<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>News</title>
    <description>
      <![CDATA[]]>
    </description>
    <link>https://www.securitymagazine.com/rss/2766-news</link>
    <language>en-us</language>
    <item>
      <title>World Cloud Security Day: Breaking Down the State of the Cloud Cybersecurity and Physical Security</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>
A snapshot of the state of the cloud in cybersecurity and physical security.&nbsp;</p><br>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102204</guid>
      <pubDate>Fri, 03 Apr 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102204-world-cloud-security-day-breaking-down-the-state-of-the-cloud-cybersecurity-and-physical-security</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/03/Cloud-security-by-Growtika.webp?t=1775232056" type="image/png" length="255866"/>
    </item>
    <item>
      <title>AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Mercor has faced a breach of data.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102203</guid>
      <pubDate>Fri, 03 Apr 2026 08:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102203-ai-startup-mercor-which-works-with-open-ai-and-anthropic-confirms-data-breach</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/03/AI-by-Immo-Wegmann.webp?t=1775220033" type="image/png" length="617463"/>
    </item>
    <item>
      <title>8 in 10 AI Chatbots Likely to Help Plan Attacks, Hate Crimes</title>
      <author></author>
      <description>
        <![CDATA[<p>Most&nbsp;<span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">AI chatbots are likely to assist a user in planning a violent attack.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102201</guid>
      <pubDate>Thu, 02 Apr 2026 05:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102201-8-in-10-ai-chatbots-likely-to-help-plan-attacks-hate-crimes</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/01/Chatbot-prompt-screen-by-Zulfugar-Karimov.webp?t=1775062464" type="image/png" length="365644"/>
    </item>
    <item>
      <title>10 Data Security Stories to Know About (March 2026)</title>
      <author></author>
      <description>
        <![CDATA[<p><em>Security&nbsp;</em>magazine reviews 10 data security events from March 2026.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102198</guid>
      <pubDate>Wed, 01 Apr 2026 04:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102198-10-data-security-stories-to-know-about-march-2026</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/31/Keyboard-by-Vikas-Harijan.webp?t=1774975015" type="image/png" length="291242"/>
    </item>
    <item>
      <title>How to Grow Your Cybersecurity Skills, According to Experts</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>How are cybersecurity professionals developing their career for the modern era?&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102181</guid>
      <pubDate>Fri, 27 Mar 2026 05:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102181-how-to-grow-your-cybersecurity-skills-according-to-experts</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/23/Young-man-working-on-laptop-in-coffee-shop-by-Miguel-Dominguez.webp?t=1774285182" type="image/png" length="621832"/>
    </item>
    <item>
      <title>What Does It Take to Be an Outstanding CSO or CISO?</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Scott McHugh, Program Executive, Institute for Homeland Security at Sam Houston State University, discusses what it takes to be a great CSO or CISO in the modern age.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102171</guid>
      <pubDate>Wed, 25 Mar 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102171-what-does-it-take-to-be-an-outstanding-cso-or-ciso</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/12/McHugh-podcast-news-header.webp?t=1773332170" type="image/png" length="132615"/>
    </item>
    <item>
      <title>Security Leaders Share Thoughts on Foster City Cyberattack</title>
      <description>
        <![CDATA[<p>A ransomware attack on Foster City, California, triggered a state of emergency to access additional resources to keep systems up and running.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102196</guid>
      <pubDate>Tue, 24 Mar 2026 13:52:05 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102196-security-leaders-share-thoughts-on-foster-city-cyberattack</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/24/ilya-pavlov-OqtafYT5kTw-unsplash-(8).webp?t=1774374543" type="image/jpeg" length="136420"/>
    </item>
    <item>
      <title>3.7M Records Exposed, Many Belonging to Sears Home Services</title>
      <author></author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Three different databases were&nbsp;<span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">publicly exposed, amounting to 3.7 million records.&nbsp;</span></span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102188</guid>
      <pubDate>Mon, 23 Mar 2026 05:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102188-37m-records-exposed-many-belonging-to-sears-home-services</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/19/Code-by-Pankaj-Patel.webp?t=1773942658" type="image/png" length="367475"/>
    </item>
    <item>
      <title>Hackers Claim to Have Breached Streaming Service CrunchyRoll’s Data</title>
      <author></author>
      <description>
        <![CDATA[<p>Hackers claim&nbsp;<span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">that they breached Sony’s anime streaming service CrunchyRoll.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102195</guid>
      <pubDate>Mon, 23 Mar 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102195-hackers-claim-to-have-breached-streaming-service-crunchyrolls-data</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/23/Crunchyroll-by-Jonathan-Kemper.webp?t=1774287082" type="image/png" length="469059"/>
    </item>
    <item>
      <title>The FBI Buys Data to Track Movement, Location History</title>
      <author></author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Director Patel stated the FBI purchases data that can be leveraged to track a person’s movement and location history.</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102189</guid>
      <pubDate>Fri, 20 Mar 2026 04:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102189-the-fbi-buys-data-to-track-movement-location-history</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/19/Person-placing-location-pin-on-map-by-GeoJango-Maps.webp?t=1773946101" type="image/png" length="393550"/>
