<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="/stylesheet.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link rel="self" type="application/atom+xml" href="https://feeds.transistor.fm/cyber-security-tldr" title="MP3 Audio"/>
    <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/"/>
    <podcast:podping usesPodping="true"/>
    <title>Cyber Security TLDR</title>
    <generator>Transistor (https://transistor.fm)</generator>
    <itunes:new-feed-url>https://feeds.transistor.fm/cyber-security-tldr</itunes:new-feed-url>
    <description>Saving you valuable time by providing the "Too Long Didn't Read" summary of Cyber Security topics and news.</description>
    <copyright>©2022 Jon Good</copyright>
    <podcast:guid>d40e6296-f33e-50a4-8562-f197a1b17d6d</podcast:guid>
    <podcast:locked owner="shows@jongood.com">yes</podcast:locked>
    <language>en</language>
    <pubDate>Wed, 23 Jul 2025 07:34:09 -0700</pubDate>
    <lastBuildDate>Wed, 23 Jul 2025 07:39:18 -0700</lastBuildDate>
    <link>https://www.jongood.com/</link>
    <image>
      <url>https://img.transistor.fm/jjS1i6iwAknvq-WfM-4gjpjyS_Omc1mDsPFtVDI61jw/rs:fill:0:0:1/w:3000/h:3000/q:60/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9zaG93/LzI5MTg5LzE2NDc4/MDAwNTEtYXJ0d29y/ay5qcGc.jpg</url>
      <title>Cyber Security TLDR</title>
      <link>https://www.jongood.com/</link>
    </image>
    <itunes:category text="Technology"/>
    <itunes:category text="News">
      <itunes:category text="Tech News"/>
    </itunes:category>
    <itunes:type>episodic</itunes:type>
    <itunes:author>Jon Good</itunes:author>
    <itunes:image href="https://img.transistor.fm/jjS1i6iwAknvq-WfM-4gjpjyS_Omc1mDsPFtVDI61jw/rs:fill:0:0:1/w:3000/h:3000/q:60/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9zaG93/LzI5MTg5LzE2NDc4/MDAwNTEtYXJ0d29y/ay5qcGc.jpg"/>
    <itunes:summary>Saving you valuable time by providing the "Too Long Didn't Read" summary of Cyber Security topics and news.</itunes:summary>
    <itunes:subtitle>Saving you valuable time by providing the "Too Long Didn't Read" summary of Cyber Security topics and news..</itunes:subtitle>
    <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
    <itunes:owner>
      <itunes:name>Jon Good</itunes:name>
    </itunes:owner>
    <itunes:complete>No</itunes:complete>
    <itunes:explicit>No</itunes:explicit>
    <item>
      <title>62: Threat Intel (05/14/23 to 05/20/23) // Cyber Security News</title>
      <itunes:episode>62</itunes:episode>
      <podcast:episode>62</podcast:episode>
      <itunes:title>62: Threat Intel (05/14/23 to 05/20/23) // Cyber Security News</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b4bc104f-a3df-4607-aa01-d8751e1a3b0d</guid>
      <link>https://share.transistor.fm/s/0d330e11</link>
      <description>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-05-14-23-to-05-20-23-cyber-security-news/">https://jongood.com/threat-intel-05-14-23-to-05-20-23-cyber-security-news/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-05-14-23-to-05-20-23-cyber-security-news/">https://jongood.com/threat-intel-05-14-23-to-05-20-23-cyber-security-news/</a></p>]]>
      </content:encoded>
      <pubDate>Sun, 21 May 2023 05:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/0d330e11/110728c4.mp3" length="57778442" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>1802</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-05-14-23-to-05-20-23-cyber-security-news/">https://jongood.com/threat-intel-05-14-23-to-05-20-23-cyber-security-news/</a></p>]]>
      </itunes:summary>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>61: Threat Intel (05/07/23 to 05/13/23) // Cyber Security News</title>
      <itunes:episode>61</itunes:episode>
      <podcast:episode>61</podcast:episode>
      <itunes:title>61: Threat Intel (05/07/23 to 05/13/23) // Cyber Security News</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">41ec55fa-42bb-4e78-8805-d49378eb1f5d</guid>
      <link>https://share.transistor.fm/s/96f31be5</link>
      <description>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-05-07-23-to-05-13-23-cyber-security-news/">https://jongood.com/threat-intel-05-07-23-to-05-13-23-cyber-security-news/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-05-07-23-to-05-13-23-cyber-security-news/">https://jongood.com/threat-intel-05-07-23-to-05-13-23-cyber-security-news/</a></p>]]>
      </content:encoded>
      <pubDate>Sun, 14 May 2023 05:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/96f31be5/239fcd3f.mp3" length="58776193" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>1833</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-05-07-23-to-05-13-23-cyber-security-news/">https://jongood.com/threat-intel-05-07-23-to-05-13-23-cyber-security-news/</a></p>]]>
      </itunes:summary>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>60: Threat Intel (04/30/23 to 05/06/23) // Cyber Security News</title>
      <itunes:episode>60</itunes:episode>
      <podcast:episode>60</podcast:episode>
      <itunes:title>60: Threat Intel (04/30/23 to 05/06/23) // Cyber Security News</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1315fa45-0aeb-4f6f-baab-3a1db236f535</guid>
      <link>https://share.transistor.fm/s/f68264ab</link>
      <description>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-04-30-23-to-05-06-23-cyber-security-news/">https://jongood.com/threat-intel-04-30-23-to-05-06-23-cyber-security-news/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-04-30-23-to-05-06-23-cyber-security-news/">https://jongood.com/threat-intel-04-30-23-to-05-06-23-cyber-security-news/</a></p>]]>
      </content:encoded>
      <pubDate>Sun, 07 May 2023 05:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/f68264ab/94fd1667.mp3" length="67656455" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>2111</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-04-30-23-to-05-06-23-cyber-security-news/">https://jongood.com/threat-intel-04-30-23-to-05-06-23-cyber-security-news/</a></p>]]>
      </itunes:summary>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>59: Threat Intel (04/23/23 to 04/29/23) // Cyber Security News</title>
      <itunes:episode>59</itunes:episode>
      <podcast:episode>59</podcast:episode>
      <itunes:title>59: Threat Intel (04/23/23 to 04/29/23) // Cyber Security News</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d4534d8e-7cdf-4630-8d49-d008c520dfce</guid>
      <link>https://share.transistor.fm/s/e7503167</link>
      <description>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-04-23-23-to-04-29-23-cyber-security-news/">https://jongood.com/threat-intel-04-23-23-to-04-29-23-cyber-security-news/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-04-23-23-to-04-29-23-cyber-security-news/">https://jongood.com/threat-intel-04-23-23-to-04-29-23-cyber-security-news/</a></p>]]>
      </content:encoded>
      <pubDate>Sun, 30 Apr 2023 05:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/e7503167/701b847e.mp3" length="61775122" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>1927</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-04-23-23-to-04-29-23-cyber-security-news/">https://jongood.com/threat-intel-04-23-23-to-04-29-23-cyber-security-news/</a></p>]]>
      </itunes:summary>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>58: Threat Intel (04/16/23 to 04/22/23) // Cyber Security News</title>
      <itunes:episode>58</itunes:episode>
      <podcast:episode>58</podcast:episode>
      <itunes:title>58: Threat Intel (04/16/23 to 04/22/23) // Cyber Security News</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3c46a602-3721-48be-a434-8b414a293cd0</guid>
      <link>https://share.transistor.fm/s/89f1f460</link>
      <description>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-04-16-23-to-04-22-23-cyber-security-news/">https://jongood.com/threat-intel-04-16-23-to-04-22-23-cyber-security-news/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-04-16-23-to-04-22-23-cyber-security-news/">https://jongood.com/threat-intel-04-16-23-to-04-22-23-cyber-security-news/</a></p>]]>
      </content:encoded>
      <pubDate>Sun, 23 Apr 2023 05:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/89f1f460/20ce9b18.mp3" length="66095864" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>2062</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-04-16-23-to-04-22-23-cyber-security-news/">https://jongood.com/threat-intel-04-16-23-to-04-22-23-cyber-security-news/</a></p>]]>
      </itunes:summary>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>57: Threat Intel (04/09/23 to 04/15/23) // Cyber Security News</title>
      <itunes:episode>57</itunes:episode>
      <podcast:episode>57</podcast:episode>
      <itunes:title>57: Threat Intel (04/09/23 to 04/15/23) // Cyber Security News</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0428ceaa-aac5-4ecc-9a1d-bbea5eeba68c</guid>
      <link>https://share.transistor.fm/s/e7bdfe5a</link>
      <description>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-04-09-23-to-04-15-23-cyber-security-news/">https://jongood.com/threat-intel-04-09-23-to-04-15-23-cyber-security-news/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-04-09-23-to-04-15-23-cyber-security-news/">https://jongood.com/threat-intel-04-09-23-to-04-15-23-cyber-security-news/</a></p>]]>
      </content:encoded>
      <pubDate>Sun, 16 Apr 2023 05:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/e7bdfe5a/cfaa62da.mp3" length="69157283" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>2158</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-04-09-23-to-04-15-23-cyber-security-news/">https://jongood.com/threat-intel-04-09-23-to-04-15-23-cyber-security-news/</a></p>]]>
      </itunes:summary>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>56: Threat Intel (04/02/23 to 04/08/23) // Cyber Security News</title>
      <itunes:episode>56</itunes:episode>
      <podcast:episode>56</podcast:episode>
      <itunes:title>56: Threat Intel (04/02/23 to 04/08/23) // Cyber Security News</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d48c47b2-425d-4022-85f0-4f6475d19b3a</guid>
      <link>https://share.transistor.fm/s/fb4016fa</link>
      <description>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-04-02-23-to-04-08-23-cyber-security-news/">https://jongood.com/threat-intel-04-02-23-to-04-08-23-cyber-security-news/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-04-02-23-to-04-08-23-cyber-security-news/">https://jongood.com/threat-intel-04-02-23-to-04-08-23-cyber-security-news/</a></p>]]>
      </content:encoded>
      <pubDate>Sun, 09 Apr 2023 05:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/fb4016fa/a6eb8624.mp3" length="67528143" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>2107</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-04-02-23-to-04-08-23-cyber-security-news/">https://jongood.com/threat-intel-04-02-23-to-04-08-23-cyber-security-news/</a></p>]]>
      </itunes:summary>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>55: Threat Intel (03/26/23 to 04/01/23) // Cyber Security News</title>
      <itunes:episode>55</itunes:episode>
      <podcast:episode>55</podcast:episode>
      <itunes:title>55: Threat Intel (03/26/23 to 04/01/23) // Cyber Security News</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">cc77332a-d1b2-46da-8776-0e204ae00d83</guid>
      <link>https://share.transistor.fm/s/b695b338</link>
      <description>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-03-26-23-to-04-01-23-cyber-security-news/">https://jongood.com/threat-intel-03-26-23-to-04-01-23-cyber-security-news/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-03-26-23-to-04-01-23-cyber-security-news/">https://jongood.com/threat-intel-03-26-23-to-04-01-23-cyber-security-news/</a></p>]]>
      </content:encoded>
      <pubDate>Sun, 02 Apr 2023 05:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/b695b338/d3b7e56e.mp3" length="68443760" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>2136</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-03-26-23-to-04-01-23-cyber-security-news/">https://jongood.com/threat-intel-03-26-23-to-04-01-23-cyber-security-news/</a></p>]]>
      </itunes:summary>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>54: Threat Intel (03/12/23 to 03/18/23) // Cyber Security News</title>
      <itunes:episode>54</itunes:episode>
      <podcast:episode>54</podcast:episode>
      <itunes:title>54: Threat Intel (03/12/23 to 03/18/23) // Cyber Security News</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">56fd99c7-0060-4cd1-b619-07ef70314fe2</guid>
      <link>https://share.transistor.fm/s/4631e2f3</link>
      <description>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-03-19-23-to-03-25-23-cyber-security-news/">https://jongood.com/threat-intel-03-19-23-to-03-25-23-cyber-security-news/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-03-19-23-to-03-25-23-cyber-security-news/">https://jongood.com/threat-intel-03-19-23-to-03-25-23-cyber-security-news/</a></p>]]>
      </content:encoded>
      <pubDate>Sun, 26 Mar 2023 05:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/4631e2f3/642e6e92.mp3" length="59566449" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>1858</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-03-19-23-to-03-25-23-cyber-security-news/">https://jongood.com/threat-intel-03-19-23-to-03-25-23-cyber-security-news/</a></p>]]>
      </itunes:summary>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>53: Threat Intel (03/12/23 to 03/18/23) // Cyber Security News</title>
      <itunes:episode>53</itunes:episode>
      <podcast:episode>53</podcast:episode>
      <itunes:title>53: Threat Intel (03/12/23 to 03/18/23) // Cyber Security News</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b571f4f3-1eaf-42d4-85cf-e27b8b07beef</guid>
      <link>https://share.transistor.fm/s/32e2f286</link>
      <description>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-03-12-23-to-03-18-23-cyber-security-news/">https://jongood.com/threat-intel-03-12-23-to-03-18-23-cyber-security-news/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-03-12-23-to-03-18-23-cyber-security-news/">https://jongood.com/threat-intel-03-12-23-to-03-18-23-cyber-security-news/</a></p>]]>
