<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 3, 2026 at 11:00 pm by All in One SEO v4.6.1.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://firewalls.firm.in/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Firewall Security Company India</title>
		<link><![CDATA[https://firewalls.firm.in]]></link>
		<description><![CDATA[Firewall Security Company India]]></description>
		<lastBuildDate><![CDATA[Tue, 31 Mar 2026 20:14:45 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://firewalls.firm.in/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://firewalls.firm.in/android-developer-verification-rollout-begins-ahead-of-september-enforcement/]]></guid>
			<link><![CDATA[https://firewalls.firm.in/android-developer-verification-rollout-begins-ahead-of-september-enforcement/]]></link>
			<title>Android Developer Verification Rollout Begins Ahead of September Enforcement</title>
			<pubDate><![CDATA[Tue, 31 Mar 2026 20:14:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewalls.firm.in/ai-cybersecurity-digital-and-data-skills-emerge-as-indias-most-critical-future-capabilities-etciso/]]></guid>
			<link><![CDATA[https://firewalls.firm.in/ai-cybersecurity-digital-and-data-skills-emerge-as-indias-most-critical-future-capabilities-etciso/]]></link>
			<title>AI, cybersecurity, digital and data skills emerge as India&#8217;s most critical future capabilities, ETCISO</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 23:49:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewalls.firm.in/anthropics-most-powerful-ai-model-claude-mythos-data-leaked/]]></guid>
			<link><![CDATA[https://firewalls.firm.in/anthropics-most-powerful-ai-model-claude-mythos-data-leaked/]]></link>
			<title>Anthropic&#8217;s most powerful AI model &#8216;Claude Mythos&#8217; data leaked</title>
			<pubDate><![CDATA[Sun, 29 Mar 2026 09:28:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewalls.firm.in/iran-linked-hackers-breach-fbi-directors-personal-email-hit-stryker-with-wiper-attack/]]></guid>
			<link><![CDATA[https://firewalls.firm.in/iran-linked-hackers-breach-fbi-directors-personal-email-hit-stryker-with-wiper-attack/]]></link>
			<title>Iran-Linked Hackers Breach FBI Director’s Personal Email, Hit Stryker With Wiper Attack</title>
			<pubDate><![CDATA[Sat, 28 Mar 2026 16:55:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewalls.firm.in/48-enterprises-flag-mule-networks-as-top-fraud-threat-etciso/]]></guid>
			<link><![CDATA[https://firewalls.firm.in/48-enterprises-flag-mule-networks-as-top-fraud-threat-etciso/]]></link>
			<title>48% enterprises flag mule networks as top fraud threat, ETCISO</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 01:38:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewalls.firm.in/india-tightens-digital-security-with-strict-rules/]]></guid>
			<link><![CDATA[https://firewalls.firm.in/india-tightens-digital-security-with-strict-rules/]]></link>
			<title>India tightens digital security with strict rules</title>
			<pubDate><![CDATA[Fri, 27 Mar 2026 12:51:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewalls.firm.in/bits-ai-security-analyst-reduces-threat-investigation-time-by-up-to-98/]]></guid>
			<link><![CDATA[https://firewalls.firm.in/bits-ai-security-analyst-reduces-threat-investigation-time-by-up-to-98/]]></link>
			<title>Bits AI Security Analyst reduces threat investigation time by up to 98%</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 00:26:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewalls.firm.in/silent-mobile-verification-eradicates-sms-otp-anxiety-etciso/]]></guid>
			<link><![CDATA[https://firewalls.firm.in/silent-mobile-verification-eradicates-sms-otp-anxiety-etciso/]]></link>
			<title>Silent Mobile Verification Eradicates SMS/OTP Anxiety, ETCISO</title>
			<pubDate><![CDATA[Fri, 27 Mar 2026 05:40:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewalls.firm.in/nhrc-issues-notices-over-alleged-dpdp-act-violations-by-ai-social-media-edtech-platforms/]]></guid>
			<link><![CDATA[https://firewalls.firm.in/nhrc-issues-notices-over-alleged-dpdp-act-violations-by-ai-social-media-edtech-platforms/]]></link>
