<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cyber &#8211; newsletterwp</title>
	<atom:link href="https://newsletter-wp.osservatori.net/tag/cyber/feed/" rel="self" type="application/rss+xml" />
	<link>https://newsletter-wp.osservatori.net</link>
	<description>Un nuovo sito targato WordPress</description>
	<lastBuildDate>Thu, 30 Apr 2026 18:05:38 +0000</lastBuildDate>
	<language>it-IT</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.3.8</generator>
	<item>
		<title>Accesso abusivo a Mythos, la super arma cyber AI</title>
		<link>https://newsletter-wp.osservatori.net/cybersecurity/accesso-abusivo-a-mythos-la-super-arma-cyber-ai/</link>
		
		<dc:creator><![CDATA[Maddalena Bruscagin]]></dc:creator>
		<pubDate>Thu, 30 Apr 2026 18:05:38 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Data Protection]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[mythos]]></category>
		<guid isPermaLink="false">https://newsletter-wp.osservatori.net/?p=68095</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>China-Linked Cyber Actors Turn to Massive Covert Botnets to Evade Detection</title>
		<link>https://newsletter-wp.osservatori.net/cybersecurity/china-linked-cyber-actors-turn-to-massive-covert-botnets-to-evade-detection/</link>
		
		<dc:creator><![CDATA[Maddalena Bruscagin]]></dc:creator>
		<pubDate>Thu, 30 Apr 2026 18:03:20 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Data Protection]]></category>
		<category><![CDATA[actors]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[bots]]></category>
		<category><![CDATA[china]]></category>
		<category><![CDATA[Cyber]]></category>
		<guid isPermaLink="false">https://newsletter-wp.osservatori.net/?p=68093</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>La Francia conferma il data breach contro l’ANTS. A rischio le identità di milioni di cittadini</title>
		<link>https://newsletter-wp.osservatori.net/cybersecurity/la-francia-conferma-il-data-breach-contro-lants-a-rischio-le-identita-di-milioni-di-cittadini/</link>
		
		<dc:creator><![CDATA[Maddalena Bruscagin]]></dc:creator>
		<pubDate>Thu, 30 Apr 2026 18:01:57 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Data Protection]]></category>
		<category><![CDATA[#databreaches]]></category>
		<category><![CDATA[breach]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[Data]]></category>
		<category><![CDATA[francia]]></category>
		<guid isPermaLink="false">https://newsletter-wp.osservatori.net/?p=68091</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cyber Resilience Act (CRA): come il bollino CE cambia il procurement software in azienda</title>
		<link>https://newsletter-wp.osservatori.net/cybersecurity/cyber-resilience-act-cra-come-il-bollino-ce-cambia-il-procurement-software-in-azienda/</link>
		
		<dc:creator><![CDATA[Maddalena Bruscagin]]></dc:creator>
		<pubDate>Thu, 30 Apr 2026 17:57:04 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Data Protection]]></category>
		<category><![CDATA[act]]></category>
		<category><![CDATA[cra]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[resilience]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://newsletter-wp.osservatori.net/?p=68086</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Critical GitHub Vulnerability Exposed Millions of Repositories</title>
		<link>https://newsletter-wp.osservatori.net/cybersecurity/critical-github-vulnerability-exposed-millions-of-repositories/</link>
		
		<dc:creator><![CDATA[Maddalena Bruscagin]]></dc:creator>
		<pubDate>Thu, 30 Apr 2026 17:55:22 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Data Protection]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[Data]]></category>
		<category><![CDATA[github]]></category>
		<category><![CDATA[leak]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://newsletter-wp.osservatori.net/?p=68084</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>AI Agent Deleted Production Database in 9 Secs; Then Confessed Every Rule It Broke</title>
		<link>https://newsletter-wp.osservatori.net/cybersecurity/ai-agent-deleted-production-database-in-9-secs-then-confessed-every-rule-it-broke/</link>
		
		<dc:creator><![CDATA[Maddalena Bruscagin]]></dc:creator>
		<pubDate>Thu, 30 Apr 2026 17:53:23 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Data Protection]]></category>
		<category><![CDATA[AI Agent]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[database]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://newsletter-wp.osservatori.net/?p=68082</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>L’AI cyber accelera: OpenAI prepara l’anti-Mythos</title>
		<link>https://newsletter-wp.osservatori.net/cybersecurity/lai-cyber-accelera-openai-prepara-lanti-mythos/</link>
		
		<dc:creator><![CDATA[Maddalena Bruscagin]]></dc:creator>
		<pubDate>Thu, 30 Apr 2026 17:48:54 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Data Protection]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[mythos]]></category>
		<category><![CDATA[OpenAI]]></category>
		<guid isPermaLink="false">https://newsletter-wp.osservatori.net/?p=68080</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Hidden Security Risks of Shadow AI in Enterprises</title>
		<link>https://newsletter-wp.osservatori.net/cybersecurity/the-hidden-security-risks-of-shadow-ai-in-enterprises/</link>
		
		<dc:creator><![CDATA[Maddalena Bruscagin]]></dc:creator>
		<pubDate>Fri, 17 Apr 2026 14:29:02 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Data Protection]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[Risk]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Shadow AI]]></category>
		<guid isPermaLink="false">https://newsletter-wp.osservatori.net/?p=67385</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Violazione dei dati su Booking.com: hacker trafugano informazioni sensibili dei clienti e scattano contromisure</title>
		<link>https://newsletter-wp.osservatori.net/cybersecurity/violazione-dei-dati-su-booking-com-hacker-trafugano-informazioni-sensibili-dei-clienti-e-scattano-contromisure/</link>
		
		<dc:creator><![CDATA[Maddalena Bruscagin]]></dc:creator>
		<pubDate>Fri, 17 Apr 2026 14:27:27 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Data Protection]]></category>
		<category><![CDATA[booking]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[Dati]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[violazione]]></category>
		<guid isPermaLink="false">https://newsletter-wp.osservatori.net/?p=67383</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Data breach Inditex, i rischi per la cybersicurezza di Zara. Coinvolte di nuovo le terze parti</title>
		<link>https://newsletter-wp.osservatori.net/cybersecurity/data-breach-inditex-i-rischi-per-la-cybersicurezza-di-zara-coinvolte-di-nuovo-le-terze-parti/</link>
		
		<dc:creator><![CDATA[Maddalena Bruscagin]]></dc:creator>
		<pubDate>Fri, 17 Apr 2026 14:26:08 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Data Protection]]></category>
		<category><![CDATA[attacco]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://newsletter-wp.osservatori.net/?p=67381</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Object Caching 96/102 objects using disk
Page Caching using disk: enhanced 
Minified using disk
Database Caching using disk

Served from: newsletter-wp.osservatori.net @ 2026-05-09 13:50:46 by W3 Total Cache
-->