      </content:encoded>
      <pubDate>Sun, 19 Mar 2023 05:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/32e2f286/96ae72a7.mp3" length="73874254" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>2305</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-03-12-23-to-03-18-23-cyber-security-news/">https://jongood.com/threat-intel-03-12-23-to-03-18-23-cyber-security-news/</a></p>]]>
      </itunes:summary>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>52: Threat Intel (03/05/23 to 03/11/23) // Cyber Security News</title>
      <itunes:episode>52</itunes:episode>
      <podcast:episode>52</podcast:episode>
      <itunes:title>52: Threat Intel (03/05/23 to 03/11/23) // Cyber Security News</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5c64597e-bcba-4f8f-a868-3eae83e94607</guid>
      <link>https://share.transistor.fm/s/fb372be9</link>
      <description>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-03-05-23-to-03-11-23-cyber-security-news/">https://jongood.com/threat-intel-03-05-23-to-03-11-23-cyber-security-news/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-03-05-23-to-03-11-23-cyber-security-news/">https://jongood.com/threat-intel-03-05-23-to-03-11-23-cyber-security-news/</a></p>]]>
      </content:encoded>
      <pubDate>Sun, 12 Mar 2023 05:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/fb372be9/fc33d8a8.mp3" length="68094571" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>2125</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-03-05-23-to-03-11-23-cyber-security-news/">https://jongood.com/threat-intel-03-05-23-to-03-11-23-cyber-security-news/</a></p>]]>
      </itunes:summary>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>51: Threat Intel (02/26/23 to 03/04/23) // Cyber Security News</title>
      <itunes:episode>51</itunes:episode>
      <podcast:episode>51</podcast:episode>
      <itunes:title>51: Threat Intel (02/26/23 to 03/04/23) // Cyber Security News</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">32d7c75b-e6bc-482f-9af1-ed45e6bee66a</guid>
      <link>https://share.transistor.fm/s/2b7feb50</link>
      <description>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-02-26-23-to-03-04-23-cyber-security-news/">https://jongood.com/threat-intel-02-26-23-to-03-04-23-cyber-security-news/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-02-26-23-to-03-04-23-cyber-security-news/">https://jongood.com/threat-intel-02-26-23-to-03-04-23-cyber-security-news/</a></p>]]>
      </content:encoded>
      <pubDate>Sun, 05 Mar 2023 05:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/2b7feb50/0a9013fa.mp3" length="62957420" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>1964</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-02-26-23-to-03-04-23-cyber-security-news/">https://jongood.com/threat-intel-02-26-23-to-03-04-23-cyber-security-news/</a></p>]]>
      </itunes:summary>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>50: Threat Intel (02/19/23 to 02/25/23) // Cyber Security News</title>
      <itunes:episode>50</itunes:episode>
      <podcast:episode>50</podcast:episode>
      <itunes:title>50: Threat Intel (02/19/23 to 02/25/23) // Cyber Security News</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">90003878-3807-4bfd-ba15-b8d1abf5091a</guid>
      <link>https://share.transistor.fm/s/a9ccf043</link>
      <description>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-02-19-23-to-02-25-23-cyber-security-news/">https://jongood.com/threat-intel-02-19-23-to-02-25-23-cyber-security-news/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-02-19-23-to-02-25-23-cyber-security-news/">https://jongood.com/threat-intel-02-19-23-to-02-25-23-cyber-security-news/</a></p>]]>
      </content:encoded>
      <pubDate>Sun, 26 Feb 2023 05:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/a9ccf043/ff534f72.mp3" length="69431820" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>2167</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-02-19-23-to-02-25-23-cyber-security-news/">https://jongood.com/threat-intel-02-19-23-to-02-25-23-cyber-security-news/</a></p>]]>
      </itunes:summary>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>49: Threat Intel (02/12/23 to 02/18/23) // Cyber Security News</title>
      <itunes:episode>49</itunes:episode>
      <podcast:episode>49</podcast:episode>
      <itunes:title>49: Threat Intel (02/12/23 to 02/18/23) // Cyber Security News</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9487fd0c-fef4-43a8-9362-3d268a4aa4b8</guid>
      <link>https://share.transistor.fm/s/2d3f2134</link>
      <description>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-02-12-23-to-02-18-23-cyber-security-news/">https://jongood.com/threat-intel-02-12-23-to-02-18-23-cyber-security-news/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-02-12-23-to-02-18-23-cyber-security-news/">https://jongood.com/threat-intel-02-12-23-to-02-18-23-cyber-security-news/</a></p>]]>
      </content:encoded>
      <pubDate>Sun, 19 Feb 2023 05:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/2d3f2134/2fb77e09.mp3" length="56481644" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>1762</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-02-12-23-to-02-18-23-cyber-security-news/">https://jongood.com/threat-intel-02-12-23-to-02-18-23-cyber-security-news/</a></p>]]>
      </itunes:summary>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>48: Threat Intel (02/05/23 to 02/11/23) // Cyber Security News</title>
      <itunes:episode>48</itunes:episode>
      <podcast:episode>48</podcast:episode>
      <itunes:title>48: Threat Intel (02/05/23 to 02/11/23) // Cyber Security News</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a653c255-1df0-47d8-b72a-66a01baa8d6d</guid>
      <link>https://share.transistor.fm/s/ec3fbf0c</link>
      <description>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-02-05-23-to-02-11-23-cyber-security-news/">https://jongood.com/threat-intel-02-05-23-to-02-11-23-cyber-security-news/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-02-05-23-to-02-11-23-cyber-security-news/">https://jongood.com/threat-intel-02-05-23-to-02-11-23-cyber-security-news/</a></p>]]>
      </content:encoded>
      <pubDate>Sun, 12 Feb 2023 05:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/ec3fbf0c/970dfbba.mp3" length="55200781" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>1722</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-02-05-23-to-02-11-23-cyber-security-news/">https://jongood.com/threat-intel-02-05-23-to-02-11-23-cyber-security-news/</a></p>]]>
      </itunes:summary>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>47: Threat Intel (01/29/23 to 02/04/23) // Cyber Security News</title>
      <itunes:episode>47</itunes:episode>
      <podcast:episode>47</podcast:episode>
      <itunes:title>47: Threat Intel (01/29/23 to 02/04/23) // Cyber Security News</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">cb2367cb-742c-4f17-96e7-2cebfa043796</guid>
      <link>https://share.transistor.fm/s/659f0331</link>
      <description>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-01-29-23-to-02-04-23-cyber-security-news/">https://jongood.com/threat-intel-01-29-23-to-02-04-23-cyber-security-news/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-01-29-23-to-02-04-23-cyber-security-news/">https://jongood.com/threat-intel-01-29-23-to-02-04-23-cyber-security-news/</a></p>]]>
      </content:encoded>
      <pubDate>Sun, 05 Feb 2023 05:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/659f0331/da0d061b.mp3" length="64938206" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>2026</itunes:duration>
      <itunes:summary>Threat Intel (01/29/23 to 02/04/23) // Cyber Security News</itunes:summary>
      <itunes:subtitle>Threat Intel (01/29/23 to 02/04/23) // Cyber Security News</itunes:subtitle>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>46: Threat Intel (01/22/23 to 01/28/23) // Cyber Security News</title>
      <itunes:episode>46</itunes:episode>
      <podcast:episode>46</podcast:episode>
      <itunes:title>46: Threat Intel (01/22/23 to 01/28/23) // Cyber Security News</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">acc053d4-c865-467c-8d30-66a36a6eb562</guid>
      <link>https://share.transistor.fm/s/5ada3fcc</link>
      <description>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-01-22-23-to-01-28-23-cyber-security-news/">https://jongood.com/threat-intel-01-22-23-to-01-28-23-cyber-security-news/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-01-22-23-to-01-28-23-cyber-security-news/">https://jongood.com/threat-intel-01-22-23-to-01-28-23-cyber-security-news/</a></p>]]>
      </content:encoded>
      <pubDate>Sun, 29 Jan 2023 05:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/5ada3fcc/46e58a2b.mp3" length="66709997" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>2081</itunes:duration>
      <itunes:summary>Threat Intel (01/22/23 to 01/28/23) // Cyber Security News</itunes:summary>
      <itunes:subtitle>Threat Intel (01/22/23 to 01/28/23) // Cyber Security News</itunes:subtitle>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>45: Threat Intel (01/15/23 to 01/21/23) // Cyber Security News</title>
      <itunes:episode>45</itunes:episode>
      <podcast:episode>45</podcast:episode>
      <itunes:title>45: Threat Intel (01/15/23 to 01/21/23) // Cyber Security News</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3a69a2d6-f7a6-4ced-827c-99ae1e83919f</guid>
      <link>https://share.transistor.fm/s/0e97ce19</link>
      <description>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-01-15-23-to-01-21-23-cyber-security-news/">https://jongood.com/threat-intel-01-15-23-to-01-21-23-cyber-security-news/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-01-15-23-to-01-21-23-cyber-security-news/">https://jongood.com/threat-intel-01-15-23-to-01-21-23-cyber-security-news/</a></p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Jan 2023 05:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/0e97ce19/5f7d614b.mp3" length="60240390" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>1879</itunes:duration>
      <itunes:summary>Threat Intel (01/15/23 to 01/21/23) // Cyber Security News</itunes:summary>
      <itunes:subtitle>Threat Intel (01/15/23 to 01/21/23) // Cyber Security News</itunes:subtitle>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>44: Threat Intel (01/08/23 to 01/14/23) // Cyber Security News</title>
      <itunes:episode>44</itunes:episode>
      <podcast:episode>44</podcast:episode>
      <itunes:title>44: Threat Intel (01/08/23 to 01/14/23) // Cyber Security News</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">036a7111-526c-4257-839c-ac5062b84361</guid>
      <link>https://share.transistor.fm/s/7d657f5d</link>
      <description>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-01-08-23-to-01-14-23-cyber-security-news/">https://jongood.com/threat-intel-01-08-23-to-01-14-23-cyber-security-news/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-01-08-23-to-01-14-23-cyber-security-news/">https://jongood.com/threat-intel-01-08-23-to-01-14-23-cyber-security-news/</a></p>]]>
      </content:encoded>
      <pubDate>Sun, 15 Jan 2023 05:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/7d657f5d/6143702b.mp3" length="73899307" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>2306</itunes:duration>
      <itunes:summary>Threat Intel (01/08/23 to 01/14/23) // Cyber Security News</itunes:summary>
      <itunes:subtitle>Threat Intel (01/08/23 to 01/14/23) // Cyber Security News</itunes:subtitle>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>43: Threat Intel (01/01/23 to 01/07/23) // Cyber Security News</title>
      <itunes:episode>43</itunes:episode>
      <podcast:episode>43</podcast:episode>
      <itunes:title>43: Threat Intel (01/01/23 to 01/07/23) // Cyber Security News</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e2c8e7a8-2df6-4348-ba61-910e89f6ee18</guid>
      <link>https://share.transistor.fm/s/808df79f</link>
      <description>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-01-01-23-to-01-07-23-cyber-security-news/">https://jongood.com/threat-intel-01-01-23-to-01-07-23-cyber-security-news/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-01-01-23-to-01-07-23-cyber-security-news/">https://jongood.com/threat-intel-01-01-23-to-01-07-23-cyber-security-news/</a></p>]]>
      </content:encoded>
      <pubDate>Sun, 08 Jan 2023 05:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/808df79f/9acc8245.mp3" length="63644141" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>1986</itunes:duration>
      <itunes:summary>Threat Intel (01/01/23 to 01/07/23) // Cyber Security News</itunes:summary>
      <itunes:subtitle>Threat Intel (01/01/23 to 01/07/23) // Cyber Security News</itunes:subtitle>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>42: Threat Intel (12/25/22 to 12/31/22) // Cyber Security News</title>
      <itunes:episode>42</itunes:episode>
      <podcast:episode>42</podcast:episode>
      <itunes:title>42: Threat Intel (12/25/22 to 12/31/22) // Cyber Security News</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">32f93230-b0b2-40d1-85dd-1afd07c76d58</guid>
      <link>https://share.transistor.fm/s/6ed529d7</link>
      <description>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-12-25-22-to-12-31-22-cyber-security-news/">https://jongood.com/threat-intel-12-25-22-to-12-31-22-cyber-security-news/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-12-25-22-to-12-31-22-cyber-security-news/">https://jongood.com/threat-intel-12-25-22-to-12-31-22-cyber-security-news/</a></p>]]>
      </content:encoded>
      <pubDate>Sat, 31 Dec 2022 12:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/6ed529d7/358420c1.mp3" length="58413293" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>1822</itunes:duration>
      <itunes:summary>Threat Intel (12/25/22 to 12/31/22) // Cyber Security News</itunes:summary>
