabilities/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/discord-pushes-back-age-verification-after-security-risks-revealed/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/slh-offers-5001000-per-call-to-recruit-women-for-it-help-desk-vishing-attacks/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/the-openclaw-hype-analysis-of-chatter-from-open-source-deep-and-dark-web/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/top-5-ways-broken-triage-increases-business-risk-instead-of-reducing-it/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/nowhere-to-hide-privacy-risks-and-policy-implications-of-ai-geolocation/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/why-call-this-number-toad-emails-beat-gateways/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/ex-l3harris-exec-jailed-7-years-for-selling-exploits-to-russia/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/medical-device-maker-ufp-technologies-hit-by-cyberattack/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/ex-us-defense-contractor-executive-jailed-for-selling-exploits-to-russia/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/zyxel-warns-of-critical-rce-flaw-affecting-over-a-dozen-routers/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/malicious-nuget-packages-stole-aspnet-data-npm-package-dropped-malware/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/wynn-resorts-takes-attackers-word-for-it-that-stolen-staff-data-was-deleted/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/over-12-million-users-impacted-by-cargurus-data-breach/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/poisoning-ai-training-data/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/cisa-adds-two-known-exploited-vulnerabilities-to-catalog/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/cisa-and-partners-release-guidance-for-ongoing-global-exploitation-of-cisco-sd-w/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/richter-scale-model-measures-magnitude-of-ot-cyber-incidents/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/securityweek-report-426-cybersecurity-ma-deals-announced-in-2025/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/wynn-resorts-confirms-data-breach-after-hackers-remove-it-from-leak-site/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/microsoft-warns-of-jobthemed-repo-lures-targeting-developers-with-multistage-bac/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/manual-processes-are-putting-national-security-at-risk/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/astelia-raises-35-million-for-exposure-management/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/us-sanctions-russian-broker-for-buying-stolen-zero-day-exploits/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/reddit-hit-with-20-million-uk-data-privacy-fine-over-child-safety-failings/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/openai-says-chinese-cops-used-chatgpt-to-plan-and-track-smear-ops-against-oppone/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/claudes-new-ai-vulnerability-scanner-sends-cybersecurity-shares-plunging/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/ukrainian-convicted-for-helping-fake-north-korean-it-workers/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/defense-contractor-employee-jailed-for-selling-8-zero-days-to-russian-broker/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/ad-tech-company-optimizely-targeted-in-cyberattack/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/ex-l3harris-exec-jailed-for-selling-zero-days-to-russian-exploit-broker/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/operation-red-card-20-leads-to-651-arrests-in-africa/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/windows-11-kb5077241-update-improves-bitlocker-adds-sysmon-tool/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/solarwinds-patches-4-critical-serv-u-155-flaws-allowing-root-code-execution/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/boards-dont-need-cyber-metrics-they-need-risk-signals/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/threat-intelligence-supply-chain-is-full-of-weak-links-researchers-find/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/cisa-confirms-active-exploitation-of-filezen-cve-2026-25108-vulnerability/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/hacker-cracks-600-firewalls-in-one-month-with-ai/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/how-ai-is-changing-your-grc-strategy/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/new-serv-u-bugs-extend-solarwinds-run-of-high-severity-disclosures/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/fake-zoom-meeting-silently-installs-surveillance-software-says-malwarebytes/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/risky-bulletin-russia-starts-criminal-probe-of-telegram-founder-pavel-durov/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/25/vmware-fixes-command-injection-flaw-in-aria-operations/</loc><lastmod>2026-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/phishing-campaign-targets-freight-and-logistics-orgs-in-the-us-europe/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/tech-companies-shouldnt-be-bullied-into-doing-surveillance/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/tech-companies-shouldnt-be-bullied-into-doing-surveillance/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/ai-has-gotten-good-at-finding-bugs-not-so-good-at-swatting-them/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/what-does-business-email-compromise-look-like/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/what-are-the-types-of-ransomware-attacks/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/wynn-resorts-confirms-employee-data-breach-after-extortion-threat/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/take-control-locking-down-common-endpoint-vulnerabilities/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/1campaign-platform-helps-malicious-google-ads-evade-detection/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/attackers-now-need-just-29-minutes-to-own-a-network/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/how-to-prevent-business-email-compromise/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/know-the-red-flags-business-email-compromise-signs-to-look-out-for/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/lazarus-group-picks-a-new-poison-medusa-ransomware/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/sophos-workspace-protection-is-now-available/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/epic-joins-groups-urging-ftc-to-crack-down-on-hidden-surveillance-pricing/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/patch-these-4-critical-make-me-root-solarwinds-bugs-asap/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/cyber-defense-from-reactive-to-proactive/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/roguepilot-flaw-in-github-codespaces-enabled-copilot-to-leak-github-token/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/north-koreas-lazarus-group-targets-healthcare-orgs-with-medusa-ransomware/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/cargurus-data-breach-exposes-information-of-124-million-accounts/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/open-redirects-a-forgotten-vulnerabilityx3f-tue-feb-24th/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/microsoft-adds-copilot-data-controls-to-all-storage-locations/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/go-library-maintainer-brands-githubs-dependabot-a-noise-machine/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/nowhere-man-the-2026-active-adversary-report/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/arkanix-stealer-malware-disappears-shortly-after-debut/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/identity-first-ai-security-why-cisos-must-add-intent-to-the-equation/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/uk-fines-reddit-19-million-for-using-childrens-data-unlawfully/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/vmware-aria-operations-vulnerability-could-allow-remote-code-execution/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/uac-0050-targets-european-financial-institution-with-spoofed-domain-and-rms-malw/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/ciso-conversations-timothy-youngblood-4x-fortune-500-cisocso/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/new-sandworm-mode-supply-chain-attack-hits-npm/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/uk-data-watchdog-fines-reddit-1447m-for-letting-kids-slip-past-the-gate/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/as-cybersecurity-firms-chase-ai-vc-market-skyrockets/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/critical-solarwinds-serv-u-flaws-offer-root-access-to-servers/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/github-issues-abused-in-copilot-attack-leading-to-repository-takeover/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/is-ai-good-for-democracy/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/taiwan-security-firm-confirms-flaw-flagged-by-cisa-likely-exploited-by-chinese-a/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/cisa-adds-one-known-exploited-vulnerability-to-catalog/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/insat-masterscada-buk-ts/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/gardyn-home-kit/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/schneider-electric-ecostruxure-building-operation-workstation/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/celebrating-two-years-of-csf-20/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/identity-prioritization-isnt-a-backlog-problem-its-a-risk-math-problem/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/korean-cops-charge-teens-over-bike-hire-breach-that-exposed-data-on-462m-riders/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/lazarus-group-uses-medusa-ransomware-in-middle-east-and-us-healthcare-attacks/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/shai-hulud-style-npm-worm-hits-ci-pipelines-and-ai-coding-tools/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/shinyhunters-extortion-gang-claims-odido-breach-affecting-millions/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/north-korean-lazarus-group-linked-to-medusa-ransomware-attacks/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/uk-tech-hit-by-double-trouble-fewer-foreign-techies-amid-skills-squeeze/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/anonymous-fénix-members-arrested-in-spain/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/unsolicitedbooker-targets-central-asian-telecoms-with-lucidoor-and-marssnake-bac/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/billions-in-bitcoin-from-pirated-content-portal-targeted-by-justice-system/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/euro-allies-aiming-to-rapidly-build-low-cost-air-defense-weapons/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/dual-use-tech-the-elbit-example/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/dual-use-tech-the-skydio-example/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/dual-use-tech-the-leonardo-example/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/dual-use-tech-the-thales-example/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/its-time-to-rethink-ciso-reporting-lines/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/the-rise-of-the-evasive-adversary/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/anthropics-claude-code-security-rollout-is-an-industry-wakeup-call/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/anthropic-says-chinese-ai-firms-used-16-million-claude-queries-to-copy-model/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/ot-security-why-its-worth-taking-a-look-at-open-source/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/russian-group-uses-ai-to-exploit-weakly-protected-fortinet-firewalls-says-amazon/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/the-active-adversary-report-safety-in-numbers/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/january-2026-cve-landscape-23-critical-vulnerabilities-mark-5-increase-apt28-exp/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/the-active-adversary-report-safety-in-numbers/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/stopping-real-world-attacks-lessons-for-business-leaders-from-the-2026-cyber-fro/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/24/preparing-for-russias-new-generation-warfare-in-europe/</loc><lastmod>2026-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/23/android-mental-health-apps-with-147m-installs-filled-with-security-flaws/</loc><lastmod>2026-02-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/23/spitting-cash-atm-jackpotting-attacks-surged-in-2025/</loc><lastmod>2026-02-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/23/more-than-dashboards-ai-decisions-must-be-provable/</loc><lastmod>2026-02-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/23/spain-arrests-suspected-hacktivists-for-ddosing-govt-sites/</loc><lastmod>2026-02-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/23/epic-model-platform-design-legislation-introduced-in-kentucky/</loc><lastmod>2026-02-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/23/irans-muddywater-targets-orgs-with-fresh-malware-as-tensions-mount/</loc><lastmod>2026-02-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/23/enigma-cipher-device-still-holds-secrets-for-cyber-pros/</loc><lastmod>2026-02-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/23/infosec-community-panics-as-anthropic-rolls-out-claude-code-security-checker/</loc><lastmod>2026-02-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/23/apt28-targeted-european-entities-using-webhook-based-macro-malware/</loc><lastmod>2026-02-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/23/microsoft-says-bug-in-classic-outlook-hides-the-mouse-pointer/</loc><lastmod>2026-02-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/23/600-fortigate-devices-hacked-by-ai-armed-amateur/</loc><lastmod>2026-02-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/23/epic-testifies-in-support-of-ban-on-sale-of-precise-location-data-in-virginia/</loc><lastmod>2026-02-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/23/ad-tech-firm-optimizely-confirms-data-breach-after-vishing-attack/</loc><lastmod>2026-02-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/23/wormable-xmrig-campaign-uses-byovd-exploit-and-time-based-logic-bomb/</loc><lastmod>2026-02-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/23/stopping-real-world-attacks-lessons-for-business-leaders-from-the-2026-cyber-fro/</loc><lastmod>2026-02-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/23/nonprofit-coalition-asks-courts-to-prevent-coercive-federal-investigation-tactic/</loc><lastmod>2026-02-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/23/global-regulators-say-ai-image-tools-dont-get-a-free-pass-on-privacy-rules/</loc><lastmod>2026-02-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/23/us-healthcare-diagnostic-firm-says-140000-affected-by-data-breach/</loc><lastmod>2026-02-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/23/break-free-of-rings-servers-earn-a-five-figure-bounty/</loc><lastmod>2026-02-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/23/when-identity-isnt-the-weak-link-access-still-is/</loc><lastmod>2026-02-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/23/ukrainian-gets-5-years-in-us-prison-for-aiding-north-korean-it-fraud/</loc><lastmod>2026-02-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/23/another-day-another-malicious-jpeg-mon-feb-23rd/</loc><lastmod>2026-02-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/23/weekly-recap-double-tap-skimmers-promptspy-ai-30tbps-ddos-docker-malware-more/</loc><lastmod>2026-02-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/23/autonomous-ai-agents-provide-new-class-of-supply-chain-attack/</loc><lastmod>2026-02-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/23/suspected-anonymous-members-detained-in-spain-over-post-flood-ddos-blitz/</loc><lastmod>2026-02-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/23/on-the-security-of-password-managers/</loc><lastmod>2026-02-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/23/hacker-steals-data-from-thousands-of-rtl-employees/</loc><lastmod>2026-02-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/23/how-exposed-endpoints-increase-risk-across-llm-infrastructure/</loc><lastmod>2026-02-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/23/new-arkanix-stealer-blends-rapid-python-harvesting-with-stealthier-c-payloads/</loc><lastmod>2026-02-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/23/romanian-hacker-pleads-guilty-to-selling-access-to-us-state-network/</loc><lastmod>2026-02-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/23/cisa-recently-patched-roundcube-flaws-now-exploited-in-attacks/</loc><lastmod>2026-02-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/23/aws-says-more-than-600-fortigate-firewalls-hit-in-ai-augmented-campaign/</loc><lastmod>2026-02-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/23/hundreds-of-fortigate-firewalls-hacked-in-ai-powered-attacks-aws/</loc><lastmod>2026-02-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/23/recent-roundcube-webmail-vulnerability-exploited-in-attacks/</loc><lastmod>2026-02-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/23/attackers-exploit-ivanti-epmm-zero-days-to-seize-control-of-mdm-servers/</loc><lastmod>2026-02-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/23/mississippi-hospital-system-closes-all-clinics-after-ransomware-attack/</loc><lastmod>2026-02-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/23/malicious-npm-packages-harvest-crypto-keys-ci-secrets-and-api-tokens/</loc><lastmod>2026-02-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/23/every-day-in-every-way-passwords-are-getting-worse-and-worse/</loc><lastmod>2026-02-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/23/paypal-data-breach-led-to-fraudulent-transactions/</loc><lastmod>2026-02-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/23/muddywater-targets-mena-organizations-with-ghostfetch-char-and-http-vip/</loc><lastmod>2026-02-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/23/13-ways-attackers-use-generative-ai-to-exploit-your-systems/</loc><lastmod>2026-02-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/23/the-verge-america-desperately-needs-new-privacy-laws/</loc><lastmod>2026-02-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/23/risky-bulletin-ai-driven-hacking-campaign-breaches-600-fortinet-devices/</loc><lastmod>2026-02-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/23/nowhere-man-the-2026-active-adversary-report/</loc><lastmod>2026-02-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/23/sophos-workspace-protection-enables-secure-access-for-contractors-and-guests/</loc><lastmod>2026-02-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/22/attacker-gets-into-frances-database-listing-all-bank-accounts-makes-off-with-12/</loc><lastmod>2026-02-22</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/22/arkanix-stealer-pops-up-as-short-lived-ai-info-stealer-experiment/</loc><lastmod>2026-02-22</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/22/uk-council-faces-data-breach-claim-after-mishandling-trans-complaints/</loc><lastmod>2026-02-22</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/21/predator-spyware-hooks-ios-springboard-to-hide-mic-camera-activity/</loc><lastmod>2026-02-21</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/21/ai-assisted-threat-actor-compromises-600-fortigate-devices-in-55-countries/</loc><lastmod>2026-02-21</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/21/amazon-ai-assisted-hacker-breached-600-fortigate-firewalls-in-5-weeks/</loc><lastmod>2026-02-21</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/21/critical-grandstream-phone-vulnerability-exposes-calls-to-interception/</loc><lastmod>2026-02-21</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/21/anthropic-launches-claude-code-security-for-ai-powered-vulnerability-scanning/</loc><lastmod>2026-02-21</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/21/cisa-adds-two-actively-exploited-roundcube-flaws-to-kev-catalog/</loc><lastmod>2026-02-21</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/21/japanese-language-phishing-emails-sat-feb-21st/</loc><lastmod>2026-02-21</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/21/ec-council-expands-ai-certification-portfolio-to-strengthen-us-ai-workforce-read/</loc><lastmod>2026-02-21</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/21/compromised-npm-package-silently-installs-openclaw-on-developer-machines/</loc><lastmod>2026-02-21</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/21/law360-state-privacy-watch-4-legislative-developments-to-know/</loc><lastmod>2026-02-21</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/21/biometric-update-ftc-asked-to-investigate-meta-facial-recognition-smart-glasses/</loc><lastmod>2026-02-21</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/21/the-verge-smart-glasses-in-court-are-a-privacy-nightmare/</loc><lastmod>2026-02-21</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/20/paypal-app-code-error-leaked-personal-info-and-a-few-unauthorized-transactions/</loc><lastmod>2026-02-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/20/friday-squid-blogging-squid-cartoon/</loc><lastmod>2026-02-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/20/attackers-use-new-tool-to-scan-for-react2shell-exposure/</loc><lastmod>2026-02-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/20/ai-coding-assistant-cline-compromised-to-create-more-openclaw-chaos/</loc><lastmod>2026-02-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/20/starkiller-phishing-service-proxies-real-login-pages-mfa/</loc><lastmod>2026-02-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/20/epic-testifies-in-support-of-new-jersey-age-appropriate-design-code/</loc><lastmod>2026-02-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/20/god-like-attack-machines-ai-agents-ignore-security-policies/</loc><lastmod>2026-02-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/20/japanese-tech-giant-advantest-hit-by-ransomware-attack/</loc><lastmod>2026-02-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/20/shinyhunters-demands-15m-not-to-leak-vegas-casino-and-resort-chain-data/</loc><lastmod>2026-02-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/20/lessons-from-ai-hacking-every-model-every-layer-is-risky/</loc><lastmod>2026-02-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/20/cisa-beyondtrust-rce-flaw-now-exploited-in-ransomware-attacks/</loc><lastmod>2026-02-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/20/dont-trust-trustconnect-this-fake-remote-support-tool-only-helps-hackers/</loc><lastmod>2026-02-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/20/data-breach-at-french-bank-registry-impacts-12-million-accounts/</loc><lastmod>2026-02-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/20/nists-quantum-breakthrough-single-photons-produced-on-a-chip/</loc><lastmod>2026-02-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/20/beyondtrust-flaw-used-for-web-shells-backdoors-and-data-exfiltration/</loc><lastmod>2026-02-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/20/in-other-news-ransomware-shuts-us-clinics-ics-vulnerability-surge-european-parli/</loc><lastmod>2026-02-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/20/why-the-shift-left-dream-has-become-a-nightmare-for-security-and-developers/</loc><lastmod>2026-02-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/20/ukrainian-gets-five-years-for-helping-north-koreans-secure-us-tech-jobs/</loc><lastmod>2026-02-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/20/cline-cli-230-supply-chain-attack-installed-openclaw-on-developer-systems/</loc><lastmod>2026-02-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/20/founder-ditches-aws-for-euro-stack-finds-sovereignty-isnt-plug-and-play/</loc><lastmod>2026-02-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/20/latin-americas-cyber-maturity-lags-threat-landscape/</loc><lastmod>2026-02-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/20/paypal-discloses-data-breach-that-exposed-user-info-for-6-months/</loc><lastmod>2026-02-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/20/ki-und-komplexität-als-brandbeschleuniger-für-cyberkriminelle/</loc><lastmod>2026-02-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/20/beyondtrust-vulnerability-exploited-in-ransomware-attacks/</loc><lastmod>2026-02-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/20/cisa-gives-federal-agencies-three-days-to-patch-actively-exploited-dell-bug/</loc><lastmod>2026-02-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/20/ring-cancels-its-partnership-with-flock/</loc><lastmod>2026-02-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/20/cisa-adds-two-known-exploited-vulnerabilities-to-catalog/</loc><lastmod>2026-02-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/20/clickfix-campaign-abuses-compromised-sites-to-deploy-mimicrat-rat/</loc><lastmod>2026-02-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/20/mississippi-medical-center-closes-all-clinics-after-ransomware-attack/</loc><lastmod>2026-02-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/20/fbi-20-million-losses-caused-by-700-atm-jackpotting-attacks-in-2025/</loc><lastmod>2026-02-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/20/ex-google-engineers-accused-of-helping-themselves-to-chip-security-secrets/</loc><lastmod>2026-02-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/20/identity-cyber-scores-the-new-metric-shaping-cyber-insurance-in-2026/</loc><lastmod>2026-02-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/20/attackers-have-16-digit-card-numbers-expiry-dates-but-not-names-should-org-get-5/</loc><lastmod>2026-02-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/20/fbi-over-20-million-stolen-in-surge-of-atm-malware-attacks-in-2025/</loc><lastmod>2026-02-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/20/ukrainian-national-sentenced-to-5-years-in-north-korea-it-worker-fraud-case/</loc><lastmod>2026-02-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/20/chip-testing-giant-advantest-hit-by-ransomware/</loc><lastmod>2026-02-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/20/ukrainian-gets-5-years-for-helping-north-koreans-infiltrate-us-firms/</loc><lastmod>2026-02-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/20/sonderkommission-ermittelt-zu-cyberangriff-auf-kunstsammlungen-dresden/</loc><lastmod>2026-02-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/20/fbi-reports-1900-atm-jackpotting-incidents-since-2020-20m-lost-in-2025/</loc><lastmod>2026-02-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/20/promptspy-android-malware-abuses-gemini-ai-at-runtime-for-persistence/</loc><lastmod>2026-02-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/20/paypal-launches-latest-struggle-to-get-rid-of-sms-for-mfa/</loc><lastmod>2026-02-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/20/three-former-google-engineers-indicted-over-trade-secret-transfers-to-iran/</loc><lastmod>2026-02-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/20/snyk-ceo-bails-wants-someone-with-more-ai-experience-to-replace-him/</loc><lastmod>2026-02-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/20/10-passwordless-optionen-für-unternehmen/</loc><lastmod>2026-02-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/20/risky-bulletin-rpki-infrastructure-sits-on-shaky-ground/</loc><lastmod>2026-02-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/20/ai-agents-abound-unbound-by-rules-or-safety-disclosures/</loc><lastmod>2026-02-