<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://www.cypro.se/wp-sitemap.xsl" ?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://www.cypro.se/2017/12/18/nordic-it-security-2017/</loc></url><url><loc>https://www.cypro.se/2017/12/26/incidents-2017/</loc></url><url><loc>https://www.cypro.se/2017/12/30/artificial-intelligence-the-next-step-in-cyber-security/</loc></url><url><loc>https://www.cypro.se/2018/01/16/meltdown-spectre-daunting-cpu-exploits-yet/</loc></url><url><loc>https://www.cypro.se/2018/01/24/cypro-600minutes-executive-sweden/</loc></url><url><loc>https://www.cypro.se/2018/01/25/intel-amt-meltdown-spectre-patch-flaws-rough-start-2018/</loc></url><url><loc>https://www.cypro.se/2018/02/02/1-billion-lost-two-largest-cryptocurrency-exchange-hacks/</loc></url><url><loc>https://www.cypro.se/2018/02/07/flaw-spell-checking-utility-grammarly-leave-22-million-users-vulnerable/</loc></url><url><loc>https://www.cypro.se/2018/02/15/malware-attack-pyeongchang-2018-winter-olympics-opening-ceremony/</loc></url><url><loc>https://www.cypro.se/2018/02/23/now-time-rethink-dated-password-policies/</loc></url><url><loc>https://www.cypro.se/2018/03/03/flaw-popular-torrenting-software-%ce%bctorrent-leave-users-risk/</loc></url><url><loc>https://www.cypro.se/2018/03/09/records-set-ddos-vector-memcached-memcrashed-reaches-1-7-tbps-traffic/</loc></url><url><loc>https://www.cypro.se/2018/03/22/pre-installed-rottensys-malware-resulting-5-million-infected-android-devices/</loc></url><url><loc>https://www.cypro.se/2018/03/29/leader-hacker-group-responsible-1-billion-bank-theft-arrested/</loc></url><url><loc>https://www.cypro.se/2018/04/08/authentication-bypass-vulnerability-revealed-auth0-identity-platform/</loc></url><url><loc>https://www.cypro.se/2018/04/13/malicious-text-put-windows-computer-risk/</loc></url><url><loc>https://www.cypro.se/2018/04/19/massive-gandcrab-ransomware-campaign-reaching-way-sweden/</loc></url><url><loc>https://www.cypro.se/2018/04/26/orangeworm-hacker-group-targeting-hospitals-worldwide/</loc></url><url><loc>https://www.cypro.se/2018/05/05/twitter-urging-330-million-users-change-password-plain-text-bug/</loc></url><url><loc>https://www.cypro.se/2018/05/11/unpatched-gpon-routers-leading-botnet-gold-rush/</loc></url><url><loc>https://www.cypro.se/2018/05/18/gdpr-related-phishing-scams-rise/</loc></url><url><loc>https://www.cypro.se/2018/05/25/bmw-cars-flawed-14-vulnerabilities-found-chinese-hackers/</loc></url><url><loc>https://www.cypro.se/2018/06/10/emergency-patch-issued-adobe-flash-zero-day-exploits/</loc></url><url><loc>https://www.cypro.se/2018/06/13/crypto-mining-worm-spreading-across-unprotected-android-devices/</loc></url><url><loc>https://www.cypro.se/2018/06/21/critical-wavethrough-browser-flaw-discovered-google-developer/</loc></url><url><loc>https://www.cypro.se/2018/06/30/global-data-collection-company-typeform-suffers-data-breach/</loc></url><url><loc>https://www.cypro.se/2018/07/12/intel-paying-100k-bounty-for-new-spectre-cpu-flaws/</loc></url><url><loc>https://www.cypro.se/2018/07/19/over-90-of-login-attempts-towards-online-retailers-are-now-malicious/</loc></url><url><loc>https://www.cypro.se/2018/07/26/new-bluetooth-vulnerability-affects-millions-of-popular-devices/</loc></url><url><loc>https://www.cypro.se/2018/08/02/samsam-the-unique-ransomware-earning-5-9-million/</loc></url><url><loc>https://www.cypro.se/2018/08/23/android-triout-malware-can-steal-pictures-record-phone-calls/</loc></url><url><loc>https://www.cypro.se/2018/08/30/publicly-revealed-windows-10-zero-day-vulnerability-currently-unpatched/</loc></url><url><loc>https://www.cypro.se/2018/09/05/varfor-sverige-inte-har-digitala-val/</loc></url><url><loc>https://www.cypro.se/2018/09/08/top-adware-removal-tool-on-app-store-found-stealing-data/</loc></url><url><loc>https://www.cypro.se/2018/09/12/car-stolen-in-seconds-tesla-model-s-keyfob-vulnerability-found/</loc></url><url><loc>https://www.cypro.se/2018/09/18/powerful-mobile-spyware-pegasus-found-in-45-countries/</loc></url><url><loc>https://www.cypro.se/2018/09/25/zero-day-vulnerability-peekabo-exposes-hundreds-of-thousands-of-ip-cameras/</loc></url><url><loc>https://www.cypro.se/2018/10/03/north-korean-hidden-cobra-group-targeting-atms-in-fastcash-attack/</loc></url><url><loc>https://www.cypro.se/2018/10/10/domen-foll-for-silk-road-administratoren-kan-fa-20-ars-fangelse/</loc></url><url><loc>https://www.cypro.se/2018/10/16/android-trojanen-gplayed-ett-nytt-sofistikerat-hot-mot-din-mobil/</loc></url><url><loc>https://www.cypro.se/2018/10/22/om-sverige-ska-bli-varldsledande-pa-digitalisering-varfor-rostar-vi-fortfarande-pa-samma-satt-som-for-100-ar-sedan/</loc></url><url><loc>https://www.cypro.se/2018/11/06/allvarlig-sakerhetsbrister-i-populara-krypterade-solid-state-diskar-kan-avsloja-din-data/</loc></url><url><loc>https://www.cypro.se/2018/11/27/flera-sarbarheter-hittade-i-macos-skadlig-lank-gav-hackare-full-kontroll/</loc></url><url><loc>https://www.cypro.se/2018/12/04/fragetjansten-quora-hackad-data-fran-100-miljoner-anvandare-stulen/</loc></url><url><loc>https://www.cypro.se/2018/12/11/google-tvingas-stanga-tidigt-efter-sekretessfel-paverkat-over-50-miljoner-anvandare/</loc></url><url><loc>https://www.cypro.se/2018/12/18/3d-printat-huvud-lurar-vara-mobilers-ansiktsigenkanning/</loc></url><url><loc>https://www.cypro.se/2018/12/27/fbi-beslagtog-15-ddos-uthyrningstjanster-3-operatorer-gripna/</loc></url><url><loc>https://www.cypro.se/2019/01/20/773-miljoner-hackade-konton-och-losenord-i-massiv-collection-1-samling/</loc></url><url><loc>https://www.cypro.se/2019/01/29/europol-pa-jakt-efter-anvandare-av-ddos-uthyrningstjanster/</loc></url><url><loc>https://www.cypro.se/2019/02/04/17-miljarder-sek-i-kryptovaluta-forlorade-efter-grundare-dog-med-enda-losenordet/</loc></url><url><loc>https://www.cypro.se/2019/02/11/skadlig-bild-kan-hacka-din-android/</loc></url><url><loc>https://www.cypro.se/2019/02/18/27-miljoner-inspelade-samtal-till-1177-tillgangliga-oppet-pa-internet/</loc></url><url><loc>https://www.cypro.se/2019/02/25/kritiskt-winrar-fel-paverkar-alla-versioner-slappta-de-senaste-19-aren/</loc></url><url><loc>https://www.cypro.se/2019/03/04/okanda-cryptojacking-tjansten-coinhive-att-stanga-denna-veckan/</loc></url><url><loc>https://www.cypro.se/2019/03/11/flera-terabyte-data-stulna-i-iran-lankad-citrix-attack/</loc></url><url><loc>https://www.cypro.se/2019/03/25/storforetaget-norsk-hydro-utsatt-for-cyberattack/</loc></url><url><loc>https://www.cypro.se/2019/04/01/halv-miljon-datorer-infekterade-via-asus-uppdateringar/</loc></url><url><loc>https://www.cypro.se/2019/04/08/540-miljoner-anvandaruppgifter-fran-facebook-oppet-tillgangliga/</loc></url><url><loc>https://www.cypro.se/2019/04/15/ryska-storboter-for-facebook-och-twitter-430-kronor/</loc></url><url><loc>https://www.cypro.se/2019/04/22/franska-regeringens-chattapplikation-hackad-pa-nagra-dagar/</loc></url><url><loc>https://www.cypro.se/2019/04/29/vad-ar-en-brandvagg-och-varfor-ska-du-bry-dig/</loc></url><url><loc>https://www.cypro.se/2019/05/06/israel-svarar-pa-hacker-attack-med-flygangrepp/</loc></url><url><loc>https://www.cypro.se/2019/05/13/hundratals-webbaffarer-paverkade-av-pagaende-kreditkortsstold/</loc></url><url><loc>https://www.cypro.se/2019/05/20/forbes-senaste-offret-for-magecart-skimning/</loc></url><url><loc>https://www.cypro.se/2019/05/27/google-sparade-anvandarlosenord-i-klartext-under-14-ar/</loc></url><url><loc>https://www.cypro.se/2019/06/10/linux-operativsystem-kan-hackas-genom-textredigerare/</loc></url><url><loc>https://www.cypro.se/2019/06/17/telegram-utsatt-for-kinesisk-ddos-attack-i-samband-med-hong-kong-protester/</loc></url><url><loc>https://www.cypro.se/2019/09/23/kunddata-fran-telenor-lackta-anvandes-for-att-locka-kunder-till-tre/</loc></url><url><loc>https://www.cypro.se/2019/10/03/over-en-miljard-skadliga-annonsvisningar-riktade-mot-apple-anvandare/</loc></url><url><loc>https://www.cypro.se/2019/10/10/kritisk-sarbarhet-upptackt-i-terminal-applikationen-iterm2-efter-7-ar/</loc></url><url><loc>https://www.cypro.se/2019/10/24/populart-linux-verktyg-visar-sig-ha-en-otack-bugg-att-alla-kan-fa-hogsta-behorighet/</loc></url><url><loc>https://www.cypro.se/2019/11/08/ny-sarbarhet-har-upptackts-i-webbsidor-mojliggor-for-attackerare-att-gora-intrang/</loc></url><url><loc>https://www.cypro.se/2019/11/14/bluekeep-har-for-forsta-gangen-anvants-i-en-cyberattack-for-att-bryta-kryptovaluta/</loc></url><url><loc>https://www.cypro.se/2019/11/22/en-ny-sarbarhet-har-hittats-i-whatsapp-hackare-kan-installera-spionvara/</loc></url><url><loc>https://www.cypro.se/2019/11/29/administratorer-for-microsoft-office-365-utsatta-for-natfiske-kan-aventyra-hela-dess-doman/</loc></url><url><loc>https://www.cypro.se/2019/12/06/stjal-dina-kontouppgifter-fran-google-chrome-genom-ny-trojan/</loc></url><url><loc>https://www.cypro.se/2019/12/13/exponera-hela-natverket-genom-att-anvanda-en-sarbar-iot-enhet/</loc></url><url><loc>https://www.cypro.se/2019/12/20/hackare-forsokte-utfora-industrispionage-pa-valkanda-biltillverkare/</loc></url><url><loc>https://www.cypro.se/2020/01/01/sarbarhet-i-kant-vpn-program-kan-utnyttjas-av-gisslanprogram/</loc></url><url><loc>https://www.cypro.se/2020/01/24/amerikanska-nsa-varnar-kritisk-sarbarhet-i-windows-upptackt/</loc></url><url><loc>https://www.cypro.se/2020/02/07/microsoft-azure-drabbad-av-nya-sarbarheter-mojliggor-for-riktade-attacker-mot-foretag/</loc></url><url><loc>https://www.cypro.se/2020/02/21/kanda-foretag-utsatta-for-ny-phishing-kampanj-trojan-gomd-i-skickade-filer/</loc></url><url><loc>https://www.cypro.se/2020/03/06/miljarder-enheter-sarbara-av-wi-fi-kryptering/</loc></url><url><loc>https://www.cypro.se/2020/06/26/gisslanprogram-tar-till-nya-knep-utsatter-foretag-for-storre-fara/</loc></url><url><loc>https://www.cypro.se/2022/12/05/8th-annual-nice-k12-cybersecurity-education-conference/</loc></url><url><loc>https://www.cypro.se/2022/11/15/fissea-fall-forum-november-15-2022/</loc></url><url><loc>https://www.cypro.se/2022/09/01/stop-worrying-about-passwords-forever/</loc></url><url><loc>https://www.cypro.se/2022/09/01/researchers-detail-emerging-cross-platform-bianlian-ransomware-attacks/</loc></url><url><loc>https://www.cypro.se/2022/09/01/over-1800-android-and-ios-apps-found-leaking-hard-coded-aws-credentials/</loc></url><url><loc>https://www.cypro.se/2022/09/01/infra-used-in-cisco-hack-also-targeted-workforce-management-solution/</loc></url><url><loc>https://www.cypro.se/2022/09/01/microsoft-discover-severe-one-click-exploit-for-tiktok-android-app/</loc></url><url><loc>https://www.cypro.se/2022/09/01/apple-releases-ios-update-for-older-iphones-to-fix-actively-exploited-vulnerability/</loc></url><url><loc>https://www.cypro.se/2022/08/31/experts-find-malicious-cookie-stuffing-chrome-extensions-used-by-1-4-million-users/</loc></url><url><loc>https://www.cypro.se/2022/08/31/hackers-hide-malware-in-stunning-images-taken-by-james-webb-space-telescope/</loc></url><url><loc>https://www.cypro.se/2022/08/31/interested-in-reducing-your-risk-profile-jamf-has-a-solution-for-that/</loc></url><url><loc>https://www.cypro.se/2022/08/31/google-launches-new-open-source-bug-bounty-to-tackle-supply-chain-attacks/</loc></url><url><loc>https://www.cypro.se/2022/08/31/chinese-hackers-used-scanbox-framework-in-recent-cyber-espionage-attacks/</loc></url><url><loc>https://www.cypro.se/2022/08/30/hackers-use-modernloader-to-infect-systems-with-stealers-and-cryptominers/</loc></url><url><loc>https://www.cypro.se/2022/08/30/hands-on-review-stellar-cyber-security-operations-platform-for-mssps/</loc></url><url><loc>https://www.cypro.se/2022/08/30/indias-newest-airline-akasa-air-found-leaking-passengers-personal-information/</loc></url><url><loc>https://www.cypro.se/2022/08/30/fbi-warns-investors-to-take-precautions-with-decentralized-financial-platforms/</loc></url><url><loc>https://www.cypro.se/2022/08/30/ftc-sues-data-broker-over-selling-location-data-for-hundreds-of-millions-of-phones/</loc></url><url><loc>https://www.cypro.se/2022/08/29/new-golang-based-agenda-ransomware-can-be-customized-for-each-victim/</loc></url><url><loc>https://www.cypro.se/2022/08/29/nitrokod-crypto-miner-infected-over-111000-users-with-copies-of-popular-software/</loc></url><url><loc>https://www.cypro.se/2022/08/29/a-cisos-ultimate-security-validation-checklist/</loc></url><url><loc>https://www.cypro.se/2022/08/29/twilio-breach-also-compromised-authy-two-factor-accounts-of-some-users/</loc></url><url><loc>https://www.cypro.se/2022/08/29/cisa-adds-10-new-known-actively-exploited-vulnerabilities-to-its-catalog/</loc></url><url><loc>https://www.cypro.se/2022/08/27/iranian-hackers-exploiting-unpatched-log4j-2-bugs-to-target-israeli-organizations/</loc></url><url><loc>https://www.cypro.se/2022/08/26/critical-vulnerability-discovered-in-atlassian-bitbucket-server-and-data-center/</loc></url><url><loc>https://www.cypro.se/2022/08/26/hackers-breach-lastpass-developer-system-to-steal-source-code/</loc></url><url><loc>https://www.cypro.se/2022/08/26/cybercrime-groups-increasingly-adopting-sliver-command-and-control-framework/</loc></url><url><loc>https://www.cypro.se/2022/08/17/journey-to-the-nist-cybersecurity-framework-csf-2-0-workshop-1/</loc></url><url><loc>https://www.cypro.se/2022/07/21/implementing-the-hipaa-security-rule-nist-releases-draft-nist-sp-800-66-rev-2-for-public-comment/</loc></url><url><loc>https://www.cypro.se/2022/07/21/nist-updates-guidance-for-health-care-cybersecurity/</loc></url><url><loc>https://www.cypro.se/2022/07/21/information-and-communications-technology-ict-risk-management-in-the-enterprise-two-draft-special-publications-available-for-comment/</loc></url><url><loc>https://www.cypro.se/2022/07/21/nccoe-releases-draft-project-description-for-devsecops/</loc></url><url><loc>https://www.cypro.se/2022/07/20/nice-webinar-optimizing-your-linkedin-profile-for-your-cybersecurity-career/</loc></url><url><loc>https://www.cypro.se/2022/07/20/security-guidance-for-first-responder-mobile-and-wearable-devices-nist-ir-8235/</loc></url><url><loc>https://www.cypro.se/2022/07/19/cybersecurity-apprenticeship-sprint/</loc></url><url><loc>https://www.cypro.se/2022/07/13/nist-opens-first-online-comment-period-using-the-sp-800-53-public-comment-site/</loc></url><url><loc>https://www.cypro.se/2022/07/05/pqc-standardization-process-announcing-four-candidates-to-be-standardized-plus-fourth-round-candidates/</loc></url><url><loc>https://www.cypro.se/2022/06/29/nice-webinar-creating-the-infrastructure-needed-for-scalable-learning-and-employment-records/</loc></url><url><loc>https://www.cypro.se/2022/06/29/foundational-pnt-profile-initial-public-draft-of-nist-ir-8323r1-is-available-for-comment/</loc></url><url><loc>https://www.cypro.se/2022/06/28/commercial-space-and-astronomy-partnering-in-best-practices-and-guidelines-for-brightness-mitigation/</loc></url><url><loc>https://www.cypro.se/2022/06/24/nist-releases-new-guidance-and-resources-on-macos-security/</loc></url><url><loc>https://www.cypro.se/2022/06/23/submit-comments-on-draft-nist-sp-1800-34-validating-the-integrity-of-computing-devices/</loc></url><url><loc>https://www.cypro.se/2022/06/21/nist-iot-cybersecurity-program-releases-new-documents/</loc></url><url><loc>https://www.cypro.se/2022/06/13/ordered-t-way-combinations-for-testing-state-based-systems-nist-releases-cybersecurity-white-paper-26/</loc></url><url><loc>https://www.cypro.se/2022/06/09/nist-requests-public-comments-on-fips-180-4-secure-hash-standard-shs/</loc></url><url><loc>https://www.cypro.se/2022/06/09/using-business-impact-analysis-to-inform-risk-prioritization-and-response-nist-ir-8286d-available-for-public-comment/</loc></url><url><loc>https://www.cypro.se/2022/06/08/announcement-of-proposal-to-withdraw-special-publication-800-107-revision-1/</loc></url><url><loc>https://www.cypro.se/2022/06/08/nist-releases-draft-ir-8409-measuring-the-common-vulnerability-scoring-system-base-score-equation/</loc></url><url><loc>https://www.cypro.se/2022/06/07/final-public-draft-engineering-trustworthy-secure-systems-is-available-for-comment/</loc></url><url><loc>https://www.cypro.se/2022/06/03/open-for-public-comment-preliminary-draft-practice-guide-sp-1800-35-vol-a/</loc></url><url><loc>https://www.cypro.se/2022/05/26/blockchain-for-access-control-systems-nist-ir-8403/</loc></url><url><loc>https://www.cypro.se/2022/05/20/nist-revises-special-publications-800-140c-and-800-140d-for-the-cmvp/</loc></url><url><loc>https://www.cypro.se/2022/05/05/new-eo-guidance-for-cybersecurity-supply-chain-risk-management/</loc></url><url><loc>https://www.cypro.se/2022/05/05/nist-updates-cybersecurity-guidance-for-supply-chain-risk-management/</loc></url><url><loc>https://www.cypro.se/2022/04/26/nist-seeks-inputs-on-its-draft-guide-to-operational-technology-security/</loc></url><url><loc>https://www.cypro.se/2022/04/26/nist-requests-public-comment-on-draft-guidance-for-5g-cybersecurity/</loc></url><url><loc>https://www.cypro.se/2022/04/26/guide-to-operational-technology-ot-security-nist-requests-comments-on-draft-sp-800-82r3/</loc></url><url><loc>https://www.cypro.se/2022/04/25/nccoe-releases-preliminary-draft-on-5g-cybersecurity/</loc></url><url><loc>https://www.cypro.se/2022/03/01/nist-researchers-investigate-a-hybrid-wired-wireless-deterministic-network-for-the-smart-grid/</loc></url><url><loc>https://www.cypro.se/2022/03/01/nist-releases-cybersecurity-guide-for-manufacturing-control-systems/</loc></url><url><loc>https://www.cypro.se/2022/02/01/how-many-infections-are-in-networks-or-society-nist-researchers-offer-a-way-to-find-out/</loc></url><url><loc>https://www.cypro.se/2022/02/01/nist-led-panel-assesses-test-and-evaluation-of-industrial-ai-risk-awareness-and-barriers-to-use/</loc></url><url><loc>https://www.cypro.se/2021/11/01/nist-offers-guidelines-for-securing-distributed-energy-resources-and-proposes-research/</loc></url><url><loc>https://www.cypro.se/2021/11/01/gctcs-cybersecurity-symposium-showcases-smart-communities-digital-safety-nets/</loc></url><url><loc>https://www.cypro.se/2021/11/01/nist-north-american-electric-reliability-corporation-publish-guide-for-bulk-electric-systems-cybersecurity/</loc></url><url><loc>https://www.cypro.se/2022/08/30/introducing-our-new-machine-learning-security-principles/</loc></url><url><loc>https://www.cypro.se/2022/08/29/the-security-benefits-of-modern-collaboration-in-the-cloud/</loc></url><url><loc>https://www.cypro.se/2022/08/22/information-security-best-practice-for-the-construction-sector/</loc></url><url><loc>https://www.cypro.se/2022/08/18/threat-report-19th-august-2022/</loc></url><url><loc>https://www.cypro.se/2022/08/17/social-engineering-tactics-used-in-interrogation/</loc></url><url><loc>https://www.cypro.se/2022/08/09/securing-the-cloud-by-design-and-by-default/</loc></url><url><loc>https://www.cypro.se/2022/08/04/threat-report-5th-august-2022/</loc></url><url><loc>https://www.cypro.se/2022/08/03/social-media-how-to-keep-yourself-safe/</loc></url><url><loc>https://www.cypro.se/2022/07/27/how-rebellion-defence-used-ncsc-for-startups-to-accelerate-product-development/</loc></url><url><loc>https://www.cypro.se/2022/07/21/threat-report-22nd-july-2022/</loc></url><url><loc>https://www.cypro.se/2022/07/20/qr-codes-and-captcha-tests-new-scams-in-a-digital-age/</loc></url><url><loc>https://www.cypro.se/2022/07/07/threat-report-8th-july-2022/</loc></url><url><loc>https://www.cypro.se/2022/07/06/my-first-three-years-in-the-social-engineering-world/</loc></url><url><loc>https://www.cypro.se/2022/07/04/preparing-for-the-long-haul-the-cyber-threat-from-russia/</loc></url><url><loc>https://www.cypro.se/2022/07/04/maintaining-a-sustainable-strengthened-cyber-security-posture/</loc></url><url><loc>https://www.cypro.se/2022/06/29/reducing-data-exfiltration-by-malicious-insiders/</loc></url><url><loc>https://www.cypro.se/2022/06/23/threat-report-24th-june-2022/</loc></url><url><loc>https://www.cypro.se/2022/06/22/myths-about-human-lie-detection/</loc></url><url><loc>https://www.cypro.se/2022/06/20/ncsc-for-startups-the-feedback-loop/</loc></url><url><loc>https://www.cypro.se/2022/06/09/threat-report-10th-june-2022/</loc></url><url><loc>https://www.cypro.se/2022/06/08/i100-insider-the-cyber-security-advocate/</loc></url><url><loc>https://www.cypro.se/2022/06/08/internet-safety-month-stop-think-connect/</loc></url><url><loc>https://www.cypro.se/2022/06/06/new-briefing-pack-for-the-ncsc-board-toolkit-now-available/</loc></url><url><loc>https://www.cypro.se/2022/05/26/weekly-threat-report-27th-may-2022/</loc></url><url><loc>https://www.cypro.se/2022/05/24/acd-the-5th-year-report-now-available-to-download/</loc></url><url><loc>https://www.cypro.se/2022/05/22/new-soc-guidance-101/</loc></url><url><loc>https://www.cypro.se/2022/05/19/weekly-threat-report-20th-may-2022/</loc></url><url><loc>https://www.cypro.se/2022/05/17/mythbusting-cloud-key-management-services/</loc></url><url><loc>https://www.cypro.se/2022/05/15/avoiding-crisis-mismanagement/</loc></url><url><loc>https://www.cypro.se/2022/05/11/relaunching-the-ncscs-cloud-security-guidance-collection/</loc></url><url><loc>https://www.cypro.se/2022/05/11/password-security/</loc></url><url><loc>https://www.cypro.se/2022/05/10/the-technology-assurance-principles/</loc></url><url><loc>https://www.cypro.se/2022/05/09/putting-staff-welfare-at-the-heart-of-incident-response/</loc></url><url><loc>https://www.cypro.se/2022/05/09/laying-the-new-foundations-for-enterprise-device-security/</loc></url><url><loc>https://www.cypro.se/2022/05/09/organisational-use-of-enterprise-connected-devices/</loc></url><url><loc>https://www.cypro.se/2022/05/09/acd-the-fifth-year/</loc></url><url><loc>https://www.cypro.se/2022/05/05/weekly-threat-report-6th-may-2022/</loc></url><url><loc>https://www.cypro.se/2022/05/04/ccp-scheme-to-be-run-by-the-uk-cyber-security-council/</loc></url><url><loc>https://www.cypro.se/2022/05/04/the-visher-and-the-magician/</loc></url><url><loc>https://www.cypro.se/2022/05/03/threat-report-on-application-stores/</loc></url><url><loc>https://www.cypro.se/2022/05/02/cyber-security-in-the-built-environment-considering-security-throughout-a-buildings-lifecycle/</loc></url><url><loc>https://www.cypro.se/2022/04/28/weekly-threat-report-29th-april-2022/</loc></url><url><loc>https://www.cypro.se/2022/04/25/cyber-tools-for-uk-schools/</loc></url><url><loc>https://www.cypro.se/2022/04/24/malware-analysis-report-on-sparrowdoor-malware/</loc></url><url><loc>https://www.cypro.se/2022/04/21/weekly-threat-report-22nd-april-2022/</loc></url><url><loc>https://www.cypro.se/2022/04/21/inside-industry-100-the-on-loan-cto/</loc></url><url><loc>https://www.cypro.se/2022/04/13/ransomware-the-number-one-cyber-threat-for-enterprises-and-smes/</loc></url><url><loc>https://www.cypro.se/2022/04/11/cyberuk-2022-taming-the-dragon/</loc></url><url><loc>https://www.cypro.se/2022/04/10/the-cyber-assessment-framework-3-1/</loc></url><url><loc>https://www.cypro.se/2022/04/07/weekly-threat-report-8th-april-2022/</loc></url><url><loc>https://www.cypro.se/2022/04/06/a-peek-into-a-professional-social-engineering-team/</loc></url><url><loc>https://www.cypro.se/2022/03/31/weekly-threat-report-1st-april-2022/</loc></url><url><loc>https://www.cypro.se/2022/03/28/use-of-russian-technology-products-and-services-following-the-invasion-of-ukraine/</loc></url><url><loc>https://www.cypro.se/2022/03/25/weekly-threat-report-25th-march-2022/</loc></url><url><loc>https://www.cypro.se/2022/03/23/motivating-developers-to-write-secure-code/</loc></url><url><loc>https://www.cypro.se/2022/03/22/five-years-of-i100/</loc></url><url><loc>https://www.cypro.se/2022/03/22/vendor-security-assessment/</loc></url><url><loc>https://www.cypro.se/2022/03/18/weekly-threat-report-18th-march-2022/</loc></url><url><loc>https://www.cypro.se/2022/03/16/tax-season-scams/</loc></url><url><loc>https://www.cypro.se/2022/03/16/hacker-games-and-trojan-tales-new-cybersprinters-activities-now-available-to-download/</loc></url><url><loc>https://www.cypro.se/2022/03/11/weekly-threat-report-11th-march-2022/</loc></url><url><loc>https://www.cypro.se/2022/03/04/weekly-threat-report-4th-march-2022/</loc></url><url><loc>https://www.cypro.se/2022/03/02/building-and-operating-a-secure-online-service/</loc></url><url><loc>https://www.cypro.se/2022/03/02/transaction-monitoring-building-and-operating-a-secure-online-service-guidance-published/</loc></url><url><loc>https://www.cypro.se/2022/03/02/transaction-monitoring-for-online-services/</loc></url><url><loc>https://www.cypro.se/2022/02/25/weekly-threat-report-25th-february-2022/</loc></url><url><loc>https://www.cypro.se/2022/02/23/construction-businesses-understanding-the-cyber-threat/</loc></url><url><loc>https://www.cypro.se/2022/02/23/cyber-security-for-construction-businesses/</loc></url><url><loc>https://www.cypro.se/2022/02/18/weekly-threat-report-18th-february-2022/</loc></url><url><loc>https://www.cypro.se/2022/02/11/weekly-threat-report-11th-february-2022/</loc></url><url><loc>https://www.cypro.se/2022/02/04/weekly-threat-report-4th-february-2022/</loc></url><url><loc>https://www.cypro.se/2022/02/02/ncsc-for-startups-taking-on-malvertising/</loc></url><url><loc>https://www.cypro.se/2022/01/28/weekly-threat-report-28th-january-2022/</loc></url><url><loc>https://www.cypro.se/2022/01/27/industry-100-women-can-do-it/</loc></url><url><loc>https://www.cypro.se/2022/01/25/introducing-scanning-made-easy/</loc></url><url><loc>https://www.cypro.se/2022/01/24/we-think-cyber-essentials-is-well-still-essential/</loc></url><url><loc>https://www.cypro.se/2022/01/21/weekly-threat-report-21st-january-2022/</loc></url><url><loc>https://www.cypro.se/2022/01/19/business-communications-sms-and-telephone-best-practice/</loc></url><url><loc>https://www.cypro.se/2022/01/19/sms-and-telephone-best-practice-new-guidance-for-organisations/</loc></url><url><loc>https://www.cypro.se/2022/01/17/actions-to-take-when-the-cyber-threat-is-heightened/</loc></url><url><loc>https://www.cypro.se/2022/01/14/weekly-threat-report-14th-january-2022/</loc></url><url><loc>https://www.cypro.se/2022/01/11/empower-cyber-week-at-the-ncsc-in-london/</loc></url><url><loc>https://www.cypro.se/2022/01/07/weekly-threat-report-7th-january-2022/</loc></url><url><loc>https://www.cypro.se/2021/12/22/zero-trust-migration-where-do-i-start/</loc></url><url><loc>https://www.cypro.se/2021/12/20/new-guidance-for-practitioners-supporting-victims-of-domestic-cyber-crime/</loc></url><url><loc>https://www.cypro.se/2021/12/20/why-vulnerabilities-are-like-buses/</loc></url><url><loc>https://www.cypro.se/2021/12/17/weekly-threat-report-17th-december-2021/</loc></url><url><loc>https://www.cypro.se/2021/12/17/log4j-vulnerability-what-should-boards-be-asking/</loc></url><url><loc>https://www.cypro.se/2021/12/10/weekly-threat-report-10th-december-2021/</loc></url><url><loc>https://www.cypro.se/2021/12/07/using-secure-messaging-voice-and-collaboration-apps/</loc></url><url><loc>https://www.cypro.se/2021/12/03/weekly-threat-report-3rd-december-2021/</loc></url><url><loc>https://www.cypro.se/2021/11/26/weekly-threat-report-26th-november-2021/</loc></url><url><loc>https://www.cypro.se/2021/11/23/decrypting-diversity-diversity-and-inclusion-in-cyber-security-report-2021/</loc></url><url><loc>https://www.cypro.se/2021/11/19/weekly-threat-report-19th-november-2021/</loc></url><url><loc>https://www.cypro.se/2021/11/12/weekly-threat-report-12th-november-2021/</loc></url><url><loc>https://www.cypro.se/2021/11/08/protecting-internet-facing-services-on-public-service-cni/</loc></url><url><loc>https://www.cypro.se/2021/11/05/weekly-threat-report-5th-november-2021/</loc></url><url><loc>https://www.cypro.se/2021/10/28/weekly-threat-report-29th-october-2021/</loc></url><url><loc>https://www.cypro.se/2021/10/21/weekly-threat-report-22nd-october-2021/</loc></url><url><loc>https://www.cypro.se/2021/10/18/ncsc-for-startups-diaries-porgiesoft/</loc></url><url><loc>https://www.cypro.se/2021/10/17/weekly-threat-report-15th-october-2021/</loc></url><url><loc>https://www.cypro.se/2021/10/07/weekly-threat-report-8th-october-2021/</loc></url><url><loc>https://www.cypro.se/2021/10/04/bring-your-own-device-how-to-do-it-well/</loc></url><url><loc>https://www.cypro.se/2021/09/30/weekly-threat-report-1st-october-2021/</loc></url><url><loc>https://www.cypro.se/2021/09/29/secure-communication-principles-updated/</loc></url><url><loc>https://www.cypro.se/2021/09/23/principles-and-how-they-can-help-us-with-assurance/</loc></url><url><loc>https://www.cypro.se/2021/09/23/the-future-of-technology-assurance-in-the-uk/</loc></url><url><loc>https://www.cypro.se/2021/09/23/weekly-threat-report-24th-september-2021/</loc></url><url><loc>https://www.cypro.se/2021/09/21/are-you-hungry-a-two-part-blog-about-risk-appetites/</loc></url><url><loc>https://www.cypro.se/2021/09/19/knockevin-school-is-the-first-special-school-to-achieve-cyberfirst-status/</loc></url><url><loc>https://www.cypro.se/2021/09/16/weekly-threat-report-17th-september-2021/</loc></url><url><loc>https://www.cypro.se/2021/09/14/ncsc-for-startups-the-case-for-collaboration/</loc></url><url><loc>https://www.cypro.se/2021/09/09/weekly-threat-report-10th-september-2021/</loc></url><url><loc>https://www.cypro.se/2021/09/02/weekly-threat-report-3rd-september-2021/</loc></url><url><loc>https://www.cypro.se/2021/09/01/zero-trust-is-it-right-for-me/</loc></url><url><loc>https://www.cypro.se/2021/08/26/weekly-threat-report-27th-august-2021/</loc></url><url><loc>https://www.cypro.se/2021/08/19/weekly-threat-report-20th-august-2021/</loc></url><url><loc>https://www.cypro.se/2021/08/15/reaching-out-to-the-next-generation-of-cyber-sprinters/</loc></url><url><loc>https://www.cypro.se/2021/08/12/weekly-threat-report-13th-august-2021/</loc></url><url><loc>https://www.cypro.se/2021/08/11/configuring-office-365s-report-phishing-add-in-for-outlook-to-use-sers/</loc></url><url><loc>https://www.cypro.se/2021/08/08/twitter-ncsc-reaches-100k-followers/</loc></url><url><loc>https://www.cypro.se/2021/08/05/the-logic-behind-three-random-words/</loc></url><url><loc>https://www.cypro.se/2021/08/05/weekly-threat-report-6th-august-2021/</loc></url><url><loc>https://www.cypro.se/2021/07/29/weekly-threat-report-30th-july-2021/</loc></url><url><loc>https://www.cypro.se/2021/07/22/zero-trust-1-0/</loc></url><url><loc>https://www.cypro.se/2021/07/22/weekly-threat-report-23rd-july-2021/</loc></url><url><loc>https://www.cypro.se/2021/07/20/using-tls-to-protect-data/</loc></url><url><loc>https://www.cypro.se/2021/07/15/weekly-threat-report-16th-july-2021/</loc></url><url><loc>https://www.cypro.se/2021/07/08/weekly-threat-report-9th-july-2021/</loc></url><url><loc>https://www.cypro.se/2021/07/07