{"id":257659,"date":"2025-05-27T01:50:04","date_gmt":"2025-05-27T01:50:04","guid":{"rendered":"https:\/\/norgestech.com\/?page_id=257659"},"modified":"2025-08-17T12:38:52","modified_gmt":"2025-08-17T12:38:52","slug":"news","status":"publish","type":"page","link":"https:\/\/norgestech.com\/nb\/news\/","title":{"rendered":"Nyheter"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/norgestech.com\/wp-content\/uploads\/2025\/07\/wallpaperfornews4-scaled.png&#8221; background_enable_pattern_style=&#8221;on&#8221; background_pattern_style=&#8221;diagonal-stripes-2&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_heading title=&#8221;BleepingComputer&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; title_font=&#8221;Ubuntu|700|||||||&#8221; title_text_align=&#8221;center&#8221; title_text_color=&#8221;#FFFFFF&#8221; title_text_shadow_style=&#8221;preset2&#8243; text_shadow_style=&#8221;preset3&#8243; text_shadow_color=&#8221;RGBA(255,255,255,0)&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_heading title=&#8221;The Hacker News&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; title_font=&#8221;Ubuntu|700|||||||&#8221; title_text_align=&#8221;center&#8221; title_text_color=&#8221;#FFFFFF&#8221; title_text_shadow_style=&#8221;preset2&#8243; text_shadow_style=&#8221;preset3&#8243; text_shadow_color=&#8221;RGBA(255,255,255,0)&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;RGBA(255,255,255,0)&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#000000&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_code _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;RGBA(255,255,255,0)&#8221; text_orientation=&#8221;left&#8221; box_shadow_style=&#8221;preset6&#8243; box_shadow_color=&#8221;#FFFFFF&#8221; global_colors_info=&#8221;{}&#8221;]<div class=\"wpra-display align\" data-display-id=\"1\" hx-target=\"this\" hx-swap=\"outerHTML\">    <div class=\"wp-rss-aggregator wpra-list-template \">\n        <ul class=\"rss-aggregator wpra-item-list wpra-item-list--bullets wpra-item-list--default\" start=\"1\">\n                <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/www.bleepingcomputer.com\/news\/artificial-intelligence\/openai-prepares-chromium-based-ai-browser-to-take-on-google\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">OpenAI prepares Chromium-based AI browser to take on Google<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.bleepingcomputer.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">BleepingComputer<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-16\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/www.bleepingcomputer.com\/news\/artificial-intelligence\/leak-chatgpt-cheaper-plan-costs-4-or-350-might-release-everywhere\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Leak: ChatGPT cheaper plan costs $4 or \u00a33.50, might release everywhere<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.bleepingcomputer.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">BleepingComputer<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-16\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/www.bleepingcomputer.com\/news\/artificial-intelligence\/openai-is-improving-chatgpt-voice-mode\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">OpenAI is improving ChatGPT voice mode<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.bleepingcomputer.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">BleepingComputer<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-16\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/researcher-to-release-exploit-for-full-auth-bypass-on-fortiweb\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Researcher to release exploit for full auth bypass on FortiWeb<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.bleepingcomputer.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">BleepingComputer<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-16\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/microsoft-teams-to-protect-against-malicious-urls-dangerous-file-types\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Microsoft Teams to protect against malicious URLs, dangerous file types<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.bleepingcomputer.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">BleepingComputer<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-16\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/colt-telecom-attack-claimed-by-warlock-ransomware-data-up-for-sale\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Colt Telecom attack claimed by WarLock ransomware, data up for sale<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.bleepingcomputer.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">BleepingComputer<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-15\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cisco-warns-of-max-severity-flaw-in-firewall-management-center\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Cisco warns of max severity flaw in Firewall Management Center<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.bleepingcomputer.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">BleepingComputer<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-15\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-reminds-users-of-windows-10-retirement-in-october\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Microsoft reminds of Windows 10 support ending in two months<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.bleepingcomputer.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">BleepingComputer<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-15\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/plex-warns-users-to-patch-security-vulnerability-immediately\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Plex warns users to patch security vulnerability immediately<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.bleepingcomputer.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">BleepingComputer<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-15\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/us-sanctions-grinex-crypto-exchange-garantexs-successor\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">US sanctions Grinex crypto-exchange, Garantex\u2019s successor<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.bleepingcomputer.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">BleepingComputer<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-15\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>\n        <\/ul>\n    <\/div> <\/div><!-- [et_pb_line_break_holder] -->[\/et_pb_code][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#000000&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_code _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; border_color_all=&#8221;RGBA(255,255,255,0)&#8221; box_shadow_style=&#8221;preset6&#8243; box_shadow_color=&#8221;#FFFFFF&#8221; global_colors_info=&#8221;{}&#8221;]<div class=\"wpra-display align\" data-display-id=\"1\" hx-target=\"this\" hx-swap=\"outerHTML\">    <div class=\"wp-rss-aggregator wpra-list-template \">\n        <ul class=\"rss-aggregator wpra-item-list wpra-item-list--bullets wpra-item-list--default\" start=\"1\">\n                <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/thehackernews.com\/2025\/08\/ermac-v30-banking-trojan-source-code.html\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">ERMAC V3.0 Banking Trojan Source Code Leak Exposes Full Malware Infrastructure<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/feeds.feedburner.com\/TheHackersNews\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">The Hacker News<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-16\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/thehackernews.com\/2025\/08\/russian-group-encrypthub-exploits-msc.html\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Russian Group EncryptHub Exploits MSC EvilTwin Vulnerability to Deploy Fickle Stealer Malware<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/feeds.feedburner.com\/TheHackersNews\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">The Hacker News<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-16\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/thehackernews.com\/2025\/08\/taiwan-web-servers-breached-by-uat-7237.html\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Taiwan Web Servers Breached by UAT-7237 Using Customized Open-Source Hacking