<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security | TechRepublic</title>
	<atom:link href="https://www.techrepublic.com/rssfeeds/topic/security/?mode=rss" rel="self" type="application/rss+xml" />
	<link>https://www.techrepublic.com/topic/security/</link>
	<description>News, Tips, and Advice for Technology Professionals</description>
	<lastBuildDate>Tue, 22 Apr 2025 07:32:46 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>Bitwarden vs LastPass 2025: Which Password Manager Is Better?</title>
		<link>https://www.techrepublic.com/article/bitwarden-vs-lastpass/</link>
		
		<dc:creator><![CDATA[TechRepublic Staff]]></dc:creator>
		<pubDate>Mon, 21 Apr 2025 12:00:14 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Bitwarden]]></category>
		<category><![CDATA[lastpass]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[password management]]></category>
		<category><![CDATA[password manager]]></category>
		<category><![CDATA[password security]]></category>
		<guid isPermaLink="false">https://www.techrepublic.com/?p=3977001</guid>

					<description><![CDATA[In this comparison between Bitwarden and LastPass, we explore their features, security, ease of use and pricing. Find out which password manager is best for you.]]></description>
		
		
		
			</item>
		<item>
		<title>&#8216;No AI Agents are Allowed.&#8217; EU Bans Use of AI Assistants in Virtual Meetings</title>
		<link>https://www.techrepublic.com/article/news-eu-bans-ai-assistants-virtual-meetings/</link>
		
		<dc:creator><![CDATA[Fiona Jackson]]></dc:creator>
		<pubDate>Thu, 17 Apr 2025 17:30:37 +0000</pubDate>
				<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[EU]]></category>
		<category><![CDATA[International]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[ai]]></category>
		<category><![CDATA[ai security]]></category>
		<category><![CDATA[anthropic]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[emea]]></category>
		<category><![CDATA[eu]]></category>
		<category><![CDATA[europe]]></category>
		<category><![CDATA[openai]]></category>
		<category><![CDATA[video conferencing]]></category>
		<category><![CDATA[virtual assistants]]></category>
		<category><![CDATA[virtual meetings]]></category>
		<guid isPermaLink="false">https://www.techrepublic.com/?p=4302294</guid>

					<description><![CDATA[In a presentation delivered this month by the European Commission, a meeting etiquette slide stated “No AI Agents are allowed.”]]></description>
		
		
		
			</item>
		<item>
		<title>Apple Patches Two Zero-Days Used in &#8216;Extremely Sophisticated&#8217; Attacks</title>
		<link>https://www.techrepublic.com/article/news-apple-patches-zero-days-ios-macos/</link>
		
		<dc:creator><![CDATA[Aminu Abdullahi]]></dc:creator>
		<pubDate>Thu, 17 Apr 2025 15:54:09 +0000</pubDate>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[Mobility]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[apple iphone]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[ios]]></category>
		<category><![CDATA[mobile security]]></category>
		<category><![CDATA[threats and vulnerabilities]]></category>
		<category><![CDATA[zero-day threats]]></category>
		<guid isPermaLink="false">https://www.techrepublic.com/?p=4302210</guid>

					<description><![CDATA[Find out the specifics of these iOS and macOS vulnerabilities, as well as which Apple devices were impacted.]]></description>
		
		
		
			</item>
		<item>
		<title>Network Security at the Edge for AI-ready Enterprise</title>
		<link>https://www.techrepublic.com/article/network-security-at-the-edge-for-ai-ready-enterprise/</link>
		
		<dc:creator><![CDATA[StudioA by TechnologyAdvice]]></dc:creator>
		<pubDate>Thu, 17 Apr 2025 13:00:01 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.techrepublic.com/?p=4301966</guid>

					<description><![CDATA[The widespread use of AI, particularly generative AI, in modern businesses creates new network security risks for complex enterprise workloads across various locations.]]></description>
		
		
		
			</item>
		<item>
		<title>Developers Beware: Slopsquatting &#038; Vibe Coding Can Increase Risk of AI-Powered Attacks</title>
		<link>https://www.techrepublic.com/article/news-slopsquatting-vide-coding-ai-cybersecurity-risk/</link>
		
