<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 4, 2026 at 3:43 pm by All in One SEO v4.9.3 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://thecybersecurity.network/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>The Cyber Security Network</title>
		<link><![CDATA[https://thecybersecurity.network]]></link>
		<description><![CDATA[The Cyber Security Network]]></description>
		<lastBuildDate><![CDATA[Sat, 04 Apr 2026 14:40:24 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://thecybersecurity.network/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://thecybersecurity.network/abusing-trusted-tools-the-new-frontier-of-cyber-threats/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/abusing-trusted-tools-the-new-frontier-of-cyber-threats/]]></link>
			<title>Abusing Trusted Tools: The New Frontier of Cyber Threats</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 14:40:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/anthropic-confirms-claude-code-source-leak-due-to-npm-packaging-mistake/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/anthropic-confirms-claude-code-source-leak-due-to-npm-packaging-mistake/]]></link>
			<title>Anthropic Confirms Claude Code Source Leak Due to npm Packaging Mistake</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 14:33:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/claude-code-source-leak-anthropic-confirms-human-error-led-to-exposure/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/claude-code-source-leak-anthropic-confirms-human-error-led-to-exposure/]]></link>
			<title>Claude Code Source Leak: Anthropic Confirms Human Error Led to Exposure</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 14:33:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/abusing-trusted-tools-the-new-cyber-threat-landscape/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/abusing-trusted-tools-the-new-cyber-threat-landscape/]]></link>
			<title>Abusing Trusted Tools: The New Cyber Threat Landscape</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 14:32:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/the-decline-of-overly-restrictive-security-measures-moving-beyond-doctor-no/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/the-decline-of-overly-restrictive-security-measures-moving-beyond-doctor-no/]]></link>
			<title>The Decline of Overly Restrictive Security Measures: Moving Beyond &#8216;Doctor No&#8217;</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 14:20:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/trusted-tools-exploited-3-reasons-attackers-are-using-them-against-you/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/trusted-tools-exploited-3-reasons-attackers-are-using-them-against-you/]]></link>
			<title>Trusted Tools Exploited: 3 Reasons Attackers Are Using Them Against You</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 14:13:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/attackers-are-using-your-trusted-tools-against-you-3-key-reasons/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/attackers-are-using-your-trusted-tools-against-you-3-key-reasons/]]></link>
			<title>Attackers Are Using Your Trusted Tools Against You: 3 Key Reasons</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 14:13:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/the-evolution-of-security-beyond-the-doctor-no-approach/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/the-evolution-of-security-beyond-the-doctor-no-approach/]]></link>
			<title>The Evolution of Security: Beyond the &#8216;Doctor No&#8217; Approach</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 14:12:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/new-whatsapp-based-malware-campaign-targets-windows-users-with-uac-bypass/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/new-whatsapp-based-malware-campaign-targets-windows-users-with-uac-bypass/]]></link>
			<title>New WhatsApp-Based Malware Campaign Targets Windows Users with UAC Bypass</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 14:00:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/the-evolution-of-security-from-doctor-no-to-enabling-innovation/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/the-evolution-of-security-from-doctor-no-to-enabling-innovation/]]></link>
			<title>The Evolution of Security: From &#8216;Doctor No&#8217; to Enabling Innovation</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 13:53:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/the-rise-of-permissive-security-moving-beyond-the-culture-of-no/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/the-rise-of-permissive-security-moving-beyond-the-culture-of-no/]]></link>
			<title>The Rise of Permissive Security: Moving Beyond the Culture of &#8216;No&#8217;</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 13:53:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cisco-patches-critical-imc-and-ssm-security-flaws-with-9-8-cvss-score/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cisco-patches-critical-imc-and-ssm-security-flaws-with-9-8-cvss-score/]]></link>
			<title>Cisco Patches Critical IMC and SSM Security Flaws with 9.8 CVSS Score</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 13:52:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/north-korean-hackers-unc1069-use-social-engineering-to-breach-axios-npm-package-3/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/north-korean-hackers-unc1069-use-social-engineering-to-breach-axios-npm-package-3/]]></link>