      <itunes:subtitle>Threat Intel (12/25/22 to 12/31/22) // Cyber Security News</itunes:subtitle>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>41: Threat Intel (12/18/22 to 12/24/22) // Cyber Security News</title>
      <itunes:episode>41</itunes:episode>
      <podcast:episode>41</podcast:episode>
      <itunes:title>41: Threat Intel (12/18/22 to 12/24/22) // Cyber Security News</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">72b226ba-6c52-460d-b150-d058a1bd31e2</guid>
      <link>https://share.transistor.fm/s/cfd62dd7</link>
      <description>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-12-18-22-to-12-24-22-cyber-security-news/">https://jongood.com/threat-intel-12-18-22-to-12-24-22-cyber-security-news/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-12-18-22-to-12-24-22-cyber-security-news/">https://jongood.com/threat-intel-12-18-22-to-12-24-22-cyber-security-news/</a></p>]]>
      </content:encoded>
      <pubDate>Sat, 24 Dec 2022 12:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/cfd62dd7/b2414ebe.mp3" length="68577580" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>2140</itunes:duration>
      <itunes:summary>Threat Intel (12/18/22 to 12/24/22) // Cyber Security News</itunes:summary>
      <itunes:subtitle>Threat Intel (12/18/22 to 12/24/22) // Cyber Security News</itunes:subtitle>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>40: Threat Intel (12/11/22 to 12/17/22) // Cyber Security News</title>
      <itunes:episode>40</itunes:episode>
      <podcast:episode>40</podcast:episode>
      <itunes:title>40: Threat Intel (12/11/22 to 12/17/22) // Cyber Security News</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">448e68fc-56e7-488d-b69c-1e7bcaa7dbbb</guid>
      <link>https://share.transistor.fm/s/ed97c56b</link>
      <description>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-12-11-22-to-12-17-22-cyber-security-news/">https://jongood.com/threat-intel-12-11-22-to-12-17-22-cyber-security-news/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-12-11-22-to-12-17-22-cyber-security-news/">https://jongood.com/threat-intel-12-11-22-to-12-17-22-cyber-security-news/</a></p>]]>
      </content:encoded>
      <pubDate>Sun, 18 Dec 2022 10:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/ed97c56b/25584db4.mp3" length="68636177" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>2142</itunes:duration>
      <itunes:summary>Threat Intel (12/11/22 to 12/17/22) // Cyber Security News</itunes:summary>
      <itunes:subtitle>Threat Intel (12/11/22 to 12/17/22) // Cyber Security News</itunes:subtitle>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>39: Threat Intel (12/04/22 to 12/10/22) // Cyber Security News</title>
      <itunes:episode>39</itunes:episode>
      <podcast:episode>39</podcast:episode>
      <itunes:title>39: Threat Intel (12/04/22 to 12/10/22) // Cyber Security News</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8f32d19c-c135-4da5-a45a-3c00d82fd2da</guid>
      <link>https://share.transistor.fm/s/24c0dcaa</link>
      <description>
        <![CDATA[<p><a href="https://jongood.com/threat-intel/">https://jongood.com/threat-intel/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://jongood.com/threat-intel/">https://jongood.com/threat-intel/</a></p>]]>
      </content:encoded>
      <pubDate>Sun, 11 Dec 2022 10:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/24c0dcaa/c88ecf01.mp3" length="67498854" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>2106</itunes:duration>
      <itunes:summary>Threat Intel (12/04/22 to 12/10/22) // Cyber Security News</itunes:summary>
      <itunes:subtitle>Threat Intel (12/04/22 to 12/10/22) // Cyber Security News</itunes:subtitle>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>38: Threat Intel (11/27/22 to 12/03/22) // Cyber Security News</title>
      <itunes:episode>38</itunes:episode>
      <podcast:episode>38</podcast:episode>
      <itunes:title>38: Threat Intel (11/27/22 to 12/03/22) // Cyber Security News</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">36330d2e-d2c5-41eb-835b-70a770ded50e</guid>
      <link>https://share.transistor.fm/s/3fd50a26</link>
      <description>
        <![CDATA[<p><a href="https://jongood.com/threat-intel/">https://jongood.com/threat-intel/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://jongood.com/threat-intel/">https://jongood.com/threat-intel/</a></p>]]>
      </content:encoded>
      <pubDate>Sun, 04 Dec 2022 10:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/3fd50a26/a32e307e.mp3" length="69204373" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>2159</itunes:duration>
      <itunes:summary>Threat Intel (11/27/22 to 12/03/22) // Cyber Security News</itunes:summary>
      <itunes:subtitle>Threat Intel (11/27/22 to 12/03/22) // Cyber Security News</itunes:subtitle>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>37: Threat Intel (11/20/22 to 11/26/22) // Cyber Security News</title>
      <itunes:episode>37</itunes:episode>
      <podcast:episode>37</podcast:episode>
      <itunes:title>37: Threat Intel (11/20/22 to 11/26/22) // Cyber Security News</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">69126258-b5ba-402c-bd15-a190d7a1c919</guid>
      <link>https://share.transistor.fm/s/8985ebee</link>
      <description>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-11-20-22-to-11-26-22-cyber-security-news/">https://jongood.com/threat-intel-11-20-22-to-11-26-22-cyber-security-news/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-11-20-22-to-11-26-22-cyber-security-news/">https://jongood.com/threat-intel-11-20-22-to-11-26-22-cyber-security-news/</a></p>]]>
      </content:encoded>
      <pubDate>Sun, 27 Nov 2022 10:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/8985ebee/2942a0b5.mp3" length="74398073" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>2322</itunes:duration>
      <itunes:summary>Threat Intel (11/20/22 to 11/26/22) // Cyber Security News</itunes:summary>
      <itunes:subtitle>Threat Intel (11/20/22 to 11/26/22) // Cyber Security News</itunes:subtitle>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>36: Threat Intel (11/13/22 to 11/19/22) // Cyber Security News</title>
      <itunes:episode>36</itunes:episode>
      <podcast:episode>36</podcast:episode>
      <itunes:title>36: Threat Intel (11/13/22 to 11/19/22) // Cyber Security News</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d6a3da52-4c3d-4349-8377-9bead0317a5f</guid>
      <link>https://share.transistor.fm/s/47b2a3ec</link>
      <description>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-11-13-22-to-11-19-22-cyber-security-news/">https://jongood.com/threat-intel-11-13-22-to-11-19-22-cyber-security-news/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-11-13-22-to-11-19-22-cyber-security-news/">https://jongood.com/threat-intel-11-13-22-to-11-19-22-cyber-security-news/</a></p>]]>
      </content:encoded>
      <pubDate>Sun, 20 Nov 2022 10:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/47b2a3ec/6de9dd6f.mp3" length="75638868" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>2360</itunes:duration>
      <itunes:summary>Threat Intel (11/13/22 to 11/19/22) // Cyber Security News</itunes:summary>
      <itunes:subtitle>Threat Intel (11/13/22 to 11/19/22) // Cyber Security News</itunes:subtitle>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>35: Threat Intel (11/06/22 to 11/12/22) // Cyber Security News</title>
      <itunes:episode>35</itunes:episode>
      <podcast:episode>35</podcast:episode>
      <itunes:title>35: Threat Intel (11/06/22 to 11/12/22) // Cyber Security News</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">521a9a99-e028-466e-a51e-9857bb19fd5b</guid>
      <link>https://share.transistor.fm/s/3c989f08</link>
      <description>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-11-06-22-to-11-12-22-cyber-security-news/">https://jongood.com/threat-intel-11-06-22-to-11-12-22-cyber-security-news/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-11-06-22-to-11-12-22-cyber-security-news/">https://jongood.com/threat-intel-11-06-22-to-11-12-22-cyber-security-news/</a></p>]]>
      </content:encoded>
      <pubDate>Sun, 13 Nov 2022 10:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/3c989f08/1c7594a3.mp3" length="72105272" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>2250</itunes:duration>
      <itunes:summary>Threat Intel (11/06/22 to 11/12/22) // Cyber Security News</itunes:summary>
      <itunes:subtitle>Threat Intel (11/06/22 to 11/12/22) // Cyber Security News</itunes:subtitle>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>34: Threat Intel (10/30/22 to 11/05/22) // Cyber Security News</title>
      <itunes:episode>34</itunes:episode>
      <podcast:episode>34</podcast:episode>
      <itunes:title>34: Threat Intel (10/30/22 to 11/05/22) // Cyber Security News</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">23161bd9-3e57-4940-81fa-6ad9525c3c88</guid>
      <link>https://share.transistor.fm/s/358c8f6d</link>
      <description>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-10-30-22-to-11-05-22-cyber-security-news/">https://jongood.com/threat-intel-10-30-22-to-11-05-22-cyber-security-news/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-10-30-22-to-11-05-22-cyber-security-news/">https://jongood.com/threat-intel-10-30-22-to-11-05-22-cyber-security-news/</a></p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Nov 2022 10:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/358c8f6d/5485f84a.mp3" length="80167170" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>2502</itunes:duration>
      <itunes:summary>Threat Intel (10/30/22 to 11/05/22) // Cyber Security News</itunes:summary>
      <itunes:subtitle>Threat Intel (10/30/22 to 11/05/22) // Cyber Security News</itunes:subtitle>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>33: Threat Intel (10/23/22 to 10/29/22) // Cyber Security News</title>
      <itunes:episode>33</itunes:episode>
      <podcast:episode>33</podcast:episode>
      <itunes:title>33: Threat Intel (10/23/22 to 10/29/22) // Cyber Security News</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3c775d6c-cd2e-4088-8d6a-b61f48b4b3e2</guid>
      <link>https://share.transistor.fm/s/edce40b4</link>
      <description>
        <![CDATA[<p><a href="https://jongood.com/threat-intel/">https://jongood.com/threat-intel/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://jongood.com/threat-intel/">https://jongood.com/threat-intel/</a></p>]]>
      </content:encoded>
      <pubDate>Sun, 30 Oct 2022 10:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/edce40b4/600392b7.mp3" length="76555035" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>2389</itunes:duration>
      <itunes:summary>Threat Intel (10/23/22 to 10/29/22) // Cyber Security News</itunes:summary>
      <itunes:subtitle>Threat Intel (10/23/22 to 10/29/22) // Cyber Security News</itunes:subtitle>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Threat Intel (10/16/22 to 10/22/22) // Cyber Security News</title>
      <itunes:episode>32</itunes:episode>
      <podcast:episode>32</podcast:episode>
      <itunes:title>Threat Intel (10/16/22 to 10/22/22) // Cyber Security News</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7c35e9b3-63ec-421e-8fbd-4b121b9f6b39</guid>
      <link>https://share.transistor.fm/s/fb3e84c3</link>
      <description>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-10-16-22-to-10-22-22-cyber-security-news/">https://jongood.com/threat-intel-10-16-22-to-10-22-22-cyber-security-news/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-10-16-22-to-10-22-22-cyber-security-news/">https://jongood.com/threat-intel-10-16-22-to-10-22-22-cyber-security-news/</a></p>]]>
      </content:encoded>
      <pubDate>Sun, 23 Oct 2022 10:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/fb3e84c3/312880c8.mp3" length="69465827" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>2168</itunes:duration>
      <itunes:summary>Threat Intel (10/16/22 to 10/22/22) // Cyber Security News</itunes:summary>
      <itunes:subtitle>Threat Intel (10/16/22 to 10/22/22) // Cyber Security News</itunes:subtitle>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Threat Intel (10/09/22 to 10/15/22) // Cyber Security News</title>
      <itunes:episode>31</itunes:episode>
      <podcast:episode>31</podcast:episode>
      <itunes:title>Threat Intel (10/09/22 to 10/15/22) // Cyber Security News</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f9130e4a-c6bc-4c61-ad3b-b0de671f7a3c</guid>
      <link>https://share.transistor.fm/s/6ae4186a</link>
      <description>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-10-09-22-to-10-15-22-cyber-security-news/">https://jongood.com/threat-intel-10-09-22-to-10-15-22-cyber-security-news/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-10-09-22-to-10-15-22-cyber-security-news/">https://jongood.com/threat-intel-10-09-22-to-10-15-22-cyber-security-news/</a></p>]]>
      </content:encoded>
      <pubDate>Sun, 16 Oct 2022 10:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/6ae4186a/173b131a.mp3" length="63620828" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>1985</itunes:duration>
      <itunes:summary>Threat Intel (10/09/22 to 10/15/22) // Cyber Security News</itunes:summary>
      <itunes:subtitle>Threat Intel (10/09/22 to 10/15/22) // Cyber Security News</itunes:subtitle>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Threat Intel (10/02/22 to 10/08/22) // Cyber Security News</title>
      <itunes:episode>30</itunes:episode>
      <podcast:episode>30</podcast:episode>
      <itunes:title>Threat Intel (10/02/22 to 10/08/22) // Cyber Security News</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">fc0aa0da-ca99-4340-aee0-8826506327e5</guid>
      <link>https://share.transistor.fm/s/111532b2</link>
      <description>
        <![CDATA[<p><a href="https://jongood.com/threat-intel/">https://jongood.com/threat-intel/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://jongood.com/threat-intel/">https://jongood.com/threat-intel/</a></p>]]>
