<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on May 22, 2026 at 9:36 pm by All in One SEO v4.9.7.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://inionline.net/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>inionline.net</title>
		<link><![CDATA[https://inionline.net]]></link>
		<description><![CDATA[inionline.net]]></description>
		<lastBuildDate><![CDATA[Fri, 22 May 2026 15:43:50 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://inionline.net/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://inionline.net/akamai-joins-growing-chorus-of-vendors-betting-big-on-secure-enterprise-browsers/]]></guid>
			<link><![CDATA[https://inionline.net/akamai-joins-growing-chorus-of-vendors-betting-big-on-secure-enterprise-browsers/]]></link>
			<title>Akamai Joins Growing Chorus of Vendors Betting Big on Secure Enterprise Browsers</title>
			<pubDate><![CDATA[Fri, 22 May 2026 15:43:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/verizon-dbir-healthcare-fends-off-increased-social-engineering-attacks/]]></guid>
			<link><![CDATA[https://inionline.net/verizon-dbir-healthcare-fends-off-increased-social-engineering-attacks/]]></link>
			<title>Verizon DBIR: Healthcare Fends Off Increased Social Engineering Attacks</title>
			<pubDate><![CDATA[Fri, 22 May 2026 13:17:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/megalodon-github-attack-targets-5561-repos-with-malicious-ci-cd-workflows/]]></guid>
			<link><![CDATA[https://inionline.net/megalodon-github-attack-targets-5561-repos-with-malicious-ci-cd-workflows/]]></link>
			<title>Megalodon GitHub Attack Targets 5,561 Repos with Malicious CI/CD Workflows</title>
			<pubDate><![CDATA[Fri, 22 May 2026 11:55:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/making-vulnerable-drivers-exploitable-without-hardware-the-byovd-perspective/]]></guid>
			<link><![CDATA[https://inionline.net/making-vulnerable-drivers-exploitable-without-hardware-the-byovd-perspective/]]></link>
			<title>Making Vulnerable Drivers Exploitable Without Hardware &#8211; The BYOVD Perspective</title>
			<pubDate><![CDATA[Fri, 22 May 2026 11:38:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/kimwolf-ddos-botnet-operator-arrested-in-canada-over-ddos-for-hire-attacks/]]></guid>
			<link><![CDATA[https://inionline.net/kimwolf-ddos-botnet-operator-arrested-in-canada-over-ddos-for-hire-attacks/]]></link>
			<title>Kimwolf DDoS Botnet Operator Arrested in Canada Over DDoS-for-Hire Attacks</title>
			<pubDate><![CDATA[Fri, 22 May 2026 08:50:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/chinas-webworm-uses-discord-microsoft-graphs-to-hack-eu-govts/]]></guid>
			<link><![CDATA[https://inionline.net/chinas-webworm-uses-discord-microsoft-graphs-to-hack-eu-govts/]]></link>
			<title>China&#8217;s Webworm Uses Discord, Microsoft Graphs to Hack EU Govts.</title>
			<pubDate><![CDATA[Fri, 22 May 2026 07:01:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/cisa-adds-exploited-langflow-and-trend-micro-apex-one-vulnerabilities-to-kev/]]></guid>
			<link><![CDATA[https://inionline.net/cisa-adds-exploited-langflow-and-trend-micro-apex-one-vulnerabilities-to-kev/]]></link>
			<title>CISA Adds Exploited Langflow and Trend Micro Apex One Vulnerabilities to KEV</title>
			<pubDate><![CDATA[Fri, 22 May 2026 05:47:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/cisco-patches-cvss-10-0-secure-workload-rest-api-flaw-enabling-data-access/]]></guid>
			<link><![CDATA[https://inionline.net/cisco-patches-cvss-10-0-secure-workload-rest-api-flaw-enabling-data-access/]]></link>
			<title>Cisco Patches CVSS 10.0 Secure Workload REST API Flaw Enabling Data Access</title>
			<pubDate><![CDATA[Fri, 22 May 2026 05:36:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/how-cisos-should-prep-for-agentic-ready-ai-boms/]]></guid>
			<link><![CDATA[https://inionline.net/how-cisos-should-prep-for-agentic-ready-ai-boms/]]></link>
			<title>How CISOs Should Prep for Agentic-Ready AI BOMs</title>
			<pubDate><![CDATA[Thu, 21 May 2026 21:11:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/google-api-keys-remain-active-after-deletion/]]></guid>
			<link><![CDATA[https://inionline.net/google-api-keys-remain-active-after-deletion/]]></link>
			<title>Google API Keys Remain Active After Deletion</title>