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/20/effs-policy-on-llm-assisted-contributions-to-our-open-source-projects/</loc><lastmod>2026-02-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/20/effs-policy-on-llm-assisted-contributions-to-our-open-source-projects/</loc><lastmod>2026-02-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/20/new-phishing-campaign-tricks-employees-into-bypassing-microsoft-365-mfa/</loc><lastmod>2026-02-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/19/crims-create-fake-remote-management-vendor-that-actually-sells-a-rat/</loc><lastmod>2026-02-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/19/emerging-chiplet-designs-spark-fresh-cybersecurity-challenges/</loc><lastmod>2026-02-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/19/promptspy-is-the-first-known-android-malware-to-use-generative-ai-at-runtime/</loc><lastmod>2026-02-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/19/supply-chain-attack-secretly-installs-openclaw-for-cline-users/</loc><lastmod>2026-02-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/19/best-in-class-starkiller-phishing-kit-bypasses-mfa/</loc><lastmod>2026-02-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/19/us-dominance-of-agentic-ai-at-the-heart-of-new-nist-initiative/</loc><lastmod>2026-02-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/19/washington-supreme-court-allows-suicide-kit-lawsuit-against-amazon-to-proceed/</loc><lastmod>2026-02-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/19/representative-trahan-drops-epic-backed-blueprint-for-updating-the-privacy-act/</loc><lastmod>2026-02-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/19/abu-dhabi-finance-week-exposed-vip-passport-details/</loc><lastmod>2026-02-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/19/under-the-hood-of-dynowiper-thu-feb-19th/</loc><lastmod>2026-02-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/19/epic-testifies-in-support-of-maryland-bill-that-would-ban-surveillance-pricing-i/</loc><lastmod>2026-02-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/19/crims-hit-a-20m-jackpot-via-malware-stuffed-atms/</loc><lastmod>2026-02-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/19/promptspy-android-malware-abuses-gemini-ai-to-automate-recent-apps-persistence/</loc><lastmod>2026-02-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/19/interpol-operation-red-card-20-arrests-651-in-african-cybercrime-crackdown/</loc><lastmod>2026-02-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/19/microsoft-patches-cve-2026-26119-privilege-escalation-in-windows-admin-center/</loc><lastmod>2026-02-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/19/flaw-in-grandstream-voip-phones-allows-stealthy-eavesdropping/</loc><lastmod>2026-02-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/19/google-blocked-over-175-million-play-store-app-submissions-in-2025/</loc><lastmod>2026-02-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/19/android-malware-taps-gemini-to-navigate-infected-devices/</loc><lastmod>2026-02-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/19/cisa-orders-feds-to-patch-actively-exploited-dell-flaw-within-3-days/</loc><lastmod>2026-02-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/19/connected-and-compromised-when-iot-devices-turn-into-threats/</loc><lastmod>2026-02-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/19/how-infostealers-turn-stolen-credentials-into-real-identities/</loc><lastmod>2026-02-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/19/french-government-says-12-million-bank-accounts-exposed-in-breach/</loc><lastmod>2026-02-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/19/threatsday-bulletin-openssl-rce-foxit-0-days-copilot-leak-ai-password-flaws-20-s/</loc><lastmod>2026-02-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/19/nigerian-man-gets-eight-years-in-prison-for-hacking-tax-firms/</loc><lastmod>2026-02-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/19/def-con-bans-three-epstein-linked-men-from-future-events/</loc><lastmod>2026-02-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/19/nearly-1-million-user-records-compromised-in-figure-data-breach/</loc><lastmod>2026-02-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/19/texas-sues-tp-link-over-chinese-hacking-risks-user-deception/</loc><lastmod>2026-02-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/19/hackers-target-microsoft-entra-accounts-in-device-code-vishing-attacks/</loc><lastmod>2026-02-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/19/venice-security-emerges-from-stealth-with-33m-funding-for-privileged-access-mana/</loc><lastmod>2026-02-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/19/six-flaws-found-hiding-in-openclaws-plumbing/</loc><lastmod>2026-02-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/19/malicious-ai/</loc><lastmod>2026-02-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/19/welker-odoreyes-ecosystem-pulse-bypass-system-with-xl4-controller/</loc><lastmod>2026-02-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/19/valmet-dna-engineering-web-tools/</loc><lastmod>2026-02-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/19/enocean-smartserver-iot/</loc><lastmod>2026-02-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/19/jinan-usr-iot-technology-limited-pusr-usr-w610/</loc><lastmod>2026-02-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/19/what-does-prosuss-buyout-mean-for-justeat-drivers/</loc><lastmod>2026-02-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/19/ivanti-exploitation-surges-as-zero-day-attacks-traced-back-to-july-2025/</loc><lastmod>2026-02-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/19/from-exposure-to-exploitation-how-ai-collapses-your-response-window/</loc><lastmod>2026-02-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/19/uk-to-demand-social-platforms-take-down-abusive-intimate-images-within-48-hours/</loc><lastmod>2026-02-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/19/police-arrests-651-suspects-in-african-cybercrime-crackdown/</loc><lastmod>2026-02-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/19/healthcare-security-write-login-details-on-whiteboard-hope-for-the-best/</loc><lastmod>2026-02-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/19/openclaw-security-issues-continue-as-secureclaw-open-source-tool-debuts/</loc><lastmod>2026-02-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/19/fake-iptv-apps-spread-massiv-android-malware-targeting-mobile-banking-users/</loc><lastmod>2026-02-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/19/hackers-can-turn-grok-copilot-into-covert-command-and-control-channels-researche/</loc><lastmod>2026-02-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/19/new-massiv-android-banking-malware-poses-as-an-iptv-app/</loc><lastmod>2026-02-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/19/cybersicherheit-braucht-reife-und-keine-checklisten/</loc><lastmod>2026-02-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/19/german-rail-giant-deutsche-bahn-hit-by-large-scale-ddos-attack/</loc><lastmod>2026-02-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/19/crescentharvest-campaign-targets-iran-protest-supporters-with-rat-malware/</loc><lastmod>2026-02-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/19/more-than-40-of-south-africans-were-scammed-in-2025/</loc><lastmod>2026-02-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/19/from-in-house-ciso-to-consultant-what-you-need-to-know-before-making-the-leap/</loc><lastmod>2026-02-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/19/poland-bans-camera-packing-cars-made-in-china-cars-from-military-bases/</loc><lastmod>2026-02-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/19/srsly-risky-biz-europes-cyber-bullets-cant-replace-political-will/</loc><lastmod>2026-02-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/19/isc-stormcast-for-thursday-february-19th-2026-httpsiscsansedupodcastdetail9816-t/</loc><lastmod>2026-02-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/19/2025-cloud-threat-hunting-and-defense-landscape/</loc><lastmod>2026-02-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/adidas-investigates-third-party-data-breach-after-criminals-claim-they-pwned-the/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/notepad-author-says-fixes-make-update-mechanism-effectively-unexploitable/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/scam-abuses-gemini-chatbots-to-convince-people-to-buy-fake-crypto/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/chinese-hackers-exploited-zero-day-dell-recoverpoint-flaw-for-15-years/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/critical-grandstream-voip-bug-highlights-smb-security-blind-spot/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/critical-infra-honeywell-cctvs-vulnerable-to-auth-bypass-flaw/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/threat-intelligence-has-a-human-shaped-blind-spot/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/dells-hard-coded-flaw-a-nation-state-goldmine/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/shinyhunters-allegedly-drove-off-with-17m-cargurus-records/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/epic-urges-second-circuit-to-recognize-constitutionality-of-surveillance-pricing/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/ai-platforms-can-be-abused-for-stealthy-malware-communication/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/a-cisos-playbook-for-defending-data-assets-against-ai-scraping/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/fraudster-hacked-hotel-system-paid-1-cent-for-luxury-rooms-spanish-cops-say/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/how-to-enhance-threat-hunting-through-enterprise-wide-collaboration/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/citizen-lab-finds-cellebrite-tool-used-on-kenyan-activists-phone-in-police-custo/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/texas-sues-tp-link-over-china-links-and-security-vulnerabilities/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/german-train-line-back-on-track-after-ddos-yanks-the-brakes/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/grandstream-gxp1600-voip-phones-exposed-to-unauthenticated-remote-code-execution/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/telegram-channels-expose-rapid-weaponization-of-smartermail-flaws/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/microsoft-anti-phishing-rules-mistakenly-blocked-emails-teams-messages/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/threat-intelligence-will-ai-make-human-analysts-obsolete/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/new-keenadu-android-malware-found-on-thousands-of-devices/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/millionen-chrome-erweiterungen-geben-browserverlauf-preis/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/securing-devops-pipelines-with-real-time-threat-intelligence/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/anticipate-attacks-before-they-strike-harness-predictive-threat-intelligence/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/mastering-threat-hunting-aligning-with-adversary-tactics-in-2026/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/browser-extensions-under-siege-advanced-detection-tactics-for-enterprises/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/scaling-security-governance-with-platform-engineering-a-proactive-approach-for-w/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/driving-security-culture-evolution-for-business-growth/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/cogent-security-raises-42-million-for-ai-driven-vulnerability-management/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/your-ai-generated-password-isnt-random-it-just-looks-that-way/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/data-breach-at-fintech-firm-figure-affects-nearly-1-million-accounts/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/philadelphia-could-elect-its-first-muslim-congressman-hes-not-sure-where-he-stan/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/eff-to-wisconsin-legislature-vpn-bans-are-still-a-terrible-idea/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/ai-found-twelve-new-vulnerabilities-in-openssl/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/keenadu-android-malware-that-comes-preinstalled-and-cant-be-removed-by-users/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/flaws-in-four-popular-vs-code-extensions-left-128-million-installs-open-to-attac/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/vulnerabilities-in-popular-pdf-platforms-allowed-account-takeover-data-exfiltrat/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/you-can-jailbreak-an-f-35-just-like-an-iphone-says-dutch-defense-chief/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/notepad-declares-hardened-update-process-effectively-unexploitable/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/cybersecurity-tech-predictions-for-2026-operating-in-a-world-of-permanent-instab/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/critical-flaws-found-in-four-vs-code-extensions-with-over-125-million-installs/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/microsoft-says-bug-causes-copilot-to-summarize-confidential-emails/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/a-new-approach-for-genai-risk-protection/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/discipline-is-the-new-power-move-in-cybersecurity-leadership/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/cyberangriff-auf-bahn-stört-auskunftssysteme/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/cisa-hackers-exploiting-vulnerability-in-product-of-taiwan-security-firm-teamt5/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/hackerone-updating-tsampcs-after-bug-hunters-question-if-theyre-training-ai/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/3-ways-to-start-your-intelligent-workflow-program/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/dell-recoverpoint-for-vms-zero-day-cve-2026-22769-exploited-since-mid-2024/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/glendale-man-gets-5-years-in-prison-for-role-in-darknet-drug-ring/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/cisa-adds-two-known-exploited-vulnerabilities-to-catalog/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/credshields-leads-owasp-smart-contract-top-10-2026-as-governance-and-access-fail/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/tracking-malware-campaigns-with-reused-material-wed-feb-18th/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/palo-alto-networks-to-acquire-koi-in-reported-400-million-transaction/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/notepad-fixes-hijacked-update-mechanism-used-to-deliver-targeted-malware/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/the-new-paradigm-for-raising-up-secure-software-engineers/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/dell-recoverpoint-zero-day-exploited-by-chinese-cyberespionage-group/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/cisa-flags-four-security-flaws-under-active-exploitation-in-latest-kev-update/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/13-fragen-gegen-drittanbieterrisiken/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/palo-alto-ceo-says-ai-isnt-great-for-business-yet/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/isc-stormcast-for-wednesday-february-18th-2026-httpsiscsansedupodcastdetail9814/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/risky-bulletin-supply-chain-attack-plants-backdoor-on-android-tablets/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/virtual-event-shields-up-key-technologies-reshaping-cybersecurity-defenses/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/china-linked-snoops-have-been-exploiting-dell-0-day-since-mid-2024-using-ghost-n/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/singapore-amp-its-4-major-telcos-fend-off-chinese-hackers/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/the-openclaw-experiment-is-a-warning-shot-for-enterprise-ai-security/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/eff-to-wisconsin-legislature-vpn-bans-are-still-a-terrible-idea/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/18/graycharlie-hijacks-law-firm-sites-in-suspected-supply-chain-attack/</loc><lastmod>2026-02-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/17/spain-orders-nordvpn-protonvpn-to-block-laliga-piracy-sites/</loc><lastmod>2026-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/17/supply-chain-attack-embeds-malware-in-android-devices/</loc><lastmod>2026-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/17/china-remains-embedded-in-us-energy-networks-for-the-purpose-of-taking-it-down/</loc><lastmod>2026-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/17/poland-energy-survives-attack-on-wind-solar-infrastructure/</loc><lastmod>2026-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/17/flaws-in-popular-vscode-extensions-expose-developers-to-attacks/</loc><lastmod>2026-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/17/cyber-attacks-enabled-by-basic-failings-palo-alto-analysis-finds/</loc><lastmod>2026-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/17/rmm-abuse-explodes-as-hackers-ditch-malware/</loc><lastmod>2026-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/17/clickfix-attacks-abuses-dns-lookup-command-to-deliver-modelorat/</loc><lastmod>2026-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/17/password-managers-promise-that-they-cant-see-your-vaults-isnt-always-true/</loc><lastmod>2026-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/17/chinese-hackers-exploiting-dell-zero-day-flaw-since-mid-2024/</loc><lastmod>2026-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/17/can-trumps-plan-for-warehouse-immigrant-detention-camps-be-stopped/</loc><lastmod>2026-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/17/webinar-how-modern-soc-teams-use-ai-and-context-to-investigate-cloud-breaches-fa/</loc><lastmod>2026-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/17/its-correct-and-moral-to-use-the-olympics-to-speak-out-about-politics/</loc><lastmod>2026-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/17/san-jose-can-protect-immigrants-by-ending-flock-surveillance-system/</loc><lastmod>2026-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/17/san-jose-can-protect-immigrants-by-ending-flock-surveillance-system/</loc><lastmod>2026-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/17/notepad-boosts-update-security-with-double-lock-mechanism/</loc><lastmod>2026-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/17/researchers-show-copilot-and-grok-can-be-abused-as-malware-c2-proxies/</loc><lastmod>2026-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/17/new-report-helps-journalists-dig-deeper-into-police-surveillance-technology/</loc><lastmod>2026-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/17/new-report-helps-journalists-dig-deeper-into-police-surveillance-technology/</loc><lastmod>2026-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/17/keenadu-firmware-backdoor-infects-android-tablets-via-signed-ota-updates/</loc><lastmod>2026-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/17/vulncheck-raises-25-million-in-series-b-funding-to-scale-vulnerability-intellige/</loc><lastmod>2026-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/17/microsoft-teams-outage-affects-users-in-united-states-europe/</loc><lastmod>2026-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/17/hackers-offer-to-sell-millions-of-eurail-user-records/</loc><lastmod>2026-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/17/mcsc-2026-politik-und-wirtschaft-müssen-zusammenarbeiten/</loc><lastmod>2026-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/17/what-5-million-apps-revealed-about-secrets-in-javascript/</loc><lastmod>2026-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/17/new-keenadu-backdoor-found-in-android-firmware-google-play-apps/</loc><lastmod>2026-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/17/api-threats-grow-in-scale-as-ai-expands-the-blast-radius/</loc><lastmod>2026-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/17/cyber-insights-2026-the-ongoing-fight-to-secure-industrial-control-systems/</loc><lastmod>2026-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/17/us-lawyers-fire-up-privacy-class-action-accusing-lenovo-of-bulk-data-transfers-t/</loc><lastmod>2026-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/17/polish-cops-nab-47-year-old-man-in-phobos-ransomware-raid/</loc><lastmod>2026-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/17/man-linked-to-phobos-ransomware-arrested-in-poland/</loc><lastmod>2026-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/17/smartloader-attack-uses-trojanized-oura-mcp-server-to-deploy-stealc-infostealer/</loc><lastmod>2026-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/17/zerodayrat-spyware-targets-android-and-ios-devices-via-commercial-toolkit/</loc><lastmod>2026-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/17/side-channel-attacks-against-llms/</loc><lastmod>2026-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/17/cisa-adds-four-known-exploited-vulnerabilities-to-catalog/</loc><lastmod>2026-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/17/honeywell-cctv-products/</loc><lastmod>2026-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/17/delta-electronics-asda-soft/</loc><lastmod>2026-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/17/ge-vernova-enervista-ur-setup/</loc><lastmod>2026-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/17/siemens-simcenter-femap-and-nastran/</loc><lastmod>2026-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/17/poland-arrests-suspect-linked-to-phobos-ransomware-operation/</loc><lastmod>2026-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/17/ukgov-launches-cyber-lockdown-campaign-as-80-of-orgs-still-leave-door-open/</loc><lastmod>2026-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/17/my-day-getting-my-hands-dirty-with-an-ndr-system/</loc><lastmod>2026-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/17/ireland-joins-regulator-smackdown-after-xs-grok-ai-accused-of-undressing-people/</loc><lastmod>2026-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/17/3-threat-groups-started-targeting-icsot-in-2025-dragos/</loc><lastmod>2026-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/17/us-sent-a-rescue-plane-for-boat-strike-survivors-it-took-45-hours-to-arrive/</loc><lastmod>2026-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/17/ireland-now-also-investigating-x-over-grok-made-sexual-images/</loc><lastmod>2026-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/17/with-cisos-stretched-thin-re-envisioning-enterprise-risk-may-be-the-only-fix/</loc><lastmod>2026-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/17/air-force-maintenance-staff-cant-stop-buying-fancy-knives-with-tax-dollars/</loc><lastmod>2026-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/17/why-2025s-agentic-ai-boom-is-a-cisos-worst-nightmare/</loc><lastmod>2026-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/17/microsoft-finds-summarize-with-ai-prompts-manipulating-chatbot-recommendations/</loc><lastmod>2026-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/17/password-managers-vulnerable-to-vault-compromise-under-malicious-server/</loc><lastmod>2026-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/17/mod-ticks-shopping-list-as-pm-considers-weapons-budget-boost/</loc><lastmod>2026-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/17/fake-incident-report-used-in-phishing-campaign-tue-feb-17th/</loc><lastmod>2026-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/17/apple-tests-end-to-end-encrypted-rcs-messaging-in-ios-264-developer-beta/</loc><lastmod>2026-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/17/isc-stormcast-for-tuesday-february-17th-2026-httpsiscsansedupodcastdetail9812-tu/</loc><lastmod>2026-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/17/exploit-available-for-new-chrome-zero-day-vulnerability-says-google/</loc><lastmod>2026-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/17/sophos-workspace-protection-enables-secure-saas-app-control/</loc><lastmod>2026-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/16/washington-hotel-in-japan-discloses-ransomware-infection-incident/</loc><lastmod>2026-02-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/16/was-cisos-über-openclaw-wissen-sollten/</loc><lastmod>2026-02-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/16/open-source-maintainers-being-targeted-by-ai-agent-as-part-of-reputation-farming/</loc><lastmod>2026-02-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/16/eurail-says-stolen-traveler-data-now-up-for-sale-on-dark-web/</loc><lastmod>2026-02-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/16/man-arrested-for-demanding-reward-after-accidental-police-data-leak/</loc><lastmod>2026-02-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/16/infostealer-steals-openclaw-ai-agent-configuration-files-and-gateway-tokens/</loc><lastmod>2026-02-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/16/study-uncovers-25-password-recovery-attacks-in-major-cloud-password-managers/</loc><lastmod>2026-02-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/16/operation-doppelbrand-weaponizing-fortune-500-brands/</loc><lastmod>2026-02-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/16/canada-goose-ruffles-feathers-over-600k-record-dump-says-leak-is-old-news/</loc><lastmod>2026-02-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/16/infostealer-malware-found-stealing-openclaw-secrets-for-first-time/</loc><lastmod>2026-02-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/16/dutch-cops-arrest-man-after-sending-him-confidential-files-by-mistake/</loc><lastmod>2026-02-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/16/you-probably-cant-trust-your-password-manager-if-its-compromised/</loc><lastmod>2026-02-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/16/dior-louis-vuitton-tiffany-fined-25-million-in-south-korea-after-data-breaches/</loc><lastmod>2026-02-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/16/passwords-to-passkeys-staying-iso-27001-compliant-in-a-passwordless-era/</loc><lastmod>2026-02-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/16/open-source-registries-dont-have-enough-money-to-implement-basic-security/</loc><lastmod>2026-02-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/16/260k-chrome-users-duped-by-fake-ai-browser-extensions/</loc><lastmod>2026-02-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/16/android-17-beta-strengthens-secure-by-default-design-for-privacy-and-app-securit/</loc><lastmod>2026-02-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/16/cisa-navigates-dhs-shutdown-with-reduced-staff/</loc><lastmod>2026-02-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/16/weekly-recap-outlook-add-ins-hijack-0-day-patches-wormable-botnet-ai-malware/</loc><lastmod>2026-02-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/16/google-patches-chrome-zero-day-as-in-the-wild-exploits-surface/</loc><lastmod>2026-02-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/16/cisa-gives-feds-3-days-to-patch-actively-exploited-beyondtrust-flaw/</loc><lastmod>2026-02-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/16/the-promptware-kill-chain/</loc><lastmod>2026-02-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/16/safe-and-inclusive-esociety-how-lithuania-is-bracing-for-aidriven-cyber-fraud/</loc><lastmod>2026-02-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/16/leaky-chrome-extensions-with-37m-installs-caught-divulging-your-browsing-history/</loc><lastmod>2026-02-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