<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://www.cypro.se/wp-sitemap.xsl" ?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://www.cypro.se/2024/10/29/u-s-government-issues-new-tlp-guidance-for-cross-sector-threat-intelligence-sharing/</loc></url><url><loc>https://www.cypro.se/2024/10/29/a-sherlock-holmes-approach-to-cybersecurity-eliminate-the-impossible-with-exposure-validation/</loc></url><url><loc>https://www.cypro.se/2024/10/29/dutch-police-disrupt-major-info-stealers-redline-and-metastealer-in-operation-magnus/</loc></url><url><loc>https://www.cypro.se/2024/10/29/researchers-uncover-vulnerabilities-in-open-source-ai-and-ml-models/</loc></url><url><loc>https://www.cypro.se/2024/10/29/nist-wins-multiple-cyberscoop-50-awards/</loc></url><url><loc>https://www.cypro.se/2024/10/29/cyber-resilience-audit-cra-scheme-launches-for-assured-caf-based-audits/</loc></url><url><loc>https://www.cypro.se/2024/10/30/researchers-uncover-python-package-targeting-crypto-wallets-with-malicious-code/</loc></url><url><loc>https://www.cypro.se/2024/10/30/embarking-on-a-compliance-journey-heres-how-intruder-can-help/</loc></url><url><loc>https://www.cypro.se/2024/10/30/opera-browser-fixes-big-security-hole-that-could-have-exposed-your-information/</loc></url><url><loc>https://www.cypro.se/2024/10/30/malvertising-campaign-hijacks-facebook-accounts-to-spread-sys01stealer-malware/</loc></url><url><loc>https://www.cypro.se/2024/10/30/north-korean-group-collaborates-with-play-ransomware-in-significant-cyber-attack/</loc></url><url><loc>https://www.cypro.se/2024/10/31/enterprise-identity-threat-report-2024-unveiling-hidden-threats-to-corporate-identities/</loc></url><url><loc>https://www.cypro.se/2024/10/31/litespeed-cache-plugin-vulnerability-poses-significant-risk-to-wordpress-websites/</loc></url><url><loc>https://www.cypro.se/2024/10/31/lottiefiles-issues-warning-about-compromised-lottie-player-npm-package/</loc></url><url><loc>https://www.cypro.se/2024/10/31/new-lightspy-spyware-version-targets-iphones-with-increased-surveillance-tactics/</loc></url><url><loc>https://www.cypro.se/2024/11/01/stop-lucr-3-attacks-learn-key-identity-security-tactics-in-this-expert-webinar/</loc></url><url><loc>https://www.cypro.se/2024/11/01/new-phishing-kit-xiu-gou-targets-users-across-five-countries-with-2000-fake-sites/</loc></url><url><loc>https://www.cypro.se/2024/11/01/microsoft-delays-windows-copilot-recall-release-over-privacy-concerns/</loc></url><url><loc>https://www.cypro.se/2024/11/01/microsoft-warns-of-chinese-botnet-exploiting-router-flaws-for-credential-theft/</loc></url><url><loc>https://www.cypro.se/2024/11/01/massive-git-config-breach-exposes-15000-credentials-10000-private-repos-cloned/</loc></url><url><loc>https://www.cypro.se/2024/11/01/5-saas-misconfigurations-leading-to-major-fu-ups/</loc></url><url><loc>https://www.cypro.se/2024/11/01/inside-irans-cyber-playbook-ai-fake-hosting-and-psychological-warfare/</loc></url><url><loc>https://www.cypro.se/2024/11/04/new-fakecall-malware-variant-hijacks-android-devices-for-fraudulent-banking-calls/</loc></url><url><loc>https://www.cypro.se/2024/11/04/cyber-threats-that-could-impact-the-retail-industry-this-holiday-season-and-what-to-do-about-it/</loc></url><url><loc>https://www.cypro.se/2024/11/04/googles-ai-tool-big-sleep-finds-zero-day-vulnerability-in-sqlite-database-engine/</loc></url><url><loc>https://www.cypro.se/2024/11/04/german-police-disrupt-ddos-for-hire-platform-dstat-cc-suspects-arrested/</loc></url><url><loc>https://www.cypro.se/2024/11/04/thn-recap-top-cybersecurity-threats-tools-and-practices-oct-28-nov-03/</loc></url><url><loc>https://www.cypro.se/2024/11/04/critical-flaws-in-ollama-ai-framework-could-enable-dos-model-theft-and-poisoning/</loc></url><url><loc>https://www.cypro.se/2024/11/05/google-warns-of-actively-exploited-cve-2024-43093-vulnerability-in-android-system/</loc></url><url><loc>https://www.cypro.se/2024/11/05/malware-campaign-uses-ethereum-smart-contracts-to-control-npm-typosquat-packages/</loc></url><url><loc>https://www.cypro.se/2024/11/05/canadian-suspect-arrested-over-snowflake-data-breach-and-extortion-attacks/</loc></url><url><loc>https://www.cypro.se/2024/11/05/synology-urges-patch-for-critical-zero-click-rce-flaw-affecting-millions-of-nas-devices/</loc></url><url><loc>https://www.cypro.se/2024/11/05/leveraging-wazuh-for-zero-trust-security/</loc></url><url><loc>https://www.cypro.se/2024/11/05/new-android-banking-malware-toxicpanda-targets-users-with-fraudulent-money-transfers/</loc></url><url><loc>https://www.cypro.se/2024/11/05/nist-participates-in-first-workshop-on-zero-trust-architecture-in-mobile-networks/</loc></url><url><loc>https://www.cypro.se/2024/11/05/fbi-seeks-public-help-to-identify-chinese-hackers-behind-global-cyber-intrusions/</loc></url><url><loc>https://www.cypro.se/2024/11/06/google-cloud-to-enforce-multi-factor-authentication-by-2025-for-all-users/</loc></url><url><loc>https://www.cypro.se/2024/11/06/south-korea-fines-meta-15-67m-for-illegally-sharing-sensitive-user-data-with-advertisers/</loc></url><url><loc>https://www.cypro.se/2024/11/06/helping-banish-malicious-adverts-and-drive-a-secure-advertising-ecosystem/</loc></url><url><loc>https://www.cypro.se/2024/11/06/guidance-for-brands-to-help-advertising-partners-counter-malvertising/</loc></url><url><loc>https://www.cypro.se/2024/11/06/interpol-disrupts-over-22000-malicious-servers-in-global-crackdown-on-cybercrime/</loc></url><url><loc>https://www.cypro.se/2024/11/06/9-steps-to-get-ctem-on-your-2025-budgetary-radar/</loc></url><url><loc>https://www.cypro.se/2024/11/06/new-winos-4-0-malware-infects-gamers-through-malicious-game-optimization-apps/</loc></url><url><loc>https://www.cypro.se/2024/11/06/veildrive-attack-exploits-microsoft-services-to-evade-detection-and-distribute-malware/</loc></url><url><loc>https://www.cypro.se/2024/11/07/canada-orders-tiktok-to-shut-down-canadian-operations-over-security-concerns/</loc></url><url><loc>https://www.cypro.se/2024/11/07/cisco-releases-patch-for-critical-urwb-vulnerability-in-industrial-wireless-systems/</loc></url><url><loc>https://www.cypro.se/2024/11/07/5-most-common-malware-techniques-in-2024/</loc></url><url><loc>https://www.cypro.se/2024/11/07/steelfox-and-rhadamanthys-malware-use-copyright-scams-driver-exploits-to-target-victims/</loc></url><url><loc>https://www.cypro.se/2024/11/07/malicious-pypi-package-fabrice-found-stealing-aws-keys-from-thousands-of-developers/</loc></url><url><loc>https://www.cypro.se/2024/11/07/china-aligned-mirrorface-hackers-target-eu-diplomats-with-world-expo-2025-bait/</loc></url><url><loc>https://www.cypro.se/2024/11/07/north-korean-hackers-target-crypto-firms-with-hidden-risk-malware-on-macos/</loc></url><url><loc>https://www.cypro.se/2024/11/07/a-hackers-guide-to-password-cracking/</loc></url><url><loc>https://www.cypro.se/2024/11/08/cisa-alerts-to-active-exploitation-of-critical-palo-alto-networks-vulnerability/</loc></url><url><loc>https://www.cypro.se/2024/11/08/new-crontrap-malware-infects-windows-by-hiding-in-linux-vm-to-evade-antivirus/</loc></url><url><loc>https://www.cypro.se/2024/11/08/webinar-learn-how-storytelling-can-make-cybersecurity-training-fun-and-effective/</loc></url><url><loc>https://www.cypro.se/2024/11/08/the-vciso-academy-transforming-msps-and-mssps-into-cybersecurity-powerhouses/</loc></url><url><loc>https://www.cypro.se/2024/11/08/icepeony-and-transparent-tribe-target-indian-entities-with-cloud-based-tools/</loc></url><url><loc>https://www.cypro.se/2024/11/08/malicious-npm-packages-target-roblox-users-with-data-stealing-malware/</loc></url><url><loc>https://www.cypro.se/2024/11/08/androxgh0st-malware-integrates-mozi-botnet-to-target-iot-and-cloud-services/</loc></url><url><loc>https://www.cypro.se/2024/11/09/bitcoin-fog-founder-sentenced-to-12-years-for-cryptocurrency-money-laundering/</loc></url><url><loc>https://www.cypro.se/2024/11/09/palo-alto-advises-securing-pan-os-interface-amid-potential-rce-threat-concerns/</loc></url><url><loc>https://www.cypro.se/2024/11/11/cybercriminals-use-excel-exploit-to-spread-fileless-remcos-rat-malware/</loc></url><url><loc>https://www.cypro.se/2024/11/11/security-flaws-in-popular-ml-toolkits-enable-server-hijacks-privilege-escalation/</loc></url><url><loc>https://www.cypro.se/2024/11/11/hpe-issues-critical-security-patches-for-aruba-access-point-vulnerabilities/</loc></url><url><loc>https://www.cypro.se/2024/11/11/the-roi-of-security-investments-how-cybersecurity-leaders-prove-it/</loc></url><url><loc>https://www.cypro.se/2024/11/11/thn-recap-top-cybersecurity-threats-tools-and-practices-nov-04-nov-10/</loc></url><url><loc>https://www.cypro.se/2024/11/11/new-gootloader-campaign-targets-users-searching-for-bengal-cat-laws-in-australia/</loc></url><url><loc>https://www.cypro.se/2024/11/12/new-ymir-ransomware-exploits-memory-for-stealthy-attacks-targets-corporate-networks/</loc></url><url><loc>https://www.cypro.se/2024/11/12/5-ways-behavioral-analytics-is-revolutionizing-incident-response/</loc></url><url><loc>https://www.cypro.se/2024/11/12/north-korean-hackers-target-macos-using-flutter-embedded-malware/</loc></url><url><loc>https://www.cypro.se/2024/11/12/new-flaws-in-citrix-virtual-apps-enable-rce-attacks-via-msmq-misconfiguration/</loc></url><url><loc>https://www.cypro.se/2024/11/12/new-phishing-tool-goissue-targets-github-developers-in-bulk-email-campaigns/</loc></url><url><loc>https://www.cypro.se/2024/11/13/microsoft-fixes-90-new-flaws-including-actively-exploited-ntlm-and-task-scheduler-bugs/</loc></url><url><loc>https://www.cypro.se/2024/11/13/iranian-hackers-use-dream-job-lures-to-deploy-snailresin-malware-in-aerospace-attacks/</loc></url><url><loc>https://www.cypro.se/2024/11/13/ovrc-platform-vulnerabilities-expose-iot-devices-to-remote-attacks-and-code-execution/</loc></url><url><loc>https://www.cypro.se/2024/11/13/comprehensive-guide-to-building-a-strong-browser-security-program/</loc></url><url><loc>https://www.cypro.se/2024/11/13/free-decryptor-released-for-bitlocker-based-shrinklocker-ransomware-victims/</loc></url><url><loc>https://www.cypro.se/2024/11/13/hamas-affiliated-wirte-employs-samecoin-wiper-in-disruptive-attacks-against-israel/</loc></url><url><loc>https://www.cypro.se/2024/11/14/russian-hackers-exploit-new-ntlm-flaw-to-deploy-rat-malware-via-phishing-emails/</loc></url><url><loc>https://www.cypro.se/2024/11/14/new-rustyattr-malware-targets-macos-through-extended-attribute-abuse/</loc></url><url><loc>https://www.cypro.se/2024/11/14/tiktok-pixel-privacy-nightmare-a-new-case-study/</loc></url><url><loc>https://www.cypro.se/2024/11/14/5-bcdr-oversights-that-leave-you-exposed-to-ransomware/</loc></url><url><loc>https://www.cypro.se/2024/11/14/google-warns-of-rising-cloaking-scams-ai-driven-fraud-and-crypto-schemes/</loc></url><url><loc>https://www.cypro.se/2024/11/14/experts-uncover-70000-hijacked-domains-in-widespread-sitting-ducks-attack-scheme/</loc></url><url><loc>https://www.cypro.se/2024/11/15/cisa-flags-critical-palo-alto-network-flaws-actively-exploited-in-the-wild/</loc></url><url><loc>https://www.cypro.se/2024/11/15/bitfinex-hacker-sentenced-to-5-years-guilty-of-laundering-10-5-billion-in-bitcoin/</loc></url><url><loc>https://www.cypro.se/2024/11/15/high-severity-flaw-in-postgresql-allows-hackers-to-exploit-environment-variables/</loc></url><url><loc>https://www.cypro.se/2024/11/15/a-decade-of-cyber-essentials-the-journey-towards-a-safer-digital-future/</loc></url><url><loc>https://www.cypro.se/2024/11/15/how-ai-is-transforming-iam-and-identity-security/</loc></url><url><loc>https://www.cypro.se/2024/11/15/vietnamese-hacker-group-deploys-new-pxa-stealer-targeting-europe-and-asia/</loc></url><url><loc>https://www.cypro.se/2024/11/15/researchers-warn-of-privilege-escalation-risks-in-googles-vertex-ai-ml-platform/</loc></url><url><loc>https://www.cypro.se/2024/11/15/master-certificate-management-join-this-webinar-on-crypto-agility-and-best-practices/</loc></url><url><loc>https://www.cypro.se/2024/11/15/iranian-hackers-deploy-wezrat-malware-in-attacks-targeting-israeli-organizations/</loc></url><url><loc>https://www.cypro.se/2024/11/16/warning-deepdata-malware-exploiting-unpatched-fortinet-flaw-to-steal-vpn-credentials/</loc></url><url><loc>https://www.cypro.se/2024/11/16/pan-os-firewall-vulnerability-under-active-exploitation-iocs-released/</loc></url><url><loc>https://www.cypro.se/2024/11/18/urgent-critical-wordpress-plugin-vulnerability-exposes-over-4-million-sites/</loc></url><url><loc>https://www.cypro.se/2024/11/18/nso-group-exploited-whatsapp-to-install-pegasus-spyware-even-after-metas-lawsuit/</loc></url><url><loc>https://www.cypro.se/2024/11/18/fake-discount-sites-exploit-black-friday-to-hijack-shopper-information/</loc></url><url><loc>https://www.cypro.se/2024/11/18/beyond-compliance-the-advantage-of-year-round-network-pen-testing/</loc></url><url><loc>https://www.cypro.se/2024/11/18/thn-recap-top-cybersecurity-threats-tools-and-practices-nov-11-nov-17/</loc></url><url><loc>https://www.cypro.se/2024/11/18/gmails-new-shielded-email-feature-lets-users-create-aliases-for-email-privacy/</loc></url><url><loc>https://www.cypro.se/2024/11/18/the-problem-of-permissions-and-non-human-identities-why-remediating-credentials-takes-longer-than-you-think/</loc></url><url><loc>https://www.cypro.se/2024/11/18/new-stealthy-babbleloader-malware-spotted-delivering-whitesnake-and-meduza-stealers/</loc></url><url><loc>https://www.cypro.se/2024/11/18/the-problem-of-permissions-and-non-human-identities-why-remediating-credentials-takes-longer-than-you-think-2/</loc></url><url><loc>https://www.cypro.se/2025/01/15/nice-webinar-the-privacy-workforce-evolves-and-matures/</loc></url><url><loc>https://www.cypro.se/2024/11/19/cisa-alert-active-exploitation-of-vmware-vcenter-and-kemp-loadmaster-flaws/</loc></url><url><loc>https://www.cypro.se/2024/11/19/chinese-hackers-exploit-t-mobile-and-other-u-s-telecoms-in-broader-espionage-campaign/</loc></url><url><loc>https://www.cypro.se/2024/11/19/new-helldown-ransomware-variant-expands-attacks-to-vmware-and-linux-systems/</loc></url><url><loc>https://www.cypro.se/2024/11/19/privileged-accounts-hidden-threats-why-privileged-access-security-must-be-a-top-priority/</loc></url><url><loc>https://www.cypro.se/2024/11/19/ngioweb-botnet-fuels-nsocks-residential-proxy-network-exploiting-iot-devices/</loc></url><url><loc>https://www.cypro.se/2024/11/19/hackers-hijack-unsecured-jupyter-notebooks-to-stream-illegal-sports-broadcasts/</loc></url><url><loc>https://www.cypro.se/2024/11/20/apple-releases-urgent-updates-to-patch-actively-exploited-zero-day-vulnerabilities/</loc></url><url><loc>https://www.cypro.se/2024/11/20/oracle-warns-of-agile-plm-vulnerability-currently-under-active-exploitation/</loc></url><url><loc>https://www.cypro.se/2024/11/20/china-backed-hackers-leverage-sigtran-gsm-protocols-to-infiltrate-telecom-networks/</loc></url><url><loc>https://www.cypro.se/2024/11/20/decades-old-security-vulnerabilities-found-in-ubuntus-needrestart-package/</loc></url><url><loc>https://www.cypro.se/2024/11/20/nhis-are-the-future-of-cybersecurity-meet-nhidr/</loc></url><url><loc>https://www.cypro.se/2024/11/20/microsoft-launches-windows-resiliency-initiative-to-boost-security-and-system-integrity/</loc></url><url><loc>https://www.cypro.se/2024/11/20/ghost-tap-hackers-exploiting-nfcgate-to-steal-funds-via-mobile-payments/</loc></url><url><loc>https://www.cypro.se/2024/11/21/nodestealer-malware-targets-facebook-ad-accounts-harvesting-credit-card-data/</loc></url><url><loc>https://www.cypro.se/2024/11/21/googles-ai-powered-oss-fuzz-tool-finds-26-vulnerabilities-in-open-source-projects/</loc></url><url><loc>https://www.cypro.se/2024/11/21/5-scattered-spider-gang-members-indicted-in-multi-million-dollar-cybercrime-scheme/</loc></url><url><loc>https://www.cypro.se/2024/11/21/over-145000-industrial-control-systems-across-175-countries-found-exposed-online/</loc></url><url><loc>https://www.cypro.se/2024/11/21/north-korean-front-companies-impersonate-u-s-it-firms-to-fund-missile-programs/</loc></url><url><loc>https://www.cypro.se/2024/11/21/cyber-story-time-the-boy-who-cried-secure/</loc></url><url><loc>https://www.cypro.se/2024/11/21/10-most-impactful-pam-use-cases-for-enhancing-organizational-security/</loc></url><url><loc>https://www.cypro.se/2024/11/21/warning-over-2000-palo-alto-networks-devices-hacked-in-ongoing-attack-campaign/</loc></url><url><loc>https://www.cypro.se/2024/11/21/chinese-apt-gelsemium-targets-linux-systems-with-new-wolfsbane-backdoor/</loc></url><url><loc>https://www.cypro.se/2024/11/22/pypi-attack-chatgpt-claude-impersonators-deliver-jarkastealer-via-python-libraries/</loc></url><url><loc>https://www.cypro.se/2024/11/22/microsoft-meta-and-doj-disrupt-global-cybercrime-and-fraudulent-networks/</loc></url><url><loc>https://www.cypro.se/2024/11/22/russian-hackers-deploy-hatvibe-and-cherryspy-malware-across-europe-and-asia/</loc></url><url><loc>https://www.cypro.se/2024/11/22/unlocking-google-workspace-security-are-you-doing-enough-to-protect-your-data/</loc></url><url><loc>https://www.cypro.se/2024/11/22/apt-k-47-uses-hajj-themed-lures-to-deliver-advanced-asyncshell-malware/</loc></url><url><loc>https://www.cypro.se/2024/11/22/china-linked-tag-112-targets-tibetan-media-with-cobalt-strike-espionage-campaign/</loc></url><url><loc>https://www.cypro.se/2024/11/19/social-engineering-tactics-sympathy-and-assistance-themes/</loc></url><url><loc>https://www.cypro.se/2024/11/04/onsite-social-engineering-tribe-mentality/</loc></url><url><loc>https://www.cypro.se/2024/11/23/google-exposes-glassbridge-a-pro-china-influence-network-of-fake-news-sites/</loc></url><url><loc>https://www.cypro.se/2024/11/23/north-korean-hackers-steal-10m-with-ai-driven-scams-and-malware-on-linkedin/</loc></url><url><loc>https://www.cypro.se/2024/11/25/researchers-uncover-malware-using-byovd-to-bypass-antivirus-protections/</loc></url><url><loc>https://www.cypro.se/2024/11/25/thn-recap-top-cybersecurity-threats-tools-and-practices-nov-18-nov-24/</loc></url><url><loc>https://www.cypro.se/2024/11/25/flying-under-the-radar-security-evasion-techniques/</loc></url><url><loc>https://www.cypro.se/2024/11/25/cybersecurity-blind-spots-in-iac-and-pac-tools-expose-cloud-platforms-to-new-attacks/</loc></url><url><loc>https://www.cypro.se/2024/11/25/googles-new-restore-credentials-tool-simplifies-app-login-after-android-migration/</loc></url><url><loc>https://www.cypro.se/2024/11/25/pypi-python-library-aiocpa-found-exfiltrating-crypto-keys-via-telegram-bot/</loc></url><url><loc>https://www.cypro.se/2024/11/26/cisa-urges-agencies-to-patch-critical-array-networks-flaw-amid-active-attacks/</loc></url><url><loc>https://www.cypro.se/2024/11/26/romcom-exploits-zero-day-firefox-and-windows-flaws-in-sophisticated-cyberattacks/</loc></url><url><loc>https://www.cypro.se/2024/11/26/chinese-hackers-use-ghostspider-malware-to-hack-telecoms-across-12-countries/</loc></url><url><loc>https://www.cypro.se/2024/11/26/intruder-launches-intel-a-free-vulnerability-intelligence-platform-for-staying-ahead-of-the-latest-threats/</loc></url><url><loc>https://www.cypro.se/2024/11/26/critical-wordpress-anti-spam-plugin-flaws-expose-200000-sites-to-remote-attacks/</loc></url><url><loc>https://www.cypro.se/2024/11/27/matrix-botnet-exploits-iot-devices-in-widespread-ddos-botnet-campaign/</loc></url><url><loc>https://www.cypro.se/2024/11/27/interpol-busts-african-cybercrime-1006-arrests-134089-malicious-networks-dismantled/</loc></url><url><loc>https://www.cypro.se/2024/11/27/apt-c-60-exploits-wps-office-vulnerability-to-deploy-spyglace-backdoor/</loc></url><url><loc>https://www.cypro.se/2024/11/27/researchers-discover-bootkitty-first-uefi-bootkit-targeting-linux-kernels/</loc></url><url><loc>https://www.cypro.se/2024/11/27/latest-multi-stage-attack-scenarios-with-real-world-examples/</loc></url><url><loc>https://www.cypro.se/2024/11/27/critical-flaw-in-projectsend-under-active-exploitation-against-public-facing-servers/</loc></url><url><loc>https://www.cypro.se/2024/11/28/u-s-telecom-giant-t-mobile-detects-network-intrusion-attempts-from-wireline-provider/</loc></url><url><loc>https://www.cypro.se/2024/11/28/cybercriminals-exploit-popular-game-engine-godot-to-distribute-cross-platform-malware/</loc></url><url><loc>https://www.cypro.se/2024/11/28/cyber-security-toolkit-for-boards-updated-briefing-pack-released/</loc></url><url><loc>https://www.cypro.se/2024/11/28/xmlrpc-npm-library-turns-malicious-steals-data-deploys-crypto-miner/</loc></url><url><loc>https://www.cypro.se/2024/11/28/the-future-of-serverless-security-in-2025-from-logs-to-runtime-protection/</loc></url><url><loc>https://www.cypro.se/2024/11/28/over-two-dozen-flaws-identified-in-advantech-industrial-wi-fi-access-points-patch-asap/</loc></url><url><loc>https://www.cypro.se/2024/11/29/u-s-citizen-sentenced-for-spying-on-behalf-of-chinas-intelligence-agency/</loc></url><url><loc>https://www.cypro.se/2024/11/29/protecting-tomorrows-world-shaping-the-cyber-physical-future/</loc></url><url><loc>https://www.cypro.se/2024/11/29/phishing-as-a-service-rockstar-2fa-targets-microsoft-365-users-with-aitm-attacks/</loc></url><url><loc>https://www.cypro.se/2024/11/29/microsoft-fixes-ai-cloud-and-erp-security-flaws-one-exploited-in-active-attacks/</loc></url><url><loc>https://www.cypro.se/2024/11/29/ai-powered-fake-news-campaign-targets-western-support-for-ukraine-and-u-s-elections/</loc></url><url><loc>https://www.cypro.se/2024/10/01/nist-introduces-a-meta-framework-to-strengthen-supply-chain-traceability-in-critical-infrastructure-sectors/</loc></url><url><loc>https://www.cypro.se/2024/10/01/nist-researchers-hold-an-automated-vehicle-research-day/</loc></url><url><loc>https://www.cypro.se/2024/11/30/wanted-russian-cybercriminal-linked-to-hive-and-lockbit-ransomware-has-been-arrested/</loc></url><url><loc>https://www.cypro.se/2024/12/02/interpol-arrests-5500-in-global-cybercrime-crackdown-seizes-over-400-million/</loc></url><url><loc>https://www.cypro.se/2024/12/02/8-million-android-users-hit-by-spyloan-malware-in-loan-apps-on-google-play/</loc></url><url><loc>https://www.cypro.se/2024/12/02/a-guide-to-securing-ai-app-development-join-this-cybersecurity-webinar/</loc></url><url><loc>https://www.cypro.se/2024/12/02/thn-recap-top-cybersecurity-threats-tools-and-tips-nov-25-dec-1/</loc></url><url><loc>https://www.cypro.se/2024/12/02/smokeloader-malware-resurfaces-targeting-manufacturing-and-it-in-taiwan/</loc></url><url><loc>https://www.cypro.se/2024/12/03/hornshooves-campaign-delivers-rats-via-fake-emails-and-javascript-payloads/</loc></url><url><loc>https://www.cypro.se/2024/12/03/north-korean-kimsuky-hackers-use-russian-email-addresses-for-credential-theft-attacks/</loc></url><url><loc>https://www.cypro.se/2024/12/03/nachovpn-tool-exploits-flaws-in-popular-vpn-clients-for-system-compromise/</loc></url><url><loc>https://www.cypro.se/2024/12/03/cisco-warns-of-exploitation-of-decade-old-asa-webvpn-vulnerability/</loc></url><url><loc>https://www.cypro.se/2024/10/25/nist-announces-14-candidates-to-advance-to-the-second-round-of-the-additional-digital-signatures-for-the-post-quantum-cryptography-standardization-process/</loc></url><url><loc>https://www.cypro.se/2024/12/04/veeam-issues-patch-for-critical-rce-vulnerability-in-service-provider-console/</loc></url><url><loc>https://www.cypro.se/2024/12/04/critical-sailpoint-identityiq-vulnerability-exposes-files-to-unauthorized-access/</loc></url><url><loc>https://www.cypro.se/2024/12/04/hackers-use-corrupted-zips-and-office-docs-to-evade-antivirus-and-email-defenses/</loc></url><url><loc>https://www.cypro.se/2024/12/04/joint-advisory-warns-of-prc-backed-cyber-espionage-targeting-telecom-networks/</loc></url><url><loc>https://www.cypro.se/2024/12/04/researchers-uncover-backdoor-in-solanas-popular-web3-js-npm-library/</loc></url><url><loc>https://www.cypro.se/2024/12/04/how-to-plan-a-new-and-improved-password-policy-for-real-world-security-challenges/</loc></url><url><loc>https://www.cypro.se/2024/12/04/europol-dismantles-criminal-messaging-service-matrix-in-major-global-takedown/</loc></url><url><loc>https://www.cypro.se/2024/12/04/7-pam-best-practices-to-secure-hybrid-and-multi-cloud-environments/</loc></url><url><loc>https://www.cypro.se/2024/12/04/russia-linked-turla-exploits-pakistani-hackers-servers-to-target-afghan-and-indian-entities/</loc></url><url><loc>https://www.cypro.se/2024/12/05/nca-busts-russian-crypto-networks-laundering-funds-and-evading-sanctions/</loc></url><url><loc>https://www.cypro.se/2024/12/05/cisa-warns-of-active-exploitation-of-flaws-in-zyxel-projectsend-and-cyberpanel/</loc></url><url><loc>https://www.cypro.se/2024/12/05/anel-and-noopdoor-backdoors-weaponized-in-new-mirrorface-campaign-against-japan/</loc></url><url><loc>https://www.cypro.se/2024/12/05/researchers-uncover-4-month-cyberattack-on-u-s-firm-linked-to-chinese-hackers/</loc></url><url><loc>https://www.cypro.se/2024/12/05/want-to-grow-vulnerability-management-into-exposure-management-start-here/</loc></url><url><loc>https://www.cypro.se/2024/12/05/hackers-target-uyghurs-and-tibetans-with-moonshine-exploit-and-darknimbus-backdoor/</loc></url><url><loc>https://www.cypro.se/2024/12/05/this-3000-android-trojan-targeting-banks-and-cryptocurrency-exchanges/</loc></url><url><loc>https://www.cypro.se/2024/12/05/critical-mitel-micollab-flaw-exposes-systems-to-unauthorized-file-and-admin-access/</loc></url><url><loc>https://www.cypro.se/2024/12/05/europol-shuts-down-manson-market-fraud-marketplace-seizes-50-servers/</loc></url><url><loc>https://www.cypro.se/2024/12/06/hackers-leveraging-cloudflare-tunnels-dns-fast-flux-to-hide-gammadrop-malware/</loc></url><url><loc>https://www.cypro.se/2024/12/06/more_eggs-maas-expands-operations-with-revc2-backdoor-and-venom-loader/</loc></url><url><loc>https://www.cypro.se/2024/12/06/researchers-uncover-flaws-in-popular-open-source-machine-learning-frameworks/</loc></url><url><loc>https://www.cypro.se/2024/12/06/conquering-the-complexities-of-modern-bcdr/</loc></url><url><loc>https://www.cypro.se/2024/12/06/fsb-uses-trojan-app-to-monitor-russian-programmer-accused-of-supporting-ukraine/</loc></url><url><loc>https://www.cypro.se/2024/12/07/romania-cancels-presidential-election-results-after-alleged-russian-meddling-on-tiktok/</loc></url><url><loc>https://www.cypro.se/2024/12/07/learn-how-experts-secure-privileged-accounts-proven-pas-strategies-webinar/</loc></url><url><loc>https://www.cypro.se/2024/12/07/hackers-using-fake-video-conferencing-apps-to-steal-web3-professionals-data/</loc></url><url><loc>https://www.cypro.se/2024/12/07/ultralytics-ai-library-compromised-cryptocurrency-miner-found-in-pypi-versions/</loc></url><url><loc>https://www.cypro.se/2024/12/09/researchers-uncover-prompt-injection-vulnerabilities-in-deepseek-and-claude-ai/</loc></url><url><loc>https://www.cypro.se/2024/12/09/seven-bolt-ons-to-make-your-entra-id-more-secure-for-critical-sessions/</loc></url><url><loc>https://www.cypro.se/2024/12/09/socks5systemz-botnet-powers-illegal-proxy-service-with-85000-hacked-devices/</loc></url><url><loc>https://www.cypro.se/2024/12/09/%e2%9a%a1-thn-recap-top-cybersecurity-threats-tools-and-tips-dec-2-8/</loc></url><url><loc>https://www.cypro.se/2024/12/02/vishing-meets-ai/</loc></url><url><loc>https://www.cypro.se/2024/12/09/black-basta-ransomware-evolves-with-email-bombing-qr-codes-and-social-engineering/</loc></url><url><loc>https://www.cypro.se/2024/12/10/ongoing-phishing-and-malware-campaigns-in-december-2024/</loc></url><url><loc>https://www.cypro.se/2024/12/10/cert-ua-warns-of-phishing-attacks-targeting-ukraines-defense-and-security-force/</loc></url><url><loc>https://www.cypro.se/2024/12/10/phone-phishing-gang-busted-eight-arrested-in-belgium-and-netherlands/</loc></url><url><loc>https://www.cypro.se/2024/12/10/hackers-weaponize-visual-studio-code-remote-tunnels-for-cyber-espionage/</loc></url><url><loc>https://www.cypro.se/2024/12/10/the-future-of-network-security-automated-internal-and-external-pentesting/</loc></url><url><loc>https://www.cypro.se/2024/12/10/fake-recruiters-distribute-banking-trojan-via-malicious-apps-in-phishing-scam/</loc></url><url><loc>https://www.cypro.se/2024/12/10/cleo-file-transfer-vulnerability-under-exploitation-patch-pending-mitigation-urged/</loc></url><url><loc>https://www.cypro.se/2024/12/11/ivanti-issues-critical-security-updates-for-csa-and-connect-secure-vulnerabilities/</loc></url><url><loc>https://www.cypro.se/2024/12/11/u-s-charges-chinese-hacker-for-exploiting-zero-day-in-81000-sophos-firewalls/</loc></url><url><loc>https://www.cypro.se/2024/12/11/microsoft-fixes-72-flaws-including-patch-for-actively-exploited-clfs-vulnerability/</loc></url><url><loc>https://www.cypro.se/2024/12/11/chinese-eaglemsgspy-spyware-found-exploiting-mobile-devices-since-2017/</loc></url><url><loc>https://www.cypro.se/2024/12/11/researchers-uncover-espionage-tactics-of-china-based-apt-groups-in-southeast-asia/</loc></url><url><loc>https://www.cypro.se/2024/12/11/microsoft-mfa-authquake-flaw-enabled-unlimited-brute-force-attempts-without-alerts/</loc></url><url><loc>https://www.cypro.se/2024/12/11/zloader-malware-returns-with-dns-tunneling-to-stealthily-mask-c2-comms/</loc></url><url><loc>https://www.cypro.se/2024/12/11/new-malware-technique-could-exploit-windows-ui-framework-to-evade-edr-tools/</loc></url><url><loc>https://www.cypro.se/2024/12/11/secret-blizzard-deploys-kazuar-backdoor-in-ukraine-using-amadey-malware-as-a-service/</loc></url><url><loc>https://www.cypro.se/2024/12/12/europol-dismantles-27-ddos-attack-platforms-across-15-nations-admins-arrested/</loc></url><url><loc>https://www.cypro.se/2024/12/12/wordpress-hunk-companion-plugin-flaw-exploited-to-silently-install-vulnerable-plugins/</loc></url><url><loc>https://www.cypro.se/2024/12/12/researchers-uncover-symlink-exploit-allowing-tcc-bypass-in-ios-and-macos/</loc></url><url><loc>https://www.cypro.se/2024/12/12/saas-budget-planning-guide-for-it-professionals/</loc></url><url><loc>https://www.cypro.se/2024/12/12/over-300k-prometheus-instances-exposed-credentials-and-api-keys-leaking-online/</loc></url><url><loc>https://www.cypro.se/2024/12/12/gamaredon-deploys-android-spyware-bonespy-and-plaingnome-in-former-soviet-states/</loc></url><url><loc>https://www.cypro.se/2024/12/13/fbi-busts-rydox-marketplace-with-7600-pii-sales-cryptocurrency-worth-225k-seized/</loc></url><url><loc>https://www.cypro.se/2024/12/13/new-linux-rootkit-pumakit-uses-advanced-stealth-techniques-to-evade-detection/</loc></url><url><loc>https://www.cypro.se/2024/12/13/iran-linked-iocontrol-malware-targets-scada-and-linux-based-iot-platforms/</loc></url><url><loc>https://www.cypro.se/2024/12/13/how-to-generate-a-crowdstrike-rfm-report-with-ai-in-tines/</loc></url><url><loc>https://www.cypro.se/2024/12/13/doj-indicts-14-north-koreans-for-88m-it-worker-fraud-scheme-over-six-years/</loc></url><url><loc>https://www.cypro.se/2024/12/13/critical-openwrt-vulnerability-exposes-devices-to-malicious-firmware-injection/</loc></url><url><loc>https://www.cypro.se/2024/12/13/390000-wordpress-credentials-stolen-via-malicious-github-repository-hosting-poc-exploits/</loc></url><url><loc>https://www.cypro.se/2024/12/14/thai-officials-targeted-in-yokai-backdoor-campaign-using-dll-side-loading-techniques/</loc></url><url><loc>https://www.cypro.se/2024/12/14/germany-disrupts-badbox-malware-on-30000-devices-using-sinkhole-action/</loc></url><url><loc>https://www.cypro.se/2024/12/16/ukrainian-minors-recruited-for-cyber-ops-and-reconnaissance-in-russian-airstrikes/</loc></url><url><loc>https://www.cypro.se/2024/12/16/new-investment-scam-leverages-ai-social-media-ads-to-target-victims-worldwide/</loc></url><url><loc>https://www.cypro.se/2024/12/16/new-glutton-malware-exploits-popular-php-frameworks-like-laravel-and-thinkphp/</loc></url><url><loc>https://www.cypro.se/2024/12/16/data-governance-in-devops-ensuring-compliance-in-the-ai-era/</loc></url><url><loc>https://www.cypro.se/2024/12/16/novispy-spyware-installed-on-journalists-phone-after-unlocking-it-with-cellebrite-tool/</loc></url><url><loc>https://www.cypro.se/2024/12/16/%e2%9a%a1-thn-weekly-recap-top-cybersecurity-threats-tools-and-tips/</loc></url><url><loc>https://www.cypro.se/2024/12/16/deceptionads-delivers-1m-daily-impressions-via-3000-sites-fake-captcha-pages/</loc></url><url><loc>https://www.cypro.se/2024/12/16/three-random-words-or-thinkrandom/</loc></url><url><loc>https://www.cypro.se/2024/12/16/what-does-the-ncsc-think-of-password-managers/</loc></url><url><loc>https://www.cypro.se/2024/12/16/ransomware-wannacry-guidance-for-home-users-and-small-businesses/</loc></url><url><loc>https://www.cypro.se/2024/12/16/ncsc-advice-for-dixons-carphone-plc-customers/</loc></url><url><loc>https://www.cypro.se/2024/12/16/krack-wi-fi-guidance/</loc></url><url><loc>https://www.cypro.se/2024/12/16/ncsc-advice-for-marriott-international-customers/</loc></url><url><loc>https://www.cypro.se/2024/12/16/how-to-recover-an-infected-device-12/</loc></url><url><loc>https://www.cypro.se/2024/12/16/early-years-practitioners-using-cyber-security-to-protect-your-settings/</loc></url><url><loc>https://www.cypro.se/2024/12/16/equities-process/</loc></url><url><loc>https://www.cypro.se/2024/12/17/the-mask-apt-resurfaces-with-sophisticated-multi-platform-malware-arsenal/</loc></url><url><loc>https://www.cypro.se/2024/12/17/cisa-and-fbi-raise-alerts-on-exploited-flaws-and-expanding-hiatusrat-campaign/</loc></url><url><loc>https://www.cypro.se/2024/12/17/hackers-exploit-webview2-to-deploy-coinlurker-malware-and-evade-security-detection/</loc></url><url><loc>https://www.cypro.se/2024/12/17/bitter-apt-targets-turkish-defense-sector-with-wmrat-and-miyarat-malware/</loc></url><url><loc>https://www.cypro.se/2024/12/17/5-practical-techniques-for-effective-cyber-threat-hunting/</loc></url><url><loc>https://www.cypro.se/2024/12/17/even-great-companies-get-breached-find-out-why-and-how-to-stop-it/</loc></url><url><loc>https://www.cypro.se/2024/12/17/hackers-use-microsoft-msc-files-to-deploy-obfuscated-backdoor-in-pakistan-attacks/</loc></url><url><loc>https://www.cypro.se/2024/12/17/attackers-exploit-microsoft-teams-and-anydesk-to-deploy-darkgate-malware/</loc></url><url><loc>https://www.cypro.se/2024/12/18/meta-fined-e251-million-for-2018-data-breach-impacting-29-million-accounts/</loc></url><url><loc>https://www.cypro.se/2024/12/18/patch-alert-critical-apache-struts-flaw-found-exploitation-attempts-detected/</loc></url><url><loc>https://www.cypro.se/2024/12/18/interpol-pushes-for-romance-baiting-to-replace-pig-butchering-in-scam-discourse/</loc></url><url><loc>https://www.cypro.se/2024/12/18/not-your-old-activestate-introducing-our-end-to-end-os-platform/</loc></url><url><loc>https://www.cypro.se/2024/12/18/apt29-hackers-target-high-value-victims-using-rogue-rdp-servers-and-pyrdp/</loc></url><url><loc>https://www.cypro.se/2024/12/18/only-cynet-delivers-100-protection-and-100-detection-visibility-in-the-2024-mitre-attck-evaluation/</loc></url><url><loc>https://www.cypro.se/2024/12/18/beyondtrust-issues-urgent-patch-for-critical-vulnerability-in-pra-and-rs-products/</loc></url><url><loc>https://www.cypro.se/2024/12/18/hubphish-exploits-hubspot-tools-to-target-20000-european-users-for-credential-theft/</loc></url><url><loc>https://www.cypro.se/2024/12/19/cisa-mandates-cloud-security-for-federal-agencies-by-2025-under-binding-directive-25-01/</loc></url><url><loc>https://www.cypro.se/2024/12/19/dutch-dpa-fines-netflix-e4-75-million-for-gdpr-violations-over-data-transparency/</loc></url><url><loc>https://www.cypro.se/2024/12/19/uac-0125-abuses-cloudflare-workers-to-distribute-malware-disguised-as-army-app/</loc></url><url><loc>https://www.cypro.se/2024/12/18/assured-cyber-incident-response-scheme-important-updates/</loc></url><url><loc>https://www.cypro.se/2024/12/19/fortinet-warns-of-critical-fortiwlm-flaw-that-could-lead-to-admin-access-exploits/</loc></url><url><loc>https://www.cypro.se/2024/12/19/juniper-warns-of-mirai-botnet-targeting-ssr-devices-with-default-passwords/</loc></url><url><loc>https://www.cypro.se/2024/12/19/thousands-download-malicious-npm-libraries-impersonating-legitimate-tools/</loc></url><url><loc>https://www.cypro.se/2025/03/25/macos-security-compliance-project-developer-conference/</loc></url><url><loc>https://www.cypro.se/2024/12/20/cisa-adds-critical-flaw-in-beyondtrust-software-to-exploited-vulnerabilities-list/</loc></url><url><loc>https://www.cypro.se/2024/12/20/hackers-exploiting-critical-fortinet-ems-vulnerability-to-deploy-remote-access-tools/</loc></url><url><loc>https://www.cypro.se/2024/12/20/rspack-npm-packages-compromised-with-crypto-mining-malware-in-supply-chain-attack/</loc></url><url><loc>https://www.cypro.se/2024/12/20/sophos-issues-hotfixes-for-critical-firewall-flaws-update-to-prevent-exploitation/</loc></url><url><loc>https://www.cypro.se/2024/12/20/lazarus-group-spotted-targeting-nuclear-engineers-with-cookieplus-malware/</loc></url><url><loc>https://www.cypro.se/2024/12/21/lockbit-developer-rostislav-panev-charged-for-billions-in-global-ransomware-damages/</loc></url><url><loc>https://www.cypro.se/2024/12/23/italy-fines-openai-e15-million-for-chatgpt-gdpr-data-privacy-violations/</loc></url><url><loc>https://www.cypro.se/2024/12/23/u-s-judge-rules-against-nso-group-in-whatsapp-pegasus-spyware-case/</loc></url><url><loc>https://www.cypro.se/2024/12/23/top-10-cybersecurity-trends-to-expect-in-2025/</loc></url><url><loc>https://www.cypro.se/2024/12/23/rockstar2fa-collapse-fuels-expansion-of-flowerstorm-phishing-as-a-service/</loc></url><url><loc>https://www.cypro.se/2024/12/23/ai-could-generate-10000-malware-variants-evading-detection-in-88-of-case/</loc></url><url><loc>https://www.cypro.se/2024/12/23/%e2%9a%a1-thn-weekly-recap-top-cybersecurity-threats-tools-and-tips-2/</loc></url><url><loc>https://www.cypro.se/2024/12/24/apache-tomcat-vulnerability-cve-2024-56337-exposes-servers-to-rce-attacks/</loc></url><url><loc>https://www.cypro.se/2024/12/24/north-korean-hackers-pull-off-308m-bitcoin-heist-from-crypto-firm-dmm-bitcoin/</loc></url><url><loc>https://www.cypro.se/2024/12/24/cisa-adds-acclaim-usaherds-vulnerability-to-kev-catalog-amid-active-exploitation/</loc></url><url><loc>https://www.cypro.se/2024/12/24/researchers-uncover-pypi-packages-stealing-keystrokes-and-hijacking-social-accounts/</loc></url><url><loc>https://www.cypro.se/2024/12/25/irans-charming-kitten-deploys-bellacpp-a-new-c-variant-of-bellaciao-malware/</loc></url><url><loc>https://www.cypro.se/2024/12/25/ruijie-networks-cloud-platform-flaws-could-expose-50000-devices-to-remote-attacks/</loc></url><url><loc>https://www.cypro.se/2024/12/25/critical-sql-injection-vulnerability-in-apache-traffic-control-rated-9-9-cvss-patch-now/</loc></url><url><loc>https://www.cypro.se/2024/12/26/brazilian-hacker-charged-for-extorting-3-2m-in-bitcoin-after-breaching-300000-accounts/</loc></url><url><loc>https://www.cypro.se/2024/12/27/apache-mina-cve-2024-52046-cvss-10-0-flaw-enables-rce-via-unsafe-serialization/</loc></url><url><loc>https://www.cypro.se/2024/12/27/palo-alto-releases-patch-for-pan-os-dos-flaw-update-immediately/</loc></url><url><loc>https://www.cypro.se/2024/12/27/ficora-and-kaiten-botnets-exploit-old-d-link-vulnerabilities-for-global-attacks/</loc></url><url><loc>https://www.cypro.se/2024/12/27/cloud-atlas-deploys-vbcloud-malware-over-80-of-targets-found-in-russia/</loc></url><url><loc>https://www.cypro.se/2024/12/27/north-korean-hackers-deploy-ottercookie-malware-in-contagious-interview-campaign/</loc></url><url><loc>https://www.cypro.se/2024/12/28/15000-four-faith-routers-exposed-to-new-exploit-due-to-default-credentials/</loc></url><url><loc>https://www.cypro.se/2024/12/29/16-chrome-extensions-hacked-exposing-over-600000-users-to-data-theft/</loc></url><url><loc>https://www.cypro.se/2024/12/30/when-good-extensions-go-bad-takeaways-from-the-campaign-targeting-browser-extensions/</loc></url><url><loc>https://www.cypro.se/2024/12/30/new-hipaa-rules-mandate-72-hour-data-restoration-and-annual-compliance-audits/</loc></url><url><loc>https://www.cypro.se/2024/12/30/%e2%9a%a1-thn-weekly-recap-top-cybersecurity-threats-tools-and-tips-3/</loc></url><url><loc>https://www.cypro.se/2024/12/31/misconfigured-kubernetes-rbac-in-azure-airflow-could-expose-entire-cluster-to-exploitation/</loc></url><url><loc>https://www.cypro.se/2024/12/31/chinese-apt-exploits-beyondtrust-api-key-to-access-u-s-treasury-systems-and-documents/</loc></url><url><loc>https://www.cypro.se/2024/12/31/new-u-s-doj-rule-halts-bulk-data-transfers-to-adversarial-nations-to-protect-privacy/</loc></url><url><loc>https://www.cypro.se/2025/01/01/iranian-and-russian-entities-sanctioned-for-election-interference-using-ai-and-cyber-tactics/</loc></url><url><loc>https://www.cypro.se/2025/01/01/new-doubleclickjacking-exploit-bypasses-clickjacking-protections-on-major-websites/</loc></url><url><loc>https://www.cypro.se/2025/01/02/malicious-obfuscated-npm-package-disguised-as-an-ethereum-tool-deploys-quasar-rat/</loc></url><url><loc>https://www.cypro.se/2025/01/02/three-russian-german-nationals-charged-with-espionage-for-russian-secret-service/</loc></url><url><loc>https://www.cypro.se/2025/01/02/cross-domain-attacks-a-growing-threat-to-modern-security-and-how-to-combat-them/</loc></url><url><loc>https://www.cypro.se/2025/01/02/severe-security-flaws-patched-in-microsoft-dynamics-365-and-power-apps-web-api/</loc></url><url><loc>https://www.cypro.se/2025/01/03/apple-to-pay-siri-users-20-per-device-in-settlement-over-accidental-siri-privacy-violations/</loc></url><url><loc>https://www.cypro.se/2025/01/03/critical-deadline-update-old-net-domains-before-january-7-2025-to-avoid-service-disruption/</loc></url><url><loc>https://www.cypro.se/2025/01/03/ldapnightmare-poc-exploit-crashes-lsass-and-reboots-windows-domain-controllers/</loc></url><url><loc>https://www.cypro.se/2025/01/03/new-ai-jailbreak-method-bad-likert-judge-boosts-attack-success-rates-by-over-60/</loc></url><url><loc>https://www.cypro.se/2025/01/04/u-s-treasury-sanctions-beijing-cybersecurity-firm-for-state-backed-hacking-campaigns/</loc></url><url><loc>https://www.cypro.se/2025/01/04/playfulghost-delivered-via-phishing-and-seo-poisoning-in-trojanized-vpn-apps/</loc></url><url><loc>https://www.cypro.se/2025/01/04/researchers-uncover-nuclei-vulnerability-enabling-signature-bypass-and-code-execution/</loc></url><url><loc>https://www.cypro.se/2025/01/03/border-gateway-protocol-security-and-resilience-nist-releases-public-draft-of-sp-800-189-revision-1/</loc></url><url><loc>https://www.cypro.se/2025/01/06/russian-speaking-attackers-target-ethereum-devs-with-fake-hardhat-npm-packages/</loc></url><url><loc>https://www.cypro.se/2025/01/06/%e2%9a%a1-thn-weekly-recap-top-cybersecurity-threats-tools-and-tips-6-jan/</loc></url><url><loc>https://www.cypro.se/2025/01/06/from-22m-in-ransom-to-100m-stolen-records-2025s-all-star-saas-threat-actors-to-watch/</loc></url><url><loc>https://www.cypro.se/2025/01/06/firescam-android-malware-poses-as-telegram-premium-to-steal-data-and-control-devices/</loc></url><url><loc>https://www.cypro.se/2025/01/06/india-proposes-digital-data-rules-with-tough-penalties-and-cybersecurity-requirements/</loc></url><url><loc>https://www.cypro.se/2025/01/07/moxa-alerts-users-to-high-severity-vulnerabilities-in-cellular-and-secure-routers/</loc></url><url><loc>https://www.cypro.se/2025/01/07/new-eagerbee-variant-targets-isps-and-governments-with-advanced-backdoor-capabilities/</loc></url><url><loc>https://www.cypro.se/2025/01/07/cisa-no-wider-federal-impact-from-treasury-cyber-attack-investigation-ongoing/</loc></url><url><loc>https://www.cypro.se/2025/01/07/farewell-to-the-fallen-the-cybersecurity-stars-we-lost-last-year/</loc></url><url><loc>https://www.cypro.se/2025/01/07/researchers-uncover-major-security-flaw-in-illumina-iseq-100-dna-sequencers/</loc></url><url><loc>https://www.cypro.se/2025/01/08/cisa-flags-critical-flaws-in-mitel-and-oracle-systems-amid-active-exploitation/</loc></url><url><loc>https://www.cypro.se/2025/01/08/fcc-launches-cyber-trust-mark-for-iot-devices-to-certify-security-compliance/</loc></url><url><loc>https://www.cypro.se/2025/01/08/mirai-botnet-variant-exploits-four-faith-router-vulnerability-for-ddos-attacks/</loc></url><url><loc>https://www.cypro.se/2025/01/08/top-5-malware-threats-to-prepare-against-in-2025/</loc></url><url><loc>https://www.cypro.se/2025/01/08/researchers-expose-noneuclid-rat-using-uac-bypass-and-amsi-evasion-techniques/</loc></url><url><loc>https://www.cypro.se/2025/01/08/applying-the-cloud-security-principles-in-practice-a-case-study/</loc></url><url><loc>https://www.cypro.se/2025/01/08/neglected-domains-used-in-malspam-to-evade-spf-and-dmarc-security-protections/</loc></url><url><loc>https://www.cypro.se/2025/01/09/ivanti-flaw-cve-2025-0282-actively-exploited-impacts-connect-secure-and-policy-secure/</loc></url><url><loc>https://www.cypro.se/2025/01/09/e-u-commission-fined-for-transferring-user-data-to-meta-in-violation-of-privacy-laws/</loc></url><url><loc>https://www.cypro.se/2025/01/09/critical-rce-flaw-in-gfi-keriocontrol-allows-remote-code-execution-via-crlf-injection/</loc></url><url><loc>https://www.cypro.se/2025/01/09/webinar-learn-how-to-stop-encrypted-attacks-before-they-cost-you-millions/</loc></url><url><loc>https://www.cypro.se/2025/01/09/mirrorface-leverages-anel-and-noopdoor-in-multi-year-cyberattacks-on-japan/</loc></url><url><loc>https://www.cypro.se/2025/01/09/product-review-how-reco-discovers-shadow-ai-in-saas/</loc></url><url><loc>https://www.cypro.se/2025/01/09/new-banshee-stealer-variant-bypasses-antivirus-with-apples-xprotect-inspired-encryption/</loc></url><url><loc>https://www.cypro.se/2025/01/09/major-vulnerabilities-patched-in-sonicwall-palo-alto-expedition-and-aviatrix-controllers/</loc></url><url><loc>https://www.cypro.se/2025/01/10/hands-on-walkthrough-microsegmentation-for-all-users-workloads-and-devices-by-elisity/</loc></url><url><loc>https://www.cypro.se/2025/01/10/google-project-zero-researcher-uncovers-zero-click-exploit-targeting-samsung-devices/</loc></url><url><loc>https://www.cypro.se/2025/01/10/reddelta-deploys-plugx-malware-to-target-mongolia-and-taiwan-in-espionage-campaigns/</loc></url><url><loc>https://www.cypro.se/2025/01/10/crowdstrike-warns-of-phishing-scam-targeting-job-seekers-with-xmrig-cryptominer/</loc></url><url><loc>https://www.cypro.se/2025/01/10/taking-the-pain-out-of-cybersecurity-reporting-a-practical-guide-for-msps/</loc></url><url><loc>https://www.cypro.se/2025/01/10/ai-driven-ransomware-funksec-targets-85-victims-using-double-extortion-tactics/</loc></url><url><loc>https://www.cypro.se/2025/01/11/microsoft-sues-hacking-group-exploiting-azure-ai-for-harmful-content-creation/</loc></url><url><loc>https://www.cypro.se/2025/01/11/doj-indicts-three-russians-for-operating-crypto-mixers-used-in-cybercrime-laundering/</loc></url><url><loc>https://www.cypro.se/2025/01/13/wordpress-skimmers-evade-detection-by-injecting-themselves-into-database-tables/</loc></url><url><loc>https://www.cypro.se/2025/01/13/expired-domains-allowed-control-over-4000-backdoors-on-compromised-systems/</loc></url><url><loc>https://www.cypro.se/2025/01/13/%e2%9a%a1-thn-weekly-recap-top-cybersecurity-threats-tools-and-tips-13-january/</loc></url><url><loc>https://www.cypro.se/2025/01/13/ransomware-on-esxi-the-mechanization-of-virtualized-attacks/</loc></url><url><loc>https://www.cypro.se/2025/01/13/hackers-exploit-aviatrix-controller-vulnerability-to-deploy-backdoors-and-crypto-miners/</loc></url><url><loc>https://www.cypro.se/2025/01/14/cisa-adds-second-beyondtrust-flaw-to-kev-catalog-amid-active-attacks/</loc></url><url><loc>https://www.cypro.se/2025/01/14/illicit-huione-telegram-market-surpasses-hydra-hits-24-billion-in-crypto-transactions/</loc></url><url><loc>https://www.cypro.se/2025/01/14/zero-day-vulnerability-suspected-in-attacks-on-fortinet-firewalls-with-exposed-interfaces/</loc></url><url><loc>https://www.cypro.se/2025/01/14/4-reasons-your-saas-attack-surface-can-no-longer-be-ignored/</loc></url><url><loc>https://www.cypro.se/2025/01/14/russian-linked-hackers-target-kazakhstan-in-espionage-campaign-with-hatvibe-malware/</loc></url><url><loc>https://www.cypro.se/2025/01/14/microsoft-uncovers-macos-vulnerability-cve-2024-44243-allowing-rootkit-installation/</loc></url><url><loc>https://www.cypro.se/2025/01/14/google-oauth-vulnerability-exposes-millions-via-failed-startup-domains/</loc></url><url><loc>https://www.cypro.se/2025/01/15/3-actively-exploited-zero-day-flaws-patched-in-microsofts-latest-security-update/</loc></url><url><loc>https://www.cypro.se/2025/01/15/critical-simplehelp-flaws-allow-file-theft-privilege-escalation-and-rce-attacks/</loc></url><url><loc>https://www.cypro.se/2025/01/15/fbi-deletes-plugx-malware-from-4250-hacked-computers-in-multi-month-operation/</loc></url><url><loc>https://www.cypro.se/2025/01/14/passkeys-theyre-not-perfect-but-theyre-getting-better/</loc></url><url><loc>https://www.cypro.se/2025/01/14/passkeys-the-promise-of-a-simpler-and-safer-alternative-to-passwords/</loc></url><url><loc>https://www.cypro.se/2025/01/15/google-cloud-researchers-uncover-flaws-in-rsync-file-synchronization-tool/</loc></url><url><loc>https://www.cypro.se/2025/01/15/the-high-stakes-disconnect-for-ics-ot-security/</loc></url><url><loc>https://www.cypro.se/2025/01/15/north-korean-it-worker-fraud-linked-to-2016-crowdfunding-scam-and-fake-domains/</loc></url><url><loc>https://www.cypro.se/2025/01/15/google-ads-users-targeted-in-malvertising-scam-stealing-credentials-and-2fa-codes/</loc></url><url><loc>https://www.cypro.se/2025/01/15/lazarus-group-targets-web3-developers-with-fake-linkedin-profiles-in-operation-99/</loc></url><url><loc>https://www.cypro.se/2025/01/16/python-based-malware-powers-ransomhub-ransomware-to-exploit-network-flaws/</loc></url><url><loc>https://www.cypro.se/2025/01/16/researcher-uncovers-critical-flaws-in-multiple-versions-of-ivanti-endpoint-manager/</loc></url><url><loc>https://www.cypro.se/2025/01/16/the-10-cyber-threat-responsible-for-the-biggest-breaches-of-2024/</loc></url><url><loc>https://www.cypro.se/2025/01/16/new-uefi-secure-boot-vulnerability-could-allow-attackers-to-load-malicious-bootkits/</loc></url><url><loc>https://www.cypro.se/2025/01/16/researchers-find-exploit-allowing-ntlmv1-despite-active-directory-restrictions/</loc></url><url><loc>https://www.cypro.se/2025/01/16/hackers-hide-malware-in-images-to-deploy-vip-keylogger-and-0bj3ctivity-stealer/</loc></url><url><loc>https://www.cypro.se/2025/01/16/ready-to-simplify-trust-management-join-free-webinar-to-see-digicert-one-in-action/</loc></url><url><loc>https://www.cypro.se/2025/01/16/russian-star-blizzard-shifts-tactics-to-exploit-whatsapp-qr-codes-for-credential-harvesting/</loc></url><url><loc>https://www.cypro.se/2025/01/17/european-privacy-group-sues-tiktok-and-aliexpress-for-illicit-data-transfers-to-china/</loc></url><url><loc>https://www.cypro.se/2025/01/17/how-to-bring-zero-trust-to-wi-fi-security-with-a-cloud-based-captive-portal/</loc></url><url><loc>https://www.cypro.se/2025/01/17/new-sneaky-2fa-phishing-kit-targets-microsoft-365-accounts-with-2fa-code-bypass/</loc></url><url><loc>https://www.cypro.se/2025/01/17/u-s-sanctions-north-korean-it-worker-network-supporting-wmd-programs/</loc></url><url><loc>https://www.cypro.se/2025/01/17/python-based-bots-exploiting-php-servers-fuel-gambling-platform-proliferation/</loc></url><url><loc>https://www.cypro.se/2025/01/17/critical-flaws-in-wgs-804hpt-switches-enable-rce-and-network-exploitation/</loc></url><url><loc>https://www.cypro.se/2025/01/18/u-s-sanctions-chinese-cybersecurity-firm-over-treasury-hack-tied-to-silk-typhoon/</loc></url><url><loc>https://www.cypro.se/2025/01/19/tiktok-goes-dark-in-the-u-s-as-federal-ban-takes-effect-january-19-2025/</loc></url><url><loc>https://www.cypro.se/2025/01/20/hackers-deploy-malicious-npm-packages-to-steal-solana-wallet-keys-via-gmail-smtp/</loc></url><url><loc>https://www.cypro.se/2025/01/20/%e2%9a%a1-thn-weekly-recap-top-cybersecurity-threats-tools-and-tips-20-january/</loc></url><url><loc>https://www.cypro.se/2025/01/20/product-walkthrough-how-satori-secures-sensitive-data-from-production-to-ai/</loc></url><url><loc>https://www.cypro.se/2025/01/20/unsecured-tunneling-protocols-expose-4-2-million-hosts-including-vpns-and-routers/</loc></url><url><loc>https://www.cypro.se/2025/01/20/donot-team-linked-to-new-tanzeem-android-malware-targeting-intelligence-collection/</loc></url><url><loc>https://www.cypro.se/2025/01/21/cert-ua-warns-of-cyber-scams-using-fake-anydesk-requests-for-fraudulent-security-audits/</loc></url><url><loc>https://www.cypro.se/2025/01/21/pngplug-loader-delivers-valleyrat-malware-through-fake-software-installers/</loc></url><url><loc>https://www.cypro.se/2025/01/21/hackgate-setting-new-standards-for-visibility-and-control-in-penetration-testing-projects/</loc></url><url><loc>https://www.cypro.se/2025/01/21/ex-cia-analyst-pleads-guilty-to-sharing-top-secret-data-with-unauthorized-parties/</loc></url><url><loc>https://www.cypro.se/2025/01/21/mirai-variant-murdoc_botnet-exploits-avtech-ip-cameras-and-huawei-routers/</loc></url><url><loc>https://www.cypro.se/2025/01/21/13000-mikrotik-routers-hijacked-by-botnet-for-malspam-and-cyberattacks/</loc></url><url><loc>https://www.cypro.se/2025/04/08/open-industrial-digital-ecosystem-summit/</loc></url><url><loc>https://www.cypro.se/2025/01/22/mirai-botnet-launches-record-5-6-tbps-ddos-attack-with-13000-iot-device/</loc></url><url><loc>https://www.cypro.se/2025/01/22/oracle-releases-january-2025-patch-to-address-318-flaws-across-major-products/</loc></url><url><loc>https://www.cypro.se/2025/01/22/plushdaemon-apt-targets-south-korean-vpn-provider-in-supply-chain-attack/</loc></url><url><loc>https://www.cypro.se/2025/01/22/discover-hidden-browsing-threats-free-risk-assessment-for-genai-identity-web-and-saas-risks/</loc></url><url><loc>https://www.cypro.se/2025/01/22/president-trump-pardons-silk-road-creator-ross-ulbricht-after-11-years-in-prison/</loc></url><url><loc>https://www.cypro.se/2025/01/22/hackers-exploit-zero-day-in-cnpilot-routers-to-deploy-airashi-ddos-botnet/</loc></url><url><loc>https://www.cypro.se/2025/05/07/5th-high-performance-computing-security-workshop/</loc></url><url><loc>https://www.cypro.se/2025/01/22/trump-terminates-dhs-advisory-committee-memberships-disrupting-cybersecurity-review/</loc></url><url><loc>https://www.cypro.se/2025/01/22/acd-2-0-exploration-into-attack-surface-management-completed/</loc></url><url><loc>https://www.cypro.se/2025/01/21/set-security-goals-for-2025/</loc></url><url><loc>https://www.cypro.se/2025/01/06/a-parents-guide-keeping-your-kids-safe-in-a-digital-world/</loc></url><url><loc>https://www.cypro.se/2025/01/23/triplestrength-hits-cloud-for-cryptojacking-on-premises-systems-for-ransomware/</loc></url><url><loc>https://www.cypro.se/2025/01/23/cisco-fixes-critical-privilege-escalation-flaw-in-meeting-management-cvss-9-9/</loc></url><url><loc>https://www.cypro.se/2025/01/23/qakbot-linked-bc-malware-adds-enhanced-dns-tunneling-and-remote-access-features/</loc></url><url><loc>https://www.cypro.se/2025/01/23/how-to-eliminate-identity-based-threats/</loc></url><url><loc>https://www.cypro.se/2025/01/23/sonicwall-urges-immediate-patch-for-critical-cve-2025-23006-flaw-amid-likely-exploitation/</loc></url><url><loc>https://www.cypro.se/2025/01/23/new-research-the-state-of-web-exposure-2025/</loc></url><url><loc>https://www.cypro.se/2025/01/23/experts-find-shared-codebase-linking-morpheus-and-hellcat-ransomware-payloads/</loc></url><url><loc>https://www.cypro.se/2025/01/23/palo-alto-firewalls-found-vulnerable-to-secure-boot-bypass-and-firmware-exploits/</loc></url><url><loc>https://www.cypro.se/2025/01/23/beware-fake-captcha-campaign-spreads-lumma-stealer-in-multi-industry-attacks/</loc></url><url><loc>https://www.cypro.se/2025/01/23/custom-backdoor-exploiting-magic-packet-vulnerability-in-juniper-routers/</loc></url><url><loc>https://www.cypro.se/2025/01/24/cisa-adds-five-year-old-jquery-xss-flaw-to-exploited-vulnerabilities-list/</loc></url><url><loc>https://www.cypro.se/2025/01/24/androids-new-identity-check-feature-locks-device-settings-outside-trusted-locations/</loc></url><url><loc>https://www.cypro.se/2025/01/24/doj-indicts-5-individuals-for-866k-north-korean-it-worker-scheme-violations/</loc></url><url><loc>https://www.cypro.se/2025/01/24/2025-state-of-saas-backup-and-recovery-report/</loc></url><url><loc>https://www.cypro.se/2025/01/24/ransacked-over-100-security-flaws-found-in-lte-and-5g-network-implementations/</loc></url><url><loc>https://www.cypro.se/2025/01/26/metas-llama-framework-flaw-exposes-ai-systems-to-remote-code-execution-risks/</loc></url><url><loc>https://www.cypro.se/2025/01/27/mintsloader-delivers-stealc-malware-and-boinc-in-targeted-cyber-attacks/</loc></url><url><loc>https://www.cypro.se/2025/01/27/gamacopy-mimics-gamaredon-tactics-in-cyber-espionage-targeting-russian-entities/</loc></url><url><loc>https://www.cypro.se/2025/01/27/do-we-really-need-the-owasp-nhi-top-10/</loc></url><url><loc>https://www.cypro.se/2025/01/27/%e2%9a%a1-thn-weekly-recap-top-cybersecurity-threats-tools-and-tips-27-january/</loc></url><url><loc>https://www.cypro.se/2025/01/27/github-desktop-vulnerability-risks-credential-leaks-via-malicious-remote-urls/</loc></url><url><loc>https://www.cypro.se/2025/03/05/workshop-on-foundational-cybersecurity-activities-for-iot-device-manufacturers/</loc></url><url><loc>https://www.cypro.se/2025/01/28/apple-patches-actively-exploited-zero-day-affecting-iphones-macs-and-more/</loc></url><url><loc>https://www.cypro.se/2025/01/28/top-rated-chinese-ai-app-deepseek-limits-registrations-amid-cyberattacks/</loc></url><url><loc>https://www.cypro.se/2025/01/28/a-method-to-assess-forgivable-vs-unforgivable-vulnerabilities/</loc></url><url><loc>https://www.cypro.se/2025/01/28/eradicating-trivial-vulnerabilities-at-scale/</loc></url><url><loc>https://www.cypro.se/2025/01/28/ransomware-targets-esxi-systems-via-stealthy-ssh-tunnels-for-c2-operations/</loc></url><url><loc>https://www.cypro.se/2025/01/28/how-long-does-it-take-hackers-to-crack-modern-hashing-algorithms/</loc></url><url><loc>https://www.cypro.se/2025/01/28/e-u-sanctions-3-russian-nationals-for-cyber-attacks-targeting-estonias-key-ministries/</loc></url><url><loc>https://www.cypro.se/2025/01/28/ai-soc-analysts-propelling-secops-into-the-future/</loc></url><url><loc>https://www.cypro.se/2025/01/28/oauth-redirect-flaw-in-airline-travel-integration-exposes-millions-to-account-hijacking/</loc></url><url><loc>https://www.cypro.se/2025/01/28/purecrypter-deploys-agent-tesla-and-new-tornet-backdoor-in-ongoing-cyberattacks/</loc></url><url><loc>https://www.cypro.se/2025/01/29/uac-0063-expands-cyber-attacks-to-european-embassies-using-stolen-documents/</loc></url><url><loc>https://www.cypro.se/2025/01/29/broadcom-warns-of-high-severity-sql-injection-flaw-in-vmware-avi-load-balancer/</loc></url><url><loc>https://www.cypro.se/2025/01/29/zyxel-cpe-devices-face-active-exploitation-due-to-unpatched-cve-2024-40891-vulnerability/</loc></url><url><loc>https://www.cypro.se/2025/01/29/how-interlock-ransomware-infects-healthcare-organizations/</loc></url><url><loc>https://www.cypro.se/2025/01/29/critical-cacti-security-flaw-cve-2025-22604-enables-remote-code-execution/</loc></url><url><loc>https://www.cypro.se/2025/01/29/ai-in-cybersecurity-whats-effective-and-whats-not-insights-from-200-experts/</loc></url><url><loc>https://www.cypro.se/2025/01/29/new-slap-flop-attacks-expose-apple-m-series-chips-to-speculative-execution-exploits/</loc></url><url><loc>https://www.cypro.se/2025/01/29/preserving-integrity-in-the-age-of-generative-ai/</loc></url><url><loc>https://www.cypro.se/2025/01/29/lazarus-group-uses-react-based-admin-panel-to-control-global-cyber-attacks/</loc></url><url><loc>https://www.cypro.se/2025/01/30/unpatched-php-voyager-flaws-leave-servers-open-to-one-click-rce-exploits/</loc></url><url><loc>https://www.cypro.se/2025/01/30/new-aquabot-botnet-exploits-cve-2024-41710-in-mitel-phones-for-ddos-attacks/</loc></url><url><loc>https://www.cypro.se/2025/01/30/soc-analysts-reimagining-their-role-using-ai/</loc></url><url><loc>https://www.cypro.se/2025/01/30/deepseek-ai-database-exposed-over-1-million-log-lines-secret-keys-leaked/</loc></url><url><loc>https://www.cypro.se/2025/01/30/authorities-seize-domains-of-popular-hacking-forums-in-major-cybercrime-crackdown/</loc></url><url><loc>https://www.cypro.se/2025/01/30/lightning-ai-studio-vulnerability-allowed-rce-via-hidden-url-parameter/</loc></url><url><loc>https://www.cypro.se/2025/01/30/google-over-57-nation-state-threat-groups-using-ai-for-cyber-operations/</loc></url><url><loc>https://www.cypro.se/2025/01/31/broadcom-patches-vmware-aria-flaws-exploits-may-lead-to-credential-theft/</loc></url><url><loc>https://www.cypro.se/2025/01/31/top-5-ai-powered-social-engineering-attacks/</loc></url><url><loc>https://www.cypro.se/2025/01/31/italy-bans-chinese-deepseek-ai-over-data-privacy-and-ethical-concerns/</loc></url><url><loc>https://www.cypro.se/2025/01/31/google-bans-158000-malicious-android-app-developer-accounts-in-2024/</loc></url><url><loc>https://www.cypro.se/2025/01/31/cisa-and-fda-warn-of-critical-backdoor-in-contec-cms8000-patient-monitors/</loc></url><url><loc>https://www.cypro.se/2025/02/01/malvertising-scam-uses-fake-google-ads-to-hijack-microsoft-advertising-accounts/</loc></url><url><loc>https://www.cypro.se/2025/02/01/meta-confirms-zero-click-whatsapp-spyware-attack-targeting-90-journalists-activists/</loc></url><url><loc>https://www.cypro.se/2025/02/01/beyondtrust-zero-day-breach-exposes-17-saas-customers-via-compromised-api-key/</loc></url><url><loc>https://www.cypro.se/2025/02/01/u-s-and-dutch-authorities-dismantle-39-domains-linked-to-bec-fraud-network/</loc></url><url><loc>https://www.cypro.se/2025/02/03/crazy-evil-gang-targets-crypto-with-stealc-amos-and-angel-drainer-malware/</loc></url><url><loc>https://www.cypro.se/2025/02/03/%e2%9a%a1-thn-weekly-recap-top-cybersecurity-threats-tools-and-tips-27-february/</loc></url><url><loc>https://www.cypro.se/2025/02/03/coyote-malware-expands-reach-now-targets-1030-sites-and-73-financial-institutions/</loc></url><url><loc>https://www.cypro.se/2025/02/03/what-is-attack-surface-management/</loc></url><url><loc>https://www.cypro.se/2025/02/03/768-cves-exploited-in-2024-reflecting-a-20-increase-from-639-in-2023/</loc></url><url><loc>https://www.cypro.se/2025/02/03/pypi-introduces-archival-status-to-alert-users-about-unmaintained-python-packages/</loc></url><url><loc>https://www.cypro.se/2025/02/04/microsoft-sharepoint-connector-flaw-couldve-enabled-credential-theft-across-power-platform/</loc></url><url><loc>https://www.cypro.se/2025/02/04/microsoft-patches-critical-azure-ai-face-service-vulnerability-with-cvss-9-9-score/</loc></url><url><loc>https://www.cypro.se/2025/02/04/google-patches-47-android-security-flaws-including-actively-exploited-cve-2024-53104/</loc></url><url><loc>https://www.cypro.se/2025/02/04/taiwan-bans-deepseek-ai-over-national-security-concerns-citing-data-leakage-risks/</loc></url><url><loc>https://www.cypro.se/2025/02/04/amd-sev-snp-vulnerability-allows-malicious-microcode-injection-with-admin-access/</loc></url><url><loc>https://www.cypro.se/2025/02/04/watch-out-for-these-8-cloud-security-shifts-in-2025/</loc></url><url><loc>https://www.cypro.se/2025/02/04/russian-cybercrime-groups-exploiting-7-zip-flaw-to-bypass-windows-motw-protections/</loc></url><url><loc>https://www.cypro.se/2025/02/04/north-korean-hackers-deploy-ferret-malware-via-fake-job-interviews-on-macos/</loc></url><url><loc>https://www.cypro.se/2025/02/04/malicious-go-package-exploits-module-mirror-caching-for-persistent-remote-access/</loc></url><url><loc>https://www.cypro.se/2025/02/04/guidance-on-digital-forensics-and-protective-monitoring-specifications-for-producers-of-network-devices-and-appliances/</loc></url><url><loc>https://www.cypro.se/2025/02/05/cisa-adds-four-actively-exploited-vulnerabilities-to-kev-catalog-urges-fixes-by-feb-25/</loc></url><url><loc>https://www.cypro.se/2025/02/05/asyncrat-campaign-uses-python-payloads-and-trycloudflare-tunnels-for-stealth-attacks/</loc></url><url><loc>https://www.cypro.se/2025/02/05/navigating-the-future-key-it-vulnerability-management-trends/</loc></url><url><loc>https://www.cypro.se/2025/02/05/new-veeam-flaw-allows-arbitrary-code-execution-via-man-in-the-middle-attack/</loc></url><url><loc>https://www.cypro.se/2025/02/05/cybercriminals-use-go-resty-and-node-fetch-in-13-million-password-spraying-attempts/</loc></url><url><loc>https://www.cypro.se/2025/02/05/silent-lynx-using-powershell-golang-and-c-loaders-in-multi-stage-cyberattacks/</loc></url><url><loc>https://www.cypro.se/2025/02/05/cross-platform-javascript-stealer-targets-crypto-wallets-in-new-lazarus-group-campaign/</loc></url><url><loc>https://www.cypro.se/2025/02/03/healthcare-cyberattacks-on-the-rise/</loc></url><url><loc>https://www.cypro.se/2025/02/06/network-security-fundamentals/</loc></url><url><loc>https://www.cypro.se/2025/02/06/cisco-patches-critical-ise-vulnerabilities-enabling-root-cmdexec-and-privesc/</loc></url><url><loc>https://www.cypro.se/2025/02/06/top-3-ransomware-threats-active-in-2025/</loc></url><url><loc>https://www.cypro.se/2025/02/06/sparkcat-malware-uses-ocr-to