<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>News &#8211; Cyber Defense Magazine</title>
	<atom:link href="https://www.cyberdefensemagazine.com/category/news/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.cyberdefensemagazine.com</link>
	<description>The Premier Source For IT Security Information</description>
	<lastBuildDate>Tue, 17 Sep 2019 14:23:10 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.cyberdefensemagazine.com/wp-content/uploads/2019/06/mynew-9-32x32.jpg</url>
	<title>News &#8211; Cyber Defense Magazine</title>
	<link>https://www.cyberdefensemagazine.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Cyber Security the Major Issue of 2019</title>
		<link>https://www.cyberdefensemagazine.com/cyber-security-the-major-issue-of-2019/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cyber-security-the-major-issue-of-2019</link>
				<comments>https://www.cyberdefensemagazine.com/cyber-security-the-major-issue-of-2019/#respond</comments>
				<pubDate>Tue, 17 Sep 2019 15:00:16 +0000</pubDate>
		<dc:creator><![CDATA[News Team]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Account]]></category>
		<category><![CDATA[Adware]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Bitcoin]]></category>
		<category><![CDATA[botnet]]></category>
		<category><![CDATA[Breach]]></category>
		<category><![CDATA[bug]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[Cyber Defense Magazine]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Infosec]]></category>
		<category><![CDATA[insecurity]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[tech]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[VPN]]></category>
		<category><![CDATA[vulnerability]]></category>

		<guid isPermaLink="false">https://www.cyberdefensemagazine.com/?p=33713</guid>
				<description><![CDATA[By Angelica Technology has provided services to the whole humanity like no time ever before. Now in this contemporary world, everything is connected such as cars, cities, planes, homes and even the animals. The technology in the shape of software is everywhere. So, everything is changing such as how we talk, how we behave and [&#8230;]]]></description>
						<wfw:commentRss>https://www.cyberdefensemagazine.com/cyber-security-the-major-issue-of-2019/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
							</item>
		<item>
		<title>Astaroth Trojan leverages Facebook and YouTube to avoid detection</title>
		<link>https://www.cyberdefensemagazine.com/astaroth-trojan-leverages-facebook-and-youtube-to-avoid-detection/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=astaroth-trojan-leverages-facebook-and-youtube-to-avoid-detection</link>
				<comments>https://www.cyberdefensemagazine.com/astaroth-trojan-leverages-facebook-and-youtube-to-avoid-detection/#respond</comments>
				<pubDate>Tue, 17 Sep 2019 14:23:10 +0000</pubDate>
		<dc:creator><![CDATA[Press Team]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Cofense]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[File]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Threat Actors]]></category>
		<category><![CDATA[Trojan]]></category>
		<category><![CDATA[Youtube]]></category>

		<guid isPermaLink="false">https://www.cyberdefensemagazine.com/?p=33719</guid>
				<description><![CDATA[Cofense experts uncovered a new variant of the Astaroth Trojan that uses Facebook and YouTube in the infection process. Researchers at Cofense have uncovered a phishing campaign targeting Brazilian citizens with the AstarothTrojan that uses Facebook and YouTube in the infection process. The attach chain appears to be very complex and starts with phishing messages [&#8230;]]]></description>
						<wfw:commentRss>https://www.cyberdefensemagazine.com/astaroth-trojan-leverages-facebook-and-youtube-to-avoid-detection/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
							</item>
		<item>
		<title>The Dawn of the DDoS of Things (DoT)</title>
		<link>https://www.cyberdefensemagazine.com/the-dawn/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-dawn</link>
				<comments>https://www.cyberdefensemagazine.com/the-dawn/#respond</comments>
				<pubDate>Tue, 17 Sep 2019 14:00:02 +0000</pubDate>
		<dc:creator><![CDATA[News Team]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Account]]></category>
		<category><![CDATA[Adware]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Bitcoin]]></category>
		<category><![CDATA[botnet]]></category>
		<category><![CDATA[Breach]]></category>
		<category><![CDATA[bug]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[ddos]]></category>
		<category><![CDATA[Defense]]></category>
		<category><![CDATA[Gmail]]></category>
		<category><![CDATA[Infosec]]></category>
		<category><![CDATA[insecurity]]></category>
		<category><![CDATA[it security]]></category>
		<category><![CDATA[Magazine]]></category>
		<category><![CDATA[Malware]]></category>

