<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url><loc>https://privacytoday.ai/index.html</loc></url>
  <url><loc>https://privacytoday.ai/rss.xml</loc></url>
  <url><loc>https://privacytoday.ai/about.html</loc></url>
  <url><loc>https://privacytoday.ai/editorial.html</loc></url>
  <url><loc>https://privacytoday.ai/contact.html</loc></url>
  <url><loc>https://privacytoday.ai/categories/AI &amp; Deepfakes.html</loc></url>
  <url><loc>https://privacytoday.ai/categories/Advisories.html</loc></url>
  <url><loc>https://privacytoday.ai/categories/Data Breach.html</loc></url>
  <url><loc>https://privacytoday.ai/categories/Enterprise.html</loc></url>
  <url><loc>https://privacytoday.ai/categories/Privacy.html</loc></url>
  <url><loc>https://privacytoday.ai/categories/Ransomware.html</loc></url>
  <url><loc>https://privacytoday.ai/categories/Threats.html</loc></url>
  <url><loc>https://privacytoday.ai/categories/Vulnerabilities.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-08-01-black-hat-usa-d9b74f.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-05-36-malicious-npm-packages-exploited-redis-postgresql-to-deploy-persistent-impla-df3b36.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-05-fortinet-patches-actively-exploited-cve-2026-35616-in-forticlient-ems-701722.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-04-axios-npm-hack-used-fake-teams-error-fix-to-hijack-maintainer-account-261485.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-04-device-code-phishing-attacks-surge-37x-as-new-kits-spread-online-fd1efd.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-04-european-commission-confirms-data-breach-linked-to-trivy-supply-chain-attack-73cbc6.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-03-friday-squid-blogging-jurassic-fish-chokes-on-squid-0dd042.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-03-inconsistent-privacy-labels-dont-tell-users-what-they-are-getting-d24a46.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-03-linkedin-secretly-scans-for-6000-chrome-extensions-collects-data-a8f6e6.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-03-linkedin-secretely-scans-for-6000-chrome-extensions-collects-data-bada94.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-03-hims-hers-warns-of-data-breach-after-zendesk-support-ticket-breach-2cec08.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-03-china-linked-ta416-targets-european-governments-with-plugx-and-oauth-based-phis-8e62f2.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-03-apple-breaks-precedent-patches-darksword-for-ios-18-acda18.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-03-die-linke-german-political-party-confirms-data-stolen-by-qilin-ransomware-68e65f.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-03-microsoft-details-cookie-controlled-php-web-shells-persisting-via-cron-on-linux-d246d7.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-03-blast-radius-of-teampcp-attacks-expands-amid-hacker-infighting-4f7861.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-03-evolution-of-ransomware-multi-extortion-ransomware-attacks-6ae826.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-03-picking-up-skull-vibrations-could-be-xr-headset-authentication-7f9d43.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-03-claude-source-code-leak-highlights-big-supply-chain-missteps-237e5a.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-03-chainguard-unveils-factory-20-to-automate-hardening-the-software-supply-chain-ffe942.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-03-trueconf-zero-day-exploited-in-asian-government-attacks-f35c56.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-03-in-other-news-chatgpt-data-leak-android-rootkit-water-facility-hit-by-ransomwar-41ae38.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-03-critical-sharefile-flaws-lead-to-unauthenticated-rce-9c472a.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-03-crowdstrike-next-gen-siem-can-now-ingest-microsoft-defender-telemetry-f17160.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-03-microsoft-still-working-to-fix-exchange-online-mailbox-access-issues-0c9650.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-03-company-that-secretly-records-and-publishes-zoom-meetings-f6a83b.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-03-unc1069-social-engineering-of-axios-maintainer-led-to-npm-supply-chain-attack-e3ffa6.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-03-mobile-attack-surface-expands-as-enterprises-lose-control-e89ebb.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-03-why-third-party-risk-is-the-biggest-gap-in-your-clients-security-posture-e40d3e.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-03-react2shell-exploited-in-large-scale-credential-harvesting-campaign-8f581e.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-03-t-mobile-sets-the-record-straight-on-latest-data-breach-filing-7158ae.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-03-north-korean-hackers-drain-285-million-from-drift-in-10-seconds-d49385.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-03-new-sparkcat-variant-in-ios-android-apps-steals-crypto-wallet-recovery-phrase-i-e22064.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-03-man-admits-to-locking-thousands-of-windows-devices-in-extortion-plot-234d1e.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-03-drift-loses-285-million-in-durable-nonce-social-engineering-attack-linked-to-dp-eb831c.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-03-microsoft-now-force-upgrades-unmanaged-windows-11-24h2-pcs-a9393f.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-03-cert-eu-european-commission-hack-exposes-data-of-30-eu-entities-366e27.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-02-geopolitics-ai-and-cybersecurity-insights-from-rsac-2026-84f57b.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-02-claude-code-leak-used-to-push-infostealer-malware-on-github-2b6ceb.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-02-not-toying-around-hasbro-attack-may-take-weeks-to-remediate-7fb31a.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-02-hackers-exploit-cve-2025-55182-to-breach-766-nextjs-hosts-steal-credentials-7e67d1.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-02-security-bosses-are-all-in-on-ai-heres-why-43ec2f.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-02-drift-loses-280-million-as-north-korean-hackers-seize-security-council-powers-3b14e7.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-02-drift-loses-280-million-north-korean-hackers-seize-security-council-powers-3c19d5.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-02-critical-vulnerability-in-claude-code-emerges-days-after-source-leak-86696f.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-02-us-bans-all-foreign-made-consumer-routers-4f558a.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-02-apple-rolls-out-darksword-exploit-protection-to-more-devices-7bf8ff.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-02-rsac-2026-ai-dominates-but-community-remains-key-to-security-94c874.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-02-residential-proxies-evaded-ip-reputation-checks-in-78-of-4b-sessions-f342d3.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-02-cisco-patches-98-cvss-imc-and-ssm-flaws-allowing-remote-system-compromise-505262.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-02-adversaries-exploit-vacant-homes-to-intercept-mail-in-hybrid-cybercrime-846ed4.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-02-new-progress-sharefile-flaws-can-be-chained-in-pre-auth-rce-attacks-1a542d.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-02-medtech-giant-stryker-fully-operational-after-data-wiping-attack-b85e5e.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-02-bank-trojan-casbaneiro-worms-through-latin-america-152be0.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-02-threatsday-bulletin-pre-auth-chains-android-rootkits-cloudtrail-evasion-10-more-5ab5a0.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-02-researchers-uncover-mining-operation-using-iso-lures-to-spread-rats-and-crypto--85838c.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-02-the-state-of-trusted-open-source-report-38a5f6.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-02-critical-cisco-imc-auth-bypass-gives-attackers-admin-access-5026c5.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-02-possible-us-government-iphone-hacking-tool-leaked-59bbdb.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-02-whatsapp-alerts-200-users-after-fake-ios-app-installed-spyware-italian-firm-fac-71299f.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-02-microsoft-links-classic-outlook-issue-to-email-delivery-problems-9677c8.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-02-over-14000-f5-big-ip-apm-instances-still-exposed-to-rce-attacks-3c3984.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-02-apple-expands-ios-1877-update-to-more-devices-to-block-darksword-exploit-d73067.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-01-new-crystalrat-malware-adds-rat-stealer-and-prankware-features-e5e33b.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-01-ransomware-will-hit-hospitals-rehearsals-are-key-to-defense-27f492.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-01-apple-expands-ios-18-updates-to-more-iphones-to-block-darksword-attacks-00a2c0.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-01-hackers-exploit-trueconf-zero-day-to-push-malicious-software-updates-0571b5.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-01-new-eviltokens-service-fuels-microsoft-device-code-phishing-attacks-357a3a.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-01-latams-self-taught-cyber-talent-overlooked-amid-cyberattack-glut-01a908.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-01-novoice-android-malware-on-google-play-infected-23-million-devices-8cdd7d.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-01-is-hackback-official-us-cybersecurity-strategy-88a604.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-01-cyberattacks-intensify-pressure-on-latin-american-governments-c1f42f.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-01-cert-ua-impersonation-campaign-spread-agewheeze-malware-to-1-million-emails-479a8e.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-01-venom-stealer-maas-platform-commoditizes-clickfix-attacks-9a3d2a.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-01-microsoft-warns-of-whatsapp-delivered-vbs-malware-hijacking-windows-via-uac-byp-8e1a3d.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-01-routine-access-is-powering-modern-intrusions-a-new-threat-report-finds-a3cab6.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-01-block-the-prompt-not-the-work-the-end-of-doctor-no-229690.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-01-casbaneiro-phishing-targets-latin-america-and-europe-using-dynamic-pdf-lures-92ac66.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-01-new-chrome-zero-day-cve-2026-5281-under-active-exploitation-patch-released-e53940.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-01-fbi-warns-against-using-chinese-mobile-apps-due-to-privacy-risks-9463c1.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-01-3-reasons-attackers-are-using-your-trusted-tools-against-you-and-why-you-dont-s-df4ea1.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-01-are-we-training-ai-too-late-ad798e.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-01-google-fixes-fourth-chrome-zero-day-exploited-in-attacks-in-2026-0a9164.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-01-a-taxonomy-of-cognitive-security-356f29.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-01-google-attributes-axios-npm-supply-chain-attack-to-north-korean-group-unc1069-e79f90.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-01-google-drive-ransomware-detection-now-on-by-default-for-paying-users-3e933a.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-01-claude-code-source-leaked-via-npm-packaging-error-anthropic-confirms-37a15d.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-04-01-new-windows-11-emergency-update-fixes-preview-update-install-issues-476389.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-31-claude-code-source-code-accidentally-leaked-in-npm-package-6e7401.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-31-google-now-allows-you-to-change-your-gmailcom-address-28394a.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-31-proton-launches-new-meet-privacy-focused-conferencing-platform-58639c.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-31-gigabyte-control-center-vulnerable-to-arbitrary-file-write-flaw-e0e150.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-31-the-forgotten-endpoint-security-risks-of-dormant-devices-a889d8.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-31-claude-ai-finds-vim-emacs-rce-bugs-that-trigger-on-file-open-ff6c35.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-31-axios-npm-package-compromised-in-precision-attack-fb1550.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-31-googles-vertex-ai-is-over-privileged-thats-a-problem-1fe5ae.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-31-teampcp-breaches-cloud-saas-instances-with-stolen-credentials-362e37.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-31-android-developer-verification-rollout-begins-ahead-of-september-enforcement-ed49fe.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-31-cisco-source-code-stolen-in-trivy-linked-dev-environment-breach-332746.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-31-trueconf-zero-day-exploited-in-attacks-on-southeast-asian-government-networks-071fdf.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-31-ai-and-quantum-are-forcing-a-rethink-of-digital-trust-fe2c59.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-31-how-to-categorize-ai-agents-and-prioritize-risk-ff604c.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-31-iran-deploys-pseudo-ransomware-revives-pay2key-operations-9c6da7.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-31-vertex-ai-vulnerability-exposes-google-cloud-data-and-private-artifacts-e9e8b8.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-31-google-slashes-quantum-resource-requirements-for-breaking-cryptocurrency-encryp-3d73d6.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-31-the-ai-arms-race-why-unified-exposure-management-is-becoming-a-boardroom-priori-071ff9.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-31-silver-fox-expands-asia-cyber-campaign-with-atlascross-rat-and-fake-domains-ec7369.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-31-inventors-of-quantum-cryptography-win-turing-award-4f07ac.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-31-hacker-charged-with-stealing-53-million-from-uranium-crypto-exchange-a6abcd.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-31-dutch-finance-ministry-takes-treasury-banking-portal-offline-after-breach-44b747.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-31-cisa-orders-feds-to-patch-actively-exploited-citrix-flaw-by-thursday-ddf2cf.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-31-axios-supply-chain-attack-pushes-cross-platform-rat-via-compromised-npm-account-970e6a.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-30-healthcare-tech-firm-carecloud-says-hackers-stole-patient-data-7737b7.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-30-ai-powered-deepload-malware-steals-credentials-evades-detection-f18169.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-30-new-roadk1ll-websocket-implant-used-to-pivot-on-breached-networks-03d1a7.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-30-ai-driven-code-surge-is-forcing-a-rethink-of-appsec-f25cea.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-30-critical-citrix-netscaler-memory-flaw-actively-exploited-in-attacks-6145b4.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-30-f5-big-ip-vulnerability-reclassified-as-rce-under-exploitation-464c8e.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-30-f5-big-ip-vulnerability-reclassified-as-rce-under-exploitation-a05a2b.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-30-openai-patches-chatgpt-data-exfiltration-flaw-and-codex-github-token-vulnerabil-1ee707.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-30-manufacturing-amp-healthcare-share-struggles-with-passwords-e33e34.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-30-manufacturing-and-healthcare-share-struggles-with-passwords-3f1c40.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-30-deepload-malware-uses-clickfix-and-wmi-persistence-to-steal-browser-credentials-33c0a8.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-30-storm-brews-over-critical-no-click-telegram-flaw-f30eb2.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-30-apple-adds-macos-terminal-warning-to-block-clickfix-attacks-52b273.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-30-how-to-evaluate-ai-soc-agents-7-questions-gartner-says-you-should-be-asking-914dd1.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-30-weekly-recap-telecom-sleeper-cells-llm-jailbreaks-apple-forces-uk-age-checks-an-84547a.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-30-3-soc-process-fixes-that-unlock-tier-1-productivity-c979be.