<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>Cybersecurity</title>
    <description>
      <![CDATA[<style>

.taxonomy-header__description{

width: 675px !important;

max-width: 100% !important;

}

</style>


<p style="font-size: 12px; text-align: right;"><em>Image courtesy of:  JuSun (E+)</em></p>

<p>Stay ahead in cybersecurity with the latest news, strategies, and technologies to protect organizations from evolving digital threats and cyber attacks.</p>]]>
    </description>
    <link>https://www.securitymagazine.com/rss/2788-cybersecurity</link>
    <language>en-us</language>
    <item>
      <title>Why CISA Accepting KEV Nominations Is So Important</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">CISA announced that it will be accepting nominations to its Known Exploited Vulnerabilities (KEV) catalog.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102317</guid>
      <pubDate>Fri, 22 May 2026 11:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102317-why-cisa-accepting-kev-nominations-is-so-important</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/22/Laptop-with-green-code-by-Moritz-Erken.webp?t=1779459779" type="image/png" length="374989"/>
    </item>
    <item>
      <title>Schools Blackmailed with Explicit AI Deepfakes of Students</title>
      <author></author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Images on school websites and social media accounts are being leveraged by cybercriminals to create sexually explicit deepfakes of students.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102316</guid>
      <pubDate>Thu, 21 May 2026 14:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102316-schools-blackmailed-with-explicit-ai-deepfakes-of-students</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/21/Student-desks-in-a-room-by-Allen-Y.webp?t=1779386289" type="image/png" length="428886"/>
    </item>
    <item>
      <title>Security Leaders Should Prepare for World Cup Scams</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">It’s likely that cybercriminals will increase scam activity leading up to and during this event.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102315</guid>
      <pubDate>Thu, 21 May 2026 11:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102315-security-leaders-should-prepare-for-world-cup-scams</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/21/Soccer-ball-by-Wesley-Tingey.webp?t=1779373738" type="image/png" length="812516"/>
    </item>
    <item>
      <title>Strategies, Expert Insights from the 2026 Verizon DBIR</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">The overarching theme of this year’s report is “keeping a strong foundation in the face of change.”</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102313</guid>
      <pubDate>Thu, 21 May 2026 09:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102313-strategies-expert-insights-from-the-2026-verizon-dbir</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/20/Padlock-with-computer-keys-by-FlyD.webp?t=1779294387" type="image/png" length="508835"/>
    </item>
    <item>
      <title>Financial Services, Cybersecurity and the Evolving Threat Landscape</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>How can financial institutions manage evolving cyber threats? </p><br>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102310</guid>
      <pubDate>Wed, 20 May 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102310-financial-services-cybersecurity-and-the-evolving-threat-landscape</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/19/SEC_Web_5Minutes-Farol-0526_1170x658.webp?t=1779207756" type="image/jpeg" length="94508"/>
    </item>
    <item>
      <title>GitHub Breached, Internal Repositories Exposed</title>
      <author></author>
      <description>
        <![CDATA[<p>GitHub experienced a cyber incident. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102312</guid>
      <pubDate>Wed, 20 May 2026 09:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102312-github-breached-internal-repositories-exposed</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/20/Coding-on-screen-by-Caspar-Camille-Rubin.webp?t=1779279954" type="image/png" length="291675"/>
    </item>
    <item>
      <title>Should Customers Worry About the 7-Eleven Data Breach?</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Is the average 7-Eleven customer at risk from the recent data breach?&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102311</guid>
      <pubDate>Tue, 19 May 2026 14:15:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102311-should-customers-worry-about-the-7-eleven-data-breach</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/19/7-Eleven-storefront-by-James-Butterly.webp?t=1779213773" type="image/png" length="441480"/>
    </item>
    <item>
      <title>The Glasswing Warning: What Companies Outside the Inner Circle Must Do Now</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">The Mythos threat is arriving at exactly the wrong moment for most enterprises.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102307</guid>
      <pubDate>Tue, 19 May 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102307-the-glasswing-warning-what-companies-outside-the-inner-circle-must-do-now</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/18/Chess-board-by-Felix-Mittermeier.webp?t=1779113422" type="image/png" length="236726"/>
    </item>
    <item>
      <title>123,000 Impacted by American Lending Center’s Year-Old Breach</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">The American Lending Center notified consumers of a data breach nearly a year after it occured.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102309</guid>
      <pubDate>Mon, 18 May 2026 13:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102309-123-000-impacted-by-year-old-breach</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/18/Calendar-with-pins-by-Towfiqu-barbhuiya.webp?t=1779120656" type="image/png" length="233997"/>
    </item>
    <item>
      <title>Reframing MFA Bypass: Four Identity Gaps Attackers Exploit </title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">The misnomer of ‘MFA Bypass’ keeps MFA at the center of a problem it cannot solve alone.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102304</guid>
