<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Social Engineering Archives - Vertex Cyber Security</title>
	<atom:link href="https://www.vertexcybersecurity.com.au/category/all/cybersecurity/social-engineering/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.vertexcybersecurity.com.au/category/all/cybersecurity/social-engineering/</link>
	<description>Your Partner in Cyber Security</description>
	<lastBuildDate>Mon, 20 May 2024 17:07:43 +0000</lastBuildDate>
	<language>en-AU</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.vertexcybersecurity.com.au/wp-content/uploads/2024/08/cropped-ColoredLogo-32x32.png</url>
	<title>Social Engineering Archives - Vertex Cyber Security</title>
	<link>https://www.vertexcybersecurity.com.au/category/all/cybersecurity/social-engineering/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>SSH Backdoor through XZ Utils and Open Source Security</title>
		<link>https://www.vertexcybersecurity.com.au/ssh-backdoor-through-xz-utils-and-open-source-security/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=ssh-backdoor-through-xz-utils-and-open-source-security</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Tue, 09 Apr 2024 00:44:27 +0000</pubDate>
				<category><![CDATA[Code]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[Process]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<category><![CDATA[Software Development]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[open source]]></category>
		<category><![CDATA[oss]]></category>
		<category><![CDATA[proprietary software]]></category>
		<category><![CDATA[vs]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=7817</guid>

					<description><![CDATA[In the ever-evolving landscape of cybersecurity, the recent discovery of the XZ Utils Backdoor, a critical SSH vulnerability identified as CVE-2024-3094, has once again spotlighted the importance of vigilance, thorough code review, and the inherent strengths of the open-source model. This incident involved a malicious actor who, under the guise of contributing to the project, [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>AI will increase Phishing Cyber attacks</title>
		<link>https://www.vertexcybersecurity.com.au/ai-will-increase-phishing-cyber-attacks/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=ai-will-increase-phishing-cyber-attacks</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Fri, 16 Feb 2024 00:18:25 +0000</pubDate>
				<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<category><![CDATA[AI Cyber]]></category>
		<category><![CDATA[AI Cyber Security]]></category>
		<category><![CDATA[phishing]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=7615</guid>

					<description><![CDATA[Phishing campaigns, particularly those powered by artificial intelligence (AI), represent one of the most insidious forms of cyber threats facing companies today. The integration of AI into phishing operations has significantly enhanced the effectiveness and sophistication of these attacks, making them more difficult to detect and resist. Here&#8217;s a deeper dive into how AI-driven phishing [&#8230;]]]></description>
		
		
		
			</item>
	</channel>
</rss>
