<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
 <id>https://www.scworld.com/topic/latest</id>
 <title>SCM feed for Latest</title>
 <updated>2025-07-07T11:05:51+00:00</updated>
 <link href="https://www.scworld.com/topic/latest" rel="alternate" type="text/html"/>
 <link href="/feed/topic/latest" rel="self" type="application/atom+xml"/>
 <link href="https://pubsubhubbub.appspot.com/" rel="hub"/>
 <category term="latest" label="Latest"/>
 <logo>https://files.cyberriskalliance.com/logo/scm-horizontal-white-with-resource.png</logo>
 <rights type="html">Copyright &amp;copy; 2025 CyberRisk Alliance, LLC All Rights Reserved</rights>
 <entry>
  <id isPermaLink="false">tag:www.scworld.com:post,827079</id>
  <title>The case for replacing the secure email gateway</title>
  <updated>2025-07-03T11:08:51-04:00</updated>
  <author>
   <name>Mick Leach</name>
   <uri>https://www.scworld.com/contributor/mick-leach</uri>
  </author>
  <summary type="html">&lt;p&gt;Here are five features to look for in a modern AI-based email security tool. &lt;/p&gt;
</summary>
  <link rel="alternate" href="https://www.scworld.com/perspective/the-case-for-replacing-the-secure-email-gateway" type="text/html"/>
  <category term="email-security" label="Email Security"/>
  <category term="ai-benefitsrisks" label="AI Benefits/risks"/>
  <published>2025-07-07T07:00:00-04:00</published>
  <media:content url="https://files.cyberriskalliance.com/wp-content/uploads/2024/03/032824_phishing_email.jpg" type="image/jpeg" medium="image" height="800" width="1200"/>
 </entry>
 <entry>
  <id isPermaLink="false">tag:www.scworld.com:post,816969</id>
  <title>North Korea, ransomware, social engineering, AI, Apple, Drugs &amp; Iran   - SWN #491</title>
  <updated>2025-07-03T15:37:10-04:00</updated>
  <author>
   <name>Aaran Leyland</name>
   <uri>https://www.scworld.com/contributor/aaran-leyland</uri>
  </author>
  <summary type="html"></summary>
  <link rel="alternate" href="https://www.scworld.com/podcast-segment/14052-north-korea-ransomware-social-engineering-ai-apple-drugs-iran-swn-491" type="text/html"/>
  <category term="ransomware" label="Ransomware"/>
  <published>2025-07-04T17:00:00-04:00</published>
  <media:content url="https://files.cyberriskalliance.com/wp-content/uploads/2025/07/SWN_491_Thumbnail_SWN_1920x1080_b72418c7-6373-4c29-bef3-c5960147e859.jpg" type="image/jpeg" medium="image" height="1080" width="1920"/>
 </entry>
 <entry>
  <id isPermaLink="false">tag:www.scworld.com:post,827197</id>
  <title>America’s blind spot: As drone production surges globally, U.S. counter-drone policy lags far behind</title>
  <updated>2025-07-04T11:50:26-04:00</updated>
  <author>
   <name>Brett Freedman </name>
   <uri>https://www.scworld.com/contributor/brett-freedman</uri>
  </author>
  <summary type="html">&lt;p&gt;When Americans look to the skies on July 4th, we expect celebration—fireworks, light shows, and the kind of awe that reflects our national spirit. But in today’s world, those skies carry new meanings.&lt;/p&gt;
</summary>
  <link rel="alternate" href="https://www.scworld.com/perspective/americas-blind-spot-as-drone-production-surges-globally-us-counter-drone-policy-lags-far-behind" type="text/html"/>
  <category term="critical-infrastructure-security" label="Critical Infrastructure Security"/>
  <published>2025-07-04T11:50:23-04:00</published>
  <media:content url="https://files.cyberriskalliance.com/wp-content/uploads/2024/04/040524_drone.jpg" type="image/jpeg" medium="image" height="806" width="1210"/>
 </entry>
 <entry>
  <id isPermaLink="false">tag:www.scworld.com:post,817044</id>
  <title>Exploring Meshtastic and LoRa Mesh Networks - Rob Allen - PSW #881</title>
  <updated>2025-07-03T12:19:03-04:00</updated>
  <author>
