<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Threat Research | Website Cyber Security</title>
	<atom:link href="https://websitecyber.com/tag/threat-research/feed/" rel="self" type="application/rss+xml" />
	<link>https://websitecyber.com</link>
	<description>Website Cyber Security</description>
	<lastBuildDate>Wed, 25 Mar 2026 07:32:36 +0000</lastBuildDate>
	<language>en-AU</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-32x32.png</url>
	<title>Threat Research | Website Cyber Security</title>
	<link>https://websitecyber.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Dangerous Evolution of AI Hacking</title>
		<link>https://websitecyber.com/dangerous-evolution-of-ai-hacking/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Wed, 25 Mar 2026 07:30:27 +0000</pubDate>
				<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[Attacks]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Cyber Warfare]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<category><![CDATA[Threat Research]]></category>
		<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=51477</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/artificial_intelligence-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Artificial Intelligence" decoding="async" /><p>The hacking headline on security forums was almost cinematic: “Anthropic’s Claude used to hack 17 organizations in under a month by a single individual.”</p>
The post <a href="https://websitecyber.com/dangerous-evolution-of-ai-hacking/">Dangerous Evolution of AI Hacking</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Fraud Draining the Bank of Canada</title>
		<link>https://websitecyber.com/fraud-draining-the-bank-of-canada/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Wed, 04 Feb 2026 10:31:23 +0000</pubDate>
				<category><![CDATA[Attacks]]></category>
		<category><![CDATA[Banking]]></category>
		<category><![CDATA[Case Studies]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Threat Research]]></category>
		<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=51471</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/banking-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Banking" decoding="async" /><p>Fraudsters are robbing the Bank of Canada of hundreds of millions of dollars through intricate carousel schemes. Involving fake business transactions.</p>
The post <a href="https://websitecyber.com/fraud-draining-the-bank-of-canada/">Fraud Draining the Bank of Canada</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Claude AI Code Cyber Attack</title>
		<link>https://websitecyber.com/claude-ai-code-cyber-attack/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Wed, 04 Feb 2026 10:22:24 +0000</pubDate>
				<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[Attacks]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Cyber Warfare]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Threat Research]]></category>
		<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=51469</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/artificial_intelligence-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Artificial Intelligence" decoding="async" /><p>Leveraging Anthropic’s Claude Code Chinese hackers exploited the model’s capabilities to launch highly autonomous cyberattacks on 30 organizations.</p>
The post <a href="https://websitecyber.com/claude-ai-code-cyber-attack/">Claude AI Code Cyber Attack</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Make Cybersecurity Your Addiction</title>
		<link>https://websitecyber.com/make-cybersecurity-your-addiction/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Mon, 19 Jan 2026 10:21:10 +0000</pubDate>
				<category><![CDATA[Darknet]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Security Strategy]]></category>
		<category><![CDATA[Threat Defense]]></category>
		<category><![CDATA[Threat Research]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=51457</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-150x150.png" class="attachment-thumbnail size-thumbnail wp-post-image" alt="cyber security" decoding="async" loading="lazy" srcset="https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-150x150.png 150w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-300x300.png 300w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-270x270.png 270w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-192x192.png 192w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-180x180.png 180w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-32x32.png 32w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon.png 512w" sizes="auto, (max-width: 150px) 100vw, 150px" /><p>If you want to join the elite hacking ranks, you can’t treat this as a side hobby you have to make cybersecurity your addiction.</p>
The post <a href="https://websitecyber.com/make-cybersecurity-your-addiction/">Make Cybersecurity Your Addiction</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Crypto ATM Scam on a CNN Reporter</title>
		<link>https://websitecyber.com/crypto-atm-scam-on-a-cnn-reporter/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Mon, 27 Oct 2025 11:32:25 +0000</pubDate>
				<category><![CDATA[Attacks]]></category>
		<category><![CDATA[Banking]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Scams]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<category><![CDATA[Threat Research]]></category>
