<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:media="http://search.yahoo.com/mrss/"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>GBHackers Security | #1 Globally Trusted Cyber Security News Platform</title>
	<atom:link href="https://gbhackers.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://gbhackers.com/</link>
	<description>GBhackers Offering Exclusive Cyber Security News Coverage, New Research papers &#38; Technology Updates.</description>
	<lastBuildDate>Fri, 14 Nov 2025 14:12:27 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>

<image>
	<url>https://gbhackers.com/wp-content/uploads/2024/09/cropped-gbh-32x32.png</url>
	<title>GBHackers Security | #1 Globally Trusted Cyber Security News Platform</title>
	<link>https://gbhackers.com/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">236592110</site>	<item>
		<title>Cisco Catalyst Center Vulnerability Allows Attackers to Escalate Privileges</title>
		<link>https://gbhackers.com/cisco-catalyst-center/</link>
					<comments>https://gbhackers.com/cisco-catalyst-center/#respond</comments>
		
		<dc:creator><![CDATA[Mayura Kathir]]></dc:creator>
		<pubDate>Fri, 14 Nov 2025 14:12:22 +0000</pubDate>
				<category><![CDATA[Cisco]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security News]]></category>
		<guid isPermaLink="false">https://gbhackers.com/?p=169142</guid>

					<description><![CDATA[<p>A critical security vulnerability has been identified in the Cisco Catalyst Center Virtual Appliance that could enable authenticated, remote attackers to escalate their privileges to Administrator on affected systems. This vulnerability CVE-2025-20341 caused by insufficient validation of user-supplied input, underscores the urgent need for patching among organizations that use the affected platform. The vulnerability resides [&#8230;]</p>
<p>The post <a href="https://gbhackers.com/cisco-catalyst-center/">Cisco Catalyst Center Vulnerability Allows Attackers to Escalate Privileges</a> appeared first on <a href="https://gbhackers.com">GBHackers Security | #1 Globally Trusted Cyber Security News Platform</a>.</p>
]]></description>
		
					<wfw:commentRss>https://gbhackers.com/cisco-catalyst-center/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url="https://i3.wp.com/blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrqghj0dOv6OG5grnVhK3k91tubYqcV1QRvUTaZNIjb-rtrOzhCI5t5Bw4ikoqS5FvDkmKpQuViUD18ijR5X_QdZu7u31Zn9NXQUd2KSvCUCh6dnhdJGbBAqbKJfpMGdpwJUaq8i1OD7rGs5_lvyzlOb0oa2DB3UOvz2qMud4ar_z6ait47d4V06EVeLgj/s16000/Cisco%20Catalyst%20Center%20Vulnerability.webp?ssl=1" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">169142</post-id>	</item>
		<item>
		<title>Multiple Cisco Unified CCX Vulnerabilities Enable Arbitrary Command Execution by Attackers</title>
		<link>https://gbhackers.com/cisco-unified-ccx/</link>
					<comments>https://gbhackers.com/cisco-unified-ccx/#respond</comments>
		
		<dc:creator><![CDATA[Mayura Kathir]]></dc:creator>
		<pubDate>Fri, 14 Nov 2025 13:36:02 +0000</pubDate>
				<category><![CDATA[Cisco]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<guid isPermaLink="false">https://gbhackers.com/?p=169136</guid>

					<description><![CDATA[<p>Cisco has disclosed critical security vulnerabilities affecting Cisco Unified Contact Center Express (Unified CCX) that could enable unauthenticated, remote attackers to execute arbitrary commands, escalate privileges to root, and bypass authentication mechanisms. The vulnerabilities reside in the Java Remote Method Invocation (RMI) process and CCX Editor application, presenting severe risks to enterprise contact center deployments. [&#8230;]</p>
<p>The post <a href="https://gbhackers.com/cisco-unified-ccx/">Multiple Cisco Unified CCX Vulnerabilities Enable Arbitrary Command Execution by Attackers</a> appeared first on <a href="https://gbhackers.com">GBHackers Security | #1 Globally Trusted Cyber Security News Platform</a>.</p>
]]></description>
		