-extract-crypto-wallet-recovery-phrases-from-images/</loc></url><url><loc>https://www.cypro.se/2025/02/06/the-evolving-role-of-pam-in-cybersecurity-leadership-agendas-for-2025/</loc></url><url><loc>https://www.cypro.se/2025/02/06/north-korean-apt-kimsuky-uses-forcecopy-malware-to-steal-browser-stored-credentials/</loc></url><url><loc>https://www.cypro.se/2025/02/06/fake-google-chrome-sites-distribute-valleyrat-malware-via-dll-hijacking/</loc></url><url><loc>https://www.cypro.se/2025/02/06/ransomware-extortion-drops-to-813-5m-in-2024-down-from-1-25b-in-2023/</loc></url><url><loc>https://www.cypro.se/2025/02/07/hackers-exploiting-simplehelp-rmm-flaws-for-persistent-access-and-ransomware/</loc></url><url><loc>https://www.cypro.se/2025/02/07/indias-rbi-introduces-exclusive-bank-in-domain-to-combat-digital-banking-fraud/</loc></url><url><loc>https://www.cypro.se/2025/02/07/ai-powered-social-engineering-reinvented-threats/</loc></url><url><loc>https://www.cypro.se/2025/02/07/microsoft-identifies-3000-publicly-disclosed-asp-net-machine-keys-vulnerable-to-code-injection/</loc></url><url><loc>https://www.cypro.se/2025/02/07/cisa-warns-of-active-exploitation-in-trimble-cityworks-vulnerability-leading-to-iis-rce/</loc></url><url><loc>https://www.cypro.se/2025/02/07/deepseek-app-transmits-sensitive-user-and-device-data-without-encryption/</loc></url><url><loc>https://www.cypro.se/2025/02/08/malicious-ml-models-on-hugging-face-leverage-broken-pickle-format-to-evade-detection/</loc></url><url><loc>https://www.cypro.se/2025/02/10/xe-hacker-group-exploits-veracore-zero-day-to-deploy-persistent-web-shells/</loc></url><url><loc>https://www.cypro.se/2025/02/10/zimbra-releases-security-updates-for-sql-injection-stored-xss-and-ssrf-vulnerabilities/</loc></url><url><loc>https://www.cypro.se/2025/02/10/dragonrank-exploits-iis-servers-with-badiis-malware-for-seo-fraud-and-gambling-redirects/</loc></url><url><loc>https://www.cypro.se/2025/02/10/dont-overlook-these-6-critical-okta-security-configurations/</loc></url><url><loc>https://www.cypro.se/2025/02/10/%e2%9a%a1-thn-weekly-recap-top-cybersecurity-threats-tools-and-tips-10-february/</loc></url><url><loc>https://www.cypro.se/2025/02/10/hackers-exploit-google-tag-manager-to-deploy-credit-card-skimmers-on-magento-stores/</loc></url><url><loc>https://www.cypro.se/2025/02/11/apple-patches-actively-exploited-ios-zero-day-cve-2025-24200-in-emergency-update/</loc></url><url><loc>https://www.cypro.se/2025/02/11/8base-ransomware-data-leak-sites-seized-in-international-law-enforcement-operation/</loc></url><url><loc>https://www.cypro.se/2025/02/11/protecting-your-software-supply-chain-assessing-the-risks-before-deployment/</loc></url><url><loc>https://www.cypro.se/2025/02/11/threat-actors-exploit-clickfix-to-deploy-netsupport-rat-in-latest-cyber-attacks/</loc></url><url><loc>https://www.cypro.se/2025/02/11/progress-software-patches-high-severity-loadmaster-flaws-affecting-multiple-versions/</loc></url><url><loc>https://www.cypro.se/2025/02/11/gcore-ddos-radar-reveals-56-yoy-increase-in-ddos-attacks/</loc></url><url><loc>https://www.cypro.se/2025/02/11/growing-positive-security-cultures/</loc></url><url><loc>https://www.cypro.se/2025/02/11/4-ways-to-keep-mfa-from-becoming-too-much-of-a-good-thing/</loc></url><url><loc>https://www.cypro.se/2025/02/11/google-confirms-android-safetycore-enables-ai-powered-on-device-content-classification/</loc></url><url><loc>https://www.cypro.se/2025/02/12/ivanti-patches-critical-flaws-in-connect-secure-and-policy-secure-update-now/</loc></url><url><loc>https://www.cypro.se/2025/02/12/microsofts-patch-tuesday-fixes-63-flaws-including-two-under-active-exploitation/</loc></url><url><loc>https://www.cypro.se/2025/02/12/north-korean-hackers-exploit-powershell-trick-to-hijack-devices-in-new-cyberattack/</loc></url><url><loc>https://www.cypro.se/2025/02/12/how-to-steer-ai-adoption-a-ciso-guide/</loc></url><url><loc>https://www.cypro.se/2025/02/12/researchers-find-new-exploit-bypassing-patched-nvidia-container-toolkit-vulnerability/</loc></url><url><loc>https://www.cypro.se/2025/02/12/microsoft-uncovers-sandworm-subgroups-global-cyber-attacks-spanning-15-countries/</loc></url><url><loc>https://www.cypro.se/2025/02/13/finaldraft-malware-exploits-microsoft-graph-api-for-espionage-on-windows-and-linux/</loc></url><url><loc>https://www.cypro.se/2025/02/13/palo-alto-networks-patches-authentication-bypass-exploit-in-pan-os-software/</loc></url><url><loc>https://www.cypro.se/2025/02/13/hackers-exploited-pan-os-flaw-to-deploy-chinese-malware-in-ransomware-attack/</loc></url><url><loc>https://www.cypro.se/2025/02/13/ai-and-security-a-new-puzzle-to-figure-out/</loc></url><url><loc>https://www.cypro.se/2025/02/13/fast-deployments-secure-code-watch-this-learn-to-sync-dev-and-sec-teams/</loc></url><url><loc>https://www.cypro.se/2025/02/13/north-korean-apt43-uses-powershell-and-dropbox-in-targeted-south-korea-cyberattacks/</loc></url><url><loc>https://www.cypro.se/2025/02/13/hackers-use-captcha-trick-on-webflow-cdn-pdfs-to-bypass-security-scanners/</loc></url><url><loc>https://www.cypro.se/2025/02/14/postgresql-vulnerability-exploited-alongside-beyondtrust-zero-day-in-targeted-attacks/</loc></url><url><loc>https://www.cypro.se/2025/02/14/ai-powered-social-engineering-ancillary-tools-and-techniques/</loc></url><url><loc>https://www.cypro.se/2025/02/14/microsoft-russian-linked-hackers-using-device-code-phishing-to-hijack-accounts/</loc></url><url><loc>https://www.cypro.se/2025/02/14/ransomhub-becomes-2024s-top-ransomware-group-hitting-600-organizations-globally/</loc></url><url><loc>https://www.cypro.se/2025/02/14/lazarus-group-deploys-marstech1-javascript-implant-in-targeted-developer-attacks/</loc></url><url><loc>https://www.cypro.se/2025/02/14/new-whoami-attack-exploits-aws-ami-name-confusion-for-remote-code-execution/</loc></url><url><loc>https://www.cypro.se/2025/02/15/androids-new-feature-blocks-fraudsters-from-sideloading-apps-during-calls/</loc></url><url><loc>https://www.cypro.se/2025/02/17/%e2%9a%a1-thn-weekly-recap-google-secrets-stolen-windows-hack-new-crypto-scams-and-more/</loc></url><url><loc>https://www.cypro.se/2025/02/17/new-golang-based-backdoor-uses-telegram-bot-api-for-evasive-c2-operations/</loc></url><url><loc>https://www.cypro.se/2025/02/17/cisos-expert-guide-to-ctem-and-why-it-matters/</loc></url><url><loc>https://www.cypro.se/2025/02/17/south-korea-suspends-deepseek-ai-downloads-over-privacy-violations/</loc></url><url><loc>https://www.cypro.se/2025/02/17/microsoft-uncovers-new-xcsset-macos-malware-variant-with-advanced-obfuscation-tactics/</loc></url><url><loc>https://www.cypro.se/2025/02/18/cybercriminals-exploit-onerror-event-in-image-tags-to-deploy-payment-skimmers/</loc></url><url><loc>https://www.cypro.se/2025/02/18/new-xerox-printer-flaws-could-let-attackers-capture-windows-active-directory-credentials/</loc></url><url><loc>https://www.cypro.se/2025/02/18/debunking-the-ai-hype-inside-real-hacker-tactics/</loc></url><url><loc>https://www.cypro.se/2025/02/18/winnti-apt41-targets-japanese-firms-in-revivalstone-cyber-espionage-campaign/</loc></url><url><loc>https://www.cypro.se/2025/02/18/juniper-session-smart-routers-vulnerability-could-let-attackers-bypass-authentication/</loc></url><url><loc>https://www.cypro.se/2025/02/18/new-frigidstealer-malware-targets-macos-users-via-fake-browser-updates/</loc></url><url><loc>https://www.cypro.se/2025/02/18/chinese-hackers-exploit-mavinject-exe-to-evade-detection-in-targeted-cyber-attacks/</loc></url><url><loc>https://www.cypro.se/2025/02/18/new-openssh-flaws-enable-man-in-the-middle-and-dos-attacks-patch-now/</loc></url><url><loc>https://www.cypro.se/2025/02/19/cisa-adds-palo-alto-networks-and-sonicwall-flaws-to-exploited-vulnerabilities-list/</loc></url><url><loc>https://www.cypro.se/2025/02/19/trojanized-game-installers-deploy-cryptocurrency-miner-in-large-scale-starydobry-attack/</loc></url><url><loc>https://www.cypro.se/2025/02/19/mikey-sakke-frequently-asked-questions/</loc></url><url><loc>https://www.cypro.se/2025/02/19/new-snake-keylogger-variant-leverages-autoit-scripting-to-evade-detection/</loc></url><url><loc>https://www.cypro.se/2025/02/19/the-ultimate-msp-guide-to-structuring-and-selling-vciso-services/</loc></url><url><loc>https://www.cypro.se/2025/02/19/pattern-safely-importing-data/</loc></url><url><loc>https://www.cypro.se/2025/02/19/effective-steps-to-cyber-exercise-creation/</loc></url><url><loc>https://www.cypro.se/2025/02/19/gdpr-security-outcomes/</loc></url><url><loc>https://www.cypro.se/2025/02/19/design-pattern-safely-exporting-data/</loc></url><url><loc>https://www.cypro.se/2025/02/19/erasing-data-from-donated-devices/</loc></url><url><loc>https://www.cypro.se/2025/02/19/firmware-updates-on-linux-and-using-data-to-influence-procurement-decisions/</loc></url><url><loc>https://www.cypro.se/2025/02/19/what-exactly-should-we-be-logging/</loc></url><url><loc>https://www.cypro.se/2025/02/19/drawing-good-architecture-diagrams/</loc></url><url><loc>https://www.cypro.se/2025/02/19/the-cyber-threat-to-universities/</loc></url><url><loc>https://www.cypro.se/2025/02/19/hackers-exploit-signals-linked-devices-feature-to-hijack-accounts-via-malicious-qr-codes/</loc></url><url><loc>https://www.cypro.se/2025/02/20/citrix-releases-security-fix-for-netscaler-console-privilege-escalation-vulnerability/</loc></url><url><loc>https://www.cypro.se/2025/02/20/microsoft-patches-actively-exploited-power-pages-privilege-escalation-vulnerability/</loc></url><url><loc>https://www.cypro.se/2025/02/20/microsofts-end-of-support-for-exchange-2016-and-2019-what-it-teams-must-do-now/</loc></url><url><loc>https://www.cypro.se/2025/02/20/chinese-linked-attackers-exploit-check-point-flaw-to-deploy-shadowpad-and-ransomware/</loc></url><url><loc>https://www.cypro.se/2025/02/20/pci-dss-4-0-mandates-dmarc-by-31st-march-2025/</loc></url><url><loc>https://www.cypro.se/2025/02/20/cybercriminals-use-eclipse-jarsigner-to-deploy-xloader-malware-via-zip-archives/</loc></url><url><loc>https://www.cypro.se/2025/02/20/north-korean-hackers-target-freelance-developers-in-job-scam-to-deploy-malware/</loc></url><url><loc>https://www.cypro.se/2025/03/20/csf-2-0-webinar-series-implementing-csf-2-0-the-why-what-and-how/</loc></url><url><loc>https://www.cypro.se/2025/02/21/cisco-confirms-salt-typhoon-exploited-cve-2018-0171-to-target-u-s-telecom-networks/</loc></url><url><loc>https://www.cypro.se/2025/02/21/cisa-flags-craft-cms-vulnerability-cve-2025-23209-amid-active-attacks/</loc></url><url><loc>https://www.cypro.se/2025/02/21/ai-powered-deception-is-a-menace-to-our-societies/</loc></url><url><loc>https://www.cypro.se/2025/02/21/webinar-learn-how-to-identify-high-risk-identity-gaps-and-slash-security-debt-in-2025/</loc></url><url><loc>https://www.cypro.se/2025/02/21/cybercriminals-can-now-clone-any-brands-site-in-minutes-using-darcula-phaas-v3/</loc></url><url><loc>https://www.cypro.se/2025/02/21/apple-drops-iclouds-advanced-data-protection-in-the-u-k-amid-encryption-backdoor-demands/</loc></url><url><loc>https://www.cypro.se/2025/02/21/data-leak-exposes-topsecs-role-in-chinas-censorship-as-a-service-operations/</loc></url><url><loc>https://www.cypro.se/2025/02/22/openai-bans-accounts-misusing-chatgpt-for-surveillance-and-influence-campaigns/</loc></url><url><loc>https://www.cypro.se/2025/02/22/bybit-confirms-record-breaking-1-46-billion-crypto-heist-in-sophisticated-cold-wallet-attack/</loc></url><url><loc>https://www.cypro.se/2025/02/24/australia-bans-kaspersky-software-over-national-security-and-espionage-concerns/</loc></url><url><loc>https://www.cypro.se/2025/02/24/%e2%9a%a1-thn-weekly-recap-from-1-5b-crypto-heist-to-ai-misuse-apples-data-dilemma/</loc></url><url><loc>https://www.cypro.se/2025/02/24/becoming-ransomware-ready-why-continuous-validation-is-your-best-defense/</loc></url><url><loc>https://www.cypro.se/2025/02/24/google-cloud-kms-adds-quantum-safe-digital-signatures-to-defend-against-future-threats/</loc></url><url><loc>https://www.cypro.se/2025/02/24/new-malware-campaign-uses-cracked-software-to-spread-lumma-and-acr-stealer/</loc></url><url><loc>https://www.cypro.se/2025/02/25/two-actively-exploited-security-flaws-in-adobe-and-oracle-products-flagged-by-cisa/</loc></url><url><loc>https://www.cypro.se/2025/02/25/fatalrat-phishing-attacks-target-apac-industries-using-chinese-cloud-services/</loc></url><url><loc>https://www.cypro.se/2025/02/25/5-active-malware-campaigns-in-q1-2025/</loc></url><url><loc>https://www.cypro.se/2025/02/25/2500-truesight-sys-driver-variants-exploited-to-bypass-edr-and-deploy-hiddengh0st-rat/</loc></url><url><loc>https://www.cypro.se/2025/02/25/gitvenom-malware-steals-456k-in-bitcoin-using-fake-github-projects-to-hijack-wallets/</loc></url><url><loc>https://www.cypro.se/2025/02/25/lightspy-expands-to-100-commands-increasing-control-over-windows-macos-linux-and-mobile/</loc></url><url><loc>https://www.cypro.se/2025/02/25/belarus-linked-ghostwriter-uses-macropack-obfuscated-excel-macros-to-deploy-malware/</loc></url><url><loc>https://www.cypro.se/2025/02/26/cisa-adds-microsoft-and-zimbra-flaws-to-kev-catalog-amid-active-exploitation/</loc></url><url><loc>https://www.cypro.se/2025/02/26/soc-3-0-the-evolution-of-the-soc-and-how-ai-is-empowering-human-talent/</loc></url><url><loc>https://www.cypro.se/2025/02/26/new-linux-malware-auto-color-grants-hackers-full-remote-access-to-compromised-systems/</loc></url><url><loc>https://www.cypro.se/2025/02/26/three-password-cracking-techniques-and-how-to-defend-against-them/</loc></url><url><loc>https://www.cypro.se/2025/02/26/cert-ua-warns-of-uac-0173-attacks-deploying-dcrat-to-compromise-ukrainian-notaries/</loc></url><url><loc>https://www.cypro.se/2025/02/26/malicious-pypi-package-automslc-enables-104k-unauthorized-deezer-music-downloads/</loc></url><url><loc>https://www.cypro.se/2025/02/26/leaked-black-basta-chat-logs-reveal-107m-ransom-earnings-and-internal-power-struggles/</loc></url><url><loc>https://www.cypro.se/2025/02/26/hackers-exploited-krpano-framework-flaw-to-inject-spam-ads-on-350-websites/</loc></url><url><loc>https://www.cypro.se/2025/02/27/bybit-hack-traced-to-safewallet-supply-chain-attack-exploited-by-north-korean-hackers/</loc></url><url><loc>https://www.cypro.se/2025/02/27/polaredge-botnet-exploits-cisco-and-other-flaws-to-hijack-asus-qnap-and-synology-devices/</loc></url><url><loc>https://www.cypro.se/2024/12/07/systems-administration-architectures/</loc></url><url><loc>https://www.cypro.se/2025/02/27/space-pirates-targets-russian-it-firms-with-new-luckystrike-agent-malware/</loc></url><url><loc>https://www.cypro.se/2025/02/27/89-of-enterprise-genai-usage-is-invisible-to-organizations-exposing-critical-security-risks-new-report-reveals/</loc></url><url><loc>https://www.cypro.se/2025/02/27/new-tgtoxic-banking-trojan-variant-evolves-with-anti-analysis-upgrades/</loc></url><url><loc>https://www.cypro.se/2025/02/27/silver-fox-apt-uses-winos-4-0-malware-in-cyber-attacks-against-taiwanese-organizations/</loc></url><url><loc>https://www.cypro.se/2025/02/18/protect-yourself-from-personal-targeted-scams/</loc></url><url><loc>https://www.cypro.se/2025/02/28/12000-api-keys-and-passwords-found-in-public-datasets-used-for-llm-training/</loc></url><url><loc>https://www.cypro.se/2025/02/28/sticky-werewolf-uses-undocumented-implant-to-deploy-lumma-stealer-in-russia-and-belarus/</loc></url><url><loc>https://www.cypro.se/2025/02/28/microsoft-exposes-llmjacking-cybercriminals-behind-azure-ai-abuse-scheme/</loc></url><url><loc>https://www.cypro.se/2025/02/28/rdp-a-double-edged-sword-for-it-teams-essential-yet-exploitable/</loc></url><url><loc>https://www.cypro.se/2025/02/28/5000-phishing-pdfs-on-260-domains-distribute-lumma-stealer-via-fake-captchas/</loc></url><url><loc>https://www.cypro.se/2025/02/28/amnesty-finds-cellebrites-zero-day-used-to-unlock-serbian-activists-android-phone/</loc></url><url><loc>https://www.cypro.se/2025/03/01/mozilla-updates-firefox-terms-again-after-backlash-over-broad-data-license-language/</loc></url><url><loc>https://www.cypro.se/2025/03/03/vo1d-botnets-peak-surpasses-1-59m-infected-android-tvs-spanning-226-countries/</loc></url><url><loc>https://www.cypro.se/2025/03/03/the-new-ransomware-groups-shaking-up-2025/</loc></url><url><loc>https://www.cypro.se/2025/03/03/%e2%9a%a1-thn-weekly-recap-alerts-on-zero-day-exploits-ai-breaches-and-crypto-heists/</loc></url><url><loc>https://www.cypro.se/2025/03/03/hackers-use-clickfix-trick-to-deploy-powershell-based-havoc-c2-via-sharepoint-sites/</loc></url><url><loc>https://www.cypro.se/2025/03/03/u-k-ico-investigates-tiktok-reddit-and-imgur-over-childrens-data-protection-practices/</loc></url><url><loc>https://www.cypro.se/2025/03/03/hackers-exploit-paragon-partition-manager-driver-vulnerability-in-ransomware-attacks/</loc></url><url><loc>https://www.cypro.se/2025/03/03/hackers-exploit-aws-misconfigurations-to-launch-phishing-attacks-via-ses-and-workmail/</loc></url><url><loc>https://www.cypro.se/2025/03/04/googles-march-2025-android-security-update-fixes-two-actively-exploited-vulnerabilities/</loc></url><url><loc>https://www.cypro.se/2025/03/04/cisco-hitachi-microsoft-and-progress-flaws-actively-exploited-cisa-sounds-alarm/</loc></url><url><loc>https://www.cypro.se/2025/03/04/suspected-iranian-hackers-used-compromised-indian-firms-email-to-target-u-a-e-aviation-sector/</loc></url><url><loc>https://www.cypro.se/2025/03/04/over-4000-isp-ips-targeted-in-brute-force-attacks-to-deploy-info-stealers-and-cryptominers/</loc></url><url><loc>https://www.cypro.se/2025/03/04/ncsc-for-startups-from-hp-labs-to-configured-things/</loc></url><url><loc>https://www.cypro.se/2025/03/04/how-new-ai-agents-will-transform-credential-stuffing-attacks/</loc></url><url><loc>https://www.cypro.se/2025/03/04/vmware-security-flaws-exploited-in-the-wild-broadcom-releases-urgent-patches/</loc></url><url><loc>https://www.cypro.se/2025/03/04/researchers-link-cactus-ransomware-tactics-to-former-black-basta-affiliates/</loc></url><url><loc>https://www.cypro.se/2025/03/05/seven-malicious-go-packages-found-deploying-malware-on-linux-and-macos-systems/</loc></url><url><loc>https://www.cypro.se/2025/03/05/why-cloud-first-is-not-a-security-problem/</loc></url><url><loc>https://www.cypro.se/2025/03/05/ncsc-it-theres-confidence-and-then-theres-saas/</loc></url><url><loc>https://www.cypro.se/2025/03/05/protecting-parked-domains-for-the-uk-public-sector/</loc></url><url><loc>https://www.cypro.se/2025/03/05/theres-a-hole-in-my-bucket/</loc></url><url><loc>https://www.cypro.se/2025/03/05/protecting-system-administration-with-pam/</loc></url><url><loc>https://www.cypro.se/2025/03/05/chinese-apt-lotus-panda-targets-governments-with-new-sagerunex-backdoor-variants/</loc></url><url><loc>https://www.cypro.se/2025/03/05/identity-the-new-cybersecurity-battleground/</loc></url><url><loc>https://www.cypro.se/2025/03/05/defending-against-usb-drive-attacks-with-wazuh/</loc></url><url><loc>https://www.cypro.se/2025/03/05/dark-caracal-uses-poco-rat-to-target-spanish-speaking-enterprises-in-latin-america/</loc></url><url><loc>https://www.cypro.se/2025/03/05/google-rolls-out-ai-scam-detection-for-android-to-combat-conversational-fraud/</loc></url><url><loc>https://www.cypro.se/2025/03/05/china-linked-silk-typhoon-expands-cyber-attacks-to-it-supply-chains-for-initial-access/</loc></url><url><loc>https://www.cypro.se/2025/08/14/nist-small-business-cybersecurity-webinar-protecting-your-small-business-from-phishing-risks/</loc></url><url><loc>https://www.cypro.se/2025/03/05/acd-2-0-insights-from-the-external-attack-surface-management-trials/</loc></url><url><loc>https://www.cypro.se/2025/03/06/u-s-charges-12-chinese-nationals-in-state-backed-hacking-operations/</loc></url><url><loc>https://www.cypro.se/2025/03/06/vulnerability-scanning-keeping-on-top-of-the-most-common-threats/</loc></url><url><loc>https://www.cypro.se/2025/03/06/over-1000-wordpress-sites-infected-with-javascript-backdoors-enabling-persistent-attacker-access/</loc></url><url><loc>https://www.cypro.se/2025/03/06/outsmarting-cyber-threats-with-attack-graphs/</loc></url><url><loc>https://www.cypro.se/2025/03/06/elastic-releases-urgent-fix-for-critical-kibana-vulnerability-enabling-remote-code-execution/</loc></url><url><loc>https://www.cypro.se/2025/03/06/encrypthub-deploys-ransomware-and-stealer-via-trojanized-apps-ppi-services-and-phishing/</loc></url><url><loc>https://www.cypro.se/2025/03/06/medusa-ransomware-hits-40-victims-in-2025-demands-100k-15m-ransom/</loc></url><url><loc>https://www.cypro.se/2025/03/06/nist-finalizes-guidelines-for-evaluating-differential-privacy-guarantees-to-de-identify-data/</loc></url><url><loc>https://www.cypro.se/2025/03/07/php-cgi-rce-flaw-exploited-in-attacks-on-japans-tech-telecom-and-e-commerce-sectors/</loc></url><url><loc>https://www.cypro.se/2025/03/07/safewallet-confirms-north-korean-tradertraitor-hackers-stole-1-5-billion-in-bybit-heist/</loc></url><url><loc>https://www.cypro.se/2025/03/07/this-malicious-pypi-package-stole-ethereum-private-keys-via-polygon-rpc-transactions/</loc></url><url><loc>https://www.cypro.se/2025/03/07/u-s-secret-service-seizes-russian-garantex-crypto-exchange-website/</loc></url><url><loc>https://www.cypro.se/2025/03/07/what-pci-dss-v4-really-means-lessons-from-af-compliance-journey/</loc></url><url><loc>https://www.cypro.se/2025/03/07/webinar-learn-how-aspm-transforms-application-security-from-reactive-to-proactive/</loc></url><url><loc>https://www.cypro.se/2025/03/07/microsoft-warns-of-malvertising-campaign-infecting-over-1-million-devices-worldwide/</loc></url><url><loc>https://www.cypro.se/2025/03/07/fin7-fin8-and-others-use-ragnar-loader-for-persistent-access-and-ransomware-operations/</loc></url><url><loc>https://www.cypro.se/2025/03/10/silentcryptominer-infects-2000-russian-users-via-fake-vpn-and-dpi-bypass-tools/</loc></url><url><loc>https://www.cypro.se/2025/03/10/%e2%9a%a1-thn-weekly-recap-new-attacks-old-tricks-bigger-impact/</loc></url><url><loc>https://www.cypro.se/2025/03/10/why-the-modern-google-workspace-needs-unified-security/</loc></url><url><loc>https://www.cypro.se/2025/03/10/desert-dexter-targets-900-victims-using-facebook-ads-and-telegram-malware-links/</loc></url><url><loc>https://www.cypro.se/2025/03/10/researchers-expose-new-polymorphic-attack-that-clones-browser-extensions-to-steal-credentials/</loc></url><url><loc>https://www.cypro.se/2025/03/11/cisa-adds-five-actively-exploited-vulnerabilities-in-advantive-veracore-and-ivanti-epm-to-kev-list/</loc></url><url><loc>https://www.cypro.se/2025/03/11/sidewinder-apt-targets-maritime-nuclear-and-it-sectors-across-asia-middle-east-and-africa/</loc></url><url><loc>https://www.cypro.se/2025/03/11/moxa-issues-fix-for-critical-authentication-bypass-vulnerability-in-pt-switches/</loc></url><url><loc>https://www.cypro.se/2025/03/11/steganography-explained-how-xworm-hides-inside-images/</loc></url><url><loc>https://www.cypro.se/2025/03/11/ballista-botnet-exploits-unpatched-tp-link-vulnerability-infects-over-6000-devices/</loc></url><url><loc>https://www.cypro.se/2025/03/11/your-risk-scores-are-lying-adversarial-exposure-validation-exposes-real-threats/</loc></url><url><loc>https://www.cypro.se/2025/03/11/nist-selects-hqc-as-fifth-algorithm-for-post-quantum-encryption/</loc></url><url><loc>https://www.cypro.se/2025/03/11/blind-eagle-hacks-colombian-institutions-using-ntlm-flaw-rats-and-github-based-attacks/</loc></url><url><loc>https://www.cypro.se/2025/03/12/apple-releases-patch-for-webkit-zero-day-vulnerability-exploited-in-targeted-attacks/</loc></url><url><loc>https://www.cypro.se/2025/03/12/supplier-assurance-questions/</loc></url><url><loc>https://www.cypro.se/2025/03/12/social-media-protecting-what-you-publish/</loc></url><url><loc>https://www.cypro.se/2025/03/12/secure-communications-principles/</loc></url><url><loc>https://www.cypro.se/2025/03/12/roca-infineon-tpm-and-secure-element-rsa-vulnerability-guidance/</loc></url><url><loc>https://www.cypro.se/2025/03/12/provisioning-and-securing-security-certificates/</loc></url><url><loc>https://www.cypro.se/2025/03/12/operational-technologies/</loc></url><url><loc>https://www.cypro.se/2025/03/12/managing-the-risk-of-cloud-enabled-products/</loc></url><url><loc>https://www.cypro.se/2025/03/12/managing-public-domain-names/</loc></url><url><loc>https://www.cypro.se/2025/03/12/introduction-to-logging-for-security-purposes/</loc></url><url><loc>https://www.cypro.se/2025/03/12/guidance-following-recent-dos-attacks-in-the-run-up-to-the-2019-general-election/</loc></url><url><loc>https://www.cypro.se/2025/03/12/dealing-with-the-solarwinds-orion-compromise/</loc></url><url><loc>https://www.cypro.se/2025/03/12/joint-report-on-publicly-available-hacking-tools/</loc></url><url><loc>https://www.cypro.se/2025/03/12/incident-trends-report-october-2018-april-2019/</loc></url><url><loc>https://www.cypro.se/2025/03/12/high-level-privacy-and-security-design-for-nhs-covid-19-contact-tracing-app/</loc></url><url><loc>https://www.cypro.se/2025/03/12/active-cyber-defence-acd-the-third-year/</loc></url><url><loc>https://www.cypro.se/2025/03/12/using-ipsec-to-protect-data/</loc></url><url><loc>https://www.cypro.se/2025/03/12/urgent-microsoft-patches-57-security-flaws-including-6-actively-exploited-zero-days/</loc></url><url><loc>https://www.cypro.se/2025/03/12/the-cyber-threat-to-uk-business/</loc></url><url><loc>https://www.cypro.se/2025/03/12/summary-of-ncscs-security-analysis-for-the-uk-telecoms-sector/</loc></url><url><loc>https://www.cypro.se/2025/03/12/pentesters-is-ai-coming-for-your-role/</loc></url><url><loc>https://www.cypro.se/2025/03/12/cyber-security-for-schools/</loc></url><url><loc>https://www.cypro.se/2025/03/12/over-400-ips-exploiting-multiple-ssrf-vulnerabilities-in-coordinated-cyber-attack/</loc></url><url><loc>https://www.cypro.se/2025/03/12/intelligent-security-tools-are-they-a-smart-choice-for-you/</loc></url><url><loc>https://www.cypro.se/2025/03/12/chinese-hackers-breach-juniper-networks-routers-with-custom-backdoors-and-rootkits/</loc></url><url><loc>https://www.cypro.se/2025/03/13/ritics-securing-cyber-physical-systems/</loc></url><url><loc>https://www.cypro.se/2025/03/13/meta-warns-of-freetype-vulnerability-cve-2025-27363-with-active-exploitation-risk/</loc></url><url><loc>https://www.cypro.se/2025/03/13/warning-expiring-root-certificate-may-disable-firefox-add-ons-security-features-and-drm-playback/</loc></url><url><loc>https://www.cypro.se/2025/03/13/the-problems-with-patching/</loc></url><url><loc>https://www.cypro.se/2025/03/13/the-problems-with-forcing-regular-password-expiry/</loc></url><url><loc>https://www.cypro.se/2025/03/13/github-uncovers-new-ruby-saml-vulnerabilities-allowing-account-takeover-attacks/</loc></url><url><loc>https://www.cypro.se/2025/03/13/future-proofing-business-continuity-bcdr-trends-and-challenges-for-2025/</loc></url><url><loc>https://www.cypro.se/2025/03/13/north-koreas-scarcruft-deploys-kospy-malware-spying-on-android-users-via-fake-utility-apps/</loc></url><url><loc>https://www.cypro.se/2025/03/13/microsoft-warns-of-clickfix-phishing-campaign-targeting-hospitality-sector-via-fake-booking-com-emails/</loc></url><url><loc>https://www.cypro.se/2025/03/14/obscurebat-malware-uses-fake-captcha-pages-to-deploy-rootkit-r77-and-evade-detection/</loc></url><url><loc>https://www.cypro.se/2025/03/14/new-massjacker-malware-targets-piracy-users-hijacking-cryptocurrency-transactions/</loc></url><url><loc>https://www.cypro.se/2025/03/14/live-ransomware-demo-see-how-hackers-breach-networks-and-demand-a-ransom/</loc></url><url><loc>https://www.cypro.se/2025/03/14/why-most-microsegmentation-projects-fail-and-how-andelyn-biosciences-got-it-right/</loc></url><url><loc>https://www.cypro.se/2025/03/14/gsma-confirms-end-to-end-encryption-for-rcs-enabling-secure-cross-platform-messaging/</loc></url><url><loc>https://www.cypro.se/2025/03/14/alleged-israeli-lockbit-developer-rostislav-panev-extradited-to-u-s-for-cybercrime-charges/</loc></url><url><loc>https://www.cypro.se/2025/03/15/malicious-pypi-packages-stole-cloud-tokens-over-14100-downloads-before-removal/</loc></url><url><loc>https://www.cypro.se/2025/03/17/github-action-compromise-puts-ci-cd-secrets-at-risk-in-over-23000-repositories/</loc></url><url><loc>https://www.cypro.se/2025/03/17/%e2%9a%a1-thn-weekly-recap-router-hacks-pypi-attacks-new-ransomware-decryptor-and-more/</loc></url><url><loc>https://www.cypro.se/2025/03/17/sans-institute-warns-of-novel-cloud-native-ransomware-attacks/</loc></url><url><loc>https://www.cypro.se/2025/03/17/unpatched-edimax-camera-flaw-exploited-for-mirai-botnet-attacks-since-last-year/</loc></url><url><loc>https://www.cypro.se/2025/03/17/cybercriminals-exploit-css-to-evade-spam-filters-and-track-email-users-actions/</loc></url><url><loc>https://www.cypro.se/2025/03/17/apache-tomcat-vulnerability-actively-exploited-just-30-hours-after-public-disclosure/</loc></url><url><loc>https://www.cypro.se/2025/03/18/microsoft-warns-of-stilachirat-a-stealthy-rat-targeting-credentials-and-crypto-wallets/</loc></url><url><loc>https://www.cypro.se/2025/03/18/how-to-improve-okta-security-in-four-steps/</loc></url><url><loc>https://www.cypro.se/2025/03/18/china-linked-mirrorface-deploys-anel-and-asyncrat-in-new-cyber-espionage-operation/</loc></url><url><loc>https://www.cypro.se/2025/03/18/badbox-2-0-botnet-infects-1-million-android-devices-for-ad-fraud-and-proxy-abuse/</loc></url><url><loc>https://www.cypro.se/2025/03/18/new-ad-fraud-campaign-exploits-331-apps-with-60m-downloads-for-phishing-and-intrusive-ads/</loc></url><url><loc>https://www.cypro.se/2025/03/18/unpatched-windows-zero-day-flaw-exploited-by-11-state-sponsored-threat-groups-since-2017/</loc></url><url><loc>https://www.cypro.se/2025/03/18/google-acquires-wiz-for-32-billion-in-its-biggest-deal-ever-to-boost-cloud-security/</loc></url><url><loc>https://www.cypro.se/2025/03/18/new-critical-ami-bmc-vulnerability-enables-remote-server-takeover-and-bricking/</loc></url><url><loc>https://www.cypro.se/2025/03/18/new-rules-file-backdoor-attack-lets-hackers-inject-malicious-code-via-ai-code-editors/</loc></url><url><loc>https://www.cypro.se/2025/03/19/cisa-warns-of-active-exploitation-in-github-action-supply-chain-compromise/</loc></url><url><loc>https://www.cypro.se/2025/03/19/critical-myscada-mypro-flaws-could-let-attackers-take-over-industrial-control-systems/</loc></url><url><loc>https://www.cypro.se/2025/03/19/5-identity-threat-detection-response-must-haves-for-super-saas-security/</loc></url><url><loc>https://www.cypro.se/2025/03/19/watch-this-webinar-to-learn-how-to-eliminate-identity-based-attacks-before-they-happen/</loc></url><url><loc>https://www.cypro.se/2025/03/19/clearfake-infects-9300-sites-uses-fake-recaptcha-and-turnstile-to-spread-info-stealers/</loc></url><url><loc>https://www.cypro.se/2025/03/19/leaked-black-basta-chats-suggest-russian-officials-aided-leaders-escape-from-armenia/</loc></url><url><loc>https://www.cypro.se/2025/03/19/hackers-exploit-severe-php-flaw-to-deploy-quasar-rat-and-xmrig-miners/</loc></url><url><loc>https://www.cypro.se/2025/03/19/timelines-for-migration-to-post-quantum-cryptography/</loc></url><url><loc>https://www.cypro.se/2025/03/19/setting-direction-for-the-uks-migration-to-post-quantum-cryptography/</loc></url><url><loc>https://www.cypro.se/2025/03/20/cert-ua-warns-dark-crystal-rat-targets-ukrainian-defense-via-malicious-signal-messages/</loc></url><url><loc>https://www.cypro.se/2025/03/20/six-governments-likely-use-israeli-paragon-spyware-to-hack-im-apps-and-harvest-data/</loc></url><url><loc>https://www.cypro.se/2025/03/20/why-continuous-compliance-monitoring-is-essential-for-it-managed-service-providers/</loc></url><url><loc>https://www.cypro.se/2025/03/20/cisa-adds-nakivo-vulnerability-to-kev-catalog-amid-active-exploitation/</loc></url><url><loc>https://www.cypro.se/2025/03/20/how-to-protect-your-business-from-cyber-threats-mastering-the-shared-responsibility-model/</loc></url><url><loc>https://www.cypro.se/2025/03/20/veeam-and-ibm-release-patches-for-high-risk-flaws-in-backup-and-aix-systems/</loc></url><url><loc>https://www.cypro.se/2025/03/20/youtube-game-cheats-spread-arcane-stealer-malware-to-russian-speaking-users/</loc></url><url><loc>https://www.cypro.se/2025/03/18/how-to-take-control-of-your-online-presence/</loc></url><url><loc>https://www.cypro.se/2025/03/21/ongoing-cyber-attacks-exploit-critical-vulnerabilities-in-cisco-smart-licensing-utility/</loc></url><url><loc>https://www.cypro.se/2025/03/21/10-critical-network-pentest-findings-it-teams-overlook/</loc></url><url><loc>https://www.cypro.se/2025/03/21/china-linked-apt-aquatic-panda-10-month-campaign-7-global-targets-5-malware-families/</loc></