		<dc:creator><![CDATA[Aminu Abdullahi]]></dc:creator>
		<pubDate>Wed, 16 Apr 2025 19:09:46 +0000</pubDate>
				<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[Developer]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[ai]]></category>
		<category><![CDATA[ai cybersecurity]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[developers]]></category>
		<category><![CDATA[supply chain attacks]]></category>
		<category><![CDATA[vibe coding]]></category>
		<guid isPermaLink="false">https://www.techrepublic.com/?p=4302149</guid>

					<description><![CDATA[Slopsquatting and vibe coding are fueling a new wave of AI-driven cyberattacks, exposing developers to hidden risks through fake, hallucinated packages.]]></description>
		
		
		
			</item>
		<item>
		<title>LastPass Review: Is it Still Safe and Reliable in 2025?</title>
		<link>https://www.techrepublic.com/article/lastpass-review/</link>
		
		<dc:creator><![CDATA[TechRepublic Staff]]></dc:creator>
		<pubDate>Wed, 16 Apr 2025 12:00:46 +0000</pubDate>
				<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[password managers]]></category>
		<guid isPermaLink="false">https://www.techrepublic.com/?p=4199754</guid>

					<description><![CDATA[LastPass’ recent data breaches make it hard to recommend as a viable password manager in 2025. Learn more in our full review below.]]></description>
		
		
		
			</item>
		<item>
		<title>Gartner’s 12 Emerging Tech Disruptors &#038; Why &#8216;Technology Leaders Must Take Action Now&#8217;</title>
		<link>https://www.techrepublic.com/article/news-gartner-early-stage-technologies/</link>
		
		<dc:creator><![CDATA[Esther Shein]]></dc:creator>
		<pubDate>Tue, 15 Apr 2025 20:49:31 +0000</pubDate>
				<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[Big Data]]></category>
		<category><![CDATA[CXO]]></category>
		<category><![CDATA[Innovation]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[disinformation security]]></category>
		<category><![CDATA[domain-specific language models]]></category>
		<category><![CDATA[earth intelligence]]></category>
		<category><![CDATA[emerging technologies]]></category>
		<category><![CDATA[gartner]]></category>
		<category><![CDATA[genai]]></category>
		<category><![CDATA[market disruptors]]></category>
		<category><![CDATA[polyfunctional robots]]></category>
		<guid isPermaLink="false">https://www.techrepublic.com/?p=4302027</guid>

					<description><![CDATA[A Gartner distinguished VP analyst offers TechRepublic readers advice about which early-stage technologies that will define the future of business systems to prioritize.]]></description>
		
		
		
			</item>
		<item>
		<title>UK’s Cyber Crime Down in 2024: Better &#8216;Cyber Hygiene Among Small Businesses</title>
		<link>https://www.techrepublic.com/article/news-cyber-attacks-uk-businesses/</link>
		
		<dc:creator><![CDATA[Fiona Jackson]]></dc:creator>
		<pubDate>Tue, 15 Apr 2025 16:41:49 +0000</pubDate>
				<category><![CDATA[International]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[United Kingdom]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[data breaches]]></category>
		<category><![CDATA[government]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[small businesses]]></category>
		<category><![CDATA[uk]]></category>
		<guid isPermaLink="false">https://www.techrepublic.com/?p=4302008</guid>

					<description><![CDATA[A UK government survey of 2024 data shows phishing remains the top cyber threat, ransomware cases doubled, and fewer boards include cyber experts despite steady attack rates.]]></description>
		
		
		
			</item>
		<item>
		<title>How to Use LastPass Password Manager</title>
		<link>https://www.techrepublic.com/article/how-to-use-lastpass/</link>
		
		<dc:creator><![CDATA[TechRepublic Staff]]></dc:creator>
		<pubDate>Mon, 14 Apr 2025 13:00:17 +0000</pubDate>
				<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[lastpass]]></category>
		<category><![CDATA[password manager]]></category>
		<guid isPermaLink="false">https://www.techrepublic.com/?p=4199705</guid>

					<description><![CDATA[Learn how to set up and use LastPass password manager. Start managing and storing your passwords with this step-by-step guide.]]></description>
		
		
		
			</item>
		<item>
		<title>Can VPNs Be Tracked by the Police?</title>
		<link>https://www.techrepublic.com/article/can-vpns-be-tracked-by-police/</link>
		
		<dc:creator><![CDATA[Drew Robb]]></dc:creator>
		<pubDate>Thu, 10 Apr 2025 12:00:52 +0000</pubDate>
				<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[VPN]]></category>
		<guid isPermaLink="false">https://www.techrepublic.com/?p=4233124</guid>

