<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 3, 2026 at 3:23 pm by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://secy247.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Secy247 – Technology, Cybersecurity &amp; Business</title>
		<link><![CDATA[https://secy247.com]]></link>
		<description><![CDATA[Secy247 – Technology, Cybersecurity &amp; Business]]></description>
		<lastBuildDate><![CDATA[Mon, 30 Mar 2026 18:30:59 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://secy247.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://secy247.com/new-cyber-espionage-operation-shows-coordinated-attacks-by-china-aligned-groups/]]></guid>
			<link><![CDATA[https://secy247.com/new-cyber-espionage-operation-shows-coordinated-attacks-by-china-aligned-groups/]]></link>
			<title>New Cyber Espionage Operation Shows Coordinated Attacks by China-Aligned Groups</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 18:30:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/new-ctrl-malware-uses-fake-private-key-files-and-rdp-hijacking-to-steal-credentials-stealthily/]]></guid>
			<link><![CDATA[https://secy247.com/new-ctrl-malware-uses-fake-private-key-files-and-rdp-hijacking-to-steal-credentials-stealthily/]]></link>
			<title>New CTRL Malware Uses Fake Private Key Files and RDP Hijacking to Steal Credentials Stealthily</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 18:19:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/how-to-improve-tier-1-soc-performance-and-reduce-alert-fatigue/]]></guid>
			<link><![CDATA[https://secy247.com/how-to-improve-tier-1-soc-performance-and-reduce-alert-fatigue/]]></link>
			<title>How to Improve Tier 1 SOC Performance and Reduce Alert Fatigue</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 18:06:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/new-malware-deepload-spreads-through-fake-fix-prompts-and-powershell-abuse/]]></guid>
			<link><![CDATA[https://secy247.com/new-malware-deepload-spreads-through-fake-fix-prompts-and-powershell-abuse/]]></link>
			<title>New Malware DeepLoad Spreads Through Fake Fix Prompts and PowerShell Abuse</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 17:46:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/cybersecurity-news-roundup-new-threats-exploits-and-attacks-this-week/]]></guid>
			<link><![CDATA[https://secy247.com/cybersecurity-news-roundup-new-threats-exploits-and-attacks-this-week/]]></link>
			<title>Cybersecurity News Roundup: New Threats, Exploits, and Attacks This Week</title>
			<pubDate><![CDATA[Fri, 20 Mar 2026 19:37:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/new-report-reveals-50-tools-used-to-shut-down-security-software/]]></guid>
			<link><![CDATA[https://secy247.com/new-report-reveals-50-tools-used-to-shut-down-security-software/]]></link>
			<title>New Report Reveals 50+ Tools Used to Shut Down Security Software</title>
			<pubDate><![CDATA[Fri, 20 Mar 2026 19:17:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/new-ios-exploit-threat-puts-millions-of-iphones-at-risk/]]></guid>
			<link><![CDATA[https://secy247.com/new-ios-exploit-threat-puts-millions-of-iphones-at-risk/]]></link>
			<title>New iOS Exploit Threat Puts Millions of iPhones at Risk</title>
			<pubDate><![CDATA[Fri, 20 Mar 2026 18:55:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/massive-iot-botnet-disrupted-after-launching-record-breaking-ddos-attacks/]]></guid>
			<link><![CDATA[https://secy247.com/massive-iot-botnet-disrupted-after-launching-record-breaking-ddos-attacks/]]></link>
			<title>Massive IoT Botnet Disrupted After Launching Record-Breaking DDoS Attacks</title>
			<pubDate><![CDATA[Fri, 20 Mar 2026 18:46:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/hackers-exploit-critical-flaws-in-solarwinds-and-ivanti-software/]]></guid>
			<link><![CDATA[https://secy247.com/hackers-exploit-critical-flaws-in-solarwinds-and-ivanti-software/]]></link>
			<title>Hackers Exploit Critical Flaws in SolarWinds and Ivanti Software</title>