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-30-russian-apt-star-blizzard-adopts-darksword-ios-exploit-kit-83666e.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-30-the-state-of-secrets-sprawl-2026-9-takeaways-for-cisos-62ac96.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-30-european-commission-reports-cyber-intrusion-and-data-theft-f5043f.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-30-hacked-hospitals-hidden-spyware-iran-conflict-shows-how-digital-fight-is-ingrai-52a3b0.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-30-apples-camera-indicator-lights-ecad9b.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-30-hackers-exploiting-critical-f5-big-ip-flaw-in-attacks-patch-now-9fdd39.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-30-hackers-now-exploit-critical-f5-big-ip-flaw-in-attacks-patch-now-e231a7.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-30-telnyx-targeted-in-growing-teampcp-supply-chain-attack-aea862.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-30-russian-ctrl-toolkit-delivered-via-malicious-lnk-files-hijacks-rdp-via-frp-tunn-65e0eb.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-30-microsoft-pulls-kb5079391-windows-update-over-install-issues-375a7f.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-30-exploitation-of-fresh-citrix-netscaler-vulnerability-begins-4ede9e.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-30-fbi-confirms-kash-patel-email-hack-as-us-offers-10m-reward-for-hackers-fe93dd.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-30-critical-fortinet-forticlient-ems-flaw-now-exploited-in-attacks-ff07d9.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-30-f5-big-ip-dos-flaw-upgraded-to-critical-rce-now-exploited-in-the-wild-d99f3e.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-30-three-china-linked-clusters-target-southeast-asian-government-in-2025-cyber-cam-bd102b.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-30-european-commission-confirms-data-breach-after-europaeu-hack-7c9fbf.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-29-fbi-confirms-hack-of-director-patels-personal-email-inbox-5e8ad9.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-29-file-read-flaw-in-smart-slider-plugin-impacts-500k-wordpress-sites-fd6d3e.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-28-iran-linked-hackers-breach-fbi-directors-personal-email-hit-stryker-with-wiper--d25b1b.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-28-new-infinity-stealer-malware-grabs-macos-data-via-clickfix-lures-3c4088.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-28-cloudflare-themed-clickfix-attack-drops-infiniti-stealer-on-macs-e532c8.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-28-citrix-netscaler-under-active-recon-for-cve-2026-3055-cvss-93-memory-overread-b-f8c467.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-28-cisa-adds-cve-2025-53521-to-kev-after-active-f5-big-ip-apm-exploitation-93656d.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-28-ta446-deploys-darksword-ios-exploit-kit-in-targeted-spear-phishing-campaign-a7584a.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-27-backdoored-telnyx-pypi-package-pushes-malware-hidden-in-wav-audio-638f84.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-27-friday-squid-blogging-bioluminescent-bacteria-in-squid-b7a3f5.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-27-apple-sends-lock-screen-alerts-to-outdated-iphones-over-active-web-based-exploi-d4ef70.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-27-teampcp-pushes-malicious-telnyx-versions-to-pypi-hides-stealer-in-wav-files-f7d706.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-27-fake-vs-code-alerts-on-github-spread-malware-to-developers-d23b85.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-27-china-upgrades-the-backdoor-it-uses-to-spy-on-telcos-globally-bcaa41.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-27-pro-iranian-hacking-group-claims-credit-for-hack-of-fbi-director-kash-patels-pe-f79139.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-27-wartime-usage-of-compromised-ip-cameras-highlight-their-danger-a5f572.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-27-in-other-news-palo-alto-recruiter-scam-anti-deepfake-chip-google-sets-2029-quan-6c2da1.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-27-agentic-grc-teams-get-the-tech-the-mindset-shift-is-whats-missing-65ae8b.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-27-open-vsx-bug-let-malicious-vs-code-extensions-bypass-pre-publish-security-check-d6726e.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-27-infrastructure-attacks-with-physical-consequences-down-25-c64f34.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-27-google-sets-2029-deadline-for-quantum-safe-cryptography-3f6fd3.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-27-european-commission-investigating-breach-after-amazon-cloud-account-hack-8fa196.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-27-aitm-phishing-targets-tiktok-business-accounts-using-cloudflare-turnstile-evasi-7b1332.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-27-we-are-at-war-4020be.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-27-anti-piracy-coalition-takes-down-animeplay-app-with-5-million-users-38dbf7.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-27-bearlyfy-hits-russian-firms-with-custom-genielocker-ransomware-4a5656.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-27-bearlyfy-hits-70-russian-firms-with-custom-genielocker-ransomware-e2f902.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-27-windows-11-kb5079391-update-rolls-out-smart-app-control-improvements-4320b3.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-27-dutch-police-discloses-security-breach-after-phishing-attack-da4064.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-27-langchain-langgraph-flaws-expose-files-secrets-databases-in-widely-used-ai-fram-630c03.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-26-ajax-football-club-hack-exposed-fan-data-enabled-ticket-hijack-8026ba.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-26-coruna-darksword-amp-democratizing-nation-state-exploit-kits-143b52.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-26-is-the-fccs-router-ban-the-wrong-fix-f4ef33.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-26-automotive-cybersecurity-threats-grow-in-era-of-connected-autonomous-vehicles-cd80d1.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-26-cisa-new-langflow-flaw-actively-exploited-to-hijack-ai-workflows-1ffeaf.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-26-critical-flaw-in-langflow-ai-platform-under-attack-5ab6ab.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-26-china-linked-red-menshen-uses-stealthy-bpfdoor-implants-to-spy-via-telecom-netw-eefc27.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-26-uk-sanctions-xinbi-marketplace-linked-to-asian-scam-centers-f53996.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-26-how-organizations-can-use-mistakes-to-level-up-their-security-programs-0eab05.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-26-ai-powered-dependency-decisions-introduce-ignore-security-bugs-9344a4.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-26-tiktok-for-business-accounts-targeted-in-new-phishing-campaign-5e8c70.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-26-whatsapp-rolls-out-more-ai-features-ios-multi-account-support-ecdb1f.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-26-inside-a-modern-fraud-attack-from-bot-signups-to-account-takeovers-759b81.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-26-claude-extension-flaw-enabled-zero-click-xss-prompt-injection-via-any-website-d55a02.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-26-coruna-ios-exploit-framework-linked-to-triangulation-attacks-fb87b9.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-26-russia-arrests-suspected-owner-of-leakbase-cybercrime-forum-253da0.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-26-intermediaries-driving-global-spyware-market-expansion-16f0b3.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-26-masters-of-imitation-how-hackers-and-art-forgers-perfect-the-art-of-deception-bda74e.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-26-suspected-redline-infostealer-malware-admin-extradited-to-us-90bcd7.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-26-threatsday-bulletin-pqc-push-ai-vuln-hunting-pirated-traps-phishing-kits-20-mor-0c93c2.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-26-coruna-ios-kit-reuses-2023-triangulation-exploit-code-in-recent-mass-attacks-15943a.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-26-webinar-stop-guessing-learn-to-validate-your-defenses-against-real-attacks-561951.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-26-coruna-ios-kit-reuses-2023-triangulation-exploit-code-in-new-mass-attacks-2b5f6f.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-26-as-the-us-midterms-approach-ai-is-going-to-emerge-as-a-key-issue-concerning-vot-5356d8.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-26-webrtc-skimmer-bypasses-csp-to-steal-payment-data-from-e-commerce-sites-e4c9fe.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-25-github-adds-ai-powered-bug-detection-to-expand-security-coverage-775e1c.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-25-at-rsac-the-eu-leads-while-us-officials-are-sidelined-8a8997.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-25-polyshell-attacks-target-56-of-all-vulnerable-magento-stores-51f172.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-25-bubble-ai-app-builder-abused-to-steal-microsoft-account-credentials-ec261a.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-25-new-torg-grabber-infostealer-malware-targets-728-crypto-wallets-302453.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-25-leakbase-admin-arrested-in-russia-over-massive-stolen-credential-marketplace-0ddf8b.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-25-blame-game-why-public-cyber-attribution-carries-risks-7a6149.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-25-citrix-urges-admins-to-patch-netscaler-flaws-as-soon-as-possible-241b6e.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-25-phishers-pose-as-palo-alto-networks-recruiters-for-months-in-job-scam-4cb6cb.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-25-ai-dominates-rsac-innovation-sandbox-518f1f.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-25-sans-top-5-most-dangerous-new-attack-techniques-to-watch-4e0e2e.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-25-glassworm-malware-uses-solana-dead-drops-to-deliver-rat-and-steal-browser-crypt-559ac5.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-25-why-a-near-miss-database-is-key-to-improving-information-sharing-e20738.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-25-paid-ai-accounts-are-now-a-hot-underground-commodity-d13e9a.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-25-kali-linux-20261-released-with-8-new-tools-new-backtrack-mode-43597e.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-25-ai-native-security-is-a-must-to-counter-ai-based-attacks-42b1e3.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-25-the-kill-chain-is-obsolete-when-your-ai-agent-is-the-threat-65c1f4.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-25-ex-nsa-directors-discuss-red-line-for-offensive-cyberattacks-542d72.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-25-russian-hacker-sentenced-to-2-years-for-ta551-botnet-driven-ransomware-attacks-1abc24.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-25-device-code-phishing-hits-340-microsoft-365-orgs-across-five-countries-via-oaut-d2dfd7.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-25-tp-link-warns-users-to-patch-critical-router-auth-bypass-flaw-4cc342.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-25-sen-wyden-warns-of-another-section-702-abuse-6c49be.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-25-manager-of-botnet-used-in-ransomware-attacks-gets-2-years-in-prison-49e2fe.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-25-fcc-bans-new-foreign-made-routers-over-supply-chain-and-cyber-risk-concerns-2e1652.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-25-iran-hacktivists-make-noise-but-have-little-impact-on-war-3035f9.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-24-ptc-warns-of-imminent-threat-from-critical-windchill-flexplm-rce-bug-fc465b.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-24-csa-launches-csai-foundation-for-ai-security-452ca8.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-24-popular-litellm-pypi-package-backdoored-to-steal-credentials-auth-tokens-d04539.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-24-checkmarx-kics-code-scanner-targeted-in-widening-supply-chain-hit-52663f.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-24-how-ai-coding-tools-crushed-the-endpoint-security-fortress-16fe79.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-24-fcc-bans-new-routers-made-outside-the-usa-over-security-risks-1dc34a.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-24-teampcp-backdoors-litellm-versions-18271828-via-trivy-cicd-compromise-f1a9ea.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-24-firefox-now-has-a-free-built-in-vpn-with-50gb-monthly-data-limit-7ea128.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-24-tax-search-ads-deliver-screenconnect-malware-using-huawei-driver-to-disable-edr-19c994.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-24-5-learnings-from-the-first-ever-gartner-market-guide-for-guardian-agents-ef5e68.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-24-hackers-use-fake-resumes-to-steal-enterprise-credentials-and-deploy-crypto-mine-c8a73e.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-24-microsoft-fixes-bug-causing-classic-outlook-sync-issues-with-gmail-f73789.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-24-github-openclaw-deployer-repo-delivers-trojan-instead-6b0ae2.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-24-zero-trust-bridging-the-gap-between-authentication-and-trust-749b8c.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-24-hackerone-discloses-employee-data-breach-after-navia-hack-40b58b.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-24-infinite-campus-warns-of-breach-after-shinyhunters-claims-data-theft-8e4bdf.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-24-how-a-large-bank-uses-ai-digital-twins-for-threat-hunting-dd30c6.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-24-yanluowang-ransomware-access-broker-gets-81-months-in-prison-55565b.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-24-microsoft-proposes-better-identity-guardrails-for-ai-agents-ff1c52.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-24-dutch-ministry-of-finance-discloses-breach-affecting-employees-93d5a2.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-24-ghost-campaign-uses-7-npm-packages-to-steal-crypto-wallets-and-credentials-f4425f.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-24-team-mirai-and-democracy-ed9895.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-24-the-hidden-cost-of-cybersecurity-specialization-losing-foundational-skills-3ed9d0.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-24-teampcp-hacks-checkmarx-github-actions-using-stolen-ci-credentials-3e32c1.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-24-us-sentences-russian-hacker-to-675-years-for-role-in-9m-ransomware-damage-b8e3b6.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-24-citrix-urges-patching-critical-netscaler-flaw-allowing-unauthenticated-data-lea-42d544.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-23-openai-rolls-out-chatgpt-library-to-store-your-personal-files-544447.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-23-mazda-discloses-security-breach-exposing-employee-and-partner-data-ae2c07.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-23-ai-in-the-soc-what-could-go-wrong-ec2bcc.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-23-tycoon2fa-phishing-platform-returns-after-recent-police-disruption-2bbb94.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-23-trivy-supply-chain-attack-targets-cicd-secrets-396949.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-23-ransomwares-new-era-moving-at-ai-speed-cc1e16.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-23-cisos-debate-human-role-in-ai-powered-security-818632.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-23-teampcp-deploys-iran-targeted-wiper-in-kubernetes-attacks-f13e0b.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-23-crunchyroll-probes-breach-after-hacker-claims-to-steal-68m-users-data-425fc2.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-23-north-korean-hackers-abuse-vs-code-auto-run-tasks-to-deploy-stoatwaffle-malware-fff04b.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-23-trivy-supply-chain-attack-spreads-to-docker-github-repos-aa1cf9.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-23-canisterworm-springs-wiper-attack-targeting-iran-3416ae.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-23-attackers-hide-infostealer-in-copyright-infringement-notices-68a353.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-23-varonis-atlas-securing-ai-and-the-data-that-powers-it-3679f5.