      </content:encoded>
      <pubDate>Sun, 09 Oct 2022 10:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/111532b2/23f896ae.mp3" length="67070169" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>2093</itunes:duration>
      <itunes:summary>Threat Intel (10/02/22 to 10/08/22) // Cyber Security News</itunes:summary>
      <itunes:subtitle>Threat Intel (10/02/22 to 10/08/22) // Cyber Security News</itunes:subtitle>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Threat Intel (09/25/22 to 10/01/22) // Cyber Security News</title>
      <itunes:episode>29</itunes:episode>
      <podcast:episode>29</podcast:episode>
      <itunes:title>Threat Intel (09/25/22 to 10/01/22) // Cyber Security News</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e8a974a4-fced-4b57-8cba-11d13d50e907</guid>
      <link>https://share.transistor.fm/s/c1a68fd9</link>
      <description>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-09-25-22-to-10-01-22-cyber-security-news/">https://jongood.com/threat-intel-09-25-22-to-10-01-22-cyber-security-news/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-09-25-22-to-10-01-22-cyber-security-news/">https://jongood.com/threat-intel-09-25-22-to-10-01-22-cyber-security-news/</a></p>]]>
      </content:encoded>
      <pubDate>Sun, 02 Oct 2022 10:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/c1a68fd9/0e07b85c.mp3" length="67407513" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>2103</itunes:duration>
      <itunes:summary>Threat Intel (09/25/22 to 10/01/22) // Cyber Security News</itunes:summary>
      <itunes:subtitle>Threat Intel (09/25/22 to 10/01/22) // Cyber Security News</itunes:subtitle>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Threat Intel (09/18/22 to 09/24/22) // Cyber Security News</title>
      <itunes:episode>28</itunes:episode>
      <podcast:episode>28</podcast:episode>
      <itunes:title>Threat Intel (09/18/22 to 09/24/22) // Cyber Security News</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4b205b4d-40ea-4386-b7dc-c3386465e466</guid>
      <link>https://share.transistor.fm/s/2acb935f</link>
      <description>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-09-18-22-to-09-24-22-cyber-security-news/">https://jongood.com/threat-intel-09-18-22-to-09-24-22-cyber-security-news/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-09-18-22-to-09-24-22-cyber-security-news/">https://jongood.com/threat-intel-09-18-22-to-09-24-22-cyber-security-news/</a></p>]]>
      </content:encoded>
      <pubDate>Sun, 25 Sep 2022 10:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/2acb935f/2e55506a.mp3" length="66533373" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>2076</itunes:duration>
      <itunes:summary>Threat Intel (09/18/22 to 09/24/22) // Cyber Security News</itunes:summary>
      <itunes:subtitle>Threat Intel (09/18/22 to 09/24/22) // Cyber Security News</itunes:subtitle>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Threat Intel (09/11/22 to 09/17/22) // Cyber Security News</title>
      <itunes:episode>27</itunes:episode>
      <podcast:episode>27</podcast:episode>
      <itunes:title>Threat Intel (09/11/22 to 09/17/22) // Cyber Security News</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">61f4c9c3-c4f7-4a61-b0ae-6277bb74b3bd</guid>
      <link>https://share.transistor.fm/s/ad20d58b</link>
      <description>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-09-11-22-to-09-17-22-cyber-security-news/">https://jongood.com/threat-intel-09-11-22-to-09-17-22-cyber-security-news/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-09-11-22-to-09-17-22-cyber-security-news/">https://jongood.com/threat-intel-09-11-22-to-09-17-22-cyber-security-news/</a></p>]]>
      </content:encoded>
      <pubDate>Sun, 18 Sep 2022 10:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/ad20d58b/62afaf2a.mp3" length="67478516" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>2105</itunes:duration>
      <itunes:summary>Threat Intel (09/11/22 to 09/17/22) // Cyber Security News</itunes:summary>
      <itunes:subtitle>Threat Intel (09/11/22 to 09/17/22) // Cyber Security News</itunes:subtitle>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Threat Intel (09/04/22 to 09/10/22) // Cyber Security News</title>
      <itunes:episode>26</itunes:episode>
      <podcast:episode>26</podcast:episode>
      <itunes:title>Threat Intel (09/04/22 to 09/10/22) // Cyber Security News</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">adc77f47-0ab8-458e-9f2d-23dd2319fa07</guid>
      <link>https://share.transistor.fm/s/c1057474</link>
      <description>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-09-04-22-to-09-10-22-cyber-security-news/">https://jongood.com/threat-intel-09-04-22-to-09-10-22-cyber-security-news/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-09-04-22-to-09-10-22-cyber-security-news/">https://jongood.com/threat-intel-09-04-22-to-09-10-22-cyber-security-news/</a></p>]]>
      </content:encoded>
      <pubDate>Sun, 11 Sep 2022 10:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/c1057474/302daf7c.mp3" length="68045453" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>2123</itunes:duration>
      <itunes:summary>Threat Intel (09/04/22 to 09/10/22) // Cyber Security News</itunes:summary>
      <itunes:subtitle>Threat Intel (09/04/22 to 09/10/22) // Cyber Security News</itunes:subtitle>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Threat Intel (08/28/22 to 09/03/22) // Cyber Security News</title>
      <itunes:episode>25</itunes:episode>
      <podcast:episode>25</podcast:episode>
      <itunes:title>Threat Intel (08/28/22 to 09/03/22) // Cyber Security News</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4452d5fb-5767-4d0b-abff-51114da5704f</guid>
      <link>https://share.transistor.fm/s/331656f7</link>
      <description>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-08-28-22-to-09-03-22-cyber-security-news/">https://jongood.com/threat-intel-08-28-22-to-09-03-22-cyber-security-news/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-08-28-22-to-09-03-22-cyber-security-news/">https://jongood.com/threat-intel-08-28-22-to-09-03-22-cyber-security-news/</a></p>]]>
      </content:encoded>
      <pubDate>Sun, 04 Sep 2022 10:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/331656f7/cc81ad39.mp3" length="69739668" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>2176</itunes:duration>
      <itunes:summary>Threat Intel (08/28/22 to 09/03/22) // Cyber Security News</itunes:summary>
      <itunes:subtitle>Threat Intel (08/28/22 to 09/03/22) // Cyber Security News</itunes:subtitle>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Threat Intel (08/21/22 to 08/27/22) // Cyber Security News</title>
      <itunes:episode>24</itunes:episode>
      <podcast:episode>24</podcast:episode>
      <itunes:title>Threat Intel (08/21/22 to 08/27/22) // Cyber Security News</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5034e320-d9e0-4fa5-a0ea-5b2284a937f1</guid>
      <link>https://share.transistor.fm/s/26c2989e</link>
      <description>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-08-21-22-to-08-27-22-cyber-security-news/">https://jongood.com/threat-intel-08-21-22-to-08-27-22-cyber-security-news/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-08-21-22-to-08-27-22-cyber-security-news/">https://jongood.com/threat-intel-08-21-22-to-08-27-22-cyber-security-news/</a></p>]]>
      </content:encoded>
      <pubDate>Sun, 28 Aug 2022 10:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/26c2989e/f31f1e42.mp3" length="61440603" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>1916</itunes:duration>
      <itunes:summary>Threat Intel (08/21/22 to 08/27/22) // Cyber Security News</itunes:summary>
      <itunes:subtitle>Threat Intel (08/21/22 to 08/27/22) // Cyber Security News</itunes:subtitle>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Threat Intel (08/14/22 to 08/20/22) // Cyber Security News</title>
      <itunes:episode>23</itunes:episode>
      <podcast:episode>23</podcast:episode>
      <itunes:title>Threat Intel (08/14/22 to 08/20/22) // Cyber Security News</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">28644823-14b9-4e1e-af1a-7bc066a736ec</guid>
      <link>https://share.transistor.fm/s/6285c9aa</link>
      <description>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-08-14-22-to-08-20-22-cyber-security-news/">https://jongood.com/threat-intel-08-14-22-to-08-20-22-cyber-security-news/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-08-14-22-to-08-20-22-cyber-security-news/">https://jongood.com/threat-intel-08-14-22-to-08-20-22-cyber-security-news/</a></p>]]>
      </content:encoded>
      <pubDate>Sun, 21 Aug 2022 10:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/6285c9aa/165fef94.mp3" length="66382128" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>2070</itunes:duration>
      <itunes:summary>Threat Intel (08/14/22 to 08/20/22) // Cyber Security News</itunes:summary>
      <itunes:subtitle>Threat Intel (08/14/22 to 08/20/22) // Cyber Security News</itunes:subtitle>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Threat Intel (08/07/22 to 08/13/22) // Cyber Security News</title>
      <itunes:episode>22</itunes:episode>
      <podcast:episode>22</podcast:episode>
      <itunes:title>Threat Intel (08/07/22 to 08/13/22) // Cyber Security News</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">698bf1af-1b8b-4834-9930-266e05bfeb60</guid>
      <link>https://share.transistor.fm/s/19578fe4</link>
      <description>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-08-07-22-to-08-13-22-cyber-security-news/">https://jongood.com/threat-intel-08-07-22-to-08-13-22-cyber-security-news/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://jongood.com/threat-intel-08-07-22-to-08-13-22-cyber-security-news/">https://jongood.com/threat-intel-08-07-22-to-08-13-22-cyber-security-news/</a></p>]]>
      </content:encoded>
      <pubDate>Sun, 14 Aug 2022 12:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/19578fe4/0a5446ee.mp3" length="70214805" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>2190</itunes:duration>
      <itunes:summary>Threat Intel (08/07/22 to 08/13/22) // Cyber Security News</itunes:summary>
      <itunes:subtitle>Threat Intel (08/07/22 to 08/13/22) // Cyber Security News</itunes:subtitle>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Threat Intel (07/31/22 to 08/06/22) // Cyber Security News</title>
      <itunes:episode>21</itunes:episode>
      <podcast:episode>21</podcast:episode>
      <itunes:title>Threat Intel (07/31/22 to 08/06/22) // Cyber Security News</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a3b221b1-05d2-465b-9318-86058c31030c</guid>
      <link>https://share.transistor.fm/s/2d202b77</link>
      <description>
        <![CDATA[<p><a href="https://www.jongood.com/threat-intel-07-31-22-to-08-06-22-cyber-security-news/">https://www.jongood.com/threat-intel-07-31-22-to-08-06-22-cyber-security-news/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://www.jongood.com/threat-intel-07-31-22-to-08-06-22-cyber-security-news/">https://www.jongood.com/threat-intel-07-31-22-to-08-06-22-cyber-security-news/</a></p>]]>
      </content:encoded>
      <pubDate>Sun, 07 Aug 2022 12:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/2d202b77/53e29a76.mp3" length="67752362" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>2113</itunes:duration>
      <itunes:summary>Threat Intel (07/31/22 to 08/06/22) // Cyber Security News</itunes:summary>
      <itunes:subtitle>Threat Intel (07/31/22 to 08/06/22) // Cyber Security News</itunes:subtitle>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Threat Intel (07/24/22 to 07/30/22) // Cyber Security News</title>
      <itunes:episode>20</itunes:episode>
      <podcast:episode>20</podcast:episode>
      <itunes:title>Threat Intel (07/24/22 to 07/30/22) // Cyber Security News</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c4c1ebfc-39a2-4cef-a5b1-421a0492bd88</guid>
      <link>https://share.transistor.fm/s/3b368b51</link>
      <description>
        <![CDATA[<p><a href="https://www.jongood.com/threat-intel-07-24-22-to-07-30-22-cyber-security-news/">https://www.jongood.com/threat-intel-07-24-22-to-07-30-22-cyber-security-news/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://www.jongood.com/threat-intel-07-24-22-to-07-30-22-cyber-security-news/">https://www.jongood.com/threat-intel-07-24-22-to-07-30-22-cyber-security-news/</a></p>]]>
      </content:encoded>
      <pubDate>Sun, 31 Jul 2022 12:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/3b368b51/a6b96d2c.mp3" length="72728125" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>2269</itunes:duration>
      <itunes:summary>Threat Intel (07/24/22 to 07/30/22) // Cyber Security News</itunes:summary>
      <itunes:subtitle>Threat Intel (07/24/22 to 07/30/22) // Cyber Security News</itunes:subtitle>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Threat Intel (07/17/22 to 07/23/22) // Cyber Security News</title>
      <itunes:episode>19</itunes:episode>
      <podcast:episode>19</podcast:episode>
      <itunes:title>Threat Intel (07/17/22 to 07/23/22) // Cyber Security News</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2d9cb64d-5f34-4dbd-b4a8-1cf9dfcc8e5d</guid>
      <link>https://share.transistor.fm/s/144bddaa</link>
      <description>
        <![CDATA[<p><a href="https://www.jongood.com/threat-intel-07-17-22-to-07-23-22-cyber-security-news/">https://www.jongood.com/threat-intel-07-17-22-to-07-23-22-cyber-security-news/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://www.jongood.com/threat-intel-07-17-22-to-07-23-22-cyber-security-news/">https://www.jongood.com/threat-intel-07-17-22-to-07-23-22-cyber-security-news/</a></p>]]>
      </content:encoded>
      <pubDate>Sun, 24 Jul 2022 12:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/144bddaa/f147491d.mp3" length="65480324" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>2042</itunes:duration>
      <itunes:summary>Threat Intel (07/17/22 to 07/23/22) // Cyber Security News</itunes:summary>