			<title>North Korean Hackers UNC1069 Use Social Engineering to Breach Axios npm Package</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 12:40:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/php-web-shells-on-linux-servers-a-new-threat-via-http-cookies/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/php-web-shells-on-linux-servers-a-new-threat-via-http-cookies/]]></link>
			<title>PHP Web Shells on Linux Servers: A New Threat via HTTP Cookies</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 12:20:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/china-linked-ta416-targets-european-governments-with-sophisticated-malware-and-phishing-tactics-3/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/china-linked-ta416-targets-european-governments-with-sophisticated-malware-and-phishing-tactics-3/]]></link>
			<title>China-Linked TA416 Targets European Governments with Sophisticated Malware and Phishing Tactics</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 12:00:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/npm-supply-chain-attack-axios-maintainer-targeted-by-unc1069/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/npm-supply-chain-attack-axios-maintainer-targeted-by-unc1069/]]></link>
			<title>Npm Supply Chain Attack: Axios Maintainer Targeted by UNC1069</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 10:40:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cookie-controlled-php-web-shells-a-new-threat-to-linux-servers-4/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cookie-controlled-php-web-shells-a-new-threat-to-linux-servers-4/]]></link>
			<title>Cookie-Controlled PHP Web Shells: A New Threat to Linux Servers</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 10:20:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/china-linked-threat-actor-targets-european-governments-with-sophisticated-phishing-campaign/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/china-linked-threat-actor-targets-european-governments-with-sophisticated-phishing-campaign/]]></link>
			<title>China-Linked Threat Actor Targets European Governments with Sophisticated Phishing Campaign</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 10:00:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/north-korean-hackers-unc1069-use-social-engineering-to-breach-axios-npm-package-2/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/north-korean-hackers-unc1069-use-social-engineering-to-breach-axios-npm-package-2/]]></link>
			<title>North Korean Hackers UNC1069 Use Social Engineering to Breach Axios npm Package</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 08:40:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/microsoft-exposes-cookie-controlled-php-web-shells-on-linux-servers-4/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/microsoft-exposes-cookie-controlled-php-web-shells-on-linux-servers-4/]]></link>
			<title>Microsoft Exposes Cookie-Controlled PHP Web Shells on Linux Servers</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 08:20:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/china-linked-ta416-targets-european-governments-with-advanced-malware-and-phishing-tactics-2/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/china-linked-ta416-targets-european-governments-with-advanced-malware-and-phishing-tactics-2/]]></link>
			<title>China-Linked TA416 Targets European Governments with Advanced Malware and Phishing Tactics</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 08:00:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/axios-npm-package-hit-by-unc1069-social-engineering-attack/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/axios-npm-package-hit-by-unc1069-social-engineering-attack/]]></link>
			<title>Axios npm Package Hit by UNC1069 Social Engineering Attack</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 06:40:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/microsoft-warns-of-sneaky-cookie-controlled-php-web-shells-on-linux-servers/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/microsoft-warns-of-sneaky-cookie-controlled-php-web-shells-on-linux-servers/]]></link>
			<title>Microsoft Warns of Sneaky Cookie-Controlled PHP Web Shells on Linux Servers</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 06:20:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/china-linked-ta416-targets-european-governments-with-sophisticated-malware-and-phishing-campaigns-3/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/china-linked-ta416-targets-european-governments-with-sophisticated-malware-and-phishing-campaigns-3/]]></link>
			<title>China-Linked TA416 Targets European Governments with Sophisticated Malware and Phishing Campaigns</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 06:00:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/north-korean-hackers-unc1069-use-social-engineering-to-breach-axios-npm-package/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/north-korean-hackers-unc1069-use-social-engineering-to-breach-axios-npm-package/]]></link>
