<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" >

<channel>
	<title> &ndash; Tech Observer Magazine</title>
	<atom:link href="https://techobserver.in/news/cybersecurity/feed/" rel="self" type="application/rss+xml" />
	<link>https://techobserver.in</link>
	<description></description>
	<lastBuildDate>Tue, 14 Apr 2026 10:00:59 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
<atom:link rel="hub" href="https://pubsubhubbub.appspot.com"/>
<atom:link rel="hub" href="https://pubsubhubbub.superfeedr.com"/>
<atom:link rel="self" href="https://techobserver.in/news/cybersecurity/feed/"/>
	<itunes:category text="News &amp; Politics" />
	<itunes:author>Tech Observer</itunes:author>
	<itunes:owner>
		<itunes:name>Tech Observer</itunes:name>
		<itunes:email>contact@techobserver.in</itunes:email>
	</itunes:owner>
	<itunes:image href="https://techobserver.in/wp-content/uploads/2021/05/podcast-tehobserver.png" />
	<image>
		<title> &ndash; Tech Observer Magazine</title>
		<url>https://techobserver.in/wp-content/uploads/2021/05/podcast-tehobserver.png</url>
		<link>https://techobserver.in</link>
	</image>
	<itunes:subtitle> &ndash; Tech Observer Magazine</itunes:subtitle>
	<itunes:summary></itunes:summary>
	<itunes:explicit>false</itunes:explicit>
	<copyright>Copyright &#xA9; 2025 TechObserver Infomedia [P] Ltd. All Rights Reserved</copyright>
	<item>
		<title>CoinDCX Receives Patent for Crypto Wallet Security System</title>
		<link>https://techobserver.in/news/cybersecurity/coindcx-patent-crypto-wallet-security-india-322071/</link>
					<comments>https://techobserver.in/news/cybersecurity/coindcx-patent-crypto-wallet-security-india-322071/#respond</comments>
		
		<dc:creator><![CDATA[Tech Observer Desk]]></dc:creator>
		<pubDate>Tue, 14 Apr 2026 10:00:21 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[CoinDCX]]></category>
		<category><![CDATA[Patent Office]]></category>
		<category><![CDATA[Sumit Gupta]]></category>
		<guid isPermaLink="false">https://techobserver.in/?p=322071</guid>

					<description><![CDATA[<p>The Patent Office has granted CoinDCX a patent for technology designed to protect cryptocurrency wallet private keys using adaptive artificial intelligence systems.</p>
<p>This article was first and originally published on TechObserver.in. Read more at https://techobserver.in/</p>
]]></description>
		
					<wfw:commentRss>https://techobserver.in/news/cybersecurity/coindcx-patent-crypto-wallet-security-india-322071/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cisco eyes $350 million acquisition of Israeli AI security startup Astrix</title>
		<link>https://techobserver.in/news/cybersecurity/cisco-acquire-astrix-ai-security-startup-321988/</link>
					<comments>https://techobserver.in/news/cybersecurity/cisco-acquire-astrix-ai-security-startup-321988/#respond</comments>
		
		<dc:creator><![CDATA[Tech Observer Desk]]></dc:creator>
		<pubDate>Sun, 12 Apr 2026 16:30:40 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Astrix Security]]></category>
		<category><![CDATA[Cisco]]></category>
		<category><![CDATA[Unit 8200]]></category>
		<guid isPermaLink="false">https://techobserver.in/?p=321988</guid>

					<description><![CDATA[<p>Cisco is reportedly negotiating to acquire Israeli cybersecurity startup Astrix Security for up to $350 million. The startup specialises in securing AI agents and non-human identities operating inside corporate systems.</p>
<p>This article was first and originally published on TechObserver.in. Read more at https://techobserver.in/</p>
]]></description>
		
					<wfw:commentRss>https://techobserver.in/news/cybersecurity/cisco-acquire-astrix-ai-security-startup-321988/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Anthropic restricts new AI model after it finds thousands of software flaws</title>
		<link>https://techobserver.in/news/cybersecurity/anthropic-restricts-claude-mythos-preview-security-flaws-321959/</link>
					<comments>https://techobserver.in/news/cybersecurity/anthropic-restricts-claude-mythos-preview-security-flaws-321959/#respond</comments>
		
		<dc:creator><![CDATA[Tech Observer Desk]]></dc:creator>
		<pubDate>Sun, 12 Apr 2026 13:51:46 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[Claude]]></category>
		<category><![CDATA[OpenBSD]]></category>
		<guid isPermaLink="false">https://techobserver.in/?p=321959</guid>