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-23-weekly-recap-cicd-backdoor-fbi-buys-location-data-whatsapp-ditches-numbers-more-652943.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-23-microsoft-exchange-online-service-change-causes-email-access-issues-451de7.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-23-we-found-eight-attack-vectors-inside-aws-bedrock-heres-what-attackers-can-do-wi-1651c0.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-23-qnap-patches-four-vulnerabilities-exploited-at-pwn2own-b64be9.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-23-microsoft-xbox-one-hacked-429ad6.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-23-microsoft-warns-irs-phishing-hits-29000-users-deploys-rmm-malware-e000c8.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-23-tycoon-2fa-fully-operational-despite-law-enforcement-takedown-f995d1.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-23-fbi-warns-of-handala-hackers-using-telegram-in-malware-attacks-c3cbf1.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-23-cisa-orders-feds-to-patch-darksword-ios-flaws-exploited-attacks-acb522.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-23-trivy-hack-spreads-infostealer-via-docker-triggers-worm-and-kubernetes-wiper-5d7ac7.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-23-new-kb5085516-emergency-update-fixes-microsoft-account-sign-in-a6916d.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-23-hackers-exploit-cve-2025-32975-cvss-100-to-hijack-unpatched-quest-kace-sma-syst-0c1384.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-23-oracle-releases-emergency-patch-for-critical-identity-manager-vulnerability-b80494.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-22-voidstealer-malware-steals-chrome-master-key-via-debugger-trick-2b25c5.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-21-trivy-vulnerability-scanner-breach-pushed-infostealer-via-github-actions-fdf4d5.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-21-google-adds-advanced-flow-for-safe-apk-sideloading-on-android-16e526.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-21-microsoft-azure-monitor-alerts-abused-for-callback-phishing-attacks-fa32ea.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-21-fbi-warns-russian-hackers-target-signal-whatsapp-in-mass-phishing-attacks-61ec80.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-21-critical-quest-kace-vulnerability-potentially-exploited-in-attacks-9e381b.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-21-oracle-patches-critical-cve-2026-21992-enabling-unauthenticated-rce-in-identity-18d6f3.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-21-trivy-supply-chain-attack-triggers-self-spreading-canisterworm-across-47-npm-pa-658fa5.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-21-cisa-flags-apple-craft-cms-laravel-bugs-in-kev-orders-patching-by-april-3-2026-581ce8.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-20-friday-squid-blogging-jumbo-flying-squid-in-the-south-pacific-d56a46.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-20-fbi-links-signal-phishing-attacks-to-russian-intelligence-services-742c51.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-20-patch-now-oracles-fusion-middleware-has-critical-rce-flaw-8e75c5.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-20-oracle-pushes-emergency-fix-for-critical-identity-manager-rce-flaw-1db1c0.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-20-trivy-security-scanner-github-actions-breached-75-tags-hijacked-to-steal-cicd-s-7ffbd0.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-20-police-take-down-373000-fake-csam-sites-in-operation-alice-862c4d.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-20-cyber-opsec-fail-beast-gang-exposes-ransomware-server-0f8a63.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-20-in-other-news-new-android-safeguards-operation-alice-uk-toughens-cyber-reportin-7bb9d9.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-20-critical-langflow-flaw-cve-2026-33017-triggers-attacks-within-20-hours-of-discl-549792.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-20-cisa-orders-feds-to-patch-max-severity-cisco-flaw-by-sunday-96ba8b.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-20-3-men-charged-with-conspiring-to-smuggle-us-artificial-intelligence-to-china-b9ab76.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-20-how-cisos-can-survive-the-era-of-geopolitical-cyberattacks-52b183.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-20-eclypsium-raises-25-million-for-device-supply-chain-security-58b9b7.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-20-interlock-ransomware-targets-cisco-enterprise-firewalls-9ee528.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-20-us-confirms-handala-link-to-iran-government-amid-takedown-of-hackers-sites-841ef9.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-20-cape-raises-100-million-for-protection-against-cellular-security-threats-96eade.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-20-proton-mail-shared-user-information-with-the-police-045f5a.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-20-navia-data-breach-impacts-27-million-491dd3.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-20-google-adds-24-hour-wait-for-unverified-app-sideloading-to-reduce-malware-and-s-0b3641.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-20-thousands-of-magento-sites-hit-in-ongoing-defacement-campaign-11e93d.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-20-the-importance-of-behavioral-analytics-in-ai-enabled-cyber-attacks-103b82.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-20-musician-admits-to-10m-streaming-royalty-fraud-using-ai-bots-c63d09.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-20-magento-polyshell-flaw-enables-unauthenticated-uploads-rce-and-account-takeover-ebe8f4.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-20-allure-security-raises-17-million-for-online-brand-protection-0056c4.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-20-critical-langflow-vulnerability-exploited-hours-after-public-disclosure-01bf77.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-20-international-joint-action-disrupts-worlds-largest-ddos-botnets-befeed.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-20-microsoft-march-windows-updates-break-teams-onedrive-sign-ins-beaa9a.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-20-ex-data-analyst-stole-company-data-in-25m-extortion-scheme-369c61.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-20-doj-disrupts-3-million-device-iot-botnets-behind-record-314-tbps-global-ddos-at-778332.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-20-apple-warns-older-iphones-vulnerable-to-coruna-darksword-exploit-kit-attacks-8ab05b.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-19-feds-disrupt-iot-botnets-behind-huge-ddos-attacks-d3df53.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-19-ai-conundrum-why-mcp-security-cant-be-patched-away-f47dfa.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-19-navia-discloses-data-breach-impacting-27-million-people-78381c.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-19-with-governments-role-uncertain-businesses-unite-to-combat-fraud-d9e184.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-19-native-launches-with-security-control-plane-for-multicloud-a7258b.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-19-new-polyshell-flaw-allows-unauthenticated-rce-on-magento-e-stores-79d741.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-19-speagle-malware-hijacks-cobra-docguard-to-steal-data-via-compromised-servers-ea4131.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-19-54-edr-killers-use-byovd-to-exploit-35-signed-vulnerable-drivers-and-disable-se-cf5804.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-19-post-quantum-web-could-be-safer-faster-c1c69f.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-19-bitrefill-blames-north-korean-lazarus-group-for-cyberattack-1bbf32.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-19-fbi-seizes-handala-data-leak-site-after-stryker-cyberattack-7fe806.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-19-virtual-event-shields-up-key-technologies-reshaping-cybersecurity-defenses-f393b4.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-19-russian-hackers-exploit-zimbra-flaw-in-ukrainian-govt-attacks-572b22.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-19-threatsday-bulletin-fortigate-raas-citrix-exploits-mcp-abuse-livechat-phish-mor-f11585.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-19-7-ways-to-prevent-privilege-escalation-via-password-resets-f43f51.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-19-new-perseus-android-banking-malware-monitors-notes-apps-to-extract-sensitive-da-e56127.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-19-cisa-urges-us-orgs-to-secure-microsoft-intune-systems-after-stryker-breach-034b90.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-19-how-ceros-gives-security-teams-visibility-and-control-in-claude-code-facc78.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-19-new-perseus-android-malware-checks-user-notes-for-secrets-fefa47.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-19-critical-microsoft-sharepoint-flaw-now-exploited-in-attacks-de7052.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-19-hacking-a-robot-vacuum-f4ddb0.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-19-darksword-ios-exploit-kit-uses-6-flaws-3-zero-days-for-full-device-takeover-92eaa2.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-19-eu-sanctions-companies-in-china-iran-for-cyberattacks-f59c2c.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-19-cisa-warns-of-zimbra-sharepoint-flaw-exploits-cisco-zero-day-hit-in-ransomware--bdc34e.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-18-aura-confirms-data-breach-exposing-900000-marketing-contacts-ab8a76.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-18-c2-implant-snappyclient-targets-crypto-wallets-a8062d.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-18-darksword-iphone-exploit-kit-serves-spies-amp-thieves-alike-b60268.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-18-cisa-orders-feds-to-patch-zimbra-xss-flaw-exploited-in-attacks-6f1d11.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-18-connectwise-patches-new-flaw-allowing-screenconnect-hijacking-f96752.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-18-ofac-sanctions-dprk-it-worker-network-funding-wmd-programs-through-fake-remote--75a4d4.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-18-ransomware-gang-exploits-cisco-flaw-in-zero-day-attacks-since-january-cac685.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-18-interlock-ransomware-exploits-cisco-fmc-zero-day-cve-2026-20131-for-root-access-001253.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-18-marquis-ransomware-gang-stole-data-of-672k-people-in-cyberattack-5f0c09.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-18-claudy-day-trio-of-flaws-exposes-claude-users-to-data-theft-b45bae.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-18-the-refund-fraud-economy-exploiting-major-retailers-and-payment-platforms-511efd.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-18-new-darksword-ios-exploit-used-in-infostealer-attack-on-iphones-4bdd49.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-18-new-darksword-ios-exploit-used-in-infostealer-attack-on-iphones-6b0836.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-18-nordstroms-email-system-abused-to-send-crypto-scams-to-customers-18e1e9.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-18-researchers-meta-tiktok-steal-personal-amp-financial-info-when-users-click-ads-0e11a7.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-18-meta-tiktok-steal-personal-amp-financial-info-when-users-click-ads-e2682e.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-18-sidewinder-espionage-campaign-expands-across-southeast-asia-19c538.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-18-critical-unpatched-telnetd-flaw-cve-2026-32746-enables-unauthenticated-root-rce-1f8fbd.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-18-claude-code-security-and-magecart-getting-the-threat-model-right-bccdb2.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-18-9-critical-ip-kvm-flaws-enable-unauthenticated-root-access-across-four-vendors-0daaed.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-18-metas-ai-glasses-and-privacy-c324a0.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-18-product-walkthrough-how-mesh-csma-reveals-and-breaks-attack-paths-to-crown-jewe-f69655.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-18-ubuntu-cve-2026-3888-bug-lets-attackers-gain-root-via-systemd-cleanup-timing-ex-a6e57f.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-18-apple-fixes-webkit-vulnerability-enabling-same-origin-policy-bypass-on-ios-and--1cab14.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-17-apple-pushes-first-background-security-improvements-update-to-fix-webkit-flaw-1523ae.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-17-more-attackers-are-logging-in-not-breaking-in-9eb77c.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-17-glassworm-malware-hits-400-code-repos-on-github-npm-vscode-openvsx-17bd1c.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-17-clear-communication-the-missing-link-in-cybersecurity-success-d00e65.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-17-less-lucrative-ransomware-market-makes-attackers-alter-methods-7fc0a6.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-17-hackers-target-cybersecurity-firm-outpost24-in-7-stage-phish-60eed9.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-17-europe-sanctions-chinese-and-iranian-firms-for-cyberattacks-a7df83.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-17-ai-flaws-in-amazon-bedrock-langsmith-and-sglang-enable-data-exfiltration-and-rc-744c69.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-17-warlock-ransomware-group-augments-post-exploitation-activities-9de582.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-17-leaknet-ransomware-uses-clickfix-via-hacked-sites-deploys-deno-in-memory-loader-ea129e.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-17-top-5-things-cisos-need-to-do-today-to-secure-ai-agents-41b8d9.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-17-new-font-rendering-trick-hides-malicious-commands-from-ai-tools-c39290.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-17-microsoft-stops-force-installing-the-microsoft-365-copilot-app-dc5081.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-17-leaknet-ransomware-uses-clickfix-deno-runtime-in-stealthy-attacks-5f499e.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-17-microsoft-shares-fix-for-windows-c-drive-access-issues-on-samsung-pcs-686de8.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-17-ai-is-everywhere-but-cisos-are-still-securing-it-with-yesterdays-skills-and-too-67c532.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-17-new-windows-11-hotpatch-fixes-bluetooth-device-visibility-issue-7635d7.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-17-microsoft-enabling-teams-meeting-add-in-breaks-outlook-classic-cb4e5b.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-17-south-korean-police-accidentally-post-cryptocurrency-wallet-password-dac550.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-17-konni-deploys-endrat-through-phishing-uses-kakaotalk-to-propagate-malware-513c4c.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-17-cisa-flags-actively-exploited-wing-ftp-vulnerability-leaking-server-paths-47adad.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-16-china-nexus-hackers-skulk-in-southeast-asian-military-orgs-for-years-f3a93c.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-16-glassworm-malware-evolves-to-hide-in-dependencies-2a80b1.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-16-inside-olympic-cybersecurity-lessons-from-paris-2024-to-milan-cortina-2026-93a8ce.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-16-glassworm-attack-uses-stolen-github-tokens-to-force-push-malware-into-python-re-85c979.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-16-stryker-attack-wiped-tens-of-thousands-of-devices-no-malware-needed-b93854.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-16-cisa-flags-wing-ftp-server-flaw-as-actively-exploited-in-attacks-ab2a98.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-16-weekly-recap-chrome-0-days-router-botnets-aws-breach-rogue-ai-agents-more-687913.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-16-attackers-abuse-livechat-to-phish-credit-card-personal-data-389d2c.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-16-why-security-validation-is-becoming-agentic-38f304.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-16-clickfix-campaigns-spread-macsync-macos-infostealer-via-fake-ai-tool-installers-b51fce.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-16-possible-new-result-in-quantum-factorization-d36995.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-16-drillapp-backdoor-targets-ukraine-abuses-microsoft-edge-debugging-for-stealth-e-2b71b8.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-16-android-17-blocks-non-accessibility-apps-from-accessibility-api-to-prevent-malw-8dfdfb.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-15-loblaw-data-breach-impacts-customer-information-a15283.