<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Microsoft | Website Cyber Security</title>
	<atom:link href="https://websitecyber.com/tag/microsoft/feed/" rel="self" type="application/rss+xml" />
	<link>https://websitecyber.com</link>
	<description>Website Cyber Security</description>
	<lastBuildDate>Thu, 30 Oct 2025 09:32:48 +0000</lastBuildDate>
	<language>en-AU</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-32x32.png</url>
	<title>Microsoft | Website Cyber Security</title>
	<link>https://websitecyber.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>The Man Who Leaked Windows 95</title>
		<link>https://websitecyber.com/the-man-who-leaked-windows-95/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Thu, 30 Oct 2025 09:32:45 +0000</pubDate>
				<category><![CDATA[Applications]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=51444</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/applications-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Applications" decoding="async" /><p>Gregg's operation was a powerhouse of illicit distribution. Their crown jewel? The legendary leak of Windows 95 Microsoft's most groundbreaking software.</p>
The post <a href="https://websitecyber.com/the-man-who-leaked-windows-95/">The Man Who Leaked Windows 95</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>The AI Cold War</title>
		<link>https://websitecyber.com/the-ai-cold-war/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Sat, 25 Oct 2025 07:23:19 +0000</pubDate>
				<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[Attacks]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Cyber Warfare]]></category>
		<category><![CDATA[Digital Transformation]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Threat Defense]]></category>
		<category><![CDATA[Threat Research]]></category>
		<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=51399</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/artificial_intelligence-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Artificial Intelligence" decoding="async" /><p>While we focus on AI’s potential a far more sinister application is rapidly maturing on the global stage the weaponization of AI by hostile state actors.</p>
The post <a href="https://websitecyber.com/the-ai-cold-war/">The AI Cold War</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Unpacking China&#8217;s Hackers</title>
		<link>https://websitecyber.com/unpacking-chinas-hackers/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Sun, 24 Aug 2025 00:04:34 +0000</pubDate>
				<category><![CDATA[Advanced Persistent Threats]]></category>
		<category><![CDATA[Attacks]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Cyber Warfare]]></category>
		<category><![CDATA[Data]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Threat Defense]]></category>
		<category><![CDATA[Threat Research]]></category>
		<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=51340</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/hacking-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Hacking" decoding="async" /><p>When Microsoft accused state backed Chinese hackers of breaching its servers targeting at least 60,000 global users few people were genuinely surprised.</p>
The post <a href="https://websitecyber.com/unpacking-chinas-hackers/">Unpacking China’s Hackers</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Artificial Intelligence Psychosis</title>
		<link>https://websitecyber.com/artificial-intelligence-psychosis/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Sat, 23 Aug 2025 13:43:37 +0000</pubDate>
				<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[Data]]></category>
		<category><![CDATA[Digital Transformation]]></category>
		<category><![CDATA[High Technology]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Threat Research]]></category>
		<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=51335</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/artificial_intelligence-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Artificial Intelligence" decoding="async" loading="lazy" /><p>In a world increasingly shaped by artificial intelligence the line between the real and the simulated is becoming fuzzier by the day.</p>
The post <a href="https://websitecyber.com/artificial-intelligence-psychosis/">Artificial Intelligence Psychosis</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Threat of Chinese Cyberattacks</title>
		<link>https://websitecyber.com/threat-of-chinese-cyberattacks/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Sat, 02 Aug 2025 23:06:08 +0000</pubDate>
				<category><![CDATA[Advanced Persistent Threats]]></category>
		<category><![CDATA[Attacks]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Cyber Warfare]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Threat Research]]></category>
		<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=51242</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/microsoft-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Microsoft" decoding="async" loading="lazy" /><p>At the forefront of these concerns is the pervasive and sophisticated threat posed by Chinese cyberattacks on U.S. Department of Defense (DOD) computer systems.</p>
The post <a href="https://websitecyber.com/threat-of-chinese-cyberattacks/">Threat of Chinese Cyberattacks</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Microsoft Points at Chinese Hackers</title>
		<link>https://websitecyber.com/microsoft-points-at-chinese-hackers/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Thu, 24 Jul 2025 09:41:24 +0000</pubDate>
				<category><![CDATA[Advanced Persistent Threats]]></category>
		<category><![CDATA[Attacks]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Cyber Warfare]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Patch Management]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=51122</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/microsoft-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Microsoft" decoding="async" loading="lazy" /><p>Microsoft has directly accused Chinese state sponsored hacking groups of orchestrating a sophisticated cyberattack on its widely used SharePoint software.</p>
The post <a href="https://websitecyber.com/microsoft-points-at-chinese-hackers/">Microsoft Points at Chinese Hackers</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Cyberattack on Microsoft SharePoint</title>
		<link>https://websitecyber.com/cyberattack-on-microsoft-sharepoint/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Thu, 24 Jul 2025 09:21:30 +0000</pubDate>
				<category><![CDATA[Attacks]]></category>
		<category><![CDATA[Communications]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Threat Defense]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=51118</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/microsoft-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Microsoft" decoding="async" loading="lazy" /><p>An active and dangerous cyberattack targeting Microsoft's on-premises SharePoint Server customers. Cyber security agencies are sounding the alarm.</p>