			<pubDate><![CDATA[Tue, 10 Mar 2026 16:56:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/polyshell-attack-explained-how-hackers-can-exploit-magento-file-uploads/]]></guid>
			<link><![CDATA[https://secy247.com/polyshell-attack-explained-how-hackers-can-exploit-magento-file-uploads/]]></link>
			<title>PolyShell Attack Explained: How Hackers Can Exploit Magento File Uploads</title>
			<pubDate><![CDATA[Fri, 20 Mar 2026 18:14:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/security-alert-hackers-target-public-salesforce-experience-cloud-sites/]]></guid>
			<link><![CDATA[https://secy247.com/security-alert-hackers-target-public-salesforce-experience-cloud-sites/]]></link>
			<title>Security Alert: Hackers Target Public Salesforce Experience Cloud Sites</title>
			<pubDate><![CDATA[Tue, 10 Mar 2026 16:43:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/security-researchers-uncover-new-apt28-espionage-tools-targeting-ukraine/]]></guid>
			<link><![CDATA[https://secy247.com/security-researchers-uncover-new-apt28-espionage-tools-targeting-ukraine/]]></link>
			<title>Security Researchers Uncover New APT28 Espionage Tools Targeting Ukraine</title>
			<pubDate><![CDATA[Tue, 10 Mar 2026 16:28:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/the-rise-of-ai-cybercrime-why-traditional-security-is-failing/]]></guid>
			<link><![CDATA[https://secy247.com/the-rise-of-ai-cybercrime-why-traditional-security-is-failing/]]></link>
			<title>The Rise of AI Cybercrime: Why Traditional Security Is Failing</title>
			<pubDate><![CDATA[Fri, 20 Mar 2026 17:55:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/interpol-shuts-down-45000-malicious-servers-in-global-cybercrime-crackdown/]]></guid>
			<link><![CDATA[https://secy247.com/interpol-shuts-down-45000-malicious-servers-in-global-cybercrime-crackdown/]]></link>
			<title>“INTERPOL Shuts Down 45,000 Malicious Servers in Global Cybercrime Crackdown”</title>
			<pubDate><![CDATA[Sat, 14 Mar 2026 19:44:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/meta-to-end-end-to-end-encryption-for-instagram-direct-messages-in-2026/]]></guid>
			<link><![CDATA[https://secy247.com/meta-to-end-end-to-end-encryption-for-instagram-direct-messages-in-2026/]]></link>
			<title>Meta to End End-to-End Encryption for Instagram Direct Messages in 2026</title>
			<pubDate><![CDATA[Sat, 14 Mar 2026 19:17:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/military-networks-under-attack-china-linked-hackers-deploy-custom-backdoors/]]></guid>
			<link><![CDATA[https://secy247.com/military-networks-under-attack-china-linked-hackers-deploy-custom-backdoors/]]></link>
			<title>Military Networks Under Attack: China-Linked Hackers Deploy Custom Backdoors</title>
			<pubDate><![CDATA[Sat, 14 Mar 2026 19:03:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/security-researchers-warn-of-glassworm-attack-targeting-developer-tools/]]></guid>
			<link><![CDATA[https://secy247.com/security-researchers-warn-of-glassworm-attack-targeting-developer-tools/]]></link>
			<title>Security Researchers Warn of GlassWorm Attack Targeting Developer Tools</title>
			<pubDate><![CDATA[Sat, 14 Mar 2026 18:11:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/new-ai-security-threat-openclaw-vulnerabilities-raise-concerns-for-businesses/]]></guid>
			<link><![CDATA[https://secy247.com/new-ai-security-threat-openclaw-vulnerabilities-raise-concerns-for-businesses/]]></link>
			<title>New AI Security Threat: OpenClaw Vulnerabilities Raise Concerns for Businesses</title>
			<pubDate><![CDATA[Sat, 14 Mar 2026 17:37:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/android-users-face-new-24-hour-delay-for-installing-apps-outside-play-store/]]></guid>
			<link><![CDATA[https://secy247.com/android-users-face-new-24-hour-delay-for-installing-apps-outside-play-store/]]></link>
			<title>Android Users Face New 24-Hour Delay for Installing Apps Outside Play Store</title>
			<pubDate><![CDATA[Fri, 20 Mar 2026 17:45:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/how-exposed-servers-turn-new-vulnerabilities-into-major-cyber-attacks/]]></guid>