		<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=51439</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2022/10/image-3-150x150.png" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Bitcoin" decoding="async" loading="lazy" srcset="https://websitecyber.com/wp-content/uploads/2022/10/image-3-150x150.png 150w, https://websitecyber.com/wp-content/uploads/2022/10/image-3-120x120.png 120w" sizes="auto, (max-width: 150px) 100vw, 150px" /><p>The situation is dire and the only way to resolve it immediately and avoid severe penalties is to feed thousands of dollars into a nearby Crypto ATM.</p>
The post <a href="https://websitecyber.com/crypto-atm-scam-on-a-cnn-reporter/">Crypto ATM Scam on a CNN Reporter</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>$3 Billion Bitcoin Breakthrough</title>
		<link>https://websitecyber.com/3-billion-bitcoin-breakthrough/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Mon, 27 Oct 2025 11:06:41 +0000</pubDate>
				<category><![CDATA[Banking]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Threat Defense]]></category>
		<category><![CDATA[Threat Research]]></category>
		<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=51434</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2022/10/image-3-150x150.png" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Bitcoin" decoding="async" loading="lazy" srcset="https://websitecyber.com/wp-content/uploads/2022/10/image-3-150x150.png 150w, https://websitecyber.com/wp-content/uploads/2022/10/image-3-120x120.png 120w" sizes="auto, (max-width: 150px) 100vw, 150px" /><p>US officials have successfully seized billions of dollars in Bitcoin linked to one of the largest alleged scam networks operating out of Southeast Asia.</p>
The post <a href="https://websitecyber.com/3-billion-bitcoin-breakthrough/">$3 Billion Bitcoin Breakthrough</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Artificial Intelligence Apocalypse</title>
		<link>https://websitecyber.com/artificial-intelligence-apocalypse/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Sat, 25 Oct 2025 14:20:57 +0000</pubDate>
				<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[Attacks]]></category>
		<category><![CDATA[Case Studies]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Cyber Warfare]]></category>
		<category><![CDATA[Digital Transformation]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Threat Research]]></category>
		<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=51419</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/artificial_intelligence-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Artificial Intelligence" decoding="async" loading="lazy" /><p>The future of technology promised efficiency and innovation. What we received was something far more menacing as Artificial Intelligence has gone evil.</p>
The post <a href="https://websitecyber.com/artificial-intelligence-apocalypse/">Artificial Intelligence Apocalypse</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>20 Mind Bending Hacking Stories</title>
		<link>https://websitecyber.com/20-mind-bending-hacking-stories/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Sat, 25 Oct 2025 14:00:12 +0000</pubDate>
				<category><![CDATA[Attacks]]></category>
		<category><![CDATA[Case Studies]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Cyber Warfare]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Threat Research]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=51417</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/hacking-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Hacking" decoding="async" loading="lazy" /><p>We're diving deep into the rabbit hole to uncover 20 utterly insane hacking stories that have shaped our understanding of cybersecurity.</p>
The post <a href="https://websitecyber.com/20-mind-bending-hacking-stories/">20 Mind Bending Hacking Stories</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Nmap Full Guide</title>
		<link>https://websitecyber.com/nmap-full-guide/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Sat, 25 Oct 2025 13:37:13 +0000</pubDate>
				<category><![CDATA[Applications]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Network]]></category>
		<category><![CDATA[Security Strategy]]></category>
		<category><![CDATA[Skills and Training]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Threat Research]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=51413</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/network-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Network" decoding="async" loading="lazy" /><p>Cybersecurity enthusiasts, system administrators and curious tech minds, meet Nmap. Nmap "Network Mapper," is the undisputed king of network scanning.</p>
The post <a href="https://websitecyber.com/nmap-full-guide/">Nmap Full Guide</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>UK Under Cyberattacks</title>
		<link>https://websitecyber.com/uk-under-cyberattacks/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Sat, 25 Oct 2025 07:34:21 +0000</pubDate>
				<category><![CDATA[Attacks]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Cyber Warfare]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Interviews]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Security Strategy]]></category>
		<category><![CDATA[Threat Defense]]></category>
		<category><![CDATA[Threat Research]]></category>
		<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=51401</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/attacks-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Attacks" decoding="async" loading="lazy" /><p>Serious cyberattacks are not just a looming threat they're a present danger, prompting the government to issue surprisingly analogue advice to businesses.</p>
