<?xml version="1.0" encoding="UTF-8"?><feed
	xmlns="http://www.w3.org/2005/Atom"
	xmlns:thr="http://purl.org/syndication/thread/1.0"
	xml:lang="en-US"
	>
	<title type="text">Botcrawl</title>
	<subtitle type="text"></subtitle>

	<updated>2026-04-11T00:10:47Z</updated>

	<link rel="alternate" type="text/html" href="https://botcrawl.com" />
	<id>https://botcrawl.com/feed/atom/</id>
	<link rel="self" type="application/atom+xml" href="http://botcrawl.com/feed/atom/" />

	<generator uri="https://wordpress.org/" version="6.9.4">WordPress</generator>
<icon>https://botcrawl.com/wp-content/uploads/2026/03/cropped-botcrawl-icon-v5-32x32.png</icon>
	<entry>
		<author>
			<name>Sean Doyle</name>
							<uri>https://Botcrawl.com</uri>
						</author>

		<title type="html"><![CDATA[CPUID Compromise Served Malware Through Official CPU-Z and HWMonitor Downloads]]></title>
		<link rel="alternate" type="text/html" href="https://botcrawl.com/cpuid-compromise-served-malware-through-official-cpu-z-and-hwmonitor-downloads/" />

		<id>https://botcrawl.com/?p=164645</id>
		<updated>2026-04-11T00:10:47Z</updated>
		<published>2026-04-11T00:10:47Z</published>
		<category scheme="https://botcrawl.com" term="Data Breaches" /><category scheme="https://botcrawl.com" term="Cybersecurity" />
		<summary type="html"><![CDATA[<p>The CPUID compromise turned the official download path for CPU-Z and HWMonitor into a malware delivery channel for roughly six hours between April 9 and&#8230;</p>
<p>The post <a rel="nofollow" href="https://botcrawl.com/cpuid-compromise-served-malware-through-official-cpu-z-and-hwmonitor-downloads/">CPUID Compromise Served Malware Through Official CPU-Z and HWMonitor Downloads</a> appeared first on <a rel="nofollow" href="https://botcrawl.com">Botcrawl</a>.</p>
]]></summary>

		
					<link rel="replies" type="text/html" href="https://botcrawl.com/cpuid-compromise-served-malware-through-official-cpu-z-and-hwmonitor-downloads/#comments" thr:count="0" />
			<link rel="replies" type="application/atom+xml" href="https://botcrawl.com/cpuid-compromise-served-malware-through-official-cpu-z-and-hwmonitor-downloads/feed/atom/" thr:count="0" />
			<thr:total>0</thr:total>
			</entry>
		<entry>
		<author>
			<name>Sean Doyle</name>
							<uri>https://Botcrawl.com</uri>
						</author>

		<title type="html"><![CDATA[FBI and CISA Warn Iran-Affiliated Actors Are Targeting PLCs Across U.S. Critical Infrastructure]]></title>
		<link rel="alternate" type="text/html" href="https://botcrawl.com/fbi-and-cisa-warn-iran-affiliated-actors-are-targeting-plcs-across-u-s-critical-infrastructure/" />

		<id>https://botcrawl.com/?p=164568</id>
		<updated>2026-04-08T05:32:36Z</updated>
		<published>2026-04-08T05:32:36Z</published>
		<category scheme="https://botcrawl.com" term="Cybersecurity" />
		<summary type="html"><![CDATA[<p>FBI, CISA, NSA, EPA, DOE, and U.S. Cyber Command are warning that Iran-affiliated cyber actors are targeting internet-connected operational technology devices across multiple U.S. critical&#8230;</p>
<p>The post <a rel="nofollow" href="https://botcrawl.com/fbi-and-cisa-warn-iran-affiliated-actors-are-targeting-plcs-across-u-s-critical-infrastructure/">FBI and CISA Warn Iran-Affiliated Actors Are Targeting PLCs Across U.S. Critical Infrastructure</a> appeared first on <a rel="nofollow" href="https://botcrawl.com">Botcrawl</a>.</p>
]]></summary>