    </item>
    <item>
      <title>8M Confidential Crime Tips Hacked, Compromised</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">A hacker group claimed to breach a platform used for submitting tips about criminal events.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102191</guid>
      <pubDate>Thu, 19 Mar 2026 04:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102191-8m-confidential-crime-tips-hacked-compromised</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/19/Person-holding-phone-by-Gilles-Lambert.webp?t=1773951547" type="image/png" length="122968"/>
    </item>
    <item>
      <title>Trump’s Former Counter-Terrorism Official Investigated Over Alleged Leaks</title>
      <author></author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Joe Kent is under investigation for alleged leaks of classified information</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102187</guid>
      <pubDate>Thu, 19 Mar 2026 02:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102187-trumps-former-counter-terrorism-official-investigated-over-alleged-leaks</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/19/FBI-emblem-by-David-Trinks.webp?t=1773924947" type="image/png" length="818037"/>
    </item>
    <item>
      <title>Stryker Update: FBI Seizes Website of Iran-Linked Hackers</title>
      <author></author>
      <description>
        <![CDATA[<p>The FBI has seized the website of the Iranian-linked hackers believed to be behind the recent cyberattack against Stryker.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102190</guid>
      <pubDate>Thu, 19 Mar 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102190-stryker-update-fbi-seizes-website-of-iran-linked-hackers</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/19/Computer-with-binary-code-hovering-nearby-by-Steve-Johnson.webp?t=1773948437" type="image/png" length="376534"/>
    </item>
    <item>
      <title>GuardDog Telehealth Accesses Sensitive Medical Records Under False Pretenses</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">A telehealth organization accessed patient medical data in order to share it with law firms.&nbsp;</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102184</guid>
      <pubDate>Wed, 18 Mar 2026 11:05:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102184-guarddog-telehealth-accesses-sensitive-medical-records-under-false-pretenses</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/18/Spilled-pills-by-Etactics-Inc.webp?t=1773846220" type="image/png" length="209108"/>
    </item>
    <item>
      <title>Verizon Retail Customer Database Allegedly for Sale by Hackers: 6.3M Customers at Risk</title>
      <author></author>
      <description>
        <![CDATA[<p>One of the United States’ largest <span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Verizon Authorized Retailers&nbsp;<span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; widows: 2; word-spacing: 0px; display: inline !important; float: none;">may have been compromised.&nbsp;</span></span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102183</guid>
      <pubDate>Tue, 17 Mar 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102183-verizon-retail-customer-database-allegedly-for-sale-by-hackers-63m-customers-at-risk</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/17/Verizon-on-phone-screen-by-Marques-Thomas.webp?t=1773762370" type="image/png" length="572050"/>
    </item>
    <item>
      <title>Security Team Member Dies in Standoff with Dallas Police</title>
      <author></author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">A member of Democratic U.S. Rep. Jasmine Crockett’s security team was killed in a standoff with the Dallas police.&nbsp;</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102179</guid>
      <pubDate>Tue, 17 Mar 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102179-security-team-member-dies-in-standoff-with-dallas-police</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/17/Police-lights-by-Max-Fleischmann.webp?t=1773757343" type="image/png" length="471259"/>
    </item>
    <item>
      <title>Targeted Phishing Attack Breaches Biotech Company Data</title>
      <author></author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Intuitive faced a data breach due to a phishing attack.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102178</guid>
      <pubDate>Mon, 16 Mar 2026 11:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102178-targeted-phishing-attack-breaches-biotech-company-data</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/16/Stethoscope-in-monochrome-by-Hush-Naidoo-Jade-Photography.webp?t=1773673171" type="image/png" length="284105"/>
    </item>
    <item>
      <title>Why Are Platform Ecosystems — Like Salesforce — Often Targeted?</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Why is Salesforce — and other platforms like it <span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">— such an attractive target to cybercriminals?</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102172</guid>
      <pubDate>Fri, 13 Mar 2026 12:30:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102172-why-are-platform-ecosystems-like-salesforce-often-targeted</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/13/Monitors-with-keyboard-by-Fotis-Fotopoulos.webp?t=1773418594" type="image/png" length="340025"/>
    </item>
    <item>
      <title>Nuclear Facility Cyberattack Investigated as Possible Iranian Exploit</title>
      <author></author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Poland’s National Centre for Nuclear Research defended against a cyberattack.&nbsp;</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102170</guid>
      <pubDate>Thu, 12 Mar 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102170-nuclear-facility-cyberattack-investigated-as-possible-iranian-exploit</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/12/Nuclear-power-plant-by-Luk-Lehotsk.webp?t=1773323465" type="image/png" length="414474"/>
    </item>
    <item>
      <title>Suspected Iranian Cyberattack Targets U.S. Medtech Company Stryker</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Stryker, a major U.S. medical technology organization, has been disrupted by a cyberattack.&nbsp;</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102168</guid>