/16/prison-style-free-speech-censorship-is-coming-for-the-rest-of-us/</loc><lastmod>2026-02-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/16/new-zerodayrat-mobile-spyware-enables-real-time-surveillance-and-data-theft/</loc><lastmod>2026-02-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/16/finding-a-common-language-around-risk/</loc><lastmod>2026-02-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/16/neue-kooperation-soll-souveräne-cloud-lösungen-bringen/</loc><lastmod>2026-02-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/16/ciso-julie-chatman-offers-insights-for-you-to-take-control-of-your-security-lead/</loc><lastmod>2026-02-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/16/2026-64-bits-malware-trend-mon-feb-16th/</loc><lastmod>2026-02-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/16/10-years-later-bangladesh-bank-cyberheist-still-offers-cyber-resiliency-lessons/</loc><lastmod>2026-02-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/16/new-chrome-zero-day-cve-2026-2441-under-active-attack-patch-released/</loc><lastmod>2026-02-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/16/us-appears-open-to-reversing-some-china-tech-bans/</loc><lastmod>2026-02-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/16/siem-kaufratgeber/</loc><lastmod>2026-02-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/16/risky-bulletin-cambodia-promises-to-dismantle-scam-networks-by-april/</loc><lastmod>2026-02-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/16/isc-stormcast-for-monday-february-16th-2026-httpsiscsansedupodcastdetail9810-mon/</loc><lastmod>2026-02-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/16/network-intelligence-your-questions-global-answers/</loc><lastmod>2026-02-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/15/infosec-exec-sold-eight-zero-day-exploit-kits-to-russia-says-doj/</loc><lastmod>2026-02-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/15/palantir-gets-millions-of-dollars-from-new-york-citys-public-hospitals/</loc><lastmod>2026-02-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/15/microsoft-discloses-dns-based-clickfix-attack-using-nslookup-for-malware-staging/</loc><lastmod>2026-02-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/14/the-guardian-the-problem-with-doorbell-cams-nancy-guthrie-case-and-ring-super-bo/</loc><lastmod>2026-02-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/14/upcoming-speaking-engagements/</loc><lastmod>2026-02-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/13/epic-urges-ftc-states-to-block-metas-facial-recognition-smart-glasses-plan/</loc><lastmod>2026-02-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/13/critical-beyondtrust-rs-vulnerability-exploited-in-active-attacks/</loc><lastmod>2026-02-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/13/friday-squid-blogging-do-squid-dream/</loc><lastmod>2026-02-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/13/zscaler-squarex-deal-boosts-zero-trust-secure-browsing-capabilities/</loc><lastmod>2026-02-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/13/seven-billion-reasons-for-facebook-to-abandon-its-face-recognition-plans/</loc><lastmod>2026-02-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/13/seven-billion-reasons-for-facebook-to-abandon-its-face-recognition-plans/</loc><lastmod>2026-02-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/13/leakers-helped-destroy-deportation-case-against-tufts-student/</loc><lastmod>2026-02-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/13/attackers-finally-get-around-to-exploiting-critical-microsoft-bug-from-2024/</loc><lastmod>2026-02-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/13/south-korea-fines-louis-vuitton-christian-dior-tiffany-25m-for-saas-security-fai/</loc><lastmod>2026-02-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/13/researchers-unearth-30-year-old-vulnerability-in-libpng-library/</loc><lastmod>2026-02-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/13/battling-bots-face-off-in-cybersecurity-arena/</loc><lastmod>2026-02-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/13/google-ties-suspected-russian-actor-to-canfail-malware-attacks-on-ukrainian-orgs/</loc><lastmod>2026-02-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/13/microsoft-under-pressure-to-bolster-defenses-for-byovd-attacks/</loc><lastmod>2026-02-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/13/nation-state-hackers-put-defense-industrial-base-under-siege/</loc><lastmod>2026-02-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/13/ai-agents-swarm-security-complexity-follows-suit/</loc><lastmod>2026-02-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/13/google-links-china-iran-russia-north-korea-to-coordinated-defense-sector-cyber-o/</loc><lastmod>2026-02-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/13/four-new-reasons-why-windows-lnk-files-cannot-be-trusted/</loc><lastmod>2026-02-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/13/uat-9921-deploys-voidlink-malware-to-target-technology-and-financial-sectors/</loc><lastmod>2026-02-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/13/the-woman-alex-pretti-was-killed-trying-to-defend-is-an-emt-federal-agents-stopp/</loc><lastmod>2026-02-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/13/jasmine-crockett-swears-off-corporate-cash-but-transferred-thousands-from-her-ho/</loc><lastmod>2026-02-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/13/bsi-läutet-ende-der-klassischen-verschlüsselung-ein/</loc><lastmod>2026-02-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/13/the-only-solution-capitalism-has-is-to-sell-us-more-useless-junk/</loc><lastmod>2026-02-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/13/cisa-adds-one-known-exploited-vulnerability-to-catalog/</loc><lastmod>2026-02-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/13/top-dutch-telco-odido-admits-62m-customers-caught-in-contact-system-caper/</loc><lastmod>2026-02-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/13/malicious-chrome-extensions-caught-stealing-business-data-emails-and-browsing-hi/</loc><lastmod>2026-02-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/13/attorney-for-epstein-survivors-warns-that-justice-is-impossible-with-bondi-as-ag/</loc><lastmod>2026-02-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/13/npms-update-to-harden-their-supply-chain-and-points-to-consider/</loc><lastmod>2026-02-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/13/researchers-observe-in-the-wild-exploitation-of-beyondtrust-cvss-99-vulnerabilit/</loc><lastmod>2026-02-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/13/enforcing-piracy-policy-earned-helpdesk-worker-death-threats/</loc><lastmod>2026-02-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/13/x26xaai-powered-knowledge-graph-generator-x26-apts-thu-feb-12th/</loc><lastmod>2026-02-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/13/risky-bulletin-icedid-malware-developer-fakes-his-own-death-to-escape-the-fbi/</loc><lastmod>2026-02-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/13/isc-stormcast-for-friday-february-13th-2026-httpsiscsansedupodcastdetail9808-fri/</loc><lastmod>2026-02-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/13/trump-attacked-immigrant-food-aid-in-minnesota-locals-fought-back/</loc><lastmod>2026-02-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/13/februarys-patch-tuesday-assumes-battle-stations/</loc><lastmod>2026-02-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/13/the-openclaw-experiment-is-a-warning-shot-for-enterprise-ai-security/</loc><lastmod>2026-02-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/12/30-chrome-extensions-disguised-as-ai-chatbots-steal-users-api-keys-emails-other/</loc><lastmod>2026-02-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/12/ivanti-epmm-zero-day-bugs-spark-exploit-frenzy-again/</loc><lastmod>2026-02-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/12/booz-allen-announces-general-availability-of-vellox-reverser-to-automate-malware/</loc><lastmod>2026-02-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/12/discord-voluntarily-pushes-mandatory-age-verification-despite-recent-data-breach/</loc><lastmod>2026-02-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/12/discord-voluntarily-pushes-mandatory-age-verification-despite-recent-data-breach/</loc><lastmod>2026-02-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/12/specterops-launches-bloodhound-scentry-to-accelerate-the-practice-of-identity-at/</loc><lastmod>2026-02-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/12/gone-with-the-shame-one-in-two-americans-are-reluctant-to-talk-about-romance-sca/</loc><lastmod>2026-02-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/12/those-summarize-with-ai-buttons-may-be-lying-to-you/</loc><lastmod>2026-02-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/12/pam-bondi-admits-doj-has-a-secret-domestic-terrorist-list/</loc><lastmod>2026-02-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/12/whos-the-bossware-ransomware-slingers-like-employee-monitoring-tools-too/</loc><lastmod>2026-02-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/12/epic-model-platform-design-legislation-introduced-in-georgia-and-kansas/</loc><lastmod>2026-02-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/12/fbi-counterterrorism-agents-spent-weeks-seeking-a-climate-activist-then-showed-u/</loc><lastmod>2026-02-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/12/coming-to-america-the-government-wants-to-see-your-emails/</loc><lastmod>2026-02-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/12/elevating-enterprise-iga-programs-for-the-future/</loc><lastmod>2026-02-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/12/google-reports-state-backed-hackers-using-gemini-ai-for-recon-and-attack-support/</loc><lastmod>2026-02-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/12/lazarus-campaign-plants-malicious-packages-in-npm-and-pypi-ecosystems/</loc><lastmod>2026-02-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/12/mastering-identity-governance-strategies-for-enterprise-success-in-2026/</loc><lastmod>2026-02-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/12/marine-detained-in-minneapolis-says-feds-copied-his-phone-without-a-warrant/</loc><lastmod>2026-02-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/12/apple-patches-decade-old-ios-zero-day-possibly-exploited-by-commercial-spyware/</loc><lastmod>2026-02-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/12/aipac-is-flooding-illinois-with-cash-pro-palestine-groups-are-backing-kat-abugha/</loc><lastmod>2026-02-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/12/3d-printer-surveillance/</loc><lastmod>2026-02-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/12/cisa-adds-four-known-exploited-vulnerabilities-to-catalog/</loc><lastmod>2026-02-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/12/siemens-sinec-nms/</loc><lastmod>2026-02-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/12/siemens-comos/</loc><lastmod>2026-02-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/12/airleader-master/</loc><lastmod>2026-02-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/12/siemens-solid-edge/</loc><lastmod>2026-02-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/12/siemens-polarion/</loc><lastmod>2026-02-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/12/siemens-siveillance-video-management-servers/</loc><lastmod>2026-02-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/12/siemens-desigo-cc-product-family-and-sentron-powermanager/</loc><lastmod>2026-02-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/12/hitachi-energy-supros/</loc><lastmod>2026-02-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/12/siemens-nx/</loc><lastmod>2026-02-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/12/siemens-sinec-os/</loc><lastmod>2026-02-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/12/supply-chain-attacks-now-fuel-a-self-reinforcing-cybercrime-economy/</loc><lastmod>2026-02-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/12/threatsday-bulletin-ai-prompt-rce-claude-0-click-renengine-loader-auto-0-days-25/</loc><lastmod>2026-02-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/12/overcoming-digital-id-barriers-to-drive-seamless-adoption-in-2026/</loc><lastmod>2026-02-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/12/the-ctem-divide-why-84-of-security-programs-are-falling-behind/</loc><lastmod>2026-02-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/12/feeling-brave-ministry-of-defence-seeks-300k-digital-boss-to-manage-46b-spend/</loc><lastmod>2026-02-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/12/senegalese-data-breaches-expose-lack-of-security-maturity/</loc><lastmod>2026-02-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/12/bypassing-administrator-protection-by-abusing-ui-access/</loc><lastmod>2026-02-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/12/83-of-ivanti-epmm-exploits-linked-to-single-ip-on-bulletproof-hosting-infrastruc/</loc><lastmod>2026-02-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/12/google-chinas-apt31-used-gemini-to-plan-cyberattacks-against-us-orgs/</loc><lastmod>2026-02-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/12/apple-fixes-exploited-zero-day-affecting-ios-macos-and-other-devices/</loc><lastmod>2026-02-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/12/isc-stormcast-for-thursday-february-12th-2026-httpsiscsansedupodcastdetail9806-t/</loc><lastmod>2026-02-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/12/four-seconds-to-botnet-analyzing-a-self-propagating-ssh-worm-with-cryptographica/</loc><lastmod>2026-02-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/12/microsoft-warns-that-poisoned-ai-buttons-and-links-may-betray-your-trust/</loc><lastmod>2026-02-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/12/srsly-risky-biz-microsofts-forgoes-its-secure-future/</loc><lastmod>2026-02-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/12/state-of-security-report-recorded-future/</loc><lastmod>2026-02-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/12/fragmentation-defined-2025s-threat-landscape-heres-what-it-means-for-2026/</loc><lastmod>2026-02-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/12/sophos-firewall-configuration-viewer/</loc><lastmod>2026-02-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/11/defending-against-ai-driven-identity-threats-in-2026/</loc><lastmod>2026-02-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/11/once-hobbled-lumma-stealer-is-back-with-lures-that-are-hard-to-resist/</loc><lastmod>2026-02-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/11/north-koreas-unc1069-hammers-crypto-firms-with-ai/</loc><lastmod>2026-02-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/11/devilish-devs-spawn-287-chrome-extensions-to-flog-your-browser-history-to-data-b/</loc><lastmod>2026-02-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/11/how-to-stay-on-top-of-future-threats-with-a-cutting-edge-soc/</loc><lastmod>2026-02-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/11/apple-patches-everything-february-2026-wed-feb-11th/</loc><lastmod>2026-02-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/11/automaker-secures-the-supply-chain-with-developer-friendly-platform/</loc><lastmod>2026-02-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/11/officials-dispute-trump-explanation-of-el-paso-airspace-closure-there-was-not-a/</loc><lastmod>2026-02-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/11/posting-ai-generated-caricatures-on-social-media-is-risky-infosec-killjoys-warn/</loc><lastmod>2026-02-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/11/cyberscoop-your-ai-doctor-doesnt-have-to-follow-the-same-privacy-rules-as-your-r/</loc><lastmod>2026-02-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/11/homeland-security-wants-names-effector-383/</loc><lastmod>2026-02-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/11/homeland-security-wants-names-effector-383/</loc><lastmod>2026-02-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/11/epic-endorses-new-bill-to-ban-ice-and-cbp-from-using-facial-recognition-technolo/</loc><lastmod>2026-02-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/11/free-surveillance-tech-still-comes-at-a-high-and-dangerous-cost/</loc><lastmod>2026-02-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/11/free-surveillance-tech-still-comes-at-a-high-and-dangerous-cost/</loc><lastmod>2026-02-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/11/first-malicious-outlook-add-in-found-stealing-4000-microsoft-credentials/</loc><lastmod>2026-02-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/11/kimwolf-botnet-swamps-anonymity-network-i2p/</loc><lastmod>2026-02-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/11/were-telcos-tipped-off-to-that-ancient-telnet-bug-cyber-pros-say-the-signs-stack/</loc><lastmod>2026-02-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/11/apt36-and-sidecopy-launch-cross-platform-rat-campaigns-against-indian-entities/</loc><lastmod>2026-02-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/11/rewiring-democracy-ebook-is-on-sale/</loc><lastmod>2026-02-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/11/ai-rising-do-we-know-enough-about-the-data-populating-it/</loc><lastmod>2026-02-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/11/top-cyber-industry-defenses-spike-co2-emissions/</loc><lastmod>2026-02-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/11/texas-antifa-cell-terror-trial-takes-on-tough-questions-about-guns-at-protests-a/</loc><lastmod>2026-02-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/11/over-60-software-vendors-issue-security-fixes-across-os-cloud-and-network-platfo/</loc><lastmod>2026-02-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/11/payroll-pirates-are-conning-help-desks-to-steal-workers-identities-and-redirect/</loc><lastmod>2026-02-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/11/scaling-digital-credentials-the-fast-evolving-landscape-of-mdl/</loc><lastmod>2026-02-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/11/prompt-injection-via-road-signs/</loc><lastmod>2026-02-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/11/notepads-new-markdown-powers-served-with-a-side-of-remote-code-execution/</loc><lastmod>2026-02-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/11/exposed-training-open-the-door-for-crypto-mining-in-fortune-500-cloud-environmen/</loc><lastmod>2026-02-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/11/microsoft-patches-59-vulnerabilities-including-six-actively-exploited-zero-days/</loc><lastmod>2026-02-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/11/sshstalker-botnet-uses-irc-c2-to-control-linux-systems-via-legacy-kernel-exploit/</loc><lastmod>2026-02-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/11/legacy-systems-blamed-as-ministers-promise-no-repeat-of-afghan-breach/</loc><lastmod>2026-02-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/11/modern-iam-decentralized-solutions-for-evolving-threats/</loc><lastmod>2026-02-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/11/north-korea-linked-unc1069-uses-ai-lures-to-attack-cryptocurrency-organizations/</loc><lastmod>2026-02-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/11/risky-bulletin-chinese-cyber-spies-breached-all-of-singapores-telcos/</loc><lastmod>2026-02-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/11/asia-fumbles-with-throttling-back-telnet-traffic-in-region/</loc><lastmod>2026-02-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/11/from-27-steps-to-5-how-recorded-future-reimagined-threat-hunting-with-autonomous/</loc><lastmod>2026-02-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/10/open-letter-to-tech-companies-protect-your-users-from-lawless-dhs-subpoenas/</loc><lastmod>2026-02-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/10/open-letter-to-tech-companies-protect-your-users-from-lawless-dhs-subpoenas/</loc><lastmod>2026-02-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/10/microsofts-valentines-gift-to-admins-6-exploited-zero-day-fixes/</loc><lastmod>2026-02-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/10/americans-want-accountability-with-the-epstein-files-elites-couldnt-care-less/</loc><lastmod>2026-02-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/10/solarwinds-whd-attacks-highlight-risks-of-exposed-apps/</loc><lastmod>2026-02-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/10/patch-tuesday-february-2026-edition/</loc><lastmod>2026-02-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/10/in-bypassing-mfa-zerodayrat-is-textbook-stalkerware/</loc><lastmod>2026-02-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/10/epic-joins-eff-others-urging-california-to-block-federal-agencies-covert-alprs-i/</loc><lastmod>2026-02-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/10/no-one-including-our-furry-friends-will-be-safer-in-rings-surveillance-nightmare/</loc><lastmod>2026-02-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/10/no-one-including-our-furry-friends-will-be-safer-in-rings-surveillance-nightmare/</loc><lastmod>2026-02-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/10/microsoft-patches-6-actively-exploited-zero-days/</loc><lastmod>2026-02-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/10/maine-house-passes-strong-privacy-bill/</loc><lastmod>2026-02-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/10/windows-original-secure-boot-certificates-expire-in-juneheres-what-you-need-to-d/</loc><lastmod>2026-02-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/10/ai-agents-spill-secrets-just-by-previewing-malicious-links/</loc><lastmod>2026-02-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/10/dprk-operatives-impersonate-professionals-on-linkedin-to-infiltrate-companies/</loc><lastmod>2026-02-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/10/coalition-urges-california-to-revoke-permits-for-federal-license-plate-reader-su/</loc><lastmod>2026-02-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/10/coalition-urges-california-to-revoke-permits-for-federal-license-plate-reader-su/</loc><lastmod>2026-02-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/10/speaking-freely-yazan-badran/</loc><lastmod>2026-02-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/10/ot-attacks-get-scary-with-living-off-the-plant-techniques/</loc><lastmod>2026-02-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/10/reynolds-ransomware-embeds-byovd-driver-to-disable-edr-security-tools/</loc><lastmod>2026-02-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/10/from-ransomware-to-residency-inside-the-rise-of-the-digital-parasite/</loc><lastmod>2026-02-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/10/singapore-spent-11-months-booting-china-linked-snoops-out-of-telco-networks/</loc><lastmod>2026-02-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/10/fortinet-patches-critical-sqli-flaw-enabling-unauthenticated-code-execution/</loc><lastmod>2026-02-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/10/ai-generated-text-and-the-detection-arms-race/</loc><lastmod>2026-02-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/10/barriers-to-secure-ot-communication-why-johnny-cant-authenticate/</loc><lastmod>2026-02-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/10/cisa-adds-six-known-exploited-vulnerabilities-to-catalog/</loc><lastmod>2026-02-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/10/poland-energy-sector-cyber-incident-highlights-ot-and-ics-security-gaps/</loc><lastmod>2026-02-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/10/zoll-epcr-ios-mobile-application/</loc><lastmod>2026-02-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/10/aveva-pi-data-archive/</loc><lastmod>2026-02-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/10/aveva-pi-to-connect-agent/</loc><lastmod>2026-02-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/10/zlan-information-technology-co-zlan5143d/</loc><lastmod>2026-02-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/10/yokogawa-fasttools/</loc><lastmod>2026-02-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/10/zastai-raises-6m-pre-a-to-scale-zero-false-positive-ai-powered-code-security/</loc><lastmod>2026-02-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/10/nearly-17000-volvo-staff-dinged-in-supplier-breach/</loc><lastmod>2026-02-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/10/warlock-ransomware-breaches-smartertools-through-unpatched-smartermail-server/</loc><lastmod>2026-02-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/10/british-army-splashes-86m-on-ai-gear-to-speed-up-the-battlefield-kill-chain/</loc><lastmod>2026-02-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/10/malicious-use-of-virtual-machine-infrastructure/</loc><lastmod>2026-02-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/10/dutch-authorities-confirm-ivanti-zero-day-exploit-exposed-employee-contact-data/</loc><lastmod>2026-02-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/10/from-security-operations-to-security-leadership-sophos-ciso-advantage/</loc><lastmod>2026-02-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/10/sophos-workspace-protection-enables-safe-genai-adoption/</loc><lastmod>2026-02-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/10/sophos-ai-agents-accelerating-mdr-and-powering-the-agentic-soc/</loc><lastmod>2026-02-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/10/threat-intelligence-executive-report-volume-2025-number-6/</loc><lastmod>2026-02-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/09/transunions-real-networks-deal-focuses-on-robocall-blocking/</loc><lastmod>2026-02-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/09/effecting-change-get-the-flock-out-of-our-city/</loc><lastmod>2026-02-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/09/effecting-change-get-the-flock-out-of-our-city/</loc><lastmod>2026-02-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/09/the-internet-still-works-yelp-protects-consumer-reviews/</loc><lastmod>2026-02-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/09/the-internet-still-works-yelp-protects-consumer-reviews/</loc><lastmod>2026-02-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/09/warlock-gang-breaches-smartertools-via-smartermail-bugs/</loc><lastmod>2026-02-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/09/someones-attacking-solarwinds-whd-to-steal-highprivilege-credentials-but-we-dont/</loc><lastmod>2026-02-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/09/the-internet-still-works-wikipedia-defends-its-editors/</loc><lastmod>2026-02-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/09/teampcp-turns-cloud-infrastructure-into-crime-bots/</loc><lastmod>2026-02-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/09/reynolds-bundles-byovd-with-ransomware-payload/</loc><lastmod>2026-02-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/09/on-its-30th-birthday-section-230-remains-the-lynchpin-for-users-speech/</loc><lastmod>2026-02-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/09/rip-dave-farber-eff-board-member-and-friend/</loc><lastmod>2026-02-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/09/rip-dave-farber-eff-board-member-and-friend/</loc><lastmod>2026-02-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/09/more-than-135000-openclaw-instances-exposed-to-internet-in-latest-vibe-coded-dis/</loc><lastmod>2026-02-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/09/what-organizations-need-to-change-when-managing-printers/</loc><lastmod>2026-02-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/09/china-linked-unc3886-targets-singapore-telecom-sector-in-cyber-espionage-campaig/</loc><lastmod>2026-02-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/09/op-ed-weakening-section