<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 3, 2026 at 8:19 pm by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://cybercory.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Cybercory</title>
		<link><![CDATA[https://cybercory.com]]></link>
		<description><![CDATA[Cybercory]]></description>
		<lastBuildDate><![CDATA[Wed, 18 Mar 2026 12:30:15 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://cybercory.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://cybercory.com/2026/03/18/boggy-serpens-escalates-cyberespionage-campaigns-with-ai-driven-malware-and-trusted-account-hijacking/]]></guid>
			<link><![CDATA[https://cybercory.com/2026/03/18/boggy-serpens-escalates-cyberespionage-campaigns-with-ai-driven-malware-and-trusted-account-hijacking/]]></link>
			<title>Boggy Serpens Escalates Cyberespionage Campaigns with AI-Driven Malware and Trusted Account Hijacking</title>
			<pubDate><![CDATA[Wed, 18 Mar 2026 12:30:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybercory.com/]]></guid>
			<link><![CDATA[https://cybercory.com/]]></link>
			<title>Home</title>
			<pubDate><![CDATA[Tue, 24 Mar 2026 15:23:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybercory.com/tdb_templates/header-template-downtown-pro/]]></guid>
			<link><![CDATA[https://cybercory.com/tdb_templates/header-template-downtown-pro/]]></link>
			<title>Header Template &#8211; Downtown PRO</title>
			<pubDate><![CDATA[Tue, 24 Mar 2026 15:23:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybercory.com/tdb_templates/footer-downtown-pro-2/]]></guid>
			<link><![CDATA[https://cybercory.com/tdb_templates/footer-downtown-pro-2/]]></link>
			<title>Footer &#8211; Downtown PRO (2)</title>
			<pubDate><![CDATA[Tue, 24 Mar 2026 15:23:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybercory.com/2026/03/24/nist-just-rewrote-the-rules-on-cybersecurity-risk-and-your-workforce-is-the-missing-piece/]]></guid>
			<link><![CDATA[https://cybercory.com/2026/03/24/nist-just-rewrote-the-rules-on-cybersecurity-risk-and-your-workforce-is-the-missing-piece/]]></link>
			<title>NIST Just Rewrote the Rules on Cybersecurity Risk &#8211; And Your Workforce Is the Missing Piece</title>
			<pubDate><![CDATA[Tue, 24 Mar 2026 15:20:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybercory.com/2026/03/17/advancing-digital-identity-assurance-securing-trust-in-a-hyper-connected-world-ouaissou-dembele-with-astemir-karmov/]]></guid>
			<link><![CDATA[https://cybercory.com/2026/03/17/advancing-digital-identity-assurance-securing-trust-in-a-hyper-connected-world-ouaissou-dembele-with-astemir-karmov/]]></link>
			<title>Advancing Digital Identity Assurance: Securing Trust in a Hyper-Connected World, Ouaissou DEMBELE With Astemir Karmov</title>
			<pubDate><![CDATA[Thu, 19 Mar 2026 17:54:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybercory.com/2026/03/19/dubai-cyber-show-ep13-rethinking-access-governance-in-a-zero-trust-world-ouaissou-dembele-receiving-ahmad-abdul-fattah/]]></guid>
			<link><![CDATA[https://cybercory.com/2026/03/19/dubai-cyber-show-ep13-rethinking-access-governance-in-a-zero-trust-world-ouaissou-dembele-receiving-ahmad-abdul-fattah/]]></link>
			<title>Dubai Cyber Show Ep13: Rethinking Access Governance in a Zero Trust World, Ouaissou DEMBELE Receiving Ahmad Abdul Fattah</title>
			<pubDate><![CDATA[Thu, 19 Mar 2026 17:45:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybercory.com/2026/03/19/claudy-day-exposes-hidden-risks-prompt-injection-flaw-in-claude-ai-enables-silent-data-exfiltration/]]></guid>
			<link><![CDATA[https://cybercory.com/2026/03/19/claudy-day-exposes-hidden-risks-prompt-injection-flaw-in-claude-ai-enables-silent-data-exfiltration/]]></link>
			<title>“Claudy Day” Exposes Hidden Risks: Prompt Injection Flaw in Claude AI Enables Silent Data Exfiltration</title>
			<pubDate><![CDATA[Thu, 19 Mar 2026 14:28:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybercory.com/2026/03/17/cyber-war-meets-kinetic-conflict-how-the-iran-crisis-is-redefining-modern-warfare/]]></guid>
