<?xml version="1.0" encoding="utf-8" ?>
<rss version="2.0">
<channel>
<title>DeviceSecurity.io  RSS Syndication</title>
<link>https://www.devicesecurity.io/rssFeeds.php?type=main</link>
<description>DeviceSecurity.io RSS News Feeds on device security news, regulations, blogs and education</description>
<pubDate>Sat, 16 May 2026 10:15:20 -0400</pubDate>
			<item>
			<title>New Cisco SD-WAN Zero-Day Grants Admin Access</title>
			<link>https://www.devicesecurity.io/new-cisco-sd-wan-zero-day-grants-admin-access-a-31708</link>
			<guid>https://www.devicesecurity.io/new-cisco-sd-wan-zero-day-grants-admin-access-a-31708</guid>
			<description>&lt;img src=&quot;https://ismg-cdn.nyc3.cdn.digitaloceanspaces.com/articles/new-cisco-sd-wan-zero-day-grants-admin-access-image_small-6-a-31708.jpg&quot; align=right hspace=4&gt;&lt;b&gt;Broken vdaemon Peering Authentication Enables Unauthenticated Admin Access&lt;/b&gt;&lt;br&gt;A maximum-severity vulnerability in Cisco Catalyst SD-WAN Controller is being actively exploited, giving attackers administrative privileges without authentication. The authentication bypass vulnerability stems from a broken peering authentication mechanism.</description>
			</item>
			<item>
			<title>SecurityScorecard Buys Driftnet for More Internet Visibility</title>
			<link>https://www.devicesecurity.io/securityscorecard-buys-driftnet-for-more-internet-visibility-a-31707</link>
			<guid>https://www.devicesecurity.io/securityscorecard-buys-driftnet-for-more-internet-visibility-a-31707</guid>
			<description>&lt;img src=&quot;https://ismg-cdn.nyc3.cdn.digitaloceanspaces.com/articles/securityscorecard-buys-driftnet-for-more-internet-visibility-image_small-7-a-31707.jpg&quot; align=right hspace=4&gt;&lt;b&gt;Driftnet Acquisition Adds Real-Time Visibility Into Exposed Assets and AI Risks&lt;/b&gt;&lt;br&gt;SecurityScorecard acquired internet reconnaissance startup Driftnet to expand real-time visibility into hidden infrastructure, exposed assets and AI-driven third-party risks while strengthening threat hunting, attribution and internet-scale intelligence capabilities.</description>
			</item>
			<item>
			<title>AI Doctors? Lawsuits Say No, Some Doctors Say Yes</title>
			<link>https://www.devicesecurity.io/ai-doctors-lawsuits-say-no-some-doctors-say-yes-a-31705</link>
			<guid>https://www.devicesecurity.io/ai-doctors-lawsuits-say-no-some-doctors-say-yes-a-31705</guid>
			<description>&lt;img src=&quot;https://ismg-cdn.nyc3.cdn.digitaloceanspaces.com/articles/pennsylvania-targets-ai-chatbots-posing-as-doctors-image_small-5-a-31705.jpg&quot; align=right hspace=4&gt;&lt;b&gt;License Frontier AI to Practice Medicine, Argues JAMA Article&lt;/b&gt;&lt;br&gt;Scrutiny is intensifying around the quickly evolving role that AI is playing in healthcare. That includes issues around the transparency and safety of consumer health chatbots and also whether a new clinical AI licensing framework is necessary to protect the integrity of medicine.</description>
			</item>
			<item>
			<title>ISMG Editors: Should We Trust Ransomware Gangs?</title>
			<link>https://www.devicesecurity.io/ismg-editors-should-we-trust-ransomware-gangs-a-31704</link>
			<guid>https://www.devicesecurity.io/ismg-editors-should-we-trust-ransomware-gangs-a-31704</guid>
			<description>&lt;img src=&quot;https://ismg-cdn.nyc3.cdn.digitaloceanspaces.com/articles/ismg-editors-should-we-trust-ransomware-gangs-image_small-2-a-31704.jpg&quot; align=right hspace=4&gt;&lt;b&gt;Ransomware Payouts, AI-Driven Threats and Reshaping Payment Fraud&lt;/b&gt;&lt;br&gt;In this week's panel, four ISMG editors discussed a ransomware case that once again raises questions about paying extortionists, why security leaders fear AI is accelerating attacks faster than humans can respond and how the rise of instant payments is reshaping fraud programs at banks.</description>