			<link><![CDATA[https://secy247.com/how-exposed-servers-turn-new-vulnerabilities-into-major-cyber-attacks/]]></link>
			<title>How Exposed Servers Turn New Vulnerabilities Into Major Cyber Attacks</title>
			<pubDate><![CDATA[Tue, 10 Mar 2026 16:19:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/ai-automation-creates-new-attack-surface-for-hackers/]]></guid>
			<link><![CDATA[https://secy247.com/ai-automation-creates-new-attack-surface-for-hackers/]]></link>
			<title>AI Automation Creates New Attack Surface for Hackers</title>
			<pubDate><![CDATA[Tue, 10 Mar 2026 16:11:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/major-looker-studio-security-flaws-could-have-allowed-cross-tenant-data-theft/]]></guid>
			<link><![CDATA[https://secy247.com/major-looker-studio-security-flaws-could-have-allowed-cross-tenant-data-theft/]]></link>
			<title>Major Looker Studio Security Flaws Could Have Allowed Cross-Tenant Data Theft</title>
			<pubDate><![CDATA[Tue, 10 Mar 2026 16:01:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/thousands-of-chrome-users-exposed-after-trusted-extensions-turn-malicious/]]></guid>
			<link><![CDATA[https://secy247.com/thousands-of-chrome-users-exposed-after-trusted-extensions-turn-malicious/]]></link>
			<title>Thousands of Chrome Users Exposed After Trusted Extensions Turn Malicious</title>
			<pubDate><![CDATA[Tue, 10 Mar 2026 01:27:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/how-mid-sized-businesses-can-improve-cybersecurity-with-limited-it-resources/]]></guid>
			<link><![CDATA[https://secy247.com/how-mid-sized-businesses-can-improve-cybersecurity-with-limited-it-resources/]]></link>
			<title>How Mid-Sized Businesses Can Improve Cybersecurity With Limited IT Resources</title>
			<pubDate><![CDATA[Tue, 10 Mar 2026 01:17:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/hackers-exploit-google-cloud-environment-in-major-cryptocurrency-theft-operation/]]></guid>
			<link><![CDATA[https://secy247.com/hackers-exploit-google-cloud-environment-in-major-cryptocurrency-theft-operation/]]></link>
			<title>Hackers Exploit Google Cloud Environment in Major Cryptocurrency Theft Operation</title>
			<pubDate><![CDATA[Tue, 10 Mar 2026 01:09:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/developers-targeted-by-malicious-openclaw-npm-package-delivering-ghostloader-rat/]]></guid>
			<link><![CDATA[https://secy247.com/developers-targeted-by-malicious-openclaw-npm-package-delivering-ghostloader-rat/]]></link>
			<title>Developers Targeted by Malicious OpenClaw npm Package Delivering GhostLoader RAT</title>
			<pubDate><![CDATA[Tue, 10 Mar 2026 00:51:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/microsoft-warns-of-new-clickfix-campaign-spreading-lumma-stealer-malware/]]></guid>
			<link><![CDATA[https://secy247.com/microsoft-warns-of-new-clickfix-campaign-spreading-lumma-stealer-malware/]]></link>
			<title>Microsoft Warns of New ClickFix Campaign Spreading Lumma Stealer Malware</title>
			<pubDate><![CDATA[Fri, 06 Mar 2026 18:22:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/cybersecurity-warning-critical-hikvision-and-ics-vulnerabilities-under-active-attack/]]></guid>
			<link><![CDATA[https://secy247.com/cybersecurity-warning-critical-hikvision-and-ics-vulnerabilities-under-active-attack/]]></link>
			<title>Cybersecurity Warning: Critical Hikvision and ICS Vulnerabilities Under Active Attack</title>
			<pubDate><![CDATA[Fri, 06 Mar 2026 18:21:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/china-linked-hackers-target-south-american-telecom-networks-with-new-malware/]]></guid>
			<link><![CDATA[https://secy247.com/china-linked-hackers-target-south-american-telecom-networks-with-new-malware/]]></link>
			<title>China-Linked Hackers Target South American Telecom Networks With New Malware</title>
			<pubDate><![CDATA[Fri, 06 Mar 2026 17:07:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/new-cyber-espionage-campaign-iranian-muddywater-group-targets-u-s-organizations/]]></guid>