		<guid isPermaLink="false">https://www.cyberdefensemagazine.com/?p=33709</guid>
				<description><![CDATA[Dr. Chase Cunningham, Director of Cyber Operations at A10 Networks Last year saw an unprecedented uptick in the volume, size, and scope of distributed denial of service (DDoS) attacks. Led mostly by the Mirai malware, this drumfire of DDoS attacks took advantage of unsecured Internet of Things (IoT) devices to build massive botnets and launch [&#8230;]]]></description>
						<wfw:commentRss>https://www.cyberdefensemagazine.com/the-dawn/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
							</item>
		<item>
		<title>Anti-Abortion Ads Plague Women-Online Privacy Lies in Peril</title>
		<link>https://www.cyberdefensemagazine.com/anti-abortion-ads/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=anti-abortion-ads</link>
				<comments>https://www.cyberdefensemagazine.com/anti-abortion-ads/#respond</comments>
				<pubDate>Tue, 17 Sep 2019 13:00:20 +0000</pubDate>
		<dc:creator><![CDATA[News Team]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Account]]></category>
		<category><![CDATA[Adware]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Bitcoin]]></category>
		<category><![CDATA[botnet]]></category>
		<category><![CDATA[Breach]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[ddos]]></category>
		<category><![CDATA[Defense]]></category>
		<category><![CDATA[flaw]]></category>
		<category><![CDATA[Gmail]]></category>
		<category><![CDATA[news]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[VPN]]></category>
		<category><![CDATA[vulnerability]]></category>

		<guid isPermaLink="false">https://www.cyberdefensemagazine.com/?p=33705</guid>
				<description><![CDATA[By Anas Baig If the recent anti-privacy bill&#8217;s existence was not enough, it has sparked numerous debates resulting in internet users resorting to different tactics and tools to safeguard their privacy. Unfortunately, online privacy lies in peril for everyone, as the basic right to protecting one&#8217;s privacy seems like a farfetched dream. Women Targeted by [&#8230;]]]></description>
						<wfw:commentRss>https://www.cyberdefensemagazine.com/anti-abortion-ads/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
							</item>
		<item>
		<title>The US Treasury placed sanctions on North Korea linked APT Groups</title>
		<link>https://www.cyberdefensemagazine.com/the-us-treasury-placed-sanctions-on-north-korea-linked-apt-groups/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-us-treasury-placed-sanctions-on-north-korea-linked-apt-groups</link>
				<comments>https://www.cyberdefensemagazine.com/the-us-treasury-placed-sanctions-on-north-korea-linked-apt-groups/#respond</comments>
				<pubDate>Mon, 16 Sep 2019 16:55:43 +0000</pubDate>
		<dc:creator><![CDATA[Press Team]]></dc:creator>
				<category><![CDATA[News]]></category>