-230-would-chill-online-speech/</loc><lastmod>2026-02-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/09/dutch-data-watchdog-snitches-on-itself-after-getting-caught-in-ivanti-zero-day-a/</loc><lastmod>2026-02-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/09/solarwinds-web-help-desk-exploited-for-rce-in-multi-stage-attacks-on-exposed-ser/</loc><lastmod>2026-02-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/09/taiwan-tells-uncle-sam-its-chip-ecosystem-aint-going-anywhere/</loc><lastmod>2026-02-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/09/weekly-recap-ai-skill-malware-31tbps-ddos-notepad-hack-llm-backdoors-and-more/</loc><lastmod>2026-02-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/09/how-the-gnu-c-compiler-became-the-clippy-of-cryptography/</loc><lastmod>2026-02-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/09/llms-are-getting-a-lot-better-and-faster-at-finding-and-exploiting-zero-days/</loc><lastmod>2026-02-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/09/follow-the-money-switzerland-remains-europes-top-destination-for-tech-pay/</loc><lastmod>2026-02-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/09/how-top-cisos-solve-burnout-and-speed-up-mttr-without-extra-hiring/</loc><lastmod>2026-02-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/09/bloody-wolf-targets-uzbekistan-russia-using-netsupport-rat-in-spear-phishing-cam/</loc><lastmod>2026-02-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/09/european-commission-probes-intrusion-into-staff-mobile-management-backend/</loc><lastmod>2026-02-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/09/teampcp-worm-exploits-cloud-infrastructure-to-build-criminal-infrastructure/</loc><lastmod>2026-02-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/09/beyondtrust-fixes-critical-pre-auth-rce-vulnerability-in-remote-support-and-pra/</loc><lastmod>2026-02-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/09/indian-police-commissioner-wants-id-cards-for-ai-agents/</loc><lastmod>2026-02-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/09/risky-bulletin-smartertools-hacked-via-its-own-product/</loc><lastmod>2026-02-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/08/telcos-arent-saying-how-they-fought-back-against-chinas-salt-typhoon-attacks/</loc><lastmod>2026-02-08</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/08/openclaw-integrates-virustotal-scanning-to-detect-malicious-clawhub-skills/</loc><lastmod>2026-02-08</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/07/study-confirms-experience-beats-youthful-enthusiasm/</loc><lastmod>2026-02-07</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/07/german-agencies-warn-of-signal-phishing-targeting-politicians-military-journalis/</loc><lastmod>2026-02-07</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/06/malicious-packages-for-dydx-cryptocurrency-exchange-empties-user-wallets/</loc><lastmod>2026-02-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/06/friday-squid-blogging-squid-fishing-tips/</loc><lastmod>2026-02-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/06/south-carolina-becomes-fifth-state-to-enact-an-age-appropriate-design-code/</loc><lastmod>2026-02-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/06/flickr-emails-users-about-data-breach-pins-it-on-third-party/</loc><lastmod>2026-02-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/06/ddos-deluge-brit-biz-battered-as-botnet-blitzes-break-records/</loc><lastmod>2026-02-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/06/encrypt-it-already-campaign-pushes-big-tech-to-prioritize-e2e-encryption/</loc><lastmod>2026-02-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/06/shai-hulud-the-hidden-costs-of-supply-chain-attacks/</loc><lastmod>2026-02-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/06/openclaws-gregarious-insecurities-make-safe-usage-difficult/</loc><lastmod>2026-02-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/06/china-linked-dknife-aitm-framework-targets-routers-for-traffic-hijacking-malware/</loc><lastmod>2026-02-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/06/ad-blocking-is-alive-and-well-despite-chromes-attempts-to-make-it-harder/</loc><lastmod>2026-02-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/06/risky-bulletin-denmark-recruits-hackers-for-offensive-cyber-operations/</loc><lastmod>2026-02-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/05/openclaw-reveals-meaty-personal-information-after-simple-cracks/</loc><lastmod>2026-02-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/05/yes-to-the-ice-out-of-our-faces-act/</loc><lastmod>2026-02-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/05/yes-to-the-ice-out-of-our-faces-act/</loc><lastmod>2026-02-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/05/encase-driver-weaponized-as-edr-killers-persist/</loc><lastmod>2026-02-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/05/agentic-ai-site-moltbook-is-riddled-with-security-risks/</loc><lastmod>2026-02-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/05/data-tool-to-triage-exploited-vulnerabilities-can-make-kev-more-useful/</loc><lastmod>2026-02-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/05/substack-says-intruder-lifted-emails-phone-numbers-in-months-old-breach/</loc><lastmod>2026-02-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/05/press-release-epic-publishes-model-bill-to-protect-minors-from-online-harms-and/</loc><lastmod>2026-02-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/05/cyber-success-trifecta-education-certifications-amp-experience/</loc><lastmod>2026-02-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/05/cisa-adds-two-known-exploited-vulnerabilities-to-catalog/</loc><lastmod>2026-02-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/05/hitachi-energy-fox61x/</loc><lastmod>2026-02-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/05/o6-automation-gmbh-open62541/</loc><lastmod>2026-02-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/05/hitachi-energy-xmc20/</loc><lastmod>2026-02-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/05/ilevia-eve-x1-server/</loc><lastmod>2026-02-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/05/protests-dont-impede-iranian-spying-on-expats-syrians-israelis/</loc><lastmod>2026-02-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/05/srsly-risky-biz-googles-cyber-disruption-unit-kicks-its-first-goal/</loc><lastmod>2026-02-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/05/protecting-our-right-to-sue-federal-agents-who-violate-the-constitution/</loc><lastmod>2026-02-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/04/microsoft-releases-urgent-office-patch-russian-state-hackers-pounce/</loc><lastmod>2026-02-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/04/smart-ai-policy-means-examining-its-real-harms-and-benefits/</loc><lastmod>2026-02-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/04/smart-ai-policy-means-examining-its-real-harms-and-benefits/</loc><lastmod>2026-02-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/04/ransomware-gang-goes-full-godfather-with-cartel/</loc><lastmod>2026-02-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/04/cisa-makes-unpublicized-ransomware-updates-to-kev-catalog/</loc><lastmod>2026-02-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/04/attackers-use-windows-screensavers-to-drop-malware-rmm-tools/</loc><lastmod>2026-02-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/04/juego-de-cartas-sobre-tecnología-datos-y-elecciones/</loc><lastmod>2026-02-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/04/extra-extra-announcing-dr-global-latin-america/</loc><lastmod>2026-02-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/04/big-breach-or-smooth-sailing-mexican-govt-faces-leak-allegations/</loc><lastmod>2026-02-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/04/google-looker-bugs-allow-cross-tenant-rce-data-exfil/</loc><lastmod>2026-02-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/04/risky-bulletin-plone-cms-stops-supply-chain-attack/</loc><lastmod>2026-02-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/04/rublevka-team-anatomy-of-a-russian-crypto-drainer-operation/</loc><lastmod>2026-02-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/04/malicious-use-of-virtual-machine-infrastructure/</loc><lastmod>2026-02-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/03/russian-hackers-weaponize-microsoft-office-bug-in-just-3-days/</loc><lastmod>2026-02-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/03/glassworm-malware-returns-to-shatter-developer-ecosystems/</loc><lastmod>2026-02-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/03/ai-may-supplant-pen-testers-but-oversight-amp-trust-are-not-there-yet/</loc><lastmod>2026-02-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/03/virginia-senate-passes-bill-banning-sale-of-precise-location-data/</loc><lastmod>2026-02-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/03/the-rise-of-moltbook-suggests-viral-ai-prompts-may-be-the-next-big-security-thre/</loc><lastmod>2026-02-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/02/the-minnesota-star-tribune-why-the-trump-administration-keeps-asking-for-minneso/</loc><lastmod>2026-02-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/02/inside-ai-policy-washington-state-lawmakers-to-consider-controversial-automated/</loc><lastmod>2026-02-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/02/notepad-users-take-note-its-time-to-check-if-youre-hacked/</loc><lastmod>2026-02-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/02/please-dont-feed-the-scattered-lapsus-shinyhunters/</loc><lastmod>2026-02-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/02/risky-bulletin-stopice-blames-hack-on-a-cbp-agent-here-in-socal/</loc><lastmod>2026-02-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/02/01/autonomous-threat-operations-in-action-real-results-from-recorded-futures-own-so/</loc><lastmod>2026-02-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/30/microsoft-office-vulnerability-cve-2026-21509-in-active-exploitation/</loc><lastmod>2026-01-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/30/web-portal-leaves-kids-chats-with-ai-toy-open-to-anyone-with-gmail-account/</loc><lastmod>2026-01-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/30/breaking-the-sound-barrier-part-ii-exploiting-cve-2024-54529/</loc><lastmod>2026-01-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/29/risky-bulletin-escan-antivirus-distributes-backdoor-in-latest-supply-chain-attac/</loc><lastmod>2026-01-29</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/29/eff-to-close-friday-in-solidarity-with-national-shutdown/</loc><lastmod>2026-01-29</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/29/eff-to-close-friday-in-solidarity-with-national-shutdown/</loc><lastmod>2026-01-29</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/29/county-pays-600000-to-pentesters-it-arrested-for-assessing-courthouse-security/</loc><lastmod>2026-01-29</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/29/introducing-encrypt-it-already/</loc><lastmod>2026-01-29</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/29/introducing-encrypt-it-already/</loc><lastmod>2026-01-29</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/29/google-settlement-may-bring-new-privacy-controls-for-real-time-bidding/</loc><lastmod>2026-01-29</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/29/google-settlement-may-bring-new-privacy-controls-for-real-time-bidding/</loc><lastmod>2026-01-29</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/29/srsly-risky-biz-punish-the-wicked-reward-the-righteous/</loc><lastmod>2026-01-29</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/28/site-catering-to-online-criminals-has-been-seized-by-the-fbi/</loc><lastmod>2026-01-28</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/28/the-bill-to-hand-parenting-to-big-tech-effector-382/</loc><lastmod>2026-01-28</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/28/the-bill-to-hand-parenting-to-big-tech-effector-382/</loc><lastmod>2026-01-28</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/28/dsa-human-rights-alliance-publishes-principles-calling-for-dsa-enforcement-to-in/</loc><lastmod>2026-01-28</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/28/dsa-human-rights-alliance-publishes-principles-calling-for-dsa-enforcement-to-in/</loc><lastmod>2026-01-28</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/27/theres-a-rash-of-scam-spam-coming-from-a-real-microsoft-address/</loc><lastmod>2026-01-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/27/risky-bulletin-cyberattack-cripples-cars-across-russia/</loc><lastmod>2026-01-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/27/beware-government-using-image-manipulation-for-propaganda/</loc><lastmod>2026-01-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/27/beware-government-using-image-manipulation-for-propaganda/</loc><lastmod>2026-01-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/27/eeny-meeny-miny-moe-how-ransomware-operators-choose-victims/</loc><lastmod>2026-01-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/27/celebrating-data-privacy-week-with-nists-privacy-engineering-program/</loc><lastmod>2026-01-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/27/eff-statement-on-ice-and-cbp-violence/</loc><lastmod>2026-01-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/27/eff-statement-on-ice-and-cbp-violence/</loc><lastmod>2026-01-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/26/why-has-microsoft-been-routing-examplecom-traffic-to-a-company-in-japan/</loc><lastmod>2026-01-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/26/how-to-encrypt-your-pcs-disk-without-giving-the-keys-to-microsoft/</loc><lastmod>2026-01-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/26/who-operates-the-badbox-20-botnet/</loc><lastmod>2026-01-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/26/bypassing-windows-administrator-protection/</loc><lastmod>2026-01-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/25/risky-bulletin-eu-readies-new-anti-spyware-group-but-with-even-less-powers-than/</loc><lastmod>2026-01-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/24/polands-energy-grid-was-targeted-by-never-before-seen-wiper-malware/</loc><lastmod>2026-01-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/24/search-engines-ai-and-the-long-fight-over-fair-use/</loc><lastmod>2026-01-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/24/search-engines-ai-and-the-long-fight-over-fair-use/</loc><lastmod>2026-01-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/23/rent-only-copyright-culture-makes-us-all-worse-off/</loc><lastmod>2026-01-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/22/overrun-with-ai-slop-curl-scraps-bug-bounties-to-ensure-intact-mental-health/</loc><lastmod>2026-01-22</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/22/risky-bulletin-improperly-patched-bug-exploited-again-in-fortinet-firewalls/</loc><lastmod>2026-01-22</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/22/hacker-who-stole-120000-bitcoins-wants-a-second-chanceand-a-security-job/</loc><lastmod>2026-01-22</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/21/millions-of-people-imperiled-through-sign-in-links-sent-by-sms/</loc><lastmod>2026-01-21</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/21/copyright-kills-competition/</loc><lastmod>2026-01-21</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/21/copyright-should-not-enable-monopoly/</loc><lastmod>2026-01-21</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/21/big-brother-watch-consultation-response/</loc><lastmod>2026-01-21</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/21/uk-government-facial-recognition-consultation/</loc><lastmod>2026-01-21</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/21/purplebravos-targeting-of-the-it-software-supply-chain/</loc><lastmod>2026-01-21</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/20/statutory-damages-the-fuel-of-copyright-based-censorship/</loc><lastmod>2026-01-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/20/the-worst-data-breaches-of-2025and-what-you-can-do-effector-381/</loc><lastmod>2026-01-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/20/the-worst-data-breaches-of-2025and-what-you-can-do-effector-381/</loc><lastmod>2026-01-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/20/kimwolf-botnet-lurking-in-corporate-govt-networks/</loc><lastmod>2026-01-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/20/eff-joins-internet-advocates-calling-on-the-iranian-government-to-restore-full-i/</loc><lastmod>2026-01-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/20/eff-joins-internet-advocates-calling-on-the-iranian-government-to-restore-full-i/</loc><lastmod>2026-01-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/16/eff-condemns-fbi-search-of-washington-post-reporters-home/</loc><lastmod>2026-01-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/16/eff-condemns-fbi-search-of-washington-post-reporters-home/</loc><lastmod>2026-01-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/16/eff-to-california-appeals-court-first-amendment-protects-journalist-from-tech-ex/</loc><lastmod>2026-01-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/16/mandiant-releases-rainbow-table-that-cracks-weak-admin-password-in-12-hours/</loc><lastmod>2026-01-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/16/baton-rouge-acquires-a-straight-up-military-surveillance-drone/</loc><lastmod>2026-01-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/16/congress-wants-to-hand-your-parenting-to-big-tech/</loc><lastmod>2026-01-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/16/dual-use-tech-the-shield-ai-example/</loc><lastmod>2026-01-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/16/dual-use-tech-the-airbus-example/</loc><lastmod>2026-01-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/16/threat-and-vulnerability-management-in-2026/</loc><lastmod>2026-01-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/15/transform-security-culture-into-measurable-organizational-memory/</loc><lastmod>2026-01-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/15/why-im-withholding-certainty-that-precise-us-cyber-op-disrupted-venezuelan-elect/</loc><lastmod>2026-01-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/15/report-ice-using-palantir-tool-that-feeds-on-medicaid-data/</loc><lastmod>2026-01-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/15/evolving-security-culture-aligning-human-and-ai-risks-for-business-resilience/</loc><lastmod>2026-01-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/15/many-bluetooth-devices-with-google-fast-pair-vulnerable-to-whisperpair-hack/</loc><lastmod>2026-01-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/15/building-cyber-resilience-through-culture-in-2026/</loc><lastmod>2026-01-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/14/quantify-cyber-risk-impact-for-strategic-ma-growth/</loc><lastmod>2026-01-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/14/a-0-click-exploit-chain-for-the-pixel-9-part-3-where-do-we-go-from-here/</loc><lastmod>2026-01-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/14/a-0-click-exploit-chain-for-the-pixel-9-part-2-cracking-the-sandbox-with-a-big-w/</loc><lastmod>2026-01-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/14/a-0-click-exploit-chain-for-the-pixel-9-part-1-decoding-dolby/</loc><lastmod>2026-01-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/14/so-youve-hit-an-age-gate-what-now/</loc><lastmod>2026-01-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/14/leverage-cyber-threat-intelligence-for-proactive-risk-mitigation/</loc><lastmod>2026-01-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/14/securing-open-source-dependencies-at-enterprise-scale/</loc><lastmod>2026-01-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/14/patch-tuesday-january-2026-edition/</loc><lastmod>2026-01-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/13/december-2025-cve-landscape-22-critical-vulnerabilities-mark-120-surge-react2she/</loc><lastmod>2026-01-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/13/best-ransomware-detection-tools/</loc><lastmod>2026-01-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/09/practitioners-reveal-what-makes-threat-intelligence-programs-mature/</loc><lastmod>2026-01-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/08/who-benefited-from-the-aisuru-and-kimwolf-botnets/</loc><lastmod>2026-01-08</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/08/how-hackers-are-fighting-back-against-ice/</loc><lastmod>2026-01-08</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/07/ice-is-going-on-a-surveillance-shopping-spree/</loc><lastmod>2026-01-07</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/07/digital-identities-getting-to-know-the-verifiable-digital-credential-ecosystem/</loc><lastmod>2026-01-07</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/07/gru-linked-bluedelta-evolves-credential-harvesting/</loc><lastmod>2026-01-07</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/06/effecting-change-the-human-cost-of-online-age-verification/</loc><lastmod>2026-01-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/06/the-homeland-security-spending-trail-how-to-follow-the-money-through-us-governme/</loc><lastmod>2026-01-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/05/new-ransomware-tactics-to-watch-out-for-in-2026/</loc><lastmod>2026-01-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/02/the-kimwolf-botnet-is-stalking-your-local-network/</loc><lastmod>2026-01-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/02/the-year-states-chose-surveillance-over-safety-2025-in-review/</loc><lastmod>2026-01-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2026/01/02/surveillance-self-defense-2025-year-in-review/</loc><lastmod>2026-01-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/12/31/congresss-crusade-to-age-gate-the-internet-2025-in-review/</loc><lastmod>2025-12-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/12/31/states-tried-to-censor-kids-online-courts-and-eff-mostly-stopped-them-2025-in-re/</loc><lastmod>2025-12-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/12/30/site-blocking-laws-will-always-be-a-bad-idea-2025-in-review/</loc><lastmod>2025-12-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/12/30/effs-investigations-expose-flock-safetys-surveillance-abuses-2025-in-review/</loc><lastmod>2025-12-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/12/29/happy-16th-birthday-krebsonsecuritycom/</loc><lastmod>2025-12-29</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/12/22/digital-threat-detection-tools-best-practices/</loc><lastmod>2025-12-22</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/12/19/dismantling-defenses-trump-20-cyber-year-in-review/</loc><lastmod>2025-12-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/12/18/las-autoridades-electorales-argentinas-deben-garantizar-un-voto-universalmente-s/</loc><lastmod>2025-12-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/12/18/argentinas-election-authorities-must-guarantee-the-right-to-a-universally-access/</loc><lastmod>2025-12-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/12/17/uk-justice-and-home-affairs-committee-publishes-report-on-electronic-monitoring/</loc><lastmod>2025-12-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/12/17/international-migrants-day-2025-a-year-in-review/</loc><lastmod>2025-12-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/12/17/clearview-and-the-long-arm-of-the-law/</loc><lastmod>2025-12-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/12/17/cyber-on-the-geopolitical-battlefield-beyond-the-big-fourˮ/</loc><lastmod>2025-12-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/12/17/chinas-zero-day-pipeline-from-discovery-to-deployment/</loc><lastmod>2025-12-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/12/17/the-0-transaction-that-signaled-a-nation-state-cyberattack/</loc><lastmod>2025-12-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/12/17/bluedeltas-persistent-campaign-against-ukrnet/</loc><lastmod>2025-12-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/12/16/most-parked-domains-now-serving-malicious-content/</loc><lastmod>2025-12-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/12/16/welcome-to-the-new-project-zero-blog/</loc><lastmod>2025-12-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/12/16/thinking-outside-the-box-dusted-off-draft-from-2017/</loc><lastmod>2025-12-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/12/16/windows-exploitation-techniques-winning-race-conditions-with-path-lookups/</loc><lastmod>2025-12-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/12/15/whats-next-for-enterprise-threat-intelligence-in-2026/</loc><lastmod>2025-12-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/12/12/a-look-at-an-android-itw-dng-exploit/</loc><lastmod>2025-12-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/12/11/palestine-action-operations-and-global-network/</loc><lastmod>2025-12-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/12/09/microsoft-patch-tuesday-december-2025-edition/</loc><lastmod>2025-12-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/12/09/november-2025-cve-landscape-10-critical-vulnerabilities-show-69-drop-from-octobe/</loc><lastmod>2025-12-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/12/09/5-real-word-third-party-risk-examples/</loc><lastmod>2025-12-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/12/09/graybravos-castleloader-activity-clusters-target-multiple-industries/</loc><lastmod>2025-12-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/12/08/when-the-digital-world-turns-physical-the-expanding-role-of-threat-intelligence/</loc><lastmod>2025-12-08</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/12/08/critical-react2shell-vulnerability-under-active-exploitation-by-chinese-threat-a/</loc><lastmod>2025-12-08</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/12/06/drones-to-diplomas-how-russias-largest-private-university-is-linked-to-a-25m-ess/</loc><lastmod>2025-12-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/12/05/the-bug-that-wont-die-10-years-of-the-same-mistake/</loc><lastmod>2025-12-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/12/05/the-hidden-cascade-why-law-firm-breaches-destroy-more-than-data/</loc><lastmod>2025-12-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/12/04/sms-phishers-pivot-to-points-taxes-fake-retailers/</loc><lastmod>2025-12-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/12/03/tools-are-nothing-why-people-and-process-matter-more-in-data-security-and-privac/</loc><lastmod>2025-12-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/12/03/future-ready-data-protection-securing-modern-data-ecosystems-in-an-ai-driven-wor/</loc><lastmod>2025-12-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/12/03/strengthen-data-security-strategy-for-tomorrows-resilience-defense/</loc><lastmod>2025-12-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/12/03/intellexas-global-corporate-web/</loc><lastmod>2025-12-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/12/03/the-maturity-gap-the-next-frontier-in-threat-intelligence/</loc><lastmod>2025-12-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/12/02/a-nice-retrospective-on-shaping-cybersecuritys-future/</loc><lastmod>2025-12-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/12/02/inside-the-copycop-playbook-how-to-fight-back-in-the-age-of-synthetic-media/</loc><lastmod>2025-12-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/12/01/how-ransomware-affects-business-operations-revenue-and-brand-reputation/</loc><lastmod>2025-12-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/12/01/ai-malware-hype-vs-reality/</loc><lastmod>2025-12-