<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 24, 2026 at 2:32 pm by All in One SEO v4.9.6.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://digitalwarfare.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Digital Warfare</title>
		<link><![CDATA[https://digitalwarfare.com]]></link>
		<description><![CDATA[Digital Warfare]]></description>
		<lastBuildDate><![CDATA[Thu, 23 Apr 2026 14:34:22 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://digitalwarfare.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://digitalwarfare.com/109-fake-github-repositories-used-to-deliver-smartloader-and-stealc-malware-in-supply-chain-attack/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/109-fake-github-repositories-used-to-deliver-smartloader-and-stealc-malware-in-supply-chain-attack/]]></link>
			<title>109 Fake GitHub Repositories Used to Deliver SmartLoader and StealC Malware in Supply Chain Attack</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 14:34:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/cybercriminals-exploit-french-fintech-and-banking-accounts-using-stolen-credentials-to-access-millions-of-records/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/cybercriminals-exploit-french-fintech-and-banking-accounts-using-stolen-credentials-to-access-millions-of-records/]]></link>
			<title>Cybercriminals Exploit French Fintech and Banking Accounts Using Stolen Credentials to Access Millions of Records</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 13:26:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/adobe-reader-zero-day-exploit-uses-malicious-pdfs-to-steal-data-and-enable-full-system-compromise/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/adobe-reader-zero-day-exploit-uses-malicious-pdfs-to-steal-data-and-enable-full-system-compromise/]]></link>
			<title>Adobe Reader Zero Day Exploit Uses Malicious PDFs to Steal Data and Enable Full System Compromise</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 06:03:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/ai-router-vulnerabilities-enable-attackers-to-inject-malicious-code-and-steal-data-from-ai-systems/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/ai-router-vulnerabilities-enable-attackers-to-inject-malicious-code-and-steal-data-from-ai-systems/]]></link>
			<title>AI Router Vulnerabilities Enable Attackers to Inject Malicious Code and Steal Data from AI Systems</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 05:53:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/ransomware-gangs-expand-use-of-edr-killers-to-disable-security-before-encryption-attacks/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/ransomware-gangs-expand-use-of-edr-killers-to-disable-security-before-encryption-attacks/]]></link>
			<title>Ransomware Gangs Expand Use of EDR Killers to Disable Security Before Encryption Attacks</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 05:32:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/mozilla-criticizes-microsoft-copilot-rollout-over-user-consent-and-forced-ai-integration-in-windows/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/mozilla-criticizes-microsoft-copilot-rollout-over-user-consent-and-forced-ai-integration-in-windows/]]></link>
			<title>Mozilla Criticizes Microsoft Copilot Rollout Over User Consent and Forced AI Integration in Windows</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 05:19:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/etcd-authentication-bypass-vulnerability-allows-unauthorized-access-to-critical-cluster-apis/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/etcd-authentication-bypass-vulnerability-allows-unauthorized-access-to-critical-cluster-apis/]]></link>
			<title>etcd Authentication Bypass Vulnerability Allows Unauthorized Access to Critical Cluster APIs</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 04:53:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/google-microsoft-and-meta-tracking-users-even-after-opt-out-signals-raise-major-privacy-concerns/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/google-microsoft-and-meta-tracking-users-even-after-opt-out-signals-raise-major-privacy-concerns/]]></link>
			<title>Google Microsoft and Meta Tracking Users Even After Opt Out Signals Raise Major Privacy Concerns</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 17:48:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/uac-0247-cyber-campaign-steals-browser-credentials-and-whatsapp-data-from-government-and-healthcare-systems/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/uac-0247-cyber-campaign-steals-browser-credentials-and-whatsapp-data-from-government-and-healthcare-systems/]]></link>
			<title>UAC-0247 Cyber Campaign Steals Browser Credentials and WhatsApp Data from Government and Healthcare Systems</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 17:35:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/attackers-spread-blockchain-based-backdoor-via-hugging-face-to-compromise-ai-developer-environments/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/attackers-spread-blockchain-based-backdoor-via-hugging-face-to-compromise-ai-developer-environments/]]></link>
			<title>Attackers Spread Blockchain Based Backdoor via Hugging Face to Compromise AI Developer Environments</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 17:23:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/openai-gpt-5-4-cyber-defense-program-expands-ai-driven-security-to-thousands-of-verified-defenders/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/openai-gpt-5-4-cyber-defense-program-expands-ai-driven-security-to-thousands-of-verified-defenders/]]></link>