		
					<link rel="replies" type="text/html" href="https://botcrawl.com/fbi-and-cisa-warn-iran-affiliated-actors-are-targeting-plcs-across-u-s-critical-infrastructure/#comments" thr:count="0" />
			<link rel="replies" type="application/atom+xml" href="https://botcrawl.com/fbi-and-cisa-warn-iran-affiliated-actors-are-targeting-plcs-across-u-s-critical-infrastructure/feed/atom/" thr:count="0" />
			<thr:total>0</thr:total>
			</entry>
		<entry>
		<author>
			<name>Sean Doyle</name>
							<uri>https://Botcrawl.com</uri>
						</author>

		<title type="html"><![CDATA[Adobe Data Breach Shows How One Employee Can Bring It All Down]]></title>
		<link rel="alternate" type="text/html" href="https://botcrawl.com/adobe-data-breach-shows-how-one-employee-can-bring-it-all-down/" />

		<id>https://botcrawl.com/?p=164552</id>
		<updated>2026-04-08T04:49:38Z</updated>
		<published>2026-04-08T04:49:38Z</published>
		<category scheme="https://botcrawl.com" term="Data Breaches" />
		<summary type="html"><![CDATA[<p>The Adobe data breach shows how a major security incident can begin with a single compromise inside a support workflow. The intrusion allegedly moved through&#8230;</p>
<p>The post <a rel="nofollow" href="https://botcrawl.com/adobe-data-breach-shows-how-one-employee-can-bring-it-all-down/">Adobe Data Breach Shows How One Employee Can Bring It All Down</a> appeared first on <a rel="nofollow" href="https://botcrawl.com">Botcrawl</a>.</p>
]]></summary>

		
					<link rel="replies" type="text/html" href="https://botcrawl.com/adobe-data-breach-shows-how-one-employee-can-bring-it-all-down/#comments" thr:count="0" />
			<link rel="replies" type="application/atom+xml" href="https://botcrawl.com/adobe-data-breach-shows-how-one-employee-can-bring-it-all-down/feed/atom/" thr:count="0" />
			<thr:total>0</thr:total>
			</entry>
		<entry>
		<author>
			<name>Sean Doyle</name>
							<uri>https://Botcrawl.com</uri>
						</author>

		<title type="html"><![CDATA[Adobe Data Breach Tied to Mr. Raccoon Exposes 13 Million Support Records]]></title>
		<link rel="alternate" type="text/html" href="https://botcrawl.com/adobe-data-breach-tied-to-mr-raccoon-exposes-13-million-support-records/" />

		<id>https://botcrawl.com/?p=164385</id>
		<updated>2026-04-02T22:34:54Z</updated>
		<published>2026-04-02T22:34:54Z</published>
		<category scheme="https://botcrawl.com" term="Data Breaches" />
		<summary type="html"><![CDATA[<p>Adobe is dealing with a major breach after an intrusion tied to Mr. Raccoon exposed 13 million support records, employee files, HackerOne submissions, internal documents,&#8230;</p>
<p>The post <a rel="nofollow" href="https://botcrawl.com/adobe-data-breach-tied-to-mr-raccoon-exposes-13-million-support-records/">Adobe Data Breach Tied to Mr. Raccoon Exposes 13 Million Support Records</a> appeared first on <a rel="nofollow" href="https://botcrawl.com">Botcrawl</a>.</p>
]]></summary>

		
					<link rel="replies" type="text/html" href="https://botcrawl.com/adobe-data-breach-tied-to-mr-raccoon-exposes-13-million-support-records/#comments" thr:count="0" />
			<link rel="replies" type="application/atom+xml" href="https://botcrawl.com/adobe-data-breach-tied-to-mr-raccoon-exposes-13-million-support-records/feed/atom/" thr:count="0" />
			<thr:total>0</thr:total>
			</entry>
		<entry>
		<author>
			<name>Sean Doyle</name>
							<uri>https://Botcrawl.com</uri>
						</author>

		<title type="html"><![CDATA[Anthropic Accidentally Leaks Claude Code Source in npm Package]]></title>
		<link rel="alternate" type="text/html" href="https://botcrawl.com/anthropic-accidentally-leaks-claude-code-source-in-npm-package/" />

		<id>https://botcrawl.com/?p=164260</id>
		<updated>2026-04-01T23:07:56Z</updated>
		<published>2026-04-01T23:07:56Z</published>
		<category scheme="https://botcrawl.com" term="Artificial Intelligence" />
		<summary type="html"><![CDATA[<p>Anthropic has confirmed that a public Claude Code release accidentally exposed internal source code through npm. The leak has been tied to Claude Code version&#8230;</p>
<p>The post <a rel="nofollow" href="https://botcrawl.com/anthropic-accidentally-leaks-claude-code-source-in-npm-package/">Anthropic Accidentally Leaks Claude Code Source in npm Package</a> appeared first on <a rel="nofollow" href="https://botcrawl.com">Botcrawl</a>.</p>
]]></summary>