			<title>NHRC issues notices over alleged DPDP Act violations by AI, social media, edtech platforms</title>
			<pubDate><![CDATA[Fri, 27 Mar 2026 04:31:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewalls.firm.in/webinar-stop-guessing-learn-to-validate-your-defenses-against-real-attacks/]]></guid>
			<link><![CDATA[https://firewalls.firm.in/webinar-stop-guessing-learn-to-validate-your-defenses-against-real-attacks/]]></link>
			<title>[Webinar] Stop Guessing. Learn to Validate Your Defenses Against Real Attacks</title>
			<pubDate><![CDATA[Thu, 26 Mar 2026 13:57:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewalls.firm.in/ai-apps-to-drive-50-of-cyber-incident-response-by-2028-etciso/]]></guid>
			<link><![CDATA[https://firewalls.firm.in/ai-apps-to-drive-50-of-cyber-incident-response-by-2028-etciso/]]></link>
			<title>AI apps to drive 50% of cyber incident response by 2028, ETCISO</title>
			<pubDate><![CDATA[Wed, 25 Mar 2026 16:31:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewalls.firm.in/84-of-female-entrepreneurs-use-upi-cohort-shows-the-highest-levels-of-digital-adoption-report/]]></guid>
			<link><![CDATA[https://firewalls.firm.in/84-of-female-entrepreneurs-use-upi-cohort-shows-the-highest-levels-of-digital-adoption-report/]]></link>
			<title>84% of female entrepreneurs use UPI; cohort shows the highest levels of digital adoption: Report</title>
			<pubDate><![CDATA[Wed, 25 Mar 2026 12:13:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewalls.firm.in/teampcp-backdoors-litellm-versions-1-82-7-1-82-8-likely-via-trivy-ci-cd-compromise/]]></guid>
			<link><![CDATA[https://firewalls.firm.in/teampcp-backdoors-litellm-versions-1-82-7-1-82-8-likely-via-trivy-ci-cd-compromise/]]></link>
			<title>TeamPCP Backdoors LiteLLM Versions 1.82.7–1.82.8 Likely via Trivy CI/CD Compromise</title>
			<pubDate><![CDATA[Wed, 25 Mar 2026 01:58:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewalls.firm.in/india-cyber-threat-report-2026-healthcare-pharma-among-most-targeted/]]></guid>
			<link><![CDATA[https://firewalls.firm.in/india-cyber-threat-report-2026-healthcare-pharma-among-most-targeted/]]></link>
			<title>India Cyber Threat Report 2026: Healthcare, pharma among most targeted</title>
			<pubDate><![CDATA[Tue, 24 Mar 2026 15:46:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewalls.firm.in/safeguarding-your-organization-from-shadow-ai-risks-etciso/]]></guid>
			<link><![CDATA[https://firewalls.firm.in/safeguarding-your-organization-from-shadow-ai-risks-etciso/]]></link>
			<title>Safeguarding Your Organization from Shadow AI Risks, ETCISO</title>
			<pubDate><![CDATA[Tue, 24 Mar 2026 15:32:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewalls.firm.in/sebi-leverages-ai-to-combat-finfluencer-fraud-on-google-platforms/]]></guid>
			<link><![CDATA[https://firewalls.firm.in/sebi-leverages-ai-to-combat-finfluencer-fraud-on-google-platforms/]]></link>
			<title>Sebi leverages AI to combat finfluencer fraud on Google platforms</title>
			<pubDate><![CDATA[Thu, 26 Mar 2026 12:42:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewalls.firm.in/cognizant-unit-trizetto-breach-exposes-data-of-3-4m-people/]]></guid>
			<link><![CDATA[https://firewalls.firm.in/cognizant-unit-trizetto-breach-exposes-data-of-3-4m-people/]]></link>
			<title>Cognizant unit TriZetto breach exposes data of 3.4m people</title>
			<pubDate><![CDATA[Mon, 23 Mar 2026 19:27:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewalls.firm.in/weekly-recap-ci-cd-backdoor-fbi-buys-location-data-whatsapp-ditches-numbers-more/]]></guid>
			<link><![CDATA[https://firewalls.firm.in/weekly-recap-ci-cd-backdoor-fbi-buys-location-data-whatsapp-ditches-numbers-more/]]></link>
			<title>&#x26a1; Weekly Recap: CI/CD Backdoor, FBI Buys Location Data, WhatsApp Ditches Numbers &#038; More</title>
			<pubDate><![CDATA[Mon, 23 Mar 2026 15:36:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewalls.firm.in/google-and-security-companies-have-warned-iphone-users-of-darksword-spy-attack/]]></guid>
			<link><![CDATA[https://firewalls.firm.in/google-and-security-companies-have-warned-iphone-users-of-darksword-spy-attack/]]></link>
			<title>Google and security companies have warned iPhone users of DarkSword spy attack</title>