/the-first-certified-cyber-professional-ccp-specialism-is-now-live/</loc></url><url><loc>https://www.cypro.se/2021/07/05/jacqueline-de-rojas-interview-how-to-get-cyber-security-on-the-boards-agenda/</loc></url><url><loc>https://www.cypro.se/2021/07/01/weekly-threat-report-2nd-july-2021/</loc></url><url><loc>https://www.cypro.se/2021/07/01/cisp-2-0-development-update/</loc></url><url><loc>https://www.cypro.se/2021/06/28/securing-your-devices-the-future/</loc></url><url><loc>https://www.cypro.se/2021/06/27/call-for-postgraduate-taught-masters-degrees-2021-now-open/</loc></url><url><loc>https://www.cypro.se/2022/09/02/google-chrome-bug-lets-sites-silently-overwrite-system-clipboard-content/</loc></url><url><loc>https://www.cypro.se/2022/09/01/oktapus-attack-on-twilio-exposes-data-of-163-companies/</loc></url><url><loc>https://www.cypro.se/2022/08/31/iotw-plex-urges-customers-to-change-passwords-following-data-breach/</loc></url><url><loc>https://www.cypro.se/2022/08/31/google-blocks-largest-ever-web-ddos-attack/</loc></url><url><loc>https://www.cypro.se/2022/08/31/almost-one-million-people-affected-by-medical-billing-ransomware-attack/</loc></url><url><loc>https://www.cypro.se/2022/08/31/iotw-signal-users-directly-targeted-in-twilio-phishing-attack/</loc></url><url><loc>https://www.cypro.se/2022/08/31/twitter-confirms-data-from-5-4-million-accounts-has-been-stolen/</loc></url><url><loc>https://www.cypro.se/2022/08/31/nomad-offers-19m-bounty-for-stolen-crypto/</loc></url><url><loc>https://www.cypro.se/2022/08/31/social-engineering-most-dangerous-threat-say-75-of-security-professionals/</loc></url><url><loc>https://www.cypro.se/2022/08/31/github-supply-chain-attack-could-affect-83-million-developers/</loc></url><url><loc>https://www.cypro.se/2022/08/31/lastpasss-source-code-stolen-in-data-breach/</loc></url><url><loc>https://www.cypro.se/2022/08/31/student-loan-data-breach-leaks-2-5-million-social-security-numbers/</loc></url><url><loc>https://www.cypro.se/2022/08/11/iotw-twilio-suffers-data-breach-following-phishing-attack/</loc></url><url><loc>https://www.cypro.se/2022/09/02/new-evidence-links-raspberry-robin-malware-to-dridex-and-russian-evil-corp-hackers/</loc></url><url><loc>https://www.cypro.se/2022/09/02/juiceledger-hackers-behind-the-recent-phishing-attacks-against-pypi-users/</loc></url><url><loc>https://www.cypro.se/2022/09/02/the-ultimate-security-blind-spot-you-dont-know-you-have/</loc></url><url><loc>https://www.cypro.se/2022/09/02/warning-pypi-feature-executes-code-automatically-after-python-package-download/</loc></url><url><loc>https://www.cypro.se/2022/09/02/iotw-fbi-to-investigate-montenegro-cyber-attacks/</loc></url><url><loc>https://www.cypro.se/2022/09/01/threat-report-2nd-september-2022/</loc></url><url><loc>https://www.cypro.se/2022/09/02/prynt-stealer-contains-a-backdoor-to-steal-victims-data-stolen-by-other-cybercriminals/</loc></url><url><loc>https://www.cypro.se/2022/09/03/samsung-admits-data-breach-that-exposed-details-of-some-u-s-customers/</loc></url><url><loc>https://www.cypro.se/2022/09/03/google-release-urgent-chrome-update-to-patch-new-zero-day-vulnerability/</loc></url><url><loc>https://www.cypro.se/2021/06/24/weekly-threat-report-25th-june-2021/</loc></url><url><loc>https://www.cypro.se/2021/06/17/weekly-threat-report-18th-june-2021/</loc></url><url><loc>https://www.cypro.se/2021/06/10/weekly-threat-report-11th-june-2021/</loc></url><url><loc>https://www.cypro.se/2021/06/08/protective-dns-for-the-private-sector/</loc></url><url><loc>https://www.cypro.se/2021/06/07/cyber-essentials-it-isnt-a-risky-business/</loc></url><url><loc>https://www.cypro.se/2021/06/03/weekly-threat-report-4th-june-2021/</loc></url><url><loc>https://www.cypro.se/2021/06/01/ransomware-what-board-members-should-know-and-what-they-should-be-asking-their-technical-experts/</loc></url><url><loc>https://www.cypro.se/2021/05/27/weekly-threat-report-28th-may-2021/</loc></url><url><loc>https://www.cypro.se/2021/05/27/asset-management-for-cyber-security/</loc></url><url><loc>https://www.cypro.se/2021/05/27/asset-management/</loc></url><url><loc>https://www.cypro.se/2021/05/24/cybersprinters-a-digital-game-and-practitioner-led-activities-for-7-11-year-olds/</loc></url><url><loc>https://www.cypro.se/2021/05/20/weekly-threat-report-21st-may-2021/</loc></url><url><loc>https://www.cypro.se/2022/09/05/fake-antivirus-and-cleaner-apps-caught-installing-sharkbot-android-banking-trojan/</loc></url><url><loc>https://www.cypro.se/2022/09/05/ransomware-attackers-abuse-genshin-impact-anti-cheat-system-to-disable-antivirus/</loc></url><url><loc>https://www.cypro.se/2022/09/06/samsung-warns-us-customers-of-data-breach/</loc></url><url><loc>https://www.cypro.se/2022/09/06/ta505-hackers-using-teslagun-panel-to-manage-servhelper-backdoor-attacks/</loc></url><url><loc>https://www.cypro.se/2022/09/06/integrating-live-patching-in-secdevops-workflows/</loc></url><url><loc>https://www.cypro.se/2022/09/06/new-evilproxy-phishing-service-allowing-cybercriminals-to-bypass-2-factor-security/</loc></url><url><loc>https://www.cypro.se/2022/09/06/researchers-find-new-android-spyware-campaign-targeting-uyghur-community/</loc></url><url><loc>https://www.cypro.se/2022/09/06/qnap-warns-of-new-deadbolt-ransomware-attacks-exploiting-photo-station-flaw/</loc></url><url><loc>https://www.cypro.se/2022/09/05/tiktok-denies-data-breach-reportedly-exposing-over-2-billion-users-information/</loc></url><url><loc>https://www.cypro.se/2022/09/05/what-is-your-security-team-profile-prevention-detection-or-risk-management/</loc></url><url><loc>https://www.cypro.se/2022/09/06/worok-hackers-target-high-profile-asian-companies-and-governments/</loc></url><url><loc>https://www.cypro.se/2022/09/07/mirai-variant-moobot-botnet-exploiting-d-link-router-vulnerabilities/</loc></url><url><loc>https://www.cypro.se/2022/09/07/critical-rce-vulnerability-affects-zyxel-nas-devices-firmware-patch-released/</loc></url><url><loc>https://www.cypro.se/2022/09/07/the-deadly-risk-of-cyber-attacks-on-hospitals/</loc></url><url><loc>https://www.cypro.se/2022/09/07/authorities-shut-down-wt1shop-site-for-selling-stolen-credentials-and-credit-cards/</loc></url><url><loc>https://www.cypro.se/2022/09/07/new-stealthy-shikitega-malware-targeting-linux-systems-and-iot-devices/</loc></url><url><loc>https://www.cypro.se/2022/09/07/north-korean-hackers-deploying-new-magicrat-malware-in-targeted-campaigns/</loc></url><url><loc>https://www.cypro.se/2022/09/07/4-key-takeaways-from-xdr-is-the-perfect-solution-for-smes-webinar/</loc></url><url><loc>https://www.cypro.se/2022/09/07/some-members-of-conti-group-targeting-ukraine-in-financially-motivated-attacks/</loc></url><url><loc>https://www.cypro.se/2022/09/08/cisco-releases-security-patches-for-new-vulnerabilities-impacting-multiple-products/</loc></url><url><loc>https://www.cypro.se/2022/09/08/microsoft-warns-of-ransomware-attacks-by-iranian-phosphorus-hacker-group/</loc></url><url><loc>https://www.cypro.se/2022/09/08/hackers-repeatedly-targeting-financial-services-in-french-speaking-african-countries/</loc></url><url><loc>https://www.cypro.se/2022/09/08/chinese-hackers-target-government-officials-in-europe-south-america-and-middle-east/</loc></url><url><loc>https://www.cypro.se/2022/09/08/shopify-fails-to-prevent-known-breached-passwords/</loc></url><url><loc>https://www.cypro.se/2022/09/08/ihg-booking-systems-disrupted-in-cyberattack/</loc></url><url><loc>https://www.cypro.se/2022/09/08/north-korean-lazarus-hackers-targeting-energy-providers-around-the-world/</loc></url><url><loc>https://www.cypro.se/2022/09/08/new-vulnerabilities-reported-in-baxters-internet-connected-infusion-pumps/</loc></url><url><loc>https://www.cypro.se/2022/09/09/hackers-exploit-zero-day-in-wordpress-backupbuddy-plugin-in-5-million-attempts/</loc></url><url><loc>https://www.cypro.se/2022/09/09/6-top-api-security-risks-favored-targets-for-attackers-if-left-unmanaged/</loc></url><url><loc>https://www.cypro.se/2022/09/09/u-s-seizes-cryptocurrency-worth-30-million-stolen-by-north-korean-hackers/</loc></url><url><loc>https://www.cypro.se/2022/09/10/u-s-imposes-new-sanctions-on-iran-over-cyberattack-on-albania/</loc></url><url><loc>https://www.cypro.se/2022/09/11/iranian-apt42-launched-over-30-espionage-attacks-against-activists-and-dissidents/</loc></url><url><loc>https://www.cypro.se/2022/09/12/high-severity-firmware-security-flaws-left-unpatched-in-hp-enterprise-devices/</loc></url><url><loc>https://www.cypro.se/2022/09/12/palestinian-hacktivist-group-ghostsec-compromises-55-berghof-plcs-across-israel/</loc></url><url><loc>https://www.cypro.se/2022/09/12/why-vulnerability-scanning-is-critical-for-soc-2/</loc></url><url><loc>https://www.cypro.se/2022/09/12/china-accuses-nsas-tao-unit-of-hacking-its-military-research-university/</loc></url><url><loc>https://www.cypro.se/2022/09/12/samsung-hit-with-class-action-lawsuit-following-data-breach/</loc></url><url><loc>https://www.cypro.se/2022/09/13/apple-releases-ios-and-macos-updates-to-patch-actively-exploited-zero-day-flaw/</loc></url><url><loc>https://www.cypro.se/2022/09/13/iranian-hackers-target-high-value-targets-in-nuclear-security-and-genomic-research/</loc></url><url><loc>https://www.cypro.se/2022/09/13/asian-governments-and-organizations-targeted-in-latest-cyber-espionage-attacks/</loc></url><url><loc>https://www.cypro.se/2022/09/13/how-grc-protects-the-value-of-organizations-a-simple-guide-to-data-quality-and-integrity/</loc></url><url><loc>https://www.cypro.se/2022/09/13/early-bird-registration-for-the-2022-nice-k12-cybersecurity-education-conference/</loc></url><url><loc>https://www.cypro.se/2022/09/14/over-280000-wordpress-sites-attacked-using-wpgateway-plugin-zero-day-vulnerability/</loc></url><url><loc>https://www.cypro.se/2022/09/14/microsofts-latest-security-update-fixes-64-new-flaws-including-a-zero-day/</loc></url><url><loc>https://www.cypro.se/2022/09/14/researchers-detail-originlogger-rat-successor-to-agent-tesla-malware/</loc></url><url><loc>https://www.cypro.se/2022/09/14/sparklinggoblin-apt-hackers-using-new-linux-variant-of-sidewalk-backdoor/</loc></url><url><loc>https://www.cypro.se/2022/09/14/how-to-do-malware-analysis/</loc></url><url><loc>https://www.cypro.se/2022/09/14/lorenz-ransomware-exploit-mitel-voip-systems-to-breach-business-networks/</loc></url><url><loc>https://www.cypro.se/2022/09/14/iotw-albania-hit-with-cyber-attack-after-severing-ties-with-iran/</loc></url><url><loc>https://www.cypro.se/2022/09/15/u-s-charges-3-iranian-hackers-and-sanctions-several-others-over-ransomware-attacks/</loc></url><url><loc>https://www.cypro.se/2022/09/15/webworm-hackers-using-modified-rats-in-latest-cyber-espionage-attacks/</loc></url><url><loc>https://www.cypro.se/2022/09/15/russian-gamaredon-hackers-target-ukrainian-government-using-info-stealing-malware/</loc></url><url><loc>https://www.cypro.se/2022/09/15/5-ways-to-mitigate-your-new-insider-threats-in-the-great-resignation/</loc></url><url><loc>https://www.cypro.se/2022/09/15/researchers-warn-of-self-spreading-malware-targeting-gamers-via-youtube/</loc></url><url><loc>https://www.cypro.se/2022/09/16/uber-says-its-investigating-a-potential-breach-of-its-computer-systems/</loc></url><url><loc>https://www.cypro.se/2022/09/16/hackers-targeting-weblogic-servers-and-docker-apis-for-mining-cryptocurrencies/</loc></url><url><loc>https://www.cypro.se/2022/09/16/researchers-find-link-b-w-privateloader-and-ruzki-pay-per-install-services/</loc></url><url><loc>https://www.cypro.se/2022/09/16/north-korean-hackers-spreading-trojanized-versions-of-putty-client-application/</loc></url><url><loc>https://www.cypro.se/2022/09/16/how-to-use-a-utm-solution-win-time-money-and-resources/</loc></url><url><loc>https://www.cypro.se/2022/09/17/hackers-had-access-to-lastpasss-development-systems-for-four-days/</loc></url><url><loc>https://www.cypro.se/2022/09/17/uber-claims-no-sensitive-data-exposed-in-latest-breach-but-theres-more-to-this/</loc></url><url><loc>https://www.cypro.se/2022/09/19/microsoft-warns-of-large-scale-click-fraud-campaign-targeting-gamers/</loc></url><url><loc>https://www.cypro.se/2022/09/19/europol-and-bitdefender-release-free-decryptor-for-lockergoga-ransomware/</loc></url><url><loc>https://www.cypro.se/2022/09/19/emotet-botnet-started-distributing-quantum-and-blackcat-ransomware/</loc></url><url><loc>https://www.cypro.se/2022/09/19/microsoft-teams-gifshell-attack-what-is-it-and-how-you-can-protect-yourself-from-it/</loc></url><url><loc>https://www.cypro.se/2022/09/19/rockstar-games-confirms-hacker-stole-early-grand-theft-auto-vi-footage/</loc></url><url><loc>https://www.cypro.se/2022/09/20/uber-blames-lapsus-hacking-group-for-recent-security-breach/</loc></url><url><loc>https://www.cypro.se/2022/09/20/russian-sandworm-hackers-impersonate-ukrainian-telecoms-to-distribute-malware/</loc></url><url><loc>https://www.cypro.se/2022/09/21/record-ddos-attack-with-25-3-billion-requests-abused-http-2-multiplexing/</loc></url><url><loc>https://www.cypro.se/2022/09/21/critical-remote-hack-flaws-found-in-dataprobes-power-distribution-units/</loc></url><url><loc>https://www.cypro.se/2022/09/21/product-review-stellar-cyber-open-xdr-platform/</loc></url><url><loc>https://www.cypro.se/2022/09/20/protect-your-customers-to-protect-your-brand/</loc></url><url><loc>https://www.cypro.se/2022/09/20/takedown-removing-malicious-content-to-protect-your-brand/</loc></url><url><loc>https://www.cypro.se/2022/09/20/authentication-methods-choosing-the-right-type/</loc></url><url><loc>https://www.cypro.se/2022/09/21/common-scam-tactics-and-techniques/</loc></url><url><loc>https://www.cypro.se/2022/09/21/u-s-adds-2-more-chinese-telecom-firms-to-national-security-threat-list/</loc></url><url><loc>https://www.cypro.se/2022/09/21/crypto-trading-firm-wintermute-loses-160-million-in-hacking-incident/</loc></url><url><loc>https://www.cypro.se/2022/09/21/why-zero-trust-should-be-the-foundation-of-your-cybersecurity-ecosystem/</loc></url><url><loc>https://www.cypro.se/2022/09/21/revolut-data-breach-exposes-information-for-more-than-50000-customers/</loc></url><url><loc>https://www.cypro.se/2022/09/21/over-39000-unauthenticated-redis-instances-found-exposed-on-the-internet/</loc></url><url><loc>https://www.cypro.se/2022/09/22/wintermute-loses-160-million-in-hack/</loc></url><url><loc>https://www.cypro.se/2022/09/22/hackers-targeting-unpatched-atlassian-confluence-servers-to-deploy-crypto-miners/</loc></url><url><loc>https://www.cypro.se/2022/09/22/15-year-old-unpatched-python-vulnerability-potentially-affects-over-350000-projects/</loc></url><url><loc>https://www.cypro.se/2022/09/22/researchers-disclose-critical-vulnerability-in-oracle-cloud-infrastructure/</loc></url><url><loc>https://www.cypro.se/2022/09/22/it-security-takeaways-from-the-wiseasy-hack/</loc></url><url><loc>https://www.cypro.se/2022/09/22/malicious-npm-package-caught-mimicking-material-tailwind-css-package/</loc></url><url><loc>https://www.cypro.se/2022/09/22/researchers-uncover-years-long-mobile-spyware-campaign-targeting-uyghurs/</loc></url><url><loc>https://www.cypro.se/2022/09/23/fake-indian-banking-rewards-apps-targeting-android-users-with-info-stealing-malware/</loc></url><url><loc>https://www.cypro.se/2022/09/23/hackers-using-malicious-oauth-apps-to-take-over-email-servers/</loc></url><url><loc>https://www.cypro.se/2022/09/23/cisa-warns-of-hackers-exploiting-recent-zoho-manageengine-vulnerability/</loc></url><url><loc>https://www.cypro.se/2022/09/23/firing-your-entire-cybersecurity-team-are-you-sure/</loc></url><url><loc>https://www.cypro.se/2022/09/23/void-balaur-hackers-for-hire-targeting-russian-businesses-and-politics-entities/</loc></url><url><loc>https://www.cypro.se/2022/09/23/iotw-hacker-allegedly-hits-both-uber-and-rockstar/</loc></url><url><loc>https://www.cypro.se/2022/09/23/researchers-uncover-new-metador-apt-targeting-telcos-isps-and-universities/</loc></url><url><loc>https://www.cypro.se/2022/09/23/hackers-using-fake-circleci-notifications-to-hack-github-accounts/</loc></url><url><loc>https://www.cypro.se/2022/09/24/hackers-actively-exploiting-new-sophos-firewall-rce-vulnerability/</loc></url><url><loc>https://www.cypro.se/2022/09/24/london-police-arrested-17-year-old-hacker-suspected-of-uber-and-gta-6-breaches/</loc></url><url><loc>https://www.cypro.se/2022/09/26/ukraine-arrests-cybercrime-group-for-selling-data-of-30-million-people/</loc></url><url><loc>https://www.cypro.se/2022/09/26/blackcat-ransomware-attackers-spotted-fine-tuning-their-malware-arsenal/</loc></url><url><loc>https://www.cypro.se/2022/09/26/google-to-make-account-login-mandatory-for-new-fitbit-users-in-2023/</loc></url><url><loc>https://www.cypro.se/2022/09/26/chinese-espionage-hackers-target-tibetans-using-new-lowzero-backdoor/</loc></url><url><loc>https://www.cypro.se/2022/09/26/5-network-security-threats-and-how-to-protect-yourself/</loc></url><url><loc>https://www.cypro.se/2022/09/26/researchers-identify-3-hacktivist-groups-supporting-russian-interests/</loc></url><url><loc>https://www.cypro.se/2022/09/27/hacker-behind-optus-breach-releases-10200-customer-records-in-extortion-scheme/</loc></url><url><loc>https://www.cypro.se/2022/09/27/suspected-grand-theft-auto-6-hacker-arrested-by-uk-police/</loc></url><url><loc>https://www.cypro.se/2022/09/27/north-koreas-lazarus-hackers-targeting-macos-users-interested-in-crypto-jobs/</loc></url><url><loc>https://www.cypro.se/2022/09/27/why-continuous-security-testing-is-a-must-for-organizations-today/</loc></url><url><loc>https://www.cypro.se/2022/09/27/experts-uncover-85-apps-with-13-million-downloads-involved-in-ad-fraud-scheme/</loc></url><url><loc>https://www.cypro.se/2022/09/27/new-nullmixer-malware-campaign-stealing-users-payment-data-and-credentials/</loc></url><url><loc>https://www.cypro.se/2022/09/27/ukraine-says-russia-planning-massive-cyberattacks-on-its-critical-infrastructures/</loc></url><url><loc>https://www.cypro.se/2022/09/28/critical-whatsapp-bugs-could-have-let-attackers-hack-devices-remotely/</loc></url><url><loc>https://www.cypro.se/2022/09/27/winning-trust-and-making-powerful-connections/</loc></url><url><loc>https://www.cypro.se/2022/09/28/hackers-using-powerpoint-mouseover-trick-to-infect-system-with-malware/</loc></url><url><loc>https://www.cypro.se/2022/09/28/facebook-shuts-down-covert-political-influence-operations-from-russia-and-china/</loc></url><url><loc>https://www.cypro.se/2022/09/20/announcement-of-proposal-to-convert-fips-198-1-the-keyed-hash-message-authentication-code-hmac-to-a-nist-special-publication/</loc></url><url><loc>https://www.cypro.se/2022/09/20/nist-iot-cybersecurity-program-releases-two-new-documents/</loc></url><url><loc>https://www.cypro.se/2022/09/14/nist-releases-nist-ir-8286c-staging-cybersecurity-risks-for-enterprise-risk-management-and-governance-oversight/</loc></url><url><loc>https://www.cypro.se/2022/09/07/recommendation-for-random-bit-generator-constructions-third-public-draft-of-nist-sp-800-90c-available-for-comment/</loc></url><url><loc>https://www.cypro.se/2022/09/07/discussion-on-the-full-entropy-assumption-of-the-sp-800-90-series-initial-public-draft-of-nist-ir-8427-available-for-comment/</loc></url><url><loc>https://www.cypro.se/2022/09/06/request-for-additional-digital-signature-schemes-for-the-post-quantum-cryptography-standardization-process/</loc></url><url><loc>https://www.cypro.se/2022/08/18/nist-publishes-sp-800-108-revision-1-recommendation-for-key-derivation-using-pseudorandom-functions/</loc></url><url><loc>https://www.cypro.se/2022/08/12/nist-requests-comments-on-ir-8214b-initial-public-draft-notes-on-threshold-eddsa-schnorr-signatures/</loc></url><url><loc>https://www.cypro.se/2022/08/09/open-for-public-comment-zero-trust-architecture-preliminary-draft-practice-guide-vol-c-d/</loc></url><url><loc>https://www.cypro.se/2022/08/05/guide-to-a-secure-enterprise-network-landscape-nist-requests-comments-on-draft-sp-800-215/</loc></url><url><loc>https://www.cypro.se/2022/09/28/cyber-criminals-using-quantum-builder-sold-on-dark-web-to-deliver-agent-tesla-malware/</loc></url><url><loc>https://www.cypro.se/2022/09/28/improve-your-security-posture-with-wazuh-a-free-and-open-source-xdr/</loc></url><url><loc>https://www.cypro.se/2022/09/28/researchers-warn-of-new-go-based-malware-targeting-windows-and-linux-systems/</loc></url><url><loc>https://www.cypro.se/2022/09/29/swachh-city-platform-suffers-data-breach-leaking-16-million-user-records/</loc></url><url><loc>https://www.cypro.se/2022/09/29/hackers-aid-protests-against-iranian-government-with-proxies-leaks-and-hacks/</loc></url><url><loc>https://www.cypro.se/2022/09/29/researchers-uncover-covert-attack-campaign-targeting-military-contractors/</loc></url><url><loc>https://www.cypro.se/2022/09/29/five-steps-to-mitigate-the-risk-of-credential-exposure/</loc></url><url><loc>https://www.cypro.se/2022/09/29/brazilian-prilex-hackers-resurfaced-with-sophisticated-point-of-sale-malware/</loc></url><url><loc>https://www.cypro.se/2022/09/29/iotw-everything-we-know-about-the-optus-data-breach/</loc></url><url><loc>https://www.cypro.se/2022/09/30/warning-new-unpatched-microsoft-exchange-zero-day-under-active-exploitation/</loc></url><url><loc>https://www.cypro.se/2022/09/30/microsoft-confirms-2-new-exchange-zero-day-flaws-being-used-in-the-wild/</loc></url><url><loc>https://www.cypro.se/2022/09/30/new-malware-campaign-targeting-job-seekers-with-cobalt-strike-beacons/</loc></url><url><loc>https://www.cypro.se/2022/09/30/why-organisations-need-both-edr-and-ndr-for-complete-network-protection/</loc></url><url><loc>https://www.cypro.se/2022/09/30/north-korean-hackers-weaponizing-open-source-software-in-latest-cyber-attacks/</loc></url><url><loc>https://www.cypro.se/2022/09/29/threat-report-30th-september-2022/</loc></url><url><loc>https://www.cypro.se/2022/09/30/new-malware-families-found-targeting-vmware-esxi-hypervisors/</loc></url><url><loc>https://www.cypro.se/2022/09/30/cyber-attacks-against-middle-east-governments-hide-malware-in-windows-logo/</loc></url><url><loc>https://www.cypro.se/2022/10/01/state-sponsored-hackers-likely-exploited-ms-exchange-0-days-against-10-organizations/</loc></url><url><loc>https://www.cypro.se/2022/10/01/cisa-warns-of-hackers-exploiting-critical-atlassian-bitbucket-server-vulnerability/</loc></url><url><loc>https://www.cypro.se/2022/10/01/pay-what-you-want-for-this-collection-of-white-hat-hacking-courses/</loc></url><url><loc>https://www.cypro.se/2022/10/03/comm100-chat-provider-hijacked-to-spread-malware-in-supply-chain-attack/</loc></url><url><loc>https://www.cypro.se/2022/10/03/researchers-link-cheerscrypt-linux-based-ransomware-to-chinese-hackers/</loc></url><url><loc>https://www.cypro.se/2022/10/03/hackers-exploiting-dell-driver-vulnerability-to-deploy-rootkit-on-targeted-computers/</loc></url><url><loc>https://www.cypro.se/2022/10/03/ex-nsa-employee-arrested-for-trying-to-sell-u-s-secrets-to-a-foreign-government/</loc></url><url><loc>https://www.cypro.se/2022/10/04/proxynotshell-the-new-proxy-hell/</loc></url><url><loc>https://www.cypro.se/2022/10/04/optus-hack-exposes-data-of-nearly-2-1-million-australian-telecom-customers/</loc></url><url><loc>https://www.cypro.se/2022/10/04/cisa-orders-federal-agencies-to-regularly-track-network-assets-and-vulnerabilities/</loc></url><url><loc>https://www.cypro.se/2022/10/04/data-breach-sees-telstra-employees-details-posted-online/</loc></url><url><loc>https://www.cypro.se/2022/10/04/bec-scammer-gets-25-year-jail-sentence-for-stealing-over-9-5-million/</loc></url><url><loc>https://www.cypro.se/2022/10/04/back-to-basics-cybersecuritys-weakest-link/</loc></url><url><loc>https://www.cypro.se/2022/10/04/popular-youtube-channel-caught-distributing-malicious-tor-browser-installer/</loc></url><url><loc>https://www.cypro.se/2022/10/04/researchers-report-supply-chain-vulnerability-in-packagist-php-repository/</loc></url><url><loc>https://www.cypro.se/2022/10/04/russian-hacker-arrested-in-india-for-reportedly-helping-students-cheat-in-jee-main-exam/</loc></url><url><loc>https://www.cypro.se/2022/10/05/mitigation-for-exchange-zero-days-bypassed-microsoft-issues-new-workarounds/</loc></url><url><loc>https://www.cypro.se/2022/10/05/canadian-netwalker-ransomware-affiliate-sentenced-to-20-years-in-u-s-prison/</loc></url><url><loc>https://www.cypro.se/2022/10/04/cyber-essentials-plus-is-for-charities-too/</loc></url><url><loc>https://www.cypro.se/2022/10/05/see-yourself-in-cyber/</loc></url><url><loc>https://www.cypro.se/2022/10/05/fbi-cisa-and-nsa-reveal-how-hackers-targeted-a-defense-industrial-base-organization/</loc></url><url><loc>https://www.cypro.se/2022/10/05/want-more-secure-software-start-recognizing-security-skilled-developers/</loc></url><url><loc>https://www.cypro.se/2022/10/05/experts-warn-of-new-ratmilad-android-spyware-targeting-enterprise-devices/</loc></url><url><loc>https://www.cypro.se/2022/10/05/telstra-telecom-suffers-data-breach-potentially-exposing-employee-information/</loc></url><url><loc>https://www.cypro.se/2022/10/06/iotw-capital-one-hacker-given-probation-following-cyber-attack/</loc></url><url><loc>https://www.cypro.se/2022/10/06/19-year-old-teen-arrested-for-using-leaked-optus-breach-data-in-sms-scam/</loc></url><url><loc>https://www.cypro.se/2022/10/06/former-uber-security-chief-found-guilty-of-data-breach-coverup/</loc></url><url><loc>https://www.cypro.se/2022/10/06/eternity-group-hackers-offering-new-lilithbot-malware-as-a-service-to-cybercriminals/</loc></url><url><loc>https://www.cypro.se/2022/10/06/details-released-for-recently-patched-new-macos-archive-utility-vulnerability/</loc></url><url><loc>https://www.cypro.se/2022/10/06/the-ultimate-saas-security-posture-management-checklist-2023-edition/</loc></url><url><loc>https://www.cypro.se/2022/10/07/ferrari-denies-breach-following-7gb-of-data-posted-online/</loc></url><url><loc>https://www.cypro.se/2022/10/07/former-cso-of-uber-found-guilty-of-covering-up-data-breach/</loc></url><url><loc>https://www.cypro.se/2022/10/07/blackbyte-ransomware-abuses-vulnerable-windows-driver-to-disable-security-solutions/</loc></url><url><loc>https://www.cypro.se/2022/10/07/hackers-can-use-app-mode-in-chromium-browsers-for-stealth-phishing-attacks/</loc></url><url><loc>https://www.cypro.se/2022/10/06/whats-been-happening-with-cisp-then/</loc></url><url><loc>https://www.cypro.se/2022/10/07/the-essentials-of-grc-and-cybersecurity-how-they-empower-each-other/</loc></url><url><loc>https://www.cypro.se/2022/10/07/lofygang-distributed-200-malicious-npm-packages-to-steal-credit-card-data/</loc></url><url><loc>https://www.cypro.se/2022/10/07/facebook-detects-400-android-and-ios-apps-stealing-users-log-in-credentials/</loc></url><url><loc>https://www.cypro.se/2022/10/07/fortinet-warns-of-new-auth-bypass-flaw-affecting-fortigate-and-fortiproxy/</loc></url><url><loc>https://www.cypro.se/2022/10/08/microsoft-issues-improved-mitigations-for-unpatched-exchange-server-vulnerabilities/</loc></url><url><loc>https://www.cypro.se/2022/10/08/hackers-exploiting-unpatched-rce-flaw-in-zimbra-collaboration-suite/</loc></url><url><loc>https://www.cypro.se/2022/10/10/intel-confirms-leak-of-alder-lake-bios-source-code/</loc></url><url><loc>https://www.cypro.se/2022/10/10/hackers-steal-100-million-cryptocurrency-from-binance-bridge/</loc></url><url><loc>https://www.cypro.se/2022/10/10/new-report-uncovers-emotets-delivery-and-evasion-techniques-used-in-recent-attacks/</loc></url><url><loc>https://www.cypro.se/2022/10/10/researchers-detail-malicious-tools-used-by-cyberespionage-group-earth-aughisky/</loc></url><url><loc>https://www.cypro.se/2022/10/11/fortinet-warns-of-active-exploitation-of-newly-discovered-critical-auth-bypass-bug/</loc></url><url><loc>https://www.cypro.se/2022/10/11/researchers-detail-critical-rce-flaw-reported-in-popular-vm2-javascript-sandbox/</loc></url><url><loc>https://www.cypro.se/2022/10/11/the-latest-funding-news-and-what-it-means-for-cyber-security-in-2023/</loc></url><url><loc>https://www.cypro.se/2022/10/11/researchers-warn-of-new-phishing-as-a-service-being-used-by-cyber-criminals/</loc></url><url><loc>https://www.cypro.se/2022/10/11/bazarcall-callback-phishing-attacks-constantly-evolving-its-social-engineering-tactics/</loc></url><url><loc>https://www.cypro.se/2022/10/12/microsoft-patch-tuesday-fixes-new-windows-zero-day-no-patch-for-exchange-server-bugs/</loc></url><url><loc>https://www.cypro.se/2022/10/11/supply-chain-cyber-security-new-guidance-from-the-ncsc/</loc></url><url><loc>https://www.cypro.se/2022/10/12/over-1-2-million-credit-card-numbers-leaked-on-hacking-forum/</loc></url><url><loc>https://www.cypro.se/2022/10/12/64000-additional-patients-impacted-by-omnicell-data-breach-what-is-your-data-breach-action-plan/</loc></url><url><loc>https://www.cypro.se/2022/10/12/critical-bug-in-siemens-simatic-plcs-could-let-attackers-steal-cryptographic-keys/</loc></url><url><loc>https://www.cypro.se/2022/10/12/hackers-using-vishing-to-trick-victims-into-installing-android-banking-malware/</loc></url><url><loc>https://www.cypro.se/2022/10/12/scribe-platform-end-to-end-software-supply-chain-security/</loc></url><url><loc>https://www.cypro.se/2022/10/12/google-rolling-out-passkey-passwordless-login-support-to-android-and-chrome/</loc></url><url><loc>https://www.cypro.se/2022/10/13/researchers-uncover-custom-backdoors-and-spying-tools-used-by-polonium-hackers/</loc></url><url><loc>https://www.cypro.se/2022/10/13/modified-whatsapp-app-caught-infecting-android-devices-with-malware/</loc></url><url><loc>https://www.cypro.se/2022/10/12/nine-months-on-from-the-cyber-essentials-update-debunking-some-myths/</loc></url><url><loc>https://www.cypro.se/2022/10/13/budworm-hackers-resurface-with-new-espionage-attacks-aimed-at-u-s-organization/</loc></url><url><loc>https://www.cypro.se/2022/10/13/iotw-toyota-admits-to-data-breach-after-access-key-is-posted-on-github/</loc></url><url><loc>https://www.cypro.se/2022/10/13/new-chinese-malware-attack-framework-targets-windows-macos-and-linux-systems/</loc></url><url><loc>https://www.cypro.se/2022/10/13/new-timing-attack-against-npm-registry-api-could-expose-private-packages/</loc></url><url><loc>https://www.cypro.se/2022/10/13/does-the-owasp-top-10-still-matter/</loc></url><url><loc>https://www.cypro.se/2022/10/14/poc-exploit-released-for-critical-fortinet-auth-bypass-bug-under-active-attacks/</loc></url><url><loc>https://www.cypro.se/2022/10/14/mirai-botnet-hits-wynncraft-minecraft-server-with-2-5-tbps-ddos-attack/</loc></url><url><loc>https://www.cypro.se/2022/10/13/threat-report-14th-october-2022/</loc></url><url><loc>https://www.cypro.se/2022/10/14/new-php-version-of-ducktail-malware-hijacking-facebook-business-accounts/</loc></url><url><loc>https://www.cypro.se/2022/10/14/how-to-