			<title>North Korean Hackers UNC1069 Use Social Engineering to Breach Axios npm Package</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 04:40:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cookie-controlled-php-web-shells-a-new-threat-to-linux-servers-3/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cookie-controlled-php-web-shells-a-new-threat-to-linux-servers-3/]]></link>
			<title>Cookie-Controlled PHP Web Shells: A New Threat to Linux Servers</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 04:20:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/china-linked-ta416-targets-european-governments-with-sophisticated-malware-and-phishing-tactics-2/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/china-linked-ta416-targets-european-governments-with-sophisticated-malware-and-phishing-tactics-2/]]></link>
			<title>China-Linked TA416 Targets European Governments with Sophisticated Malware and Phishing Tactics</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 04:00:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/north-korean-hackers-unc1069-use-social-engineering-to-breach-npm-package-axios/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/north-korean-hackers-unc1069-use-social-engineering-to-breach-npm-package-axios/]]></link>
			<title>North Korean Hackers UNC1069 Use Social Engineering to Breach npm Package Axios</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 02:40:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cookie-controlled-php-web-shells-a-new-threat-to-linux-servers-2/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cookie-controlled-php-web-shells-a-new-threat-to-linux-servers-2/]]></link>
			<title>Cookie-Controlled PHP Web Shells: A New Threat to Linux Servers</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 02:20:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/china-linked-ta416-targets-european-governments-with-advanced-malware-and-phishing-tactics/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/china-linked-ta416-targets-european-governments-with-advanced-malware-and-phishing-tactics/]]></link>
			<title>China-Linked TA416 Targets European Governments with Advanced Malware and Phishing Tactics</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 02:00:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/north-korean-hackers-target-axios-maintainer-in-sophisticated-social-engineering-attack/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/north-korean-hackers-target-axios-maintainer-in-sophisticated-social-engineering-attack/]]></link>
			<title>North Korean Hackers Target Axios Maintainer in Sophisticated Social Engineering Attack</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 00:40:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/microsoft-exposes-cookie-controlled-php-web-shells-on-linux-servers-3/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/microsoft-exposes-cookie-controlled-php-web-shells-on-linux-servers-3/]]></link>
			<title>Microsoft Exposes Cookie-Controlled PHP Web Shells on Linux Servers</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 00:20:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/china-linked-ta416-targets-european-governments-with-sophisticated-malware-and-phishing-tactics/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/china-linked-ta416-targets-european-governments-with-sophisticated-malware-and-phishing-tactics/]]></link>
			<title>China-Linked TA416 Targets European Governments with Sophisticated Malware and Phishing Tactics</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 00:00:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/npm-supply-chain-attack-unc1069-uses-social-engineering-on-axios-maintainer-3/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/npm-supply-chain-attack-unc1069-uses-social-engineering-on-axios-maintainer-3/]]></link>
			<title>npm Supply Chain Attack: UNC1069 Uses Social Engineering on Axios Maintainer</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 22:40:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/microsoft-exposes-cookie-controlled-php-web-shells-on-linux-servers-2/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/microsoft-exposes-cookie-controlled-php-web-shells-on-linux-servers-2/]]></link>
			<title>Microsoft Exposes Cookie-Controlled PHP Web Shells on Linux Servers</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 22:20:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/china-linked-ta416-targets-european-governments-with-sophisticated-phishing-campaigns/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/china-linked-ta416-targets-european-governments-with-sophisticated-phishing-campaigns/]]></link>
			<title>China-Linked TA416 Targets European Governments with Sophisticated Phishing Campaigns</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 22:00:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/axios-npm-package-compromised-by-unc1069-social-engineering-attack/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/axios-npm-package-compromised-by-unc1069-social-engineering-attack/]]></link>
			<title>Axios npm Package Compromised by UNC1069 Social Engineering Attack</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 20:40:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/microsoft-exposes-cookie-controlled-php-web-shells-on-linux-servers/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/microsoft-exposes-cookie-controlled-php-web-shells-on-linux-servers/]]></link>
