<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 16, 2026 at 8:31 pm by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://digitalwarfare.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Digital Warfare</title>
		<link><![CDATA[https://digitalwarfare.com]]></link>
		<description><![CDATA[Digital Warfare]]></description>
		<lastBuildDate><![CDATA[Wed, 01 Apr 2026 20:44:21 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://digitalwarfare.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://digitalwarfare.com/cybercriminals-are-increasingly-shifting-away-from-traditional-command-and-control-infrastructure-and-instead-leveraging-trusted-platforms-to-operate-in-plain-sight-one-platform-that-has-become-centr/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/cybercriminals-are-increasingly-shifting-away-from-traditional-command-and-control-infrastructure-and-instead-leveraging-trusted-platforms-to-operate-in-plain-sight-one-platform-that-has-become-centr/]]></link>
			<title>Cybercriminals are increasingly shifting away from traditional command and control infrastructure and instead leveraging trusted platforms to operate in plain sight. One platform that has become central to this evolution is Telegram.</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 20:44:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/astrazeneca-data-breach-linked-to-lapsus-hackers-exposes-source-code-and-cloud-credentials/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/astrazeneca-data-breach-linked-to-lapsus-hackers-exposes-source-code-and-cloud-credentials/]]></link>
			<title>AstraZeneca Data Breach Linked to LAPSUS$ Hackers Exposes Source Code and Cloud Credentials</title>
			<pubDate><![CDATA[Tue, 31 Mar 2026 07:50:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/progress-sharefile-vulnerability-enables-pre-authentication-remote-code-execution-and-server-takeover/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/progress-sharefile-vulnerability-enables-pre-authentication-remote-code-execution-and-server-takeover/]]></link>
			<title>Progress ShareFile Vulnerability Enables Pre Authentication Remote Code Execution and Server Takeover</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 15:02:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/gpubreach-attack-enables-hackers-to-gain-root-access-using-gpu-rowhammer-exploits/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/gpubreach-attack-enables-hackers-to-gain-root-access-using-gpu-rowhammer-exploits/]]></link>
			<title>GPUBreach Attack Enables Hackers to Gain Root Access Using GPU Rowhammer Exploits</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 20:44:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/trojanized-pypi-ai-proxy-exploits-stolen-claude-prompts-to-steal-credentials-and-compromise-dev-environments/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/trojanized-pypi-ai-proxy-exploits-stolen-claude-prompts-to-steal-credentials-and-compromise-dev-environments/]]></link>
			<title>Trojanized PyPI AI Proxy Exploits Stolen Claude Prompts to Steal Credentials and Compromise Dev Environments</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 23:15:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/blog-bluehammer-windows-zero-day-exploit-grants-system-access-with-no-patch-available/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/blog-bluehammer-windows-zero-day-exploit-grants-system-access-with-no-patch-available/]]></link>
			<title>The BlueHammer Windows zero-day exploit allows attackers to gain SYSTEM-level access with no available patch. This analysis explains how the attack works and what organizations must do to defend against it.</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 23:09:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/blog-rockstar-games-data-breach-linked-to-shinyhunters-threatens-leak-unless-ransom-is-paid/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/blog-rockstar-games-data-breach-linked-to-shinyhunters-threatens-leak-unless-ransom-is-paid/]]></link>
			<title>Rockstar Games Data Breach Linked to ShinyHunters Threatens Leak Unless Ransom Is Paid</title>
			<pubDate><![CDATA[Sun, 12 Apr 2026 20:58:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/seo-poisoning-campaign-impersonates-25-popular-apps-to-deliver-asyncrat-and-steal-sensitive-data/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/seo-poisoning-campaign-impersonates-25-popular-apps-to-deliver-asyncrat-and-steal-sensitive-data/]]></link>