			<link><![CDATA[https://cybercory.com/2026/03/17/cyber-war-meets-kinetic-conflict-how-the-iran-crisis-is-redefining-modern-warfare/]]></link>
			<title>Cyber War Meets Kinetic Conflict: How the Iran Crisis Is Redefining Modern Warfare</title>
			<pubDate><![CDATA[Wed, 18 Mar 2026 12:44:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybercory.com/2026/04/02/critical-cisco-vulnerability-exposes-systems-to-remote-root-level-attacks-cve-2026-20160/]]></guid>
			<link><![CDATA[https://cybercory.com/2026/04/02/critical-cisco-vulnerability-exposes-systems-to-remote-root-level-attacks-cve-2026-20160/]]></link>
			<title>Critical Cisco Vulnerability Exposes Systems to Remote Root-Level Attacks (CVE-2026-20160)</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 17:54:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybercory.com/2026/03/23/russian-intelligence-targets-messaging-apps-thousands-of-accounts-compromised-in-global-phishing-campaign/]]></guid>
			<link><![CDATA[https://cybercory.com/2026/03/23/russian-intelligence-targets-messaging-apps-thousands-of-accounts-compromised-in-global-phishing-campaign/]]></link>
			<title>Russian Intelligence Targets Messaging Apps: Thousands of Accounts Compromised in Global Phishing Campaign</title>
			<pubDate><![CDATA[Mon, 23 Mar 2026 17:04:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybercory.com/2026/03/18/fake-telegram-malware-campaign-exploits-typosquatting-to-deploy-stealthy-multi-stage-loader/]]></guid>
			<link><![CDATA[https://cybercory.com/2026/03/18/fake-telegram-malware-campaign-exploits-typosquatting-to-deploy-stealthy-multi-stage-loader/]]></link>
			<title>Fake Telegram Malware Campaign Exploits Typosquatting to Deploy Stealthy Multi-Stage Loader</title>
			<pubDate><![CDATA[Wed, 18 Mar 2026 12:04:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybercory.com/2026/03/11/critical-zoom-vulnerabilities-discovered-multiple-security-flaws-expose-enterprise-collaboration-platforms/]]></guid>
			<link><![CDATA[https://cybercory.com/2026/03/11/critical-zoom-vulnerabilities-discovered-multiple-security-flaws-expose-enterprise-collaboration-platforms/]]></link>
			<title>Critical Zoom Vulnerabilities Discovered: Multiple Security Flaws Expose Enterprise Collaboration Platforms</title>
			<pubDate><![CDATA[Wed, 11 Mar 2026 11:57:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybercory.com/2026/03/11/fortinet-patches-multiple-security-flaws-across-core-products-including-high-severity-vulnerability-in-fortiswitch/]]></guid>
			<link><![CDATA[https://cybercory.com/2026/03/11/fortinet-patches-multiple-security-flaws-across-core-products-including-high-severity-vulnerability-in-fortiswitch/]]></link>
			<title>Fortinet Patches Multiple Security Flaws Across Core Products, Including High-Severity Vulnerability in FortiSwitch</title>
			<pubDate><![CDATA[Wed, 11 Mar 2026 11:36:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybercory.com/tds-switching-plans-wizard/]]></guid>
			<link><![CDATA[https://cybercory.com/tds-switching-plans-wizard/]]></link>
			<title>Switching plans wizard</title>
			<pubDate><![CDATA[Tue, 24 Mar 2026 15:33:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybercory.com/2026/03/10/kali-linux-goes-local-running-ai-powered-cybersecurity-tools-offline-with-ollama-and-5ire/]]></guid>
			<link><![CDATA[https://cybercory.com/2026/03/10/kali-linux-goes-local-running-ai-powered-cybersecurity-tools-offline-with-ollama-and-5ire/]]></link>
			<title>Kali Linux Goes Local: Running AI-Powered Cybersecurity Tools Offline with Ollama and 5ire</title>
			<pubDate><![CDATA[Tue, 10 Mar 2026 16:04:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybercory.com/2026/02/26/critical-alert-cisco-sd-wan-authentication-bypass-cvss-10-0-actively-exploited/]]></guid>
			<link><![CDATA[https://cybercory.com/2026/02/26/critical-alert-cisco-sd-wan-authentication-bypass-cvss-10-0-actively-exploited/]]></link>
			<title>Critical Alert: Cisco SD-WAN Authentication Bypass (CVSS 10.0) Actively Exploited</title>