      <itunes:subtitle>Threat Intel (07/17/22 to 07/23/22) // Cyber Security News</itunes:subtitle>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Threat Intel (07/10/22 to 07/16/22) // Cyber Security News</title>
      <itunes:episode>18</itunes:episode>
      <podcast:episode>18</podcast:episode>
      <itunes:title>Threat Intel (07/10/22 to 07/16/22) // Cyber Security News</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">10df6fbf-ac93-44ea-bb5f-76565043cd76</guid>
      <link>https://share.transistor.fm/s/0bf71de7</link>
      <description>
        <![CDATA[<p><a href="https://www.jongood.com/threat-intel-07-10-22-to-07-16-22-cyber-security-news/">https://www.jongood.com/threat-intel-07-10-22-to-07-16-22-cyber-security-news/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://www.jongood.com/threat-intel-07-10-22-to-07-16-22-cyber-security-news/">https://www.jongood.com/threat-intel-07-10-22-to-07-16-22-cyber-security-news/</a></p>]]>
      </content:encoded>
      <pubDate>Sun, 17 Jul 2022 12:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/0bf71de7/19c61d71.mp3" length="81822902" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>2553</itunes:duration>
      <itunes:summary>Threat Intel (07/10/22 to 07/16/22) // Cyber Security News</itunes:summary>
      <itunes:subtitle>Threat Intel (07/10/22 to 07/16/22) // Cyber Security News</itunes:subtitle>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Threat Intel (07/03/22 to 07/09/22) // Cyber Security News</title>
      <itunes:episode>17</itunes:episode>
      <podcast:episode>17</podcast:episode>
      <itunes:title>Threat Intel (07/03/22 to 07/09/22) // Cyber Security News</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1e08294c-21b3-444b-910b-fdd5a73c5602</guid>
      <link>https://share.transistor.fm/s/1f0cb01a</link>
      <description>
        <![CDATA[<p><a href="https://www.jongood.com/threat-intel-07-03-22-to-07-09-22-cyber-security-news/">https://www.jongood.com/threat-intel-07-03-22-to-07-09-22-cyber-security-news/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://www.jongood.com/threat-intel-07-03-22-to-07-09-22-cyber-security-news/">https://www.jongood.com/threat-intel-07-03-22-to-07-09-22-cyber-security-news/</a></p>]]>
      </content:encoded>
      <pubDate>Sat, 09 Jul 2022 14:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/1f0cb01a/0036837a.mp3" length="78692490" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>2455</itunes:duration>
      <itunes:summary>Threat Intel (07/03/22 to 07/09/22) // Cyber Security News</itunes:summary>
      <itunes:subtitle>Threat Intel (07/03/22 to 07/09/22) // Cyber Security News</itunes:subtitle>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Threat Intel (06/26/22 to 07/02/22) // Cyber Security News</title>
      <itunes:episode>16</itunes:episode>
      <podcast:episode>16</podcast:episode>
      <itunes:title>Threat Intel (06/26/22 to 07/02/22) // Cyber Security News</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8fd29b8d-1a5a-497d-be43-84740f053048</guid>
      <link>https://share.transistor.fm/s/3688930a</link>
      <description>
        <![CDATA[<p><a href="https://www.jongood.com/threat-intel-06-26-22-to-07-02-22-cyber-security-news/">https://www.jongood.com/threat-intel-06-26-22-to-07-02-22-cyber-security-news/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://www.jongood.com/threat-intel-06-26-22-to-07-02-22-cyber-security-news/">https://www.jongood.com/threat-intel-06-26-22-to-07-02-22-cyber-security-news/</a></p>]]>
      </content:encoded>
      <pubDate>Sat, 02 Jul 2022 16:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/3688930a/b4f07836.mp3" length="62338149" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>1944</itunes:duration>
      <itunes:summary>Threat Intel (06/26/22 to 07/02/22) // Cyber Security News</itunes:summary>
      <itunes:subtitle>Threat Intel (06/26/22 to 07/02/22) // Cyber Security News</itunes:subtitle>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Threat Intel (06/19/22 to 06/25/22) // Cyber Security News</title>
      <itunes:episode>15</itunes:episode>
      <podcast:episode>15</podcast:episode>
      <itunes:title>Threat Intel (06/19/22 to 06/25/22) // Cyber Security News</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">377f3fa2-cb2f-4527-8d7a-ab045d041f28</guid>
      <link>https://share.transistor.fm/s/a3b3efcb</link>
      <description>
        <![CDATA[<p><a href="https://www.jongood.com/threat-intel-06-19-22-to-06-25-22-cyber-security-news/">https://www.jongood.com/threat-intel-06-19-22-to-06-25-22-cyber-security-news/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://www.jongood.com/threat-intel-06-19-22-to-06-25-22-cyber-security-news/">https://www.jongood.com/threat-intel-06-19-22-to-06-25-22-cyber-security-news/</a></p>]]>
      </content:encoded>
      <pubDate>Sat, 25 Jun 2022 16:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/a3b3efcb/1af3172f.mp3" length="66955037" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>2088</itunes:duration>
      <itunes:summary>Threat Intel (06/19/22 to 06/25/22) // Cyber Security News</itunes:summary>
      <itunes:subtitle>Threat Intel (06/19/22 to 06/25/22) // Cyber Security News</itunes:subtitle>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Threat Intel (06/12/22 to 06/18/22) // Cyber Security News</title>
      <itunes:episode>14</itunes:episode>
      <podcast:episode>14</podcast:episode>
      <itunes:title>Threat Intel (06/12/22 to 06/18/22) // Cyber Security News</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">442e616f-8b2c-4843-bf94-54eb806885fe</guid>
      <link>https://share.transistor.fm/s/cb805078</link>
      <description>
        <![CDATA[<p><a href="https://www.jongood.com/threat-intel-06-12-22-to-06-18-22-cyber-security-news/">https://www.jongood.com/threat-intel-06-12-22-to-06-18-22-cyber-security-news/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://www.jongood.com/threat-intel-06-12-22-to-06-18-22-cyber-security-news/">https://www.jongood.com/threat-intel-06-12-22-to-06-18-22-cyber-security-news/</a></p>]]>
      </content:encoded>
      <pubDate>Sat, 18 Jun 2022 13:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/cb805078/69f001bf.mp3" length="74661823" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>2329</itunes:duration>
      <itunes:summary>Threat Intel (06/12/22 to 06/18/22) // Cyber Security News</itunes:summary>
      <itunes:subtitle>Threat Intel (06/12/22 to 06/18/22) // Cyber Security News</itunes:subtitle>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Threat Intel (06/05/22 to 06/11/22) // Cyber Security News</title>
      <itunes:episode>13</itunes:episode>
      <podcast:episode>13</podcast:episode>
      <itunes:title>Threat Intel (06/05/22 to 06/11/22) // Cyber Security News</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d821d210-4b50-42f0-b360-815515a1c8e0</guid>
      <link>https://share.transistor.fm/s/e0e4057f</link>
      <description>
        <![CDATA[<p><a href="https://www.jongood.com/threat-intel-06-05-22-to-06-11-22-cyber-security-tldr/">https://www.jongood.com/threat-intel-06-05-22-to-06-11-22-cyber-security-tldr/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://www.jongood.com/threat-intel-06-05-22-to-06-11-22-cyber-security-tldr/">https://www.jongood.com/threat-intel-06-05-22-to-06-11-22-cyber-security-tldr/</a></p>]]>
      </content:encoded>
      <pubDate>Sun, 12 Jun 2022 11:33:48 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/e0e4057f/14cb313d.mp3" length="41222647" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>1284</itunes:duration>
      <itunes:summary>Threat Intel (06/05/22 to 06/11/22) // Cyber Security News</itunes:summary>
      <itunes:subtitle>Threat Intel (06/05/22 to 06/11/22) // Cyber Security News</itunes:subtitle>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cyber Security News // Weekly Recap (05/29/22 to 06/04/22)</title>
      <itunes:episode>12</itunes:episode>
      <podcast:episode>12</podcast:episode>
      <itunes:title>Cyber Security News // Weekly Recap (05/29/22 to 06/04/22)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">84a9eaea-58a3-4ab0-846f-73b00ea1a4cb</guid>
      <link>https://share.transistor.fm/s/5188f83c</link>
      <description>
        <![CDATA[<p><a href="https://www.jongood.com/cyber-security-news-weekly-recap-05-29-22-to-06-04-22/">https://www.jongood.com/cyber-security-news-weekly-recap-05-29-22-to-06-04-22/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://www.jongood.com/cyber-security-news-weekly-recap-05-29-22-to-06-04-22/">https://www.jongood.com/cyber-security-news-weekly-recap-05-29-22-to-06-04-22/</a></p>]]>
      </content:encoded>
      <pubDate>Sat, 04 Jun 2022 12:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/5188f83c/f521b28c.mp3" length="64552639" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>2013</itunes:duration>
      <itunes:summary>Cyber Security News // Weekly Recap (05/29/22 to 06/04/22)</itunes:summary>
      <itunes:subtitle>Cyber Security News // Weekly Recap (05/29/22 to 06/04/22)</itunes:subtitle>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cyber Security News // Weekly Recap (05/22/22 to 05/28/22)</title>
      <itunes:episode>11</itunes:episode>
      <podcast:episode>11</podcast:episode>
      <itunes:title>Cyber Security News // Weekly Recap (05/22/22 to 05/28/22)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">17931a68-a76b-41ec-87ed-080cb76159d3</guid>
      <link>https://share.transistor.fm/s/ef800961</link>
      <description>
        <![CDATA[<p><a href="https://www.jongood.com/cyber-security-news-weekly-recap-05-22-22-to-05-28-22/">https://www.jongood.com/cyber-security-news-weekly-recap-05-22-22-to-05-28-22/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://www.jongood.com/cyber-security-news-weekly-recap-05-22-22-to-05-28-22/">https://www.jongood.com/cyber-security-news-weekly-recap-05-22-22-to-05-28-22/</a></p>]]>
      </content:encoded>
      <pubDate>Sun, 29 May 2022 09:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/ef800961/0aced0a4.mp3" length="70805912" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>2208</itunes:duration>
      <itunes:summary>Cyber Security News // Weekly Recap (05/22/22 to 05/28/22)</itunes:summary>
      <itunes:subtitle>Cyber Security News // Weekly Recap (05/22/22 to 05/28/22)</itunes:subtitle>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cyber Security News // Weekly Recap (05/15/22 to 05/21/22)</title>
      <itunes:episode>10</itunes:episode>
      <podcast:episode>10</podcast:episode>
      <itunes:title>Cyber Security News // Weekly Recap (05/15/22 to 05/21/22)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2ec46fa4-7d76-4ef0-a419-1f448da9c72f</guid>
      <link>https://share.transistor.fm/s/9a677953</link>
      <description>
        <![CDATA[<p><a href="https://www.jongood.com/cyber-security-news-weekly-recap-05-15-22-to-05-21-22/">https://www.jongood.com/cyber-security-news-weekly-recap-05-15-22-to-05-21-22/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://www.jongood.com/cyber-security-news-weekly-recap-05-15-22-to-05-21-22/">https://www.jongood.com/cyber-security-news-weekly-recap-05-15-22-to-05-21-22/</a></p>]]>
      </content:encoded>
      <pubDate>Sun, 22 May 2022 12:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/9a677953/4328c6ac.mp3" length="60936252" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>1900</itunes:duration>
      <itunes:summary>Cyber Security News // Weekly Recap (05/15/22 to 05/21/22)</itunes:summary>
      <itunes:subtitle>Cyber Security News // Weekly Recap (05/15/22 to 05/21/22)</itunes:subtitle>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cyber Security News // Weekly Recap (05/08/22 to 05/14/22)</title>
      <itunes:episode>9</itunes:episode>
      <podcast:episode>9</podcast:episode>
      <itunes:title>Cyber Security News // Weekly Recap (05/08/22 to 05/14/22)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8e32f4e9-4ab8-4e80-9074-98aae1646c98</guid>
      <link>https://share.transistor.fm/s/5ba9e49b</link>
      <description>
        <![CDATA[<p><a href="https://www.jongood.com/cyber-security-news-weekly-recap-05-08-22-to-05-14-22/">https://www.jongood.com/cyber-security-news-weekly-recap-05-08-22-to-05-14-22/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://www.jongood.com/cyber-security-news-weekly-recap-05-08-22-to-05-14-22/">https://www.jongood.com/cyber-security-news-weekly-recap-05-08-22-to-05-14-22/</a></p>]]>
      </content:encoded>
      <pubDate>Sun, 15 May 2022 12:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/5ba9e49b/b0d62960.mp3" length="71155916" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>2219</itunes:duration>
      <itunes:summary>Cyber Security News // Weekly Recap (05/08/22 to 05/14/22)</itunes:summary>
      <itunes:subtitle>Cyber Security News // Weekly Recap (05/08/22 to 05/14/22)</itunes:subtitle>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cyber Security News // Weekly Recap (05/01/22 to 05/07/22)</title>
      <itunes:episode>8</itunes:episode>
      <podcast:episode>8</podcast:episode>
      <itunes:title>Cyber Security News // Weekly Recap (05/01/22 to 05/07/22)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5c2c811d-c3e6-4e0d-a65d-a8c031f1cb62</guid>
      <link>https://share.transistor.fm/s/645ce048</link>
      <description>
        <![CDATA[<p><a href="https://www.jongood.com/cyber-security-news-weekly-recap-05-01-22-to-05-07-22/">https://www.jongood.com/cyber-security-news-weekly-recap-05-01-22-to-05-07-22/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://www.jongood.com/cyber-security-news-weekly-recap-05-01-22-to-05-07-22/">https://www.jongood.com/cyber-security-news-weekly-recap-05-01-22-to-05-07-22/</a></p>]]>
      </content:encoded>
      <pubDate>Sat, 07 May 2022 12:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/645ce048/39aaf21b.mp3" length="52846809" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>1647</itunes:duration>
