<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://www.cypro.se/wp-sitemap.xsl" ?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://www.cypro.se/2025/11/12/active-directory-under-siege-why-critical-infrastructure-needs-stronger-security/</loc></url><url><loc>https://www.cypro.se/2025/11/12/microsoft-fixes-63-security-flaws-including-a-windows-kernel-zero-day-under-active-attack/</loc></url><url><loc>https://www.cypro.se/2025/11/12/webinar-learn-how-leading-security-teams-reduce-attack-surface-exposure-with-dasr/</loc></url><url><loc>https://www.cypro.se/2025/11/12/amazon-uncovers-attacks-exploited-cisco-ise-and-citrix-netscaler-as-zero-day-flaws/</loc></url><url><loc>https://www.cypro.se/2025/11/12/google-sues-china-based-hackers-behind-1-billion-lighthouse-phishing-platform/</loc></url><url><loc>https://www.cypro.se/2025/11/13/over-46000-fake-npm-packages-flood-registry-in-worm-like-spam-attack/</loc></url><url><loc>https://www.cypro.se/2025/11/13/cisa-flags-critical-watchguard-fireware-flaw-exposing-54000-fireboxes-to-no-login-attacks/</loc></url><url><loc>https://www.cypro.se/2025/11/13/threatsday-bulletin-cisco-0-days-ai-bug-bounties-crypto-heists-state-linked-leaks-and-20-more-stories/</loc></url><url><loc>https://www.cypro.se/2025/11/13/when-attacks-come-faster-than-patches-why-2026-will-be-the-year-of-machine-speed-security/</loc></url><url><loc>https://www.cypro.se/2025/11/13/operation-endgame-dismantles-rhadamanthys-venom-rat-and-elysium-botnet-in-global-crackdown/</loc></url><url><loc>https://www.cypro.se/2025/11/13/fake-chrome-extension-safery-steals-ethereum-wallet-seed-phrases-using-sui-blockchain/</loc></url><url><loc>https://www.cypro.se/2025/11/13/russian-hackers-create-4300-fake-travel-sites-to-steal-hotel-guests-payment-data/</loc></url><url><loc>https://www.cypro.se/2025/11/14/fortinet-fortiweb-flaw-actively-exploited-in-the-wild-before-companys-silent-patch/</loc></url><url><loc>https://www.cypro.se/2025/11/14/chinese-hackers-use-anthropics-ai-to-launch-automated-cyber-espionage-campaign/</loc></url><url><loc>https://www.cypro.se/2025/11/14/ransomwares-fragmentation-reaches-a-breaking-point-while-lockbit-returns/</loc></url><url><loc>https://www.cypro.se/2025/11/14/researchers-find-serious-ai-bugs-exposing-meta-nvidia-and-microsoft-inference-frameworks/</loc></url><url><loc>https://www.cypro.se/2025/11/14/iranian-hackers-launch-spearspecter-spy-operation-on-defense-government-targets/</loc></url><url><loc>https://www.cypro.se/2025/11/14/north-korean-hackers-turn-json-services-into-covert-malware-delivery-channels/</loc></url><url><loc>https://www.cypro.se/2025/11/15/five-u-s-citizens-plead-guilty-to-helping-north-korean-it-workers-infiltrate-136-companies/</loc></url><url><loc>https://www.cypro.se/2025/11/15/rondodox-exploits-unpatched-xwiki-servers-to-pull-more-devices-into-its-botnet/</loc></url><url><loc>https://www.cypro.se/2025/11/17/rust-adoption-drives-android-memory-safety-bugs-below-20-for-first-time/</loc></url><url><loc>https://www.cypro.se/2025/11/17/dragon-breath-uses-roningloader-to-disable-security-tools-and-deploy-gh0st-rat/</loc></url><url><loc>https://www.cypro.se/2025/11/17/%e2%9a%a1-weekly-recap-fortinet-exploited-chinas-ai-hacks-phaas-empire-falls-more/</loc></url><url><loc>https://www.cypro.se/2025/11/17/5-reasons-why-attackers-are-phishing-over-linkedin/</loc></url><url><loc>https://www.cypro.se/2025/11/17/new-evalusion-clickfix-campaign-delivers-amatera-stealer-and-netsupport-rat/</loc></url><url><loc>https://www.cypro.se/2025/11/18/google-issues-security-fix-for-actively-exploited-chrome-v8-zero-day-vulnerability/</loc></url><url><loc>https://www.cypro.se/2025/11/18/microsoft-mitigates-record-5-72-tbps-ddos-attack-driven-by-aisuru-botnet/</loc></url><url><loc>https://www.cypro.se/2025/11/18/learn-how-leading-companies-secure-cloud-workloads-and-infrastructure-at-scale/</loc></url><url><loc>https://www.cypro.se/2025/11/18/researchers-detail-tuoni-c2s-role-in-an-attempted-2025-real-estate-cyber-intrusion/</loc></url><url><loc>https://www.cypro.se/2025/11/18/iranian-hackers-use-deeproot-and-twostroke-malware-in-aerospace-and-defense-attacks/</loc></url><url><loc>https://www.cypro.se/2025/11/18/beyond-iam-silos-why-the-identity-security-fabric-is-essential-for-securing-ai-and-non-human-identities/</loc></url><url><loc>https://www.cypro.se/2025/11/18/seven-npm-packages-use-adspect-cloaking-to-trick-victims-into-crypto-scam-pages/</loc></url><url><loc>https://www.cypro.se/2025/11/18/meta-expands-whatsapp-security-research-with-new-proxy-tool-and-4m-in-bounties-this-year/</loc></url><url><loc>https://www.cypro.se/2025/11/18/sneaky-2fa-phishing-kit-adds-bitb-pop-ups-designed-to-mimic-the-browser-address-bar/</loc></url><url><loc>https://www.cypro.se/2025/11/19/fortinet-warns-of-new-fortiweb-cve-2025-58034-vulnerability-exploited-in-the-wild/</loc></url><url><loc>https://www.cypro.se/2025/11/19/edgestepper-implant-reroutes-dns-queries-to-deploy-malware-via-hijacked-software-updates/</loc></url><url><loc>https://www.cypro.se/2025/11/19/servicenow-ai-agents-can-be-tricked-into-acting-against-each-other-via-second-order-prompts/</loc></url><url><loc>https://www.cypro.se/2025/11/19/application-containment-how-to-use-ringfencing-to-prevent-the-weaponization-of-trusted-software/</loc></url><url><loc>https://www.cypro.se/2025/11/19/wrthug-exploits-six-asus-wrt-flaws-to-hijack-tens-of-thousands-of-eol-routers-worldwide/</loc></url><url><loc>https://www.cypro.se/2025/11/19/python-based-whatsapp-worm-spreads-eternidade-stealer-across-brazilian-devices/</loc></url><url><loc>https://www.cypro.se/2025/11/19/hackers-actively-exploiting-7-zip-symbolic-link-based-rce-vulnerability-cve-2025-11001/</loc></url><url><loc>https://www.cypro.se/2025/11/20/tamperedchef-malware-spreads-via-fake-software-installers-in-ongoing-global-campaign/</loc></url><url><loc>https://www.cypro.se/2025/11/20/iran-linked-hackers-mapped-ship-ais-data-days-before-real-world-missile-strike-attempt/</loc></url><url><loc>https://www.cypro.se/2025/11/20/ctm360-exposes-a-global-whatsapp-hijacking-campaign-hackonchat/</loc></url><url><loc>https://www.cypro.se/2025/11/20/new-sturnus-android-trojan-quietly-captures-encrypted-chats-and-hijacks-devices/</loc></url><url><loc>https://www.cypro.se/2025/11/20/threatsday-bulletin-0-days-linkedin-spies-crypto-crimes-iot-flaws-and-new-malware-waves/</loc></url><url><loc>https://www.cypro.se/2025/11/20/shadowray-2-0-exploits-unpatched-ray-flaw-to-build-self-spreading-gpu-cryptomining-botnet/</loc></url><url><loc>https://www.cypro.se/2025/11/20/tsundere-botnet-expands-using-game-lures-and-ethereum-based-c2-on-windows/</loc></url><url><loc>https://www.cypro.se/2025/11/18/inside-the-mind-of-a-social-engineer-what-fase-teaches-about-human-psychology-and-security/</loc></url><url><loc>https://www.cypro.se/2025/11/03/sowing-confusion-the-social-engineering-behind-gaslighting/</loc></url><url><loc>https://www.cypro.se/2025/11/21/salesforce-flags-unauthorized-data-access-via-gainsight-linked-oauth-activity/</loc></url><url><loc>https://www.cypro.se/2025/11/21/sec-drops-solarwinds-case-after-years-of-high-stakes-cybersecurity-scrutiny/</loc></url><url><loc>https://www.cypro.se/2025/11/21/why-it-admins-choose-samsung-for-mobile-security/</loc></url><url><loc>https://www.cypro.se/2025/11/21/apt24-deploys-badaudio-in-years-long-espionage-hitting-taiwan-and-1000-domains/</loc></url><url><loc>https://www.cypro.se/2025/11/21/google-brings-airdrop-compatibility-to-androids-quick-share-using-rust-hardened-security/</loc></url><url><loc>https://www.cypro.se/2025/11/21/grafana-patches-cvss-10-0-scim-flaw-enabling-impersonation-and-privilege-escalation/</loc></url><url><loc>https://www.cypro.se/2025/11/22/matrix-push-c2-uses-browser-notifications-for-fileless-cross-platform-phishing-attacks/</loc></url><url><loc>https://www.cypro.se/2025/11/22/cisa-warns-of-actively-exploited-critical-oracle-identity-manager-zero-day-vulnerability/</loc></url><url><loc>https://www.cypro.se/2025/11/22/china-linked-apt31-launches-stealthy-cyberattacks-on-russian-it-using-cloud-services/</loc></url><url><loc>https://www.cypro.se/2025/11/24/choosing-a-managed-service-provider-msp/</loc></url><url><loc>https://www.cypro.se/2025/11/24/shadowpad-malware-actively-exploits-wsus-vulnerability-for-full-system-access/</loc></url><url><loc>https://www.cypro.se/2025/11/24/chinese-deepseek-r1-ai-generates-insecure-code-when-prompts-mention-tibet-or-uyghurs/</loc></url><url><loc>https://www.cypro.se/2025/11/24/second-sha1-hulud-wave-affects-25000-repositories-via-npm-preinstall-credential-theft/</loc></url><url><loc>https://www.cypro.se/2025/11/24/%e2%9a%a1-weekly-recap-fortinet-exploit-chrome-0-day-badiis-malware-record-ddos-saas-breach-more/</loc></url><url><loc>https://www.cypro.se/2025/11/24/new-fluent-bit-flaws-expose-cloud-to-rce-and-stealthy-infrastructure-intrusions/</loc></url><url><loc>https://www.cypro.se/2025/11/25/cisa-warns-of-active-spyware-campaigns-hijacking-high-value-signal-and-whatsapp-users/</loc></url><url><loc>https://www.cypro.se/2025/11/25/3-soc-challenges-you-need-to-solve-before-2026/</loc></url><url><loc>https://www.cypro.se/2025/11/25/hackers-hijack-blender-3d-assets-to-deploy-stealc-v2-data-stealing-malware/</loc></url><url><loc>https://www.cypro.se/2025/11/25/toddycats-new-hacking-tools-steal-outlook-emails-and-microsoft-365-access-tokens/</loc></url><url><loc>https://www.cypro.se/2025/11/25/jackfix-uses-fake-windows-update-pop-ups-on-adult-sites-to-deliver-multiple-stealers/</loc></url><url><loc>https://www.cypro.se/2025/11/25/years-of-jsonformatter-and-codebeautify-leaks-expose-thousands-of-passwords-and-api-keys/</loc></url><url><loc>https://www.cypro.se/2025/11/26/fbi-reports-262m-in-ato-fraud-as-researchers-cite-growing-ai-phishing-and-holiday-scams/</loc></url><url><loc>https://www.cypro.se/2025/11/26/romcom-uses-socgholish-fake-update-attacks-to-deliver-mythic-agent-malware/</loc></url><url><loc>https://www.cypro.se/2025/11/26/webinar-learn-to-spot-risks-and-patch-safely-with-community-maintained-tools/</loc></url><url><loc>https://www.cypro.se/2025/11/26/chrome-extension-caught-injecting-hidden-solana-transfer-fees-into-raydium-swaps/</loc></url><url><loc>https://www.cypro.se/2025/11/26/when-your-2m-security-detection-fails-can-your-soc-save-you/</loc></url><url><loc>https://www.cypro.se/2025/11/26/qilin-ransomware-turns-south-korean-msp-breach-into-28-victim-korean-leaks-data-heist/</loc></url><url><loc>https://www.cypro.se/2025/11/26/shai-hulud-v2-campaign-spreads-from-npm-to-maven-exposing-thousands-of-secrets/</loc></url><url><loc>https://www.cypro.se/2025/11/27/gainsight-expands-impacted-customer-list-following-salesforce-security-alert/</loc></url><url><loc>https://www.cypro.se/2025/11/27/ncsc-handing-over-the-baton-of-smart-meter-security-a-decade-of-progress/</loc></url><url><loc>https://www.cypro.se/2025/11/27/threatsday-bulletin-ai-malware-voice-bot-flaws-crypto-laundering-iot-attacks-and-20-more-stories/</loc></url><url><loc>https://www.cypro.se/2025/11/27/microsoft-to-block-unauthorized-scripts-in-entra-id-logins-with-2026-csp-update/</loc></url><url><loc>https://www.cypro.se/2025/11/27/bloody-wolf-expands-java-based-netsupport-rat-attacks-in-kyrgyzstan-and-uzbekistan/</loc></url><url><loc>https://www.cypro.se/2025/11/28/ms-teams-guest-access-can-remove-defender-protection-when-users-join-external-tenants/</loc></url><url><loc>https://www.cypro.se/2025/11/27/its-time-for-all-small-businesses-to-act/</loc></url><url><loc>https://www.cypro.se/2025/11/28/why-organizations-are-turning-to-rpam/</loc></url><url><loc>https://www.cypro.se/2025/11/28/legacy-python-bootstrap-scripts-create-domain-takeover-risk-in-multiple-pypi-packages/</loc></url><url><loc>https://www.cypro.se/2025/11/28/north-korean-hackers-deploy-197-npm-packages-to-spread-updated-ottercookie-malware/</loc></url><url><loc>https://www.cypro.se/2025/11/30/cisa-adds-actively-exploited-xss-bug-cve-2021-26829-in-openplc-scadabr-to-kev/</loc></url><url><loc>https://www.cypro.se/2025/12/01/tomiris-shifts-to-public-service-implants-for-stealthier-c2-in-attacks-on-government-targets/</loc></url><url><loc>https://www.cypro.se/2025/12/01/new-albiriox-maas-malware-targets-400-apps-for-on-device-fraud-and-screen-control/</loc></url><url><loc>https://www.cypro.se/2025/12/01/webinar-the-agentic-trojan-horse-why-the-new-ai-browsers-war-is-a-nightmare-for-security-teams/</loc></url><url><loc>https://www.cypro.se/2025/12/01/%e2%9a%a1-weekly-recap-hot-cves-npm-worm-returns-firefox-rce-m365-email-raid-more/</loc></url><url><loc>https://www.cypro.se/2025/12/01/india-orders-phone-makers-to-pre-install-sanchar-saathi-app-to-tackle-telecom-fraud/</loc></url><url><loc>https://www.cypro.se/2025/12/01/shadypanda-turns-popular-browser-extensions-with-4-3-million-installs-into-spyware/</loc></url><url><loc>https://www.cypro.se/2025/12/02/google-patches-107-android-flaws-including-two-framework-bugs-exploited-in-the-wild/</loc></url><url><loc>https://www.cypro.se/2025/12/02/what-makes-a-responsible-cyber-actor-introducing-the-pall-mall-industry-consultation-on-good-practice/</loc></url><url><loc>https://www.cypro.se/2025/12/02/secalerts-cuts-through-the-noise-with-a-smarter-faster-way-to-track-vulnerabilities/</loc></url><url><loc>https://www.cypro.se/2025/12/02/iran-linked-hackers-hits-israeli-sectors-with-new-muddyviper-backdoor-in-targeted-attacks/</loc></url><url><loc>https://www.cypro.se/2025/12/02/researchers-capture-lazarus-apts-remote-worker-scheme-live-on-camera/</loc></url><url><loc>https://www.cypro.se/2025/12/02/glassworm-returns-with-24-malicious-extensions-impersonating-popular-developer-tools/</loc></url><url><loc>https://www.cypro.se/2025/12/02/malicious-npm-package-uses-hidden-prompt-and-script-to-evade-ai-security-tools/</loc></url><url><loc>https://www.cypro.se/2025/12/02/india-orders-messaging-apps-to-work-only-with-active-sim-cards-to-prevent-fraud-and-misuse/</loc></url><url><loc>https://www.cypro.se/2025/12/03/picklescan-bugs-allow-malicious-pytorch-models-to-evade-scans-and-execute-code/</loc></url><url><loc>https://www.cypro.se/2025/12/03/malicious-rust-crate-delivers-os-specific-malware-to-web3-developer-systems/</loc></url><url><loc>https://www.cypro.se/2025/12/03/chopping-ai-down-to-size-turning-disruptive-technology-into-a-strategic-advantage/</loc></url><url><loc>https://www.cypro.se/2025/12/03/discover-the-ai-tools-fueling-the-next-cybercrime-wave-watch-the-webinar/</loc></url><url><loc>https://www.cypro.se/2025/12/03/brazil-hit-by-banking-trojan-spread-via-whatsapp-worm-and-relaynfc-nfc-relay-fraud/</loc></url><url><loc>https://www.cypro.se/2025/12/03/microsoft-silently-patches-windows-lnk-flaw-after-years-of-active-exploitation/</loc></url><url><loc>https://www.cypro.se/2025/12/03/wordpress-king-addons-flaw-under-active-attack-lets-hackers-make-admin-accounts/</loc></url><url><loc>https://www.cypro.se/2025/12/03/critical-rsc-bugs-in-react-and-next-js-allow-unauthenticated-remote-code-execution/</loc></url><url><loc>https://www.cypro.se/2025/12/04/record-29-7-tbps-ddos-attack-linked-to-aisuru-botnet-with-up-to-4-million-infected-hosts/</loc></url><url><loc>https://www.cypro.se/2025/12/04/goldfactory-hits-southeast-asia-with-modified-banking-apps-driving-11000-infections/</loc></url><url><loc>https://www.cypro.se/2025/12/04/5-threats-that-reshaped-web-security-this-year-2025/</loc></url><url><loc>https://www.cypro.se/2025/12/04/threatsday-bulletin-wi-fi-hack-npm-worm-defi-theft-phishing-blasts-and-15-more-stories/</loc></url><url><loc>https://www.cypro.se/2025/12/03/building-trust-in-the-digital-age-a-collaborative-approach-to-content-provenance-technologies/</loc></url><url><loc>https://www.cypro.se/2025/12/04/silver-fox-uses-fake-microsoft-teams-installer-to-spread-valleyrat-malware-in-china/</loc></url><url><loc>https://www.cypro.se/2025/12/05/jpcert-confirms-active-command-injection-attacks-on-array-ag-gateways/</loc></url><url><loc>https://www.cypro.se/2025/12/05/cisa-reports-prc-hackers-using-brickstorm-for-long-term-access-in-u-s-systems/</loc></url><url><loc>https://www.cypro.se/2025/12/05/intellexa-leaks-reveal-zero-days-and-ads-based-vector-for-predator-spyware-delivery/</loc></url><url><loc>https://www.cypro.se/2025/12/05/getting-to-yes-an-anti-sales-guide-for-msps/</loc></url><url><loc>https://www.cypro.se/2025/12/05/chinese-hackers-have-started-exploiting-the-newly-disclosed-react2shell-vulnerability/</loc></url><url><loc>https://www.cypro.se/2025/12/05/critical-xxe-bug-cve-2025-66516-cvss-10-0-hits-apache-tika-requires-urgent-patch/</loc></url><url><loc>https://www.cypro.se/2025/12/05/zero-click-agentic-browser-attack-can-delete-entire-google-drive-using-crafted-emails/</loc></url><url><loc>https://www.cypro.se/2025/12/06/critical-react2shell-flaw-added-to-cisa-kev-after-confirmed-active-exploitation/</loc></url><url><loc>https://www.cypro.se/2025/12/06/researchers-uncover-30-flaws-in-ai-coding-tools-enabling-data-theft-and-rce-attacks/</loc></url><url><loc>https://www.cypro.se/2025/12/08/muddywater-deploys-udpgangster-backdoor-in-targeted-turkey-israel-azerbaijan-campaign/</loc></url><url><loc>https://www.cypro.se/2025/12/08/prompt-injection-is-not-sql-injection-it-may-be-worse/</loc></url><url><loc>https://www.cypro.se/2025/12/08/sneeit-wordpress-rce-exploited-in-the-wild-while-ictbroadcast-bug-fuels-frost-botnet-attacks/</loc></url><url><loc>https://www.cypro.se/2025/12/08/android-malware-fvncbot-seedsnatcher-and-clayrat-gain-stronger-data-theft-features/</loc></url><url><loc>https://www.cypro.se/2025/12/08/%e2%9a%a1-weekly-recap-usb-malware-react2shell-whatsapp-worms-ai-ide-bugs-more/</loc></url><url><loc>https://www.cypro.se/2025/12/08/how-can-retailers-cyber-prepare-for-the-most-vulnerable-time-of-the-year/</loc></url><url><loc>https://www.cypro.se/2025/12/08/experts-confirm-jssmuggler-uses-compromised-sites-to-deploy-netsupport-rat/</loc></url><url><loc>https://www.cypro.se/2025/12/09/researchers-find-malicious-vs-code-go-npm-and-rust-packages-stealing-developer-data/</loc></url><url><loc>https://www.cypro.se/2025/12/09/stac6565-targets-canada-in-80-of-attacks-as-gold-blade-deploys-qwcrypt-ransomware/</loc></url><url><loc>https://www.cypro.se/2025/12/09/how-to-streamline-zero-trust-using-the-shared-signals-framework/</loc></url><url><loc>https://www.cypro.se/2025/12/09/google-adds-layered-defenses-to-chrome-to-block-indirect-prompt-injection-threats/</loc></url><url><loc>https://www.cypro.se/2025/12/09/storm-0249-escalates-ransomware-attacks-with-clickfix-fileless-powershell-and-dll-sideloading/</loc></url><url><loc>https://www.cypro.se/2025/12/09/four-threat-clusters-using-castleloader-as-graybravo-expands-its-malware-service-infrastructure/</loc></url><url><loc>https://www.cypro.se/2025/12/09/north-korea-linked-actors-exploit-react2shell-to-deploy-new-etherrat-malware/</loc></url><url><loc>https://www.cypro.se/2025/12/10/fortinet-ivanti-and-sap-issue-urgent-patches-for-authentication-and-code-execution-flaws/</loc></url><url><loc>https://www.cypro.se/2025/12/10/microsoft-issues-security-fixes-for-56-flaws-including-active-exploit-and-two-zero-days/</loc></url><url><loc>https://www.cypro.se/2025/12/08/provisioning-and-managing-certificates-in-the-web-pki/</loc></url><url><loc>https://www.cypro.se/2025/12/08/updating-our-guidance-on-security-certificates-tls-and-ipsec/</loc></url><url><loc>https://www.cypro.se/2025/12/10/warning-winrar-vulnerability-cve-2025-6218-under-active-attack-by-multiple-threat-groups/</loc></url><url><loc>https://www.cypro.se/2025/12/10/webinar-how-attackers-exploit-cloud-misconfigurations-across-aws-ai-models-and-kubernetes/</loc></url><url><loc>https://www.cypro.se/2025/12/10/three-pcie-encryption-weaknesses-expose-pcie-5-0-systems-to-faulty-data-handling/</loc></url><url><loc>https://www.cypro.se/2025/12/10/net-soapwn-flaw-opens-door-for-file-writes-and-remote-code-execution-via-rogue-wsdl/</loc></url><url><loc>https://www.cypro.se/2025/12/10/react2shell-exploitation-delivers-crypto-miners-and-new-malware-across-multiple-sectors/</loc></url><url><loc>https://www.cypro.se/2025/12/11/active-attacks-exploit-gladinets-hard-coded-keys-for-unauthorized-access-and-code-execution/</loc></url><url><loc>https://www.cypro.se/2025/12/11/cyber-deception-trials-what-weve-learned-so-far/</loc></url><url><loc>https://www.cypro.se/2025/12/11/chrome-targeted-by-active-in-the-wild-exploit-tied-to-undisclosed-high-severity-flaw/</loc></url><url><loc>https://www.cypro.se/2025/12/11/unpatched-gogs-zero-day-exploited-across-700-instances-amid-active-attacks/</loc></url><url><loc>https://www.cypro.se/2025/12/11/wirte-leverages-ashenloader-sideloading-to-install-the-ashtag-espionage-backdoor/</loc></url><url><loc>https://www.cypro.se/2025/12/11/the-impact-of-robotic-process-automation-rpa-on-identity-and-access-management/</loc></url><url><loc>https://www.cypro.se/2025/12/11/threatsday-bulletin-spyware-alerts-mirai-strikes-docker-leaks-valleyrat-rootkit-and-20-more-stories/</loc></url><url><loc>https://www.cypro.se/2025/12/11/nanoremote-malware-uses-google-drive-api-for-hidden-control-on-windows-systems/</loc></url><url><loc>https://www.cypro.se/2025/12/12/cisa-flags-actively-exploited-geoserver-xxe-flaw-in-updated-kev-catalog/</loc></url><url><loc>https://www.cypro.se/2025/12/12/new-react-rsc-vulnerabilities-enable-dos-and-source-code-exposure/</loc></url><url><loc>https://www.cypro.se/2025/12/12/react2shell-exploitation-escalates-into-large-scale-global-attacks-forcing-emergency-mitigation/</loc></url><url><loc>https://www.cypro.se/2025/12/12/securing-genai-in-the-browser-policy-isolation-and-data-controls-that-actually-work/</loc></url><url><loc>https://www.cypro.se/2025/12/12/new-advanced-phishing-kits-use-ai-and-mfa-bypass-tactics-to-steal-credentials-at-scale/</loc></url><url><loc>https://www.cypro.se/2025/12/12/fake-osint-and-gpt-utility-github-repos-spread-pystorerat-malware-payloads/</loc></url><url><loc>https://www.cypro.se/2025/12/13/apple-issues-security-updates-after-two-webkit-flaws-found-exploited-in-the-wild/</loc></url><url><loc>https://www.cypro.se/2025/12/13/cisa-adds-actively-exploited-sierra-wireless-router-flaw-enabling-rce-attacks/</loc></url><url><loc>https://www.cypro.se/2025/12/15/volklocker-ransomware-exposed-by-hard-coded-master-key-allowing-free-decryption/</loc></url><url><loc>https://www.cypro.se/2025/12/15/phantom-stealer-spread-by-iso-phishing-emails-hitting-russian-finance-sector/</loc></url><url><loc>https://www.cypro.se/2025/12/15/%e2%9a%a1-weekly-recap-apple-0-days-winrar-exploit-lastpass-fines-net-rce-oauth-scams-more/</loc></url><url><loc>https://www.cypro.se/2025/12/15/a-browser-extension-risk-guide-after-the-shadypanda-campaign/</loc></url><url><loc>https://www.cypro.se/2025/12/15/freepbx-patches-critical-sqli-file-upload-and-authtype-bypass-flaws-enabling-rce/</loc></url><url><loc>https://www.cypro.se/2025/12/15/featured-chrome-browser-extension-caught-intercepting-millions-of-users-ai-chats/</loc></url><url><loc>https://www.cypro.se/2025/12/16/google-to-shut-down-dark-web-monitoring-tool-in-february-2026/</loc></url><url><loc>https://www.cypro.se/2025/12/16/react2shell-vulnerability-actively-exploited-to-deploy-linux-backdoors/</loc></url><url><loc>https://www.cypro.se/2025/12/16/fortinet-fortigate-under-active-attack-through-saml-sso-authentication-bypass/</loc></url><url><loc>https://www.cypro.se/2025/12/16/why-data-security-and-privacy-need-to-start-in-code/</loc></url><url><loc>https://www.cypro.se/2025/12/16/amazon-exposes-years-long-gru-cyber-campaign-targeting-energy-and-cloud-infrastructure/</loc></url><url><loc>https://www.cypro.se/2025/12/16/rogue-nuget-package-poses-as-tracer-fody-steals-cryptocurrency-wallet-data/</loc></url><url><loc>https://www.cypro.se/2025/12/16/compromised-iam-credentials-power-a-large-aws-crypto-mining-campaign/</loc></url><url><loc>https://www.cypro.se/2025/12/17/ghostposter-malware-found-in-17-firefox-add-ons-with-50000-downloads/</loc></url><url><loc>https://www.cypro.se/2025/12/17/fix-soc-blind-spots-see-threats-to-your-industry-country-in-real-time/</loc></url><url><loc>https://www.cypro.se/2025/12/17/china-linked-ink-dragon-hacks-governments-using-shadowpad-and-finaldraft-malware/</loc></url><url><loc>https://www.cypro.se/2025/12/17/apt28-targets-ukrainian-ukr-net-users-in-long-running-credential-phishing-campaign/</loc></url><url><loc>https://www.cypro.se/2025/12/17/new-forumtroll-phishing-attacks-target-russian-scholars-using-fake-elibrary-emails/</loc></url><url><loc>https://www.cypro.se/2025/12/17/sonicwall-fixes-actively-exploited-cve-2025-40602-in-sma-100-appliances/</loc></url><url><loc>https://www.cypro.se/2025/12/17/kimwolf-botnet-hijacks-1-8-million-android-tvs-launches-large-scale-ddos-attacks/</loc></url><url><loc>https://www.cypro.se/2025/12/18/cisco-warns-of-active-attacks-exploiting-unpatched-0-day-in-asyncos-email-security-appliances/</loc></url><url><loc>https://www.cypro.se/2025/12/18/cisa-flags-critical-asus-live-update-flaw-after-evidence-of-active-exploitation/</loc></url><url><loc>https://www.cypro.se/2025/12/18/kimsuky-spreads-docswap-android-malware-via-qr-phishing-posing-as-delivery-app/</loc></url><url><loc>https://www.cypro.se/2025/12/18/the-case-for-dynamic-ai-saas-security-as-copilots-scale/</loc></url><url><loc>https://www.cypro.se/2025/12/18/threatsday-bulletin-whatsapp-hijacks-mcp-leaks-ai-recon-react2shell-exploit-and-15-more-stories/</loc></url><url><loc>https://www.cypro.se/2025/12/18/north-korea-linked-hackers-steal-2-02-billion-in-2025-leading-global-crypto-theft/</loc></url><url><loc>https://www.cypro.se/2025/12/18/hpe-oneview-flaw-rated-cvss-10-0-allows-unauthenticated-remote-code-execution/</loc></url><url><loc>https://www.cypro.se/2025/12/18/china-aligned-threat-group-uses-windows-group-policy-to-deploy-espionage-malware/</loc></url><url><loc>https://www.cypro.se/2025/12/19/new-uefi-flaw-enables-early-boot-dma-attacks-on-asrock-asus-gigabyte-msi-motherboards/</loc></url><url><loc>https://www.cypro.se/2025/12/19/nigeria-arrests-raccoono365-phishing-developer-linked-to-microsoft-365-attacks/</loc></url><url><loc>https://www.cypro.se/2025/12/19/watchguard-warns-of-active-exploitation-of-critical-fireware-os-vpn-vulnerability/</loc></url><url><loc>https://www.cypro.se/2025/12/19/cracked-software-and-youtube-videos-spread-countloader-and-gachiloader-malware/</loc></url><url><loc>https://www.cypro.se/2025/12/19/russia-linked-hackers-use-microsoft-365-device-code-phishing-for-account-takeovers/</loc></url><url><loc>https://www.cypro.se/2025/12/20/u-s-doj-charges-54-in-atm-jackpotting-scheme-using-ploutus-malware/</loc></url><url><loc>https://www.cypro.se/2025/12/21/iranian-infy-apt-resurfaces-with-new-malware-activity-after-years-of-silence/</loc></url><url><loc>https://www.cypro.se/2025/12/22/android-malware-operations-merge-droppers-sms-theft-and-rat-capabilities