<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>News</title>
    <description>
      <![CDATA[]]>
    </description>
    <link>https://www.securitymagazine.com/rss/2766-news</link>
    <language>en-us</language>
    <item>
      <title>Targeted Phishing Attack Breaches Biotech Company Data</title>
      <author></author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Intuitive faced a data breach due to a phishing attack.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102178</guid>
      <pubDate>Mon, 16 Mar 2026 11:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102178-targeted-phishing-attack-breaches-biotech-company-data</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/16/Stethoscope-in-monochrome-by-Hush-Naidoo-Jade-Photography.webp?t=1773673171" type="image/png" length="284105"/>
    </item>
    <item>
      <title>Why Are Platform Ecosystems — Like Salesforce — Often Targeted?</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Why is Salesforce — and other platforms like it <span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">— such an attractive target to cybercriminals?</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102172</guid>
      <pubDate>Fri, 13 Mar 2026 12:30:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102172-why-are-platform-ecosystems-like-salesforce-often-targeted</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/13/Monitors-with-keyboard-by-Fotis-Fotopoulos.webp?t=1773418594" type="image/png" length="340025"/>
    </item>
    <item>
      <title>Nuclear Facility Cyberattack Investigated as Possible Iranian Exploit</title>
      <author></author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Poland’s National Centre for Nuclear Research defended against a cyberattack.&nbsp;</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102170</guid>
      <pubDate>Thu, 12 Mar 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102170-nuclear-facility-cyberattack-investigated-as-possible-iranian-exploit</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/12/Nuclear-power-plant-by-Luk-Lehotsk.webp?t=1773323465" type="image/png" length="414474"/>
    </item>
    <item>
      <title>Suspected Iranian Cyberattack Targets U.S. Medtech Company Stryker</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Stryker, a major U.S. medical technology organization, has been disrupted by a cyberattack.&nbsp;</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102168</guid>
      <pubDate>Wed, 11 Mar 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102168-suspected-iranian-cyberattack-targets-us-medtech-company-stryker</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/11/Red-laptop-by-Mithun-V.webp?t=1773245268" type="image/png" length="487277"/>
    </item>
    <item>
      <title>Explosives Thrown in Attempted Terrorist Attack Near NYC Mayor’s Home</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Explosives were thrown&nbsp;outside of the residence of New York City Mayor&nbsp;Zohran Mamdani.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102167</guid>
      <pubDate>Tue, 10 Mar 2026 13:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102167-explosives-thrown-in-attempted-terrorist-attack-near-nyc-mayors-home</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/10/NYPD-car-by-Campbell-Jensen.webp?t=1773158172" type="image/png" length="535664"/>
    </item>
    <item>
      <title>Security Leaders Discuss Trump’s Cyber Strategy for America</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Security leaders share approval and critiques of Trump’s Cyber Strategy for America.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102166</guid>
      <pubDate>Tue, 10 Mar 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102166-security-leaders-discuss-trumps-cyber-strategy-for-america</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/10/American-flag-by-Laura-Seaman.webp?t=1773279400" type="image/png" length="407086"/>
    </item>
    <item>
      <title>Airport Security Challenges in the Midst of the DHS Shutdown</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>TSA is facing challenges due to the DHS shutdown.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102164</guid>
      <pubDate>Mon, 09 Mar 2026 11:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102164-airport-security-challenges-in-the-midst-of-the-dhs-shutdown</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/09/Airport-baggage-check-by-Phil-Mosley.webp?t=1773066755" type="image/png" length="593724"/>
    </item>
    <item>
      <title>Can the Industry Do More for Women in Security?</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">While women in security have seen forward progress, the path hasn’t always been linear.&nbsp;</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102162</guid>
      <pubDate>Fri, 06 Mar 2026 14:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102162-can-the-industry-do-more-for-women-in-security</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/06/Woman-in-suit-by-Vitaly-Gariev.webp?t=1773279401" type="image/png" length="292579"/>
    </item>
    <item>
      <title>Iran Conflict and Cybersecurity: What to Expect in the Next 30 Days</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>What to expect as&nbsp;<span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">the conflict between the United States and Iran unfolds.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102157</guid>
      <pubDate>Wed, 04 Mar 2026 12:00:27 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102157-iran-conflict-and-cybersecurity-what-to-expect-in-the-next-30-days</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/04/Iran-on-map-by-mana5280.webp?t=1773279400" type="image/png" length="866822"/>
    </item>
    <item>
      <title>Coupang Data Breach Leads to Q4 Losses</title>
      <author></author>
      <description>
        <![CDATA[<p>Coupang reported Q4 losses, with revenue totaling below the estimates of analysts. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102153</guid>
      <pubDate>Wed, 04 Mar 2026 05:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102153-coupang-data-breach-leads-to-q4-losses</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/02/Person-holding-phone-in-front-of-stock-market-by-Adam-migielski.webp?t=1772471176" type="image/png" length="316863"/>