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/11/26/integrating-threat-intelligence-and-vulnerability-management-a-modern-approach/</loc><lastmod>2025-11-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/11/26/the-salesforce-gainsight-security-incident-what-you-need-to-know/</loc><lastmod>2025-11-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/11/24/choosing-a-digital-risk-intelligence-platform-5-key-capabilities-to-evaluate/</loc><lastmod>2025-11-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/11/20/threat-intelligence-automation/</loc><lastmod>2025-11-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/11/20/the-future-of-humanoid-robotics/</loc><lastmod>2025-11-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/11/19/operational-cyber-threat-intelligence/</loc><lastmod>2025-11-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/11/18/addressing-the-vulnerability-prioritization-challenge/</loc><lastmod>2025-11-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/11/13/third-party-risk-statistics/</loc><lastmod>2025-11-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/11/12/threat-intelligence-the-c-suite/</loc><lastmod>2025-11-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/11/12/introducing-the-2025-state-of-threat-intelligence-report-threat-intelligence-shi/</loc><lastmod>2025-11-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/11/10/threat-hunting-vs-threat-intelligence/</loc><lastmod>2025-11-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/11/06/deploy-automated-aws-defenses-for-threat-prevention/</loc><lastmod>2025-11-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/11/06/beyond-sboms-runtime-verification-for-bulletproof-cloud-supply-chains/</loc><lastmod>2025-11-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/11/06/october-2025-cve-landscape/</loc><lastmod>2025-11-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/11/06/malicious-infrastructure-finds-stability-with-aurologic-gmbh/</loc><lastmod>2025-11-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/11/05/considerations-securing-the-cloud-and-in-specific-ai/</loc><lastmod>2025-11-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/11/05/securing-the-human-element-why-people-remain-cloud-securitys-top-vulnerability-i/</loc><lastmod>2025-11-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/11/05/mitigate-insider-threats-in-multicloud-through-strategic-modeling/</loc><lastmod>2025-11-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/11/05/managing-human-risk-in-cloud-security-operations/</loc><lastmod>2025-11-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/11/04/ransomware-detection-with-real-time-data/</loc><lastmod>2025-11-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/10/28/digital-risk-management-strategies/</loc><lastmod>2025-10-28</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/10/24/how-to-prevent-ransomware/</loc><lastmod>2025-10-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/10/23/fortifying-the-human-firewall-cultivating-security-champions-in-todays-ai-landsc/</loc><lastmod>2025-10-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/10/23/transforming-human-risk-10-battle-tested-strategies-for-modern-security-awarenes/</loc><lastmod>2025-10-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/10/23/strengthening-your-human-firewall-closing-cognitive-security-gaps-before-2026/</loc><lastmod>2025-10-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/10/23/overcoming-increasing-endpoint-security-management-challenges/</loc><lastmod>2025-10-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/10/23/emerging-risks-evolving-defenses-and-the-future-of-cloud-security/</loc><lastmod>2025-10-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/10/23/dark-covenant-30-controlled-impunity-and-russias-cybercriminals/</loc><lastmod>2025-10-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/10/22/neutralizing-ai-vulnerabilities-the-new-cybersecurity-imperative/</loc><lastmod>2025-10-22</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/10/22/i-vs-ai-ai-threat-landscape-2026/</loc><lastmod>2025-10-22</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/10/22/the-2026-threatscape-is-it-time-for-a-new-strategy/</loc><lastmod>2025-10-22</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/10/21/securing-the-ai-frontier-evolving-cybersecurity-for-tomorrows-threats/</loc><lastmod>2025-10-21</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/10/21/the-control-optimization-imperative-security-roi-in-the-age-of-ai-threats/</loc><lastmod>2025-10-21</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/10/07/leveraging-cyber-ranges-for-advanced-capabilities/</loc><lastmod>2025-10-07</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/10/07/the-human-firewall-building-resilience-against-cyber-deception/</loc><lastmod>2025-10-07</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/10/07/security-risks-to-consider-with-ai-integration-ai-in-devops/</loc><lastmod>2025-10-07</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/10/02/deriving-roi-from-monitoring-the-dark-web/</loc><lastmod>2025-10-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/10/02/making-the-business-case-for-both-compliance-and-security/</loc><lastmod>2025-10-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/10/02/transforming-financial-data-security-through-strategic-governance/</loc><lastmod>2025-10-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/10/01/ai-and-the-customer-experience-a-benchmarking-perspective/</loc><lastmod>2025-10-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/10/01/balancing-ai-innovation-and-trust-in-financial-customer-journeys/</loc><lastmod>2025-10-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/10/01/creating-cyber-resilience-protecting-financial-data-services/</loc><lastmod>2025-10-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/09/30/sharpening-the-focus-on-product-requirements-and-cybersecurity-risks-updating-fo/</loc><lastmod>2025-09-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/09/12/empowering-responsible-tech-hrs-role-in-ai-and-data-governance/</loc><lastmod>2025-09-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/09/12/transforming-regulatory-compliance-mastering-emerging-tech-threats-in-data-prote/</loc><lastmod>2025-09-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/09/12/cyber-law-incident-response-navigating-personal-liability-in-cybersecurity/</loc><lastmod>2025-09-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/09/12/cyber-law-incident-response-navigating-personal-liability-in-cybersecurity/</loc><lastmod>2025-09-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/09/11/a-new-vision-for-data-security-in-the-cloud-age/</loc><lastmod>2025-09-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/09/11/confidential-ai-protecting-sensitive-data-in-genai-workflows/</loc><lastmod>2025-09-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/09/11/securing-schrodingers-spreadsheets-next-generation-protection/</loc><lastmod>2025-09-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/09/11/securing-schrodingers-spreadsheets-next-generation-protection/</loc><lastmod>2025-09-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/09/04/the-zero-trust-mindset-getting-everyone-onboard/</loc><lastmod>2025-09-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/09/04/zero-trust-dos-and-donts/</loc><lastmod>2025-09-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/09/03/elevating-mfa-and-modernising-iam/</loc><lastmod>2025-09-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/09/03/elevating-mfa-and-modernising-iam/</loc><lastmod>2025-09-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/09/03/harnessing-cloud-devops-techniques-to-bolster-zero-trust-security/</loc><lastmod>2025-09-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/09/03/threat-based-security-risk-management-a-zero-trust-evolution/</loc><lastmod>2025-09-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/08/14/strategic-enterprise-intelligence-mastering-vulnerability-management/</loc><lastmod>2025-08-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/08/14/tackling-threat-detection-and-response-in-saas-applications/</loc><lastmod>2025-08-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/08/14/from-visibility-to-action-designing-an-effective-threat-detection-and-response-p/</loc><lastmod>2025-08-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/08/13/cti-teams-that-win-skills-structure-and-strategy/</loc><lastmod>2025-08-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/08/13/osint-threat-intelligence-still-a-reliable-tool-amidst-the-ai-and-machine-learni/</loc><lastmod>2025-08-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/08/13/building-a-cyber-shielded-organization-through-a-proactive-incident-threat-intel/</loc><lastmod>2025-08-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/08/13/unifying-cyber-operational-resilience-building-robust-threat-response/</loc><lastmod>2025-08-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/08/01/lets-get-digital-updated-digital-identity-guidelines-are-here/</loc><lastmod>2025-08-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/07/31/reflections-from-the-first-cyber-ai-profile-workshop/</loc><lastmod>2025-07-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/07/07/nine-years-and-counting-nice-ramps-communities-keep-expanding-opportunities-in-c/</loc><lastmod>2025-07-07</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/06/12/strengthening-your-cybersecurity-through-a-strategic-security-operations-program/</loc><lastmod>2025-06-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/06/12/from-conflict-to-collaboration-building-a-secops-culture/</loc><lastmod>2025-06-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/06/12/the-impact-of-artificial-intelligence-on-the-cybersecurity-workforce/</loc><lastmod>2025-06-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/06/11/generative-ai-in-secops-automating-the-art-of-threat-intelligence/</loc><lastmod>2025-06-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/06/11/unpacking-the-ai-supply-chain-strategies-to-fortify-open-source-intelligence/</loc><lastmod>2025-06-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/06/11/invisible-security-embedding-genai-guards-into-developer-workflows/</loc><lastmod>2025-06-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/06/04/business-centric-cyber-resilience-protect-what-matters-most/</loc><lastmod>2025-06-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/06/04/post-quantum-cryptography-securing-the-future/</loc><lastmod>2025-06-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/06/04/turning-incidents-into-insights-a-product-led-approach-to-incident-response/</loc><lastmod>2025-06-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/06/04/secure-collaboration-in-the-age-of-genai-a-cisos-guide-to-risk-mitigation/</loc><lastmod>2025-06-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/06/04/security-risks-to-consider-with-ai-integration-ai-in-devops/</loc><lastmod>2025-06-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/06/03/smarter-pen-testing-with-threat-intel/</loc><lastmod>2025-06-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/06/03/smarter-pen-testing-with-threat-intel/</loc><lastmod>2025-06-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/06/03/what-are-the-top-ciso-priorities-for-2025/</loc><lastmod>2025-06-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/05/29/the-evolution-of-the-siem-seeing-and-doing-more-to-stop-attacks/</loc><lastmod>2025-05-29</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/05/29/future-proof-your-security-architecture-against-todays-persistent-threats/</loc><lastmod>2025-05-29</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/05/29/discover-the-future-of-trusted-workload-identity-to-secure-your-sensitive-applic/</loc><lastmod>2025-05-29</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/05/28/the-appsec-enabled-soc-addressing-modern-challenges-in-incident-response/</loc><lastmod>2025-05-28</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/05/28/smarter-app-security-strategies-to-enhance-todays-cyber-defense/</loc><lastmod>2025-05-28</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/05/28/the-proving-you-are-you-problem-for-organizations/</loc><lastmod>2025-05-28</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/05/28/adr-not-just-another-detection-and-response-solution/</loc><lastmod>2025-05-28</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/05/22/cybersecurity-and-ai-integrating-and-building-on-existing-nist-guidelines/</loc><lastmod>2025-05-22</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/05/13/five-years-later-evolving-iot-cybersecurity-guidelines/</loc><lastmod>2025-05-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/05/08/zero-trust-architecture-bridging-the-gap-between-mandate-and-implementation/</loc><lastmod>2025-05-08</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/05/05/small-businesses-create-big-impact-nist-celebrates-2025-national-small-business/</loc><lastmod>2025-05-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/04/17/using-man-and-machine-to-improve-threat-intelligence-efficiency/</loc><lastmod>2025-04-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/04/17/proactive-defense-leveraging-ai-for-predictive-threat-mitigation-and-response/</loc><lastmod>2025-04-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/04/17/automated-defense-ais-role-in-proactive-cyber-threat-mitigation/</loc><lastmod>2025-04-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/04/16/using-the-eu-approach-to-mitigate-ai-security-risks/</loc><lastmod>2025-04-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/04/16/what-microsoft-tay-teaches-us-about-using-ai-safely-for-cybersecurity/</loc><lastmod>2025-04-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/04/16/mitigating-ai-security-risks-in-content-generation-securing-api-based-ai-systems/</loc><lastmod>2025-04-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/04/16/security-risks-to-consider-with-ai-integration-ai-in-devops/</loc><lastmod>2025-04-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/03/13/layered-security-one-principle-zero-trust/</loc><lastmod>2025-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/03/12/securing-the-cloud-ecosystem-what-is-keeping-the-c-suite-up-at-night/</loc><lastmod>2025-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/03/12/ai-supply-chains-under-siege-how-to-secure-open-source-ai-from-emerging-threats/</loc><lastmod>2025-03-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/03/05/price-of-our-stolen-identities-on-the-dark-web/</loc><lastmod>2025-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/03/05/stay-safe-managing-employee-access-from-cradle-to-grave/</loc><lastmod>2025-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/03/05/privileged-access-a-journey-from-little-to-least/</loc><lastmod>2025-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/03/05/developments-in-privileged-access-management/</loc><lastmod>2025-03-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/03/04/mastering-identity-sprawl-centralizing-iam-for-enhanced-security/</loc><lastmod>2025-03-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/03/04/navigating-identity-security-in-the-era-of-ai/</loc><lastmod>2025-03-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/03/04/identity-verification-in-the-age-of-ai-fraud/</loc><lastmod>2025-03-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/02/26/beyond-the-horizon-use-ai-to-expand-threat-intelligence-for-proactive-security/</loc><lastmod>2025-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/02/26/exploring-visual-threat-intelligence/</loc><lastmod>2025-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/02/26/celebrating-1-year-of-csf-20/</loc><lastmod>2025-02-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/02/25/resolve-post-covid-network-security-issues-with-nist-csf-v20-and-the-cis-critica/</loc><lastmod>2025-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/02/25/attack-on-ai-systems-understanding-the-vulnerabilities-and-risks/</loc><lastmod>2025-02-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/02/06/price-of-our-stolen-identities-on-the-dark-web/</loc><lastmod>2025-02-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/02/06/stay-safe-managing-employee-access-from-cradle-to-grave/</loc><lastmod>2025-02-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/02/06/privileged-access-a-journey-from-little-to-least/</loc><lastmod>2025-02-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/02/05/mastering-identity-sprawl-centralizing-iam-for-enhanced-security/</loc><lastmod>2025-02-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/02/05/navigating-identity-security-in-the-era-of-ai/</loc><lastmod>2025-02-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/02/05/identity-verification-in-the-age-of-ai-fraud/</loc><lastmod>2025-02-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/01/27/privacy-preserving-federated-learning-future-collaboration-and-continued-researc/</loc><lastmod>2025-01-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/01/15/applying-it-grc-solutions-to-remote-and-hybrid-work-security-issues/</loc><lastmod>2025-01-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/01/15/does-ai-make-social-engineering-too-easy/</loc><lastmod>2025-01-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/01/15/determining-the-impact-of-cyberattacks/</loc><lastmod>2025-01-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/01/14/roadmap-to-an-iron-clad-ransomware-defense-system/</loc><lastmod>2025-01-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/01/14/reinforce-your-data-fortress-how-zero-trust-can-help-reduce-your-risk-of-a-ranso/</loc><lastmod>2025-01-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2025/01/14/ransomware-negotiations-everything-you-need-to-know/</loc><lastmod>2025-01-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/12/19/nists-international-cybersecurity-and-privacy-engagement-update-new-translations/</loc><lastmod>2024-12-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/12/05/data-pipeline-challenges-of-privacy-preserving-federated-learning/</loc><lastmod>2024-12-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/12/04/black-hat-2024-snippet-video-with-brett-price-lead-cybersecurity-consultant-vcis/</loc><lastmod>2024-12-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/12/04/black-hat-2024-snippet-video-with-toby-foss-senior-director-of-information-secur/</loc><lastmod>2024-12-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/12/04/black-hat-2024-snippet-video-with-matt-murphy-lead-devsecops-engineer-cyber-secu/</loc><lastmod>2024-12-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/12/04/black-hat-2024-snippet-video-with-theresa-lanowitz-chief-evangelist-levelblue/</loc><lastmod>2024-12-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/12/04/black-hat-2024-snippet-video-with-boaz-barzel-evangelist-director-of-technical-e/</loc><lastmod>2024-12-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/12/04/black-hat-2024-snippet-video-with-uzi-ailon-vp-devsecops-solutions-cyberark/</loc><lastmod>2024-12-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/12/04/black-hat-2024-snippet-video-with-joe-nicastro-field-cto-legit-security/</loc><lastmod>2024-12-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/11/21/2024-rsa-highlight-reel-studios/</loc><lastmod>2024-11-21</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/11/21/2024-rsa-highlight-reel-techtarget-editorial/</loc><lastmod>2024-11-21</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/11/21/2024-rsa-highlight-reel-enterprise-strategy-group/</loc><lastmod>2024-11-21</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/11/21/kicking-off-with-a-december-4th-workshop-nist-is-revisiting-and-revising-foundat/</loc><lastmod>2024-11-21</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/11/18/unlocking-cybersecurity-talent-the-power-of-apprenticeships/</loc><lastmod>2024-11-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/11/15/2024-rsa-snippet-video-with-rich-vibert-ceo-and-co-founder-of-metomic/</loc><lastmod>2024-11-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/11/15/2024-rsa-snippet-video-with-mike-britton-ciso-at-abnormal-security/</loc><lastmod>2024-11-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/11/15/2024-rsa-snippet-video-with-doug-merritt-ceo-of-aviatrix/</loc><lastmod>2024-11-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/11/15/2024-rsa-snippet-video-with-theresa-lanowitz-chief-evangelist-att-cybersecurity/</loc><lastmod>2024-11-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/11/15/2024-rsa-snippet-video-with-papi-menon-vp-and-chief-product-officer-outshift-by/</loc><lastmod>2024-11-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/11/15/2024-rsa-snippet-video-with-bradley-schaufenbuel-ciso-paychex-sponsored-by-norma/</loc><lastmod>2024-11-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/11/15/2024-rsa-snippet-video-with-teza-mukkavilli-ciso-chargepoint-sponsored-by-normal/</loc><lastmod>2024-11-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/11/15/2024-rsa-snippet-video-with-renee-guttmann-cxo-forum-sponsored-by-normalyze/</loc><lastmod>2024-11-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/11/15/2024-rsa-snippet-video-with-anubhav-arora-vp-security-engineering-at-cradlepoint/</loc><lastmod>2024-11-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/11/15/2024-rsa-snippet-video-with-amy-blackshaw-vp-product-marketing-at-cyberark/</loc><lastmod>2024-11-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/11/15/2024-rsa-snippet-video-with-frank-catucci-cto-head-of-security-research-at-invic/</loc><lastmod>2024-11-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/11/15/2024-rsa-snippet-video-with-tony-anscombe-chief-security-evangelist-at-eset/</loc><lastmod>2024-11-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/11/13/digital-identities-getting-to-know-the-verifiable-digital-credential-ecosystem/</loc><lastmod>2024-11-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/10/28/staff-stories-spotlight-series-cybersecurity-awareness-month-2024/</loc><lastmod>2024-10-28</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/10/23/staff-stories-spotlight-series-cybersecurity-awareness-month-2024/</loc><lastmod>2024-10-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/10/22/iot-assignment-completed-report-on-barriers-to-us-iot-adoption/</loc><lastmod>2024-10-22</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/10/17/building-a-security-first-culture-leadership-strategies-for-holistic-data-protec/</loc><lastmod>2024-10-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/10/17/to-automate-or-not-automate-guide-to-cybersecurity-best-defenses/</loc><lastmod>2024-10-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/10/17/staff-stories-spotlight-series-cybersecurity-awareness-month-2024/</loc><lastmod>2024-10-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/10/16/integrating-ai-compliance-and-the-human-factor-in-a-comprehensive-data-security/</loc><lastmod>2024-10-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/10/16/quantum-computing-the-cybersecurity-apocalypse-or-the-next-great-leap/</loc><lastmod>2024-10-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/10/16/how-secure-and-private-is-your-data/</loc><lastmod>2024-10-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/10/15/staff-stories-spotlight-series-cybersecurity-awareness-month-2024/</loc><lastmod>2024-10-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/10/09/ai-enabled-cybersecurity-is-overrated-why-low-tech-it-security-basics-still-matt/</loc><lastmod>2024-10-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/10/09/tackle-3-common-ai-challenges-to-build-effective-security-programs/</loc><lastmod>2024-10-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/10/09/the-promises-and-perils-of-using-ai-for-cybersecurity/</loc><lastmod>2024-10-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/10/09/staff-stories-spotlight-series-cybersecurity-awareness-month-2024/</loc><lastmod>2024-10-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/10/08/victories-challenges-and-unknowns-threat-landscape-2025/</loc><lastmod>2024-10-08</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/10/08/what-do-you-need-to-consider-for-your-cyber-incident-response-framework/</loc><lastmod>2024-10-08</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/10/08/scalability-challenges-in-privacy-preserving-federated-learning/</loc><lastmod>2024-10-08</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/10/08/eliminating-cybersecurity-threats-inspection-of-devsecops/</loc><lastmod>2024-10-08</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/10/01/staff-stories-spotlight-series-cybersecurity-awareness-month-2024/</loc><lastmod>2024-10-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/09/19/managing-cybersecurity-and-privacy-risks-in-the-age-of-artificial-intelligence-l/</loc><lastmod>2024-09-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/09/04/learning-sharing-and-exploring-with-nists-new-human-centered-cybersecurity-commu/</loc><lastmod>2024-09-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/08/29/zero-downtime-ensuring-reliable-service-availability/</loc><lastmod>2024-08-29</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/08/20/implementation-challenges-in-privacy-preserving-federated-learning/</loc><lastmod>2024-08-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/07/15/protecting-trained-models-in-privacy-preserving-federated-learning/</loc><lastmod>2024-07-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/07/11/improve-incident-detection-and-response-governance-with-nist-csf-v20/</loc><lastmod>2024-07-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/07/11/identifying-and-building-the-foundation-of-a-threat-program/</loc><lastmod>2024-07-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/07/11/ensuring-threat-intelligence-remains-intelligent/</loc><lastmod>2024-07-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/07/11/elevating-api-security/</loc><lastmod>2024-07-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/07/10/threat-intelligence-the-dark-side-of-threat-detection/</loc><lastmod>2024-07-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/07/10/beyond-the-horizon-use-ai-to-expand-threat-intelligence-for-proactive-security/</loc><lastmod>2024-07-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/07/10/the-processes-to-deliver-effective-threat-detection-and-response/</loc><lastmod>2024-07-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/06/27/adversarial-machine-learning-what-is-it/</loc><lastmod>2024-06-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/06/20/sae-g32-cyberphysical-systems-and-the-ev-illustrative-example/</loc><lastmod>2024-06-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/06/18/what-is-generative-ai-and-what-are-the-security-considerations/</loc><lastmod>2024-06-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/06/12/nists-international-cybersecurity-and-privacy-engagement-update-mexico-city-rsa/</loc><lastmod>2024-06-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/06/11/threat-intelligence-the-dark-side-of-threat-detection/</loc><lastmod>2024-06-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/06/11/enhancing-edr-a-holistic-ai-based-behavioral-profiling-approach/</loc><lastmod>2024-06-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/06/11/next-gen-endpoint-security-efficiency-efficacy-and-hybrid-protection/</loc><lastmod>2024-06-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/05/22/check-your-wallet-how-mobile-drivers-licenses-are-changing-online-transactions/</loc><lastmod>2024-05-22