<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 10, 2026 at 12:27 am by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://secy247.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Secy247 – Technology, Cybersecurity &amp; Business</title>
		<link><![CDATA[https://secy247.com]]></link>
		<description><![CDATA[Secy247 – Technology, Cybersecurity &amp; Business]]></description>
		<lastBuildDate><![CDATA[Thu, 09 Apr 2026 20:24:52 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://secy247.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://secy247.com/supply-chain-attack-alert-hidden-malware-discovered-in-npm-pypi-go-and-rust-packages/]]></guid>
			<link><![CDATA[https://secy247.com/supply-chain-attack-alert-hidden-malware-discovered-in-npm-pypi-go-and-rust-packages/]]></link>
			<title>“Supply Chain Attack Alert: Hidden Malware Discovered in npm, PyPI, Go, and Rust Packages”</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 20:24:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/identity-security-crisis-how-identity-dark-matter-is-exposing-hidden-risks-in-modern-enterprises/]]></guid>
			<link><![CDATA[https://secy247.com/identity-security-crisis-how-identity-dark-matter-is-exposing-hidden-risks-in-modern-enterprises/]]></link>
			<title>Identity Security Crisis: How “Identity Dark Matter” Is Exposing Hidden Risks in Modern Enterprises</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 19:53:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/new-prismex-malware-linked-to-apt28-targets-critical-infrastructure-with-zero-day-exploits/]]></guid>
			<link><![CDATA[https://secy247.com/new-prismex-malware-linked-to-apt28-targets-critical-infrastructure-with-zero-day-exploits/]]></link>
			<title>“New PRISMEX Malware Linked to APT28 Targets Critical Infrastructure with Zero-Day Exploits”</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 19:40:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/masjesu-botnet-exposed-stealthy-iot-malware-powering-ddos-for-hire-attacks/]]></guid>
			<link><![CDATA[https://secy247.com/masjesu-botnet-exposed-stealthy-iot-malware-powering-ddos-for-hire-attacks/]]></link>
			<title>Masjesu Botnet Exposed: Stealthy IoT Malware Powering DDoS-for-Hire Attacks</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 19:26:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/chaos-malware-evolves-new-variant-targets-misconfigured-cloud-systems-with-proxy-capabilities/]]></guid>
			<link><![CDATA[https://secy247.com/chaos-malware-evolves-new-variant-targets-misconfigured-cloud-systems-with-proxy-capabilities/]]></link>
			<title>Chaos Malware Evolves: New Variant Targets Misconfigured Cloud Systems with Proxy Capabilities</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 19:14:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/adobe-reader-zero-day-exploit-discovered-malicious-pdfs-used-to-steal-data-since-2025/]]></guid>
			<link><![CDATA[https://secy247.com/adobe-reader-zero-day-exploit-discovered-malicious-pdfs-used-to-steal-data-since-2025/]]></link>
			<title>Adobe Reader Zero-Day Exploit Discovered: Malicious PDFs Used to Steal Data Since 2025</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 18:56:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/what-is-shadow-ai-hidden-security-risks-of-unapproved-ai-tools-in-the-workplace/]]></guid>
			<link><![CDATA[https://secy247.com/what-is-shadow-ai-hidden-security-risks-of-unapproved-ai-tools-in-the-workplace/]]></link>
			<title>“What Is Shadow AI? Hidden Security Risks of Unapproved AI Tools in the Workplace”</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 18:40:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/uat-10362-launches-targeted-attacks-on-taiwan-using-lucidrook-lua-based-malware/]]></guid>
			<link><![CDATA[https://secy247.com/uat-10362-launches-targeted-attacks-on-taiwan-using-lucidrook-lua-based-malware/]]></link>
