<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>Cybersecurity</title>
    <description>
      <![CDATA[<style>

.taxonomy-header__description{

width: 675px !important;

max-width: 100% !important;

}

</style>


<p style="font-size: 12px; text-align: right;"><em>Image courtesy of:  JuSun (E+)</em></p>

<p>Stay ahead in cybersecurity with the latest news, strategies, and technologies to protect organizations from evolving digital threats and cyber attacks.</p>]]>
    </description>
    <link>https://www.securitymagazine.com/rss/2788</link>
    <language>en-us</language>
    <item>
      <title>Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen</title>
      <author></author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Data has allegedly been stolen from a state-run Chinese supercomputer.</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102225</guid>
      <pubDate>Thu, 09 Apr 2026 15:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102225-chinese-supercomputer-allegedly-hacked-10-petabytes-of-data-stolen</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/09/Cables-plugged-in-by-Scott-Rodgerson.webp?t=1775761808" type="image/png" length="464149"/>
    </item>
    <item>
      <title>Iranian-Linked Cyber Actors Target US Critical Infrastructure, Security Leaders Respond</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>CISA warns that Iranian-connected cyber actors are focusing U.S. critical infrastructure. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102221</guid>
      <pubDate>Wed, 08 Apr 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102221-iranian-linked-cyber-actors-target-us-critical-infrastructure-security-leaders-respond</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/08/Power-lines-by-Yuan-Yang.webp?t=1775663200" type="image/png" length="497945"/>
    </item>
    <item>
      <title>LAPD Records Hacked and Exposed</title>
      <author></author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">A data breach&nbsp;</span>has lead to the exposure of sensitive LAPD records.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102215</guid>
      <pubDate>Wed, 08 Apr 2026 05:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102215-lapd-records-hacked-and-exposed</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/08/Police-in-road-by-AJ-Colores.webp?t=1775656677" type="image/png" length="765393"/>
    </item>
    <item>
      <title>Ransomware Response: How Businesses Regain Control Under Pressure</title>
      <description>
        <![CDATA[<p>You can’t control when ransomware attacks happen, but you can control how you respond.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102212</guid>
      <pubDate>Wed, 08 Apr 2026 05:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102212-ransomware-response-how-businesses-regain-control-under-pressure</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/07/Head-in-front-of-monitors-by-Kevin-Horvat.webp?t=1775572604" type="image/png" length="385769"/>
    </item>
    <item>
      <title>Healthcare Executives Face a New Era of Personal Risk</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Protecting executives’ digital and physical environments is no longer optional.&nbsp;</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102208</guid>
      <pubDate>Tue, 07 Apr 2026 04:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102208-healthcare-executives-face-a-new-era-of-personal-risk</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/06/Man-on-laptop-by-Vitaly-Gariev.webp?t=1775680873" type="image/png" length="346927"/>
    </item>
    <item>
      <title>New Trump Administration Budget Cuts $707M from CISA Funding</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>The White House plans to cut $707M from CISA funding.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102213</guid>
      <pubDate>Tue, 07 Apr 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102213-new-trump-administration-budget-cuts-707m-from-cisa-funding</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/07/United-States-capitol-by-Louis-Velazquez.webp?t=1775573360" type="image/png" length="590390"/>
    </item>
    <item>
      <title>Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Security leaders discuss this breach and share insights.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102207</guid>
      <pubDate>Mon, 06 Apr 2026 11:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102207-breach-of-fbi-surveillance-system-considered-a-major-incident-security-experts-weigh-in</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/06/Padlock-with-computer-keys-by-FlyD.webp?t=1775486057" type="image/png" length="508835"/>
    </item>
    <item>
      <title>World Cloud Security Day: Breaking Down the State of Cloud Cybersecurity and Physical Security</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>
A snapshot of the state of the cloud in cybersecurity and physical security.&nbsp;</p><br>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102204</guid>
      <pubDate>Fri, 03 Apr 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102204-world-cloud-security-day-breaking-down-the-state-of-the-cloud-cybersecurity-and-physical-security</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/03/Cloud-security-by-Growtika.webp?t=1775232056" type="image/png" length="255866"/>
    </item>
    <item>
      <title>AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Mercor has faced a breach of data.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102203</guid>
      <pubDate>Fri, 03 Apr 2026 08:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102203-ai-startup-mercor-which-works-with-open-ai-and-anthropic-confirms-data-breach</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/03/AI-by-Immo-Wegmann.webp?t=1775220033" type="image/png" length="617463"/>
    </item>
    <item>
      <title>Stakeholder Confidence in the Age of Digital Threats: PR as a Security Asset</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Every cyber incident also creates a communication challenge that directly affects stakeholder confidence.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102202</guid>
      <pubDate>Fri, 03 Apr 2026 05:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102202-stakeholder-confidence-in-the-age-of-digital-threats-pr-as-a-security-asset</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/02/Conference-room-by-Ninthgrid.webp?t=1775142497" type="image/png" length="470607"/>