The post <a href="https://websitecyber.com/uk-under-cyberattacks/">UK Under Cyberattacks</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>The AI Cold War</title>
		<link>https://websitecyber.com/the-ai-cold-war/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Sat, 25 Oct 2025 07:23:19 +0000</pubDate>
				<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[Attacks]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Cyber Warfare]]></category>
		<category><![CDATA[Digital Transformation]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Threat Defense]]></category>
		<category><![CDATA[Threat Research]]></category>
		<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=51399</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/artificial_intelligence-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Artificial Intelligence" decoding="async" loading="lazy" /><p>While we focus on AI’s potential a far more sinister application is rapidly maturing on the global stage the weaponization of AI by hostile state actors.</p>
The post <a href="https://websitecyber.com/the-ai-cold-war/">The AI Cold War</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>The AI Supercharged Cybercrime</title>
		<link>https://websitecyber.com/the-ai-supercharged-cybercrime/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Thu, 16 Oct 2025 10:39:23 +0000</pubDate>
				<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[Attacks]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Threat Research]]></category>
		<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=51392</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/artificial_intelligence-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Artificial Intelligence" decoding="async" loading="lazy" /><p>The Australian Signals Directorate (ASD) has issued its annual cyber threat report, and the message is cybercrime isn't just growing it's accelerating.</p>
The post <a href="https://websitecyber.com/the-ai-supercharged-cybercrime/">The AI Supercharged Cybercrime</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Arrest Made in Major Cyberattack</title>
		<link>https://websitecyber.com/arrest-made-in-major-cyberattack/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Fri, 03 Oct 2025 08:39:47 +0000</pubDate>
				<category><![CDATA[Attacks]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Infrastructure]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Threat Research]]></category>
		<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=51385</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/attacks-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Attacks" decoding="async" loading="lazy" /><p>The National Crime Agency (NCA) has confirmed the arrest of a man in connection with the recent cyberattack that rippled across Europe’s aviation sector.</p>
The post <a href="https://websitecyber.com/arrest-made-in-major-cyberattack/">Arrest Made in Major Cyberattack</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>UNGA Security Scare</title>
		<link>https://websitecyber.com/unga-security-scare/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Tue, 30 Sep 2025 09:37:28 +0000</pubDate>
				<category><![CDATA[Attacks]]></category>
		<category><![CDATA[Communications]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Cyber Warfare]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Network]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Security Strategy]]></category>
		<category><![CDATA[Threat Defense]]></category>
		<category><![CDATA[Threat Research]]></category>
		<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=51381</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/news-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security News" decoding="async" loading="lazy" /><p>The annual gathering of world leaders in New York City for the UN General Assembly (UNGA) is always a massive undertaking for security agencies.</p>
The post <a href="https://websitecyber.com/unga-security-scare/">UNGA Security Scare</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Encounter with Cybercriminals</title>
		<link>https://websitecyber.com/encounter-with-cybercriminals/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Tue, 30 Sep 2025 08:57:40 +0000</pubDate>
				<category><![CDATA[Attacks]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Interviews]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<category><![CDATA[Threat Research]]></category>
		<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=51377</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/cyber_crime-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Cyber Crime" decoding="async" loading="lazy" /><p>The world of cybercriminals is often described as a constant battle between unseen forces. A glimpse into one of the aspects of cybercrime the insider threat.</p>
The post <a href="https://websitecyber.com/encounter-with-cybercriminals/">Encounter with Cybercriminals</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Chinese Cars and National Security</title>
		<link>https://websitecyber.com/chinese-cars-and-national-security/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Sun, 21 Sep 2025 01:45:25 +0000</pubDate>
				<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Cyber Warfare]]></category>
		<category><![CDATA[Data]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Infrastructure]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[Security Strategy]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Threat Defense]]></category>