			<title>“UAT-10362 Launches Targeted Attacks on Taiwan Using LucidRook Lua-Based Malware</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 18:12:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/interpol-shuts-down-45000-malicious-servers-in-global-cybercrime-crackdown/]]></guid>
			<link><![CDATA[https://secy247.com/interpol-shuts-down-45000-malicious-servers-in-global-cybercrime-crackdown/]]></link>
			<title>“INTERPOL Shuts Down 45,000 Malicious Servers in Global Cybercrime Crackdown”</title>
			<pubDate><![CDATA[Sat, 14 Mar 2026 19:44:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/military-networks-under-attack-china-linked-hackers-deploy-custom-backdoors/]]></guid>
			<link><![CDATA[https://secy247.com/military-networks-under-attack-china-linked-hackers-deploy-custom-backdoors/]]></link>
			<title>Military Networks Under Attack: China-Linked Hackers Deploy Custom Backdoors</title>
			<pubDate><![CDATA[Sat, 14 Mar 2026 19:03:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/new-cyber-espionage-operation-shows-coordinated-attacks-by-china-aligned-groups/]]></guid>
			<link><![CDATA[https://secy247.com/new-cyber-espionage-operation-shows-coordinated-attacks-by-china-aligned-groups/]]></link>
			<title>New Cyber Espionage Operation Shows Coordinated Attacks by China-Aligned Groups</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 18:30:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/new-ctrl-malware-uses-fake-private-key-files-and-rdp-hijacking-to-steal-credentials-stealthily/]]></guid>
			<link><![CDATA[https://secy247.com/new-ctrl-malware-uses-fake-private-key-files-and-rdp-hijacking-to-steal-credentials-stealthily/]]></link>
			<title>New CTRL Malware Uses Fake Private Key Files and RDP Hijacking to Steal Credentials Stealthily</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 18:19:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/how-to-improve-tier-1-soc-performance-and-reduce-alert-fatigue/]]></guid>
			<link><![CDATA[https://secy247.com/how-to-improve-tier-1-soc-performance-and-reduce-alert-fatigue/]]></link>
			<title>How to Improve Tier 1 SOC Performance and Reduce Alert Fatigue</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 18:06:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/new-malware-deepload-spreads-through-fake-fix-prompts-and-powershell-abuse/]]></guid>
			<link><![CDATA[https://secy247.com/new-malware-deepload-spreads-through-fake-fix-prompts-and-powershell-abuse/]]></link>
			<title>New Malware DeepLoad Spreads Through Fake Fix Prompts and PowerShell Abuse</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 17:46:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/cybersecurity-news-roundup-new-threats-exploits-and-attacks-this-week/]]></guid>
			<link><![CDATA[https://secy247.com/cybersecurity-news-roundup-new-threats-exploits-and-attacks-this-week/]]></link>
			<title>Cybersecurity News Roundup: New Threats, Exploits, and Attacks This Week</title>
			<pubDate><![CDATA[Fri, 20 Mar 2026 19:37:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/new-report-reveals-50-tools-used-to-shut-down-security-software/]]></guid>
			<link><![CDATA[https://secy247.com/new-report-reveals-50-tools-used-to-shut-down-security-software/]]></link>
			<title>New Report Reveals 50+ Tools Used to Shut Down Security Software</title>
			<pubDate><![CDATA[Fri, 20 Mar 2026 19:17:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/new-ios-exploit-threat-puts-millions-of-iphones-at-risk/]]></guid>
			<link><![CDATA[https://secy247.com/new-ios-exploit-threat-puts-millions-of-iphones-at-risk/]]></link>
			<title>New iOS Exploit Threat Puts Millions of iPhones at Risk</title>
			<pubDate><![CDATA[Fri, 20 Mar 2026 18:55:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/massive-iot-botnet-disrupted-after-launching-record-breaking-ddos-attacks/]]></guid>
			<link><![CDATA[https://secy247.com/massive-iot-botnet-disrupted-after-launching-record-breaking-ddos-attacks/]]></link>
			<title>Massive IoT Botnet Disrupted After Launching Record-Breaking DDoS Attacks</title>
			<pubDate><![CDATA[Fri, 20 Mar 2026 18:46:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/polyshell-attack-explained-how-hackers-can-exploit-magento-file-uploads/]]></guid>