					<wfw:commentRss>https://gbhackers.com/cisco-unified-ccx/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url="https://i0.wp.com/blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgD0Fo0vZE_4-OxmTai4AsKS6IHW00A_5cQdWN7KDZah7rI5Wws1v4s3EknwymU1dPwE47nT_KfnbccLZTXKs6RagODGFBsMy4v486ewXAjzyJZzK8TMnNkHhcAeT4Bsxgl-A6vDVe_ipV200aXcrHrA_DyiRCUbVkAYfAEItSa1mfzPZsudf9YpFEnCwbn/s16000/Cisco%20Unified%20CCX%20Vulnerabilities.webp?ssl=1" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">169136</post-id>	</item>
		<item>
		<title>RONINGLOADER Uses Signed Drivers to Disable Microsoft Defender and Bypass EDR</title>
		<link>https://gbhackers.com/roningloader/</link>
					<comments>https://gbhackers.com/roningloader/#respond</comments>
		
		<dc:creator><![CDATA[Mayura Kathir]]></dc:creator>
		<pubDate>Fri, 14 Nov 2025 13:18:12 +0000</pubDate>
				<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[Microsoft]]></category>
		<guid isPermaLink="false">https://gbhackers.com/?p=169124</guid>

					<description><![CDATA[<p>Elastic Security Labs has uncovered a sophisticated campaign deploying a newly identified loader, dubbed RONINGLOADER, that weaponizes legitimately signed kernel drivers to systematically disable Microsoft Defender and evade endpoint detection and response (EDR) tools. Attributed to the Dragon Breath APT group (APT-Q-27), this campaign demonstrates a significant evolution in attack sophistication, primarily targeting Chinese-speaking users [&#8230;]</p>
<p>The post <a href="https://gbhackers.com/roningloader/">RONINGLOADER Uses Signed Drivers to Disable Microsoft Defender and Bypass EDR</a> appeared first on <a href="https://gbhackers.com">GBHackers Security | #1 Globally Trusted Cyber Security News Platform</a>.</p>
]]></description>
		
					<wfw:commentRss>https://gbhackers.com/roningloader/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url="https://i3.wp.com/blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-le5_9Dwi9frwrkyawsUyY6zHMVbb-gY3nccsNfUwJkaEI2TprOZmc7WtisJpixGd3WoUGBin6Y-3bbXQ9BAhOPrSx5YaiKS-X8sDYkdRJk6FOAOGsStN2RaCKCA-mKOyqelRH0PFAVijVXto0qnpYMJLrooSbPzKxoRMF9gQXqv17PryrbmDo5Rpg-ct/s16000/Untitled%20design%20-%202025-11-14T184132.973.webp?ssl=1" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">169124</post-id>	</item>
		<item>
		<title>Hackers Exploit Rogue MCP Server to Inject Malicious Code into Cursor’s Built-In Browser</title>
		<link>https://gbhackers.com/hackers-exploit-rogue-mcp-server-to-inject-malicious-code/</link>
					<comments>https://gbhackers.com/hackers-exploit-rogue-mcp-server-to-inject-malicious-code/#respond</comments>
		
		<dc:creator><![CDATA[Divya]]></dc:creator>
		<pubDate>Fri, 14 Nov 2025 13:16:08 +0000</pubDate>
				<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[web server]]></category>
		<category><![CDATA[cyber security]]></category>
		<guid isPermaLink="false">https://gbhackers.com/?p=169121</guid>

					<description><![CDATA[<p>Security researchers have uncovered a critical vulnerability in Cursor, the AI-powered code editor, that allows attackers to inject malicious code through rogue Model Context Protocol (MCP) servers. Unlike VS Code, Cursor lacks integrity checks on its runtime components, making it vulnerable to tampering through MCP server registration. The attack works by registering a local MCP [&#8230;]</p>
<p>The post <a href="https://gbhackers.com/hackers-exploit-rogue-mcp-server-to-inject-malicious-code/">Hackers Exploit Rogue MCP Server to Inject Malicious Code into Cursor’s Built-In Browser</a> appeared first on <a href="https://gbhackers.com">GBHackers Security | #1 Globally Trusted Cyber Security News Platform</a>.</p>
]]></description>
		