			<pubDate><![CDATA[Mon, 23 Mar 2026 15:11:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewalls.firm.in/reimagining-cybersecurity-in-indias-financial-sector-etciso/]]></guid>
			<link><![CDATA[https://firewalls.firm.in/reimagining-cybersecurity-in-indias-financial-sector-etciso/]]></link>
			<title>Reimagining cybersecurity in India&#8217;s financial sector, ETCISO</title>
			<pubDate><![CDATA[Mon, 23 Mar 2026 10:34:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewalls.firm.in/millions-of-infected-devices-fueled-massive-cyberattacks/]]></guid>
			<link><![CDATA[https://firewalls.firm.in/millions-of-infected-devices-fueled-massive-cyberattacks/]]></link>
			<title>Millions of infected devices fueled massive cyberattacks</title>
			<pubDate><![CDATA[Mon, 23 Mar 2026 09:27:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewalls.firm.in/tech-giants-join-hands-to-fight-online-scams/]]></guid>
			<link><![CDATA[https://firewalls.firm.in/tech-giants-join-hands-to-fight-online-scams/]]></link>
			<title>Tech giants join hands to fight online scams</title>
			<pubDate><![CDATA[Sun, 22 Mar 2026 22:15:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewalls.firm.in/hackers-exploit-cve-2025-32975-cvss-10-0-to-hijack-unpatched-quest-kace-sma-systems/]]></guid>
			<link><![CDATA[https://firewalls.firm.in/hackers-exploit-cve-2025-32975-cvss-10-0-to-hijack-unpatched-quest-kace-sma-systems/]]></link>
			<title>Hackers Exploit CVE-2025-32975 (CVSS 10.0) to Hijack Unpatched Quest KACE SMA Systems</title>
			<pubDate><![CDATA[Mon, 23 Mar 2026 08:08:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewalls.firm.in/the-hidden-crisis-threatening-d2c-brand-loyalty-etciso/]]></guid>
			<link><![CDATA[https://firewalls.firm.in/the-hidden-crisis-threatening-d2c-brand-loyalty-etciso/]]></link>
			<title>The Hidden Crisis Threatening D2C Brand Loyalty, ETCISO</title>
			<pubDate><![CDATA[Sun, 22 Mar 2026 21:38:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewalls.firm.in/ai-flaws-in-amazon-bedrock-langsmith-and-sglang-enable-data-exfiltration-and-rce/]]></guid>
			<link><![CDATA[https://firewalls.firm.in/ai-flaws-in-amazon-bedrock-langsmith-and-sglang-enable-data-exfiltration-and-rce/]]></link>
			<title>AI Flaws in Amazon Bedrock, LangSmith, and SGLang Enable Data Exfiltration and RCE</title>
			<pubDate><![CDATA[Tue, 17 Mar 2026 23:30:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewalls.firm.in/fake-tech-support-spam-deploys-customized-havoc-c2-across-organizations/]]></guid>
			<link><![CDATA[https://firewalls.firm.in/fake-tech-support-spam-deploys-customized-havoc-c2-across-organizations/]]></link>
			<title>Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations</title>
			<pubDate><![CDATA[Tue, 03 Mar 2026 22:14:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewalls.firm.in/proofpoint-integrates-with-aws-security-hub-extended-plan/]]></guid>
			<link><![CDATA[https://firewalls.firm.in/proofpoint-integrates-with-aws-security-hub-extended-plan/]]></link>
			<title>Proofpoint integrates with AWS Security Hub extended plan</title>
			<pubDate><![CDATA[Tue, 03 Mar 2026 22:11:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewalls.firm.in/building-a-high-impact-tier-1-the-3-steps-cisos-must-follow/]]></guid>
			<link><![CDATA[https://firewalls.firm.in/building-a-high-impact-tier-1-the-3-steps-cisos-must-follow/]]></link>
			<title>Building a High-Impact Tier 1: The 3 Steps CISOs Must Follow</title>
			<pubDate><![CDATA[Tue, 03 Mar 2026 15:33:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewalls.firm.in/upwind-expands-india-presence-to-support-cloud-and-ai-security-needs/]]></guid>
			<link><![CDATA[https://firewalls.firm.in/upwind-expands-india-presence-to-support-cloud-and-ai-security-needs/]]></link>
			<title>Upwind expands India presence to support cloud and AI security needs</title>
			<pubDate><![CDATA[Tue, 03 Mar 2026 12:50:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewalls.firm.in/tru-identifies-mobile-spyware-campaign-using-fake-red-alert-app-in-israel/]]></guid>
			<link><![CDATA[https://firewalls.firm.in/tru-identifies-mobile-spyware-campaign-using-fake-red-alert-app-in-israel/]]></link>