-at-scale/</loc></url><url><loc>https://www.cypro.se/2025/12/22/%e2%9a%a1-weekly-recap-firewall-exploits-ai-data-theft-android-hacks-apt-attacks-insider-leaks-more/</loc></url><url><loc>https://www.cypro.se/2025/12/22/how-to-browse-the-web-more-sustainably-with-a-green-browser/</loc></url><url><loc>https://www.cypro.se/2025/12/22/fake-whatsapp-api-package-on-npm-steals-messages-contacts-and-login-tokens/</loc></url><url><loc>https://www.cypro.se/2025/12/23/fcc-bans-foreign-made-drones-and-key-parts-over-u-s-national-security-risks/</loc></url><url><loc>https://www.cypro.se/2025/12/23/critical-n8n-flaw-cvss-9-9-enables-arbitrary-code-execution-across-thousands-of-instances/</loc></url><url><loc>https://www.cypro.se/2025/12/23/u-s-doj-seizes-fraud-domain-behind-14-6-million-bank-account-takeover-scheme/</loc></url><url><loc>https://www.cypro.se/2025/12/23/interpol-arrests-574-in-africa-ukrainian-ransomware-affiliate-pleads-guilty/</loc></url><url><loc>https://www.cypro.se/2025/12/23/passwd-a-walkthrough-of-the-google-workspace-password-manager/</loc></url><url><loc>https://www.cypro.se/2025/12/23/two-chrome-extensions-caught-secretly-stealing-credentials-from-over-170-sites/</loc></url><url><loc>https://www.cypro.se/2025/12/24/italy-fines-apple-e98-6-million-over-att-rules-limiting-app-store-competition/</loc></url><url><loc>https://www.cypro.se/2025/12/24/sec-files-charges-over-14-million-crypto-scam-using-fake-ai-themed-investment-tips/</loc></url><url><loc>https://www.cypro.se/2025/12/24/attacks-are-evolving-3-ways-to-protect-your-business-in-2026/</loc></url><url><loc>https://www.cypro.se/2025/12/24/nomani-investment-scam-surges-62-using-ai-deepfake-ads-on-social-media/</loc></url><url><loc>https://www.cypro.se/2025/12/24/new-macsync-macos-stealer-uses-signed-app-to-bypass-apple-gatekeeper/</loc></url><url><loc>https://www.cypro.se/2025/12/01/the-art-of-listening-in-a-distracted-world/</loc></url><url><loc>https://www.cypro.se/2025/12/25/fortinet-warns-of-active-exploitation-of-fortios-ssl-vpn-2fa-bypass-vulnerability/</loc></url><url><loc>https://www.cypro.se/2025/12/25/cisa-flags-actively-exploited-digiever-nvr-vulnerability-allowing-remote-code-execution/</loc></url><url><loc>https://www.cypro.se/2025/12/25/lastpass-2022-breach-led-to-years-long-cryptocurrency-thefts-trm-labs-finds/</loc></url><url><loc>https://www.cypro.se/2025/12/25/threatsday-bulletin-stealth-loaders-ai-chatbot-flaws-ai-exploits-docker-hack-and-15-more-stories/</loc></url><url><loc>https://www.cypro.se/2025/12/26/critical-langchain-core-vulnerability-exposes-secrets-via-serialization-injection/</loc></url><url><loc>https://www.cypro.se/2025/12/26/china-linked-evasive-panda-ran-dns-poisoning-campaign-to-deliver-mgbot-malware/</loc></url><url><loc>https://www.cypro.se/2025/12/26/trust-wallet-chrome-extension-breach-caused-7-million-crypto-loss-via-malicious-code/</loc></url><url><loc>https://www.cypro.se/2025/12/27/new-mongodb-flaw-lets-unauthenticated-attackers-read-uninitialized-memory/</loc></url><url><loc>https://www.cypro.se/2025/12/29/mongodb-vulnerability-cve-2025-14847-under-active-exploitation-worldwide/</loc></url><url><loc>https://www.cypro.se/2025/12/29/traditional-security-frameworks-leave-organizations-exposed-to-ai-specific-attack-vectors/</loc></url><url><loc>https://www.cypro.se/2025/12/29/27-malicious-npm-packages-used-as-phishing-infrastructure-to-steal-login-credentials/</loc></url><url><loc>https://www.cypro.se/2025/12/29/%e2%9a%a1-weekly-recap-mongodb-attacks-wallet-breaches-android-spyware-insider-crime-more/</loc></url><url><loc>https://www.cypro.se/2025/12/30/mustang-panda-uses-signed-kernel-mode-rootkit-to-load-toneshell-backdoor/</loc></url><url><loc>https://www.cypro.se/2025/12/30/silver-fox-targets-indian-users-with-tax-themed-emails-delivering-valleyrat-malware/</loc></url><url><loc>https://www.cypro.se/2025/12/30/how-to-integrate-ai-into-modern-soc-workflows/</loc></url><url><loc>https://www.cypro.se/2025/12/30/csa-issues-alert-on-critical-smartermail-bug-allowing-remote-code-execution/</loc></url><url><loc>https://www.cypro.se/2025/12/31/u-s-treasury-lifts-sanctions-on-three-individuals-linked-to-intellexa-and-predator-spyware/</loc></url><url><loc>https://www.cypro.se/2025/12/31/ibm-warns-of-critical-api-connect-bug-allowing-remote-authentication-bypass/</loc></url><url><loc>https://www.cypro.se/2025/12/31/researchers-spot-modified-shai-hulud-worm-testing-payload-on-npm-registry/</loc></url><url><loc>https://www.cypro.se/2025/12/31/trust-wallet-chrome-extension-hack-drains-8-5m-via-shai-hulud-supply-chain-attack/</loc></url><url><loc>https://www.cypro.se/2025/12/31/darkspectre-browser-extension-campaigns-exposed-after-impacting-8-8-million-users-worldwide/</loc></url><url><loc>https://www.cypro.se/2026/01/01/rondodox-botnet-exploits-critical-react2shell-flaw-to-hijack-iot-devices-and-web-servers/</loc></url><url><loc>https://www.cypro.se/2026/01/01/how-to-browse-faster-and-get-more-done-using-adapt-browser/</loc></url><url><loc>https://www.cypro.se/2026/01/01/threatsday-bulletin-ghostad-drain-macos-attacks-proxy-botnets-cloud-exploits-and-12-stories/</loc></url><url><loc>https://www.cypro.se/2026/01/02/cybercriminals-abuse-google-cloud-email-feature-in-multi-stage-phishing-campaign/</loc></url><url><loc>https://www.cypro.se/2026/01/02/the-roi-problem-in-attack-surface-management/</loc></url><url><loc>https://www.cypro.se/2026/01/02/transparent-tribe-launches-new-rat-attacks-against-indian-government-and-academia/</loc></url><url><loc>https://www.cypro.se/2026/01/05/new-vvs-stealer-malware-targets-discord-accounts-via-obfuscated-python-code/</loc></url><url><loc>https://www.cypro.se/2026/01/05/bitfinex-hack-convict-ilya-lichtenstein-released-early-under-u-s-first-step-act/</loc></url><url><loc>https://www.cypro.se/2026/01/05/the-state-of-cybersecurity-in-2025-key-segments-insights-and-innovations/</loc></url><url><loc>https://www.cypro.se/2026/01/05/%e2%9a%a1-weekly-recap-iot-exploits-wallet-breaches-rogue-extensions-ai-abuse-more/</loc></url><url><loc>https://www.cypro.se/2026/01/05/russia-aligned-hackers-abuse-viber-to-target-ukrainian-military-and-government/</loc></url><url><loc>https://www.cypro.se/2026/01/05/kimwolf-android-botnet-infects-over-2-million-devices-via-exposed-adb-and-proxy-networks/</loc></url><url><loc>https://www.cypro.se/2026/01/06/new-n8n-vulnerability-9-9-cvss-lets-authenticated-users-execute-system-commands/</loc></url><url><loc>https://www.cypro.se/2026/01/06/critical-adonisjs-bodyparser-flaw-cvss-9-2-enables-arbitrary-file-write-on-servers/</loc></url><url><loc>https://www.cypro.se/2026/01/06/what-is-identity-dark-matter/</loc></url><url><loc>https://www.cypro.se/2026/01/06/fake-booking-emails-redirect-hotel-staff-to-fake-bsod-pages-delivering-dcrat/</loc></url><url><loc>https://www.cypro.se/2026/01/06/vs-code-forks-recommend-missing-extensions-creating-supply-chain-risk-in-open-vsx/</loc></url><url><loc>https://www.cypro.se/2026/01/06/unpatched-firmware-flaw-exposes-totolink-ex200-to-full-remote-device-takeover/</loc></url><url><loc>https://www.cypro.se/2026/01/06/two-chrome-extensions-caught-stealing-chatgpt-and-deepseek-chats-from-900000-users/</loc></url><url><loc>https://www.cypro.se/2026/01/07/ongoing-attacks-exploiting-critical-rce-vulnerability-in-legacy-d-link-dsl-routers/</loc></url><url><loc>https://www.cypro.se/2026/01/07/microsoft-warns-misconfigured-email-routing-can-enable-internal-domain-phishing/</loc></url><url><loc>https://www.cypro.se/2026/01/07/webinar-learn-how-ai-powered-zero-trust-detects-attacks-with-no-files-or-indicators/</loc></url><url><loc>https://www.cypro.se/2026/01/07/n8n-warns-of-cvss-10-0-rce-vulnerability-affecting-self-hosted-and-cloud-versions/</loc></url><url><loc>https://www.cypro.se/2026/01/07/the-future-of-cybersecurity-includes-non-human-employees/</loc></url><url><loc>https://www.cypro.se/2026/01/07/veeam-patches-critical-rce-vulnerability-with-cvss-9-0-in-backup-replication/</loc></url><url><loc>https://www.cypro.se/2026/01/07/critical-n8n-vulnerability-cvss-10-0-allows-unauthenticated-attackers-to-take-full-control/</loc></url><url><loc>https://www.cypro.se/2026/01/07/black-cat-behind-seo-poisoning-malware-campaign-targeting-popular-software-searches/</loc></url><url><loc>https://www.cypro.se/2026/01/08/cisa-flags-microsoft-office-and-hpe-oneview-bugs-as-actively-exploited/</loc></url><url><loc>https://www.cypro.se/2026/01/08/openai-launches-chatgpt-health-with-isolated-encrypted-health-data-controls/</loc></url><url><loc>https://www.cypro.se/2026/01/07/the-government-cyber-action-plan-strengthening-resilience-across-the-uk/</loc></url><url><loc>https://www.cypro.se/2026/01/08/cisco-patches-ise-security-vulnerability-after-public-poc-exploit-release/</loc></url><url><loc>https://www.cypro.se/2026/01/08/researchers-uncover-nodecordrat-hidden-in-npm-bitcoin-themed-packages/</loc></url><url><loc>https://www.cypro.se/2026/01/08/coolify-discloses-11-critical-flaws-enabling-full-server-compromise-on-self-hosted-instances/</loc></url><url><loc>https://www.cypro.se/2026/01/08/the-state-of-trusted-open-source/</loc></url><url><loc>https://www.cypro.se/2026/01/08/threatsday-bulletin-rustfs-flaw-iranian-ops-webui-rce-cloud-leaks-and-12-more-stories/</loc></url><url><loc>https://www.cypro.se/2026/01/08/china-linked-uat-7290-targets-telecoms-with-linux-malware-and-orb-nodes/</loc></url><url><loc>https://www.cypro.se/2026/01/08/whatsapp-worm-spreads-astaroth-banking-trojan-across-brazil-via-contact-auto-messaging/</loc></url><url><loc>https://www.cypro.se/2026/01/09/fbi-warns-north-korean-hackers-using-malicious-qr-codes-in-spear-phishing/</loc></url><url><loc>https://www.cypro.se/2026/01/09/trend-micro-apex-central-rce-flaw-scores-9-8-cvss-in-on-prem-windows-versions/</loc></url><url><loc>https://www.cypro.se/2026/01/09/cisa-retires-10-emergency-cybersecurity-directives-issued-between-2019-and-2024/</loc></url><url><loc>https://www.cypro.se/2026/01/09/cybersecurity-predictions-2026-the-hype-we-can-ignore-and-the-risks-we-cant/</loc></url><url><loc>https://www.cypro.se/2026/01/09/russian-apt28-runs-credential-stealing-campaign-targeting-energy-and-policy-organizations/</loc></url><url><loc>https://www.cypro.se/2026/01/09/china-linked-hackers-exploit-vmware-esxi-zero-days-to-escape-virtual-machines/</loc></url><url><loc>https://www.cypro.se/2026/01/10/europol-arrests-34-black-axe-members-in-spain-over-e5-9m-fraud-and-organized-crime/</loc></url><url><loc>https://www.cypro.se/2026/01/10/muddywater-launches-rustywater-rat-via-spear-phishing-across-middle-east-sectors/</loc></url><url><loc>https://www.cypro.se/2026/01/12/researchers-uncover-service-providers-fueling-industrial-scale-pig-butchering-fraud/</loc></url><url><loc>https://www.cypro.se/2026/01/12/anthropic-launches-claude-ai-for-healthcare-with-secure-health-record-access/</loc></url><url><loc>https://www.cypro.se/2026/01/12/gobruteforcer-botnet-targets-crypto-project-databases-by-exploiting-weak-credentials/</loc></url><url><loc>https://www.cypro.se/2026/01/12/%e2%9a%a1-weekly-recap-ai-automation-exploits-telecom-espionage-prompt-poaching-more/</loc></url><url><loc>https://www.cypro.se/2026/01/12/n8n-supply-chain-attack-abuses-community-nodes-to-steal-oauth-tokens/</loc></url><url><loc>https://www.cypro.se/2026/01/13/cisa-warns-of-active-exploitation-of-gogs-vulnerability-enabling-code-execution/</loc></url><url><loc>https://www.cypro.se/2026/01/13/new-malware-campaign-delivers-remcos-rat-through-multi-stage-windows-attack/</loc></url><url><loc>https://www.cypro.se/2026/01/13/what-should-we-learn-from-how-attackers-leveraged-ai-in-2025/</loc></url><url><loc>https://www.cypro.se/2026/01/13/servicenow-patches-critical-ai-platform-flaw-allowing-unauthenticated-user-impersonation/</loc></url><url><loc>https://www.cypro.se/2026/01/13/new-advanced-linux-voidlink-malware-targets-cloud-and-container-environments/</loc></url><url><loc>https://www.cypro.se/2026/01/13/webinar-securing-agentic-ai-from-mcps-and-tool-access-to-shadow-api-key-sprawl/</loc></url><url><loc>https://www.cypro.se/2026/01/13/malicious-chrome-extension-steals-mexc-api-keys-by-masquerading-as-trading-tool/</loc></url><url><loc>https://www.cypro.se/2026/01/13/long-running-web-skimming-campaign-steals-credit-cards-from-online-checkout-pages/</loc></url><url><loc>https://www.cypro.se/2026/01/14/pluggyape-malware-uses-signal-and-whatsapp-to-target-ukrainian-defense-forces/</loc></url><url><loc>https://www.cypro.se/2026/01/14/critical-node-js-vulnerability-can-cause-server-crashes-via-async_hooks-stack-overflow/</loc></url><url><loc>https://www.cypro.se/2026/01/12/designing-safer-links-secure-connectivity-for-operational-technology/</loc></url><url><loc>https://www.cypro.se/2026/01/14/new-research-64-of-3rd-party-applications-access-sensitive-data-without-justification/</loc></url><url><loc>https://www.cypro.se/2026/01/14/microsoft-fixes-114-windows-flaws-in-january-2026-patch-one-actively-exploited/</loc></url><url><loc>https://www.cypro.se/2026/01/14/fortinet-fixes-critical-fortisiem-flaw-allowing-unauthenticated-remote-code-execution/</loc></url><url><loc>https://www.cypro.se/2026/01/14/hackers-exploit-c-ares-dll-side-loading-to-bypass-security-and-deploy-malware/</loc></url><url><loc>https://www.cypro.se/2026/01/14/ai-agents-are-becoming-privilege-escalation-paths/</loc></url><url><loc>https://www.cypro.se/2026/01/14/researchers-null-route-over-550-kimwolf-and-aisuru-botnet