			<pubDate><![CDATA[Thu, 26 Feb 2026 15:14:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybercory.com/2026/02/26/malicious-nuget-package-impersonates-stripe-attempts-to-steal-api-keys-from-developers/]]></guid>
			<link><![CDATA[https://cybercory.com/2026/02/26/malicious-nuget-package-impersonates-stripe-attempts-to-steal-api-keys-from-developers/]]></link>
			<title>Malicious NuGet Package Impersonates Stripe, Attempts to Steal API Keys from Developers</title>
			<pubDate><![CDATA[Thu, 26 Feb 2026 11:24:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybercory.com/2026/03/16/drillapp-backdoor-campaign-targets-ukrainian-entities-using-browser-based-malware/]]></guid>
			<link><![CDATA[https://cybercory.com/2026/03/16/drillapp-backdoor-campaign-targets-ukrainian-entities-using-browser-based-malware/]]></link>
			<title>DRILLAPP Backdoor Campaign Targets Ukrainian Entities Using Browser-Based Malware</title>
			<pubDate><![CDATA[Mon, 16 Mar 2026 13:56:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybercory.com/2026/03/09/signal-warns-of-targeted-phishing-campaign-hijacking-accounts-of-journalists-and-government-officials/]]></guid>
			<link><![CDATA[https://cybercory.com/2026/03/09/signal-warns-of-targeted-phishing-campaign-hijacking-accounts-of-journalists-and-government-officials/]]></link>
			<title>Signal Warns of Targeted Phishing Campaign Hijacking Accounts of Journalists and Government Officials</title>
			<pubDate><![CDATA[Mon, 09 Mar 2026 18:30:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybercory.com/2026/03/09/ghanaian-national-pleads-guilty-in-100m-romance-scam-and-business-email-compromise-scheme/]]></guid>
			<link><![CDATA[https://cybercory.com/2026/03/09/ghanaian-national-pleads-guilty-in-100m-romance-scam-and-business-email-compromise-scheme/]]></link>
			<title>Ghanaian National Pleads Guilty in $100M Romance Scam and Business Email Compromise Scheme</title>
			<pubDate><![CDATA[Mon, 09 Mar 2026 18:09:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybercory.com/tdb_templates/footer-downtown-pro/]]></guid>
			<link><![CDATA[https://cybercory.com/tdb_templates/footer-downtown-pro/]]></link>
			<title>Footer &#8211; Downtown PRO</title>
			<pubDate><![CDATA[Fri, 27 Feb 2026 21:18:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybercory.com/2026/02/25/refund-scam-impersonates-avast-to-steal-credit-card-data-from-french-speaking-users/]]></guid>
			<link><![CDATA[https://cybercory.com/2026/02/25/refund-scam-impersonates-avast-to-steal-credit-card-data-from-french-speaking-users/]]></link>
			<title>Refund Scam Impersonates Avast to Steal Credit Card Data from French-Speaking Users</title>
			<pubDate><![CDATA[Thu, 26 Feb 2026 10:53:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybercory.com/2026/02/25/attackers-can-abuse-cortex-xdr-live-response-as-covert-c2-channel-researchers-warn/]]></guid>
			<link><![CDATA[https://cybercory.com/2026/02/25/attackers-can-abuse-cortex-xdr-live-response-as-covert-c2-channel-researchers-warn/]]></link>
			<title>Attackers Can Abuse Cortex XDR Live Response as Covert C2 Channel, Researchers Warn</title>
			<pubDate><![CDATA[Thu, 26 Feb 2026 10:21:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybercory.com/2026/03/30/sentinelone-annual-report-the-new-cyber-battlefield-ai-driven-attacks-ransomware-evolution-and-the-rise-of-autonomous-threats/]]></guid>
			<link><![CDATA[https://cybercory.com/2026/03/30/sentinelone-annual-report-the-new-cyber-battlefield-ai-driven-attacks-ransomware-evolution-and-the-rise-of-autonomous-threats/]]></link>
			<title>SentinelOne Annual Report &#8211; The New Cyber Battlefield: AI-Driven Attacks, Ransomware Evolution, and the Rise of Autonomous Threats</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 15:43:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybercory.com/2026/02/24/broadcom-issues-high-severity-advisory-for-vmware-aria-operations-flaws-cve-2026-22719-22720-22721/]]></guid>