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-14-microsoft-releases-windows-11-oob-hotpatch-to-fix-rras-rce-flaw-584ff6.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-14-openclaw-ai-agent-flaws-could-enable-prompt-injection-and-data-exfiltration-884ee7.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-14-upcoming-speaking-engagements-eb3bfb.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-14-appsflyer-web-sdk-hijacked-to-spread-crypto-stealing-javascript-code-3230ee.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-14-glassworm-supply-chain-attack-abuses-72-open-vsx-extensions-to-target-developer-ae956b.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-14-critical-hpe-aos-cx-vulnerability-allows-admin-password-resets-628461.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-13-microsoft-windows-11-users-cant-access-c-drive-on-some-samsung-pcs-5b94e3.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-13-friday-squid-blogging-increased-squid-population-in-the-falklands-9009bc.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-13-fbi-seeks-victims-of-steam-games-used-to-spread-malware-7bcd45.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-13-fake-pocs-misunderstood-risks-cause-cisco-sd-wan-chaos-a89a7b.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-13-the-data-gap-why-nonprofit-cyber-incidents-go-underreported-4d7c9a.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-13-chinese-hackers-target-southeast-asian-militaries-with-applechris-and-memfun-ma-0c568e.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-13-cyberattackers-dont-care-about-good-causes-348b8b.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-13-polands-nuclear-research-centre-targeted-by-cyberattack-07ddb8.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-13-meta-to-shut-down-instagram-end-to-end-encrypted-chat-support-starting-may-2026-3a7eec.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-13-microsoft-investigates-classic-outlook-sync-and-connection-issues-a8d419.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-13-will-ai-save-consumers-from-smartphone-based-phishing-attacks-044a78.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-13-interpol-dismantles-45000-malicious-ips-arrests-94-in-global-cybercrime-6bda13.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-13-from-vmware-to-whats-next-protecting-data-during-hypervisor-migration-36b50c.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-13-storm-2561-spreads-trojan-vpn-clients-via-seo-poisoning-to-steal-credentials-3731c7.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-13-police-sinkholes-45000-ip-addresses-in-cybercrime-crackdown-4e6ba5.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-13-investigating-a-new-click-fix-variant-bd9a2b.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-13-fake-enterprise-vpn-sites-used-to-steal-company-credentials-e8fb79.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-13-most-google-cloud-attacks-start-with-bug-exploitation-65c512.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-13-real-time-banking-trojan-strikes-brazils-pix-users-fab7ba.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-13-academia-and-the-ai-brain-drain-5bfefb.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-13-google-fixes-two-chrome-zero-days-exploited-in-the-wild-affecting-skia-and-v8-014062.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-13-nine-crackarmor-flaws-in-linux-apparmor-enable-root-escalation-bypass-container-968889.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-13-starbucks-discloses-data-breach-affecting-hundreds-of-employees-4e821d.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-13-google-fixes-two-new-chrome-zero-days-exploited-in-attacks-66acd7.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-13-authorities-disrupt-socksescort-proxy-botnet-exploiting-369000-ips-across-163-c-30a9e5.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-13-veeam-patches-7-critical-backup-replication-flaws-allowing-remote-code-executio-4224ff.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-12-why-post-quantum-cryptography-cant-wait-e690d7.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-12-canadian-retail-giant-loblaw-notifies-customers-of-data-breach-735e7b.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-12-iran-mois-colludes-with-criminals-to-boost-cyberattacks-6d04f3.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-12-england-hockey-investigating-ransomware-data-breach-83974c.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-12-commercial-spyware-opponents-fear-us-policy-shifting-147814.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-12-ai-generated-slopoly-malware-used-in-interlock-ransomware-attack-8862f9.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-12-iphones-and-ipads-approved-for-nato-classified-data-25c650.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-12-rust-based-venon-malware-targets-33-brazilian-banks-with-credential-stealing-ov-33b7c5.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-12-delineas-strongdm-acquisition-highlights-the-changing-role-of-pam-d282da.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-12-hive0163-uses-ai-assisted-slopoly-malware-for-persistent-access-in-ransomware-a-9e3e07.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-12-veeam-warns-of-critical-flaws-exposing-backup-servers-to-rce-attacks-26bce0.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-12-why-strykers-outage-is-a-disaster-recovery-wake-up-call-149e4e.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-12-us-disrupts-socksescort-proxy-network-powered-by-linux-malware-fb8f78.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-12-google-paid-171-million-for-vulnerability-reports-in-2025-d6c641.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-12-telus-digital-confirms-breach-after-hacker-claims-1-petabyte-data-theft-9147ac.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-12-what-orgs-can-learn-from-olympics-world-cup-ir-plans-38aa58.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-12-going-the-extra-mile-travel-rewards-turn-into-underground-currency-872581.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-12-how-to-scale-phishing-detection-in-your-soc-3-steps-for-cisos-a444c8.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-12-threatsday-bulletin-oauth-trap-edr-killer-signal-phishing-zombie-zip-ai-platfor-7b5ba6.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-12-us-charges-another-ransomware-negotiator-linked-to-blackcat-attacks-fd8fa2.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-12-attackers-dont-just-send-phishing-emails-they-weaponize-your-socs-workload-280d94.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-12-apple-issues-security-updates-for-older-ios-devices-targeted-by-coruna-webkit-e-ec3643.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-12-six-android-malware-families-target-pix-payments-banking-apps-and-crypto-wallet-0147d8.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-12-cisa-flags-actively-exploited-n8n-rce-bug-as-24700-instances-remain-exposed-a13a02.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-11-a-guy-who-wrote-the-code-died-in-2005-i-still-have-to-secure-it-ac76f2.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-11-inc-ransomware-group-holds-healthcare-hostage-in-oceania-0520ce.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-11-xygeni-github-action-compromised-via-tag-poison-cda972.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-11-whatsapp-introduces-parent-managed-accounts-for-pre-teens-89ac7f.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-11-sqli-flaw-in-elementor-ally-plugin-impacts-250k-wordpress-sites-4eba3c.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-11-cisa-orders-feds-to-patch-n8n-rce-flaw-exploited-in-attacks-77c353.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-11-medtech-giant-stryker-offline-after-iran-linked-wiper-malware-attack-a151f0.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-11-new-phantomraven-npm-attack-wave-steals-dev-data-via-88-packages-08e626.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-11-researchers-trick-perplexitys-comet-ai-browser-into-phishing-scam-in-under-four-43d1da.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-11-iran-backed-hackers-claim-wiper-attack-on-medtech-firm-stryker-01fd41.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-11-critical-n8n-flaws-allow-remote-code-execution-and-exposure-of-stored-credentia-e7e368.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-11-chinese-nexus-actors-shift-focus-to-qatar-amid-iranian-conflict-652d94.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-11-meta-adds-new-whatsapp-facebook-and-messenger-anti-scam-tools-58da90.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-11-meta-disables-150k-accounts-linked-to-southeast-asia-scam-centers-in-global-cra-927f4a.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-11-dozens-of-vendors-patch-security-flaws-across-enterprise-software-and-network-d-3b6ba4.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-11-what-boards-must-demand-in-the-age-of-ai-automated-exploitation-69e869.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-11-canada-needs-nationalized-public-ai-f2fa90.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-11-microsoft-patches-84-flaws-in-march-patch-tuesday-including-two-public-zero-day-39e1bd.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-11-unc6426-exploits-nx-npm-supply-chain-attack-to-gain-aws-admin-access-in-72-hour-6b6846.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-11-five-malicious-rust-crates-and-ai-bot-exploit-cicd-pipelines-to-steal-developer-9b9411.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-11-middle-east-conflict-highlights-cloud-resilience-gaps-ebceaf.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-10-microsoft-patches-83-cves-in-march-update-ce6cd4.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-10-microsoft-patch-tuesday-march-2026-edition-587382.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-10-new-blacksanta-edr-killer-spotted-targeting-hr-departments-135576.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-10-new-beatbanker-android-malware-poses-as-starlink-app-to-hijack-devices-4e3099.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-10-overly-permissive-salesforce-cloud-configs-in-the-crosshairs-fd92b8.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-10-new-zombie-zip-technique-lets-malware-slip-past-security-tools-448a04.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-10-russian-threat-actor-sednit-resurfaces-with-sophisticated-toolkit-803298.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-10-microsoft-releases-windows-10-kb5078885-extended-security-update-4c84ef.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-10-microsoft-march-2026-patch-tuesday-fixes-2-zero-days-79-flaws-fa2ce0.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-10-windows-11-kb5079473-kb5078883-cumulative-updates-released-e99aae.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-10-hpe-warns-of-critical-aos-cx-flaw-allowing-admin-password-resets-f3313b.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-10-fortigate-devices-exploited-to-breach-networks-and-steal-service-account-creden-ed12b9.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-10-kadnap-malware-infects-14000-edge-devices-to-power-stealth-proxy-botnet-efa566.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-10-microsoft-brings-phishing-resistant-windows-sign-ins-via-entra-passkeys-054924.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-10-new-kadnap-botnet-hijacks-asus-routers-to-fuel-cybercrime-proxy-network-f21100.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-10-the-new-turing-test-how-threats-use-geometry-to-prove-humanness-305873.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-10-blacksanta-edr-killer-targets-hr-workflows-4df1bf.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-10-new-leakylooker-flaws-in-google-looker-studio-could-enable-cross-tenant-sql-que-edb8f8.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-10-how-to-stop-ai-data-leaks-a-webinar-guide-to-auditing-modern-agentic-workflows-f90909.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-10-cisa-recently-patched-ivanti-epm-flaw-now-actively-exploited-2626b5.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-10-the-zero-day-scramble-is-avoidable-a-guide-to-attack-surface-reduction-2beccf.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-10-apt28-uses-beardshell-and-covenant-malware-to-spy-on-ukrainian-military-915b68.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-10-microsoft-to-enable-windows-hotpatch-security-updates-by-default-494316.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-10-apt28-hackers-deploy-customized-variant-of-covenant-open-source-tool-e52bd9.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-10-jailbreaking-the-f-35-fighter-jet-d90569.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-10-threat-actors-mass-scan-salesforce-experience-cloud-via-modified-aurainspector--739064.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-10-cisa-flags-solarwinds-ivanti-and-workspace-one-vulnerabilities-as-actively-expl-b3db5d.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-09-microsoft-teams-phishing-targets-employees-with-a0backdoor-malware-b01f45.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-09-google-cloud-attacks-exploit-flaws-more-than-weak-credentials-c76e15.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-09-dutch-govt-warns-of-signal-whatsapp-account-hijacking-attacks-953624.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-09-white-house-cyber-strategy-prioritizes-offense-bdbb25.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-09-installfix-attacks-spread-fake-claude-code-sites-49a7ba.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-09-are-we-ready-for-auto-remediation-with-agentic-ai-e59ba1.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-09-ericsson-us-discloses-data-breach-after-service-provider-hack-f37683.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-09-malicious-npm-package-posing-as-openclaw-installer-deploys-rat-steals-macos-cre-acce6e.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-09-microsoft-teams-will-tag-third-party-bots-trying-to-join-meetings-a331a2.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-09-shinyhunters-claims-ongoing-salesforce-aura-data-theft-attacks-270872.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-09-fbi-warns-of-phishing-attacks-impersonating-us-city-county-officials-867753.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-09-unc4899-breached-crypto-firm-after-developer-airdropped-trojanized-file-to-work-d94b7f.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-09-why-password-audits-miss-the-accounts-attackers-actually-want-07be74.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-09-weekly-recap-qualcomm-0-day-ios-exploit-chains-airsnitch-attack-vibe-coded-malw-0e315c.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-09-chinese-cyber-threat-lurks-in-critical-asian-sectors-for-years-cc054e.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-09-can-the-security-platform-finally-deliver-for-the-mid-market-db4763.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-09-cloned-ai-tool-sites-distribute-malware-in-installfix-campaign-ea2d35.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-09-new-attack-against-wi-fi-1100c2.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-09-chrome-extension-turns-malicious-after-ownership-transfer-enabling-code-injecti-f0700f.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-09-web-server-exploits-and-mimikatz-used-in-attacks-targeting-asian-critical-infra-e5cfe0.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-08-how-ai-assistants-are-moving-the-security-goalposts-8baf2c.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-08-eu-court-adviser-says-banks-must-immediately-refund-phishing-victims-7d45ac.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-08-hackers-abuse-arpa-dns-and-ipv6-to-evade-phishing-defenses-96d0b4.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-08-recent-cisco-catalyst-sd-wan-vulnerability-now-widely-exploited-1332af.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-07-openai-codex-security-scanned-12-million-commits-and-found-10561-high-severity--afeb5c.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-07-termite-ransomware-breaches-linked-to-clickfix-castlerat-attacks-d8d7b5.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-07-us-cyber-strategy-targets-adversaries-critical-infrastructure-and-emerging-tech-6bca6b.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-07-microsoft-hackers-abusing-ai-at-every-stage-of-cyberattacks-5bfb64.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-07-over-100-github-repositories-distributing-boryptgrab-stealer-52ea38.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-07-pentagons-chief-tech-officer-says-he-clashed-with-ai-company-anthropic-over-aut-e6733b.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-07-anthropic-finds-22-firefox-vulnerabilities-using-claude-opus-46-ai-model-248520.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-06-fbi-investigating-suspicious-cyber-activity-on-system-holding-sensitive-surveil-99d377.