			<link><![CDATA[https://secy247.com/new-cyber-espionage-campaign-iranian-muddywater-group-targets-u-s-organizations/]]></link>
			<title>New Cyber Espionage Campaign: Iranian MuddyWater Group Targets U.S. Organizations</title>
			<pubDate><![CDATA[Fri, 06 Mar 2026 16:48:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/why-risk-based-cybersecurity-and-ai-are-key-for-modern-msp-growth/]]></guid>
			<link><![CDATA[https://secy247.com/why-risk-based-cybersecurity-and-ai-are-key-for-modern-msp-growth/]]></link>
			<title>Why Risk-Based Cybersecurity and AI Are Key for Modern MSP Growth</title>
			<pubDate><![CDATA[Fri, 06 Mar 2026 16:29:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/multi-stage-fileless-malware-attack-targets-systems-with-xworm-and-asyncrat/]]></guid>
			<link><![CDATA[https://secy247.com/multi-stage-fileless-malware-attack-targets-systems-with-xworm-and-asyncrat/]]></link>
			<title>Multi-Stage Fileless Malware Attack Targets Systems With XWorm and AsyncRAT</title>
			<pubDate><![CDATA[Fri, 06 Mar 2026 16:08:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/hackers-now-using-ai-to-create-malware-faster-security-researchers-warn/]]></guid>
			<link><![CDATA[https://secy247.com/hackers-now-using-ai-to-create-malware-faster-security-researchers-warn/]]></link>
			<title>Hackers Now Using AI to Create Malware Faster, Security Researchers Warn</title>
			<pubDate><![CDATA[Fri, 06 Mar 2026 15:49:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/new-social-engineering-attack-installs-havoc-malware-on-corporate-networks/]]></guid>
			<link><![CDATA[https://secy247.com/new-social-engineering-attack-installs-havoc-malware-on-corporate-networks/]]></link>
			<title>New Social Engineering Attack Installs Havoc Malware on Corporate Networks</title>
			<pubDate><![CDATA[Wed, 04 Mar 2026 19:28:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/security-alert-vmware-aria-operations-command-injection-flaw-under-attack/]]></guid>
			<link><![CDATA[https://secy247.com/security-alert-vmware-aria-operations-command-injection-flaw-under-attack/]]></link>
			<title>Security Alert: VMware Aria Operations Command Injection Flaw Under Attack</title>
			<pubDate><![CDATA[Wed, 04 Mar 2026 19:00:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/google-shuts-down-gridtide-malware-operation-targeting-53-organizations-worldwide/]]></guid>
			<link><![CDATA[https://secy247.com/google-shuts-down-gridtide-malware-operation-targeting-53-organizations-worldwide/]]></link>
			<title>Google Shuts Down GRIDTIDE Malware Operation Targeting 53 Organizations Worldwide</title>
			<pubDate><![CDATA[Wed, 25 Feb 2026 20:01:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/new-silver-dragon-apt-group-linked-to-global-cyber-attacks/]]></guid>
			<link><![CDATA[https://secy247.com/new-silver-dragon-apt-group-linked-to-global-cyber-attacks/]]></link>
			<title>New Silver Dragon APT Group Linked to Global Cyber Attacks</title>
			<pubDate><![CDATA[Wed, 04 Mar 2026 18:43:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/new-report-reveals-how-malicious-repos-can-exploit-anthropics-coding-assistant/]]></guid>
			<link><![CDATA[https://secy247.com/new-report-reveals-how-malicious-repos-can-exploit-anthropics-coding-assistant/]]></link>
			<title>New Report Reveals How Malicious Repos Can Exploit Anthropic’s Coding Assistant</title>
			<pubDate><![CDATA[Wed, 25 Feb 2026 20:12:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/malicious-php-packages-disguised-as-laravel-tools-install-remote-access-trojan/]]></guid>
			<link><![CDATA[https://secy247.com/malicious-php-packages-disguised-as-laravel-tools-install-remote-access-trojan/]]></link>
			<title>Security Alert: Fake Laravel Packages Infect Systems With Cross-Platform RAT</title>
			<pubDate><![CDATA[Wed, 04 Mar 2026 18:33:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/ai-governance-is-the-new-cybersecurity-challenge-for-enterprises/]]></guid>