			<link><![CDATA[https://cybercory.com/2026/02/24/broadcom-issues-high-severity-advisory-for-vmware-aria-operations-flaws-cve-2026-22719-22720-22721/]]></link>
			<title>Broadcom Issues High-Severity Advisory for VMware Aria Operations Flaws (CVE-2026-22719, -22720, -22721)</title>
			<pubDate><![CDATA[Tue, 24 Feb 2026 18:10:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybercory.com/2024/03/15/when-breaches-breach-trust-the-enduring-scars-of-reputational-damage-2/]]></guid>
			<link><![CDATA[https://cybercory.com/2024/03/15/when-breaches-breach-trust-the-enduring-scars-of-reputational-damage-2/]]></link>
			<title>The Devastating Price of a Breach: Counting the Costs of a Data Security Incident</title>
			<pubDate><![CDATA[Sat, 21 Feb 2026 22:43:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybercory.com/2026/02/16/dubai-cyber-show-episode-11-why-dlp-projects-fail-and-how-to-get-them-right/]]></guid>
			<link><![CDATA[https://cybercory.com/2026/02/16/dubai-cyber-show-episode-11-why-dlp-projects-fail-and-how-to-get-them-right/]]></link>
			<title>Dubai Cyber Show Episode 11: Why DLP Projects Fail &#8211; And How to Get Them Right</title>
			<pubDate><![CDATA[Mon, 23 Feb 2026 18:36:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybercory.com/2026/02/23/google-blocks-1-75-million-malicious-apps-in-2025-as-ai-supercharges-android-security/]]></guid>
			<link><![CDATA[https://cybercory.com/2026/02/23/google-blocks-1-75-million-malicious-apps-in-2025-as-ai-supercharges-android-security/]]></link>
			<title>Google Blocks 1.75 Million Malicious Apps in 2025 as AI Supercharges Android Security</title>
			<pubDate><![CDATA[Mon, 23 Feb 2026 11:44:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybercory.com/2025/08/27/ai-cyber-defense-a-strategic-dialogue-with-jay-bavisi-the-founder-of-ec-council-on-the-future-of-machine-learning-in-security/]]></guid>
			<link><![CDATA[https://cybercory.com/2025/08/27/ai-cyber-defense-a-strategic-dialogue-with-jay-bavisi-the-founder-of-ec-council-on-the-future-of-machine-learning-in-security/]]></link>
			<title>AI &amp; Cyber Defense: A Strategic Dialogue with Jay Bavisi, the Founder of EC-COUNCIL, on the Future of Machine Learning in Security</title>
			<pubDate><![CDATA[Fri, 20 Feb 2026 18:03:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybercory.com/2025/10/09/gitex-2025-where-ai-cybersecurity-sovereign-tech-collide-in-dubai/]]></guid>
			<link><![CDATA[https://cybercory.com/2025/10/09/gitex-2025-where-ai-cybersecurity-sovereign-tech-collide-in-dubai/]]></link>
			<title>GITEX 2025: Where AI, Cybersecurity &amp; Sovereign Tech Collide in Dubai &#8211; Join Our Cyber Talks During The Event</title>
			<pubDate><![CDATA[Fri, 20 Feb 2026 18:02:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybercory.com/2025/06/03/microsoft-and-crowdstrike-unite-to-unmask-cyber-adversaries-with-shared-threat-actor-glossary/]]></guid>
			<link><![CDATA[https://cybercory.com/2025/06/03/microsoft-and-crowdstrike-unite-to-unmask-cyber-adversaries-with-shared-threat-actor-glossary/]]></link>
			<title>Microsoft and CrowdStrike Unite to Unmask Cyber Adversaries with Shared Threat Actor Glossary</title>
			<pubDate><![CDATA[Fri, 20 Feb 2026 17:59:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybercory.com/2025/05/24/adidas-customer-data-breach-contact-information-stolen-via-third-party-provider/]]></guid>
			<link><![CDATA[https://cybercory.com/2025/05/24/adidas-customer-data-breach-contact-information-stolen-via-third-party-provider/]]></link>
			<title>Adidas Customer Data Breach: Contact Information Stolen via Third-Party Provider</title>
			<pubDate><![CDATA[Fri, 20 Feb 2026 17:59:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybercory.com/2025/06/26/cybercriminals-exploit-open-source-tools-to-breach-africas-financial-sector/]]></guid>
			<link><![CDATA[https://cybercory.com/2025/06/26/cybercriminals-exploit-open-source-tools-to-breach-africas-financial-sector/]]></link>
			<title>Cybercriminals Weaponized Open-Source Tools in Sustained Campaign Against Africa’s Financial Sector</title>
