<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" version="2.0">

<channel>
	<title>SecurityWeek RSS Feed</title>
	<atom:link href="https://www.securityweek.com/feed/" rel="self" type="application/rss+xml"/>
	<link>https://www.securityweek.com/</link>
	<description>Latest cybersecurity news and expert insights from SecurityWeek's RSS feed</description>
	<lastBuildDate>Thu, 25 May 2023 15:24:47 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.2</generator>

<image>
	<url>https://www.securityweek.com/wp-content/uploads/2023/01/cropped-SecurityWeek-Icon-32x32.jpeg</url>
	<title>SecurityWeek</title>
	<link>https://www.securityweek.com/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Memcyco Raises $10 Million in Seed Funding to Prevent Website Impersonation</title>
		<link>https://www.securityweek.com/memcyco-raises-10-million-in-seed-funding-to-prevent-website-impersonation/</link>
					<comments>https://www.securityweek.com/memcyco-raises-10-million-in-seed-funding-to-prevent-website-impersonation/#respond</comments>
		
		<dc:creator><![CDATA[Ionut Arghire]]></dc:creator>
		<pubDate>Thu, 25 May 2023 15:14:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity Funding]]></category>
		<category><![CDATA[Funding/M&A]]></category>
		<category><![CDATA[funding]]></category>
		<guid isPermaLink="false">https://www.securityweek.com/?p=33808</guid>

					<description><![CDATA[<p>Website impersonation detection and prevention company Memcyco raises $10 million in seed funding.</p>
<p>The post <a rel="nofollow" href="https://www.securityweek.com/memcyco-raises-10-million-in-seed-funding-to-prevent-website-impersonation/">Memcyco Raises $10 Million in Seed Funding to Prevent Website Impersonation</a> appeared first on <a rel="nofollow" href="https://www.securityweek.com">SecurityWeek</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.securityweek.com/memcyco-raises-10-million-in-seed-funding-to-prevent-website-impersonation/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>New Russia-Linked CosmicEnergy ICS Malware Could Disrupt Electric Grids</title>
		<link>https://www.securityweek.com/new-russia-linked-cosmicenergy-ics-malware-can-disrupt-electric-grid/</link>
					<comments>https://www.securityweek.com/new-russia-linked-cosmicenergy-ics-malware-can-disrupt-electric-grid/#respond</comments>
		
		<dc:creator><![CDATA[Eduard Kovacs]]></dc:creator>
		<pubDate>Thu, 25 May 2023 14:24:41 +0000</pubDate>
				<category><![CDATA[ICS/OT]]></category>
		<category><![CDATA[CosmicEnergy]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[ICS]]></category>
		<category><![CDATA[OT]]></category>
		<guid isPermaLink="false">https://www.securityweek.com/?p=33804</guid>

					<description><![CDATA[<p>Mandiant has analyzed a new Russia-linked ICS malware named CosmicEnergy that is designed to cause electric power disruption.</p>
<p>The post <a rel="nofollow" href="https://www.securityweek.com/new-russia-linked-cosmicenergy-ics-malware-can-disrupt-electric-grid/">New Russia-Linked CosmicEnergy ICS Malware Could Disrupt Electric Grids</a> appeared first on <a rel="nofollow" href="https://www.securityweek.com">SecurityWeek</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.securityweek.com/new-russia-linked-cosmicenergy-ics-malware-can-disrupt-electric-grid/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Security Pros: Before You Do Anything, Understand Your Threat Landscape</title>
		<link>https://www.securityweek.com/security-pros-before-you-do-anything-understand-your-threat-landscape/</link>
					<comments>https://www.securityweek.com/security-pros-before-you-do-anything-understand-your-threat-landscape/#respond</comments>
		
		<dc:creator><![CDATA[Marc Solomon]]></dc:creator>
		<pubDate>Thu, 25 May 2023 14:06:10 +0000</pubDate>
				<category><![CDATA[Incident Response]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://www.securityweek.com/?p=33803</guid>

					<description><![CDATA[<p>Regardless of the use case your security organization is focused on, you’ll likely waste time and resources and make poor decisions if you don’t start with understanding <i>your</i> threat landscape.</p>
<p>The post <a rel="nofollow" href="https://www.securityweek.com/security-pros-before-you-do-anything-understand-your-threat-landscape/">Security Pros: Before You Do Anything, Understand Your Threat Landscape</a> appeared first on <a rel="nofollow" href="https://www.securityweek.com">SecurityWeek</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.securityweek.com/security-pros-before-you-do-anything-understand-your-threat-landscape/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Major Massachusetts Health Insurer Hit by Ransomware Attack, Member Data May Be Compromised</title>
		<link>https://www.securityweek.com/major-massachusetts-health-insurer-hit-by-ransomware-attack-member-data-may-be-compromised/</link>
					<comments>https://www.securityweek.com/major-massachusetts-health-insurer-hit-by-ransomware-attack-member-data-may-be-compromised/#respond</comments>
		