					<wfw:commentRss>https://gbhackers.com/hackers-exploit-rogue-mcp-server-to-inject-malicious-code/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url="https://i0.wp.com/blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiekQoU0hyphenhyphen_5pJzM6SDupueEYpcrXMRhR3fdQBAzTvFjWBIH3lwP6UoSIoTjCrDPPsdqtWJjZO4CFTkmAV-n8bKxOsakoAlSn6lLBUsee_wxzHgnY2dmBqOROko3DOJKvBprJokJ1mGgUORfigtw56hdVZUInOTun2gie2beuTQI7P_196cKBi7AGHR-YBt/s1600/Hackers%20Exploit%20Rogue%20MCP%20Server%20to%20Inject%20Malicious%20Code%20into%20Cursor%E2%80%99s%20Built-In%20Browser%20%281%29%20%283%29.webp?ssl=1" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">169121</post-id>	</item>
		<item>
		<title>NVIDIA NeMo Flaw Enables Code Injection and Privilege Escalation Attacks</title>
		<link>https://gbhackers.com/nvidia-nemo-flaw/</link>
					<comments>https://gbhackers.com/nvidia-nemo-flaw/#respond</comments>
		
		<dc:creator><![CDATA[Divya]]></dc:creator>
		<pubDate>Fri, 14 Nov 2025 12:59:14 +0000</pubDate>
				<category><![CDATA[Cyber Security News]]></category>
		<guid isPermaLink="false">https://gbhackers.com/?p=169104</guid>

					<description><![CDATA[<p>NVIDIA has released critical security patches addressing two high-severity vulnerabilities in its NeMo Framework that could allow attackers to execute arbitrary code and escalate privileges on affected systems. The vulnerabilities affect all versions of the framework before 2.5.0, and users should update to 2.5.0 immediately. CVE ID Description CVSS Score Severity CVE-2025-23361 Improper control of [&#8230;]</p>
<p>The post <a href="https://gbhackers.com/nvidia-nemo-flaw/">NVIDIA NeMo Flaw Enables Code Injection and Privilege Escalation Attacks</a> appeared first on <a href="https://gbhackers.com">GBHackers Security | #1 Globally Trusted Cyber Security News Platform</a>.</p>
]]></description>
		
					<wfw:commentRss>https://gbhackers.com/nvidia-nemo-flaw/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url="https://i2.wp.com/blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPrMEn411EcX7wmUn43ZXlrLzutcQ8JJrlMjFsktSq_nyvHcmoOlM2VWnWLkMB_koNMbF1DD897UD9-RoEB4dGsaoMEY2IdpuwwrKJLgslPvFIDrNXY1wADNro6goPOh1yddnbm5z9DWfEpV6CnCTmBfUIq_-GIzudPANEXQu682eWCBtXvd_AzUfpVwhT/s1600/NVIDIA%20NeMo%20Flaw%20Enables%20Code%20Injection%20and%20Privilege%20Escalation%20Attacks%20%281%29%20%281%29.webp?ssl=1" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">169104</post-id>	</item>
		<item>
		<title>Cybercriminals Use Fake Invoices to Deploy XWorm and Steal Login Credentials</title>
		<link>https://gbhackers.com/fake-invoices/</link>
					<comments>https://gbhackers.com/fake-invoices/#respond</comments>
		
		<dc:creator><![CDATA[Mayura Kathir]]></dc:creator>
		<pubDate>Fri, 14 Nov 2025 12:54:26 +0000</pubDate>
				<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security News]]></category>
		<guid isPermaLink="false">https://gbhackers.com/?p=169116</guid>

					<description><![CDATA[<p>Cybercriminals are deploying sophisticated phishing campaigns that weaponize seemingly legitimate invoice emails to distribute Backdoor.XWorm is a dangerous remote-access trojan (RAT) capable of stealing sensitive credentials, recording keystrokes, and installing ransomware. Security researchers have uncovered an active malware distribution operation using Visual Basic Script attachments disguised as routine business correspondence, representing a dangerous evolution of social [&#8230;]</p>
<p>The post <a href="https://gbhackers.com/fake-invoices/">Cybercriminals Use Fake Invoices to Deploy XWorm and Steal Login Credentials</a> appeared first on <a href="https://gbhackers.com">GBHackers Security | #1 Globally Trusted Cyber Security News Platform</a>.</p>
]]></description>
		
