<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on May 23, 2026 at 8:22 pm by All in One SEO v4.9.7.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://digitalwarfare.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Digital Warfare</title>
		<link><![CDATA[https://digitalwarfare.com]]></link>
		<description><![CDATA[Digital Warfare]]></description>
		<lastBuildDate><![CDATA[Tue, 21 Apr 2026 21:46:53 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://digitalwarfare.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://digitalwarfare.com/blog/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/blog/]]></link>
			<title>Blog</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 21:46:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/]]></link>
			<title>Home</title>
			<pubDate><![CDATA[Thu, 21 May 2026 17:44:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/github-data-breach-supply-chain-risks/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/github-data-breach-supply-chain-risks/]]></link>
			<title>GitHub Data Breach Exposes Growing Software Supply Chain Risks</title>
			<pubDate><![CDATA[Wed, 20 May 2026 08:41:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/penetration-testing/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/penetration-testing/]]></link>
			<title>Penetration Testing</title>
			<pubDate><![CDATA[Thu, 21 May 2026 17:37:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/nginx-rce-vulnerability-exploited-in-widespread-web-server-attacks/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/nginx-rce-vulnerability-exploited-in-widespread-web-server-attacks/]]></link>
			<title>NGINX RCE Vulnerability Exploited in Widespread Web Server Attacks</title>
			<pubDate><![CDATA[Tue, 19 May 2026 07:50:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/claude-code-sandbox-escape-vulnerability-allows-remote-code-execution/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/claude-code-sandbox-escape-vulnerability-allows-remote-code-execution/]]></link>
			<title>Claude Code Sandbox Escape Vulnerability Allows Remote Code Execution</title>
			<pubDate><![CDATA[Thu, 21 May 2026 08:52:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/windows-bitlocker-zero-day-vulnerability-exposes-enterprise-security-risks/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/windows-bitlocker-zero-day-vulnerability-exposes-enterprise-security-risks/]]></link>
			<title>Windows BitLocker Zero Day Vulnerability Exposes Enterprise Security Risks</title>
			<pubDate><![CDATA[Thu, 14 May 2026 14:20:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/foxconn-cyberattack-exposes-major-supply-chain-security-risks/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/foxconn-cyberattack-exposes-major-supply-chain-security-risks/]]></link>
			<title>Foxconn Cyberattack Exposes Major Supply Chain Security Risks</title>
			<pubDate><![CDATA[Thu, 14 May 2026 13:51:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/teampcp-compromises-checkmarx-jenkins-plugin-in-supply-chain-attack/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/teampcp-compromises-checkmarx-jenkins-plugin-in-supply-chain-attack/]]></link>
			<title>TeamPCP Compromises Checkmarx Jenkins Plugin in Supply Chain Attack</title>
			<pubDate><![CDATA[Thu, 14 May 2026 13:26:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/grafana-labs-security-breach-exposes-critical-monitoring-risks/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/grafana-labs-security-breach-exposes-critical-monitoring-risks/]]></link>
			<title>Grafana Labs Security Breach Exposes Critical Monitoring Risks</title>
			<pubDate><![CDATA[Sun, 17 May 2026 19:00:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/nvidia-geforce-now-breach-exposes-user-data/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/nvidia-geforce-now-breach-exposes-user-data/]]></link>
			<title>NVIDIA GeForce NOW Breach Exposes User Data</title>
			<pubDate><![CDATA[Sun, 10 May 2026 19:02:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/f5-big-ip-exploited-for-ssh-access-and-enterprise-network-compromise/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/f5-big-ip-exploited-for-ssh-access-and-enterprise-network-compromise/]]></link>
			<title>F5 BIG IP Exploited for SSH Access and Enterprise Network Compromise</title>
			<pubDate><![CDATA[Sat, 23 May 2026 20:08:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/shai-hulud-worm-steals-npm-github-aws-and-kubernetes-secrets/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/shai-hulud-worm-steals-npm-github-aws-and-kubernetes-secrets/]]></link>
			<title>Shai Hulud Worm Steals npm, GitHub, AWS, and Kubernetes Secrets</title>