Tools<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/feeds.feedburner.com\/TheHackersNews\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">The Hacker News<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-15\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/thehackernews.com\/2025\/08\/us-sanctions-garantex-and-grinex-over.html\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">U.S. Sanctions Garantex and Grinex Over $100M in Ransomware-Linked Illicit Crypto Transactions<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/feeds.feedburner.com\/TheHackersNews\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">The Hacker News<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-15\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/thehackernews.com\/2025\/08\/zero-trust-ai-privacy-in-age-of-agentic.html\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Zero Trust + AI: Privacy in the Age of Agentic AI<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/feeds.feedburner.com\/TheHackersNews\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">The Hacker News<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-15\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/thehackernews.com\/2025\/08\/cisco-warns-of-cvss-100-fmc-radius-flaw.html\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Cisco Warns of CVSS 10.0 FMC RADIUS Flaw Allowing Remote Code Execution<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/feeds.feedburner.com\/TheHackersNews\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">The Hacker News<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-15\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/thehackernews.com\/2025\/08\/new-http2-madeyoureset-vulnerability.html\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">New HTTP\/2 'MadeYouReset' Vulnerability Enables Large-Scale DoS Attacks<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/feeds.feedburner.com\/TheHackersNews\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">The Hacker News<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-14\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/thehackernews.com\/2025\/08\/researchers-warn-crossc2-expands-cobalt.html\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Hackers Found Using CrossC2 to Expand Cobalt Strike Beacon\u2019s Reach to Linux and macOS<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/feeds.feedburner.com\/TheHackersNews\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">The Hacker News<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-14\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/thehackernews.com\/2025\/08\/have-you-turned-off-your-virtual-oven.html\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Have You Turned Off Your Virtual Oven?<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/feeds.feedburner.com\/TheHackersNews\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">The Hacker News<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-14\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/thehackernews.com\/2025\/08\/new-android-malware-wave-hits-banking.html\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">New Android Malware Wave Hits Banking via NFC Relay Fraud, Call Hijacking, and Root Exploits<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/feeds.feedburner.com\/TheHackersNews\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">The Hacker News<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-14\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>\n        <\/ul>\n    <\/div> <\/div><!-- [et_pb_line_break_holder] -->[\/et_pb_code][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider color=&#8221;#1FFFFF&#8221; divider_weight=&#8221;2px&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;RGBA(255,255,255,0)&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_heading title=&#8221;GovInfoSecurity&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; title_font=&#8221;Ubuntu|700|||||||&#8221; title_text_align=&#8221;center&#8221; title_text_color=&#8221;#FFFFFF&#8221; title_text_shadow_style=&#8221;preset2&#8243; text_shadow_style=&#8221;preset3&#8243; text_shadow_color=&#8221;RGBA(255,255,255,0)&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_heading title=&#8221;Infosecurity Magazine&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; title_font=&#8221;Ubuntu|700|||||||&#8221; title_text_align=&#8221;center&#8221; title_text_color=&#8221;#FFFFFF&#8221; title_text_shadow_style=&#8221;preset2&#8243; text_shadow_style=&#8221;preset3&#8243; text_shadow_color=&#8221;RGBA(255,255,255,0)&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_code _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#000000&#8243; box_shadow_style=&#8221;preset6&#8243; box_shadow_color=&#8221;#FFFFFF&#8221; global_colors_info=&#8221;{}&#8221;]<div class=\"wpra-display align\" data-display-id=\"1\" hx-target=\"this\" hx-swap=\"outerHTML\">    <div class=\"wp-rss-aggregator wpra-list-template \">\n        <ul class=\"rss-aggregator wpra-item-list wpra-item-list--bullets wpra-item-list--default\" start=\"1\">\n                <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/www.govinfosecurity.com\/ai-worker-digital-twins-pose-new-insider-threats-a-29238\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">AI Worker Digital Twins Pose New Insider Threats<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.govinfosecurity.com\/rss_feed.php\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">GovInfoSecurity<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-15\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/www.govinfosecurity.com\/rethinking-software-supply-chain-security-a-29237\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Rethinking Software Supply Chain Security<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.govinfosecurity.com\/rss_feed.php\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">GovInfoSecurity<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-15\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/www.govinfosecurity.com\/how-cybersecurity-helped-estonia-carve-niche-in-space-a-29236\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">How Cybersecurity Helped Estonia Carve a Niche in Space<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.govinfosecurity.com\/rss_feed.php\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">GovInfoSecurity<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-15\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/www.govinfosecurity.com\/ismg-editors-dutch-lab-hack-shows-healthcare-security-gaps-a-29233\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">ISMG Editors: Dutch Lab Hack Shows Healthcare Security Gaps<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.govinfosecurity.com\/rss_feed.php\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">GovInfoSecurity<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-15\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/www.govinfosecurity.com\/interviews\/how-ot-device-flaws-threaten-hospital-operations-i-5492\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">How OT Device Flaws Can Threaten Hospital Operations<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.govinfosecurity.com\/rss_feed.php\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">GovInfoSecurity<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-15\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/www.govinfosecurity.com\/navigating-multiple-state-ai-laws-in-wake-us-deregulation-a-29235\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Navigating Multiple State AI Laws in the Wake of US Deregulation<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.govinfosecurity.com\/rss_feed.php\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">GovInfoSecurity<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-15\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/www.govinfosecurity.com\/pakistans-oil-gas-sector-hit-by-blue-locker-ransomware-a-29232\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Pakistan's Oil and Gas Sector Hit by Blue Locker Ransomware<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.govinfosecurity.com\/rss_feed.php\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">GovInfoSecurity<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-15\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/www.govinfosecurity.com\/blogs\/from-awareness-to-action-building-lasting-cybersecurity-habits-p-3928\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">From