url><url><loc>https://www.cypro.se/2025/03/21/kaspersky-links-head-mare-to-twelve-targeting-russian-entities-via-shared-c2-servers/</loc></url><url><loc>https://www.cypro.se/2025/03/21/medusa-ransomware-uses-malicious-driver-to-disable-anti-malware-with-stolen-certificates/</loc></url><url><loc>https://www.cypro.se/2025/03/21/uat-5918-targets-taiwans-critical-infrastructure-using-web-shells-and-open-source-tools/</loc></url><url><loc>https://www.cypro.se/2025/03/22/u-s-treasury-lifts-tornado-cash-sanctions-amid-north-korea-money-laundering-probe/</loc></url><url><loc>https://www.cypro.se/2025/03/23/github-supply-chain-breach-coinbase-attack-exposes-218-repositories-leaks-ci-cd-secrets/</loc></url><url><loc>https://www.cypro.se/2025/03/24/critical-next-js-vulnerability-allows-attackers-to-bypass-middleware-authorization-checks/</loc></url><url><loc>https://www.cypro.se/2025/03/24/%e2%9a%a1-thn-weekly-recap-github-supply-chain-attack-ai-malware-byovd-tactics-and-more/</loc></url><url><loc>https://www.cypro.se/2025/03/24/vscode-marketplace-removes-two-extensions-deploying-early-stage-ransomware/</loc></url><url><loc>https://www.cypro.se/2025/03/24/how-to-balance-password-security-against-user-experience/</loc></url><url><loc>https://www.cypro.se/2025/03/24/cyberfirst-girls-competition-a-proud-milestone-and-exciting-future/</loc></url><url><loc>https://www.cypro.se/2025/03/24/vanhelsing-raas-launch-3-victims-5k-entry-fee-multi-os-and-double-extortion-tactics/</loc></url><url><loc>https://www.cypro.se/2025/03/24/microsoft-adds-inline-data-protection-to-edge-for-business-to-block-genai-data-leaks/</loc></url><url><loc>https://www.cypro.se/2025/03/24/critical-ingress-nginx-controller-vulnerability-allows-rce-without-authentication/</loc></url><url><loc>https://www.cypro.se/2025/03/24/privileged-access-workstations-introducing-our-new-set-of-principles/</loc></url><url><loc>https://www.cypro.se/2025/03/25/interpol-arrests-306-suspects-seizes-1842-devices-in-cross-border-cybercrime-bust/</loc></url><url><loc>https://www.cypro.se/2025/03/25/hackers-use-net-maui-to-target-indian-and-chinese-users-with-fake-banking-social-apps/</loc></url><url><loc>https://www.cypro.se/2025/03/25/ai-powered-saas-security-keeping-pace-with-an-expanding-attack-surface/</loc></url><url><loc>https://www.cypro.se/2025/03/25/chinese-hackers-breach-asian-telecom-remain-undetected-for-over-4-years/</loc></url><url><loc>https://www.cypro.se/2025/03/25/researchers-uncover-200-unique-c2-domains-linked-to-raspberry-robin-access-broker/</loc></url><url><loc>https://www.cypro.se/2025/03/26/zero-day-alert-google-releases-chrome-patch-for-exploit-used-in-russian-espionage-attacks/</loc></url><url><loc>https://www.cypro.se/2025/03/26/new-security-flaws-found-in-vmware-tools-and-crushftp-high-risk-no-workaround/</loc></url><url><loc>https://www.cypro.se/2025/03/26/hackers-using-e-crime-tool-atlantis-aio-for-credential-stuffing-on-140-platforms/</loc></url><url><loc>https://www.cypro.se/2025/03/26/how-pam-mitigates-insider-threats-preventing-data-breaches-privilege-misuse-and-more/</loc></url><url><loc>https://www.cypro.se/2025/03/26/malicious-npm-package-modifies-local-ethers-library-to-launch-reverse-shell-attacks/</loc></url><url><loc>https://www.cypro.se/2025/03/26/sparring-in-the-cyber-ring-using-automated-pentesting-to-build-resilience/</loc></url><url><loc>https://www.cypro.se/2025/03/26/encrypthub-exploits-windows-zero-day-to-deploy-rhadamanthys-and-stealc-malware/</loc></url><url><loc>https://www.cypro.se/2025/03/26/redcurl-shifts-from-espionage-to-ransomware-with-first-ever-qwcrypt-deployment/</loc></url><url><loc>https://www.cypro.se/2025/06/26/iris-experts-group-ieg-annual-meeting/</loc></url><url><loc>https://www.cypro.se/2025/03/26/new-sparrowdoor-backdoor-variants-found-in-attacks-on-u-s-and-mexican-organizations/</loc></url><url><loc>https://www.cypro.se/2025/03/27/cisa-warns-of-sitecore-rce-flaws-active-exploits-hit-next-js-and-draytek-devices/</loc></url><url><loc>https://www.cypro.se/2025/03/27/netapp-snapcenter-flaw-could-let-users-gain-remote-admin-access-on-plug-in-systems/</loc></url><url><loc>https://www.cypro.se/2025/03/27/150000-sites-compromised-by-javascript-injection-promoting-chinese-gambling-platforms/</loc></url><url><loc>https://www.cypro.se/2025/03/27/top-3-ms-office-exploits-hackers-use-in-2025-stay-alert/</loc></url><url><loc>https://www.cypro.se/2025/03/27/new-report-explains-why-casb-solutions-fail-to-address-shadow-saas-and-how-to-fix-it/</loc></url><url><loc>https://www.cypro.se/2025/03/27/apt36-spoofs-india-post-website-to-infect-windows-and-android-users-with-malware/</loc></url><url><loc>https://www.cypro.se/2025/03/27/hackers-repurpose-ransomhubs-edrkillshifter-in-medusa-bianlian-and-play-attacks/</loc></url><url><loc>https://www.cypro.se/2025/03/27/new-morphing-meerkat-phishing-kit-mimics-114-brands-using-victims-dns-email-records/</loc></url><url><loc>https://www.cypro.se/2025/03/28/nine-year-old-npm-packages-hijacked-to-exfiltrate-api-keys-via-obfuscated-scripts/</loc></url><url><loc>https://www.cypro.se/2025/03/28/mozilla-patches-critical-firefox-bug-similar-to-chromes-recent-zero-day-vulnerability/</loc></url><url><loc>https://www.cypro.se/2025/03/28/pjobrat-malware-campaign-targeted-taiwanese-users-via-fake-chat-apps/</loc></url><url><loc>https://www.cypro.se/2025/03/28/product-walkthrough-how-datto-bcdr-delivers-unstoppable-business-continuity/</loc></url><url><loc>https://www.cypro.se/2025/03/28/coffeeloader-uses-gpu-based-armoury-packer-to-evade-edr-and-antivirus-detection/</loc></url><url><loc>https://www.cypro.se/2025/03/28/researchers-uncover-46-critical-flaws-in-solar-inverters-from-sungrow-growatt-and-sma/</loc></url><url><loc>https://www.cypro.se/2025/03/29/blacklock-ransomware-exposed-after-researchers-exploit-leak-site-vulnerability/</loc></url><url><loc>https://www.cypro.se/2025/03/29/new-android-trojan-crocodilus-abuses-accessibility-to-steal-banking-and-crypto-credentials/</loc></url><url><loc>https://www.cypro.se/2025/03/30/resurge-malware-exploits-ivanti-flaw-with-rootkit-and-web-shell-features/</loc></url><url><loc>https://www.cypro.se/2025/03/31/russia-linked-gamaredon-uses-troop-related-lures-to-deploy-remcos-rat-in-ukraine/</loc></url><url><loc>https://www.cypro.se/2025/03/31/%e2%9a%a1-weekly-recap-chrome-0-day-ingressnightmare-solar-bugs-dns-tactics-and-more/</loc></url><url><loc>https://www.cypro.se/2025/03/31/5-impactful-aws-vulnerabilities-youre-responsible-for/</loc></url><url><loc>https://www.cypro.se/2025/03/31/hackers-exploit-wordpress-mu-plugins-to-inject-spam-and-hijack-site-images/</loc></url><url><loc>https://www.cypro.se/2025/03/31/russian-hackers-exploit-cve-2025-26633-via-msc-eviltwin-to-deploy-silentprism-and-darkwisp/</loc></url><url><loc>https://www.cypro.se/2025/04/01/apple-fined-e150-million-by-french-regulator-over-discriminatory-att-consent-practices/</loc></url><url><loc>https://www.cypro.se/2025/03/31/cyber-security-and-resilience-policy-statement-to-strengthen-regulation-of-critical-sectors/</loc></url><url><loc>https://www.cypro.se/2025/04/01/apple-backports-critical-fixes-for-3-live-exploits-impacting-ios-and-macos-legacy-devices/</loc></url><url><loc>https://www.cypro.se/2025/04/01/nearly-24000-ips-target-pan-os-globalprotect-in-coordinated-login-scan-campaign/</loc></url><url><loc>https://www.cypro.se/2025/04/01/new-case-study-global-retailer-overshares-csrf-tokens-with-facebook/</loc></url><url><loc>https://www.cypro.se/2025/04/01/china-linked-earth-alux-uses-vargeit-and-cobeacon-in-multi-stage-cyber-intrusions/</loc></url><url><loc>https://www.cypro.se/2025/04/01/lucid-phaas-hits-169-targets-in-88-countries-using-imessage-and-rcs-smishing/</loc></url><url><loc>https://www.cypro.se/2025/04/01/enterprise-gmail-users-can-now-send-end-to-end-encrypted-emails-to-any-platform/</loc></url><url><loc>https://www.cypro.se/2025/04/01/over-1500-postgresql-servers-compromised-in-fileless-cryptocurrency-mining-campaign/</loc></url><url><loc>https://www.cypro.se/2025/04/02/new-malware-loaders-use-call-stack-spoofing-github-c2-and-net-reactor-for-stealth/</loc></url><url><loc>https://www.cypro.se/2025/04/02/fin7-deploys-anubis-backdoor-to-hijack-windows-systems-via-compromised-sharepoint-sites/</loc></url><url><loc>https://www.cypro.se/2025/04/02/how-ssl-misconfigurations-impact-your-attack-surface/</loc></url><url><loc>https://www.cypro.se/2025/04/02/helping-your-clients-achieve-nist-compliance-a-step-by-step-guide-for-service-providers/</loc></url><url><loc>https://www.cypro.se/2025/04/02/outlaw-group-uses-ssh-brute-force-to-deploy-cryptojacking-malware-on-linux-servers/</loc></url><url><loc>https://www.cypro.se/2025/05/20/csf-2-0-webinar-series-deep-dive-into-the-csf-2-0-govern-function-to-improve-cybersecurity/</loc></url><url><loc>https://www.cypro.se/2025/04/02/google-fixed-cloud-run-vulnerability-allowing-unauthorized-image-access-via-iam-misuse/</loc></url><url><loc>https://www.cypro.se/2025/04/03/legacy-stripe-api-exploited-to-validate-stolen-payment-cards-in-web-skimmer-campaign/</loc></url><url><loc>https://www.cypro.se/2025/04/03/europol-dismantles-kidflix-with-72000-csam-videos-seized-in-major-operation/</loc></url><url><loc>https://www.cypro.se/2025/04/03/triada-malware-preloaded-on-counterfeit-android-phones-infects-2600-devices/</loc></url><url><loc>https://www.cypro.se/2025/04/03/new-guidance-on-securing-http-based-apis/</loc></url><url><loc>https://www.cypro.se/2025/04/03/google-patches-quick-share-vulnerability-enabling-silent-file-transfers-without-consent/</loc></url><url><loc>https://www.cypro.se/2025/04/03/ai-adoption-in-the-enterprise-breaking-through-the-security-and-compliance-gridlock/</loc></url><url><loc>https://www.cypro.se/2025/04/03/ai-threats-are-evolving-fast-learn-practical-defense-tactics-in-this-expert-webinar/</loc></url><url><loc>https://www.cypro.se/2025/04/03/lazarus-group-targets-job-seekers-with-clickfix-tactic-to-deploy-golangghost-malware/</loc></url><url><loc>https://www.cypro.se/2025/04/03/microsoft-warns-of-tax-themed-email-attacks-using-pdfs-and-qr-codes-to-deliver-malware/</loc></url><url><loc>https://www.cypro.se/2025/04/04/cert-ua-reports-cyberattacks-targeting-ukrainian-state-systems-with-wrecksteel-malware/</loc></url><url><loc>https://www.cypro.se/2025/04/04/critical-flaw-in-apache-parquet-allows-remote-attackers-to-execute-arbitrary-code/</loc></url><url><loc>https://www.cypro.se/2025/04/04/critical-ivanti-flaw-actively-exploited-to-deploy-trailblaze-and-brushfire-malware/</loc></url><url><loc>https://www.cypro.se/2025/04/04/have-we-reached-a-distroless-tipping-point/</loc></url><url><loc>https://www.cypro.se/2025/04/04/opsec-failure-exposes-coquetttes-malware-campaigns-on-bulletproof-hosting-servers/</loc></url><url><loc>https://www.cypro.se/2025/04/04/spotbugs-access-token-theft-identified-as-root-cause-of-github-supply-chain-attack/</loc></url><url><loc>https://www.cypro.se/2025/04/05/malicious-python-packages-on-pypi-downloaded-39000-times-steal-sensitive-data/</loc></url><url><loc>https://www.cypro.se/2025/04/05/north-korean-hackers-deploy-beavertail-malware-via-11-malicious-npm-packages/</loc></url><url><loc>https://www.cypro.se/2025/04/05/microsoft-credits-encrypthub-hacker-behind-618-breaches-for-disclosing-windows-flaws/</loc></url><url><loc>https://www.cypro.se/2025/04/07/poisonseed-exploits-crm-accounts-to-launch-cryptocurrency-seed-phrase-poisoning-attacks/</loc></url><url><loc>https://www.cypro.se/2025/04/07/security-theater-vanity-metrics-keep-you-busy-and-exposed/</loc></url><url><loc>https://www.cypro.se/2025/04/07/%e2%9a%a1-weekly-recap-vpn-exploits-oracles-silent-breach-clickfix-comeback-and-more/</loc></url><url><loc>https://www.cypro.se/2025/04/07/cisa-and-fbi-warn-fast-flux-is-powering-resilient-malware-c2-and-phishing-networks/</loc></url><url><loc>https://www.cypro.se/2025/04/07/disability-access-within-the-field-of-social-engineering/</loc></url><url><loc>https://www.cypro.se/2025/04/02/new-online-training-helps-board-members-to-govern-cyber-risk/</loc></url><url><loc>https://www.cypro.se/2025/04/08/google-releases-android-update-to-patch-two-actively-exploited-vulnerabilities/</loc></url><url><loc>https://www.cypro.se/2025/04/08/cisa-adds-crushftp-vulnerability-to-kev-catalog-following-confirmed-active-exploitation/</loc></url><url><loc>https://www.cypro.se/2025/04/08/agentic-ai-in-the-soc-dawn-of-autonomous-alert-triage/</loc></url><url><loc>https://www.cypro.se/2025/04/08/uac-0226-deploys-giftedcrook-stealer-via-malicious-excel-files-targeting-ukraine/</loc></url><url><loc>https://www.cypro.se/2025/04/08/amazon-ec2-ssm-agent-flaw-patched-after-privilege-escalation-via-path-traversal/</loc></url><url><loc>https://www.cypro.se/2025/04/08/cryptocurrency-miner-and-clipper-malware-spread-via-sourceforge-cracked-software-listings/</loc></url><url><loc>https://www.cypro.se/2025/04/08/fortinet-urges-fortiswitch-upgrades-to-patch-critical-admin-password-change-flaw/</loc></url><url><loc>https://www.cypro.se/2025/04/09/adobe-patches-11-critical-coldfusion-flaws-amid-30-total-vulnerabilities-discovered/</loc></url><url><loc>https://www.cypro.se/2025/04/09/microsoft-patches-126-flaws-including-actively-exploited-windows-clfs-vulnerability/</loc></url><url><loc>https://www.cypro.se/2025/04/09/pipemagic-trojan-exploits-windows-zero-day-vulnerability-to-deploy-ransomware/</loc></url><url><loc>https://www.cypro.se/2025/04/09/cisa-warns-of-centrestacks-hard-coded-machinekey-vulnerability-enabling-rce-attacks/</loc></url><url><loc>https://www.cypro.se/2025/04/09/explosive-growth-of-non-human-identities-creating-massive-security-blind-spots/</loc></url><url><loc>https://www.cypro.se/2025/04/09/new-tcesb-malware-found-in-active-attacks-exploiting-eset-security-scanner/</loc></url><url><loc>https://www.cypro.se/2025/04/09/lovable-ai-found-most-vulnerable-to-vibescamming-enabling-anyone-to-build-live-scam-pages/</loc></url><url><loc>https://www.cypro.se/2025/04/10/akirabot-targets-420000-sites-with-openai-generated-spam-bypassing-captcha-protections/</loc></url><url><loc>https://www.cypro.se/2025/04/10/europol-arrests-five-smokeloader-clients-linked-by-seized-database-evidence/</loc></url><url><loc>https://www.cypro.se/2025/04/10/playpraetor-reloaded-ctm360-uncovers-a-play-masquerading-party/</loc></url><url><loc>https://www.cypro.se/2025/04/10/the-identities-behind-ai-agents-a-deep-dive-into-ai-nhi/</loc></url><url><loc>https://www.cypro.se/2025/04/10/gamaredon-uses-infected-removable-drives-to-breach-western-military-mission-in-ukraine/</loc></url><url><loc>https://www.cypro.se/2025/04/10/malicious-npm-package-targets-atomic-wallet-exodus-users-by-swapping-crypto-addresses/</loc></url><url><loc>https://www.cypro.se/2025/04/10/incomplete-patch-in-nvidia-toolkit-leaves-cve-2024-0132-open-to-container-escapes/</loc></url><url><loc>https://www.cypro.se/2025/04/11/ottokit-wordpress-plugin-admin-creation-vulnerability-under-active-exploitation/</loc></url><url><loc>https://www.cypro.se/2025/04/11/palo-alto-networks-warns-of-brute-force-attempts-targeting-pan-os-globalprotect-gateways/</loc></url><url><loc>https://www.cypro.se/2025/04/11/spynote-badbazaar-moonshine-malware-target-android-and-ios-users-via-fake-apps/</loc></url><url><loc>https://www.cypro.se/2025/04/11/initial-access-brokers-shift-tactics-selling-more-for-less/</loc></url><url><loc>https://www.cypro.se/2025/04/11/paper-werewolf-deploys-powermodul-implant-in-targeted-cyberattacks-on-russian-sectors/</loc></url><url><loc>https://www.cypro.se/2025/04/11/fortinet-warns-attackers-retain-fortigate-access-post-patching-via-ssl-vpn-symlink-exploit/</loc></url><url><loc>https://www.cypro.se/2025/04/14/pakistan-linked-hackers-expand-targets-in-india-with-curlback-rat-and-spark-rat/</loc></url><url><loc>https://www.cypro.se/2025/04/14/cybersecurity-in-the-ai-era-evolve-faster-than-the-threats-or-get-left-behind/</loc></url><url><loc>https://www.cypro.se/2025/04/14/%e2%9a%a1-weekly-recap-windows-0-day-vpn-exploits-weaponized-ai-hijacked-antivirus-and-more/</loc></url><url><loc>https://www.cypro.se/2025/04/14/phishing-campaigns-use-real-time-checks-to-validate-victim-emails-before-credential-theft/</loc></url><url><loc>https://www.cypro.se/2025/04/14/resolverrat-campaign-targets-healthcare-pharma-via-phishing-and-dll-side-loading/</loc></url><url><loc>https://www.cypro.se/2025/04/15/gladinets-triofox-and-centrestack-under-active-exploitation-via-critical-rce-vulnerability/</loc></url><url><loc>https://www.cypro.se/2025/04/15/meta-resumes-e-u-ai-training-using-public-user-data-after-regulator-approval/</loc></url><url><loc>https://www.cypro.se/2025/04/15/crypto-developers-targeted-by-python-malware-disguised-as-coding-challenges/</loc></url><url><loc>https://www.cypro.se/2025/04/15/majority-of-browser-extensions-can-access-sensitive-enterprise-data-new-report-finds/</loc></url><url><loc>https://www.cypro.se/2025/04/15/chinese-hackers-target-linux-systems-using-snowlight-malware-and-vshell-tool/</loc></url><url><loc>https://www.cypro.se/2025/04/15/critical-apache-roller-vulnerability-cvss-10-0-enables-unauthorized-session-persistence/</loc></url><url><loc>https://www.cypro.se/2025/04/15/malicious-pypi-package-targets-mexc-trading-api-to-steal-credentials-and-redirect-orders/</loc></url><url><loc>https://www.cypro.se/2025/04/16/u-s-govt-funding-for-mitres-cve-ends-april-16-cybersecurity-community-on-alert/</loc></url><url><loc>https://www.cypro.se/2025/04/16/chinese-android-phones-shipped-with-fake-whatsapp-telegram-apps-targeting-crypto-users/</loc></url><url><loc>https://www.cypro.se/2025/04/16/new-bpfdoor-controller-enables-stealthy-lateral-movement-in-linux-server-attacks/</loc></url><url><loc>https://www.cypro.se/2025/04/16/product-walkthrough-a-look-inside-wing-securitys-layered-saas-identity-defense/</loc></url><url><loc>https://www.cypro.se/2025/04/16/gamma-ai-platform-abused-in-phishing-chain-to-spoof-microsoft-sharepoint-logins/</loc></url><url><loc>https://www.cypro.se/2025/04/16/from-third-party-vendors-to-u-s-tariffs-the-new-cyber-risks-facing-supply-chains/</loc></url><url><loc>https://www.cypro.se/2025/04/16/google-blocked-5-1b-harmful-ads-and-suspended-39-2m-advertiser-accounts-in-2024/</loc></url><url><loc>https://www.cypro.se/2025/04/16/experts-uncover-four-new-privilege-escalation-flaws-in-windows-task-scheduler/</loc></url><url><loc>https://www.cypro.se/2025/04/17/apple-patches-two-actively-exploited-ios-flaws-used-in-sophisticated-targeted-attacks/</loc></url><url><loc>https://www.cypro.se/2025/04/17/cisa-flags-actively-exploited-vulnerability-in-sonicwall-sma-devices/</loc></url><url><loc>https://www.cypro.se/2025/04/17/critical-erlang-otp-ssh-vulnerability-cvss-10-0-allows-unauthenticated-code-execution/</loc></url><url><loc>https://www.cypro.se/2025/04/17/node-js-malware-campaign-targets-crypto-users-with-fake-binance-and-tradingview-installers/</loc></url><url><loc>https://www.cypro.se/2025/04/17/blockchain-offers-security-benefits-but-dont-neglect-your-passwords/</loc></url><url><loc>https://www.cypro.se/2025/04/14/nist-updates-privacy-framework-tying-it-to-recent-cybersecurity-guidelines/</loc></url><url><loc>https://www.cypro.se/2025/04/17/state-sponsored-hackers-weaponize-clickfix-tactic-in-targeted-malware-campaigns/</loc></url><url><loc>https://www.cypro.se/2025/04/17/artificial-intelligence-whats-all-the-fuss/</loc></url><url><loc>https://www.cypro.se/2025/04/17/mustang-panda-targets-myanmar-with-starproxy-edr-bypass-and-toneshell-updates/</loc></url><url><loc>https://www.cypro.se/2025/04/18/cve-2025-24054-under-active-attack-steals-ntlm-credentials-on-file-download/</loc></url><url><loc>https://www.cypro.se/2025/04/18/experts-uncover-new-xorddos-controller-infrastructure-as-malware-expands-to-docker-linux-iot/</loc></url><url><loc>https://www.cypro.se/2025/04/18/webinar-ai-is-already-inside-your-saas-stack-learn-how-to-prevent-the-next-silent-breach/</loc></url><url><loc>https://www.cypro.se/2025/04/18/multi-stage-malware-attack-uses-jse-and-powershell-to-deploy-agent-tesla-and-xloader/</loc></url><url><loc>https://www.cypro.se/2025/04/18/chinese-smishing-kit-powers-widespread-toll-fraud-campaign-targeting-u-s-users-in-8-states/</loc></url><url><loc>https://www.cypro.se/2025/04/19/asus-confirms-critical-flaw-in-aicloud-routers-users-urged-to-update-firmware/</loc></url><url><loc>https://www.cypro.se/2025/04/19/rogue-npm-packages-mimic-telegram-bot-api-to-plant-ssh-backdoors-on-linux-systems/</loc></url><url><loc>https://www.cypro.se/2025/04/20/apt29-deploys-grapeloader-malware-targeting-european-diplomats-through-wine-tasting-lures/</loc></url><url><loc>https://www.cypro.se/2025/04/21/hackers-abuse-russian-bulletproof-host-proton66-for-global-attacks-and-malware-delivery/</loc></url><url><loc>https://www.cypro.se/2025/04/21/5-reasons-device-management-isnt-device-trust/</loc></url><url><loc>https://www.cypro.se/2025/04/21/%e2%9a%a1-thn-weekly-recap-ios-zero-days-4chan-breach-ntlm-exploits-whatsapp-spyware-more/</loc></url><url><loc>https://www.cypro.se/2025/04/21/supercard-x-android-malware-enables-contactless-atm-and-pos-fraud-via-nfc-relay-attacks/</loc></url><url><loc>https://www.cypro.se/2025/04/21/kimsuky-exploits-bluekeep-rdp-vulnerability-to-breach-systems-in-south-korea-and-japan/</loc></url><url><loc>https://www.cypro.se/2025/04/22/lotus-panda-hacks-se-asian-governments-with-browser-stealers-and-sideloaded-malware/</loc></url><url><loc>https://www.cypro.se/2025/04/22/microsoft-secures-msa-signing-with-azure-confidential-vms-following-storm-0558-breach/</loc></url><url><loc>https://www.cypro.se/2025/04/22/5-major-concerns-with-employees-using-the-browser/</loc></url><url><loc>https://www.cypro.se/2025/04/22/phishers-exploit-google-sites-and-dkim-replay-to-send-signed-emails-steal-credentials/</loc></url><url><loc>https://www.cypro.se/2025/04/22/gcp-cloud-composer-bug-let-attackers-elevate-access-via-malicious-pypi-packages/</loc></url><url><loc>https://www.cypro.se/2025/04/22/docker-malware-exploits-teneo-web3-node-to-earn-crypto-via-fake-heartbeat-signals/</loc></url><url><loc>https://www.cypro.se/2025/04/23/google-drops-cookie-prompt-in-chrome-adds-ip-protection-to-incognito/</loc></url><url><loc>https://www.cypro.se/2025/04/23/ripples-xrpl-js-npm-package-backdoored-to-steal-private-keys-in-major-supply-chain-attack/</loc></url><url><loc>https://www.cypro.se/2025/04/23/three-reasons-why-the-browser-is-best-for-stopping-phishing-attacks/</loc></url><url><loc>https://www.cypro.se/2025/04/23/russian-hackers-exploit-microsoft-oauth-to-target-ukraine-allies-via-signal-and-whatsapp/</loc></url><url><loc>https://www.cypro.se/2025/04/23/android-spyware-disguised-as-alpine-quest-app-targets-russian-military-devices/</loc></url><url><loc>https://www.cypro.se/2025/04/23/iran-linked-hackers-target-israel-with-murkytour-malware-via-fake-job-campaign/</loc></url><url><loc>https://www.cypro.se/2025/04/23/dprk-hackers-steal-137m-from-tron-users-in-single-day-phishing-attack/</loc></url><url><loc>https://www.cypro.se/2025/04/24/whatsapp-adds-advanced-chat-privacy-to-blocks-chat-exports-and-auto-downloads/</loc></url><url><loc>https://www.cypro.se/2025/04/24/automating-zero-trust-in-healthcare-from-risk-scoring-to-dynamic-policy-enforcement-without-network-redesign/</loc></url><url><loc>https://www.cypro.se/2025/04/24/critical-commvault-command-center-flaw-enables-attackers-to-execute-code-remotely/</loc></url><url><loc>https://www.cypro.se/2025/04/24/darcula-adds-genai-to-phishing-toolkit-lowering-the-barrier-for-cybercriminals/</loc></url><url><loc>https://www.cypro.se/2025/04/24/lazarus-hits-6-south-korean-firms-via-cross-ex-innorix-zero-day-and-threatneedle-malware/</loc></url><url><loc>https://www.cypro.se/2025/04/24/159-cves-exploited-in-q1-2025-28-3-within-24-hours-of-disclosure/</loc></url><url><loc>https://www.cypro.se/2025/04/24/linux-io_uring-poc-rootkit-bypasses-system-call-based-threat-detection-tools/</loc></url><url><loc>https://www.cypro.se/2025/04/25/researchers-identify-rackstatic-vulnerability-enabling-data-breaches-in-ruby-servers/</loc></url><url><loc>https://www.cypro.se/2025/04/25/dslogdrat-malware-deployed-via-ivanti-ics-zero-day-cve-2025-0282-in-japan-attacks/</loc></url><url><loc>https://www.cypro.se/2025/04/25/sap-confirms-critical-netweaver-flaw-amid-suspected-zero-day-exploitation-by-hackers/</loc></url><url><loc>https://www.cypro.se/2025/04/25/why-nhis-are-securitys-most-dangerous-blind-spot/</loc></url><url><loc>https://www.cypro.se/2025/04/25/north-korean-hackers-spread-malware-via-fake-crypto-firms-and-job-interview-lures/</loc></url><url><loc>https://www.cypro.se/2025/04/22/listening-beyond-hearing-thriving-as-a-disabled-professional-at-secom-part-2/</loc></url><url><loc>https://www.cypro.se/2025/04/26/toymaker-uses-lagtoy-to-sell-access-to-cactus-ransomware-gangs-for-double-extortion/</loc></url><url><loc>https://www.cypro.se/2025/04/27/storm-1977-hits-education-clouds-with-azurechecker-deploys-200-crypto-mining-containers/</loc></url><url><loc>https://www.cypro.se/2025/04/25/advanced-cryptography-new-approaches-to-data-privacy/</loc></url><url><loc>https://www.cypro.se/2025/04/28/hackers-exploit-critical-craft-cms-flaws-hundreds-of-servers-likely-compromised/</loc></url><url><loc>https://www.cypro.se/2025/04/28/woocommerce-users-targeted-by-fake-patch-phishing-campaign-deploying-site-backdoors/</loc></url><url><loc>https://www.cypro.se/2025/04/28/earth-kurma-targets-southeast-asia-with-rootkits-and-cloud-based-data-theft-tools/</loc></url><url><loc>https://www.cypro.se/2025/04/28/how-breaches-start-breaking-down-5-real-vulns/</loc></url><url><loc>https://www.cypro.se/2025/04/28/%e2%9a%a1-weekly-recap-critical-sap-exploit-ai-powered-phishing-major-breaches-new-cves-more/</loc></url><url><loc>https://www.cypro.se/2025/04/29/cisa-adds-actively-exploited-broadcom-and-commvault-flaws-to-kev-database/</loc></url><url><loc>https://www.cypro.se/2025/04/29/malware-attack-targets-world-uyghur-congress-leaders-via-trojanized-uyghuredit-tool/</loc></url><url><loc>https://www.cypro.se/2025/04/29/product-walkthrough-securing-microsoft-copilot-with-reco/</loc></url><url><loc>https://www.cypro.se/2025/04/29/google-reports-75-zero-days-exploited-in-2024-44-targeted-enterprise-security-products/</loc></url><url><loc>https://www.cypro.se/2025/09/24/sixth-pqc-standardization-conference/</loc></url><url><loc>https://www.cypro.se/2025/04/29/sentinelone-uncovers-chinese-espionage-campaign-targeting-its-infrastructure-and-clients/</loc></url><url><loc>https://www.cypro.se/2025/04/29/whatsapp-launches-private-processing-to-enable-ai-features-while-protecting-message-privacy/</loc></url><url><loc>https://www.cypro.se/2025/04/29/new-reports-uncover-jailbreaks-unsafe-code-and-data-theft-risks-in-leading-ai-systems/</loc></url><url><loc>https://www.cypro.se/2025/04/30/indian-court-orders-action-to-block-proton-mail-over-ai-deepfake-abuse-allegations/</loc></url><url><loc>https://www.cypro.se/2025/04/30/meta-launches-llamafirewall-framework-to-stop-ai-jailbreaks-injections-and-insecure-code/</loc></url><url><loc>https://www.cypro.se/2025/04/30/customer-account-takeovers-the-multi-billion-dollar-problem-you-dont-know-about/</loc></url><url><loc>https://www.cypro.se/2025/04/30/ransomhub-went-dark-april-1-affiliates-fled-to-qilin-dragonforce-claimed-control/</loc></url><url><loc>https://www.cypro.se/2025/04/30/free-webinar-guide-to-securing-your-entire-identity-lifecycle-against-ai-powered-threats/</loc></url><url><loc>https://www.cypro.se/2025/04/30/chinese-hackers-abuse-ipv6-slaac-for-aitm-attacks-via-spellbinder-lateral-movement-tool/</loc></url><url><loc>https://www.cypro.se/2025/04/30/nebulous-mantis-targets-nato-linked-entities-with-multi-stage-malware-attacks/</loc></url><url><loc>https://www.cypro.se/2025/04/30/researchers-demonstrate-how-mcp-prompt-injection-can-be-used-for-both-attack-and-defense/</loc></url><url><loc>https://www.cypro.se/2025/05/01/sonicwall-confirms-active-exploitation-of-flaws-affecting-multiple-appliance-models/</loc></url><url><loc>https://www.cypro.se/2025/05/01/commvault-confirms-hackers-exploited-cve-2025-3928-as-zero-day-in-azure-breach/</loc></url><url><loc>https://www.cypro.se/2025/05/01/new-research-reveals-95-of-appsec-fixes-dont-reduce-risk/</loc></url><url><loc>https://www.cypro.se/2025/05/01/darkwatchman-sheriff-malware-hit-russia-and-ukraine-with-stealth-and-nation-grade-tactics/</loc></url><url><loc>https://www.cypro.se/2025/05/01/why-top-soc-teams-are-shifting-to-network-detection-and-response/</loc></url><url><loc>https://www.cypro.se/2025/05/01/claude-ai-exploited-to-operate-100-fake-political-personas-in-global-influence-campaign/</loc></url><url><loc>https://www.cypro.se/2025/05/04/incidents-impacting-retailers-recommendations-from-the-ncsc/</loc></url><url><loc>https://www.cypro.se/2025/05/05/red-teaming-for-beginners-key-lessons-from-my-first-engagement/</loc></url><url><loc>https://www.cypro.se/2025/05/07/software-code-of-practice-building-a-secure-digital-future/</loc></url><url><loc>https://www.cypro.se/2025/05/01/software-security-code-of-practice-assurance-principles-and-claims-apcs/</loc></url><url><loc>https://www.cypro.se/2025/05/02/impact-of-ai-on-cyber-threat-from-now-to-2027/</loc></url><url><loc>https://www.cypro.se/2025/05/07/sysaid-patches-4-critical-flaws-enabling-pre-auth-rce-in-on-premise-version/</loc></url><url><loc>https://www.cypro.se/2025/05/07/reevaluating-sses-a-technical-gap-analysis-of-last-mile-protection/</loc></url><url><loc>https://www.cypro.se/2025/05/07/play-ransomware-exploited-windows-cve-2025-29824-as-zero-day-to-breach-u-s-organization/</loc></url><url><loc>https://www.cypro.se/2025/05/07/researchers-uncover-malware-in-fake-discord-pypi-package-downloaded-11500-times/</loc></url><url><loc>https://www.cypro.se/2025/05/07/nso-group-fined-168m-for-targeting-1400-whatsapp-users-with-pegasus-spyware/</loc></url><url><loc>https://www.cypro.se/2025/05/06/hackers-exploit-samsung-magicinfo-geovision-iot-flaws-to-deploy-mirai-botnet/</loc></url><url><loc>https://www.cypro.se/2025/05/06/new-investment-scams-use-facebook-ads-rdga-domains-and-ip-checks-to-filter-victims/</loc></url><url><loc>https://www.cypro.se/2025/05/06/third-parties-and-machine-credentials-the-silent-drivers-behind-2025s-worst-breaches/</loc></url><url><loc>https://www.cypro.se/2025/05/06/microsoft-warns-default-helm-charts-could-leave-kubernetes-apps-exposed-to-data-leaks/</loc></url><url><loc>https://www.cypro.se/2025/05/06/entra-id-data-protection-essential-or-overkill/</loc></url><url><loc>https://www.cypro.se/2025/05/06/update-asap-google-fixes-android-flaw-cve-2025-27363-exploited-by-attackers/</loc></url><url><loc>https://www.cypro.se/2025/05/06/critical-langflow-flaw-added-to-cisa-kev-list-amid-ongoing-exploitation-evidence/</loc></url><url><loc>https://www.cypro.se/2025/05/05/wormable-airplay-flaws-enable-zero-click-rce-on-apple-devices-via-public-wi-fi/</loc></url><url><loc>https://www.cypro.se/2025/05/05/commvault-cve-2025-34028-added-to-cisa-kev-after-active-exploitation-confirmed/</loc></url><url><loc>https://www.cypro.se/2025/05/05/%e2%9a%a1-weekly-recap-nation-state-hacks-spyware-alerts-deepfake-malware-supply-chain-backdoors/</loc></url><url><loc>https://www.cypro.se/2025/05/05/perfection-is-a-myth-leverage-isnt-how-small-teams-can-secure-their-google-workspace/</loc></url><url><loc>https://www.cypro.se/2025/05/05/golden-chickens-deploy-terrastealerv2-to-steal-browser-credentials-and-crypto-wallet-data/</loc></url><url><loc>https://www.cypro.se/2025/05/03/malicious-go-modules-deliver-disk-wiping-linux-malware-in-advanced-supply-chain-attack/</loc></url><url><loc>https://www.cypro.se/2025/05/03/iranian-hackers-maintain-2-year-access-to-middle-east-cni-via-vpn-flaws-and-malware/</loc></url><url><loc>https://www.cypro.se/2025/05/03/u-s-charges-yemeni-hacker-behind-black-kingdom-ransomware-targeting-1500-systems/</loc></url><url><loc>https://www.cypro.se/2025/05/02/tiktok-slammed-with-e530-million-gdpr-fine-for-sending-e-u-data-to-china/</loc></url><url><loc>https://www.cypro.se/2025/05/02/how-to-automate-cve-and-vulnerability-advisory-response-with-tines/</loc></url><url><loc>https://www.cypro.se/2025/05/02/mintsloader-drops-ghostweaver-via-phishing-clickfix-uses-dga-tls-for-stealth-attacks/</loc></url><url><loc>https://www.cypro.se/2025/05/02/microsoft-sets-passkeys-default-for-new-accounts-15-billion-users-gain-passwordless-support/</loc></url><url><loc>https://www.cypro.se/2025/05/01/fake-security-plugin-on-wordpress-enables-remote-admin-access-for-attackers/</loc></url><url><loc>https://www.cypro.se/2025/05/08/russian-hackers-using-clickfix-fake-captcha