<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>malware Archives - Vertex Cyber Security</title>
	<atom:link href="https://www.vertexcybersecurity.com.au/tag/malware/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.vertexcybersecurity.com.au/tag/malware/</link>
	<description>Your Partner in Cyber Security</description>
	<lastBuildDate>Mon, 06 Apr 2026 09:32:07 +0000</lastBuildDate>
	<language>en-AU</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.vertexcybersecurity.com.au/wp-content/uploads/2024/08/cropped-ColoredLogo-32x32.png</url>
	<title>malware Archives - Vertex Cyber Security</title>
	<link>https://www.vertexcybersecurity.com.au/tag/malware/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>The Kamikaze Wiper: How TeamPCP Poisoned the Open-Source Supply Chain and Targeted Iran</title>
		<link>https://www.vertexcybersecurity.com.au/the-kamikaze-wiper-how-teampcp-poisoned-the-open-source-supply-chain-and-targeted-iran/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-kamikaze-wiper-how-teampcp-poisoned-the-open-source-supply-chain-and-targeted-iran</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Wed, 25 Mar 2026 22:53:03 +0000</pubDate>
				<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[open source]]></category>
		<category><![CDATA[Supply Chain]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=10481</guid>

					<description><![CDATA[Learn how the TeamPCP hacking group compromised open-source security tools in a major supply chain attack, targeted iran and what this means for your organisation.]]></description>
		
		
		
			</item>
		<item>
		<title>Will Delaying Cyber Security kill your business</title>
		<link>https://www.vertexcybersecurity.com.au/the-levitas-capital-case-why-you-cannot-afford-to-delay-cyber-security/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-levitas-capital-case-why-you-cannot-afford-to-delay-cyber-security</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Tue, 18 Nov 2025 23:53:13 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[BEC]]></category>
		<category><![CDATA[Business Continuity]]></category>
		<category><![CDATA[Business Email Compromise]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[ISO 27001]]></category>
		<category><![CDATA[Levitas Capital]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[SOC 2]]></category>
		<category><![CDATA[Vertex Cyber Security]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=9903</guid>

					<description><![CDATA[Discover how the Levitas Capital cyber attack led to their closure. Learn why proactive, high-quality cyber security, like Vertex's expert services and platforms, is crucial now to avoid irreversible business damage.]]></description>
		
		
		
			</item>
		<item>
		<title>Conveyancers targeted by Cyber Attackers</title>
		<link>https://www.vertexcybersecurity.com.au/conveyancers-targetted-by-cyber-attackers/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=conveyancers-targetted-by-cyber-attackers</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Mon, 02 Jul 2018 05:59:41 +0000</pubDate>
				<category><![CDATA[Cyber Attack]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Process]]></category>
		<category><![CDATA[Australian Institute of Conveyancers]]></category>
		<category><![CDATA[conveyancer]]></category>
		<category><![CDATA[conveyancers]]></category>
		<category><![CDATA[conveyancing]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[email]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[PEXA]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Property Exchange Australia]]></category>
		<category><![CDATA[property lawyer]]></category>
		<category><![CDATA[Sydney]]></category>
		<category><![CDATA[VIC]]></category>
		<guid isPermaLink="false">http://new.vtxsecurity.com.au/?p=619</guid>

					<description><![CDATA[You may have heard about the cyber attack against PEXA and Sargeants Knox Conveyancing that was used to steal $250,000. This money was planned for the purchase of a home for the family of MasterChef finalist Dani Venn, her husband Chris Burgess and their children. Considering conveyancers deal with such large amounts of transfers but are typically [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>The Next AntiVirus</title>
		<link>https://www.vertexcybersecurity.com.au/next-antivirus-antimalware-application-whitelisting/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=next-antivirus-antimalware-application-whitelisting</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Fri, 04 May 2018 13:41:42 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Defence]]></category>
		<category><![CDATA[0-day]]></category>
		<category><![CDATA[0day]]></category>
		<category><![CDATA[antimalware]]></category>
		<category><![CDATA[antivirus]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[application whitelist]]></category>
		<category><![CDATA[av]]></category>
		<category><![CDATA[blacklist]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[EU]]></category>
		<category><![CDATA[EUGDPR]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Mandatory breach notification]]></category>
		<category><![CDATA[virus]]></category>
		<category><![CDATA[whitelist]]></category>
		<category><![CDATA[worm]]></category>
		<category><![CDATA[zero-day]]></category>
		<category><![CDATA[zeroday]]></category>
		<guid isPermaLink="false">http://new.vtxsecurity.com.au/?p=597</guid>

					<description><![CDATA[Antivirus has been the default method for providing computer security for decades. The question is should it continue or what is next? AntiVirus typically works on a list of bad things and then anything being used is compared against the list and anything similar or the same is then blocked. There are many techniques on [&#8230;]]]></description>
		
		
		
			</item>
	</channel>
</rss>