Awareness to Action: Building Lasting Cybersecurity Habits<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.govinfosecurity.com\/rss_feed.php\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">GovInfoSecurity<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-15\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/www.govinfosecurity.com\/north-korean-hackers-launch-new-cyber-assault-on-south-korea-a-29231\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">North Korean Hackers Launch New Cyber Assault on South Korea<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.govinfosecurity.com\/rss_feed.php\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">GovInfoSecurity<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-14\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/www.govinfosecurity.com\/us-sanctions-crypto-exchange-tied-to-russian-ransomware-a-29230\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">US Sanctions Crypto Exchange Tied to Russian Ransomware<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.govinfosecurity.com\/rss_feed.php\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">GovInfoSecurity<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-14\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>\n        <\/ul>\n    <\/div> <\/div><!-- [et_pb_line_break_holder] -->[\/et_pb_code][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_code _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#000000&#8243; box_shadow_style=&#8221;preset6&#8243; box_shadow_color=&#8221;#FFFFFF&#8221; global_colors_info=&#8221;{}&#8221;]<div class=\"wpra-display align\" data-display-id=\"1\" hx-target=\"this\" hx-swap=\"outerHTML\">    <div class=\"wp-rss-aggregator wpra-list-template \">\n        <ul class=\"rss-aggregator wpra-item-list wpra-item-list--bullets wpra-item-list--default\" start=\"1\">\n                <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/us-canada-australia-nz-ot-security\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">US and Five Global Partners Release First Unified OT Security Taxonomy<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.infosecurity-magazine.com\/rss\/news\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Infosecurity Magazine<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-15\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/cisco-critical-rce-flaw-firewall\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Cisco Discloses Critical RCE Flaw in Firewall Management Software<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.infosecurity-magazine.com\/rss\/news\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Infosecurity Magazine<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-15\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/majority-of-orgs-ship-vulnerable\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Majority of Organizations Ship Vulnerable Code, Study Finds<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.infosecurity-magazine.com\/rss\/news\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Infosecurity Magazine<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-15\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/authorized-push-payment-national\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Authorized Push Payment Fraud a National Security Risk to UK, Report Finds<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.infosecurity-magazine.com\/rss\/news\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Infosecurity Magazine<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-15\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/kernelsu-flaw-android-apps-root\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">KernelSU v0.5.7 Flaw Lets Android Apps Gain Root Access<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.infosecurity-magazine.com\/rss\/news\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Infosecurity Magazine<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-14\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/malvertising-powershell-malware\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Malvertising Campaign Deploys Modular PowerShell Malware PS1Bot<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.infosecurity-magazine.com\/rss\/news\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Infosecurity Magazine<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-14\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/fbi-spot-fake-lawyer-schemes\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">FBI Shares Tips to Spot Fake Lawyer Schemes Targeting Crypto Scam Victims<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.infosecurity-magazine.com\/rss\/news\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Infosecurity Magazine<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-14\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/law-enforcement-government-emails\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Hacked Law Enforcement and Government Email Accounts Sold on Dark Web for $40<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.infosecurity-magazine.com\/rss\/news\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Infosecurity Magazine<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-14\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/fortinet-exploit-code-available\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Fortinet Warns Exploit Code Available for Critical Vulnerability<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.infosecurity-magazine.com\/rss\/news\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Infosecurity Magazine<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-14\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/campaigners-slam-police-facial\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Campaigners Slam Expansion of Police Facial Recognition Schemes in UK<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.infosecurity-magazine.com\/rss\/news\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Infosecurity Magazine<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-14\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>\n        <\/ul>\n    <\/div> <\/div><!-- [et_pb_line_break_holder] -->[\/et_pb_code][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider color=&#8221;#1FFFFF&#8221; divider_weight=&#8221;2px&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;RGBA(255,255,255,0)&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_heading title=&#8221;CyberScoop&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; title_font=&#8221;Ubuntu|700|||||||&#8221; title_text_align=&#8221;center&#8221; title_text_color=&#8221;#FFFFFF&#8221; title_text_shadow_style=&#8221;preset2&#8243; text_shadow_style=&#8221;preset3&#8243; text_shadow_color=&#8221;RGBA(255,255,255,0)&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_heading title=&#8221;Krebs on Security&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; title_font=&#8221;Ubuntu|700|||||||&#8221; title_text_align=&#8221;center&#8221; title_text_color=&#8221;#FFFFFF&#8221; title_text_shadow_style=&#8221;preset2&#8243; text_shadow_style=&#8221;preset3&#8243; text_shadow_color=&#8221;RGBA(255,255,255,0)&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_code _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#000000&#8243; box_shadow_style=&#8221;preset6&#8243; box_shadow_color=&#8221;#FFFFFF&#8221; global_colors_info=&#8221;{}&#8221; box_shadow_blur__hover_enabled=&#8221;on|desktop&#8221;]<div class=\"wpra-display align\" data-display-id=\"1\" hx-target=\"this\" hx-swap=\"outerHTML\">    <div class=\"wp-rss-aggregator wpra-list-template \">\n        <ul class=\"rss-aggregator wpra-item-list wpra-item-list--bullets wpra-item-list--default\" start=\"1\">\n                <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/cyberscoop.com\/fcc-court-upholds-92-million-dollar-fine-on-telecoms\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Court rebuffs request by telecoms to review $92 million privacy fine\u00a0\u00a0<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.cyberscoop.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">CyberScoop<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-15\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/cyberscoop.com\/cisco-vulnerability-secure-firewall-management-center\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Cisco discloses maximum-severity defect in firewall software<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.cyberscoop.