-to-deploy-new-lostkeys-malware/</loc></url><url><loc>https://www.cypro.se/2025/05/08/cisco-patches-cve-2025-20188-10-0-cvss-in-ios-xe-that-enables-root-exploits-via-jwt/</loc></url><url><loc>https://www.cypro.se/2025/05/07/europol-shuts-down-six-ddos-for-hire-services-used-in-global-attacks/</loc></url><url><loc>https://www.cypro.se/2025/05/07/ottokit-wordpress-plugin-with-100k-installs-hit-by-exploits-targeting-multiple-flaws/</loc></url><url><loc>https://www.cypro.se/2025/05/08/ransomware-wannacry-guidance-for-enterprise-administrators/</loc></url><url><loc>https://www.cypro.se/2025/05/13/china-linked-apts-exploit-sap-cve-2025-31324-to-breach-581-critical-systems-worldwide/</loc></url><url><loc>https://www.cypro.se/2025/05/13/malicious-pypi-package-posing-as-solana-tool-stole-source-code-in-761-downloads/</loc></url><url><loc>https://www.cypro.se/2025/05/13/deepfake-defense-in-the-age-of-ai/</loc></url><url><loc>https://www.cypro.se/2025/05/13/north-korean-konni-apt-targets-ukraine-with-malware-to-track-russian-invasion-progress/</loc></url><url><loc>https://www.cypro.se/2025/05/13/moldovan-police-arrest-suspect-in-e4-5m-ransomware-attack-on-dutch-research-agency/</loc></url><url><loc>https://www.cypro.se/2025/05/13/turkiye-hackers-exploited-output-messenger-zero-day-to-drop-golang-backdoors-on-kurdish-servers/</loc></url><url><loc>https://www.cypro.se/2025/05/12/asus-patches-driverhub-rce-flaws-exploitable-via-http-and-crafted-ini-files/</loc></url><url><loc>https://www.cypro.se/2025/05/12/%e2%9a%a1-weekly-recap-zero-day-exploits-developer-malware-iot-botnets-and-ai-powered-scams/</loc></url><url><loc>https://www.cypro.se/2025/05/12/the-persistence-problem-why-exposed-credentials-remain-unfixed-and-how-to-change-that/</loc></url><url><loc>https://www.cypro.se/2025/05/12/fake-ai-tools-used-to-spread-noodlophile-malware-targeting-62000-via-facebook-lures/</loc></url><url><loc>https://www.cypro.se/2025/05/10/google-pays-1-375-billion-to-texas-over-unauthorized-tracking-and-biometric-data-collection/</loc></url><url><loc>https://www.cypro.se/2025/05/10/germany-shuts-down-exch-over-1-9b-laundering-seizes-e34m-in-crypto-and-8tb-of-data/</loc></url><url><loc>https://www.cypro.se/2025/05/09/breaking-7000-device-proxy-botnet-using-iot-eol-systems-dismantled-in-u-s-dutch-operation/</loc></url><url><loc>https://www.cypro.se/2025/05/09/ottercookie-v4-adds-vm-detection-and-chrome-metamask-credential-theft-capabilities/</loc></url><url><loc>https://www.cypro.se/2025/05/09/initial-access-brokers-target-brazil-execs-via-nf-e-spam-and-legit-rmm-trials/</loc></url><url><loc>https://www.cypro.se/2025/05/09/deploying-ai-agents-learn-to-secure-them-before-hackers-strike-your-business/</loc></url><url><loc>https://www.cypro.se/2025/05/09/beyond-vulnerability-management-can-you-cve-what-i-cve/</loc></url><url><loc>https://www.cypro.se/2025/05/09/malicious-npm-packages-infect-3200-cursor-users-with-backdoor-steal-credentials/</loc></url><url><loc>https://www.cypro.se/2025/05/09/google-rolls-out-on-device-ai-protections-to-detect-scams-in-chrome-and-android/</loc></url><url><loc>https://www.cypro.se/2025/05/09/chinese-hackers-exploit-sap-rce-flaw-cve-2025-31324-deploy-golang-based-supershell/</loc></url><url><loc>https://www.cypro.se/2025/05/08/38000-freedrain-subdomains-found-exploiting-seo-to-steal-crypto-wallet-seed-phrases/</loc></url><url><loc>https://www.cypro.se/2025/05/08/sonicwall-patches-3-flaws-in-sma-100-devices-allowing-attackers-to-run-code-as-root/</loc></url><url><loc>https://www.cypro.se/2025/05/08/qilin-ransomware-ranked-highest-in-april-2025-with-72-data-leak-disclosures/</loc></url><url><loc>https://www.cypro.se/2025/05/14/samsung-patches-cve-2025-4632-used-to-deploy-mirai-botnet-via-magicinfo-9-exploit/</loc></url><url><loc>https://www.cypro.se/2025/05/14/bianlian-and-ransomexx-exploit-sap-netweaver-flaw-to-deploy-pipemagic-trojan/</loc></url><url><loc>https://www.cypro.se/2025/05/14/xinbi-telegram-market-tied-to-8-4b-in-crypto-crime-romance-scams-north-korea-laundering/</loc></url><url><loc>https://www.cypro.se/2025/05/14/ctm360-identifies-surge-in-phishing-attacks-targeting-meta-business-users/</loc></url><url><loc>https://www.cypro.se/2025/05/14/earth-ammit-breached-drone-supply-chains-via-erp-in-venom-tidrone-campaigns/</loc></url><url><loc>https://www.cypro.se/2025/05/14/learning-how-to-hack-why-offensive-security-training-benefits-your-entire-security-team/</loc></url><url><loc>https://www.cypro.se/2025/05/14/horabot-malware-targets-6-latin-american-nations-using-invoice-themed-phishing-emails/</loc></url><url><loc>https://www.cypro.se/2025/05/14/microsoft-fixes-78-flaws-5-zero-days-exploited-cvss-10-bug-impacts-azure-devops-server/</loc></url><url><loc>https://www.cypro.se/2025/05/14/fortinet-patches-cve-2025-32756-zero-day-rce-flaw-exploited-in-fortivoice-systems/</loc></url><url><loc>https://www.cypro.se/2025/05/14/ivanti-patches-epmm-vulnerabilities-exploited-for-remote-code-execution-in-limited-attacks/</loc></url><url><loc>https://www.cypro.se/2025/05/15/5-bcdr-essentials-for-effective-ransomware-defense/</loc></url><url><loc>https://www.cypro.se/2025/05/15/russia-linked-apt28-exploited-mdaemon-zero-day-to-hack-government-webmail-servers/</loc></url><url><loc>https://www.cypro.se/2025/05/15/malicious-npm-package-leverages-unicode-steganography-google-calendar-as-c2-dropper/</loc></url><url><loc>https://www.cypro.se/2025/05/15/pen-testing-for-compliance-only-its-time-to-change-your-approach/</loc></url><url><loc>https://www.cypro.se/2025/05/15/coinbase-agents-bribed-data-of-1-users-leaked-20m-extortion-attempt-fails/</loc></url><url><loc>https://www.cypro.se/2025/05/15/meta-to-train-ai-on-e-u-user-data-from-may-27-without-consent-noyb-threatens-lawsuit/</loc></url><url><loc>https://www.cypro.se/2025/05/16/webinar-from-code-to-cloud-to-soc-learn-a-smarter-way-to-defend-modern-applications/</loc></url><url><loc>https://www.cypro.se/2025/05/16/researchers-expose-new-intel-cpu-flaws-enabling-memory-leaks-and-spectre-v2-attacks/</loc></url><url><loc>https://www.cypro.se/2025/05/16/fileless-remcos-rat-delivered-via-lnk-files-and-mshta-in-powershell-based-attacks/</loc></url><url><loc>https://www.cypro.se/2025/05/16/top-10-best-practices-for-effective-data-protection/</loc></url><url><loc>https://www.cypro.se/2025/05/16/new-httpbot-botnet-launches-200-precision-ddos-attacks-on-gaming-and-tech-sectors/</loc></url><url><loc>https://www.cypro.se/2025/05/19/why-ctem-is-the-winning-bet-for-cisos-in-2025/</loc></url><url><loc>https://www.cypro.se/2025/05/19/firefox-patches-2-zero-days-exploited-at-pwn2own-berlin-with-100k-in-rewards/</loc></url><url><loc>https://www.cypro.se/2025/05/19/%e2%9a%a1-weekly-recap-zero-day-exploits-insider-threats-apt-targeting-botnets-and-more/</loc></url><url><loc>https://www.cypro.se/2025/05/08/mirrorface-targets-japan-and-taiwan-with-roamingmouse-and-upgraded-anel-malware/</loc></url><url><loc>https://www.cypro.se/2025/05/19/ransomware-gangs-use-skitnet-malware-for-stealthy-data-theft-and-remote-access/</loc></url><url><loc>https://www.cypro.se/2025/05/19/rvtools-official-site-hacked-to-deliver-bumblebee-malware-via-trojanized-installer/</loc></url><url><loc>https://www.cypro.se/2025/05/20/malicious-pypi-packages-exploit-instagram-and-tiktok-apis-to-validate-user-accounts/</loc></url><url><loc>https://www.cypro.se/2025/05/08/security-tools-alone-dont-protect-you-control-effectiveness-does/</loc></url><url><loc>https://www.cypro.se/2025/05/20/go-based-malware-deploys-xmrig-miner-on-linux-hosts-via-redis-configuration-abuse/</loc></url><url><loc>https://www.cypro.se/2025/05/20/decommissioning-assets/</loc></url><url><loc>https://www.cypro.se/2025/05/20/chinese-hackers-deploy-marssnake-backdoor-in-multi-year-attack-on-saudi-organization/</loc></url><url><loc>https://www.cypro.se/2025/05/20/the-crowded-battle-key-insights-from-the-2025-state-of-pentesting-report/</loc></url><url><loc>https://www.cypro.se/2025/05/20/south-asian-ministries-hit-by-sidewinder-apt-using-old-office-flaws-and-custom-malware/</loc></url><url><loc>https://www.cypro.se/2025/05/20/aws-default-iam-roles-found-to-enable-lateral-movement-and-cross-service-exploitation/</loc></url><url><loc>https://www.cypro.se/2025/05/20/100-fake-chrome-extensions-found-hijacking-sessions-stealing-credentials-injecting-ads/</loc></url><url><loc>https://www.cypro.se/2025/05/20/hazy-hawk-exploits-dns-records-to-hijack-cdc-corporate-domains-for-malware-delivery/</loc></url><url><loc>https://www.cypro.se/2025/05/21/google-chrome-can-now-auto-change-compromised-passwords-using-its-built-in-manager/</loc></url><url><loc>https://www.cypro.se/2025/05/21/researchers-expose-pwa-javascript-attack-that-redirects-users-to-adult-scam-apps/</loc></url><url><loc>https://www.cypro.se/2025/05/21/how-to-detect-phishing-attacks-faster-tycoon2fa-example/</loc></url><url><loc>https://www.cypro.se/2025/05/21/fake-kling-ai-facebook-ads-deliver-rat-malware-to-over-22-million-potential-victims/</loc></url><url><loc>https://www.cypro.se/2025/05/21/securing-ci-cd-workflows-with-wazuh/</loc></url><url><loc>https://www.cypro.se/2025/05/21/purerat-malware-spikes-4x-in-2025-deploying-purelogs-to-target-russian-firms/</loc></url><url><loc>https://www.cypro.se/2025/05/21/facing-the-cyber-threat-behind-the-headlines/</loc></url><url><loc>https://www.cypro.se/2025/05/21/russian-hackers-exploit-email-and-vpn-vulnerabilities-to-spy-on-ukraine-aid-logistics/</loc></url><url><loc>https://www.cypro.se/2025/05/22/fbi-and-europol-disrupt-lumma-stealer-malware-network-linked-to-10-million-infections/</loc></url><url><loc>https://www.cypro.se/2025/05/22/identity-security-has-an-automation-problem-and-its-bigger-than-you-think/</loc></url><url><loc>https://www.cypro.se/2025/05/22/chinese-hackers-exploit-ivanti-epmm-bugs-in-global-enterprise-network-attacks/</loc></url><url><loc>https://www.cypro.se/2025/05/22/new-etsi-standard-protects-ai-systems-from-evolving-cyber-threats/</loc></url><url><loc>https://www.cypro.se/2025/05/22/webinar-learn-how-to-build-a-reasonable-and-legally-defensible-cybersecurity-program/</loc></url><url><loc>https://www.cypro.se/2025/05/22/unpatched-versa-concerto-flaws-let-attackers-escape-docker-and-compromise-host/</loc></url><url><loc>https://www.cypro.se/2025/05/22/critical-windows-server-2025-dmsa-vulnerability-enables-active-directory-compromise/</loc></url><url><loc>https://www.cypro.se/2025/05/22/chinese-hackers-exploit-trimble-cityworks-flaw-to-infiltrate-u-s-government-networks/</loc></url><url><loc>https://www.cypro.se/2025/05/23/cisa-warns-of-suspected-broader-saas-attacks-exploiting-app-secrets-and-cloud-misconfigs/</loc></url><url><loc>https://www.cypro.se/2025/05/23/gitlab-duo-vulnerability-enabled-attackers-to-hijack-ai-responses-with-hidden-prompts/</loc></url><url><loc>https://www.cypro.se/2025/05/23/u-s-dismantles-danabot-malware-network-charges-16-in-50m-global-cybercrime-operation/</loc></url><url><loc>https://www.cypro.se/2025/05/23/safeline-waf-open-source-web-application-firewall-with-zero-day-detection-and-bot-protection/</loc></url><url><loc>https://www.cypro.se/2025/05/23/300-servers-and-e3-5m-seized-as-europol-strikes-ransomware-networks-worldwide/</loc></url><url><loc>https://www.cypro.se/2025/05/23/vicioustrap-uses-cisco-flaw-to-build-global-honeypot-from-5300-compromised-devices/</loc></url><url><loc>https://www.cypro.se/2025/05/23/hackers-use-tiktok-videos-to-distribute-vidar-and-stealc-malware-via-clickfix-technique/</loc></url><url><loc>https://www.cypro.se/2025/05/25/hackers-use-fake-vpn-and-browser-nsis-installers-to-deliver-winos-4-0-malware/</loc></url><url><loc>https://www.cypro.se/2025/05/26/%e2%9a%a1-weekly-recap-apt-campaigns-browser-hijacks-ai-malware-cloud-breaches-and-critical-cves/</loc></url><url><loc>https://www.cypro.se/2025/05/26/cisos-guide-to-web-privacy-validation-and-why-its-important/</loc></url><url><loc>https://www.cypro.se/2025/05/26/over-70-malicious-npm-and-vs-code-packages-found-stealing-data-and-crypto/</loc></url><url><loc>https://www.cypro.se/2025/05/27/russia-linked-hackers-target-tajikistan-government-with-weaponized-word-documents/</loc></url><url><loc>https://www.cypro.se/2025/05/27/hackers-are-calling-your-office-fbi-alerts-law-firms-to-luna-moths-stealth-phishing-campaign/</loc></url><url><loc>https://www.cypro.se/2025/05/27/employees-searching-payroll-portals-on-google-tricked-into-sending-paychecks-to-hackers/</loc></url><url><loc>https://www.cypro.se/2025/05/15/new-chrome-vulnerability-enables-cross-origin-data-leak-via-loader-referrer-policy/</loc></url><url><loc>https://www.cypro.se/2025/05/27/russian-hackers-breach-20-ngos-using-evilginx-phishing-via-fake-microsoft-entra-pages/</loc></url><url><loc>https://www.cypro.se/2025/05/27/ai-agents-and-the-non%e2%80%91human-identity-crisis-how-to-deploy-ai-more-securely-at-scale/</loc></url><url><loc>https://www.cypro.se/2025/05/27/new-self-spreading-malware-infects-docker-containers-to-mine-dero-cryptocurrency/</loc></url><url><loc>https://www.cypro.se/2025/05/27/cybercriminals-clone-antivirus-site-to-spread-venom-rat-and-steal-crypto-wallets/</loc></url><url><loc>https://www.cypro.se/2025/05/28/apple-blocks-9-billion-in-fraud-over-5-years-amid-rising-app-store-threats/</loc></url><url><loc>https://www.cypro.se/2025/05/28/how-browser-in-the-middle-attacks-steal-sessions-in-seconds/</loc></url><url><loc>https://www.cypro.se/2025/05/28/251-amazon-hosted-ips-used-in-exploit-scan-targeting-coldfusion-struts-and-elasticsearch/</loc></url><url><loc>https://www.cypro.se/2025/05/28/mimo-hackers-exploit-cve-2025-32432-in-craft-cms-to-deploy-cryptominer-and-proxyware/</loc></url><url><loc>https://www.cypro.se/2025/05/28/new-pumabot-botnet-targets-linux-iot-devices-to-steal-ssh-credentials-and-mine-crypto/</loc></url><url><loc>https://www.cypro.se/2025/05/28/from-infection-to-access-a-24-hour-timeline-of-a-modern-stealer-campaign/</loc></url><url><loc>https://www.cypro.se/2025/05/28/microsoft-onedrive-file-picker-flaw-grants-apps-full-cloud-access-even-when-uploading-just-one-file/</loc></url><url><loc>https://www.cypro.se/2025/05/28/iranian-hacker-pleads-guilty-in-19-million-robbinhood-ransomware-attack-on-baltimore/</loc></url><url><loc>https://www.cypro.se/2025/05/28/czech-republic-blames-china-linked-apt31-hackers-for-2022-cyberattack/</loc></url><url><loc>https://www.cypro.se/2025/05/27/the-threat-landscape-smishing/</loc></url><url><loc>https://www.cypro.se/2025/05/29/over-100000-wordpress-sites-at-risk-from-critical-cvss-10-0-vulnerability-in-wishlist-plugin/</loc></url><url><loc>https://www.cypro.se/2025/05/29/chinese-apt41-exploits-google-calendar-for-malware-command-and-control-operations/</loc></url><url><loc>https://www.cypro.se/2025/05/29/dragonforce-exploits-simplehelp-flaws-to-deploy-ransomware-across-customer-endpoints/</loc></url><url><loc>https://www.cypro.se/2025/05/29/new-windows-rat-evades-detection-for-weeks-using-corrupted-dos-and-pe-headers/</loc></url><url><loc>https://www.cypro.se/2025/05/29/cybercriminals-target-ai-users-with-malware-loaded-installers-posing-as-popular-tools/</loc></url><url><loc>https://www.cypro.se/2025/05/30/meta-disrupts-influence-ops-targeting-romania-azerbaijan-and-taiwan-with-fake-personas/</loc></url><url><loc>https://www.cypro.se/2025/05/30/connectwise-hit-by-cyberattack-nation-state-actor-suspected-in-targeted-breach/</loc></url><url><loc>https://www.cypro.se/2025/05/30/u-s-sanctions-funnull-for-200m-romance-baiting-scams-tied-to-crypto-fraud/</loc></url><url><loc>https://www.cypro.se/2025/05/30/china-linked-hackers-exploit-sap-and-sql-server-flaws-in-attacks-across-asia-and-brazil/</loc></url><url><loc>https://www.cypro.se/2025/05/30/from-the-department-of-no-to-a-culture-of-yes-a-healthcare-cisos-journey-to-enabling-modern-care/</loc></url><url><loc>https://www.cypro.se/2025/05/30/new-eddiestealer-malware-bypasses-chromes-app-bound-encryption-to-steal-browser-data/</loc></url><url><loc>https://www.cypro.se/2025/05/31/u-s-doj-seizes-4-domains-supporting-cybercrime-crypting-services-in-global-operation/</loc></url><url><loc>https://www.cypro.se/2025/05/31/new-linux-flaws-allow-password-hash-theft-via-core-dumps-in-ubuntu-rhel-fedora/</loc></url><url><loc>https://www.cypro.se/2025/06/02/fake-recruiter-emails-target-cfos-using-legit-netbird-tool-across-6-global-regions/</loc></url><url><loc>https://www.cypro.se/2025/06/02/the-secret-defense-strategy-of-four-critical-industries-combating-advanced-cyber-threats/</loc></url><url><loc>https://www.cypro.se/2025/06/02/%e2%9a%a1-weekly-recap-apt-intrusions-ai-malware-zero-click-exploits-browser-hijacks-and-more/</loc></url><url><loc>https://www.cypro.se/2025/06/02/qualcomm-fixes-3-zero-days-used-in-targeted-android-attacks-via-adreno-gpu/</loc></url><url><loc>https://www.cypro.se/2025/06/02/cryptojacking-campaign-exploits-devops-apis-using-off-the-shelf-tools-from-github/</loc></url><url><loc>https://www.cypro.se/2025/06/02/preinstalled-apps-on-ulefone-krugermatz-phones-let-any-app-reset-device-steal-pin/</loc></url><url><loc>https://www.cypro.se/2025/06/02/be-wary-of-quishing/</loc></url><url><loc>https://www.cypro.se/2025/06/03/new-chrome-zero-day-actively-exploited-google-issues-emergency-out-of-band-patch/</loc></url><url><loc>https://www.cypro.se/2025/06/03/google-chrome-to-distrust-two-certificate-authorities-over-compliance-and-conduct-issues/</loc></url><url><loc>https://www.cypro.se/2025/06/03/microsoft-and-crowdstrike-launch-shared-threat-actor-glossary-to-cut-attribution-confusion/</loc></url><url><loc>https://www.cypro.se/2025/06/03/android-trojan-crocodilus-now-active-in-8-countries-targeting-banks-and-crypto-wallets/</loc></url><url><loc>https://www.cypro.se/2025/06/03/scattered-spider-understanding-help-desk-scams-and-how-to-defend-your-organization/</loc></url><url><loc>https://www.cypro.se/2025/06/03/critical-10-year-old-roundcube-webmail-bug-allows-authenticated-users-run-malicious-code/</loc></url><url><loc>https://www.cypro.se/2025/06/03/fake-docusign-gitcode-sites-spread-netsupport-rat-via-multi-stage-powershell-attack/</loc></url><url><loc>https://www.cypro.se/2025/06/04/hpe-issues-security-patch-for-storeonce-bug-allowing-remote-authentication-bypass/</loc></url><url><loc>https://www.cypro.se/2025/06/03/creating-the-right-organisational-culture-for-cyber-security/</loc></url><url><loc>https://www.cypro.se/2025/06/04/malicious-pypi-npm-and-ruby-packages-exposed-in-ongoing-open-source-supply-chain-attacks/</loc></url><url><loc>https://www.cypro.se/2025/06/04/your-saas-data-isnt-safe-why-traditional-dlp-solutions-fail-in-the-browser-era/</loc></url><url><loc>https://www.cypro.se/2025/06/04/chaos-rat-malware-targets-windows-and-linux-via-fake-network-tool-downloads/</loc></url><url><loc>https://www.cypro.se/2025/06/04/google-exposes-vishing-group-unc6040-targeting-salesforce-with-fake-data-loader-app/</loc></url><url><loc>https://www.cypro.se/2025/06/05/critical-cisco-ise-auth-bypass-flaw-impacts-cloud-deployments-on-aws-azure-and-oci/</loc></url><url><loc>https://www.cypro.se/2025/06/05/doj-seizes-145-domains-tied-to-bidencash-carding-marketplace-in-global-takedown/</loc></url><url><loc>https://www.cypro.se/2025/06/05/redefining-cyber-value-why-business-impact-should-lead-the-security-conversation/</loc></url><url><loc>https://www.cypro.se/2025/06/05/iran-linked-bladedfeline-hits-iraqi-and-kurdish-targets-with-whisper-and-spearal-malware/</loc></url><url><loc>https://www.cypro.se/2025/06/05/researchers-detail-bitter-apts-evolving-tactics-as-its-geographic-scope-expands/</loc></url><url><loc>https://www.cypro.se/2025/06/05/popular-chrome-extensions-leak-api-keys-user-data-via-http-and-hardcoded-credentials/</loc></url><url><loc>https://www.cypro.se/2025/06/06/new-pathwiper-data-wiper-malware-disrupts-ukrainian-critical-infrastructure-in-2025-attack/</loc></url><url><loc>https://www.cypro.se/2025/06/06/inside-the-mind-of-the-adversary-why-more-security-leaders-are-selecting-aev/</loc></url><url><loc>https://www.cypro.se/2025/06/06/empower-users-and-protect-against-genai-data-loss/</loc></url><url><loc>https://www.cypro.se/2025/06/06/microsoft-helps-cbi-dismantle-indian-call-centers-behind-japanese-tech-support-scam/</loc></url><url><loc>https://www.cypro.se/2025/06/06/new-atomic-macos-stealer-campaign-exploits-clickfix-to-target-apple-users/</loc></url><url><loc>https://www.cypro.se/2025/06/08/malicious-browser-extensions-infect-722-users-across-latin-america-since-early-2025/</loc></url><url><loc>https://www.cypro.se/2025/06/08/new-supply-chain-malware-operation-hits-npm-and-pypi-ecosystems-targeting-millions-globally/</loc></url><url><loc>https://www.cypro.se/2025/06/09/openai-bans-chatgpt-accounts-used-by-russian-iranian-and-chinese-hacker-groups/</loc></url><url><loc>https://www.cypro.se/2025/06/06/sausages-and-incentives-rewarding-a-resilient-technology-future/</loc></url><url><loc>https://www.cypro.se/2025/06/09/%e2%9a%a1-weekly-recap-chrome-0-day-data-wipers-misused-tools-and-zero-click-iphone-attacks/</loc></url><url><loc>https://www.cypro.se/2025/06/09/think-your-idp-or-casb-covers-shadow-it-these-5-risks-prove-otherwise/</loc></url><url><loc>https://www.cypro.se/2025/06/09/two-distinct-botnets-exploit-wazuh-server-vulnerability-to-launch-mirai-based-attacks/</loc></url><url><loc>https://www.cypro.se/2025/06/09/over-70-organizations-across-multiple-sectors-targeted-by-china-linked-cyber-espionage-group/</loc></url><url><loc>https://www.cypro.se/2025/06/10/cisa-adds-erlang-ssh-and-roundcube-flaws-to-known-exploited-vulnerabilities-catalog/</loc></url><url><loc>https://www.cypro.se/2025/06/10/rare-werewolf-apt-uses-legitimate-software-in-attacks-on-hundreds-of-russian-enterprises/</loc></url><url><loc>https://www.cypro.se/2025/06/10/researcher-found-flaw-to-discover-phone-numbers-linked-to-any-google-account/</loc></url><url><loc>https://www.cypro.se/2025/06/10/the-hidden-threat-in-your-stack-why-non-human-identity-management-is-the-next-cybersecurity-frontier/</loc></url><url><loc>https://www.cypro.se/2025/06/10/rust-based-myth-stealer-malware-spread-via-fake-gaming-sites-targets-chrome-firefox-users/</loc></url><url><loc>https://www.cypro.se/2025/06/10/fin6-uses-aws-hosted-fake-resumes-on-linkedin-to-deliver-more_eggs-malware/</loc></url><url><loc>https://www.cypro.se/2025/06/10/adobe-releases-patch-fixing-254-vulnerabilities-closing-high-severity-security-gaps/</loc></url><url><loc>https://www.cypro.se/2025/06/10/researchers-uncover-20-configuration-risks-including-five-cves-in-salesforce-industry-cloud/</loc></url><url><loc>https://www.cypro.se/2025/06/11/microsoft-patches-67-vulnerabilities-including-webdav-zero-day-exploited-in-the-wild/</loc></url><url><loc>https://www.cypro.se/2025/06/11/sinotrack-gps-devices-vulnerable-to-remote-vehicle-control-via-default-passwords/</loc></url><url><loc>https://www.cypro.se/2025/06/11/how-to-build-a-lean-security-model-5-lessons-from-river-island/</loc></url><url><loc>https://www.cypro.se/2025/06/11/interpol-dismantles-20000-malicious-ips-linked-to-69-malware-variants-in-operation-secure/</loc></url><url><loc>https://www.cypro.se/2025/06/11/why-dns-security-is-your-first-defense-against-cyber-attacks/</loc></url><url><loc>https://www.cypro.se/2025/05/20/nist-nccoe-cybersecurity-and-privacy-of-genomic-data-workshop/</loc></url><url><loc>https://www.cypro.se/2025/05/05/nccoe-cybersecurity-connections-celebrating-national-small-business-week/</loc></url><url><loc>https://www.cypro.se/2025/04/17/iot-open-house-implementing-sp-1800-36-and-the-road-ahead/</loc></url><url><loc>https://www.cypro.se/2025/04/03/nccoe-mobile-drivers-licenses-project-update-webinar/</loc></url><url><loc>https://www.cypro.se/2025/04/03/cyber-ai-profile-workshop/</loc></url><url><loc>https://www.cypro.se/2025/03/17/open-for-public-comment-draft-nist-5g-cybersecurity-practice-guide/</loc></url><url><loc>https://www.cypro.se/2025/03/13/cybersecurity-framework-profile-for-semiconductor-manufacturing-public-workshop/</loc></url><url><loc>https://www.cypro.se/2025/06/11/nist-offers-19-ways-to-build-zero-trust-architectures/</loc></url><url><loc>https://www.cypro.se/2025/06/11/295-malicious-ips-launch-coordinated-brute-force-attacks-on-apache-tomcat-manager/</loc></url><url><loc>https://www.cypro.se/2025/06/11/former-black-basta-members-use-microsoft-teams-and-python-scripts-in-2025-attacks/</loc></url><url><loc>https://www.cypro.se/2025/06/12/over-80000-microsoft-entra-id-accounts-targeted-using-open-source-teamfiltration-tool/</loc></url><url><loc>https://www.cypro.se/2025/06/12/connectwise-to-rotate-screenconnect-code-signing-certificates-due-to-security-risks/</loc></url><url><loc>https://www.cypro.se/2025/06/12/zero-click-ai-vulnerability-exposes-microsoft-365-copilot-data-without-user-interaction/</loc></url><url><loc>https://www.cypro.se/2025/06/12/non-human-identities-how-to-address-the-expanding-security-risk/</loc></url><url><loc>https://www.cypro.se/2025/06/12/ai-agents-run-on-secret-accounts-learn-how-to-secure-them-in-this-webinar/</loc></url><url><loc>https://www.cypro.se/2025/06/12/new-tokenbreak-attack-bypasses-ai-moderation-with-single-character-text-changes/</loc></url><url><loc>https://www.cypro.se/2025/06/12/wordpress-sites-turned-weapon-how-vextrio-and-affiliates-run-a-global-scam-network/</loc></url><url><loc>https://www.cypro.se/2025/06/10/the-summer-online-safety-guide-for-kids/</loc></url><url><loc>https://www.cypro.se/2025/06/13/apple-zero-click-flaw-in-messages-exploited-to-spy-on-journalists-using-paragon-spyware/</loc></url><url><loc>https://www.cypro.se/2025/06/13/ransomware-gangs-exploit-unpatched-simplehelp-flaws-to-target-victims-with-double-extortion/</loc></url><url><loc>https://www.cypro.se/2025/06/13/ctem-is-the-new-soc-shifting-from-monitoring-alerts-to-measuring-risk/</loc></url><url><loc>https://www.cypro.se/2025/06/13/over-269000-websites-infected-with-jsfiretruck-javascript-malware-in-one-month/</loc></url><url><loc>https://www.cypro.se/2025/06/14/discord-invite-link-hijacking-delivers-asyncrat-and-skuld-stealer-targeting-crypto-wallets/</loc></url><url><loc>https://www.cypro.se/2025/06/16/malicious-pypi-package-masquerades-as-chimera-module-to-steal-aws-ci-cd-and-macos-data/</loc></url><url><loc>https://www.cypro.se/2025/06/16/%e2%9a%a1-weekly-recap-iphone-spyware-microsoft-0-day-tokenbreak-hack-ai-data-leaks-and-more/</loc></url><url><loc>https://www.cypro.se/2025/06/16/playbook-transforming-your-cybersecurity-practice-into-an-mrr-machine/</loc></url><url><loc>https://www.cypro.se/2025/06/16/anubis-ransomware-encrypts-and-wipes-files-making-recovery-impossible-even-after-payment/</loc></url><url><loc>https://www.cypro.se/2025/06/16/u-s-seizes-7-74m-in-crypto-tied-to-north-koreas-global-fake-it-worker-network/</loc></url><url><loc>https://www.cypro.se/2025/06/17/meta-starts-showing-ads-on-whatsapp-after-6-year-delay-from-2018-announcement/</loc></url><url><loc>https://www.cypro.se/2025/06/17/tp-link-router-flaw-cve-2023-33538-under-active-exploit-cisa-issues-immediate-alert/</loc></url><url><loc>https://www.cypro.se/2025/06/17/new-flodrix-botnet-variant-exploits-langflow-ai-server-rce-bug-to-launch-ddos-attacks/</loc></url><url><loc>https://www.cypro.se/2025/06/17/are-forgotten-ad-service-accounts-leaving-you-at-risk/</loc></url><url><loc>https://www.cypro.se/2025/06/17/hard-coded-b-password-in-sitecore-xp-sparks-major-rce-risk-in-enterprise-deployments/</loc></url><url><loc>https://www.cypro.se/2025/06/17/backups-are-under-attack-how-to-protect-your-backups/</loc></url><url><loc>https://www.cypro.se/2025/06/17/silver-fox-apt-targets-taiwan-with-complex-gh0stcringe-and-holdinghands-rat-malware/</loc></url><url><loc>https://www.cypro.se/2025/06/17/google-warns-of-scattered-spider-attacks-targeting-it-support-teams-at-u-s-insurance-firms/</loc></url><url><loc>https://www.cypro.se/2025/06/17/langsmith-bug-could-expose-openai-keys-and-user-data-via-malicious-agents/</loc></url><url><loc>https://www.cypro.se/2025/06/17/google-chrome-zero-day-cve-2025-2783-exploited-by-taxoff-to-deploy-trinper-backdoor/</loc></url><url><loc>https://www.cypro.se/2025/06/18/veeam-patches-cve-2025-23121-critical-rce-bug-rated-9-9-cvss-in-backup-replication/</loc></url><url><loc>https://www.cypro.se/2025/06/18/iran-slows-internet-to-prevent-cyber-attacks-amid-escalating-regional-conflict/</loc></url><url><loc>https://www.cypro.se/2025/06/18/cisa-warns-of-active-exploitation-of-linux-kernel-privilege-escalation-vulnerability/</loc></url><url><loc>https://www.cypro.se/2025/06/18/ex-cia-analyst-sentenced-to-37-months-for-leaking-top-secret-national-defense-documents/</loc></url><url><loc>https://www.cypro.se/2025/06/17/new-nist-5g-cybersecurity-white-paper-network-security-design-principles/</loc></url><url><loc>https://www.cypro.se/2025/06/18/fedramp-at-startup-speed-lessons-learned/</loc></url><url><loc>https://www.cypro.se/2025/06/18/water-curse-hijacks-76-github-accounts-to-deliver-multi-stage-malware-campaign/</loc></url><url><loc>https://www.cypro.se/2025/06/18/1500-minecraft-players-infected-by-java-malware-masquerading-as-game-mods-on-github/</loc></url><url><loc>https://www.cypro.se/2025/06/18/new-malware-campaign-uses-cloudflare-tunnels-to-deliver-rats-via-phishing-chains/</loc></url><url><loc>https://www.cypro.se/2025/06/19/new-linux-flaws-enable-full-root-access-via-pam-and-udisks-across-major-distributions/</loc></url><url><loc>https://www.cypro.se/2025/06/19/meta-adds-passkey-login-support-to-facebook-for-android-and-ios-users/</loc></url><url><loc>https://www.cypro.se/2025/06/19/russian-apt29-exploits-gmail-app-passwords-to-bypass-2fa-in-targeted-phishing-campaign/</loc></url><url><loc>https://www.cypro.se/2025/06/18/now-available-nist-nccoe-chatbot-internal-report/</loc></url><url><loc>https://www.cypro.se/2025/06/19/uncover-lots-attacks-hiding-in-trusted-tools-learn-how-in-this-free-expert-session/</loc></url><url><loc>https://www.cypro.se/2025/06/19/bluenoroff-deepfake-zoom-scam-hits-crypto-employee-with-macos-backdoor-malware/</loc></url><url><loc>https://www.cypro.se/2025/06/19/secure-vibe-coding-the-complete-new-guide/</loc></url><url><loc>https://www.cypro.se/2025/06/19/new-android-malware-surge-hits-devices-via-overlays-virtualization-fraud-and-nfc-theft/</loc></url><url><loc>https://www.cypro.se/2025/06/20/67-trojanized-github-repositories-found-in-campaign-targeting-gamers-and-developers/</loc></url><url><loc>https://www.cypro.se/2025/06/20/6-steps-to-24-7-in-house-soc-success/</loc></url><url><loc>https://www.cypro.se/2025/06/20/massive-7-3-tbps-ddos-attack-delivers-37-4-tb-in-45-seconds-targeting-hosting-provider/</loc></url><url><loc>https://www.cypro.se/2025/06/20/irans-state-tv-hijacked-mid-broadcast-amid-geopolitical-tensions-90m-stolen-in-crypto-heist/</loc></url><url><loc>https://www.cypro.se/2025/06/20/qilin-ransomware-adds-call-lawyer-feature-to-pressure-victims-for-larger-ransoms/</loc></url><url><loc>https://www.cypro.se/2025/06/21/scattered-spider-behind-cyberattacks-on-ms-and-co-op-causing-up-to-592m-in-damages/</loc></url><url><loc>https://www.cypro.se/2025/06/23/have-you-got-what-it-takes-to-be-a-cyber-advisor/</loc></url><url><loc>https://www.cypro.se/2025/06/23/%e2%9a%a1-weekly-recap-chrome-0-day-7-3-tbps-ddos-mfa-bypass-tricks-banking-trojan-and-more/</loc></url><url><loc>https://www.cypro.se/2025/06/23/google-adds-multi-layered-defenses-to-secure-genai-from-prompt-injection-attacks/</loc></url><url><loc>https://www.cypro.se/2025/06/23/how-ai-enabled-workflow-automation-can-help-socs-reduce-burnout/</loc></url><url><loc>https://www.cypro.se/2025/06/23/xdigo-malware-exploits-windows-lnk-flaw-in-eastern-european-government-attacks/</loc></url><url><loc>https://www.cypro.se/2025/06/23/echo-chamber-jailbreak-tricks-llms-like-openai-and-google-into-generating-harmful-content/</loc></url><url><loc>https://www.cypro.se/2025/06/23/dhs-warns-pro-iranian-hackers-likely-to-target-u-s-networks-after-iranian-nuclear-strikes/</loc></url><url><loc>https://www.cypro.se/2025/06/24/china-linked-salt-typhoon-exploits-critical-cisco-vulnerability-to-target-canadian-telecom/</loc></url><url><loc>https://www.cypro.se/2025/06/24/trusting-the-tech-using-password-managers-and-passkeys-to-help-you-stay-secure-online/</loc></url><url><loc>https://www.cypro.se/2025/06/24/u-s-house-bans-whatsapp-on-official-devices-over-security-and-data-protection-issues/</loc></url><url><loc>https://www.cypro.se/2025/06/24/apt28-uses-signal-chat-to-deploy-beardshell-malware-and-covenant-in-ukraine/</loc></url><url><loc>https://www.cypro.se/2025/06/24/hackers-exploit-misconfigured-docker-apis-to-mine-cryptocurrency-via-tor-network/</loc></url><url><loc>https://www.cypro.se/2025/06/