<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 3, 2026 at 5:41 pm by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://soteryan.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Soteryan</title>
		<link><![CDATA[https://soteryan.com]]></link>
		<description><![CDATA[Soteryan]]></description>
		<lastBuildDate><![CDATA[Tue, 24 Mar 2026 17:20:08 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://soteryan.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://soteryan.com/blog/the-phone-call-is-the-new-phishing-email/]]></guid>
			<link><![CDATA[https://soteryan.com/blog/the-phone-call-is-the-new-phishing-email/]]></link>
			<title>The phone call is the new phishing email</title>
			<pubDate><![CDATA[Tue, 24 Mar 2026 17:20:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://soteryan.com/blog/trivy-hack-spreads-infostealer-via-docker-triggers-worm-and-kubernetes-wiper/]]></guid>
			<link><![CDATA[https://soteryan.com/blog/trivy-hack-spreads-infostealer-via-docker-triggers-worm-and-kubernetes-wiper/]]></link>
			<title>Trivy Hack Spreads Infostealer via Docker, Triggers Worm and Kubernetes Wiper</title>
			<pubDate><![CDATA[Tue, 24 Mar 2026 17:19:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://soteryan.com/blog/crunchyroll-probes-breach-after-hacker-claims-to-steal-6-8m-users-data/]]></guid>
			<link><![CDATA[https://soteryan.com/blog/crunchyroll-probes-breach-after-hacker-claims-to-steal-6-8m-users-data/]]></link>
			<title>Crunchyroll probes breach after hacker claims to steal 6.8M users&#8217; data</title>
			<pubDate><![CDATA[Thu, 26 Mar 2026 13:54:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://soteryan.com/blog/device-code-phishing-hits-340-microsoft-365-orgs-across-five-countries-via-oauth-abuse/]]></guid>
			<link><![CDATA[https://soteryan.com/blog/device-code-phishing-hits-340-microsoft-365-orgs-across-five-countries-via-oauth-abuse/]]></link>
			<title>Device Code Phishing Hits 340+ Microsoft 365 Orgs Across Five Countries via OAuth Abuse</title>
			<pubDate><![CDATA[Thu, 26 Mar 2026 07:58:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://soteryan.com/zero-trust-security/]]></guid>
			<link><![CDATA[https://soteryan.com/zero-trust-security/]]></link>
			<title>Zero Trust Security</title>
			<pubDate><![CDATA[Mon, 24 Mar 2025 10:41:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://soteryan.com/]]></guid>
			<link><![CDATA[https://soteryan.com/]]></link>
			<title>Front Page</title>
			<pubDate><![CDATA[Mon, 24 Mar 2025 10:41:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://soteryan.com/blog/musician-admits-to-10m-streaming-royalty-fraud-using-ai-bots/]]></guid>
			<link><![CDATA[https://soteryan.com/blog/musician-admits-to-10m-streaming-royalty-fraud-using-ai-bots/]]></link>
			<title>Musician admits to $10M streaming royalty fraud using AI bots</title>
			<pubDate><![CDATA[Sun, 22 Mar 2026 19:06:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://soteryan.com/blog/contagious-interview-malware-delivered-through-fake-developer-job-interviews/]]></guid>
			<link><![CDATA[https://soteryan.com/blog/contagious-interview-malware-delivered-through-fake-developer-job-interviews/]]></link>
			<title>Contagious Interview: Malware delivered through fake developer job interviews</title>
			<pubDate><![CDATA[Thu, 12 Mar 2026 19:29:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://soteryan.com/blog/voidstealer-malware-steals-chrome-master-key-via-debugger-trick/]]></guid>
			<link><![CDATA[https://soteryan.com/blog/voidstealer-malware-steals-chrome-master-key-via-debugger-trick/]]></link>
			<title>VoidStealer malware steals Chrome master key via debugger trick</title>
			<pubDate><![CDATA[Mon, 23 Mar 2026 14:43:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://soteryan.com/blog/fbi-warns-russian-hackers-target-signal-whatsapp-in-mass-phishing-attacks/]]></guid>