</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/05/16/an-educational-perspective-and-mitigation-strategy-for-application-security/</loc><lastmod>2024-05-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/05/16/predictive-shenanigans-the-new-wave-of-application-threats/</loc><lastmod>2024-05-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/05/16/elevating-api-security/</loc><lastmod>2024-05-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/05/16/the-blueprint-to-secure-api-design-through-effective-threat-modeling/</loc><lastmod>2024-05-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/05/15/how-do-you-know-where-to-start-your-zero-trust-journey/</loc><lastmod>2024-05-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/05/15/whats-not-included-in-zero-trust-architecture/</loc><lastmod>2024-05-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/05/14/elevating-devsecops-security-the-journey-to-zero-trust/</loc><lastmod>2024-05-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/05/09/latest-nice-framework-update-offers-improvements-for-the-cybersecurity-workforce/</loc><lastmod>2024-05-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/05/02/protecting-model-updates-in-privacy-preserving-federated-learning-part-two/</loc><lastmod>2024-05-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/05/01/take-a-tour-nist-cybersecurity-framework-20-small-business-quick-start-guide/</loc><lastmod>2024-05-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/04/22/giving-nist-digital-identity-guidelines-a-boost-supplement-for-incorporating-syn/</loc><lastmod>2024-04-22</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/04/18/using-cloud-security-posture-management-solutions-to-mitigate-misconfigurations/</loc><lastmod>2024-04-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/03/21/protecting-model-updates-in-privacy-preserving-federated-learning/</loc><lastmod>2024-03-21</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/01/17/secure-your-company-by-avoiding-these-five-cyber-insurance-pitfalls/</loc><lastmod>2024-01-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/01/17/evaluating-options-for-cyber-insurance/</loc><lastmod>2024-01-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/01/16/old-school-lessons-for-handling-ransomware-in-the-digital-age/</loc><lastmod>2024-01-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/01/16/key-steps-to-planning-recovery-from-ransomware-attacks/</loc><lastmod>2024-01-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/01/15/outsmarting-phishers-turning-employees-into-cyber-self-defenders/</loc><lastmod>2024-01-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/01/15/preventing-ransomware-attacks-in-the-cloud/</loc><lastmod>2024-01-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2024/01/15/using-a-zero-trust-architecture-to-help-prevent-ransomware/</loc><lastmod>2024-01-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/12/19/work-and-generational-diversity/</loc><lastmod>2023-12-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/12/06/data-security-incident-management-what-keeps-you-awake-at-night-part-3/</loc><lastmod>2023-12-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/27/measuring-inclusion-launch-webinar/</loc><lastmod>2023-11-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/21/improving-the-safety-security-and-trustworthiness-of-business-ai/</loc><lastmod>2023-11-21</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/16/futures-gonna-be-okai-navigating-innovation-and-security-in-the-era/</loc><lastmod>2023-11-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/06/cve-2022-48192/</loc><lastmod>2023-11-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/06/cve-2023-5719/</loc><lastmod>2023-11-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/06/cve-2023-46731/</loc><lastmod>2023-11-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/06/cve-2023-39345/</loc><lastmod>2023-11-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/06/cve-2023-46732/</loc><lastmod>2023-11-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/06/cve-2023-46254/</loc><lastmod>2023-11-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/06/cve-2023-44398/</loc><lastmod>2023-11-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/06/cve-2023-46251/</loc><lastmod>2023-11-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/06/cve-2023-5678/</loc><lastmod>2023-11-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/06/cve-2023-5964/</loc><lastmod>2023-11-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/06/cve-2023-5825/</loc><lastmod>2023-11-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/06/cve-2023-45074/</loc><lastmod>2023-11-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/06/cve-2023-28748/</loc><lastmod>2023-11-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/06/cve-2022-47432/</loc><lastmod>2023-11-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/06/cve-2022-45373/</loc><lastmod>2023-11-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/06/cve-2022-47420/</loc><lastmod>2023-11-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/06/cve-2022-47430/</loc><lastmod>2023-11-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/06/cve-2022-47428/</loc><lastmod>2023-11-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/06/cve-2021-4430/</loc><lastmod>2023-11-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/06/cve-2022-46849/</loc><lastmod>2023-11-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/06/cve-2023-42669/</loc><lastmod>2023-11-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/06/cve-2023-32825/</loc><lastmod>2023-11-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/06/cve-2023-32818/</loc><lastmod>2023-11-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/06/cve-2023-32832/</loc><lastmod>2023-11-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/06/cve-2018-25093/</loc><lastmod>2023-11-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/05/cve-2018-25092/</loc><lastmod>2023-11-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/05/cve-2017-20187/</loc><lastmod>2023-11-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/03/cve-2022-43555/</loc><lastmod>2023-11-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/03/cve-2022-3172/</loc><lastmod>2023-11-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/03/cve-2023-23368/</loc><lastmod>2023-11-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/03/cve-2023-23369/</loc><lastmod>2023-11-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/03/cve-2023-39299/</loc><lastmod>2023-11-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/03/cve-2022-46818/</loc><lastmod>2023-11-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/03/cve-2023-5088/</loc><lastmod>2023-11-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/03/cve-2023-5945/</loc><lastmod>2023-11-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/03/cve-2022-47426/</loc><lastmod>2023-11-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/03/cve-2022-45805/</loc><lastmod>2023-11-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/03/cve-2022-46808/</loc><lastmod>2023-11-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/03/cve-2022-46859/</loc><lastmod>2023-11-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/03/cve-2022-47445/</loc><lastmod>2023-11-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/03/cve-2023-3961/</loc><lastmod>2023-11-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/03/cve-2023-34383/</loc><lastmod>2023-11-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/03/cve-2022-47588/</loc><lastmod>2023-11-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/03/cve-2023-3277/</loc><lastmod>2023-11-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/03/cve-2023-4091/</loc><lastmod>2023-11-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/03/cve-2023-42670/</loc><lastmod>2023-11-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/03/cve-2023-1194/</loc><lastmod>2023-11-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/03/cve-2023-41348/</loc><lastmod>2023-11-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/03/cve-2020-28407/</loc><lastmod>2023-11-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/03/cve-2017-7252/</loc><lastmod>2023-11-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/02/nist-csf-v20-a-potent-tool-against-cybersecurity-risks-in-2024-and-beyond/</loc><lastmod>2023-11-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/02/developing-strategy-that-enables-zero-day-exploitation/</loc><lastmod>2023-11-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/02/cve-2023-31019/</loc><lastmod>2023-11-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/02/cve-2022-4900/</loc><lastmod>2023-11-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/02/threat-forecast-vs-operational-risk-what-keeps-you-awake-at-night-part-2/</loc><lastmod>2023-11-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/02/cve-2023-46725/</loc><lastmod>2023-11-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/02/cve-2023-26452/</loc><lastmod>2023-11-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/02/cve-2023-5917/</loc><lastmod>2023-11-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/02/cve-2023-5606/</loc><lastmod>2023-11-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/02/cve-2023-46327/</loc><lastmod>2023-11-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/02/cve-2023-5910/</loc><lastmod>2023-11-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/01/cve-2023-44954/</loc><lastmod>2023-11-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/01/cve-2023-46428-hadsky/</loc><lastmod>2023-11-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/01/cve-2023-46724/</loc><lastmod>2023-11-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/01/cve-2023-20070/</loc><lastmod>2023-11-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/01/cve-2023-20083/</loc><lastmod>2023-11-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/01/cve-2023-20264/</loc><lastmod>2023-11-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/01/cve-2023-20031/</loc><lastmod>2023-11-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/01/cve-2023-20063/</loc><lastmod>2023-11-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/01/cve-2023-20155/</loc><lastmod>2023-11-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/01/cve-2023-20177/</loc><lastmod>2023-11-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/01/cve-2023-20041/</loc><lastmod>2023-11-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/01/cve-2023-20005/</loc><lastmod>2023-11-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/01/the-ai-elephant-in-every-room/</loc><lastmod>2023-11-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/01/cve-2023-3972/</loc><lastmod>2023-11-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/01/cve-2023-33226/</loc><lastmod>2023-11-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/01/will-2024-bring-us-a-year-of-ai-and-ml-threats/</loc><lastmod>2023-11-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/11/01/cve-2023-1717/</loc><lastmod>2023-11-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/09/27/cybersecurity-supply-chain-governance/</loc><lastmod>2023-09-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/09/27/the-nuances-of-physical-security-and-supply-chain-management/</loc><lastmod>2023-09-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/09/26/innovating-scrm-and-resilience-harnessing-the-potential-of-digital-technologies/</loc><lastmod>2023-09-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/09/14/cybersecurity-supply-chain-governance/</loc><lastmod>2023-09-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/09/14/the-nuances-of-physical-security-and-supply-chain-management/</loc><lastmod>2023-09-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/09/13/innovating-scrm-and-resilience-harnessing-the-potential-of-digital-technologies/</loc><lastmod>2023-09-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/08/16/disaster-recovery-plans-what-keeps-you-awake-at-night/</loc><lastmod>2023-08-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/08/15/risk-management-for-ai-systems/</loc><lastmod>2023-08-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/07/27/how-to-break-into-the-international-cybersecurity-market/</loc><lastmod>2023-07-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/07/27/hunting-for-the-unknownswhere-to-start/</loc><lastmod>2023-07-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/07/26/developing-the-requirements-of-a-security-analytics-solution/</loc><lastmod>2023-07-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/07/26/creating-and-implementing-incident-response-plans/</loc><lastmod>2023-07-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/07/26/practical-application-of-aiml-in-security-monitoring-and-analytics/</loc><lastmod>2023-07-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/07/25/holistic-ransomware-planning-is-your-organization-one-click-away-from-chaos/</loc><lastmod>2023-07-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/06/08/optimizing-cloud-application-security-through-relevant-iso-standards/</loc><lastmod>2023-06-08</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/06/08/how-to-break-into-the-international-cybersecurity-market/</loc><lastmod>2023-06-08</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/06/08/top-10-azure-security-tips-from-10-years-of-securing-azure-applications/</loc><lastmod>2023-06-08</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/06/07/considerations-in-application-tooling/</loc><lastmod>2023-06-07</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/06/07/explore-application-security-tools-and-testing-to-strengthen-software-defenses/</loc><lastmod>2023-06-07</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/06/06/ensure-security-with-devsecops/</loc><lastmod>2023-06-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/06/06/a-cxos-guide-to-application-security-in-the-age-of-digital-transformation/</loc><lastmod>2023-06-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/05/11/achieve-compliance-and-prepare-for-audits-using-storage-security-standards/</loc><lastmod>2023-05-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/05/09/why-storage-management-standards-matter-in-complex-virtualized-environments/</loc><lastmod>2023-05-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/04/25/101-from-enterprise-strategy-group-what-is-defense-surface-management/</loc><lastmod>2023-04-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/04/05/optimize-the-implementation-of-pci-dss-v40-on-endpoint-security/</loc><lastmod>2023-04-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/04/05/beyond-antivirus-endpoint-security-strategies-to-combat-sophisticated-threats/</loc><lastmod>2023-04-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/04/04/implement-best-practice-iam-and-zero-trust/</loc><lastmod>2023-04-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/04/04/creating-threat-analytics-on-the-endpoint/</loc><lastmod>2023-04-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/04/04/protect-your-endpoints-with-evolutionary-xdr/</loc><lastmod>2023-04-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/02/09/moving-target-defense-for-space-systems/</loc><lastmod>2023-02-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/01/31/improving-electric-grid-cybersecurity-with-cyber-physical-analysis/</loc><lastmod>2023-01-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/01/19/tips-to-make-your-company-cyber-insurable/</loc><lastmod>2023-01-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/01/19/cyber-insurance-as-a-part-of-a-cyber-resilience-program/</loc><lastmod>2023-01-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/01/18/three-phase-ransomware-protection-strategy/</loc><lastmod>2023-01-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/01/18/recovery-from-a-ransomware-attack-how-to-prepare-and-plan-to-minimize-risk/</loc><lastmod>2023-01-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/01/17/how-i-learned-to-halt-ransomware-and-stop-worrying/</loc><lastmod>2023-01-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/01/17/a-career-in-cyber-security-my-unconventional-path/</loc><lastmod>2023-01-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/01/17/monitor-your-environment-247-with-a-mdr-solution/</loc><lastmod>2023-01-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2023/01/17/thwarting-ransomware-with-zero-trust/</loc><lastmod>2023-01-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/12/13/what-does-or-does-not-protect-you/</loc><lastmod>2022-12-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/12/08/top-5-strategies-to-reduce-the-risk-of-a-breach/</loc><lastmod>2022-12-08</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/12/08/breach-detection-in-the-cloud/</loc><lastmod>2022-12-08</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/12/08/breach-prevention-in-cloud-computing/</loc><lastmod>2022-12-08</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/12/08/reach-it-dont-breach-it/</loc><lastmod>2022-12-08</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/12/07/top-threats-to-the-cloud-for-the-business/</loc><lastmod>2022-12-07</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/12/07/application-induced-cloud-security-issues-and-how-to-overcome-them/</loc><lastmod>2022-12-07</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/12/06/the-building-blocks-of-a-cloud-security-strategy/</loc><lastmod>2022-12-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/12/06/go-phish/</loc><lastmod>2022-12-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/12/06/secure-your-cloud-footprint-in-2023/</loc><lastmod>2022-12-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/12/06/enable-your-cloud-security-strategy-by-building-a-pagoda/</loc><lastmod>2022-12-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/12/05/get-your-cloud-security-strategy-ready-for-2023/</loc><lastmod>2022-12-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/11/29/exploring-cybersecurity-at-accenture/</loc><lastmod>2022-11-29</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/11/15/the-cybersecurity-skills-shortage-why-how-and-what-to-do-about-it/</loc><lastmod>2022-11-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/11/08/privacy-challenges-and-the-future-of-privacy/</loc><lastmod>2022-11-08</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/11/04/how-to-build-a-successful-cybersecurity-team/</loc><lastmod>2022-11-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/11/04/designing-a-responsive-playbook/</loc><lastmod>2022-11-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/11/04/how-to-stay-safe-while-working-virtually/</loc><lastmod>2022-11-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/11/04/the-email-menace-understanding-and-responding-to-the-1-threat-to-your-business/</loc><lastmod>2022-11-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/11/03/its-not-the-silicon-its-the-carbon-those-darn-humans/</loc><lastmod>2022-11-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/11/03/a-pragmatic-approach-to-automating-your-defenses/</loc><lastmod>2022-11-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/11/03/ciso-security-tips-to-manage-the-end-of-covid-19/</loc><lastmod>2022-11-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/11/03/8-things-that-keep-cisos-up-at-night-you-wont-believe-number-4/</loc><lastmod>2022-11-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/11/02/staying-ahead-of-the-breach/</loc><lastmod>2022-11-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/11/02/public-sector-entities-vulnerable-and-less-prepared-cyber-targets/</loc><lastmod>2022-11-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/11/02/its-not-cyber-crime-its-cyber-warfare/</loc><lastmod>2022-11-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/11/02/geopolitical-instability-and-its-impact-on-cybersecurity/</loc><lastmod>2022-11-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/11/02/master-security-kryptonite-how-to-proactively-pinpoint-and-mitigate-user-risk/</loc><lastmod>2022-11-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/11/01/vade-recording/</loc><lastmod>2022-11-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/11/01/top-ciso-concerns-for-2023-and-how-to-prepare-for-them/</loc><lastmod>2022-11-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/11/01/7-dimensions-of-cybersecurity/</loc><lastmod>2022-11-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/11/01/entering-a-risk-free-cyber-zone/</loc><lastmod>2022-11-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/10/31/ransomware-preparedness-cyber-resiliency-for-2023/</loc><lastmod>2022-10-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/10/31/improving-security-posture-for-the-modern-enterprise/</loc><lastmod>2022-10-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/10/26/understanding-cyber-threats/</loc><lastmod>2022-10-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/10/26/pulse-check-on-threat-detection-and-response-in-2022/</loc><lastmod>2022-10-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/10/24/how-to-secure-your-mobile-device/</loc><lastmod>2022-10-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/10/18/sorting-out-the-alphabet-soup/</loc><lastmod>2022-10-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/10/13/a-whole-lotta-bs-behavioral-science-about-security/</loc><lastmod>2022-10-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/10/13/securing-open-source-hidden-in-plain-sight/</loc><lastmod>2022-10-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/10/13/when-the-answer-really-is-no-how-to-say-it-diplomatically/</loc><lastmod>2022-10-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/10/13/diversity-of-cybersecurity-mindsets/</loc><lastmod>2022-10-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/10/12/the-tone-in-the-middle-the-biggest-hindrance-to-a-cybersecurity-culture/</loc><lastmod>2022-10-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/10/12/building-a-stronger-security-partner-team/</loc><lastmod>2022-10-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/10/12/optimizing-remote-employee-collaboration/</loc><lastmod>2022-10-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/10/12/key-concerns-of-cyber-leaders/</loc><lastmod>2022-10-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/10/11/the-it-compliance-role-in-safeguarding-the-enterprise-from-post-covid-symptoms/</loc><lastmod>2022-10-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/10/11/building-a-cybersecurity-culture-its-time-to-think-differently-about-training/</loc><lastmod>2022-10-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/10/11/understanding-and-managing-cyber-and-privacy-risk-in-an-increasingly-risky-world/</loc><lastmod>2022-10-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/10/04/community-college-pathways-to-cybersecurity-success/</loc><lastmod>2022-10-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/09/29/esg-keynote-video-2023-threatscape-summit/</loc><lastmod>2022-09-29</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/09/26/pulse-check-on-threat-detection-and-response-in-2022/</loc><lastmod>2022-09-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/09/22/recording-zero-trust-security-strategies-to-safeguard-the-enterprise/</loc><lastmod>2022-09-22</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/09/15/the-benefits-and-threats-of-the-multi-cloud/</loc><lastmod>2022-09-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/09/15/rethinking-network-centric-observability-for-cloud-security/</loc><lastmod>2022-09-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/09/15/top-5-leadership-strategies-for-multi-cloud-security/</loc><lastmod>2022-09-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/09/15/top-public-cloud-security-fails-and-how-to-avoid-them/</loc><lastmod>2022-09-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/09/15/the-importance-of-cloud-security-education-and-awareness/</loc><lastmod>2022-09-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/09/14/cloud-application-security-best-practices-and-vulnerabilities/</loc><lastmod>2022-09-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/09/14/implementing-emerging-identity-standards-for-better-application-security/</loc><lastmod>2022-09-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/09/14/better-security-with-iac/</loc><lastmod>2022-09-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/09/14/wicys-internship-program-kickoff-webinar/</loc><lastmod>2022-09-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/09/14/define-application-security-accurately-to-generate-business-success/</loc><lastmod>2022-09-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/09/13/top-ten-reasons-to-launch-a-wicys-student-chapter/</loc><lastmod>2022-09-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/09/13/security-posture-management-for-multi-cloud-and-hybrid-infrastructures/</loc><lastmod>2022-09-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/09/13/build-a-multi-cloud-strategy-that-supports-governance-and-compliance/</loc><lastmod>2022-09-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/09/13/security-challenges-and-mitigation-techniques-for-the-multi-cloud/</loc><lastmod>2022-09-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/09/12/supercharge-your-security-for-multi-cloud/</loc><lastmod>2022-09-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/09/08/innovation-driven-by-a-culture-of-dei/</loc><lastmod>2022-09-08</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/09/07/coming-soon-ciso-observability-in-the-boardroom/</loc><lastmod>2022-09-07</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/09/07/a-discussion-on-mitigating-risk-from-insider-threats/</loc><lastmod>2022-09-07</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/09/07/a-proactive-plan-for-addressing-cyber-risk/</loc><lastmod>2022-09-07</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/08/30/exclusive-look-into-linkedin-infosec/</loc><lastmod>2022-08-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/08/19/defeating-ransomware-security-controls-that-may-surprise-you/</loc><lastmod>2022-08-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/08/19/fireside-chat-with-invicti-and-clarify360-on-application-security/</loc><lastmod>2022-08-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/08/19/lifes-a-breach-understand-threat-intelligence-cyber-maturity-and-resiliency/</loc><lastmod>2022-08-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/08/19/recording-of-fireside-chat-with-invicti-and-clarify360/</loc><lastmod>2022-08-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/08/19/the-post-pandemic-threat-landscape/</loc><lastmod>2022-08-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/08/18/why-cant-we-make-secure-software/</loc><lastmod>2022-08-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/08/18/update-your-application-security-strategy/</loc><lastmod>2022-08-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/08/17/social-engineering-and-security-awareness/</loc><lastmod>2022-08-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/08/17/building-a-robust-enterprise-security-program/</loc><lastmod>2022-08-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/08/17/your-security-metrics-are-lying-and-what-to-do-about-it/</loc><lastmod>2022-08-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/08/17/a-road-less-traveled-learning-the-value-of-sme-enterprise-security-management/</loc><lastmod>2022-08-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/08/17/john-bambenek-presentation/</loc><lastmod>2022-08-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/08/16/retraining-the-brain/</loc><lastmod>2022-08-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