			<pubDate><![CDATA[Sat, 16 May 2026 19:22:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/fast16-malware-manipulated-nuclear-weapons/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/fast16-malware-manipulated-nuclear-weapons/]]></link>
			<title>FAST16 Malware Manipulated Nuclear Weapons Simulations Before Stuxnet</title>
			<pubDate><![CDATA[Mon, 18 May 2026 08:42:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/node-ipc-npm-package-compromise-sparks-supply-chain-security-fears/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/node-ipc-npm-package-compromise-sparks-supply-chain-security-fears/]]></link>
			<title>Node IPC NPM Package Compromise Sparks Supply Chain Security Fears</title>
			<pubDate><![CDATA[Fri, 15 May 2026 07:15:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/fake-openclaw-installer-spreads-malware/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/fake-openclaw-installer-spreads-malware/]]></link>
			<title>Fake OpenClaw Installer Spreads Malware</title>
			<pubDate><![CDATA[Sat, 09 May 2026 12:18:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/fake-deepseek-tui-repositories-spread-malware/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/fake-deepseek-tui-repositories-spread-malware/]]></link>
			<title>Fake DeepSeek TUI Repositories Spread Malware</title>
			<pubDate><![CDATA[Mon, 11 May 2026 15:41:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/dprk-npm-malware-targets-crypto-developers/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/dprk-npm-malware-targets-crypto-developers/]]></link>
			<title>DPRK npm Malware Targets Crypto Developers</title>
			<pubDate><![CDATA[Thu, 07 May 2026 23:01:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/progress-sharefile-vulnerability-enables-pre-authentication-remote-code-execution-and-server-takeover/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/progress-sharefile-vulnerability-enables-pre-authentication-remote-code-execution-and-server-takeover/]]></link>
			<title>Progress ShareFile Vulnerability Enables Pre Authentication Remote Code Execution and Server Takeover</title>
			<pubDate><![CDATA[Thu, 07 May 2026 22:54:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/etcd-authentication-bypass-flaw-allows-unauthorized-cluster-api-access/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/etcd-authentication-bypass-flaw-allows-unauthorized-cluster-api-access/]]></link>
			<title>etcd Authentication Bypass Flaw Allows Unauthorized Cluster API Access</title>
			<pubDate><![CDATA[Thu, 07 May 2026 22:49:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/google-microsoft-and-meta-tracking-users-despite-opt-out-signals/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/google-microsoft-and-meta-tracking-users-despite-opt-out-signals/]]></link>
			<title>Google, Microsoft and Meta Tracking Users Despite Opt-Out Signals</title>
			<pubDate><![CDATA[Thu, 07 May 2026 22:46:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/blobphish-attack-targets-microsoft-365-logins/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/blobphish-attack-targets-microsoft-365-logins/]]></link>
			<title>BlobPhish Attack Targets Microsoft 365 Logins</title>
			<pubDate><![CDATA[Thu, 07 May 2026 22:44:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/sidewinder-hackers-use-fake-chrome-pdf-viewer-to-steal-credentials/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/sidewinder-hackers-use-fake-chrome-pdf-viewer-to-steal-credentials/]]></link>
			<title>SideWinder Hackers Use Fake Chrome PDF Viewer to Steal Credentials</title>
			<pubDate><![CDATA[Thu, 07 May 2026 22:40:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/claude-security-beta-targets-code-vulnerabilities/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/claude-security-beta-targets-code-vulnerabilities/]]></link>
			<title>Claude Security Beta Targets Code Vulnerabilities</title>
			<pubDate><![CDATA[Thu, 07 May 2026 22:28:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/blog-two-americans-sentenced-for-blackcat-ransomware-attacks-against-u-s-victims/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/blog-two-americans-sentenced-for-blackcat-ransomware-attacks-against-u-s-victims/]]></link>
			<title>Two Americans Sentenced for BlackCat Ransomware Attacks</title>
			<pubDate><![CDATA[Thu, 07 May 2026 22:21:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/pcpjack-malware-targets-cloud-credentials/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/pcpjack-malware-targets-cloud-credentials/]]></link>
			<title>PCPJack Malware Targets Cloud Credentials</title>
			<pubDate><![CDATA[Fri, 08 May 2026 10:20:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/google-appsheet-phishing-hits-facebook-accounts/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/google-appsheet-phishing-hits-facebook-accounts/]]></link>