		<guid isPermaLink="false">https://www.cyberdefensemagazine.com/?p=33695</guid>
				<description><![CDATA[The US Treasury placed sanctions on three North Korea-linked hacking groups, the Lazarus Group, Bluenoroff, and Andarial. The US Treasury sanctions on three North Korea-linked hacking groups, the Lazarus Group, Bluenoroff, and Andarial. The groups are behind several hacking operations that resulted in the theft of hundreds of millions of dollars from financial institutions and cryptocurrency exchanges [&#8230;]]]></description>
						<wfw:commentRss>https://www.cyberdefensemagazine.com/the-us-treasury-placed-sanctions-on-north-korea-linked-apt-groups/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
							</item>
		<item>
		<title>Tesco Bank</title>
		<link>https://www.cyberdefensemagazine.com/tesco-bank/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=tesco-bank</link>
				<comments>https://www.cyberdefensemagazine.com/tesco-bank/#respond</comments>
				<pubDate>Mon, 16 Sep 2019 15:00:35 +0000</pubDate>
		<dc:creator><![CDATA[News Team]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Account]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Bitcoin]]></category>
		<category><![CDATA[botnet]]></category>
		<category><![CDATA[Breach]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[ddos]]></category>
		<category><![CDATA[Defense]]></category>
		<category><![CDATA[flaw]]></category>
		<category><![CDATA[Gmail]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[Magazine]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[network]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[VPN]]></category>
		<category><![CDATA[vulnerability]]></category>

		<guid isPermaLink="false">https://www.cyberdefensemagazine.com/?p=33689</guid>
				<description><![CDATA[Oversight By Charles Parker, II; Information Security Architect And the hits keep coming. The Swift issue involving over $100M in thefts has recently been not in the news nearly as much. The Swift system is currently being updated and upgraded so this does not occur again. Just as the banking industry begins to move back [&#8230;]]]></description>
						<wfw:commentRss>https://www.cyberdefensemagazine.com/tesco-bank/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
							</item>
		<item>
		<title>Nation State Cyber Attacks Emerge from the Shadows</title>
		<link>https://www.cyberdefensemagazine.com/nation-state-cyber-attacks/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=nation-state-cyber-attacks</link>
				<comments>https://www.cyberdefensemagazine.com/nation-state-cyber-attacks/#respond</comments>
				<pubDate>Mon, 16 Sep 2019 14:00:01 +0000</pubDate>
		<dc:creator><![CDATA[News Team]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Account]]></category>
		<category><![CDATA[Adware]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Bitcoin]]></category>
		<category><![CDATA[botnet]]></category>
		<category><![CDATA[Breach]]></category>
		<category><![CDATA[bug]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[Cyber Defense Magazine]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[ddos]]></category>
		<category><![CDATA[Defense]]></category>
		<category><![CDATA[flaw]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[Infosec]]></category>
		<category><![CDATA[insecurity]]></category>
		<category><![CDATA[Iot]]></category>
		<category><![CDATA[it security]]></category>
		<category><![CDATA[Mac]]></category>
		<category><![CDATA[Magazine]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[VPN]]></category>
		<category><![CDATA[vulnerability]]></category>

		<guid isPermaLink="false">https://www.cyberdefensemagazine.com/?p=33686</guid>
				<description><![CDATA[By Leo Taddeo, CISO at Cyxtera Technologies Nation-state hackers are increasingly targeting government agencies, critical infrastructure facilities, and businesses with powerful, sophisticated techniques that interrupt business operations, leak confidential information resulting in massive data and revenue loss. Today, public and private organizations unwittingly leave sensitive, monetizable data, such as intellectual property (IP), unprotected, making cyberattacks [&#8230;]]]></description>
						<wfw:commentRss>https://www.cyberdefensemagazine.com/nation-state-cyber-attacks/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
							</item>
		<item>
		<title>Why today’s university students pose a massive cyber threat — and what to do about it</title>
		<link>https://www.cyberdefensemagazine.com/why-todays-university/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=why-todays-university</link>
				<comments>https://www.cyberdefensemagazine.com/why-todays-university/#respond</comments>
				<pubDate>Mon, 16 Sep 2019 13:00:07 +0000</pubDate>
		<dc:creator><![CDATA[News Team]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Account]]></category>
		<category><![CDATA[Adware]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Bitcoin]]></category>
		<category><![CDATA[botnet]]></category>
		<category><![CDATA[Breach]]></category>
		<category><![CDATA[bug]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[Cyber Defense Magazine]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[ddos]]></category>
		<category><![CDATA[Defense]]></category>
		<category><![CDATA[flaw]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[insecurity]]></category>
		<category><![CDATA[it security]]></category>
		<category><![CDATA[Magazine]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[network]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[VPN]]></category>
		<category><![CDATA[vulnerability]]></category>