/08/16/its-time-to-modernize-threat-detection/</loc><lastmod>2022-08-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/08/16/understand-threat-detection-and-response-solutions-and-services/</loc><lastmod>2022-08-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/08/15/outwit-attackers-with-a-proactive-cybersecurity-plan/</loc><lastmod>2022-08-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/08/12/video-your-security-metrics-are-lying-and-what-to-do-about-it/</loc><lastmod>2022-08-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/08/11/speed-matters-strategies-to-accelerate-security-velocity/</loc><lastmod>2022-08-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/08/11/modern-applications-require-modern-application-security/</loc><lastmod>2022-08-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/08/11/clean-code-software-done-right/</loc><lastmod>2022-08-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/08/10/navigating-a-new-era-of-email-driven-attacks/</loc><lastmod>2022-08-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/08/10/implementing-an-attack-surface-management-program/</loc><lastmod>2022-08-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/08/05/video-understand-threat-detection-and-response-solutions-and-services/</loc><lastmod>2022-08-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/07/27/enhancing-your-enterprise-network-security-strategy/</loc><lastmod>2022-07-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/07/21/strategic-approach-to-managing-the-insider-threat/</loc><lastmod>2022-07-21</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/07/21/the-cyber-threat-landscape-get-ready-for-2023/</loc><lastmod>2022-07-21</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/07/20/re-calibrate-your-ciso-strategy/</loc><lastmod>2022-07-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/07/20/implementing-a-multi-layered-security-program-to-protect-defend-your-business/</loc><lastmod>2022-07-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/07/20/a-partnership-initiative-of-industry-and-academia/</loc><lastmod>2022-07-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/07/19/threat-detection-and-mitigation-strategies-for-small-businesses/</loc><lastmod>2022-07-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/07/19/detecting-mitre-attcks-with-aws/</loc><lastmod>2022-07-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/07/19/the-endpoint-security-alphabet-stew-must-include-vm-and-pm/</loc><lastmod>2022-07-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/07/19/unpacking-endpoint-detection-and-response/</loc><lastmod>2022-07-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/07/19/cutting-through-the-fog-of-more-use-mdr-or-xdr-to-find-real-threats/</loc><lastmod>2022-07-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/07/18/video-the-endpoint-security-alphabet-stew-must-include-vm-and-pm/</loc><lastmod>2022-07-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/07/18/adapt-your-endpoint-security-strategy/</loc><lastmod>2022-07-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/07/18/video-cutting-through-the-fog-of-more-use-mdr-or-xdr-to-find-real-threats/</loc><lastmod>2022-07-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/07/14/video-with-dave-gruber-esg-adapt-your-endpoint-security-strategy/</loc><lastmod>2022-07-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/07/12/video-strategic-approach-to-managing-the-insider-threat/</loc><lastmod>2022-07-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/06/30/cybersecurity-careers-in-healthcare/</loc><lastmod>2022-06-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/06/29/wicys-fortinet-nse4-certification-summer-camp/</loc><lastmod>2022-06-29</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/06/22/securing-the-cloud-in-2022-and-beyond/</loc><lastmod>2022-06-22</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/06/22/building-your-cloud-security-strategy-visibility-is-key/</loc><lastmod>2022-06-22</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/06/21/moving-beyond-traditional-app-security-tools/</loc><lastmod>2022-06-21</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/06/21/how-to-not-sabotage-your-sase-deployment/</loc><lastmod>2022-06-21</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/06/21/building-your-threat-detection-and-response-strategy/</loc><lastmod>2022-06-21</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/06/21/how-to-use-cyber-threat-intelligence-to-eliminate-blind-spots/</loc><lastmod>2022-06-21</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/06/16/how-to-get-into-cybersecurity-the-non-technical-way/</loc><lastmod>2022-06-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/06/16/benefits-of-sso-and-automation-in-a-cloud-native-world/</loc><lastmod>2022-06-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/06/15/how-princeton-u-addresses-risk-and-compliance-through-proactive-measures/</loc><lastmod>2022-06-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/06/15/pragmatic-risk-based-cyber-security/</loc><lastmod>2022-06-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/06/14/identity-as-the-foundation-for-access/</loc><lastmod>2022-06-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/06/14/mis-configuration-in-the-cloud/</loc><lastmod>2022-06-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/06/14/identity-management-is-essential-to-cloud-security/</loc><lastmod>2022-06-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/06/14/the-rise-of-ssi-and-its-global-adoption/</loc><lastmod>2022-06-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/06/13/video-the-rise-of-ssi-and-its-global-adoption/</loc><lastmod>2022-06-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/06/13/build-an-identity-first-security-strategy-thats-ready-for-prime-time/</loc><lastmod>2022-06-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/06/13/securing-the-identity-perimeter-with-defense-in-depth/</loc><lastmod>2022-06-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/06/09/turn-your-security-challenges-into-opportunities/</loc><lastmod>2022-06-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/06/09/how-to-build-a-strong-data-security-strategy-panel-discussion/</loc><lastmod>2022-06-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/06/08/end-user-protection-strategies-for-2022-and-beyond/</loc><lastmod>2022-06-08</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/06/08/understanding-a-risk-based-approach-to-cybersecurity/</loc><lastmod>2022-06-08</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/06/08/build-a-network-security-strategy-that-works-for-you-not-cyberattackers/</loc><lastmod>2022-06-08</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/06/08/securing-the-cloud-native-enterprise/</loc><lastmod>2022-06-08</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/06/08/navigating-privileged-access-management-zero-trust-and-mfa/</loc><lastmod>2022-06-08</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/06/07/cybersecurity-operations-for-todays-threat-landscape/</loc><lastmod>2022-06-07</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/06/07/your-approach-to-security-operations-must-evolve-panel-discussion/</loc><lastmod>2022-06-07</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/05/31/enterprise-security-the-batman-effect/</loc><lastmod>2022-05-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/05/19/protecting-organization-data-against-cyber-attacks-threats-and-data-breaches/</loc><lastmod>2022-05-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/05/19/dont-become-the-next-cautionary-tale-top-breach-prevention-strategies/</loc><lastmod>2022-05-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/05/19/planning-your-application-ecosystem-landscape-to-withstand-multi-layered-attack/</loc><lastmod>2022-05-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/05/19/the-art-of-breach-detection/</loc><lastmod>2022-05-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/05/18/the-next-gen-soc-optimizing-to-make-the-most-of-limited-resources/</loc><lastmod>2022-05-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/05/18/how-to-keep-up-with-the-cyber-threat-landscape/</loc><lastmod>2022-05-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/05/18/use-bad-guy-trends-tactics-and-techniques-against-them-for-effective-strategy/</loc><lastmod>2022-05-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/05/18/decoding-cui-a-highly-valued-data-type-at-risk/</loc><lastmod>2022-05-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/05/17/faster-breach-detection/</loc><lastmod>2022-05-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/05/17/using-ai-in-cyber-security-boon-or-bust/</loc><lastmod>2022-05-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/05/17/trends-in-cyber-threats-and-top-countermeasures/</loc><lastmod>2022-05-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/05/16/threat-prevention-anchored-by-strong-security-hygiene-and-posture-management/</loc><lastmod>2022-05-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/05/12/mobilize-community-college-cyber-fasttrack-pilot-program/</loc><lastmod>2022-05-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/05/10/if-it-moves-log-it/</loc><lastmod>2022-05-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/05/06/tech-news-bytes/</loc><lastmod>2022-05-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/05/02/responding-to-mega-cyber-incidents/</loc><lastmod>2022-05-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/04/28/what-cyber-bullying-initiatives-can-teach-companies-about-protecting-employees/</loc><lastmod>2022-04-28</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/04/28/ransomware-trends-in-2022/</loc><lastmod>2022-04-28</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/04/27/new-trends-in-cyber-incident-response-and-forensics/</loc><lastmod>2022-04-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/04/27/container-and-kubernetes-security-best-practices-forensics-incident/</loc><lastmod>2022-04-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/04/27/the-top-cyberattacks-to-watch-for-in-2022/</loc><lastmod>2022-04-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/04/27/how-new-technology-increases-chance-of-breach-and-avoiding-detection/</loc><lastmod>2022-04-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/04/27/my-team-didnt-fail-the-vendor-did/</loc><lastmod>2022-04-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/04/26/the-state-of-endpoint-security-in-todays-workforce/</loc><lastmod>2022-04-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/04/26/secure-browser-or-browser-isolation-101/</loc><lastmod>2022-04-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/04/26/introduction-to-just-in-time-access-with-ssh-and-database-credentials/</loc><lastmod>2022-04-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/04/26/the-zero-trust-framework-applies-to-endpoints-too/</loc><lastmod>2022-04-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/04/25/securing-a-world-in-motion-from-any-location-any-device-or-any-cloud/</loc><lastmod>2022-04-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/04/21/ciso-strategies-for-the-evolving-role/</loc><lastmod>2022-04-21</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/04/19/application-and-cloud-security-overview/</loc><lastmod>2022-04-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/04/07/master-the-3-levels-of-risk-decision-making-impacting-your-security-team/</loc><lastmod>2022-04-07</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/04/07/multi-cloud-security-neednt-be-multi-perplexity/</loc><lastmod>2022-04-07</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/04/07/authentication-password-beyond/</loc><lastmod>2022-04-07</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/04/07/security-strategies-a-pragmatic-approach-for-vulnerable-world/</loc><lastmod>2022-04-07</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/04/06/protecting-critical-assets-against-ransomware-attacks/</loc><lastmod>2022-04-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/03/30/cyber-defense-challenge-made-possible-by-target/</loc><lastmod>2022-03-30</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/03/29/curiosity-didnt-kill-the-cat-cultivating-a-culture-of-performance/</loc><lastmod>2022-03-29</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/03/18/multi-cloud-security-neednt-be-multi-perplexity/</loc><lastmod>2022-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/03/18/what-to-expect-future-trends-in-identity-and-access-management/</loc><lastmod>2022-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/03/17/zero-trust-security-automation-supercharging-your-dilithium-crystals/</loc><lastmod>2022-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/03/17/detect-cloud-threats-via-monitoring/</loc><lastmod>2022-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/03/16/best-practices-for-cloud-monitoring-and-breach-prevention/</loc><lastmod>2022-03-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/03/15/siem-threat-detection-and-response-for-your-multi-cloud-world/</loc><lastmod>2022-03-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/03/14/scaling-security-to-manage-cloud-native-risk/</loc><lastmod>2022-03-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/03/03/how-to-accelerate-your-career-in-security-data-science/</loc><lastmod>2022-03-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/02/24/built-in-not-bolted-on-efficiency-gain-with-securonix-soar/</loc><lastmod>2022-02-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/02/22/plan-prepare-predict-implementing-breach-prevention-strategies-from-the-start/</loc><lastmod>2022-02-22</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/02/22/wicys-cyber-fasttrack-cohort/</loc><lastmod>2022-02-22</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/02/22/tips-for-building-an-effective-and-proactive-data-loss-prevention-strategy/</loc><lastmod>2022-02-22</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/02/22/data-breaches-latest-threats-safeguards/</loc><lastmod>2022-02-22</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/02/15/future-proofing-against-bias-in-tech/</loc><lastmod>2022-02-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/02/03/ransomware-unlocked/</loc><lastmod>2022-02-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/01/27/inclusive-cybersecurity-mentoring-and-career-assessment/</loc><lastmod>2022-01-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/01/26/moving-beyond-uba-for-better-threat-detection/</loc><lastmod>2022-01-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/01/26/automating-cybersecurity-risk-management-and-compliance/</loc><lastmod>2022-01-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/01/26/how-to-prepare-yourself-for-making-a-career-transition-into-cybersecurity/</loc><lastmod>2022-01-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/01/26/panel-enterprise-security-landscape-2022/</loc><lastmod>2022-01-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/01/26/the-2022-cyber-security-landscape/</loc><lastmod>2022-01-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2022/01/25/the-cybersecurity-skills-gap-barriers-to-entry/</loc><lastmod>2022-01-25</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/12/17/panel-managing-compliance-in-a-multi-cloud-world/</loc><lastmod>2021-12-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/12/17/how-to-secure-your-ai-environments/</loc><lastmod>2021-12-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/12/16/the-it-factor-what-you-need-besides-technical-skills-to-succeed/</loc><lastmod>2021-12-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/12/16/apis-the-universe-and-everything/</loc><lastmod>2021-12-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/12/15/rain-hail-or-insider-threat-a-risk-based-approach-to-cloud-threats/</loc><lastmod>2021-12-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/12/15/how-to-stop-more-phishing-emails-in-microsoft-365/</loc><lastmod>2021-12-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/12/07/hunting-for-a-career-in-cybersecurity-lessons-from-the-microsoft-team/</loc><lastmod>2021-12-07</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/11/18/cybersecurity-an-it-challenge-or-a-boardroom-priority/</loc><lastmod>2021-11-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/11/11/threatscape-2022-cyber-attack-prevention/</loc><lastmod>2021-11-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/11/10/apts-threat-safeguards/</loc><lastmod>2021-11-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/11/09/why-you-cant-prevent-the-next-breach-without-the-right-data/</loc><lastmod>2021-11-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/11/09/panel-preparing-for-the-2022-threatscape/</loc><lastmod>2021-11-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/11/09/rethink-risk-so-you-can-stay-ahead-of-cyber-breaches-in-2021-beyond/</loc><lastmod>2021-11-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/11/08/panel-threat-horizon-2022/</loc><lastmod>2021-11-08</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/11/03/using-the-cyber-table-top-ctt-process-to-perform-a-cyber-risk-assessment/</loc><lastmod>2021-11-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/10/28/a-trailblazers-path-to-a-career-in-cybersecurity/</loc><lastmod>2021-10-28</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/10/21/blaze-your-trail-discover-the-many-paths-to-a-career-in-cybersecurity/</loc><lastmod>2021-10-21</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/10/21/flexible-security-components-for-sase/</loc><lastmod>2021-10-21</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/10/21/improving-the-remote-worker-experience-while-balancing-security/</loc><lastmod>2021-10-21</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/10/20/building-a-cloud-architecture-for-the-hybrid-workforce/</loc><lastmod>2021-10-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/10/20/moving-beyond-all-or-nothing-security/</loc><lastmod>2021-10-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/10/20/passwordless-future-why-passwords-are-still-around-when-nobody-likes-them/</loc><lastmod>2021-10-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/10/20/end-user-security-awareness-culture-change-in-hybrid-enterprises/</loc><lastmod>2021-10-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/10/20/hacking-and-hardening-without-perimeters/</loc><lastmod>2021-10-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/10/20/post-pandemic-pain-points-for-professional-protectors/</loc><lastmod>2021-10-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/10/20/what-your-board-and-c-suite-needs-to-secure-the-post-pandemic-workforce/</loc><lastmod>2021-10-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/10/19/merge-security-and-networking-or-close-your-business/</loc><lastmod>2021-10-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/10/19/cybersecurity-leadership-influence-without-authority/</loc><lastmod>2021-10-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/10/19/sase-101/</loc><lastmod>2021-10-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/10/19/remote-network-access-for-the-hybrid-workforce/</loc><lastmod>2021-10-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/10/18/ensuring-a-technology-relevant-workforce/</loc><lastmod>2021-10-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/10/14/securing-business-networks-in-the-new-remote-reality/</loc><lastmod>2021-10-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/10/14/security-on-a-shoestring/</loc><lastmod>2021-10-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/10/12/2021s-top-10-privacy-tips-to-protect-your-privacy/</loc><lastmod>2021-10-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/10/12/cloud-security-architecture/</loc><lastmod>2021-10-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/10/12/human-centred-security-effectively-managing-behaviour/</loc><lastmod>2021-10-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/10/12/successful-techniques-for-cybersecurity-awareness/</loc><lastmod>2021-10-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/10/12/cyber-attackers-hidden-in-plain-sight/</loc><lastmod>2021-10-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/10/11/panel-discussion-securing-the-endpoint/</loc><lastmod>2021-10-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/09/16/5g-iot-security/</loc><lastmod>2021-09-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/09/16/to-pay-or-not-to-pay-ransom-that-is-the-question/</loc><lastmod>2021-09-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/09/16/how-do-you-monitor-your-cloud-controls-in-a-multi-cloud-environment/</loc><lastmod>2021-09-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/09/14/using-ai-to-thwart-cloud-ransomware/</loc><lastmod>2021-09-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/09/14/no-silver-bullet-essence-and-accident-in-cyber-resiliency-engineering/</loc><lastmod>2021-09-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/09/14/securing-your-organisations-cloud-the-right-way/</loc><lastmod>2021-09-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/09/13/top-10-cloud-security-challenges-of-2021/</loc><lastmod>2021-09-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/09/13/innovations-in-new-threats-on-the-cloud/</loc><lastmod>2021-09-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/09/07/securing-mission-critical-operations-with-emerging-transport-technologies/</loc><lastmod>2021-09-07</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/09/07/threat-horizon-emerging-cyber-risks-for-apac/</loc><lastmod>2021-09-07</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/08/24/5g-and-cyber-threats/</loc><lastmod>2021-08-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/08/19/advanced-threat-prevention-defending-against-sophisticated-threat-actors/</loc><lastmod>2021-08-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/08/19/stay-ahead-of-the-game-automate-your-threat-hunting-workflows/</loc><lastmod>2021-08-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/08/19/quantum-vs-quantum/</loc><lastmod>2021-08-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/08/18/application-security-vulnerability-a-risk-based-approach/</loc><lastmod>2021-08-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/08/18/application-security-2021/</loc><lastmod>2021-08-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/08/18/how-to-do-application-security-right/</loc><lastmod>2021-08-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/08/17/5-steps-to-your-sase-journey-security-connectivity-to-any-app-from-anywhere/</loc><lastmod>2021-08-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/08/17/exploring-cyber-threats-breach-prevention-2021/</loc><lastmod>2021-08-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/08/16/staying-ahead-of-the-breach-in-2021/</loc><lastmod>2021-08-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/08/16/geopolitical-cyberwarfare-hacktivism-as-a-trend/</loc><lastmod>2021-08-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/08/04/develop-cyber-genius-with-the-cyber-aptitude-and-talent-assessment/</loc><lastmod>2021-08-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/07/15/protecting-critical-web-apis-evolution-of-attack-vectors-defense-strategies/</loc><lastmod>2021-07-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/07/14/secure-win10-desktops-apps-in-the-cloud-while-defending-against-ransomware/</loc><lastmod>2021-07-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/07/14/how-moving-to-the-cloud-changed-security-strategy-forever/</loc><lastmod>2021-07-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/07/14/cyber-authors-ep5-big-breaches-cybersecurity-lessons-for-everyone/</loc><lastmod>2021-07-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/07/14/the-dual-mission-of-the-ciso-in-2021/</loc><lastmod>2021-07-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/07/14/managing-multi-cloud-security-in-2021/</loc><lastmod>2021-07-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/07/13/stay-ahead-of-the-game-automate-your-threat-hunting-workflows/</loc><lastmod>2021-07-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/07/13/remote-and-hybrid-workplace-endpoint-security/</loc><lastmod>2021-07-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/07/13/stay-ahead-of-the-game-automate-your-threat-hunting-workflows/</loc><lastmod>2021-07-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/07/12/2021-the-ultimate-reality-check-for-cybersecurity/</loc><lastmod>2021-07-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/07/12/walking-the-tightrope-balancing-usability-with-security/</loc><lastmod>2021-07-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/06/23/federated-learning-and-preserving-data-privacy/</loc><lastmod>2021-06-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/06/17/cloud-security-trends/</loc><lastmod>2021-06-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/06/17/a-top-down-view-of-cloud-risk/</loc><lastmod>2021-06-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/06/17/managing-cloud-risk-and-security-in-2021/</loc><lastmod>2021-06-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/06/17/cloud-risk-management/</loc><lastmod>2021-06-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/06/17/threat-and-risk-analysis-for-the-cloud/</loc><lastmod>2021-06-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/06/17/adopting-cloud-learn-how-to-manage-your-cyber-risks/</loc><lastmod>2021-06-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/06/16/zero-trust-for-the-new-normal/</loc><lastmod>2021-06-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/06/16/a-whole-new-world-compliance-in-the-cloud-is-no-magic-carpet-ride/</loc><lastmod>2021-06-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/06/15/endpoint-security-in-the-remote-and-hybrid-workplace/</loc><lastmod>2021-06-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/06/15/what-to-expect-future-trends-in-identity-and-access-management/</loc><lastmod>2021-06-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/06/09/how-to-wow-submission-reviewers-with-a-stellar-proposal/</loc><lastmod>2021-06-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/06/03/a-day-in-the-life-of-soc-womans-perspective/</loc><lastmod>2021-06-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/05/13/breach-detection-and-response-in-the-era-of-supply-chain-attacks/</loc><lastmod>2021-05-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/05/12/threat-modeling-with-the-veris-a4-threat-model/</loc><lastmod>2021-05-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/05/12/cyber-authors-ep4-stopping-losses-from-accidental-and-malicious-actions/</loc><lastmod>2021-05-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/05/12/ransomware-in-the-remote-work-era/</loc><lastmod>2021-05-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/05/12/breach-detection-lessons-learnt-from-mountaineers/</loc><lastmod>2021-05-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/05/11/lessons-learned-zero-trust-for-segmentation-in-iot-based-smart-buildings/</loc><lastmod>2021-05-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/05/11/pull-your-soc-up-with-continuous-validation-and-optimization/</loc><lastmod>2021-05-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/05/11/preventing-the-big-one-staying-ahead-of-the-breach/</loc><lastmod>2021-05-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/05/11/vid-lessons-learned-zero-trust-for-segmentation-in-iot-based-smart-buildings/</loc><lastmod>2021-05-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/05/11/whats-next-owasp-top-10-2021/</loc><lastmod>2021-05-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