					<description><![CDATA[VPNs are popular due to the fact they add security and privacy to what are otherwise fairly open Wi-Fi and public internet channels. But can VPNs be tracked by the police?]]></description>
		
		
		
			</item>
		<item>
		<title>Patch Tuesday: Microsoft Fixes 134 Vulnerabilities, Including 1 Zero-Day</title>
		<link>https://www.techrepublic.com/article/news-microsoft-patch-tuesday-april-2025/</link>
		
		<dc:creator><![CDATA[Megan Crouse]]></dc:creator>
		<pubDate>Wed, 09 Apr 2025 21:24:58 +0000</pubDate>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[International]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[clfs]]></category>
		<category><![CDATA[fortra]]></category>
		<category><![CDATA[ldap]]></category>
		<category><![CDATA[Microsoft Office]]></category>
		<category><![CDATA[remote code execution]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[tenable]]></category>
		<guid isPermaLink="false">https://www.techrepublic.com/?p=4301543</guid>

					<description><![CDATA[One CVE was used against “a small number of targets.” Windows 10 users needed to wait a little bit for their patches. ]]></description>
		
		
		
			</item>
		<item>
		<title>Microsoft: Windows CLFS Vulnerability Could Lead to ‘Widespread Deployment and Detonation of Ransomware&#8217;</title>
		<link>https://www.techrepublic.com/article/news-microsoft-windows-common-log-file-system-vulnerability/</link>
		
		<dc:creator><![CDATA[Fiona Jackson]]></dc:creator>
		<pubDate>Wed, 09 Apr 2025 18:40:46 +0000</pubDate>
				<category><![CDATA[International]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[ransomexx]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[security updates]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<category><![CDATA[windows]]></category>
		<guid isPermaLink="false">https://www.techrepublic.com/?p=4301530</guid>

					<description><![CDATA[Microsoft warns CVE-2025-29824 lets attackers with user access escalate privileges to deploy ransomware via a flaw in Windows CLFS. ]]></description>
		
		
		
			</item>
		<item>
		<title>5 Reasons Why You Should Use a Password Manager</title>
		<link>https://www.techrepublic.com/article/5-reasons-why-you-should-use-a-password-manager/</link>
		
		<dc:creator><![CDATA[Jack Wallen]]></dc:creator>
		<pubDate>Wed, 09 Apr 2025 13:00:00 +0000</pubDate>
				<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[password managers]]></category>
		<guid isPermaLink="false"></guid>

					<description><![CDATA[Find out why you should consider using a password manager to protect your data and improve password management.]]></description>
		
		
		
			</item>
		<item>
		<title>Master IT Fundamentals with This CompTIA Certification Prep Bundle</title>
		<link>https://www.techrepublic.com/article/the-all-in-one-comptia-certifications-prep-courses-bundle/</link>
		
		<dc:creator><![CDATA[TechRepublic Academy]]></dc:creator>
		<pubDate>Wed, 09 Apr 2025 07:00:09 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[TR Academy]]></category>
		<category><![CDATA[comptia certification prep course]]></category>
		<guid isPermaLink="false">https://www.techrepublic.com/?p=4261655</guid>

					<description><![CDATA[Prepare for a successful IT career with lifetime access to expert-led courses covering CompTIA A+, Network+, Security+, and Cloud+ certification prep.]]></description>
		
		
		
			</item>
		<item>
		<title>UK’s Request to Keep Apple Privacy Case Secret Rejected</title>
		<link>https://www.techrepublic.com/article/news-apple-icloud-encryption-uk-us-privacy/</link>
		
		<dc:creator><![CDATA[Fiona Jackson]]></dc:creator>
		<pubDate>Tue, 08 Apr 2025 19:00:46 +0000</pubDate>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[Big Data]]></category>
		<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[International]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[United Kingdom]]></category>
		<category><![CDATA[advanced data protection]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[government]]></category>
		<category><![CDATA[icloud]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[tribunal]]></category>
		<category><![CDATA[trump]]></category>
		<category><![CDATA[uk]]></category>
		<category><![CDATA[united kingdom]]></category>
		<category><![CDATA[us]]></category>
		<category><![CDATA[usa]]></category>
		<guid isPermaLink="false">https://www.techrepublic.com/?p=4297524</guid>