			<pubDate><![CDATA[Thu, 21 May 2026 20:07:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/ai-agents-are-shifting-identity-security-budget-dynamics/]]></guid>
			<link><![CDATA[https://inionline.net/ai-agents-are-shifting-identity-security-budget-dynamics/]]></link>
			<title>AI Agents Are Shifting Identity Security Budget Dynamics</title>
			<pubDate><![CDATA[Thu, 21 May 2026 15:43:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/showboat-linux-malware-hits-middle-east-telecom-with-socks5-proxy-backdoor/]]></guid>
			<link><![CDATA[https://inionline.net/showboat-linux-malware-hits-middle-east-telecom-with-socks5-proxy-backdoor/]]></link>
			<title>Showboat Linux Malware Hits Middle East Telecom with SOCKS5 Proxy Backdoor</title>
			<pubDate><![CDATA[Thu, 21 May 2026 14:17:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/chinese-apts-share-linux-backdoor-in-central-asia-telco-attacks/]]></guid>
			<link><![CDATA[https://inionline.net/chinese-apts-share-linux-backdoor-in-central-asia-telco-attacks/]]></link>
			<title>Chinese APTs Share Linux Backdoor in Central Asia Telco Attacks</title>
			<pubDate><![CDATA[Thu, 21 May 2026 14:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/content-delivery-exploit-opens-websites-to-brand-hijacking/]]></guid>
			<link><![CDATA[https://inionline.net/content-delivery-exploit-opens-websites-to-brand-hijacking/]]></link>
			<title>Content Delivery Exploit Opens Websites to Brand Hijacking</title>
			<pubDate><![CDATA[Thu, 21 May 2026 13:05:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/threatsday-bulletin-linux-rootkits-router-0-day-ai-intrusions-scam-kits-and-25-new-stories/]]></guid>
			<link><![CDATA[https://inionline.net/threatsday-bulletin-linux-rootkits-router-0-day-ai-intrusions-scam-kits-and-25-new-stories/]]></link>
			<title>ThreatsDay Bulletin: Linux Rootkits, Router 0-Day, AI Intrusions, Scam Kits and 25 New Stories</title>
			<pubDate><![CDATA[Thu, 21 May 2026 11:52:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/microsoft-warns-of-two-actively-exploited-defender-vulnerabilities/]]></guid>
			<link><![CDATA[https://inionline.net/microsoft-warns-of-two-actively-exploited-defender-vulnerabilities/]]></link>
			<title>Microsoft Warns of Two Actively Exploited Defender Vulnerabilities</title>
			<pubDate><![CDATA[Thu, 21 May 2026 10:55:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/when-identity-is-the-attack-path/]]></guid>
			<link><![CDATA[https://inionline.net/when-identity-is-the-attack-path/]]></link>
			<title>When Identity is the Attack Path</title>
			<pubDate><![CDATA[Thu, 21 May 2026 10:30:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/shifting-budget-dynamics-for-identity-security-and-ai-agents/]]></guid>
			<link><![CDATA[https://inionline.net/shifting-budget-dynamics-for-identity-security-and-ai-agents/]]></link>
			<title>Shifting Budget Dynamics for Identity Security and AI Agents</title>
			<pubDate><![CDATA[Thu, 21 May 2026 08:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/9-year-old-linux-kernel-flaw-enables-root-command-execution-on-major-distros/]]></guid>
			<link><![CDATA[https://inionline.net/9-year-old-linux-kernel-flaw-enables-root-command-execution-on-major-distros/]]></link>
			<title>9-Year-Old Linux Kernel Flaw Enables Root Command Execution on Major Distros</title>
			<pubDate><![CDATA[Thu, 21 May 2026 07:35:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/cyber-pros-cant-decide-if-ai-is-a-good-or-a-bad-thing/]]></guid>
			<link><![CDATA[https://inionline.net/cyber-pros-cant-decide-if-ai-is-a-good-or-a-bad-thing/]]></link>
			<title>Cyber Pros Can&#8217;t Decide If AI Is a Good or a Bad Thing</title>
			<pubDate><![CDATA[Wed, 20 May 2026 20:52:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/github-internal-repositories-breached-via-malicious-nx-console-vs-code-extension/]]></guid>
			<link><![CDATA[https://inionline.net/github-internal-repositories-breached-via-malicious-nx-console-vs-code-extension/]]></link>
			<title>GitHub Internal Repositories Breached via Malicious Nx Console VS Code Extension</title>
			<pubDate><![CDATA[Thu, 21 May 2026 04:27:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/highly-critical-drupal-core-flaw-exposes-postgresql-sites-to-rce-attacks/]]></guid>