      <pubDate>Mon, 18 May 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102304-reframing-mfa-bypass-four-identity-gaps-attackers-exploit</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/15/Laptop-in-darkness-by-Hostaphoto.webp?t=1779326126" type="image/png" length="125623"/>
    </item>
    <item>
      <title>MENA Region Runs First-of-its-Kind Cybercrime Operation, 201 Arrested</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; widows: 2; word-spacing: 0px; display: inline !important; float: none;">The Middle East and North Africa (MENA) region, also referred to as Southwest Asia and North Africa (SWANA), managed a first-of-its-kind cybercrime operation between October 2025 and February 2026.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102308</guid>
      <pubDate>Mon, 18 May 2026 10:23:56 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102308-mena-region-runs-first-of-its-kind-cybercrime-operation-201-arrested</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/18/kevin-horvat-Pyjp2zmxuLk-unsplash.webp?t=1779326127" type="image/jpeg" length="110101"/>
    </item>
    <item>
      <title>Product Spotlight on Risk Assessment Monitoring</title>
      <description>
        <![CDATA[<p><em>Security</em> magazine highlights a few risk monitoring solutions for 2026.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102271</guid>
      <pubDate>Mon, 18 May 2026 09:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102271-product-spotlight-on-risk-assessment-monitoring</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/05-May/SEC-0526-ProdSpot-Feat_1170x658.webp?t=1777380490" type="image/jpeg" length="93529"/>
    </item>
    <item>
      <title>Did Iran Hack Tank Readers at US Gas Stations? Security Leaders Discuss</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Security leaders share their thoughts on the attack, Iran’s potential involvement and the broader implications. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102306</guid>
      <pubDate>Fri, 15 May 2026 16:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102306-did-iran-hack-tank-readers-at-us-gas-stations-security-leaders-discuss</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/15/Gas-station-by-Hans-Eiskonen.webp?t=1778875430" type="image/png" length="249372"/>
    </item>
    <item>
      <title>2025 Saw a Surge in Wireless Vulnerabilities</title>
      <description>
        <![CDATA[<p>Wireless vulnerabilities rose in 2025.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102270</guid>
      <pubDate>Fri, 15 May 2026 08:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102270-2025-saw-a-surge-in-wireless-vulnerabilities</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/05-May/SEC-0526-News3-Feat-Slide1-1170x658.webp?t=1777322198" type="image/jpeg" length="123566"/>
    </item>
    <item>
      <title>Funding Has Limited Security Readiness</title>
      <description>
        <![CDATA[<p>Limited security funding opens organizations to threat actors.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102269</guid>
      <pubDate>Fri, 15 May 2026 08:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102269-funding-has-limited-security-readiness</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/05-May/SEC-0526-News2-Feat-Slide1-1170x658.webp?t=1777321953" type="image/jpeg" length="125156"/>
    </item>
    <item>
      <title>AI Makes Phishing Scams Harder to Identify in the Workplace</title>
      <description>
        <![CDATA[<p>Phishing grows harder to identify in the age of AI.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102268</guid>
      <pubDate>Fri, 15 May 2026 08:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102268-ai-makes-phishing-scams-harder-to-identify-in-the-workplace</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/05-May/SEC-0526-News1-Feat-Slide1-1170x658.webp?t=1777321628" type="image/jpeg" length="64207"/>
    </item>
    <item>
      <title>Foxconn Confirms Cyberattack, Security Experts Discuss</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Foxconn confirmed a cyberattack has disrupted some of its North American facilities</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102301</guid>
      <pubDate>Thu, 14 May 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102301-foxconn-confirms-cyberattack-security-experts-discuss</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/14/Laptop-and-monitor-by-Glen-Carrie.webp?t=1779326127" type="image/png" length="339529"/>
    </item>
    <item>
      <title>Expert Insights on the West Pharmaceutical Ransomware Attack</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">West Pharmaceutical Services experienced a ransomware incident.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102300</guid>
      <pubDate>Thu, 14 May 2026 11:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102300-expert-insights-on-the-west-pharmaceutical-ransomware-attack</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/14/Pills-spilled-by-Towfiqu-barbhuiya.webp?t=1778769586" type="image/png" length="221040"/>
    </item>
    <item>
      <title>The Bench You'll Need in Three Years Depends on Decisions You Make Now</title>
      <description>
        <![CDATA[<p>Today’s hiring shortcut is tomorrow’s talent shortage.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102299</guid>
      <pubDate>Thu, 14 May 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102299-the-bench-youll-need-in-three-years-depends-on-decisions-you-make-now</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/13/Woman-by-whiteboard-by-ThisisEngineering.webp?t=1779326127" type="image/png" length="302550"/>
    </item>
    <item>
      <title>What Security Leaders Say About the First AI-Developed Zero-Day Exploit</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Security leaders discuss the first AI-created&nbsp;<span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">zero-day exploit.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102298</guid>
      <pubDate>Wed, 13 May 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102298-what-security-leaders-say-about-the-first-ai-developed-zero-day-exploit</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/13/Coding-by-Walkator.webp?t=1778685541" type="image/png" length="846347"/>
    </item>
    <item>
      <title>Cybersecurity Is No Longer a Gatekeeper, But the Engine of Delivery Across Digital Economy</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Cybersecurity is no longer a function that can be delegated and reviewed after the fact.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102297</guid>