			</item>
			<item>
			<title>From AI Risk to Trusted Recovery: Building Resilient Incident Response</title>
			<link>https://www.devicesecurity.io/webinars/from-ai-risk-to-trusted-recovery-building-resilient-incident-response-w-7058</link>
			<guid>https://www.devicesecurity.io/webinars/from-ai-risk-to-trusted-recovery-building-resilient-incident-response-w-7058</guid>
			<description></description>
			</item>
			<item>
			<title>Webinar | The Hidden Identity Risks of AI Agents</title>
			<link>https://www.devicesecurity.io/webinars/webinar-hidden-identity-risks-ai-agents-w-7055</link>
			<guid>https://www.devicesecurity.io/webinars/webinar-hidden-identity-risks-ai-agents-w-7055</guid>
			<description></description>
			</item>
			<item>
			<title>Live Webinar | From AI Data Risk to Clean Recovery: A Practical CISO Playbook for Trusted Resilience Operations</title>
			<link>https://www.devicesecurity.io/webinars/live-webinar-from-ai-data-risk-to-clean-recovery-practical-ciso-w-7052</link>
			<guid>https://www.devicesecurity.io/webinars/live-webinar-from-ai-data-risk-to-clean-recovery-practical-ciso-w-7052</guid>
			<description></description>
			</item>
			<item>
			<title>Webinar | Exposing the Security Gaps Behind AI Agents and Shadow Identities</title>
			<link>https://www.devicesecurity.io/webinars/webinar-exposing-security-gaps-behind-ai-agents-shadow-identities-w-7027</link>
			<guid>https://www.devicesecurity.io/webinars/webinar-exposing-security-gaps-behind-ai-agents-shadow-identities-w-7027</guid>
			<description></description>
			</item>
			<item>
			<title>Why Hospitals Must Rethink Cyber Resilience</title>
			<link>https://www.devicesecurity.io/interviews/hospitals-must-rethink-cyber-resilience-i-5547</link>
			<guid>https://www.devicesecurity.io/interviews/hospitals-must-rethink-cyber-resilience-i-5547</guid>
			<description>In the face of relentless cyberattacks that threaten patient safety, hospitals must strengthen their resilience, with clinical continuity, secure backups and coordinated recovery emerging as critical strategies, said John Riggi of the American Hospital Association and Josh Howell of Rubrik.</description>
			</item>
			<item>
			<title>The Privacy Risks of Embedded, Shadow AI in Healthcare</title>
			<link>https://www.devicesecurity.io/interviews/privacy-risks-embedded-shadow-ai-in-healthcare-i-5546</link>
			<guid>https://www.devicesecurity.io/interviews/privacy-risks-embedded-shadow-ai-in-healthcare-i-5546</guid>
			<description>Artificial intelligence that is embedded in newer editions of software and other technology tools but is not explicitly revealed by vendors is a substantial risk on par with shadow AI, said regulatory attorney Elizabeth Hodge with the law firm Akerman LLP.</description>
			</item>
			<item>
			<title>Why Data Security Standards in Cancer Innovation Matter</title>
			<link>https://www.devicesecurity.io/interviews/data-security-standards-in-cancer-innovation-matter-i-5540</link>
			<guid>https://www.devicesecurity.io/interviews/data-security-standards-in-cancer-innovation-matter-i-5540</guid>
			<description>Cancer research and treatment innovation - and the tech that powers that - requires a great deal of collaboration and data sharing among multiple parties. But keeping that sensitive information secure and private is crucial - and requires adherence to standards, said Baxter Lee of Clearwater.</description>