   <name>Paul Asadoorian</name>
   <uri>https://www.scworld.com/contributor/paul-asadoorian</uri>
  </author>
  <author>
   <name>Jeff Man</name>
   <uri>https://www.scworld.com/contributor/jeff-man</uri>
  </author>
  <author>
   <name>Larry Pesce</name>
   <uri>https://www.scworld.com/contributor/larry-pesce</uri>
  </author>
  <summary type="html"></summary>
  <link rel="alternate" href="https://www.scworld.com/podcast-segment/14126-exploring-meshtastic-and-lora-mesh-networks-rob-allen-psw-881" type="text/html"/>
  <category term="privacy" label="Privacy"/>
  <category term="wireless-security" label="Wireless Security"/>
  <category term="hardware" label="Hardware"/>
  <published>2025-07-03T17:00:00-04:00</published>
  <media:content url="https://files.cyberriskalliance.com/wp-content/uploads/2025/07/PSW_881_Thumbnail_PSW_1920x1080_38f4cb5d-2462-4322-ad14-7699e49b753c.jpg" type="image/jpeg" medium="image" height="1080" width="1920"/>
 </entry>
 <entry>
  <id isPermaLink="false">tag:www.scworld.com:post,827185</id>
  <title>AT&amp;T rolls out protections to block SIM-swapping attacks</title>
  <updated>2025-07-03T16:39:41-04:00</updated>
  <author>
   <name>Shaun Nichols</name>
   <uri>https://www.scworld.com/contributor/shaun-nichols</uri>
  </author>
  <summary type="html">&lt;p&gt;&quot;Wireless Account Lock&quot; allows customers to prevent the registration of new devices. &lt;/p&gt;
</summary>
  <link rel="alternate" href="https://www.scworld.com/news/att-rolls-out-protections-to-block-sim-swapping-attacks" type="text/html"/>
  <category term="identity" label="Identity"/>
  <category term="wireless-security" label="Wireless Security"/>
  <category term="vulnerability-management" label="Vulnerability Management"/>
  <category term="endpointdevice-security" label="Endpoint/Device Security"/>
  <published>2025-07-03T16:38:42-04:00</published>
  <media:content url="https://files.cyberriskalliance.com/wp-content/uploads/2024/07/071224_att_logo.jpg" type="image/jpeg" medium="image" height="720" width="1080"/>
 </entry>
 <entry>
  <id isPermaLink="false">tag:www.scworld.com:post,827153</id>
  <title>CatWatchful stalkerware breach reveals 62K users, 26K victims</title>
  <updated>2025-07-03T15:18:57-04:00</updated>
  <author>
   <name>Laura French</name>
   <uri>https://www.scworld.com/contributor/laura-french</uri>
  </author>
  <summary type="html">&lt;p&gt;An SQL injection exploit exposed the users and owner of CatWatchful stalkerware. &lt;/p&gt;
</summary>
  <link rel="alternate" href="https://www.scworld.com/news/catwatchful-stalkerware-breach-reveals-62k-users-26k-victims" type="text/html"/>
  <category term="application-security" label="Application Security"/>
  <category term="data-security" label="Data Security"/>
  <category term="breach" label="Breach"/>
  <category term="privacy" label="Privacy"/>
  <published>2025-07-03T15:18:48-04:00</published>
  <media:content url="https://files.cyberriskalliance.com/wp-content/uploads/2025/07/AdobeStock_1039675680.jpg" type="image/jpeg" medium="image" height="533" width="800"/>
 </entry>
 <entry>
  <id isPermaLink="false">tag:www.scworld.com:post,827047</id>
  <title>When AI goes off-script: Understanding the rise of prompt injection attacks</title>
  <updated>2025-07-03T14:17:28-04:00</updated>
  <author>
   <name>Tom Spring</name>
   <uri>https://www.scworld.com/contributor/tom-spring</uri>
  </author>
  <author>
   <name>OWASP GenAI Security Project Team</name>
   <uri>https://www.scworld.com/contributor/owasp-genai-security-project-team</uri>
  </author>
  <summary type="html">&lt;p&gt;Attackers aren’t breaching firewalls — they’re slipping instructions into prompts. Here’s why OWASP named prompt injection the top GenAI risk, and what it means for security teams. &lt;/p&gt;