      <itunes:summary>Cyber Security News // Weekly Recap (05/01/22 to 05/07/22)</itunes:summary>
      <itunes:subtitle>Cyber Security News // Weekly Recap (05/01/22 to 05/07/22)</itunes:subtitle>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cyber Security News // Weekly Recap (04/24/22 to 04/30/22)</title>
      <itunes:episode>7</itunes:episode>
      <podcast:episode>7</podcast:episode>
      <itunes:title>Cyber Security News // Weekly Recap (04/24/22 to 04/30/22)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0653963e-890f-473d-bd7f-22394948081f</guid>
      <link>https://share.transistor.fm/s/66b13ea2</link>
      <description>
        <![CDATA[<p><a href="https://www.jongood.com/cyber-security-tldr-weekly-recap-04-24-22-to-04-30-22/">https://www.jongood.com/cyber-security-tldr-weekly-recap-04-24-22-to-04-30-22/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://www.jongood.com/cyber-security-tldr-weekly-recap-04-24-22-to-04-30-22/">https://www.jongood.com/cyber-security-tldr-weekly-recap-04-24-22-to-04-30-22/</a></p>]]>
      </content:encoded>
      <pubDate>Sun, 01 May 2022 12:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/66b13ea2/ada7b262.mp3" length="66646806" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>2078</itunes:duration>
      <itunes:summary>Cyber Security News // Weekly Recap (04/24/22 to 04/30/22)</itunes:summary>
      <itunes:subtitle>Cyber Security News // Weekly Recap (04/24/22 to 04/30/22)</itunes:subtitle>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Company Board is Accountable for Cyber Security // Cyber Security News</title>
      <itunes:episode>6</itunes:episode>
      <podcast:episode>6</podcast:episode>
      <itunes:title>Company Board is Accountable for Cyber Security // Cyber Security News</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3ab09878-c1ec-493e-9a63-a65db39b8ada</guid>
      <link>https://share.transistor.fm/s/e3719ff6</link>
      <description>
        <![CDATA[<p>For years companies have tried to avoid facing accountability for their lack of cyber security. Unfortunately for them, the increase in cyber attacks has dramatically increased the spotlight on inadequate practices and the SEC is going to do something about it. Similar to what we saw with the Sarbanes-Oxley Act, companies are going to find themselves in hot water if they continue to ignore cyber security implications of their actions.</p><p>Join me in this video as we talk about a recent article regarding the SEC’s interest in forcing companies to add the CISO role to the board. This is a topic that could impact companies and Cyber Security professionals around the world.</p><p>Article: <a href="https://www.forbes.com/sites/bobzukis/2022/04/18/the-sec-is-about-to-force-cisos-into-americas-boardrooms/?sh=54534a4d68a9">https://www.forbes.com/sites/bobzukis/2022/04/18/the-sec-is-about-to-force-cisos-into-americas-boardrooms/?sh=d2c286768a90</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>For years companies have tried to avoid facing accountability for their lack of cyber security. Unfortunately for them, the increase in cyber attacks has dramatically increased the spotlight on inadequate practices and the SEC is going to do something about it. Similar to what we saw with the Sarbanes-Oxley Act, companies are going to find themselves in hot water if they continue to ignore cyber security implications of their actions.</p><p>Join me in this video as we talk about a recent article regarding the SEC’s interest in forcing companies to add the CISO role to the board. This is a topic that could impact companies and Cyber Security professionals around the world.</p><p>Article: <a href="https://www.forbes.com/sites/bobzukis/2022/04/18/the-sec-is-about-to-force-cisos-into-americas-boardrooms/?sh=54534a4d68a9">https://www.forbes.com/sites/bobzukis/2022/04/18/the-sec-is-about-to-force-cisos-into-americas-boardrooms/?sh=d2c286768a90</a></p>]]>
      </content:encoded>
      <pubDate>Mon, 25 Apr 2022 07:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/e3719ff6/367d8b8f.mp3" length="18059847" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>560</itunes:duration>
      <itunes:summary>Do company boards need more "CYBER EXPERTISE?" The SEC says yes!</itunes:summary>
      <itunes:subtitle>Do company boards need more "CYBER EXPERTISE?" The SEC says yes!</itunes:subtitle>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cyber Security News // Weekly Recap (04/17/22 to 04/23/22)</title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>Cyber Security News // Weekly Recap (04/17/22 to 04/23/22)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">fd8ccef3-0107-4c77-a9a9-4cb27aa9c5c6</guid>
      <link>https://share.transistor.fm/s/e1d318f7</link>
      <description>
        <![CDATA[<p><a href="https://www.jongood.com/cyber-security-tldr-weekly-recap-04-17-22-to-04-23-22/">https://www.jongood.com/cyber-security-tldr-weekly-recap-04-17-22-to-04-23-22/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://www.jongood.com/cyber-security-tldr-weekly-recap-04-17-22-to-04-23-22/">https://www.jongood.com/cyber-security-tldr-weekly-recap-04-17-22-to-04-23-22/</a></p>]]>
      </content:encoded>
      <pubDate>Sat, 23 Apr 2022 12:07:58 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/e1d318f7/8ffa94d9.mp3" length="56807182" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>1771</itunes:duration>
      <itunes:summary>Cyber Security News // Weekly Recap (04/17/22 to 04/23/22)</itunes:summary>
      <itunes:subtitle>Cyber Security News // Weekly Recap (04/17/22 to 04/23/22)</itunes:subtitle>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cyber Security News // Weekly Recap (04/10/22 to 04/16/22)</title>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:title>Cyber Security News // Weekly Recap (04/10/22 to 04/16/22)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">818d1b1b-0e67-4f95-bb7b-490aa65dd61b</guid>
      <link>https://share.transistor.fm/s/d84f8679</link>
      <description>
        <![CDATA[<p><a href="https://www.jongood.com/cyber-security-tldr-weekly-recap-04-10-22-to-04-16-22/">https://www.jongood.com/cyber-security-tldr-weekly-recap-04-10-22-to-04-16-22/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><a href="https://www.jongood.com/cyber-security-tldr-weekly-recap-04-10-22-to-04-16-22/">https://www.jongood.com/cyber-security-tldr-weekly-recap-04-10-22-to-04-16-22/</a></p>]]>
      </content:encoded>
      <pubDate>Sat, 16 Apr 2022 16:21:45 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/d84f8679/eeef9f47.mp3" length="61276949" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>1911</itunes:duration>
      <itunes:summary>Cyber Security News // Weekly Recap (04/10/22 to 04/16/22)</itunes:summary>
      <itunes:subtitle>Cyber Security News // Weekly Recap (04/10/22 to 04/16/22)</itunes:subtitle>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cyber Security News // Weekly Recap (04/03/22 to 04/09/22)</title>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:title>Cyber Security News // Weekly Recap (04/03/22 to 04/09/22)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">af074208-e32c-4069-a89d-3992c064ebe6</guid>
      <link>https://share.transistor.fm/s/6885b030</link>
      <description>
        <![CDATA[<p>This episode provides a recap of Cyber Security news with expert analysis.</p><p><strong>TOP HEADLINES:<br></strong><a href="https://www.bleepingcomputer.com/news/security/new-borat-remote-access-malware-is-no-laughing-matter/">https://www.bleepingcomputer.com/news/security/new-borat-remote-access-malware-is-no-laughing-matter/</a><br><a href="https://www.theregister.com/2022/04/01/nsa_employee_secret_data_leak/">https://www.theregister.com/2022/04/01/nsa_employee_secret_data_leak/</a><br><a href="https://threatpost.com/cyberattackers-ups-backup-power-critical-environments/179169/">https://threatpost.com/cyberattackers-ups-backup-power-critical-environments/179169/</a><br><a href="https://www.theverge.com/2022/4/3/23008658/data-leak-russian-delivery-app-dining-habits-secret-police-yandex-food">https://www.theverge.com/2022/4/3/23008658/data-leak-russian-delivery-app-dining-habits-secret-police-yandex-food</a><br><a href="https://therecord.media/state-department-launched-new-cyber-bureau/">https://therecord.media/state-department-launched-new-cyber-bureau/</a><br><a href="https://www.cyberscoop.com/debate-u-s-cyber-command-lose-cyber-ops-authorities/">https://www.cyberscoop.com/debate-u-s-cyber-command-lose-cyber-ops-authorities/</a><br><a href="https://www.bleepingcomputer.com/news/legal/germany-takes-down-hydra-worlds-largest-darknet-market/">https://www.bleepingcomputer.com/news/legal/germany-takes-down-hydra-worlds-largest-darknet-market/</a><br><a href="https://therecord.media/doj-charges-russian-national-with-operating-worlds-largest-darknet-market/">https://therecord.media/doj-charges-russian-national-with-operating-worlds-largest-darknet-market/</a><br><a href="https://www.cybersecurity-insiders.com/anonymous-leaks-all-personal-details-of-russian-soldiers-invading-ukraine/?utm_source=feedly&amp;utm_medium=rss&amp;utm_campaign=anonymous-leaks-all-personal-details-of-russian-soldiers-invading-ukraine">https://www.cybersecurity-insiders.com/anonymous-leaks-all-personal-details-of-russian-soldiers-invading-ukraine/?utm_source=feedly&amp;utm_medium=rss&amp;utm_campaign=anonymous-leaks-all-personal-details-of-russian-soldiers-invading-ukraine</a><br><a href="https://www.cyberscoop.com/war-crimes-phishing-attempts-russia-ukraine/">https://www.cyberscoop.com/war-crimes-phishing-attempts-russia-ukraine/</a><br><a href="https://www.securityweek.com/cashapp-says-ex-employee-stole-customer-stock-trading-data">https://www.securityweek.com/cashapp-says-ex-employee-stole-customer-stock-trading-data</a><br><a href="https://www.cyberscoop.com/russian-botnet-disrupted-garland-doj/">https://www.cyberscoop.com/russian-botnet-disrupted-garland-doj/</a><br><a href="https://www.theverge.com/2022/4/5/23012046/twitter-prisoner-of-war-pow-photos-rules-russian-government-accounts?scrolla=5eb6d68b7fedc32c19ef33b4">https://www.theverge.com/2022/4/5/23012046/twitter-prisoner-of-war-pow-photos-rules-russian-government-accounts?scrolla=5eb6d68b7fedc32c19ef33b4</a><br><a href="https://www.wsj.com/articles/hackers-stole-more-than-600-million-in-crypto-laundering-it-is-the-tricky-part-11649237401?mod=djemalertNEWS">https://www.wsj.com/articles/hackers-stole-more-than-600-million-in-crypto-laundering-it-is-the-tricky-part-11649237401?mod=djemalertNEWS</a><br><a href="https://www.wsj.com/articles/apps-with-hidden-data-harvesting-software-are-banned-by-google-11649261181?mod=djemalertNEWS">https://www.wsj.com/articles/apps-with-hidden-data-harvesting-software-are-banned-by-google-11649261181?mod=djemalertNEWS</a><br><a href="https://threatpost.com/attackers-whatsapp-voice-message/179244/">https://threatpost.com/attackers-whatsapp-voice-message/179244/</a><br><a href="https://www.cyberscoop.com/chinese-hackers-india-power-grid-recorded-future-red-echo/">https://www.cyberscoop.com/chinese-hackers-india-power-grid-recorded-future-red-echo/</a><br><a href="https://www.bbc.com/news/technology-61009163">https://www.bbc.com/news/technology-61009163</a></p><p><strong>CAREERS:<br></strong><a href="https://www.darkreading.com/edge-articles/accelerating-onto-the-on-ramp-for-cybersecurity-jobs">https://www.darkreading.com/edge-articles/accelerating-onto-the-on-ramp-for-cybersecurity-jobs</a></p><p><strong>VULNERABILITIES:<br></strong><a href="https://threatpost.com/apple-rushes-out-patches-0-days-macos-ios/179222/">https://threatpost.com/apple-rushes-out-patches-0-days-macos-ios/179222/</a><br><a href="https://securityaffairs.co/wordpress/129784/apt/deep-panda-fire-chili-rootkit.html">https://securityaffairs.co/wordpress/129784/apt/deep-panda-fire-chili-rootkit.html</a><br><a href="https://www.darkreading.com/application-security/vulnerable-spring-framework-instances-estimated-at-possibly-millions">https://www.darkreading.com/application-security/vulnerable-spring-framework-instances-estimated-at-possibly-millions</a><br><a href="https://www.helpnetsecurity.com/2022/04/05/spring4shell-exploited/">https://www.helpnetsecurity.com/2022/04/05/spring4shell-exploited/</a><br><a href="https://www.bleepingcomputer.com/news/hardware/amd-confirms-gpu-driver-bug-overclocks-cpus-without-permission/">https://www.bleepingcomputer.com/news/hardware/amd-confirms-gpu-driver-bug-overclocks-cpus-without-permission/</a><br><a href="https://securityaffairs.co/wordpress/129942/hacking/cve-2022-22292-hack-samsung-android-devices.html">https://securityaffairs.co/wordpress/129942/hacking/cve-2022-22292-hack-samsung-android-devices.html</a><br><a href="https://www.theregister.com/2022/04/07/adobe_cloud_malware/">https://www.theregister.com/2022/04/07/adobe_cloud_malware/</a></p><p><strong>OTHER NEWS:<br></strong><a href="https://grahamcluley.com/trezor-wallets-hacked-dont-be-duped-by-phishing-attack-email/">https://grahamcluley.com/trezor-wallets-hacked-dont-be-duped-by-phishing-attack-email/</a><br><a href="https://www.bleepingcomputer.com/news/security/hackers-breach-mailchimps-internal-tools-to-target-crypto-customers/">https://www.bleepingcomputer.com/news/security/hackers-breach-mailchimps-internal-tools-to-target-crypto-customers/</a><br><a href="https://techcrunch.com/2022/04/04/q1-crypto-losses-spike-695-on-year-following-massive-hacks/">https://techcrunch.com/2022/04/04/q1-crypto-losses-spike-695-on-year-following-massive-hacks/</a><br><a href="https://www.csoonline.com/article/3655637/upstart-crime-site-woos-raid-forums-orphans.html">https://www.csoonline.com/article/3655637/upstart-crime-site-woos-raid-forums-orphans.html</a><br><a href="https://www.bleepingcomputer.com/news/technology/russians-bypass-website-blocks-to-access-western-news-sources/">https://www.bleepingcomputer.com/news/technology/russians-bypass-website-blocks-to-access-western-news-sources/</a><br><a href="https://www.theguardian.com/technology/2022/apr/01/china-accused-of-launching-cyber-attacks-on-ukraine-before-russian-invasion">https://www.theguardian.com/technology/2022/apr/01/china-accused-of-launching-cyber-attacks-on-ukraine-before-russian-invasion</a><br><a href="https://www.infosecurity-magazine.com/news/cadbury-warns-of-easter-egg-scam/">https://www.infosecurity-magazine.com/news/cadbury-warns-of-easter-egg-scam/</a><br><a href="https://www.zdnet.com/article/github-now-scans-for-secret-leaks-in-push-workflows/#ftag=RSSbaffb68">https://www.zdnet.com/article/github-now-scans-for-secret-leaks-in-push-workflows/#ftag=RSSbaffb68</a><br><a href="https://www.bleepingcomputer.com/news/security/microsoft-adds-on-premises-exchange-sharepoint-to-bug-bounty-program/">https://www.bleepingcomputer.com/news/security/microsoft-adds-on-premises-exchange-sharepoint-to-bug-bounty-program/</a><br><a href="https://www.helpnetsecurity.com/2022/04/05/cyberattacks-healthcare-providers/">https://www.helpnetsecurity.com/2022/04/05/cyberattacks-healthcare-providers/</a><br><a href="https://www.engadget.com/windows-11-file-explorer-tabs-cloud-based-redesign-154512479.html">https://www.engadget.com/windows-11-file-explorer-tabs-cloud-based-red...