build-a-career-as-a-freelance-cybersecurity-analyst-from-scratch/</loc></url><url><loc>https://www.cypro.se/2022/10/14/shein-fined-us1-9mn-over-data-breach-affecting-39-million-customers/</loc></url><url><loc>https://www.cypro.se/2022/10/14/new-chinese-cyberespionage-group-targeting-it-service-providers-and-telcos/</loc></url><url><loc>https://www.cypro.se/2022/10/05/nist-releases-draft-nist-ir-8408-understanding-stablecoin-technology-and-related-security-considerations/</loc></url><url><loc>https://www.cypro.se/2022/10/14/researchers-reveal-detail-for-windows-zero-day-vulnerability-patched-last-month/</loc></url><url><loc>https://www.cypro.se/2022/10/15/indian-energy-company-tata-powers-it-infrastructure-hit-by-cyber-attack/</loc></url><url><loc>https://www.cypro.se/2022/10/17/interpol-led-operation-takes-down-black-axe-cyber-crime-organization/</loc></url><url><loc>https://www.cypro.se/2022/10/17/zimbra-releases-patch-for-actively-exploited-vulnerability-in-its-collaboration-suite/</loc></url><url><loc>https://www.cypro.se/2022/10/17/black-basta-ransomware-hackers-infiltrates-networks-via-qakbot-to-deploy-brute-ratel-c4/</loc></url><url><loc>https://www.cypro.se/2022/10/17/researchers-say-microsoft-office-365-uses-broken-email-encryption-to-secure-messages/</loc></url><url><loc>https://www.cypro.se/2022/10/17/why-crypto-winter-is-no-excuse-to-let-your-cyber-defenses-falter/</loc></url><url><loc>https://www.cypro.se/2022/10/17/new-prestige-ransomware-targeting-polish-and-ukrainian-organizations/</loc></url><url><loc>https://www.cypro.se/2022/10/18/critical-rce-vulnerability-discovered-in-popular-cobalt-strike-hacking-software/</loc></url><url><loc>https://www.cypro.se/2022/10/18/chinese-spyder-loader-malware-spotted-targeting-organizations-in-hong-kong/</loc></url><url><loc>https://www.cypro.se/2022/10/18/european-police-arrest-a-gang-that-hacked-wireless-key-fobs-to-steal-cars/</loc></url><url><loc>https://www.cypro.se/2022/10/18/%d1%81ryptocurrency-and-ransomware-the-ultimate-friendship/</loc></url><url><loc>https://www.cypro.se/2022/10/17/cmvp-security-policy-requirements-nist-sp-800-140b-rev-1-second-public-draft-available-for-public-comment/</loc></url><url><loc>https://www.cypro.se/2022/10/17/open-for-public-comment-draft-nist-ir-8406-cybersecurity-for-the-liquefied-natural-gas-industry-a-cybersecurity-framework-profile/</loc></url><url><loc>https://www.cypro.se/2022/10/13/nist-releases-2021-cybersecurity-and-privacy-program-annual-report/</loc></url><url><loc>https://www.cypro.se/2022/10/18/mydeal-data-breach-impacts-2-2-million-people/</loc></url><url><loc>https://www.cypro.se/2022/10/19/cisa-warns-of-critical-flaws-affecting-industrial-appliances-from-advantech-and-hitachi/</loc></url><url><loc>https://www.cypro.se/2022/10/18/early-warning-whats-new-and-whats-in-it-for-you/</loc></url><url><loc>https://www.cypro.se/2022/10/19/experts-warn-of-stealthy-powershell-backdoor-disguising-as-windows-update/</loc></url><url><loc>https://www.cypro.se/2022/10/19/medibank-is-latest-australian-company-to-suffer-cyber-security-incident/</loc></url><url><loc>https://www.cypro.se/2022/10/19/employment-scams-how-to-avoid-them/</loc></url><url><loc>https://www.cypro.se/2022/10/19/researchers-detail-azure-sfx-flaw-that-couldve-allowed-attackers-to-gain-admin-access/</loc></url><url><loc>https://www.cypro.se/2022/10/19/chinese-hackers-targeting-online-casinos-with-gameplayerframework-malware/</loc></url><url><loc>https://www.cypro.se/2022/10/19/a-quick-guide-for-small-cybersecurity-teams-looking-to-invest-in-cyber-insurance/</loc></url><url><loc>https://www.cypro.se/2022/10/20/brazilian-police-arrest-suspected-member-of-lapsus-hacking-group/</loc></url><url><loc>https://www.cypro.se/2022/10/20/these-16-clicker-malware-infected-android-apps-were-downloaded-over-20-million-times/</loc></url><url><loc>https://www.cypro.se/2022/10/20/new-ursnif-variant-likely-shifting-focus-to-ransomware-and-data-theft/</loc></url><url><loc>https://www.cypro.se/2022/10/20/hackers-using-new-version-of-furball-android-malware-to-spy-on-iranian-citizens/</loc></url><url><loc>https://www.cypro.se/2022/10/20/not-all-sandboxes-are-for-children-how-to-secure-your-saas-sandbox/</loc></url><url><loc>https://www.cypro.se/2022/10/20/iotw-medibank-confirms-200gb-of-customer-data-stolen/</loc></url><url><loc>https://www.cypro.se/2022/10/20/google-launches-guac-open-source-project-to-secure-software-supply-chain/</loc></url><url><loc>https://www.cypro.se/2022/10/20/oldgremlin-ransomware-targeted-over-a-dozen-russian-entities-in-multi-million-scheme/</loc></url><url><loc>https://www.cypro.se/2022/10/21/a-quick-look-at-the-strengthening-americas-cybersecurity-initiative/</loc></url><url><loc>https://www.cypro.se/2022/10/21/microsoft-confirms-server-misconfiguration-led-to-65000-companies-data-leak/</loc></url><url><loc>https://www.cypro.se/2022/10/21/hackers-started-exploiting-critical-text4shell-apache-commons-text-vulnerability/</loc></url><url><loc>https://www.cypro.se/2022/10/21/multiple-campaigns-exploit-vmware-vulnerability-to-deploy-crypto-miners-and-ransomware/</loc></url><url><loc>https://www.cypro.se/2022/10/21/emotet-botnet-distributing-self-unlocking-password-protected-rar-files-to-drop-malware/</loc></url><url><loc>https://www.cypro.se/2022/10/22/critical-flaw-reported-in-move-virtual-machine-powering-the-aptos-blockchain-network/</loc></url><url><loc>https://www.cypro.se/2022/10/24/why-ransomware-in-education-on-the-rise-and-what-that-means-for-2023/</loc></url><url><loc>https://www.cypro.se/2022/10/24/sidewinder-apt-using-new-warhawk-backdoor-to-target-entities-in-pakistan/</loc></url><url><loc>https://www.cypro.se/2022/10/24/cisa-warns-of-daixin-team-hackers-targeting-health-organizations-with-ransomware/</loc></url><url><loc>https://www.cypro.se/2022/10/24/download-ebook-top-virtual-cisos-share-7-tips-for-vciso-service-providers/</loc></url><url><loc>https://www.cypro.se/2022/10/25/apple-releases-patch-for-new-actively-exploited-ios-and-ipados-zero-day-vulnerability/</loc></url><url><loc>https://www.cypro.se/2022/10/25/how-the-software-supply-chain-security-is-threatened-by-hackers/</loc></url><url><loc>https://www.cypro.se/2022/10/25/cybercriminals-used-two-pos-malware-to-steal-details-of-over-167000-credit-cards/</loc></url><url><loc>https://www.cypro.se/2022/10/25/researchers-detail-windows-event-log-vulnerabilities-logcrusher-and-overlog/</loc></url><url><loc>https://www.cypro.se/2022/10/25/22-year-old-vulnerability-reported-in-widely-used-sqlite-database-library/</loc></url><url><loc>https://www.cypro.se/2022/10/25/hive-ransomware-hackers-begin-leaking-data-stolen-from-tata-power-energy-company/</loc></url><url><loc>https://www.cypro.se/2022/10/26/vmware-releases-patch-for-critical-rce-flaw-in-cloud-foundation-platform/</loc></url><url><loc>https://www.cypro.se/2022/10/26/vice-society-hackers-are-behind-several-ransomware-attacks-against-education-sector/</loc></url><url><loc>https://www.cypro.se/2022/10/26/hackers-actively-exploiting-cisco-anyconnect-and-gigabyte-drivers-vulnerabilities/</loc></url><url><loc>https://www.cypro.se/2022/10/26/u-s-charges-ukrainian-hacker-over-role-in-raccoon-stealer-malware-service/</loc></url><url><loc>https://www.cypro.se/2022/10/26/this-9-course-bundle-can-take-your-cybersecurity-skills-to-the-next-level/</loc></url><url><loc>https://www.cypro.se/2022/10/26/kimsuky-hackers-spotted-using-3-new-android-malware-to-target-south-koreans/</loc></url><url><loc>https://www.cypro.se/2022/10/26/unknown-actors-are-deploying-romcom-rat-to-target-ukrainian-military/</loc></url><url><loc>https://www.cypro.se/2022/10/27/australian-health-insurer-medibank-suffers-breach-exposing-3-9-million-customers-data/</loc></url><url><loc>https://www.cypro.se/2022/10/27/new-cryptojacking-campaign-targeting-vulnerable-docker-and-kubernetes-instances/</loc></url><url><loc>https://www.cypro.se/2022/10/27/apple-ios-and-macos-flaw-couldve-let-apps-eavesdrop-on-your-conversations-with-siri/</loc></url><url><loc>https://www.cypro.se/2022/10/27/ransomware-open-source-to-the-rescue/</loc></url><url><loc>https://www.cypro.se/2022/10/26/so-long-and-thanks-for-all-the-bits/</loc></url><url><loc>https://www.cypro.se/2022/08/01/nist-researcher-describes-easytrust-for-digital-data-defense-in-manufacturing/</loc></url><url><loc>https://www.cypro.se/2022/10/27/british-hacker-charged-for-operating-the-real-deal-dark-web-marketplace/</loc></url><url><loc>https://www.cypro.se/2022/10/27/researchers-expose-over-80-shadowpad-malware-c2-servers/</loc></url><url><loc>https://www.cypro.se/2022/10/28/researchers-uncover-stealthy-techniques-used-by-cranefly-espionage-hackers/</loc></url><url><loc>https://www.cypro.se/2022/10/28/implementing-defense-in-depth-to-prevent-and-mitigate-cyber-attacks/</loc></url><url><loc>https://www.cypro.se/2022/10/28/google-issues-urgent-chrome-update-to-patch-actively-exploited-zero-day-vulnerability/</loc></url><url><loc>https://www.cypro.se/2022/10/28/raspberry-robin-operators-selling-cybercriminals-access-to-thousands-of-endpoints/</loc></url><url><loc>https://www.cypro.se/2022/10/28/these-dropper-apps-on-play-store-targeting-over-200-banking-and-cryptocurrency-wallets/</loc></url><url><loc>https://www.cypro.se/2022/10/28/hacker-steals-us1mn-worth-of-crypto-and-nfts-24-hours/</loc></url><url><loc>https://www.cypro.se/2022/10/28/high-severity-flaws-in-juniper-junos-os-affect-enterprise-networking-devices/</loc></url><url><loc>https://www.cypro.se/2022/10/28/cloud-security-made-simple-in-new-guidebook-for-lean-teams/</loc></url><url><loc>https://www.cypro.se/2022/10/27/threat-report-28th-october-2022/</loc></url><url><loc>https://www.cypro.se/2022/08/01/nist-led-research-shows-advantages-of-quantum-enabled-communications-for-internet/</loc></url><url><loc>https://www.cypro.se/2022/08/01/nist-researchers-demonstrate-quantum-entanglement-with-distant-synchronized-network-nodes/</loc></url><url><loc>https://www.cypro.se/2022/10/29/twilio-reveals-another-breach-from-the-same-hackers-behind-the-august-hack/</loc></url><url><loc>https://www.cypro.se/2022/10/31/samsung-galaxy-store-bug-couldve-let-hackers-secretly-install-apps-on-targeted-devices/</loc></url><url><loc>https://www.cypro.se/2022/10/31/github-repojacking-bug-couldve-allowed-attackers-to-takeover-other-users-repositories/</loc></url><url><loc>https://www.cypro.se/2022/10/31/tips-for-choosing-a-pentesting-company/</loc></url><url><loc>https://www.cypro.se/2022/10/31/unofficial-patch-released-for-new-actively-exploited-windows-motw-vulnerability/</loc></url><url><loc>https://www.cypro.se/2022/10/31/fodcha-ddos-botnet-resurfaces-with-new-capabilities/</loc></url><url><loc>https://www.cypro.se/2022/11/01/last-years-open-source-tomorrows-vulnerabilities/</loc></url><url><loc>https://www.cypro.se/2022/11/01/critical-rce-vulnerability-reported-in-connectwise-server-backup-solution/</loc></url><url><loc>https://www.cypro.se/2022/11/01/scanning-the-internet-for-fun-and-profit/</loc></url><url><loc>https://www.cypro.se/2022/11/01/researchers-disclose-details-of-critical-cosmiss-rce-flaw-affecting-azure-cosmos-db/</loc></url><url><loc>https://www.cypro.se/2022/11/01/chinese-hackers-using-new-stealthy-infection-chain-to-deploy-lodeinfo-malware/</loc></url><url><loc>https://www.cypro.se/2022/11/01/openssl-releases-patch-for-2-new-high-severity-vulnerabilities/</loc></url><url><loc>https://www.cypro.se/2022/11/02/dropbox-breach-hackers-unauthorizedly-accessed-130-github-source-code-repositories/</loc></url><url><loc>https://www.cypro.se/2022/11/02/experts-warn-of-sandstrike-android-spyware-infecting-devices-via-malicious-vpn-app/</loc></url><url><loc>https://www.cypro.se/2022/11/02/these-android-apps-with-a-million-play-store-installations-redirect-users-to-malicious-sites/</loc></url><url><loc>https://www.cypro.se/2022/11/02/inside-raccoon-stealer-v2/</loc></url><url><loc>https://www.cypro.se/2022/11/02/multiple-vulnerabilities-reported-in-checkmk-it-infrastructure-monitoring-software/</loc></url><url><loc>https://www.cypro.se/2022/11/02/cyberuk-2023-technical-masterclass-call-for-abstracts-now-open/</loc></url><url><loc>https://www.cypro.se/2022/11/02/dropbox-suffers-data-breach-following-phishing-attack/</loc></url><url><loc>https://www.cypro.se/2022/11/03/new-tiktok-privacy-policy-confirms-chinese-staff-can-access-european-users-data/</loc></url><url><loc>https://www.cypro.se/2022/11/03/hackers-using-rogue-versions-of-keepass-and-solarwinds-software-to-distribute-romcom-rat/</loc></url><url><loc>https://www.cypro.se/2022/11/03/why-identity-access-management-governance-is-a-core-part-of-your-saas-security/</loc></url><url><loc>https://www.cypro.se/2022/11/03/opera1er-apt-hackers-targeted-dozens-of-financial-organizations-in-africa/</loc></url><url><loc>https://www.cypro.se/2022/10/18/spotlight-after-50-years-a-look-back-at-nist-cybersecurity-milestones/</loc></url><url><loc>https://www.cypro.se/2022/12/13/cybersecurity-measurement-workshop/</loc></url><url><loc>https://www.cypro.se/2022/11/03/researchers-find-links-b-w-black-basta-ransomware-and-fin7-hackers/</loc></url><url><loc>https://www.cypro.se/2022/11/04/cisa-warns-of-critical-vulnerabilities-in-3-industrial-control-system-software/</loc></url><url><loc>https://www.cypro.se/2022/11/04/decision-to-convert-fips-198-1-to-a-nist-special-publication/</loc></url><url><loc>https://www.cypro.se/2022/11/02/draft-project-description-for-securing-water-and-wastewater-utilities-cybersecurity-for-the-water-and-wastewater-systems-sector/</loc></url><url><loc>https://www.cypro.se/2022/11/01/summary-and-analysis-of-responses-to-cui-series-pre-draft-call-for-comments/</loc></url><url><loc>https://www.cypro.se/2022/11/04/researchers-detail-new-malware-campaign-targeting-indian-government-employees/</loc></url><url><loc>https://www.cypro.se/2022/11/04/your-ot-is-no-longer-isolated-act-fast-to-protect-it/</loc></url><url><loc>https://www.cypro.se/2022/11/05/microsoft-warns-of-uptick-in-hackers-leveraging-publicly-disclosed-0-day-vulnerabilities/</loc></url><url><loc>https://www.cypro.se/2022/11/05/researchers-uncover-29-malicious-pypi-packages-targeted-developers-with-w4sp-stealer/</loc></url><url><loc>https://www.cypro.se/2024/11/07/linkedin-2012-hack-what-you-need-to-know/</loc></url><url><loc>https://www.cypro.se/2022/05/26/plan-for-security-flaws/</loc></url><url><loc>https://www.cypro.se/2021/11/03/new-brochure-published-to-support-academic-researchers/</loc></url><url><loc>https://www.cypro.se/2022/11/07/robin-banks-phishing-service-for-cybercriminals-returns-with-russian-server/</loc></url><url><loc>https://www.cypro.se/2022/11/07/experts-find-urlscan-security-scanner-inadvertently-leaks-sensitive-urls-and-data/</loc></url><url><loc>https://www.cypro.se/2022/11/07/this-hidden-facebook-tool-lets-users-remove-their-email-or-phone-number-shared-by-others/</loc></url><url><loc>https://www.cypro.se/2022/11/07/medibank-refuses-pay-ransom-after-9-7m-customers-details-stolen/</loc></url><url><loc>https://www.cypro.se/2022/11/07/medibank-refuses-to-pay-ransom-after-9-7-million-customers-exposed-in-ransomware-hack/</loc></url><url><loc>https://www.cypro.se/2022/11/08/hacker-threatens-to-release-data-stolen-from-9-7m-medibank-customers/</loc></url><url><loc>https://www.cypro.se/2022/11/08/u-s-seizes-over-50k-bitcoin-worth-3-3-billion-linked-to-silk-road-dark-web/</loc></url><url><loc>https://www.cypro.se/2022/11/08/5-reasons-to-consolidate-your-tech-stack/</loc></url><url><loc>https://www.cypro.se/2022/11/08/amadey-bot-spotted-deploying-lockbit-3-0-ransomware-on-hacked-machines/</loc></url><url><loc>https://www.cypro.se/2022/11/08/new-laplas-clipper-malware-targeting-cryptocurrency-users-via-smokeloader/</loc></url><url><loc>https://www.cypro.se/2022/11/09/install-latest-windows-update-asap-patches-issued-for-6-actively-exploited-zero-days/</loc></url><url><loc>https://www.cypro.se/2022/11/09/vmware-warns-of-3-new-critical-flaws-affecting-workspace-one-assist-software/</loc></url><url><loc>https://www.cypro.se/2022/11/09/experts-warn-of-browser-extensions-spying-on-users-via-cloud9-chrome-botnet-network/</loc></url><url><loc>https://www.cypro.se/2022/11/09/top-5-api-security-myths-that-are-crushing-your-business/</loc></url><url><loc>https://www.cypro.se/2022/11/09/new-icexloader-malware-loader-variant-infected-thousands-of-victims-worldwide/</loc></url><url><loc>https://www.cypro.se/2022/11/09/understanding-threat-actors/</loc></url><url><loc>https://www.cypro.se/2022/11/09/hacker-releases-stolen-medibank-data-on-the-dark-web/</loc></url><url><loc>https://www.cypro.se/2022/11/09/apt29-exploited-a-windows-feature-to-compromise-european-diplomatic-entity-network/</loc></url><url><loc>https://www.cypro.se/2022/11/09/several-cyber-attacks-observed-leveraging-ipfs-decentralized-network/</loc></url><url><loc>https://www.cypro.se/2022/11/10/new-uefi-firmware-flaws-reported-in-several-lenovo-notebook-models/</loc></url><url><loc>https://www.cypro.se/2022/11/10/high-severity-flaw-reported-in-critical-system-used-in-oil-and-gas-companies/</loc></url><url><loc>https://www.cypro.se/2022/11/10/re-focusing-cyber-insurance-with-security-validation/</loc></url><url><loc>https://www.cypro.se/2022/11/10/citrix-issues-patches-for-critical-flaw-affecting-adc-and-gateway-products/</loc></url><url><loc>https://www.cypro.se/2022/11/10/researchers-uncover-pypi-package-hiding-malicious-code-behind-image-file/</loc></url><url><loc>https://www.cypro.se/2022/11/10/is-cybersecurity-awareness-month-anything-more-than-pr/</loc></url><url><loc>https://www.cypro.se/2022/11/09/software-supply-chain-and-devops-security-practices-implementing-a-risk-based-approach-to-devsecops-final-project-description-released/</loc></url><url><loc>https://www.cypro.se/2022/11/08/mitigating-ai-ml-bias-in-context-final-project-description-released/</loc></url><url><loc>https://www.cypro.se/2022/11/10/iotw-everything-we-know-about-the-medibank-data-leak/</loc></url><url><loc>https://www.cypro.se/2022/11/10/warning-new-massive-malicious-campaigns-targeting-top-indian-banks-customers/</loc></url><url><loc>https://www.cypro.se/2022/11/10/hacker-rewarded-70000-for-finding-way-to-bypass-google-pixel-phones-lock-screens/</loc></url><url><loc>https://www.cypro.se/2022/11/10/winners-announced-in-first-phase-of-uk-us-privacy-enhancing-technologies-prize-challenges/</loc></url><url><loc>https://www.cypro.se/2022/11/11/microsoft-blames-russian-hackers-for-prestige-ransomware-attacks-on-ukraine-and-poland/</loc></url><url><loc>https://www.cypro.se/2022/11/11/multiple-high-severity-flaw-affect-widely-used-openlitespeed-web-server-software/</loc></url><url><loc>https://www.cypro.se/2022/11/11/russian-canadian-national-charged-over-involvement-in-lockbit-ransomware-attacks/</loc></url><url><loc>https://www.cypro.se/2022/11/11/eset-antivirus-advanced-protection-solutions-for-home-users-and-businesses/</loc></url><url><loc>https://www.cypro.se/2022/11/11/these-two-google-play-store-apps-spotted-distributing-xenomorph-banking-trojan/</loc></url><url><loc>https://www.cypro.se/2022/11/11/vpn-vs-dns-security/</loc></url><url><loc>https://www.cypro.se/2022/11/11/experts-uncover-two-long-running-android-spyware-campaigns-targeting-uyghurs/</loc></url><url><loc>https://www.cypro.se/2022/11/11/threat-report-11th-november-2022/</loc></url><url><loc>https://www.cypro.se/2022/11/14/worok-hackers-abuse-dropbox-api-to-exfiltrate-data-via-backdoor-hidden-in-images/</loc></url><url><loc>https://www.cypro.se/2022/11/14/new-kmsdbot-malware-hijacking-systems-for-mining-crypto-and-launch-ddos-attacks/</loc></url><url><loc>https://www.cypro.se/2022/11/14/over-15000-wordpress-sites-compromised-in-malicious-seo-campaign/</loc></url><url><loc>https://www.cypro.se/2022/11/14/what-is-an-external-penetration-test/</loc></url><url><loc>https://www.cypro.se/2022/11/14/new-earth-longzhi-apt-targets-ukraine-and-asian-countries-with-custom-cobalt-strike-loaders/</loc></url><url><loc>https://www.cypro.se/2023/01/26/nice-webinar-optimizing-your-linkedin-profile-for-your-cybersecurity-career-2/</loc></url><url><loc>https://www.cypro.se/2022/11/14/we-know-who-are-says-afp-to-medibank-hackers/</loc></url><url><loc>https://www.cypro.se/2022/11/15/google-to-pay-391-million-privacy-fine-for-secretly-tracking-users-location/</loc></url><url><loc>https://www.cypro.se/2022/11/15/researchers-say-china-state-backed-hackers-breached-a-digital-certificate-authority/</loc></url><url><loc>https://www.cypro.se/2022/11/15/deep-packet-inspection-vs-metadata-analysis-of-network-detection-response-ndr-solutions/</loc></url><url><loc>https://www.cypro.se/2022/11/14/performance-measurement-guide-for-information-security-annotated-outline-available-for-comment/</loc></url><url><loc>https://www.cypro.se/2022/11/15/critical-rce-flaw-reported-in-spotifys-backstage-software-catalog-and-developer-platform/</loc></url><url><loc>https://www.cypro.se/2022/11/15/pcspoof-new-vulnerability-affects-networking-tech-used-by-spacecraft-and-aircraft/</loc></url><url><loc>https://www.cypro.se/2022/11/15/researchers-reported-critical-sqli-and-access-flaws-in-zendesk-analytics-service/</loc></url><url><loc>https://www.cypro.se/2022/11/16/google-to-roll-out-privacy-sandbox-beta-on-android-13-by-early-2023/</loc></url><url><loc>https://www.cypro.se/2022/11/16/cyberfirst-girls-falling-into-coding/</loc></url><url><loc>https://www.cypro.se/2022/11/16/warning-new-rapperbot-campaign-aims-to-launch-ddos-attacks-at-game-servers/</loc></url><url><loc>https://www.cypro.se/2022/11/16/researchers-discover-hundreds-of-amazon-rds-instances-leaking-users-personal-data/</loc></url><url><loc>https://www.cypro.se/2022/11/16/7-reasons-to-choose-an-mdr-provider/</loc></url><url><loc>https://www.cypro.se/2022/11/15/de-identifying-government-data-sets-third-public-draft-available-for-comment/</loc></url><url><loc>https://www.cypro.se/2022/11/15/nist-releases-nist-ir-8409-measuring-the-common-vulnerability-scoring-system-base-score-equation/</loc></url><url><loc>https://www.cypro.se/2022/11/17/high-severity-vulnerabilities-reported-in-f5-big-ip-and-big-iq-devices/</loc></url><url><loc>https://www.cypro.se/2022/11/17/iranian-hackers-compromised-a-u-s-federal-agencys-network-using-log4shell-exploit/</loc></url><url><loc>https://www.cypro.se/2022/11/17/north-korean-hackers-targeting-europe-and-latin-america-with-updated-dtrack-backdoor/</loc></url><url><loc>https://www.cypro.se/2022/11/17/fbi-wanted-leader-of-the-notorious-zeus-botnet-gang-arrested-in-geneva/</loc></url><url><loc>https://www.cypro.se/2022/11/17/100-apps-endless-security-checks/</loc></url><url><loc>https://www.cypro.se/2022/11/17/personnel-security-in-the-cloud/</loc></url><url><loc>https://www.cypro.se/2022/11/17/chinese-hackers-using-42000-imposter-domains-in-massive-phishing-attack-campaign/</loc></url><url><loc>https://www.cypro.se/2022/12/08/nccoe-learning-series-cybersecurity-for-the-water-and-wastewater-systems-sector/</loc></url><url><loc>https://www.cypro.se/2022/11/18/w4sp-stealer-constantly-targeting-python-developers-in-ongoing-supply-chain-attack/</loc></url><url><loc>https://www.cypro.se/2022/11/18/cyberfirst-girls-from-top-gun-to-tech/</loc></url><url><loc>https://www.cypro.se/2022/11/18/hive-ransomware-attackers-extorted-100-million-from-over-1300-companies-worldwide/</loc></url><url><loc>https://www.cypro.se/2022/11/18/threat-hunting-with-mitre-attck-and-wazuh/</loc></url><url><loc>https://www.cypro.se/2022/11/18/meta-reportedly-fires-dozens-of-employees-for-hijacking-users-facebook-and-instagram-accounts/</loc></url><url><loc>https://www.cypro.se/2022/11/18/lodarat-malware-resurfaces-with-new-variants-employing-updated-functionalities/</loc></url><url><loc>https://www.cypro.se/2022/11/19/atlassian-releases-patches-for-critical-flaws-affecting-crowd-and-bitbucket-products/</loc></url><url><loc>https://www.cypro.se/2022/11/19/chinese-mustang-panda-hackers-actively-targeting-governments-worldwide/</loc></url><url><loc>https://www.cypro.se/2022/11/19/microsoft-warns-of-hackers-using-google-ads-to-distribute-royal-ransomware/</loc></url><url><loc>https://www.cypro.se/2022/11/19/indian-government-publishes-draft-of-digital-personal-data-protection-bill-2022/</loc></url><url><loc>https://www.cypro.se/2022/11/21/google-identifies-34-cracked-versions-of-popular-cobalt-strike-hacking-toolkit-in-the-wild/</loc></url><url><loc>https://www.cypro.se/2022/11/21/google-wins-lawsuit-against-russians-linked-to-blockchain-based-glupteba-botnet/</loc></url><url><loc>https://www.cypro.se/2022/11/21/been-doing-it-the-same-way-for-years-think-again/</loc></url><url><loc>https://www.cypro.se/2022/11/21/notorious-emotet-malware-returns-with-high-volume-malspam-campaign/</loc></url><url><loc>https://www.cypro.se/2022/11/21/daixin-ransomware-gang-steals-5-million-airasia-passengers-and-employees-data/</loc></url><url><loc>https://www.cypro.se/2022/11/22/luna-moth-gang-invests-in-call-centers-to-target-businesses-with-callback-phishing-campaigns/</loc></url><url><loc>https://www.cypro.se/2022/11/22/u-s-authorities-seize-domains-used-in-pig-butchering-cryptocurrency-scams/</loc></url><url><loc>https://www.cypro.se/2022/11/22/meta-fires-employees-for-allegedly-hacking-into-users-accounts/</loc></url><url><loc>https://www.cypro.se/2022/11/22/researchers-warn-of-cyber-criminals-using-go-based-aurora-stealer-malware/</loc></url><url><loc>https://www.cypro.se/2022/11/22/heres-how-to-ensure-your-incident-response-strategy-is-ready-for-holiday-hackers/</loc></url><url><loc>https://www.cypro.se/2022/11/22/this-malware-installs-malicious-browser-extensions-to-steal-users-passwords-and-cryptos/</loc></url><url><loc>https://www.cypro.se/2022/11/23/nighthawk-likely-to-become-hackers-new-post-exploitation-tool-after-cobalt-strike/</loc></url><url><loc>https://www.cypro.se/1970/01/01/mitigating-malware-and-ransomware-attacks/</loc></url><url><loc>https://www.cypro.se/2022/11/25/iotw-twitter-accused-of-covering-up-data-breach-that-affects-millions/</loc></url><url><loc>https://www.cypro.se/2022/11/25/threat-report-25th-november-2022/</loc></url><url><loc>https://www.cypro.se/2022/11/28/hacker-attempts-to-sell-data-of-500m-whatsapp-users-on-dark-web/</loc></url><url><loc>https://www.cypro.se/2022/11/29/meta-fined-us275-million-following-enquiry-into-april-2021-data-leak/</loc></url><url><loc>https://www.cypro.se/2022/11/30/ncsc-for-startups-vistalworks-cracking-down-on-illicit-trade/</loc></url><url><loc>https://www.cypro.se/2022/11/30/the-psychic-and-the-social-engineer/</loc></url><url><loc>https://www.cypro.se/2022/11/30/encryption-provider-for-sony-leaks-data-for-over-a-year/</loc></url><url><loc>https://www.cypro.se/2022/12/01/iotw-passwords-secure-in-latest-lastpass-data-breach/</loc></url><url><loc>https://www.cypro.se/2022/12/02/the-top-10-hacks-and-cyber-security-threats-of-2022/</loc></url><url><loc>https://www.cypro.se/2022/11/23/meta-takes-down-fake-facebook-and-instagram-accounts-linked-to-pro-u-s-influence-operation/</loc></url><url><loc>https://www.cypro.se/2022/12/05/critical-ping-vulnerability-allows-remote-attackers-to-take-over-freebsd-systems/</loc></url><url><loc>https://www.cypro.se/2022/11/23/top-cyber-threats-facing-e-commerce-sites-this-holiday-season/</loc></url><url><loc>https://www.cypro.se/2022/11/23/hackers-exploiting-abandoned-boa-web-servers-to-target-critical-industries/</loc></url><url><loc>https://www.cypro.se/2022/12/05/siriusxm-vulnerability-lets-hackers-remotely-unlock-and-start-connected-cars/</loc></url><url><loc>https://www.cypro.se/2022/12/05/north-korean-hackers-spread-applejeus-malware-disguised-as-cryptocurrency-apps/</loc></url><url><loc>https://www.cypro.se/2022/11/23/ducktail-malware-operation-evolves-with-new-malicious-capabilities/</loc></url><url><loc>https://www.cypro.se/2022/12/05/russian-courts-targeted-by-new-crywiper-data-wiper-malware-posing-as-ransomware/</loc></url><url><loc>https://www.cypro.se/2022/11/24/black-basta-ransomware-gang-actively-infiltrating-u-s-companies-with-qakbot-malware/</loc></url><url><loc>https://www.cypro.se/2022/11/23/34-russian-cybercrime-groups-stole-over-50-million-passwords-with-stealer-malware/</loc></url><url><loc>https://www.cypro.se/2022/12/05/new-bmc-supply-chain-vulnerabilities-affect-servers-from-dozens-of-manufacturers/</loc></url><url><loc>https://www.cypro.se/2022/12/05/when-being-attractive-gets-risky-how-does-your-attack-surface-look-to-an-attacker/</loc></url><url><loc>https://www.cypro.se/2022/11/17/nist-releases-ir-8286d-using-business-impact-analysis-to-inform-risk-prioritization-and-response/</loc></url><url><loc>https://www.cypro.se/2022/11/17/nist-publishes-sp-800-215-guide-to-a-secure-enterprise-network-landscape/</loc></url><url><loc>https://www.cypro.se/2022/11/16/nist-releases-revised-guidance-on-engineering-trustworthy-secure-systems/</loc></url><url><loc>https://www.cypro.se/2022/11/24/this-android-file-manager-app-infected-thousands-of-devices-with-sharkbot-malware/</loc></url><url><loc>https://www.cypro.se/2022/12/06/open-source-ransomware-toolkit-cryptonite-turns-into-accidental-wiper-malware/</loc></url><url><loc>https://www.cypro.se/2022/11/24/bahamut-cyber-espionage-hackers-targeting-android-users-with-fake-vpn-apps/</loc></url><url><loc>https://www.cypro.se/2022/12/06/telcom-and-bpo-companies-under-attack-by-sim-swapping-hackers/</loc></url><url><loc>https://www.cypro.se/2022/11/24/millions-of-android-devices-still-dont-have-patches-for-mali-gpu-flaws/</loc></url><url><loc>https://www.cypro.se/2022/11/24/boost-your-security-with-europes-leading-bug-bounty-platform/</loc></url><url><loc>https://www.cypro.se/2022/12/06/darknets-largest-mobile-malware-marketplace-threatens-users-worldwide/</loc></url><url><loc>https://www.cypro.se/2022/12/06/understanding-nist-csf-to-assess-your-organizations-ransomware-readiness/</loc></url><url><loc>https://www.cypro.se/2022/11/24/new-ransomexx-ransomware-variant-rewritten-in-the-rust-programming-language/</loc></url><url><loc>https://www.cypro.se/2022/12/06/iranian-state-hackers-targeting-key-figures-in-activism-journalism-and-politics/</loc></url><url><loc>https://www.cypro.se/2022/11/25/interpol-seized-130-million-from-cybercriminals-in-global-haechi-iii-crackdown-operation/</loc></url><url><loc>https://www.cypro.se/2022/12/06/chinese-hackers-target-middle-east-telecoms-in-latest-cyber-attacks/</loc></url><url><loc>https://www.cypro.se/2022/11/25/u-k-police-arrest-142-in-global-crackdown-on-ispoof-phone-spoofing-service/</loc></url><url><loc>https://www.cypro.se/2022/12/07/new-go-based-zerobot-botnet-exploiting-dozen-of-iot-vulnerabilities-to-expand-its-network/</loc></url><url><loc>https://www.cypro.se/2022/11/25/dell-hp-and-lenovo-devices-found