			<link><![CDATA[https://secy247.com/polyshell-attack-explained-how-hackers-can-exploit-magento-file-uploads/]]></link>
			<title>PolyShell Attack Explained: How Hackers Can Exploit Magento File Uploads</title>
			<pubDate><![CDATA[Fri, 20 Mar 2026 18:14:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/the-rise-of-ai-cybercrime-why-traditional-security-is-failing/]]></guid>
			<link><![CDATA[https://secy247.com/the-rise-of-ai-cybercrime-why-traditional-security-is-failing/]]></link>
			<title>The Rise of AI Cybercrime: Why Traditional Security Is Failing</title>
			<pubDate><![CDATA[Fri, 20 Mar 2026 17:55:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/android-users-face-new-24-hour-delay-for-installing-apps-outside-play-store/]]></guid>
			<link><![CDATA[https://secy247.com/android-users-face-new-24-hour-delay-for-installing-apps-outside-play-store/]]></link>
			<title>Android Users Face New 24-Hour Delay for Installing Apps Outside Play Store</title>
			<pubDate><![CDATA[Fri, 20 Mar 2026 17:45:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/new-social-engineering-attack-installs-havoc-malware-on-corporate-networks/]]></guid>
			<link><![CDATA[https://secy247.com/new-social-engineering-attack-installs-havoc-malware-on-corporate-networks/]]></link>
			<title>New Social Engineering Attack Installs Havoc Malware on Corporate Networks</title>
			<pubDate><![CDATA[Wed, 04 Mar 2026 19:28:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/meta-to-end-end-to-end-encryption-for-instagram-direct-messages-in-2026/]]></guid>
			<link><![CDATA[https://secy247.com/meta-to-end-end-to-end-encryption-for-instagram-direct-messages-in-2026/]]></link>
			<title>Meta to End End-to-End Encryption for Instagram Direct Messages in 2026</title>
			<pubDate><![CDATA[Sat, 14 Mar 2026 19:17:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/security-alert-vmware-aria-operations-command-injection-flaw-under-attack/]]></guid>
			<link><![CDATA[https://secy247.com/security-alert-vmware-aria-operations-command-injection-flaw-under-attack/]]></link>
			<title>Security Alert: VMware Aria Operations Command Injection Flaw Under Attack</title>
			<pubDate><![CDATA[Wed, 04 Mar 2026 19:00:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/hackers-exploit-critical-flaws-in-solarwinds-and-ivanti-software/]]></guid>
			<link><![CDATA[https://secy247.com/hackers-exploit-critical-flaws-in-solarwinds-and-ivanti-software/]]></link>
			<title>Hackers Exploit Critical Flaws in SolarWinds and Ivanti Software</title>
			<pubDate><![CDATA[Tue, 10 Mar 2026 16:56:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/]]></guid>
			<link><![CDATA[https://secy247.com/]]></link>
			<title>Home</title>
			<pubDate><![CDATA[Sun, 08 Mar 2026 02:57:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/security-alert-hackers-target-public-salesforce-experience-cloud-sites/]]></guid>
			<link><![CDATA[https://secy247.com/security-alert-hackers-target-public-salesforce-experience-cloud-sites/]]></link>
			<title>Security Alert: Hackers Target Public Salesforce Experience Cloud Sites</title>
			<pubDate><![CDATA[Tue, 10 Mar 2026 16:43:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/security-researchers-uncover-new-apt28-espionage-tools-targeting-ukraine/]]></guid>
			<link><![CDATA[https://secy247.com/security-researchers-uncover-new-apt28-espionage-tools-targeting-ukraine/]]></link>
			<title>Security Researchers Uncover New APT28 Espionage Tools Targeting Ukraine</title>
			<pubDate><![CDATA[Tue, 10 Mar 2026 16:28:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/how-exposed-servers-turn-new-vulnerabilities-into-major-cyber-attacks/]]></guid>
			<link><![CDATA[https://secy247.com/how-exposed-servers-turn-new-vulnerabilities-into-major-cyber-attacks/]]></link>
			<title>How Exposed Servers Turn New Vulnerabilities Into Major Cyber Attacks</title>
			<pubDate><![CDATA[Tue, 10 Mar 2026 16:19:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/ai-automation-creates-new-attack-surface-for-hackers/]]></guid>