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">CyberScoop<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-15\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/cyberscoop.com\/court-upholds-fcc-data-breach-regulations-pii\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Court upholds FCC data breach reporting rules on telecom sector<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.cyberscoop.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">CyberScoop<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-15\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/cyberscoop.com\/garantex-grinex-russian-crypto-exchange-sanctions\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">US widens sanctions on Russian crypto exchange Garantex, its successor and affiliate firms<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.cyberscoop.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">CyberScoop<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-14\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/cyberscoop.com\/russia-restricts-whatsapp-telegram-calls-alleging-criminal-terrorist-activity\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Russia restricts WhatsApp, Telegram calls, alleging criminal, terrorist activity<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.cyberscoop.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">CyberScoop<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-13\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/cyberscoop.com\/fortinet-fortisiem-critical-vulnerability-ssl-vpn-brute-force-traffic\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Fortinet SIEM issue coincides with spike in brute-force traffic against company\u2019s SSL VPNs<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.cyberscoop.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">CyberScoop<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-13\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/cyberscoop.com\/trump-administration-cybersecurity-executive-orders-policy-changes-2025\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">The overlooked changes that two Trump executive orders could bring to cybersecurity<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.cyberscoop.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">CyberScoop<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-13\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/cyberscoop.com\/sean-plankey-cisa-confirmation-op-ed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Patch the vulnerability: Confirm Sean Plankey as CISA director<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.cyberscoop.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">CyberScoop<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-13\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/cyberscoop.com\/microsoft-patch-tuesday-august-2025\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Microsoft Patch Tuesday follows SharePoint attacks, Exchange server warnings<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.cyberscoop.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">CyberScoop<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-12\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/cyberscoop.com\/gpt5-openai-microsoft-security-review\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Guess what else GPT-5 is bad at? Security<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.cyberscoop.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">CyberScoop<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-12\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>\n        <\/ul>\n    <\/div> <\/div><!-- [et_pb_line_break_holder] -->[\/et_pb_code][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_code _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#000000&#8243; box_shadow_style=&#8221;preset6&#8243; box_shadow_color=&#8221;#FFFFFF&#8221; global_colors_info=&#8221;{}&#8221;]<div class=\"wpra-display align\" data-display-id=\"1\" hx-target=\"this\" hx-swap=\"outerHTML\">    <div class=\"wp-rss-aggregator wpra-list-template \">\n        <ul class=\"rss-aggregator wpra-item-list wpra-item-list--bullets wpra-item-list--default\" start=\"1\">\n                <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/krebsonsecurity.com\/2025\/08\/mobile-phishers-target-brokerage-accounts-in-ramp-and-dump-cashout-scheme\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Mobile Phishers Target Brokerage Accounts in \u2018Ramp and Dump\u2019 Cashout Scheme<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/krebsonsecurity.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Krebs on Security<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-15\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/krebsonsecurity.com\/2025\/08\/microsoft-patch-tuesday-august-2025-edition\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Microsoft Patch Tuesday, August 2025 Edition<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/krebsonsecurity.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Krebs on Security<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-12\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/krebsonsecurity.com\/2025\/08\/krebsonsecurity-in-new-most-wanted-hbo-max-series\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">KrebsOnSecurity in New \u2018Most Wanted\u2019 HBO Max Series<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/krebsonsecurity.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Krebs on Security<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-08\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/krebsonsecurity.com\/2025\/08\/who-got-arrested-in-the-raid-on-the-xss-crime-forum\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Who Got Arrested in the Raid on the XSS Crime Forum?<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/krebsonsecurity.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Krebs on Security<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-06\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/krebsonsecurity.com\/2025\/07\/scammers-unleash-flood-of-slick-online-gaming-sites\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Scammers Unleash Flood of Slick Online Gaming Sites<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/krebsonsecurity.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Krebs on Security<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-07-30\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/krebsonsecurity.com\/2025\/07\/phishers-target-aviation-execs-to-scam-customers\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Phishers Target Aviation Execs to Scam Customers<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/krebsonsecurity.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Krebs on Security<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-07-24\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/krebsonsecurity.com\/2025\/07\/microsoft-fix-targets-attacks-on-sharepoint-zero-day\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Microsoft Fix Targets Attacks on SharePoint Zero-Day<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/krebsonsecurity.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Krebs on Security<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-07-21\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/krebsonsecurity.com\/2025\/07\/poor-passwords-tattle-on-ai-hiring-bot-maker-paradox-ai\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Poor Passwords Tattle on AI Hiring Bot Maker Paradox.ai<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/krebsonsecurity.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Krebs on Security<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-07-18\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/krebsonsecurity.com\/2025\/07\/doge-denizen-marko-elez-leaked-api-key-for-xai\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">DOGE Denizen Marko Elez Leaked API Key for xAI<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/krebsonsecurity.