    </item>
    <item>
      <title>10 Data Security Stories to Know About (March 2026)</title>
      <author></author>
      <description>
        <![CDATA[<p><em>Security&nbsp;</em>magazine reviews 10 data security events from March 2026.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102198</guid>
      <pubDate>Wed, 01 Apr 2026 04:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102198-10-data-security-stories-to-know-about-march-2026</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/31/Keyboard-by-Vikas-Harijan.webp?t=1774975015" type="image/png" length="291242"/>
    </item>
    <item>
      <title>Tax Season Means Phishing Season: How Individuals and Businesses Can Protect Themselves</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Tax season-related phishing attacks have gotten more sophisticated as threat actors increasingly leverage generative AI.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102192</guid>
      <pubDate>Tue, 31 Mar 2026 04:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102192-tax-season-means-phishing-season-how-individuals-and-businesses-can-protect-themselves</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/23/Calculator-with-pen-and-notebook-by-Recha-Oktaviani.webp?t=1774281830" type="image/png" length="344356"/>
    </item>
    <item>
      <title>How to Grow Your Cybersecurity Skills, According to Experts</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>How are cybersecurity professionals developing their career for the modern era?&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102181</guid>
      <pubDate>Fri, 27 Mar 2026 05:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102181-how-to-grow-your-cybersecurity-skills-according-to-experts</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/23/Young-man-working-on-laptop-in-coffee-shop-by-Miguel-Dominguez.webp?t=1774285182" type="image/png" length="621832"/>
    </item>
    <item>
      <title>Breaking Down “The Mosaic Effect”</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><em>Security&nbsp;</em>magazine talks with Luke Norris, C<span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">o-Founder and CEO of Kamiwaza, about <span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">“the mosaic effect” and how AI is shaping it today.&nbsp;</span></span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102186</guid>
      <pubDate>Thu, 26 Mar 2026 04:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102186-breaking-down-the-mosaic-effect</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/18/SEC_Web_5Minutes-Norris-0326_1170x658.webp?t=1773855022" type="image/jpeg" length="84529"/>
    </item>
    <item>
      <title>Security Leaders Share Thoughts on Foster City Cyberattack</title>
      <description>
        <![CDATA[<p>A ransomware attack on Foster City, California, triggered a state of emergency to access additional resources to keep systems up and running.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102196</guid>
      <pubDate>Tue, 24 Mar 2026 13:52:05 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102196-security-leaders-share-thoughts-on-foster-city-cyberattack</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/24/ilya-pavlov-OqtafYT5kTw-unsplash-(8).webp?t=1774374543" type="image/jpeg" length="136420"/>
    </item>
    <item>
      <title>The AI Efficacy Asymmetry Problem</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">While we have AI models that hallucinate, threat actors have an asymmetric advantage.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102180</guid>
      <pubDate>Tue, 24 Mar 2026 03:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102180-the-ai-efficacy-asymmetry-problem</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/17/Blurry-keyboard-by-Mohamed-Marey.webp?t=1773759029" type="image/png" length="373204"/>
    </item>
    <item>
      <title>3.7M Records Exposed, Many Belonging to Sears Home Services</title>
      <author></author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Three different databases were&nbsp;<span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">publicly exposed, amounting to 3.7 million records.&nbsp;</span></span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102188</guid>
      <pubDate>Mon, 23 Mar 2026 05:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102188-37m-records-exposed-many-belonging-to-sears-home-services</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/19/Code-by-Pankaj-Patel.webp?t=1773942658" type="image/png" length="367475"/>
    </item>
    <item>
      <title>Hackers Claim to Have Breached Streaming Service CrunchyRoll’s Data</title>
      <author></author>
      <description>
        <![CDATA[<p>Hackers claim&nbsp;<span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">that they breached Sony’s anime streaming service CrunchyRoll.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102195</guid>
      <pubDate>Mon, 23 Mar 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102195-hackers-claim-to-have-breached-streaming-service-crunchyrolls-data</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/23/Crunchyroll-by-Jonathan-Kemper.webp?t=1774287082" type="image/png" length="469059"/>
    </item>
    <item>
      <title>Taming the Threat Beast: Building a Threat-Led Cybersecurity Program</title>
      <description>
        <![CDATA[<p>Moving from noisy threat feeds to focused intelligence that security teams can actually act on.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102175</guid>
      <pubDate>Fri, 20 Mar 2026 09:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102175-taming-the-threat-beast-building-a-threat-led-cybersecurity-program</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/03-March/SEC-0326-Cyber-Feat-Slide1-1170x658.webp?t=1775680875" type="image/jpeg" length="198421"/>
    </item>
    <item>
      <title>The FBI Buys Data to Track Movement, Location History</title>
      <author></author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Director Patel stated the FBI purchases data that can be leveraged to track a person’s movement and location history.</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102189</guid>
      <pubDate>Fri, 20 Mar 2026 04:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102189-the-fbi-buys-data-to-track-movement-location-history</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/19/Person-placing-location-pin-on-map-by-GeoJango-Maps.webp?t=1773946101" type="image/png" length="393550"/>