					<description><![CDATA[<p>Anthropic has restricted its Claude Mythos Preview model after it found thousands of critical security flaws in all major operating systems and browsers. The company commits up to ₹850 crore in credits for defensive cybersecurity work.</p>
<p>This article was first and originally published on TechObserver.in. Read more at https://techobserver.in/</p>
]]></description>
		
					<wfw:commentRss>https://techobserver.in/news/cybersecurity/anthropic-restricts-claude-mythos-preview-security-flaws-321959/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>World Backup Day: Experts urge shift to cyber resilience as threats rise</title>
		<link>https://techobserver.in/news/cybersecurity/world-backup-day-cyber-resilience-india-experts-321719/</link>
					<comments>https://techobserver.in/news/cybersecurity/world-backup-day-cyber-resilience-india-experts-321719/#respond</comments>
		
		<dc:creator><![CDATA[Tech Observer Desk]]></dc:creator>
		<pubDate>Mon, 30 Mar 2026 19:43:05 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cloudera]]></category>
		<category><![CDATA[Lenovo]]></category>
		<category><![CDATA[Zscaler]]></category>
		<guid isPermaLink="false">https://techobserver.in/?p=321719</guid>

					<description><![CDATA[<p>Industry leaders warn Indian enterprises that traditional backup strategies are failing as attackers now target recovery systems. Experts urge adoption of Zero Trust architecture and distributed resilience frameworks ahead of World Backup Day.</p>
<p>This article was first and originally published on TechObserver.in. Read more at https://techobserver.in/</p>
]]></description>
		
					<wfw:commentRss>https://techobserver.in/news/cybersecurity/world-backup-day-cyber-resilience-india-experts-321719/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>OAuth login flows exploited in new malware campaigns, warns CISO</title>
		<link>https://techobserver.in/news/cybersecurity/oauth-login-malware-campaigns-microsoft-ciso-warning-321189/</link>
					<comments>https://techobserver.in/news/cybersecurity/oauth-login-malware-campaigns-microsoft-ciso-warning-321189/#respond</comments>
		
		<dc:creator><![CDATA[Tech Observer Desk]]></dc:creator>
		<pubDate>Sun, 08 Mar 2026 18:00:24 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Keeper Security]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Shane Barney]]></category>
		<guid isPermaLink="false">https://techobserver.in/?p=321189</guid>

					<description><![CDATA[<p>Microsoft research reveals attackers are exploiting OAuth login redirect behaviour to send users from legitimate login pages to malware-hosting websites. Keeper Security's CISO warns identity workflows have become a core attack surface for cyber criminals.</p>
<p>This article was first and originally published on TechObserver.in. Read more at https://techobserver.in/</p>
]]></description>
		
					<wfw:commentRss>https://techobserver.in/news/cybersecurity/oauth-login-malware-campaigns-microsoft-ciso-warning-321189/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>AI ‘autonomy’ fears say more about human design choices than machines, security expert says</title>
		<link>https://techobserver.in/news/cybersecurity/ai-autonomy-fears-say-more-about-human-design-choices-than-machines-security-expert-says-320864/</link>
					<comments>https://techobserver.in/news/cybersecurity/ai-autonomy-fears-say-more-about-human-design-choices-than-machines-security-expert-says-320864/#respond</comments>
		
		<dc:creator><![CDATA[Tooba Aslam]]></dc:creator>
		<pubDate>Mon, 09 Feb 2026 04:45:41 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[AI Autonomy]]></category>
		<category><![CDATA[Moltbook]]></category>
		<guid isPermaLink="false">https://techobserver.in/?p=320864</guid>

					<description><![CDATA[<p>Speculation around AI agents acting independently masks deeper concerns about access controls, permissions and human design choices that ultimately determine how artificial intelligence behaves, cybersecurity experts say.</p>
<p>This article was first and originally published on TechObserver.in. Read more at https://techobserver.in/</p>
]]></description>
		
					<wfw:commentRss>https://techobserver.in/news/cybersecurity/ai-autonomy-fears-say-more-about-human-design-choices-than-machines-security-expert-says-320864/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Union Budget 2026 sharpens focus on cybersecurity as digital expansion raises risk exposure</title>
		<link>https://techobserver.in/news/cybersecurity/union-budget-2026-sharpens-focus-on-cybersecurity-as-digital-expansion-raises-risk-exposure-320644/</link>
					<comments>https://techobserver.in/news/cybersecurity/union-budget-2026-sharpens-focus-on-cybersecurity-as-digital-expansion-raises-risk-exposure-320644/#respond</comments>
		