-using-outdated-openssl-versions/</loc></url><url><loc>https://www.cypro.se/2022/12/07/microsoft-alerts-cryptocurrency-industry-of-targeted-cyber-attacks/</loc></url><url><loc>https://www.cypro.se/2022/12/07/new-zealand-government-compromised-in-third-party-cyber-attack/</loc></url><url><loc>https://www.cypro.se/2022/11/25/update-chrome-browser-now-to-patch-new-actively-exploited-zero-day-flaw/</loc></url><url><loc>https://www.cypro.se/2022/12/07/russian-hackers-spotted-targeting-u-s-military-weapons-and-hardware-supplier/</loc></url><url><loc>https://www.cypro.se/2022/12/07/are-ethics-and-social-engineering-compatible/</loc></url><url><loc>https://www.cypro.se/2022/11/26/russia-based-ransomboggs-ransomware-targeted-several-ukrainian-organizations/</loc></url><url><loc>https://www.cypro.se/2022/12/07/chinese-hackers-using-russo-ukrainian-war-decoys-to-target-apac-and-european-entities/</loc></url><url><loc>https://www.cypro.se/2022/11/26/u-s-bans-chinese-telecom-equipment-and-surveillance-cameras-over-national-security-risk/</loc></url><url><loc>https://www.cypro.se/2022/12/07/how-xdr-helps-protect-critical-infrastructure/</loc></url><url><loc>https://www.cypro.se/2022/11/26/all-you-need-to-know-about-emotet-in-2022/</loc></url><url><loc>https://www.cypro.se/2023/01/18/initial-meeting-of-the-iot-advisory-board/</loc></url><url><loc>https://www.cypro.se/2022/12/07/vice-society-ransomware-attackers-targeted-dozens-of-schools-in-2022/</loc></url><url><loc>https://www.cypro.se/2022/12/01/spotlight-the-cybersecurity-and-privacy-of-byod-bring-your-own-device/</loc></url><url><loc>https://www.cypro.se/2022/11/28/over-a-dozen-new-bmc-firmware-flaws-expose-ot-and-iot-devices-to-remote-attacks/</loc></url><url><loc>https://www.cypro.se/2022/11/28/elon-musk-confirms-twitter-2-0-will-bring-end-to-end-encryption-to-direct-messages/</loc></url><url><loc>https://www.cypro.se/2022/12/08/google-warns-of-internet-explorer-zero-day-vulnerability-exploited-by-scarcruft-hackers/</loc></url><url><loc>https://www.cypro.se/2022/12/08/iranian-hackers-strike-diamond-industry-with-data-wiping-malware-in-supply-chain-attack/</loc></url><url><loc>https://www.cypro.se/2022/11/29/cisa-warns-of-actively-exploited-critical-oracle-fusion-middleware-vulnerability/</loc></url><url><loc>https://www.cypro.se/2022/11/28/researchers-detail-appsync-cross-tenant-vulnerability-in-amazon-web-services/</loc></url><url><loc>https://www.cypro.se/2022/11/28/the-5-cornerstones-for-an-effective-cyber-security-awareness-training/</loc></url><url><loc>https://www.cypro.se/2022/12/08/covid-bit-new-covert-channel-to-exfiltrate-data-from-air-gapped-computers/</loc></url><url><loc>https://www.cypro.se/2022/12/08/apple-boosts-security-with-new-imessage-apple-id-and-icloud-protections/</loc></url><url><loc>https://www.cypro.se/2022/12/08/best-year-end-cybersecurity-deals-from-uptycs-sans-institute-and-bitdefender/</loc></url><url><loc>https://www.cypro.se/2022/12/08/iotw-metallica-encourages-fans-to-seek-and-destroy-crypto-scams/</loc></url><url><loc>https://www.cypro.se/2022/11/29/irish-regulator-fines-facebook-277-million-for-leak-of-half-a-billion-users-data/</loc></url><url><loc>https://www.cypro.se/2023/06/05/13th-annual-nice-conference-and-expo/</loc></url><url><loc>https://www.cypro.se/2022/12/08/researchers-uncover-darknet-service-allowing-hackers-to-trojonize-legit-android-apps/</loc></url><url><loc>https://www.cypro.se/2023/01/24/providing-timely-and-clear-data-to-support-federal-cybersecurity-workforce-needs/</loc></url><url><loc>https://www.cypro.se/2022/11/29/7-cyber-security-tips-for-smbs/</loc></url><url><loc>https://www.cypro.se/2022/12/09/muddywater-hackers-target-asian-and-middle-east-countries-with-updated-tactics/</loc></url><url><loc>https://www.cypro.se/2022/12/09/code-of-practice-for-app-store-operators-and-app-developers/</loc></url><url><loc>https://www.cypro.se/2022/11/29/hackers-using-trending-tiktok-invisible-challenge-to-spread-malware/</loc></url><url><loc>https://www.cypro.se/2022/12/09/researchers-uncover-new-drokbk-malware-that-uses-github-as-a-dead-drop-resolver/</loc></url><url><loc>https://www.cypro.se/2022/11/30/chinese-cyber-espionage-hackers-using-usb-devices-to-target-entities-in-philippines/</loc></url><url><loc>https://www.cypro.se/2022/11/29/new-flaw-in-acer-laptops-could-let-attackers-disable-secure-boot-protection/</loc></url><url><loc>https://www.cypro.se/2022/12/09/why-is-robust-api-security-crucial-in-ecommerce/</loc></url><url><loc>https://www.cypro.se/2022/12/09/what-stricter-data-privacy-laws-mean-for-your-cybersecurity-policies/</loc></url><url><loc>https://www.cypro.se/2022/12/09/threat-report-9th-december-2022/</loc></url><url><loc>https://www.cypro.se/2022/11/30/3-new-vulnerabilities-affect-ot-products-from-german-companies-festo-and-codesys/</loc></url><url><loc>https://www.cypro.se/2022/12/09/new-truebot-malware-variant-leveraging-netwrix-auditor-bug-and-raspberry-robin-worm/</loc></url><url><loc>https://www.cypro.se/2022/11/30/australia-passes-bill-to-fine-companies-up-to-50-million-for-data-breaches/</loc></url><url><loc>https://www.cypro.se/2022/12/09/using-xdr-to-consolidate-and-optimize-cybersecurity-technology/</loc></url><url><loc>https://www.cypro.se/2022/11/30/this-malicious-app-abused-hacked-devices-to-create-fake-accounts-on-multiple-platforms/</loc></url><url><loc>https://www.cypro.se/2022/11/30/french-electricity-provider-fined-for-storing-users-passwords-with-weak-md5-algorithm/</loc></url><url><loc>https://www.cypro.se/2022/12/10/researchers-detail-new-attack-method-to-bypass-popular-web-application-firewalls/</loc></url><url><loc>https://www.cypro.se/2022/12/10/cisco-warns-of-high-severity-unpatched-flaw-affecting-ip-phones-firmware/</loc></url><url><loc>https://www.cypro.se/2022/11/30/researchers-find-a-way-malicious-npm-libraries-can-evade-vulnerability-detection/</loc></url><url><loc>https://www.cypro.se/2022/12/10/hack-for-hire-group-targets-travel-and-financial-entities-with-new-janicab-malware-variant/</loc></url><url><loc>https://www.cypro.se/2022/11/30/north-korea-hackers-using-new-dolphin-backdoor-to-spy-on-south-korean-targets/</loc></url><url><loc>https://www.cypro.se/2022/12/12/royal-ransomware-threat-takes-aim-at-u-s-healthcare-system/</loc></url><url><loc>https://www.cypro.se/2022/12/01/lastpass-suffers-another-security-breach-exposed-some-customers-information/</loc></url><url><loc>https://www.cypro.se/2022/12/12/keep-your-grinch-at-bay-heres-how-to-stay-safe-online-this-holiday-season/</loc></url><url><loc>https://www.cypro.se/2022/12/01/malware-authors-accidentally-crash-kmsdbot-cryptocurrency-mining-botnet/</loc></url><url><loc>https://www.cypro.se/2022/12/12/cryptocurrency-mining-campaign-hits-linux-users-with-go-based-chaos-malware/</loc></url><url><loc>https://www.cypro.se/2022/12/01/schoolyard-bully-trojan-apps-stole-facebook-credentials-from-over-300000-android-users/</loc></url><url><loc>https://www.cypro.se/2022/12/12/google-adds-passkey-support-to-chrome-for-windows-macos-and-android/</loc></url><url><loc>https://www.cypro.se/2022/12/01/what-developers-need-to-fight-the-battle-against-common-vulnerabilities/</loc></url><url><loc>https://www.cypro.se/2022/12/12/top-4-saas-security-threats-for-2023/</loc></url><url><loc>https://www.cypro.se/2022/12/01/researchers-disclose-critical-rce-vulnerability-affecting-quarkus-java-framework/</loc></url><url><loc>https://www.cypro.se/2022/12/12/researchers-demonstrate-how-edr-and-antivirus-can-be-weaponized-against-users/</loc></url><url><loc>https://www.cypro.se/2022/12/01/hackers-leak-another-set-of-medibank-customer-data-on-the-dark-web/</loc></url><url><loc>https://www.cypro.se/2022/12/13/fortinet-warns-of-active-exploitation-of-new-ssl-vpn-pre-auth-rce-vulnerability/</loc></url><url><loc>https://www.cypro.se/2022/12/01/google-accuses-spanish-spyware-vendor-of-exploiting-chrome-firefox-windows-zero-days/</loc></url><url><loc>https://www.cypro.se/2022/12/13/malware-strains-targeting-python-and-javascript-developers-through-official-repositories/</loc></url><url><loc>https://www.cypro.se/2022/12/02/cuba-ransomware-extorted-over-60-million-in-ransom-fees-from-more-than-100-entities/</loc></url><url><loc>https://www.cypro.se/2022/12/13/cybersecurity-experts-uncover-inner-workings-of-destructive-azov-ransomware/</loc></url><url><loc>https://www.cypro.se/2022/12/02/watch-out-these-android-keyboard-apps-with-2-million-installs-can-be-hacked-remotely/</loc></url><url><loc>https://www.cypro.se/2022/12/13/serious-attacks-could-have-been-staged-through-this-amazon-ecr-public-gallery-vulnerability/</loc></url><url><loc>https://www.cypro.se/2022/12/02/what-the-cisa-reporting-rule-means-for-your-it-security-protocol/</loc></url><url><loc>https://www.cypro.se/2022/12/13/google-launches-largest-distributed-database-of-open-source-vulnerabilities/</loc></url><url><loc>https://www.cypro.se/2022/12/02/hackers-exploiting-redis-vulnerability-to-deploy-new-redigo-malware-on-servers/</loc></url><url><loc>https://www.cypro.se/2022/12/14/new-actively-exploited-zero-day-vulnerability-discovered-in-apple-products/</loc></url><url><loc>https://www.cypro.se/2022/12/02/researchers-disclose-supply-chain-flaw-affecting-ibm-cloud-databases-for-postgresql/</loc></url><url><loc>https://www.cypro.se/2022/12/14/hackers-actively-exploiting-citrix-adc-and-gateway-zero-day-vulnerability/</loc></url><url><loc>https://www.cypro.se/2022/12/02/the-value-of-old-systems/</loc></url><url><loc>https://www.cypro.se/2022/12/14/december-2022-patch-tuesday-get-latest-security-updates-from-microsoft-and-more/</loc></url><url><loc>https://www.cypro.se/2022/12/14/making-principles-based-assurance-a-reality/</loc></url><url><loc>https://www.cypro.se/2022/12/02/hackers-sign-android-malware-apps-with-compromised-platform-certificates/</loc></url><url><loc>https://www.cypro.se/2022/12/02/cisa-warns-of-multiple-critical-vulnerabilities-affecting-mitsubishi-electric-plcs/</loc></url><url><loc>https://www.cypro.se/2022/12/14/ransomware-attackers-use-microsoft-signed-drivers-to-gain-access-to-systems/</loc></url><url><loc>https://www.cypro.se/2022/12/14/why-pci-dss-4-0-should-be-on-your-radar-in-2023/</loc></url><url><loc>https://www.cypro.se/2022/12/03/google-rolls-out-new-chrome-browser-update-to-patch-yet-another-zero-day-vulnerability/</loc></url><url><loc>https://www.cypro.se/2022/12/14/new-gotrim-botnet-attempting-to-break-into-wordpress-sites-admin-accounts/</loc></url><url><loc>https://www.cypro.se/2022/12/15/hacking-using-svg-files-to-smuggle-qbot-malware-onto-windows-systems/</loc></url><url><loc>https://www.cypro.se/2022/12/15/hackers-bombard-open-source-repositories-with-over-144000-malicious-packages/</loc></url><url><loc>https://www.cypro.se/2022/12/15/fbi-charges-6-seizes-48-domains-linked-to-ddos-for-hire-service-platforms/</loc></url><url><loc>https://www.cypro.se/2022/12/15/android-malware-campaign-leverages-money-lending-apps-to-blackmail-victims/</loc></url><url><loc>https://www.cypro.se/2022/12/15/top-5-web-app-vulnerabilities-and-how-to-find-them/</loc></url><url><loc>https://www.cypro.se/2022/12/15/researchers-uncover-mirrorface-cyber-attacks-targeting-japanese-political-entities/</loc></url><url><loc>https://www.cypro.se/2022/12/15/microsoft-reclassifies-spnego-extended-negotiation-security-vulnerability-as-critical/</loc></url><url><loc>https://www.cypro.se/2022/12/15/nist-retires-sha-1-cryptographic-algorithm/</loc></url><url><loc>https://www.cypro.se/2022/12/08/national-online-informative-references-olir-program-two-draft-nist-irs-available-for-comment/</loc></url><url><loc>https://www.cypro.se/2022/12/15/iotw-over-77000-uber-employee-details-leaked-in-data-breach/</loc></url><url><loc>https://www.cypro.se/2022/12/16/cisa-alert-veeam-backup-and-replication-vulnerabilities-being-exploited-in-attacks/</loc></url><url><loc>https://www.cypro.se/2022/12/16/goodbye-sha-1-nist-retires-27-year-old-widely-used-cryptographic-algorithm/</loc></url><url><loc>https://www.cypro.se/2022/12/16/minecraft-servers-under-attack-microsoft-warns-about-cross-platform-ddos-botnet/</loc></url><url><loc>https://www.cypro.se/2022/12/16/github-announces-free-secret-scanning-for-all-public-repositories/</loc></url><url><loc>https://www.cypro.se/2022/12/16/trojanized-windows-10-installer-used-in-cyberattacks-against-ukrainian-government-entities/</loc></url><url><loc>https://www.cypro.se/2022/12/16/ex-twitter-employee-gets-3-5-years-jail-for-spying-on-behalf-of-saudi-arabia/</loc></url><url><loc>https://www.cypro.se/2022/12/16/cyber-security-is-not-a-losing-game-if-you-start-right-now/</loc></url><url><loc>https://www.cypro.se/2022/12/16/nist-drafts-revised-guidelines-for-digital-identification-in-federal-systems/</loc></url><url><loc>https://www.cypro.se/2022/12/17/samba-issues-security-updates-to-patch-multiple-high-severity-vulnerabilities/</loc></url><url><loc>https://www.cypro.se/2022/12/18/google-takes-gmail-security-to-the-next-level-with-client-side-encryption/</loc></url><url><loc>https://www.cypro.se/2022/12/19/new-agenda-ransomware-variant-written-in-rust-aiming-at-critical-infrastructure/</loc></url><url><loc>https://www.cypro.se/2022/12/19/facebook-cracks-down-on-spyware-vendors-from-u-s-china-russia-israel-and-india/</loc></url><url><loc>https://www.cypro.se/2022/12/19/cybercrime-and-security-predictions-for-2023/</loc></url><url><loc>https://www.cypro.se/2022/12/19/glupteba-botnet-continues-to-thrive-despite-googles-attempts-to-disrupt-it/</loc></url><url><loc>https://www.cypro.se/2022/12/19/researchers-discover-malicious-pypi-package-posing-as-sentinelone-sdk-to-steal-data/</loc></url><url><loc>https://www.cypro.se/2022/12/20/ftc-fines-fortnite-maker-epic-games-275-million-for-violating-childrens-privacy-law/</loc></url><url><loc>https://www.cypro.se/2022/12/20/microsoft-details-gatekeeper-bypass-vulnerability-in-apple-macos-systems/</loc></url><url><loc>https://www.cypro.se/2022/12/20/telling-users-to-avoid-clicking-bad-links-still-isnt-working/</loc></url><url><loc>https://www.cypro.se/2022/12/20/russian-hackers-targeted-petroleum-refinery-in-nato-country-during-ukraine-war/</loc></url><url><loc>https://www.cypro.se/2022/12/20/a-guide-to-efficient-patch-management-with-action1/</loc></url><url><loc>https://www.cypro.se/2022/12/20/kmsdbot-botnet-suspected-of-being-used-as-ddos-for-hire-service/</loc></url><url><loc>https://www.cypro.se/2022/12/20/beware-cybercriminals-launch-new-brasdex-android-trojan-targeting-brazilian-banking-users/</loc></url><url><loc>https://www.cypro.se/2022/12/19/announcement-of-proposal-to-update-fips-197-the-advanced-encryption-standard/</loc></url><url><loc>https://www.cypro.se/2022/12/16/call-for-comments-on-nist-draft-revision-4-of-sp-800-63-digital-identity-guidelines/</loc></url><url><loc>https://www.cypro.se/2022/12/15/announcement-of-proposal-to-revise-fips-180-4-secure-hash-standard-shs/</loc></url><url><loc>https://www.cypro.se/2022/12/15/nist-transitioning-away-from-sha-1-for-all-applications/</loc></url><url><loc>https://www.cypro.se/2022/12/15/withdrawal-of-nist-special-publication-800-106-randomized-hashing-for-digital-signatures/</loc></url><url><loc>https://www.cypro.se/2022/12/21/ukraines-delta-military-system-users-under-attack-from-info-stealing-malware/</loc></url><url><loc>https://www.cypro.se/2022/12/21/ransomware-hackers-using-new-way-to-bypass-ms-exchange-proxynotshell-mitigations/</loc></url><url><loc>https://www.cypro.se/2022/12/21/godfather-android-banking-trojan-targeting-users-of-over-400-banking-and-crypto-apps/</loc></url><url><loc>https://www.cypro.se/2022/12/21/be-wary-of-scammers-in-the-holiday-season/</loc></url><url><loc>https://www.cypro.se/2022/12/21/raspberry-robin-worm-strikes-again-targeting-telecom-and-government-systems/</loc></url><url><loc>https://www.cypro.se/2022/12/21/the-rise-of-the-rookie-hacker-a-new-trend-to-reckon-with/</loc></url><url><loc>https://www.cypro.se/2022/12/22/hackers-breach-oktas-github-repositories-steal-source-code/</loc></url><url><loc>https://www.cypro.se/2022/12/22/zerobot-botnet-emerges-as-a-growing-threat-with-new-exploits-and-capabilities/</loc></url><url><loc>https://www.cypro.se/2022/12/22/two-new-security-flaws-reported-in-ghost-cms-blogging-software/</loc></url><url><loc>https://www.cypro.se/2022/12/22/critical-security-flaw-reported-in-passwordstate-enterprise-password-manager/</loc></url><url><loc>https://www.cypro.se/2022/12/22/fin7-cybercrime-syndicate-emerges-as-major-player-in-ransomware-landscape/</loc></url><url><loc>https://www.cypro.se/2022/12/22/the-era-of-cyber-threat-intelligence-sharing/</loc></url><url><loc>https://www.cypro.se/2022/12/22/threat-report-22nd-december-2022/</loc></url><url><loc>https://www.cypro.se/2023/12/04/9th-annual-nice-k12-cybersecurity-education-conference/</loc></url><url><loc>https://www.cypro.se/2022/12/23/lastpass-admits-to-severe-data-breach-encrypted-password-vaults-compromised/</loc></url><url><loc>https://www.cypro.se/2022/12/23/france-fines-microsoft-e60-million-for-using-advertising-cookies-without-user-consent/</loc></url><url><loc>https://www.cypro.se/2022/12/23/vice-society-ransomware-attackers-adopt-robust-encryption-methods/</loc></url><url><loc>https://www.cypro.se/2022/12/23/customer-details-compromised-in-lastpass-data-breaches/</loc></url><url><loc>https://www.cypro.se/2022/12/23/researchers-warn-of-kavach-2fa-phishing-attacks-targeting-indian-govt-officials/</loc></url><url><loc>https://www.cypro.se/2022/12/23/accelerate-your-incident-response/</loc></url><url><loc>https://www.cypro.se/2022/12/23/frodopir-new-privacy-focused-database-querying-system/</loc></url><url><loc>https://www.cypro.se/2022/12/24/w4sp-stealer-discovered-in-multiple-pypi-packages-under-various-names/</loc></url><url><loc>https://www.cypro.se/2022/12/26/privateloader-ppi-service-found-distributing-info-stealing-risepro-malware/</loc></url><url><loc>https://www.cypro.se/2022/12/26/guloader-malware-utilizing-new-techniques-to-evade-security-software/</loc></url><url><loc>https://www.cypro.se/2022/12/26/2022-top-five-immediate-threats-in-geopolitical-context/</loc></url><url><loc>https://www.cypro.se/2022/12/27/facebook-to-pay-725-million-to-settle-lawsuit-over-cambridge-analytica-data-leak/</loc></url><url><loc>https://www.cypro.se/2021/05/09/active-cyber-defence-acd-the-fourth-year/</loc></url><url><loc>https://www.cypro.se/2021/05/06/connected-places-new-ncsc-security-principles-for-smart-cities/</loc></url><url><loc>https://www.cypro.se/2021/05/05/training-for-small-organisations-and-charities-now-available/</loc></url><url><loc>https://www.cypro.se/2022/12/27/bluenoroff-apt-hackers-using-new-ways-to-bypass-windows-motw-protection/</loc></url><url><loc>https://www.cypro.se/2022/12/28/apt-hackers-turn-to-malicious-excel-add-ins-as-initial-intrusion-vector/</loc></url><url><loc>https://www.cypro.se/2022/12/28/bitkeep-confirms-cyber-attack-loses-over-9-million-in-digital-currencies/</loc></url><url><loc>https://www.cypro.se/2022/12/29/new-malvertising-campaign-via-google-ads-targets-users-searching-for-popular-software/</loc></url><url><loc>https://www.cypro.se/2022/12/29/thousands-of-citrix-servers-still-unpatched-for-critical-vulnerabilities/</loc></url><url><loc>https://www.cypro.se/2022/12/30/cisa-warns-of-active-exploitation-of-jasperreports-vulnerabilities/</loc></url><url><loc>https://www.cypro.se/2022/12/30/researcher-uncovers-potential-wiretapping-bugs-in-google-home-smart-speakers/</loc></url><url><loc>https://www.cypro.se/2023/01/02/google-to-pay-29-5-million-to-settle-lawsuits-over-user-location-tracking/</loc></url><url><loc>https://www.cypro.se/2023/01/02/wordpress-security-alert-new-linux-malware-exploiting-over-two-dozen-cms-flaws/</loc></url><url><loc>https://www.cypro.se/2023/01/02/pytorch-machine-learning-framework-compromised-with-malicious-dependency/</loc></url><url><loc>https://www.cypro.se/2023/01/02/redzei-chinese-scammers-targeting-chinese-students-in-the-u-k/</loc></url><url><loc>https://www.cypro.se/2023/01/03/raspberry-robin-worm-evolves-to-attack-financial-and-insurance-sectors-in-europe/</loc></url><url><loc>https://www.cypro.se/2023/01/03/hackers-using-stolen-bank-information-to-trick-victims-into-downloading-bitrat-malware/</loc></url><url><loc>https://www.cypro.se/2023/01/03/enforcement-vs-enrollment-based-security-how-to-balance-security-and-employee-trust/</loc></url><url><loc>https://www.cypro.se/2023/01/12/digital-identity-guidelines-kicking-off-revision-4/</loc></url><url><loc>https://www.cypro.se/2023/01/04/synology-releases-patch-for-critical-rce-vulnerability-affecting-vpn-plus-servers/</loc></url><url><loc>https://www.cypro.se/2023/01/04/new-shc-based-linux-malware-targeting-systems-with-cryptocurrency-miner/</loc></url><url><loc>https://www.cypro.se/2023/01/04/investigation-launched-into-twitter-after-400m-user-details-posted-on-hacking-fo/</loc></url><url><loc>https://www.cypro.se/2023/01/04/qualcomm-chipsets-and-lenovo-bios-get-security-updates-to-fix-multiple-flaws/</loc></url><url><loc>https://www.cypro.se/2023/01/04/the-fbis-perspective-on-ransomware/</loc></url><url><loc>https://www.cypro.se/2023/01/04/social-engineering-and-healthcare/</loc></url><url><loc>https://www.cypro.se/2023/01/05/irish-regulators-fine-facebook-414-million-for-forcing-users-to-accept-targeted-ads/</loc></url><url><loc>https://www.cypro.se/2023/01/05/fortinet-and-zoho-urge-customers-to-patch-enterprise-software-vulnerabilities/</loc></url><url><loc>https://www.cypro.se/2023/01/05/circleci-urges-customers-to-rotate-secrets-following-security-incident/</loc></url><url><loc>https://www.cypro.se/2023/01/05/the-evolving-tactics-of-vidar-stealer-from-phishing-emails-to-social-media/</loc></url><url><loc>https://www.cypro.se/2023/01/05/spynote-strikes-again-android-spyware-targeting-financial-institutions/</loc></url><url><loc>https://www.cypro.se/2023/01/05/mitigate-the-lastpass-attack-surface-in-your-environment-with-this-free-tool/</loc></url><url><loc>https://www.cypro.se/2023/01/05/bluebottle-cybercrime-group-preys-on-financial-sector-in-french-speaking-african-nations/</loc></url><url><loc>https://www.cypro.se/2023/01/05/blind-eagle-hackers-return-with-refined-tools-and-sophisticated-infection-chain/</loc></url><url><loc>https://www.cypro.se/2023/01/05/iotw-almost-50000-uk-government-ministers-vulnerable-to-cyber-attacks/</loc></url><url><loc>https://www.cypro.se/2023/01/06/rackspace-confirms-play-ransomware-gang-responsible-for-recent-breach/</loc></url><url><loc>https://www.cypro.se/2023/01/06/whatsapp-introduces-proxy-support-to-help-users-bypass-internet-censorship/</loc></url><url><loc>https://www.cypro.se/2023/01/06/microsoft-reveals-tactics-used-by-4-ransomware-families-targeting-macos/</loc></url><url><loc>https://www.cypro.se/2023/01/06/dridex-malware-now-attacking-macos-systems-with-novel-infection-method/</loc></url><url><loc>https://www.cypro.se/2023/01/06/hackers-using-captcha-bypass-tactics-in-freejacking-campaign-on-github/</loc></url><url><loc>https://www.cypro.se/2023/01/03/applying-the-cybersecurity-framework-to-satellite-command-and-control-nist-interagency-report-ir-8401/</loc></url><url><loc>https://www.cypro.se/2023/01/08/russian-turla-hackers-hijack-decade-old-malware-infrastructure-to-deploy-new-backdoors/</loc></url><url><loc>https://www.cypro.se/2023/01/09/hackers-can-abuse-visual-studio-marketplace-to-target-developers-with-malicious-extensions/</loc></url><url><loc>https://www.cypro.se/2023/01/09/top-saas-cybersecurity-threats-in-2023-are-you-ready/</loc></url><url><loc>https://www.cypro.se/2023/01/09/malicious-pypi-packages-using-cloudflare-tunnels-to-sneak-through-firewalls/</loc></url><url><loc>https://www.cypro.se/2023/01/09/millions-of-vehicles-at-risk-api-vulnerabilities-uncovered-in-16-major-car-brands/</loc></url><url><loc>https://www.cypro.se/2023/01/09/why-do-user-permissions-matter-for-saas-security/</loc></url><url><loc>https://www.cypro.se/2023/01/09/new-study-uncovers-text-to-sql-model-vulnerabilities-allowing-data-theft-and-dos-attacks/</loc></url><url><loc>https://www.cypro.se/2023/01/09/kinsing-cryptojacking-hits-kubernetes-clusters-via-misconfigured-postgresql/</loc></url><url><loc>https://www.cypro.se/2023/01/06/nist-requests-public-comments-on-sp-800-132-recommendation-for-password-based-key-derivation-part-1-storage-applications/</loc></url><url><loc>https://www.cypro.se/2023/01/10/critical-security-flaw-found-in-jsonwebtoken-library-used-by-22000-projects/</loc></url><url><loc>https://www.cypro.se/2023/01/10/using-msps-to-administer-your-cloud-services/</loc></url><url><loc>https://www.cypro.se/2023/01/10/expert-analysis-reveals-cryptographic-weaknesses-in-threema-messaging-app/</loc></url><url><loc>https://www.cypro.se/2023/01/10/italian-users-warned-of-malware-attack-targeting-sensitive-information/</loc></url><url><loc>https://www.cypro.se/2023/01/10/strongpity-hackers-distribute-trojanized-telegram-app-to-target-android-users/</loc></url><url><loc>https://www.cypro.se/2023/01/10/cybercriminals-are-using-chatgpt-to-create-malware/</loc></url><url><loc>https://www.cypro.se/2023/01/11/microsoft-issues-january-2023-patch-tuesday-updates-warns-of-zero-day-exploit/</loc></url><url><loc>https://www.cypro.se/2023/01/11/dark-pink-apt-group-targets-governments-and-military-in-apac-region/</loc></url><url><loc>https://www.cypro.se/2023/01/11/unlock-your-potential-get-9-online-cyber-security-courses-for-just-49-99/</loc></url><url><loc>https://www.cypro.se/2023/02/01/an-introduction-to-draft-sp-800-157-rev-1-derived-piv-credentials-and-sp-800-217-piv-federation/</loc></url><url><loc>https://www.cypro.se/2023/01/11/australian-healthcare-sector-targeted-in-latest-gootkit-malware-attacks/</loc></url><url><loc>https://www.cypro.se/2023/01/11/new-analysis-reveals-raspberry-robin-can-be-repurposed-by-other-threat-actors/</loc></url><url><loc>https://www.cypro.se/2023/01/12/alert-hackers-actively-exploiting-critical-control-web-panel-rce-vulnerability/</loc></url><url><loc>https://www.cypro.se/2023/01/12/twitter-denies-hacking-claims-assures-leaked-user-data-not-from-its-system/</loc></url><url><loc>https://www.cypro.se/2023/01/12/experts-detail-chromium-browser-security-flaw-putting-confidential-data-at-risk/</loc></url><url><loc>https://www.cypro.se/2023/01/12/patch-where-it-hurts-effective-vulnerability-management-in-2023/</loc></url><url><loc>https://www.cypro.se/2023/01/12/iotw-lastpass-facing-class-action-lawsuit-following-data-breach/</loc></url><url><loc>https://www.cypro.se/2023/01/12/over-100-siemens-plc-models-found-vulnerable-to-firmware-takeover/</loc></url><url><loc>https://www.cypro.se/2023/01/12/icedid-malware-strikes-again-active-directory-domain-compromised-in-under-24-hours/</loc></url><url><loc>https://www.cypro.se/2023/01/13/get-unified-cloud-and-endpoint-security-only-1-for-1000-assets-for-all-of-2023/</loc></url><url><loc>https://www.cypro.se/2023/01/13/fortios-flaw-exploited-as-zero-day-in-attacks-on-government-and-organizations/</loc></url><url><loc>https://www.cypro.se/2023/01/13/cybercriminals-using-polyglot-files-in-malware-distribution-to-fly-under-the-radar/</loc></url><url><loc>https://www.cypro.se/2023/01/13/cyber-attack-against-royal-mail-linked-to-russian-hackers/</loc></url><url><loc>https://www.cypro.se/2023/01/13/threat-report-13th-january-2023/</loc></url><url><loc>https://www.cypro.se/2023/01/13/beware-tainted-vpns-being-used-to-spread-eyespy-surveillanceware/</loc></url><url><loc>https://www.cypro.se/2023/01/14/cisco-issues-warning-for-unpatched-vulnerabilities-in-eol-business-routers/</loc></url><url><loc>https://www.cypro.se/2023/01/14/tiktok-fined-5-4-million-by-french-regulator-for-violating-cookie-laws/</loc></url><url><loc>https://www.cypro.se/2023/01/14/cacti-servers-under-attack-as-majority-fail-to-patch-critical-vulnerability/</loc></url><url><loc>https://www.cypro.se/2023/01/14/malware-attack-on-circleci-engineers-laptop-leads-to-recent-security-incident/</loc></url><url><loc>https://www.cypro.se/2023/01/16/new-backdoor-created-using-leaked-cias-hive-malware-discovered-in-the-wild/</loc></url><url><loc>https://www.cypro.se/2023/01/16/cisa-warns-for-flaws-affecting-industrial-control-systems-from-major-manufacturers/</loc></url><url><loc>https://www.cypro.se/2023/01/16/a-secure-user-authentication-method-planning-is-more-important-than-ever/</loc></url><url><loc>https://www.cypro.se/2023/01/16/raccoon-and-vidar-stealers-spreading-via-massive-network-of-fake-cracked-software/</loc></url><url><loc>https://www.cypro.se/2023/01/17/researchers-uncover-3-pypi-packages-spreading-malware-to-developer-systems/</loc></url><url><loc>https://www.cypro.se/2023/01/17/uk-schools-build-cyber-resilience/</loc></url><url><loc>https://www.cypro.se/2023/01/17/4-places-to-supercharge-your-soc-with-automation/</loc></url><url><loc>https://www.cypro.se/2023/01/17/zoho-manageengine-poc-exploit-to-be-released-soon-patch-before-its-too-late/</loc></url><url><loc>https://www.cypro.se/2023/01/17/hackers-can-abuse-legitimate-github-codespaces-feature-to-deliver-malware/</loc></url><url><loc>https://www.cypro.se/2023/01/17/microsoft-azure-services-flaws-couldve-exposed-cloud-resources-to-unauthorized-access/</loc></url><url><loc>https://www.cypro.se/2023/01/18/cisa-warns-of-flaws-in-siemens-ge-digital-and-contec-industrial-control-systems/</loc></url><url><loc>https://www.cypro.se/2023/01/18/guide-how-mssps-and-vcisos-can-extend-their-services-into-compliance-readiness-without-increasing-cost/</loc></url><url><loc>https://www.cypro.se/2023/01/18/critical-security-vulnerabilities-discovered-in-netcomm-and-tp-link-routers/</loc></url><url><loc>https://www.cypro.se/2023/01/18/git-users-urged-to-update-software-to-prevent-remote-code-execution-attacks/</loc></url><url><loc>https://www.cypro.se/2023/01/18/iranian-government-entities-under-attack-by-new-wave-of-backdoordiplomacy-attacks/</loc></url><url><loc>https://www.cypro.se/2023/01/18/personal-cybersecurity-concerns-for-2023/</loc></url><url><loc>https://www.cypro.se/2023/01/18/earth-bogle-campaign-unleashes-njrat-trojan-on-middle-east-and-north-africa/</loc></url><url><loc>https://www.cypro.se/2023/01/19/mailchimp-suffers-another-security-breach-compromising-some-customers-information/</loc></url><url><loc>https://www.cypro.se/2023/01/19/bitzlato-crypto-exchange-founder-arrested-for-aiding-cybercriminals/</loc></url><url><loc>https://www.cypro.se/2023/01/19/6-types-of-risk-assessment-methodologies-how-to-choose/</loc></url><url><loc>https://www.cypro.se/2023/01/19/android-users-beware-new-hook-malware-with-rat-capabilities-emerges/</loc></url><url><loc>https://www.cypro.se/2023/01/19/new-research-delves-into-the-world-of-malicious-lnk-files-and-hackers-behind-them/</loc></url><url><loc>https://www.cypro.se/2023/01/19/new-microsoft-azure-vulnerability-uncovered-experts-warn-of-rce-attacks/</loc></url><url><loc>https://www.cypro.se/2023/01/19/iotw-mailchimp-suffers-another-social-engineering-attack/</loc></url><url><loc>https://www.cypro.se/2023/01/20/new-chinese-malware-spotted-exploiting-recent-fortinet-firewall-vulnerability/</loc></url><url><loc>https://www.cypro.se/2023/01/20/phishing-and-ransomware-amongst-biggest-threats-to-charity-sector/</loc></url><url><loc>https://www.cypro.se/2023/01/20/ncsc-to-retire-logging-made-easy/</loc></url><url><loc>https://www.cypro.se/2023/01/20/whatsapp-hit-with-e5-5-million-fine-for-violating-data-protection-laws/</loc></url><url><loc>https://www.cypro.se/2023/01/20/gamaredon-group-launches-cyberattacks-against-ukraine-using-telegram/</loc></url><url><loc>https://www.cypro.se/2023/01/20/roaming-mantis-spreading-mobile-malware-that-hijacks-wi-fi-routers-dns-settings/</loc></url><url><loc>https://www.cypro.se/2023/01/23/massive-ad-fraud-scheme-targeted-over-11-million-devices-with-1700-spoofed-apps/</loc></url><url><loc>https://www.cypro.se/2023/01/23/threat-actors-turn-to-sliver-as-open-source-alternative-to-popular-c2-frameworks/</loc></url><url><loc>https://www.cypro.se/2023/01/23/samsung-galaxy-store-app-found-vulnerable-to-sneaky-app-installs-and-fraud/</loc></url><url><loc>https://www.cypro.se/2023/01/23/saas-security-posture-management-sspm-as-a-layer-in-your-identity-fabric/</loc></url><url><loc>https://www.cypro.se/2023/01/24/facebook-introduces-new-features-for-end-to-end-encrypted-messenger-app/</loc></url><url><loc>https://www.cypro.se/2023/01/24/apple-issues-updates-for-older-devices-to-fix-actively-exploited-vulnerability/</loc></url><url><loc>https://www.cypro.se/2023/01/24/fbi-says-north-korean-hackers-behind-100-million-horizon-bridge-crypto-theft/</loc></url><url><loc>https://www.cypro.se/2023/01/24/security-navigator-research-some-vulnerabilities-date-back-to-the-last-millennium/</loc></url><url><loc>https://www.cypro.se/2023/01/24/emotet-malware-makes-a-comeback-with-new-evasion-techniques/</loc></url><url><loc>https://www.cypro.se/2023/01/24/chinese-hackers-utilize-golang-malware-in-dragonspark-attacks-to-evade-detection/</loc></url><url><loc>https://www.cypro.se/2023/01/25/lastpass-parent-company-goto-suffers-data-breach-customers-backups-compromised/</loc></url><url><loc>https://www.cypro.se/2023/01/25/vmware-releases-patches-for-critical-vrealize-log-insight-software-vulnerabilities/</loc></url><url><loc>https://www.cypro.se/2023/01/25/north-korean-hackers-turn-to-credential-harvesting-in-latest-wave-of-cyberattacks/</loc></url><url><loc>https://www.cypro.se/2023/01/25/the-definitive-browser-security-checklist/</loc></url><url><loc>https://www.cypro.se/2023/01/25/over-4500-wordpress-sites-hacked-to-redirect-visitors-to-sketchy-ad-pages/</loc></url><url><loc>https://www.cypro.se/2023/01/26/u-s-federal-agencies-fall-victim-to-cyber-attack-utilizing-legitimate-rmm-software/</loc></url><url><loc>https://www.cypro.se/2023/01/26/pyration-new-python-based-rat-uses-websocket-for-c2-and-data-exfiltration/</loc></url><url><loc>https://www.cypro.se/2023/01/26/ncsc-for-startups-an-ecosystem-based-approach-to-cyber-security/</loc></url><url><loc>https://www.cypro.se/2023/01/26/is-once-yearly-pen-testing-enough-for-your-organization/</loc></url><url><loc>https://www.cypro.se/2023/01/26/google-takes-down-50000-instances-of-pro-chinese-dragonbridge-influence-operation/</loc></url><url><loc>https://www.cypro.se/2023/01/26/researchers-release-poc-exploit-for-windows-cryptoapi-bug-discovered-by-nsa/</loc></url><url><loc>https://www.cypro.se/2023/01/26/researchers-uncover-connection-b-w-moses-staff-and-emerging-abrahams-ax-hacktivists-group/</loc></url><url><loc>https://www.cypro.se/2023/01/26/hive-ransomware-infrastructure-seized-in-joint-international-law-enforcement-effort/</loc></url><url><loc>https://www.cypro.se/2023/01/26/iotw-hackers-steal-the-data-of-37-million-t-mobile-customers/</loc></url><url><loc>https://www.cypro.se/2023/01/27/researchers-discover-new-plugx-malware-variant-spreading-via-removable-usb-devices/</loc></url><url><loc>https://www.cypro.se/2023/01/27/3-lifehacks-while-analyzing-orcus-rat-in-a-malware-sandbox/</loc></url><url><loc>https://www.cypro.se/2023/01/27/british-cyber-agency-warns-of-russian-and-iranian-hackers-targeting-key-industries/</loc></url><url><loc>https://www.cypro.se/2023/01/27/experts-uncover-the-identity-of-mastermind-behind-golden-chickens-malware-service/</loc></url><url><loc>https://www.cypro.se/2023/01/28/ukraine-hit-with-new-golang-based-swiftslicer-wiper-malware-in-latest-cyber-attack/</loc></url><url><loc>https://www.cypro.se/2023/01/28/isc-releases-security-patches-for-new-bind-dns-software-vulnerabilities/</loc></url><url><loc>https://www.cypro.se/2023/01/28/microsoft-urges-customers-to-secure-on-premises-exchange-servers/</loc></url><url><loc>https://www.cypro.se/2023/01/28/eliminating-saas-shadow-it-is-now-available-via-a-self-service-product-free-of-charge/</loc></url><url><loc>https://www.cypro.se/2023/01/29/gootkit-malware-continues-to-evolve-with-new-components-and-obfuscations/</loc></url><url><loc>https://www.cypro.se/2023/01/30/realtek-vulnerability-under-attack-134-million-attempts-in-2-months-to-hack-iot-devices/</loc></url><url><loc>https://www.cypro.se/2023/01/30/threat-report-27th-january-2023/</loc></url><url><loc>https://www.cypro.se/2023/01/30/titan-stealer-a-new-golang-based-information-stealer-malware-emerges/</loc></url><url><loc>https://www.cypro.se/2023/01/31/github-breach-hackers-stole-code-signing-certificates-for-github-desktop-and-atom/</loc></url><url><loc>https://www.cypro.se/2023/01/31/qnap-fixes-critical-vulnerability-in-nas-devices-with-latest-security-updates/</loc></url><url><loc>https://www.cypro.se/2023/01/31/new-report-reveals-nikowiper-malware-that-targeted-ukraine-energy-sector/</loc></url><url><loc>https://www.cypro.se/2023/01/31/researchers-uncover-packer-used-by-several-malware-to-evade-detection-for-6-years/</loc></url><url><loc>https://www.cypro.se/2023/01/31/you-dont-know-where-your-secrets-are/</loc></url><url><loc>https://www.cypro.se/2023/02/01/additional-supply-chain-vulnerabilities-uncovered-in-ami-megarac-bmc-software/</loc></url><url><loc>https://www.cypro.se/2023/02/01/hackers-abused-microsofts-verified-publisher-oauth-apps-to-hack-corporate-email-accounts/</loc></url><url><loc>https://www.cypro.se/2023/02/01/auditing-kubernetes-with-open-source-siem-and-xdr/</loc></url><url><loc>https://www.cypro.se/2023/02/01/prilex-pos-malware-evolves-to-block-contactless-payments-to-steal-from-nfc-cards/</loc></url><url><loc>https://www.cypro.se/2023/02/01/romance-scams/</loc></url><url><loc>https://www.cypro.se/2023/02/01/new-sh1mmer-exploit-for-chromebook-unenrolls-managed-chromeos-devices/</loc></url><url><loc>https://www.cypro.se/2023/02/01/experts-warn-of-ice-breaker-cyberattacks-targeting-gaming-and-gambling-industry/</loc></url><url><loc>https://www.cypro.se/2023/02/01/jd-sports-data-breach-affects-10-million-customers/</loc></url><url><loc>https://www.cypro.se/2023/02/01/researchers-uncover-new-bugs-in-popular-imagemagick-image-processing-utility/</loc></url><url><loc>https://www.cypro.se/2023/02/02/new-threat-stealthy-headcrab-malware-compromised-over-1200-redis-servers/</loc></url><url><loc>https://www.cypro.se/2023/02/02/cybersecurity-budgets-are-going-up-so-why-arent-breaches-going-down/</loc></url><url><loc>https://www.cypro.se/2023/02/02/north-korean-hackers-exploit-unpatched-zimbra-devices-in-no-pineapple-campaign/</loc></url><url><loc>https://www.cypro.se/2023/02/02/new-russian-backed-gamaredons-spyware-variants-targeting-ukrainian-authorities/</loc></url><url><loc>https://www.cypro.se/2023/02/02/iotw-malicious-actors-gain-access-to-github-source-code/</loc></url><url><loc>https://www.cypro.se/2023/02/03/cisa-alert-oracle-e-business-suite-and-sugarcrm-vulnerabilities-under-attack/</loc></url><url><loc>https://www.cypro.se/2023/02/03/new-high-severity-vulnerabilities-discovered-in-cisco-iox-and-f5-big-ip-products/</loc></url><url><loc>https://www.cypro.se/2023/02/03/atlassians-jira-software-found-vulnerable-to-critical-authentication-vulnerability/</loc></url><url><loc>https://www.cypro.se/2023/02/03/iranian-oilrig-hackers-using-new-backdoor-to-exfiltrate-data-from-govt-organizations/</loc></url><url><loc>https://www.cypro.se/2023/02/03/the-pivot-how-msps-can-turn-a-challenge-into-a-once-in-a-decade-opportunity/</loc></url><url><loc>https://www.cypro.se/2023/02/03/is-your-ev-charging-station-safe-new-security-vulnerabilities-uncovered/</loc></url><url><loc>https://www.cypro.se/2023/02/03/post-macro-world-sees-rise-in-microsoft-onenote-documents-delivering-malware/</loc></url><url><loc>https://www.cypro.se/2023/02/04/warning-hackers-actively-exploiting-zero-day-in-fortras-goanywhere-mft/</loc></url><url><loc>https://www.cypro.se/2023/02/04/new-wave-of-ransomware-attacks-exploiting-vmware-bug-to-target-esxi-servers/</loc></url><url><loc>https://www.cypro.se/2023/02/04/pixpirate-new-android-banking-trojan-targeting-brazilian-financial-institutions/</loc></url><url><loc>https://www.cypro.se/2023/02/06/formbook-malware-spreads-via-malvertising-using-malvirt-loader-to-evade-detection/</loc></url><url><loc>https://www.cypro.se/2023/02/06/saas-in-the-real-world-whos-responsible-to-secure-this-data/</loc></url><url><loc>https://www.cypro.se/2023/02/06/openssh-releases-patch-for-new-pre-auth-double-free-vulnerability/</loc></url><url><loc>https://www.cypro.se/2023/02/06/guloader-malware-using-malicious-nsis-executable-to-target-e-commerce-industry/</loc></url><url><loc>https://www.cypro.se/2023/02/06/microsoft-iranian-nation-state-group-sanctioned-by-u-s-behind-charlie-hebdo-hack/</loc></url><url><loc>https://www.cypro.se/2023/02/07/linux-variant-of-clop-ransomware-spotted-but-uses-faulty-encryption-algorithm/</loc></url><url><loc>https://www.cypro.se/2023/02/07/vmware-finds-no-evidence-of-0-day-in-ongoing-esxiargs-ransomware-spree/</loc></url><url><loc>https://www.cypro.se/2023/02/07/hackers-exploit-vulnerabilities-in-sunlogin-to-deploy-sliver-c2-framework/</loc></url><url><loc>https://www.cypro.se/2023/02/07/tackling-the-new-cyber-insurance-requirements-can-your-organization-comply/</loc></url><url><loc>https://www.cypro.se/2023/02/07/nist-selects-lightweight-cryptography-algorithms-to-protect-small-devices/</loc></url><url><loc>https://www.cypro.se/2023/02/07/encrypted-messaging-app-exclu-used-by-criminal-groups-cracked-by-joint-law-enforcement/</loc></url><url><loc>https://www.cypro.se/2023/02/08/cert-ua-alerts-ukrainian-state-authorities-of-remcos-software-fueled-cyber-attacks/</loc></url><url><loc>https://www.cypro.se/2023/02/08/russian-hacker-pleads-guilty-to-money-laundering-linked-to-ryuk-ransomware/</loc></url><url><loc>https://www.cypro.se/2023/02/08/how-to-think-like-a-hacker-and-stay-ahead-of-threats/</loc></url><url><loc>https://www.cypro.se/2023/02/08/russian-hackers-using-graphiron-malware-to-steal-data-from-ukraine/</loc></url><url><loc>https://www.cypro.se/2023/02/08/social-engineer-yourself/</loc></url><url><loc>https://www.cypro.se/2023/02/08/sydney-man-sentenced-for-blackmailing-optus-customers-after-data-breach/</loc></url><url><loc>https://www.cypro.se/2023/02/08/unpatched-security-flaws-disclosed-in-multiple-document-management-systems/</loc></url><url><loc>https://www.cypro.se/2023/02/08/nist-standardizes-ascon-cryptographic-algorithm-for-iot-and-other-lightweight-devices/</loc></url><url><loc>https://www.cypro.se/2023/06/15/2023-iris-experts-group-ieg-meeting/</loc></url><url><loc>https://www.cypro.se/2023/02/09/a-hackers-pot-of-gold-your-msps-data/</loc></url><url><loc>https://www.cypro.se/2023/02/09/gootkit-malware-adopts-new-tactics-to-attack-healthcare-and-finance-firms/</loc></url><url><loc>https://www.cypro.se/2023/02/09/openssl-fixes-multiple-new-security-flaws-with-latest-update/</loc></url><url><loc>https://www.cypro.se/2023/02/09/newspenguin-threat-actor-emerges-with-malicious-campaign-targeting-pakistani-entities/</loc></url><url><loc>https://www.cypro.se/2023/02/09/thn-webinar-learn-how-to-comply-with-new-cyber-insurance-identity-security-requirements/</loc></url><url><loc>https://www.cypro.se/2023/02/09/critical-infrastructure-at-risk-from-new-vulnerabilities-found-in-wireless-iiot-devices/</loc></url><url><loc>https://www.cypro.se/2023/02/10/reddit-suffers-security-breach-exposing-internal-documents-and-source-code/</loc></url><url><loc>https://www.cypro.se/2023/02/10/u-k-and-u-s-sanction-7-russians-for-trickbot-ryuk-and-conti-ransomware-attacks/</loc></url><url><loc>https://www.cypro.se/2023/02/10/threat-report-10th-february-2023/</loc></url><url><loc>https://www.cypro.se/2023/02/10/north-korean-hackers-targeting-healthcare-with-ransomware-to-fund-its-operations/</loc></url><url><loc>https://www.cypro.se/2023/02/10/3-overlooked-cybersecurity-breaches/</loc></url><url><loc>https://www.cypro.se/2023/02/10/iotw-source-code-stolen-in-reddit-phishing-attack/</loc></url><url><loc>https://www.cypro.se/2023/02/10/researchers-uncover-obfuscated-malicious-code-in-pypi-python-packages/</loc></url><url><loc>https://www.cypro.se/2023/02/11/cisa-warns-of-active-attacks-exploiting-fortra-mft-terramaster-nas-and-intel-driver-flaws/</loc></url><url><loc>https://www.cypro.se/2023/02/11/enigma-vector-and-tgtoxic-the-new-threats-to-cryptocurrency-users/</loc></url><url><loc>https://www.cypro.se/2023/02/11/new-esxiargs-ransomware-variant-emerges-after-cisa-releases-decryptor-tool/</loc></url><url><loc>https://www.cypro.se/2023/02/13/hackers-targeting-u-s-and-german-firms-monitor-victims-desktops-with-screenshotter/</loc></url><url><loc>https://www.cypro.se/2023/02/13/chinese-tonto-team-hackers-second-attempt-to-target-cybersecurity-firm-group-ib-fails/</loc></url><url><loc>https://www.cypro.se/2023/02/13/honeypot-factory-the-use-of-deception-in-ics-ot-environments/</loc></url><url><loc>https://www.cypro.se/2023/02/13/hackers-create-malicious-dota-2-game-modes-to-secretly-access-players-systems/</loc></url><url><loc>https://www.cypro.se/2023/02/03/spotlight-understanding-human-tech-interactions-with-computer-scientist-shanee-dawkins/</loc></url><url><loc>https://www.cypro.se/2023/02/14/patch-now-apples-ios-ipados-macos-and-safari-under-attack-with-new-zero-day-flaw/</loc></url><url><loc>https://www.cypro.se/2023/02/14/massive-http-ddos-attack-hits-record-high-of-71-million-requests-second/</loc></url><url><loc>https://www.cypro.se/2023/02/14/a-cisos-practical-guide-to-storage-and-backup-ransomware-resiliency/</loc></url><url><loc>https://www.cypro.se/2023/02/14/chinese-hackers-targeting-south-american-diplomatic-entities-with-shadowpad/</loc></url><url><loc>https://www.cypro.se/2023/02/14/python-developers-beware-clipper-malware-found-in-450-pypi-packages/</loc></url><url><loc>https://www.cypro.se/2023/03/16/digital-identity-guidelines-webinar-3-the-future-of-authentication/</loc></url><url><loc>https://www.cypro.se/2023/03/09/digital-identity-guidelines-webinar-2-innovating-identity-proofing/</loc></url><url><loc>https://www.cypro.se/2023/03/02/digital-identity-guidelines-webinar-1-digital-identity-risk-management-and-assurance-level-selection/</loc></url><url><loc>https://www.cypro.se/2023/02/08/announcement-of-proposal-to-update-nist-sp-800-38e-using-the-xts-aes-mode-for-confidentiality-on-storage-devices/</loc></url><url><loc>https://www.cypro.se/2023/02/08/nist-cloud-computing-forensic-reference-architecture-nist-requests-public-comments-on-sp-800-201/</loc></url><url><loc>https://www.cypro.se/2023/02/07/lightweight-cryptography-standardization-process-nist-selects-ascon/</loc></url><url><loc>https://www.cypro.se/2023/02/06/high-performance-computing-hpc-security-draft-nist-sp-800-223-is-available-for-public-comment/</loc></url><url><loc>https://www.cypro.se/2023/02/03/nist-revises-the-digital-signature-standard-dss-and-publishes-a-guideline-for-elliptic-curve-domain-parameters/</loc></url><url><loc>https://www.cypro.se/2023/01/25/draft-call-for-multi-party-threshold-schemes-nist-ir-8214c-ipd-available-for-public-comment/</loc></url><url><loc>https://www.cypro.se/2023/01/10/nist-releases-two-draft-guidelines-on-personal-identity-verification-piv-credentials/</loc></url><url><loc>https://www.cypro.se/2023/02/14/massive-adsense-fraud-campaign-uncovered-10000-wordpress-sites-infected/</loc></url><url><loc>https://www.cypro.se/2023/02/15/update-now-microsoft-releases-patches-for-3-actively-exploited-windows-vulnerabilities/</loc></url><url><loc>https://www.cypro.se/2023/02/15/google-rolling-out-privacy-sandbox-beta-on-android-13-devices/</loc></url><url><loc>https://www.cypro.se/2023/02/15/regular-pen-testing-is-key-to-resolving-conflict-between-secops-and-devops/</loc></url><url><loc>https://www.cypro.se/2023/02/15/experts-warn-of-beep-a-new-evasive-malware-that-can-fly-under-the-radar/</loc></url><url><loc>https://www.cypro.se/2023/02/15/webinar-a-mythbusting-special-9-myths-about-file-based-threats/</loc></url><url><loc>https://www.cypro.se/2023/02/15/financially-motivated-threat-actor-strikes-with-new-ransomware-and-clipper-malware/</loc></url><url><loc>https://www.cypro.se/2023/02/15/north-koreas-apt37-targeting-southern-counterpart-with-new-m2rat-malware/</loc></url><url><loc>https://www.cypro.se/2023/03/07/iot-advisory-board-meeting/</loc></url><url><loc>https://www.cypro.se/2023/02/16/mapping-your-supply-chain/</loc></url><url><loc>https://www.cypro.se/2023/02/16/new-supply-chain-mapping-guidance/</loc></url><url><loc>https://www.cypro.se/2023/02/16/esxiargs-ransomware-hits-over-500-new-targets-in-european-countries/</loc></url><url><loc>https://www.cypro.se/2023/02/16/breaking-the-security-black-box-in-dbs-data-warehouses-and-data-lakes/</loc></url><url><loc>https://www.cypro.se/2023/02/16/new-threat-actor-wip26-targeting-telecom-service-providers-in-the-middle-east/</loc></url><url><loc>https://www.cypro.se/2023/02/16/researchers-warn-of-critical-security-bugs-in-schneider-electric-modicon-plcs/</loc></url><url><loc>https://www.cypro.se/2023/02/16/hackers-using-google-ads-to-spread-fatalrat-malware-disguised-as-popular-apps/</loc></url><url><loc>https://www.cypro.se/2023/02/16/researchers-hijack-popular-npm-package-with-millions-of-downloads/</loc></url><url><loc>https://www.cypro.se/2023/02/16/researchers-link-sidewinder-group-to-dozens-of-targeted-attacks-in-multiple-countries/</loc></url><url><loc>https://www.cypro.se/2023/02/17/critical-rce-vulnerability-discovered-in-clamav-open-source-antivirus-software/</loc></url><url><loc>https://www.cypro.se/2023/02/17/new-mirai-botnet-variant-v3g4-exploiting-13-flaws-to-target-linux-and-iot-devices/</loc></url><url><loc>https://www.cypro.se/2023/02/17/iotw-russian-hackers-target-nato-sites-with-ddos-attack/</loc></url><url><loc>https://www.cypro.se/2023/02/17/armenian-entities-hit-by-new-version-of-oxtarat-spying-tool/</loc></url><url><loc>https://www.cypro.se/2023/02/17/%e2%9a%a1top-cybersecurity-news-stories-this-week-cybersecurity-newsletter/</loc></url><url><loc>https://www.cypro.se/2023/02/17/experts-warn-of-rambleon-android-malware-targeting-south-korean-journalists/</loc></url><url><loc>https://www.cypro.se/2023/02/18/godaddy-discloses-multi-year-security-breach-causing-malware-installations-and-source-code-theft/</loc></url><url><loc>https://www.cypro.se/2023/02/18/twitter-limits-sms-based-2-factor-authentication-to-blue-subscribers-only/</loc></url><url><loc>https://www.cypro.se/2023/02/19/fortinet-issues-patches-for-40-flaws-affecting-fortiweb-fortios-fortios-and-fortiproxy/</loc></url><url><loc>https://www.cypro.se/2023/02/20/samsung-introduces-new-feature-to-protect-users-from-zero-click-malware-attacks/</loc></url><url><loc>https://www.cypro.se/2023/02/20/north-korean-cyber-espionage-group-deploys-whiskerspy-backdoor-in-latest-attacks/</loc></url><url><loc>https://www.cypro.se/2023/02/20/how-to-detect-new-threats-via-suspicious-activities/</loc></url><url><loc>https://www.cypro.se/2023/02/20/google-reveals-alarming-surge-in-russian-cyber-attacks-against-ukraine/</loc></url><url><loc>https://www.cypro.se/2023/02/20/norway-seizes-5-84-million-in-cryptocurrency-stolen-by-lazarus-hackers/</loc></url><url><loc>https://www.cypro.se/2023/02/21/researchers-warn-of-reverserat-backdoor-targeting-indian-government-agencies/</loc></url><url><loc>https://www.cypro.se/2023/02/21/researchers-discover-dozens-samples-of-information-stealer-stealc-in-the-wild/</loc></url><url><loc>https://www.cypro.se/2023/02/21/coinbase-employee-falls-for-sms-scam-in-cyber-attack-limited-data-exposed/</loc></url><url><loc>https://www.cypro.se/2023/02/21/the-future-of-network-security-predictive-analytics-and-ml-driven-solutions/</loc></url><url><loc>https://www.cypro.se/2023/02/21/mylobot-botnet-spreading-rapidly-worldwide-infecting-over-50000-devices-daily/</loc></url><url><loc>https://www.cypro.se/2023/02/22/vmware-patches-critical-vulnerability-in-carbon-black-app-control-product/</loc></url><url><loc>https://www.cypro.se/2023/02/22/u-s-cybersecurity-agency-cisa-adds-three-new-vulnerabilities-in-kev-catalog/</loc></url><url><loc>https://www.cypro.se/2023/02/22/threat-actors-adopt-havoc-framework-for-post-exploitation-in-targeted-attacks/</loc></url><url><loc>https://www.cypro.se/2023/02/22/gcore-thwarts-massive-650-gbps-ddos-attack-on-free-plan-client/</loc></url><url><loc>https://www.cypro.se/2023/02/22/german-airports-hit-with-ddos-attack/</loc></url><url><loc>https://www.cypro.se/2023/02/22/attackers-flood-npm-repository-with-over-15000-spam-packages-containing-phishing-links/</loc></url><url><loc>https://www.cypro.se/2023/02/22/3-steps-to-automate-your-third-party-risk-management-program/</loc></url><url><loc>https://www.cypro.se/2023/02/22/hydrochasma-new-threat-actor-targets-shipping-companies-and-medical-labs-in-asia/</loc></url><url><loc>https://www.cypro.se/2023/02/22/apple-warns-of-3-new-vulnerabilities-affecting-iphone-ipad-and-mac-devices/</loc></url><url><loc>https://www.cypro.se/2023/02/23/python-developers-warned-of-trojanized-pypi-packages-mimicking-popular-libraries/</loc></url><url><loc>https://www.cypro.se/2023/02/23/new-s1deload-malware-hijacking-users-social-media-accounts-and-mining-cryptocurrency/</loc></url><url><loc>https://www.cypro.se/2023/02/23/new-hacking-cluster-clasiopa-targeting-materials-research-organizations-in-asia/</loc></url><url><loc>https://www.cypro.se/2023/02/23/lazarus-group-using-new-winordll64-backdoor-to-exfiltrate-sensitive-data/</loc></url><url><loc>https://www.cypro.se/2023/02/23/the-secret-vulnerability-finance-execs-are-missing/</loc></url><url><loc>https://www.cypro.se/2023/02/23/experts-sound-alarm-over-growing-attacks-exploiting-zoho-manageengine-products/</loc></url><url><loc>https://www.cypro.se/2023/02/23/how-digital-twins-could-protect-manufacturers-from-cyberattacks/</loc></url><url><loc>https://www.cypro.se/2023/02/23/hackers-using-trojanized-macos-apps-to-deploy-evasive-cryptocurrency-mining-malware/</loc></url><url><loc>https://www.cypro.se/2023/02/24/majority-of-android-apps-on-google-play-store-provide-misleading-data-safety-labels/</loc></url><url><loc>https://www.cypro.se/2023/02/24/how-to-use-ai-in-cybersecurity-and-avoid-being-trapped/</loc></url><url><loc>https://www.cypro.se/2023/02/24/cisa-sounds-alarm-on-cybersecurity-threats-amid-russias-invasion-anniversary/</loc></url><url><loc>https://www.cypro.se/2023/02/24/how-to-tackle-the-top-saas-challenges-of-2023/</loc></url><url><loc>https://www.cypro.se/2023/02/24/google-teams-up-with-ecosystem-partners-to-enhance-security-of-soc-processors/</loc></url><url><loc>https://www.cypro.se/2023/02/24/threat-report-24th-february-2023/</loc></url><url><loc>https://www.cypro.se/2023/02/27/dutch-police-arrest-3-hackers-involved-in-massive-data-theft-and-extortion-scheme/</loc></url><url><loc>https://www.cypro.se/2023/02/27/zero-trust-building-a-mixed-estate/</loc></url><url><loc>https://www.cypro.se/2023/02/27/zero-trust-migration-how-will-i-know-if-i-can-remove-my-vpn/</loc></url><url><loc>https://www.cypro.se/2023/02/27/purecrypter-malware-targets-government-entities-in-asia-pacific-and-north-america/</loc></url><url><loc>https://www.cypro.se/2023/02/27/plugx-trojan-disguised-as-legitimate-windows-debugger-tool-in-latest-attacks/</loc></url><url><loc>https://www.cypro.se/2023/02/27/chromeloader-malware-targeting-gamers-via-fake-nintendo-and-steam-game-hacks/</loc></url><url><loc>https://www.cypro.se/2023/02/27/shocking-findings-from-the-2023-third-party-app-access-report/</loc></url><url><loc>https://www.cypro.se/2023/02/27/researchers-share-new-insights-into-rig-exploit-kit-malwares-operations/</loc></url><url><loc>https://www.cypro.se/2023/02/28/cisa-issues-warning-on-active-exploitation-of-zk-java-web-framework-vulnerability/</loc></url><url><loc>https://www.cypro.se/2023/02/28/lastpass-reveals-second-attack-resulting-in-breach-of-encrypted-password-vaults/</loc></url><url><loc>https://www.cypro.se/2023/02/28/apt-c-36-strikes-again-blind-eagle-hackers-target-key-industries-in-colombia/</loc></url><url><loc>https://www.cypro.se/2023/02/28/application-security-vs-api-security-what-is-the-difference/</loc></url><url><loc>https://www.cypro.se/2023/02/28/bitdefender-releases-free-decryptor-for-mortalkombat-ransomware-strain/</loc></url><url><loc>https://www.cypro.se/2023/02/28/new-ex-22-tool-empowers-hackers-with-stealthy-ransomware-attacks-on-enterprises/</loc></url><url><loc>https://www.cypro.se/2023/03/01/parallax-rat-targeting-cryptocurrency-firms-with-sophisticated-injection-techniques/</loc></url><url><loc>https://www.cypro.se/2023/03/01/gmail-and-google-calendar-now-support-client-side-encryption-cse-to-boost-data-privacy/</loc></url><url><loc>https://www.cypro.se/2023/03/01/blacklotus-becomes-first-uefi-bootkit-malware-to-bypass-secure-boot-on-windows-11/</loc></url><url><loc>https://www.cypro.se/2023/03/01/cisos-are-stressed-out-and-its-putting-companies-at-risk/</loc></url><url><loc>https://www.cypro.se/2023/03/01/cybercriminals-targeting-law-firms-with-gootloader-and-fakeupdates-malware/</loc></url><url><loc>https://www.cypro.se/2023/03/02/critical-flaw-in-cisco-ip-phone-series-exposes-users-to-command-injection-attack/</loc></url><url><loc>https://www.cypro.se/2023/03/02/sysupdate-malware-strikes-again-with-linux-version-and-new-evasion-tactics/</loc></url><url><loc>https://www.cypro.se/2023/03/02/what-if-a-service-changes-your-2-step-verification-options/</loc></url><url><loc>https://www.cypro.se/2023/03/02/new-cryptojacking-campaign-leverages-misconfigured-redis-database-servers/</loc></url><url><loc>https://www.cypro.se/2023/03/02/2023-browser-security-report-uncovers-major-browsing-risks-and-blind-spots/</loc></url><url><loc>https://www.cypro.se/2023/03/02/experts-identify-fully-featured-info-stealer-and-trojan-in-python-package-on-pypi/</loc></url><url><loc>https://www.cypro.se/2023/03/02/hackers-exploit-containerized-environments-to-steals-proprietary-data-and-software/</loc></url><url><loc>https://www.cypro.se/2023/06/28/5x5-the-public-safety-innovation-summit/</loc></url><url><loc>https://www.cypro.se/2023/03/03/u-s-cybersecurity-agency-raises-alarm-over-royal-ransomwares-deadly-capabilities/</loc></url><url><loc>https://www.cypro.se/2023/03/03/chinese-hackers-targeting-european-entities-with-new-mqsttang-backdoor/</loc></url><url><loc>https://www.cypro.se/2023/03/03/iotw-us-marshals-service-suffers-ransomware-attack/</loc></url><url><loc>https://www.cypro.se/2023/03/03/new-flaws-in-tpm-2-0-library-pose-threat-to-billions-of-iot-and-enterprise-devices/</loc></url><url><loc>https://www.cypro.se/2023/03/03/immersive-test-center-brings-first-responders-advanced-training-opportunities-to-overcome-challenges/</loc></url><url><loc>https://www.cypro.se/2023/03/04/security-and-it-teams-no-longer-need-to-pay-for-saas-shadow-it-discovery/</loc></url><url><loc>https://www.cypro.se/2023/03/04/new-fixs-atm-malware-targeting-mexican-banks/</loc></url><url><loc>https://www.cypro.se/2023/03/06/experts-discover-flaw-in-u-s-govts-chosen-quantum-resistant-encryption-algorithm/</loc></url><url><loc>https://www.cypro.se/2023/03/06/experts-reveal-google-cloud-platforms-blind-spot-for-data-exfiltration-attacks/</loc></url><url><loc>https://www.cypro.se/2023/03/06/core-members-of-doppelpaymer-ransomware-gang-targeted-in-germany-and-ukraine/</loc></url><url><loc>https://www.cypro.se/2023/03/06/from-disinformation-to-deep-fakes-how-threat-actors-manipulate-reality/</loc></url><url><loc>https://www.cypro.se/2023/03/06/new-hiatusrat-malware-targets-business-grade-routers-to-covertly-spy-on-victims/</loc></url><url><loc>https://www.cypro.se/2023/03/07/lastpass-hack-engineers-failure-to-update-plex-software-led-to-massive-data-breach/</loc></url><url><loc>https://www.cypro.se/2023/03/07/sheins-android-app-caught-transmitting-clipboard-data-to-remote-servers/</loc></url><url><loc>https://www.cypro.se/2023/03/07/transparent-tribe-hackers-distribute-caprarat-via-trojanized-messaging-apps/</loc></url><url><loc>https://www.cypro.se/2023/03/07/why-healthcare-cant-afford-to-ignore-digital-identity/</loc></url><url><loc>https://www.cypro.se/2023/03/07/nists-national-cybersecurity-center-of-excellence-renews-partnerships-with-state-county/</loc></url><url><loc>https://www.cypro.se/2023/03/07/sys01stealer-new-threat-using-facebook-ads-to-target-critical-infrastructure-firms/</loc></url><url><loc>https://www.cypro.se/2023/03/08/cisas-kev-catalog-updated-with-3-new-flaws-threatening-it-management-systems/</loc></url><url><loc>https://www.cypro.se/2023/03/08/sharp-panda-using-new-soul-framework-version-to-target-southeast-asian-governments/</loc></url><url><loc>https://www.cypro.se/2023/03/08/lazarus-group-exploits-zero-day-vulnerability-to-hack-south-korean-financial-entity/</loc></url><url><loc>https://www.cypro.se/2023/03/08/influence-techniques-in-everyday-life-sales/</loc></url><url><loc>https://www.cypro.se/2023/03/08/syxsense-platform-unified-security-and-endpoint-management/</loc></url><url><loc>https://www.cypro.se/2023/03/08/jenkins-security-alert-new-security-flaws-could-allow-code-execution-attacks/</loc></url><url><loc>https://www.cypro.se/2023/03/09/new-critical-flaw-in-fortios-and-fortiproxy-could-give-hackers-remote-access/</loc></url><url><loc>https://www.cypro.se/2023/03/09/new-scrubcrypt-crypter-used-in-cryptojacking-attacks-targeting-oracle-weblogic/</loc></url><url><loc>https://www.cypro.se/2023/03/09/does-your-help-desk-know-whos-calling/</loc></url><url><loc>https://www.cypro.se/2023/03/09/iranian-hackers-target-women-involved-in-human-rights-and-middle-east-politics/</loc></url