			<title>SEO Poisoning Campaign Impersonates 25 Popular Apps to Deliver AsyncRAT and Steal Sensitive Data</title>
			<pubDate><![CDATA[Tue, 31 Mar 2026 07:38:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/new-homoglyph-attack-techniques-exploit-unicode-characters-to-bypass-security-and-steal-credentials/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/new-homoglyph-attack-techniques-exploit-unicode-characters-to-bypass-security-and-steal-credentials/]]></link>
			<title>New Homoglyph Attack Techniques Exploit Unicode Characters to Bypass Security and Steal Credentials</title>
			<pubDate><![CDATA[Tue, 31 Mar 2026 20:43:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/databricks-teampcp-supply-chain-attack-exposes-devops-secrets-across-ci-cd-pipelines/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/databricks-teampcp-supply-chain-attack-exposes-devops-secrets-across-ci-cd-pipelines/]]></link>
			<title>Databricks TeamPCP Supply Chain Attack Exposes DevOps Secrets Across CI CD Pipelines</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 20:44:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/pay2key-linux-ransomware-attacks-target-enterprise-servers-and-cloud-infrastructure/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/pay2key-linux-ransomware-attacks-target-enterprise-servers-and-cloud-infrastructure/]]></link>
			<title>Pay2Key Linux Ransomware Attacks Target Enterprise Servers and Cloud Infrastructure</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 11:38:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/blog-google-to-shut-down-dark-web-monitoring-in-2025-and-what-it-means-for-online-security/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/blog-google-to-shut-down-dark-web-monitoring-in-2025-and-what-it-means-for-online-security/]]></link>
			<title>Google to Shut Down Dark Web Monitoring in 2025 and What It Means for Online Security</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 11:34:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/superclaw-red-team-ai-agent-emerges-as-advanced-adversary-tool-and-what-organisations-must-do-to-defend/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/superclaw-red-team-ai-agent-emerges-as-advanced-adversary-tool-and-what-organisations-must-do-to-defend/]]></link>
			<title>SuperClaw Red Team AI Agent Emerges as Advanced Adversary Tool and What Organisations Must Do to Defend</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 11:31:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/apache-activemq-dos-vulnerability-could-allow-attackers-to-crash-messaging-infrastructure/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/apache-activemq-dos-vulnerability-could-allow-attackers-to-crash-messaging-infrastructure/]]></link>
			<title>Apache ActiveMQ DoS Vulnerability Could Allow Attackers to Crash Messaging Infrastructure</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 11:28:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/openai-launches-codex-security-to-automate-vulnerability-detection-and-code-security-reviews/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/openai-launches-codex-security-to-automate-vulnerability-detection-and-code-security-reviews/]]></link>
			<title>OpenAI Launches Codex Security to Automate Vulnerability Detection and Code Security Reviews</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 11:26:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/chinese-apt-campaign-targets-qatar-with-plugx-malware-lures-in-cyber-espionage-operation/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/chinese-apt-campaign-targets-qatar-with-plugx-malware-lures-in-cyber-espionage-operation/]]></link>
			<title>Chinese APT Campaign Targets Qatar With PlugX Malware Lures in Cyber Espionage Operation</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 11:26:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/ericsson-data-breach-exposes-employee-and-customer-information-after-third-party-service-provider-hack/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/ericsson-data-breach-exposes-employee-and-customer-information-after-third-party-service-provider-hack/]]></link>
			<title>Ericsson Data Breach Exposes Employee and Customer Information After Third-Party Service Provider Hack</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 11:23:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/backdoored-open-vsx-extension-used-as-github-downloader-to-steal-developer-credentials/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/backdoored-open-vsx-extension-used-as-github-downloader-to-steal-developer-credentials/]]></link>