			<link><![CDATA[https://soteryan.com/blog/fbi-warns-russian-hackers-target-signal-whatsapp-in-mass-phishing-attacks/]]></link>
			<title>FBI Warns Russian Hackers Target Signal, WhatsApp in Mass Phishing Attacks</title>
			<pubDate><![CDATA[Mon, 23 Mar 2026 08:01:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://soteryan.com/blog/attack-on-strykers-microsoft-environment-wiped-employee-devices-without-malware/]]></guid>
			<link><![CDATA[https://soteryan.com/blog/attack-on-strykers-microsoft-environment-wiped-employee-devices-without-malware/]]></link>
			<title>Attack on Stryker’s Microsoft environment wiped employee devices without malware</title>
			<pubDate><![CDATA[Tue, 17 Mar 2026 20:38:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://soteryan.com/blog/darksword-ios-exploit-kit-uses-6-flaws-3-zero-days-for-full-device-takeover/]]></guid>
			<link><![CDATA[https://soteryan.com/blog/darksword-ios-exploit-kit-uses-6-flaws-3-zero-days-for-full-device-takeover/]]></link>
			<title>DarkSword iOS Exploit Kit Uses 6 Flaws, 3 Zero-Days for Full Device Takeover</title>
			<pubDate><![CDATA[Thu, 19 Mar 2026 12:47:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://soteryan.com/blog/appsflyer-web-sdk-hijacked-to-spread-crypto-stealing-javascript-code/]]></guid>
			<link><![CDATA[https://soteryan.com/blog/appsflyer-web-sdk-hijacked-to-spread-crypto-stealing-javascript-code/]]></link>
			<title>AppsFlyer Web SDK hijacked to spread crypto-stealing JavaScript code</title>
			<pubDate><![CDATA[Sun, 15 Mar 2026 22:13:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://soteryan.com/blog/hackers-targeted-polands-national-centre-for-nuclear-research/]]></guid>
			<link><![CDATA[https://soteryan.com/blog/hackers-targeted-polands-national-centre-for-nuclear-research/]]></link>
			<title>Hackers targeted Poland’s National Centre for Nuclear Research</title>
			<pubDate><![CDATA[Sat, 14 Mar 2026 14:02:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://soteryan.com/blog/fbi-seeks-victims-of-steam-games-used-to-spread-malware/]]></guid>
			<link><![CDATA[https://soteryan.com/blog/fbi-seeks-victims-of-steam-games-used-to-spread-malware/]]></link>
			<title>FBI seeks victims of Steam games used to spread malware</title>
			<pubDate><![CDATA[Sat, 14 Mar 2026 10:18:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://soteryan.com/blog/chinese-hackers-target-southeast-asian-militaries-with-applechris-and-memfun-malware/]]></guid>
			<link><![CDATA[https://soteryan.com/blog/chinese-hackers-target-southeast-asian-militaries-with-applechris-and-memfun-malware/]]></link>
			<title>Chinese Hackers Target Southeast Asian Militaries with AppleChris and MemFun Malware</title>
			<pubDate><![CDATA[Sat, 14 Mar 2026 07:45:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://soteryan.com/blog/stryker-attack-wiped-tens-of-thousands-of-devices-no-malware-needed/]]></guid>
			<link><![CDATA[https://soteryan.com/blog/stryker-attack-wiped-tens-of-thousands-of-devices-no-malware-needed/]]></link>
			<title>Stryker attack wiped tens of thousands of devices, no malware needed</title>
			<pubDate><![CDATA[Mon, 16 Mar 2026 21:46:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://soteryan.com/blog/fbi-launches-inquiry-into-steam-games-spreading-malware/]]></guid>
			<link><![CDATA[https://soteryan.com/blog/fbi-launches-inquiry-into-steam-games-spreading-malware/]]></link>
			<title>FBI launches inquiry into Steam games spreading malware</title>
			<pubDate><![CDATA[Mon, 16 Mar 2026 19:19:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://soteryan.com/blog/payload-ransomware-claims-the-hack-of-royal-bahrain-hospital/]]></guid>
			<link><![CDATA[https://soteryan.com/blog/payload-ransomware-claims-the-hack-of-royal-bahrain-hospital/]]></link>
			<title>Payload Ransomware claims the hack of Royal Bahrain Hospital</title>
			<pubDate><![CDATA[Mon, 16 Mar 2026 09:14:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://soteryan.com/blog/european-commission-investigating-breach-after-amazon-cloud-account-hack/]]></guid>
