<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	 xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>Information Security Buzz</title>
	<atom:link href="https://informationsecuritybuzz.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://informationsecuritybuzz.com</link>
	<description>Information Security News With Experts Analysis</description>
	<lastBuildDate>Mon, 31 Mar 2025 07:44:52 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.7.2</generator>

<image>
	<url>https://informationsecuritybuzz.com/wp-content/uploads/ISB-B-Logo_Green-RGB2.png</url>
	<title>Information Security Buzz</title>
	<link>https://informationsecuritybuzz.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Expert Insights: Strengthening Business Continuity and Disaster Recovery Strategies with AI</title>
		<link>https://informationsecuritybuzz.com/expert-insights-st-business-continuity/</link>
		
		<dc:creator><![CDATA[Bob Covello]]></dc:creator>
		<pubDate>Mon, 31 Mar 2025 07:04:08 +0000</pubDate>
				<category><![CDATA[Expert Panel]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[Business Continuity and Disaster Recovery]]></category>
		<category><![CDATA[Expert Panel Annick O'Brien]]></category>
		<category><![CDATA[Expert Panel​ Chloe Messdaghi]]></category>
		<category><![CDATA[Expert Panel​ Ross Moore]]></category>
		<guid isPermaLink="false">https://informationsecuritybuzz.com/?p=840896</guid>

					<description><![CDATA[Artificial Intelligence (AI) continues to have broad impacts on industries. While most of what is featured in the news focuses on the ability of AI to create written works, art, or fabricated images, there are some positive uses for the technology. Medical science has benefitted through faster analysis and diagnoses, and meteorology has also seen [...]]]></description>
		
		
		
			</item>
		<item>
		<title>Scale Security Expertise: Six Steps to Championing Security Across the SDLC</title>
		<link>https://informationsecuritybuzz.com/six-steps-to-security-across-the-sdlc/</link>
		
		<dc:creator><![CDATA[Kevin Poniatowski]]></dc:creator>
		<pubDate>Mon, 31 Mar 2025 06:42:19 +0000</pubDate>
				<category><![CDATA[Software Development Security]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://informationsecuritybuzz.com/?p=840893</guid>

					<description><![CDATA[Once just a &#8220;technology problem,&#8221; cybersecurity is now a business leadership priority across every area of a company. For software development organizations, cybersecurity has to become more than just a tool or program for creating secure code. It should be a mindset and foundational skillset for teams across the software development lifecycle (SDLC). This means [...]]]></description>
		
		
		
			</item>
		<item>
		<title>Major Cybersecurity Risks in Solar Power Systems Exposed</title>
		<link>https://informationsecuritybuzz.com/cybersec-risks-in-solar-power-systems/</link>
		
		<dc:creator><![CDATA[Kirsten Doyle]]></dc:creator>
		<pubDate>Mon, 31 Mar 2025 06:07:23 +0000</pubDate>
				<category><![CDATA[Critical Infrastructure Security]]></category>
		<category><![CDATA[News & Analysis]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://informationsecuritybuzz.com/?p=840887</guid>

					<description><![CDATA[A new cybersecurity report from Forescout Technologies has unveiled significant vulnerabilities in solar power systems that could potentially destabilize power grids and compromise consumer data privacy.&#160;&#160; The report, titled “SUN:DOWN – Destabilizing the Grid via Orchestrated Exploitation of Solar Power Systems,” details several key findings:&#160;&#160; According to Barry Mainz, Forescout CEO, “The collective impact of [...]]]></description>
		
		
		
			</item>
		<item>
		<title>Qualys Finds Three Security Bypasses in Ubuntu&#8217;s Unprivileged User Namespace Restrictions</title>
		<link>https://informationsecuritybuzz.com/qualys-security-bypasses-in-ubuntu/</link>
		
		<dc:creator><![CDATA[Kirsten Doyle]]></dc:creator>
		<pubDate>Mon, 31 Mar 2025 05:45:13 +0000</pubDate>
				<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[Latest News]]></category>
		<category><![CDATA[News & Analysis]]></category>
		<category><![CDATA[Threats and Vulnerabilities]]></category>
		<guid isPermaLink="false">https://informationsecuritybuzz.com/?p=840880</guid>

					<description><![CDATA[The Qualys Threat Research Unit (TRU) has uncovered three security bypasses in Ubuntu’s unprivileged user namespace restrictions.&#160;&#160; Researchers disclosed these vulnerabilities to the Ubuntu Security Team on 15 January this year, has been working with then ever since.&#160; Researchers found three distinct bypasses of these namespace restrictions, each of which would allow bad actors to [...]]]></description>
		
		
		
			</item>
		<item>
		<title>KnowBe4 Report Finds Polymorphic Phishing Features Present in 76.4% of Campaigns</title>
		<link>https://informationsecuritybuzz.com/knowbe4-report-fi-polymorphic-phishing/</link>
		
		<dc:creator><![CDATA[Adam Parlett]]></dc:creator>
		<pubDate>Mon, 31 Mar 2025 05:44:55 +0000</pubDate>
				<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Attacks]]></category>
		<category><![CDATA[Latest News]]></category>
		<category><![CDATA[News & Analysis]]></category>
		<category><![CDATA[Study & Research]]></category>
		<guid isPermaLink="false">https://informationsecuritybuzz.com/?p=840869</guid>