</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode provides a recap of Cyber Security news with expert analysis.</p><p><strong>TOP HEADLINES:<br></strong><a href="https://www.bleepingcomputer.com/news/security/new-borat-remote-access-malware-is-no-laughing-matter/">https://www.bleepingcomputer.com/news/security/new-borat-remote-access-malware-is-no-laughing-matter/</a><br><a href="https://www.theregister.com/2022/04/01/nsa_employee_secret_data_leak/">https://www.theregister.com/2022/04/01/nsa_employee_secret_data_leak/</a><br><a href="https://threatpost.com/cyberattackers-ups-backup-power-critical-environments/179169/">https://threatpost.com/cyberattackers-ups-backup-power-critical-environments/179169/</a><br><a href="https://www.theverge.com/2022/4/3/23008658/data-leak-russian-delivery-app-dining-habits-secret-police-yandex-food">https://www.theverge.com/2022/4/3/23008658/data-leak-russian-delivery-app-dining-habits-secret-police-yandex-food</a><br><a href="https://therecord.media/state-department-launched-new-cyber-bureau/">https://therecord.media/state-department-launched-new-cyber-bureau/</a><br><a href="https://www.cyberscoop.com/debate-u-s-cyber-command-lose-cyber-ops-authorities/">https://www.cyberscoop.com/debate-u-s-cyber-command-lose-cyber-ops-authorities/</a><br><a href="https://www.bleepingcomputer.com/news/legal/germany-takes-down-hydra-worlds-largest-darknet-market/">https://www.bleepingcomputer.com/news/legal/germany-takes-down-hydra-worlds-largest-darknet-market/</a><br><a href="https://therecord.media/doj-charges-russian-national-with-operating-worlds-largest-darknet-market/">https://therecord.media/doj-charges-russian-national-with-operating-worlds-largest-darknet-market/</a><br><a href="https://www.cybersecurity-insiders.com/anonymous-leaks-all-personal-details-of-russian-soldiers-invading-ukraine/?utm_source=feedly&amp;utm_medium=rss&amp;utm_campaign=anonymous-leaks-all-personal-details-of-russian-soldiers-invading-ukraine">https://www.cybersecurity-insiders.com/anonymous-leaks-all-personal-details-of-russian-soldiers-invading-ukraine/?utm_source=feedly&amp;utm_medium=rss&amp;utm_campaign=anonymous-leaks-all-personal-details-of-russian-soldiers-invading-ukraine</a><br><a href="https://www.cyberscoop.com/war-crimes-phishing-attempts-russia-ukraine/">https://www.cyberscoop.com/war-crimes-phishing-attempts-russia-ukraine/</a><br><a href="https://www.securityweek.com/cashapp-says-ex-employee-stole-customer-stock-trading-data">https://www.securityweek.com/cashapp-says-ex-employee-stole-customer-stock-trading-data</a><br><a href="https://www.cyberscoop.com/russian-botnet-disrupted-garland-doj/">https://www.cyberscoop.com/russian-botnet-disrupted-garland-doj/</a><br><a href="https://www.theverge.com/2022/4/5/23012046/twitter-prisoner-of-war-pow-photos-rules-russian-government-accounts?scrolla=5eb6d68b7fedc32c19ef33b4">https://www.theverge.com/2022/4/5/23012046/twitter-prisoner-of-war-pow-photos-rules-russian-government-accounts?scrolla=5eb6d68b7fedc32c19ef33b4</a><br><a href="https://www.wsj.com/articles/hackers-stole-more-than-600-million-in-crypto-laundering-it-is-the-tricky-part-11649237401?mod=djemalertNEWS">https://www.wsj.com/articles/hackers-stole-more-than-600-million-in-crypto-laundering-it-is-the-tricky-part-11649237401?mod=djemalertNEWS</a><br><a href="https://www.wsj.com/articles/apps-with-hidden-data-harvesting-software-are-banned-by-google-11649261181?mod=djemalertNEWS">https://www.wsj.com/articles/apps-with-hidden-data-harvesting-software-are-banned-by-google-11649261181?mod=djemalertNEWS</a><br><a href="https://threatpost.com/attackers-whatsapp-voice-message/179244/">https://threatpost.com/attackers-whatsapp-voice-message/179244/</a><br><a href="https://www.cyberscoop.com/chinese-hackers-india-power-grid-recorded-future-red-echo/">https://www.cyberscoop.com/chinese-hackers-india-power-grid-recorded-future-red-echo/</a><br><a href="https://www.bbc.com/news/technology-61009163">https://www.bbc.com/news/technology-61009163</a></p><p><strong>CAREERS:<br></strong><a href="https://www.darkreading.com/edge-articles/accelerating-onto-the-on-ramp-for-cybersecurity-jobs">https://www.darkreading.com/edge-articles/accelerating-onto-the-on-ramp-for-cybersecurity-jobs</a></p><p><strong>VULNERABILITIES:<br></strong><a href="https://threatpost.com/apple-rushes-out-patches-0-days-macos-ios/179222/">https://threatpost.com/apple-rushes-out-patches-0-days-macos-ios/179222/</a><br><a href="https://securityaffairs.co/wordpress/129784/apt/deep-panda-fire-chili-rootkit.html">https://securityaffairs.co/wordpress/129784/apt/deep-panda-fire-chili-rootkit.html</a><br><a href="https://www.darkreading.com/application-security/vulnerable-spring-framework-instances-estimated-at-possibly-millions">https://www.darkreading.com/application-security/vulnerable-spring-framework-instances-estimated-at-possibly-millions</a><br><a href="https://www.helpnetsecurity.com/2022/04/05/spring4shell-exploited/">https://www.helpnetsecurity.com/2022/04/05/spring4shell-exploited/</a><br><a href="https://www.bleepingcomputer.com/news/hardware/amd-confirms-gpu-driver-bug-overclocks-cpus-without-permission/">https://www.bleepingcomputer.com/news/hardware/amd-confirms-gpu-driver-bug-overclocks-cpus-without-permission/</a><br><a href="https://securityaffairs.co/wordpress/129942/hacking/cve-2022-22292-hack-samsung-android-devices.html">https://securityaffairs.co/wordpress/129942/hacking/cve-2022-22292-hack-samsung-android-devices.html</a><br><a href="https://www.theregister.com/2022/04/07/adobe_cloud_malware/">https://www.theregister.com/2022/04/07/adobe_cloud_malware/</a></p><p><strong>OTHER NEWS:<br></strong><a href="https://grahamcluley.com/trezor-wallets-hacked-dont-be-duped-by-phishing-attack-email/">https://grahamcluley.com/trezor-wallets-hacked-dont-be-duped-by-phishing-attack-email/</a><br><a href="https://www.bleepingcomputer.com/news/security/hackers-breach-mailchimps-internal-tools-to-target-crypto-customers/">https://www.bleepingcomputer.com/news/security/hackers-breach-mailchimps-internal-tools-to-target-crypto-customers/</a><br><a href="https://techcrunch.com/2022/04/04/q1-crypto-losses-spike-695-on-year-following-massive-hacks/">https://techcrunch.com/2022/04/04/q1-crypto-losses-spike-695-on-year-following-massive-hacks/</a><br><a href="https://www.csoonline.com/article/3655637/upstart-crime-site-woos-raid-forums-orphans.html">https://www.csoonline.com/article/3655637/upstart-crime-site-woos-raid-forums-orphans.html</a><br><a href="https://www.bleepingcomputer.com/news/technology/russians-bypass-website-blocks-to-access-western-news-sources/">https://www.bleepingcomputer.com/news/technology/russians-bypass-website-blocks-to-access-western-news-sources/</a><br><a href="https://www.theguardian.com/technology/2022/apr/01/china-accused-of-launching-cyber-attacks-on-ukraine-before-russian-invasion">https://www.theguardian.com/technology/2022/apr/01/china-accused-of-launching-cyber-attacks-on-ukraine-before-russian-invasion</a><br><a href="https://www.infosecurity-magazine.com/news/cadbury-warns-of-easter-egg-scam/">https://www.infosecurity-magazine.com/news/cadbury-warns-of-easter-egg-scam/</a><br><a href="https://www.zdnet.com/article/github-now-scans-for-secret-leaks-in-push-workflows/#ftag=RSSbaffb68">https://www.zdnet.com/article/github-now-scans-for-secret-leaks-in-push-workflows/#ftag=RSSbaffb68</a><br><a href="https://www.bleepingcomputer.com/news/security/microsoft-adds-on-premises-exchange-sharepoint-to-bug-bounty-program/">https://www.bleepingcomputer.com/news/security/microsoft-adds-on-premises-exchange-sharepoint-to-bug-bounty-program/</a><br><a href="https://www.helpnetsecurity.com/2022/04/05/cyberattacks-healthcare-providers/">https://www.helpnetsecurity.com/2022/04/05/cyberattacks-healthcare-providers/</a><br><a href="https://www.engadget.com/windows-11-file-explorer-tabs-cloud-based-redesign-154512479.html">https://www.engadget.com/windows-11-file-explorer-tabs-cloud-based-red...</a></p>]]>
      </content:encoded>
      <pubDate>Sun, 10 Apr 2022 12:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/6885b030/d1c739e2.mp3" length="51886566" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>1617</itunes:duration>
      <itunes:summary>Cyber Security News // Weekly Recap (04/03/22 to 04/09/22)</itunes:summary>
      <itunes:subtitle>Cyber Security News // Weekly Recap (04/03/22 to 04/09/22)</itunes:subtitle>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cyber Security News // Weekly Recap (03/27/22 to 04/02/22)</title>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>Cyber Security News // Weekly Recap (03/27/22 to 04/02/22)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d6d9b0bb-4661-4ef4-9a99-c035e13de4c8</guid>
      <link>https://share.transistor.fm/s/81376096</link>
      <description>
        <![CDATA[<p>Cyber Security News // Weekly Recap (03/27/22 to 04/02/22)</p><p><strong>MAJOR HEADLINES:</strong></p><ul><li><a href="https://www.bleepingcomputer.com/news/security/okta-we-made-a-mistake-delaying-the-lapsus-hack-disclosure/">https://www.bleepingcomputer.com/news/security/okta-we-made-a-mistake-delaying-the-lapsus-hack-disclosure/</a></li><li><a href="https://www.theregister.com/2022/03/25/honda_civic_hack/">https://www.theregister.com/2022/03/25/honda_civic_hack/</a></li><li><a href="https://www.theregister.com/2022/03/26/lumu-ransomware-precursor-malware/">https://www.theregister.com/2022/03/26/lumu-ransomware-precursor-malware/</a></li><li><a href="https://www.forbes.com/sites/thomasbrewster/2022/03/28/huge-cyberattack-on-ukrtelecom-biggest-since-russian-invasion-crashes-ukraine-telecom/?sh=6329284b7dc2">https://www.forbes.com/sites/thomasbrewster/2022/03/28/huge-cyberattack-on-ukrtelecom-biggest-since-russian-invasion-crashes-ukraine-telecom/?sh=6329284b7dc2</a></li><li><a href="https://theintercept.com/2022/03/28/google-russia-ukraine-war-censorship/">https://theintercept.com/2022/03/28/google-russia-ukraine-war-censorship/</a></li><li><a href="https://www.zdnet.com/article/ukraine-takes-out-five-bot-farms-spreading-panic-among-citizens/#ftag=RSSbaffb68">https://www.zdnet.com/article/ukraine-takes-out-five-bot-farms-spreading-panic-among-citizens/#ftag=RSSbaffb68</a></li><li><a href="https://www.infosecurity-magazine.com/news/yandex-is-sending-ios-users-data/">https://www.infosecurity-magazine.com/news/yandex-is-sending-ios-users-data/</a></li><li><a href="https://www.bleepingcomputer.com/news/security/hacked-wordpress-sites-force-visitors-to-ddos-ukrainian-targets/">https://www.bleepingcomputer.com/news/security/hacked-wordpress-sites-force-visitors-to-ddos-ukrainian-targets/</a></li><li><a href="https://www.cyberscoop.com/biden-fiscal-2023-budget-request-civilian-agencies-cybersecurity/">https://www.cyberscoop.com/biden-fiscal-2023-budget-request-civilian-agencies-cybersecurity/</a></li><li><a href="https://arstechnica.com/information-technology/2022/03/lapsus-and-solar-winds-hackers-both-use-the-same-old-trick-to-bypass-mfa/">https://arstechnica.com/information-technology/2022/03/lapsus-and-solar-winds-hackers-both-use-the-same-old-trick-to-bypass-mfa/</a></li></ul><p><br><strong>VULNERABILITIES:</strong></p><ul><li><a href="https://www.bleepingcomputer.com/news/security/critical-sophos-firewall-vulnerability-allows-remote-code-execution/">https://www.bleepingcomputer.com/news/security/critical-sophos-firewall-vulnerability-allows-remote-code-execution/</a></li><li><a href="https://www.securityweek.com/google-issues-emergency-fix-chrome-zero-day">https://www.securityweek.com/google-issues-emergency-fix-chrome-zero-day</a></li><li><a href="https://blogs.cisco.com/security/emotet-is-back">https://blogs.cisco.com/security/emotet-is-back</a></li><li><a href="https://www.zdnet.com/article/log4shell-exploited-to-infect-vmware-horizon-servers-with-backdoors-crypto-miners/#ftag=RSSbaffb68">https://www.zdnet.com/article/log4shell-exploited-to-infect-vmware-horizon-servers-with-backdoors-crypto-miners/#ftag=RSSbaffb68</a></li><li><a href="https://www.bleepingcomputer.com/news/security/wyze-cam-flaw-lets-hackers-remotely-access-your-saved-videos/">https://www.bleepingcomputer.com/news/security/wyze-cam-flaw-lets-hackers-remotely-access-your-saved-videos/</a></li></ul><p><br><strong>OTHER NEWS:</strong></p><ul><li><a href="https://securityaffairs.co/wordpress/129502/hacking/cisa-known-exploited-vulnerabilities-catalog-66.html">https://securityaffairs.co/wordpress/129502/hacking/cisa-known-exploited-vulnerabilities-catalog-66.html</a></li><li><a href="https://www.bleepingcomputer.com/news/microsoft/new-windows-security-feature-blocks-vulnerable-drivers/">https://www.bleepingcomputer.com/news/microsoft/new-windows-security-feature-blocks-vulnerable-drivers/</a></li><li><a href="https://www.npr.org/2022/03/27/1088140809/fake-linkedin-profiles">https://www.npr.org/2022/03/27/1088140809/fake-linkedin-profiles</a></li><li><a