		
					<link rel="replies" type="text/html" href="https://botcrawl.com/anthropic-accidentally-leaks-claude-code-source-in-npm-package/#comments" thr:count="0" />
			<link rel="replies" type="application/atom+xml" href="https://botcrawl.com/anthropic-accidentally-leaks-claude-code-source-in-npm-package/feed/atom/" thr:count="0" />
			<thr:total>0</thr:total>
			</entry>
		<entry>
		<author>
			<name>Sean Doyle</name>
							<uri>https://Botcrawl.com</uri>
						</author>

		<title type="html"><![CDATA[North Korea Hackers Tied to Axios npm Package Supply Chain Attack]]></title>
		<link rel="alternate" type="text/html" href="https://botcrawl.com/north-korea-hackers-tied-to-axios-npm-package-supply-chain-attack/" />

		<id>https://botcrawl.com/?p=163753</id>
		<updated>2026-04-01T09:46:17Z</updated>
		<published>2026-04-01T09:46:17Z</published>
		<category scheme="https://botcrawl.com" term="Cybersecurity" />
		<summary type="html"><![CDATA[<p>North Korea hackers are now at the center of the Axios compromise after Google Threat Intelligence Group said the recent npm package attack was tied&#8230;</p>
<p>The post <a rel="nofollow" href="https://botcrawl.com/north-korea-hackers-tied-to-axios-npm-package-supply-chain-attack/">North Korea Hackers Tied to Axios npm Package Supply Chain Attack</a> appeared first on <a rel="nofollow" href="https://botcrawl.com">Botcrawl</a>.</p>
]]></summary>

		
					<link rel="replies" type="text/html" href="https://botcrawl.com/north-korea-hackers-tied-to-axios-npm-package-supply-chain-attack/#comments" thr:count="0" />
			<link rel="replies" type="application/atom+xml" href="https://botcrawl.com/north-korea-hackers-tied-to-axios-npm-package-supply-chain-attack/feed/atom/" thr:count="0" />
			<thr:total>0</thr:total>
			</entry>
		<entry>
		<author>
			<name>Sean Doyle</name>
							<uri>https://Botcrawl.com</uri>
						</author>

		<title type="html"><![CDATA[Axios Supply Chain Attack Pushes RAT Malware Through npm Install]]></title>
		<link rel="alternate" type="text/html" href="https://botcrawl.com/axios-supply-chain-attack-pushes-rat-malware-through-npm-install/" />

		<id>https://botcrawl.com/?p=162559</id>
		<updated>2026-03-31T06:41:49Z</updated>
		<published>2026-03-31T06:41:49Z</published>
		<category scheme="https://botcrawl.com" term="Cybersecurity" />
		<summary type="html"><![CDATA[<p>An axios supply chain attack briefly turned one of the JavaScript ecosystem’s most trusted packages into a malware delivery vehicle after poisoned npm releases pulled&#8230;</p>
<p>The post <a rel="nofollow" href="https://botcrawl.com/axios-supply-chain-attack-pushes-rat-malware-through-npm-install/">Axios Supply Chain Attack Pushes RAT Malware Through npm Install</a> appeared first on <a rel="nofollow" href="https://botcrawl.com">Botcrawl</a>.</p>
]]></summary>

		
					<link rel="replies" type="text/html" href="https://botcrawl.com/axios-supply-chain-attack-pushes-rat-malware-through-npm-install/#comments" thr:count="0" />
			<link rel="replies" type="application/atom+xml" href="https://botcrawl.com/axios-supply-chain-attack-pushes-rat-malware-through-npm-install/feed/atom/" thr:count="0" />
			<thr:total>0</thr:total>
			</entry>
		<entry>
		<author>
			<name>Sean Doyle</name>
							<uri>https://Botcrawl.com</uri>
						</author>

		<title type="html"><![CDATA[FBI Director Hacked by Iranian Hackers in Personal Gmail Leak]]></title>
		<link rel="alternate" type="text/html" href="https://botcrawl.com/fbi-director-hacked-by-iranian-hackers-in-personal-gmail-leak/" />