      <pubDate>Wed, 11 Mar 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102168-suspected-iranian-cyberattack-targets-us-medtech-company-stryker</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/11/Red-laptop-by-Mithun-V.webp?t=1773245268" type="image/png" length="487277"/>
    </item>
    <item>
      <title>Explosives Thrown in Attempted Terrorist Attack Near NYC Mayor’s Home</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Explosives were thrown&nbsp;outside of the residence of New York City Mayor&nbsp;Zohran Mamdani.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102167</guid>
      <pubDate>Tue, 10 Mar 2026 13:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102167-explosives-thrown-in-attempted-terrorist-attack-near-nyc-mayors-home</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/10/NYPD-car-by-Campbell-Jensen.webp?t=1773158172" type="image/png" length="535664"/>
    </item>
    <item>
      <title>Security Leaders Discuss Trump’s Cyber Strategy for America</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Security leaders share approval and critiques of Trump’s Cyber Strategy for America.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102166</guid>
      <pubDate>Tue, 10 Mar 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102166-security-leaders-discuss-trumps-cyber-strategy-for-america</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/10/American-flag-by-Laura-Seaman.webp?t=1773279400" type="image/png" length="407086"/>
    </item>
    <item>
      <title>Airport Security Challenges in the Midst of the DHS Shutdown</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>TSA is facing challenges due to the DHS shutdown.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102164</guid>
      <pubDate>Mon, 09 Mar 2026 11:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102164-airport-security-challenges-in-the-midst-of-the-dhs-shutdown</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/09/Airport-baggage-check-by-Phil-Mosley.webp?t=1773066755" type="image/png" length="593724"/>
    </item>
    <item>
      <title>Can the Industry Do More for Women in Security?</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">While women in security have seen forward progress, the path hasn’t always been linear.&nbsp;</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102162</guid>
      <pubDate>Fri, 06 Mar 2026 14:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102162-can-the-industry-do-more-for-women-in-security</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/06/Woman-in-suit-by-Vitaly-Gariev.webp?t=1773279401" type="image/png" length="292579"/>
    </item>
    <item>
      <title>Iran Conflict and Cybersecurity: What to Expect in the Next 30 Days</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>What to expect as&nbsp;<span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">the conflict between the United States and Iran unfolds.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102157</guid>
      <pubDate>Wed, 04 Mar 2026 12:00:27 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102157-iran-conflict-and-cybersecurity-what-to-expect-in-the-next-30-days</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/04/Iran-on-map-by-mana5280.webp?t=1773279400" type="image/png" length="866822"/>
    </item>
    <item>
      <title>Coupang Data Breach Leads to Q4 Losses</title>
      <author></author>
      <description>
        <![CDATA[<p>Coupang reported Q4 losses, with revenue totaling below the estimates of analysts. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102153</guid>
      <pubDate>Wed, 04 Mar 2026 05:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102153-coupang-data-breach-leads-to-q4-losses</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/02/Person-holding-phone-in-front-of-stock-market-by-Adam-migielski.webp?t=1772471176" type="image/png" length="316863"/>
    </item>
    <item>
      <title>1M Impacted by University of Hawaii Cancer Center Breach</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">The University of Hawaiʻi Cancer Center’s Epidemiology Division revealed it experienced a data breach.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102155</guid>
      <pubDate>Tue, 03 Mar 2026 14:35:26 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102155-1m-impacted-by-university-of-hawaii-cancer-center-breach</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/03/Half-open-laptop-by-Agung-Raharja.webp?t=1772566521" type="image/png" length="177227"/>
    </item>
    <item>
      <title>New Research: 45% Cybersecurity Leaders Work a “Sixth Day”</title>
      <author></author>
      <description>
        <![CDATA[<p>Nearly half of&nbsp;<span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">cybersecurity leaders are working 11 or more extra hours per week.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102152</guid>
      <pubDate>Tue, 03 Mar 2026 09:30:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102152-new-research-45-cybersecurity-leaders-work-a-sixth-day</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/02/Person-on-laptop-by-Windows.webp?t=1772462875" type="image/png" length="498953"/>
    </item>
    <item>
      <title>Iranian Apps, Websites Hacked Following US-Israeli Strikes</title>
      <author></author>
      <description>
        <![CDATA[<p>A wave of cyber operations targeted Iran.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102151</guid>
      <pubDate>Mon, 02 Mar 2026 09:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102151-iranian-apps-websites-hacked-following-us-israeli-strikes</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/02/Iranian-flag-by-engin-akyurt.webp?t=1772459206" type="image/png" length="666289"/>
    </item>
    <item>
      <title>4 Data Security Incidents to Know About (February 2026)</title>
      <author></author>
      <description>
        <![CDATA[<p><em>Security&nbsp;</em>magazine reviews four data security events, some of which had a widespread impact. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102149</guid>
      <pubDate>Mon, 02 Mar 2026 03:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102149-4-data-security-incidents-to-know-about-february-2026</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/27/Half-open-laptop-by-Ales-Nesetril.webp?t=1772209615" type="image/png" length="207387"/>
    </item>
  </channel>
</rss>