			<title>Backdoored Open VSX Extension Used as GitHub Downloader to Steal Developer Credentials</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 11:23:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/hackers-deploy-brushworm-loader-and-brushlogger-malware-to-steal-credentials-and-maintain-persistence/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/hackers-deploy-brushworm-loader-and-brushlogger-malware-to-steal-credentials-and-maintain-persistence/]]></link>
			<title>Hackers Deploy Brushworm Loader and BrushLogger Malware to Steal Credentials and Maintain Persistence</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 11:16:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/silver-fox-cyberattack-targets-japanese-businesses-with-phishing-lures-and-remote-access-malware/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/silver-fox-cyberattack-targets-japanese-businesses-with-phishing-lures-and-remote-access-malware/]]></link>
			<title>Silver Fox Cyberattack Targets Japanese Businesses With Phishing Lures and Remote Access Malware</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 11:15:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/cybersecurity-stocks-drop-after-anthropic-ai-security-tool-sparks-industry-disruption-concerns/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/cybersecurity-stocks-drop-after-anthropic-ai-security-tool-sparks-industry-disruption-concerns/]]></link>
			<title>Cybersecurity Stocks Drop After Anthropic AI Security Tool Sparks Industry Disruption Concerns</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 11:12:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/apt-hackers-target-rdp-servers-using-rogue-infrastructure-and-credential-harvesting-techniques/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/apt-hackers-target-rdp-servers-using-rogue-infrastructure-and-credential-harvesting-techniques/]]></link>
			<title>APT Hackers Target RDP Servers Using Rogue Infrastructure and Credential Harvesting Techniques</title>
			<pubDate><![CDATA[Wed, 25 Mar 2026 20:44:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/blog-cisco-firewall-vulnerability-threatens-network-security/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/blog-cisco-firewall-vulnerability-threatens-network-security/]]></link>
			<title>Cisco Firewall Vulnerability Threatens Network Security</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 11:08:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/qnap-qvr-pro-vulnerability-could-allow-attackers-to-execute-commands-and-access-surveillance-systems/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/qnap-qvr-pro-vulnerability-could-allow-attackers-to-execute-commands-and-access-surveillance-systems/]]></link>
			<title>QNAP QVR Pro Vulnerability Could Allow Attackers to Execute Commands and Access Surveillance Systems</title>
			<pubDate><![CDATA[Tue, 24 Mar 2026 20:44:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/blog-github-copilot-exploited-by-hackers-and-what-developers-must-do-to-secure-ai-powered-tools/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/blog-github-copilot-exploited-by-hackers-and-what-developers-must-do-to-secure-ai-powered-tools/]]></link>
			<title>GitHub Copilot Exploited by Hackers and What Developers Must Do to Secure AI-Powered Tools</title>
			<pubDate><![CDATA[Wed, 25 Feb 2026 12:11:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/]]></link>
			<title>Home</title>
			<pubDate><![CDATA[Mon, 16 Mar 2026 05:52:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/chinese-apt-campaign-targets-qatar-with-plugx-malware-lures-in-cyber-espionage-operation-2/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/chinese-apt-campaign-targets-qatar-with-plugx-malware-lures-in-cyber-espionage-operation-2/]]></link>
			<title>Chinese APT Campaign Targets Qatar With PlugX Malware Lures in Cyber Espionage Operation</title>
			<pubDate><![CDATA[Wed, 11 Mar 2026 20:44:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/blog-microsoft-february-2026-patch-tuesday-addresses-54-security-flaws-including-critical-cves/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/blog-microsoft-february-2026-patch-tuesday-addresses-54-security-flaws-including-critical-cves/]]></link>