			<pubDate><![CDATA[Fri, 20 Feb 2026 17:59:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybercory.com/2025/05/23/operation-endgame-strikes-again-global-law-enforcement-breaks-ransomware-kill-chain-at-the-source/]]></guid>
			<link><![CDATA[https://cybercory.com/2025/05/23/operation-endgame-strikes-again-global-law-enforcement-breaks-ransomware-kill-chain-at-the-source/]]></link>
			<title>Operation ENDGAME Strikes Again: Global Law Enforcement Breaks Ransomware Kill Chain at the Source</title>
			<pubDate><![CDATA[Fri, 20 Feb 2026 17:59:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybercory.com/2025/11/05/the-future-takes-flight-iatas-one-id-pushes-contactless-travel-into-reality/]]></guid>
			<link><![CDATA[https://cybercory.com/2025/11/05/the-future-takes-flight-iatas-one-id-pushes-contactless-travel-into-reality/]]></link>
			<title>The Future Takes Flight: IATA’s One ID Pushes Contactless Travel into Reality</title>
			<pubDate><![CDATA[Fri, 20 Feb 2026 17:58:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybercory.com/2025/03/26/saintynet-cybersecurity-and-keystrike-forge-strategic-partnership-to-redefine-cyber-resilience-in-the-middle-east-and-beyond/]]></guid>
			<link><![CDATA[https://cybercory.com/2025/03/26/saintynet-cybersecurity-and-keystrike-forge-strategic-partnership-to-redefine-cyber-resilience-in-the-middle-east-and-beyond/]]></link>
			<title>Saintynet Cybersecurity and Keystrike Forge Strategic Partnership to Redefine Cyber Resilience in the Middle East and Beyond</title>
			<pubDate><![CDATA[Fri, 20 Feb 2026 17:58:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybercory.com/2026/01/27/microsoft-office-flaw-actively-exploited-to-bypass-built-in-security-protections/]]></guid>
			<link><![CDATA[https://cybercory.com/2026/01/27/microsoft-office-flaw-actively-exploited-to-bypass-built-in-security-protections/]]></link>
			<title>Microsoft Office Flaw Actively Exploited to Bypass Built-In Security Protections</title>
			<pubDate><![CDATA[Fri, 20 Feb 2026 17:58:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybercory.com/2025/11/11/sap-issues-18-new-security-fixes-in-november-patch-day-critical-vulnerabilities-demand-immediate-attention/]]></guid>
			<link><![CDATA[https://cybercory.com/2025/11/11/sap-issues-18-new-security-fixes-in-november-patch-day-critical-vulnerabilities-demand-immediate-attention/]]></link>
			<title>SAP Issues 18 New Security Fixes in November Patch Day &#8211; Critical Vulnerabilities Demand Immediate Attention</title>
			<pubDate><![CDATA[Fri, 20 Feb 2026 17:58:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybercory.com/2025/11/11/europe-launches-first-multi-satellite-cybersecurity-challenge-pioneering-a-new-era-in-space-defence/]]></guid>
			<link><![CDATA[https://cybercory.com/2025/11/11/europe-launches-first-multi-satellite-cybersecurity-challenge-pioneering-a-new-era-in-space-defence/]]></link>
			<title>Europe Launches First Multi-Satellite Cybersecurity Challenge, Pioneering a New Era in Space Defence</title>
			<pubDate><![CDATA[Fri, 20 Feb 2026 17:58:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybercory.com/2025/11/12/maverick-meets-coyote-inside-the-evolving-threat-of-brazilian-banking-trojans/]]></guid>
			<link><![CDATA[https://cybercory.com/2025/11/12/maverick-meets-coyote-inside-the-evolving-threat-of-brazilian-banking-trojans/]]></link>
			<title>Maverick Meets Coyote: Inside the Evolving Threat of Brazilian Banking Trojans</title>
			<pubDate><![CDATA[Fri, 20 Feb 2026 17:58:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybercory.com/2025/11/13/google-strikes-back-a-dual-strategy-of-legal-action-and-legislation-to-stop-global-scammers/]]></guid>
			<link><![CDATA[https://cybercory.com/2025/11/13/google-strikes-back-a-dual-strategy-of-legal-action-and-legislation-to-stop-global-scammers/]]></link>
			<title>Google Strikes Back: A Dual Strategy of Legal Action and Legislation to Stop Global Scammers</title>