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Krebs on Security<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-07-15\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item \">\n        <a href=\"https:\/\/krebsonsecurity.com\/2025\/07\/uk-charges-four-in-scattered-spider-ransom-group\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">UK Charges Four in \u2018Scattered Spider\u2019 Ransom Group<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/krebsonsecurity.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Krebs on Security<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-07-10\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>\n        <\/ul>\n    <\/div> <\/div>[\/et_pb_code][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#0E164B&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;0px||0px||true|false&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][et_pb_row column_structure=&#8221;1_4,1_2,1_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;-7px|auto||auto||&#8221; custom_padding=&#8221;41px|||||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/norgestech.com\/wp-content\/uploads\/2023\/01\/Untitled-design4.png&#8221; title_text=&#8221;norges tech logo horizontal&#8221; url=&#8221;#mainslide&#8221; align_tablet=&#8221;center&#8221; align_phone=&#8221;&#8221; align_last_edited=&#8221;on|tablet&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;4px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.19.4&#8243; _dynamic_attributes=&#8221;content&#8221; _module_preset=&#8221;default&#8221; text_font=&#8221;Ubuntu||||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;17px&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;34px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoiY3VycmVudF9kYXRlIiwic2V0dGluZ3MiOnsiYmVmb3JlIjoiQ29weXJpZ2h0IFx1MDBhOSAiLCJhZnRlciI6IiBOb3JnZXMgVGVjaCIsImRhdGVfZm9ybWF0IjoiY3VzdG9tIiwiY3VzdG9tX2RhdGVfZm9ybWF0IjoiWSJ9fQ==@[\/et_pb_text][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Ubuntu||||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;17px&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;0px||||false|false&#8221; link_option_url=&#8221;https:\/\/norgestech.com\/privacy-policy\/&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\">Privacy Policy<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Ubuntu||||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;17px&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;-26px||||false|false&#8221; link_option_url=&#8221;https:\/\/norgestech.com\/terms-and-conditions\/&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\">Terms &amp; Conditions<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Ubuntu||||||||&#8221; text_font_size=&#8221;17px&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;34px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"color: #ffffff;\"><strong>info@norgestech.com<\/strong><\/span><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Ubuntu||||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;17px&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;-26px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Norges Tech Dagarslan ENK.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Ubuntu||||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;17px&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;-26px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Org. No: 927187906<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Ubuntu||||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;17px&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;-26px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Stavanger\/Norway<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p><div class=\"wpra-display align\" data-display-id=\"1\" hx-target=\"this\" hx-swap=\"outerHTML\">    <div class=\"wp-rss-aggregator wpra-list-template\">\n        <ul class=\"rss-aggregator wpra-item-list wpra-item-list--bullets wpra-item-list--default\" start=\"1\">\n                <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/www.bleepingcomputer.com\/news\/artificial-intelligence\/openai-prepares-chromium-based-ai-browser-to-take-on-google\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">OpenAI prepares Chromium-based AI browser to take on Google<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.bleepingcomputer.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">BleepingComputer<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-16\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/www.bleepingcomputer.com\/news\/artificial-intelligence\/leak-chatgpt-cheaper-plan-costs-4-or-350-might-release-everywhere\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Leak: ChatGPT cheaper plan costs $4 or \u00a33.50, might release everywhere<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.bleepingcomputer.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">BleepingComputer<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-16\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/www.bleepingcomputer.com\/news\/artificial-intelligence\/openai-is-improving-chatgpt-voice-mode\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">OpenAI is improving ChatGPT voice mode<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.bleepingcomputer.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">BleepingComputer<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-16\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/researcher-to-release-exploit-for-full-auth-bypass-on-fortiweb\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Researcher to release exploit for full auth bypass on FortiWeb<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.bleepingcomputer.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">BleepingComputer<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-16\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/microsoft-teams-to-protect-against-malicious-urls-dangerous-file-types\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Microsoft Teams to protect against malicious URLs, dangerous file types<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.bleepingcomputer.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">BleepingComputer<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-16\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/colt-telecom-attack-claimed-by-warlock-ransomware-data-up-for-sale\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Colt Telecom attack claimed by WarLock ransomware, data up for sale<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.bleepingcomputer.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">BleepingComputer<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-15\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cisco-warns-of-max-severity-flaw-in-firewall-management-center\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Cisco warns of max severity flaw in Firewall Management Center<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.bleepingcomputer.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">BleepingComputer<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-15\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-reminds-users-of-windows-10-retirement-in-october\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Microsoft reminds of Windows 10 support ending in two months<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.bleepingcomputer.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">BleepingComputer<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-15\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/plex-warns-users-to-patch-security-vulnerability-immediately\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Plex warns users to patch security vulnerability immediately<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.bleepingcomputer.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">BleepingComputer<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-15\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/us-sanctions-grinex-crypto-exchange-garantexs-successor\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">US sanctions Grinex crypto-exchange, Garantex\u2019s successor<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.bleepingcomputer.