/05/11/safeguarding-your-data-need-how-to/</loc><lastmod>2021-05-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/04/20/wicys-veterans-apprenticeship-program/</loc><lastmod>2021-04-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/04/15/cybersecurity-of-ai-essential-pillars-to-building-ai-systems-securely/</loc><lastmod>2021-04-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/04/15/network-security-in-the-age-of-remote-working/</loc><lastmod>2021-04-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/04/15/building-a-threat-detection-framework-for-the-future/</loc><lastmod>2021-04-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/04/15/cyber-threats-of-today-attack-approaches-motivations-protection-mechanisms/</loc><lastmod>2021-04-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/04/14/wed-all-like-to-forget-2020-but-the-phishing-landscape-provided-great-insights/</loc><lastmod>2021-04-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/04/14/taking-down-nation-state-botnets/</loc><lastmod>2021-04-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/04/14/mitigating-email-threats-and-securing-the-enterprise-in-2021/</loc><lastmod>2021-04-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/04/14/the-future-of-email-security-ai-vs-human/</loc><lastmod>2021-04-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/04/13/how-to-take-a-threat-centric-approach-to-security-with-managed-security-services/</loc><lastmod>2021-04-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/04/13/breach-detection-and-response-in-the-era-of-supply-chain-attacks/</loc><lastmod>2021-04-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/04/12/the-endpoint-redefined/</loc><lastmod>2021-04-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/04/12/how-to-tie-up-loose-ends-with-endpoint-security/</loc><lastmod>2021-04-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/04/09/the-future-of-cyber-security-ai-for-offence-and-defence/</loc><lastmod>2021-04-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/04/09/cybersecurity-narratives-in-the-digital-era/</loc><lastmod>2021-04-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/04/09/re-inventing-cyber-security/</loc><lastmod>2021-04-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/04/09/the-future-of-cyber-security-2020-trends-and-2021-predictions/</loc><lastmod>2021-04-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/04/08/wicys-veterans-apprenticeship-program/</loc><lastmod>2021-04-08</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/04/08/is-your-cloud-environment-safe-against-cybercrimes/</loc><lastmod>2021-04-08</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/04/08/navigating-the-alphabet-soup-of-detection-response/</loc><lastmod>2021-04-08</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/04/08/three-ways-to-protect-against-ransomware/</loc><lastmod>2021-04-08</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/04/08/cyber-strategy-war-learning-from-history-and-protecting-the-future/</loc><lastmod>2021-04-08</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/04/07/the-modern-enterprise-is-more-digital-complex-regulated-so-how-do-we-cope/</loc><lastmod>2021-04-07</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/04/06/ciso-strategy-monitor-the-breathe/</loc><lastmod>2021-04-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/04/06/top-security-predictions-for-2021/</loc><lastmod>2021-04-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/04/06/how-to-measure-devsecops/</loc><lastmod>2021-04-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/04/06/how-the-best-cisos-build-cyber-strategies-to-get-the-budgets-they-need/</loc><lastmod>2021-04-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/04/06/your-people-are-not-as-secure-as-you-think/</loc><lastmod>2021-04-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/04/05/synergy-of-cyber-security-plan-with-enterprise-strategic-plan/</loc><lastmod>2021-04-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/04/01/expert-perspective-on-cybersecurity-transformation-with-your-board/</loc><lastmod>2021-04-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/03/31/selling-a-cloud-first-it-and-security-strategy-with-john-thompson/</loc><lastmod>2021-03-31</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/03/23/design-a-mentoring-program-that-delivers/</loc><lastmod>2021-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/03/18/cybersecurity-scholarships-through-cyber-fasttrack/</loc><lastmod>2021-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/03/18/identity-centric-security-the-zero-trust-perspective/</loc><lastmod>2021-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/03/18/what-to-expect-future-trends-in-identity-and-access-management/</loc><lastmod>2021-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/03/18/identities-privileged-access-cloud-security/</loc><lastmod>2021-03-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/03/17/sentinelones-woman-leaders-top-insights-that-have-guided-their-careers/</loc><lastmod>2021-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/03/17/cloud-supply-chain-lessons-learned-from-ms-exchange-and-solarwinds-hacks/</loc><lastmod>2021-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/03/17/the-future-is-identity-centric/</loc><lastmod>2021-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/03/17/panel-cloud-security-hurdles-and-how-to-overcome-them/</loc><lastmod>2021-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/03/17/simplifying-cloud-security-concepts/</loc><lastmod>2021-03-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/03/16/multi-cloud-security-a-concern-for-providers-and-consumers/</loc><lastmod>2021-03-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/03/16/cloud-security-a-dynamic-approach-to-cloud-risk-monitoring-and-reporting/</loc><lastmod>2021-03-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/03/16/cloud-security-threat-cloud-monitoring-and-breach-prevention/</loc><lastmod>2021-03-16</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/03/15/security-issues-and-solutions-in-cloud-computing/</loc><lastmod>2021-03-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/03/15/thinking-like-a-hacker/</loc><lastmod>2021-03-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/03/15/cyber-resilience-in-multiple-cloud-environments/</loc><lastmod>2021-03-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/03/15/panel-securing-a-multicloud-environment/</loc><lastmod>2021-03-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/03/15/preventing-detecting-cloud-security-incidents/</loc><lastmod>2021-03-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/03/10/cyber-authors-ep3-how-to-do-application-security-right/</loc><lastmod>2021-03-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/02/17/succeeding-as-a-ciso-in-2021/</loc><lastmod>2021-02-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/02/11/threat-hunting-in-a-borderless-world/</loc><lastmod>2021-02-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/02/11/are-your-vendors-a-threat-to-your-business/</loc><lastmod>2021-02-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/02/11/cybercrime-on-constant-watch/</loc><lastmod>2021-02-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/02/11/data-breaches-two-tales-two-motives-financial-vs-espionage/</loc><lastmod>2021-02-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/02/11/attacking-the-dark-corners-of-the-internet/</loc><lastmod>2021-02-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/02/11/panel-discussion-defending-fintech-best-practices-and-lessons-learned/</loc><lastmod>2021-02-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/02/11/dont-let-them-catch-you-with-your-work-undone-todays-threat-landscape/</loc><lastmod>2021-02-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/02/11/securing-the-distributed-workforce-in-the-new-normal/</loc><lastmod>2021-02-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/02/11/predicting-the-future-protecting-the-now/</loc><lastmod>2021-02-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/02/10/geopolitical-cyberwarfare-hacktivism-as-a-trend/</loc><lastmod>2021-02-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/02/10/rage-alongside-the-machines-practical-advice-for-automating-response/</loc><lastmod>2021-02-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/02/10/a-new-capability-for-incident-responders-deny-privileged-access/</loc><lastmod>2021-02-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/02/10/panel-discussion-strategies-for-breach-prevention-response/</loc><lastmod>2021-02-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/02/10/cyber-defense-in-the-modern-org-7-low-cost-tips-to-secure-your-organization/</loc><lastmod>2021-02-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/02/10/navigating-complexity-a-path-through-too-much-choice/</loc><lastmod>2021-02-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/02/09/threat-modeling-over-coffee-a-simple-method-of-data-prioritization/</loc><lastmod>2021-02-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/02/09/ciso-tips-for-shaping-your-security-strategy/</loc><lastmod>2021-02-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/02/09/beyond-the-hype-use-cases-that-work-with-applied-behavioral-analytics/</loc><lastmod>2021-02-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/02/09/panel-discussion-getting-ahead-of-the-breach/</loc><lastmod>2021-02-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/02/09/breach-what-breach/</loc><lastmod>2021-02-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/02/09/breach-detection-an-integral-part-of-digital-transformation/</loc><lastmod>2021-02-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/02/09/how-to-implement-a-new-cyber-solution-to-change-the-defense-status/</loc><lastmod>2021-02-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/02/08/global-requirements-in-privacy-security-compliance-breach-prevention/</loc><lastmod>2021-02-08</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/02/08/back-to-basics-planning-for-a-breach-edition/</loc><lastmod>2021-02-08</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/02/08/breach-prevention-and-impact-reduction/</loc><lastmod>2021-02-08</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/02/08/how-engaging-your-business-stakeholders-can-improve-cybersecurity/</loc><lastmod>2021-02-08</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/02/08/removing-24x7-administrator-rights-to-break-the-attack-chain/</loc><lastmod>2021-02-08</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/02/08/lead-with-data-centric-security-to-prevent-breaches/</loc><lastmod>2021-02-08</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/02/08/cyber-hygiene-1-dollar-solution-to-a-million-dollars-problem/</loc><lastmod>2021-02-08</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/02/08/when-it-comes-to-cloud-soften-up/</loc><lastmod>2021-02-08</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/02/04/revamp-your-supply-chain-risk-strategy/</loc><lastmod>2021-02-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/02/04/get-ahead-of-digital-third-party-risk-management-in-2021/</loc><lastmod>2021-02-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/02/03/storage-technologies-practices-ripe-for-refresh/</loc><lastmod>2021-02-03</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/01/21/like-shooting-phish-in-a-barrel-3-perspectives-on-email-protection/</loc><lastmod>2021-01-21</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/01/21/panel-improving-email-security-for-the-remote-workforce/</loc><lastmod>2021-01-21</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/01/21/best-practices-for-reducing-email-compromise-except-for-eliminating-humans/</loc><lastmod>2021-01-21</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/01/20/early-lessons-learned-mitigating-solarwinds-hack-style-insider-risk/</loc><lastmod>2021-01-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/01/20/is-the-biggest-threat-to-your-firms-security-already-on-your-network/</loc><lastmod>2021-01-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/01/20/data-privacy-and-data-protection-in-the-covid-era/</loc><lastmod>2021-01-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/01/20/the-inside-outsider-how-to-deal-with-vendors-that-have-privileged-access/</loc><lastmod>2021-01-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/01/20/election-takeaways-for-cybersecurity-leaders/</loc><lastmod>2021-01-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/01/20/applying-the-mitre-attck-framework-to-detect-insider-threats/</loc><lastmod>2021-01-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/01/20/tackling-insider-threat-with-open-source-intelligence-osint/</loc><lastmod>2021-01-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/01/20/mindhunter-1-social-engineering-the-threat-is-coming-from-inside-the-house/</loc><lastmod>2021-01-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/01/20/you-never-mean-to-let-attackers-in-the-front-door/</loc><lastmod>2021-01-20</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/01/19/its-not-you-its-me-go-from-frenemy-to-friend-with-security-automation/</loc><lastmod>2021-01-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/01/19/human-error-cyber-security/</loc><lastmod>2021-01-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/01/19/why-the-next-ryuk-ransomware-will-bypass-your-defenses/</loc><lastmod>2021-01-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/01/19/affects-of-human-behavior-in-cybersecurity/</loc><lastmod>2021-01-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/01/19/ciso-insights-the-top-21-security-predictions-for-2021/</loc><lastmod>2021-01-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/01/19/why-did-they-click-that-human-errors-factor/</loc><lastmod>2021-01-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/01/19/managing-the-most-vulnerable-element-in-our-cyber-security-strategy/</loc><lastmod>2021-01-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/01/19/employees-weakest-or-strongest-link-in-your-cyber-security-posture/</loc><lastmod>2021-01-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/01/19/deployment-pipeline-way-to-secure-your-workloads/</loc><lastmod>2021-01-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2021/01/13/cyber-authors-ep2-a-practical-guide-for-cisos/</loc><lastmod>2021-01-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/12/17/6-ways-cisos-are-securing-and-navigating-the-cloud/</loc><lastmod>2020-12-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/12/10/cybersecurity-threat-detection-and-prevention/</loc><lastmod>2020-12-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/12/10/how-to-fix-cybersecurity-from-patching-leaks-to-building-better-dams/</loc><lastmod>2020-12-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/12/10/all-pci-and-nothing-about-pci-dss-v4/</loc><lastmod>2020-12-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/12/10/how-to-remediate-application-security-vulnerabilities/</loc><lastmod>2020-12-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/12/09/third-party-risk-management-and-the-cloud/</loc><lastmod>2020-12-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/12/09/cover-your-saas-evaluating-saas-vendors-for-cyber-risk/</loc><lastmod>2020-12-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/12/09/a-whole-new-world-compliance-in-the-cloud-is-no-magic-carpet-ride/</loc><lastmod>2020-12-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/12/09/cloud-data-management-interoperability-why-a-cdmi-standard-matters/</loc><lastmod>2020-12-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/12/09/2021-readiness-balancing-security-in-a-post-covid-world/</loc><lastmod>2020-12-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/12/09/to-trust-or-not-to-trust-the-cloud-that-is-your-compliance-and-risk-question/</loc><lastmod>2020-12-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/12/08/protecting-against-public-cloud-data-breaches-using-confidential-computing/</loc><lastmod>2020-12-08</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/12/08/cloud-adoption-has-changed-gears-your-security-needs-to-do-the-same/</loc><lastmod>2020-12-08</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/12/08/panel-cloud-security-risks-and-solutions/</loc><lastmod>2020-12-08</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/12/08/shifting-to-a-holistic-cloud-security-strategy/</loc><lastmod>2020-12-08</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/12/07/the-corporate-dissolve-of-centralized-security/</loc><lastmod>2020-12-07</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/12/07/closing-cybersecurity-skills-gap-with-customized-training-and-untapped-talent/</loc><lastmod>2020-12-07</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/12/07/a-muggles-guide-to-security-in-the-cloud/</loc><lastmod>2020-12-07</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/12/02/how-video-analytics-is-changing-the-way-we-store-video/</loc><lastmod>2020-12-02</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/12/01/cybersecurity-and-elections-past-present-and-future/</loc><lastmod>2020-12-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/11/26/data-breach-tools-and-tips-for-managing-a-cyber-attack/</loc><lastmod>2020-11-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/11/26/5-reasons-cisos-are-turning-to-security-as-a-service/</loc><lastmod>2020-11-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/11/26/cyber-threats-in-2021-real-impact-of-covid-on-cyber-security/</loc><lastmod>2020-11-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/11/26/ive-been-hit-by-ransomware-now-what/</loc><lastmod>2020-11-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/11/26/cya-toolkit-for-cisos/</loc><lastmod>2020-11-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/11/26/key-strategies-to-reduce-your-attack-surface-in-2021/</loc><lastmod>2020-11-26</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/11/19/election-recap-cybersecurity-lessons-learned/</loc><lastmod>2020-11-19</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/11/17/compute-everywhere-how-storage-and-networking-expand-the-compute-continuum/</loc><lastmod>2020-11-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/11/17/deceiving-the-attacker/</loc><lastmod>2020-11-17</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/11/12/infrastructure-compliance-automation-security-management-in-your-cloud/</loc><lastmod>2020-11-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/11/12/cya-toolkit-for-cisos/</loc><lastmod>2020-11-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/11/12/5-reasons-cisos-are-turning-to-security-as-a-service/</loc><lastmod>2020-11-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/11/12/bridging-the-gap-communicating-cyber-risk-reduction-strategies/</loc><lastmod>2020-11-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/11/12/assess-comply-assure-eight-cyber-challenges-in-an-uncertain-world/</loc><lastmod>2020-11-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/11/11/breach-response-in-context-of-new-privacy-regulation/</loc><lastmod>2020-11-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/11/11/ive-been-hit-by-ransomware-now-what/</loc><lastmod>2020-11-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/11/11/eyes-wide-open-magecart-web-skimming-attacks-detection-and-prevention/</loc><lastmod>2020-11-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/11/11/adapting-your-incident-response-policy-to-the-cloud-era/</loc><lastmod>2020-11-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/11/11/data-breach-tools-and-tips-for-managing-a-cyber-attack/</loc><lastmod>2020-11-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/11/11/responding-to-a-breach-business-resilience-from-a-ciso-perspective/</loc><lastmod>2020-11-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/11/10/the-ins-and-outs-of-enterprise-crypto-in-the-world-of-cloud-and-mobile-computing/</loc><lastmod>2020-11-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/11/10/key-strategies-to-reduce-your-attack-surface-in-2021/</loc><lastmod>2020-11-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/11/10/cyber-risk-drives-cost-effective-security/</loc><lastmod>2020-11-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/11/10/police-insight-how-to-protect-your-business-from-cyber-threats/</loc><lastmod>2020-11-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/11/10/old-wine-in-new-bottles-has-the-threat-landscape-really-changed/</loc><lastmod>2020-11-10</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/11/09/the-2021-threat-forecast/</loc><lastmod>2020-11-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/11/09/cyber-threats-in-2021-real-impact-of-covid-on-cyber-security/</loc><lastmod>2020-11-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/11/09/ciso-challenges-and-opportunities/</loc><lastmod>2020-11-09</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/10/28/neurodiversity-untapped-talent-that-can-help-meet-the-cyber-skills-shortage/</loc><lastmod>2020-10-28</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/10/28/securing-whatsapp-what-you-need-to-know-today/</loc><lastmod>2020-10-28</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/10/28/storage-networking-security-series-securing-data-in-transit/</loc><lastmod>2020-10-28</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/10/28/cyber-authors-ep1-inside-the-cyberwar-to-hijack-elections-distort-the-truth/</loc><lastmod>2020-10-28</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/10/27/2021-cybersecurity-budget-must-haves-for-every-smb/</loc><lastmod>2020-10-27</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/10/21/ransomware-negotiation-dos-and-donts-with-an-expert-negotiator/</loc><lastmod>2020-10-21</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/10/15/if-security-is-a-people-problem-are-our-teams-the-weakest-link/</loc><lastmod>2020-10-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/10/15/best-practices-for-reducing-email-compromise-except-for-eliminating-humans/</loc><lastmod>2020-10-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/10/15/email-security-in-the-age-of-remote-work/</loc><lastmod>2020-10-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/10/15/defense-in-depth-catch-them-where-you-can/</loc><lastmod>2020-10-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/10/15/uncertainties-fuel-ransomware-attacks-into-corporate-are-you-prepared/</loc><lastmod>2020-10-15</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/10/14/understanding-open-source-risk/</loc><lastmod>2020-10-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/10/14/application-security-vulnerability-a-risk-based-approach/</loc><lastmod>2020-10-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/10/14/how-to-do-application-security-right/</loc><lastmod>2020-10-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/10/14/securing-identity-1-year-check-in/</loc><lastmod>2020-10-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/10/14/application-security-for-the-modern-enterprise/</loc><lastmod>2020-10-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/10/14/new-normal-for-application-security-adaptive-intelligent-access/</loc><lastmod>2020-10-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/10/13/defense-in-depth-a-layered-approach-to-prevent-data-breach/</loc><lastmod>2020-10-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/10/13/ransomware-breach-prevention-101-securing-your-vpn/</loc><lastmod>2020-10-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/10/13/putting-the-pieces-together/</loc><lastmod>2020-10-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/10/13/securing-your-connected-devices-at-home-at-work/</loc><lastmod>2020-10-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/10/13/how-to-tie-up-loose-ends-with-endpoint-security/</loc><lastmod>2020-10-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/10/13/key-tips-for-data-breach-prevention/</loc><lastmod>2020-10-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/10/13/defensible-cybersecurity-balancing-business-and-operational-requirements/</loc><lastmod>2020-10-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/10/12/sunny-with-a-chance-ofinsider-threats/</loc><lastmod>2020-10-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/10/12/trending-cyber-attack-vectors/</loc><lastmod>2020-10-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/10/12/cyber-attack-trends-threat-forecast-for-2021/</loc><lastmod>2020-10-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/10/12/understanding-of-risk-in-cyber-security/</loc><lastmod>2020-10-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/10/12/evolution-of-cyber-attacks-in-india-2015-2020/</loc><lastmod>2020-10-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/10/12/cybersecurity-attack-trends-influencing-society-wfh-and-the-new-normal/</loc><lastmod>2020-10-12</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/10/07/protecting-connected-devices-from-cyber-threats/</loc><lastmod>2020-10-07</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/10/06/the-evolution-beyond-secure-email-gateways/</loc><lastmod>2020-10-06</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/10/05/ciso-insights-how-to-practice-cyber-hygiene-becybersmart/</loc><lastmod>2020-10-05</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/09/24/dissecting-cybercrime-mule-networks-unwitting-accomplices-in-cyber-crime/</loc><lastmod>2020-09-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/08/24/dissecting-cybercrime-credentials-still-keys-to-your-kingdom/</loc><lastmod>2020-08-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/07/14/dissecting-cybercrime-journey-of-a-stolen-credit-card/</loc><lastmod>2020-07-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/07/01/ciso-pandemic-response-next-steps/</loc><lastmod>2020-07-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/05/01/back-to-the-office-or-not-next-steps-in-pandemic-technology-response/</loc><lastmod>2020-05-01</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/03/23/coronavirus-pandemic-cyber-intelligence-fighting-the-virus-in-cyberspace/</loc><lastmod>2020-03-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/03/13/coronavirus-actions-and-risks-for-tech-and-security-leaders/</loc><lastmod>2020-03-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2020/02/13/threat-landscape-2020-expect-the-unexpected/</loc><lastmod>2020-02-13</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2019/06/04/cybersecurity-and-fraud-securing-the-financial-sector/</loc><lastmod>2019-06-04</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2017/07/14/petyas-real-impact-in-a-new-era-of-cyber-warfare/</loc><lastmod>2017-07-14</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2017/05/24/malware-in-disguise-how-to-spot-it-ransomware-phishing/</loc><lastmod>2017-05-24</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2017/05/11/travel-loyalty-reward-program-vulnerabilities/</loc><lastmod>2017-05-11</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2017/03/21/wikileaks-vault7-impact/</loc><lastmod>2017-03-21</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2017/02/23/the-state-of-cybersecurity-in-2017/</loc><lastmod>2017-02-23</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2017/02/07/stolen-credentials-1-cyber-threat-today/</loc><lastmod>2017-02-07</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2017/01/18/what-did-russians-really-hack/</loc><lastmod>2017-01-18</lastmod><priority>0.5</priority></url><url><loc>https://infosecradar.com/stories/2017/01/03/yahoo-breaches-continue-what-to-expect-next-from-yahoo/</loc><lastmod>2017-01-03</lastmod><priority>0.5</priority></url></urlset>