<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>Cybersecurity News</title>
    <description>
      <![CDATA[<style>

.taxonomy-header__description{

width: 675px !important;

max-width: 100% !important;

}

</style>


<p style="font-size: 12px; text-align: right;"><em>Image courtesy of: kentoh (iStock / Getty Images Plus)</em></p>

<p>Latest news on cybersecurity, including data breaches, security vulnerabilities, cyberattacks, malware and phishing attacks, data privacy and compliance, cybersecurity conferences and more.</p>

]]>
    </description>
    <link>https://www.securitymagazine.com/rss/2236-cybersecurity-news</link>
    <language>en-us</language>
    <item>
      <title>Unauthorized Users Accessed Claude Mythos, New Reports Suggest</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Anthropic’s new AI model may have been accessed by unauthorized users.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102251</guid>
      <pubDate>Wed, 22 Apr 2026 13:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102251-unauthorized-users-accessed-claude-mythos-new-reports-suggest</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/22/Laptop-in-darkness-by-Hostaphoto.webp?t=1776877073" type="image/png" length="125623"/>
    </item>
    <item>
      <title>Hackers Claim 19M Records Stolen From French Government Agency</title>
      <author></author>
      <description>
        <![CDATA[<p>The <span style=" font-style: normal; font-weight: 300; letter-spacing: normal; orphans: 2; text-align: start; widows: 2; word-spacing: 0px; display: inline !important; float: none;">France Titres&nbsp;<span style=" font-style: normal; font-weight: 300; letter-spacing: normal; orphans: 2; text-align: start; widows: 2; word-spacing: 0px; display: inline !important; float: none;">discovered a security incident.&nbsp;</span></span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102248</guid>
      <pubDate>Wed, 22 Apr 2026 09:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102248-hackers-claim-19m-records-stolen-from-french-government-agency</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/22/French-flag-by-Rafael-Garcin.webp?t=1776860491" type="image/png" length="263048"/>
    </item>
    <item>
      <title>Security Leaders Discuss the Vercel Breach</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Security leaders are discussing the Vercel breach.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102246</guid>
      <pubDate>Tue, 21 Apr 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102246-security-leaders-discuss-the-vercel-breach</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/21/Office-supplies-by-Amy-Hirschi.webp?t=1776783392" type="image/png" length="332942"/>
    </item>
    <item>
      <title>US Security Agency Leverages Claude Mythos Despite Pentagon Blacklist</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Reports suggest that the NSA is using Claude Mythos.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102243</guid>
      <pubDate>Mon, 20 Apr 2026 13:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102243-us-security-agency-leverages-claude-mythos-despite-pentagon-blacklist</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/20/Aerial-view-of-America-by-NASA.webp?t=1776702474" type="image/png" length="629203"/>
    </item>
    <item>
      <title>Vercel Breach Originated From an Employee’s AI Tool</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>This breach occurred due to a <span style=" font-style: normal; font-weight: 400; letter-spacing: 0.1px; orphans: 2; text-align: start; widows: 2; word-spacing: 0px; display: inline !important; float: none;">third-party AI tool.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102242</guid>
      <pubDate>Mon, 20 Apr 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102242-vercel-breach-originated-from-an-employees-ai-tool</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/20/Computer-in-darkness-by-Nikita-Kachanovsky.webp?t=1776699474" type="image/png" length="299046"/>
    </item>
    <item>
      <title>58% of Organizations Spend Over 10 Hours a Month Securing AI-generated Code</title>
      <author></author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">A recent report by Cloudsmith found that 31% of organizations using AI-generated code spend 10 hours or less per month validating, auditing, or securing it.</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102241</guid>
      <pubDate>Mon, 20 Apr 2026 10:23:28 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102241-58-of-organizations-spend-over-10-hours-a-month-securing-ai-generated-code</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/20/chris-ried-ieic5Tq8YMk-unsplash.webp?t=1776694909" type="image/jpeg" length="132731"/>
    </item>
    <item>
      <title>Top 3 Cyber Insurance Incident Claims</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">A new report reveals the top three cyber incidents that account for a majority of reported claims.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102232</guid>
      <pubDate>Mon, 20 Apr 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102232-top-3-cyber-insurance-incident-claims</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/17/Laptop-keyboard-in-gradient-colorful-light-by-Jonas-Vandermeiren.webp?t=1776442444" type="image/png" length="151909"/>
    </item>
    <item>
      <title>What Are Security Experts Saying About OpenAI’s GPT-5.4-Cyber?</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">OpenAI has launched GPT-5.4-Cyber, a model optimized for defensive cybersecurity usage.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102235</guid>
      <pubDate>Thu, 16 Apr 2026 11:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102235-what-are-security-experts-saying-about-openais-gpt-54-cyber</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/15/Golden-lights-by-Joshua-Sortino.webp?t=1776273162" type="image/png" length="929161"/>
    </item>
    <item>
      <title>McGraw Hill Data Breach Caused by Salesforce Misconfiguration</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>McGraw Hill announced a data breach connected to a Salesforce misconfiguration.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102233</guid>
      <pubDate>Wed, 15 Apr 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102233-mcgraw-hill-data-breach-caused-by-salesforce-misconfiguration</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/15/Student-desks-in-a-room-by-Allen-Y.webp?t=1776266704" type="image/png" length="428886"/>