24/between-buzz-and-reality-the-ctem-conversation-we-all-need/</loc></url><url><loc>https://www.cypro.se/2025/06/24/researchers-find-way-to-shut-down-cryptominer-campaigns-using-bad-shares-and-xmrogue/</loc></url><url><loc>https://www.cypro.se/2025/06/24/hackers-target-over-70-microsoft-exchange-servers-to-steal-credentials-via-keyloggers/</loc></url><url><loc>https://www.cypro.se/2025/06/24/new-u-s-visa-rule-requires-applicants-to-set-social-media-account-privacy-to-public/</loc></url><url><loc>https://www.cypro.se/2025/06/25/microsoft-extends-windows-10-security-updates-for-one-year-with-new-enrollment-options/</loc></url><url><loc>https://www.cypro.se/2025/06/25/north-korea-linked-supply-chain-attack-targets-developers-with-35-malicious-npm-packages/</loc></url><url><loc>https://www.cypro.se/2025/06/25/sonicwall-netextender-trojan-and-connectwise-exploits-used-in-remote-access-attacks/</loc></url><url><loc>https://www.cypro.se/2025/06/25/pro-iranian-hacktivist-group-leaks-personal-records-from-the-2024-saudi-games/</loc></url><url><loc>https://www.cypro.se/2025/06/25/beware-the-hidden-risk-in-your-entra-environment/</loc></url><url><loc>https://www.cypro.se/2025/06/25/citrix-bleed-2-flaw-enables-token-theft-sap-gui-flaws-risk-sensitive-data-exposure/</loc></url><url><loc>https://www.cypro.se/2025/06/25/citrix-releases-emergency-patches-for-actively-exploited-cve-2025-6543-in-netscaler-adc/</loc></url><url><loc>https://www.cypro.se/2025/06/25/noauth-vulnerability-still-affects-9-of-microsoft-entra-saas-apps-two-years-after-discovery/</loc></url><url><loc>https://www.cypro.se/2025/06/26/whatsapp-adds-ai-powered-message-summaries-for-faster-chat-previews/</loc></url><url><loc>https://www.cypro.se/2025/06/26/cisa-adds-3-flaws-to-kev-catalog-impacting-ami-megarac-d-link-fortinet/</loc></url><url><loc>https://www.cypro.se/2025/06/26/cyber-criminals-exploit-open-source-tools-to-compromise-financial-institutions-across-africa/</loc></url><url><loc>https://www.cypro.se/2025/06/26/iranian-apt35-hackers-targeting-israeli-tech-experts-with-ai-powered-phishing-attacks/</loc></url><url><loc>https://www.cypro.se/2025/06/26/the-hidden-risks-of-saas-why-built-in-protections-arent-enough-for-modern-data-resilience/</loc></url><url><loc>https://www.cypro.se/2025/06/26/critical-rce-flaws-in-cisco-ise-and-ise-pic-allow-unauthenticated-attackers-to-gain-root-access/</loc></url><url><loc>https://www.cypro.se/2025/06/26/new-filefix-method-emerges-as-a-threat-following-517-rise-in-clickfix-attacks/</loc></url><url><loc>https://www.cypro.se/2025/06/26/critical-open-vsx-registry-flaw-exposes-millions-of-developers-to-supply-chain-attacks/</loc></url><url><loc>https://www.cypro.se/2025/06/27/oneclik-malware-targets-energy-sector-using-microsoft-clickonce-and-golang-backdoors/</loc></url><url><loc>https://www.cypro.se/2025/06/27/moveit-transfer-faces-increased-threats-as-scanning-surges-and-cve-flaws-are-targeted/</loc></url><url><loc>https://www.cypro.se/2025/06/27/business-case-for-agentic-ai-soc-analysts/</loc></url><url><loc>https://www.cypro.se/2025/06/27/chinese-group-silver-fox-uses-fake-websites-to-deliver-sainbox-rat-and-hidden-rootkit/</loc></url><url><loc>https://www.cypro.se/2025/06/27/pubload-and-pubshell-malware-used-in-mustang-pandas-tibet-specific-attack/</loc></url><url><loc>https://www.cypro.se/2025/06/27/over-1000-soho-devices-hacked-in-china-linked-lapdogs-cyber-espionage-campaign/</loc></url><url><loc>https://www.cypro.se/2025/06/28/facebooks-new-ai-tool-asks-to-upload-your-photos-for-story-ideas-sparking-privacy-concerns/</loc></url><url><loc>https://www.cypro.se/2025/06/28/giftedcrook-malware-evolves-from-browser-stealer-to-intelligence-gathering-tool/</loc></url><url><loc>https://www.cypro.se/2025/06/28/fbi-warns-of-scattered-spiders-expanding-attacks-on-airlines-using-social-engineering/</loc></url><url><loc>https://www.cypro.se/2025/06/30/leveraging-credentials-as-unique-identifiers-a-pragmatic-approach-to-nhi-inventories/</loc></url><url><loc>https://www.cypro.se/2025/06/30/%e2%9a%a1-weekly-recap-airline-hacks-citrix-0-day-outlook-malware-banking-trojans-and-more/</loc></url><url><loc>https://www.cypro.se/2025/06/30/blind-eagle-uses-proton66-hosting-for-phishing-rat-deployment-on-colombian-banks/</loc></url><url><loc>https://www.cypro.se/2025/06/30/europol-dismantles-540-million-cryptocurrency-fraud-network-arrests-five-suspects/</loc></url><url><loc>https://www.cypro.se/2025/06/30/u-s-agencies-warn-of-rising-iranian-cyberattacks-on-defense-ot-networks-and-critical-infrastructure/</loc></url><url><loc>https://www.cypro.se/2025/07/01/microsoft-removes-password-management-from-authenticator-app-starting-august-2025/</loc></url><url><loc>https://www.cypro.se/2025/07/01/u-s-arrests-key-facilitator-in-north-korean-it-worker-scheme-seizes-7-74-million/</loc></url><url><loc>https://www.cypro.se/2025/07/01/google-patches-critical-zero-day-flaw-in-chromes-v8-engine-after-active-exploitation/</loc></url><url><loc>https://www.cypro.se/2025/07/01/a-new-maturity-model-for-browser-security-closing-the-last-mile-risk/</loc></url><url><loc>https://www.cypro.se/2025/07/01/new-flaw-in-ides-like-visual-studio-code-lets-malicious-extensions-bypass-verified-status/</loc></url><url><loc>https://www.cypro.se/2025/07/01/ta829-and-unk_greensec-share-tactics-and-infrastructure-in-ongoing-malware-campaigns/</loc></url><url><loc>https://www.cypro.se/2025/07/01/critical-vulnerability-in-anthropics-mcp-exposes-developer-machines-to-remote-exploits/</loc></url><url><loc>https://www.cypro.se/2025/07/02/vercels-v0-ai-tool-weaponized-by-cybercriminals-to-rapidly-create-fake-login-pages-at-scale/</loc></url><url><loc>https://www.cypro.se/2025/07/02/u-s-sanctions-russian-bulletproof-hosting-provider-for-supporting-cybercriminals-behind-ransomware/</loc></url><url><loc>https://www.cypro.se/2025/07/02/that-network-traffic-looks-legit-but-it-could-be-hiding-a-serious-threat/</loc></url><url><loc>https://www.cypro.se/2025/07/02/hackers-using-pdfs-to-impersonate-microsoft-docusign-and-more-in-callback-phishing-campaigns/</loc></url><url><loc>https://www.cypro.se/2025/07/02/north-korean-hackers-target-web3-with-nim-malware-and-use-clickfix-in-babyshark-campaign/</loc></url><url><loc>https://www.cypro.se/2025/07/03/critical-cisco-vulnerability-in-unified-cm-grants-root-access-via-static-credentials/</loc></url><url><loc>https://www.cypro.se/2025/07/03/the-hidden-weaknesses-in-ai-soc-tools-that-no-one-talks-about/</loc></url><url><loc>https://www.cypro.se/2025/07/03/chinese-hackers-exploit-ivanti-csa-zero-days-in-attacks-on-french-government-telecoms/</loc></url><url><loc>https://www.cypro.se/2025/07/03/over-40-malicious-firefox-extensions-target-cryptocurrency-wallets-stealing-user-assets/</loc></url><url><loc>https://www.cypro.se/2025/07/03/massive-android-fraud-operations-uncovered-iconads-kaleidoscope-sms-malware-nfc-scams/</loc></url><url><loc>https://www.cypro.se/2025/07/04/google-ordered-to-pay-314m-for-misusing-android-users-cellular-data-without-permission/</loc></url><url><loc>https://www.cypro.se/2025/07/04/your-ai-agents-might-be-leaking-data-watch-this-webinar-to-learn-how-to-stop-it/</loc></url><url><loc>https://www.cypro.se/2025/07/04/critical-sudo-vulnerabilities-let-local-users-gain-root-access-on-linux-impacting-major-distros/</loc></url><url><loc>https://www.cypro.se/2025/07/04/nighteagle-apt-exploits-microsoft-exchange-flaw-to-target-chinas-military-and-tech-sectors/</loc></url><url><loc>https://www.cypro.se/2025/07/05/taiwan-nsb-alerts-public-on-data-risks-from-tiktok-weibo-and-rednote-over-china-ties/</loc></url><url><loc>https://www.cypro.se/2025/07/05/alert-exposed-jdwp-interfaces-lead-to-crypto-mining-hpingbot-targets-ssh-for-ddos/</loc></url><url><loc>https://www.cypro.se/2025/07/07/tag-140-deploys-drat-v2-rat-targeting-indian-government-defense-and-rail-sectors/</loc></url><url><loc>https://www.cypro.se/2025/07/07/%e2%9a%a1-weekly-recap-chrome-0-day-ivanti-exploits-macos-stealers-crypto-heists-and-more/</loc></url><url><loc>https://www.cypro.se/2025/07/07/manufacturing-security-why-default-passwords-must-go/</loc></url><url><loc>https://www.cypro.se/2025/07/07/legal-metrology-meets-the-digital-age/</loc></url><url><loc>https://www.cypro.se/2025/07/07/seo-poisoning-campaign-targets-8500-smb-users-with-malware-disguised-as-ai-tools/</loc></url><url><loc>https://www.cypro.se/2025/07/08/cisa-adds-four-critical-vulnerabilities-to-kev-catalog-due-to-active-exploitation/</loc></url><url><loc>https://www.cypro.se/2025/07/08/researchers-uncover-batavia-windows-spyware-stealing-documents-from-russian-firms/</loc></url><url><loc>https://www.cypro.se/2025/07/08/5-ways-identity-based-attacks-are-breaching-retail/</loc></url><url><loc>https://www.cypro.se/2025/07/08/rondodox-botnet-exploits-flaws-in-tbk-dvrs-and-four-faith-routers-to-launch-ddos-attacks/</loc></url><url><loc>https://www.cypro.se/2025/07/08/baittrap-over-17000-fake-news-websites-caught-fueling-investment-fraud-globally/</loc></url><url><loc>https://www.cypro.se/2025/07/08/malicious-pull-request-targets-6000-developers-via-vulnerable-ethcode-vs-code-extension/</loc></url><url><loc>https://www.cypro.se/2025/07/08/hackers-use-leaked-shellter-tool-license-to-spread-lumma-stealer-and-sectoprat-malware/</loc></url><url><loc>https://www.cypro.se/2025/07/08/anatsa-android-banking-trojan-hits-90000-users-with-fake-pdf-app-on-google-play/</loc></url><url><loc>https://www.cypro.se/2025/07/09/microsoft-patches-130-vulnerabilities-including-critical-flaws-in-spnego-and-sql-server/</loc></url><url><loc>https://www.cypro.se/2025/07/09/chinese-hacker-xu-zewei-arrested-for-ties-to-silk-typhoon-group-and-u-s-cyber-attacks/</loc></url><url><loc>https://www.cypro.se/2025/07/09/u-s-sanctions-north-korean-andariel-hacker-behind-fraudulent-it-worker-scheme/</loc></url><url><loc>https://www.cypro.se/2025/07/09/how-to-automate-ticket-creation-device-identification-and-threat-triage-with-tines/</loc></url><url><loc>https://www.cypro.se/2025/07/09/donot-apt-expands-operations-targets-european-foreign-ministries-with-loptikmod-malware/</loc></url><url><loc>https://www.cypro.se/2025/07/09/gold-melody-iab-exploits-exposed-asp-net-machine-keys-for-unauthorized-access-to-targets/</loc></url><url><loc>https://www.cypro.se/2025/07/10/servicenow-flaw-cve-2025-3648-could-lead-to-data-exposure-via-misconfigured-acls/</loc></url><url><loc>https://www.cypro.se/2025/07/10/what-security-leaders-need-to-know-about-ai-governance-for-saas/</loc></url><url><loc>https://www.cypro.se/2025/07/10/new-zuru-malware-variant-targeting-developers-via-trojanized-termius-macos-app/</loc></url><url><loc>https://www.cypro.se/2025/07/10/amd-warns-of-new-transient-scheduler-attacks-impacting-a-wide-range-of-cpus/</loc></url><url><loc>https://www.cypro.se/2025/07/10/four-arrested-in-440m-cyber-attack-on-marks-spencer-co-op-and-harrods/</loc></url><url><loc>https://www.cypro.se/2025/07/10/fake-gaming-and-ai-firms-push-malware-on-cryptocurrency-users-via-telegram-and-discord/</loc></url><url><loc>https://www.cypro.se/2025/07/10/critical-mcp-remote-vulnerability-enables-remote-code-execution-impacting-437000-downloads/</loc></url><url><loc>https://www.cypro.se/2025/07/11/cisa-adds-citrix-netscaler-cve-2025-5777-to-kev-catalog-as-active-exploits-target-enterprises/</loc></url><url><loc>https://www.cypro.se/2025/07/11/securing-data-in-the-ai-era/</loc></url><url><loc>https://www.cypro.se/2025/07/11/critical-wing-ftp-server-vulnerability-cve-2025-47812-actively-being-exploited-in-the-wild/</loc></url><url><loc>https://www.cypro.se/2025/07/11/iranian-backed-pay2key-ransomware-resurfaces-with-80-profit-share-for-cybercriminals/</loc></url><url><loc>https://www.cypro.se/2025/07/11/perfektblue-bluetooth-vulnerabilities-expose-millions-of-vehicles-to-remote-code-execution/</loc></url><url><loc>https://www.cypro.se/2025/07/07/balancing-security-and-service/</loc></url><url><loc>https://www.cypro.se/2025/07/11/fortinet-releases-patch-for-critical-sql-injection-flaw-in-fortiweb-cve-2025-25257/</loc></url><url><loc>https://www.cypro.se/2025/07/12/over-600-laravel-apps-exposed-to-remote-code-execution-due-to-leaked-app_keys-on-github/</loc></url><url><loc>https://www.cypro.se/2025/07/12/gpuhammer-new-rowhammer-attack-variant-degrades-ai-models-on-nvidia-gpus/</loc></url><url><loc>https://www.cypro.se/2025/07/14/esim-vulnerability-in-kigens-euicc-cards-exposes-billions-of-iot-devices-to-malicious-attacks/</loc></url><url><loc>https://www.cypro.se/2025/07/14/cbi-shuts-down-390k-u-k-tech-support-scam-arrests-key-operatives-in-noida-call-center/</loc></url><url><loc>https://www.cypro.se/2025/07/14/getting-your-organisation-ready-for-windows-11-upgrade-before-autumn-2025/</loc></url><url><loc>https://www.cypro.se/2025/07/14/%e2%9a%a1-weekly-recap-scattered-spider-arrests-car-exploits-macos-malware-fortinet-rce-and-more/</loc></url><url><loc>https://www.cypro.se/2025/07/14/the-unusual-suspect-git-repos/</loc></url><url><loc>https://www.cypro.se/2025/07/14/new-php-based-interlock-rat-variant-uses-filefix-delivery-mechanism-to-target-multiple-industries/</loc></url><url><loc>https://www.cypro.se/2025/07/15/north-korean-hackers-flood-npm-registry-with-xorindex-malware-in-ongoing-attack-campaign/</loc></url><url><loc>https://www.cypro.se/2025/07/15/state-backed-hazybeacon-malware-uses-aws-lambda-to-steal-data-from-se-asian-governments/</loc></url><url><loc>https://www.cypro.se/2025/07/15/securing-agentic-ai-how-to-protect-the-invisible-identity-access/</loc></url><url><loc>https://www.cypro.se/2025/07/15/asyncrats-open-source-code-sparks-surge-in-dangerous-malware-variants-across-the-globe/</loc></url><url><loc>https://www.cypro.se/2025/07/15/newly-emerged-global-group-raas-expands-operations-with-ai-driven-negotiation-tools/</loc></url><url><loc>https://www.cypro.se/2025/07/15/hyper-volumetric-ddos-attacks-reach-record-7-3-tbps-targeting-key-global-sectors/</loc></url><url><loc>https://www.cypro.se/2025/07/16/google-ai-big-sleep-stops-exploitation-of-critical-sqlite-vulnerability-before-hackers-act/</loc></url><url><loc>https://www.cypro.se/2025/07/16/deepfakes-fake-recruiters-cloned-cfos-learn-how-to-stop-ai-driven-attacks-in-real-time/</loc></url><url><loc>https://www.cypro.se/2025/07/16/urgent-google-releases-critical-chrome-update-for-cve-2025-6558-exploit-active-in-the-wild/</loc></url><url><loc>https://www.cypro.se/2025/07/16/new-konfety-malware-variant-evades-detection-by-manipulating-apks-and-dynamic-code/</loc></url><url><loc>https://www.cypro.se/2025/07/15/comment-now-reducing-the-cybersecurity-risks-of-portable-storage-media-in-ot-environments/</loc></url><url><loc>https://www.cypro.se/2025/07/16/critical-golden-dmsa-attack-in-windows-server-2025-enables-cross-domain-attacks-and-persistent-access/</loc></url><url><loc>https://www.cypro.se/2025/07/16/ai-agents-act-like-employees-with-root-access-heres-how-to-regain-control/</loc></url><url><loc>https://www.cypro.se/2025/07/16/unc6148-backdoors-fully-patched-sonicwall-sma-100-series-devices-with-overstep-rootkit/</loc></url><url><loc>https://www.cypro.se/2025/07/16/hackers-leverage-microsoft-teams-to-spread-matanbuchus-3-0-malware-to-targeted-firms/</loc></url><url><loc>https://www.cypro.se/2025/07/17/cisco-warns-of-critical-ise-flaw-allowing-unauthenticated-attackers-to-execute-root-code/</loc></url><url><loc>https://www.cypro.se/2025/07/17/chinese-hackers-target-taiwans-semiconductor-sector-with-cobalt-strike-custom-backdoors/</loc></url><url><loc>https://www.cypro.se/2025/07/17/europol-disrupts-noname05716-hacktivist-group-linked-to-ddos-attacks-against-ukraine/</loc></url><url><loc>https://www.cypro.se/2025/07/17/ctem-vs-asm-vs-vulnerability-management-what-security-leaders-need-to-know-in-2025/</loc></url><url><loc>https://www.cypro.se/2025/07/17/hackers-exploit-apache-http-server-flaw-to-deploy-linuxsys-cryptocurrency-miner/</loc></url><url><loc>https://www.cypro.se/2025/07/17/hackers-use-github-repositories-to-host-amadey-malware-and-data-stealers-bypassing-filters/</loc></url><url><loc>https://www.cypro.se/2025/07/18/google-sues-25-chinese-entities-over-badbox-2-0-botnet-affecting-10m-android-devices/</loc></url><url><loc>https://www.cypro.se/2025/07/18/critical-nvidia-container-toolkit-flaw-allows-privilege-escalation-on-ai-cloud-services/</loc></url><url><loc>https://www.cypro.se/2025/07/18/from-backup-to-cyber-resilience-why-it-leaders-must-rethink-backup-in-the-age-of-ransomware/</loc></url><url><loc>https://www.cypro.se/2025/07/18/cert-ua-discovers-lamehug-malware-linked-to-apt28-using-llm-for-phishing-campaign/</loc></url><url><loc>https://www.cypro.se/2025/07/18/chinas-massistant-tool-secretly-extracts-sms-gps-data-and-images-from-confiscated-phones/</loc></url><url><loc>https://www.cypro.se/2025/07/18/ung0002-group-hits-china-hong-kong-pakistan-using-lnk-files-and-rats-in-twin-campaigns/</loc></url><url><loc>https://www.cypro.se/2025/07/18/ivanti-zero-days-exploited-to-drop-mdifyloader-and-launch-in-memory-cobalt-strike-attacks/</loc></url><url><loc>https://www.cypro.se/2025/07/20/hackers-exploit-critical-crushftp-flaw-to-gain-admin-access-on-unpatched-servers/</loc></url><url><loc>https://www.cypro.se/2025/07/20/critical-unpatched-sharepoint-zero-day-actively-exploited-breaches-75-global-organizations/</loc></url><url><loc>https://www.cypro.se/2025/07/20/malware-injected-into-6-npm-packages-after-maintainer-tokens-stolen-in-phishing-attack/</loc></url><url><loc>https://www.cypro.se/2025/07/20/encrypthub-targets-web3-developers-using-fake-ai-platforms-to-deploy-fickle-stealer-malware/</loc></url><url><loc>https://www.cypro.se/2025/07/21/microsoft-releases-urgent-patch-for-sharepoint-rce-flaw-exploited-in-ongoing-cyber-attacks/</loc></url><url><loc>https://www.cypro.se/2025/07/21/hard-coded-credentials-found-in-hpe-instant-on-devices-allow-admin-access/</loc></url><url><loc>https://www.cypro.se/2025/07/21/3500-websites-hijacked-to-secretly-mine-crypto-using-stealth-javascript-and-websocket-tactics/</loc></url><url><loc>https://www.cypro.se/2025/07/21/poisonseed-hackers-bypass-fido-keys-using-qr-phishing-and-cross-device-sign-in-abuse/</loc></url><url><loc>https://www.cypro.se/2025/07/21/%e2%9a%a1-weekly-recap-sharepoint-0-day-chrome-exploit-macos-spyware-nvidia-toolkit-rce-and-more/</loc></url><url><loc>https://www.cypro.se/2025/07/21/assessing-the-role-of-ai-in-zero-trust/</loc></url><url><loc>https://www.cypro.se/2025/07/21/iran-linked-dchspy-android-malware-masquerades-as-vpn-apps-to-spy-on-dissidents/</loc></url><url><loc>https://www.cypro.se/2025/07/21/china-linked-hackers-launch-targeted-espionage-campaign-on-african-it-infrastructure/</loc></url><url><loc>https://www.cypro.se/2025/07/22/hackers-exploit-sharepoint-zero-day-since-july-7-to-steal-keys-maintain-persistent-access/</loc></url><url><loc>https://www.cypro.se/2025/07/22/how-to-advance-from-soc-manager-to-ciso/</loc></url><url><loc>https://www.cypro.se/2025/07/22/cisco-confirms-active-exploits-targeting-ise-flaws-enabling-unauthenticated-root-access/</loc></url><url><loc>https://www.cypro.se/2025/07/22/credential-theft-and-remote-access-surge-as-allakore-purerat-and-hijack-loader-proliferate/</loc></url><url><loc>https://www.cypro.se/2025/07/22/microsoft-links-ongoing-sharepoint-exploits-to-three-chinese-hacker-groups/</loc></url><url><loc>https://www.cypro.se/2025/07/22/draft-sp-800-53-controls-on-secure-and-reliable-patches-available-for-comment/</loc></url><url><loc>https://www.cypro.se/2025/07/23/cisa-orders-urgent-patching-after-chinese-hackers-exploit-sharepoint-flaws-in-live-attacks/</loc></url><url><loc>https://www.cypro.se/2025/07/23/cisa-warns-sysaid-flaws-under-active-attack-enable-remote-file-access-and-ssrf/</loc></url><url><loc>https://www.cypro.se/2025/07/23/google-launches-oss-rebuild-to-expose-malicious-code-in-widely-used-open-source-packages/</loc></url><url><loc>https://www.cypro.se/2025/07/23/kerberoasting-detections-a-new-approach-to-a-decade-old-challenge/</loc></url><url><loc>https://www.cypro.se/2025/07/23/new-coyote-malware-variant-exploits-windows-ui-automation-to-steal-banking-credentials/</loc></url><url><loc>https://www.cypro.se/2025/07/23/threat-actor-mimo-targets-magento-and-docker-to-deploy-crypto-miners-and-proxyware/</loc></url><url><loc>https://www.cypro.se/2025/07/24/hackers-deploy-stealth-backdoor-in-wordpress-mu-plugins-to-maintain-admin-access/</loc></url><url><loc>https://www.cypro.se/2025/07/24/europol-arrests-xss-forum-admin-in-kyiv-after-12-year-run-operating-cybercrime-marketplace/</loc></url><url><loc>https://www.cypro.se/2025/07/24/storm-2603-exploits-sharepoint-flaws-to-deploy-warlock-ransomware-on-unpatched-systems/</loc></url><url><loc>https://www.cypro.se/2025/07/24/watch-this-webinar-to-uncover-hidden-flaws-in-login-ai-and-digital-trust-and-fix-them/</loc></url><url><loc>https://www.cypro.se/2025/07/24/pentests-once-a-year-nope-its-time-to-build-an-offensive-soc/</loc></url><url><loc>https://www.cypro.se/2025/07/24/china-based-apts-deploy-fake-dalai-lama-apps-to-spy-on-tibetan-community/</loc></url><url><loc>https://www.cypro.se/2025/07/24/sophos-and-sonicwall-patch-critical-rce-flaws-affecting-firewalls-and-sma-100-devices/</loc></url><url><loc>https://www.cypro.se/2025/07/24/castleloader-malware-infects-469-devices-using-fake-github-repos-and-clickfix-phishing/</loc></url><url><loc>https://www.cypro.se/2025/07/24/critical-mitel-flaw-lets-hackers-bypass-login-gain-full-access-to-mivoice-mx-one-systems/</loc></url><url><loc>https://www.cypro.se/2025/07/24/fire-ant-exploits-vmware-flaws-to-compromise-esxi-hosts-and-vcenter-environments/</loc></url><url><loc>https://www.cypro.se/2025/09/02/nist-nccoe-cyber-ai-profile-virtual-working-session-series-thwarting-ai-enabled-cyber-attacks/</loc></url><url><loc>https://www.cypro.se/2025/08/19/nist-nccoe-cyber-ai-profile-virtual-working-session-series-conducting-ai-enabled-cyber-defense/</loc></url><url><loc>https://www.cypro.se/2025/08/05/nist-nccoe-cyber-ai-profile-virtual-working-session-series-securing-ai-system-components/</loc></url><url><loc>https://www.cypro.se/2025/07/25/soco404-and-koske-malware-target-cloud-services-with-cross-platform-cryptomining-attacks/</loc></url><url><loc>https://www.cypro.se/2025/07/25/overcoming-risks-from-chinese-genai-tool-usage/</loc></url><url><loc>https://www.cypro.se/2025/07/25/cyber-espionage-campaign-hits-russian-aerospace-sector-using-eaglet-backdoor/</loc></url><url><loc>https://www.cypro.se/2025/07/25/u-s-sanctions-firm-behind-n-korean-it-scheme-arizona-woman-jailed-for-running-laptop-farm/</loc></url><url><loc>https://www.cypro.se/2025/07/25/patchwork-targets-turkish-defense-firms-with-spear-phishing-using-malicious-lnk-files/</loc></url><url><loc>https://www.cypro.se/2025/07/28/critical-flaws-in-niagara-framework-threaten-smart-buildings-and-industrial-systems-worldwide/</loc></url><url><loc>https://www.cypro.se/2025/07/28/scattered-spider-hijacks-vmware-esxi-to-deploy-ransomware-on-critical-u-s-infrastructure/</loc></url><url><loc>https://www.cypro.se/2025/07/28/email-security-is-stuck-in-the-antivirus-era-why-it-needs-a-modern-approach/</loc></url><url><loc>https://www.cypro.se/2025/07/28/%e2%9a%a1-weekly-recap-sharepoint-breach-spyware-iot-hijacks-dprk-fraud-crypto-drains-and-more/</loc></url><url><loc>https://www.cypro.se/2025/07/28/hackers-breach-toptal-github-publish-10-malicious-npm-packages-with-5000-downloads/</loc></url><url><loc>https://www.cypro.se/2025/07/29/cisa-adds-papercut-ng-mf-csrf-vulnerability-to-kev-catalog-amid-active-exploitation/</loc></url><url><loc>https://www.cypro.se/2025/07/28/comment-now-nist-ir-8374-ransomware-risk-management-a-cybersecurity-framework-2-0-community-profile/</loc></url><url><loc>https://www.cypro.se/2025/07/29/how-the-browser-became-the-main-cyber-battleground/</loc></url><url><loc>https://www.cypro.se/2025/07/29/cybercriminals-use-fake-apps-to-steal-data-and-blackmail-users-across-asias-mobile-networks/</loc></url><url><loc>https://www.cypro.se/2025/07/29/why-react-didnt-kill-xss-the-new-javascript-injection-playbook/</loc></url><url><loc>https://www.cypro.se/2025/07/29/chaos-raas-emerges-after-blacksuit-takedown-demanding-300k-from-u-s-victims/</loc></url><url><loc>https://www.cypro.se/2025/07/29/wiz-uncovers-critical-access-bypass-flaw-in-ai-powered-vibe-coding-platform-base44/</loc></url><url><loc>https://www.cypro.se/2025/07/29/pypi-warns-of-ongoing-phishing-campaign-using-fake-verification-emails-and-lookalike-domain/</loc></url><url><loc>https://www.cypro.se/2025/07/30/hackers-exploit-sap-vulnerability-to-breach-linux-systems-and-deploy-auto-color-malware/</loc></url><url><loc>https://www.cypro.se/2025/07/30/scattered-spider-hacker-arrests-halt-attacks-but-copycat-threats-sustain-security-pressure/</loc></url><url><loc>https://www.cypro.se/2025/07/30/google-launches-dbsc-open-beta-in-chrome-and-enhances-patch-transparency-via-project-zero/</loc></url><url><loc>https://www.cypro.se/2025/07/30/chinese-firms-linked-to-silk-typhoon-filed-15-patents-for-cyber-espionage-tools/</loc></url><url><loc>https://www.cypro.se/2025/07/30/product-walkthrough-a-look-inside-pillars-ai-security-platform/</loc></url><url><loc>https://www.cypro.se/2025/07/30/apple-patches-safari-vulnerability-also-exploited-as-zero-day-in-google-chrome/</loc></url><url><loc>https://www.cypro.se/2025/07/30/critical-dahua-camera-flaws-enable-remote-hijack-via-onvif-and-file-upload-exploits/</loc></url><url><loc>https://www.cypro.se/2025/07/30/nist-consortium-and-draft-guidelines-aim-to-improve-security-in-software-development/</loc></url><url><loc>https://www.cypro.se/2025/07/30/funksec-ransomware-decryptor-released-free-to-public-after-group-goes-dormant/</loc></url><url><loc>https://www.cypro.se/2025/09/30/fissea-fall-forum-september-30-2025/</loc></url><url><loc>https://www.cypro.se/2025/07/30/hackers-use-facebook-ads-to-spread-jsceal-malware-via-fake-cryptocurrency-trading-apps/</loc></url><url><loc>https://www.cypro.se/2025/07/31/hackers-exploit-critical-wordpress-theme-flaw-to-hijack-sites-via-remote-plugin-install/</loc></url><url><loc>https://www.cypro.se/2025/08/27/nist-nccoe-secure-software-development-devsecops-virtual-event/</loc></url><url><loc>https://www.cypro.se/2025/07/31/unc2891-breaches-atm-network-via-4g-raspberry-pi-tries-caketap-rootkit-for-fraud/</loc></url><url><loc>https://www.cypro.se/2025/07/31/alert-fatigue-data-overload-and-the-fall-of-traditional-siems/</loc></url><url><loc>https://www.cypro.se/2025/07/31/ai-driven-trends-in-endpoint-security-what-the-2025-gartner-magic-quadrant-reveals/</loc></url><url><loc>https://www.cypro.se/2025/07/31/n-korean-hackers-used-job-lures-cloud-account-access-and-malware-to-steal-millions-in-crypto/</loc></url><url><loc>https://www.cypro.se/2025/07/31/experts-detect-multi-layer-redirect-tactic-used-to-steal-microsoft-365-login-credentials/</loc></url><url><loc>https://www.cypro.se/2025/07/31/secret-blizzard-deploys-malware-in-isp-level-aitm-attacks-on-moscow-embassies/</loc></url><url><loc>https://www.cypro.se/2025/08/01/storm-2603-deploys-dns-controlled-backdoor-in-warlock-and-lockbit-ransomware-attacks/</loc></url><url><loc>https://www.cypro.se/2025/07/31/comment-now-nist-internal-report-8536-supply-chain-traceability-manufacturing-meta-framework-second-public-draft/</loc></url><url><loc>https://www.cypro.se/2025/08/01/you-are-what-you-eat-why-your-ai-security-tools-are-only-as-strong-as-the-data-you-feed-them/</loc></url><url><loc>https://www.cypro.se/2025/08/01/ai-generated-malicious-npm-package-drains-solana-funds-from-1500-before-takedown/</loc></url><url><loc>https://www.cypro.se/2025/08/01/attackers-use-fake-oauth-apps-with-tycoon-kit-to-breach-microsoft-365-accounts/</loc></url><url><loc>https://www.cypro.se/2025/08/01/cursor-ai-code-editor-fixed-flaw-allowing-attackers-to-run-commands-via-prompt-injection/</loc></url><url><loc>https://www.cypro.se/2025/08/02/akira-ransomware-exploits-sonicwall-vpns-in-likely-zero-day-attack-on-fully-patched-devices/</loc></url><url><loc>https://www.cypro.se/2025/08/02/new-plague-pam-backdoor-exposes-critical-linux-systems-to-silent-credential-theft/</loc></url><url><loc>https://www.cypro.se/2025/08/02/cl-sta-0969-installs-covert-malware-in-telecom-networks-during-10-month-espionage-campaign/</loc></url><url><loc>https://www.cypro.se/2025/08/04/playpraetor-android-trojan-infects-11000-devices-via-fake-google-play-pages-and-meta-ads/</loc></url><url><loc>https://www.cypro.se/2025/08/04/the-wild-west-of-shadow-it/</loc></url><url><loc>https://www.cypro.se/2025/08/04/%e2%9a%a1-weekly-recap-vpn-0-day-encryption-backdoor-ai-malware-macos-flaw-atm-hack-more/</loc></url><url><loc>https://www.cypro.se/2025/08/04/man-in-the-middle-attack-prevention-guide/</loc></url><url><loc>https://www.cypro.se/2025/08/04/vietnamese-hackers-use-pxa-stealer-hit-4000-ips-and-steal-200000-passwords-globally/</loc></url><url><loc>https://www.cypro.se/2025/08/04/nvidia-triton-bugs-let-unauthenticated-attackers-execute-code-and-hijack-ai-servers/</loc></url><url><loc>https://www.cypro.se/2025/08/05/sonicwall-investigating-potential-ssl-vpn-zero-day-after-20-targeted-attacks-reported/</loc></url><url><loc>https://www.cypro.se/2025/08/05/15000-fake-tiktok-shop-domains-deliver-malware-steal-crypto-via-ai-driven-scam-campaign/</loc></url><url><loc>https://www.cypro.se/2025/08/05/how-top-cisos-save-their-socs-from-alert-chaos-to-never-miss-real-incidents/</loc></url><url><loc>https://www.cypro.se/2025/08/05/misconfigurations-are-not-vulnerabilities-the-costly-confusion-behind-security-risks/</loc></url><url><loc>https://www.cypro.se/2025/08/05/googles-august-patch-fixes-two-qualcomm-vulnerabilities-exploited-in-the-wild/</loc></url><url><loc>https://www.cypro.se/2025/08/05/cursor-ai-code-editor-vulnerability-enables-rce-via-malicious-mcp-file-swaps-post-approval/</loc></url><url><loc>https://www.cypro.se/2025/08/27/second-seminar-on-building-an-in-space-circular-economy/</loc></url><url><loc>https://www.cypro.se/2025/08/05/clickfix-malware-campaign-exploits-captchas-to-spread-cross-platform-infections/</loc></url><url><loc>https://www.cypro.se/2025/08/06/ai-is-transforming-cybersecurity-adversarial-testing-pentera-founders-vision/</loc></url><url><loc>https://www.cypro.se/2025/08/06/cisa-adds-3-d-link-router-flaws-to-kev-catalog-after-active-exploitation-reports/</loc></url><url><loc>https://www.cypro.se/2025/08/06/cyber-assessment-framework-v4-0-released-in-response-to-growing-threat/</loc></url><url><loc>https://www.cypro.se/2025/08/06/cert-ua-warns-of-hta-delivered-c-malware-attacks-using-court-summons-lures/</loc></url><url><loc>https://www.cypro.se/2025/08/06/ai-slashes-workloads-for-vcisos-by-68-as-smbs-demand-more-new-report-reveals/</loc></url><url><loc>https://www.cypro.se/2025/08/06/microsoft-launches-project-ire-to-autonomously-classify-malware-using-ai-tools/</loc></url><url><loc>https://www.cypro.se/2025/08/06/trend-micro-confirms-active-exploitation-of-critical-apex-one-flaws-in-on-premise-systems/</loc></url><url><loc>https://www.cypro.se/2025/08/06/fake-vpn-and-spam-blocker-apps-tied-to-vextrio-used-in-ad-fraud-subscription-scams/</loc></url><url><loc>https://www.cypro.se/2025/08/06/researchers-uncover-ecscape-flaw-in-amazon-ecs-enabling-cross-task-credential-theft/</loc></url><url><loc>https://www.cypro.se/2025/08/04/what-a-real-professional-social-engineering-team-looks-like/</loc></url><url><loc>https://www.cypro.se/2025/07/22/the-anatomy-of-a-phishing-email/</loc></url><url><loc>https://www.cypro.se/2025/08/07/webinar-how-to-stop-python-supply-chain-attacks-and-the-expert-tools-you-need/</loc></url><url><loc>https://www.cypro.se/2025/08/07/microsoft-discloses-exchange-server-flaw-enabling-silent-cloud-access-in-hybrid-setups/</loc></url><url><loc>https://www.cypro.se/2025/08/07/the-ai-powered-security-shift-what-2025-is-teaching-us-about-cloud-defense/</loc></url><url><loc>https://www.cypro.se/2025/08/07/sonicwall-confirms-patched-vulnerability-behind-recent-vpn-attacks-not-a-zero-day/</loc></url><url><loc>https://www.cypro.se/2025/08/07/malicious-go-npm-packages-deliver-cross-platform-malware-trigger-remote-data-wipes/</loc></url><url><loc>https://www.cypro.se/2025/08/07/6500-axis-servers-expose-remoting-protocol-4000-in-u-s-vulnerable-to-exploits/</loc></url><url><loc>https://www.cypro.se/2025/08/07/socgholish-malware-spread-via-ad-tools-delivers-access-to-lockbit-evil-corp-and-others/</loc></url><url><loc>https://www.cypro.se/2025/08/08/greedybear-steals-1m-in-crypto-using-150-malicious-firefox-wallet-extensions/</loc></url><url><loc>https://www.cypro.se/2025/08/08/leaked-credentials-up-160-what-attackers-are-doing-with-them/</loc></url><url><loc>https