			<pubDate><![CDATA[Fri, 20 Feb 2026 17:58:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybercory.com/2025/11/13/fighting-for-user-privacy-openai-pushes-back-against-the-new-york-times-demand-for-20-million-chatgpt-conversations/]]></guid>
			<link><![CDATA[https://cybercory.com/2025/11/13/fighting-for-user-privacy-openai-pushes-back-against-the-new-york-times-demand-for-20-million-chatgpt-conversations/]]></link>
			<title>Fighting for User Privacy: OpenAI Pushes Back Against The New York Times’ Demand for 20 Million ChatGPT Conversations</title>
			<pubDate><![CDATA[Fri, 20 Feb 2026 17:58:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybercory.com/2025/11/17/u-s-cracks-down-on-north-koreas-global-cybercrime-network-in-sweeping-nationwide-operation/]]></guid>
			<link><![CDATA[https://cybercory.com/2025/11/17/u-s-cracks-down-on-north-koreas-global-cybercrime-network-in-sweeping-nationwide-operation/]]></link>
			<title>U.S. Cracks Down on North Korea’s Global Cybercrime Network in Sweeping Nationwide Operation</title>
			<pubDate><![CDATA[Fri, 20 Feb 2026 17:58:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybercory.com/2025/05/29/unpatched-zero-day-in-ti-woocommerce-wishlist-plugin-exposes-over-100k-sites-to-rce-risk/]]></guid>
			<link><![CDATA[https://cybercory.com/2025/05/29/unpatched-zero-day-in-ti-woocommerce-wishlist-plugin-exposes-over-100k-sites-to-rce-risk/]]></link>
			<title>Unpatched Zero-Day in TI WooCommerce Wishlist Plugin Exposes Over 100K Sites to RCE Risk</title>
			<pubDate><![CDATA[Fri, 20 Feb 2026 17:58:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybercory.com/2025/12/22/access-granted-how-device-code-phishing-is-fueling-account-takeovers/]]></guid>
			<link><![CDATA[https://cybercory.com/2025/12/22/access-granted-how-device-code-phishing-is-fueling-account-takeovers/]]></link>
			<title>Access Granted: How Device Code Phishing Is Fueling Account Takeovers</title>
			<pubDate><![CDATA[Fri, 20 Feb 2026 17:58:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybercory.com/2025/10/28/from-forumtroll-to-dante-kaspersky-unmasks-a-hidden-espionage-operation-and-the-return-of-hacking-teams-legacy/]]></guid>
			<link><![CDATA[https://cybercory.com/2025/10/28/from-forumtroll-to-dante-kaspersky-unmasks-a-hidden-espionage-operation-and-the-return-of-hacking-teams-legacy/]]></link>
			<title>From ForumTroll to Dante: Kaspersky Unmasks a Hidden Espionage Operation and the Return of Hacking Team’s Legacy</title>
			<pubDate><![CDATA[Fri, 20 Feb 2026 17:58:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybercory.com/2025/10/31/multilingual-zip-phishing-campaigns-hit-asian-financial-and-government-sectors-evidence-points-to-a-shared-automated-infrastructure/]]></guid>
			<link><![CDATA[https://cybercory.com/2025/10/31/multilingual-zip-phishing-campaigns-hit-asian-financial-and-government-sectors-evidence-points-to-a-shared-automated-infrastructure/]]></link>
			<title>Multilingual ZIP Phishing Campaigns Hit Asian Financial and Government Sectors &#8211; Evidence Points to a Shared Automated Infrastructure</title>
			<pubDate><![CDATA[Fri, 20 Feb 2026 17:58:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybercory.com/2025/09/23/one-token-to-rule-them-all-critical-entra-id-flaw-could-have-exposed-every-tenant/]]></guid>
			<link><![CDATA[https://cybercory.com/2025/09/23/one-token-to-rule-them-all-critical-entra-id-flaw-could-have-exposed-every-tenant/]]></link>
			<title>One Token to Rule Them All: Critical Entra ID Flaw Could Have Exposed Every Tenant</title>
			<pubDate><![CDATA[Fri, 20 Feb 2026 17:58:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybercory.com/2025/05/30/cybercriminals-camouflage-malware-as-ai-tools-in-sophisticated-new-campaign/]]></guid>
			<link><![CDATA[https://cybercory.com/2025/05/30/cybercriminals-camouflage-malware-as-ai-tools-in-sophisticated-new-campaign/]]></link>
			<title>Cybercriminals Camouflage Malware as AI Tools in Sophisticated New Campaign</title>
			<pubDate><![CDATA[Fri, 20 Feb 2026 17:58:52 +0000]]></pubDate>
		</item>
				</channel>
</rss>