href="https://www.infosecurity-magazine.com/news/ransomware-attacks-soar-100-2021/">https://www.infosecurity-magazine.com/news/ransomware-attacks-soar-100-2021/</a></li><li><a href="https://isc.sans.edu/diary/rss/28492">https://isc.sans.edu/diary/rss/28492</a></li><li><a href="https://www.securitymagazine.com/articles/97321-1-in-4-employees-who-fell-victim-to-cyberattacks-lost-their-jobs">https://www.securitymagazine.com/articles/97321-1-in-4-employees-who-fell-victim-to-cyberattacks-lost-their-jobs</a></li><li><a href="https://www.infosecurity-magazine.com/news/dental-upi-shared-patient-data/">https://www.infosecurity-magazine.com/news/dental-upi-shared-patient-data/</a></li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Cyber Security News // Weekly Recap (03/27/22 to 04/02/22)</p><p><strong>MAJOR HEADLINES:</strong></p><ul><li><a href="https://www.bleepingcomputer.com/news/security/okta-we-made-a-mistake-delaying-the-lapsus-hack-disclosure/">https://www.bleepingcomputer.com/news/security/okta-we-made-a-mistake-delaying-the-lapsus-hack-disclosure/</a></li><li><a href="https://www.theregister.com/2022/03/25/honda_civic_hack/">https://www.theregister.com/2022/03/25/honda_civic_hack/</a></li><li><a href="https://www.theregister.com/2022/03/26/lumu-ransomware-precursor-malware/">https://www.theregister.com/2022/03/26/lumu-ransomware-precursor-malware/</a></li><li><a href="https://www.forbes.com/sites/thomasbrewster/2022/03/28/huge-cyberattack-on-ukrtelecom-biggest-since-russian-invasion-crashes-ukraine-telecom/?sh=6329284b7dc2">https://www.forbes.com/sites/thomasbrewster/2022/03/28/huge-cyberattack-on-ukrtelecom-biggest-since-russian-invasion-crashes-ukraine-telecom/?sh=6329284b7dc2</a></li><li><a href="https://theintercept.com/2022/03/28/google-russia-ukraine-war-censorship/">https://theintercept.com/2022/03/28/google-russia-ukraine-war-censorship/</a></li><li><a href="https://www.zdnet.com/article/ukraine-takes-out-five-bot-farms-spreading-panic-among-citizens/#ftag=RSSbaffb68">https://www.zdnet.com/article/ukraine-takes-out-five-bot-farms-spreading-panic-among-citizens/#ftag=RSSbaffb68</a></li><li><a href="https://www.infosecurity-magazine.com/news/yandex-is-sending-ios-users-data/">https://www.infosecurity-magazine.com/news/yandex-is-sending-ios-users-data/</a></li><li><a href="https://www.bleepingcomputer.com/news/security/hacked-wordpress-sites-force-visitors-to-ddos-ukrainian-targets/">https://www.bleepingcomputer.com/news/security/hacked-wordpress-sites-force-visitors-to-ddos-ukrainian-targets/</a></li><li><a href="https://www.cyberscoop.com/biden-fiscal-2023-budget-request-civilian-agencies-cybersecurity/">https://www.cyberscoop.com/biden-fiscal-2023-budget-request-civilian-agencies-cybersecurity/</a></li><li><a href="https://arstechnica.com/information-technology/2022/03/lapsus-and-solar-winds-hackers-both-use-the-same-old-trick-to-bypass-mfa/">https://arstechnica.com/information-technology/2022/03/lapsus-and-solar-winds-hackers-both-use-the-same-old-trick-to-bypass-mfa/</a></li></ul><p><br><strong>VULNERABILITIES:</strong></p><ul><li><a href="https://www.bleepingcomputer.com/news/security/critical-sophos-firewall-vulnerability-allows-remote-code-execution/">https://www.bleepingcomputer.com/news/security/critical-sophos-firewall-vulnerability-allows-remote-code-execution/</a></li><li><a href="https://www.securityweek.com/google-issues-emergency-fix-chrome-zero-day">https://www.securityweek.com/google-issues-emergency-fix-chrome-zero-day</a></li><li><a href="https://blogs.cisco.com/security/emotet-is-back">https://blogs.cisco.com/security/emotet-is-back</a></li><li><a href="https://www.zdnet.com/article/log4shell-exploited-to-infect-vmware-horizon-servers-with-backdoors-crypto-miners/#ftag=RSSbaffb68">https://www.zdnet.com/article/log4shell-exploited-to-infect-vmware-horizon-servers-with-backdoors-crypto-miners/#ftag=RSSbaffb68</a></li><li><a href="https://www.bleepingcomputer.com/news/security/wyze-cam-flaw-lets-hackers-remotely-access-your-saved-videos/">https://www.bleepingcomputer.com/news/security/wyze-cam-flaw-lets-hackers-remotely-access-your-saved-videos/</a></li></ul><p><br><strong>OTHER NEWS:</strong></p><ul><li><a href="https://securityaffairs.co/wordpress/129502/hacking/cisa-known-exploited-vulnerabilities-catalog-66.html">https://securityaffairs.co/wordpress/129502/hacking/cisa-known-exploited-vulnerabilities-catalog-66.html</a></li><li><a href="https://www.bleepingcomputer.com/news/microsoft/new-windows-security-feature-blocks-vulnerable-drivers/">https://www.bleepingcomputer.com/news/microsoft/new-windows-security-feature-blocks-vulnerable-drivers/</a></li><li><a href="https://www.npr.org/2022/03/27/1088140809/fake-linkedin-profiles">https://www.npr.org/2022/03/27/1088140809/fake-linkedin-profiles</a></li><li><a href="https://www.infosecurity-magazine.com/news/ransomware-attacks-soar-100-2021/">https://www.infosecurity-magazine.com/news/ransomware-attacks-soar-100-2021/</a></li><li><a href="https://isc.sans.edu/diary/rss/28492">https://isc.sans.edu/diary/rss/28492</a></li><li><a href="https://www.securitymagazine.com/articles/97321-1-in-4-employees-who-fell-victim-to-cyberattacks-lost-their-jobs">https://www.securitymagazine.com/articles/97321-1-in-4-employees-who-fell-victim-to-cyberattacks-lost-their-jobs</a></li><li><a href="https://www.infosecurity-magazine.com/news/dental-upi-shared-patient-data/">https://www.infosecurity-magazine.com/news/dental-upi-shared-patient-data/</a></li></ul>]]>
      </content:encoded>
      <pubDate>Sun, 03 Apr 2022 16:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/81376096/37fec555.mp3" length="51383793" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>1601</itunes:duration>
      <itunes:summary>Cyber Security News // Weekly Recap (03/27/22 to 04/02/22)</itunes:summary>
      <itunes:subtitle>Cyber Security News // Weekly Recap (03/27/22 to 04/02/22)</itunes:subtitle>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cyber Security News // Weekly Recap (03/20/22 to 03/26/22)</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Cyber Security News // Weekly Recap (03/20/22 to 03/26/22)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8c003dc0-40d6-4948-9d0f-106681250b99</guid>
      <link>https://share.transistor.fm/s/78bd1a0e</link>
      <description>
        <![CDATA[<p>Cyber Security News // Weekly Recap (03/20/22 to 03/26/22)</p><p><strong>UKRAINE &amp; RUSSIA CONFLICT:</strong></p><ul><li>https://www.cyberscoop.com/satellite-cybersecurity-cisa-fbi-ukraine/</li><li>https://www.darkreading.com/risk/white-house-warns-of-new-intel-on-russia-mulling-cyberattack-options-against-us</li><li>https://www.csoonline.com/article/3654298/developer-sabotages-own-npm-module-prompting-open-source-supply-chain-security-questions.html</li><li>https://www.bleepingcomputer.com/news/security/more-conti-ransomware-source-code-leaked-on-twitter-out-of-revenge/</li><li>https://www.reuters.com/technology/meta-asks-russian-court-dismiss-proceedings-extremism-case-reports-2022-03-21/</li><li>https://securityaffairs.co/wordpress/129382/hacktivism/anonymous-hacked-nestle-leaked-data.html?utm_source=feedly&amp;utm_medium=rss&amp;utm_campaign=anonymous-hacked-nestle-leaked-data</li><li>https://threatpost.com/russia-cyberattacks-us-infrastructure/179037/</li><li>https://www.msn.com/en-us/news/world/israel-blocked-ukraine-from-getting-potent-pegasus-spyware/ar-AAVpB74</li><li>https://www.infosecurity-magazine.com/news/west-blocks-russias-weather-data/</li><li>https://securityaffairs.co/wordpress/129431/hacktivism/anonymous-hacked-central-bank-of-russia.html</li><li>https://www.zdnet.com/article/mustang-panda-hacking-group-takes-advantage-of-ukraine-crisis-in-new-attacks/</li></ul><p><br><strong>LAPSUS$ ATTACKS:</strong></p><ul><li>https://www.cybersecurity-insiders.com/lapsus-ransomware-attack-on-okta-leads-to-a-data-breach/?utm_source=feedly&amp;utm_medium=rss&amp;utm_campaign=lapsus-ransomware-attack-on-okta-leads-to-a-data-breach</li><li>https://www.darkreading.com/attacks-breaches/okta-says-366-customers-impacted-via-third-party-breach</li><li>https://www.bleepingcomputer.com/news/microsoft/lapsus-hackers-leak-37gb-of-microsofts-alleged-source-code/</li><li>https://www.theverge.com/2022/3/22/22991409/lapsus-microsoft-security-windows-source-code</li><li>https://techcrunch.com/2022/03/24/london-police-lapsus-arrests/</li></ul><p><br><strong>OTHER NOTABLE ATTACK TTPS:</strong></p><ul><li>https://thehackernews.com/2022/03/new-browser-in-browser-bitb-attack.html</li><li>https://www.darkreading.com/attacks-breaches/threat-actor-using-unique-attack-chain-to-drop-backdoor-in-new-phishing-campaign</li><li>https://www.bleepingcomputer.com/news/security/hackers-steal-from-hackers-by-pushing-fake-malware-on-forums/</li><li>https://threatpost.com/deadbolt-ransomware-qnap-again/179057/</li><li>https://www.bleepingcomputer.com/news/security/north-korean-hackers-exploit-chrome-zero-day-weeks-before-patch/</li></ul><p><br><strong>CYBER CAREERS &amp; EDUCATION:</strong></p><ul><li>https://www.protocol.com/bulletins/microsofts-cybersecurity-skilling-initiative-is-going-global</li><li>https://www.darkreading.com/remote-workforce/pandemic-leaves-firms-scrambling-for-cybersecurity-specialists</li></ul><p><br><strong>OTHER CYBER NEWS:</strong></p><ul><li>https://www.infosecurity-magazine.com/news/cloudbased-email-threats-surge-2021/</li><li>https://www.infosecurity-magazine.com/news/ftc-cafepress-data-cover-up/</li><li>https://www.theverge.com/2022/3/20/22988183/telegrams-ban-brazil-lifted-president-bolsonaro</li><li>https://gizmodo.com/scripps-national-spelling-bee-website-hacked-1848669629</li><li>https://www.cnet.com/tech/computing/internet-crime-cost-people-more-than-6-9b-in-2021-fbi-says/</li><li>https://www.infosecurity-magazine.com/news/ransomware-encrypts-100k-files/</li></ul><p><br>#CyberSecurity #InformationSecurity #News</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Cyber Security News // Weekly Recap (03/20/22 to 03/26/22)</p><p><strong>UKRAINE &amp; RUSSIA CONFLICT:</strong></p><ul><li>https://www.cyberscoop.com/satellite-cybersecurity-cisa-fbi-ukraine/</li><li>https://www.darkreading.com/risk/white-house-warns-of-new-intel-on-russia-mulling-cyberattack-options-against-us</li><li>https://www.csoonline.com/article/3654298/developer-sabotages-own-npm-module-prompting-open-source-supply-chain-security-questions.html</li><li>https://www.bleepingcomputer.com/news/security/more-conti-ransomware-source-code-leaked-on-twitter-out-of-revenge/</li><li>https://www.reuters.com/technology/meta-asks-russian-court-dismiss-proceedings-extremism-case-reports-2022-03-21/</li><li>https://securityaffairs.co/wordpress/129382/hacktivism/anonymous-hacked-nestle-leaked-data.html?utm_source=feedly&amp;utm_medium=rss&amp;utm_campaign=anonymous-hacked-nestle-leaked-data</li><li>https://threatpost.com/russia-cyberattacks-us-infrastructure/179037/</li><li>https://www.msn.com/en-us/news/world/israel-blocked-ukraine-from-getting-potent-pegasus-spyware/ar-AAVpB74</li><li>https://www.infosecurity-magazine.com/news/west-blocks-russias-weather-data/</li><li>https://securityaffairs.co/wordpress/129431/hacktivism/anonymous-hacked-central-bank-of-russia.html</li><li>https://www.zdnet.com/article/mustang-panda-hacking-group-takes-advantage-of-ukraine-crisis-in-new-attacks/</li></ul><p><br><strong>LAPSUS$ ATTACKS:</strong></p><ul><li>https://www.cybersecurity-insiders.com/lapsus-ransomware-attack-on-okta-leads-to-a-data-breach/?utm_source=feedly&amp;utm_medium=rss&amp;utm_campaign=lapsus-ransomware-attack-on-okta-leads-to-a-data-breach</li><li>https://www.darkreading.com/attacks-breaches/okta-says-366-customers-impacted-via-third-party-breach</li><li>https://www.bleepingcomputer.com/news/microsoft/lapsus-hackers-leak-37gb-of-microsofts-alleged-source-code/</li><li>https://www.theverge.com/2022/3/22/22991409/lapsus-microsoft-security-windows-source-code</li><li>https://techcrunch.com/2022/03/24/london-police-lapsus-arrests/</li></ul><p><br><strong>OTHER NOTABLE ATTACK TTPS:</strong></p><ul><li>https://thehackernews.com/2022/03/new-browser-in-browser-bitb-attack.html</li><li>https://www.darkreading.com/attacks-breaches/threat-actor-using-unique-attack-chain-to-drop-backdoor-in-new-phishing-campaign</li><li>https://www.bleepingcomputer.com/news/security/hackers-steal-from-hackers-by-pushing-fake-malware-on-forums/</li><li>https://threatpost.com/deadbolt-ransomware-qnap-again/179057/</li><li>https://www.bleepingcomputer.com/news/security/north-korean-hackers-exploit-chrome-zero-day-weeks-before-patch/</li></ul><p><br><strong>CYBER CAREERS &amp; EDUCATION:</strong></p><ul><li>https://www.protocol.com/bulletins/microsofts-cybersecurity-skilling-initiative-is-going-global</li><li>https://www.darkreading.com/remote-workforce/pandemic-leaves-firms-scrambling-for-cybersecurity-specialists</li></ul><p><br><strong>OTHER CYBER NEWS:</strong></p><ul><li>https://www.infosecurity-magazine.com/news/cloudbased-email-threats-surge-2021/</li><li>https://www.infosecurity-magazine.com/news/ftc-cafepress-data-cover-up/</li><li>https://www.theverge.com/2022/3/20/22988183/telegrams-ban-brazil-lifted-president-bolsonaro</li><li>https://gizmodo.com/scripps-national-spelling-bee-website-hacked-1848669629</li><li>https://www.cnet.com/tech/computing/internet-crime-cost-people-more-than-6-9b-in-2021-fbi-says/</li><li>https://www.infosecurity-magazine.com/news/ransomware-encrypts-100k-files/</li></ul><p><br>#CyberSecurity #InformationSecurity #News</p>]]>
      </content:encoded>
      <pubDate>Sun, 27 Mar 2022 16:00:00 -0700</pubDate>
      <author>Jon Good</author>
      <enclosure url="https://media.transistor.fm/78bd1a0e/6fc5ce64.mp3" length="63512235" type="audio/mpeg"/>
      <itunes:author>Jon Good</itunes:author>
      <itunes:duration>1980</itunes:duration>
      <itunes:summary>Cyber Security News // Weekly Recap (03/20/22 to 03/26/22)</itunes:summary>
      <itunes:subtitle>Cyber Security News // Weekly Recap (03/20/22 to 03/26/22)</itunes:subtitle>
      <itunes:keywords>cyber security, cybersecurity, technology, news, hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
  </channel>
</rss>