					<wfw:commentRss>https://gbhackers.com/fake-invoices/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url="https://i2.wp.com/blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdXbX_GP6bcVSY2JPVQcLGOUQf4sNJ4OSc1rmTcmfV_njn6BptbmT4Hhb56aBetZEWfcF-UFtGiTlKCU4KZMv0f1fD2uA1Z7ORU_UWN-6d3VS5k1VDDp5IGquAbYp_PF8oTzw5zaiN7TFgaqeTESsIk87YZlfa2NY_iOfFojeZG7MtDMvHawtdAhg409UG/s16000/Untitled%20design%20-%202025-11-14T182628.321.webp?ssl=1" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">169116</post-id>	</item>
		<item>
		<title>Advanced macOS DigitStealer Uses Multi-Stage Attack Chain to Evade Detection</title>
		<link>https://gbhackers.com/macos-digitstealer/</link>
					<comments>https://gbhackers.com/macos-digitstealer/#respond</comments>
		
		<dc:creator><![CDATA[Mayura Kathir]]></dc:creator>
		<pubDate>Fri, 14 Nov 2025 12:31:36 +0000</pubDate>
				<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[macOS]]></category>
		<guid isPermaLink="false">https://gbhackers.com/?p=169105</guid>

					<description><![CDATA[<p>Jamf Threat Labs has identified a new family of malicious stealers tracked as DigitStealer, representing a significant evolution in macOS-targeted malware. Unlike traditional infostealers that follow linear execution paths, DigitStealer introduced sophisticated multi-stage attack techniques, extensive anti-analysis checks, and novel persistence mechanisms, demonstrating the threat actors&#8217; deep understanding of macOS architecture. The DigitStealer campaign begins [&#8230;]</p>
<p>The post <a href="https://gbhackers.com/macos-digitstealer/">Advanced macOS DigitStealer Uses Multi-Stage Attack Chain to Evade Detection</a> appeared first on <a href="https://gbhackers.com">GBHackers Security | #1 Globally Trusted Cyber Security News Platform</a>.</p>
]]></description>
		
					<wfw:commentRss>https://gbhackers.com/macos-digitstealer/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url="https://i3.wp.com/blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMFfHp8cxENQuAr9rZp9zXO_6BMoqQzpqD_h3ij9jIFhBBp1y6LNwEJZaeU1ER-zDo6DCx5xpgYgFjpGBESakyRm4vWn-gNGTFg83qK1eY0wVFDvQiaK2AA4V_TALk2O0QWGu6MQB2EeixxuXP4haVSUNXLULTYvJlO71lyzYLzLV9_By5Qmzi3U4hHq68/s16000/Advanced%20macOS%20DigitStealer%20Uses%20Multi-Stage%20Attack%20Chain.webp?ssl=1" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">169105</post-id>	</item>
		<item>
		<title>Formbook Malware Campaign Uses Malicious ZIP Files and Layered Scripting Techniques</title>
		<link>https://gbhackers.com/formbook-malware-2/</link>
					<comments>https://gbhackers.com/formbook-malware-2/#respond</comments>
		
		<dc:creator><![CDATA[Mayura Kathir]]></dc:creator>
		<pubDate>Fri, 14 Nov 2025 12:07:35 +0000</pubDate>
				<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[Malware]]></category>
		<guid isPermaLink="false">https://gbhackers.com/?p=169101</guid>

					<description><![CDATA[<p>A new campaign leveraging Formbook malware has emerged, showcasing sophisticated multi-stage infection tactics that underscore the importance of analyzing more than just executable files during malware investigations. When teaching malware reverse-engineering in courses like SANS FOR610, it’s critical to addressed that reverse engineering applies to every component in the infection chain, not just PE or [&#8230;]</p>
<p>The post <a href="https://gbhackers.com/formbook-malware-2/">Formbook Malware Campaign Uses Malicious ZIP Files and Layered Scripting Techniques</a> appeared first on <a href="https://gbhackers.com">GBHackers Security | #1 Globally Trusted Cyber Security News Platform</a>.</p>
]]></description>
		