		<guid isPermaLink="false">https://www.cyberdefensemagazine.com/?p=33667</guid>
				<description><![CDATA[By François Amigorena, CEO, IS Decisions To any IT security person working within a university, students are one heck of a headache. Old enough to make adult decisions but young enough to make naïve judgments, students pose a security challenge akin to holding water in a sieve. Despite being digitally savvy and the future of [&#8230;]]]></description>
						<wfw:commentRss>https://www.cyberdefensemagazine.com/why-todays-university/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
							</item>
		<item>
		<title>PART II: DEFENDING YOUR AIRSPACE</title>
		<link>https://www.cyberdefensemagazine.com/part-ii-defending-your-airspace/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=part-ii-defending-your-airspace</link>
				<comments>https://www.cyberdefensemagazine.com/part-ii-defending-your-airspace/#respond</comments>
				<pubDate>Sun, 15 Sep 2019 15:00:48 +0000</pubDate>
		<dc:creator><![CDATA[News Team]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Account]]></category>
		<category><![CDATA[Adware]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Bitcoin]]></category>
		<category><![CDATA[botnet]]></category>
		<category><![CDATA[Breach]]></category>
		<category><![CDATA[bug]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[Cyber Defense Magazine]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Gmail]]></category>
		<category><![CDATA[hacked]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[twitter]]></category>
		<category><![CDATA[VPN]]></category>
		<category><![CDATA[vulnerability]]></category>

		<guid isPermaLink="false">https://www.cyberdefensemagazine.com/?p=33664</guid>
				<description><![CDATA[WIPS vs. WIDS By Ryan Orsi, Director Product Management, WatchGuard Technologies In part one of this series: The Anatomy of a Wi-Fi Hacker, we addressed the ever-growing need for a digital connection and the risks associated with public Wi-Fi. Paramount among those risks is the man-in-the-middle (MiTM) attack, which allows a hacker to gain visibility [&#8230;]]]></description>
						<wfw:commentRss>https://www.cyberdefensemagazine.com/part-ii-defending-your-airspace/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
							</item>
		<item>
		<title>Part I: The Anatomy of a Wi-Fi Hacker in 2019</title>
		<link>https://www.cyberdefensemagazine.com/part-i-the-anatomy/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=part-i-the-anatomy</link>
				<comments>https://www.cyberdefensemagazine.com/part-i-the-anatomy/#respond</comments>
				<pubDate>Sun, 15 Sep 2019 14:00:46 +0000</pubDate>
		<dc:creator><![CDATA[News Team]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Account]]></category>
		<category><![CDATA[Adware]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Bitcoin]]></category>
		<category><![CDATA[botnet]]></category>
		<category><![CDATA[Breach]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[Cyber Defense Magazine]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[ddos]]></category>
		<category><![CDATA[Defense]]></category>
		<category><![CDATA[Gmail]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[Infosec]]></category>
		<category><![CDATA[insecurity]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[tech]]></category>
		<category><![CDATA[VPN]]></category>
		<category><![CDATA[vulnerability]]></category>

		<guid isPermaLink="false">https://www.cyberdefensemagazine.com/?p=33661</guid>
				<description><![CDATA[By Ryan Orsi, Director Product Management, WatchGuard Technologies We all know the use of Wi-Fi is pervasive because people crave a constant digital connection. So much so, that they&#8217;ll spend the day jumping from free public hotspot to free public hotspot. As a matter of fact, Wi-Fi now accounts for 60 percent of all connections [&#8230;]]]></description>
						<wfw:commentRss>https://www.cyberdefensemagazine.com/part-i-the-anatomy/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
							</item>
	</channel>
</rss>
