<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" version="2.0">

<channel>
	<title>Prodefence – Cyber security</title>
	<atom:link href="https://www.prodefence.org/feed/" rel="self" type="application/rss+xml"/>
	<link>https://www.prodefence.org</link>
	<description>Cyber security solutions</description>
	<lastBuildDate>Mon, 13 Jan 2020 18:05:28 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.4.2</generator>

<image>
	<url>https://www.prodefence.org/wp-content/uploads/2019/05/favicon.png</url>
	<title>Prodefence – Cyber security</title>
	<link>https://www.prodefence.org</link>
	<width>32</width>
	<height>32</height>
</image> 
	<itunes:explicit>no</itunes:explicit><itunes:subtitle>Cyber security solutions</itunes:subtitle><item>
		<title>Emotet Malware Restarts Spam Attacks After Holiday Break</title>
		<link>https://www.prodefence.org/emotet-malware-restarts-spam-attacks-after-holiday-break/</link>
		
		<dc:creator><![CDATA[Alex Anghelus]]></dc:creator>
		<pubDate>Tue, 14 Jan 2020 10:00:00 +0000</pubDate>
				<category><![CDATA[Home]]></category>
		<guid isPermaLink="false">https://www.prodefence.org/?p=86788</guid>

					<description><![CDATA[After almost a three-week holiday vacation, the Emotet&#160;trojan is back and targeting the over eighty countries with malicious spam campaigns.&#160;]]></description>
		
		
		
			</item>
		<item>
		<title>Android Trojan Steals Your Money to Fund International SMS Attacks</title>
		<link>https://www.prodefence.org/android-trojan-steals-your-money-to-fund-international-sms-attacks/</link>
		
		<dc:creator><![CDATA[Alex Anghelus]]></dc:creator>
		<pubDate>Mon, 13 Jan 2020 18:02:57 +0000</pubDate>
				<category><![CDATA[Home]]></category>
		<guid isPermaLink="false">https://www.prodefence.org/?p=86785</guid>

					<description><![CDATA[An Android banking Trojan dubbed Faketoken&#160;has recently been observed by security researchers while draining its victims&#8217; accounts&#160;to fuel offensive mass]]></description>
		
		
		
			</item>
		<item>
		<title>Ransomware Attackers Offer Holiday Discounts and Greetings</title>
		<link>https://www.prodefence.org/ransomware-attackers-offer-holiday-discounts-and-greetings/</link>
		
		<dc:creator><![CDATA[Alex Anghelus]]></dc:creator>
		<pubDate>Thu, 02 Jan 2020 18:56:00 +0000</pubDate>
				<category><![CDATA[Home]]></category>
		<guid isPermaLink="false">https://www.prodefence.org/?p=86780</guid>

					<description><![CDATA[To celebrate the holidays, ransomware operators are providing discounts or season&#8217;s&#160;greetings to entice victims into paying a ransom demand. As]]></description>
		
		
		
			</item>
		<item>
		<title>FIN7 Hackers’ BIOLOAD Malware Drops Fresher Carbanak Backdoor</title>
		<link>https://www.prodefence.org/fin7-hackers-bioload-malware-drops-fresher-carbanak-backdoor/</link>
		
		<dc:creator><![CDATA[Alex Anghelus]]></dc:creator>
		<pubDate>Fri, 27 Dec 2019 18:32:08 +0000</pubDate>
				<category><![CDATA[Home]]></category>
		<guid isPermaLink="false">https://www.prodefence.org/?p=86776</guid>

					<description><![CDATA[Malware researchers have uncovered a new tool used by the financially-motivated cybercriminal group known as FIN7 to load fresher builds]]></description>
		
		
		
			</item>
		<item>
		<title>Your Company’s Devices Organized and Secure</title>
		<link>https://www.prodefence.org/your-companys-devices-organized-and-secure/</link>
		
		<dc:creator><![CDATA[Alex Anghelus]]></dc:creator>
		<pubDate>Sat, 21 Dec 2019 17:04:12 +0000</pubDate>
				<category><![CDATA[Tools]]></category>
		<guid isPermaLink="false">https://www.prodefence.org/?p=86771</guid>