    </item>
    <item>
      <title>1M Impacted by University of Hawaii Cancer Center Breach</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">The University of Hawaiʻi Cancer Center’s Epidemiology Division revealed it experienced a data breach.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102155</guid>
      <pubDate>Tue, 03 Mar 2026 14:35:26 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102155-1m-impacted-by-university-of-hawaii-cancer-center-breach</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/03/Half-open-laptop-by-Agung-Raharja.webp?t=1772566521" type="image/png" length="177227"/>
    </item>
    <item>
      <title>New Research: 45% Cybersecurity Leaders Work a “Sixth Day”</title>
      <author></author>
      <description>
        <![CDATA[<p>Nearly half of&nbsp;<span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">cybersecurity leaders are working 11 or more extra hours per week.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102152</guid>
      <pubDate>Tue, 03 Mar 2026 09:30:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102152-new-research-45-cybersecurity-leaders-work-a-sixth-day</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/02/Person-on-laptop-by-Windows.webp?t=1772462875" type="image/png" length="498953"/>
    </item>
    <item>
      <title>Iranian Apps, Websites Hacked Following US-Israeli Strikes</title>
      <author></author>
      <description>
        <![CDATA[<p>A wave of cyber operations targeted Iran.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102151</guid>
      <pubDate>Mon, 02 Mar 2026 09:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102151-iranian-apps-websites-hacked-following-us-israeli-strikes</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/02/Iranian-flag-by-engin-akyurt.webp?t=1772459206" type="image/png" length="666289"/>
    </item>
    <item>
      <title>4 Data Security Incidents to Know About (February 2026)</title>
      <author></author>
      <description>
        <![CDATA[<p><em>Security&nbsp;</em>magazine reviews four data security events, some of which had a widespread impact. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102149</guid>
      <pubDate>Mon, 02 Mar 2026 03:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102149-4-data-security-incidents-to-know-about-february-2026</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/27/Half-open-laptop-by-Ales-Nesetril.webp?t=1772209615" type="image/png" length="207387"/>
    </item>
    <item>
      <title>Montana National Guard Appoints First Ever Cyber Warfare Officer</title>
      <author></author>
      <description>
        <![CDATA[<p>This appointment aims to improve of the <span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; widows: 2; word-spacing: 0px; display: inline !important; float: none;">state’s&nbsp;</span>proactive cyber defense capabilities.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102148</guid>
      <pubDate>Fri, 27 Feb 2026 05:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102148-montana-national-guard-appoints-first-ever-cyber-warfare-officer</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/26/Montana-capitol-by-Steven-Cordes.webp?t=1772123947" type="image/png" length="573262"/>
    </item>
    <item>
      <title>How AI Could Impact Tax Season Security This Year</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>The risks surrounding tax season are varied.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102147</guid>
      <pubDate>Thu, 26 Feb 2026 03:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102147-how-ai-could-impact-tax-season-security-this-year</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/25/Money-tied-up-by-Sasun-Bughdaryan.webp?t=1772043545" type="image/png" length="350702"/>
    </item>
    <item>
      <title>Strategies for Security Leaders in the Midst of Skill Shortages</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>In this episode of Lock It Down with <em>Security</em> Magazine, Chief Security & Trust Officer Kory Daniels shares how security leaders struggling with skill shortages can make strategic tradeoffs to lessen their team’s burden.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102142</guid>
      <pubDate>Wed, 25 Feb 2026 12:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102142-strategies-for-security-leaders-in-the-midst-of-skill-shortages</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/20/Daniels-podcast-news-header.webp?t=1772642386" type="image/png" length="131691"/>
    </item>
    <item>
      <title>41% of Organizations Have Hired a Fake Candidate</title>
      <description>
        <![CDATA[<p>Deepfakes are leading to fraudulent job positions and hirings.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102140</guid>
      <pubDate>Mon, 23 Feb 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102140-41-of-organizations-have-hired-a-fake-candidate</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/02-February/SEC-0226-Global-News2-Slide2-1170x658.webp?t=1771603411" type="image/jpeg" length="139548"/>
    </item>
    <item>
      <title>Human-Related Security Risks Rose 90% in 2025</title>
      <description>
        <![CDATA[<p>2025 saw a rise in AI-related security risks.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102139</guid>
      <pubDate>Mon, 23 Feb 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102139-human-related-security-risks-rose-90-in-2025</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/02-February/SEC-0226-Global-News1-Slide1-1170x658.webp?t=1771602899" type="image/jpeg" length="69975"/>
    </item>
    <item>
      <title>The 25 Most Vulnerable Passwords of 2026</title>
      <author></author>
      <description>
        <![CDATA[<p>Research reveals the most insecure passwords of 2026.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102132</guid>
      <pubDate>Fri, 20 Feb 2026 12:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102132-the-25-most-vulnerable-passwords-of-2026</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/20/Glitched-password-screen-by-Egor-Komarov.webp?t=1771603563" type="image/png" length="357788"/>
    </item>
    <item>
      <title>1.2M Bank Accounts Exposed in French National Bank Account Registry Breach</title>