					<description><![CDATA[Phishing attacks are on the rise, with the latest KnowBe4 Phishing Threat Trends Report observing a 17.3% increase in phishing emails between September 15th, 2024, and February 14th, 2025, compared to the previous six months. Also increasing is the use of Polymorphic phishing, with polymorphic phishing features identified in 76.4% of all phishing campaigns they [...]]]></description>
		
		
		
			</item>
		<item>
		<title>Thousands of Driver’s Licenses, Bank Records, and PII Exposed in Australian Fintech Data Leak</title>
		<link>https://informationsecuritybuzz.com/thousands-of-drivers-licenses-bank-records-and-pii-exposed-in-australian-fintech-data-leak/</link>
		
		<dc:creator><![CDATA[Kirsten Doyle]]></dc:creator>
		<pubDate>Fri, 28 Mar 2025 07:50:15 +0000</pubDate>
				<category><![CDATA[News & Analysis]]></category>
		<category><![CDATA[Attacks]]></category>
		<category><![CDATA[Data Breach]]></category>
		<guid isPermaLink="false">https://informationsecuritybuzz.com/?p=840769</guid>

					<description><![CDATA[Cybersecurity analyst Jeremiah Fowler has discovered an unprotected Amazon S3 database that wasn’t encrypted or password protected and contained some 27,000 records. The records included highly personal information such as driver&#8217;s licenses, Medicaid cards, work statements, and bank statements that held account numbers and partial credit card numbers.&#160;&#160; The name of the database and the [...]]]></description>
		
		
		
			</item>
		<item>
		<title>WoW! A Ransomware Gang Just Took Over One of America’s Largest ISPs</title>
		<link>https://informationsecuritybuzz.com/wow-a-ransomware-gang-over-one-america/</link>
		
		<dc:creator><![CDATA[Kirsten Doyle]]></dc:creator>
		<pubDate>Fri, 28 Mar 2025 07:27:56 +0000</pubDate>
				<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Attacks]]></category>
		<category><![CDATA[Latest News]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[News & Analysis]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://informationsecuritybuzz.com/?p=840766</guid>

					<description><![CDATA[A new ransomware gang, Arkana Security, is claiming responsibility for an enormous breach at WideOpenWest (WoW), one of the largest cable operators and ISPs in the US.&#160; The malicious actors boasted they had full backend control and even put a music video montage together to illustrate exactly how much access they had.&#160;&#160; Threat researchers from [...]]]></description>
		
		
		
			</item>
		<item>
		<title>The EU AI Act: A Critical Overview of a Necessary Act?</title>
		<link>https://informationsecuritybuzz.com/the-eu-ai-act-a-critical-overview-of/</link>
		
		<dc:creator><![CDATA[Josh Breaker Rolfe]]></dc:creator>
		<pubDate>Fri, 28 Mar 2025 07:14:11 +0000</pubDate>
				<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Interviews With Experts]]></category>
		<guid isPermaLink="false">https://informationsecuritybuzz.com/?p=840762</guid>

					<description><![CDATA[The EU AI Act represents a crucial step towards responsible AI development, deployment, and use of AI in the European Union. However, Lamprini Gyftokosta, Director of Artificial Intelligence and Human Rights at Homo Digitalis, raises serious questions about its effectiveness and implementation.&#160; Ultimately, Gytfokosta believes that the EU AI Act is necessary but flawed. I [...]]]></description>
		
		
		
			</item>
		<item>
		<title>AppSOC Research Labs Delivers Damning Verdict on DeepSeek-R1 </title>
		<link>https://informationsecuritybuzz.com/appsoc-research-verdict-on-deepseek-r1/</link>
		
		<dc:creator><![CDATA[Adam Parlett]]></dc:creator>
		<pubDate>Fri, 28 Mar 2025 06:38:40 +0000</pubDate>
				<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[News & Analysis]]></category>
		<category><![CDATA[Risk Management]]></category>
		<guid isPermaLink="false">https://informationsecuritybuzz.com/?p=840756</guid>

					<description><![CDATA[Silicon Valley security provider AppSOC has branded DeepSeek-R1, one of the latest highly advanced artificial intelligence (AI) models to emerge from China, a “high-risk model unsuitable for enterprise use.” They strongly recommend that enterprises not use the DeepSeek-R1 model provided on Azure for “any AI applications, especially those involving personal information, sensitive data or IP.”  High [...]]]></description>
		
		
		
			</item>
		<item>
		<title>Oracle’s Data Breach Denial Unravels as Leaked Info Checks Out</title>
		<link>https://informationsecuritybuzz.com/oracles-data-breach-denial-unravels/</link>
		
		<dc:creator><![CDATA[Kirsten Doyle]]></dc:creator>
		<pubDate>Fri, 28 Mar 2025 06:24:44 +0000</pubDate>
				<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Attacks]]></category>
		<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[Latest News]]></category>
		<category><![CDATA[News & Analysis]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://informationsecuritybuzz.com/?p=840757</guid>

					<description><![CDATA[Despite Oracle&#8217;s denial of a breach affecting its Oracle Cloud federated SSO login servers, Bleeping Computer has confirmed with multiple companies that data samples shared by the threat actor are authentic.&#160; Recently, a threat actor, “rose87168,” claimed to be selling six million records, including sensitive account data, on dark web forums. &#160; CloudSEK’s investigation suggests [...]]]></description>
		
		
		
			</item>
	</channel>
</rss>