					<description><![CDATA[Keeping data organized and secure can be difficult &#8211; especially as your company begins to grow and incorporates more devices.]]></description>
		
		
		
			</item>
		<item>
		<title>Evil USB Cable Can Remotely Accept Commands From Hacker</title>
		<link>https://www.prodefence.org/evil-usb-cable-can-remotely-accept-commands-from-hacker/</link>
		
		<dc:creator><![CDATA[Alex Anghelus]]></dc:creator>
		<pubDate>Mon, 09 Dec 2019 07:10:24 +0000</pubDate>
				<category><![CDATA[Home]]></category>
		<guid isPermaLink="false">https://www.prodefence.org/?p=86768</guid>

					<description><![CDATA[Plugging a USB cable into your PC may seem like a harmless affair. But not if the cable has been]]></description>
		
		
		
			</item>
		<item>
		<title>The Needs and Solutions for the Growing E- Commerce Economy</title>
		<link>https://www.prodefence.org/the-needs-and-solutions-for-the-growing-e-commerce-economy/</link>
		
		<dc:creator><![CDATA[Alex Anghelus]]></dc:creator>
		<pubDate>Mon, 18 Nov 2019 13:47:40 +0000</pubDate>
				<category><![CDATA[Tools]]></category>
		<guid isPermaLink="false">https://www.prodefence.org/?p=86763</guid>

					<description><![CDATA[The Need for Financial Software The growth of technology has changed the face of commerce in today’s economy. Now from]]></description>
		
		
		
			</item>
		<item>
		<title>5 use cases of image recognition that we see in our daily lives</title>
		<link>https://www.prodefence.org/5-use-cases-of-image-recognition-that-we-see-in-our-daily-lives/</link>
		
		<dc:creator><![CDATA[Alex Anghelus]]></dc:creator>
		<pubDate>Mon, 18 Nov 2019 13:41:37 +0000</pubDate>
				<category><![CDATA[Home]]></category>
		<category><![CDATA[Tools]]></category>
		<guid isPermaLink="false">https://www.prodefence.org/?p=86757</guid>

					<description><![CDATA[In today’s constantly evolving environment, we all can witness a dramatic shift in technology at a rapid pace. It is]]></description>
		
		
		
			</item>
		<item>
		<title>How to Choose the Right Company for Your Embedded Software Project</title>
		<link>https://www.prodefence.org/how-to-choose-the-right-company-for-your-embedded-software-project/</link>
		
		<dc:creator><![CDATA[Alex Anghelus]]></dc:creator>
		<pubDate>Mon, 18 Nov 2019 13:36:03 +0000</pubDate>
				<category><![CDATA[Home]]></category>
		<category><![CDATA[Tools]]></category>
		<guid isPermaLink="false">https://www.prodefence.org/?p=86758</guid>

					<description><![CDATA[There are numerous reasons for you to opt for outsourcing embedded software development services such as the fact that they]]></description>
		
		
		
			</item>
		<item>
		<title>9 Ways to Improve Your Cybersecurity Incident Response Plan</title>
		<link>https://www.prodefence.org/9-ways-to-improve-your-cybersecurity-incident-response-plan/</link>
		
		<dc:creator><![CDATA[Anastasis Vasileiadis]]></dc:creator>
		<pubDate>Tue, 29 Oct 2019 19:19:35 +0000</pubDate>
				<category><![CDATA[Home]]></category>
		<guid isPermaLink="false">http://www.prodefence.org/?p=86741</guid>

					<description><![CDATA[Incident response plan (IRP) is a document called to “detect, respond to, and limit consequences of malicious cyber attacks”, according]]></description>
		
		
		
			</item>
	</channel>
</rss><!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Object Caching 69/171 objects using Disk
Page Caching using Disk: Enhanced 
Minified using Disk

Served from: www.prodefence.org @ 2023-12-17 20:21:20 by W3 Total Cache
-->