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">BleepingComputer<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-15\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>\n        <\/ul>\n    <\/div> <\/div><div class=\"wpra-display align\" data-display-id=\"1\" hx-target=\"this\" hx-swap=\"outerHTML\">    <div class=\"wp-rss-aggregator wpra-list-template\">\n        <ul class=\"rss-aggregator wpra-item-list wpra-item-list--bullets wpra-item-list--default\" start=\"1\">\n                <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/thehackernews.com\/2025\/08\/ermac-v30-banking-trojan-source-code.html\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">ERMAC V3.0 Banking Trojan Source Code Leak Exposes Full Malware Infrastructure<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/feeds.feedburner.com\/TheHackersNews\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">The Hacker News<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-16\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/thehackernews.com\/2025\/08\/russian-group-encrypthub-exploits-msc.html\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Russian Group EncryptHub Exploits MSC EvilTwin Vulnerability to Deploy Fickle Stealer Malware<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/feeds.feedburner.com\/TheHackersNews\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">The Hacker News<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-16\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/thehackernews.com\/2025\/08\/taiwan-web-servers-breached-by-uat-7237.html\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Taiwan Web Servers Breached by UAT-7237 Using Customized Open-Source Hacking Tools<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/feeds.feedburner.com\/TheHackersNews\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">The Hacker News<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-15\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/thehackernews.com\/2025\/08\/us-sanctions-garantex-and-grinex-over.html\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">U.S. Sanctions Garantex and Grinex Over $100M in Ransomware-Linked Illicit Crypto Transactions<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/feeds.feedburner.com\/TheHackersNews\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">The Hacker News<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-15\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/thehackernews.com\/2025\/08\/zero-trust-ai-privacy-in-age-of-agentic.html\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Zero Trust + AI: Privacy in the Age of Agentic AI<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/feeds.feedburner.com\/TheHackersNews\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">The Hacker News<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-15\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/thehackernews.com\/2025\/08\/cisco-warns-of-cvss-100-fmc-radius-flaw.html\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Cisco Warns of CVSS 10.0 FMC RADIUS Flaw Allowing Remote Code Execution<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/feeds.feedburner.com\/TheHackersNews\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">The Hacker News<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-15\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/thehackernews.com\/2025\/08\/new-http2-madeyoureset-vulnerability.html\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">New HTTP\/2 'MadeYouReset' Vulnerability Enables Large-Scale DoS Attacks<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/feeds.feedburner.com\/TheHackersNews\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">The Hacker News<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-14\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/thehackernews.com\/2025\/08\/researchers-warn-crossc2-expands-cobalt.html\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Hackers Found Using CrossC2 to Expand Cobalt Strike Beacon\u2019s Reach to Linux and macOS<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/feeds.feedburner.com\/TheHackersNews\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">The Hacker News<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-14\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/thehackernews.com\/2025\/08\/have-you-turned-off-your-virtual-oven.html\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Have You Turned Off Your Virtual Oven?<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/feeds.feedburner.com\/TheHackersNews\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">The Hacker News<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-14\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/thehackernews.com\/2025\/08\/new-android-malware-wave-hits-banking.html\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">New Android Malware Wave Hits Banking via NFC Relay Fraud, Call Hijacking, and Root Exploits<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/feeds.feedburner.com\/TheHackersNews\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">The Hacker News<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-14\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>\n        <\/ul>\n    <\/div> <\/div><div class=\"wpra-display align\" data-display-id=\"1\" hx-target=\"this\" hx-swap=\"outerHTML\">    <div class=\"wp-rss-aggregator wpra-list-template\">\n        <ul class=\"rss-aggregator wpra-item-list wpra-item-list--bullets wpra-item-list--default\" start=\"1\">\n                <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/www.govinfosecurity.com\/ai-worker-digital-twins-pose-new-insider-threats-a-29238\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">AI Worker Digital Twins Pose New Insider Threats<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.govinfosecurity.com\/rss_feed.php\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">GovInfoSecurity<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-15\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/www.govinfosecurity.com\/rethinking-software-supply-chain-security-a-29237\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Rethinking Software Supply Chain Security<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.govinfosecurity.com\/rss_feed.php\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">GovInfoSecurity<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-15\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/www.govinfosecurity.com\/how-cybersecurity-helped-estonia-carve-niche-in-space-a-29236\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">How Cybersecurity Helped Estonia Carve a Niche in Space<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.govinfosecurity.com\/rss_feed.php\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">GovInfoSecurity<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-15\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/www.govinfosecurity.com\/ismg-editors-dutch-lab-hack-shows-healthcare-security-gaps-a-29233\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">ISMG Editors: Dutch Lab Hack Shows Healthcare Security Gaps<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.govinfosecurity.com\/rss_feed.php\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">GovInfoSecurity<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-15\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/www.govinfosecurity.com\/interviews\/how-ot-device-flaws-threaten-hospital-operations-i-5492\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">How OT Device Flaws Can Threaten Hospital Operations<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.govinfosecurity.com\/rss_feed.php\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">GovInfoSecurity<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-15\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/www.govinfosecurity.com\/navigating-multiple-state-ai-laws-in-wake-us-deregulation-a-29235\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Navigating Multiple State AI Laws in the Wake of US Deregulation<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.govinfosecurity.com\/rss_feed.php\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">GovInfoSecurity<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-15\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/www.govinfosecurity.com\/pakistans-oil-gas-sector-hit-by-blue-locker-ransomware-a-29232\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Pakistan's Oil and Gas Sector Hit by Blue Locker Ransomware<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.govinfosecurity.com\/rss_feed.php\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">GovInfoSecurity<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-15\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/www.govinfosecurity.com\/blogs\/from-awareness-to-action-building-lasting-cybersecurity-habits-p-3928\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">From