			<link><![CDATA[https://secy247.com/ai-automation-creates-new-attack-surface-for-hackers/]]></link>
			<title>AI Automation Creates New Attack Surface for Hackers</title>
			<pubDate><![CDATA[Tue, 10 Mar 2026 16:11:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/major-looker-studio-security-flaws-could-have-allowed-cross-tenant-data-theft/]]></guid>
			<link><![CDATA[https://secy247.com/major-looker-studio-security-flaws-could-have-allowed-cross-tenant-data-theft/]]></link>
			<title>Major Looker Studio Security Flaws Could Have Allowed Cross-Tenant Data Theft</title>
			<pubDate><![CDATA[Tue, 10 Mar 2026 16:01:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/thousands-of-chrome-users-exposed-after-trusted-extensions-turn-malicious/]]></guid>
			<link><![CDATA[https://secy247.com/thousands-of-chrome-users-exposed-after-trusted-extensions-turn-malicious/]]></link>
			<title>Thousands of Chrome Users Exposed After Trusted Extensions Turn Malicious</title>
			<pubDate><![CDATA[Tue, 10 Mar 2026 01:27:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/how-mid-sized-businesses-can-improve-cybersecurity-with-limited-it-resources/]]></guid>
			<link><![CDATA[https://secy247.com/how-mid-sized-businesses-can-improve-cybersecurity-with-limited-it-resources/]]></link>
			<title>How Mid-Sized Businesses Can Improve Cybersecurity With Limited IT Resources</title>
			<pubDate><![CDATA[Tue, 10 Mar 2026 01:17:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/hackers-exploit-google-cloud-environment-in-major-cryptocurrency-theft-operation/]]></guid>
			<link><![CDATA[https://secy247.com/hackers-exploit-google-cloud-environment-in-major-cryptocurrency-theft-operation/]]></link>
			<title>Hackers Exploit Google Cloud Environment in Major Cryptocurrency Theft Operation</title>
			<pubDate><![CDATA[Tue, 10 Mar 2026 01:09:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/developers-targeted-by-malicious-openclaw-npm-package-delivering-ghostloader-rat/]]></guid>
			<link><![CDATA[https://secy247.com/developers-targeted-by-malicious-openclaw-npm-package-delivering-ghostloader-rat/]]></link>
			<title>Developers Targeted by Malicious OpenClaw npm Package Delivering GhostLoader RAT</title>
			<pubDate><![CDATA[Tue, 10 Mar 2026 00:51:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/security-researchers-warn-of-glassworm-attack-targeting-developer-tools/]]></guid>
			<link><![CDATA[https://secy247.com/security-researchers-warn-of-glassworm-attack-targeting-developer-tools/]]></link>
			<title>Security Researchers Warn of GlassWorm Attack Targeting Developer Tools</title>
			<pubDate><![CDATA[Sat, 14 Mar 2026 18:11:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/new-silver-dragon-apt-group-linked-to-global-cyber-attacks/]]></guid>
			<link><![CDATA[https://secy247.com/new-silver-dragon-apt-group-linked-to-global-cyber-attacks/]]></link>
			<title>New Silver Dragon APT Group Linked to Global Cyber Attacks</title>
			<pubDate><![CDATA[Wed, 04 Mar 2026 18:43:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/malicious-php-packages-disguised-as-laravel-tools-install-remote-access-trojan/]]></guid>
			<link><![CDATA[https://secy247.com/malicious-php-packages-disguised-as-laravel-tools-install-remote-access-trojan/]]></link>
			<title>Security Alert: Fake Laravel Packages Infect Systems With Cross-Platform RAT</title>
			<pubDate><![CDATA[Wed, 04 Mar 2026 18:33:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/microsoft-warns-of-new-clickfix-campaign-spreading-lumma-stealer-malware/]]></guid>
			<link><![CDATA[https://secy247.com/microsoft-warns-of-new-clickfix-campaign-spreading-lumma-stealer-malware/]]></link>
			<title>Microsoft Warns of New ClickFix Campaign Spreading Lumma Stealer Malware</title>
			<pubDate><![CDATA[Fri, 06 Mar 2026 18:22:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/cybersecurity-warning-critical-hikvision-and-ics-vulnerabilities-under-active-attack/]]></guid>