			<link><![CDATA[https://soteryan.com/blog/european-commission-investigating-breach-after-amazon-cloud-account-hack/]]></link>
			<title>European Commission investigating breach after Amazon cloud account hack</title>
			<pubDate><![CDATA[Fri, 27 Mar 2026 19:51:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://soteryan.com/blog/iran-linked-hackers-claim-cyberattack-on-albanias-parliament-email-systems/]]></guid>
			<link><![CDATA[https://soteryan.com/blog/iran-linked-hackers-claim-cyberattack-on-albanias-parliament-email-systems/]]></link>
			<title>Iran-linked hackers claim cyberattack on Albania’s parliament email systems</title>
			<pubDate><![CDATA[Wed, 11 Mar 2026 17:34:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://soteryan.com/blog/new-android-malware-hiding-in-streaming-apps-to-spy-on-users-personal-notes/]]></guid>
			<link><![CDATA[https://soteryan.com/blog/new-android-malware-hiding-in-streaming-apps-to-spy-on-users-personal-notes/]]></link>
			<title>New Android malware hiding in streaming apps to spy on users’ personal notes</title>
			<pubDate><![CDATA[Fri, 20 Mar 2026 02:37:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://soteryan.com/blog/google-paid-17-1-million-for-vulnerability-reports-in-2025/]]></guid>
			<link><![CDATA[https://soteryan.com/blog/google-paid-17-1-million-for-vulnerability-reports-in-2025/]]></link>
			<title>Google paid $17.1 million for vulnerability reports in 2025</title>
			<pubDate><![CDATA[Thu, 12 Mar 2026 20:06:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://soteryan.com/blog/six-android-malware-families-target-pix-payments-banking-apps-and-crypto-wallets/]]></guid>
			<link><![CDATA[https://soteryan.com/blog/six-android-malware-families-target-pix-payments-banking-apps-and-crypto-wallets/]]></link>
			<title>Six Android Malware Families Target Pix Payments, Banking Apps, and Crypto Wallets</title>
			<pubDate><![CDATA[Thu, 12 Mar 2026 19:32:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://soteryan.com/blog/medusa-ransomware-gang-claims-attacks-on-prominent-mississippi-hospital-new-jersey-county/]]></guid>
			<link><![CDATA[https://soteryan.com/blog/medusa-ransomware-gang-claims-attacks-on-prominent-mississippi-hospital-new-jersey-county/]]></link>
			<title>Medusa ransomware gang claims attacks on prominent Mississippi hospital, New Jersey county</title>
			<pubDate><![CDATA[Fri, 20 Mar 2026 02:35:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://soteryan.com/blog/fake-enterprise-vpn-downloads-used-to-steal-company-credentials/]]></guid>
			<link><![CDATA[https://soteryan.com/blog/fake-enterprise-vpn-downloads-used-to-steal-company-credentials/]]></link>
			<title>Fake enterprise VPN downloads used to steal company credentials</title>
			<pubDate><![CDATA[Fri, 13 Mar 2026 16:14:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://soteryan.com/blog/fake-government-and-starlink-apps-used-in-malware-campaign-targeting-brazil-2/]]></guid>
			<link><![CDATA[https://soteryan.com/blog/fake-government-and-starlink-apps-used-in-malware-campaign-targeting-brazil-2/]]></link>
			<title>Fake government and Starlink apps used in malware campaign targeting Brazil</title>
			<pubDate><![CDATA[Fri, 13 Mar 2026 14:25:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://soteryan.com/blog/chinese-state-hackers-target-telcos-with-new-malware-toolkit/]]></guid>
			<link><![CDATA[https://soteryan.com/blog/chinese-state-hackers-target-telcos-with-new-malware-toolkit/]]></link>
			<title>Chinese state hackers target telcos with new malware toolkit</title>
			<pubDate><![CDATA[Tue, 10 Mar 2026 10:44:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://soteryan.com/blog/fake-government-and-starlink-apps-used-in-malware-campaign-targeting-brazil/]]></guid>
			<link><![CDATA[https://soteryan.com/blog/fake-government-and-starlink-apps-used-in-malware-campaign-targeting-brazil/]]></link>