		<id>https://botcrawl.com/?p=162418</id>
		<updated>2026-04-01T05:57:47Z</updated>
		<published>2026-03-27T20:52:56Z</published>
		<category scheme="https://botcrawl.com" term="Cybersecurity" /><category scheme="https://botcrawl.com" term="Data Breaches" />
		<summary type="html"><![CDATA[<p>With little surprise, Kash Patel, the sitting director of the FBI, is facing one of the most embarrassing personal cybersecurity scandals involving a senior U.S.&#8230;</p>
<p>The post <a rel="nofollow" href="https://botcrawl.com/fbi-director-hacked-by-iranian-hackers-in-personal-gmail-leak/">FBI Director Hacked by Iranian Hackers in Personal Gmail Leak</a> appeared first on <a rel="nofollow" href="https://botcrawl.com">Botcrawl</a>.</p>
]]></summary>

		
					<link rel="replies" type="text/html" href="https://botcrawl.com/fbi-director-hacked-by-iranian-hackers-in-personal-gmail-leak/#comments" thr:count="0" />
			<link rel="replies" type="application/atom+xml" href="https://botcrawl.com/fbi-director-hacked-by-iranian-hackers-in-personal-gmail-leak/feed/atom/" thr:count="0" />
			<thr:total>0</thr:total>
			</entry>
		<entry>
		<author>
			<name>Sean Doyle</name>
							<uri>https://Botcrawl.com</uri>
						</author>

		<title type="html"><![CDATA[Crunchyroll Data Breach Allegedly Exposes 100GB of Customer Data via Outsourcing Partner]]></title>
		<link rel="alternate" type="text/html" href="https://botcrawl.com/crunchyroll-data-breach/" />

		<id>https://botcrawl.com/?p=162410</id>
		<updated>2026-03-23T07:37:32Z</updated>
		<published>2026-03-23T07:37:32Z</published>
		<category scheme="https://botcrawl.com" term="Data Breaches" />
		<summary type="html"><![CDATA[<p>The Crunchyroll data breach has emerged following claims that a threat actor gained access to internal systems through a third-party outsourcing partner, leading to the&#8230;</p>
<p>The post <a rel="nofollow" href="https://botcrawl.com/crunchyroll-data-breach/">Crunchyroll Data Breach Allegedly Exposes 100GB of Customer Data via Outsourcing Partner</a> appeared first on <a rel="nofollow" href="https://botcrawl.com">Botcrawl</a>.</p>
]]></summary>

		
					<link rel="replies" type="text/html" href="https://botcrawl.com/crunchyroll-data-breach/#comments" thr:count="0" />
			<link rel="replies" type="application/atom+xml" href="https://botcrawl.com/crunchyroll-data-breach/feed/atom/" thr:count="0" />
			<thr:total>0</thr:total>
			</entry>
		<entry>
		<author>
			<name>Sean Doyle</name>
							<uri>https://Botcrawl.com</uri>
						</author>

		<title type="html"><![CDATA[FBI Seeks Info in Steam Malware Investigation]]></title>
		<link rel="alternate" type="text/html" href="https://botcrawl.com/fbi-seeks-info-in-steam-malware-investigation/" />

		<id>https://botcrawl.com/?p=162256</id>
		<updated>2026-03-13T05:53:20Z</updated>
		<published>2026-03-13T05:53:20Z</published>
		<category scheme="https://botcrawl.com" term="Cybersecurity" /><category scheme="https://botcrawl.com" term="Malware" />
		<summary type="html"><![CDATA[<p>The Steam platform has become the focus of a growing federal investigation after malicious software was discovered inside several games distributed through the marketplace. The&#8230;</p>
<p>The post <a rel="nofollow" href="https://botcrawl.com/fbi-seeks-info-in-steam-malware-investigation/">FBI Seeks Info in Steam Malware Investigation</a> appeared first on <a rel="nofollow" href="https://botcrawl.com">Botcrawl</a>.</p>
]]></summary>

		
					<link rel="replies" type="text/html" href="https://botcrawl.com/fbi-seeks-info-in-steam-malware-investigation/#comments" thr:count="0" />
			<link rel="replies" type="application/atom+xml" href="https://botcrawl.com/fbi-seeks-info-in-steam-malware-investigation/feed/atom/" thr:count="0" />
			<thr:total>0</thr:total>
			</entry>
	</feed>