			<title>OpenAI GPT-5.4 Cyber Defense Program Expands AI Driven Security to Thousands of Verified Defenders</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 14:41:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/nexcorium-mirai-variant-exploits-tbk-dvr-vulnerability-to-build-massive-iot-ddos-botnet/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/nexcorium-mirai-variant-exploits-tbk-dvr-vulnerability-to-build-massive-iot-ddos-botnet/]]></link>
			<title>Nexcorium Mirai Variant Exploits TBK DVR Vulnerability to Build Massive IoT DDoS Botnet</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 14:30:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/blog/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/blog/]]></link>
			<title>Blog</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 21:46:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/sidewinder-hackers-use-fake-chrome-pdf-viewer-and-zimbra-clones-to-steal-credentials-and-spy-on-governments/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/sidewinder-hackers-use-fake-chrome-pdf-viewer-and-zimbra-clones-to-steal-credentials-and-spy-on-governments/]]></link>
			<title>SideWinder Hackers Use Fake Chrome PDF Viewer and Zimbra Clones to Steal Credentials and Spy on Governments</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 20:43:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/iranian-mois-hackers-use-multiple-personas-to-conduct-espionage-phishing-and-psychological-operations/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/iranian-mois-hackers-use-multiple-personas-to-conduct-espionage-phishing-and-psychological-operations/]]></link>
			<title>Iranian MOIS Hackers Use Multiple Personas to Conduct Espionage, Phishing, and Psychological Operations</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 09:28:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/trojanized-pypi-ai-proxy-exploits-stolen-claude-prompts-to-steal-credentials-and-compromise-dev-environments/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/trojanized-pypi-ai-proxy-exploits-stolen-claude-prompts-to-steal-credentials-and-compromise-dev-environments/]]></link>
			<title>Trojanized PyPI AI Proxy Exploits Stolen Claude Prompts to Steal Credentials and Compromise Dev Environments</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 23:15:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/blog-bluehammer-windows-zero-day-exploit-grants-system-access-with-no-patch-available/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/blog-bluehammer-windows-zero-day-exploit-grants-system-access-with-no-patch-available/]]></link>
			<title>The BlueHammer Windows zero-day exploit allows attackers to gain SYSTEM-level access with no available patch. This analysis explains how the attack works and what organizations must do to defend against it.</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 23:09:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/blog-rockstar-games-data-breach-linked-to-shinyhunters-threatens-leak-unless-ransom-is-paid/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/blog-rockstar-games-data-breach-linked-to-shinyhunters-threatens-leak-unless-ransom-is-paid/]]></link>
			<title>Rockstar Games Data Breach Linked to ShinyHunters Threatens Leak Unless Ransom Is Paid</title>
			<pubDate><![CDATA[Sun, 12 Apr 2026 20:58:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/astrazeneca-data-breach-linked-to-lapsus-hackers-exposes-source-code-and-cloud-credentials/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/astrazeneca-data-breach-linked-to-lapsus-hackers-exposes-source-code-and-cloud-credentials/]]></link>
			<title>AstraZeneca Data Breach Linked to LAPSUS$ Hackers Exposes Source Code and Cloud Credentials</title>
			<pubDate><![CDATA[Tue, 31 Mar 2026 07:50:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/progress-sharefile-vulnerability-enables-pre-authentication-remote-code-execution-and-server-takeover/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/progress-sharefile-vulnerability-enables-pre-authentication-remote-code-execution-and-server-takeover/]]></link>
			<title>Progress ShareFile Vulnerability Enables Pre Authentication Remote Code Execution and Server Takeover</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 15:02:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/gpubreach-attack-enables-hackers-to-gain-root-access-using-gpu-rowhammer-exploits/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/gpubreach-attack-enables-hackers-to-gain-root-access-using-gpu-rowhammer-exploits/]]></link>
			<title>GPUBreach Attack Enables Hackers to Gain Root Access Using GPU Rowhammer Exploits</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 20:44:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/cybercriminals-are-increasingly-shifting-away-from-traditional-command-and-control-infrastructure-and-instead-leveraging-trusted-platforms-to-operate-in-plain-sight-one-platform-that-has-become-centr/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/cybercriminals-are-increasingly-shifting-away-from-traditional-command-and-control-infrastructure-and-instead-leveraging-trusted-platforms-to-operate-in-plain-sight-one-platform-that-has-become-centr/]]></link>
			<title>Cybercriminals are increasingly shifting away from traditional command and control infrastructure and instead leveraging trusted platforms to operate in plain sight. One platform that has become central to this evolution is Telegram.</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 20:44:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/seo-poisoning-campaign-impersonates-25-popular-apps-to-deliver-asyncrat-and-steal-sensitive-data/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/seo-poisoning-campaign-impersonates-25-popular-apps-to-deliver-asyncrat-and-steal-sensitive-data/]]></link>
			<title>SEO Poisoning Campaign Impersonates 25 Popular Apps to Deliver AsyncRAT and Steal Sensitive Data</title>