><url><loc>https://www.cypro.se/2023/03/09/icefire-ransomware-exploits-ibm-aspera-faspex-to-attack-linux-powered-enterprise-networks/</loc></url><url><loc>https://www.cypro.se/2023/03/09/hackers-exploiting-remote-desktop-software-flaws-to-deploy-plugx-malware/</loc></url><url><loc>https://www.cypro.se/2023/03/08/hundreds-sign-up-for-the-upcoming-nist-innovative-technologies-showcase-2/</loc></url><url><loc>https://www.cypro.se/2023/03/10/north-korean-unc2970-hackers-expands-operations-with-new-malware-families/</loc></url><url><loc>https://www.cypro.se/2023/03/10/xenomorph-android-banking-trojan-returns-with-a-new-and-more-powerful-variant/</loc></url><url><loc>https://www.cypro.se/2023/03/10/when-partial-protection-is-zero-protection-the-mfa-blind-spots-no-one-talks-about/</loc></url><url><loc>https://www.cypro.se/2023/03/10/new-version-of-prometei-botnet-infects-over-10000-systems-worldwide/</loc></url><url><loc>https://www.cypro.se/2023/03/10/china-linked-hackers-targeting-unpatched-sonicwall-sma-devices-with-malware/</loc></url><url><loc>https://www.cypro.se/2023/03/10/international-law-enforcement-takes-down-infamous-netwire-cross-platform-rat/</loc></url><url><loc>https://www.cypro.se/2023/03/10/threat-report-10th-march-2023/</loc></url><url><loc>https://www.cypro.se/2023/03/11/batloader-malware-uses-google-ads-to-deliver-vidar-stealer-and-ursnif-payloads/</loc></url><url><loc>https://www.cypro.se/2023/03/13/kamikakabot-malware-used-in-latest-dark-pink-apt-attacks-on-southeast-asian-targets/</loc></url><url><loc>https://www.cypro.se/2023/03/13/researchers-uncover-over-a-dozen-security-flaws-in-akuvox-e11-smart-intercom/</loc></url><url><loc>https://www.cypro.se/2023/03/13/fake-chatgpt-chrome-extension-hijacking-facebook-accounts-for-malicious-advertising/</loc></url><url><loc>https://www.cypro.se/2023/03/13/how-to-apply-nist-principles-to-saas-in-2023/</loc></url><url><loc>https://www.cypro.se/2023/03/13/warning-ai-generated-youtube-video-tutorials-spreading-infostealer-malware/</loc></url><url><loc>https://www.cypro.se/2023/03/13/large-scale-cyber-attack-hijacks-east-asian-websites-for-adult-content-redirects/</loc></url><url><loc>https://www.cypro.se/2023/03/14/fortinet-fortios-flaw-exploited-in-targeted-cyberattacks-on-government-entities/</loc></url><url><loc>https://www.cypro.se/2023/03/14/chatgpt-and-large-language-models-whats-the-risk/</loc></url><url><loc>https://www.cypro.se/2023/03/14/microsoft-warns-of-large-scale-use-of-phishing-kits-to-send-millions-of-emails-daily/</loc></url><url><loc>https://www.cypro.se/2023/03/14/gobruteforcer-new-golang-based-malware-breaches-web-servers-via-brute-force-attacks/</loc></url><url><loc>https://www.cypro.se/2023/03/14/the-prolificacy-of-lockbit-ransomware/</loc></url><url><loc>https://www.cypro.se/2023/03/15/microsoft-rolls-out-patches-for-80-new-security-flaws-two-under-active-attack/</loc></url><url><loc>https://www.cypro.se/2023/03/15/tick-apt-targeted-high-value-customers-of-east-asian-data-loss-prevention-company/</loc></url><url><loc>https://www.cypro.se/2023/03/15/new-cryptojacking-operation-targeting-kubernetes-clusters-for-dero-mining/</loc></url><url><loc>https://www.cypro.se/2023/03/15/the-different-methods-and-stages-of-penetration-testing/</loc></url><url><loc>https://www.cypro.se/2023/03/15/yorotrooper-stealing-credentials-and-information-from-government-and-energy-organizations/</loc></url><url><loc>https://www.cypro.se/2023/03/16/cisa-issues-urgent-warning-adobe-coldfusion-vulnerability-exploited-in-the-wild/</loc></url><url><loc>https://www.cypro.se/2023/03/16/multiple-hacker-groups-exploit-3-year-old-vulnerability-to-breach-u-s-federal-agency/</loc></url><url><loc>https://www.cypro.se/2023/03/16/whats-wrong-with-manufacturing/</loc></url><url><loc>https://www.cypro.se/2023/03/16/authorities-shut-down-chipmixer-platform-tied-to-crypto-laundering-scheme/</loc></url><url><loc>https://www.cypro.se/2023/03/16/cryptojacking-group-teamtnt-suspected-of-using-decoy-miner-to-conceal-data-exfiltration/</loc></url><url><loc>https://www.cypro.se/2023/03/16/chinese-and-russian-hackers-using-silkloader-malware-to-evade-detection/</loc></url><url><loc>https://www.cypro.se/2023/03/16/iotw-ransomware-gang-allegedly-hacks-ring-doorbells/</loc></url><url><loc>https://www.cypro.se/2023/03/17/winter-vivern-apt-group-targeting-indian-lithuanian-slovakian-and-vatican-officials/</loc></url><url><loc>https://www.cypro.se/2023/03/17/google-uncovers-18-severe-security-vulnerabilities-in-samsung-exynos-chips/</loc></url><url><loc>https://www.cypro.se/2023/03/17/lookalike-telegram-and-whatsapp-websites-distributing-cryptocurrency-stealing-malware/</loc></url><url><loc>https://www.cypro.se/2023/03/17/thn-webinar-3-research-backed-ways-to-secure-your-identity-perimeter/</loc></url><url><loc>https://www.cypro.se/2023/03/17/new-golang-based-hinatabot-exploiting-router-and-server-flaws-for-ddos-attacks/</loc></url><url><loc>https://www.cypro.se/2023/03/17/a-new-security-category-addresses-web-borne-threats/</loc></url><url><loc>https://www.cypro.se/2023/03/17/fakecalls-vishing-malware-targets-south-korean-users-via-popular-financial-apps/</loc></url><url><loc>https://www.cypro.se/2023/03/18/lockbit-3-0-ransomware-inside-the-cyberthreat-thats-costing-millions/</loc></url><url><loc>https://www.cypro.se/2023/03/18/pompompurin-unmasked-infamous-breachforums-mastermind-arrested-in-new-york/</loc></url><url><loc>https://www.cypro.se/2023/03/18/chinese-hackers-exploit-fortinet-zero-day-flaw-for-cyber-espionage-attack/</loc></url><url><loc>https://www.cypro.se/2023/03/20/emotet-rises-again-evades-macro-security-via-onenote-attachments/</loc></url><url><loc>https://www.cypro.se/2023/03/20/new-cyber-platform-lab-1-decodes-dark-web-data-to-uncover-hidden-supply-chain-breaches/</loc></url><url><loc>https://www.cypro.se/2023/03/20/researchers-shed-light-on-catb-ransomwares-evasion-techniques/</loc></url><url><loc>https://www.cypro.se/2023/03/20/mispadu-banking-trojan-targets-latin-america-90000-credentials-stolen/</loc></url><url><loc>https://www.cypro.se/2023/03/20/new-dotrunpex-malware-delivers-multiple-malware-families-via-malicious-ads/</loc></url><url><loc>https://www.cypro.se/2023/03/20/is-your-cybersecurity-strategy-falling-victim-to-these-6-common-pitfalls/</loc></url><url><loc>https://www.cypro.se/2023/03/21/hackers-steal-over-1-6-million-in-crypto-from-general-bytes-bitcoin-atms-using-zero-day-flaw/</loc></url><url><loc>https://www.cypro.se/2023/03/21/from-ransomware-to-cyber-espionage-55-zero-day-vulnerabilities-weaponized-in-2022/</loc></url><url><loc>https://www.cypro.se/2023/03/21/new-shellbot-ddos-malware-targeting-poorly-managed-linux-servers/</loc></url><url><loc>https://www.cypro.se/2023/03/21/the-best-defense-against-cyber-threats-for-lean-security-teams/</loc></url><url><loc>https://www.cypro.se/2023/03/21/new-bad-magic-cyber-threat-disrupt-ukraines-key-sectors-amid-war/</loc></url><url><loc>https://www.cypro.se/2023/03/22/breachforums-administrator-baphomet-shuts-down-infamous-hacking-forum/</loc></url><url><loc>https://www.cypro.se/2023/03/22/new-naplistener-malware-used-by-ref2924-group-to-evade-network-detection/</loc></url><url><loc>https://www.cypro.se/2023/03/22/rogue-nuget-packages-infect-net-developers-with-crypto-stealing-malware/</loc></url><url><loc>https://www.cypro.se/2023/03/22/leveraging-ncscs-national-insight-to-strengthen-the-fight-against-mobile-threats/</loc></url><url><loc>https://www.cypro.se/2023/03/22/lessons-from-a-scam-artist/</loc></url><url><loc>https://www.cypro.se/2023/03/22/preventing-insider-threats-in-your-active-directory/</loc></url><url><loc>https://www.cypro.se/2023/03/22/scarcrufts-evolving-arsenal-researchers-reveal-new-malware-distribution-techniques/</loc></url><url><loc>https://www.cypro.se/2023/03/22/cisa-alerts-on-critical-security-vulnerabilities-in-industrial-control-systems/</loc></url><url><loc>https://www.cypro.se/2023/02/01/nist-researchers-extend-model-to-predict-minimum-investment-for-optimum-cybersecurity-across-large-weakly-connected-networks/</loc></url><url><loc>https://www.cypro.se/2023/03/23/google-suspends-pinduoduo-app-over-malware-concerns/</loc></url><url><loc>https://www.cypro.se/2023/03/23/german-and-south-korean-agencies-warn-of-kimsukys-expanding-cyber-attack-tactics/</loc></url><url><loc>https://www.cypro.se/2023/03/23/the-new-route-for-cyber-security-professional-recognition/</loc></url><url><loc>https://www.cypro.se/2023/03/23/operation-soft-cell-chinese-hackers-breach-middle-east-telecom-providers/</loc></url><url><loc>https://www.cypro.se/2023/03/23/2023-cybersecurity-maturity-report-reveals-organizational-unpreparedness-for-cyberattacks/</loc></url><url><loc>https://www.cypro.se/2023/03/23/nexus-a-new-rising-android-banking-trojan-targeting-450-financial-apps/</loc></url><url><loc>https://www.cypro.se/2023/03/23/fake-chatgpt-chrome-browser-extension-caught-hijacking-facebook-accounts/</loc></url><url><loc>https://www.cypro.se/2023/03/24/iotw-dark-web-hacking-forum-shuts-down-after-fbi-arrests-its-top-admin/</loc></url><url><loc>https://www.cypro.se/2023/03/24/critical-woocommerce-payments-plugin-flaw-patched-for-500000-wordpress-sites/</loc></url><url><loc>https://www.cypro.se/2023/03/24/researchers-uncover-chinese-nation-state-hackers-deceptive-attack-strategies/</loc></url><url><loc>https://www.cypro.se/2023/03/24/thn-webinar-inside-the-high-risk-of-3rd-party-saas-apps/</loc></url><url><loc>https://www.cypro.se/2023/03/24/github-swiftly-replaces-exposed-rsa-ssh-key-to-protect-git-operations/</loc></url><url><loc>https://www.cypro.se/2023/03/24/malicious-python-package-uses-unicode-trickery-to-evade-detection-and-steal-data/</loc></url><url><loc>https://www.cypro.se/2023/03/24/threat-report-24th-march-2023/</loc></url><url><loc>https://www.cypro.se/2023/05/24/zero-trust-and-high-assurance-for-cloud-native-applications/</loc></url><url><loc>https://www.cypro.se/2023/05/16/33rd-annual-fissea-conference/</loc></url><url><loc>https://www.cypro.se/2023/03/25/openai-reveals-redis-bug-behind-chatgpt-user-data-exposure-incident/</loc></url><url><loc>https://www.cypro.se/2023/03/25/microsoft-warns-of-stealthy-outlook-vulnerability-exploited-by-russian-hackers/</loc></url><url><loc>https://www.cypro.se/2023/03/25/u-k-national-crime-agency-sets-up-fake-ddos-for-hire-sites-to-catch-cybercriminals/</loc></url><url><loc>https://www.cypro.se/2023/03/27/microsoft-issues-patch-for-acropalypse-privacy-flaw-in-windows-screenshot-tools/</loc></url><url><loc>https://www.cypro.se/2023/03/27/where-sso-falls-short-in-protecting-saas/</loc></url><url><loc>https://www.cypro.se/2023/03/27/new-macstealer-macos-malware-steals-icloud-keychain-data-and-passwords/</loc></url><url><loc>https://www.cypro.se/2023/03/27/20-year-old-breachforums-founder-faces-up-to-5-years-in-prison/</loc></url><url><loc>https://www.cypro.se/2023/03/28/apple-issues-urgent-security-update-for-older-ios-and-ipados-models/</loc></url><url><loc>https://www.cypro.se/2023/03/28/president-biden-signs-executive-order-restricting-use-of-commercial-spyware/</loc></url><url><loc>https://www.cypro.se/2023/03/28/stealthy-dbatloader-malware-loader-spreading-remcos-rat-and-formbook-in-europe/</loc></url><url><loc>https://www.cypro.se/2023/03/28/pakistan-origin-sidecopy-linked-to-new-cyberattack-on-indias-ministry-of-defence/</loc></url><url><loc>https://www.cypro.se/2023/03/28/icedid-malware-shifts-focus-from-banking-fraud-to-ransomware-delivery/</loc></url><url><loc>https://www.cypro.se/2023/03/28/breaking-the-mold-pen-testing-solutions-that-challenge-the-status-quo/</loc></url><url><loc>https://www.cypro.se/2023/03/28/microsoft-introduces-gpt-4-ai-powered-security-copilot-tool-to-empower-defenders/</loc></url><url><loc>https://www.cypro.se/2023/03/29/north-korean-apt43-group-uses-cybercrime-to-fund-espionage-operations/</loc></url><url><loc>https://www.cypro.se/2023/03/29/putting-the-consultancy-community-at-its-heart/</loc></url><url><loc>https://www.cypro.se/2023/03/29/trojanized-tor-browser-installers-spreading-crypto-stealing-clipper-malware/</loc></url><url><loc>https://www.cypro.se/2023/03/29/twitter-source-code-leaked-via-github/</loc></url><url><loc>https://www.cypro.se/2023/03/29/melofee-researchers-uncover-new-linux-malware-linked-to-chinese-apt-groups/</loc></url><url><loc>https://www.cypro.se/2023/03/29/how-to-build-a-research-lab-for-reverse-engineering-4-ways/</loc></url><url><loc>https://www.cypro.se/2023/03/29/smart-mobility-has-a-blindspot-when-it-comes-to-api-security/</loc></url><url><loc>https://www.cypro.se/2023/03/29/spyware-vendors-caught-exploiting-zero-day-vulnerabilities-on-android-and-ios-devices/</loc></url><url><loc>https://www.cypro.se/2023/03/30/3cx-desktop-app-supply-chain-attack-leaves-millions-at-risk-urgent-update-on-the-way/</loc></url><url><loc>https://www.cypro.se/2023/03/30/refreshed-cyber-security-toolkit-helps-board-members-to-govern-online-risk/</loc></url><url><loc>https://www.cypro.se/2023/03/30/alienfox-malware-targets-api-keys-and-secrets-from-aws-google-and-microsoft-cloud-services/</loc></url><url><loc>https://www.cypro.se/2023/03/30/cyberstorage-leveraging-the-multi-cloud-to-combat-data-exfiltration/</loc></url><url><loc>https://www.cypro.se/2023/03/30/new-wi-fi-protocol-security-flaw-affecting-linux-android-and-ios-devices/</loc></url><url><loc>https://www.cypro.se/2023/03/30/iotw-latitude-financial-data-breach-affects-14-million-people/</loc></url><url><loc>https://www.cypro.se/2023/03/30/chinese-redgolf-group-targeting-windows-and-linux-systems-with-keyplug-backdoor/</loc></url><url><loc>https://www.cypro.se/2023/03/30/researchers-detail-severe-super-fabrixss-vulnerability-in-microsoft-azure-sfx/</loc></url><url><loc>https://www.cypro.se/2023/03/31/3cx-supply-chain-attack-heres-what-we-know-so-far/</loc></url><url><loc>https://www.cypro.se/2023/03/31/cyber-police-of-ukraine-busted-phishing-gang-responsible-for-4-33-million-scam/</loc></url><url><loc>https://www.cypro.se/2023/03/31/deep-dive-into-6-key-steps-to-accelerate-your-incident-response/</loc></url><url><loc>https://www.cypro.se/2023/03/31/winter-vivern-apt-targets-european-government-entities-with-zimbra-vulnerability/</loc></url><url><loc>https://www.cypro.se/2023/04/01/hackers-exploiting-wordpress-elementor-pro-vulnerability-millions-of-sites-at-risk/</loc></url><url><loc>https://www.cypro.se/2023/04/01/cacti-realtek-and-ibm-aspera-faspex-vulnerabilities-under-active-exploitation/</loc></url><url><loc>https://www.cypro.se/2023/04/01/microsoft-fixes-new-azure-ad-vulnerability-impacting-bing-search-and-major-apps/</loc></url><url><loc>https://www.cypro.se/2023/04/03/crypto-stealing-opcjacker-malware-targets-users-with-fake-vpn-service/</loc></url><url><loc>https://www.cypro.se/2023/04/03/western-digital-hit-by-network-security-breach-critical-services-disrupted/</loc></url><url><loc>https://www.cypro.se/2023/04/03/italian-watchdog-bans-openais-chatgpt-over-data-protection-concerns/</loc></url><url><loc>https://www.cypro.se/2023/04/03/its-the-service-accounts-stupid-why-do-pam-deployments-take-almost-forever-to-complete/</loc></url><url><loc>https://www.cypro.se/2023/04/04/microsoft-tightens-onenote-security-by-auto-blocking-120-risky-file-extensions/</loc></url><url><loc>https://www.cypro.se/2023/04/04/cryptocurrency-companies-targeted-in-sophisticated-3cx-supply-chain-attack/</loc></url><url><loc>https://www.cypro.se/2023/04/04/arid-viper-hacking-group-using-upgraded-malware-in-middle-east-cyber-attacks/</loc></url><url><loc>https://www.cypro.se/2023/04/04/think-before-you-share-the-link-saas-in-the-real-world/</loc></url><url><loc>https://www.cypro.se/2023/04/04/sorting-through-haystacks-to-find-cti-needles/</loc></url><url><loc>https://www.cypro.se/2023/04/04/rorschach-ransomware-emerges-experts-warn-of-advanced-evasion-strategies/</loc></url><url><loc>https://www.cypro.se/2023/04/04/new-rilide-malware-targeting-chromium-based-browsers-to-steal-cryptocurrency/</loc></url><url><loc>https://www.cypro.se/2023/04/05/typhon-reborn-stealer-malware-resurfaces-with-advanced-evasion-techniques/</loc></url><url><loc>https://www.cypro.se/2023/04/05/communication-using-social-engineering-techniques-in-everyday-life/</loc></url><url><loc>https://www.cypro.se/2023/04/05/protect-your-company-ransomware-prevention-made-easy/</loc></url><url><loc>https://www.cypro.se/2023/04/05/hackers-using-self-extracting-archives-exploit-for-stealthy-backdoor-attacks/</loc></url><url><loc>https://www.cypro.se/2023/04/05/google-tag-warns-of-north-korean-linked-archipelago-cyberattacks/</loc></url><url><loc>https://www.cypro.se/2023/04/05/cryptoclippy-new-clipper-malware-targeting-portuguese-cryptocurrency-users/</loc></url><url><loc>https://www.cypro.se/2023/04/05/italy-bans-chatgpt-over-data-privacy-concerns/</loc></url><url><loc>https://www.cypro.se/2023/04/06/google-mandates-android-apps-to-offer-easy-account-deletion-in-app-and-online/</loc></url><url><loc>https://www.cypro.se/2023/04/06/fbi-cracks-down-on-genesis-market-119-arrested-in-cybercrime-crackdown/</loc></url><url><loc>https://www.cypro.se/2023/04/06/supply-chain-attacks-and-critical-infrastructure-how-cisa-helps-secure-a-nations-crown-jewels/</loc></url><url><loc>https://www.cypro.se/2023/04/07/cisa-warns-of-critical-ics-flaws-in-hitachi-myscada-icl-and-nexx-products/</loc></url><url><loc>https://www.cypro.se/2023/04/07/microsoft-takes-legal-action-to-disrupt-cybercriminals-illegal-use-of-cobalt-strike-tool/</loc></url><url><loc>https://www.cypro.se/2023/04/07/are-source-code-leaks-the-new-threat-software-vendors-should-care-about/</loc></url><url><loc>https://www.cypro.se/2023/04/07/researchers-uncover-thriving-phishing-kit-market-on-telegram-channels/</loc></url><url><loc>https://www.cypro.se/2023/03/01/on-panel-nist-researcher-addresses-blockchain-uses-considerations-and-future-research/</loc></url><url><loc>https://www.cypro.se/2023/04/08/apple-releases-updates-to-address-zero-day-flaws-in-ios-ipados-macos-and-safari/</loc></url><url><loc>https://www.cypro.se/2023/04/08/researchers-discover-critical-remote-code-execution-flaw-in-vm2-sandbox-library/</loc></url><url><loc>https://www.cypro.se/2023/04/08/iran-based-hackers-caught-carrying-out-destructive-attacks-under-ransomware-guise/</loc></url><url><loc>https://www.cypro.se/2023/04/08/taiwanese-pc-company-msi-falls-victim-to-ransomware-attack/</loc></url><url><loc>https://www.cypro.se/2023/04/10/cisa-warns-of-5-actively-exploited-security-flaws-urgent-action-required/</loc></url><url><loc>https://www.cypro.se/2023/04/10/protecting-your-business-with-wazuh-the-open-source-security-platform/</loc></url><url><loc>https://www.cypro.se/2023/04/10/over-1-million-wordpress-sites-infected-by-balada-injector-malware-campaign/</loc></url><url><loc>https://www.cypro.se/2023/04/10/top-10-cybersecurity-trends-for-2023-from-zero-trust-to-cyber-insurance/</loc></url><url><loc>https://www.cypro.se/2023/04/10/estonian-national-charged-in-u-s-for-acquiring-electronics-and-metasploit-pro-for-russian-military/</loc></url><url><loc>https://www.cypro.se/2023/04/10/hackers-flood-npm-with-bogus-packages-causing-a-dos-attack/</loc></url><url><loc>https://www.cypro.se/2023/04/11/cryptocurrency-stealer-malware-distributed-via-13-nuget-packages/</loc></url><url><loc>https://www.cypro.se/2023/04/11/ebook-a-step-by-step-guide-to-cyber-risk-assessment/</loc></url><url><loc>https://www.cypro.se/2023/04/11/cybercriminals-turn-to-android-loaders-on-dark-web-to-evade-google-play-security/</loc></url><url><loc>https://www.cypro.se/2023/04/11/newly-discovered-by-design-flaw-in-microsoft-azure-could-expose-storage-accounts-to-hackers/</loc></url><url><loc>https://www.cypro.se/2023/04/12/lazarus-sub-group-labyrinth-chollima-uncovered-as-mastermind-in-3cx-supply-chain-attack/</loc></url><url><loc>https://www.cypro.se/2023/04/12/urgent-microsoft-issues-patches-for-97-flaws-including-active-ransomware-exploit/</loc></url><url><loc>https://www.cypro.se/2023/04/12/how-cyberfishs-founder-got-hooked-on-cheltenham/</loc></url><url><loc>https://www.cypro.se/2023/04/12/kfc-owner-suffers-data-breach-following-ransomware-attack/</loc></url><url><loc>https://www.cypro.se/2023/04/12/israel-based-spyware-firm-quadream-targets-high-risk-iphones-with-zero-click-exploit/</loc></url><url><loc>https://www.cypro.se/2023/04/12/the-service-accounts-challenge-cant-see-or-secure-them-until-its-too-late/</loc></url><url><loc>https://www.cypro.se/2023/04/13/chatgpt-security-openais-bug-bounty-program-offers-up-to-20000-prizes/</loc></url><url><loc>https://www.cypro.se/2023/04/13/lazarus-hacker-group-evolves-tactics-tools-and-targets-in-deathnote-campaign/</loc></url><url><loc>https://www.cypro.se/2023/04/13/why-shadow-apis-are-more-dangerous-than-you-think/</loc></url><url><loc>https://www.cypro.se/2023/04/13/pakistan-based-transparent-tribe-hackers-targeting-indian-educational-institutions/</loc></url><url><loc>https://www.cypro.se/2023/04/13/new-python-based-legion-hacking-tool-emerges-on-telegram/</loc></url><url><loc>https://www.cypro.se/2023/04/13/whatsapp-introduces-new-device-verification-feature-to-prevent-account-takeover-attacks/</loc></url><url><loc>https://www.cypro.se/2023/04/13/rtm-locker-emerging-cybercrime-group-targeting-businesses-with-ransomware/</loc></url><url><loc>https://www.cypro.se/2023/04/13/google-launches-new-cybersecurity-initiatives-to-strengthen-vulnerability-management/</loc></url><url><loc>https://www.cypro.se/2023/04/14/severe-android-and-novi-survey-vulnerabilities-under-active-exploitation/</loc></url><url><loc>https://www.cypro.se/2023/04/14/webinar-tips-from-mssps-to-mssps-building-a-profitable-vciso-practice/</loc></url><url><loc>https://www.cypro.se/2023/04/14/kodi-confirms-data-breach-400k-user-records-and-private-messages-stolen/</loc></url><url><loc>https://www.cypro.se/2023/04/14/russia-linked-hackers-launches-espionage-attacks-on-foreign-diplomatic-entities/</loc></url><url><loc>https://www.cypro.se/2023/04/15/google-releases-urgent-chrome-update-to-fix-actively-exploited-zero-day-vulnerability/</loc></url><url><loc>https://www.cypro.se/2023/04/17/new-zaraza-bot-credential-stealer-sold-on-telegram-targeting-38-web-browsers/</loc></url><url><loc>https://www.cypro.se/2023/04/17/vice-society-ransomware-using-stealthy-powershell-tool-for-data-exfiltration/</loc></url><url><loc>https://www.cypro.se/2023/04/17/google-uncovers-apt41s-use-of-open-source-gc2-tool-to-target-media-and-job-sites/</loc></url><url><loc>https://www.cypro.se/2023/04/17/tour-of-the-underground-master-the-art-of-dark-web-intelligence-gathering/</loc></url><url><loc>https://www.cypro.se/2023/04/17/fin7-and-ex-conti-cybercrime-gangs-join-forces-in-domino-malware-attacks/</loc></url><url><loc>https://www.cypro.se/2023/04/17/whats-the-difference-between-cspm-sspm/</loc></url><url><loc>https://www.cypro.se/2023/04/17/introducing-cyber-advisors/</loc></url><url><loc>https://www.cypro.se/2023/04/17/israeli-spyware-vendor-quadream-to-shut-down-following-citizen-lab-and-microsoft-expose/</loc></url><url><loc>https://www.cypro.se/2023/04/17/new-qbot-banking-trojan-campaign-hijacks-business-emails-to-spread-malware/</loc></url><url><loc>https://www.cypro.se/2023/04/18/acd-the-sixth-year/</loc></url><url><loc>https://www.cypro.se/2023/04/18/lockbit-ransomware-now-targeting-apple-macos-devices/</loc></url><url><loc>https://www.cypro.se/2023/04/18/iranian-hackers-using-simplehelp-remote-support-software-for-persistent-access/</loc></url><url><loc>https://www.cypro.se/2023/04/18/dfir-via-xdr-how-to-expedite-your-investigations-with-a-dfirent-approach/</loc></url><url><loc>https://www.cypro.se/2023/04/18/data-driven-cyber-transforming-cyber-security-through-an-evidence-based-approach/</loc></url><url><loc>https://www.cypro.se/2023/04/18/goldoson-android-malware-infects-over-100-million-google-play-store-downloads/</loc></url><url><loc>https://www.cypro.se/2023/04/18/youtube-videos-distributing-aurora-stealer-malware-via-highly-evasive-loader/</loc></url><url><loc>https://www.cypro.se/2023/04/19/critical-flaws-in-vm2-javascript-library-can-lead-to-remote-code-execution/</loc></url><url><loc>https://www.cypro.se/2023/04/19/iranian-government-backed-hackers-targeting-u-s-energy-and-transit-systems/</loc></url><url><loc>https://www.cypro.se/2023/04/19/u-s-and-u-k-warn-of-russian-hackers-exploiting-cisco-router-flaws-for-espionage/</loc></url><url><loc>https://www.cypro.se/2023/04/19/uncovering-and-understanding-the-hidden-risks-of-saas-apps/</loc></url><url><loc>https://www.cypro.se/2023/04/19/influence-tactics-in-everyday-life-collections/</loc></url><url><loc>https://www.cypro.se/2023/04/19/pakistani-hackers-use-linux-malware-poseidon-to-target-indian-government-agencies/</loc></url><url><loc>https://www.cypro.se/2023/04/19/google-chrome-hit-by-second-zero-day-attack-urgent-patch-update-released/</loc></url><url><loc>https://www.cypro.se/2023/04/19/google-tag-warns-of-russian-hackers-conducting-phishing-attacks-in-ukraine/</loc></url><url><loc>https://www.cypro.se/2023/04/19/blind-eagle-cyber-espionage-group-strikes-again-new-attack-chain-uncovered/</loc></url><url><loc>https://www.cypro.se/2023/04/19/the-threat-from-commercial-cyber-proliferation/</loc></url><url><loc>https://www.cypro.se/2023/04/20/hundreds-of-members-of-congress-affected-by-data-breach/</loc></url><url><loc>https://www.cypro.se/2023/04/20/daggerfly-cyberattack-campaign-hits-african-telecom-services-providers/</loc></url><url><loc>https://www.cypro.se/2023/04/20/nso-group-used-3-zero-click-iphone-exploits-against-human-rights-defenders/</loc></url><url><loc>https://www.cypro.se/2023/04/20/fortra-sheds-light-on-goanywhere-mft-zero-day-exploit-used-in-ransomware-attacks/</loc></url><url><loc>https://www.cypro.se/2023/04/20/chatgpts-data-protection-blind-spots-and-how-security-teams-can-solve-them/</loc></url><url><loc>https://www.cypro.se/2023/04/20/lazarus-group-adds-linux-malware-to-arsenal-in-operation-dream-job/</loc></url><url><loc>https://www.cypro.se/2023/04/20/beyond-traditional-security-ndrs-pivotal-role-in-safeguarding-ot-networks/</loc></url><url><loc>https://www.cypro.se/2023/04/20/two-critical-flaws-found-in-alibaba-clouds-postgresql-databases/</loc></url><url><loc>https://www.cypro.se/2023/04/21/cisco-and-vmware-release-security-updates-to-patch-critical-flaws-in-their-products/</loc></url><url><loc>https://www.cypro.se/2023/04/21/n-k-hackers-employ-matryoshka-doll-style-cascading-supply-chain-attack-on-3cx/</loc></url><url><loc>https://www.cypro.se/2023/04/21/iotw-samsung-employees-allegedly-leak-proprietary-information-via-chatgpt/</loc></url><url><loc>https://www.cypro.se/2023/04/21/ghosttoken-flaw-could-let-attackers-hide-malicious-apps-in-google-cloud-platform/</loc></url><url><loc>https://www.cypro.se/2023/04/21/14-kubernetes-and-cloud-security-challenges-and-how-to-solve-them/</loc></url><url><loc>https://www.cypro.se/2023/04/21/kubernetes-rbac-exploited-in-large-scale-campaign-for-cryptocurrency-mining/</loc></url><url><loc>https://www.cypro.se/2023/04/22/lazarus-x_trader-hack-impacts-critical-infrastructure-beyond-3cx-breach/</loc></url><url><loc>https://www.cypro.se/2023/04/22/cisa-adds-3-actively-exploited-flaws-to-kev-catalog-including-critical-papercut-bug/</loc></url><url><loc>https://www.cypro.se/2023/04/24/russian-hackers-suspected-in-ongoing-exploitation-of-unpatched-papercut-servers/</loc></url><url><loc>https://www.cypro.se/2023/04/24/new-all-in-one-evilextractor-stealer-for-windows-systems-surfaces-on-the-dark-web/</loc></url><url><loc>https://www.cypro.se/2023/04/24/study-84-of-companies-use-breached-saas-applications-heres-how-to-fix-it-for-free/</loc></url><url><loc>https://www.cypro.se/2023/04/24/hackers-exploit-outdated-wordpress-plugin-to-backdoor-thousands-of-wordpress-sites/</loc></url><url><loc>https://www.cypro.se/2023/04/24/russian-hackers-tomiris-targeting-central-asia-for-intelligence-gathering/</loc></url><url><loc>https://www.cypro.se/2023/04/24/ransomware-hackers-using-aukill-tool-to-disable-edr-software-using-byovd-attack/</loc></url><url><loc>https://www.cypro.se/2023/04/25/google-authenticator-app-gets-cloud-backup-feature-for-totp-codes/</loc></url><url><loc>https://www.cypro.se/2023/04/25/lazarus-subgroup-targeting-apple-devices-with-new-rustbucket-macos-malware/</loc></url><url><loc>https://www.cypro.se/2023/04/25/google-cloud-introduces-security-ai-workbench-for-faster-threat-detection-and-analysis/</loc></url><url><loc>https://www.cypro.se/2023/04/25/modernizing-vulnerability-management-the-move-toward-exposure-management/</loc></url><url><loc>https://www.cypro.se/2023/04/25/new-slp-vulnerability-could-let-attackers-launch-2200x-powerful-ddos-attacks/</loc></url><url><loc>https://www.cypro.se/2023/04/25/iranian-hackers-launch-sophisticated-attacks-targeting-israel-with-powerless-backdoor/</loc></url><url><loc>https://www.cypro.se/2023/04/26/vmware-releases-critical-patches-for-workstation-and-fusion-software/</loc></url><url><loc>https://www.cypro.se/2023/04/26/apache-superset-vulnerability-insecure-default-configuration-exposes-servers-to-rce-attacks/</loc></url><url><loc>https://www.cypro.se/2023/04/26/browser-security-survey-87-of-saas-adopters-exposed-to-browser-borne-attacks/</loc></url><url><loc>https://www.cypro.se/2023/04/26/chinese-hackers-using-mgbot-malware-to-target-international-ngos-in-mainland-china/</loc></url><url><loc>https://www.cypro.se/2023/04/26/nists-sbir-program-could-be-for-you/</loc></url><url><loc>https://www.cypro.se/2023/04/26/charming-kittens-new-bellaciao-malware-discovered-in-multi-country-attacks/</loc></url><url><loc>https://www.cypro.se/2023/04/26/chinese-hackers-spotted-using-linux-variant-of-pingpull-in-targeted-cyberattacks/</loc></url><url><loc>https://www.cypro.se/2023/04/27/microsoft-confirms-papercut-servers-used-to-deliver-lockbit-and-cl0p-ransomware/</loc></url><url><loc>https://www.cypro.se/2023/04/27/google-ads-are-being-used-to-spread-malware/</loc></url><url><loc>https://www.cypro.se/2023/04/27/rtm-lockers-first-linux-ransomware-strain-targeting-nas-and-esxi-hosts/</loc></url><url><loc>https://www.cypro.se/2023/04/27/limerat-malware-analysis-extracting-the-config/</loc></url><url><loc>https://www.cypro.se/2023/04/27/paperbug-attack-new-politically-motivated-surveillance-campaign-in-tajikistan/</loc></url><url><loc>https://www.cypro.se/2023/04/27/google-gets-court-order-to-take-down-cryptbot-that-infected-over-670000-computers/</loc></url><url><loc>https://www.cypro.se/2023/04/28/tonto-team-uses-anti-malware-file-to-launch-attacks-on-south-korean-institutions/</loc></url><url><loc>https://www.cypro.se/2023/04/28/attention-online-shoppers-dont-be-fooled-by-their-sleek-modern-looks-its-magecart/</loc></url><url><loc>https://www.cypro.se/2023/04/28/vipersoftx-infostealer-adopts-sophisticated-techniques-to-avoid-detection/</loc></url><url><loc>https://www.cypro.se/2023/04/28/new-atomic-macos-malware-steals-keychain-passwords-and-crypto-wallets/</loc></url><url><loc>https://www.cypro.se/2023/04/28/why-your-detection-first-security-approach-isnt-working/</loc></url><url><loc>https://www.cypro.se/2023/04/28/zyxel-firewall-devices-vulnerable-to-remote-code-execution-attacks-patch-now/</loc></url><url><loc>https://www.cypro.se/2023/04/28/iotw-american-bar-association-accused-of-data-breach-affecting-1-4-million-peop/</loc></url><url><loc>https://www.cypro.se/2023/04/29/cisa-warns-of-critical-flaws-in-illuminas-dna-sequencing-instruments/</loc></url><url><loc>https://www.cypro.se/2023/04/29/chatgpt-is-back-in-italy-after-addressing-data-privacy-concerns/</loc></url><url><loc>https://www.cypro.se/2023/05/01/google-blocks-1-43-million-malicious-apps-bans-73000-bad-accounts-in-2022/</loc></url><url><loc>https://www.cypro.se/2023/05/01/apt28-targets-ukrainian-government-entities-with-fake-windows-update-emails/</loc></url><url><loc>https://www.cypro.se/2023/05/01/vietnamese-threat-actor-infects-500000-devices-using-malverposting-tactics/</loc></url><url><loc>https://www.cypro.se/2023/05/01/wanted-dead-or-alive-real-time-protection-against-lateral-movement/</loc></url><url><loc>https://www.cypro.se/2023/05/01/new-decoy-dog-malware-toolkit-uncovered-targeting-enterprise-networks/</loc></url><url><loc>https://www.cypro.se/2023/05/02/alert-active-exploitation-of-tp-link-apache-and-oracle-vulnerabilities-detected/</loc></url><url><loc>https://www.cypro.se/2023/05/02/lobshot-a-stealthy-financial-trojan-and-info-stealer-delivered-through-google-ads/</loc></url><url><loc>https://www.cypro.se/2023/05/02/north-koreas-scarcruft-deploys-rokrat-malware-via-lnk-file-infection-chains/</loc></url><url><loc>https://www.cypro.se/2023/05/02/bouldspy-android-spyware-iranian-governments-alleged-tool-for-spying-on-minority-groups/</loc></url><url><loc>https://www.cypro.se/2023/05/02/why-telecoms-struggle-with-saas-security/</loc></url><url><loc>https://www.cypro.se/2023/05/02/researchers-uncover-new-bgp-flaws-in-popular-internet-routing-protocol-software/</loc></url><url><loc>https://www.cypro.se/2023/08/23/fissea-summer-forum-august-23-2023/</loc></url><url><loc>https://www.cypro.se/2023/05/03/cisa-issues-advisory-on-critical-rce-affecting-me-rtu-remote-terminal-units/</loc></url><url><loc>https://www.cypro.se/2023/05/03/hackers-exploiting-5-year-old-unpatched-vulnerability-in-tbk-dvr-devices/</loc></url><url><loc>https://www.cypro.se/2023/05/03/download-the-ebook-what-does-it-take-to-be-a-full-fledged-virtual-ciso/</loc></url><url><loc>https://www.cypro.se/2023/05/03/operation-spector-53-4-million-seized-288-vendors-arrested-in-dark-web-drug-bust/</loc></url><url><loc>https://www.cypro.se/2023/05/03/apple-and-google-join-forces-to-stop-unauthorized-tracking-alert-system/</loc></url><url><loc>https://www.cypro.se/2023/05/03/change-resistance-and-cybersecurity/</loc></url><url><loc>https://www.cypro.se/2023/05/03/cyberflix-an-interactive-video-and-related-downloads-to-help-secondary-school-kids-stay-safe-online/</loc></url><url><loc>https://www.cypro.se/2023/05/03/openai-confirms-chatgpt-data-breach/</loc></url><url><loc>https://www.cypro.se/2023/05/03/google-introduces-passwordless-secure-sign-in-with-passkeys-for-google-accounts/</loc></url><url><loc>https://www.cypro.se/2023/05/03/chinese-hacker-group-earth-longzhi-resurfaces-with-advanced-malware-tactics/</loc></url><url><loc>https://www.cypro.se/2023/05/04/meta-takes-down-malware-campaign-that-used-chatgpt-as-a-lure-to-steal-accounts/</loc></url><url><loc>https://www.cypro.se/2023/05/04/why-the-things-you-dont-know-about-the-dark-web-may-be-your-biggest-cybersecurity-threat/</loc></url><url><loc>https://www.cypro.se/2023/05/04/meta-uncovers-massive-social-media-cyber-espionage-operations-across-south-asia/</loc></url><url><loc>https://www.cypro.se/2023/05/04/researchers-discover-3-vulnerabilities-in-microsoft-azure-api-management-service/</loc></url><url><loc>https://www.cypro.se/2023/05/04/researchers-uncover-new-exploit-for-papercut-vulnerability-that-can-bypass-detection/</loc></url><url><loc>https://www.cypro.se/2023/06/21/nice-webinar-community-based-partnerships-for-cybersecurity/</loc></url><url><loc>https://www.cypro.se/2023/05/05/cisco-warns-of-vulnerability-in-popular-phone-adapter-urges-migration-to-newer-model/</loc></url><url><loc>https://www.cypro.se/2023/05/05/fleckpe-android-malware-sneaks-onto-google-play-store-with-over-620000-downloads/</loc></url><url><loc>https://www.cypro.se/2023/05/05/packagist-repository-hacked-over-a-dozen-php-packages-with-500-million-compromised/</loc></url><url><loc>https://www.cypro.se/2023/05/05/n-korean-kimsuky-hackers-using-new-recon-tool-reconshark-in-latest-cyberattacks/</loc></url><url><loc>https://www.cypro.se/2023/05/05/lack-of-visibility-the-challenge-of-protecting-websites-from-third-party-scripts/</loc></url><url><loc>https://www.cypro.se/2023/05/05/hackers-targeting-italian-corporate-banking-clients-with-new-web-inject-toolkit-driban/</loc></url><url><loc>https://www.cypro.se/2023/05/05/iotw-former-uber-cso-charged-with-concealing-data-breach/</loc></url><url><loc>https://www.cypro.se/2023/05/05/new-android-malware-fluhorse-targeting-east-asian-markets-with-deceptive-tactics/</loc></url><url><loc>https://www.cypro.se/2023/05/06/new-vulnerability-in-popular-wordpress-plugin-exposes-over-2-million-sites-to-cyberattacks/</loc></url><url><loc>https://www.cypro.se/2023/05/06/dragon-breath-apt-group-using-double-clean-app-technique-to-target-gambling-industry/</loc></url><url><loc>https://www.cypro.se/2023/05/08/cert-ua-warns-of-smokeloader-and-roarbat-malware-attacks-against-ukraine/</loc></url><url><loc>https://www.cypro.se/2023/05/08/how-to-set-up-a-threat-hunting-and-threat-intelligence-program/</loc></url><url><loc>https://www.cypro.se/2023/05/08/join-our-webinar-learn-how-to-defeat-ransomware-with-identity-focused-protection/</loc></url><url><loc>https://www.cypro.se/2023/05/08/sidecopy-using-action-rat-and-allakore-rat-to-infiltrate-indian-organizations/</loc></url><url><loc>https://www.cypro.se/2023/05/08/western-digital-confirms-customer-data-stolen-by-hackers-in-march-breach/</loc></url><url><loc>https://www.cypro.se/2023/05/08/msi-data-breach-private-code-signing-keys-leaked-on-the-dark-web/</loc></url><url><loc>https://www.cypro.se/2023/05/09/new-ransomware-strain-cactus-exploits-vpn-flaws-to-infiltrate-networks/</loc></url><url><loc>https://www.cypro.se/2023/05/09/microsoft-warns-of-state-sponsored-attacks-exploiting-critical-papercut-vulnerability/</loc></url><url><loc>https://www.cypro.se/2023/05/09/researchers-uncover-sidewinders-latest-server-based-polymorphism-technique/</loc></url><url><loc>https://www.cypro.se/2023/05/09/operation-chattygoblin-hackers-targeting-gambling-firms-via-chat-apps/</loc></url><url><loc>https://www.cypro.se/2023/05/09/from-devops-to-devsecops-strengthen-product-security-with-collaborative-tools/</loc></url><url><loc>https://www.cypro.se/2023/05/09/u-s-authorities-seize-13-domains-offering-criminal-ddos-for-hire-services/</loc></url><url><loc>https://www.cypro.se/2023/05/10/microsofts-may-patch-tuesday-fixes-38-flaws-including-active-zero-day-bug/</loc></url><url><loc>https://www.cypro.se/2023/05/10/u-s-government-neutralizes-russias-most-sophisticated-snake-cyber-espionage-tool/</loc></url><url><loc>https://www.cypro.se/2023/05/10/mastermind-behind-twitter-2020-hack-pleads-guilty-and-faces-up-to-70-years-in-prison/</loc></url><url><loc>https://www.cypro.se/2023/05/10/why-honeytokens-are-the-future-of-intrusion-detection/</loc></url><url><loc>https://www.cypro.se/2023/05/10/sophisticated-downex-malware-campaign-targeting-central-asian-governments/</loc></url><url><loc>https://www.cypro.se/2023/05/10/nist-revises-sp-800-171-guidelines-for-protecting-sensitive-information/</loc></url><url><loc>https://www.cypro.se/2023/05/10/experts-detail-new-zero-click-windows-vulnerability-for-ntlm-credential-theft/</loc></url><url><loc>https://www.cypro.se/2023/05/10/google-announces-new-privacy-safety-and-security-features-across-its-services/</loc></url><url><loc>https://www.cypro.se/2023/05/11/why-more-transparency-around-cyber-attacks-is-a-good-thing-for-everyone/</loc></url><url><loc>https://www.cypro.se/2023/05/11/twitter-finally-rolling-out-encrypted-direct-messages-starting-with-verified-users/</loc></url><url><loc>https://www.cypro.se/2023/05/11/github-extends-push-protection-to-prevent-accidental-leaks-of-keys-and-other-secrets/</loc></url><url><loc>https://www.cypro.se/2023/05/11/andoryu-botnet-exploits-critical-ruckus-wireless-flaw-for-widespread-attack/</loc></url><url><loc>https://www.cypro.se/2023/05/11/babuk-source-code-sparks-9-different-ransomware-strains-targeting-vmware-esxi-systems/</loc></url><url><loc>https://www.cypro.se/2023/05/11/how-attack-surface-management-supports-continuous-threat-exposure-management/</loc></url><url><loc>https://www.cypro.se/2023/05/11/iotw-sysco-confirms-data-breach-impacting-company-supplier-and-employee-data/</loc></url><url><loc>https://www.cypro.se/2023/05/11/new-apt-group-red-stinger-targets-military-and-critical-infrastructure-in-eastern-europe/</loc></url><url><loc>https://www.cypro.se/2023/05/11/spanish-police-takes-down-massive-cybercrime-ring-40-arrested/</loc></url><url><loc>https://www.cypro.se/2023/05/12/severe-security-flaw-exposes-over-a-million-wordpress-sites-to-hijack/</loc></url><url><loc>https://www.cypro.se/2023/05/12/bl00dy-ransomware-gang-strikes-education-sector-with-critical-papercut-vulnerability/</loc></url><url><loc>https://www.cypro.se/2023/05/12/solving-your-teams-secure-collaboration-challenges/</loc></url><url><loc>https://www.cypro.se/2023/05/12/new-variant-of-linux-backdoor-bpfdoor-uncovered-after-years-of-staying-under-the-radar/</loc></url><url><loc>https://www.cypro.se/2023/05/12/netgear-routers-flaws-expose-users-to-malware-remote-attacks-and-surveillance/</loc></url><url><loc>https://www.cypro.se/2023/05/12/xworm-malware-exploits-follina-vulnerability-in-new-wave-of-attacks/</loc></url><url><loc>https://www.cypro.se/2023/05/13/new-phishing-as-a-service-platform-lets-cybercriminals-generate-convincing-phishing-pages/</loc></url><url><loc>https://www.cypro.se/2023/05/15/former-ubiquiti-employee-gets-6-years-in-jail-for-2-million-crypto-extortion-case/</loc></url><url><loc>https://www.cypro.se/2023/05/15/clr-sqlshell-malware-targets-ms-sql-servers-for-crypto-mining-and-ransomware/</loc></url><url><loc>https://www.cypro.se/2023/05/15/i100-industry-team-and-ncsc-collaborate-on-refreshed-guidance-for-boards/</loc></url><url><loc>https://www.cypro.se/2023/05/15/researchers-uncover-powerful-backdoor-and-custom-implant-in-year-long-cyber-campaign/</loc></url><url><loc>https://www.cypro.se/2023/05/15/new-michaelkors-ransomware-as-a-service-targeting-linux-and-vmware-esxi-systems/</loc></url><url><loc>https://www.cypro.se/2023/05/15/new-ransomware-gang-ra-group-hits-u-s-and-south-korean-organizations/</loc></url><url><loc>https://www.cypro.se/2023/05/15/why-high-tech-companies-struggle-with-saas-security/</loc></url><url><loc>https://www.cypro.se/2023/05/15/industrial-cellular-routers-at-risk-11-new-vulnerabilities-expose-ot-networks/</loc></url><url><loc>https://www.cypro.se/2023/05/16/hackers-using-golang-variant-of-cobalt-strike-to-target-apple-macos-systems/</loc></url><url><loc>https://www.cypro.se/2023/05/16/building-cyber-skills-and-roles-from-cybok-foundations/</loc></url><url><loc>https://www.cypro.se/2023/05/16/cyolo-product-overview-secure-remote-access-to-all-environments/</loc></url><url><loc>https://www.cypro.se/2023/05/16/copperstealer-malware-crew-resurfaces-with-new-rootkit-and-phishing-kit-modules/</loc></url><url><loc>https://www.cypro.se/2023/05/16/inside-qilin-ransomware-affiliates-take-home-85-of-ransom-payouts/</loc></url><url><loc>https://www.cypro.se/2023/05/16/chinas-mustang-panda-hackers-exploit-tp-link-routers-for-persistent-attacks/</loc></url><url><loc>https://www.cypro.se/2023/05/17/u-s-offers-10-million-bounty-for-capture-of-notorious-russian-ransomware-operator/</loc></url><url><loc>https://www.cypro.se/2023/05/17/state-sponsored-sidewinder-hacker-groups-covert-attack-infrastructure-uncovered/</loc></url><url><loc>https://www.cypro.se/2023/05/17/serious-unpatched-vulnerability-uncovered-in-popular-belkin-wemo-smart-plugs/</loc></url><url><loc>https://www.cypro.se/2023/05/17/social-media-be-aware-of-what-you-share/</loc></url><url><loc>https://www.cypro.se/2023/05/17/identifying-a-patch-management-solution-overview-of-key-criteria/</loc></url><url><loc>https://www.cypro.se/2023/05/17/threat-group-unc3944-abusing-azure-serial-console-for-total-vm-takeover/</loc></url><url><loc>https://www.cypro.se/2023/05/17/oilalpha-emerging-houthi-linked-cyber-threat-targets-arabian-android-users/</loc></url><url><loc>https://www.cypro.se/2023/05/18/critical-flaws-in-cisco-small-business-switches-could-allow-remote-attacks/</loc></url><url><loc>https://www.cypro.se/2023/05/18/darknet-carding-kingpin-pleads-guilty-sold-financial-info-of-tens-of-thousands/</loc></url><url><loc>https://www.cypro.se/2023/05/18/apple-thwarts-2-billion-in-app-store-fraud-rejects-1-7-million-app-submissions/</loc></url><url><loc>https://www.cypro.se/2023/05/18/accessibility-as-a-cyber-security-priority/</loc></url><url><loc>https://www.cypro.se/2023/05/18/escalating-china-taiwan-tensions-fuel-alarming-surge-in-cyber-attacks/</loc></url><url><loc>https://www.cypro.se/2023/05/18/8220-gang-exploiting-oracle-weblogic-flaw-to-hijack-servers-and-mine-cryptocurrency/</loc></url><url><loc>https://www.cypro.se/2023/05/18/how-to-reduce-exposure-on-the-manufacturing-attack-surface/</loc></url><url><loc>https://www.cypro.se/2023/05/18/join-this-webinar-zero-trust-deception-learn-how-to-outsmart-attackers/</loc></url><url><loc>https://www.cypro.se/2023/05/18/this-cybercrime-syndicate-pre-infected-over-8-9-million-android-phones-worldwide/</loc></url><url><loc>https://www.cypro.se/2023/05/19/webkit-under-attack-apple-issues-emergency-patches-for-3-new-zero-day-vulnerabilities/</loc></url><url><loc>https://www.cypro.se/2023/05/19/searching-for-ai-tools-watch-out-for-rogue-sites-distributing-redline-malware/</loc></url><url><loc>https://www.cypro.se/2023/05/19/iotw-location-data-of-2-million-customers-exposed-in-toyota-data-breach/</loc></url><url><loc>https://www.cypro.se/2023/05/19/dr-active-directory-vs-mr-exposed-attack-surface-wholl-win-this-fight/</loc></url><url><loc>https://www.cypro.se/2023/05/19/developer-alert-npm-packages-for-node-js-hiding-dangerous-turkorat-malware/</loc></url><url><loc>https://www.cypro.se/2023/05/19/privacy-sandbox-initiative-google-to-phase-out-third-party-cookies-starting-2024/</loc></url><url><loc>https://www.cypro.se/2023/05/20/samsung-devices-under-active-exploitation-cisa-warns-of-critical-flaw/</loc></url><url><loc>https://www.cypro.se/2023/05/20/notorious-cyber-gang-fin7-returns-cl0p-ransomware-in-new-wave-of-attacks/</loc></url><url><loc>https://www.cypro.se/2023/05/20/meet-jack-from-romania-mastermind-behind-golden-chickens-malware/</loc></url><url><loc>https://www.cypro.se/2023/05/21/pypi-repository-under-attack-user-sign-ups-and-package-uploads-temporarily-halted/</loc></url><url><loc>https://www.cypro.se/2023/05/22/us-government-seizes-13-domains-linked-to-ddos-attacks/</loc></url><url><loc>https://www.cypro.se/2023/05/22/keepass-exploit-allows-attackers-to-recover-master-passwords-from-memory/</loc></url><url><loc>https://www.cypro.se/2023/05/22/u-k-fraudster-behind-ispoof-scam-receives-13-year-jail-term-for-cyber-crimes/</loc></url><url><loc>https://www.cypro.se/2023/05/22/are-your-apis-leaking-sensitive-data/</loc></url><url><loc>https://www.cypro.se/2023/05/22/bad-magics-extended-reign-in-cyber-espionage-goes-back-over-a-decade/</loc></url><url><loc>https://www.cypro.se/2023/05/22/indonesian-cybercriminals-exploit-aws-for-profitable-crypto-mining-operations/</loc></url><url><loc>https://www.cypro.se/2023/05/22/eu-regulators-hit-meta-with-record-1-3-billion-fine-for-data-transfer-violations/</loc></url><url><loc>https://www.cypro.se/2023/05/23/meta-faces-1-3bn-fine-following-facebook-data-transfer-investigation/</loc></url><url><loc>https://www.cypro.se/2023/05/23/china-bans-u-s-chip-giant-micron-citing-serious-cybersecurity-problems/</loc></url><url><loc>https://www.cypro.se/2023/05/23/the-rising-threat-of-secrets-sprawl-and-the-need-for-action/</loc></url><url><loc>https://www.cypro.se/2023/05/23/new-wintapix-sys-malware-engages-in-multi-stage-attack-across-middle-east/</loc></url><url><loc>https://www.cypro.se/2023/05/23/north-korean-kimsuky-hackers-strike-again-with-advanced-reconnaissance-malware/</loc></url><url><loc>https://www.cypro.se/2023/05/23/goldenjackal-new-threat-group-targeting-middle-eastern-and-south-asian-governments/</loc></url><url><loc>https://www.cypro.se/2023/05/24/new-interactive-video-and-related-downloads-to-help-secondary-school-kids-stay-safe-online/</loc></url><url><loc>https://www.cypro.se/2023/05/24/n-korean-lazarus-group-targets-microsoft-iis-servers-to-deploy-espionage-malware/</loc></url><url><loc>https://www.cypro.se/2023/05/24/cyber-attacks-strike-ukraines-state-bodies-in-espionage-operation/</loc></url><url><loc>https://www.cypro.se/2023/05/24/what-to-look-for-when-selecting-a-static-application-security-testing-sast-solution/</loc></url><url><loc>https://www.cypro.se/2023/05/24/data-stealing-malware-discovered-in-popular-android-screen-recorder-app/</loc></url><url><loc>https://www.cypro.se/2023/05/24/legion-malware-upgraded-to-target-ssh-servers-and-aws-credentials/</loc></url><url><loc>https://www.cypro.se/2023/05/24/hackers-attempt-to-sell-personal-data-of-1-5-million-women/</loc></url><url><loc>https://www.cypro.se/2023/06/02/workshop-on-omb-m-22-18-minimum-requirements/</loc></url><url><loc>https://www.cypro.se/2023/05/24/iranian-tortoiseshell-hackers-targeting-israeli-logistics-industry/</loc></url><url><loc>https://www.cypro.se/2023/05/25/iranian-agrius-hackers-targeting-israeli-organizations-with-moneybird-ransomware/</loc></url><url><loc>https://www.cypro.se/2023/05/25/guac-0-1-beta-googles-breakthrough-framework-for-secure-software-supply-chains/</loc></url><url><loc>https://www.cypro.se/2023/05/25/new-cyber-security-training-packages-launched-to-manage-supply-chain-risk/</loc></url><url><loc>https://www.cypro.se/2023/05/25/iotw-luxottica-confirms-2021-data-leak-of-70-million-customers-information/</loc></url><url><loc>https://www.cypro.se/2023/05/25/chinas-stealthy-hackers-infiltrate-u-s-and-guam-critical-infrastructure-undetected/</loc></url><url><loc>https://www.cypro.se/2023/05/25/alert-brazilian-hackers-targeting-users-of-over-30-portuguese-banks/</loc></url><url><loc>https://www.cypro.se/2023/05/25/webinar-with-guest-forrester-browser-security-new-approaches/</loc></url><url><loc>https://www.cypro.se/2023/05/25/buhti-ransomware-gang-switches-tactics-utilizes-leaked-lockbit-and-babuk-code/</loc></url><url><loc>https://www.cypro.se/2023/05/25/cynet-protects-hospital-from-lethal-infection/</loc></url><url><loc>https://www.cypro.se/2023/05/25/new-powerexchange-backdoor-used-in-iranian-cyber-attack-on-uae-government/</loc></url><url><loc>https://www.cypro.se/2023/05/25/dark-frost-botnet-launches-devastating-ddos-attacks-on-gaming-industry/</loc></url><url><loc>https://www.cypro.se/2023/05/25/zyxel-issues-critical-security-patches-for-firewall-and-vpn-products/</loc></url><url><loc>https://www.cypro.se/2023/05/26/barracuda-warns-of-zero-day-exploited-to-breach-email-security-gateway-appliances/</loc></url><url><loc>https://www.cypro.se/2023/05/26/new-cosmicenergy-malware-exploits-ics-protocol-to-sabotage-power-grids/</loc></url><url><loc>https://www.cypro.se/2023/05/26/5-must-know-facts-about-5g-network-security-and-its-cloud-benefits/</loc></url><url><loc>https://www.cypro.se/2023/05/26/elon-musks-social-security-number-allegedly-leaked-in-tesla-data-breach/</loc></url><url><loc>https://www.cypro.se/2023/05/26/predator-android-spyware-researchers-sound-the-alarm-on-alarming-capabilities/</loc></url><url><loc>https://www.cypro.se/2023/05/26/severe-flaw-in-google-clouds-cloud-sql-service-exposed-confidential-data/</loc></url><url><loc>https://www.cypro.se/2023/05/01/nist-conducting-automated-vehicle-workshop-september-5-8-2023/</loc></url><url><loc>https://www.cypro.se/2023/05/27/new-stealthy-bandit-stealer-targeting-web-browsers-and-cryptocurrency-wallets/</loc></url><url><loc>https://www.cypro.se/2023/05/27/critical-oauth-vulnerability-in-expo-framework-allows-account-hijacking/</loc></url><url><loc>https://www.cypro.se/2023/05/29/pypi-implements-mandatory-two-factor-authentication-for-project-owners/</loc></url><url><loc>https://www.cypro.se/2023/05/29/dont-click-that-zip-file-phishers-weaponizing-zip-domains-to-trick-victims/</loc></url><url><loc>https://www.cypro.se/2023/05/29/new-gobrat-remote-access-trojan-targeting-linux-routers-in-japan/</loc></url><url><loc>https://www.cypro.se/2023/05/29/acecryptor-cybercriminals-powerful-weapon-detected-in-240k-attacks/</loc></url><url><loc>https://www.cypro.se/2023/05/29/3-challenges-in-building-a-continuous-threat-exposure-management-ctem-program-and-how-to-beat-them/</loc></url><url><loc>https://www.cypro.se/2023/05/29/new-bruteprint-attack-lets-attackers-unlock-smartphones-with-fingerprint-brute-force/</loc></url><url><loc>https://www.cypro.se/2023/05/30/sneaky-dogerat-trojan-poses-as-popular-apps-targets-indian-android-users/</loc></url><url><loc>https://www.cypro.se/2023/05/30/hackers-win-105000-for-reporting-critical-security-flaws-in-sonos-one-speakers/</loc></url><url><loc>https://www.cypro.se/2023/05/30/captcha-breaking-services-with-human-solvers-helping-cybercriminals-defeat-security/</loc></url><url><loc>https://www.cypro.se/2023/05/30/implementing-risk-based-vulnerability-discovery-and-remediation/</loc></url><url><loc>https://www.cypro.se/2023/05/31/alert-hackers-exploit-barracuda-email-security-gateway-0-day-flaw-for-7-months/</loc></url><url><loc>https://www.cypro.se/2023/05/31/data-of-more-than-470000-hacking-site-members-leaked/</loc></url><url><loc>https://www.cypro.se/2023/05/31/romcom-rat-using-deceptive-web-of-rogue-software-sites-for-covert-attacks/</loc></url><url><loc>https://www.cypro.se/2023/05/31/dark-pink-apt-group-leverages-telepowerbot-and-kamikakabot-in-sophisticated-attacks/</loc></url><url><loc>https://www.cypro.se/2023/05/31/microsoft-details-critical-apple-macos-vulnerability-allowing-sip-protection-bypass/</loc></url><url><loc>https://www.cypro.se/2023/05/31/6-steps-to-effective-threat-hunting-safeguard-critical-assets-and-fight-cybercrime/</loc></url><url><loc>https://www.cypro.se/2023/05/31/critical-firmware-backdoor-in-gigabyte-systems-exposes-7-million-devices/</loc></url><url><loc>https://www.cypro.se/2023/05/31/beware-of-ghost-sites-silent-threat-lurking-in-your-salesforce-communities/</loc></url><url><loc>https://www.cypro.se/2023/05/31/cybercriminals-targeting-apache-nifi-instances-for-cryptocurrency-mining/</loc></url><url><loc>https://www.cypro.se/2023/06/01/commonspirit-health-reports-that-ransomware-attack-cost-160-million/</loc></url><url><loc>https://www.cypro.se/2023/06/01/active-mirai-botnet-variant-exploiting-zyxel-devices-for-ddos-attacks/</loc></url><url><loc>https://www.cypro.se/2023/06/01/urgent-wordpress-update-fixes-critical-flaw-in-jetpack-plugin-on-million-of-sites/</loc></url><url><loc>https://www.cypro.se/2023/06/01/n-korean-scarcruft-hackers-exploit-lnk-files-to-spread-rokrat/</loc></url><url><loc>https://www.cypro.se/2023/06/01/improved-blackcat-ransomware-strikes-with-lightning-speed-and-stealthy-tactics/</loc></url><url><loc>https://www.cypro.se/2023/06/01/malicious-pypi-packages-using-compiled-python-code-to-bypass-detection/</loc></url><url><loc>https://www.cypro.se/2023/06/01/how-wazuh-improves-it-hygiene-for-cyber-security-resilience/</loc></url><url><loc>https://www.cypro.se/2023/06/01/iotw-mcna-dental-suffers-data-breach-affecting-8-9-million-patients/</loc></url><url><loc>https://www.cypro.se/2023/06/01/new-zero-click-hack-targets-ios-users-with-stealthy-root-privilege-malware/</loc></url><url><loc>https://www.cypro.se/2023/06/01/unmasking-xe-group-experts-reveal-identity-of-suspected-cybercrime-kingpin/</loc></url><url><loc>https://www.cypro.se/2023/06/01/evasive-qbot-malware-leverages-short-lived-residential-ips-for-dynamic-attacks/</loc></url><url><loc>https://www.cypro.se/2023/06/02/moveit-transfer-under-attack-zero-day-vulnerability-actively-being-exploited/</loc></url><url><loc>https://www.cypro.se/2023/06/02/north-koreas-kimsuky-group-mimics-key-figures-in-targeted-cyber-attacks/</loc></url><url><loc>https://www.cypro.se/2023/06/02/camaro-dragon-strikes-with-new-tinynote-backdoor-for-intelligence-gathering/</loc></url><url><loc>https://www.cypro.se/2023/06/02/the-importance-of-managing-your-data-security-posture/</loc></url><url><loc>https://www.cypro.se/2023/06/02/new-botnet-malware-horabot-targets-spanish-speaking-users-in-latin-america/</loc></url><url><loc>https://www.cypro.se/2023/05/31/nist-2022-cybersecurity-privacy-annual-report/</loc></url><url><loc>https://www.cypro.se/2023/06/03/new-linux-ransomware-strain-blacksuit-shows-striking-similarities-to-royal/</loc></url><url><loc>https://www.cypro.se/2023/06/03/cloud-security-tops-concerns-for-cybersecurity-leaders-ec-councils-certified-ciso-hall-of-fame-report-2023/</loc></url><url><loc>https://www.cypro.se/2023/06/03/ftc-slams-amazon-with-30-8m-fine-for-privacy-violations-involving-alexa-and-ring/</loc></url><url><loc>https://www.cypro.se/2023/06/05/brazilian-cybercriminals-using-lolbas-and-cmd-scripts-to-drain-bank-accounts/</loc></url><url><loc>https://www.cypro.se/2023/06/05/alarming-surge-in-truebot-activity-revealed-with-new-delivery-vectors/</loc></url><url><loc>https://www.cypro.se/2023/06/05/magento-woocommerce-wordpress-and-shopify-exploited-in-web-skimmer-attack/</loc></url><url><loc>https://www.cypro.se/2023/06/05/the-annual-report-2024-plans-and-priorities-for-saas-security/</loc></url><url><loc>https://www.cypro.se/2023/06/05/microsoft-lace-tempest-hackers-behind-active-exploitation-of-moveit-transfer-app/</loc></url><url><loc>https://www.cypro.se/2023/06/05/romcom-ransomware-is-being-spread-via-poisoned-google-ads/</loc></url><url><loc>https://www.cypro.se/2023/06/06/zyxel-firewalls-under-attack-urgent-patching-required/</loc></url><url><loc>https://www.cypro.se/2023/06/06/chinese-postalfurious-gang-strikes-uae-users-with-sneaky-sms-phishing-scheme/</loc></url><url><loc>https://www.cypro.se/2023/06/06/cyclops-ransomware-gang-offers-go-based-info-stealer-to-cybercriminals/</loc></url><url><loc>https://www.cypro.se/2023/06/06/zero-day-alert-google-issues-patch-for-new-chrome-vulnerability-update-now/</loc></url><url><loc>https://www.cypro.se/2023/06/06/bbc-boots-and-british-airways-affected-by-malware-gang-attack/</loc></url><url><loc>https://www.cypro.se/2023/06/06/5-reasons-why-it-security-tools-dont-work-for-ot/</loc></url><url><loc>https://www.cypro.se/2023/06/06/over-60k-adware-apps-posing-as-cracked-versions-of-popular-apps-target-android-devices/</loc></url><url><loc>https://www.cypro.se/2023/06/06/new-malware-campaign-leveraging-satacom-downloader-to-steal-cryptocurrency/</loc></url><url><loc>https://www.cypro.se/2023/06/07/new-powerdrop-malware-targeting-u-s-aerospace-industry/</loc></url><url><loc>https://www.cypro.se/2023/06/07/new-cloud-security-guidance-its-all-about-the-config/</loc></url><url><loc>https://www.cypro.se/2023/06/07/malware-found-in-more-than-190-android-apps/</loc></url><url><loc>https://www.cypro.se/2023/06/07/winning-the-mind-game-the-role-of-the-ransomware-negotiator/</loc></url><url><loc>https://www.cypro.se/2023/06/07/microsoft-to-pay-20-million-penalty-for-illegally-collecting-kids-data-on-xbox/</loc></url><url><loc>https://www.cypro.se/2023/06/08/barracuda-urges-immediate-replacement-of-hacked-esg-appliances/</loc></url><url><loc>https://www.cypro.se/2023/06/08/urgent-security-updates-cisco-and-vmware-address-critical-vulnerabilities/</loc></url><url><loc>https://www.cypro.se/2023/06/08/kimsuky-targets-think-tanks-and-news-media-with-social-engineering-attacks/</loc></url><url><loc>https://www.cypro.se/2023/06/08/iotw-clop-ransomware-gang-threatens-bbc-boots-and-ba/</loc></url><url><loc>https://www.cypro.se/2023/06/08/experts-unveil-poc-exploit-for-recent-windows-vulnerability-under-active-exploitation/</loc></url><url><loc>https://www.cypro.se/2023/06/08/clop-ransomware-gang-likely-exploiting-moveit-transfer-vulnerability-since-2021/</loc></url><url><loc>https://www.cypro.se/2023/06/08/how-to-improve-your-api-security-posture/</loc></url><url><loc>https://www.cypro.se/2023/06/06/ramping-up-community-based-cybersecurity-education-and-workforce-development/</loc></url><url><loc>https://www.cypro.se/2023/06/07/the-social-engineering-of-survivor/</loc></url><url><loc>https://www.cypro.se/2023/06/09/stealth-soldier-a-new-custom-backdoor-targets-north-africa-with-espionage-attacks/</loc></url><url><loc>https://www.cypro.se/2023/06/09/key-role-targeted-cyber-attacks-are-on-the-rise/</loc></url><url><loc>https://www.cypro.se/2023/06/09/5-reasons-why-access-management-is-the-key-to-securing-the-modern-workplace/</loc></url><url><loc>https://www.cypro.se/2023/06/09/asylum-ambuscade-a-cybercrime-group-with-espionage-ambitions/</loc></url><url><loc>https://www.cypro.se/2023/06/09/microsoft-uncovers-banking-aitm-phishing-and-bec-attacks-targeting-financial-giants/</loc></url><url><loc>https://www.cypro.se/2023/06/10/new-critical-moveit-transfer-sql-injection-vulnerabilities-discovered-patch-now/</loc></url><url><loc>https://www.cypro.se/2023/06/10/new-spectralviper-backdoor-targeting-vietnamese-public-companies/</loc></url><url><loc>https://www.cypro.se/2023/06/12/apples-safari-private-browsing-now-automatically-removes-tracking-parameters-in-urls/</loc></url><url><loc>https://www.cypro.se/2023/06/12/critical-rce-flaw-discovered-in-fortinet-fortigate-firewalls-patch-now/</loc></url><url><loc>https://www.cypro.se/2023/06/12/password-reset-hack-exposed-in-hondas-e-commerce-platform-dealers-data-at-risk/</loc></url><url><loc>https://www.cypro.se/2023/06/12/beware-1000-fake-cryptocurrency-sites-trap-users-in-bogus-rewards-scheme/</loc></url><url><loc>https://www.cypro.se/2023/06/12/why-now-the-rise-of-attack-surface-management/</loc></url><url><loc>https://www.cypro.se/2023/06/12/cybercriminals-using-powerful-batcloak-engine-to-make-malware-fully-undetectable