			<title>Microsoft February 2026 Patch Tuesday Addresses 54 Security Flaws Including Critical CVEs</title>
			<pubDate><![CDATA[Wed, 11 Feb 2026 15:05:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/blog-aws-global-service-outage-disrupts-cloud-infrastructure-and-exposes-critical-dependency-risks/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/blog-aws-global-service-outage-disrupts-cloud-infrastructure-and-exposes-critical-dependency-risks/]]></link>
			<title>AWS Global Service Outage Disrupts Cloud Infrastructure and Exposes Critical Dependency Risks</title>
			<pubDate><![CDATA[Wed, 04 Mar 2026 10:16:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/blog-openclaw-zero-click-vulnerability-raises-concerns-for-mobile-and-messaging-security/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/blog-openclaw-zero-click-vulnerability-raises-concerns-for-mobile-and-messaging-security/]]></link>
			<title>OpenClaw Zero Click Vulnerability Raises Concerns for Mobile and Messaging Security</title>
			<pubDate><![CDATA[Wed, 04 Mar 2026 09:51:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/blog-phishing-campaign-exploiting-oauth-authentication-targets-enterprise-accounts/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/blog-phishing-campaign-exploiting-oauth-authentication-targets-enterprise-accounts/]]></link>
			<title>Phishing Campaign Exploiting OAuth Authentication Targets Enterprise Accounts</title>
			<pubDate><![CDATA[Wed, 04 Mar 2026 09:31:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/blog-cisco-sd-wan-0-day-vulnerability-exposes-enterprise-networking-risk/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/blog-cisco-sd-wan-0-day-vulnerability-exposes-enterprise-networking-risk/]]></link>
			<title>Cisco SD-WAN 0-Day Vulnerability Exposes Enterprise Networking Risk</title>
			<pubDate><![CDATA[Thu, 26 Feb 2026 14:04:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/penetration-testing/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/penetration-testing/]]></link>
			<title>Penetration Testing</title>
			<pubDate><![CDATA[Mon, 16 Mar 2026 20:01:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/windows-remote-desktop-services-0-day-vulnerability-allows-attackers-to-escalate-privileges/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/windows-remote-desktop-services-0-day-vulnerability-allows-attackers-to-escalate-privileges/]]></link>
			<title>Windows Remote Desktop Services 0-Day Vulnerability Allows Attackers to Escalate Privileges</title>
			<pubDate><![CDATA[Mon, 09 Mar 2026 12:38:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/penetration-testing2/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/penetration-testing2/]]></link>
			<title>Penetration Testing2</title>
			<pubDate><![CDATA[Fri, 13 Mar 2026 21:58:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/penetration-testing-old/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/penetration-testing-old/]]></link>
			<title>Penetration Testing old</title>
			<pubDate><![CDATA[Fri, 06 Mar 2026 15:37:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/hpe-autopass-vulnerability-could-allow-attackers-to-bypass-network-security-controls/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/hpe-autopass-vulnerability-could-allow-attackers-to-bypass-network-security-controls/]]></link>
			<title>HPE AutoPass Vulnerability Could Allow Attackers to Bypass Network Security Controls</title>
			<pubDate><![CDATA[Wed, 04 Mar 2026 09:23:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/blog-openai-confirms-chinese-hackers-used-chatgpt-in-cyberattacks-and-what-this-means-for-ai-security/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/blog-openai-confirms-chinese-hackers-used-chatgpt-in-cyberattacks-and-what-this-means-for-ai-security/]]></link>
			<title>OpenAI Confirms Chinese Hackers Used ChatGPT in Cyberattacks and What This Means for AI Security</title>
			<pubDate><![CDATA[Thu, 26 Feb 2026 14:02:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/blog-fortios-ldap-authentication-bypass-vulnerability-raises-enterprise-security-concerns/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/blog-fortios-ldap-authentication-bypass-vulnerability-raises-enterprise-security-concerns/]]></link>
			<title>FortiOS LDAP Authentication Bypass Vulnerability Raises Enterprise Security Concerns</title>