			</item>
			<item>
			<title>How Main Line Health Secures Devices With Microsegmentation</title>
			<link>https://www.devicesecurity.io/interviews/how-main-line-health-secures-devices-microsegmentation-i-5539</link>
			<guid>https://www.devicesecurity.io/interviews/how-main-line-health-secures-devices-microsegmentation-i-5539</guid>
			<description>An identity-based microsegmentation deployment at Main Line Health in Philadelphia is helping to control how its roughly 60,000 devices communicate across the network in order to protect clinical operations and limit the impact of potential cyberattacks, said Main Line Health CISO Aaron Weismann.</description>
			</item>
			<item>
			<title>Musk v. Altman: A Warning for Enterprise AI</title>
			<link>https://www.devicesecurity.io/blogs/musk-v-altman-warning-for-enterprise-ai-p-4120</link>
			<guid>https://www.devicesecurity.io/blogs/musk-v-altman-warning-for-enterprise-ai-p-4120</guid>
			<description>&lt;b&gt;3-Week Court Battle Exposes Dark Side of AI Vendors and Their Promises&lt;/b&gt;&lt;br /&gt;The Musk v. Altman trial produced something more unsettling than a verdict. It revealed an AI industry built on promises that turned out to be negotiable, governed by people whose colleagues called them liars under oath. Enterprise buyers should be paying attention.</description>
			</item>
			<item>
			<title>Upscale vs. Upskill: The Real Cybersecurity Gap</title>
			<link>https://www.devicesecurity.io/blogs/upscale-vs-upskill-real-cybersecurity-gap-p-4119</link>
			<guid>https://www.devicesecurity.io/blogs/upscale-vs-upskill-real-cybersecurity-gap-p-4119</guid>
			<description>&lt;b&gt;AI Adoption Is Accelerating, but Workforce Capability Isn't Keeping Pace&lt;/b&gt;&lt;br /&gt;Technology will continue to evolve. AI will embed itself across enterprise environments and attack surfaces will expand regardless of organizational readiness. The real challenge lies on the upskilling side, where the gap is widening - often without immediate visibility.</description>
			</item>
			<item>
			<title>Instructure Pays ShinyHunters Ransom to Little Likely Return</title>
			<link>https://www.devicesecurity.io/blogs/instructure-pays-shinyhunters-ransom-to-little-likely-return-p-4118</link>
			<guid>https://www.devicesecurity.io/blogs/instructure-pays-shinyhunters-ransom-to-little-likely-return-p-4118</guid>
			<description>&lt;b&gt;Hackers Constantly Break 'Confirmation of Data Destruction' Promises&lt;/b&gt;&lt;br /&gt;When a business that stores children's personal data gets hit by data-leaking extortionists, what should it do? For Instructure, which develops online learning platform Canvas, the answer was to pay a ransom, and tell victims, straight-faced, to have &quot;digital confirmation of data destruction.&quot;</description>
			</item>
			<item>
			<title>Cybercrime's Human Trafficking Problem</title>
			<link>https://www.devicesecurity.io/blogs/cybercrimes-human-trafficking-problem-p-4115</link>
			<guid>https://www.devicesecurity.io/blogs/cybercrimes-human-trafficking-problem-p-4115</guid>
			<description>&lt;b&gt;Coerced Labor in Scam Compounds Is Reshaping How Enterprises Face Fraud Risks&lt;/b&gt;&lt;br /&gt;Fraud operations in Southeast Asia increasingly rely on trafficked workers forced into scams. This reality challenges assumptions about threat actor behavior, complicates attribution and negotiation, and demands that enterprises rethink fraud prevention and disruption strategies.</description>
			</item></channel></rss>