			<pubDate><![CDATA[Tue, 31 Mar 2026 07:38:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/databricks-teampcp-supply-chain-attack-exposes-devops-secrets-across-ci-cd-pipelines/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/databricks-teampcp-supply-chain-attack-exposes-devops-secrets-across-ci-cd-pipelines/]]></link>
			<title>Databricks TeamPCP Supply Chain Attack Exposes DevOps Secrets Across CI CD Pipelines</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 20:44:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/chinese-apt-campaign-targets-qatar-with-plugx-malware-lures-in-cyber-espionage-operation-2/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/chinese-apt-campaign-targets-qatar-with-plugx-malware-lures-in-cyber-espionage-operation-2/]]></link>
			<title>Chinese APT Campaign Targets Qatar With PlugX Malware Lures in Cyber Espionage Operation</title>
			<pubDate><![CDATA[Wed, 11 Mar 2026 20:44:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/pay2key-linux-ransomware-attacks-target-enterprise-servers-and-cloud-infrastructure/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/pay2key-linux-ransomware-attacks-target-enterprise-servers-and-cloud-infrastructure/]]></link>
			<title>Pay2Key Linux Ransomware Attacks Target Enterprise Servers and Cloud Infrastructure</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 11:38:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/blog-google-to-shut-down-dark-web-monitoring-in-2025-and-what-it-means-for-online-security/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/blog-google-to-shut-down-dark-web-monitoring-in-2025-and-what-it-means-for-online-security/]]></link>
			<title>Google to Shut Down Dark Web Monitoring in 2025 and What It Means for Online Security</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 11:34:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/superclaw-red-team-ai-agent-emerges-as-advanced-adversary-tool-and-what-organisations-must-do-to-defend/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/superclaw-red-team-ai-agent-emerges-as-advanced-adversary-tool-and-what-organisations-must-do-to-defend/]]></link>
			<title>SuperClaw Red Team AI Agent Emerges as Advanced Adversary Tool and What Organisations Must Do to Defend</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 11:31:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/apache-activemq-dos-vulnerability-could-allow-attackers-to-crash-messaging-infrastructure/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/apache-activemq-dos-vulnerability-could-allow-attackers-to-crash-messaging-infrastructure/]]></link>
			<title>Apache ActiveMQ DoS Vulnerability Could Allow Attackers to Crash Messaging Infrastructure</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 11:28:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/openai-launches-codex-security-to-automate-vulnerability-detection-and-code-security-reviews/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/openai-launches-codex-security-to-automate-vulnerability-detection-and-code-security-reviews/]]></link>
			<title>OpenAI Launches Codex Security to Automate Vulnerability Detection and Code Security Reviews</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 11:26:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/chinese-apt-campaign-targets-qatar-with-plugx-malware-lures-in-cyber-espionage-operation/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/chinese-apt-campaign-targets-qatar-with-plugx-malware-lures-in-cyber-espionage-operation/]]></link>
			<title>Chinese APT Campaign Targets Qatar With PlugX Malware Lures in Cyber Espionage Operation</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 11:26:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/cisco-firewall-breach-shows-how-firestarter-malware-can-survive-patching-and-keep-attackers-inside-critical-networks/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/cisco-firewall-breach-shows-how-firestarter-malware-can-survive-patching-and-keep-attackers-inside-critical-networks/]]></link>
			<title>Cisco Firewall Breach Shows How FIRESTARTER Malware Can Survive Patching and Keep Attackers Inside Critical Networks</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 13:51:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/blog-aws-global-service-outage-disrupts-cloud-infrastructure-and-exposes-critical-dependency-risks/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/blog-aws-global-service-outage-disrupts-cloud-infrastructure-and-exposes-critical-dependency-risks/]]></link>
			<title>AWS Global Service Outage Disrupts Cloud Infrastructure and Exposes Critical Dependency Risks</title>
			<pubDate><![CDATA[Wed, 04 Mar 2026 10:16:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/ericsson-data-breach-exposes-employee-and-customer-information-after-third-party-service-provider-hack/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/ericsson-data-breach-exposes-employee-and-customer-information-after-third-party-service-provider-hack/]]></link>
			<title>Ericsson Data Breach Exposes Employee and Customer Information After Third-Party Service Provider Hack</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 11:23:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/backdoored-open-vsx-extension-used-as-github-downloader-to-steal-developer-credentials/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/backdoored-open-vsx-extension-used-as-github-downloader-to-steal-developer-credentials/]]></link>
			<title>Backdoored Open VSX Extension Used as GitHub Downloader to Steal Developer Credentials</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 11:23:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/apt-hackers-target-rdp-servers-using-rogue-infrastructure-and-credential-harvesting-techniques/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/apt-hackers-target-rdp-servers-using-rogue-infrastructure-and-credential-harvesting-techniques/]]></link>