Awareness to Action: Building Lasting Cybersecurity Habits<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.govinfosecurity.com\/rss_feed.php\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">GovInfoSecurity<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-15\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/www.govinfosecurity.com\/north-korean-hackers-launch-new-cyber-assault-on-south-korea-a-29231\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">North Korean Hackers Launch New Cyber Assault on South Korea<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.govinfosecurity.com\/rss_feed.php\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">GovInfoSecurity<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-14\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/www.govinfosecurity.com\/us-sanctions-crypto-exchange-tied-to-russian-ransomware-a-29230\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">US Sanctions Crypto Exchange Tied to Russian Ransomware<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.govinfosecurity.com\/rss_feed.php\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">GovInfoSecurity<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-14\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>\n        <\/ul>\n    <\/div> <\/div><div class=\"wpra-display align\" data-display-id=\"1\" hx-target=\"this\" hx-swap=\"outerHTML\">    <div class=\"wp-rss-aggregator wpra-list-template\">\n        <ul class=\"rss-aggregator wpra-item-list wpra-item-list--bullets wpra-item-list--default\" start=\"1\">\n                <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/us-canada-australia-nz-ot-security\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">US and Five Global Partners Release First Unified OT Security Taxonomy<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.infosecurity-magazine.com\/rss\/news\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Infosecurity Magazine<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-15\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/cisco-critical-rce-flaw-firewall\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Cisco Discloses Critical RCE Flaw in Firewall Management Software<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.infosecurity-magazine.com\/rss\/news\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Infosecurity Magazine<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-15\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/majority-of-orgs-ship-vulnerable\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Majority of Organizations Ship Vulnerable Code, Study Finds<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.infosecurity-magazine.com\/rss\/news\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Infosecurity Magazine<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-15\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/authorized-push-payment-national\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Authorized Push Payment Fraud a National Security Risk to UK, Report Finds<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.infosecurity-magazine.com\/rss\/news\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Infosecurity Magazine<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-15\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/kernelsu-flaw-android-apps-root\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">KernelSU v0.5.7 Flaw Lets Android Apps Gain Root Access<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.infosecurity-magazine.com\/rss\/news\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Infosecurity Magazine<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-14\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/malvertising-powershell-malware\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Malvertising Campaign Deploys Modular PowerShell Malware PS1Bot<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.infosecurity-magazine.com\/rss\/news\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Infosecurity Magazine<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-14\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/fbi-spot-fake-lawyer-schemes\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">FBI Shares Tips to Spot Fake Lawyer Schemes Targeting Crypto Scam Victims<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.infosecurity-magazine.com\/rss\/news\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Infosecurity Magazine<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-14\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/law-enforcement-government-emails\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Hacked Law Enforcement and Government Email Accounts Sold on Dark Web for $40<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.infosecurity-magazine.com\/rss\/news\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Infosecurity Magazine<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-14\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/fortinet-exploit-code-available\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Fortinet Warns Exploit Code Available for Critical Vulnerability<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.infosecurity-magazine.com\/rss\/news\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Infosecurity Magazine<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-14\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/campaigners-slam-police-facial\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Campaigners Slam Expansion of Police Facial Recognition Schemes in UK<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.infosecurity-magazine.com\/rss\/news\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Infosecurity Magazine<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-14\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>\n        <\/ul>\n    <\/div> <\/div><div class=\"wpra-display align\" data-display-id=\"1\" hx-target=\"this\" hx-swap=\"outerHTML\">    <div class=\"wp-rss-aggregator wpra-list-template\">\n        <ul class=\"rss-aggregator wpra-item-list wpra-item-list--bullets wpra-item-list--default\" start=\"1\">\n                <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/cyberscoop.com\/fcc-court-upholds-92-million-dollar-fine-on-telecoms\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Court rebuffs request by telecoms to review $92 million privacy fine\u00a0\u00a0<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.cyberscoop.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">CyberScoop<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-15\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/cyberscoop.com\/cisco-vulnerability-secure-firewall-management-center\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Cisco discloses maximum-severity defect in firewall software<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.cyberscoop.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">CyberScoop<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-15\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/cyberscoop.com\/court-upholds-fcc-data-breach-regulations-pii\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Court upholds FCC data breach reporting rules on telecom sector<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.cyberscoop.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">CyberScoop<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-15\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/cyberscoop.com\/garantex-grinex-russian-crypto-exchange-sanctions\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">US widens sanctions on Russian crypto exchange Garantex, its successor and affiliate firms<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.cyberscoop.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">CyberScoop<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-14\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/cyberscoop.com\/russia-restricts-whatsapp-telegram-calls-alleging-criminal-terrorist-activity\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Russia restricts WhatsApp, Telegram calls, alleging criminal, terrorist activity<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.cyberscoop.