The post <a href="https://websitecyber.com/cyberattack-on-microsoft-sharepoint/">Cyberattack on Microsoft SharePoint</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Microsoft and OpenAI on Deepseek</title>
		<link>https://websitecyber.com/microsoft-and-openai-on-deepseek/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Wed, 29 Jan 2025 11:05:43 +0000</pubDate>
				<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[Big Data]]></category>
		<category><![CDATA[Cyber Warfare]]></category>
		<category><![CDATA[Digital Transformation]]></category>
		<category><![CDATA[High Technology]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=50230</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/artificial_intelligence-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Artificial Intelligence" decoding="async" loading="lazy" /><p>Microsoft and OpenAI investigation into allegations that Deepseek may have obtained OpenAI's technology outputs in an unauthorized manner.</p>
The post <a href="https://websitecyber.com/microsoft-and-openai-on-deepseek/">Microsoft and OpenAI on Deepseek</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>20 Insane Hacking Stories</title>
		<link>https://websitecyber.com/20-insane-hacking-stories/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Sat, 18 Jan 2025 11:33:12 +0000</pubDate>
				<category><![CDATA[Advanced Persistent Threats]]></category>
		<category><![CDATA[Attacks]]></category>
		<category><![CDATA[Banking]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Threat Research]]></category>
		<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=49975</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/hacking-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Hacking" decoding="async" loading="lazy" /><p>The stories of hackers and cybercriminals hacking have become intriguing narratives that expose the vulnerabilities of our digital world.</p>
The post <a href="https://websitecyber.com/20-insane-hacking-stories/">20 Insane Hacking Stories</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Microsoft’s Cybercrime Center</title>
		<link>https://websitecyber.com/microsofts-cybercrime-center/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Sun, 17 Nov 2024 03:20:43 +0000</pubDate>
				<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Security Strategy]]></category>
		<category><![CDATA[Threat Defense]]></category>
		<category><![CDATA[Threat Research]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=49901</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/microsoft-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Microsoft" decoding="async" loading="lazy" /><p>Enter the Microsoft Cybercrime Center the command hub for the company's Digital Crimes Unit (DCU). This powerhouse team, comprised of international experts.</p>
The post <a href="https://websitecyber.com/microsofts-cybercrime-center/">Microsoft’s Cybercrime Center</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Cyber Landscape in the Indo-Pacific</title>
		<link>https://websitecyber.com/cyber-landscape-in-the-indo-pacific/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Fri, 20 Sep 2024 06:52:03 +0000</pubDate>
				<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Cyber Warfare]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Interviews]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Security Strategy]]></category>
		<category><![CDATA[Threat Research]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=49664</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-150x150.png" class="attachment-thumbnail size-thumbnail wp-post-image" alt="cyber security" decoding="async" loading="lazy" srcset="https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-150x150.png 150w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-300x300.png 300w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-270x270.png 270w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-192x192.png 192w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-180x180.png 180w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-32x32.png 32w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon.png 512w" sizes="auto, (max-width: 150px) 100vw, 150px" /><p>The Indo-Pacific region stands at the forefront of global economic growth and geopolitical tensions, and its cyber landscape is no exception.</p>
The post <a href="https://websitecyber.com/cyber-landscape-in-the-indo-pacific/">Cyber Landscape in the Indo-Pacific</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Cybersecurity &#038; Political Campaigns</title>
		<link>https://websitecyber.com/cybersecurity-political-campaigns/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Tue, 13 Aug 2024 06:43:57 +0000</pubDate>
				<category><![CDATA[Attacks]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<category><![CDATA[Threat Research]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Warfare]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=49481</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-150x150.png" class="attachment-thumbnail size-thumbnail wp-post-image" alt="cyber security" decoding="async" loading="lazy" srcset="https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-150x150.png 150w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-300x300.png 300w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-270x270.png 270w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-192x192.png 192w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-180x180.png 180w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-32x32.png 32w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon.png 512w" sizes="auto, (max-width: 150px) 100vw, 150px" /><p>In political campaigns, cybersecurity is emerging as a crucial battleground, and recent allegations against Iran in the hacking of the Trump campaign.</p>
The post <a href="https://websitecyber.com/cybersecurity-political-campaigns/">Cybersecurity & Political Campaigns</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Iran&#8217;s Rising Cyber Operations</title>
		<link>https://websitecyber.com/irans-rising-cyber-operations/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Sat, 10 Aug 2024 01:21:58 +0000</pubDate>
				<category><![CDATA[Attacks]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Cyber Warfare]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Threat Research]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=49444</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/cyber_warfare-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Cyber Warfare" decoding="async" loading="lazy" /><p>Iran is intensifying its covert cyber operations, leveraging the internet to create chaos and manipulate public discourse surrounding U.S. elections.</p>
The post <a href="https://websitecyber.com/irans-rising-cyber-operations/">Iran’s Rising Cyber Operations</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Global Tech Chaos Major Outage</title>
