<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>Cybersecurity News</title>
    <description>
      <![CDATA[<style>

.taxonomy-header__description{

width: 675px !important;

max-width: 100% !important;

}

</style>


<p style="font-size: 12px; text-align: right;"><em>Image courtesy of: kentoh (iStock / Getty Images Plus)</em></p>

<p>Latest news on cybersecurity, including data breaches, security vulnerabilities, cyberattacks, malware and phishing attacks, data privacy and compliance, cybersecurity conferences and more.</p>

]]>
    </description>
    <link>https://www.securitymagazine.com/rss/2236</link>
    <language>en-us</language>
    <item>
      <title>What Security Leaders Say About the First AI-Developed Zero-Day Exploit</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Security leaders discuss the first AI-created&nbsp;<span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">zero-day exploit.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102298</guid>
      <pubDate>Wed, 13 May 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102298-what-security-leaders-say-about-the-first-ai-developed-zero-day-exploit</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/13/Coding-by-Walkator.webp?t=1778685541" type="image/png" length="846347"/>
    </item>
    <item>
      <title>10 Data Breaches to Know About (April 2026)</title>
      <author></author>
      <description>
        <![CDATA[<p>A roundup of recent data breach stories.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102282</guid>
      <pubDate>Fri, 08 May 2026 08:46:58 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102282-10-data-breaches-to-know-about-april-2026</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/01/Opened-padlock-on-computer-keyboard-by-Sasun-Bughdaryan.webp?t=1777662611" type="image/png" length="307414"/>
    </item>
    <item>
      <title>Research: Microsoft Edge Loads Stored Passwords in Cleartext</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>A researcher found that Microsoft Edge will load <span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; widows: 2; word-spacing: 0px; display: inline !important; float: none;">saved passwords into memory in plaintext, even when they are not being used.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102294</guid>
      <pubDate>Thu, 07 May 2026 12:30:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102294-research-microsoft-edge-loads-stored-passwords-in-cleartext</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/07/Laptop-with-desktop-screen-showing-by-Sunrise-King.webp?t=1778170941" type="image/png" length="282476"/>
    </item>
    <item>
      <title>Will This World Password Day Be the Last?</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Passwords have long been an integral part of online security. But this year, some cybersecurity experts are pushing for this to change.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102293</guid>
      <pubDate>Thu, 07 May 2026 11:30:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102293-will-this-world-password-day-be-the-last</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/07/Keys-on-yellow-background-by-Alp-Duran.webp?t=1778167213" type="image/png" length="411957"/>
    </item>
    <item>
      <title>Security Experts Discuss Proposed Government Patching Deadlines</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">U.S. cyber officials are considering shortening the deadline for fixing critical vulnerabilities in government IT, and security experts are sharing their thoughts.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102292</guid>
      <pubDate>Wed, 06 May 2026 12:09:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102292-security-experts-discuss-proposed-government-patching-deadlines</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/06/Keyboard-by-ic-Ci.webp?t=1778080922" type="image/png" length="200840"/>
    </item>
    <item>
      <title>35,000 Users Targeted in Phishing Campaign in Just Two Days</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Between the dates of Apr. 14 and Apr. 16, a sophisticated phishing campaign was observed.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102290</guid>
      <pubDate>Tue, 05 May 2026 15:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102290-35-000-users-targeted-in-phishing-campaign-in-just-two-days</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/05/Email-app-by-Brian-J.-Tromp.webp?t=1778005568" type="image/png" length="320004"/>
    </item>
    <item>
      <title>Exclusive: What the Celebrity Stalkerware Breach Means for Executive Protection</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><em>Security </em>magazine spoke with Cybersecurity Researcher Jeremiah Fowler about the risks of stalkerware in executive protection.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102289</guid>