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-06-friday-squid-blogging-squid-in-byzantine-monk-cooking-9b4695.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-06-cognizant-trizetto-breach-exposes-health-data-of-34-million-patients-c05b63.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-06-cylake-offers-ai-native-security-without-relying-on-cloud-services-b7cd18.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-06-north-korean-apts-use-ai-to-enhance-it-worker-scams-9ad250.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-06-anthropic-and-the-pentagon-419217.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-06-armorcode-raises-16-million-for-exposure-management-platform-4b5d1f.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-06-cisa-warns-feds-to-patch-ios-flaws-exploited-in-crypto-theft-attacks-c31fd6.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-06-in-other-news-fbi-hacked-us-security-pro-killed-in-iran-war-hijacked-cameras-us-11280a.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-06-transparent-tribe-uses-ai-to-mass-produce-malware-implants-in-campaign-targetin-c403a1.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-06-eu-auto-rules-shift-gears-on-cybersecurity-standards-78c300.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-06-ec-council-expands-ai-certification-portfolio-to-strengthen-us-ai-workforce-rea-6acbb3.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-06-fake-claude-code-install-guides-push-infostealers-in-installfix-attacks-d0e34b.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-06-multi-stage-voidgeist-malware-delivering-xworm-asyncrat-and-xeno-rat-4df0a1.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-06-microsoft-365-backup-to-add-file-level-restore-for-faster-recovery-319d0d.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-06-irans-cyber-kinetic-war-doctrine-takes-shape-04e971.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-06-cyberattack-on-mexicos-govt-agencies-highlight-ai-threat-54e937.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-06-cisa-adds-ios-flaws-from-coruna-exploit-kit-to-kev-list-14d789.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-06-rockwell-vulnerability-allowing-remote-ics-hacking-exploited-in-attacks-83c291.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-06-claude-used-to-hack-mexican-government-ae287c.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-06-the-msp-guide-to-using-ai-powered-risk-management-to-scale-cybersecurity-70dd88.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-06-iran-linked-muddywater-hackers-target-us-networks-with-new-dindoor-backdoor-57626a.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-06-ghanain-man-pleads-guilty-to-role-in-100-million-fraud-ring-508d54.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-06-fbi-investigates-breach-of-surveillance-and-wiretap-systems-5c5eeb.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-06-china-linked-hackers-use-terndoor-peertime-bruteentry-in-south-american-telecom-5481b9.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-06-microsoft-reveals-clickfix-campaign-using-windows-terminal-to-deploy-lumma-stea-70af4e.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-06-hikvision-and-rockwell-automation-cvss-98-flaws-added-to-cisa-kev-catalog-c5e30e.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-05-chinese-state-hackers-target-telcos-with-new-malware-toolkit-7e6f95.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-05-bing-ai-promoted-fake-openclaw-github-repo-pushing-info-stealing-malware-39d9a3.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-05-nation-state-actor-embraces-ai-malware-assembly-line-ab4ba8.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-05-tycoon-2fa-goes-boom-as-europol-vendors-bust-phishing-platform-aac9d1.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-05-wikipedia-hit-by-self-propagating-javascript-worm-that-vandalized-pages-fed89e.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-05-cisco-drops-48-new-firewall-vulnerabilities-2-critical-a7934e.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-05-wordpress-membership-plugin-bug-exploited-to-create-admin-accounts-11863e.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-05-fbi-arrests-suspect-linked-to-46m-crypto-theft-from-us-marshals-ac6c12.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-05-israel-hacked-traffic-cameras-in-iran-f7709a.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-05-fig-security-emerges-from-stealth-to-fix-broken-security-operations-0ad050.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-05-software-development-practices-help-enterprises-tackle-real-life-risks-25a391.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-05-cisco-confirms-active-exploitation-of-two-catalyst-sd-wan-manager-vulnerabiliti-2df3fb.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-05-preparing-for-the-quantum-era-post-quantum-cryptography-webinar-for-security-le-6e7188.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-05-google-says-90-zero-days-were-exploited-in-attacks-last-year-6a4b9f.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-05-2026-browser-data-reveals-major-enterprise-security-blind-spots-3238cb.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-05-latam-now-faces-2x-more-cyberattacks-than-us-125079.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-05-threatsday-bulletin-ddr5-bot-scalping-samsung-tv-tracking-reddit-privacy-fine-m-4208af.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-05-police-dismantles-online-gambling-ring-exploiting-ukrainian-women-17cb86.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-05-dust-specter-targets-iraqi-officials-with-new-splitdrop-and-ghostform-malware-6eb23a.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-05-hacked-app-part-of-usisraeli-propaganda-campaign-against-iran-66689d.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-05-where-multi-factor-authentication-stops-and-credential-abuse-starts-d1c1a0.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-05-cisco-flags-more-sd-wan-flaws-as-actively-exploited-in-attacks-60143e.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-05-apt28-linked-campaign-deploys-badpaw-loader-and-meowmeow-backdoor-in-ukraine-5e4769.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-05-phobos-ransomware-admin-pleads-guilty-to-wire-fraud-conspiracy-0f4b4d.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-05-europol-led-operation-takes-down-tycoon-2fa-phishing-as-a-service-linked-to-640-0c8c5d.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-05-fbi-and-europol-seize-leakbase-forum-used-to-trade-stolen-credentials-c088b8.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-04-bitwarden-adds-support-for-passkey-login-on-windows-11-affa42.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-04-mail2shell-zero-click-attack-lets-hackers-hijack-freescout-mail-servers-09c3f9.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-04-vmware-aria-operations-bug-exploited-cloud-resources-at-risk-f20d01.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-04-windows-10-kb5075039-update-fixes-broken-recovery-environment-bef129.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-04-fake-lastpass-support-email-threads-try-to-steal-vault-passwords-bed90b.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-04-cisco-warns-of-max-severity-secure-fmc-flaws-giving-root-access-9dbc34.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-04-spyware-grade-coruna-ios-exploit-kit-now-used-in-crypto-theft-attacks-dc58f1.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-04-hacker-mass-mails-hungerrush-extortion-emails-to-restaurant-patrons-48fa39.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-04-fbi-seizes-leakbase-cybercrime-forum-data-of-142000-members-2889ff.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-04-149-hacktivist-ddos-attacks-hit-110-organizations-in-16-countries-after-middle--b41193.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-04-stranger-things-meets-cybersecurity-lessons-from-the-hive-mind-8bccce.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-04-europol-coordinated-action-disrupts-tycoon2fa-phishing-platform-638118.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-04-dark-reading-confidential-this-threat-hunter-helped-cops-bust-up-an-african-cyb-81e765.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-04-coruna-ios-exploit-kit-uses-23-exploits-across-five-chains-targeting-ios-131721-d6e0c1.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-04-manipulating-ai-summarization-features-c462a4.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-04-new-rfp-template-for-ai-usage-control-and-ai-governance-c87406.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-04-chinas-silver-dragon-razes-governments-in-eu-se-asia-7dc1f5.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-04-fake-laravel-packages-on-packagist-deploy-rat-on-windows-macos-and-linux-e1405f.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-04-apt41-linked-silver-dragon-targets-governments-using-cobalt-strike-and-google-d-1a652e.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-03-cisa-adds-actively-exploited-vmware-aria-operations-flaw-cve-2026-22719-to-kev--a3f08d.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-03-cisa-flags-vmware-aria-operations-rce-flaw-as-exploited-in-attacks-b374a4.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-03-paint-maker-giant-akzonobel-confirms-cyberattack-on-us-site-61db7e.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-03-facebook-accounts-unavailable-in-worldwide-outage-c75a6e.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-03-indian-apt-sloppy-lemming-targets-defense-critical-infrastructure-9026d9.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-03-microsoft-hackers-abuse-oauth-error-flows-to-spread-malware-b5adcd.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-03-vehicle-tire-pressure-sensors-enable-silent-tracking-4a3a65.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-03-qualcomm-zero-day-exploited-in-targeted-android-attacks-ef45c8.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-03-speakeasies-to-shadow-ai-banning-ai-browsers-will-fail-fa39e8.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-03-fake-tech-support-spam-deploys-customized-havoc-c2-across-organizations-a7decb.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-03-google-chrome-shifts-to-two-week-release-cycle-for-increased-stability-f11761.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-03-lexisnexis-confirms-data-breach-as-hackers-leak-stolen-files-fb98ee.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-03-compromised-site-management-panels-are-a-hot-item-in-cybercrime-markets-f334b8.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-03-building-a-high-impact-tier-1-the-3-steps-cisos-must-follow-a18fca.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-03-open-source-cyberstrikeai-deployed-in-ai-driven-fortigate-attacks-across-55-cou-3d554c.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-03-ai-agent-overload-how-to-solve-the-workload-identity-crisis-ab0a90.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-03-on-moltbook-0bb193.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-03-amazon-drone-strikes-damaged-aws-data-centers-in-middle-east-e22e57.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-03-as-war-continues-pro-iranian-actors-launch-barrage-of-cyberattacks-c23e2f.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-03-ai-agents-the-next-wave-identity-dark-matter-powerful-invisible-and-unmanaged-610a40.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-03-starkiller-phishing-suite-uses-aitm-reverse-proxy-to-bypass-multi-factor-authen-fd48d7.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-03-star-citizen-game-dev-discloses-breach-affecting-user-data-482371.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-03-uh-cancer-center-data-breach-affects-nearly-12-million-people-121575.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-03-microsoft-warns-oauth-redirect-abuse-delivers-malware-to-government-targets-d51874.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-03-android-gets-patches-for-qualcomm-zero-day-exploited-in-attacks-ee6f55.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-03-google-confirms-cve-2026-21385-in-qualcomm-android-component-exploited-b6fa3d.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-03-sloppylemming-targets-pakistan-and-bangladesh-governments-using-dual-malware-ch-73a0a0.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-02-cyberstrikeai-tool-adopted-by-hackers-for-ai-powered-attacks-1bdb0f.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-02-critical-openclaw-vulnerability-exposes-ai-agent-risks-b38a23.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-02-the-tug-of-war-over-firewall-backlogs-in-the-ai-driven-development-era-2eed00.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-02-30-alleged-members-of-the-com-arrested-in-project-compass-06b60a.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-02-fake-google-security-site-uses-pwa-app-to-steal-credentials-mfa-codes-3a90c5.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-02-alabama-man-pleads-guilty-to-hacking-extorting-hundreds-of-women-8e46b1.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-02-florida-woman-imprisoned-for-massive-microsoft-license-fraud-scheme-598185.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-02-new-chrome-vulnerability-let-malicious-extensions-escalate-privileges-via-gemin-bc9d95.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-02-google-develops-merkle-tree-certificates-to-enable-quantum-resistant-https-in-c-5bdcf5.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-02-uk-warns-of-iranian-cyberattack-risks-amid-middle-east-conflict-582428.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-02-how-deepfakes-and-injection-attacks-are-breaking-identity-verification-89a94a.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-02-weekly-recap-sd-wan-0-day-critical-cves-telegram-probe-smart-tv-proxy-sdk-and-m-42a55c.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-02-quantum-resistant-data-diode-secures-sensitive-data-on-edge-devices-critical-sy-00bbd9.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-02-anthropic-confirms-claude-is-down-in-a-worldwide-outage-1c4d13.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-02-llm-assisted-deanonymization-dcbe6b.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-02-how-to-protect-your-saas-from-bot-attacks-with-safeline-waf-eed096.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-02-north-korean-apt-targets-air-gapped-systems-in-recent-campaign-a010fb.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-02-google-working-towards-quantum-safe-chrome-https-certificates-23e36b.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-02-us-israel-and-iran-trade-cyberattacks-pro-west-hacks-cause-disruption-as-tehran-e05cdf.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-02-apt28-tied-to-cve-2026-21513-mshtml-0-day-exploited-before-feb-2026-patch-tuesd-df9b4f.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-02-bug-in-googles-gemini-ai-panel-opens-door-to-hijacking-21325c.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-02-north-korean-hackers-publish-26-npm-packages-hiding-pastebin-c2-for-cross-platf-3cceb6.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-01-clawjacked-attack-let-malicious-websites-hijack-openclaw-to-steal-data-1ae163.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-01-samsung-tvs-to-stop-collecting-texans-data-without-express-consent-20d074.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-03-01-hackers-weaponize-claude-code-in-mexican-government-cyberattack-0c2565.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-28-quicklens-chrome-extension-steals-crypto-shows-clickfix-attack-b554d7.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-28-clawjacked-flaw-lets-malicious-sites-hijack-local-openclaw-ai-agents-via-websoc-e01b92.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-28-48m-in-crypto-stolen-after-korean-tax-agency-exposes-wallet-seed-c7bcdb.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-28-who-is-the-kimwolf-botmaster-dort-669622.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-28-canadian-tire-data-breach-impacts-38-million-accounts-15d1f5.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-28-thousands-of-public-google-cloud-api-keys-exposed-with-gemini-access-after-api--d43686.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-27-pentagon-designates-anthropic-supply-chain-risk-over-ai-military-dispute-e1294c.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-27-friday-squid-blogging-squid-fishing-in-peru-9fd8e6.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-27-trump-orders-all-federal-agencies-to-phase-out-use-of-anthropic-technology-25d78a.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-27-life-mirrors-art-ransomware-hits-hospitals-on-tv-amp-irl-0b5787.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-27-cities-hosting-major-events-need-more-focus-on-wireless-drone-defense-477486.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-27-flaw-finding-ai-assistants-face-criticism-for-speed-accuracy-7b1e7b.