		<link>https://websitecyber.com/global-tech-chaos-major-outage/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Fri, 19 Jul 2024 10:13:06 +0000</pubDate>
				<category><![CDATA[Applications]]></category>
		<category><![CDATA[Banking]]></category>
		<category><![CDATA[Big Data]]></category>
		<category><![CDATA[Business Continuity]]></category>
		<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Communications]]></category>
		<category><![CDATA[Data]]></category>
		<category><![CDATA[Events]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[Health Care]]></category>
		<category><![CDATA[Infrastructure]]></category>
		<category><![CDATA[Manufacturing]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Network]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Retail]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=49243</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/applications-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Applications" decoding="async" loading="lazy" /><p>A widespread tech outage has brought some of the world's largest and most influential companies to their knees by US cybersecurity firm CrowdStrike</p>
The post <a href="https://websitecyber.com/global-tech-chaos-major-outage/">Global Tech Chaos Major Outage</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Cybersecurity For Beginners</title>
		<link>https://websitecyber.com/cybersecurity-for-beginners/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Thu, 27 Jun 2024 13:44:51 +0000</pubDate>
				<category><![CDATA[Attacks]]></category>
		<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Identity Management]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Patch Management]]></category>
		<category><![CDATA[Security Strategy]]></category>
		<category><![CDATA[Threat Defense]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=49081</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-150x150.png" class="attachment-thumbnail size-thumbnail wp-post-image" alt="cyber security" decoding="async" loading="lazy" srcset="https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-150x150.png 150w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-300x300.png 300w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-270x270.png 270w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-192x192.png 192w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-180x180.png 180w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-32x32.png 32w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon.png 512w" sizes="auto, (max-width: 150px) 100vw, 150px" /><p>The digital world is full of opportunities and innovation it also comes with its share of risks, and cybersecurity is the key to navigating those risks safely.</p>
The post <a href="https://websitecyber.com/cybersecurity-for-beginners/">Cybersecurity For Beginners</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>300 Million Daily Cyberattacks</title>
		<link>https://websitecyber.com/300-million-daily-cyberattacks/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Sat, 15 Jun 2024 03:15:42 +0000</pubDate>
				<category><![CDATA[Advanced Persistent Threats]]></category>
		<category><![CDATA[Attacks]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Interviews]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=48917</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/microsoft-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Microsoft" decoding="async" loading="lazy" /><p>Rep. August Pfluger (R-TX) grilled Microsoft President Brad Smith on the company's ability to defend against a staggering number of cyberattacks.</p>
The post <a href="https://websitecyber.com/300-million-daily-cyberattacks/">300 Million Daily Cyberattacks</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Microsoft Under Cybersecurity Fire</title>
		<link>https://websitecyber.com/microsoft-under-cybersecurity-fire/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Sat, 15 Jun 2024 03:01:02 +0000</pubDate>
				<category><![CDATA[Advanced Persistent Threats]]></category>
		<category><![CDATA[Attacks]]></category>
		<category><![CDATA[Big Data]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=48915</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/microsoft-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Microsoft" decoding="async" loading="lazy" /><p>Microsoft found itself under the microscope yesterday as President Brad Smith faced a grilling from Congress over the company's cybersecurity practices.</p>
The post <a href="https://websitecyber.com/microsoft-under-cybersecurity-fire/">Microsoft Under Cybersecurity Fire</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Cyberattacks on Microsoft</title>
		<link>https://websitecyber.com/cyberattacks-on-microsoft/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Tue, 12 Mar 2024 06:04:28 +0000</pubDate>
				<category><![CDATA[Advanced Persistent Threats]]></category>
		<category><![CDATA[Attacks]]></category>
		<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Interviews]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=48637</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/microsoft-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Microsoft" decoding="async" loading="lazy" /><p>The recent cyberattacks on Microsoft have sent shockwaves through the tech industry and raised concerns about the security of our digital infrastructure.</p>
The post <a href="https://websitecyber.com/cyberattacks-on-microsoft/">Cyberattacks on Microsoft</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Microsoft Hacked by Russian Group</title>
		<link>https://websitecyber.com/microsoft-hacked-by-russian-group/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Tue, 23 Jan 2024 06:11:56 +0000</pubDate>
				<category><![CDATA[Attacks]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=48378</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/microsoft-150x150.jpg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Microsoft" decoding="async" loading="lazy" /><p>Microsoft revealed that some of its corporate email accounts were hacked by a Russian-backed group. Midnight Blizzard, also known as Nobelium.</p>
The post <a href="https://websitecyber.com/microsoft-hacked-by-russian-group/">Microsoft Hacked by Russian Group</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>The Cryptographer</title>
		<link>https://websitecyber.com/the-cryptographer/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Sun, 10 Sep 2023 03:11:07 +0000</pubDate>
				<category><![CDATA[Cryptography]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=48028</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/cryptography-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Cryptography" decoding="async" loading="lazy" /><p>Yael Tauman Kalai is a theoretical computer scientist and cryptographer. Her breakthroughs in interactive proofs have had a major impact on everything.</p>
The post <a href="https://websitecyber.com/the-cryptographer/">The Cryptographer</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
	</channel>
</rss>