      <pubDate>Tue, 05 May 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102289-exclusive-what-the-celebrity-stalkerware-breach-means-for-executive-protection</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/05/Blurry-face-by-Darius-Bashar.webp?t=1777996872" type="image/png" length="370987"/>
    </item>
    <item>
      <title>Sandhills Medical Foundation Notified Individuals of a May 2025 Data Breach</title>
      <author></author>
      <description>
        <![CDATA[<p>Individuals were recently notified of a ransomware attack affecting Sandhills Medical Foundation that occurred in May 2025.</p><br><br>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102287</guid>
      <pubDate>Mon, 04 May 2026 15:01:57 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102287-sandhills-medical-foundation-notified-individuals-of-a-may-2025-data-breach</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/04/philipp-katzenberger-iIJrUoeRoCQ-unsplash-(6).webp?t=1777921235" type="image/jpeg" length="72549"/>
    </item>
    <item>
      <title>Cybersecurity Professionals Sentenced to Prison for Ransomware Attacks</title>
      <author></author>
      <description>
        <![CDATA[<p>Two cybersecurity professionals were imprisoned for their role in a string of 2023 ransomware attacks.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102285</guid>
      <pubDate>Mon, 04 May 2026 11:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102285-cybersecurity-professionals-sentenced-to-prison-for-ransomware-attacks</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/04/Gavel-by-Sasun-Bughdaryan.webp?t=1777904232" type="image/png" length="307749"/>
    </item>
    <item>
      <title>Instructure, Parent of Canvas, Confirms Data Breach</title>
      <author></author>
      <description>
        <![CDATA[<p>Instructure recently confirmed its data was stolen.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102283</guid>
      <pubDate>Mon, 04 May 2026 10:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102283-instructure-parent-of-canvas-confirms-data-breach</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/04/Elementary-school-supplies-by-Element5-Digital.webp?t=1777899724" type="image/png" length="290403"/>
    </item>
    <item>
      <title>Company Database Deleted by AI Agent: What Security Leaders Need to Know</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Nine seconds — that’s how long it took for an AI agent to delete a company’s <span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">production database and volume-level backups.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102278</guid>
      <pubDate>Fri, 01 May 2026 12:10:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102278-company-database-deleted-by-ai-agent-what-security-leaders-need-to-know</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/01/AI-computer-chip-by-Immo-Wegmann.webp?t=1777650906" type="image/png" length="754546"/>
    </item>
    <item>
      <title>New Research: AI-Driven Cybercrime Led to a 389% Increase in Ransomware Victims </title>
      <author></author>
      <description>
        <![CDATA[<p>An overview of cyber threat trends from the previous year.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102277</guid>
      <pubDate>Thu, 30 Apr 2026 11:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102277-new-research-ai-driven-cybercrime-led-to-a-389-increase-in-ransomware-victims</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/30/Half-open-laptop-by-Agung-Raharja.webp?t=1777559747" type="image/png" length="177227"/>
    </item>
    <item>
      <title>Ransomware Responsible for 90% of Manufacturing Cyber Losses</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>When ransomware attacks affect the sector, the losses are significant.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102276</guid>
      <pubDate>Wed, 29 Apr 2026 11:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102276-ransomware-responsible-for-90-of-manufacturing-cyber-losses</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/29/Manufacturing-by-Simon-Kadula.webp?t=1777473450" type="image/png" length="630352"/>
    </item>
    <item>
      <title>Less Than 10% of Higher Education Has No Intention of Adopting AI</title>
      <description>
        <![CDATA[<p>The majority of universities have either adopted AI or intend to soon.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102220</guid>
      <pubDate>Tue, 28 Apr 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102220-less-than-10-of-higher-education-has-no-intention-of-adopting-ai</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/04-April/SEC-0426-News2-Feat-Slide1-1170x658.webp?t=1775662047" type="image/jpeg" length="106811"/>
    </item>
    <item>
      <title>2025 Saw Fewer Healthcare Breaches Than 2024</title>
      <description>
        <![CDATA[<p>2025 healthcare breaches dropped from 2024</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102219</guid>