		<dc:creator><![CDATA[Tooba Aslam]]></dc:creator>
		<pubDate>Sun, 01 Feb 2026 20:08:01 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Resilience]]></category>
		<category><![CDATA[Union Budget]]></category>
		<guid isPermaLink="false">https://techobserver.in/?p=320644</guid>

					<description><![CDATA[<p>While cybersecurity did not feature as a standalone budget head, industry leaders said several announcements would have direct and indirect implications for cyber resilience, data protection and risk management.</p>
<p>This article was first and originally published on TechObserver.in. Read more at https://techobserver.in/</p>
]]></description>
		
					<wfw:commentRss>https://techobserver.in/news/cybersecurity/union-budget-2026-sharpens-focus-on-cybersecurity-as-digital-expansion-raises-risk-exposure-320644/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>On Data Privacy Day, tech leaders warn trust will define the AI economy</title>
		<link>https://techobserver.in/news/cybersecurity/on-data-privacy-day-tech-leaders-warn-trust-will-define-the-ai-economy-320320/</link>
					<comments>https://techobserver.in/news/cybersecurity/on-data-privacy-day-tech-leaders-warn-trust-will-define-the-ai-economy-320320/#respond</comments>
		
		<dc:creator><![CDATA[Mohd Ujaley]]></dc:creator>
		<pubDate>Wed, 28 Jan 2026 07:55:29 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[Data Privacy Day]]></category>
		<guid isPermaLink="false">https://techobserver.in/?p=320320</guid>

					<description><![CDATA[<p>On Data Privacy Day, technology leaders say rising AI use, cross-border data flows and cyber risk are forcing companies to rethink privacy, security and governance beyond compliance.</p>
<p>This article was first and originally published on TechObserver.in. Read more at https://techobserver.in/</p>
]]></description>
		
					<wfw:commentRss>https://techobserver.in/news/cybersecurity/on-data-privacy-day-tech-leaders-warn-trust-will-define-the-ai-economy-320320/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Stolen passwords now a constant risk, not isolated breaches, CISO says</title>
		<link>https://techobserver.in/news/cybersecurity/stolen-passwords-now-a-constant-risk-not-isolated-breaches-ciso-says-320254/</link>
					<comments>https://techobserver.in/news/cybersecurity/stolen-passwords-now-a-constant-risk-not-isolated-breaches-ciso-says-320254/#respond</comments>
		
		<dc:creator><![CDATA[Tech Observer Desk]]></dc:creator>
		<pubDate>Tue, 27 Jan 2026 07:44:57 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Chief Information Security Officer]]></category>
		<category><![CDATA[Jeremiah Fowler]]></category>
		<category><![CDATA[Keeper Security]]></category>
		<category><![CDATA[Shane Barney]]></category>
		<guid isPermaLink="false">https://techobserver.in/?p=320254</guid>

					<description><![CDATA[<p>The discovery of a database containing 149 million exposed login credentials shows that credential theft has become a persistent condition of the internet, rather than a series of one-off breaches, according to Shane Barney, CISO at Keeper Security.</p>
<p>This article was first and originally published on TechObserver.in. Read more at https://techobserver.in/</p>
]]></description>
		
					<wfw:commentRss>https://techobserver.in/news/cybersecurity/stolen-passwords-now-a-constant-risk-not-isolated-breaches-ciso-says-320254/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Grok AI curbs in Southeast Asia expose gaps in AI governance, security executive says</title>
		<link>https://techobserver.in/news/cybersecurity/grok-ai-curbs-in-southeast-asia-expose-gaps-in-ai-governance-security-executive-says-320184/</link>
					<comments>https://techobserver.in/news/cybersecurity/grok-ai-curbs-in-southeast-asia-expose-gaps-in-ai-governance-security-executive-says-320184/#respond</comments>
		
		<dc:creator><![CDATA[Tech Observer Desk]]></dc:creator>
		<pubDate>Fri, 23 Jan 2026 19:17:38 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AI Governance]]></category>
		<category><![CDATA[Grok AI]]></category>
		<guid isPermaLink="false">https://techobserver.in/?p=320184</guid>

					<description><![CDATA[<p>Restrictions and regulatory scrutiny facing Grok AI in parts of Southeast Asia reflect shortcomings in governance rather than opposition to artificial intelligence, Takanori Nishiyama of Keeper Security said, as countries in the region weigh the risks of generative AI systems.</p>
<p>This article was first and originally published on TechObserver.in. Read more at https://techobserver.in/</p>
]]></description>
		
					<wfw:commentRss>https://techobserver.in/news/cybersecurity/grok-ai-curbs-in-southeast-asia-expose-gaps-in-ai-governance-security-executive-says-320184/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