://www.cypro.se/2025/08/08/rubygems-pypi-hit-by-malicious-packages-stealing-credentials-crypto-forcing-security-changes/</loc></url><url><loc>https://www.cypro.se/2025/08/08/ai-tools-fuel-brazilian-phishing-scam-while-efimer-trojan-steals-crypto-from-5000-victims/</loc></url><url><loc>https://www.cypro.se/2025/08/09/cyberark-and-hashicorp-flaws-enable-remote-vault-takeover-without-credentials/</loc></url><url><loc>https://www.cypro.se/2025/08/09/researchers-uncover-gpt-5-jailbreak-and-zero-click-ai-agent-attacks-exposing-cloud-and-iot-systems/</loc></url><url><loc>https://www.cypro.se/2025/08/09/linux-based-lenovo-webcams-flaw-can-be-remotely-exploited-for-badusb-attacks/</loc></url><url><loc>https://www.cypro.se/2025/08/09/researchers-reveal-revault-attack-targeting-dell-controlvault3-firmware-in-100-laptop-models/</loc></url><url><loc>https://www.cypro.se/2025/08/10/researchers-detail-windows-epm-poisoning-exploit-chain-leading-to-domain-privilege-escalation/</loc></url><url><loc>https://www.cypro.se/2025/08/10/new-win-ddos-flaws-let-attackers-turn-public-domain-controllers-into-ddos-botnet-via-rpc-ldap/</loc></url><url><loc>https://www.cypro.se/2025/08/11/winrar-zero-day-under-active-exploitation-update-to-latest-version-immediately/</loc></url><url><loc>https://www.cypro.se/2025/08/11/6-lessons-learned-focusing-security-where-business-value-lives/</loc></url><url><loc>https://www.cypro.se/2025/08/11/nist-releases-test-tools-to-accelerate-adoption-of-emerging-route-leak-mitigation-standards/</loc></url><url><loc>https://www.cypro.se/2025/08/11/%e2%9a%a1-weekly-recap-badcam-attack-winrar-0-day-edr-killer-nvidia-flaws-ransomware-attacks-more/</loc></url><url><loc>https://www.cypro.se/2025/08/11/researchers-spot-surge-in-erlang-otp-ssh-rce-exploits-70-target-ot-firewalls/</loc></url><url><loc>https://www.cypro.se/2025/08/11/new-tetra-radio-encryption-flaws-expose-law-enforcement-communications/</loc></url><url><loc>https://www.cypro.se/2025/08/12/dutch-ncsc-confirms-active-exploitation-of-citrix-netscaler-cve-2025-6543-in-critical-sectors/</loc></url><url><loc>https://www.cypro.se/2025/08/20/digital-identity-guidelines-revision-4-public-webinar/</loc></url><url><loc>https://www.cypro.se/2025/08/12/the-ultimate-battle-enterprise-browsers-vs-secure-browser-extensions/</loc></url><url><loc>https://www.cypro.se/2025/08/12/new-curly-comrades-apt-using-ngen-com-hijacking-in-georgia-moldova-attacks/</loc></url><url><loc>https://www.cypro.se/2025/08/12/cybercrime-groups-shinyhunters-scattered-spider-join-forces-in-extortion-attacks-on-businesses/</loc></url><url><loc>https://www.cypro.se/2025/08/12/fortinet-ssl-vpns-hit-by-global-brute-force-wave-before-attackers-shift-to-fortimanager/</loc></url><url><loc>https://www.cypro.se/2025/08/12/researchers-spot-xz-utils-backdoor-in-dozens-of-docker-hub-images-fueling-supply-chain-risks/</loc></url><url><loc>https://www.cypro.se/2025/08/13/charon-ransomware-hits-middle-east-sectors-using-apt-level-evasion-tactics/</loc></url><url><loc>https://www.cypro.se/2025/08/13/microsoft-august-2025-patch-tuesday-fixes-kerberos-zero-day-among-111-total-new-flaws/</loc></url><url><loc>https://www.cypro.se/2025/08/13/webinar-what-the-next-wave-of-ai-cyberattacks-will-look-like-and-how-to-survive/</loc></url><url><loc>https://www.cypro.se/2025/08/13/fortinet-warns-about-fortisiem-vulnerability-cve-2025-25256-with-in-the-wild-exploit-code/</loc></url><url><loc>https://www.cypro.se/2025/08/13/ai-soc-101-key-capabilities-security-leaders-need-to-know/</loc></url><url><loc>https://www.cypro.se/2025/08/13/nist-finalizes-lightweight-cryptography-standard-to-protect-small-devices/</loc></url><url><loc>https://www.cypro.se/2025/08/13/zoom-and-xerox-release-critical-security-updates-fixing-privilege-escalation-and-rce-flaws/</loc></url><url><loc>https://www.cypro.se/2025/08/13/new-ps1bot-malware-campaign-uses-malvertising-to-deploy-multi-stage-in-memory-attacks/</loc></url><url><loc>https://www.cypro.se/2025/08/14/cisa-adds-two-n-able-n-central-flaws-to-known-exploited-vulnerabilities-catalog/</loc></url><url><loc>https://www.cypro.se/2025/08/14/google-requires-crypto-app-licenses-in-15-regions-as-fbi-warns-of-9-9m-scam-losses/</loc></url><url><loc>https://www.cypro.se/2025/08/14/simple-steps-for-attack-surface-reduction/</loc></url><url><loc>https://www.cypro.se/2025/08/14/have-you-turned-off-your-virtual-oven/</loc></url><url><loc>https://www.cypro.se/2025/08/14/new-android-malware-wave-hits-banking-via-nfc-relay-fraud-call-hijacking-and-root-exploits/</loc></url><url><loc>https://www.cypro.se/2025/08/14/hackers-found-using-crossc2-to-expand-cobalt-strike-beacons-reach-to-linux-and-macos/</loc></url><url><loc>https://www.cypro.se/2025/08/14/new-http-2-madeyoureset-vulnerability-enables-large-scale-dos-attacks/</loc></url><url><loc>https://www.cypro.se/2025/08/15/cisco-warns-of-cvss-10-0-fmc-radius-flaw-allowing-remote-code-execution/</loc></url><url><loc>https://www.cypro.se/2025/08/15/u-s-sanctions-garantex-and-grinex-over-100m-in-ransomware-linked-illicit-crypto-transactions/</loc></url><url><loc>https://www.cypro.se/2025/08/15/zero-trust-ai-privacy-in-the-age-of-agentic-ai/</loc></url><url><loc>https://www.cypro.se/2025/08/15/taiwan-web-servers-breached-by-uat-7237-using-customized-open-source-hacking-tools/</loc></url><url><loc>https://www.cypro.se/2025/08/16/russian-group-encrypthub-exploits-msc-eviltwin-vulnerability-to-deploy-fickle-stealer-malware/</loc></url><url><loc>https://www.cypro.se/2025/08/16/ermac-v3-0-banking-trojan-source-code-leak-exposes-full-malware-infrastructure/</loc></url><url><loc>https://www.cypro.se/2025/08/18/wazuh-for-regulatory-compliance/</loc></url><url><loc>https://www.cypro.se/2025/08/18/malicious-pypi-and-npm-packages-discovered-exploiting-dependencies-in-supply-chain-attacks/</loc></url><url><loc>https://www.cypro.se/2025/08/18/%e2%9a%a1-weekly-recap-nfc-fraud-curly-comrades-n-able-exploits-docker-backdoors-more/</loc></url><url><loc>https://www.cypro.se/2025/08/18/nist-guidelines-can-help-organizations-detect-face-photo-morphs-deter-identity-fraud/</loc></url><url><loc>https://www.cypro.se/2025/08/18/microsoft-windows-vulnerability-exploited-to-deploy-pipemagic-ransomexx-malware/</loc></url><url><loc>https://www.cypro.se/2025/08/18/nist-awards-over-1-8-million-to-small-businesses-advancing-ai-semiconductors-additive-manufacturing-and-more/</loc></url><url><loc>https://www.cypro.se/2025/08/18/noodlophile-malware-campaign-expands-global-reach-with-copyright-phishing-lures/</loc></url><url><loc>https://www.cypro.se/2025/08/19/pypi-blocks-1800-expired-domain-emails-to-prevent-account-takeovers-and-supply-chain-attacks/</loc></url><url><loc>https://www.cypro.se/2025/08/19/empowering-future-innovators-nist-ctl-connects-cybersecurity-students-with-real-world-research/</loc></url><url><loc>https://www.cypro.se/2025/08/19/u-k-government-drops-apple-encryption-backdoor-order-after-u-s-civil-liberties-pushback/</loc></url><url><loc>https://www.cypro.se/2025/08/19/why-your-security-culture-is-critical-to-mitigating-cyber-risk/</loc></url><url><loc>https://www.cypro.se/2025/08/19/public-exploit-for-chained-sap-flaws-exposes-unpatched-systems-to-remote-code-execution/</loc></url><url><loc>https://www.cypro.se/2025/08/19/new-godrat-trojan-targets-trading-firms-using-steganography-and-gh0st-rat-code/</loc></url><url><loc>https://www.cypro.se/2025/08/19/apache-activemq-flaw-exploited-to-deploy-dripdropper-malware-on-cloud-linux-systems/</loc></url><url><loc>https://www.cypro.se/2025/08/20/doj-charges-22-year-old-for-running-rapperbot-botnet-behind-370000-ddos-attacks/</loc></url><url><loc>https://www.cypro.se/2025/08/20/north-korea-uses-github-in-diplomat-cyber-attacks-as-it-worker-scheme-hits-320-firms/</loc></url><url><loc>https://www.cypro.se/2025/08/20/from-impact-to-action-turning-bia-insights-into-resilient-recovery/</loc></url><url><loc>https://www.cypro.se/2025/08/20/%f0%9f%95%b5%ef%b8%8f-webinar-discover-and-control-shadow-ai-agents-in-your-enterprise-before-hackers-do/</loc></url><url><loc>https://www.cypro.se/2025/08/20/experts-find-ai-browsers-can-be-tricked-by-promptfix-exploit-to-run-malicious-hidden-prompts/</loc></url><url><loc>https://www.cypro.se/2025/08/20/dom-based-extension-clickjacking-exposes-popular-password-managers-to-credential-and-data-theft/</loc></url><url><loc>https://www.cypro.se/2025/08/20/fbi-warns-fsb-linked-hackers-exploiting-unpatched-cisco-devices-for-cyber-espionage/</loc></url><url><loc>https://www.cypro.se/2025/08/21/apple-patches-cve-2025-43300-zero-day-in-ios-ipados-and-macos-exploited-in-targeted-attacks/</loc></url><url><loc>https://www.cypro.se/2025/08/21/scattered-spider-hacker-gets-10-years-13m-restitution-for-sim-swapping-crypto-theft/</loc></url><url><loc>https://www.cypro.se/2025/08/20/we-want-your-feedback-developing-a-transit-cybersecurity-framework-community-profile/</loc></url><url><loc>https://www.cypro.se/2025/08/21/weak-passwords-and-compromised-accounts-key-findings-from-the-blue-report-2025/</loc></url><url><loc>https://www.cypro.se/2025/08/21/hackers-using-new-quirkyloader-malware-to-spread-agent-tesla-asyncrat-and-snake-keylogger/</loc></url><url><loc>https://www.cypro.se/2025/08/21/cybercriminals-deploy-cornflake-v3-backdoor-via-clickfix-tactic-and-fake-captcha-pages/</loc></url><url><loc>https://www.cypro.se/2025/08/21/pre-auth-exploit-chains-found-in-commvault-could-enable-remote-code-execution-attacks/</loc></url><url><loc>https://www.cypro.se/2025/08/22/ex-developer-jailed-four-years-for-sabotaging-ohio-employer-with-kill-switch-malware/</loc></url><url><loc>https://www.cypro.se/2025/08/22/automation-is-redefining-pentest-delivery/</loc></url><url><loc>https://www.cypro.se/2025/08/22/chinese-hackers-murky-genesis-and-glacial-panda-escalate-cloud-and-telecom-espionage/</loc></url><url><loc>https://www.cypro.se/2025/08/22/interpol-arrests-1209-cybercriminals-across-18-african-nations-in-global-crackdown/</loc></url><url><loc>https://www.cypro.se/2025/08/22/linux-malware-delivered-via-malicious-rar-filenames-evades-antivirus-detection/</loc></url><url><loc>https://www.cypro.se/2025/08/23/geoserver-exploits-polaredge-and-gayfemboy-push-cybercrime-beyond-traditional-botnets/</loc></url><url><loc>https://www.cypro.se/2025/08/24/malicious-go-module-poses-as-ssh-brute-force-tool-steals-credentials-via-telegram-bot/</loc></url><url><loc>https://www.cypro.se/2025/08/25/transparent-tribe-targets-indian-govt-with-weaponized-desktop-shortcuts-via-phishing/</loc></url><url><loc>https://www.cypro.se/2025/08/25/why-siem-rules-fail-and-how-to-fix-them-insights-from-160-million-attack-simulations/</loc></url><url><loc>https://www.cypro.se/2025/08/25/%e2%9a%a1-weekly-recap-password-manager-flaws-apple-0-day-hidden-ai-prompts-in-the-wild-exploits-more/</loc></url><url><loc>https://www.cypro.se/2025/08/25/phishing-campaign-uses-upcrypter-in-fake-voicemail-emails-to-deliver-rat-payloads/</loc></url><url><loc>https://www.cypro.se/2025/08/25/unc6384-deploys-plugx-via-captive-portal-hijacks-and-valid-certificates-targeting-diplomats/</loc></url><url><loc>https://www.cypro.se/2025/08/25/docker-fixes-cve-2025-9074-critical-container-escape-vulnerability-with-cvss-score-9-3/</loc></url><url><loc>https://www.cypro.se/2025/08/12/the-voice-of-deception-how-vishing-exploits-human-emotion/</loc></url><url><loc>https://www.cypro.se/2025/08/26/google-to-verify-all-android-developers-in-4-countries-to-block-malicious-apps/</loc></url><url><loc>https://www.cypro.se/2025/08/26/cisa-adds-three-exploited-vulnerabilities-to-kev-catalog-affecting-citrix-and-git/</loc></url><url><loc>https://www.cypro.se/2025/08/26/hook-android-trojan-adds-ransomware-overlays-expands-to-107-remote-commands/</loc></url><url><loc>https://www.cypro.se/2025/08/26/shadowcaptcha-exploits-wordpress-sites-to-spread-ransomware-info-stealers-and-crypto-miners/</loc></url><url><loc>https://www.cypro.se/2025/08/26/mixshell-malware-delivered-via-contact-forms-targets-u-s-supply-chain-manufacturers/</loc></url><url><loc>https://www.cypro.se/2025/10/22/sushinist-rolling-next-generation-secure-hardware-into-standards/</loc></url><url><loc>https://www.cypro.se/2025/08/26/citrix-patches-three-netscaler-flaws-confirms-active-exploitation-of-cve-2025-7775/</loc></url><url><loc>https://www.cypro.se/2025/08/26/new-sni5gect-attack-crashes-phones-and-downgrades-5g-to-4g-without-rogue-base-station/</loc></url><url><loc>https://www.cypro.se/2025/08/27/salesloft-oauth-breach-via-drift-ai-chat-agent-exposes-salesforce-customer-data/</loc></url><url><loc>https://www.cypro.se/2025/08/27/blind-eagles-five-clusters-target-colombia-using-rats-phishing-lures-and-dynamic-dns-infra/</loc></url><url><loc>https://www.cypro.se/2025/08/27/the-5-golden-rules-of-safe-ai-adoption/</loc></url><url><loc>https://www.cypro.se/2025/08/27/shadowsilk-hits-36-government-targets-in-central-asia-and-apac-using-telegram-bots/</loc></url><url><loc>https://www.cypro.se/2025/08/27/nist-revises-security-and-privacy-control-catalog-to-improve-software-update-and-patch-releases/</loc></url><url><loc>https://www.cypro.se/2025/08/27/anthropic-disrupts-ai-powered-cyberattacks-automating-theft-and-extortion-across-critical-sectors/</loc></url><url><loc>https://www.cypro.se/2025/08/27/someone-created-first-ai-powered-ransomware-using-openais-gpt-oss20b-model/</loc></url><url><loc>https://www.cypro.se/2025/08/27/storm-0501-exploits-entra-id-to-exfiltrate-and-delete-azure-data-in-hybrid-cloud-attacks/</loc></url><url><loc>https://www.cypro.se/2025/08/28/u-s-treasury-sanctions-dprk-it-worker-scheme-exposing-600k-crypto-transfers-and-1m-profits/</loc></url><url><loc>https://www.cypro.se/2025/08/28/malicious-nx-packages-in-s1ngularity-attack-leaked-2349-github-cloud-and-ai-credentials/</loc></url><url><loc>https://www.cypro.se/2025/08/28/hidden-vulnerabilities-of-project-management-tools-how-fluentpro-backup-secures-them/</loc></url><url><loc>https://www.cypro.se/2025/08/28/webinar-why-top-teams-are-prioritizing-code-to-cloud-mapping-in-our-2025-appsec/</loc></url><url><loc>https://www.cypro.se/2025/08/28/salt-typhoon-exploits-cisco-ivanti-palo-alto-flaws-to-breach-600-organizations-worldwide/</loc></url><url><loc>https://www.cypro.se/2025/08/28/researchers-find-vs-code-flaw-allowing-attackers-to-republish-deleted-extensions-under-same-names/</loc></url><url><loc>https://www.cypro.se/2025/08/29/tamperedchef-malware-disguised-as-fake-pdf-editors-steals-credentials-and-cookies/</loc></url><url><loc>https://www.cypro.se/2025/08/29/google-warns-salesloft-oauth-breach-extends-beyond-salesforce-impacting-all-integrations/</loc></url><url><loc>https://www.cypro.se/2025/08/29/feds-seize-6-4m-veriftools-fake-id-marketplace-but-operators-relaunch-on-new-domain/</loc></url><url><loc>https://www.cypro.se/2025/08/28/final-nist-ir-8349-released-characterize-secure-your-iot-devices/</loc></url><url><loc>https://www.cypro.se/2025/08/29/click-studios-patches-passwordstate-authentication-bypass-vulnerability-in-emergency-access-page/</loc></url><url><loc>https://www.cypro.se/2025/08/29/freepbx-servers-targeted-by-zero-day-flaw-emergency-patch-now-available/</loc></url><url><loc>https://www.cypro.se/2025/08/29/can-your-security-stack-see-chatgpt-why-network-visibility-matters/</loc></url><url><loc>https://www.cypro.se/2025/08/29/amazon-disrupts-apt29-watering-hole-campaign-abusing-microsoft-device-code-authentication/</loc></url><url><loc>https://www.cypro.se/2025/08/29/abandoned-sogou-zhuyin-update-server-hijacked-weaponized-in-taiwan-espionage-campaign/</loc></url><url><loc>https://www.cypro.se/2025/08/29/researchers-warn-of-sitecore-exploit-chain-linking-cache-poisoning-and-remote-code-execution/</loc></url><url><loc>https://www.cypro.se/2025/08/30/whatsapp-issues-emergency-update-for-zero-click-exploit-targeting-ios-and-macos-devices/</loc></url><url><loc>https://www.cypro.se/2025/08/30/attackers-abuse-velociraptor-forensic-tool-to-deploy-visual-studio-code-for-c2-tunneling/</loc></url><url><loc>https://www.cypro.se/2025/09/01/scarcruft-uses-rokrat-malware-in-operation-hankook-phantom-targeting-south-korean-academics/</loc></url><url><loc>https://www.cypro.se/2025/09/01/when-browsers-become-the-attack-surface-rethinking-security-for-scattered-spider/</loc></url><url><loc>https://www.cypro.se/2025/09/01/%e2%9a%a1-weekly-recap-whatsapp-0-day-docker-bug-salesforce-breach-fake-captchas-spyware-app-more/</loc></url><url><loc>https://www.cypro.se/2025/09/01/android-droppers-now-deliver-sms-stealers-and-spyware-not-just-banking-trojans/</loc></url><url><loc>https://www.cypro.se/2025/09/02/malicious-npm-package-nodejs-smtp-mimics-nodemailer-targets-atomic-and-exodus-wallets/</loc></url><url><loc>https://www.cypro.se/2025/09/02/from-bugs-to-bypasses-adapting-vulnerability-disclosure-for-ai-safeguards/</loc></url><url><loc>https://www.cypro.se/2025/09/02/silver-fox-exploits-microsoft-signed-watchdog-driver-to-deploy-valleyrat-malware/</loc></url><url><loc>https://www.cypro.se/2025/09/02/ukrainian-network-fdn3-launches-massive-brute-force-attacks-on-ssl-vpn-and-rdp-devices/</loc></url><url><loc>https://www.cypro.se/2025/09/02/shadow-ai-discovery-a-critical-part-of-enterprise-ai-governance/</loc></url><url><loc>https://www.cypro.se/2025/09/02/researchers-warn-of-mystrodx-backdoor-using-dns-and-icmp-triggers-for-stealthy-control/</loc></url><url><loc>https://www.cypro.se/2025/09/02/lazarus-group-expands-malware-arsenal-with-pondrat-themeforestrat-and-remotepe/</loc></url><url><loc>https://www.cypro.se/2025/09/03/salesloft-takes-drift-offline-after-oauth-token-theft-hits-hundreds-of-organizations/</loc></url><url><loc>https://www.cypro.se/2025/09/03/cisa-adds-tp-link-and-whatsapp-flaws-to-kev-catalog-amid-active-exploitation/</loc></url><url><loc>https://www.cypro.se/2025/09/03/cloudflare-blocks-record-breaking-11-5-tbps-ddos-attack/</loc></url><url><loc>https://www.cypro.se/2025/09/03/iranian-hackers-exploit-100-embassy-email-accounts-in-global-phishing-targeting-diplomats/</loc></url><url><loc>https://www.cypro.se/2025/09/03/threat-actors-weaponize-hexstrike-ai-to-exploit-citrix-flaws-within-a-week-of-disclosure/</loc></url><url><loc>https://www.cypro.se/2025/09/03/detecting-data-leaks-before-disaster/</loc></url><url><loc>https://www.cypro.se/2025/09/03/android-security-alert-google-patches-120-flaws-including-two-zero-days-under-attack/</loc></url><url><loc>https://www.cypro.se/2025/09/01/5-years-as-a-social-engineer-what-ive-learned/</loc></url><url><loc>https://www.cypro.se/2025/09/03/malicious-npm-packages-exploit-ethereum-smart-contracts-to-target-crypto-developers/</loc></url><url><loc>https://www.cypro.se/2025/09/04/cybercriminals-exploit-xs-grok-ai-to-bypass-ad-protections-and-spread-malware-to-millions/</loc></url><url><loc>https://www.cypro.se/2025/09/04/google-fined-379-million-by-french-regulator-for-cookie-consent-violations/</loc></url><url><loc>https://www.cypro.se/2025/09/04/cisa-flags-tp-link-router-flaws-cve-2023-50224-and-cve-2025-9377-as-actively-exploited/</loc></url><url><loc>https://www.cypro.se/2025/09/04/russian-apt28-deploys-notdoor-outlook-backdoor-against-companies-in-nato-countries/</loc></url><url><loc>https://www.cypro.se/2025/09/04/ghostredirector-hacks-65-windows-servers-using-rungan-backdoor-and-gamshen-iis-module/</loc></url><url><loc>https://www.cypro.se/2025/09/05/virustotal-finds-44-undetected-svg-files-used-to-deploy-base64-encoded-phishing-pages/</loc></url><url><loc>https://www.cypro.se/2025/09/05/automation-is-redefining-pentest-delivery-2/</loc></url><url><loc>https://www.cypro.se/2025/09/05/sap-s-4hana-critical-vulnerability-cve-2025-42957-exploited-in-the-wild/</loc></url><url><loc>https://www.cypro.se/2025/09/05/tag-150-develops-castlerat-in-python-and-c-expanding-castleloader-malware-operations/</loc></url><url><loc>https://www.cypro.se/2025/09/05/cisa-orders-immediate-patch-of-critical-sitecore-vulnerability-under-active-exploitation/</loc></url><url><loc>https://www.cypro.se/2025/09/06/malicious-npm-packages-impersonate-flashbots-steal-ethereum-wallet-keys/</loc></url><url><loc>https://www.cypro.se/2025/09/06/noisy-bear-targets-kazakhstan-energy-sector-with-barrelfire-phishing-campaign/</loc></url><url><loc>https://www.cypro.se/2025/09/08/you-didnt-get-phished-you-onboarded-the-attacker/</loc></url><url><loc>https://www.cypro.se/2025/09/08/%e2%9a%a1-weekly-recap-drift-breach-chaos-zero-days-active-patch-warnings-smarter-threats-more/</loc></url><url><loc>https://www.cypro.se/2025/09/08/gpugate-malware-uses-google-ads-and-fake-github-commits-to-target-it-firms/</loc></url><url><loc>https://www.cypro.se/2025/09/08/github-account-compromise-led-to-salesloft-drift-breach-affecting-22-companies/</loc></url><url><loc>https://www.cypro.se/2025/09/09/45-previously-unreported-domains-expose-longstanding-salt-typhoon-cyber-espionage/</loc></url><url><loc>https://www.cypro.se/2025/09/09/20-popular-npm-packages-with-2-billion-weekly-downloads-compromised-in-supply-chain-attack/</loc></url><url><loc>https://www.cypro.se/2025/09/09/how-leading-cisos-are-getting-budget-approval/</loc></url><url><loc>https://www.cypro.se/2025/09/09/from-mostererat-to-clickfix-new-malware-campaigns-highlight-rising-ai-and-phishing-risks/</loc></url><url><loc>https://www.cypro.se/2025/09/09/tor-based-cryptojacking-attack-expands-through-misconfigured-docker-apis/</loc></url><url><loc>https://www.cypro.se/2025/09/09/webinar-shadow-ai-agents-multiply-fast-learn-how-to-detect-and-control-them/</loc></url><url><loc>https://www.cypro.se/2025/09/09/raton-android-malware-detected-with-nfc-relay-and-ats-banking-fraud-capabilities/</loc></url><url><loc>https://www.cypro.se/2025/09/09/axios-abuse-and-salty-2fa-kits-fuel-advanced-microsoft-365-phishing-attacks/</loc></url><url><loc>https://www.cypro.se/2025/09/09/cyber-resilience-matters-as-much-as-cyber-defence/</loc></url><url><loc>https://www.cypro.se/2025/09/10/adobe-commerce-flaw-cve-2025-54236-lets-hackers-take-over-customer-accounts/</loc></url><url><loc>https://www.cypro.se/2025/09/10/sap-patches-critical-netweaver-cvss-up-to-10-0-and-previously-exploited-s-4hana-flaws/</loc></url><url><loc>https://www.cypro.se/2025/09/10/watch-out-for-salty2fa-new-phishing-kit-targeting-us-and-eu-enterprises/</loc></url><url><loc>https://www.cypro.se/2025/09/10/china-linked-apt41-hackers-target-u-s-trade-officials-amid-2025-negotiations/</loc></url><url><loc>https://www.cypro.se/2025/09/10/the-time-saving-guide-for-service-providers-automating-vciso-and-compliance-services/</loc></url><url><loc>https://www.cypro.se/2025/09/10/microsoft-fixes-80-flaws-including-smb-privesc-and-azure-cvss-10-0-bugs/</loc></url><url><loc>https://www.cypro.se/2025/09/10/apple-iphone-air-and-iphone-17-feature-a19-chips-with-spyware-resistant-memory-safety/</loc></url><url><loc>https://www.cypro.se/2025/09/10/chillyhell-macos-backdoor-and-zynorrat-rat-threaten-macos-windows-and-linux-systems/</loc></url><url><loc>https://www.cypro.se/2025/09/10/chinese-apt-deploys-eggstreme-fileless-malware-to-breach-philippine-military-systems/</loc></url><url><loc>https://www.cypro.se/2025/09/11/asyncrat-exploits-connectwise-screenconnect-to-steal-credentials-and-crypto/</loc></url><url><loc>https://www.cypro.se/2025/03/15/application-development-guidance-introduction/</loc></url><url><loc>https://www.cypro.se/2025/09/11/fake-madgicx-plus-and-socialmetrics-extensions-are-hijacking-meta-business-accounts/</loc></url><url><loc>https://www.cypro.se/2025/09/11/cracking-the-boardroom-code-helping-cisos-speak-the-language-of-business/</loc></url><url><loc>https://www.cypro.se/2025/09/11/sonicwall-ssl-vpn-flaw-and-misconfigurations-actively-exploited-by-akira-ransomware-hackers/</loc></url><url><loc>https://www.cypro.se/2025/09/11/google-pixel-10-adds-c2pa-support-to-verify-ai-generated-media-authenticity/</loc></url><url><loc>https://www.cypro.se/2025/09/11/senator-wyden-urges-ftc-to-probe-microsoft-for-ransomware-linked-cybersecurity-negligence/</loc></url><url><loc>https://www.cypro.se/2025/09/12/cursor-ai-code-editor-flaw-enables-silent-code-execution-via-malicious-repositories/</loc></url><url><loc>https://www.cypro.se/2025/09/12/cloud-native-security-in-2025-why-runtime-visibility-must-take-center-stage/</loc></url><url><loc>https://www.cypro.se/2025/09/12/new-hybridpetya-ransomware-bypasses-uefi-secure-boot-with-cve-2024-7344-exploit/</loc></url><url><loc>https://www.cypro.se/2025/09/12/critical-cve-2025-5086-in-delmia-apriso-actively-exploited-cisa-issues-warning/</loc></url><url><loc>https://www.cypro.se/2025/09/12/samsung-fixes-critical-zero-day-cve-2025-21043-exploited-in-android-attacks/</loc></url><url><loc>https://www.cypro.se/2025/09/12/apple-warns-french-users-of-fourth-spyware-campaign-in-2025-cert-fr-confirms/</loc></url><url><loc>https://www.cypro.se/2025/09/13/fbi-warns-of-unc6040-and-unc6395-targeting-salesforce-platforms-in-data-theft-attacks/</loc></url><url><loc>https://www.cypro.se/2025/09/15/hiddengh0st-winos-and-kkrat-exploit-seo-github-pages-in-chinese-malware-attacks/</loc></url><url><loc>https://www.cypro.se/2025/09/15/ai-powered-villager-pen-testing-tool-hits-11000-pypi-downloads-amid-abuse-concerns/</loc></url><url><loc>https://www.cypro.se/2025/09/15/6-browser-based-attacks-security-teams-need-to-prepare-for-right-now/</loc></url><url><loc>https://www.cypro.se/2025/09/15/%e2%9a%a1-weekly-recap-bootkit-malware-ai-powered-attacks-supply-chain-breaches-zero-days-more/</loc></url><url><loc>https://www.cypro.se/2025/09/15/mustang-panda-deploys-snakedisk-usb-worm-to-deliver-yokai-backdoor-on-thailand-ips/</loc></url><url><loc>https://www.cypro.se/2025/09/16/40-npm-packages-compromised-in-supply-chain-attack-using-bundle-js-to-steal-credentials/</loc></url><url><loc>https://www.cypro.se/2025/09/16/phoenix-rowhammer-attack-bypasses-advanced-ddr5-memory-protections-in-109-seconds/</loc></url><url><loc>https://www.cypro.se/2025/09/16/apple-backports-fix-for-cve-2025-43300-exploited-in-sophisticated-spyware-attack/</loc></url><url><loc>https://www.cypro.se/2025/09/16/securing-the-agentic-era-introducing-astrixs-ai-agent-control-plane/</loc></url><url><loc>https://www.cypro.se/2025/09/16/new-filefix-variant-delivers-stealc-malware-through-multilingual-phishing-site/</loc></url><url><loc>https://www.cypro.se/2025/09/16/slopads-fraud-ring-exploits-224-android-apps-to-drive-2-3-billion-daily-ad-bids/</loc></url><url><loc>https://www.cypro.se/2025/09/16/chaos-mesh-critical-graphql-flaws-enable-rce-and-full-kubernetes-cluster-takeover/</loc></url><url><loc>https://www.cypro.se/2025/09/17/raccoono365-phishing-network-shut-down-after-microsoft-and-cloudflare-disrupt-338-domains/</loc></url><url><loc>https://www.cypro.se/2025/09/17/doj-resentences-breachforums-founder-to-3-years-for-cybercrime-and-possession-of-csam/</loc></url><url><loc>https://www.cypro.se/2025/09/17/scattered-spider-resurfaces-with-financial-sector-attacks-despite-retirement-claims/</loc></url><url><loc>https://www.cypro.se/2025/09/17/rethinking-ai-data-security-a-buyers-guide/</loc></url><url><loc>https://www.cypro.se/2025/09/17/from-quantum-hacks-to-ai-defenses-expert-guide-to-building-unbreakable-cyber-resilience/</loc></url><url><loc>https://www.cypro.se/2025/09/17/chinese-ta415-uses-vs-code-remote-tunnels-to-spy-on-u-s-economic-policy-experts/</loc></url><url><loc>https://www.cypro.se/2025/09/17/ta558-uses-ai-generated-scripts-to-deploy-venom-rat-in-brazil-hotel-attacks/</loc></url><url><loc>https://www.cypro.se/2025/09/17/easm-buyers-guide-now-available/</loc></url><url><loc>https://www.cypro.se/2025/09/17/external-attack-surface-management-easm-buyers-guide/</loc></url><url><loc>https://www.cypro.se/2025/09/18/google-patches-chrome-zero-day-cve-2025-10585-as-active-v8-exploit-threatens-millions/</loc></url><url><loc>https://www.cypro.se/2025/09/18/silentsync-rat-delivered-via-two-malicious-pypi-packages-targeting-python-developers/</loc></url><url><loc>https://www.cypro.se/2025/09/18/how-cisos-can-drive-effective-ai-governance/</loc></url><url><loc>https://www.cypro.se/2025/09/18/countloader-broadens-russian-ransomware-operations-with-multi-version-malware-loader/</loc></url><url><loc>https://www.cypro.se/2025/09/18/sonicwall-urges-password-resets-after-cloud-backup-breach-affecting-under-5-of-customers/</loc></url><url><loc>https://www.cypro.se/2025/09/19/cisa-warns-of-two-malware-strains-exploiting-ivanti-epmm-cve-2025-4427-and-cve-2025-4428/</loc></url><url><loc>https://www.cypro.se/2025/09/19/u-k-arrests-two-teen-scattered-spider-hackers-linked-to-august-2024-tfl-cyber-attack/</loc></url><url><loc>https://www.cypro.se/2025/09/19/russian-hackers-gamaredon-and-turla-collaborate-to-deploy-kazuar-backdoor-in-ukraine/</loc></url><url><loc>https://www.cypro.se/2025/09/19/how-to-automate-alert-triage-with-ai-agents-and-confluence-sops-using-tines/</loc></url><url><loc>https://www.cypro.se/2025/09/19/17500-phishing-domains-target-316-brands-across-74-countries-in-global-phaas-surge/</loc></url><url><loc>https://www.cypro.se/2025/09/19/systembc-powers-rem-proxy-with-1500-daily-vps-victims-across-80-c2-servers/</loc></url><url><loc>https://www.cypro.se/2025/09/19/fortra-releases-critical-patch-for-cvss-10-0-goanywhere-mft-vulnerability/</loc></url><url><loc>https://www.cypro.se/2025/09/19/unc1549-hacks-34-devices-in-11-telecom-firms-via-linkedin-job-lures-and-minibike-malware/</loc></url><url><loc>https://www.cypro.se/2025/09/20/shadowleak-zero-click-flaw-leaks-gmail-data-via-openai-chatgpt-deep-research-agent/</loc></url><url><loc>https://www.cypro.se/2025/09/20/researchers-uncover-gpt-4-powered-malterminal-malware-creating-ransomware-reverse-shell/</loc></url><url><loc>https://www.cypro.se/2025/09/20/lastpass-warns-of-fake-repositories-infecting-macos-with-atomic-infostealer/</loc></url><url><loc>https://www.cypro.se/2025/09/21/dprk-hackers-use-clickfix-to-deliver-beavertail-malware-in-crypto-job-scams/</loc></url><url><loc>https://www.cypro.se/2025/09/22/microsoft-patches-critical-entra-id-flaw-enabling-global-admin-impersonation-across-tenants/</loc></url><url><loc>https://www.cypro.se/2025/09/22/how-to-gain-control-of-ai-agents-and-non-human-identities/</loc></url><url><loc>https://www.cypro.se/2025/09/22/%e2%9a%a1-weekly-recap-chrome-0-day-ai-hacking-tools-ddr5-bit-flips-npm-worm-more/</loc></url><url><loc>https://www.cypro.se/2025/09/22/comicform-and-sectorj149-hackers-deploy-formbook-malware-in-eurasian-cyberattacks/</loc></url><url><loc>https://www.cypro.se/2025/09/23/badiis-malware-spreads-via-seo-poisoning-redirects-traffic-plants-web-shells/</loc></url><url><loc>https://www.cypro.se/2025/09/23/github-mandates-2fa-and-short-lived-tokens-to-strengthen-npm-supply-chain-security/</loc></url><url><loc>https://www.cypro.se/2025/09/23/lean-teams-higher-stakes-why-cisos-must-rethink-incident-remediation/</loc></url><url><loc>https://www.cypro.se/2025/09/23/shadowv2-botnet-exploits-misconfigured-aws-docker-containers-for-ddos-for-hire-service/</loc></url><url><loc>https://www.cypro.se/2025/09/23/solarwinds-releases-hotfix-for-critical-cve-2025-26399-remote-code-execution-flaw/</loc></url><url><loc>https://www.cypro.se/2025/09/23/u-s-secret-service-seizes-300-sim-servers-100k-cards-threatening-u-s-officials-near-un/</loc></url><url><loc>https://www.cypro.se/2025/09/23/eurojust-arrests-5-in-e100m-cryptocurrency-investment-fraud-spanning-23-countries/</loc></url><url><loc>https://www.cypro.se/2025/09/23/two-new-supermicro-bmc-bugs-allow-malicious-firmware-to-evade-root-of-trust-security/</loc></url><url><loc>https://www.cypro.se/2025/09/24/state-sponsored-hackers-exploiting-libraesva-email-security-gateway-vulnerability/</loc></url><url><loc>https://www.cypro.se/2025/09/24/hackers-exploit-pandoc-cve-2025-51591-to-target-aws-imds-and-steal-ec2-iam-credentials/</loc></url><url><loc>https://www.cypro.se/2025/09/24/how-one-bad-password-ended-a-158-year-old-business/</loc></url><url><loc>https://www.cypro.se/2025/09/24/new-yibackdoor-malware-shares-major-code-overlaps-with-icedid-and-latrodectus/</loc></url><url><loc>https://www.cypro.se/2025/09/24/iframe-security-exposed-the-blind-spot-fueling-payment-skimmer-attacks/</loc></url><url><loc>https://www.cypro.se/2025/09/24/two-critical-flaws-uncovered-in-wondershare-repairit-exposing-user-data-and-ai-models/</loc></url><url><loc>https://www.cypro.se/2025/09/24/unc5221-uses-brickstorm-backdoor-to-infiltrate-u-s-legal-and-technology-sectors/</loc></url><url><loc>https://www.cypro.se/2025/09/24/chinese-hackers-rednovember-target-global-governments-using-pantegana-and-cobalt-strike/</loc></url><url><loc>https://www.cypro.se/2025/09/25/cisco-warns-of-actively-exploited-snmp-vulnerability-allowing-rce-or-dos-in-ios