			<title>TRU identifies mobile spyware campaign using fake Red Alert app in Israel</title>
			<pubDate><![CDATA[Thu, 19 Mar 2026 17:32:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewalls.firm.in/why-a-partner-driven-ecosystem-is-the-new-strategic-imperative-etciso/]]></guid>
			<link><![CDATA[https://firewalls.firm.in/why-a-partner-driven-ecosystem-is-the-new-strategic-imperative-etciso/]]></link>
			<title>Why a partner-driven ecosystem is the new strategic imperative, ETCISO</title>
			<pubDate><![CDATA[Thu, 12 Mar 2026 16:48:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewalls.firm.in/most-india-gccs-still-in-early-stages-of-dpdp-compliance-despite-ticking-14-month-deadline/]]></guid>
			<link><![CDATA[https://firewalls.firm.in/most-india-gccs-still-in-early-stages-of-dpdp-compliance-despite-ticking-14-month-deadline/]]></link>
			<title>Most India GCCs still in early stages of DPDP compliance despite ticking 14-month deadline</title>
			<pubDate><![CDATA[Mon, 16 Mar 2026 11:26:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewalls.firm.in/f5-labs-launches-ai-security-risk-leaderboards-and-monthly-benchmarks-to-grade-ai-models-etciso/]]></guid>
			<link><![CDATA[https://firewalls.firm.in/f5-labs-launches-ai-security-risk-leaderboards-and-monthly-benchmarks-to-grade-ai-models-etciso/]]></link>
			<title>F5 Labs Launches AI Security Risk Leaderboards and Monthly Benchmarks to Grade AI Models, ETCISO</title>
			<pubDate><![CDATA[Tue, 03 Mar 2026 12:38:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewalls.firm.in/microsoft-warns-oauth-redirect-abuse-delivers-malware-to-government-targets/]]></guid>
			<link><![CDATA[https://firewalls.firm.in/microsoft-warns-oauth-redirect-abuse-delivers-malware-to-government-targets/]]></link>
			<title>Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets</title>
			<pubDate><![CDATA[Tue, 03 Mar 2026 12:03:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewalls.firm.in/incident-readiness-can-you-answer-what-happened-before-the-first-hour-is-gone/]]></guid>
			<link><![CDATA[https://firewalls.firm.in/incident-readiness-can-you-answer-what-happened-before-the-first-hour-is-gone/]]></link>
			<title>Incident readiness: Can you answer ‘What Happened?’ Before the first hour is gone?</title>
			<pubDate><![CDATA[Tue, 03 Mar 2026 11:40:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewalls.firm.in/the-ai-caricature-trend-may-expose-users-to-digital-fraud-risks/]]></guid>
			<link><![CDATA[https://firewalls.firm.in/the-ai-caricature-trend-may-expose-users-to-digital-fraud-risks/]]></link>
			<title>The AI caricature trend may expose users to digital fraud risks</title>
			<pubDate><![CDATA[Sun, 01 Mar 2026 14:24:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewalls.firm.in/identity-attacks-lead-as-threat-groups-rise-etciso/]]></guid>
			<link><![CDATA[https://firewalls.firm.in/identity-attacks-lead-as-threat-groups-rise-etciso/]]></link>
			<title>Identity attacks lead as threat groups rise, ETCISO</title>
			<pubDate><![CDATA[Sun, 01 Mar 2026 13:28:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewalls.firm.in/weekly-recap-sd-wan-0-day-critical-cves-telegram-probe-smart-tv-proxy-sdk-and-more/]]></guid>
			<link><![CDATA[https://firewalls.firm.in/weekly-recap-sd-wan-0-day-critical-cves-telegram-probe-smart-tv-proxy-sdk-and-more/]]></link>
			<title>&#x26a1; Weekly Recap: SD-WAN 0-Day, Critical CVEs, Telegram Probe, Smart TV Proxy SDK and More</title>
			<pubDate><![CDATA[Mon, 02 Mar 2026 14:31:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewalls.firm.in/thousands-of-public-google-cloud-api-keys-exposed-with-gemini-access-after-api-enablement/]]></guid>
			<link><![CDATA[https://firewalls.firm.in/thousands-of-public-google-cloud-api-keys-exposed-with-gemini-access-after-api-enablement/]]></link>
			<title>Thousands of Public Google Cloud API Keys Exposed with Gemini Access After API Enablement</title>
			<pubDate><![CDATA[Sun, 01 Mar 2026 14:35:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewalls.firm.in/airtel-partners-with-google-rcs-for-ai-spam-filtering-in-india/]]></guid>