		<category><![CDATA[Threat Research]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=51372</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/news-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security News" decoding="async" loading="lazy" /><p>For many Australians, a vehicle is a symbol of freedom and convenience. What if it harbored a hidden agenda, turning into a potential national security risk?</p>
The post <a href="https://websitecyber.com/chinese-cars-and-national-security/">Chinese Cars and National Security</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Rachel Noble on Salt Typhoon</title>
		<link>https://websitecyber.com/rachel-noble-on-salt-typhoon/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Sun, 07 Sep 2025 04:30:17 +0000</pubDate>
				<category><![CDATA[Advanced Persistent Threats]]></category>
		<category><![CDATA[Attacks]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Cyber Warfare]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Interviews]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Security Strategy]]></category>
		<category><![CDATA[Threat Defense]]></category>
		<category><![CDATA[Threat Research]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=51362</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-150x150.png" class="attachment-thumbnail size-thumbnail wp-post-image" alt="cyber security" decoding="async" loading="lazy" srcset="https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-150x150.png 150w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-300x300.png 300w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-270x270.png 270w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-192x192.png 192w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-180x180.png 180w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon-32x32.png 32w, https://websitecyber.com/wp-content/uploads/2019/10/cropped-website_cyber_site_icon.png 512w" sizes="auto, (max-width: 150px) 100vw, 150px" /><p>From the hum of servers to the headlines splashed across our screens a silent war is being waged, and few understand its battlegrounds better than Rachel Noble.</p>
The post <a href="https://websitecyber.com/rachel-noble-on-salt-typhoon/">Rachel Noble on Salt Typhoon</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Hunting the Whisky Bandits</title>
		<link>https://websitecyber.com/hunting-the-whisky-bandits/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Sat, 30 Aug 2025 09:53:55 +0000</pubDate>
				<category><![CDATA[Banking]]></category>
		<category><![CDATA[Case Studies]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Interviews]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Scams]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<category><![CDATA[Threat Research]]></category>
		<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=51355</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/scams-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Scams" decoding="async" loading="lazy" /><p>Reporter Sam Poling has embarked on a perilous journey to expose the shocking truth behind the cask whisky investment scam.</p>
The post <a href="https://websitecyber.com/hunting-the-whisky-bandits/">Hunting the Whisky Bandits</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>AI Won&#8217;t Steal Your Cyber Job</title>
		<link>https://websitecyber.com/ai-wont-steal-your-cyber-job/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Sat, 30 Aug 2025 08:53:18 +0000</pubDate>
				<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[Case Studies]]></category>
		<category><![CDATA[Digital Transformation]]></category>
		<category><![CDATA[Jobs]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Security Strategy]]></category>
		<category><![CDATA[Threat Research]]></category>
		<category><![CDATA[Videos]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=51348</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/artificial_intelligence-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Artificial Intelligence" decoding="async" loading="lazy" /><p>They scream about AI automating entire SOC teams, making entry level jobs vanish, and wiping out roles faster than a zero-day exploit.</p>
The post <a href="https://websitecyber.com/ai-wont-steal-your-cyber-job/">AI Won’t Steal Your Cyber Job</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
		<item>
		<title>Unpacking China&#8217;s Hackers</title>
		<link>https://websitecyber.com/unpacking-chinas-hackers/</link>
		
		<dc:creator><![CDATA[Website Cyber Security]]></dc:creator>
		<pubDate>Sun, 24 Aug 2025 00:04:34 +0000</pubDate>
				<category><![CDATA[Advanced Persistent Threats]]></category>
		<category><![CDATA[Attacks]]></category>
		<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Cyber Warfare]]></category>
		<category><![CDATA[Data]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Reports]]></category>
		<category><![CDATA[Threat Defense]]></category>
		<category><![CDATA[Threat Research]]></category>
		<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">https://websitecyber.com/?p=51340</guid>

					<description><![CDATA[<img width="150" height="150" src="https://websitecyber.com/wp-content/uploads/2020/03/hacking-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="Cyber Security Hacking" decoding="async" loading="lazy" /><p>When Microsoft accused state backed Chinese hackers of breaching its servers targeting at least 60,000 global users few people were genuinely surprised.</p>
The post <a href="https://websitecyber.com/unpacking-chinas-hackers/">Unpacking China’s Hackers</a> first appeared on <a href="https://websitecyber.com">Website Cyber Security</a>.]]></description>
		
		
		
			</item>
	</channel>
</rss>