			<title>Fake government and Starlink apps used in malware campaign targeting Brazil</title>
			<pubDate><![CDATA[Fri, 13 Mar 2026 14:25:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://soteryan.com/?mailpoet_page=captcha]]></guid>
			<link><![CDATA[https://soteryan.com/?mailpoet_page=captcha]]></link>
			<title>MailPoet Page</title>
			<pubDate><![CDATA[Wed, 25 Feb 2026 08:40:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://soteryan.com/blog/kadnap-bot-compromises-14000-devices-to-route-malicious-traffic/]]></guid>
			<link><![CDATA[https://soteryan.com/blog/kadnap-bot-compromises-14000-devices-to-route-malicious-traffic/]]></link>
			<title>KadNap bot compromises 14,000+ devices to route malicious traffic</title>
			<pubDate><![CDATA[Wed, 11 Mar 2026 12:07:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://soteryan.com/blog/]]></guid>
			<link><![CDATA[https://soteryan.com/blog/]]></link>
			<title>Blog</title>
			<pubDate><![CDATA[Fri, 13 Mar 2026 08:50:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://soteryan.com/blog/new-blacksanta-edr-killer-spotted-targeting-hr-departments/]]></guid>
			<link><![CDATA[https://soteryan.com/blog/new-blacksanta-edr-killer-spotted-targeting-hr-departments/]]></link>
			<title>New ‘BlackSanta’ EDR killer spotted targeting HR departments</title>
			<pubDate><![CDATA[Wed, 11 Mar 2026 07:05:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://soteryan.com/blog/apt28-hackers-deploy-customized-variant-of-covenant-open-source-tool/]]></guid>
			<link><![CDATA[https://soteryan.com/blog/apt28-hackers-deploy-customized-variant-of-covenant-open-source-tool/]]></link>
			<title>APT28 hackers deploy customized variant of Covenant open-source tool</title>
			<pubDate><![CDATA[Tue, 10 Mar 2026 11:43:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://soteryan.com/blog/fake-claude-code-install-guides-push-infostealers-in-installfix-attacks/]]></guid>
			<link><![CDATA[https://soteryan.com/blog/fake-claude-code-install-guides-push-infostealers-in-installfix-attacks/]]></link>
			<title>Fake Claude Code install guides push infostealers in InstallFix attacks</title>
			<pubDate><![CDATA[Tue, 10 Mar 2026 11:34:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://soteryan.com/blog/microsoft-to-enable-windows-hotpatch-security-updates-by-default/]]></guid>
			<link><![CDATA[https://soteryan.com/blog/microsoft-to-enable-windows-hotpatch-security-updates-by-default/]]></link>
			<title>Microsoft to enable Windows hotpatch security updates by default</title>
			<pubDate><![CDATA[Tue, 10 Mar 2026 11:20:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://soteryan.com/blog/zero-day-attacks-on-enterprise-software-reach-record-high-google-warns/]]></guid>
			<link><![CDATA[https://soteryan.com/blog/zero-day-attacks-on-enterprise-software-reach-record-high-google-warns/]]></link>
			<title>Zero‑Day Attacks on Enterprise Software Reach Record High, Google Warns</title>
			<pubDate><![CDATA[Tue, 10 Mar 2026 10:46:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://soteryan.com/blog/4-8m-in-crypto-stolen-after-korean-tax-agency-exposes-wallet-seed/]]></guid>
			<link><![CDATA[https://soteryan.com/blog/4-8m-in-crypto-stolen-after-korean-tax-agency-exposes-wallet-seed/]]></link>
			<title>$4.8M in crypto stolen after Korean tax agency exposes wallet seed</title>
			<pubDate><![CDATA[Tue, 03 Mar 2026 09:25:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://soteryan.com/blog/how-android-provides-the-most-effective-protection-to-keep-you-safe-from-mobile-scams/]]></guid>
			<link><![CDATA[https://soteryan.com/blog/how-android-provides-the-most-effective-protection-to-keep-you-safe-from-mobile-scams/]]></link>
			<title>How Android provides the most effective protection to keep you safe from mobile scams</title>
			<pubDate><![CDATA[Sat, 28 Feb 2026 11:54:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://soteryan.com/blog/massive-github-malware-operation-spreads-boryptgrab-stealer/]]></guid>