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">CyberScoop<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-13\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/cyberscoop.com\/fortinet-fortisiem-critical-vulnerability-ssl-vpn-brute-force-traffic\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Fortinet SIEM issue coincides with spike in brute-force traffic against company\u2019s SSL VPNs<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.cyberscoop.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">CyberScoop<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-13\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/cyberscoop.com\/trump-administration-cybersecurity-executive-orders-policy-changes-2025\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">The overlooked changes that two Trump executive orders could bring to cybersecurity<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.cyberscoop.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">CyberScoop<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-13\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/cyberscoop.com\/sean-plankey-cisa-confirmation-op-ed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Patch the vulnerability: Confirm Sean Plankey as CISA director<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.cyberscoop.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">CyberScoop<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-13\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/cyberscoop.com\/microsoft-patch-tuesday-august-2025\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Microsoft Patch Tuesday follows SharePoint attacks, Exchange server warnings<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.cyberscoop.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">CyberScoop<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-12\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/cyberscoop.com\/gpt5-openai-microsoft-security-review\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Guess what else GPT-5 is bad at? Security<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/www.cyberscoop.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">CyberScoop<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-12\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>\n        <\/ul>\n    <\/div> <\/div><div class=\"wpra-display align\" data-display-id=\"1\" hx-target=\"this\" hx-swap=\"outerHTML\">    <div class=\"wp-rss-aggregator wpra-list-template\">\n        <ul class=\"rss-aggregator wpra-item-list wpra-item-list--bullets wpra-item-list--default\" start=\"1\">\n                <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/krebsonsecurity.com\/2025\/08\/mobile-phishers-target-brokerage-accounts-in-ramp-and-dump-cashout-scheme\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Mobile Phishers Target Brokerage Accounts in \u2018Ramp and Dump\u2019 Cashout Scheme<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/krebsonsecurity.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Krebs on Security<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-15\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/krebsonsecurity.com\/2025\/08\/microsoft-patch-tuesday-august-2025-edition\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Microsoft Patch Tuesday, August 2025 Edition<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/krebsonsecurity.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Krebs on Security<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-12\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/krebsonsecurity.com\/2025\/08\/krebsonsecurity-in-new-most-wanted-hbo-max-series\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">KrebsOnSecurity in New \u2018Most Wanted\u2019 HBO Max Series<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/krebsonsecurity.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Krebs on Security<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-08\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/krebsonsecurity.com\/2025\/08\/who-got-arrested-in-the-raid-on-the-xss-crime-forum\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Who Got Arrested in the Raid on the XSS Crime Forum?<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/krebsonsecurity.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Krebs on Security<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-08-06\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/krebsonsecurity.com\/2025\/07\/scammers-unleash-flood-of-slick-online-gaming-sites\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Scammers Unleash Flood of Slick Online Gaming Sites<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/krebsonsecurity.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Krebs on Security<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-07-30\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/krebsonsecurity.com\/2025\/07\/phishers-target-aviation-execs-to-scam-customers\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Phishers Target Aviation Execs to Scam Customers<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/krebsonsecurity.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Krebs on Security<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-07-24\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/krebsonsecurity.com\/2025\/07\/microsoft-fix-targets-attacks-on-sharepoint-zero-day\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Microsoft Fix Targets Attacks on SharePoint Zero-Day<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/krebsonsecurity.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Krebs on Security<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-07-21\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/krebsonsecurity.com\/2025\/07\/poor-passwords-tattle-on-ai-hiring-bot-maker-paradox-ai\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Poor Passwords Tattle on AI Hiring Bot Maker Paradox.ai<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/krebsonsecurity.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Krebs on Security<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-07-18\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/krebsonsecurity.com\/2025\/07\/doge-denizen-marko-elez-leaked-api-key-for-xai\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">DOGE Denizen Marko Elez Leaked API Key for xAI<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/krebsonsecurity.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Krebs on Security<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-07-15\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>    <li class=\"wpra-item feed-item\">\n        <a href=\"https:\/\/krebsonsecurity.com\/2025\/07\/uk-charges-four-in-scattered-spider-ransom-group\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">UK Charges Four in \u2018Scattered Spider\u2019 Ransom Group<\/a>\n\n        <div class=\"wprss-feed-meta\">\n                <span class=\"feed-source\">\n        Source: <a href=\"https:\/\/krebsonsecurity.com\/feed\/\" class=\"\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" style=\"\">Krebs on Security<\/a>\n    <\/span>\n                <span class=\"feed-date\">\n        Published on: 2025-07-10\n    <\/span>\n            \n        <\/div>\n\n        \n    <\/li>\n        <\/ul>\n    <\/div> <\/div>Privacy PolicyTerms &amp; Conditionsinfo@norgestech.comNorges Tech Dagarslan ENK.Org. No: 927187906Stavanger\/Norway<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<!-- wp:divi\/placeholder \/-->","_et_gb_content_width":"","footnotes":""},"class_list":["post-257659","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/norgestech.com\/nb\/wp-json\/wp\/v2\/pages\/257659","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/norgestech.com\/nb\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/norgestech.com\/nb\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/norgestech.com\/nb\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/norgestech.com\/nb\/wp-json\/wp\/v2\/comments?post=257659"}],"version-history":[{"count":5,"href":"https:\/\/norgestech.com\/nb\/wp-json\/wp\/v2\/pages\/257659\/revisions"}],"predecessor-version":[{"id":258868,"href":"https:\/\/norgestech.com\/nb\/wp-json\/wp\/v2\/pages\/257659\/revisions\/258868"}],"wp:attachment":[{"href":"https:\/\/norgestech.com\/nb\/wp-json\/wp\/v2\/media?parent=257659"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}