-command-servers/</loc></url><url><loc>https://www.cypro.se/2026/01/15/microsoft-legal-action-disrupts-redvds-cybercrime-infrastructure-used-for-online-fraud/</loc></url><url><loc>https://www.cypro.se/2026/01/15/palo-alto-fixes-globalprotect-dos-flaw-that-can-crash-firewalls-without-login/</loc></url><url><loc>https://www.cypro.se/2026/01/15/4-outdated-habits-destroying-your-socs-mttr-in-2026/</loc></url><url><loc>https://www.cypro.se/2026/01/15/model-security-is-the-wrong-frame-the-real-risk-is-workflow-security/</loc></url><url><loc>https://www.cypro.se/2026/01/15/threatsday-bulletin-ai-voice-cloning-exploit-wi-fi-kill-switch-plc-vulns-and-14-more-stories/</loc></url><url><loc>https://www.cypro.se/2026/01/15/critical-wordpress-modular-ds-plugin-flaw-actively-exploited-to-gain-admin-access/</loc></url><url><loc>https://www.cypro.se/2026/01/15/researchers-reveal-reprompt-attack-allowing-single-click-data-exfiltration-from-microsoft-copilot/</loc></url><url><loc>https://www.cypro.se/2026/01/15/aws-codebuild-misconfiguration-exposed-github-repos-to-potential-supply-chain-attacks/</loc></url><url><loc>https://www.cypro.se/2026/01/16/cisco-patches-zero-day-rce-exploited-by-china-linked-apt-in-secure-email-gateways/</loc></url><url><loc>https://www.cypro.se/2026/01/16/china-linked-apt-exploits-sitecore-zero-day-in-attacks-on-american-critical-infrastructure/</loc></url><url><loc>https://www.cypro.se/2026/01/16/your-digital-footprint-can-lead-right-to-your-front-door/</loc></url><url><loc>https://www.cypro.se/2026/01/16/lotuslite-backdoor-targets-u-s-policy-entities-using-venezuela-themed-spear-phishing/</loc></url><url><loc>https://www.cypro.se/2026/01/16/five-malicious-chrome-extensions-impersonate-workday-and-netsuite-to-hijack-accounts/</loc></url><url><loc>https://www.cypro.se/2026/01/16/gootloader-malware-uses-500-1000-concatenated-zip-archives-to-evade-detection/</loc></url><url><loc>https://www.cypro.se/2026/01/17/openai-to-show-ads-in-chatgpt-for-logged-in-u-s-adults-on-free-and-go-plans/</loc></url><url><loc>https://www.cypro.se/2026/01/19/security-bug-in-stealc-malware-panel-let-researchers-spy-on-threat-actor-operations/</loc></url><url><loc>https://www.cypro.se/2026/01/19/crashfix-chrome-extension-delivers-modelorat-using-clickfix-style-browser-crash-lures/</loc></url><url><loc>https://www.cypro.se/2026/01/19/devops-saas-downtime-the-high-and-hidden-costs-for-cloud-first-businesses/</loc></url><url><loc>https://www.cypro.se/2026/01/19/new-stackwarp-hardware-flaw-breaks-amd-sev-snp-protections-on-zen-1-5-cpus/</loc></url><url><loc>https://www.cypro.se/2026/01/19/%e2%9a%a1-weekly-recap-fortinet-exploits-redline-clipjack-ntlm-crack-copilot-attack-more/</loc></url><url><loc>https://www.cypro.se/2026/01/19/google-gemini-prompt-injection-flaw-exposed-private-calendar-data-via-malicious-invites/</loc></url><url><loc>https://www.cypro.se/2026/01/20/tudou-guarantee-marketplace-halts-telegram-transactions-after-processing-over-12-billion/</loc></url><url><loc>https://www.cypro.se/2026/01/20/cloudflare-fixes-acme-validation-bug-allowing-waf-bypass-to-origin-servers/</loc></url><url><loc>https://www.cypro.se/2026/01/20/why-secrets-in-javascript-bundles-are-still-being-missed/</loc></url><url><loc>https://www.cypro.se/2026/01/20/evelyn-stealer-malware-abuses-vs-code-extensions-to-steal-developer-credentials-and-crypto/</loc></url><url><loc>https://www.cypro.se/2026/01/05/a-fresh-start-why-new-beginnings-motivate-us/</loc></url><url><loc>https://www.cypro.se/2026/01/23/cisa-updates-kev-catalog-with-four-actively-exploited-software-vulnerabilities/</loc></url><url><loc>https://www.cypro.se/2026/01/23/fortinet-confirms-active-forticloud-sso-bypass-on-fully-patched-fortigate-firewalls/</loc></url><url><loc>https://www.cypro.se/2026/01/23/tiktok-forms-u-s-joint-venture-to-continue-operations-under-2025-executive-order/</loc></url><url><loc>https://www.cypro.se/2026/01/23/phishing-attack-uses-stolen-credentials-to-install-logmein-rmm-for-persistent-access/</loc></url><url><loc>https://www.cypro.se/2026/01/23/microsoft-flags-multi-stage-aitm-phishing-and-bec-attacks-targeting-energy-firms/</loc></url><url><loc>https://www.cypro.se/2026/01/22/new-osiris-ransomware-emerges-as-new-strain-using-poortry-driver-in-byovd-attack/</loc></url><url><loc>https://www.cypro.se/2026/01/22/critical-gnu-inetutils-telnetd-flaw-lets-attackers-bypass-login-and-gain-root-access/</loc></url><url><loc>https://www.cypro.se/2026/01/22/threatsday-bulletin-pixel-zero-click-redis-rce-china-c2s-rat-ads-crypto-scams-15-stories/</loc></url><url><loc>https://www.cypro.se/2026/01/22/filling-the-most-common-gaps-in-google-workspace-security/</loc></url><url><loc>https://www.cypro.se/2026/01/22/malicious-pypi-package-impersonates-sympy-deploys-xmrig-miner-on-linux-hosts/</loc></url><url><loc>https://www.cypro.se/2026/01/22/smartermail-auth-bypass-exploited-in-the-wild-two-days-after-patch-release/</loc></url><url><loc>https://www.cypro.se/2026/01/22/automated-fortigate-attacks-exploit-forticloud-sso-to-alter-firewall-configurations/</loc></url><url><loc>https://www.cypro.se/2026/01/22/cisco-fixes-actively-exploited-zero-day-cve-2026-20045-in-unified-cm-and-webex/</loc></url><url><loc>https://www.cypro.se/2026/01/21/north-korean-purplebravo-campaign-targeted-3136-ip-addresses-via-fake-job-interviews/</loc></url><url><loc>https://www.cypro.se/2026/01/21/zoom-and-gitlab-release-security-updates-fixing-rce-dos-and-2fa-bypass-flaws/</loc></url><url><loc>https://www.cypro.se/2026/01/21/webinar-how-smart-mssps-using-ai-to-boost-margins-with-half-the-staff/</loc></url><url><loc>https://www.cypro.se/2026/01/21/exposure-assessment-platforms-signal-a-shift-in-focus/</loc></url><url><loc>https://www.cypro.se/2026/01/21/chainlit-ai-framework-flaws-enable-data-theft-via-file-read-and-ssrf-bugs/</loc></url><url><loc>https://www.cypro.se/2026/01/21/voidlink-linux-malware-framework-built-with-ai-assistance-reaches-88000-lines-of-code/</loc></url><url><loc>https://www.cypro.se/2026/01/21/lastpass-warns-of-fake-maintenance-messages-targeting-users-master-passwords/</loc></url><url><loc>https://www.cypro.se/2026/01/21/cert-cc-warns-binary-parser-bug-allows-node-js-privilege-level-code-execution/</loc></url><url><loc>https://www.cypro.se/2026/01/20/north-korea-linked-hackers-target-developers-via-malicious-vs-code-projects/</loc></url><url><loc>https://www.cypro.se/2026/01/20/three-flaws-in-anthropic-mcp-git-server-enable-file-access-and-code-execution/</loc></url><url><loc>https://www.cypro.se/2026/01/20/hackers-use-linkedin-messages-to-spread-rat-malware-through-dll-sideloading/</loc></url><url><loc>https://www.cypro.se/2026/01/20/the-hidden-risk-of-orphan-accounts/</loc></url><url><loc>https://www.cypro.se/2026/01/24/new-dynowiper-malware-used-in-attempted-sandworm-attack-on-polish-power-sector/</loc></url><url><loc>https://www.cypro.se/2026/01/24/who-approved-this-agent-rethinking-access-accountability-and-risk-in-the-age-of-ai-agents/</loc></url><url><loc>https://www.cypro.se/2026/01/24/cisa-adds-actively-exploited-vmware-vcenter-flaw-cve-2024-37079-to-kev-catalog/</loc></url><url><loc>https://www.cypro.se/2026/01/24/multi-stage-phishing-campaign-targets-russia-with-amnesia-rat-and-ransomware/</loc></url><url><loc>https://www.cypro.se/2026/01/26/konni-hackers-deploy-ai-generated-powershell-backdoor-against-blockchain-developers/</loc></url><url><loc>https://www.cypro.se/2026/01/26/winning-against-ai-based-attacks-requires-a-combined-defensive-approach/</loc></url><url><loc>https://www.cypro.se/2026/01/26/%e2%9a%a1-weekly-recap-firewall-flaws-ai-built-malware-browser-traps-critical-cves-more/</loc></url><url><loc>https://www.cypro.se/2026/01/26/malicious-vs-code-ai-extensions-with-1-5-million-installs-steal-developer-source-code/</loc></url><url><loc>https://www.cypro.se/2026/01/26/indian-users-targeted-in-tax-phishing-campaign-delivering-blackmoon-malware/</loc></url><url><loc>https://www.cypro.se/2026/01/27/microsoft-office-zero-day-cve-2026-21509-emergency-patch-issued-for-active-exploitation/</loc></url><url><loc>https://www.cypro.se/2026/01/27/critical-grist-core-vulnerability-allows-rce-attacks-via-spreadsheet-formulas/</loc></url><url><loc>https://www.cypro.se/2026/01/27/china-linked-hackers-have-used-the-peckbirdy-javascript-c2-framework-since-2023/</loc></url><url><loc>https://www.cypro.se/2026/01/27/ctem-in-practice-prioritization-validation-and-outcomes-that-matter/</loc></url><url><loc>https://www.cypro.se/2026/01/27/clickfix-attacks-expand-using-fake-captchas-microsoft-scripts-and-trusted-web-services/</loc></url><url><loc>https://www.cypro.se/2026/01/27/whatsapp-rolls-out-lockdown-style-security-mode-to-protect-targeted-users-from-spyware/</loc></url><url><loc>https://www.cypro.se/2026/01/27/experts-detect-pakistan-linked-cyber-campaigns-aimed-at-indian-government-entities/</loc></url><url><loc>https://www.cypro.se/2026/01/28/fortinet-patches-cve-2026-24858-after-active-fortios-sso-exploitation-detected/</loc></url><url><loc>https://www.cypro.se/2026/01/28/password-reuse-in-disguise-an-often-missed-risky-workaround/</loc></url><url><loc>https://www.cypro.se/2026/01/28/google-warns-of-active-exploitation-of-winrar-vulnerability-cve-2025-8088/</loc></url><url><loc>https://www.cypro.se/2026/01/28/fake-python-spellchecker-packages-on-pypi-delivered-hidden-remote-access-trojan/</loc></url><url><loc>https://www.cypro.se/2026/01/28/two-high-severity-n8n-flaws-allow-authenticated-remote-code-execution/</loc></url><url><loc>https://www.cypro.se/2026/01/28/from-triage-to-threat-hunts-how-ai-accelerates-secops/</loc></url><url><loc>https://www.cypro.se/2026/01/28/mustang-panda-deploys-updated-coolclient-backdoor-in-government-cyber-attacks/</loc></url><url><loc>https://www.cypro.se/2026/01/28/critical-vm2-node-js-flaw-allows-sandbox-escape-and-arbitrary-code-execution/</loc></url><url><loc>https://www.cypro.se/2026/01/28/fake-moltbot-ai-coding-assistant-on-vs-code-marketplace-drops-malware/</loc></url><url><loc>https://www.cypro.se/2026/01/28/russian-electrum-tied-to-december-2025-cyber-attack-on-polish-power-grid/</loc></url><url><loc>https://www.cypro.se/2026/01/26/why-non-punitive-cultures-strengthen-your-security-program/</loc></url><url><loc>https://www.cypro.se/2026/01/29/google-disrupts-ipidea-one-of-the-worlds-largest-residential-proxy-networks/</loc></url><url><loc>https://www.cypro.se/2026/01/29/one-small-step-for-cyber-resilience-test-facilities-one-giant-leap-for-technology-assurance/</loc></url><url><loc>https://www.cypro.se/2026/01/29/solarwinds-fixes-four-critical-web-help-desk-flaws-with-unauthenticated-rce-and-auth-bypass/</loc></url><url><loc>https://www.cypro.se/2026/01/29/3-decisions-cisos-need-to-make-to-prevent-downtime-risk-in-2026/</loc></url><url><loc>https://www.cypro.se/2026/01/29/survey-of-100-energy-systems-reveals-critical-ot-cybersecurity-gaps/</loc></url><url><loc>https://www.cypro.se/2026/01/29/threatsday-bulletin-new-rces-darknet-busts-kernel-bugs-25-more-stories/</loc></url><url><loc>https://www.cypro.se/2026/01/29/researchers-find-175000-publicly-exposed-ollama-ai-servers-across-130-countries/</loc></url><url><loc>https://www.cypro.se/2026/01/30/two-ivanti-epmm-zero-day-rce-flaws-actively-exploited-security-updates-released/</loc></url><url><loc>https://www.cypro.se/2026/01/30/ex-google-engineer-convicted-for-stealing-2000-ai-trade-secrets-for-china-startup/</loc></url><url><loc>https://www.cypro.se/2026/01/30/smartermail-fixes-critical-unauthenticated-rce-flaw-with-cvss-9-3-score/</loc></url><url><loc>https://www.cypro.se/2026/01/30/badges-bytes-and-blackmail/</loc></url><url><loc>https://www.cypro.se/2026/01/30/china-linked-uat-8099-targets-iis-servers-in-asia-with-badiis-seo-malware/</loc></url><url><loc>https://www.cypro.se/2026/01/30/researchers-uncover-chrome-extensions-abusing-affiliate-links-and-stealing-chatgpt-access/</loc></url><url><loc>https://www.cypro.se/2026/01/31/cert-polska-details-coordinated-cyber-attacks-on-30-wind-and-solar-farms/</loc></url><url><loc>https://www.cypro.se/2026/01/31/mandiant-finds-shinyhunters-style-vishing-attacks-stealing-mfa-to-breach-saas-platforms/</loc></url><url><loc>https://www.cypro.se/2026/01/31/iran-linked-redkitten-cyber-campaign-targets-human-rights-ngos-and-activists/</loc></url><url><loc>https://www.cypro.se/2026/02/02/open-vsx-supply-chain-attack-used-compromised-dev-account-to-spread-glassworm/</loc></url><url><loc>https://www.cypro.se/2026/02/02/escan-antivirus-update-servers-compromised-to-deliver-multi-stage-malware/</loc></url><url><loc>https://www.cypro.se/2026/02/02/notepad-official-update-mechanism-hijacked-to-deliver-malware-to-select-users/</loc></url><url><loc>https://www.cypro.se/2026/02/02/%e2%9a%a1-weekly-recap-proxy-botnet-office-zero-day-mongodb-ransoms-ai-hijacks-new-threats/</loc></url><url><loc>https://www.cypro.se/2026/02/02/securing-the-mid-market-across-the-complete-threat-lifecycle/</loc></url><url><loc>https://www.cypro.se/2026/02/02/microsoft-begins-ntlm-phase-out-with-three-stage-plan-to-move-windows-to-kerberos/</loc></url><url><loc>https://www.cypro.se/2026/02/02/openclaw-bug-enables-one-click-remote-code-execution-via-malicious-link/</loc></url><url><loc>https://www.cypro.se/2026/02/02/researchers-find-341-malicious-clawhub-skills-stealing-data-from-openclaw-users/</loc></url><url><loc>https://www.cypro.se/2026/02/03/notepad-hosting-breach-attributed-to-china-linked-lotus-blossom-hacking-group/</