/</loc></url><url><loc>https://www.cypro.se/2023/06/12/health-service-ireland-latest-victim-of-moveit-cyber-attack/</loc></url><url><loc>https://www.cypro.se/2023/06/12/researchers-uncover-publisher-spoofing-bug-in-microsoft-visual-studio-installer/</loc></url><url><loc>https://www.cypro.se/2021/04/29/cyber-security-for-high-profile-conferences/</loc></url><url><loc>https://www.cypro.se/2021/04/29/is-blockchain-the-right-tool-for-you/</loc></url><url><loc>https://www.cypro.se/2023/06/13/critical-fortios-and-fortiproxy-vulnerability-likely-exploited-patch-now/</loc></url><url><loc>https://www.cypro.se/2023/06/13/expanding-the-scope-of-cyber-incident-response-cir/</loc></url><url><loc>https://www.cypro.se/2023/06/13/webinar-mastering-api-security-understanding-your-true-attack-surface/</loc></url><url><loc>https://www.cypro.se/2023/06/13/two-russian-nationals-charged-for-masterminding-mt-gox-crypto-exchange-hack/</loc></url><url><loc>https://www.cypro.se/2023/06/13/ddos-attacks-launched-against-swiss-websites-ahead-of-zelensky-address/</loc></url><url><loc>https://www.cypro.se/2023/06/13/adversary-in-the-middle-attack-campaign-hits-dozens-of-global-organizations/</loc></url><url><loc>https://www.cypro.se/2023/06/13/over-half-of-security-leaders-lack-confidence-in-protecting-app-secrets-study-reveals/</loc></url><url><loc>https://www.cypro.se/2023/06/13/beware-new-doublefinger-loader-targets-cryptocurrency-wallets-with-stealer/</loc></url><url><loc>https://www.cypro.se/2023/06/14/british-watchdog-ofcom-latest-victim-of-moveit-attack/</loc></url><url><loc>https://www.cypro.se/2023/06/14/microsoft-releases-updates-to-patch-critical-flaws-in-windows-and-other-software/</loc></url><url><loc>https://www.cypro.se/2023/06/14/critical-security-vulnerability-discovered-in-woocommerce-stripe-gateway-plugin/</loc></url><url><loc>https://www.cypro.se/2023/06/14/fake-researcher-profiles-spread-malware-through-github-repositories-as-poc-exploits/</loc></url><url><loc>https://www.cypro.se/2023/06/14/new-golang-based-skuld-malware-stealing-discord-and-browser-data-from-windows-pcs/</loc></url><url><loc>https://www.cypro.se/2023/06/14/where-from-where-to-the-evolution-of-network-security/</loc></url><url><loc>https://www.cypro.se/2023/06/14/severe-vulnerabilities-reported-in-microsoft-azure-bastion-and-container-registry/</loc></url><url><loc>https://www.cypro.se/2023/06/14/chinese-hackers-exploit-vmware-zero-day-to-backdoor-windows-and-linux-systems/</loc></url><url><loc>https://www.cypro.se/2023/06/15/lockbit-ransomware-extorts-91-million-from-u-s-companies/</loc></url><url><loc>https://www.cypro.se/2023/06/15/microsoft-warns-of-new-russian-state-sponsored-hacker-group-with-destructive-intent/</loc></url><url><loc>https://www.cypro.se/2023/06/15/new-research-6-of-employees-paste-sensitive-data-into-genai-tools-as-chatgpt/</loc></url><url><loc>https://www.cypro.se/2023/06/15/new-supply-chain-attack-exploits-abandoned-s3-buckets-to-distribute-malicious-binaries/</loc></url><url><loc>https://www.cypro.se/2023/06/15/new-report-reveals-shuckworms-long-running-intrusions-on-ukrainian-organizations/</loc></url><url><loc>https://www.cypro.se/2023/06/15/warning-gravityrat-android-trojan-steals-whatsapp-backups-and-deletes-files/</loc></url><url><loc>https://www.cypro.se/2023/06/15/vidar-malware-using-new-tactics-to-evade-detection-and-anonymize-activities/</loc></url><url><loc>https://www.cypro.se/2023/06/15/chinese-unc4841-group-exploits-zero-day-flaw-in-barracuda-email-security-gateway/</loc></url><url><loc>https://www.cypro.se/2023/06/15/ransomware-hackers-and-scammers-utilizing-cloud-mining-to-launder-cryptocurrency/</loc></url><url><loc>https://www.cypro.se/2023/06/16/third-flaw-uncovered-in-moveit-transfer-app-amidst-cl0p-ransomware-mass-attack/</loc></url><url><loc>https://www.cypro.se/2023/06/16/20-year-old-russian-lockbit-ransomware-affiliate-arrested-in-arizona/</loc></url><url><loc>https://www.cypro.se/2023/06/16/activities-in-the-cybercrime-underground-require-a-new-approach-to-cybersecurity/</loc></url><url><loc>https://www.cypro.se/2023/06/16/leveraging-ncscs-national-insight-to-strengthen-the-fight-against-mobile-threats-2/</loc></url><url><loc>https://www.cypro.se/2023/06/16/chameldoh-new-linux-backdoor-utilizing-dns-over-https-tunneling-for-covert-cnc/</loc></url><url><loc>https://www.cypro.se/2023/06/17/from-cryptojacking-to-ddos-attacks-diicot-expands-tactics-with-cayosin-botnet/</loc></url><url><loc>https://www.cypro.se/2023/06/19/early-warning-is-joining-myncsc/</loc></url><url><loc>https://www.cypro.se/2023/06/19/state-backed-hackers-employ-advanced-methods-to-target-middle-eastern-and-african-governments/</loc></url><url><loc>https://www.cypro.se/2023/06/19/microsoft-blames-massive-ddos-attack-for-azure-outlook-and-onedrive-disruptions/</loc></url><url><loc>https://www.cypro.se/2023/06/19/blackcat-threatens-to-leak-80gb-of-reddit-data/</loc></url><url><loc>https://www.cypro.se/2023/06/19/introducing-ai-guided-remediation-for-iac-security-kics/</loc></url><url><loc>https://www.cypro.se/2023/06/19/researchers-discover-new-sophisticated-toolkit-targeting-apple-macos-systems/</loc></url><url><loc>https://www.cypro.se/2023/06/19/new-mystic-stealer-malware-targets-40-web-browsers-and-70-browser-extensions/</loc></url><url><loc>https://www.cypro.se/2023/06/20/rogue-android-apps-target-pakistani-individuals-in-sophisticated-espionage-campaign/</loc></url><url><loc>https://www.cypro.se/2023/06/20/over-100000-stolen-chatgpt-account-credentials-sold-on-dark-web-marketplaces/</loc></url><url><loc>https://www.cypro.se/2023/06/20/asus-releases-patches-to-fix-critical-security-bugs-impacting-multiple-router-models/</loc></url><url><loc>https://www.cypro.se/2023/06/20/saas-in-the-real-world-how-global-food-chains-can-secure-their-digital-dish/</loc></url><url><loc>https://www.cypro.se/2023/06/20/experts-uncover-year-long-cyber-attack-on-it-firm-utilizing-custom-malware-rdstealer/</loc></url><url><loc>https://www.cypro.se/2023/06/20/zyxel-releases-urgent-security-updates-for-critical-vulnerability-in-nas-devices/</loc></url><url><loc>https://www.cypro.se/2023/06/20/researchers-expose-new-severe-flaws-in-wago-and-schneider-electric-ot-products/</loc></url><url><loc>https://www.cypro.se/2023/06/21/protecting-how-you-administer-cloud-services/</loc></url><url><loc>https://www.cypro.se/2023/06/21/new-condi-malware-hijacking-tp-link-wi-fi-routers-for-ddos-botnet-attacks/</loc></url><url><loc>https://www.cypro.se/2023/06/21/alert-hackers-exploiting-critical-vulnerability-in-vmwares-aria-operations-networks/</loc></url><url><loc>https://www.cypro.se/2023/06/21/pwc-and-ey-impacted-by-moveit-cyber-attack/</loc></url><url><loc>https://www.cypro.se/2023/06/21/chinese-hacker-group-flea-targets-american-ministries-with-graphican-backdoor/</loc></url><url><loc>https://www.cypro.se/2023/06/21/startup-security-tactics-friction-surveys/</loc></url><url><loc>https://www.cypro.se/2023/06/21/critical-noauth-flaw-in-microsoft-azure-ad-enabled-complete-account-takeover/</loc></url><url><loc>https://www.cypro.se/2023/06/21/new-report-exposes-operation-triangulations-spyware-implant-targeting-ios-devices/</loc></url><url><loc>https://www.cypro.se/2023/06/21/scarcruft-hackers-exploit-ably-service-for-stealthy-wiretapping-attacks/</loc></url><url><loc>https://www.cypro.se/2023/06/22/threats-and-key-takeaways-for-the-legal-sector/</loc></url><url><loc>https://www.cypro.se/2023/06/22/cyber-threat-report-uk-legal-sector/</loc></url><url><loc>https://www.cypro.se/2023/06/22/zero-day-alert-apple-releases-patches-for-actively-exploited-flaws-in-ios-macos-and-safari/</loc></url><url><loc>https://www.cypro.se/2023/06/22/critical-flaw-found-in-wordpress-plugin-for-woocommerce-used-by-30000-websites/</loc></url><url><loc>https://www.cypro.se/2023/06/22/unveiling-the-unseen-identifying-data-exfiltration-with-machine-learning/</loc></url><url><loc>https://www.cypro.se/2023/06/22/generative-ai-apps-chatgpt-potential-risks-and-mitigation-strategies/</loc></url><url><loc>https://www.cypro.se/2023/06/22/alert-million-of-github-repositories-likely-vulnerable-to-repojacking-attack/</loc></url><url><loc>https://www.cypro.se/2023/06/22/camaro-dragon-hackers-strike-with-usb-driven-self-propagating-malware/</loc></url><url><loc>https://www.cypro.se/2023/06/22/multistorm-campaign-targets-india-and-u-s-with-remote-access-trojans/</loc></url><url><loc>https://www.cypro.se/2023/06/23/new-cryptocurrency-mining-campaign-targets-linux-systems-and-iot-devices/</loc></url><url><loc>https://www.cypro.se/2023/06/23/nsa-releases-guide-to-combat-powerful-blacklotus-bootkit-targeting-windows-systems/</loc></url><url><loc>https://www.cypro.se/2023/06/23/iotw-a-full-timeline-of-the-moveit-cyber-attack/</loc></url><url><loc>https://www.cypro.se/2023/06/23/powerful-javascript-dropper-pindos-distributes-bumblebee-and-icedid-malware/</loc></url><url><loc>https://www.cypro.se/2023/06/23/the-power-of-browser-fingerprinting-personalized-ux-fraud-detection-and-secure-logins/</loc></url><url><loc>https://www.cypro.se/2023/06/23/cybercrime-group-muddled-libra-targets-bpo-sector-with-advanced-social-engineering/</loc></url><url><loc>https://www.cypro.se/2023/06/24/u-s-cybersecurity-agency-adds-6-flaws-to-known-exploited-vulnerabilities-catalog/</loc></url><url><loc>https://www.cypro.se/2023/06/24/twitter-hacker-sentenced-to-5-years-in-prison-for-120000-crypto-scam/</loc></url><url><loc>https://www.cypro.se/2023/06/26/chinese-hackers-using-never-before-seen-tactics-for-critical-infrastructure-attacks/</loc></url><url><loc>https://www.cypro.se/2023/06/26/new-techniques-added-to-the-ncscs-risk-management-toolbox/</loc></url><url><loc>https://www.cypro.se/2023/06/26/blizzard-entertainment-hit-by-ddos-attack/</loc></url><url><loc>https://www.cypro.se/2023/06/26/microsoft-warns-of-widescale-credential-stealing-attacks-by-russian-hackers/</loc></url><url><loc>https://www.cypro.se/2023/06/26/japanese-cryptocurrency-exchange-falls-victim-to-jokerspy-macos-backdoor-attack/</loc></url><url><loc>https://www.cypro.se/2023/06/26/how-generative-ai-can-dupe-saas-authentication-protocols-and-effective-ways-to-prevent-other-key-ai-risks-in-saas/</loc></url><url><loc>https://www.cypro.se/2023/06/26/researchers-find-way-to-recover-cryptographic-keys-by-analyzing-led-flickers/</loc></url><url><loc>https://www.cypro.se/2023/06/27/new-fortinets-fortinac-vulnerability-exposes-networks-to-code-execution-attacks/</loc></url><url><loc>https://www.cypro.se/2023/06/27/tackling-the-human-factor-to-transform-cyber-security-behaviours/</loc></url><url><loc>https://www.cypro.se/2023/06/27/anatsa-banking-trojan-targeting-users-in-us-uk-germany-austria-and-switzerland/</loc></url><url><loc>https://www.cypro.se/2023/06/27/beyond-asset-discovery-how-attack-surface-management-prioritizes-vulnerability-remediation/</loc></url><url><loc>https://www.cypro.se/2023/06/27/encrochat-bust-leads-to-6558-criminals-arrests-and-e900-million-seizure/</loc></url><url><loc>https://www.cypro.se/2024/01/12/improving-government-one-bit-at-a-time/</loc></url><url><loc>https://www.cypro.se/2023/06/27/new-mockingjay-process-injection-technique-could-let-malware-evade-detection/</loc></url><url><loc>https://www.cypro.se/2023/06/27/new-ongoing-campaign-targets-npm-ecosystem-with-unique-execution-chain/</loc></url><url><loc>https://www.cypro.se/2023/06/28/critical-sql-injection-flaws-expose-gentoo-soko-to-remote-code-execution/</loc></url><url><loc>https://www.cypro.se/2023/06/28/5-things-cisos-need-to-know-about-securing-ot-environments/</loc></url><url><loc>https://www.cypro.se/2023/06/28/super-mario-game-used-to-spread-malware/</loc></url><url><loc>https://www.cypro.se/2023/06/28/8base-ransomware-spikes-in-activity-threatens-u-s-and-brazilian-businesses/</loc></url><url><loc>https://www.cypro.se/2023/06/28/cryptoslabs-scam-ring-targets-french-speaking-investors-rakes-in-e480-million/</loc></url><url><loc>https://www.cypro.se/2023/06/28/alert-new-electromagnetic-attacks-on-drones-could-let-attackers-take-control/</loc></url><url><loc>https://www.cypro.se/2023/06/29/newly-uncovered-thirdeye-windows-based-malware-steals-sensitive-data/</loc></url><url><loc>https://www.cypro.se/2023/06/29/critical-security-flaw-in-social-login-plugin-for-wordpress-exposes-users-accounts/</loc></url><url><loc>https://www.cypro.se/2023/06/29/the-right-way-to-enhance-cti-with-ai-hint-its-the-data/</loc></url><url><loc>https://www.cypro.se/2023/06/29/north-korean-hacker-group-andariel-strikes-with-new-earlyrat-malware/</loc></url><url><loc>https://www.cypro.se/2023/06/29/android-spy-app-letmespy-suffers-major-data-breach-exposing-users-personal-data/</loc></url><url><loc>https://www.cypro.se/2023/06/29/fluhorse-flutter-based-android-malware-targets-credit-cards-and-2fa-codes/</loc></url><url><loc>https://www.cypro.se/2023/06/29/from-muddyc3-to-phonyc2-irans-muddywater-evolves-with-a-new-cyber-weapon/</loc></url><url><loc>https://www.cypro.se/2023/06/30/mitre-unveils-top-25-most-dangerous-software-weaknesses-of-2023-are-you-at-risk/</loc></url><url><loc>https://www.cypro.se/2023/06/30/iotw-us-patent-and-trademark-office-suffers-years-long-data-leak/</loc></url><url><loc>https://www.cypro.se/2023/06/30/how-to-spot-scammers-claiming-to-be-from-the-ncsc/</loc></url><url><loc>https://www.cypro.se/2023/06/30/whatsapp-upgrades-proxy-feature-against-internet-shutdowns/</loc></url><url><loc>https://www.cypro.se/2023/06/30/cybercriminals-hijacking-vulnerable-ssh-servers-in-new-proxyjacking-campaign/</loc></url><url><loc>https://www.cypro.se/2023/06/30/3-reasons-saas-security-is-the-imperative-first-step-to-ensuring-secure-ai-usage/</loc></url><url><loc>https://www.cypro.se/2023/06/30/iranian-hackers-charming-kitten-utilize-powerstar-backdoor-in-targeted-espionage-attacks/</loc></url><url><loc>https://www.cypro.se/2023/07/01/beware-new-rustbucket-malware-variant-targeting-macos-users/</loc></url><url><loc>https://www.cypro.se/2023/07/01/hackers-exploiting-unpatched-wordpress-plugin-flaw-to-create-secret-admin-accounts/</loc></url><url><loc>https://www.cypro.se/2023/07/03/blackcat-operators-distributing-ransomware-disguised-as-winscp-via-malvertising/</loc></url><url><loc>https://www.cypro.se/2023/07/03/evasive-meduza-stealer-targets-19-password-managers-and-76-crypto-wallets/</loc></url><url><loc>https://www.cypro.se/2023/07/03/apple-supplier-faces-70-million-ransomware-attack/</loc></url><url><loc>https://www.cypro.se/2023/07/03/improve-your-security-wordpress-spam-protection-with-cleantalk-anti-spam/</loc></url><url><loc>https://www.cypro.se/2023/07/03/cisa-flags-8-actively-exploited-flaws-in-samsung-and-d-link-devices/</loc></url><url><loc>https://www.cypro.se/2023/07/03/chinese-hackers-use-html-smuggling-to-infiltrate-european-ministries-with-plugx/</loc></url><url><loc>https://www.cypro.se/2023/07/04/alert-330000-fortigate-firewalls-still-unpatched-to-cve-2023-27997-rce-flaw/</loc></url><url><loc>https://www.cypro.se/2023/07/04/ddosia-attack-tool-evolves-with-encryption-targeting-multiple-sectors/</loc></url><url><loc>https://www.cypro.se/2023/07/04/mexico-based-hacker-targets-global-banks-with-android-malware/</loc></url><url><loc>https://www.cypro.se/2023/07/04/swedish-data-protection-authority-warns-companies-against-google-analytics-use/</loc></url><url><loc>https://www.cypro.se/2023/06/21/amygdala-hijacking-and-social-engineering/</loc></url><url><loc>https://www.cypro.se/2023/07/05/nhs-barts-trust-attacked-by-ransomware-gang/</loc></url><url><loc>https://www.cypro.se/2023/07/05/instagrams-twitter-alternative-threads-launch-halted-in-europe-over-privacy-concerns/</loc></url><url><loc>https://www.cypro.se/2023/07/05/node-js-users-beware-manifest-confusion-attack-opens-door-to-malware/</loc></url><url><loc>https://www.cypro.se/2023/07/05/secrets-secrets-are-no-fun-secrets-secrets-stored-in-plain-text-files-hurt-someone/</loc></url><url><loc>https://www.cypro.se/2023/07/05/redenergy-stealer-as-a-ransomware-threat-targeting-energy-and-telecom-sectors/</loc></url><url><loc>https://www.cypro.se/2023/07/06/active-cyber-defence-sixth-annual-report-now-available/</loc></url><url><loc>https://www.cypro.se/2023/07/05/vishing-breaking-down-social-engineering-techniques/</loc></url><url><loc>https://www.cypro.se/2023/07/06/interpol-nabs-hacking-crew-opera1ers-leader-behind-11-million-cybercrime/</loc></url><url><loc>https://www.cypro.se/2023/07/06/surviving-the-800-gbps-storm-gain-insights-from-gcores-2023-ddos-attack-statistics/</loc></url><url><loc>https://www.cypro.se/2023/07/06/researchers-uncover-new-linux-kernel-stackrot-privilege-escalation-vulnerability/</loc></url><url><loc>https://www.cypro.se/2023/07/06/how-pen-testing-can-soften-the-blow-on-rising-costs-of-cyber-insurance/</loc></url><url><loc>https://www.cypro.se/2023/07/06/silentbob-campaign-cloud-native-environments-under-attack/</loc></url><url><loc>https://www.cypro.se/2023/07/06/iranian-hackers-sophisticated-malware-targets-windows-and-macos-users/</loc></url><url><loc>https://www.cypro.se/2023/07/07/iotw-nickelodeon-allegedly-suffers-500gb-data-leak/</loc></url><url><loc>https://www.cypro.se/2023/07/07/google-releases-android-patch-update-for-3-actively-exploited-vulnerabilities/</loc></url><url><loc>https://www.cypro.se/2023/07/07/jumpcloud-resets-api-keys-amid-ongoing-cybersecurity-incident/</loc></url><url><loc>https://www.cypro.se/2023/07/07/cybersecurity-agencies-sound-alarm-on-rising-truebot-malware-attacks/</loc></url><url><loc>https://www.cypro.se/2023/07/07/close-security-gaps-with-continuous-threat-exposure-management/</loc></url><url><loc>https://www.cypro.se/2023/07/07/blackbyte-2-0-ransomware-infiltrate-encrypt-and-extort-in-just-5-days/</loc></url><url><loc>https://www.cypro.se/2023/07/07/mastodon-social-network-patches-critical-flaws-allowing-server-takeover/</loc></url><url><loc>https://www.cypro.se/2023/07/07/another-critical-unauthenticated-sqli-flaw-discovered-in-moveit-transfer-software/</loc></url><url><loc>https://www.cypro.se/2023/07/07/vishing-goes-high-tech-new-letscall-malware-employs-voice-traffic-routing/</loc></url><url><loc>https://www.cypro.se/2023/07/08/two-spyware-apps-on-google-play-with-1-5-million-users-sending-data-to-china/</loc></url><url><loc>https://www.cypro.se/2023/07/10/new-toitoin-banking-trojan-targeting-latin-american-businesses/</loc></url><url><loc>https://www.cypro.se/2023/07/10/hackers-steal-20-million-from-revolut/</loc></url><url><loc>https://www.cypro.se/2023/07/10/global-retailers-must-keep-an-eye-on-their-saas-stack/</loc></url><url><loc>https://www.cypro.se/2023/07/10/romcom-rat-targeting-nato-and-ukraine-support-groups/</loc></url><url><loc>https://www.cypro.se/2023/07/10/hackers-steal-20-million-by-exploiting-flaw-in-revoluts-payment-systems/</loc></url><url><loc>https://www.cypro.se/2023/07/10/new-mozilla-feature-blocks-risky-add-ons-on-specific-websites-to-safeguard-user-security/</loc></url><url><loc>https://www.cypro.se/2023/07/11/apple-issues-urgent-patch-for-zero-day-flaw-targeting-ios-ipados-macos-and-safari/</loc></url><url><loc>https://www.cypro.se/2023/07/11/beware-of-big-head-ransomware-spreading-through-fake-windows-updates/</loc></url><url><loc>https://www.cypro.se/2023/07/11/scarleteel-cryptojacking-campaign-exploiting-aws-fargate-in-ongoing-campaign/</loc></url><url><loc>https://www.cypro.se/2023/07/11/how-to-apply-mitre-attck-to-your-organization/</loc></url><url><loc>https://www.cypro.se/2023/07/11/hackers-exploit-windows-policy-loophole-to-forge-kernel-mode-driver-signatures/</loc></url><url><loc>https://www.cypro.se/2023/07/12/microsoft-releases-patches-for-130-vulnerabilities-including-6-under-active-attack/</loc></url><url><loc>https://www.cypro.se/2023/07/12/python-based-pyloose-fileless-attack-targets-cloud-workloads-for-cryptocurrency-mining/</loc></url><url><loc>https://www.cypro.se/2023/07/12/to-soc-or-not-to-soc/</loc></url><url><loc>https://www.cypro.se/2023/07/12/fanfiction-site-targeted-by-ddos-attack/</loc></url><url><loc>https://www.cypro.se/2023/07/12/chinese-hackers-deploy-microsoft-signed-rootkit-to-target-gaming-sector/</loc></url><url><loc>https://www.cypro.se/2023/07/12/the-risks-and-preventions-of-ai-in-business-safeguarding-against-potential-pitfalls/</loc></url><url><loc>https://www.cypro.se/2023/07/12/microsoft-thwarts-chinese-cyber-attack-targeting-western-european-governments/</loc></url><url><loc>https://www.cypro.se/1970/01/01/better-device-configuration-shouldnt-be-like-herding-cats/</loc></url><url><loc>https://www.cypro.se/2023/08/23/bring-your-own-device-the-new-normal/</loc></url><url><loc>https://www.cypro.se/2023/07/12/ransomware-extortion-skyrockets-in-2023-reaching-449-1-million-and-counting/</loc></url><url><loc>https://www.cypro.se/2023/07/13/new-vulnerabilities-disclosed-in-sonicwall-and-fortinet-network-security-products/</loc></url><url><loc>https://www.cypro.se/2023/07/13/u-s-government-agencies-emails-compromised-in-china-backed-cyber-attack/</loc></url><url><loc>https://www.cypro.se/2023/07/13/iotw-clop-issues-threat-to-victims-of-moveit-attack/</loc></url><url><loc>https://www.cypro.se/2023/07/13/rockwell-automation-controllogix-bugs-expose-industrial-systems-to-remote-attacks/</loc></url><url><loc>https://www.cypro.se/2023/07/13/fake-poc-for-linux-kernel-vulnerability-on-github-exposes-researchers-to-malware/</loc></url><url><loc>https://www.cypro.se/2023/07/13/picassoloader-malware-used-in-ongoing-attacks-on-ukraine-and-poland/</loc></url><url><loc>https://www.cypro.se/2023/07/13/teamtnts-silentbob-botnet-infecting-196-hosts-in-cloud-attack-campaign/</loc></url><url><loc>https://www.cypro.se/2023/07/14/new-soho-router-botnet-avrecon-spreads-to-70000-devices-across-20-countries/</loc></url><url><loc>https://www.cypro.se/2023/07/14/zimbra-warns-of-critical-zero-day-flaw-in-email-software-amid-active-exploitation/</loc></url><url><loc>https://www.cypro.se/2023/07/14/defend-against-insider-threats-join-this-webinar-on-saas-security-posture-management/</loc></url><url><loc>https://www.cypro.se/2023/07/14/aios-wordpress-plugin-faces-backlash-for-storing-user-passwords-in-plain-text/</loc></url><url><loc>https://www.cypro.se/2023/07/14/teamtnts-cloud-credential-stealing-campaign-now-targets-azure-and-google-cloud/</loc></url><url><loc>https://www.cypro.se/2023/07/14/critical-security-flaws-uncovered-in-honeywell-experion-dcs-and-quickblox-services/</loc></url><url><loc>https://www.cypro.se/2023/07/15/microsoft-bug-allowed-hackers-to-breach-over-two-dozen-organizations-via-forged-azure-ad-tokens/</loc></url><url><loc>https://www.cypro.se/2023/07/15/wormgpt-new-ai-tool-allows-cybercriminals-to-launch-sophisticated-cyber-attacks/</loc></url><url><loc>https://www.cypro.se/2023/07/17/cert-ua-uncovers-gamaredons-rapid-data-exfiltration-tactics-following-initial-compromise/</loc></url><url><loc>https://www.cypro.se/2023/07/17/cybercriminals-exploit-microsoft-word-vulnerabilities-to-deploy-lokibot-malware/</loc></url><url><loc>https://www.cypro.se/2023/07/17/microsoft-hack-sees-emails-stolen-from-us-agencies/</loc></url><url><loc>https://www.cypro.se/2023/07/17/these-6-questions-will-help-you-choose-the-best-attack-surface-management-platform/</loc></url><url><loc>https://www.cypro.se/2023/07/17/malicious-usb-drives-targetinging-global-targets-with-sogu-and-snowydrive-malware/</loc></url><url><loc>https://www.cypro.se/2023/07/17/hackers-exploit-webapk-to-deceive-android-users-into-installing-malicious-apps/</loc></url><url><loc>https://www.cypro.se/2023/07/18/jumpcloud-blames-sophisticated-nation-state-actor-for-security-breach/</loc></url><url><loc>https://www.cypro.se/2023/07/18/owner-of-breachforums-pleads-guilty-to-cybercrime-and-child-pornography-charges/</loc></url><url><loc>https://www.cypro.se/2023/07/18/cybercriminals-exploiting-woocommerce-payments-plugin-flaw-to-hijack-websites/</loc></url><url><loc>https://www.cypro.se/2023/07/18/fin8-group-using-modified-sardonic-backdoor-for-blackcat-ransomware-attacks/</loc></url><url><loc>https://www.cypro.se/2023/07/18/virustotal-data-leak-exposes-some-registered-customers-details/</loc></url><url><loc>https://www.cypro.se/2023/07/18/go-beyond-the-headlines-for-deeper-dives-into-the-cybercriminal-underground/</loc></url><url><loc>https://www.cypro.se/2023/07/17/microsoft-hack-sees-emails-stolen-from-us-agencies-2/</loc></url><url><loc>https://www.cypro.se/2023/07/14/iotw-clop-issues-threat-to-victims-of-moveit-attack-2/</loc></url><url><loc>https://www.cypro.se/2023/07/13/iotw-a-full-timeline-of-the-moveit-cyber-attack-2/</loc></url><url><loc>https://www.cypro.se/2023/07/12/fanfiction-site-targeted-by-ddos-attack-2/</loc></url><url><loc>https://www.cypro.se/2023/07/10/hackers-steal-20-million-from-revolut-2/</loc></url><url><loc>https://www.cypro.se/2023/07/07/iotw-nickelodeon-allegedly-suffers-500gb-data-leak-2/</loc></url><url><loc>https://www.cypro.se/2023/07/05/nhs-barts-trust-attacked-by-ransomware-gang-2/</loc></url><url><loc>https://www.cypro.se/2023/07/03/super-mario-game-used-to-spread-malware-2/</loc></url><url><loc>https://www.cypro.se/2023/07/03/apple-supplier-faces-70-million-ransomware-attack-2/</loc></url><url><loc>https://www.cypro.se/2023/06/30/iotw-us-patent-and-trademark-office-suffers-years-long-data-leak-2/</loc></url><url><loc>https://www.cypro.se/2023/06/27/blizzard-entertainment-hit-by-ddos-attack-2/</loc></url><url><loc>https://www.cypro.se/2023/06/21/pwc-and-ey-impacted-by-moveit-cyber-attack-2/</loc></url><url><loc>https://www.cypro.se/2023/07/18/pakistani-entities-targeted-in-sophisticated-attack-deploying-shadowpad-malware/</loc></url><url><loc>https://www.cypro.se/2023/07/18/identity-theft-increasing-in-numbers-in-2023/</loc></url><url><loc>https://www.cypro.se/2023/07/19/zero-day-attacks-exploited-critical-vulnerability-in-citrix-adc-and-gateway/</loc></url><url><loc>https://www.cypro.se/2023/07/19/u-s-government-blacklists-cytrox-and-intellexa-spyware-vendors-for-cyber-espionage/</loc></url><url><loc>https://www.cypro.se/2023/07/19/hca-healthcare-data-breach-impacts-11-million-patients/</loc></url><url><loc>https://www.cypro.se/2023/07/19/bad-build-flaw-in-google-cloud-build-raises-concerns-of-privilege-escalation/</loc></url><url><loc>https://www.cypro.se/2023/07/19/chinese-apt41-hackers-target-mobile-devices-with-new-wyrmspy-and-dragonegg-spyware/</loc></url><url><loc>https://www.cypro.se/2023/07/19/exploring-the-dark-side-osint-tools-and-techniques-for-unmasking-dark-web-operations/</loc></url><url><loc>https://www.cypro.se/2023/07/19/how-to-manage-your-attack-surface/</loc></url><url><loc>https://www.cypro.se/2023/07/19/cisa-and-nsa-issue-new-guidance-to-strengthen-5g-network-slicing-against-threats/</loc></url><url><loc>https://www.cypro.se/2023/07/20/adobe-rolls-out-new-patches-for-actively-exploited-coldfusion-vulnerability/</loc></url><url><loc>https://www.cypro.se/2023/07/20/microsoft-expands-cloud-logging-to-counter-rising-nation-state-cyber-threats/</loc></url><url><loc>https://www.cypro.se/2023/07/20/new-p2pinfect-worm-targeting-redis-servers-on-linux-and-windows-systems/</loc></url><url><loc>https://www.cypro.se/2023/07/20/turlas-new-deliverycheck-backdoor-breaches-ukrainian-defense-sector/</loc></url><url><loc>https://www.cypro.se/2023/07/20/critical-flaws-in-ami-megarac-bmc-software-expose-servers-to-remote-attacks/</loc></url><url><loc>https://www.cypro.se/2023/07/20/mallox-ransomware-exploits-weak-ms-sql-servers-to-breach-networks/</loc></url><url><loc>https://www.cypro.se/2023/07/20/apache-openmeetings-web-conferencing-tool-exposed-to-critical-vulnerabilities/</loc></url><url><loc>https://www.cypro.se/2023/07/20/north-korean-state-sponsored-hackers-suspected-in-jumpcloud-supply-chain-attack/</loc></url><url><loc>https://www.cypro.se/2023/07/20/a-few-more-reasons-why-rdp-is-insecure-surprise/</loc></url><url><loc>https://www.cypro.se/2023/07/21/iotw-estee-lauder-data-stolen-in-cyber-attack/</loc></url><url><loc>https://www.cypro.se/2023/07/21/citrix-netscaler-adc-and-gateway-devices-under-attack-cisa-urges-immediate-action/</loc></url><url><loc>https://www.cypro.se/2023/07/21/ddos-botnets-hijacking-zyxel-devices-to-launch-devastating-attacks/</loc></url><url><loc>https://www.cypro.se/2023/07/21/sophisticated-bundlebot-malware-disguised-as-google-ai-chatbot-and-utilities/</loc></url><url><loc>https://www.cypro.se/2023/07/21/local-governments-targeted-for-ransomware-how-to-prevent-falling-victim/</loc></url><url><loc>https://www.cypro.se/2023/07/21/azure-ad-token-forging-technique-in-microsoft-attack-extends-beyond-outlook-wiz-reports/</loc></url><url><loc>https://www.cypro.se/2023/07/21/hotrat-new-variant-of-asyncrat-malware-spreading-through-pirated-software/</loc></url><url><loc>https://www.cypro.se/2023/07/22/apple-threatens-to-pull-imessage-and-facetime-from-u-k-amid-surveillance-demands/</loc></url><url><loc>https://www.cypro.se/2023/07/24/banking-sector-targeted-in-open-source-software-supply-chain-attacks/</loc></url><url><loc>https://www.cypro.se/2023/07/24/new-openssh-vulnerability-exposes-linux-systems-to-remote-command-injection/</loc></url><url><loc>https://www.cypro.se/2023/07/24/critical-zero-days-in-atera-windows-installers-expose-users-to-privilege-escalation-attacks/</loc></url><url><loc>https://www.cypro.se/2023/07/24/google-messages-getting-cross-platform-end-to-end-encryption-with-mls-protocol/</loc></url><url><loc>https://www.cypro.se/2023/07/24/roblox-data-breach-exposes-employee-data/</loc></url><url><loc>https://www.cypro.se/2023/07/24/how-to-protect-patients-and-their-privacy-in-your-saas-apps/</loc></url><url><loc>https://www.cypro.se/2023/07/25/atlassian-releases-patches-for-critical-flaws-in-confluence-and-bamboo/</loc></url><url><loc>https://www.cypro.se/2023/07/25/ivanti-releases-urgent-patch-for-epmm-zero-day-vulnerability-under-active-exploitation/</loc></url><url><loc>https://www.cypro.se/2023/07/25/apple-rolls-out-urgent-patches-for-zero-day-flaws-impacting-iphones-ipads-and-macs/</loc></url><url><loc>https://www.cypro.se/2023/07/25/roblox-data-breach-exposes-developer-data/</loc></url><url><loc>https://www.cypro.se/2023/07/25/macos-under-attack-examining-the-growing-threat-and-user-perspectives/</loc></url><url><loc>https://www.cypro.se/2023/07/25/tetraburst-5-new-vulnerabilities-exposed-in-widely-used-radio-communication-system/</loc></url><url><loc>https://www.cypro.se/2023/07/25/how-mdr-helps-solve-the-cybersecurity-talent-gap/</loc></url><url><loc>https://www.cypro.se/2023/07/25/zenbleed-new-flaw-in-amd-zen-2-processors-puts-encryption-keys-and-passwords-at-risk/</loc></url><url><loc>https://www.cypro.se/2023/07/25/casbaneiro-banking-malware-goes-under-the-radar-with-uac-bypass-technique/</loc></url></urlset>