    </item>
    <item>
      <title>Venice Hydraulic Pump System Hacked, Hackers Claim Power to Create Floods</title>
      <author></author>
      <description>
        <![CDATA[<p>Venice’s hydraulic pump system was hacked. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102231</guid>
      <pubDate>Tue, 14 Apr 2026 12:30:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102231-venice-hydraulic-pump-system-hacked-hackers-claim-power-to-create-floods</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/14/Venice-by-Kit-Suman.webp?t=1776276358" type="image/png" length="771305"/>
    </item>
    <item>
      <title>Pro-Iranian Actor Claims L.A. Metro Cyberattack</title>
      <author></author>
      <description>
        <![CDATA[<p>New intelligence suggests a pro-Iranian actor is responsible for the L.A. Metro cyberattack.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102230</guid>
      <pubDate>Tue, 14 Apr 2026 11:30:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102230-pro-iranian-actor-claims-la-metro-cyberattack</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/14/LA-Metro-by-Rio-Space.webp?t=1776276358" type="image/png" length="514918"/>
    </item>
    <item>
      <title>3 Quantum Realities to Confront this World Quantum Day</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>3 quantum realities security leaders need to confront.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102229</guid>
      <pubDate>Tue, 14 Apr 2026 08:15:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102229-3-quantum-realities-to-confront-this-world-quantum-day</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/13/Transparent-cube-and-colorful-squares-by-David-Clode.webp?t=1776099451" type="image/png" length="686636"/>
    </item>
    <item>
      <title>Booking.com Customer Data Hacked, Exposed</title>
      <author></author>
      <description>
        <![CDATA[<p>Booking.com is warning customers that their information may have been exposed.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102228</guid>
      <pubDate>Mon, 13 Apr 2026 08:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102228-bookingcom-customer-data-hacked-exposed</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/13/Luggage-by-Erwan-Hesry.webp?t=1776083275" type="image/png" length="595112"/>
    </item>
    <item>
      <title>Top Secret Clearance Holder Charged With Leaking Classified National Defense Information</title>
      <author></author>
      <description>
        <![CDATA[<p>Former Army employee indicted for allegedly sharing classified national defense information to unauthorized individuals.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102227</guid>
      <pubDate>Fri, 10 Apr 2026 13:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102227-top-secret-clearance-holder-charged-with-leaking-classified-national-defense-information</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/10/Gavel-by-Sasun-Bughdaryan.webp?t=1775836839" type="image/png" length="307749"/>
    </item>
    <item>
      <title>What Are Security Experts Saying About Claude Mythos and Project Glasswing?</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Security experts share their thoughts on Claude Mythos and Project Glasswing with <em>Security </em>magazine.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102226</guid>
      <pubDate>Fri, 10 Apr 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102226-what-are-security-experts-saying-about-claude-mythos-and-project-glasswing</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/10/Abstract-shape-by-Kanhaiya-Sharma.webp?t=1775834774" type="image/png" length="88935"/>
    </item>
    <item>
      <title>Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen</title>
      <author></author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Data has allegedly been stolen from a state-run Chinese supercomputer.</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102225</guid>
      <pubDate>Thu, 09 Apr 2026 15:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102225-chinese-supercomputer-allegedly-hacked-10-petabytes-of-data-stolen</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/09/Cables-plugged-in-by-Scott-Rodgerson.webp?t=1775761808" type="image/png" length="464149"/>
    </item>
    <item>
      <title>Iranian-Linked Cyber Actors Target US Critical Infrastructure, Security Leaders Respond</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>CISA warns that Iranian-connected cyber actors are focusing U.S. critical infrastructure. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102221</guid>
      <pubDate>Wed, 08 Apr 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102221-iranian-linked-cyber-actors-target-us-critical-infrastructure-security-leaders-respond</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/08/Power-lines-by-Yuan-Yang.webp?t=1775663200" type="image/png" length="497945"/>
    </item>
    <item>
      <title>LAPD Records Hacked and Exposed</title>
      <author></author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">A data breach&nbsp;</span>has lead to the exposure of sensitive LAPD records.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102215</guid>
      <pubDate>Wed, 08 Apr 2026 05:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102215-lapd-records-hacked-and-exposed</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/08/Police-in-road-by-AJ-Colores.webp?t=1775656677" type="image/png" length="765393"/>
    </item>
    <item>
      <title>New Trump Administration Budget Cuts $707M from CISA Funding</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>The White House plans to cut $707M from CISA funding.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102213</guid>
      <pubDate>Tue, 07 Apr 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102213-new-trump-administration-budget-cuts-707m-from-cisa-funding</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/07/United-States-capitol-by-Louis-Velazquez.webp?t=1775573360" type="image/png" length="590390"/>
    </item>
    <item>
      <title>Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Security leaders discuss this breach and share insights.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102207</guid>
      <pubDate>Mon, 06 Apr 2026 11:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102207-breach-of-fbi-surveillance-system-considered-a-major-incident-security-experts-weigh-in</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/06/Padlock-with-computer-keys-by-FlyD.webp?t=1775486057" type="image/png" length="508835"/>