		<dc:creator><![CDATA[Associated Press]]></dc:creator>
		<pubDate>Thu, 25 May 2023 13:41:13 +0000</pubDate>
				<category><![CDATA[Data Breaches]]></category>
		<category><![CDATA[data breach]]></category>
		<guid isPermaLink="false">https://www.securityweek.com/?p=33801</guid>

					<description><![CDATA[<p>The second-largest health insurer in Massachusetts was the victim of a ransomware attack in which sensitive personal information as well as health information of current and past members may have been compromised.</p>
<p>The post <a rel="nofollow" href="https://www.securityweek.com/major-massachusetts-health-insurer-hit-by-ransomware-attack-member-data-may-be-compromised/">Major Massachusetts Health Insurer Hit by Ransomware Attack, Member Data May Be Compromised</a> appeared first on <a rel="nofollow" href="https://www.securityweek.com">SecurityWeek</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.securityweek.com/major-massachusetts-health-insurer-hit-by-ransomware-attack-member-data-may-be-compromised/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Apria Healthcare Notifying 2 Million People of Years-Old Data Breaches</title>
		<link>https://www.securityweek.com/apria-healthcare-notifying-2-million-people-of-years-old-data-breaches/</link>
					<comments>https://www.securityweek.com/apria-healthcare-notifying-2-million-people-of-years-old-data-breaches/#respond</comments>
		
		<dc:creator><![CDATA[Ionut Arghire]]></dc:creator>
		<pubDate>Thu, 25 May 2023 11:32:43 +0000</pubDate>
				<category><![CDATA[Data Breaches]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[healthcare]]></category>
		<guid isPermaLink="false">https://www.securityweek.com/?p=33798</guid>

					<description><![CDATA[<p>Apria Healthcare is informing 1.86 million individuals of personal information compromise in 2019 and 2021 data breaches.</p>
<p>The post <a rel="nofollow" href="https://www.securityweek.com/apria-healthcare-notifying-2-million-people-of-years-old-data-breaches/">Apria Healthcare Notifying 2 Million People of Years-Old Data Breaches</a> appeared first on <a rel="nofollow" href="https://www.securityweek.com">SecurityWeek</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.securityweek.com/apria-healthcare-notifying-2-million-people-of-years-old-data-breaches/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>European Cybersecurity Firm Sekoia.io Raises $37.5 Million</title>
		<link>https://www.securityweek.com/european-cybersecurity-firm-sekoia-io-raises-37-5-million/</link>
					<comments>https://www.securityweek.com/european-cybersecurity-firm-sekoia-io-raises-37-5-million/#respond</comments>
		
		<dc:creator><![CDATA[Ionut Arghire]]></dc:creator>
		<pubDate>Thu, 25 May 2023 11:17:14 +0000</pubDate>
				<category><![CDATA[Cybersecurity Funding]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[funding]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<category><![CDATA[XDR]]></category>
		<guid isPermaLink="false">https://www.securityweek.com/?p=33797</guid>

					<description><![CDATA[<p>European XDR and threat intelligence provider Sekoia.io has raised €35 million ($37.5 million) in Series A funding.</p>
<p>The post <a rel="nofollow" href="https://www.securityweek.com/european-cybersecurity-firm-sekoia-io-raises-37-5-million/">European Cybersecurity Firm Sekoia.io Raises $37.5 Million</a> appeared first on <a rel="nofollow" href="https://www.securityweek.com">SecurityWeek</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.securityweek.com/european-cybersecurity-firm-sekoia-io-raises-37-5-million/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Today’s Cyber Defense Challenges: Complexity and a False Sense of Security</title>
		<link>https://www.securityweek.com/todays-cyber-defense-challenges-complexity-and-a-false-sense-of-security/</link>
					<comments>https://www.securityweek.com/todays-cyber-defense-challenges-complexity-and-a-false-sense-of-security/#respond</comments>
		
		<dc:creator><![CDATA[Torsten George]]></dc:creator>
		<pubDate>Thu, 25 May 2023 11:01:30 +0000</pubDate>
				<category><![CDATA[Risk Management]]></category>
		<guid isPermaLink="false">https://www.securityweek.com/?p=33794</guid>