			<pubDate><![CDATA[Wed, 11 Feb 2026 14:57:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/podcast/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/podcast/]]></link>
			<title>Podcast</title>
			<pubDate><![CDATA[Tue, 03 Mar 2026 17:23:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/blog-cloudflare-down-six-hours-in-massive-global-service-outage-and-what-this-means-for-digital-resilience/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/blog-cloudflare-down-six-hours-in-massive-global-service-outage-and-what-this-means-for-digital-resilience/]]></link>
			<title>Cloudflare Down Six Hours in Massive Global Service Outage and What This Means for Digital Resilience</title>
			<pubDate><![CDATA[Mon, 23 Feb 2026 20:46:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/blog-microsoft-mfa-outage-disrupts-sign-in-services-and-what-it-means-for-enterprise-security/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/blog-microsoft-mfa-outage-disrupts-sign-in-services-and-what-it-means-for-enterprise-security/]]></link>
			<title>Microsoft MFA Outage Disrupts Sign-In Services and What It Means for Enterprise Security</title>
			<pubDate><![CDATA[Mon, 23 Feb 2026 20:28:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/blog-hackers-abuse-free-firebase-developer-accounts-for-malicious-campaigns/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/blog-hackers-abuse-free-firebase-developer-accounts-for-malicious-campaigns/]]></link>
			<title>Hackers Abuse Free Firebase Developer Accounts for Malicious Campaigns</title>
			<pubDate><![CDATA[Mon, 09 Feb 2026 04:39:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/blog-cisa-updates-guidance-on-removing-edge-devices-from-critical-infrastructure-lists-and-what-organisations-must-know/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/blog-cisa-updates-guidance-on-removing-edge-devices-from-critical-infrastructure-lists-and-what-organisations-must-know/]]></link>
			<title>CISA Updates Guidance on Removing Edge Devices From Critical Infrastructure Lists and What Organisations Must Know</title>
			<pubDate><![CDATA[Sat, 07 Feb 2026 15:43:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/blog-bridgepay-ransomware-attack-exposes-payment-platform-vulnerabilities/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/blog-bridgepay-ransomware-attack-exposes-payment-platform-vulnerabilities/]]></link>
			<title>Bridgepay Ransomware Attack Exposes Payment Platform Vulnerabilities and What Organisations Must Do to Protect Their Systems</title>
			<pubDate><![CDATA[Mon, 09 Feb 2026 04:08:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/blog-google-api-keys-exposed-in-gemini-and-what-this-means-for-cloud-security/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/blog-google-api-keys-exposed-in-gemini-and-what-this-means-for-cloud-security/]]></link>
			<title>Google API Keys Exposed in Gemini and What This Means for Cloud Security</title>
			<pubDate><![CDATA[Fri, 27 Feb 2026 13:32:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/blog-cisa-warns-of-forticloud-sso-authentication-bypass-vulnerability-actively-exploited-in-the-wild/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/blog-cisa-warns-of-forticloud-sso-authentication-bypass-vulnerability-actively-exploited-in-the-wild/]]></link>
			<title>CISA Warns of FortiCloud SSO Authentication Bypass Vulnerability Actively Exploited in the Wild</title>
			<pubDate><![CDATA[Fri, 06 Feb 2026 09:52:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/blog-f5-patches-critical-vulnerabilities-in-big-ip/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/blog-f5-patches-critical-vulnerabilities-in-big-ip/]]></link>
			<title>F5 Patches Critical Vulnerabilities in BIG-IP and What Organisations Must Do to Secure Their Networks</title>
			<pubDate><![CDATA[Fri, 06 Feb 2026 09:51:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/blog-vmware-esxi-zero-day-ransomware-attack-and-how-organisations-can-secure-their-servers/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/blog-vmware-esxi-zero-day-ransomware-attack-and-how-organisations-can-secure-their-servers/]]></link>
			<title>VMware ESXi Zero-Day Ransomware Attack and How Organisations Can Secure Their Servers</title>
			<pubDate><![CDATA[Thu, 05 Feb 2026 10:09:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/blog/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/blog/]]></link>
			<title>Blog</title>
			<pubDate><![CDATA[Fri, 13 Mar 2026 12:35:32 +0000]]></pubDate>
		</item>
				</channel>
</rss>