    </item>
    <item>
      <title>8M Confidential Crime Tips Hacked, Compromised</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">A hacker group claimed to breach a platform used for submitting tips about criminal events.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102191</guid>
      <pubDate>Thu, 19 Mar 2026 04:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102191-8m-confidential-crime-tips-hacked-compromised</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/19/Person-holding-phone-by-Gilles-Lambert.webp?t=1773951547" type="image/png" length="122968"/>
    </item>
    <item>
      <title>Trump’s Former Counter-Terrorism Official Investigated Over Alleged Leaks</title>
      <author></author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Joe Kent is under investigation for alleged leaks of classified information</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102187</guid>
      <pubDate>Thu, 19 Mar 2026 02:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102187-trumps-former-counter-terrorism-official-investigated-over-alleged-leaks</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/19/FBI-emblem-by-David-Trinks.webp?t=1773924947" type="image/png" length="818037"/>
    </item>
    <item>
      <title>Stryker Update: FBI Seizes Website of Iran-Linked Hackers</title>
      <author></author>
      <description>
        <![CDATA[<p>The FBI has seized the website of the Iranian-linked hackers believed to be behind the recent cyberattack against Stryker.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102190</guid>
      <pubDate>Thu, 19 Mar 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102190-stryker-update-fbi-seizes-website-of-iran-linked-hackers</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/19/Computer-with-binary-code-hovering-nearby-by-Steve-Johnson.webp?t=1773948437" type="image/png" length="376534"/>
    </item>
    <item>
      <title>Threat Actors Target the Entire Retail Supply Chain</title>
      <description>
        <![CDATA[<p>The full supply chain is at risk for cyberattacks.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102174</guid>
      <pubDate>Wed, 18 Mar 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102174-threat-actors-target-the-entire-retail-supply-chain</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/03-March/SEC-0326-News2-Feat-Slide1-1170x658.webp?t=1773666213" type="image/jpeg" length="120974"/>
    </item>
    <item>
      <title>GuardDog Telehealth Accesses Sensitive Medical Records Under False Pretenses</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">A telehealth organization accessed patient medical data in order to share it with law firms.&nbsp;</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102184</guid>
      <pubDate>Wed, 18 Mar 2026 11:05:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102184-guarddog-telehealth-accesses-sensitive-medical-records-under-false-pretenses</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/18/Spilled-pills-by-Etactics-Inc.webp?t=1773846220" type="image/png" length="209108"/>
    </item>
    <item>
      <title>Fear of Surveillance Leads to Increased VPN Use</title>
      <description>
        <![CDATA[<p>Americans are using VPNs for additional privacy.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102173</guid>
      <pubDate>Wed, 18 Mar 2026 08:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102173-fear-of-surveillance-leads-to-increased-vpn-use</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/03-March/SEC-0326-News1-Feat-Slide1-1170x658.webp?t=1773665614" type="image/jpeg" length="125574"/>
    </item>
    <item>
      <title>Document Protection: Why Hybrid Storage Is the Future of Security </title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Strategically choose which data lives on a server and which lives physically.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102177</guid>
      <pubDate>Tue, 17 Mar 2026 02:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102177-document-protection-why-hybrid-storage-is-the-future-of-security</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/16/Open-filing-cabinet-by-Maksym-Kaharlytskyi.webp?t=1773670622" type="image/png" length="473786"/>
    </item>
    <item>
      <title>Verizon Retail Customer Database Allegedly for Sale by Hackers: 6.3M Customers at Risk</title>
      <author></author>
      <description>
        <![CDATA[<p>One of the United States’ largest <span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Verizon Authorized Retailers&nbsp;<span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; widows: 2; word-spacing: 0px; display: inline !important; float: none;">may have been compromised.&nbsp;</span></span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102183</guid>
      <pubDate>Tue, 17 Mar 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102183-verizon-retail-customer-database-allegedly-for-sale-by-hackers-63m-customers-at-risk</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/17/Verizon-on-phone-screen-by-Marques-Thomas.webp?t=1773762370" type="image/png" length="572050"/>
    </item>
    <item>
      <title>Targeted Phishing Attack Breaches Biotech Company Data</title>
      <author></author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Intuitive faced a data breach due to a phishing attack.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102178</guid>
      <pubDate>Mon, 16 Mar 2026 11:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102178-targeted-phishing-attack-breaches-biotech-company-data</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/16/Stethoscope-in-monochrome-by-Hush-Naidoo-Jade-Photography.webp?t=1773673171" type="image/png" length="284105"/>
    </item>
    <item>
      <title>Why Are Platform Ecosystems — Like Salesforce — Often Targeted?</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Why is Salesforce — and other platforms like it <span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">— such an attractive target to cybercriminals?</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102172</guid>
      <pubDate>Fri, 13 Mar 2026 12:30:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102172-why-are-platform-ecosystems-like-salesforce-often-targeted</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/13/Monitors-with-keyboard-by-Fotis-Fotopoulos.webp?t=1773418594" type="image/png" length="340025"/>
    </item>
  </channel>
</rss>