			<title>APT Hackers Target RDP Servers Using Rogue Infrastructure and Credential Harvesting Techniques</title>
			<pubDate><![CDATA[Wed, 25 Mar 2026 20:44:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/qnap-qvr-pro-vulnerability-could-allow-attackers-to-execute-commands-and-access-surveillance-systems/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/qnap-qvr-pro-vulnerability-could-allow-attackers-to-execute-commands-and-access-surveillance-systems/]]></link>
			<title>QNAP QVR Pro Vulnerability Could Allow Attackers to Execute Commands and Access Surveillance Systems</title>
			<pubDate><![CDATA[Tue, 24 Mar 2026 20:44:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/hackers-deploy-brushworm-loader-and-brushlogger-malware-to-steal-credentials-and-maintain-persistence/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/hackers-deploy-brushworm-loader-and-brushlogger-malware-to-steal-credentials-and-maintain-persistence/]]></link>
			<title>Hackers Deploy Brushworm Loader and BrushLogger Malware to Steal Credentials and Maintain Persistence</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 11:16:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/silver-fox-cyberattack-targets-japanese-businesses-with-phishing-lures-and-remote-access-malware/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/silver-fox-cyberattack-targets-japanese-businesses-with-phishing-lures-and-remote-access-malware/]]></link>
			<title>Silver Fox Cyberattack Targets Japanese Businesses With Phishing Lures and Remote Access Malware</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 11:15:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/cybersecurity-stocks-drop-after-anthropic-ai-security-tool-sparks-industry-disruption-concerns/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/cybersecurity-stocks-drop-after-anthropic-ai-security-tool-sparks-industry-disruption-concerns/]]></link>
			<title>Cybersecurity Stocks Drop After Anthropic AI Security Tool Sparks Industry Disruption Concerns</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 11:12:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/blog-cisco-firewall-vulnerability-threatens-network-security/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/blog-cisco-firewall-vulnerability-threatens-network-security/]]></link>
			<title>Cisco Firewall Vulnerability Threatens Network Security</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 11:08:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/penetration-testing/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/penetration-testing/]]></link>
			<title>Penetration Testing</title>
			<pubDate><![CDATA[Mon, 16 Mar 2026 20:01:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/penetration-testing2/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/penetration-testing2/]]></link>
			<title>Penetration Testing2</title>
			<pubDate><![CDATA[Fri, 13 Mar 2026 21:58:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/windows-remote-desktop-services-0-day-vulnerability-allows-attackers-to-escalate-privileges/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/windows-remote-desktop-services-0-day-vulnerability-allows-attackers-to-escalate-privileges/]]></link>
			<title>Windows Remote Desktop Services 0-Day Vulnerability Allows Attackers to Escalate Privileges</title>
			<pubDate><![CDATA[Mon, 09 Mar 2026 12:38:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/penetration-testing-old/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/penetration-testing-old/]]></link>
			<title>Penetration Testing old</title>
			<pubDate><![CDATA[Fri, 06 Mar 2026 15:37:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/blog-openclaw-zero-click-vulnerability-raises-concerns-for-mobile-and-messaging-security/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/blog-openclaw-zero-click-vulnerability-raises-concerns-for-mobile-and-messaging-security/]]></link>
			<title>OpenClaw Zero Click Vulnerability Raises Concerns for Mobile and Messaging Security</title>
			<pubDate><![CDATA[Wed, 04 Mar 2026 09:51:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/new-homoglyph-attack-techniques-exploit-unicode-characters-to-bypass-security-and-steal-credentials/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/new-homoglyph-attack-techniques-exploit-unicode-characters-to-bypass-security-and-steal-credentials/]]></link>
			<title>New Homoglyph Attack Techniques Exploit Unicode Characters to Bypass Security and Steal Credentials</title>
			<pubDate><![CDATA[Tue, 31 Mar 2026 20:43:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/blog-phishing-campaign-exploiting-oauth-authentication-targets-enterprise-accounts/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/blog-phishing-campaign-exploiting-oauth-authentication-targets-enterprise-accounts/]]></link>
			<title>Phishing Campaign Exploiting OAuth Authentication Targets Enterprise Accounts</title>
			<pubDate><![CDATA[Wed, 04 Mar 2026 09:31:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/hpe-autopass-vulnerability-could-allow-attackers-to-bypass-network-security-controls/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/hpe-autopass-vulnerability-could-allow-attackers-to-bypass-network-security-controls/]]></link>
			<title>HPE AutoPass Vulnerability Could Allow Attackers to Bypass Network Security Controls</title>
			<pubDate><![CDATA[Wed, 04 Mar 2026 09:23:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/]]></link>
			<title>Home</title>
			<pubDate><![CDATA[Mon, 16 Mar 2026 05:52:57 +0000]]></pubDate>
		</item>
				</channel>
</rss>