			<link><![CDATA[https://firewalls.firm.in/airtel-partners-with-google-rcs-for-ai-spam-filtering-in-india/]]></link>
			<title>Airtel partners with Google RCS for AI spam filtering in India</title>
			<pubDate><![CDATA[Mon, 02 Mar 2026 14:15:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewalls.firm.in/the-new-competitive-edge-for-lending-and-fraud-prevention-etciso/]]></guid>
			<link><![CDATA[https://firewalls.firm.in/the-new-competitive-edge-for-lending-and-fraud-prevention-etciso/]]></link>
			<title>The new competitive edge for lending and fraud prevention, ETCISO</title>
			<pubDate><![CDATA[Mon, 02 Mar 2026 13:09:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewalls.firm.in/how-to-protect-your-saas-from-bot-attacks-with-safeline-waf/]]></guid>
			<link><![CDATA[https://firewalls.firm.in/how-to-protect-your-saas-from-bot-attacks-with-safeline-waf/]]></link>
			<title>How to Protect Your SaaS from Bot Attacks with SafeLine WAF</title>
			<pubDate><![CDATA[Mon, 02 Mar 2026 12:41:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewalls.firm.in/companies-could-see-rise-in-digital-threats/]]></guid>
			<link><![CDATA[https://firewalls.firm.in/companies-could-see-rise-in-digital-threats/]]></link>
			<title>Companies could see rise in digital threats</title>
			<pubDate><![CDATA[Mon, 02 Mar 2026 11:54:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewalls.firm.in/emerging-network-security-threats-in-2025-and-proven-mitigation-strategies-for-enterprises-etciso/]]></guid>
			<link><![CDATA[https://firewalls.firm.in/emerging-network-security-threats-in-2025-and-proven-mitigation-strategies-for-enterprises-etciso/]]></link>
			<title>Emerging Network Security Threats in 2025 and Proven Mitigation Strategies for Enterprises, ETCISO</title>
			<pubDate><![CDATA[Mon, 02 Mar 2026 11:52:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewalls.firm.in/hackers-exploit-cve-2025-55182-to-breach-766-next-js-hosts-steal-credentials/]]></guid>
			<link><![CDATA[https://firewalls.firm.in/hackers-exploit-cve-2025-55182-to-breach-766-next-js-hosts-steal-credentials/]]></link>
			<title>Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 00:28:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewalls.firm.in/clawjacked-flaw-lets-malicious-sites-hijack-local-openclaw-ai-agents-via-websocket/]]></guid>
			<link><![CDATA[https://firewalls.firm.in/clawjacked-flaw-lets-malicious-sites-hijack-local-openclaw-ai-agents-via-websocket/]]></link>
			<title>ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket</title>
			<pubDate><![CDATA[Sun, 01 Mar 2026 11:39:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewalls.firm.in/coupang-q4-loss-data-breach-fallout-hits-revenue/]]></guid>
			<link><![CDATA[https://firewalls.firm.in/coupang-q4-loss-data-breach-fallout-hits-revenue/]]></link>
			<title>Coupang Q4 loss: Data breach fallout hits revenue</title>
			<pubDate><![CDATA[Sat, 28 Feb 2026 14:39:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewalls.firm.in/seqrite-reports-1-16-million-cyber-attacks-on-indias-financial-sector-etciso/]]></guid>
			<link><![CDATA[https://firewalls.firm.in/seqrite-reports-1-16-million-cyber-attacks-on-indias-financial-sector-etciso/]]></link>
			<title>Seqrite reports 1.16 million cyber attacks on India&#8217;s financial sector, ETCISO</title>
			<pubDate><![CDATA[Sat, 28 Feb 2026 14:25:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewalls.firm.in/rbi-summons-executives-over-forex-card-breach/]]></guid>
			<link><![CDATA[https://firewalls.firm.in/rbi-summons-executives-over-forex-card-breach/]]></link>
			<title>RBI summons executives over forex card breach</title>
			<pubDate><![CDATA[Sat, 28 Feb 2026 14:12:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewalls.firm.in/accenture-and-anthropic-partner-on-ai-driven-cybersecurity-operations-etciso/]]></guid>
			<link><![CDATA[https://firewalls.firm.in/accenture-and-anthropic-partner-on-ai-driven-cybersecurity-operations-etciso/]]></link>
			<title>Accenture and Anthropic partner on AI-driven cybersecurity operations, ETCISO</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 18:00:37 +0000]]></pubDate>
		</item>
				</channel>
</rss>
