<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Malware Archives - Vertex Cyber Security</title>
	<atom:link href="https://www.vertexcybersecurity.com.au/category/all/cybersecurity/malware/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.vertexcybersecurity.com.au/category/all/cybersecurity/malware/</link>
	<description>Your Partner in Cyber Security</description>
	<lastBuildDate>Fri, 27 Feb 2026 03:01:57 +0000</lastBuildDate>
	<language>en-AU</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.vertexcybersecurity.com.au/wp-content/uploads/2024/08/cropped-ColoredLogo-32x32.png</url>
	<title>Malware Archives - Vertex Cyber Security</title>
	<link>https://www.vertexcybersecurity.com.au/category/all/cybersecurity/malware/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>The Myth of Apple Immunity: Why Your iPhone and Mac Still Need Protection and need urgent updates</title>
		<link>https://www.vertexcybersecurity.com.au/the-myth-of-apple-immunity-why-your-iphone-and-mac-still-need-protection-and-need-urgent-updates/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-myth-of-apple-immunity-why-your-iphone-and-mac-still-need-protection-and-need-urgent-updates</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Sun, 15 Feb 2026 23:29:45 +0000</pubDate>
				<category><![CDATA[Malware]]></category>
		<category><![CDATA[Zero day]]></category>
		<category><![CDATA[Apple Security]]></category>
		<category><![CDATA[iPhone Hacked]]></category>
		<category><![CDATA[Mac Protection]]></category>
		<category><![CDATA[macOS Vulnerability]]></category>
		<category><![CDATA[Zero-Day Vulnerability]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=10311</guid>

					<description><![CDATA[Apple devices aren't immune to hackers. Learn why the recent zero-day patches for macOS and iOS prove that iPhones and Macs need professional protection.]]></description>
		
		
		
			</item>
		<item>
		<title>CrowdStrike&#8217;s Self-Inflicted Wound: Worse Than Malware for 8.5 Million PCs</title>
		<link>https://www.vertexcybersecurity.com.au/crowdstrikes-self-inflicted-wound-worse-than-malware-for-8-5-million-pcs/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=crowdstrikes-self-inflicted-wound-worse-than-malware-for-8-5-million-pcs</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Thu, 25 Jul 2024 01:10:27 +0000</pubDate>
				<category><![CDATA[Incident response]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[biggest cyber incident]]></category>
		<category><![CDATA[biggest outage]]></category>
		<category><![CDATA[crowdstrike]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=8340</guid>

					<description><![CDATA[The recent CrowdStrike outage, impacting an estimated 8.5 million* Windows computers, has sent shockwaves through the cybersecurity world. The irony is stark: a company renowned for its endpoint protection solutions caused a global disruption far exceeding the damage of many malware attacks. But how does it really compare? What Happened During the Crowdstrike Outage? On [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Malware Analysis in Penetration Testing</title>
		<link>https://www.vertexcybersecurity.com.au/malware-analysis-in-penetration-testing/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=malware-analysis-in-penetration-testing</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Fri, 03 May 2024 01:53:10 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Practices]]></category>
		<category><![CDATA[Defence]]></category>
		<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Malware Analysis]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[Threat Identification]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=7912</guid>

					<description><![CDATA[Introduction In the dynamic world of cyber security, penetration testing remains a crucial strategy for protecting organisational assets. A pivotal component of this approach is malware analysis. This technique not only bolsters defence mechanisms but also deepens understanding of potential threats. In this blog, we&#8217;ll explore the significance of malware analysis within penetration testing, its [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>How to Influence Employee Cybersecurity Behavior</title>
		<link>https://www.vertexcybersecurity.com.au/how-to-influence-employee-cybersecurity-behavior/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=how-to-influence-employee-cybersecurity-behavior</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Thu, 24 Nov 2022 01:40:56 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Protection]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Training]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=4784</guid>

					<description><![CDATA[When it comes to protecting your organisation from cyber attacks, creating a culture of both safety and awareness can be crucial elements. Many business leaders have systems and tools in place to protect their networks, but struggle to get their employees to buy into security policies and best practices. This leaves organisations vulnerable, as employees [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>ACSC Warns Australian Businesses Against Russian Cyber Threats</title>
		<link>https://www.vertexcybersecurity.com.au/acsc-warns-australian-businesses-against-russian-cyber-threats/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=acsc-warns-australian-businesses-against-russian-cyber-threats</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Wed, 23 Nov 2022 23:41:04 +0000</pubDate>
				<category><![CDATA[ACSC]]></category>
		<category><![CDATA[Audit]]></category>
		<category><![CDATA[Backups]]></category>
		<category><![CDATA[CREST]]></category>
		<category><![CDATA[Cyber Attack]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Passwords]]></category>
		<category><![CDATA[Protection]]></category>
		<category><![CDATA[Training]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=4779</guid>

					<description><![CDATA[The Australian Cyber Security Centre (ACSC) has issued a warning to Australian businesses to protect against attacks being perpetrated by Russian cybercriminal groups. CREST ANZ board member and cyber security professional Ajay Unni stated that because of the distance between Australia and Russia, cyber attacks are the most effective way to “punish” Australia for its [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>AI Antivirus and Normal AntiVirus are not working</title>
		<link>https://www.vertexcybersecurity.com.au/ai-antivirus-and-normal-antivirus-are-not-working/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=ai-antivirus-and-normal-antivirus-are-not-working</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Wed, 24 Jul 2019 11:45:48 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Malware]]></category>
		<guid isPermaLink="false">http://new.vtxsecurity.com.au/?p=722</guid>

					<description><![CDATA[&#160;First AntiVirus was shown to have easy bypass methods, and now the new AI AntiVirus has been proven to have similar issues as shown by Skylight Cyber researchers with Cylance:https://www.vice.com/en_us/article/9kxp83/researchers-easily-trick-cylances-ai-based-antivirus-into-thinking-malware-is-goodware&#160;Now they only tried cylance but it is only a matter of time for similar techniques to be used and shown effective against other AI based [&#8230;]]]></description>
		
		
		
			</item>
	</channel>
</rss>