loc></url><url><loc>https://www.cypro.se/2026/02/03/mozilla-adds-one-click-option-to-disable-generative-ai-features-in-firefox/</loc></url><url><loc>https://www.cypro.se/2026/02/02/cloud-security-posture-management-silver-bullet-or-another-piece-in-the-cloud-puzzle/</loc></url><url><loc>https://www.cypro.se/2026/02/03/apt28-uses-microsoft-office-cve-2026-21509-in-espionage-focused-malware-attacks/</loc></url><url><loc>https://www.cypro.se/2026/02/03/when-cloud-outages-ripple-across-the-internet/</loc></url><url><loc>https://www.cypro.se/2026/02/03/webinar-the-smarter-soc-blueprint-learn-what-to-build-buy-and-automate/</loc></url><url><loc>https://www.cypro.se/2026/02/03/hackers-exploit-metro4shell-rce-flaw-in-react-native-cli-npm-package/</loc></url><url><loc>https://www.cypro.se/2026/02/03/docker-fixes-critical-ask-gordon-ai-flaw-allowing-code-execution-via-image-metadata/</loc></url><url><loc>https://www.cypro.se/2026/02/04/eclipse-foundation-mandates-pre-publish-security-checks-for-open-vsx-extensions/</loc></url><url><loc>https://www.cypro.se/2026/02/04/cisa-adds-actively-exploited-solarwinds-web-help-desk-rce-to-kev-catalog/</loc></url><url><loc>https://www.cypro.se/2026/02/04/microsoft-warns-python-infostealers-target-macos-via-fake-ads-and-installers/</loc></url><url><loc>https://www.cypro.se/2026/02/04/the-first-90-seconds-how-early-decisions-shape-incident-response-investigations/</loc></url><url><loc>https://www.cypro.se/2026/02/04/orchid-security-introduces-continuous-identity-observability-for-enterprise-applications/</loc></url><url><loc>https://www.cypro.se/2026/02/04/china-linked-amaranth-dragon-exploits-winrar-flaw-in-espionage-campaigns/</loc></url><url><loc>https://www.cypro.se/2026/02/04/microsoft-develops-scanner-to-detect-backdoors-in-open-weight-large-language-models/</loc></url><url><loc>https://www.cypro.se/2026/02/04/deadvax-malware-campaign-deploys-asyncrat-via-ipfs-hosted-vhd-phishing-files/</loc></url><url><loc>https://www.cypro.se/2026/02/05/hackers-exploit-react2shell-to-hijack-web-traffic-via-compromised-nginx-servers/</loc></url><url><loc>https://www.cypro.se/2026/02/05/critical-n8n-flaw-cve-2026-25049-enables-system-command-execution-via-malicious-workflows/</loc></url><url><loc>https://www.cypro.se/2026/02/05/the-buyers-guide-to-ai-usage-control/</loc></url><url><loc>https://www.cypro.se/2026/02/05/infy-hackers-resume-operations-with-new-c2-servers-after-iran-internet-blackout-ends/</loc></url><url><loc>https://www.cypro.se/2026/02/05/threatsday-bulletin-codespaces-rce-asyncrat-c2-byovd-abuse-ai-cloud-intrusions-15-stories/</loc></url><url><loc>https://www.cypro.se/2026/02/05/aisuru-kimwolf-botnet-launches-record-setting-31-4-tbps-ddos-attack/</loc></url><url><loc>https://www.cypro.se/2026/02/06/claude-opus-4-6-finds-500-high-severity-flaws-across-major-open-source-libraries/</loc></url><url><loc>https://www.cypro.se/2026/02/06/compromised-dydx-npm-and-pypi-packages-deliver-wallet-stealers-and-rat-malware/</loc></url><url><loc>https://www.cypro.se/2026/02/06/how-samsung-knox-helps-stop-your-network-security-breach/</loc></url><url><loc>https://www.cypro.se/2026/02/06/asian-state-backed-group-tgr-sta-1030-breaches-70-government-infrastructure-entities/</loc></url><url><loc>https://www.cypro.se/2026/02/06/cisa-orders-removal-of-unsupported-edge-devices-to-reduce-federal-network-risk/</loc></url><url><loc>https://www.cypro.se/2026/02/06/china-linked-dknife-aitm-framework-targets-routers-for-traffic-hijacking-malware-delivery/</loc></url><url><loc>https://www.cypro.se/2026/02/07/german-agencies-warn-of-signal-phishing-targeting-politicians-military-journalists/</loc></url><url><loc>https://www.cypro.se/2026/02/08/openclaw-integrates-virustotal-scanning-to-detect-malicious-clawhub-skills/</loc></url><url><loc>https://www.cypro.se/2026/02/09/beyondtrust-fixes-critical-pre-auth-rce-vulnerability-in-remote-support-and-pra/</loc></url><url><loc>https://www.cypro.se/2026/02/09/teampcp-worm-exploits-cloud-infrastructure-to-build-criminal-infrastructure/</loc></url><url><loc>https://www.cypro.se/2026/02/09/bloody-wolf-targets-uzbekistan-russia-using-netsupport-rat-in-spear-phishing-campaign/</loc></url><url><loc>https://www.cypro.se/2026/02/09/how-top-cisos-solve-burnout-and-speed-up-mttr-without-extra-hiring/</loc></url><url><loc>https://www.cypro.se/2026/02/09/%e2%9a%a1-weekly-recap-ai-skill-malware-31tbps-ddos-notepad-hack-llm-backdoors-and-more/</loc></url><url><loc>https://www.cypro.se/2026/02/09/solarwinds-web-help-desk-exploited-for-rce-in-multi-stage-attacks-on-exposed-servers/</loc></url><url><loc>https://www.cypro.se/2026/02/09/china-linked-unc3886-targets-singapore-telecom-sector-in-cyber-espionage-campaign/</loc></url><url><loc>https://www.cypro.se/2026/02/10/fortinet-patches-critical-sqli-flaw-enabling-unauthenticated-code-execution/</loc></url><url><loc>https://www.cypro.se/2026/02/09/improving-your-response-to-vulnerability-management/</loc></url><url><loc>https://www.cypro.se/2026/02/10/dutch-authorities-confirm-ivanti-zero-day-exploit-exposed-employee-contact-data/</loc></url><url><loc>https://www.cypro.se/2026/02/10/warlock-ransomware-breaches-smartertools-through-unpatched-smartermail-server/</loc></url><url><loc>https://www.cypro.se/2026/02/10/zast-ai-raises-6m-pre-a-to-scale-zero-false-positive-ai-powered-code-security/</loc></url><url><loc>https://www.cypro.se/2026/02/10/from-ransomware-to-residency-inside-the-rise-of-the-digital-parasite/</loc></url><url><loc>https://www.cypro.se/2026/02/10/reynolds-ransomware-embeds-byovd-driver-to-disable-edr-security-tools/</loc></url><url><loc>https://www.cypro.se/2026/02/10/dprk-operatives-impersonate-professionals-on-linkedin-to-infiltrate-companies/</loc></url><url><loc>https://www.cypro.se/2026/02/11/north-korea-linked-unc1069-uses-ai-lures-to-attack-cryptocurrency-organizations/</loc></url><url><loc>https://www.cypro.se/2026/02/11/microsoft-patches-59-vulnerabilities-including-six-actively-exploited-zero-days/</loc></url><url><loc>https://www.cypro.se/2026/02/11/sshstalker-botnet-uses-irc-c2-to-control-linux-systems-via-legacy-kernel-exploits/</loc></url><url><loc>https://www.cypro.se/2026/02/11/exposed-training-open-the-door-for-crypto-mining-in-fortune-500-cloud-environments/</loc></url><url><loc>https://www.cypro.se/2026/02/11/over-60-software-vendors-issue-security-fixes-across-os-cloud-and-network-platforms/</loc></url><url><loc>https://www.cypro.se/2026/02/11/apt36-and-sidecopy-launch-cross-platform-rat-campaigns-against-indian-entities/</loc></url><url><loc>https://www.cypro.se/2026/02/11/first-malicious-outlook-add-in-found-stealing-4000-microsoft-credentials/</loc></url><url><loc>https://www.cypro.se/2026/02/12/apple-fixes-exploited-zero-day-affecting-ios-macos-and-apple-devices/</loc></url><url><loc>https://www.cypro.se/2026/02/12/83-of-ivanti-epmm-exploits-linked-to-single-ip-on-bulletproof-hosting-infrastructure/</loc></url><url><loc>https://www.cypro.se/2026/02/06/can-you-help-the-ncsc-with-the-next-phase-of-easm-research/</loc></url><url><loc>https://www.cypro.se/2026/02/12/the-ctem-divide-why-84-of-security-programs-are-falling-behind/</loc></url><url><loc>https://www.cypro.se/2026/02/12/threatsday-bulletin-ai-prompt-rce-claude-0-click-renengine-loader-auto-0-days-25-stories/</loc></url><url><loc>https://www.cypro.se/2026/02/12/google-reports-state-backed-hackers-using-gemini-ai-for-recon-and-attack-support/</loc></url><url><loc>https://www.cypro.se/2026/02/12/lazarus-campaign-plants-malicious-packages-in-npm-and-pypi-ecosystems/</loc></url><url><loc>https://www.cypro.se/2026/02/13/researchers-observe-in-the-wild-exploitation-of-beyondtrust-cvss-9-9-vulnerability/</loc></url><url><loc>https://www.cypro.se/2026/02/13/npms-update-to-harden-their-supply-chain-and-points-to-consider/</loc></url><url><loc>https://www.cypro.se/2026/02/13/malicious-chrome-extensions-caught-stealing-business-data-emails-and-browsing-history/</loc></url><url><loc>https://www.cypro.se/2026/02/13/uat-9921-deploys-voidlink-malware-to-target-technology-and-financial-sectors/</loc></url><url><loc>https://www.cypro.se/2026/02/13/google-ties-suspected-russian-actor-to-canfail-malware-attacks-on-ukrainian-orgs/</loc></url><url><loc>https://www.cypro.se/2026/02/13/google-links-china-iran-russia-north-korea-to-coordinated-defense-sector-cyber-operations/</loc></url><url><loc>https://www.cypro.se/2026/02/15/microsoft-discloses-dns-based-clickfix-attack-using-nslookup-for-malware-staging/</loc></url><url><loc>https://www.cypro.se/2026/02/16/new-chrome-zero-day-cve-2026-2441-under-active-attack-patch-released/</loc></url><url><loc>https://www.cypro.se/2026/02/16/new-zerodayrat-mobile-spyware-enables-real-time-surveillance-and-data-theft/</loc></url><url><loc>https://www.cypro.se/2026/02/16/safe-and-inclusive-e%e2%80%91society-how-lithuania-is-bracing-for-ai%e2%80%91driven-cyber-fraud/</loc></url><url><loc>https://www.cypro.se/2026/02/16/weekly-recap-outlook-add-ins-hijack-0-day-patches-wormable-botnet-ai-malware/</loc></url><url><loc>https://www.cypro.se/2026/02/16/infostealer-steals-openclaw-ai-agent-configuration-files-and-gateway-tokens/</loc></url><url><loc>https://www.cypro.se/2026/02/16/study-uncovers-25-password-recovery-attacks-in-major-cloud-password-managers/</loc></url><url><loc>https://www.cypro.se/2026/02/17/apple-tests-end-to-end-encrypted-rcs-messaging-in-ios-26-4-developer-beta/</loc></url><url><loc>https://www.cypro.se/2026/02/17/microsoft-finds-summarize-with-ai-prompts-manipulating-chatbot-recommendations/</loc></url><url><loc>https://www.cypro.se/2026/02/17/webinar-how-modern-soc-teams-use-ai-and-context-to-investigate-cloud-breaches-faster/</loc></url><url><loc>https://www.cypro.se/2026/02/17/my-day-getting-my-hands-dirty-with-an-ndr-system/</loc></url><url><loc>https://www.cypro.se/2026/02/17/smartloader-attack-uses-trojanized-oura-mcp-server-to-deploy-stealc-infostealer/</loc></url><url><loc>https://www.cypro.se/2026/02/17/keenadu-firmware-backdoor-infects-android-tablets-via-signed-ota-updates/</loc></url><url><loc>https://www.cypro.se/2026/02/17/researchers-show-copilot-and-grok-can-be-abused-as-malware-c2-proxies/</loc></url><url><loc>https://www.cypro.se/2026/02/18/cisa-flags-four-security-flaws-under-active-exploitation-in-latest-kev-update/</loc></url><url><loc>https://www.cypro.se/2026/02/18/notepad-fixes-hijacked-update-mechanism-used-to-deliver-targeted-malware/</loc></url><url><loc>https://www.cypro.se/2026/02/18/dell-recoverpoint-for-vms-zero-day-cve-2026-22769-exploited-since-mid-2024/</loc></url><url><loc>https://www.cypro.se/2026/02/18/3-ways-to-start-your-intelligent-workflow-program/</loc></url><url><loc>https://www.cypro.se/2026/02/18/critical-flaws-found-in-four-vs-code-extensions-with-over-125-million-installs/</loc></url><url><loc>https://www.cypro.se/2026/02/18/cybersecurity-tech-predictions-for-2026-operating-in-a-world-of-permanent-instability/</loc></url><url><loc>https://www.cypro.se/2026/02/18/grandstream-gxp1600-voip-phones-exposed-to-unauthenticated-remote-code-execution/</loc></url><url><loc>https://www.cypro.se/2026/02/18/citizen-lab-finds-cellebrite-tool-used-on-kenyan-activists-phone-in-police-custody/</loc></url><url><loc>https://www.cypro.se/2026/02/16/protecting-the-elderly-in-a-digital-age/</loc></url><url><loc>https://www.cypro.se/2026/02/02/the-quiet-compliance-gap-why-risk-persists-despite-security-training/</loc></url><url><loc>https://www.cypro.se/2026/02/19/crescentharvest-campaign-targets-iran-protest-supporters-with-rat-malware/</loc></url><url><loc>https://www.cypro.se/2026/02/19/fake-iptv-apps-spread-massiv-android-malware-targeting-mobile-banking-users/</loc></url><url><loc>https://www.cypro.se/2026/02/19/from-exposure-to-exploitation-how-ai-collapses-your-response-window/</loc></url><url><loc>https://www.cypro.se/2026/02/19/threatsday-bulletin-openssl-rce-foxit-0-days-copilot-leak-ai-password-flaws-20-stories/</loc></url><url><loc>https://www.cypro.se/2026/02/19/promptspy-android-malware-abuses-gemini-ai-to-automate-recent-apps-persistence/</loc></url><url><loc>https://www.cypro.se/2026/02/19/interpol-operation-red-card-2-0-arrests-651-in-african-cybercrime-crackdown/</loc></url><url><loc>https://www.cypro.se/2026/02/19/microsoft-patches-cve-2026-26119-privilege-escalation-in-windows-admin-center/</loc></url><url><loc>https://www.cypro.se/2026/02/20/three-former-google-engineers-indicted-over-trade-secret-transfers-to-iran/</loc></url><url><loc>https://www.cypro.se/2026/02/20/fbi-reports-1900-atm-jackpotting-incidents-since-2020-20m-lost-in-2025/</loc></url><url><loc>https://www.cypro.se/2026/02/20/identity-cyber-scores-the-new-metric-shaping-cyber-insurance-in-2026/</loc></url><url><loc>https://www.cypro.se/2026/02/20/ukrainian-national-sentenced-to-5-years-in-north-korea-it-worker-fraud-case/</loc></url><url><loc>https://www.cypro.se/2026/02/20/clickfix-campaign-abuses-compromised-sites-to-deploy-mimicrat-rat/</loc></url><url><loc>https://www.cypro.se/2026/02/20/cline-cli-2-3-0-supply-chain-attack-installed-openclaw-on-developer-systems/</loc></url><url><loc>https://www.cypro.se/2026/02/20/beyondtrust-flaw-used-for-web-shells-backdoors-and-data-exfiltration/</loc></url><url><loc>https://www.cypro.se/2026/02/21/anthropic-launches-claude-code-security-for-ai-powered-vulnerability-scanning/</loc></url><url><loc>https://www.cypro.se/2026/02/21/cisa-adds-two-actively-exploited-roundcube-flaws-to-kev-catalog/</loc></url><url