      <pubDate>Wed, 13 May 2026 08:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102297-cybersecurity-is-no-longer-a-gatekeeper-but-the-engine-of-delivery-across-digital-economy</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/13/Glowing-fibers-by-Luke-Jones.webp?t=1779326126" type="image/png" length="660440"/>
    </item>
    <item>
      <title>Top 2026 Security Conferences</title>
      <description>
        <![CDATA[<p style="box-sizing: border-box; font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; widows: 2; word-spacing: 0px;"><em style="box-sizing: border-box;">Security&nbsp;</em>magazine offers a roundup of security conferences taking place in 2026.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102296</guid>
      <pubDate>Mon, 11 May 2026 13:46:26 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102296-top-2026-security-conferences</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/11/SEC_security-conferences-of-2026.webp?t=1778521334" type="image/jpeg" length="178058"/>
    </item>
    <item>
      <title>AI Will Tell Your Breach Story for the Next Two Years — Day One Decides What It Says</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">The companies that win the AI-era reputation fight will be the ones whose CISOs and CCOs share a line item, a runbook, and a dashboard.&nbsp;</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102295</guid>
      <pubDate>Fri, 08 May 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102295-ai-will-tell-your-breach-story-for-the-next-two-years-day-one-decides-what-it-says</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/07/Megaphone-by-Igor-Omilaev.webp?t=1779326128" type="image/png" length="664838"/>
    </item>
    <item>
      <title>10 Data Breaches to Know About (April 2026)</title>
      <author></author>
      <description>
        <![CDATA[<p>A roundup of recent data breach stories.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102282</guid>
      <pubDate>Fri, 08 May 2026 08:46:58 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102282-10-data-breaches-to-know-about-april-2026</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/01/Opened-padlock-on-computer-keyboard-by-Sasun-Bughdaryan.webp?t=1777662611" type="image/png" length="307414"/>
    </item>
    <item>
      <title>Research: Microsoft Edge Loads Stored Passwords in Cleartext</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>A researcher found that Microsoft Edge will load <span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; widows: 2; word-spacing: 0px; display: inline !important; float: none;">saved passwords into memory in plaintext, even when they are not being used.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102294</guid>
      <pubDate>Thu, 07 May 2026 12:30:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102294-research-microsoft-edge-loads-stored-passwords-in-cleartext</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/07/Laptop-with-desktop-screen-showing-by-Sunrise-King.webp?t=1778170941" type="image/png" length="282476"/>
    </item>
    <item>
      <title>Will This World Password Day Be the Last?</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Passwords have long been an integral part of online security. But this year, some cybersecurity experts are pushing for this to change.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102293</guid>
      <pubDate>Thu, 07 May 2026 11:30:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102293-will-this-world-password-day-be-the-last</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/07/Keys-on-yellow-background-by-Alp-Duran.webp?t=1778167213" type="image/png" length="411957"/>
    </item>
    <item>
      <title>Synthetic Identities Are Redefining Trust in Biometric Systems</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Standards for identity verification must evolve to address how inputs are introduced, processed and validated before matching occurs.&nbsp;</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102291</guid>
      <pubDate>Thu, 07 May 2026 01:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102291-synthetic-identities-are-redefining-trust-in-biometric-systems</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/06/Rendered-human-made-from-blocks-by-Pawel-Czerwinski.webp?t=1779326128" type="image/png" length="201182"/>
    </item>
    <item>
      <title>Security Experts Discuss Proposed Government Patching Deadlines</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">U.S. cyber officials are considering shortening the deadline for fixing critical vulnerabilities in government IT, and security experts are sharing their thoughts.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102292</guid>
      <pubDate>Wed, 06 May 2026 12:09:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102292-security-experts-discuss-proposed-government-patching-deadlines</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/06/Keyboard-by-ic-Ci.webp?t=1778080922" type="image/png" length="200840"/>
    </item>
    <item>
      <title>Cybersecurity Professionals Need to Think Like Business Leaders</title>
      <description>
        <![CDATA[<p>When CISOs, CIOs, and other cyber leaders approach the board, they often run into a familiar problem: the C-suite doesn’t speak their language.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102288</guid>
      <pubDate>Wed, 06 May 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102288-cybersecurity-professionals-need-to-think-like-business-leaders</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/05/Conference-room-by-Nastuh-Abootalebi.webp?t=1777992516" type="image/png" length="448831"/>
    </item>
    <item>
      <title>35,000 Users Targeted in Phishing Campaign in Just Two Days</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Between the dates of Apr. 14 and Apr. 16, a sophisticated phishing campaign was observed.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102290</guid>
      <pubDate>Tue, 05 May 2026 15:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102290-35-000-users-targeted-in-phishing-campaign-in-just-two-days</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/05/Email-app-by-Brian-J.-Tromp.webp?t=1778005568" type="image/png" length="320004"/>
    </item>
  </channel>
</rss>