					<wfw:commentRss>https://gbhackers.com/formbook-malware-2/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url="https://i1.wp.com/blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLJsY1j-hGAcKgLZkbu6MEQHyGOa6ZlO0iRTNBDtl35WY_e6NfvScZTpFoYJR3CuVcK9Atv_Y2KfTBUMdkT5RKRVFxlehvcEzaXIh46hjq90PeEefZzNiyEYfY25xI431o2pfFbsRIBNTxJb9CslsyRMXZV5M3jBY1KrPb_1064vC1gY5jslChezUHOOqf/s16000/Untitled%20design%20-%202025-11-14T173551.337.webp?ssl=1" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">169101</post-id>	</item>
		<item>
		<title>Analysis of Multi-Stage Phishing Kits Leveraging Telegram for Credential Theft and Evasion Techniques</title>
		<link>https://gbhackers.com/phishing-kits/</link>
					<comments>https://gbhackers.com/phishing-kits/#respond</comments>
		
		<dc:creator><![CDATA[Mayura Kathir]]></dc:creator>
		<pubDate>Fri, 14 Nov 2025 11:28:17 +0000</pubDate>
				<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Telegram]]></category>
		<guid isPermaLink="false">https://gbhackers.com/?p=169094</guid>

					<description><![CDATA[<p>Researchers at Group-IB have uncovered a sophisticated phishing framework that demonstrates how cybercriminals are industrializing credential theft through automation, evasion techniques, and Telegram-based data exfiltration. The kit targets explicitly Aruba S.p.A., an Italian IT services provider serving over 5.4 million customers, highlighting the significant financial and operational risks posed by modern phishing-as-a-service operations. The analyzed [&#8230;]</p>
<p>The post <a href="https://gbhackers.com/phishing-kits/">Analysis of Multi-Stage Phishing Kits Leveraging Telegram for Credential Theft and Evasion Techniques</a> appeared first on <a href="https://gbhackers.com">GBHackers Security | #1 Globally Trusted Cyber Security News Platform</a>.</p>
]]></description>
		
					<wfw:commentRss>https://gbhackers.com/phishing-kits/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url="https://i1.wp.com/blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgn4tWcB1g7PfgoIoofGUefMk2RzwXnE-W2HWh9oZd3ipttJkgQLac31txJRNSXoSXtt5vEaMoQzVvjBmyGhYBu8B4cQHbtYdFzKUzl_SO8GUzLADMBUQKSnaLR0owyE4YWGWCXwBo8tocQOJpC6jQIrcmVADd09zvm1PUAFjTDtg8B0q7oxYTNSrjwlENW/s16000/Telegram-Based%20Multi-Stage%20Phishing%20Kit.webp?ssl=1" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">169094</post-id>	</item>
		<item>
		<title>Kraken Ransomware Targets Windows, Linux, and VMware ESXi in Enterprise Environments</title>
		<link>https://gbhackers.com/kraken-ransomware/</link>
					<comments>https://gbhackers.com/kraken-ransomware/#respond</comments>
		
		<dc:creator><![CDATA[Mayura Kathir]]></dc:creator>
		<pubDate>Fri, 14 Nov 2025 10:47:22 +0000</pubDate>
				<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">https://gbhackers.com/?p=169073</guid>

					<description><![CDATA[<p>Cisco Talos has identified an emerging threat from Kraken, a sophisticated cross-platform ransomware group that has emerged from the remnants of the HelloKitty ransomware cartel. In August 2025, the security firm observed the Russian-speaking group conducting big-game hunting and double-extortion attacks against enterprise environments worldwide. Kraken represents a significant evolution in ransomware threats due to [&#8230;]</p>
<p>The post <a href="https://gbhackers.com/kraken-ransomware/">Kraken Ransomware Targets Windows, Linux, and VMware ESXi in Enterprise Environments</a> appeared first on <a href="https://gbhackers.com">GBHackers Security | #1 Globally Trusted Cyber Security News Platform</a>.</p>
]]></description>
		
					<wfw:commentRss>https://gbhackers.com/kraken-ransomware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url="https://i0.wp.com/blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPA4F2rj0-XojYWqgwMvqeqW9ytN3XsiIU5yLPyeBQEG7TitOWR3iMcT5Dsssg85TQAeBzKByWn-deVtIKQAEecUwOpDbPPPuMKderW0jxDQo6nyo2-cCVMqv13zLyXIm8IC-JNFj_X9jWwE9aojE1iVN2jKwrFKuAfJDYHrrusrBrOFrD6jfkYPuVTX7A/s16000/Kraken%20Ransomware.webp?ssl=1" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">169073</post-id>	</item>
	</channel>
</rss>