					<description><![CDATA[<p>Industry standard frameworks and guidelines often lead organizations to believe that deploying more security solutions will result in greater protection against threats.</p>
<p>The post <a rel="nofollow" href="https://www.securityweek.com/todays-cyber-defense-challenges-complexity-and-a-false-sense-of-security/">Today’s Cyber Defense Challenges: Complexity and a False Sense of Security</a> appeared first on <a rel="nofollow" href="https://www.securityweek.com">SecurityWeek</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.securityweek.com/todays-cyber-defense-challenges-complexity-and-a-false-sense-of-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Drop in Insider Breaches Drives Decline in Intrusions at OT Organizations</title>
		<link>https://www.securityweek.com/drop-in-insider-breaches-drives-decline-in-intrusions-at-ot-organizations/</link>
					<comments>https://www.securityweek.com/drop-in-insider-breaches-drives-decline-in-intrusions-at-ot-organizations/#respond</comments>
		
		<dc:creator><![CDATA[Eduard Kovacs]]></dc:creator>
		<pubDate>Thu, 25 May 2023 11:00:16 +0000</pubDate>
				<category><![CDATA[ICS/OT]]></category>
		<category><![CDATA[OT]]></category>
		<category><![CDATA[Report]]></category>
		<guid isPermaLink="false">https://www.securityweek.com/?p=33795</guid>

					<description><![CDATA[<p>Fortinet’s 2023 State of Operational Technology and Cybersecurity Report shows a drop in the number of breaches and CISOs being increasingly responsible for OT cybersecurity.</p>
<p>The post <a rel="nofollow" href="https://www.securityweek.com/drop-in-insider-breaches-drives-decline-in-intrusions-at-ot-organizations/">Drop in Insider Breaches Drives Decline in Intrusions at OT Organizations</a> appeared first on <a rel="nofollow" href="https://www.securityweek.com">SecurityWeek</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.securityweek.com/drop-in-insider-breaches-drives-decline-in-intrusions-at-ot-organizations/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>GitLab Security Update Patches Critical Vulnerability</title>
		<link>https://www.securityweek.com/gitlab-security-update-patches-critical-vulnerability/</link>
					<comments>https://www.securityweek.com/gitlab-security-update-patches-critical-vulnerability/#respond</comments>
		
		<dc:creator><![CDATA[Ionut Arghire]]></dc:creator>
		<pubDate>Thu, 25 May 2023 10:03:24 +0000</pubDate>
				<category><![CDATA[Vulnerabilities]]></category>
		<category><![CDATA[GitLab]]></category>
		<category><![CDATA[vulnerability]]></category>
		<guid isPermaLink="false">https://www.securityweek.com/?p=33792</guid>

					<description><![CDATA[<p>GitLab CE/EE version 16.0.1 patches a critical arbitrary file read vulnerability tracked as CVE-2023-2825.</p>
<p>The post <a rel="nofollow" href="https://www.securityweek.com/gitlab-security-update-patches-critical-vulnerability/">GitLab Security Update Patches Critical Vulnerability</a> appeared first on <a rel="nofollow" href="https://www.securityweek.com">SecurityWeek</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.securityweek.com/gitlab-security-update-patches-critical-vulnerability/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Zero-Day Vulnerability Exploited to Hack Barracuda Email Security Gateway Appliances</title>
		<link>https://www.securityweek.com/zero-day-vulnerability-exploited-to-hack-barracuda-email-security-gateway-appliances/</link>
					<comments>https://www.securityweek.com/zero-day-vulnerability-exploited-to-hack-barracuda-email-security-gateway-appliances/#respond</comments>
		
		<dc:creator><![CDATA[Eduard Kovacs]]></dc:creator>
		<pubDate>Thu, 25 May 2023 09:56:37 +0000</pubDate>
				<category><![CDATA[Vulnerabilities]]></category>
		<category><![CDATA[Barracuda]]></category>
		<category><![CDATA[exploited]]></category>
		<category><![CDATA[Zero-Day]]></category>
		<guid isPermaLink="false">https://www.securityweek.com/?p=33790</guid>

					<description><![CDATA[<p>Barracuda Networks is warning customers about CVE-2023-2868, a zero-day exploited to hack some Email Security Gateway (ESG) appliances.</p>
<p>The post <a rel="nofollow" href="https://www.securityweek.com/zero-day-vulnerability-exploited-to-hack-barracuda-email-security-gateway-appliances/">Zero-Day Vulnerability Exploited to Hack Barracuda Email Security Gateway Appliances</a> appeared first on <a rel="nofollow" href="https://www.securityweek.com">SecurityWeek</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.securityweek.com/zero-day-vulnerability-exploited-to-hack-barracuda-email-security-gateway-appliances/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>