			<link><![CDATA[https://secy247.com/cybersecurity-warning-critical-hikvision-and-ics-vulnerabilities-under-active-attack/]]></link>
			<title>Cybersecurity Warning: Critical Hikvision and ICS Vulnerabilities Under Active Attack</title>
			<pubDate><![CDATA[Fri, 06 Mar 2026 18:21:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/china-linked-hackers-target-south-american-telecom-networks-with-new-malware/]]></guid>
			<link><![CDATA[https://secy247.com/china-linked-hackers-target-south-american-telecom-networks-with-new-malware/]]></link>
			<title>China-Linked Hackers Target South American Telecom Networks With New Malware</title>
			<pubDate><![CDATA[Fri, 06 Mar 2026 17:07:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/new-cyber-espionage-campaign-iranian-muddywater-group-targets-u-s-organizations/]]></guid>
			<link><![CDATA[https://secy247.com/new-cyber-espionage-campaign-iranian-muddywater-group-targets-u-s-organizations/]]></link>
			<title>New Cyber Espionage Campaign: Iranian MuddyWater Group Targets U.S. Organizations</title>
			<pubDate><![CDATA[Fri, 06 Mar 2026 16:48:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/why-risk-based-cybersecurity-and-ai-are-key-for-modern-msp-growth/]]></guid>
			<link><![CDATA[https://secy247.com/why-risk-based-cybersecurity-and-ai-are-key-for-modern-msp-growth/]]></link>
			<title>Why Risk-Based Cybersecurity and AI Are Key for Modern MSP Growth</title>
			<pubDate><![CDATA[Fri, 06 Mar 2026 16:29:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/multi-stage-fileless-malware-attack-targets-systems-with-xworm-and-asyncrat/]]></guid>
			<link><![CDATA[https://secy247.com/multi-stage-fileless-malware-attack-targets-systems-with-xworm-and-asyncrat/]]></link>
			<title>Multi-Stage Fileless Malware Attack Targets Systems With XWorm and AsyncRAT</title>
			<pubDate><![CDATA[Fri, 06 Mar 2026 16:08:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/hackers-now-using-ai-to-create-malware-faster-security-researchers-warn/]]></guid>
			<link><![CDATA[https://secy247.com/hackers-now-using-ai-to-create-malware-faster-security-researchers-warn/]]></link>
			<title>Hackers Now Using AI to Create Malware Faster, Security Researchers Warn</title>
			<pubDate><![CDATA[Fri, 06 Mar 2026 15:49:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/ai-governance-is-the-new-cybersecurity-challenge-for-enterprises/]]></guid>
			<link><![CDATA[https://secy247.com/ai-governance-is-the-new-cybersecurity-challenge-for-enterprises/]]></link>
			<title>AI Governance Is the New Cybersecurity Challenge for Enterprises</title>
			<pubDate><![CDATA[Wed, 04 Mar 2026 18:15:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/new-ai-security-threat-openclaw-vulnerabilities-raise-concerns-for-businesses/]]></guid>
			<link><![CDATA[https://secy247.com/new-ai-security-threat-openclaw-vulnerabilities-raise-concerns-for-businesses/]]></link>
			<title>New AI Security Threat: OpenClaw Vulnerabilities Raise Concerns for Businesses</title>
			<pubDate><![CDATA[Sat, 14 Mar 2026 17:37:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/new-coruna-exploit-kit-discovered-targeting-millions-of-iphones/]]></guid>
			<link><![CDATA[https://secy247.com/new-coruna-exploit-kit-discovered-targeting-millions-of-iphones/]]></link>
			<title>New Coruna Exploit Kit Discovered Targeting Millions of iPhones</title>
			<pubDate><![CDATA[Wed, 04 Mar 2026 17:39:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/new-report-reveals-how-malicious-repos-can-exploit-anthropics-coding-assistant/]]></guid>
			<link><![CDATA[https://secy247.com/new-report-reveals-how-malicious-repos-can-exploit-anthropics-coding-assistant/]]></link>
			<title>New Report Reveals How Malicious Repos Can Exploit Anthropic’s Coding Assistant</title>
			<pubDate><![CDATA[Wed, 25 Feb 2026 20:12:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/home/]]></guid>
			<link><![CDATA[https://secy247.com/home/]]></link>
			<title>CYBERSECURITY TECHNOLOGY    BUSINESS</title>
			<pubDate><![CDATA[Fri, 26 Dec 2025 07:03:33 +0000]]></pubDate>
		</item>
				</channel>
</rss>