      <author></author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">It is currently unknown how many accounts had data accessed and/or extracted.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102133</guid>
      <pubDate>Thu, 19 Feb 2026 12:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102133-12m-bank-accounts-exposed-in-french-national-bank-account-registry-breach</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/19/Close-up-of-credit-card-by--.webp?t=1771520338" type="image/png" length="513915"/>
    </item>
    <item>
      <title>Global Leaders, Executives Exposed in Data Leak</title>
      <author></author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">A financial summit accidentally exposed the passports and state identity cards of more than 700 individuals.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102129</guid>
      <pubDate>Wed, 18 Feb 2026 08:36:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102129-global-leaders-executives-exposed-in-data-leak</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/18/Passport-by-Kelly-Sikkema.webp?t=1771421659" type="image/png" length="385040"/>
    </item>
    <item>
      <title>Conduent Data Breach: Overview and What to Know</title>
      <author></author>
      <description>
        <![CDATA[<p>This&nbsp;<span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">data incident is proving to have widespread repercussions.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102128</guid>
      <pubDate>Wed, 18 Feb 2026 05:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102128-conduent-data-breach-timeline-and-what-to-know</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/17/Half-open-laptop-by-Ales-Nesetril.webp?t=1771350749" type="image/png" length="207387"/>
    </item>
    <item>
      <title>Top 20 Healthcare Data Breaches of 2025</title>
      <author></author>
      <description>
        <![CDATA[<p><em>Security&nbsp;</em>magazine breaks down the top 20 breaches in healthcare for 2025.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102127</guid>
      <pubDate>Tue, 17 Feb 2026 05:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102127-top-20-healthcare-data-breaches-of-2025</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/16/Medical-supplies-by-Kristine-Wook.webp?t=1771464183" type="image/png" length="460581"/>
    </item>
    <item>
      <title>DHS Shutdown to Begin Saturday, February 14</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Funding for the Department of Homeland Security (DHS) will expire at 12 am on Saturday, February 14th.&nbsp;</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102125</guid>
      <pubDate>Fri, 13 Feb 2026 13:00:34 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102125-dhs-shutdown-to-begin-saturday-february-14</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/13/luke-michael-Tdwu35bCUj0-unsplash.webp?t=1772041698" type="image/jpeg" length="118039"/>
    </item>
    <item>
      <title>55% Healthcare Workers Faced Increases in Violence — How Is Security Adapting to Protect Them?</title>
      <author></author>
      <description>
        <![CDATA[<p>How are organizations responding to rising threats against healthcare staff? </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102119</guid>
      <pubDate>Wed, 11 Feb 2026 02:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102119-55-healthcare-workers-faced-increases-in-violence-how-is-security-adapting-to-protect-them</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/06/Healthcare-worker-by-Nappy.webp?t=1770858201" type="image/png" length="349288"/>
    </item>
    <item>
      <title>Epstein File Data Security Update: Raw Code Found in Emails</title>
      <author></author>
      <description>
        <![CDATA[<p>Reports suggest&nbsp;<span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">raw email data was found in select Epstein files.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102120</guid>
      <pubDate>Fri, 06 Feb 2026 12:10:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102120-epstein-file-data-security-update-raw-code-found-in-emails</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/06/Coding-by-Markus-Spiske.webp?t=1770858202" type="image/png" length="633360"/>
    </item>
    <item>
      <title>How to Protect Organizations During the Winter Olympics, According to CISOs</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>CISOs analyze Winter Olympic threats such as phishing, fraud and more.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102115</guid>
      <pubDate>Thu, 05 Feb 2026 11:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102115-how-to-protect-organizations-during-the-winter-olympics-according-to-cisos</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/05/Person-skiing-by-Maarten-Duineveld.webp?t=1770306231" type="image/png" length="614853"/>
    </item>
    <item>
      <title>Epstein Files Leak Sensitive Data, Victim Information and Credentials</title>
      <author></author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Thousands of records released in relation to Jeffrey Epstein have been retracted due to<span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">&nbsp;inadequate redactions.&nbsp;</span></span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102113</guid>
      <pubDate>Wed, 04 Feb 2026 11:45:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102113-epstein-files-leak-sensitive-data-victim-information-and-credentials</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/04/Digital-cursor-by-Liam-Briese.webp?t=1770223099" type="image/png" length="11157"/>
    </item>
    <item>
      <title>7 Data Breaches, Exposures to Know About (January 2026)</title>
      <author></author>
      <description>
        <![CDATA[<p>7 data incidents that made headlines in January.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102110</guid>
      <pubDate>Wed, 04 Feb 2026 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102110-7-data-breaches-exposures-to-know-about-january-2026</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/03/Laptop-with-coding-on-ground-by-Blake-Connally.webp?t=1770144324" type="image/png" length="252709"/>
    </item>
  </channel>
</rss>