      <pubDate>Tue, 28 Apr 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102219-2025-saw-fewer-healthcare-breaches-than-2024</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/04-April/SEC-0426-News1-Feat-Slide1-1170x658.webp?t=1775661643" type="image/jpeg" length="81736"/>
    </item>
    <item>
      <title>What the Medtronic Breach Means for Security Experts</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Security experts are sharing their insights on the broader implications of this breach. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102266</guid>
      <pubDate>Mon, 27 Apr 2026 12:30:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102266-what-the-medtronic-breach-means-for-security-experts</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/27/Laptop-and-coffee-in-shade-by-Guillermo-Latorre.webp?t=1777306421" type="image/png" length="371256"/>
    </item>
    <item>
      <title>ADT Breach Confirmed: Names, Phone Numbers, and Addresses Exposed</title>
      <author></author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">ADT discovered unauthorized access of customer and prospective customer information.&nbsp;</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102264</guid>
      <pubDate>Mon, 27 Apr 2026 08:30:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102264-adt-breach-confirmed-names-phone-numbers-and-addresses-exposed</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/27/ADT-on-wall-by-the-blowup.webp?t=1777292461" type="image/png" length="406047"/>
    </item>
    <item>
      <title>Netherlands Faces Greatest National Security Threat Since World War Two</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Dutch intelligence agency AIVD says the Netherlands is facing the greatest national security threat in decades.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102263</guid>
      <pubDate>Fri, 24 Apr 2026 13:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102263-netherlands-faces-greatest-national-security-threat-since-world-war-two</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/24/Netherlands-on-a-map-by-KOBU-Agency.webp?t=1777047639" type="image/png" length="401733"/>
    </item>
    <item>
      <title>Security Leaders Discuss the Claude Mythos Breach </title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>What security experts are saying about the Claude Mythos breach.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102253</guid>
      <pubDate>Thu, 23 Apr 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102253-security-leaders-discuss-the-claude-mythos-breach</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/23/AI-chip-by-Igor-Omilaev.webp?t=1776956192" type="image/png" length="845851"/>
    </item>
    <item>
      <title>NIST’s New Prioritization Criteria for CVEs, Examined by Experts</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">NIST recently changed how it handles CVEs.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102255</guid>
      <pubDate>Thu, 23 Apr 2026 11:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102255-nists-new-prioritization-criteria-for-cves-examined-by-experts</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/23/Green-padlock-on-keyboard-by-rupixen.webp?t=1776955351" type="image/png" length="306013"/>
    </item>
    <item>
      <title>Unauthorized Users Accessed Claude Mythos, New Reports Suggest</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Anthropic’s new AI model may have been accessed by unauthorized users.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102251</guid>
      <pubDate>Wed, 22 Apr 2026 13:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102251-unauthorized-users-accessed-claude-mythos-new-reports-suggest</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/22/Laptop-in-darkness-by-Hostaphoto.webp?t=1776877073" type="image/png" length="125623"/>
    </item>
    <item>
      <title>Hackers Claim 19M Records Stolen From French Government Agency</title>
      <author></author>
      <description>
        <![CDATA[<p>The <span style=" font-style: normal; font-weight: 300; letter-spacing: normal; orphans: 2; text-align: start; widows: 2; word-spacing: 0px; display: inline !important; float: none;">France Titres&nbsp;<span style=" font-style: normal; font-weight: 300; letter-spacing: normal; orphans: 2; text-align: start; widows: 2; word-spacing: 0px; display: inline !important; float: none;">discovered a security incident.&nbsp;</span></span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102248</guid>
      <pubDate>Wed, 22 Apr 2026 09:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102248-hackers-claim-19m-records-stolen-from-french-government-agency</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/22/French-flag-by-Rafael-Garcin.webp?t=1776860491" type="image/png" length="263048"/>
    </item>
    <item>