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-27-microsoft-testing-windows-11-batch-file-security-improvements-cf4124.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-27-apt37-hackers-use-new-malware-to-breach-air-gapped-networks-86de00.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-27-europol-led-crackdown-on-the-com-hackers-leads-to-30-arrests-e54428.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-27-doj-seizes-61-million-in-tether-linked-to-pig-butchering-crypto-scams-568362.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-27-900-sangoma-freepbx-instances-compromised-in-ongoing-web-shell-attacks-763c54.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-27-the-case-for-why-better-breach-transparency-matters-f7975c.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-27-cisa-warns-that-resurge-malware-can-be-dormant-on-ivanti-devices-7eb195.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-27-malicious-go-crypto-module-steals-passwords-deploys-rekoobe-backdoor-3f3e6f.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-27-in-other-news-attck-advisory-council-russian-cyberattacks-aid-missile-strikes-p-703e6d.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-27-third-party-patching-and-the-business-footprint-we-all-share-3bb4df.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-27-claude-code-security-shows-promise-not-perfection-01b37f.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-27-38-million-allegedly-impacted-by-manomano-data-breach-91d5be.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-27-900-sangoma-freepbx-instances-infected-with-web-shells-be3129.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-27-scarcruft-uses-zoho-workdrive-and-usb-malware-to-breach-air-gapped-networks-ad0886.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-27-chilean-carding-shop-operator-extradited-to-us-9d7ff3.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-27-anthropic-refuses-to-bend-to-pentagon-on-ai-safeguards-as-dispute-nears-deadlin-1558da.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-27-ukrainian-man-pleads-guilty-to-running-ai-powered-fake-id-site-1a4047.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-27-why-tehrans-two-tiered-internet-is-so-dangerous-329675.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-27-phishing-attacks-against-people-seeking-programming-jobs-d0acb8.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-27-aeternum-botnet-loader-employs-polygon-blockchain-cc-to-boost-resilience-cea422.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-27-juniper-networks-ptx-routers-affected-by-critical-vulnerability-096304.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-27-trojanized-gaming-tools-spread-java-based-rat-via-browser-and-chat-platforms-d5dff1.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-27-meta-files-lawsuits-against-brazil-china-vietnam-advertisers-over-celeb-bait-sc-662e47.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-27-critical-flaws-exposed-gardyn-smart-gardens-to-remote-hacking-63f920.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-26-marquis-v-sonicwall-lawsuit-ups-the-breach-blame-game-0ff120.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-26-cisco-sd-wan-zero-day-under-exploitation-for-3-years-9dc536.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-26-previously-harmless-google-api-keys-now-expose-gemini-ai-data-43efc8.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-26-aeternum-c2-botnet-stores-encrypted-commands-on-polygon-blockchain-to-evade-tak-9eee21.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-26-trend-micro-warns-of-critical-apex-one-code-execution-flaws-ae510d.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-26-european-dyi-chain-manomano-data-breach-impacts-38-million-customers-e7239b.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-26-critical-juniper-networks-ptx-flaw-allows-full-router-takeover-78abc0.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-26-olympique-marseille-confirms-attempted-cyberattack-after-data-leak-69a4ce.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-26-uat-10027-targets-us-education-and-healthcare-with-dohdoor-backdoor-68555a.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-26-threatsday-bulletin-kali-linux-claude-chrome-crash-traps-winrar-flaws-lockbit-1-71e718.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-26-ransomware-payment-rate-drops-to-record-low-as-attacks-surge-9b49f9.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-26-ransomware-payment-rate-drops-to-record-low-as-attacks-surge-387eee.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-26-microsoft-expands-windows-restore-to-more-enterprise-devices-40da45.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-26-llms-generate-predictable-passwords-ab5dc5.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-26-expert-recommends-prepare-for-pqc-right-now-f07e31.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-26-cisa-issues-updated-resurge-malware-analysis-highlighting-a-stealthy-but-active-8c0c7f.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-26-new-york-sues-valve-for-promoting-illegal-gambling-via-game-loot-boxes-643e2b.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-26-microsoft-warns-developers-of-fake-nextjs-job-repos-delivering-in-memory-malwar-8c4abe.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-26-malicious-stripeapi-nuget-package-mimicked-official-library-and-stole-api-token-8b4cbf.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-26-cisco-sd-wan-zero-day-cve-2026-20127-exploited-since-2023-for-admin-access-8fe9c5.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-25-chinese-police-use-chatgpt-to-smear-japan-pm-takaichi-1560d7.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-25-medical-device-maker-ufp-technologies-warns-of-data-stolen-in-cyberattack-fef5ea.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-25-flaws-in-claude-code-put-developers-machines-at-risk-a47659.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-25-fake-nextjs-job-interview-tests-backdoor-developers-devices-22c73e.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-25-ramp-forum-seizure-fractures-ransomware-ecosystem-58d665.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-25-pci-council-says-threats-to-payments-systems-are-speeding-up-c9e135.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-25-critical-cisco-sd-wan-bug-exploited-in-zero-day-attacks-since-2023-94220f.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-25-google-disrupts-unc2814-gridtide-campaign-after-53-breaches-across-42-countries-b10bf9.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-25-chinese-cyberspies-breached-dozens-of-telecom-firms-govt-agencies-47030c.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-25-claude-code-flaws-allow-remote-code-execution-and-api-key-exfiltration-fbaef4.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-25-malicious-nextjs-repos-target-developers-via-fake-job-interviews-8e788c.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-25-marquis-sues-sonicwall-over-backup-breach-that-led-to-ransomware-attack-4e69ad.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-25-slh-offers-5001000-per-call-to-recruit-women-for-it-help-desk-vishing-attacks-a1d0ec.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-25-the-openclaw-hype-analysis-of-chatter-from-open-source-deep-and-dark-web-8dfb5a.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-25-top-5-ways-broken-triage-increases-business-risk-instead-of-reducing-it-14ef9c.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-25-why-call-this-number-toad-emails-beat-gateways-76412c.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-25-zyxel-warns-of-critical-rce-flaw-affecting-over-a-dozen-routers-207afe.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-25-malicious-nuget-packages-stole-aspnet-data-npm-package-dropped-malware-1b377f.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-25-poisoning-ai-training-data-b55f67.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-25-immediate-action-required-cisa-issues-emergency-directive-to-secure-cisco-sd-wa-719028.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-25-richter-scale-model-measures-magnitude-of-ot-cyber-incidents-40d65e.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-25-manual-processes-are-putting-national-security-at-risk-d4eb7a.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-25-us-sanctions-russian-broker-for-buying-stolen-zero-day-exploits-5636ac.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-25-defense-contractor-employee-jailed-for-selling-8-zero-days-to-russian-broker-bc7afb.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-25-ex-l3harris-exec-jailed-for-selling-zero-days-to-russian-exploit-broker-40590b.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-25-operation-red-card-20-leads-to-651-arrests-in-africa-83f127.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-25-windows-11-kb5077241-update-improves-bitlocker-adds-sysmon-tool-5cf08d.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-25-solarwinds-patches-4-critical-serv-u-155-flaws-allowing-root-code-execution-493743.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-25-cisa-confirms-active-exploitation-of-filezen-cve-2026-25108-vulnerability-d14763.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-24-phishing-campaign-targets-freight-and-logistics-orgs-in-the-us-europe-2111e8.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-24-wynn-resorts-confirms-employee-data-breach-after-extortion-threat-7d436a.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-24-1campaign-platform-helps-malicious-google-ads-evade-detection-682a48.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-24-attackers-now-need-just-29-minutes-to-own-a-network-5fbc00.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-24-lazarus-group-picks-a-new-poison-medusa-ransomware-397ad4.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-24-roguepilot-flaw-in-github-codespaces-enabled-copilot-to-leak-github-token-5438d2.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-24-cargurus-data-breach-exposes-information-of-124-million-accounts-82fbf4.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-24-microsoft-adds-copilot-data-controls-to-all-storage-locations-dd2912.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-24-identity-first-ai-security-why-cisos-must-add-intent-to-the-equation-20cbd1.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-24-uk-fines-reddit-19-million-for-using-childrens-data-unlawfully-3aa759.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-24-uac-0050-targets-european-financial-institution-with-spoofed-domain-and-rms-mal-1e5d36.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-24-as-cybersecurity-firms-chase-ai-vc-market-skyrockets-2f91dd.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-24-critical-solarwinds-serv-u-flaws-offer-root-access-to-servers-394a14.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-24-is-ai-good-for-democracy-2581af.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-24-identity-prioritization-isnt-a-backlog-problem-its-a-risk-math-problem-b88b70.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-24-lazarus-group-uses-medusa-ransomware-in-middle-east-and-us-healthcare-attacks-cce3e3.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-24-shinyhunters-extortion-gang-claims-odido-breach-affecting-millions-a73598.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-24-north-korean-lazarus-group-linked-to-medusa-ransomware-attacks-31f53c.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-24-unsolicitedbooker-targets-central-asian-telecoms-with-lucidoor-and-marssnake-ba-9302e9.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-24-anthropic-says-chinese-ai-firms-used-16-million-claude-queries-to-copy-model-d826cf.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-23-android-mental-health-apps-with-147m-installs-filled-with-security-flaws-4a369e.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-23-spitting-cash-atm-jackpotting-attacks-surged-in-2025-074903.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-23-more-than-dashboards-ai-decisions-must-be-provable-7ba105.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-23-spain-arrests-suspected-hacktivists-for-ddosing-govt-sites-57b83c.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-23-irans-muddywater-targets-orgs-with-fresh-malware-as-tensions-mount-b73af2.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-23-enigma-cipher-device-still-holds-secrets-for-cyber-pros-c243fd.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-23-apt28-targeted-european-entities-using-webhook-based-macro-malware-369c16.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-23-microsoft-says-bug-in-classic-outlook-hides-the-mouse-pointer-8420f2.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-23-600-fortigate-devices-hacked-by-ai-armed-amateur-b6cb66.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-23-ad-tech-firm-optimizely-confirms-data-breach-after-vishing-attack-dcaac4.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-23-wormable-xmrig-campaign-uses-byovd-exploit-and-time-based-logic-bomb-e58b01.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-23-when-identity-isnt-the-weak-link-access-still-is-7192b8.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-23-ukrainian-gets-5-years-in-us-prison-for-aiding-north-korean-it-fraud-df1015.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-23-weekly-recap-double-tap-skimmers-promptspy-ai-30tbps-ddos-docker-malware-more-7d0942.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-23-autonomous-ai-agents-provide-new-class-of-supply-chain-attack-887646.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-23-on-the-security-of-password-managers-2c7142.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-23-how-exposed-endpoints-increase-risk-across-llm-infrastructure-e119bd.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-23-romanian-hacker-pleads-guilty-to-selling-access-to-us-state-network-f4e172.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-23-cisa-recently-patched-roundcube-flaws-now-exploited-in-attacks-a5ff1b.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-23-hundreds-of-fortigate-firewalls-hacked-in-ai-powered-attacks-aws-5799fb.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-23-recent-roundcube-webmail-vulnerability-exploited-in-attacks-3dca89.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-23-mississippi-hospital-system-closes-all-clinics-after-ransomware-attack-3088c6.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-23-malicious-npm-packages-harvest-crypto-keys-ci-secrets-and-api-tokens-58c2ee.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-23-paypal-data-breach-led-to-fraudulent-transactions-7c347c.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-23-muddywater-targets-mena-organizations-with-ghostfetch-char-and-http-vip-6a31b4.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-22-arkanix-stealer-pops-up-as-short-lived-ai-info-stealer-experiment-0f9fcb.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-21-predator-spyware-hooks-ios-springboard-to-hide-mic-camera-activity-b4220c.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-21-ai-assisted-threat-actor-compromises-600-fortigate-devices-in-55-countries-9e8806.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-21-amazon-ai-assisted-hacker-breached-600-fortinet-firewalls-in-5-weeks-a5adf2.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-21-critical-grandstream-phone-vulnerability-exposes-calls-to-interception-fba25b.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-21-anthropic-launches-claude-code-security-for-ai-powered-vulnerability-scanning-eba77d.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-21-cisa-adds-two-actively-exploited-roundcube-flaws-to-kev-catalog-7551d7.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-20-ec-council-expands-ai-certification-portfolio-to-strengthen-us-ai-workforce-rea-fde4a9.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-20-friday-squid-blogging-squid-cartoon-18c410.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-20-attackers-use-new-tool-to-scan-for-react2shell-exposure-afbba9.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-20-starkiller-phishing-service-proxies-real-login-pages-mfa-354472.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-20-god-like-attack-machines-ai-agents-ignore-security-policies-68e838.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-20-japanese-tech-giant-advantest-hit-by-ransomware-attack-a50e2c.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-20-lessons-from-ai-hacking-every-model-every-layer-is-risky-a17d72.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-20-cisa-beyondtrust-rce-flaw-now-exploited-in-ransomware-attacks-3bc3fb.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-20-data-breach-at-french-bank-registry-impacts-12-million-accounts-1425a9.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-20-nists-quantum-breakthrough-single-photons-produced-on-a-chip-1abdc6.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-20-beyondtrust-flaw-used-for-web-shells-backdoors-and-data-exfiltration-be8028.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-20-in-other-news-ransomware-shuts-us-clinics-ics-vulnerability-surge-european-parl-32ed13.