    </item>
    <item>
      <title>World Cloud Security Day: Breaking Down the State of Cloud Cybersecurity and Physical Security</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>
A snapshot of the state of the cloud in cybersecurity and physical security.&nbsp;</p><br>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102204</guid>
      <pubDate>Fri, 03 Apr 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102204-world-cloud-security-day-breaking-down-the-state-of-the-cloud-cybersecurity-and-physical-security</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/03/Cloud-security-by-Growtika.webp?t=1775232056" type="image/png" length="255866"/>
    </item>
    <item>
      <title>AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Mercor has faced a breach of data.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102203</guid>
      <pubDate>Fri, 03 Apr 2026 08:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102203-ai-startup-mercor-which-works-with-open-ai-and-anthropic-confirms-data-breach</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/03/AI-by-Immo-Wegmann.webp?t=1775220033" type="image/png" length="617463"/>
    </item>
    <item>
      <title>10 Data Security Stories to Know About (March 2026)</title>
      <author></author>
      <description>
        <![CDATA[<p><em>Security&nbsp;</em>magazine reviews 10 data security events from March 2026.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102198</guid>
      <pubDate>Wed, 01 Apr 2026 04:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102198-10-data-security-stories-to-know-about-march-2026</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/31/Keyboard-by-Vikas-Harijan.webp?t=1774975015" type="image/png" length="291242"/>
    </item>
    <item>
      <title>Security Leaders Share Thoughts on Foster City Cyberattack</title>
      <description>
        <![CDATA[<p>A ransomware attack on Foster City, California, triggered a state of emergency to access additional resources to keep systems up and running.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102196</guid>
      <pubDate>Tue, 24 Mar 2026 13:52:05 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102196-security-leaders-share-thoughts-on-foster-city-cyberattack</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/24/ilya-pavlov-OqtafYT5kTw-unsplash-(8).webp?t=1774374543" type="image/jpeg" length="136420"/>
    </item>
    <item>
      <title>3.7M Records Exposed, Many Belonging to Sears Home Services</title>
      <author></author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Three different databases were&nbsp;<span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">publicly exposed, amounting to 3.7 million records.&nbsp;</span></span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102188</guid>
      <pubDate>Mon, 23 Mar 2026 05:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102188-37m-records-exposed-many-belonging-to-sears-home-services</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/19/Code-by-Pankaj-Patel.webp?t=1773942658" type="image/png" length="367475"/>
    </item>
    <item>
      <title>Hackers Claim to Have Breached Streaming Service CrunchyRoll’s Data</title>
      <author></author>
      <description>
        <![CDATA[<p>Hackers claim&nbsp;<span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">that they breached Sony’s anime streaming service CrunchyRoll.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102195</guid>
      <pubDate>Mon, 23 Mar 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102195-hackers-claim-to-have-breached-streaming-service-crunchyrolls-data</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/23/Crunchyroll-by-Jonathan-Kemper.webp?t=1774287082" type="image/png" length="469059"/>
    </item>
    <item>
      <title>The FBI Buys Data to Track Movement, Location History</title>
      <author></author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Director Patel stated the FBI purchases data that can be leveraged to track a person’s movement and location history.</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102189</guid>
      <pubDate>Fri, 20 Mar 2026 04:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102189-the-fbi-buys-data-to-track-movement-location-history</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/19/Person-placing-location-pin-on-map-by-GeoJango-Maps.webp?t=1773946101" type="image/png" length="393550"/>
    </item>
    <item>
      <title>8M Confidential Crime Tips Hacked, Compromised</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">A hacker group claimed to breach a platform used for submitting tips about criminal events.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102191</guid>
      <pubDate>Thu, 19 Mar 2026 04:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102191-8m-confidential-crime-tips-hacked-compromised</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/19/Person-holding-phone-by-Gilles-Lambert.webp?t=1773951547" type="image/png" length="122968"/>
    </item>
    <item>
      <title>Trump’s Former Counter-Terrorism Official Investigated Over Alleged Leaks</title>
      <author></author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Joe Kent is under investigation for alleged leaks of classified information</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102187</guid>
      <pubDate>Thu, 19 Mar 2026 02:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102187-trumps-former-counter-terrorism-official-investigated-over-alleged-leaks</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/19/FBI-emblem-by-David-Trinks.webp?t=1773924947" type="image/png" length="818037"/>
    </item>
    <item>
      <title>Stryker Update: FBI Seizes Website of Iran-Linked Hackers</title>
      <author></author>
      <description>
        <![CDATA[<p>The FBI has seized the website of the Iranian-linked hackers believed to be behind the recent cyberattack against Stryker.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102190</guid>
      <pubDate>Thu, 19 Mar 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102190-stryker-update-fbi-seizes-website-of-iran-linked-hackers</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/19/Computer-with-binary-code-hovering-nearby-by-Steve-Johnson.webp?t=1773948437" type="image/png" length="376534"/>
    </item>
  </channel>
</rss>
