<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Privacy Archives - Vertex Cyber Security</title>
	<atom:link href="https://www.vertexcybersecurity.com.au/tag/data-privacy/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.vertexcybersecurity.com.au/tag/data-privacy/</link>
	<description>Your Partner in Cyber Security</description>
	<lastBuildDate>Thu, 07 May 2026 14:31:24 +0000</lastBuildDate>
	<language>en-AU</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.vertexcybersecurity.com.au/wp-content/uploads/2024/08/cropped-ColoredLogo-32x32.png</url>
	<title>Data Privacy Archives - Vertex Cyber Security</title>
	<link>https://www.vertexcybersecurity.com.au/tag/data-privacy/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>What the White House App Security Mess Teaches Us About Mobile App Safety</title>
		<link>https://www.vertexcybersecurity.com.au/what-the-white-house-app-security-mess-teaches-us-about-mobile-app-safety/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=what-the-white-house-app-security-mess-teaches-us-about-mobile-app-safety</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Thu, 07 May 2026 00:00:19 +0000</pubDate>
				<category><![CDATA[Mobile Applications]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data Privacy]]></category>
		<category><![CDATA[mobile app security]]></category>
		<category><![CDATA[SSL Pinning]]></category>
		<category><![CDATA[Supply chain attack]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=10751</guid>

					<description><![CDATA[Discover the critical security flaws found in the new White House app and learn how your business can avoid similar mobile application vulnerabilities through better security practices.]]></description>
		
		
		
			</item>
		<item>
		<title>Anthropic complains of AI Data Extraction Cyber Attack using AI chat siphoning vulnerability</title>
		<link>https://www.vertexcybersecurity.com.au/anthropic-complains-of-ai-data-extraction-cyber-attack-using-ai-chat-siphoning-vulnerability/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=anthropic-complains-of-ai-data-extraction-cyber-attack-using-ai-chat-siphoning-vulnerability</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Thu, 05 Mar 2026 23:04:22 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[AI security]]></category>
		<category><![CDATA[Anthropic]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Data Privacy]]></category>
		<category><![CDATA[Emerging Threats]]></category>
		<category><![CDATA[Intellectual Property]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=10348</guid>

					<description><![CDATA[Anthropic accuses Chinese labs of siphoning Claude's data via distillation attacks. Discover the irony of AI data theft and how to protect your business IP.]]></description>
		
		
		
			</item>
		<item>
		<title>Is Your Robot Vacuum Watching You? The Security Lesson Behind the 7,000 Vacuum Breach</title>
		<link>https://www.vertexcybersecurity.com.au/is-your-robot-vacuum-watching-you-the-security-lesson-behind-the-7000-vacuum-breach/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=is-your-robot-vacuum-watching-you-the-security-lesson-behind-the-7000-vacuum-breach</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Thu, 05 Mar 2026 22:03:09 +0000</pubDate>
				<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[Data Privacy]]></category>
		<category><![CDATA[iot]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[smart home]]></category>
		<category><![CDATA[vulnerability management]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=10339</guid>

					<description><![CDATA[A recent incident exposed 7,000 robot vacuums to a single user. Learn about the risks of IoT devices and how to enhance your home and business cybersecurity.]]></description>
		
		
		
			</item>
		<item>
		<title>120,000 cameras hacked: How Connected Devices Become Your Greatest Vulnerability</title>
		<link>https://www.vertexcybersecurity.com.au/120000-cameras-hacked-how-connected-devices-become-your-greatest-vulnerability/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=120000-cameras-hacked-how-connected-devices-become-your-greatest-vulnerability</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Mon, 22 Dec 2025 03:18:13 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Data Privacy]]></category>
		<category><![CDATA[iot]]></category>
		<category><![CDATA[Network Protection]]></category>
		<category><![CDATA[Smart Devices]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=10110</guid>

					<description><![CDATA[Discover how internet-connected devices like IP cameras can become major security vulnerabilities and learn practical steps to protect your network from IoT threats.]]></description>
		
		
		