			<title>Google AppSheet Phishing Hits Facebook Accounts</title>
			<pubDate><![CDATA[Thu, 07 May 2026 22:13:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/lenovo-driver-vulnerability-lets-attackers-kill-edr-and-antivirus-protection/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/lenovo-driver-vulnerability-lets-attackers-kill-edr-and-antivirus-protection/]]></link>
			<title>Lenovo Driver Vulnerability Lets Attackers Kill EDR and Antivirus Protection</title>
			<pubDate><![CDATA[Fri, 22 May 2026 08:57:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/pnpm-11-blocks-risky-new-package-installs/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/pnpm-11-blocks-risky-new-package-installs/]]></link>
			<title>pnpm 11 Blocks Risky New Package Installs</title>
			<pubDate><![CDATA[Thu, 07 May 2026 22:12:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/email-bombing-attacks-fuel-fake-it-support-scams/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/email-bombing-attacks-fuel-fake-it-support-scams/]]></link>
			<title>Email Bombing Attacks Fuel Fake IT Support Scams</title>
			<pubDate><![CDATA[Thu, 07 May 2026 22:10:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/shadow-earth-053-exploits-exchange-servers/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/shadow-earth-053-exploits-exchange-servers/]]></link>
			<title>Shadow Earth 053 Exploits Exchange Servers</title>
			<pubDate><![CDATA[Wed, 06 May 2026 10:41:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/fake-captcha-scam-drives-global-sms-fraud/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/fake-captcha-scam-drives-global-sms-fraud/]]></link>
			<title>Fake CAPTCHA Scam Drives Global SMS Fraud</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 07:43:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/cloudz-rat-abuses-windows-phone-link-otps/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/cloudz-rat-abuses-windows-phone-link-otps/]]></link>
			<title>CloudZ RAT Abuses Windows Phone Link OTPs</title>
			<pubDate><![CDATA[Thu, 07 May 2026 21:43:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/phantomrpc-windows-rpc-flaw-enables-system-access/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/phantomrpc-windows-rpc-flaw-enables-system-access/]]></link>
			<title>PhantomRPC Windows RPC Flaw Enables SYSTEM Access</title>
			<pubDate><![CDATA[Sun, 26 Apr 2026 11:14:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/adt-data-breach-exposes-customer-data-risks/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/adt-data-breach-exposes-customer-data-risks/]]></link>
			<title>ADT Data Breach Exposes Customer Data Risks</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 07:26:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/vibing-exe-microsoft-store-app-raises-data-risk/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/vibing-exe-microsoft-store-app-raises-data-risk/]]></link>
			<title>Vibing.exe Microsoft Store App Raises Data Risk</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 10:07:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/rockstar-games-data-breach-linked-to-shinyhunters-ransom-threat/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/rockstar-games-data-breach-linked-to-shinyhunters-ransom-threat/]]></link>
			<title>Rockstar Games Data Breach Linked to ShinyHunters Ransom Threat</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 15:56:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/mozilla-criticizes-microsoft-copilot-rollout-over-forced-ai-integration/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/mozilla-criticizes-microsoft-copilot-rollout-over-forced-ai-integration/]]></link>
			<title>Mozilla Criticizes Microsoft Copilot Rollout Over Forced AI Integration</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 15:55:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/uac-0247-cyber-campaign-steals-browser-credentials-and-whatsapp-data/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/uac-0247-cyber-campaign-steals-browser-credentials-and-whatsapp-data/]]></link>
			<title>UAC-0247 Cyber Campaign Steals Browser Credentials and WhatsApp Data</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 15:47:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/nexcorium-mirai-variant-exploits-tbk-dvr-flaw-for-iot-ddos-botnet/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/nexcorium-mirai-variant-exploits-tbk-dvr-flaw-for-iot-ddos-botnet/]]></link>