			<title>Microsoft Exposes Cookie-Controlled PHP Web Shells on Linux Servers</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 20:20:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/china-linked-ta416-targets-european-governments-with-sophisticated-malware-and-phishing-campaigns-2/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/china-linked-ta416-targets-european-governments-with-sophisticated-malware-and-phishing-campaigns-2/]]></link>
			<title>China-Linked TA416 Targets European Governments with Sophisticated Malware and Phishing Campaigns</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 20:00:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/npm-supply-chain-attack-unc1069-uses-social-engineering-to-compromise-axios/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/npm-supply-chain-attack-unc1069-uses-social-engineering-to-compromise-axios/]]></link>
			<title>NPM Supply Chain Attack: UNC1069 Uses Social Engineering to Compromise Axios</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 18:40:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cookie-controlled-php-web-shells-a-new-threat-to-linux-servers/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cookie-controlled-php-web-shells-a-new-threat-to-linux-servers/]]></link>
			<title>Cookie-Controlled PHP Web Shells: A New Threat to Linux Servers</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 18:20:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/china-linked-ta416-targets-european-governments-with-sophisticated-malware-and-phishing-campaigns/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/china-linked-ta416-targets-european-governments-with-sophisticated-malware-and-phishing-campaigns/]]></link>
			<title>China-Linked TA416 Targets European Governments with Sophisticated Malware and Phishing Campaigns</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 18:00:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/new-sparkcat-malware-variant-targets-ios-and-android-devices-to-steal-crypto-wallet-recovery-phrases/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/new-sparkcat-malware-variant-targets-ios-and-android-devices-to-steal-crypto-wallet-recovery-phrases/]]></link>
			<title>New SparkCat Malware Variant Targets iOS and Android Devices to Steal Crypto Wallet Recovery Phrases</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 16:40:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/third-party-risk-the-hidden-gap-in-client-security-posture/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/third-party-risk-the-hidden-gap-in-client-security-posture/]]></link>
			<title>Third-Party Risk: The Hidden Gap in Client Security Posture</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 16:20:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/npm-supply-chain-attack-unc1069-uses-social-engineering-on-axios-maintainer-2/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/npm-supply-chain-attack-unc1069-uses-social-engineering-on-axios-maintainer-2/]]></link>
			<title>NPM Supply Chain Attack: UNC1069 Uses Social Engineering on Axios Maintainer</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 16:00:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/new-sparkcat-malware-variant-targets-ios-and-android-devices-to-steal-crypto-wallets-2/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/new-sparkcat-malware-variant-targets-ios-and-android-devices-to-steal-crypto-wallets-2/]]></link>
			<title>New SparkCat Malware Variant Targets iOS and Android Devices to Steal Crypto Wallets</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 14:40:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/closing-the-third-party-risk-gap-a-crucial-step-in-enhancing-client-security/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/closing-the-third-party-risk-gap-a-crucial-step-in-enhancing-client-security/]]></link>
			<title>Closing the Third-Party Risk Gap: A Crucial Step in Enhancing Client Security</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 14:20:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/npm-supply-chain-attack-unc1069-uses-social-engineering-on-axios-maintainer/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/npm-supply-chain-attack-unc1069-uses-social-engineering-on-axios-maintainer/]]></link>
			<title>npm Supply Chain Attack: UNC1069 Uses Social Engineering on Axios Maintainer</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 14:00:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/hackers-breach-766-next-js-hosts-using-cve-2025-55182-a-large-scale-credential-harvesting-operation-2/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/hackers-breach-766-next-js-hosts-using-cve-2025-55182-a-large-scale-credential-harvesting-operation-2/]]></link>
			<title>Hackers Breach 766 Next.js Hosts Using CVE-2025-55182: A Large-Scale Credential Harvesting Operation</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 12:40:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/new-sparkcat-malware-variant-targets-ios-and-android-users-crypto-wallets/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/new-sparkcat-malware-variant-targets-ios-and-android-users-crypto-wallets/]]></link>
			<title>New SparkCat Malware Variant Targets iOS and Android Users&#8217; Crypto Wallets</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 12:00:23 +0000]]></pubDate>
		</item>
				</channel>
</rss>