			<link><![CDATA[https://soteryan.com/blog/massive-github-malware-operation-spreads-boryptgrab-stealer/]]></link>
			<title>Massive GitHub malware operation spreads BoryptGrab stealer</title>
			<pubDate><![CDATA[Mon, 09 Mar 2026 19:59:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://soteryan.com/?mailpoet_page=subscriptions]]></guid>
			<link><![CDATA[https://soteryan.com/?mailpoet_page=subscriptions]]></link>
			<title>MailPoet Page</title>
			<pubDate><![CDATA[Wed, 25 Feb 2026 08:40:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://soteryan.com/blog/scarcruft-uses-zoho-workdrive-and-usb-malware-to-breach-air-gapped-networks-3/]]></guid>
			<link><![CDATA[https://soteryan.com/blog/scarcruft-uses-zoho-workdrive-and-usb-malware-to-breach-air-gapped-networks-3/]]></link>
			<title>ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks</title>
			<pubDate><![CDATA[Mon, 09 Mar 2026 19:57:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://soteryan.com/blog/microsoft-hackers-abusing-ai-at-every-stage-of-cyberattacks/]]></guid>
			<link><![CDATA[https://soteryan.com/blog/microsoft-hackers-abusing-ai-at-every-stage-of-cyberattacks/]]></link>
			<title>Microsoft: Hackers abusing AI at every stage of cyberattacks</title>
			<pubDate><![CDATA[Mon, 09 Mar 2026 18:25:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://soteryan.com/blog/iran-linked-hackers-target-ip-cameras-across-israel-and-gulf-states-for-military-intelligence/]]></guid>
			<link><![CDATA[https://soteryan.com/blog/iran-linked-hackers-target-ip-cameras-across-israel-and-gulf-states-for-military-intelligence/]]></link>
			<title>Iran-linked hackers target IP cameras across Israel and Gulf states for military intelligence</title>
			<pubDate><![CDATA[Mon, 09 Mar 2026 18:10:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://soteryan.com/blog/hackers-abuse-arpa-dns-and-ipv6-to-evade-phishing-defenses-2/]]></guid>
			<link><![CDATA[https://soteryan.com/blog/hackers-abuse-arpa-dns-and-ipv6-to-evade-phishing-defenses-2/]]></link>
			<title>Hackers abuse .arpa DNS and ipv6 to evade phishing defenses</title>
			<pubDate><![CDATA[Mon, 09 Mar 2026 18:03:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://soteryan.com/use-case/]]></guid>
			<link><![CDATA[https://soteryan.com/use-case/]]></link>
			<title>Use case</title>
			<pubDate><![CDATA[Mon, 24 Mar 2025 10:41:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://soteryan.com/blog/threat-modeling-ai-applications/]]></guid>
			<link><![CDATA[https://soteryan.com/blog/threat-modeling-ai-applications/]]></link>
			<title>Threat modeling AI applications</title>
			<pubDate><![CDATA[Mon, 09 Mar 2026 19:56:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://soteryan.com/supply-chain-risk-evaluation/]]></guid>
			<link><![CDATA[https://soteryan.com/supply-chain-risk-evaluation/]]></link>
			<title>Supply Chain Risk Evaluation</title>
			<pubDate><![CDATA[Mon, 24 Mar 2025 10:41:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://soteryan.com/blog/ai-generated-slopoly-malware-used-in-interlock-ransomware-attack/]]></guid>
			<link><![CDATA[https://soteryan.com/blog/ai-generated-slopoly-malware-used-in-interlock-ransomware-attack/]]></link>
			<title>AI-generated Slopoly malware used in Interlock ransomware attack</title>
			<pubDate><![CDATA[Fri, 13 Mar 2026 07:53:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://soteryan.com/blog/rust-based-venon-malware-targets-33-brazilian-banks-with-credential-stealing-overlays/]]></guid>
			<link><![CDATA[https://soteryan.com/blog/rust-based-venon-malware-targets-33-brazilian-banks-with-credential-stealing-overlays/]]></link>
			<title>Rust-Based VENON Malware Targets 33 Brazilian Banks with Credential-Stealing Overlays</title>
			<pubDate><![CDATA[Fri, 13 Mar 2026 05:08:26 +0000]]></pubDate>
		</item>
				</channel>
</rss>