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-20-why-the-shift-left-dream-has-become-a-nightmare-for-security-and-developers-c610f3.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-20-cline-cli-230-supply-chain-attack-installed-openclaw-on-developer-systems-6eb901.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-20-latin-americas-cyber-maturity-lags-threat-landscape-0d72c6.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-20-paypal-discloses-data-breach-that-exposed-user-info-for-6-months-0e322f.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-20-beyondtrust-vulnerability-exploited-in-ransomware-attacks-711cdd.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-20-ring-cancels-its-partnership-with-flock-b4b8d2.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-20-clickfix-campaign-abuses-compromised-sites-to-deploy-mimicrat-malware-a1d528.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-20-mississippi-medical-center-closes-all-clinics-after-ransomware-attack-5a7851.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-20-fbi-20-million-losses-caused-by-700-atm-jackpotting-attacks-in-2025-fd101a.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-20-identity-cyber-scores-the-new-metric-shaping-cyber-insurance-in-2026-b4870d.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-20-fbi-over-20-million-stolen-in-surge-of-atm-malware-attacks-in-2025-8901f1.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-20-ukrainian-national-sentenced-to-5-years-in-north-korea-it-worker-fraud-case-8d1415.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-20-chip-testing-giant-advantest-hit-by-ransomware-0e6cbe.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-20-ukrainian-gets-5-years-for-helping-north-koreans-infiltrate-us-firms-9b8ecd.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-20-fbi-reports-1900-atm-jackpotting-incidents-since-2020-20m-lost-in-2025-a9ed40.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-20-promptspy-android-malware-abuses-gemini-ai-at-runtime-for-persistence-f1b8ab.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-20-former-google-engineers-indicted-over-trade-secret-transfers-to-iran-970170.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-19-emerging-chiplet-designs-spark-fresh-cybersecurity-challenges-275d02.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-19-promptspy-is-the-first-known-android-malware-to-use-generative-ai-at-runtime-fab534.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-19-supply-chain-attack-secretly-installs-openclaw-for-cline-users-01b72d.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-19-best-in-class-starkiller-phishing-kit-bypasses-mfa-bca339.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-19-abu-dhabi-finance-week-exposed-vip-passport-details-2182bb.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-19-promptspy-android-malware-abuses-gemini-ai-to-automate-recent-apps-persistence-c67ae8.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-19-interpol-operation-red-card-20-arrests-651-in-african-cybercrime-crackdown-a66f40.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-19-microsoft-patches-cve-2026-26119-privilege-escalation-in-windows-admin-center-1bca95.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-19-flaw-in-grandstream-voip-phones-allows-stealthy-eavesdropping-0b1310.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-19-google-blocked-over-175-million-play-store-app-submissions-in-2025-b94005.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-19-cisa-orders-feds-to-patch-actively-exploited-dell-flaw-within-3-days-8b5bbd.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-19-connected-amp-compromised-when-iot-devices-turn-into-threats-1d603c.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-19-connected-and-compromised-when-iot-devices-turn-into-threats-692ff4.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-19-how-infostealers-turn-stolen-credentials-into-real-identities-de9d78.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-19-french-government-says-12-million-bank-accounts-exposed-in-breach-977b14.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-19-threatsday-bulletin-openssl-rce-foxit-0-days-copilot-leak-ai-password-flaws-20--e2e5c9.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-19-nigerian-man-gets-eight-years-in-prison-for-hacking-tax-firms-d92672.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-19-nearly-1-million-user-records-compromised-in-figure-data-breach-94f77c.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-19-texas-sues-tp-link-over-chinese-hacking-risks-user-deception-388a9a.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-19-hackers-target-microsoft-entra-accounts-in-device-code-vishing-attacks-53072b.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-19-venice-security-emerges-from-stealth-with-33m-funding-for-privileged-access-man-e96dce.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-19-malicious-ai-637fcb.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-19-from-exposure-to-exploitation-how-ai-collapses-your-response-window-3a27e0.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-19-police-arrests-651-suspects-in-african-cybercrime-crackdown-22b8cd.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-19-fake-iptv-apps-spread-massiv-android-malware-targeting-mobile-banking-users-372c6b.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-19-new-massiv-android-banking-malware-poses-as-an-iptv-app-3f6e1c.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-19-crescentharvest-campaign-targets-iran-protest-supporters-with-rat-malware-dfaec7.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-19-more-than-40-of-south-africans-were-scammed-in-2025-95340c.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-18-scam-abuses-gemini-chatbots-to-convince-people-to-buy-fake-crypto-8725ce.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-18-critical-grandstream-voip-bug-highlights-smb-security-blind-spot-d8c82d.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-18-critical-infra-honeywell-cctvs-vulnerable-to-auth-bypass-flaw-779c31.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-18-threat-intelligence-has-a-human-shaped-blind-spot-e83e11.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-18-dells-hard-coded-flaw-a-nation-state-goldmine-f91edc.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-18-ai-platforms-can-be-abused-for-stealthy-malware-communication-5aa3c7.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-18-a-cisos-playbook-for-defending-data-assets-against-ai-scraping-d08637.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-18-citizen-lab-finds-cellebrite-tool-used-on-kenyan-activists-phone-in-police-cust-3d9b3e.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-18-grandstream-gxp1600-voip-phones-exposed-to-unauthenticated-remote-code-executio-a88c81.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-18-telegram-channels-expose-rapid-weaponization-of-smartermail-flaws-c19f08.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-18-microsoft-anti-phishing-rules-mistakenly-blocked-emails-teams-messages-ec785a.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-18-data-breach-at-fintech-firm-figure-affects-nearly-1-million-accounts-6f93fe.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-18-critical-flaws-found-in-four-vs-code-extensions-with-over-125-million-installs-1a4c7f.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-18-ai-found-twelve-new-vulnerabilities-in-openssl-ccc408.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-18-microsoft-says-bug-causes-copilot-to-summarize-confidential-emails-2d1ae9.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-18-cybersecurity-tech-predictions-for-2026-operating-in-a-world-of-permanent-insta-f99019.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-18-glendale-man-gets-5-years-in-prison-for-role-in-darknet-drug-ring-cecfca.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-18-dell-recoverpoint-for-vms-zero-day-cve-2026-22769-exploited-since-mid-2024-be7c47.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-18-3-ways-to-start-your-intelligent-workflow-program-a170b0.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-18-notepad-fixes-hijacked-update-mechanism-used-to-deliver-targeted-malware-64997e.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-18-cisa-flags-four-security-flaws-under-active-exploitation-in-latest-kev-update-c6dc57.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-17-singapore-amp-its-4-major-telcos-fend-off-chinese-hackers-331568.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-17-spain-orders-nordvpn-protonvpn-to-block-laliga-piracy-sites-d34dda.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-17-supply-chain-attack-embeds-malware-in-android-devices-6fb959.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-17-poland-energy-survives-attack-on-wind-solar-infrastructure-339eda.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-17-flaws-in-popular-vscode-extensions-expose-developers-to-attacks-dc17a4.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-17-rmm-abuse-explodes-as-hackers-ditch-malware-ea9e8c.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-17-clickfix-attacks-abuses-dns-lookup-command-to-deliver-modelorat-551d29.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-17-chinese-hackers-exploiting-dell-zero-day-flaw-since-mid-2024-f2b42f.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-17-notepad-boosts-update-security-with-double-lock-mechanism-b0a3d2.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-17-researchers-show-copilot-and-grok-can-be-abused-as-malware-c2-proxies-1583dd.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-17-keenadu-firmware-backdoor-infects-android-tablets-via-signed-ota-updates-69b0f6.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-17-microsoft-teams-outage-affects-users-in-united-states-europe-31e595.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-17-what-5-million-apps-revealed-about-secrets-in-javascript-0b25ae.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-17-new-keenadu-backdoor-found-in-android-firmware-google-play-apps-4068d6.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-17-api-threats-grow-in-scale-as-ai-expands-the-blast-radius-55af1e.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-17-cyber-insights-2026-the-ongoing-fight-to-secure-industrial-control-systems-cdf53d.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-17-smartloader-attack-uses-trojanized-oura-mcp-server-to-deploy-stealc-infostealer-21a25e.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-17-side-channel-attacks-against-llms-908171.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-17-webinar-how-modern-soc-teams-use-ai-and-context-to-investigate-cloud-breaches-f-d34bb5.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-17-poland-arrests-suspect-linked-to-phobos-ransomware-operation-8f84c7.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-17-my-day-getting-my-hands-dirty-with-an-ndr-system-6fb934.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-17-ireland-now-also-investigating-x-over-grok-made-sexual-images-c8fcdb.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-17-microsoft-finds-summarize-with-ai-prompts-manipulating-chatbot-recommendations-8fb4f6.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-17-apple-tests-end-to-end-encrypted-rcs-messaging-in-ios-264-developer-beta-0faea2.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-16-washington-hotel-in-japan-discloses-ransomware-infection-incident-16d5f5.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-16-eurail-says-stolen-traveler-data-now-up-for-sale-on-dark-web-d28e50.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-16-man-arrested-for-demanding-reward-after-accidental-police-data-leak-0c5822.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-16-infostealer-steals-openclaw-ai-agent-configuration-files-and-gateway-tokens-08cb57.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-16-study-uncovers-25-password-recovery-attacks-in-major-cloud-password-managers-6864f1.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-16-operation-doppelbrand-weaponizing-fortune-500-brands-29e3e3.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-16-infostealer-malware-found-stealing-openclaw-secrets-for-first-time-731361.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-16-passwords-to-passkeys-staying-iso-27001-compliant-in-a-passwordless-era-45fee4.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-16-260k-chrome-users-duped-by-fake-ai-browser-extensions-c221bb.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-16-android-17-beta-strengthens-secure-by-default-design-for-privacy-and-app-securi-c678fd.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-16-cisa-navigates-dhs-shutdown-with-reduced-staff-ed652d.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-16-weekly-recap-outlook-add-ins-hijack-0-day-patches-wormable-botnet-ai-malware-68ed29.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-16-cisa-gives-feds-3-days-to-patch-actively-exploited-beyondtrust-flaw-fe17ff.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-16-the-promptware-kill-chain-231506.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-16-microsoft-warns-of-clickfix-attack-abusing-dns-lookups-7bb758.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-16-safe-and-inclusive-esociety-how-lithuania-is-bracing-for-aidriven-cyber-fraud-3e63c1.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-16-amazon-scraps-partnership-with-surveillance-company-after-super-bowl-ad-backlas-5f3c2e.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-16-new-zerodayrat-mobile-spyware-enables-real-time-surveillance-and-data-theft-d7520a.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-16-google-patches-first-chrome-zero-day-exploited-in-attacks-this-year-f79287.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-16-google-patches-first-actively-exploited-chrome-zero-day-of-2026-a65af8.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-16-new-chrome-zero-day-cve-2026-2441-under-active-attack-patch-released-408744.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-15-canada-goose-investigating-as-hackers-leak-600k-customer-records-c12ba7.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-15-new-clickfix-attack-abuses-nslookup-to-retrieve-powershell-payload-via-dns-b23a1e.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-15-windows-11-kb5077181-fixes-boot-failures-linked-to-failed-updates-e1ef96.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-15-ctm360-lumma-stealer-and-ninja-browser-malware-campaign-abusing-google-groups-33a8b8.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-15-pastebin-comments-push-clickfix-javascript-attack-to-hijack-crypto-swaps-e1c825.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-15-microsoft-discloses-dns-based-clickfix-attack-using-nslookup-for-malware-stagin-2af1cc.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-14-upcoming-speaking-engagements-e76d60.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-14-one-threat-actor-responsible-for-83-of-recent-ivanti-rce-attacks-cdce7e.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-14-snail-mail-letters-target-trezor-and-ledger-users-in-crypto-theft-attacks-248060.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-14-over-300-malicious-chrome-extensions-caught-leaking-or-stealing-user-data-7abb7f.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-13-fake-job-recruiters-hide-malware-in-developer-coding-challenges-39b36f.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-13-friday-squid-blogging-do-squid-dream-114d59.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-13-zscaler-squarex-deal-boosts-zero-trust-secure-browsing-capabilities-f3db73.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-13-claude-llm-artifacts-abused-to-push-mac-infostealers-in-clickfix-attack-5c406e.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-13-louis-vuitton-dior-and-tiffany-fined-25-million-over-data-breaches-0105ef.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-13-google-ties-suspected-russian-actor-to-canfail-malware-attacks-on-ukrainian-org-224d12.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-13-microsoft-under-pressure-to-bolster-defenses-for-byovd-attacks-986663.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-13-nation-state-hackers-put-defense-industrial-base-under-siege-86483c.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-13-ai-agents-swarm-security-complexity-follows-suit-62e708.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-13-google-links-china-iran-russia-north-korea-to-coordinated-defense-sector-cyber--a273e5.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-13-uat-9921-deploys-voidlink-malware-to-target-technology-and-financial-sectors-8d0d99.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-13-turning-ibm-qradar-alerts-into-action-with-criminal-ip-8c0b4f.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-13-in-other-news-google-looks-at-ai-abuse-trump-pauses-china-bans-disneys-27m-fine-b6eadb.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-13-check-point-announces-trio-of-acquisitions-amid-solid-2025-earnings-beat-9d98ff.