><loc>https://www.cypro.se/2026/02/21/ec-council-expands-ai-certification-portfolio-to-strengthen-u-s-ai-workforce-readiness-and-security/</loc></url><url><loc>https://www.cypro.se/2026/02/21/ai-assisted-threat-actor-compromises-600-fortigate-devices-in-55-countries/</loc></url><url><loc>https://www.cypro.se/2026/02/23/muddywater-targets-mena-organizations-with-ghostfetch-char-and-http_vip/</loc></url><url><loc>https://www.cypro.se/2026/02/23/malicious-npm-packages-harvest-crypto-keys-ci-secrets-and-api-tokens/</loc></url><url><loc>https://www.cypro.se/2026/02/23/how-exposed-endpoints-increase-risk-across-llm-infrastructure/</loc></url><url><loc>https://www.cypro.se/2026/02/23/%e2%9a%a1-weekly-recap-double-tap-skimmers-promptspy-ai-30tbps-ddos-docker-malware-more/</loc></url><url><loc>https://www.cypro.se/2026/02/23/wormable-xmrig-campaign-uses-byovd-exploit-and-time-based-logic-bomb/</loc></url><url><loc>https://www.cypro.se/2026/02/23/apt28-targeted-european-entities-using-webhook-based-macro-malware/</loc></url><url><loc>https://www.cypro.se/2026/02/24/anthropic-says-chinese-ai-firms-used-16-million-claude-queries-to-copy-model/</loc></url><url><loc>https://www.cypro.se/2026/02/24/unsolicitedbooker-targets-central-asian-telecoms-with-lucidoor-and-marssnake-backdoors/</loc></url><url><loc>https://www.cypro.se/2026/02/24/identity-prioritization-isnt-a-backlog-problem-its-a-risk-math-problem/</loc></url><url><loc>https://www.cypro.se/2026/02/24/lazarus-group-uses-medusa-ransomware-in-middle-east-and-u-s-healthcare-attacks/</loc></url><url><loc>https://www.cypro.se/2026/02/24/uac-0050-targets-european-financial-institution-with-spoofed-domain-and-rms-malware/</loc></url><url><loc>https://www.cypro.se/2026/02/24/roguepilot-flaw-in-github-codespaces-enabled-copilot-to-leak-github_token/</loc></url><url><loc>https://www.cypro.se/2026/02/25/cisa-confirms-active-exploitation-of-filezen-cve-2026-25108-vulnerability/</loc></url><url><loc>https://www.cypro.se/2026/02/25/defense-contractor-employee-jailed-for-selling-8-zero-days-to-russian-broker/</loc></url><url><loc>https://www.cypro.se/2026/02/25/solarwinds-patches-4-critical-serv-u-15-5-flaws-allowing-root-code-execution/</loc></url><url><loc>https://www.cypro.se/2026/02/25/manual-processes-are-putting-national-security-at-risk/</loc></url><url><loc>https://www.cypro.se/2026/02/25/malicious-nuget-packages-stole-asp-net-data-npm-package-dropped-malware/</loc></url><url><loc>https://www.cypro.se/2026/02/25/slh-offers-500-1000-per-call-to-recruit-women-for-it-help-desk-vishing-attacks/</loc></url><url><loc>https://www.cypro.se/2026/02/25/top-5-ways-broken-triage-increases-business-risk-instead-of-reducing-it/</loc></url><url><loc>https://www.cypro.se/2026/02/25/claude-code-flaws-allow-remote-code-execution-and-api-key-exfiltration/</loc></url><url><loc>https://www.cypro.se/2026/02/25/google-disrupts-unc2814-gridtide-campaign-after-53-breaches-across-42-countries/</loc></url><url><loc>https://www.cypro.se/2026/02/26/cisco-sd-wan-zero-day-cve-2026-20127-exploited-since-2023-for-admin-access/</loc></url><url><loc>https://www.cypro.se/2026/02/26/microsoft-warns-developers-of-fake-next-js-job-repos-delivering-in-memory-malware/</loc></url><url><loc>https://www.cypro.se/2026/02/26/malicious-stripeapi-nuget-package-mimicked-official-library-and-stole-api-tokens/</loc></url><url><loc>https://www.cypro.se/2026/02/26/expert-recommends-prepare-for-pqc-right-now/</loc></url><url><loc>https://www.cypro.se/2026/02/26/uat-10027-targets-u-s-education-and-healthcare-with-dohdoor-backdoor/</loc></url><url><loc>https://www.cypro.se/2026/02/26/threatsday-bulletin-kali-linux-claude-chrome-crash-traps-winrar-flaws-lockbit-15-stories/</loc></url><url><loc>https://www.cypro.se/2026/02/26/aeternum-c2-botnet-stores-encrypted-commands-on-polygon-blockchain-to-evade-takedown/</loc></url><url><loc>https://www.cypro.se/2026/02/27/meta-files-lawsuits-against-brazil-china-vietnam-advertisers-over-celeb-bait-scams/</loc></url><url><loc>https://www.cypro.se/2026/02/27/trojanized-gaming-tools-spread-java-based-rat-via-browser-and-chat-platforms/</loc></url><url><loc>https://www.cypro.se/2026/02/27/scarcruft-uses-zoho-workdrive-and-usb-malware-to-breach-air-gapped-networks/</loc></url><url><loc>https://www.cypro.se/2026/02/27/malicious-go-crypto-module-steals-passwords-deploys-rekoobe-backdoor/</loc></url><url><loc>https://www.cypro.se/2026/02/27/900-sangoma-freepbx-instances-compromised-in-ongoing-web-shell-attacks/</loc></url><url><loc>https://www.cypro.se/2026/02/27/doj-seizes-61-million-in-tether-linked-to-pig-butchering-crypto-scams/</loc></url><url><loc>https://www.cypro.se/2026/02/28/pentagon-designates-anthropic-supply-chain-risk-over-ai-military-dispute/</loc></url><url><loc>https://www.cypro.se/2026/02/28/thousands-of-public-google-cloud-api-keys-exposed-with-gemini-access-after-api-enablement/</loc></url><url><loc>https://www.cypro.se/2026/02/28/clawjacked-flaw-lets-malicious-sites-hijack-local-openclaw-ai-agents-via-websocket/</loc></url><url><loc>https://www.cypro.se/2026/03/02/north-korean-hackers-publish-26-npm-packages-hiding-pastebin-c2-for-cross-platform-rat/</loc></url><url><loc>https://www.cypro.se/2026/03/02/apt28-tied-to-cve-2026-21513-mshtml-0-day-exploited-before-feb-2026-patch-tuesday/</loc></url><url><loc>https://www.cypro.se/2026/02/25/exploitation-of-cisco-catalyst-sd-wan/</loc></url><url><loc>https://www.cypro.se/2026/01/19/pro-russia-hacktivist-activity-continues-to-target-uk-organisations/</loc></url><url><loc>https://www.cypro.se/2026/01/19/ncsc-issues-warning-over-hacktivist-groups-disrupting-uk-organisations-and-online-services/</loc></url><url><loc>https://www.cypro.se/2025/12/10/mistaking-ai-vulnerability-could-lead-to-large-scale-breaches-ncsc-warns/</loc></url><url><loc>https://www.cypro.se/2025/12/03/almost-1-billion-attempts-to-access-malicious-sites-blocked-by-new-government-cyber-tool/</loc></url><url><loc>https://www.cypro.se/2025/11/17/bargain-hunters-urged-to-stay-alert-to-cyber-scams-ahead-of-holiday-shopping-season/</loc></url><url><loc>https://www.cypro.se/2026/03/02/alert-ncsc-advises-uk-organisations-to-take-action-following-conflict-in-the-middle-east/</loc></url><url><loc>https://www.cypro.se/2026/03/02/how-to-protect-your-saas-from-bot-attacks-with-safeline-waf/</loc></url><url><loc>https://www.cypro.se/2026/03/02/%e2%9a%a1-weekly-recap-sd-wan-0-day-critical-cves-telegram-probe-smart-tv-proxy-sdk-and-more/</loc></url><url><loc>https://www.cypro.se/2026/03/02/new-chrome-vulnerability-let-malicious-extensions-escalate-privileges-via-gemini-panel/</loc></url><url><loc>https://www.cypro.se/2026/03/02/google-develops-merkle-tree-certificates-to-enable-quantum-resistant-https-in-chrome/</loc></url><url><loc>https://www.cypro.se/2026/03/03/google-confirms-cve-2026-21385-in-qualcomm-android-component-exploited/</loc></url><url><loc>https://www.cypro.se/2026/03/03/sloppylemming-targets-pakistan-and-bangladesh-governments-using-dual-malware-chains/</loc></url><url><loc>https://www.cypro.se/2026/03/03/microsoft-warns-oauth-redirect-abuse-delivers-malware-to-government-targets/</loc></url><url><loc>https://www.cypro.se/2026/03/03/ai-agents-the-next-wave-identity-dark-matter-powerful-invisible-and-unmanaged/</loc></url><url><loc>https://www.cypro.se/2026/03/03/starkiller-phishing-suite-uses-aitm-reverse-proxy-to-bypass-multi-factor-authentication/</loc></url><url><loc>https://www.cypro.se/2026/03/03/building-a-high-impact-tier-1-the-3-steps-cisos-must-follow/</loc></url><url><loc>https://www.cypro.se/2026/03/03/open-source-cyberstrikeai-deployed-in-ai-driven-fortigate-attacks-across-55-countries/</loc></url><url><loc>https://www.cypro.se/2026/03/03/fake-tech-support-spam-deploys-customized-havoc-c2-across-organizations/</loc></url><url><loc>https://www.cypro.se/2026/03/04/cisa-adds-actively-exploited-vmware-aria-operations-flaw-cve-2026-22719-to-kev-catalog/</loc></url><url><loc>https://www.cypro.se/2026/03/04/apt41-linked-silver-dragon-targets-governments-using-cobalt-strike-and-google-drive-c2/</loc></url><url><loc>https://www.cypro.se/2026/03/04/fake-laravel-packages-on-packagist-deploy-rat-on-windows-macos-and-linux/</loc></url><url><loc>https://www.cypro.se/2026/03/04/new-rfp-template-for-ai-usage-control-and-ai-governance/</loc></url><url><loc>https://www.cypro.se/2026/03/04/coruna-ios-exploit-kit-uses-23-exploits-across-five-chains-targeting-ios-13-17-2-1/</loc></url><url><loc>https://www.cypro.se/2026/03/04/149-hacktivist-ddos-attacks-hit-110-organizations-in-16-countries-after-middle-east-conflict/</loc></url><url><loc>https://www.cypro.se/2026/03/05/europol-led-operation-takes-down-tycoon-2fa-phishing-as-a-service-linked-to-64000-attacks/</loc></url><url><loc>https://www.cypro.se/2026/03/05/fbi-and-europol-seize-leakbase-forum-used-to-trade-stolen-credentials/</loc></url><url><loc>https://www.cypro.se/2026/03/05/apt28-linked-campaign-deploys-badpaw-loader-and-meowmeow-backdoor-in-ukraine/</loc></url><url><loc>https://www.cypro.se/2026/03/05/dust-specter-targets-iraqi-officials-with-new-splitdrop-and-ghostform-malware/</loc></url><url><loc>https://www.cypro.se/2026/03/05/where-multi-factor-authentication-stops-and-credential-abuse-starts/</loc></url><url><loc>https://www.cypro.se/2026/03/05/threatsday-bulletin-ddr5-bot-scalping-samsung-tv-tracking-reddit-privacy-fine-more/</loc></url><url><loc>https://www.cypro.se/2026/03/05/preparing-for-the-quantum-era-post-quantum-cryptography-webinar-for-security-leaders/</loc></url><url><loc>https://www.cypro.se/2026/03/05/cisco-confirms-active-exploitation-of-two-catalyst-sd-wan-manager-vulnerabilities/</loc></url><url><loc>https://www.cypro.se/2026/03/06/microsoft-reveals-clickfix-campaign-using-windows-terminal-to-deploy-lumma-stealer/</loc></url><url><loc>https://www.cypro.se/2026/03/06/hikvision-and-rockwell-automation-cvss-9-8-flaws-added-to-cisa-kev-catalog/</loc></url><url><loc>https://www.cypro.se/2026/03/06/china-linked-hackers-use-terndoor-peertime-bruteentry-in-south-american-telecom-attacks/</loc></url><url><loc>https://www.cypro.se/2026/03/06/the-msp-guide-to-using-ai-powered-risk-management-to-scale-cybersecurity/</loc></url><url><loc>https://www.cypro.se/2026/03/06/iran-linked-muddywater-hackers-target-u-s-networks-with-new-dindoor-backdoor/</loc></url><url><loc>https://www.cypro.se/2026/03/06/transparent-tribe-uses-ai-to-mass-produce-malware-implants-in-campaign-targeting-india/</loc></url><url><loc>https://www.cypro.se/2026/03/06/multi-stage-voidgeist-malware-delivering-xworm-asyncrat-and-xeno-rat/</loc></url><url><loc>https://www.cypro.se/2026/03/07/anthropic-finds-22-firefox-vulnerabilities-using-claude-opus-4-6-ai-model/</loc></url><url><loc>https://www.cypro.se/2026/03/07/openai-codex-security-scanned-1-2-million-commits-and-found-10561-high-severity-issues/</loc></url><url><loc>https://www.cypro.se/2026/03/09/web-server-exploits-and-mimikatz-used-in-attacks-targeting-asian-critical-infrastructure/</loc></url><url><loc>https://www.cypro.se/2026/03/09/chrome-extension-turns-malicious-after-ownership-transfer-enabling-code-injection-and-data-theft/</loc></url><url><loc>https://www.cypro.se/2026/03/09/can-the-security-platform-finally-deliver-for-the-mid-market/</loc></url><url><loc>https://www.cypro.se/2026/03/09/%e2%9a%a1-weekly-recap-qualcomm-0-day-ios-exploit-chains-airsnitch-attack-vibe-coded-malware/</loc></url><url><loc>https://www.cypro.se/2026/03/09/unc4899-breached-crypto-firm-after-developer-airdropped-trojanized-file-to-work-device/</loc></url><url><loc>https://www.cypro.se/2026/03/02/zero-trust-and-the-human-element-why-social-engineering-still-bypasses-modern-security/</loc></url><url><loc>https://www.cypro.se/2026/03/09/malicious-npm-package-posing-as-openclaw-installer-deploys-rat-steals-macos-credentials/</loc></url><url><loc>https://www.cypro.se/2026/03/10/cisa-flags-solarwinds-ivanti-and-workspace-one-vulnerabilities-as-actively-exploited/</loc></url><url><loc>https://www.cypro.se/2026/03/10/threat-actors-mass-scan-salesforce-experience-cloud-via-modified-aurainspector-tool/</loc></url><url><loc>https://www.cypro.se/2026/03/10/how-to-stop-ai-data-leaks-a-webinar-guide-to-auditing-modern-agentic-workflows/</loc></url><url><loc>https://www.cypro.se/2026/03/10/the-zero-day-scramble-is-avoidable-a-guide-to-attack-surface-reduction/</loc></url><url><loc>https://www.cypro.se/2026/03/10/apt28-uses-beardshell-and-covenant-malware-to-spy-on-ukrainian-military/</loc></url><url><loc>https://www.cypro.se/2026/03/10/new-leakylooker-flaws-in-google-looker-studio-could-enable-cross-tenant-sql-queries/</loc></url><url><loc>https://www.cypro.se/2026/03/10/kadnap-malware-infects-14000-edge-devices-to-power-stealth-proxy-botnet/</loc></url><url><loc>https://www.cypro.se/2026/03/10/fortigate-devices-exploited-to-breach-networks-and-steal-service-account-credentials/</loc></url><url><loc>https://www.cypro.se/2026/03/11/five-malicious-rust-crates-and-ai-bot-exploit-ci-cd-pipelines-to-steal-developer-secrets/</loc></url><url><loc>https://www.cypro.se/2026/03/11/unc6426-exploits-nx-npm-supply-chain-attack-to-gain-aws-admin-access-in-72-hours/</loc></url><url><loc>https://www.cypro.se/2026/03/11/microsoft-patches-84-flaws-in-march-patch-tuesday-including-two-public-zero-days/</loc></url><url><loc>https://www.cypro.se/2026/03/11/dozens-of-vendors-patch-security-flaws-across-enterprise-software-and-network-devices/</loc></url><url><loc>https://www.