			</item>
		<item>
		<title>The Flight to Data Sovereignty: Why Airbus is Grounding Big Tech Clouds</title>
		<link>https://www.vertexcybersecurity.com.au/the-flight-to-data-sovereignty-why-airbus-is-grounding-big-tech-clouds/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-flight-to-data-sovereignty-why-airbus-is-grounding-big-tech-clouds</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Mon, 22 Dec 2025 02:43:17 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Airbus]]></category>
		<category><![CDATA[Big Tech]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[Data Privacy]]></category>
		<category><![CDATA[data sovereignty]]></category>
		<category><![CDATA[Multi-Cloud Strategy]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=10103</guid>

					<description><![CDATA[Airbus is moving mission-critical systems away from AWS, Google, and Microsoft. Discover why data sovereignty is becoming a strategic priority for global businesses.]]></description>
		
		
		
			</item>
		<item>
		<title>Can You Trust AI? How Ads and Censorship Are Rewriting Reality</title>
		<link>https://www.vertexcybersecurity.com.au/can-you-trust-ai-how-ads-and-censorship-are-rewriting-reality/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=can-you-trust-ai-how-ads-and-censorship-are-rewriting-reality</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Sun, 30 Nov 2025 23:11:39 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[AI Safety]]></category>
		<category><![CDATA[Corporate Governance]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Data Privacy]]></category>
		<category><![CDATA[Information Integrity]]></category>
		<category><![CDATA[Tech News]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=9920</guid>

					<description><![CDATA[Are your AI tools lying to you? From OpenAI testing ads to censorship erasing history, discover the risks of AI manipulation and how to protect your business's data integrity with Vertex Cyber Security.]]></description>
		
		
		
			</item>
		<item>
		<title>The AI Browser Boom: Are We Ignoring Major Security Flaws?</title>
		<link>https://www.vertexcybersecurity.com.au/the-ai-browser-boom-are-we-ignoring-major-security-flaws/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-ai-browser-boom-are-we-ignoring-major-security-flaws</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Mon, 17 Nov 2025 03:34:15 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Browser Security]]></category>
		<category><![CDATA[Copilot]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data Privacy]]></category>
		<category><![CDATA[LLM]]></category>
		<category><![CDATA[Perplexity]]></category>
		<category><![CDATA[Prompt Injection]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=9897</guid>

					<description><![CDATA[New AI browsers like Perplexity, Edge Copilot, and Brave offer new features, but they come with significant cybersecurity risks like prompt injection and data leaks. Learn why these tools may not be secure.]]></description>
		
		
		
			</item>
		<item>
		<title>Remote Access from China: Denmark&#8217;s Bus Security Loophole Explained</title>
		<link>https://www.vertexcybersecurity.com.au/remote-access-from-china-denmarks-bus-security-loophole-explained/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=remote-access-from-china-denmarks-bus-security-loophole-explained</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Sun, 09 Nov 2025 13:02:29 +0000</pubDate>
				<category><![CDATA[Supplier Risk]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data Privacy]]></category>
		<category><![CDATA[Denmark]]></category>
		<category><![CDATA[iot]]></category>
		<category><![CDATA[Smart Devices]]></category>
		<category><![CDATA[Supply Chain Security]]></category>
		<category><![CDATA[Vertex]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=9821</guid>

					<description><![CDATA[Denmark's electric bus security loophole explained. Learn how remote access from China highlights critical IoT and supply chain risks for all businesses.]]></description>
		
		
		
			</item>
		<item>
		<title>OpenAI&#8217;s &#8220;Mechanical Turk&#8221;: The ChatGPT Data Leak and a Growing Crisis of Trust</title>
		<link>https://www.vertexcybersecurity.com.au/openais-mechanical-turk-the-chatgpt-data-leak-and-a-growing-crisis-of-trust/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=openais-mechanical-turk-the-chatgpt-data-leak-and-a-growing-crisis-of-trust</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Sun, 09 Nov 2025 12:16:37 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[chatgpt]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data leak]]></category>
		<category><![CDATA[Data Privacy]]></category>
		<category><![CDATA[Google Search]]></category>
		<category><![CDATA[Mechanical Turk]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[third-party risk]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=9814</guid>

					<description><![CDATA[Another OpenAI data leak sees private ChatGPT conversations leaked to Google Search. We analyse this latest failure and the growing crisis of trust for the AI giant.]]></description>
		
		
		
			</item>
	</channel>
</rss>