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-13-cisa-flags-critical-microsoft-sccm-flaw-as-exploited-in-attacks-314414.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-13-dutch-carrier-odido-discloses-data-breach-impacting-6-million-c04134.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-13-cisa-announces-new-town-halls-to-engage-with-stakeholders-on-cyber-incident-rep-98d63e.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-13-malicious-chrome-extensions-caught-stealing-business-data-emails-and-browsing-h-c9e299.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-13-beyondtrust-vulnerability-targeted-by-hackers-within-24-hours-of-poc-release-89ac83.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-13-npms-update-to-harden-their-supply-chain-and-points-to-consider-708071.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-13-cisa-warns-of-exploited-solarwinds-notepad-microsoft-vulnerabilities-aad3d2.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-13-microsoft-fixes-bug-that-blocked-google-chrome-from-launching-47d3c0.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-13-researchers-observe-in-the-wild-exploitation-of-beyondtrust-cvss-99-vulnerabili-1195b1.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-13-chrome-145-patches-11-vulnerabilities-920bde.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-13-china-revives-tianfu-cup-hacking-contest-under-increased-secrecy-9dde13.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-12-russia-tries-to-block-whatsapp-telegram-in-communication-blockade-42a8bd.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-12-ivanti-epmm-zero-day-bugs-spark-exploit-frenzy-again-d79e8a.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-12-bitwarden-introduces-cupid-vault-for-secure-password-sharing-58f695.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-12-critical-beyondtrust-rce-flaw-now-exploited-in-attacks-patch-now-6db4a9.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-12-booz-allen-announces-general-availability-of-vellox-reverser-to-automate-malwar-42eb20.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-12-specterops-launches-bloodhound-scentry-to-accelerate-the-practice-of-identity-a-ab8f0f.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-12-gone-with-the-shame-one-in-two-americans-are-reluctant-to-talk-about-romance-sc-a0bd34.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-12-microsoft-new-windows-lnk-spoofing-issues-arent-vulnerabilities-c9ee06.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-12-those-summarize-with-ai-buttons-may-be-lying-to-you-02cfbe.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-12-google-reports-state-backed-hackers-using-gemini-ai-for-recon-and-attack-suppor-9dbff6.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-12-lazarus-campaign-plants-malicious-packages-in-npm-and-pypi-ecosystems-1f6629.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-12-how-to-eliminate-the-technical-debt-of-insecure-ai-assisted-software-developmen-47d2e6.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-12-apollomd-data-breach-impacts-626000-individuals-8678f8.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-12-3d-printer-surveillance-e1b7f3.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-12-threatsday-bulletin-ai-prompt-rce-claude-0-click-renengine-loader-auto-0-days-2-c7967f.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-12-the-ctem-divide-why-84-of-security-programs-are-falling-behind-2fb4f1.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-12-senegalese-data-breaches-expose-lack-of-security-maturity-38d92e.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-12-83-of-ivanti-epmm-exploits-linked-to-single-ip-on-bulletproof-hosting-infrastru-f9ca7f.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-12-apple-fixes-exploited-zero-day-affecting-ios-macos-and-other-devices-566c29.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-11-north-koreas-unc1069-hammers-crypto-firms-with-ai-26f749.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-11-how-to-stay-on-top-of-future-threats-with-a-cutting-edge-soc-6fd7e5.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-11-automaker-secures-the-supply-chain-with-developer-friendly-platform-97e324.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-11-first-malicious-outlook-add-in-found-stealing-4000-microsoft-credentials-f7e724.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-11-kimwolf-botnet-swamps-anonymity-network-i2p-3fcd61.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-11-apt36-and-sidecopy-launch-cross-platform-rat-campaigns-against-indian-entities-b8e24c.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-11-rewiring-democracy-ebook-is-on-sale-5d13e1.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-11-ai-rising-do-we-know-enough-about-the-data-populating-it-21e711.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-11-top-cyber-industry-defenses-spike-co2-emissions-05d9c5.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-11-over-60-software-vendors-issue-security-fixes-across-os-cloud-and-network-platf-05ae48.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-11-prompt-injection-via-road-signs-ce6fc8.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-11-cisas-2025-year-in-review-driving-security-and-resilience-across-critical-infra-a86c17.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-11-exposed-training-open-the-door-for-crypto-mining-in-fortune-500-cloud-environme-d8cec9.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-11-microsoft-patches-59-vulnerabilities-including-six-actively-exploited-zero-days-feb231.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-11-sshstalker-botnet-uses-irc-c2-to-control-linux-systems-via-legacy-kernel-exploi-5d0d26.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-11-north-korea-linked-unc1069-uses-ai-lures-to-attack-cryptocurrency-organizations-2ceae8.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-10-asia-fumbles-with-throttling-back-telnet-traffic-in-region-c10e94.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-10-solarwinds-whd-attacks-highlight-risks-of-exposed-apps-e73865.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-10-patch-tuesday-february-2026-edition-d2332e.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-10-in-bypassing-mfa-zerodayrat-is-textbook-stalkerware-847f25.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-10-microsoft-patches-6-actively-exploited-zero-days-22cc10.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-10-dprk-operatives-impersonate-professionals-on-linkedin-to-infiltrate-companies-418678.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-10-ot-attacks-get-scary-with-living-off-the-plant-techniques-a4ac39.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-10-reynolds-ransomware-embeds-byovd-driver-to-disable-edr-security-tools-26ceb6.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-10-from-ransomware-to-residency-inside-the-rise-of-the-digital-parasite-c25a35.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-10-fortinet-patches-critical-sqli-flaw-enabling-unauthenticated-code-execution-d5a38a.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-10-ai-generated-text-and-the-detection-arms-race-8160a0.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-10-cisa-releases-guide-to-help-critical-infrastructure-users-adopt-more-secure-com-f9238e.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-10-zastai-raises-6m-pre-a-to-scale-zero-false-positive-ai-powered-code-security-2c1cb8.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-10-warlock-ransomware-breaches-smartertools-through-unpatched-smartermail-server-71b776.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-10-dutch-authorities-confirm-ivanti-zero-day-exploit-exposed-employee-contact-data-79945b.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-09-transunions-real-networks-deal-focuses-on-robocall-blocking-b0acf9.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-09-warlock-gang-breaches-smartertools-via-smartermail-bugs-fc1bcf.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-09-teampcp-turns-cloud-infrastructure-into-crime-bots-02d6cf.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-09-reynolds-bundles-byovd-with-ransomware-payload-cf1052.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-09-what-organizations-need-to-change-when-managing-printers-a9b859.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-09-china-linked-unc3886-targets-singapore-telecom-sector-in-cyber-espionage-campai-9c4984.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-09-solarwinds-web-help-desk-exploited-for-rce-in-multi-stage-attacks-on-exposed-se-472cba.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-09-weekly-recap-ai-skill-malware-31tbps-ddos-notepad-hack-llm-backdoors-and-more-c77518.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-09-llms-are-getting-a-lot-better-and-faster-at-finding-and-exploiting-zero-days-a37a56.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-09-how-top-cisos-solve-burnout-and-speed-up-mttr-without-extra-hiring-44fc0a.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-09-bloody-wolf-targets-uzbekistan-russia-using-netsupport-rat-in-spear-phishing-ca-671b1a.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-09-teampcp-worm-exploits-cloud-infrastructure-to-build-criminal-infrastructure-c29a65.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-09-beyondtrust-fixes-critical-pre-auth-rce-vulnerability-in-remote-support-and-pra-7f3144.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-08-openclaw-integrates-virustotal-scanning-to-detect-malicious-clawhub-skills-150e7d.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-07-german-agencies-warn-of-signal-phishing-targeting-politicians-military-journali-b9745e.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-06-friday-squid-blogging-squid-fishing-tips-859027.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-06-i-am-in-the-epstein-files-f83ced.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-06-encrypt-it-already-campaign-pushes-big-tech-to-prioritize-e2e-encryption-dd8141.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-06-shai-hulud-the-hidden-costs-of-supply-chain-attacks-2e97e0.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-06-openclaws-gregarious-insecurities-make-safe-usage-difficult-96d0b5.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-06-china-linked-dknife-aitm-framework-targets-routers-for-traffic-hijacking-malwar-b29e1c.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-06-cisa-orders-removal-of-unsupported-edge-devices-to-reduce-federal-network-risk-643781.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-06-asian-state-backed-group-tgr-sta-1030-breaches-70-government-infrastructure-ent-9a93af.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-06-iphone-lockdown-mode-protects-washington-post-reporter-7dbdc7.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-06-how-samsung-knox-helps-stop-your-network-security-breach-8ea401.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-06-compromised-dydx-npm-and-pypi-packages-deliver-wallet-stealers-and-rat-malware-11b8e7.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-06-claude-opus-46-finds-500-high-severity-flaws-across-major-open-source-libraries-c08f14.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-05-encase-driver-weaponized-as-edr-killers-persist-179fc9.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-05-agentic-ai-site-moltbook-is-riddled-with-security-risks-2228a3.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-05-data-tool-to-triage-exploited-vulnerabilities-can-make-kev-more-useful-767698.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-05-aisurukimwolf-botnet-launches-record-setting-314-tbps-ddos-attack-207ba7.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-05-cyber-success-trifecta-education-certifications-amp-experience-f94189.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-05-threatsday-bulletin-codespaces-rce-asyncrat-c2-byovd-abuse-ai-cloud-intrusions--69b044.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-05-cisa-orders-federal-agencies-to-strengthen-edge-device-security-amid-rising-cyb-e59725.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-05-the-buyers-guide-to-ai-usage-control-a434e5.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-05-infy-hackers-resume-operations-with-new-c2-servers-after-iran-internet-blackout-aa7a0b.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-05-protests-dont-impede-iranian-spying-on-expats-syrians-israelis-ee2f9b.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-05-critical-n8n-flaw-cve-2026-25049-enables-system-command-execution-via-malicious-fe610a.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-04-malicious-nginx-configurations-enable-large-scale-web-traffic-hijacking-campaig-da8446.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-04-ransomware-gang-goes-full-godfather-with-cartel-228895.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-04-cisa-makes-unpublicized-ransomware-updates-to-kev-catalog-891123.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-04-attackers-use-windows-screensavers-to-drop-malware-rmm-tools-51dc7f.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-04-microsoft-develops-scanner-to-detect-backdoors-in-open-weight-large-language-mo-3aeb3a.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-04-deadvax-malware-campaign-deploys-asyncrat-via-ipfs-hosted-vhd-phishing-files-1bb112.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-04-extra-extra-announcing-dr-global-latin-america-cd5adb.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-04-big-breach-or-smooth-sailing-mexican-govt-faces-leak-allegations-bb6ddc.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-04-google-looker-bugs-allow-cross-tenant-rce-data-exfil-b7078e.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-03-russian-hackers-weaponize-microsoft-office-bug-in-just-3-days-1a81cb.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-03-glassworm-malware-returns-to-shatter-developer-ecosystems-dd94a9.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-03-ai-may-supplant-pen-testers-but-oversight-amp-trust-are-not-there-yet-557c11.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-03-8-minute-access-ai-accelerates-breach-of-aws-environment-93d7cb.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-03-dark-patterns-undermine-security-one-click-at-a-time-cce82b.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-02-attackers-harvest-dropbox-logins-via-fake-pdf-lures-2c47f9.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-02-county-pays-600k-to-wrongfully-jailed-pen-testers-9c4e62.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-02-chinese-hackers-hijack-notepad-updates-for-6-months-e7fb56.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-02-please-dont-feed-the-scattered-lapsus-shinyhunters-3eca3b.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-02-02-shinyhunters-expands-scope-of-saas-extortion-attacks-6876ef.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-01-30-torq-moves-socs-beyond-soar-with-ai-powered-hyper-automation-203219.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-01-28-cisa-urges-critical-infrastructure-organizations-to-take-action-against-insider-01a23e.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-01-26-who-operates-the-badbox-20-botnet-a5f1c8.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-01-23-cisa-releases-product-categories-list-to-propel-post-quantum-cryptography-adopt-1816c3.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-01-20-kimwolf-botnet-lurking-in-corporate-govt-networks-b38a26.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-01-14-cisa-uk-ncsc-fbi-unveil-principles-to-combat-cyber-risks-in-ot-cf503a.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-01-13-patch-tuesday-january-2026-edition-67ce81.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-01-08-who-benefited-from-the-aisuru-and-kimwolf-botnets-337883.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-01-08-cisa-retires-ten-emergency-directives-marking-an-era-in-federal-cybersecurity-7b2aa6.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2026-01-02-the-kimwolf-botnet-is-stalking-your-local-network-44d2f7.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2025-12-29-happy-16th-birthday-krebsonsecuritycom-dc5db4.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2025-12-19-dismantling-defenses-trump-20-cyber-year-in-review-52e0d0.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2025-12-17-cisa-releases-dynamic-new-guide-for-stadium-and-arena-owners-to-fortify-operati-c431c7.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2025-12-17-opening-doors-to-the-future-cisa-announces-participation-in-the-cybercorps-scho-ff51e0.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2025-12-16-most-parked-domains-now-serving-malicious-content-d548ad.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2025-12-09-microsoft-patch-tuesday-december-2025-edition-a92f31.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2025-12-06-drones-to-diplomas-how-russias-largest-private-university-is-linked-to-a-25m-es-440fee.html</loc></url>
  <url><loc>https://privacytoday.ai/articles/2025-12-04-sms-phishers-pivot-to-points-taxes-fake-retailers-ccc379.html</loc></url>
</urlset>