			<title>Nexcorium Mirai Variant Exploits TBK DVR Flaw for IoT DDoS Botnet</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 15:44:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/iranian-mois-hackers-use-fake-personas-for-espionage-and-phishing/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/iranian-mois-hackers-use-fake-personas-for-espionage-and-phishing/]]></link>
			<title>Iranian MOIS Hackers Use Fake Personas for Espionage and Phishing</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 15:41:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/attackers-spread-blockchain-based-backdoor-via-hugging-face-to-compromise-ai-developer-environments/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/attackers-spread-blockchain-based-backdoor-via-hugging-face-to-compromise-ai-developer-environments/]]></link>
			<title>Attackers Spread Blockchain Based Backdoor via Hugging Face to Compromise AI Developer Environments</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 17:23:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/openai-gpt-5-4-cyber-defense-program-expands-ai-driven-security-to-thousands-of-verified-defenders/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/openai-gpt-5-4-cyber-defense-program-expands-ai-driven-security-to-thousands-of-verified-defenders/]]></link>
			<title>OpenAI GPT-5.4 Cyber Defense Program Expands AI Driven Security to Thousands of Verified Defenders</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 14:41:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/cybercriminals-exploit-french-fintech-and-banking-accounts-using-stolen-credentials-to-access-millions-of-records/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/cybercriminals-exploit-french-fintech-and-banking-accounts-using-stolen-credentials-to-access-millions-of-records/]]></link>
			<title>Cybercriminals Exploit French Fintech and Banking Accounts Using Stolen Credentials to Access Millions of Records</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 13:26:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/adobe-reader-zero-day-exploit-uses-malicious-pdfs-to-steal-data-and-enable-full-system-compromise/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/adobe-reader-zero-day-exploit-uses-malicious-pdfs-to-steal-data-and-enable-full-system-compromise/]]></link>
			<title>Adobe Reader Zero Day Exploit Uses Malicious PDFs to Steal Data and Enable Full System Compromise</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 06:03:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/ai-router-vulnerabilities-enable-attackers-to-inject-malicious-code-and-steal-data-from-ai-systems/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/ai-router-vulnerabilities-enable-attackers-to-inject-malicious-code-and-steal-data-from-ai-systems/]]></link>
			<title>AI Router Vulnerabilities Enable Attackers to Inject Malicious Code and Steal Data from AI Systems</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 05:53:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/ransomware-gangs-expand-use-of-edr-killers-to-disable-security-before-encryption-attacks/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/ransomware-gangs-expand-use-of-edr-killers-to-disable-security-before-encryption-attacks/]]></link>
			<title>Ransomware Gangs Expand Use of EDR Killers to Disable Security Before Encryption Attacks</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 05:32:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/fake-github-repositories-deliver-smartloader-and-stealc-malware/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/fake-github-repositories-deliver-smartloader-and-stealc-malware/]]></link>
			<title>Fake GitHub Repositories Deliver SmartLoader and StealC Malware</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 15:35:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/cisco-firewall-breach-shows-how-firestarter-malware-can-survive-patching-and-keep-attackers-inside-critical-networks/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/cisco-firewall-breach-shows-how-firestarter-malware-can-survive-patching-and-keep-attackers-inside-critical-networks/]]></link>
			<title>Cisco Firewall Breach Shows How FIRESTARTER Malware Survives Patching</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 15:31:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://digitalwarfare.com/storm-2755-aitm-session-hijacking-campaign-shows-how-payroll-attacks-are-bypassing-traditional-mfa/]]></guid>
			<link><![CDATA[https://digitalwarfare.com/storm-2755-aitm-session-hijacking-campaign-shows-how-payroll-attacks-are-bypassing-traditional-mfa/]]></link>
			<title>Storm-2755 AiTM Session Hijacking Campaign Shows How Payroll Attacks Are Bypassing Traditional MFA</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 15:14:00 +0000]]></pubDate>
		</item>
				</channel>
</rss>