-software/</loc></url><url><loc>https://www.cypro.se/2025/09/25/malicious-rust-crates-steal-solana-and-ethereum-keys-8424-downloads-confirmed/</loc></url><url><loc>https://www.cypro.se/2025/09/25/tech-overtakes-gaming-as-top-ddos-attack-target-new-gcore-radar-report-finds/</loc></url><url><loc>https://www.cypro.se/2025/09/25/north-korean-hackers-use-new-akdoortea-backdoor-to-target-global-crypto-developers/</loc></url><url><loc>https://www.cypro.se/2025/09/25/ctems-core-prioritization-and-validation/</loc></url><url><loc>https://www.cypro.se/2025/09/25/threatsday-bulletin-rootkit-patch-federal-breach-oneplus-sms-leak-tiktok-scandal-more/</loc></url><url><loc>https://www.cypro.se/2025/09/25/salesforce-patches-critical-forcedleak-bug-exposing-crm-data-via-ai-prompt-injection/</loc></url><url><loc>https://www.cypro.se/2025/09/25/urgent-cisco-asa-zero-day-duo-under-attack-cisa-triggers-emergency-mitigation-directive/</loc></url><url><loc>https://www.cypro.se/2025/09/25/vane-viper-generates-1-trillion-dns-queries-to-power-global-malware-and-ad-fraud-network/</loc></url><url><loc>https://www.cypro.se/2025/09/26/cisco-asa-firewall-zero-day-exploits-deploy-rayinitiator-and-line-viper-malware/</loc></url><url><loc>https://www.cypro.se/2025/09/26/fortra-goanywhere-cvss-10-flaw-exploited-as-0-day-a-week-before-public-disclosure/</loc></url><url><loc>https://www.cypro.se/2025/09/26/new-macos-xcsset-variant-targets-firefox-with-clipper-and-persistence-module/</loc></url><url><loc>https://www.cypro.se/2025/09/26/new-coldriver-malware-campaign-joins-bo-team-and-bearlyfy-in-russia-focused-cyberattacks/</loc></url><url><loc>https://www.cypro.se/2025/09/26/crash-tests-for-security-why-bas-is-proof-of-defense-not-assumptions/</loc></url><url><loc>https://www.cypro.se/2025/09/26/researchers-expose-svg-and-purerat-phishing-threats-targeting-ukraine-and-vietnam/</loc></url><url><loc>https://www.cypro.se/2025/09/27/china-linked-plugx-and-bookworm-malware-attacks-target-asian-telecom-and-asean-networks/</loc></url><url><loc>https://www.cypro.se/2025/09/29/microsoft-flags-ai-driven-phishing-llm-crafted-svg-files-outsmart-email-security/</loc></url><url><loc>https://www.cypro.se/2025/09/29/first-malicious-mcp-server-found-stealing-emails-in-rogue-postmark-mcp-package/</loc></url><url><loc>https://www.cypro.se/2025/09/29/understanding-your-ot-environment-the-first-step-to-stronger-cyber-security/</loc></url><url><loc>https://www.cypro.se/2025/09/29/the-state-of-ai-in-the-soc-2025-insights-from-recent-study/</loc></url><url><loc>https://www.cypro.se/2025/09/29/%e2%9a%a1-weekly-recap-cisco-0-day-record-ddos-lockbit-5-0-bmc-bugs-shadowv2-botnet-more/</loc></url><url><loc>https://www.cypro.se/2025/09/29/evilai-malware-masquerades-as-ai-tools-to-infiltrate-global-organizations/</loc></url><url><loc>https://www.cypro.se/2025/09/30/cisa-sounds-alarm-on-critical-sudo-flaw-actively-exploited-in-linux-and-unix-systems/</loc></url><url><loc>https://www.cypro.se/2025/09/30/evolving-enterprise-defense-to-secure-the-modern-ai-supply-chain/</loc></url><url><loc>https://www.cypro.se/2025/09/30/u-k-police-just-seized-5-5-billion-in-bitcoin-the-worlds-largest-crypto-bust/</loc></url><url><loc>https://www.cypro.se/2025/09/30/new-android-trojan-datzbro-tricking-elderly-with-ai-generated-facebook-travel-events/</loc></url><url><loc>https://www.cypro.se/2025/09/30/researchers-disclose-google-gemini-ai-flaws-allowing-prompt-injection-and-cloud-exploits/</loc></url><url><loc>https://www.cypro.se/2025/09/30/microsoft-expands-sentinel-into-agentic-security-platform-with-unified-data-lake/</loc></url><url><loc>https://www.cypro.se/2025/09/30/stop-alert-chaos-context-is-the-key-to-effective-incident-response/</loc></url><url><loc>https://www.cypro.se/2025/09/30/urgent-china-linked-hackers-exploit-new-vmware-zero-day-since-october-2024/</loc></url><url><loc>https://www.cypro.se/2025/09/30/phantom-taurus-new-china-linked-hacker-group-hits-governments-with-stealth-malware/</loc></url><url><loc>https://www.cypro.se/2025/09/30/50-battering-ram-attack-breaks-intel-and-amd-cloud-security-protections/</loc></url><url><loc>https://www.cypro.se/2025/09/16/rapport-how-bad-actors-use-it-against-you/</loc></url><url><loc>https://www.cypro.se/2025/10/01/ukraine-warns-of-cabinetrat-backdoor-xll-add-ins-spread-via-signal-zips/</loc></url><url><loc>https://www.cypro.se/2025/10/01/new-android-banking-trojan-klopatra-uses-hidden-vnc-to-control-infected-smartphones/</loc></url><url><loc>https://www.cypro.se/2025/10/01/2025-cybersecurity-reality-check-breaches-hidden-attack-surfaces-growing-and-ai-misperceptions-rising/</loc></url><url><loc>https://www.cypro.se/2025/10/01/hackers-exploit-milesight-routers-to-send-phishing-sms-to-european-users/</loc></url><url><loc>https://www.cypro.se/2025/10/01/how-leading-security-teams-blend-ai-human-workflows-free-webinar/</loc></url><url><loc>https://www.cypro.se/2025/10/01/red-hat-openshift-ai-flaw-exposes-hybrid-cloud-infrastructure-to-full-takeover/</loc></url><url><loc>https://www.cypro.se/2025/10/01/onelogin-bug-let-attackers-use-api-keys-to-steal-oidc-secrets-and-impersonate-apps/</loc></url><url><loc>https://www.cypro.se/2025/10/01/new-wiretap-attack-extracts-intel-sgx-ecdsa-key-via-ddr4-memory-bus-interposer/</loc></url><url><loc>https://www.cypro.se/2025/10/01/rfc-9794-a-new-standard-for-post-quantum-terminology/</loc></url><url><loc>https://www.cypro.se/2025/10/02/warning-beware-of-android-spyware-disguised-as-signal-encryption-plugin-and-totok-pro/</loc></url><url><loc>https://www.cypro.se/2025/10/02/how-to-close-threat-detection-gaps-your-socs-action-plan/</loc></url><url><loc>https://www.cypro.se/2025/10/02/automating-pentest-delivery-7-key-workflows-for-maximum-impact/</loc></url><url><loc>https://www.cypro.se/2025/10/02/threatsday-bulletin-carplay-exploit-byovd-tactics-sql-c2-attacks-icloud-backdoor-demand-more/</loc></url><url><loc>https://www.cypro.se/2025/10/02/google-mandiant-probes-new-oracle-extortion-wave-possibly-linked-to-cl0p-ransomware/</loc></url><url><loc>https://www.cypro.se/2025/10/02/alert-malicious-pypi-package-soopsocks-infects-2653-systems-before-takedown/</loc></url><url><loc>https://www.cypro.se/2025/10/02/confucius-hackers-hit-pakistan-with-new-wooperstealer-and-anondoor-malware/</loc></url><url><loc>https://www.cypro.se/2025/10/03/cisa-flags-meteobridge-cve-2025-4008-flaw-as-actively-exploited-in-the-wild/</loc></url><url><loc>https://www.cypro.se/2025/10/03/new-cavalry-werewolf-attack-hits-russian-agencies-with-foalshell-and-stallionrat/</loc></url><url><loc>https://www.cypro.se/2025/10/03/product-walkthrough-how-passwork-7-addresses-complexity-of-enterprise-security/</loc></url><url><loc>https://www.cypro.se/2025/10/03/researchers-warn-of-self-spreading-whatsapp-malware-named-sorvepotel/</loc></url><url><loc>https://www.cypro.se/2025/10/03/rhadamanthys-stealer-evolves-adds-device-fingerprinting-png-steganography-payloads/</loc></url><url><loc>https://www.cypro.se/2025/10/03/detour-dog-caught-running-dns-powered-malware-factory-for-strela-stealer/</loc></url><url><loc>https://www.cypro.se/2025/10/04/scanning-activity-on-palo-alto-networks-portals-jump-500-in-one-day/</loc></url><url><loc>https://www.cypro.se/2025/10/04/cometjacking-one-click-can-turn-perplexitys-comet-ai-browser-into-a-data-thief/</loc></url><url><loc>https://www.cypro.se/2025/10/06/oracle-rushes-patch-for-cve-2025-61882-after-cl0p-exploited-it-in-data-theft-attacks/</loc></url><url><loc>https://www.cypro.se/2025/10/06/zimbra-zero-day-exploited-to-target-brazilian-military-via-malicious-ics-files/</loc></url><url><loc>https://www.cypro.se/2025/10/06/%e2%9a%a1-weekly-recap-oracle-0-day-bitlocker-bypass-vmscape-whatsapp-worm-more/</loc></url><url><loc>https://www.cypro.se/2025/10/06/5-critical-questions-for-adopting-an-ai-security-solution/</loc></url><url><loc>https://www.cypro.se/2025/10/06/chinese-cybercrime-group-runs-global-seo-fraud-ring-using-compromised-iis-servers/</loc></url><url><loc>https://www.cypro.se/2025/10/06/new-report-links-research-firms-bieta-and-ciii-to-chinas-mss-cyber-operations/</loc></url><url><loc>https://www.cypro.se/2025/10/07/oracle-ebs-under-fire-as-cl0p-exploits-cve-2025-61882-in-real-world-attacks/</loc></url><url><loc>https://www.cypro.se/2025/10/07/13-year-redis-flaw-exposed-cvss-10-0-vulnerability-lets-attackers-run-code-remotely/</loc></url><url><loc>https://www.cypro.se/2025/10/07/microsoft-links-storm-1175-to-goanywhere-exploit-deploying-medusa-ransomware/</loc></url><url><loc>https://www.cypro.se/2025/10/07/new-research-ai-is-already-the-1-data-exfiltration-channel-in-the-enterprise/</loc></url><url><loc>https://www.cypro.se/2025/10/07/xworm-6-0-returns-with-35-plugins-and-enhanced-data-theft-capabilities/</loc></url><url><loc>https://www.cypro.se/2025/10/07/googles-new-ai-doesnt-just-find-vulnerabilities-it-rewrites-code-to-patch-them/</loc></url><url><loc>https://www.cypro.se/2025/10/07/batshadow-group-uses-new-go-based-vampire-bot-malware-to-hunt-job-seekers/</loc></url><url><loc>https://www.cypro.se/2025/10/08/openai-disrupts-russian-north-korean-and-chinese-hackers-misusing-chatgpt-for-cyberattacks/</loc></url><url><loc>https://www.cypro.se/2025/10/08/strengthening-national-cyber-resilience-through-observability-and-threat-hunting/</loc></url><url><loc>https://www.cypro.se/2025/10/08/step-into-the-password-graveyard-if-you-dare-and-join-the-live-session/</loc></url><url><loc>https://www.cypro.se/2025/10/08/severe-figma-mcp-vulnerability-lets-hackers-execute-code-remotely-patch-now/</loc></url><url><loc>https://www.cypro.se/2025/10/08/lockbit-qilin-and-dragonforce-join-forces-to-dominate-the-ransomware-ecosystem/</loc></url><url><loc>https://www.cypro.se/2025/10/08/chinese-hackers-weaponize-open-source-nezha-tool-in-new-attack-wave/</loc></url><url><loc>https://www.cypro.se/2025/10/08/hackers-exploit-wordpress-sites-to-power-next-gen-clickfix-phishing-attacks/</loc></url><url><loc>https://www.cypro.se/2025/10/09/critical-exploit-lets-hackers-bypass-authentication-in-wordpress-service-finder-theme/</loc></url><url><loc>https://www.cypro.se/2025/10/09/from-phishing-to-malware-ai-becomes-russias-new-cyber-weapon-in-war-on-ukraine/</loc></url><url><loc>https://www.cypro.se/2025/10/09/saas-breaches-start-with-tokens-what-security-teams-must-watch/</loc></url><url><loc>https://www.cypro.se/2025/10/09/hackers-access-sonicwall-cloud-firewall-backups-spark-urgent-security-checks/</loc></url><url><loc>https://www.cypro.se/2025/10/09/threatsday-bulletin-ms-teams-hack-mfa-hijacking-2b-crypto-heist-apple-siri-probe-more/</loc></url><url><loc>https://www.cypro.se/2025/10/09/new-clayrat-spyware-targets-android-users-via-fake-whatsapp-and-tiktok-apps/</loc></url><url><loc>https://www.cypro.se/2025/10/09/from-healthkick-to-govershell-the-evolution-of-uta0388s-espionage-malware/</loc></url><url><loc>https://www.cypro.se/2025/10/10/cl0p-linked-hackers-breach-dozens-of-organizations-through-oracle-software-flaw/</loc></url><url><loc>https://www.cypro.se/2025/10/10/from-lfi-to-rce-active-exploitation-detected-in-gladinet-and-triofox-vulnerability/</loc></url><url><loc>https://www.cypro.se/2025/10/10/from-detection-to-patch-fortra-reveals-full-timeline-of-cve-2025-10035-exploitation/</loc></url><url><loc>https://www.cypro.se/2025/10/10/the-ai-soc-stack-of-2026-what-sets-top-tier-platforms-apart/</loc></url><url><loc>https://www.cypro.se/2025/10/10/175-malicious-npm-packages-with-26000-downloads-used-in-credential-phishing-campaign/</loc></url><url><loc>https://www.cypro.se/2025/10/10/stealit-malware-abuses-node-js-single-executable-feature-via-game-and-vpn-installers/</loc></url><url><loc>https://www.cypro.se/2025/10/10/microsoft-warns-of-payroll-pirates-hijacking-hr-saas-accounts-to-steal-employee-salaries/</loc></url><url><loc>https://www.cypro.se/2025/10/11/hackers-turn-velociraptor-dfir-tool-into-weapon-in-lockbit-ransomware-attacks/</loc></url><url><loc>https://www.cypro.se/2025/10/11/experts-warn-of-widespread-sonicwall-vpn-compromise-impacting-over-100-accounts/</loc></url><url><loc>https://www.cypro.se/2025/10/12/new-oracle-e-business-suite-bug-could-let-hackers-access-data-without-login/</loc></url><url><loc>https://www.cypro.se/2025/10/13/new-rust-based-malware-chaosbot-uses-discord-channels-to-control-victims-pcs/</loc></url><url><loc>https://www.cypro.se/2025/10/13/astaroth-banking-trojan-abuses-github-to-remain-operational-after-takedowns/</loc></url><url><loc>https://www.cypro.se/2025/10/13/researchers-warn-rondodox-botnet-is-weaponizing-over-50-flaws-across-30-vendors/</loc></url><url><loc>https://www.cypro.se/2025/10/13/microsoft-locks-down-ie-mode-after-hackers-turned-legacy-feature-into-backdoor/</loc></url><url><loc>https://www.cypro.se/2025/10/13/why-unmonitored-javascript-is-your-biggest-holiday-security-risk/</loc></url><url><loc>https://www.cypro.se/2025/10/13/%e2%9a%a1-weekly-recap-whatsapp-worm-critical-cves-oracle-0-day-ransomware-cartel-more/</loc></url><url><loc>https://www.cypro.se/2025/10/14/researchers-expose-ta585s-monsterv2-malware-capabilities-and-attack-chain/</loc></url><url><loc>https://www.cypro.se/2025/10/14/npm-pypi-and-rubygems-packages-found-sending-developer-data-to-discord-channels/</loc></url><url><loc>https://www.cypro.se/2025/10/13/four-ways-to-stay-safe-online/</loc></url><url><loc>https://www.cypro.se/2025/10/06/the-power-of-ego-suspension-my-go-to-social-engineering-technique/</loc></url><url><loc>https://www.cypro.se/2025/10/17/common-cyber-attacks-reducing-the-impact/</loc></url><url><loc>https://www.cypro.se/2025/10/17/north-korean-hackers-combine-beavertail-and-ottercookie-into-advanced-js-malware/</loc></url><url><loc>https://www.cypro.se/2025/10/17/identity-security-your-first-and-last-line-of-defense/</loc></url><url><loc>https://www.cypro.se/2025/10/17/researchers-uncover-watchguard-vpn-bug-that-could-let-attackers-take-over-devices/</loc></url><url><loc>https://www.cypro.se/2025/10/17/microsoft-revokes-200-fraudulent-certificates-used-in-rhysida-ransomware-campaign/</loc></url><url><loc>https://www.cypro.se/2025/10/16/north-korean-hackers-use-etherhiding-to-hide-malware-inside-blockchain-smart-contracts/</loc></url><url><loc>https://www.cypro.se/2025/10/16/hackers-abuse-blockchain-smart-contracts-to-spread-malware-via-infected-wordpress-sites/</loc></url><url><loc>https://www.cypro.se/2025/10/16/linkpro-linux-rootkit-uses-ebpf-to-hide-and-activates-via-magic-tcp-packets/</loc></url><url><loc>https://www.cypro.se/2025/10/16/architectures-risks-and-adoption-how-to-assess-and-choose-the-right-ai-soc-platform/</loc></url><url><loc>https://www.cypro.se/2025/10/16/hackers-deploy-linux-rootkits-via-cisco-snmp-flaw-in-zero-disco-attacks/</loc></url><url><loc>https://www.cypro.se/2025/10/16/beware-the-hidden-costs-of-pen-testing/</loc></url><url><loc>https://www.cypro.se/2025/10/16/threatsday-bulletin-15b-crypto-bust-satellite-spying-billion-dollar-smishing-android-rats-more/</loc></url><url><loc>https://www.cypro.se/2025/10/16/cisa-flags-adobe-aem-flaw-with-perfect-10-0-score-already-under-active-attack/</loc></url><url><loc>https://www.cypro.se/2025/10/15/chinese-threat-group-jewelbug-quietly-infiltrated-russian-it-network-for-months/</loc></url><url><loc>https://www.cypro.se/2025/10/15/f5-breach-exposes-big-ip-source-code-nation-state-hackers-behind-massive-intrusion/</loc></url><url><loc>https://www.cypro.se/2025/10/15/over-100-vs-code-extensions-exposed-developers-to-hidden-supply-chain-risks/</loc></url><url><loc>https://www.cypro.se/2025/10/15/how-attackers-bypass-synced-passkeys/</loc></url><url><loc>https://www.cypro.se/2025/10/15/two-new-windows-zero-days-exploited-in-the-wild-one-affects-every-version-ever-shipped/</loc></url><url><loc>https://www.cypro.se/2025/10/15/two-cvss-10-0-bugs-in-red-lion-rtus-could-hand-hackers-full-industrial-control/</loc></url><url><loc>https://www.cypro.se/2025/10/15/hackers-target-ictbroadcast-servers-via-cookie-exploit-to-gain-remote-shell-access/</loc></url><url><loc>https://www.cypro.se/2025/10/15/new-sap-netweaver-bug-lets-attackers-take-over-servers-without-login/</loc></url><url><loc>https://www.cypro.se/2025/10/14/chinese-hackers-exploit-arcgis-server-as-backdoor-for-over-a-year/</loc></url><url><loc>https://www.cypro.se/2025/10/14/moving-beyond-awareness-how-threat-hunting-builds-readiness/</loc></url><url><loc>https://www.cypro.se/2025/10/14/rmpocalypse-single-8-byte-write-shatters-amds-sev-snp-confidential-computing/</loc></url><url><loc>https://www.cypro.se/2025/10/14/new-pixnapping-android-flaw-lets-rogue-apps-steal-2fa-codes-without-permissions/</loc></url><url><loc>https://www.cypro.se/2025/10/14/what-ai-reveals-about-web-applications-and-why-it-matters/</loc></url><url><loc>https://www.cypro.se/2025/10/20/five-new-exploited-bugs-land-in-cisas-catalog-oracle-and-microsoft-among-targets/</loc></url><url><loc>https://www.cypro.se/2025/10/20/%e2%9a%a1-weekly-recap-f5-breached-linux-rootkits-pixnapping-attack-etherhiding-more/</loc></url><url><loc>https://www.cypro.se/2025/10/20/analysing-clickfix-3-reasons-why-copy-paste-attacks-are-driving-security-breaches/</loc></url><url><loc>https://www.cypro.se/2025/10/20/131-chrome-extensions-caught-hijacking-whatsapp-web-for-massive-spam-campaign/</loc></url><url><loc>https://www.cypro.se/2025/10/20/mss-claims-nsa-used-42-cyber-tools-in-multi-stage-attack-on-beijing-time-systems/</loc></url><url><loc>https://www.cypro.se/2025/10/19/europol-dismantles-sim-farm-network-powering-49-million-fake-accounts-worldwide/</loc></url><url><loc>https://www.cypro.se/2025/10/18/new-net-capi-backdoor-targets-russian-auto-and-e-commerce-firms-via-phishing-zips/</loc></url><url><loc>https://www.cypro.se/2025/10/21/google-identifies-three-new-russian-malware-families-created-by-coldriver-hackers/</loc></url><url><loc>https://www.cypro.se/2025/10/21/hackers-used-snappybee-malware-and-citrix-flaw-to-breach-european-telecom-network/</loc></url><url><loc>https://www.cypro.se/2025/10/21/securing-ai-to-benefit-from-ai/</loc></url><url><loc>https://www.cypro.se/2025/10/21/cyber-security-is-business-survival/</loc></url><url><loc>https://www.cypro.se/2025/10/21/meta-rolls-out-new-tools-to-protect-whatsapp-and-messenger-users-from-scams/</loc></url><url><loc>https://www.cypro.se/2025/10/21/polaredge-targets-cisco-asus-qnap-synology-routers-in-expanding-botnet-campaign/</loc></url><url><loc>https://www.cypro.se/2025/10/22/tp-link-patches-four-omada-gateway-flaws-two-allow-remote-code-execution/</loc></url><url><loc>https://www.cypro.se/2025/10/22/researchers-identify-passiveneuron-apt-using-neursite-and-neuralexecutor-malware/</loc></url><url><loc>https://www.cypro.se/2025/10/22/tarmageddon-flaw-in-async-tar-rust-library-could-enable-remote-code-execution/</loc></url><url><loc>https://www.cypro.se/2025/10/28/sidewinder-adopts-new-clickonce-based-attack-chain-targeting-south-asian-diplomats/</loc></url><url><loc>https://www.cypro.se/2025/10/27/x-warns-users-with-security-keys-to-re-enroll-before-november-10-to-avoid-lockouts/</loc></url><url><loc>https://www.cypro.se/2025/10/27/new-chatgpt-atlas-browser-exploit-lets-attackers-plant-persistent-hidden-commands/</loc></url><url><loc>https://www.cypro.se/2025/10/27/%e2%9a%a1-weekly-recap-wsus-exploited-lockbit-5-0-returns-telegram-backdoor-f5-breach-widens/</loc></url><url><loc>https://www.cypro.se/2025/10/27/qilin-ransomware-combines-linux-payload-with-byovd-exploit-in-hybrid-attack/</loc></url><url><loc>https://www.cypro.se/2025/10/27/chatgpt-atlas-browser-can-be-tricked-by-fake-urls-into-executing-hidden-commands/</loc></url><url><loc>https://www.cypro.se/2025/10/24/smishing-triad-linked-to-194000-malicious-domains-in-global-phishing-operation/</loc></url><url><loc>https://www.cypro.se/2025/10/24/newly-patched-critical-microsoft-wsus-flaw-comes-under-active-exploitation/</loc></url><url><loc>https://www.cypro.se/2025/10/24/apt36-targets-indian-government-with-golang-based-deskrat-malware-campaign/</loc></url><url><loc>https://www.cypro.se/2025/10/24/the-cybersecurity-perception-gap-why-executives-and-practitioners-see-risk-differently/</loc></url><url><loc>https://www.cypro.se/2025/10/24/3000-youtube-videos-exposed-as-malware-traps-in-massive-ghost-network-operation/</loc></url><url><loc>https://www.cypro.se/2025/10/24/self-spreading-glassworm-infects-vs-code-extensions-in-widespread-supply-chain-attack/</loc></url><url><loc>https://www.cypro.se/2025/10/23/north-korean-hackers-lure-defense-engineers-with-fake-jobs-to-steal-drone-secrets/</loc></url><url><loc>https://www.cypro.se/2025/10/23/secure-ai-at-scale-and-speed-learn-the-framework-in-this-free-webinar/</loc></url><url><loc>https://www.cypro.se/2025/10/23/threatsday-bulletin-176m-crypto-fine-hacking-formula-1-chromium-vulns-ai-hijack-more/</loc></url><url><loc>https://www.cypro.se/2025/10/23/why-organizations-are-abandoning-static-secrets-for-managed-identities/</loc></url><url><loc>https://www.cypro.se/2025/10/23/jingle-thief-hackers-exploit-cloud-infrastructure-to-steal-millions-in-gift-cards/</loc></url><url><loc>https://www.cypro.se/2025/10/23/over-250-magento-stores-hit-overnight-as-hackers-exploit-new-adobe-commerce-flaw/</loc></url><url><loc>https://www.cypro.se/2025/10/23/critical-lanscope-endpoint-manager-bug-exploited-in-ongoing-cyberattacks-cisa-confirms/</loc></url><url><loc>https://www.cypro.se/2025/10/22/iran-linked-muddywater-targets-100-organisations-in-global-espionage-campaign/</loc></url><url><loc>https://www.cypro.se/2025/10/22/ukraine-aid-groups-targeted-through-fake-zoom-meetings-and-weaponized-pdf-files/</loc></url><url><loc>https://www.cypro.se/2025/10/22/chinese-threat-actors-exploit-toolshell-sharepoint-flaw-weeks-after-microsofts-july-patch/</loc></url><url><loc>https://www.cypro.se/2025/10/22/bridging-the-remediation-gap-introducing-pentera-resolve/</loc></url><url><loc>https://www.cypro.se/2025/10/22/fake-nethereum-nuget-package-used-homoglyph-trick-to-steal-crypto-wallet-keys/</loc></url><url><loc>https://www.cypro.se/2025/10/22/why-you-should-swap-passwords-for-passphrases/</loc></url><url><loc>https://www.cypro.se/2025/10/28/chrome-zero-day-exploited-to-deliver-italian-memento-labs-leetagent-spyware/</loc></url><url><loc>https://www.cypro.se/2025/10/28/is-your-google-workspace-as-secure-as-you-think-it-is/</loc></url><url><loc>https://www.cypro.se/2025/10/28/why-early-threat-detection-is-a-must-for-long-term-business-growth/</loc></url><url><loc>https://www.cypro.se/2025/10/28/researchers-expose-ghostcall-and-ghosthire-bluenoroffs-new-malware-chains/</loc></url><url><loc>https://www.cypro.se/2025/10/28/new-android-trojan-herodotus-outsmarts-anti-fraud-systems-by-typing-like-a-human/</loc></url><url><loc>https://www.cypro.se/2025/10/28/new-tee-fail-side-channel-attack-extracts-secrets-from-intel-and-amd-ddr5-secure-enclaves/</loc></url><url><loc>https://www.cypro.se/2025/10/29/active-exploits-hit-dassault-and-xwiki-cisa-confirms-critical-flaws-under-attack/</loc></url><url><loc>https://www.cypro.se/2025/10/29/10-npm-packages-caught-stealing-developer-credentials-on-windows-macos-and-linux/</loc></url><url><loc>https://www.cypro.se/2025/10/29/discover-practical-ai-tactics-for-grc-join-the-free-expert-webinar/</loc></url><url><loc>https://www.cypro.se/2025/10/18/silver-fox-expands-winos-4-0-attacks-to-japan-and-malaysia-via-holdinghands-rat/</loc></url><url><loc>https://www.cypro.se/2025/10/29/preparing-for-the-digital-battlefield-of-2026-ghost-identities-poisoned-accounts-ai-agent-havoc/</loc></url><url><loc>https://www.cypro.se/2025/10/29/russian-hackers-target-ukrainian-organizations-using-stealthy-living-off-the-land-tactics/</loc></url><url><loc>https://www.cypro.se/2025/10/29/experts-reports-sharp-increase-in-automated-botnet-attacks-targeting-php-servers-and-iot-devices/</loc></url><url><loc>https://www.cypro.se/2025/10/29/new-ai-targeted-cloaking-attack-tricks-ai-crawlers-into-citing-fake-info-as-verified-facts/</loc></url><url><loc>https://www.cypro.se/2025/10/30/threatsday-bulletin-dns-poisoning-flaw-supply-chain-heist-rust-malware-trick-and-new-rats-rising/</loc></url><url><loc>https://www.cypro.se/2025/10/30/phantomraven-malware-found-in-126-npm-packages-stealing-github-tokens-from-devs/</loc></url><url><loc>https://www.cypro.se/2025/10/30/the-death-of-the-security-checkbox-bas-is-the-power-behind-real-defense/</loc></url><url><loc>https://www.cypro.se/2025/10/30/new-brash-exploit-crashes-chromium-browsers-instantly-with-a-single-malicious-url/</loc></url><url><loc>https://www.cypro.se/2025/10/30/googles-built-in-ai-defenses-on-android-now-block-10-billion-scam-messages-a-month/</loc></url><url><loc>https://www.cypro.se/2025/10/30/russian-ransomware-gangs-weaponize-open-source-adaptixc2-for-advanced-attacks/</loc></url><url><loc>https://www.cypro.se/2025/10/31/a-new-security-layer-for-macos-takes-aim-at-admin-errors-before-hackers-do/</loc></url><url><loc>https://www.cypro.se/2025/10/31/cisa-flags-vmware-zero-day-exploited-by-china-linked-hackers-in-active-attacks/</loc></url><url><loc>https://www.cypro.se/2025/10/31/eclipse-foundation-revokes-leaked-open-vsx-tokens-following-wiz-discovery/</loc></url><url><loc>https://www.cypro.se/2025/10/31/cisa-and-nsa-issue-urgent-guidance-to-secure-wsus-and-microsoft-exchange-servers/</loc></url><url><loc>https://www.cypro.se/2025/10/31/the-msp-cybersecurity-readiness-guide-turning-security-into-growth/</loc></url><url><loc>https://www.cypro.se/2025/10/31/china-linked-hackers-exploit-windows-shortcut-flaw-to-target-european-diplomats/</loc></url><url><loc>https://www.cypro.se/2025/10/31/china-linked-tick-group-exploits-lanscope-zero-day-to-hijack-corporate-systems/</loc></url><url><loc>https://www.cypro.se/2025/10/31/nation-state-hackers-deploy-new-airstalk-malware-in-suspected-supply-chain-attack/</loc></url><url><loc>https://www.cypro.se/2025/10/31/openai-unveils-aardvark-gpt-5-agent-that-finds-and-fixes-code-flaws-automatically/</loc></url><url><loc>https://www.cypro.se/2025/11/01/asd-warns-of-ongoing-badcandy-attacks-exploiting-cisco-ios-xe-vulnerability/</loc></url><url><loc>https://www.cypro.se/2025/11/03/new-httptroy-backdoor-poses-as-vpn-invoice-in-targeted-cyberattack-on-south-korea/</loc></url><url><loc>https://www.cypro.se/2025/11/03/researchers-uncover-bankbot-ynrk-and-deliveryrat-android-trojans-stealing-financial-data/</loc></url><url><loc>https://www.cypro.se/2025/11/03/%e2%9a%a1-weekly-recap-lazarus-hits-web3-intel-amd-tees-cracked-dark-web-leak-tool-more/</loc></url><url><loc>https://www.cypro.se/2025/11/03/the-evolution-of-soc-operations-how-continuous-exposure-management-transforms-security-operations/</loc></url><url><loc>https://www.cypro.se/2025/11/03/cybercriminals-exploit-remote-monitoring-tools-to-infiltrate-logistics-and-freight-networks/</loc></url><url><loc>https://www.cypro.se/2025/11/03/malicious-vsx-extension-sleepyduck-uses-ethereum-to-keep-its-command-server-alive/</loc></url><url><loc>https://www.cypro.se/2025/11/04/microsoft-detects-sesameop-backdoor-using-openais-api-as-a-stealth-command-channel/</loc></url><url><loc>https://www.cypro.se/2025/11/04/googles-ai-big-sleep-finds-5-new-vulnerabilities-in-apples-safari-webkit/</loc></url><url><loc>https://www.cypro.se/2025/11/04/u-s-prosecutors-indict-cybersecurity-insiders-accused-of-blackcat-ransomware-attacks/</loc></url><url><loc>https://www.cypro.se/2025/11/04/ransomware-defense-using-the-wazuh-open-source-platform/</loc></url><url><loc>https://www.cypro.se/2025/11/04/operation-skycloak-deploys-tor-enabled-openssh-backdoor-targeting-defense-sectors/</loc></url><url><loc>https://www.cypro.se/2025/11/04/critical-react-native-cli-flaw-exposed-millions-of-developers-to-remote-attacks/</loc></url><url><loc>https://www.cypro.se/2025/11/04/microsoft-teams-bugs-let-attackers-impersonate-colleagues-and-edit-messages-unnoticed/</loc></url><url><loc>https://www.cypro.se/2025/11/04/europol-and-eurojust-dismantle-e600-million-crypto-fraud-network-in-global-sweep/</loc></url><url><loc>https://www.cypro.se/2025/11/04/a-cybercrime-merger-like-no-other-scattered-spider-lapsus-and-shinyhunters-join-forces/</loc></url><url><loc>https://www.cypro.se/2025/11/05/cisa-adds-gladinet-and-cwp-flaws-to-kev-catalog-amid-active-exploitation-evidence/</loc></url><url><loc>https://www.cypro.se/2025/11/05/securing-the-open-android-ecosystem-with-samsung-knox/</loc></url><url><loc>https://www.cypro.se/2025/11/05/mysterious-smudgedserpent-hackers-target-u-s-policy-experts-amid-iran-israel-tensions/</loc></url><url><loc>https://www.cypro.se/2025/11/05/u-s-sanctions-10-north-korean-entities-for-laundering-12-7m-in-crypto-and-it-fraud/</loc></url><url><loc>https://www.cypro.se/2025/11/05/why-soc-burnout-can-be-avoided-practical-steps/</loc></url><url><loc>https://www.cypro.se/2025/11/05/researchers-find-chatgpt-vulnerabilities-that-let-attackers-trick-ai-into-leaking-data/</loc></url><url><loc>https://www.cypro.se/2025/11/05/google-uncovers-promptflux-malware-that-uses-gemini-ai-to-rewrite-its-code-hourly/</loc></url><url><loc>https://www.cypro.se/2025/11/06/sonicwall-confirms-state-sponsored-hackers-behind-september-cloud-backup-breach/</loc></url><url><loc>https://www.cypro.se/2025/11/06/hackers-weaponize-windows-hyper-v-to-hide-linux-vm-and-evade-edr-detection/</loc></url><url><loc>https://www.cypro.se/2025/11/05/ncsc-to-retire-web-check-and-mail-check/</loc></url><url><loc>https://www.cypro.se/2025/11/06/bitdefender-named-a-representative-vendor-in-the-2025-gartner-market-guide-for-managed-detection-and-response/</loc></url><url><loc>https://www.cypro.se/2025/11/06/from-tabletop-to-turnkey-building-cyber-resilience-in-financial-services/</loc></url><url><loc>https://www.cypro.se/2025/11/06/threatsday-bulletin-ai-tools-in-malware-botnets-gdi-flaws-election-attacks-more/</loc></url><url><loc>https://www.cypro.se/2025/11/06/trojanized-eset-installers-drop-kalambur-backdoor-in-phishing-attacks-on-ukraine/</loc></url><url><loc>https://www.cypro.se/2025/11/06/cisco-warns-of-new-firewall-attack-exploiting-cve-2025-20333-and-cve-2025-20362/</loc></url><url><loc>https://www.cypro.se/2025/11/07/vibe-coded-malicious-vs-code-extension-found-with-built-in-ransomware-capabilities/</loc></url><url><loc>https://www.cypro.se/2025/11/07/google-launches-new-maps-feature-to-help-businesses-report-review-based-extortion-attempts/</loc></url><url><loc>https://www.cypro.se/2025/11/07/enterprise-credentials-at-risk-same-old-same-old/</loc></url><url><loc>https://www.cypro.se/2025/11/07/hidden-logic-bombs-in-malware-laced-nuget-packages-set-to-detonate-years-after-installation/</loc></url><url><loc>https://www.cypro.se/2025/11/07/from-log4j-to-iis-chinas-hackers-turn-legacy-bugs-into-global-espionage-tools/</loc></url><url><loc>https://www.cypro.se/2025/11/07/samsung-zero-click-flaw-exploited-to-deploy-landfall-android-spyware-via-whatsapp/</loc></url><url><loc>https://www.cypro.se/2025/11/08/microsoft-uncovers-whisper-leak-attack-that-identifies-ai-chat-topics-in-encrypted-traffic/</loc></url><url><loc>https://www.cypro.se/2025/11/10/large-scale-clickfix-phishing-attacks-target-hotel-systems-with-purerat-malware/</loc></url><url><loc>https://www.cypro.se/2025/11/10/glassworm-malware-discovered-in-three-vs-code-extensions-with-thousands-of-installs/</loc></url><url><loc>https://www.cypro.se/2025/11/10/%e2%9a%a1-weekly-recap-hyper-v-malware-malicious-ai-bots-rdp-exploits-whatsapp-lockdown-and-more/</loc></url><url><loc>https://www.cypro.se/2025/11/10/new-browser-security-report-reveals-emerging-threats-for-enterprises/</loc></url><url><loc>https://www.cypro.se/2025/11/10/hackers-exploiting-triofox-flaw-to-install-remote-access-tools-via-antivirus-feature/</loc></url><url><loc>https://www.cypro.se/2025/11/10/konni-hackers-turn-googles-find-hub-into-a-remote-data-wiping-weapon/</loc></url><url><loc>https://www.cypro.se/2025/11/11/cyber-action-toolkit-breaking-down-the-barriers-to-resilience/</loc></url><url><loc>https://www.cypro.se/2025/11/11/cisos-expert-guide-to-ai-supply-chain-attacks/</loc></url><url><loc>https://www.cypro.se/2025/11/11/researchers-detect-malicious-npm-package-targeting-github-owned-repositories/</loc></url><url><loc>https://www.cypro.se/2025/11/11/android-trojan-fantasy-hub-malware-service-turns-telegram-into-a-hub-for-hackers/</loc></url><url><loc>https://www.cypro.se/2025/11/11/gootloader-is-back-using-a-new-font-trick-to-hide-malware-on-wordpress-sites/</loc></url><url><loc>https://www.cypro.se/2025/11/11/whatsapp-malware-maverick-hijacks-browser-sessions-to-target-brazils-biggest-banks/</loc></url><url><loc>https://www.cypro.se/2025/11/12/google-launches-private-ai-compute-secure-ai-processing-with-on-device-level-privacy/</loc></url></urlset>