</summary>
  <link rel="alternate" href="https://www.scworld.com/feature/when-ai-goes-off-script-understanding-the-rise-of-prompt-injection-attacks" type="text/html"/>
  <category term="application-security" label="Application Security"/>
  <category term="aiml" label="AI/ML"/>
  <category term="generative-ai" label="Generative AI"/>
  <published>2025-07-03T14:12:59-04:00</published>
  <media:content url="https://files.cyberriskalliance.com/wp-content/uploads/2025/07/prompt-injection.jpeg" type="image/jpeg" medium="image" height="462" width="800"/>
 </entry>
 <entry>
  <id isPermaLink="false">tag:www.scworld.com:post,827138</id>
  <title>Cisco patches critical 10.0 bug in Unified CM systems</title>
  <updated>2025-07-03T13:32:35-04:00</updated>
  <author>
   <name>Steve Zurier</name>
   <uri>https://www.scworld.com/contributor/steve-zurier</uri>
  </author>
  <summary type="html">&lt;p&gt;A successful exploit could let an attacker log-in as the root user. &lt;/p&gt;
</summary>
  <link rel="alternate" href="https://www.scworld.com/news/cisco-patches-critical-10-0-bug-in-unified-cm-systems" type="text/html"/>
  <category term="vulnerability-management" label="Vulnerability Management"/>
  <category term="patchconfiguration-management" label="Patch/Configuration Management"/>
  <category term="network-security" label="Network Security"/>
  <published>2025-07-03T13:32:20-04:00</published>
  <media:content url="https://files.cyberriskalliance.com/wp-content/uploads/2024/10/102124_cisco.jpg" type="image/jpeg" medium="image" height="800" width="1200"/>
 </entry>
 <entry>
  <id isPermaLink="false">tag:www.scworld.com:post,827078</id>
  <title>Defending the prompt: How to secure AI against injection attacks</title>
  <updated>2025-07-03T13:10:59-04:00</updated>
  <author>
   <name>Tom Spring</name>
   <uri>https://www.scworld.com/contributor/tom-spring</uri>
  </author>
  <author>
   <name>OWASP GenAI Security Project Team</name>
   <uri>https://www.scworld.com/contributor/owasp-genai-security-project-team</uri>
  </author>
  <summary type="html">&lt;p&gt;You can’t patch prompt injection, but you can outsmart it. OWASP’s latest guidance lays out a layered defense strategy for building safer, more resilient GenAI applications. &lt;/p&gt;
</summary>
  <link rel="alternate" href="https://www.scworld.com/feature/defending-the-prompt-how-to-secure-ai-against-injection-attacks" type="text/html"/>
  <category term="application-security" label="Application Security"/>
  <category term="aiml" label="AI/ML"/>
  <category term="generative-ai" label="Generative AI"/>
  <published>2025-07-03T13:10:46-04:00</published>
  <media:content url="https://files.cyberriskalliance.com/wp-content/uploads/2025/07/AI-fix-2.jpg" type="image/jpeg" medium="image" height="533" width="800"/>
 </entry>
 <entry>
  <id isPermaLink="false">tag:www.scworld.com:post,827022</id>
  <title>Former ransomware negotiator under US probe</title>
  <updated>2025-07-03T08:30:11-04:00</updated>
  <author>
   <name>SC Staff</name>
   <uri>https://www.scworld.com/contributor/sc-staff</uri>
  </author>
  <summary type="html">&lt;p&gt;Such investigation has been confirmed by DigitalMint, which promptly moved to terminate the employee following the accusations but has not provided details regarding the suspect's arrest. &lt;/p&gt;
</summary>
  <link rel="alternate" href="https://www.scworld.com/brief/former-ransomware-negotiator-under-us-probe" type="text/html"/>
  <category term="ransomware" label="Ransomware"/>
  <published>2025-07-03T08:30:09-04:00</published>
  <media:content url="https://files.cyberriskalliance.com/wp-content/uploads/2025/01/AdobeStock_214626853.jpg" type="image/jpeg" medium="image" height="450" width="800"/>
 </entry>
</feed>