					<description><![CDATA[The U.K.’s Home Secretary claimed that publishing details about the appeal would be prejudicial to national security, but judges disagreed.]]></description>
		
		
		
			</item>
		<item>
		<title>How to Use a VPN: 4 Easy Steps to Get Started</title>
		<link>https://www.techrepublic.com/article/how-to-use-vpn/</link>
		
		<dc:creator><![CDATA[TechRepublic Staff]]></dc:creator>
		<pubDate>Tue, 08 Apr 2025 12:00:38 +0000</pubDate>
				<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[VPN]]></category>
		<guid isPermaLink="false">https://www.techrepublic.com/?p=4191050</guid>

					<description><![CDATA[Learn how to set up and use a VPN with just four easy steps. This step-by-step guide takes you through how you can secure your connection and online data.]]></description>
		
		
		
			</item>
		<item>
		<title>Google’s Sec-Gemini v1 Takes on Hackers &#038; Outperforms Rivals by 11%</title>
		<link>https://www.techrepublic.com/article/news-google-sec-gemini-v1/</link>
		
		<dc:creator><![CDATA[Aminu Abdullahi]]></dc:creator>
		<pubDate>Mon, 07 Apr 2025 20:23:55 +0000</pubDate>
				<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[ai]]></category>
		<category><![CDATA[ai model]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[gemini]]></category>
		<category><![CDATA[google sec-gemini v1]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[security ai]]></category>
		<guid isPermaLink="false">https://www.techrepublic.com/?p=4301393</guid>

					<description><![CDATA[Sec-Gemini v1 has access to real-time cybersecurity data from trusted sources including Google Threat Intelligence, Mandiant’s attack reports, and the Open Source Vulnerabilities database.]]></description>
		
		
		
			</item>
		<item>
		<title>DDoS Attacks Now Key Weapons in Geopolitical Conflicts, NETSCOUT Warns</title>
		<link>https://www.techrepublic.com/article/news-ddos-cyberattacks-political-conflicts-netscout/</link>
		
		<dc:creator><![CDATA[Aminu Abdullahi]]></dc:creator>
		<pubDate>Fri, 04 Apr 2025 16:04:26 +0000</pubDate>
				<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[International]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.techrepublic.com/?p=4301120</guid>

					<description><![CDATA[Hackers now use AI and botnets to launch powerful DDoS attacks, bypassing security and overwhelming servers as law enforcement struggles to keep up.]]></description>
		
		
		
			</item>
		<item>
		<title>Benchmarks Find ‘DeepSeek-V3-0324 Is More Vulnerable Than Qwen2.5-Max’</title>
		<link>https://www.techrepublic.com/article/news-qwen-2-5-deepseek-3-ai-model-security/</link>
		
		<dc:creator><![CDATA[J.R. Johnivan]]></dc:creator>
		<pubDate>Fri, 04 Apr 2025 08:37:09 +0000</pubDate>
				<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[ai]]></category>
		<category><![CDATA[ai models]]></category>
		<category><![CDATA[ai security]]></category>
		<category><![CDATA[alibaba]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[deepseek]]></category>
		<category><![CDATA[deepseek-v3]]></category>
		<category><![CDATA[qwen2.5-max]]></category>
		<category><![CDATA[threats and vulnerabilities]]></category>
		<guid isPermaLink="false">https://www.techrepublic.com/?p=4300992</guid>

					<description><![CDATA[While the latest iteration of Qwen2.5-Max outperforms DeepSeek-V3 on security, the AI model lags behind its competition in several other areas.]]></description>
		
		
		
			</item>
		<item>
		<title>Windows 11 Forces Microsoft Account Sign In &#038; Removes Bypass Trick Option</title>
		<link>https://www.techrepublic.com/article/news-windows-11-setup-microsoft/</link>
		
		<dc:creator><![CDATA[Aminu Abdullahi]]></dc:creator>
		<pubDate>Fri, 04 Apr 2025 08:26:23 +0000</pubDate>
				<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[microsoft windows]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Windows 11]]></category>
		<guid isPermaLink="false">https://www.techrepublic.com/?p=4300976</guid>

					<description><![CDATA[Microsoft is killing the Windows 11 bypass trick — soon, all setups will require internet and a Microsoft Account, leaving privacy-conscious users with fewer options.]]></description>
		
		
		
			</item>
	</channel>
</rss>