      <title>Security Leaders Discuss the Vercel Breach</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Security leaders are discussing the Vercel breach.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102246</guid>
      <pubDate>Tue, 21 Apr 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102246-security-leaders-discuss-the-vercel-breach</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/21/Office-supplies-by-Amy-Hirschi.webp?t=1776783392" type="image/png" length="332942"/>
    </item>
    <item>
      <title>US Security Agency Leverages Claude Mythos Despite Pentagon Blacklist</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Reports suggest that the NSA is using Claude Mythos.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102243</guid>
      <pubDate>Mon, 20 Apr 2026 13:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102243-us-security-agency-leverages-claude-mythos-despite-pentagon-blacklist</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/20/Aerial-view-of-America-by-NASA.webp?t=1776702474" type="image/png" length="629203"/>
    </item>
    <item>
      <title>Vercel Breach Originated From an Employee’s AI Tool</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>This breach occurred due to a <span style=" font-style: normal; font-weight: 400; letter-spacing: 0.1px; orphans: 2; text-align: start; widows: 2; word-spacing: 0px; display: inline !important; float: none;">third-party AI tool.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102242</guid>
      <pubDate>Mon, 20 Apr 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102242-vercel-breach-originated-from-an-employees-ai-tool</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/20/Computer-in-darkness-by-Nikita-Kachanovsky.webp?t=1776699474" type="image/png" length="299046"/>
    </item>
    <item>
      <title>58% of Organizations Spend Over 10 Hours a Month Securing AI-generated Code</title>
      <author></author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">A recent report by Cloudsmith found that 31% of organizations using AI-generated code spend 10 hours or less per month validating, auditing, or securing it.</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102241</guid>
      <pubDate>Mon, 20 Apr 2026 10:23:28 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102241-58-of-organizations-spend-over-10-hours-a-month-securing-ai-generated-code</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/20/chris-ried-ieic5Tq8YMk-unsplash.webp?t=1776694909" type="image/jpeg" length="132731"/>
    </item>
    <item>
      <title>Top 3 Cyber Insurance Incident Claims</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">A new report reveals the top three cyber incidents that account for a majority of reported claims.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102232</guid>
      <pubDate>Mon, 20 Apr 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102232-top-3-cyber-insurance-incident-claims</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/17/Laptop-keyboard-in-gradient-colorful-light-by-Jonas-Vandermeiren.webp?t=1776442444" type="image/png" length="151909"/>
    </item>
    <item>
      <title>What Are Security Experts Saying About OpenAI’s GPT-5.4-Cyber?</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">OpenAI has launched GPT-5.4-Cyber, a model optimized for defensive cybersecurity usage.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102235</guid>
      <pubDate>Thu, 16 Apr 2026 11:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102235-what-are-security-experts-saying-about-openais-gpt-54-cyber</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/15/Golden-lights-by-Joshua-Sortino.webp?t=1776273162" type="image/png" length="929161"/>
    </item>
    <item>
      <title>McGraw Hill Data Breach Caused by Salesforce Misconfiguration</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>McGraw Hill announced a data breach connected to a Salesforce misconfiguration.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102233</guid>
      <pubDate>Wed, 15 Apr 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102233-mcgraw-hill-data-breach-caused-by-salesforce-misconfiguration</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/15/Student-desks-in-a-room-by-Allen-Y.webp?t=1776266704" type="image/png" length="428886"/>
    </item>
    <item>
      <title>Venice Hydraulic Pump System Hacked, Hackers Claim Power to Create Floods</title>
      <author></author>
      <description>
        <![CDATA[<p>Venice’s hydraulic pump system was hacked. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102231</guid>
      <pubDate>Tue, 14 Apr 2026 12:30:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102231-venice-hydraulic-pump-system-hacked-hackers-claim-power-to-create-floods</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/14/Venice-by-Kit-Suman.webp?t=1776276358" type="image/png" length="771305"/>
    </item>
  </channel>
</rss>