			<link><![CDATA[https://secy247.com/ai-governance-is-the-new-cybersecurity-challenge-for-enterprises/]]></link>
			<title>AI Governance Is the New Cybersecurity Challenge for Enterprises</title>
			<pubDate><![CDATA[Wed, 04 Mar 2026 18:15:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/new-coruna-exploit-kit-discovered-targeting-millions-of-iphones/]]></guid>
			<link><![CDATA[https://secy247.com/new-coruna-exploit-kit-discovered-targeting-millions-of-iphones/]]></link>
			<title>New Coruna Exploit Kit Discovered Targeting Millions of iPhones</title>
			<pubDate><![CDATA[Wed, 04 Mar 2026 17:39:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/]]></guid>
			<link><![CDATA[https://secy247.com/]]></link>
			<title>Home</title>
			<pubDate><![CDATA[Sun, 08 Mar 2026 02:57:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/new-muddywater-campaign-uses-phishing-and-backdoors-to-spy-on-organizations-in-mena/]]></guid>
			<link><![CDATA[https://secy247.com/new-muddywater-campaign-uses-phishing-and-backdoors-to-spy-on-organizations-in-mena/]]></link>
			<title>New MuddyWater Campaign Uses Phishing and Backdoors to Spy on Organizations in MENA</title>
			<pubDate><![CDATA[Mon, 23 Feb 2026 17:39:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/malicious-npm-packages-spread-worm-that-steals-crypto-wallets-credentials-and-ai-secrets/]]></guid>
			<link><![CDATA[https://secy247.com/malicious-npm-packages-spread-worm-that-steals-crypto-wallets-credentials-and-ai-secrets/]]></link>
			<title>Malicious npm Packages Spread Worm That Steals Crypto Wallets, Credentials, and AI Secrets</title>
			<pubDate><![CDATA[Mon, 23 Feb 2026 17:12:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/hidden-security-risks-in-llm-infrastructure-why-exposed-endpoints-are-the-new-attack-vector/]]></guid>
			<link><![CDATA[https://secy247.com/hidden-security-risks-in-llm-infrastructure-why-exposed-endpoints-are-the-new-attack-vector/]]></link>
			<title>Hidden Security Risks in LLM Infrastructure: Why Exposed Endpoints Are the New Attack Vector</title>
			<pubDate><![CDATA[Mon, 23 Feb 2026 16:53:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/the-biggest-cybersecurity-threats-of-2026-data-driven-analysis-and-expert-insights/]]></guid>
			<link><![CDATA[https://secy247.com/the-biggest-cybersecurity-threats-of-2026-data-driven-analysis-and-expert-insights/]]></link>
			<title>The Biggest Cybersecurity Threats of 2026 — Data-Driven Analysis and Expert Insights</title>
			<pubDate><![CDATA[Mon, 23 Feb 2026 16:36:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/new-aura-framework-protects-ai-knowledge-graphs-from-data-theft/]]></guid>
			<link><![CDATA[https://secy247.com/new-aura-framework-protects-ai-knowledge-graphs-from-data-theft/]]></link>
			<title>New AURA Framework Protects AI Knowledge Graphs From Data Theft</title>
			<pubDate><![CDATA[Mon, 16 Feb 2026 19:42:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/new-ransomware-threat-can-cripple-entire-it-infrastructure-in-one-attack/]]></guid>
			<link><![CDATA[https://secy247.com/new-ransomware-threat-can-cripple-entire-it-infrastructure-in-one-attack/]]></link>
			<title>New Ransomware Threat Can Cripple Entire IT Infrastructure in One Attack</title>
			<pubDate><![CDATA[Mon, 16 Feb 2026 19:20:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/new-macos-malware-campaign-tricks-users-into-running-terminal-commands-to-steal-data/]]></guid>
			<link><![CDATA[https://secy247.com/new-macos-malware-campaign-tricks-users-into-running-terminal-commands-to-steal-data/]]></link>
			<title>New macOS Malware Campaign Tricks Users Into Running Terminal Commands to Steal Data</title>
			<pubDate><![CDATA[Mon, 16 Feb 2026 19:03:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://secy247.com/home/]]></guid>
			<link><![CDATA[https://secy247.com/home/]]></link>
			<title>CYBERSECURITY TECHNOLOGY    BUSINESS</title>
			<pubDate><![CDATA[Fri, 26 Dec 2025 07:03:33 +0000]]></pubDate>
		</item>
				</channel>
</rss>