cypro.se/2026/03/11/what-boards-must-demand-in-the-age-of-ai-automated-exploitation/</loc></url><url><loc>https://www.cypro.se/2026/03/11/meta-disables-150k-accounts-linked-to-southeast-asia-scam-centers-in-global-crackdown/</loc></url><url><loc>https://www.cypro.se/2026/03/11/critical-n8n-flaws-allow-remote-code-execution-and-exposure-of-stored-credentials/</loc></url><url><loc>https://www.cypro.se/2026/03/11/meta-disables-150k-accounts-linked-to-southeast-asia-scam-centers-in-global-crackdown-2/</loc></url><url><loc>https://www.cypro.se/2026/03/11/researchers-trick-perplexitys-comet-ai-browser-into-phishing-scam-in-under-four-minutes/</loc></url><url><loc>https://www.cypro.se/2026/03/12/cisa-flags-actively-exploited-n8n-rce-bug-as-24700-instances-remain-exposed/</loc></url><url><loc>https://www.cypro.se/2026/03/12/six-android-malware-families-target-pix-payments-banking-apps-and-crypto-wallets/</loc></url><url><loc>https://www.cypro.se/2026/03/12/international-security-chiefs-to-convene-in-glasgow-for-flagship-cyberuk-conference/</loc></url><url><loc>https://www.cypro.se/2026/03/12/apple-issues-security-updates-for-older-ios-devices-targeted-by-coruna-webkit-exploit/</loc></url><url><loc>https://www.cypro.se/2026/03/12/attackers-dont-just-send-phishing-emails-they-weaponize-your-socs-workload/</loc></url><url><loc>https://www.cypro.se/2026/03/12/how-to-scale-phishing-detection-in-your-soc-3-steps-for-cisos/</loc></url><url><loc>https://www.cypro.se/2026/03/12/threatsday-bulletin-oauth-trap-edr-killer-signal-phishing-zombie-zip-ai-platform-hack-more/</loc></url><url><loc>https://www.cypro.se/2025/12/03/new-vulnerability-monitoring-service-vms-from-gds-now-available-in-myncsc/</loc></url><url><loc>https://www.cypro.se/2026/03/12/rust-based-venon-malware-targets-33-brazilian-banks-with-credential-stealing-overlays/</loc></url><url><loc>https://www.cypro.se/2026/03/12/hive0163-uses-ai-assisted-slopoly-malware-for-persistent-access-in-ransomware-attacks/</loc></url><url><loc>https://www.cypro.se/2026/03/13/veeam-patches-7-critical-backup-replication-flaws-allowing-remote-code-execution/</loc></url><url><loc>https://www.cypro.se/2026/03/13/authorities-disrupt-socksescort-proxy-botnet-exploiting-369000-ips-across-163-countries/</loc></url><url><loc>https://www.cypro.se/2026/03/13/google-fixes-two-chrome-zero-days-exploited-in-the-wild-affecting-skia-and-v8/</loc></url><url><loc>https://www.cypro.se/2026/03/13/nine-crackarmor-flaws-in-linux-apparmor-enable-root-escalation-bypass-container-isolation/</loc></url><url><loc>https://www.cypro.se/2026/03/13/investigating-a-new-click-fix-variant/</loc></url><url><loc>https://www.cypro.se/2026/03/13/storm-2561-spreads-trojan-vpn-clients-via-seo-poisoning-to-steal-credentials/</loc></url><url><loc>https://www.cypro.se/2026/03/13/interpol-dismantles-45000-malicious-ips-arrests-94-in-global-cybercrime/</loc></url><url><loc>https://www.cypro.se/2026/03/13/chinese-hackers-target-southeast-asian-militaries-with-applechris-and-memfun-malware/</loc></url><url><loc>https://www.cypro.se/2026/03/13/meta-to-shut-down-instagram-end-to-end-encrypted-chat-support-starting-may-2026/</loc></url><url><loc>https://www.cypro.se/2026/03/14/glassworm-supply-chain-attack-abuses-72-open-vsx-extensions-to-target-developers/</loc></url><url><loc>https://www.cypro.se/2026/03/14/openclaw-ai-agent-flaws-could-enable-prompt-injection-and-data-exfiltration/</loc></url><url><loc>https://www.cypro.se/2026/03/16/android-17-blocks-non-accessibility-apps-from-accessibility-api-to-prevent-malware-abuse/</loc></url><url><loc>https://www.cypro.se/2026/03/16/drillapp-backdoor-targets-ukraine-abuses-microsoft-edge-debugging-for-stealth-espionage/</loc></url><url><loc>https://www.cypro.se/2026/03/16/why-security-validation-is-becoming-agentic/</loc></url><url><loc>https://www.cypro.se/2026/03/16/clickfix-campaigns-spread-macsync-macos-infostealer-via-fake-ai-tool-installers/</loc></url><url><loc>https://www.cypro.se/2026/03/16/%e2%9a%a1-weekly-recap-chrome-0-days-router-botnets-aws-breach-rogue-ai-agents-more/</loc></url><url><loc>https://www.cypro.se/2026/03/16/glassworm-attack-uses-stolen-github-tokens-to-force-push-malware-into-python-repos/</loc></url><url><loc>https://www.cypro.se/2026/03/17/cisa-flags-actively-exploited-wing-ftp-vulnerability-leaking-server-paths/</loc></url><url><loc>https://www.cypro.se/2026/03/17/konni-deploys-endrat-through-phishing-uses-kakaotalk-to-propagate-malware/</loc></url><url><loc>https://www.cypro.se/2026/03/17/ai-is-everywhere-but-cisos-are-still-securing-it-with-yesterdays-skills-and-tools-study-finds/</loc></url><url><loc>https://www.cypro.se/2026/03/17/leaknet-ransomware-uses-clickfix-via-hacked-sites-deploys-deno-in-memory-loader/</loc></url><url><loc>https://www.cypro.se/2026/03/17/ai-flaws-in-amazon-bedrock-langsmith-and-sglang-enable-data-exfiltration-and-rce/</loc></url><url><loc>https://www.cypro.se/2026/03/18/critical-unpatched-telnetd-flaw-cve-2026-32746-enables-unauthenticated-root-rce-via-port-23/</loc></url><url><loc>https://www.cypro.se/2026/03/18/apple-fixes-webkit-vulnerability-enabling-same-origin-policy-bypass-on-ios-and-macos/</loc></url><url><loc>https://www.cypro.se/2026/03/18/ubuntu-cve-2026-3888-bug-lets-attackers-gain-root-via-systemd-cleanup-timing-exploit/</loc></url><url><loc>https://www.cypro.se/2026/03/18/product-walkthrough-how-mesh-csma-reveals-and-breaks-attack-paths-to-crown-jewels/</loc></url><url><loc>https://www.cypro.se/2026/03/18/claude-code-security-and-magecart-getting-the-threat-model-right/</loc></url><url><loc>https://www.cypro.se/2026/03/18/9-critical-ip-kvm-flaws-enable-unauthenticated-root-access-across-four-vendors/</loc></url><url><loc>https://www.cypro.se/2026/03/18/interlock-ransomware-exploits-cisco-fmc-zero-day-cve-2026-20131-for-root-access/</loc></url><url><loc>https://www.cypro.se/2026/03/18/ofac-sanctions-dprk-it-worker-network-funding-wmd-programs-through-fake-remote-jobs/</loc></url><url><loc>https://www.cypro.se/2026/03/11/meta-lawsuits-and-childrens-online-safety-what-parents-need-to-know-about-social-media-and-teen-mental-health/</loc></url><url><loc>https://www.cypro.se/2026/03/19/cisa-warns-of-zimbra-sharepoint-flaw-exploits-cisco-zero-day-hit-in-ransomware-attacks/</loc></url><url><loc>https://www.cypro.se/2026/03/19/darksword-ios-exploit-kit-uses-6-flaws-3-zero-days-for-full-device-takeover/</loc></url><url><loc>https://www.cypro.se/2026/03/19/how-to-secure-your-online-meetings/</loc></url><url><loc>https://www.cypro.se/2026/03/19/how-ceros-gives-security-teams-visibility-and-control-in-claude-code/</loc></url><url><loc>https://www.cypro.se/2026/03/19/new-perseus-android-banking-malware-monitors-notes-apps-to-extract-sensitive-data/</loc></url><url><loc>https://www.cypro.se/2026/03/19/threatsday-bulletin-fortigate-raas-citrix-exploits-mcp-abuse-livechat-phish-more/</loc></url><url><loc>https://www.cypro.se/2026/03/19/54-edr-killers-use-byovd-to-exploit-34-signed-vulnerable-drivers-and-disable-security/</loc></url><url><loc>https://www.cypro.se/2026/03/19/speagle-malware-hijacks-cobra-docguard-to-steal-data-via-compromised-servers/</loc></url><url><loc>https://www.cypro.se/2026/03/20/apple-warns-older-iphones-vulnerable-to-coruna-darksword-exploit-kit-attacks/</loc></url><url><loc>https://www.cypro.se/2026/03/20/doj-disrupts-3-million-device-iot-botnets-behind-record-31-4-tbps-global-ddos-attacks/</loc></url><url><loc>https://www.cypro.se/2026/03/20/the-importance-of-behavioral-analytics-in-ai-enabled-cyber-attacks/</loc></url><url><loc>https://www.cypro.se/2026/03/20/google-adds-24-hour-wait-for-unverified-app-sideloading-to-reduce-malware-and-scams/</loc></url><url><loc>https://www.cypro.se/2026/03/20/magento-polyshell-flaw-enables-unauthenticated-uploads-rce-and-account-takeover/</loc></url><url><loc>https://www.cypro.se/2026/03/20/critical-langflow-flaw-cve-2026-33017-triggers-attacks-within-20-hours-of-disclosure/</loc></url><url><loc>https://www.cypro.se/2026/03/20/trivy-security-scanner-github-actions-breached-75-tags-hijacked-to-steal-ci-cd-secrets/</loc></url><url><loc>https://www.cypro.se/2026/03/21/trivy-supply-chain-attack-triggers-self-spreading-canisterworm-across-47-npm-packages/</loc></url><url><loc>https://www.cypro.se/2026/03/21/cisa-flags-apple-craft-cms-laravel-bugs-in-kev-orders-patching-by-april-3-2026/</loc></url><url><loc>https://www.cypro.se/2026/03/21/oracle-patches-critical-cve-2026-21992-enabling-unauthenticated-rce-in-identity-manager/</loc></url><url><loc>https://www.cypro.se/2026/03/21/fbi-warns-russian-hackers-target-signal-whatsapp-in-mass-phishing-attacks/</loc></url><url><loc>https://www.cypro.se/2026/03/23/hackers-exploit-cve-2025-32975-cvss-10-0-to-hijack-unpatched-quest-kace-sma-systems/</loc></url><url><loc>https://www.cypro.se/2026/03/23/trivy-hack-spreads-infostealer-via-docker-triggers-worm-and-kubernetes-wiper/</loc></url><url><loc>https://www.cypro.se/2026/03/23/microsoft-warns-irs-phishing-hits-29000-users-deploys-rmm-malware/</loc></url><url><loc>https://www.cypro.se/2026/03/23/we-found-eight-attack-vectors-inside-aws-bedrock-heres-what-attackers-can-do-with-them/</loc></url><url><loc>https://www.cypro.se/2026/03/23/%e2%9a%a1-weekly-recap-ci-cd-backdoor-fbi-buys-location-data-whatsapp-ditches-numbers-more/</loc></url><url><loc>https://www.cypro.se/2026/03/23/north-korean-hackers-abuse-vs-code-auto-run-tasks-to-deploy-stoatwaffle-malware/</loc></url><url><loc>https://www.cypro.se/2026/03/24/u-s-sentences-russian-hacker-to-6-75-years-for-role-in-9m-ransomware-damage/</loc></url><url><loc>https://www.cypro.se/2026/03/24/citrix-urges-patching-critical-netscaler-flaw-allowing-unauthenticated-data-leaks/</loc></url><url><loc>https://www.cypro.se/2026/03/24/the-hidden-cost-of-cybersecurity-specialization-losing-foundational-skills/</loc></url><url><loc>https://www.cypro.se/2026/03/24/teampcp-hacks-checkmarx-github-actions-using-stolen-ci-credentials/</loc></url><url><loc>https://www.cypro.se/2026/03/24/ghost-campaign-uses-7-npm-packages-to-steal-crypto-wallets-and-credentials/</loc></url><url><loc>https://www.cypro.se/2026/03/24/5-learnings-from-the-first-ever-gartner-market-guide-for-guardian-agents/</loc></url><url><loc>https://www.cypro.se/2026/03/24/hackers-use-fake-resumes-to-steal-enterprise-credentials-and-deploy-crypto-miner/</loc></url><url><loc>https://www.cypro.se/2026/03/24/tax-search-ads-deliver-screenconnect-malware-using-huawei-driver-to-disable-edr/</loc></url><url><loc>https://www.cypro.se/2026/03/24/teampcp-backdoors-litellm-versions-1-82-7-1-82-8-likely-via-trivy-ci-cd-compromise/</loc></url><url><loc>https://www.cypro.se/2026/03/24/ncsc-ceo-seize-disruptive-vibe-coding-opportunity-to-make-software-more-secure/</loc></url><url><loc>https://www.cypro.se/2026/03/24/vibe-check-ai-may-replace-saas-but-not-for-a-while/</loc></url><url><loc>https://www.cypro.se/2026/03/25/fcc-bans-new-foreign-made-routers-over-supply-chain-and-cyber-risk-concerns/</loc></url><url><loc>https://www.cypro.se/2026/03/25/the-kill-chain-is-obsolete-when-your-ai-agent-is-the-threat/</loc></url><url><loc>https://www.cypro.se/2026/03/25/russian-hacker-sentenced-to-2-years-for-ta551-botnet-driven-ransomware-attacks/</loc></url><url><loc>https://www.cypro.se/2026/03/25/device-code-phishing-hits-340-microsoft-365-orgs-across-five-countries-via-oauth-abuse/</loc></url><url><loc>https://www.cypro.se/2026/03/25/glassworm-malware-uses-solana-dead-drops-to-deliver-rat-and-steal-browser-crypto-data/</loc></url><url><loc>https://www.cypro.se/2026/03/25/vulnerabilities-affecting-citrix-netscaler-adc-and-citrix-netscaler-gateway/</loc></url><url><loc>https://www.cypro.se/2026/03/25/leakbase-admin-arrested-in-russia-over-massive-stolen-credential-marketplace/</loc></url><url><loc>https://www.cypro.se/2026/03/26/webrtc-skimmer-bypasses-csp-to-steal-payment-data-from-e-commerce-sites/</loc></url><url><loc>https://www.cypro.se/2026/03/26/webinar-stop-guessing-learn-to-validate-your-defenses-against-real-attacks/</loc></url><url><loc>https://www.cypro.se/2026/03/26/coruna-ios-kit-reuses-2023-triangulation-exploit-code-in-new-mass-attacks/</loc></url><url><loc>https://www.cypro.se/2026/03/26/claude-extension-flaw-enabled-zero-click-xss-prompt-injection-via-any-website/</loc></url><url><loc>https://www.cypro.se/2026/03/26/masters-of-imitation-how-hackers-and-art-forgers-perfect-the-art-of-deception/</loc></url><url><loc>https://www.cypro.se/2026/03/26/threatsday-bulletin-pqc-push-ai-vuln-hunting-pirated-traps-phishing-kits-20-more-stories/</loc></url><url><loc>https://www.cypro.se/2026/03/26/china-linked-red-menshen-uses-stealthy-bpfdoor-implants-to-spy-via-telecom-networks/</loc></url><url><loc>https://www.cypro.se/2026/03/27/langchain-langgraph-flaws-expose-files-secrets-databases-in-widely-used-ai-frameworks/</loc></url><url><loc>https://www.cypro.se/2026/03/27/bearlyfy-hits-70-russian-firms-with-custom-genielocker-ransomware/</loc></url><url><loc>https://www.cypro.se/2026/03/27/we-are-at-war/</loc></url><url><loc>https://www.cypro.se/2026/03/27/aitm-phishing-targets-tiktok-business-accounts-using-cloudflare-turnstile-evasion/</loc></url><url><loc>https://www.cypro.se/2026/03/27/open-vsx-bug-let-malicious-vs-code-extensions-bypass-pre-publish-security-checks/</loc></url><url><loc>https://www.cypro.se/2026/03/27/teampcp-pushes-malicious-telnyx-versions-to-pypi-hides-stealer-in-wav-files/</loc></url><url><loc>https://www.cypro.se/2026/03/27/apple-sends-lock-screen-alerts-to-outdated-iphones-over-active-web-based-exploits/</loc></url><url><loc>https://www.cypro.se/2026/03/28/ta446-deploys-leaked-darksword-ios-exploit-kit-in-targeted-spear-phishing-campaign/</loc></url><url><loc>https://www.cypro.se/2026/03/28/cisa-adds-cve-2025-53521-to-kev-after-active-f5-big-ip-apm-exploitation/</loc></url><url><loc>https://www.cypro.se/2026/03/28/citrix-netscaler-under-active-recon-for-cve-2026-3055-cvss-9-3-memory-overread-bug/</loc></url><url><loc>https://www.cypro.se/2026/03/28/iran-linked-hackers-breach-fbi-directors-personal-email-hit-stryker-with-wiper-attack/</loc></url><url><loc>https://www.cypro.se/2026/03/30/why-cyber-defenders-need-to-be-ready-for-frontier-ai/</loc></url><url><loc>https://www.cypro.se/2026/03/30/three-china-linked-clusters-target-southeast-asian-government-in-2025-cyber-campaign/</loc></url><url><loc>https://www.cypro.se/2026/03/30/russian-ctrl-toolkit-delivered-via-malicious-lnk-files-hijacks-rdp-via-frp-tunnels/</loc></url><url><loc>https://www.cypro.se/2026/03/30/vulnerability-affecting-f5-big-ip-apm/</loc></url><url><loc>https://www.cypro.se/2026/03/30/the-state-of-secrets-sprawl-2026-9-takeaways-for-cisos/</loc></url><url><loc>https://www.cypro.se/2026/03/30/%e2%9a%a1-weekly-recap-telecom-sleeper-cells-llm-jailbreaks-apple-forces-u-k-age-checks-and-more/</loc></url><url><loc>https://www.cypro.se/2026/03/30/3-soc-process-fixes-that-unlock-tier-1-productivity/</loc></url><url><loc>https://www.cypro.se/2026/03/30/deepload-malware-uses-clickfix-and-wmi-persistence-to-steal-browser-credentials/</loc></url><url><loc>https://www.cypro.se/2026/03/30/openai-patches-chatgpt-data-exfiltration-flaw-and-codex-github-token-vulnerability/</loc></url><url><loc>https://www.cypro.se/2026/03/31/axios-supply-chain-attack-pushes-cross-platform-rat-via-compromised-npm-account/</loc></url><url><loc>https://www.cypro.se/2026/03/31/silver-fox-expands-asia-cyber-campaign-with-atlascross-rat-and-fake-domains/</loc></url><url><loc>https://www.cypro.se/2026/03/31/the-ai-arms-race-why-unified-exposure-management-is-becoming-a-boardroom-priority/</loc></url><url><loc>https://www.cypro.se/2026/03/31/vertex-ai-vulnerability-exposes-google-cloud-data-and-private-artifacts/</loc></url><url><loc>https://www.cypro.se/2026/03/31/ncsc-warns-of-messaging-app-targeting/</loc></url><url><loc>https://www.cypro.se/2026/03/31/trueconf-zero-day-exploited-in-attacks-on-southeast-asian-government-networks/</loc></url><url><loc>https://www.cypro.se/2026/03/31/android-developer-verification-rollout-begins-ahead-of-september-enforcement/</loc></url><url><loc>https://www.cypro.se/2026/04/01/claude-code-source-leaked-via-npm-packaging-error-anthropic-confirms/</loc></url><url><loc>https://www.cypro.se/2026/04/01/google-attributes-axios-npm-supply-chain-attack-to-north-korean-group-unc1069/</loc></url><url><loc>https://www.cypro.se/2026/04/01/3-reasons-attackers-are-using-your-trusted-tools-against-you-and-why-you-dont-see-it-coming/</loc></url><url><loc>https://www.cypro.se/2026/04/01/block-the-prompt-not-the-work-the-end-of-doctor-no/</loc></url><url><loc>https://www.cypro.se/2026/04/01/casbaneiro-phishing-targets-latin-america-and-europe-using-dynamic-pdf-lures/</loc></url><url><loc>https://www.cypro.se/2026/04/01/microsoft-warns-of-whatsapp-delivered-vbs-malware-hijacking-windows-via-uac-bypass/</loc></url><url><loc>https://www.cypro.se/2026/04/01/new-chrome-zero-day-cve-2026-5281-under-active-exploitation-patch-released/</loc></url><url><loc>https://www.cypro.se/2026/04/01/cert-ua-impersonation-campaign-spread-agewheeze-malware-to-1-million-emails/</loc></url><url><loc>https://www.cypro.se/2026/04/02/apple-expands-ios-18-7-7-update-to-more-devices-to-block-darksword-exploit/</loc></url><url><loc>https://www.cypro.se/2026/04/02/whatsapp-alerts-200-users-after-fake-ios-app-installed-spyware-italian-firm-faces-action/</loc></url><url><loc>https://www.cypro.se/2026/04/02/researchers-uncover-mining-operation-using-iso-lures-to-spread-rats-and-crypto-miners/</loc></url><url><loc>https://www.cypro.se/2026/04/02/the-state-of-trusted-open-source-report/</loc></url><url><loc>https://www.cypro.se/2026/04/02/threatsday-bulletin-pre-auth-chains-android-rootkits-cloudtrail-evasion-10-more-stories/</loc></url><url><loc>https://www.cypro.se/2026/04/02/cisco-patches-9-8-cvss-imc-and-ssm-flaws-allowing-remote-system-compromise/</loc></url><url><loc>https://www.cypro.se/2026/04/02/hackers-exploit-cve-2025-55182-to-breach-766-next-js-hosts-steal-credentials/</loc></url><url><loc>https://www.cypro.se/2026/04/03/new-sparkcat-variant-in-ios-android-apps-steals-crypto-wallet-recovery-phrase-images/</loc></url><url><loc>https://www.cypro.se/2026/04/03/drift-loses-285-million-in-durable-nonce-social-engineering-attack-linked-to-dprk/</loc></url><url><loc>https://www.cypro.se/2026/04/03/unc1069-social-engineering-of-axios-maintainer-led-to-npm-supply-chain-attack/</loc></url><url><loc>https://www.cypro.se/2026/04/03/why-third-party-risk-is-the-biggest-gap-in-your-clients-security-posture/</loc></url><url><loc>https://www.cypro.se/2026/04/03/microsoft-details-cookie-controlled-php-web-shells-persisting-via-cron-on-linux-servers/</loc></url><url><loc>https://www.cypro.se/2026/04/03/china-linked-ta416-targets-european-governments-with-plugx-and-oauth-based-phishing/</loc></url><url><loc>https://www.cypro.se/2026/04/05/36-malicious-npm-packages-exploited-redis-postgresql-to-deploy-persistent-implants/</loc></url><url><loc>https://www.cypro.se/2026/04/05/fortinet-patches-actively-exploited-cve-2026-35616-in-forticlient-ems/</loc></url><url><loc>https://www.cypro.se/2026/04/05/285-million-drift-hack-traced-to-six-month-dprk-social-engineering-operation/</loc></url><url><loc>https://www.cypro.se/2026/04/06/bka-identifies-revil-leaders-behind-130-german-ransomware-attacks/</loc></url><url><loc>https://www.cypro.se/2026/04/06/qilin-and-warlock-ransomware-use-vulnerable-drivers-to-disable-300-edr-tools/</loc></url><url><loc>https://www.cypro.se/2026/04/06/how-litellm-turned-developer-machines-into-credential-vaults-for-attackers/</loc></url><url><loc>https://www.cypro.se/2026/04/06/multi-os-cyberattacks-how-socs-close-a-critical-risk-in-3-steps/</loc></url><url><loc>https://www.cypro.se/2026/04/06/%e2%9a%a1-weekly-recap-axios-hack-chrome-0-day-fortinet-exploits-paragon-spyware-and-more/</loc></url><url><loc>https://www.cypro.se/2026/04/06/dprk-linked-hackers-use-github-as-c2-in-multi-stage-attacks-targeting-south-korea/</loc></url><url><loc>https://www.cypro.se/2026/04/06/iran-linked-password-spraying-campaign-targets-300-israeli-microsoft-365-organizations/</loc></url><url><loc>https://www.cypro.se/2026/04/07/flowise-ai-agent-builder-under-active-cvss-10-0-rce-exploitation-12000-instances-exposed/</loc></url><url><loc>https://www.cypro.se/2026/04/07/china-linked-storm-1175-exploits-zero-days-to-rapidly-deploy-medusa-ransomware/</loc></url><url><loc>https://www.cypro.se/2026/04/07/new-gpubreach-attack-enables-full-cpu-privilege-escalation-via-gddr6-bit-flips/</loc></url><url><loc>https://www.cypro.se/2026/04/07/webinar-how-to-close-identity-gaps-in-2026-before-ai-exploits-enterprise-risk/</loc></url><url><loc>https://www.cypro.se/2026/04/07/uk-exposes-russian-military-intelligence-hijacking-vulnerable-routers-for-cyber-attacks/</loc></url><url><loc>https://www.cypro.se/2026/04/07/apt28-exploit-routers-to-enable-dns-hijacking-operations/</loc></url><url><loc>https://www.cypro.se/2026/04/07/the-hidden-cost-of-recurring-credential-incidents/</loc></url><url><loc>https://www.cypro.se/2026/04/07/over-1000-exposed-comfyui-instances-targeted-in-cryptomining-botnet-campaign/</loc></url><url><loc>https://www.cypro.se/2026/04/07/docker-cve-2026-34040-lets-attackers-bypass-authorization-and-gain-host-access/</loc></url><url><loc>https://www.cypro.se/2026/04/07/russian-state-linked-apt28-exploits-soho-routers-in-global-dns-hijacking-campaign/</loc></url><url><loc>https://www.cypro.se/2026/04/08/iran-linked-hackers-disrupt-u-s-critical-infrastructure-by-targeting-internet-exposed-plcs/</loc></url><url><loc>https://www.cypro.se/2026/04/08/n-korean-hackers-spread-1700-malicious-packages-across-npm-pypi-go-rust/</loc></url><url><loc>https://www.cypro.se/2026/04/08/anthropics-claude-mythos-finds-thousands-of-zero-day-flaws-across-major-systems/</loc></url><url><loc>https://www.cypro.se/2026/04/08/shrinking-the-iam-attack-surface-through-identity-visibility-and-intelligence-platforms-ivip/</loc></url><url><loc>https://www.cypro.se/2026/04/08/apt28-deploys-prismex-malware-in-campaign-targeting-ukraine-and-nato-allies/</loc></url><url><loc>https://www.cypro.se/2026/04/08/masjesu-botnet-emerges-as-ddos-for-hire-service-targeting-global-iot-devices/</loc></url><url><loc>https://www.cypro.se/2026/04/08/new-chaos-variant-targets-misconfigured-cloud-deployments-adds-socks-proxy/</loc></url><url><loc>https://www.cypro.se/2026/04/09/the-hidden-security-risks-of-shadow-ai-in-enterprises/</loc></url><url><loc>https://www.cypro.se/2026/04/09/adobe-reader-zero-day-exploited-via-malicious-pdfs-since-december-2025/</loc></url><url><loc>https://www.cypro.se/2026/04/09/bitter-linked-hack-for-hire-campaign-targets-journalists-across-mena-region/</loc></url><url><loc>https://www.cypro.se/2026/04/09/threatsday-bulletin-hybrid-p2p-botnet-13-year-old-apache-rce-and-18-more-stories/</loc></url><url><loc>https://www.cypro.se/2026/04/09/uat-10362-targets-taiwanese-ngos-with-lucidrook-malware-in-spear-phishing-campaigns/</loc></url><url><loc>https://www.cypro.se/2026/04/09/engagelab-sdk-flaw-exposed-50m-android-users-including-30m-crypto-wallets/</loc></url><url><loc>https://www.cypro.se/2026/04/10/google-rolls-out-dbsc-in-chrome-146-to-block-session-theft-on-windows/</loc></url><url><loc>https://www.cypro.se/2026/04/10/backdoored-smart-slider-3-pro-update-distributed-via-compromised-nextend-servers/</loc></url><url><loc>https://www.cypro.se/2026/04/10/browser-extensions-are-the-new-ai-consumption-channel-that-no-one-is-talking-about/</loc></url><url><loc>https://www.cypro.se/2026/04/10/marimo-rce-flaw-cve-2026-39987-exploited-within-10-hours-of-disclosure/</loc></url><url><loc>https://www.cypro.se/2026/04/10/glassworm-campaign-uses-zig-dropper-to-infect-multiple-developer-ides/</loc></url><url><loc>https://www.cypro.se/2026/04/11/citizen-lab-law-enforcement-used-webloc-to-track-500-million-devices-via-ad-data/</loc></url><url><loc>https://www.cypro.se/2026/04/12/cpuid-breach-distributes-stx-rat-via-trojanized-cpu-z-and-hwmonitor-downloads/</loc></url><url><loc>https://www.cypro.se/2026/04/12/adobe-patches-actively-exploited-acrobat-reader-flaw-cve-2026-34621/</loc></url><url><loc>https://www.cypro.se/2026/04/13/openai-revokes-macos-app-certificate-after-malicious-axios-supply-chain-incident/</loc></url><url><loc>https://www.cypro.se/2026/04/13/north-koreas-apt37-uses-facebook-social-engineering-to-deliver-rokrat-malware/</loc></url><url><loc>https://www.cypro.se/2026/04/13/your-mttd-looks-great-your-post-alert-gap-doesnt/</loc></url><url><loc>https://www.cypro.se/2026/04/13/%e2%9a%a1-weekly-recap-fiber-optic-spying-windows-rootkit-ai-vulnerability-hunting-and-more/</loc></url><url><loc>https://www.cypro.se/2026/04/13/fbi-and-indonesian-police-dismantle-w3ll-phishing-network-behind-20m-fraud-attempts/</loc></url><url><loc>https://www.cypro.se/2026/04/13/janelarat-malware-targets-latin-american-banks-with-14739-attacks-in-brazil-in-2025/</loc></url><url><loc>https://www.cypro.se/2026/04/14/showdoc-rce-flaw-cve-2025-0520-actively-exploited-on-unpatched-servers/</loc></url><url><loc>https://www.cypro.se/2026/04/14/cisa-adds-6-known-exploited-flaws-in-fortinet-microsoft-and-adobe-software/</loc></url><url><loc>https://www.cypro.se/2026/04/14/108-malicious-chrome-extensions-steal-google-and-telegram-data-affecting-20000-users/</loc></url><url><loc>https://www.cypro.se/2026/04/14/analysis-of-216m-security-findings-shows-a-4x-increase-in-critical-risk-2026-report/</loc></url><url><loc>https://www.cypro.se/2026/04/14/mirax-android-rat-turns-devices-into-socks5-proxies-reaching-220000-via-meta-ads/</loc></url><url><loc>https://www.cypro.se/2026/04/14/google-adds-rust-based-dns-parser-into-pixel-10-modem-to-enhance-security/</loc></url><url><loc>https://www.cypro.se/2026/04/14/ai-driven-pushpaganda-scam-exploits-google-discover-to-spread-scareware-and-ad-fraud/</loc></url><url><loc>https://www.cypro.se/2026/04/14/new-php-composer-flaws-enable-arbitrary-command-execution-patches-released/</loc></url><url><loc>https://www.cypro.se/2026/04/15/openai-launches-gpt-5-4-cyber-with-expanded-access-for-security-teams/</loc></url><url><loc>https://www.cypro.se/2026/04/15/microsoft-issues-patches-for-sharepoint-zero-day-and-168-other-new-vulnerabilities/</loc></url><url><loc>https://www.cypro.se/2026/04/15/retaining-defensive-advantage-in-the-age-of-frontier-ai-cyber-capabilities/</loc></url><url><loc>https://www.cypro.se/2026/04/15/deterministic-agentic-ai-the-architecture-exposure-validation-requires/</loc></url><url><loc>https://www.cypro.se/2026/04/15/actively-exploited-nginx-ui-flaw-cve-2026-33032-enables-full-nginx-server-takeover/</loc></url><url><loc>https://www.cypro.se/2026/04/15/april-patch-tuesday-fixes-critical-flaws-across-sap-adobe-microsoft-fortinet-and-more/</loc></url><url><loc>https://www.cypro.se/2026/04/15/n8n-webhooks-abused-since-october-2025-to-deliver-malware-via-phishing-emails/</loc></url></urlset>