			<link><![CDATA[https://inionline.net/highly-critical-drupal-core-flaw-exposes-postgresql-sites-to-rce-attacks/]]></link>
			<title>Highly Critical Drupal Core Flaw Exposes PostgreSQL Sites to RCE Attacks</title>
			<pubDate><![CDATA[Thu, 21 May 2026 03:44:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/github-confirms-breach-4k-internal-repos-stolen/]]></guid>
			<link><![CDATA[https://inionline.net/github-confirms-breach-4k-internal-repos-stolen/]]></link>
			<title>GitHub Confirms Breach, 4K Internal Repos Stolen</title>
			<pubDate><![CDATA[Wed, 20 May 2026 20:51:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/fake-android-apps-commit-carrier-billing-fraud-for-premium-svcs/]]></guid>
			<link><![CDATA[https://inionline.net/fake-android-apps-commit-carrier-billing-fraud-for-premium-svcs/]]></link>
			<title>Fake Android Apps Commit Carrier Billing Fraud for Premium Svcs.</title>
			<pubDate><![CDATA[Wed, 20 May 2026 20:35:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/processes-and-culture-top-reasons-behind-data-breaches/]]></guid>
			<link><![CDATA[https://inionline.net/processes-and-culture-top-reasons-behind-data-breaches/]]></link>
			<title>Processes and Culture Top Reasons Behind Data Breaches</title>
			<pubDate><![CDATA[Wed, 20 May 2026 17:42:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/microsoft-open-sources-rampart-and-clarity-to-secure-ai-agents-during-development/]]></guid>
			<link><![CDATA[https://inionline.net/microsoft-open-sources-rampart-and-clarity-to-secure-ai-agents-during-development/]]></link>
			<title>Microsoft Open-Sources RAMPART and Clarity to Secure AI Agents During Development</title>
			<pubDate><![CDATA[Wed, 20 May 2026 17:06:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/patch-now-critical-flaw-in-ot-robot-os-gives-attackers-control/]]></guid>
			<link><![CDATA[https://inionline.net/patch-now-critical-flaw-in-ot-robot-os-gives-attackers-control/]]></link>
			<title>Patch Now: Critical Flaw in OT Robot OS Gives Attackers Control</title>
			<pubDate><![CDATA[Wed, 20 May 2026 16:12:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/microsoft-takes-down-malware-signing-service-behind-ransomware-attacks/]]></guid>
			<link><![CDATA[https://inionline.net/microsoft-takes-down-malware-signing-service-behind-ransomware-attacks/]]></link>
			<title>Microsoft Takes Down Malware-Signing Service Behind Ransomware Attacks</title>
			<pubDate><![CDATA[Wed, 20 May 2026 14:36:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/webworm-deploys-echocreep-and-graphworm-backdoors-using-discord-and-ms-graph-api/]]></guid>
			<link><![CDATA[https://inionline.net/webworm-deploys-echocreep-and-graphworm-backdoors-using-discord-and-ms-graph-api/]]></link>
			<title>Webworm Deploys EchoCreep and GraphWorm Backdoors Using Discord and MS Graph API</title>
			<pubDate><![CDATA[Wed, 20 May 2026 12:51:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/agent-ai-is-coming-are-you-ready/]]></guid>
			<link><![CDATA[https://inionline.net/agent-ai-is-coming-are-you-ready/]]></link>
			<title>Agent AI is Coming. Are You Ready?</title>
			<pubDate><![CDATA[Wed, 20 May 2026 11:58:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/typosquatting-is-no-longer-a-user-problem-its-a-supply-chain-problem/]]></guid>
			<link><![CDATA[https://inionline.net/typosquatting-is-no-longer-a-user-problem-its-a-supply-chain-problem/]]></link>
			<title>Typosquatting Is No Longer a User Problem. It&#8217;s a Supply Chain Problem</title>
			<pubDate><![CDATA[Wed, 20 May 2026 10:30:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/microsoft-releases-mitigation-for-yellowkey-bitlocker-bypass-cve-2026-45585-exploit/]]></guid>
			<link><![CDATA[https://inionline.net/microsoft-releases-mitigation-for-yellowkey-bitlocker-bypass-cve-2026-45585-exploit/]]></link>
			<title>Microsoft Releases Mitigation for YellowKey BitLocker Bypass CVE-2026-45585 Exploit</title>
			<pubDate><![CDATA[Wed, 20 May 2026 08:28:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/interpols-operation-ramz-pioneers-cross-region-collabs-in-middle-east/]]></guid>
			<link><![CDATA[https://inionline.net/interpols-operation-ramz-pioneers-cross-region-collabs-in-middle-east/]]></link>
			<title>Interpol&#8217;s &#8216;Operation Ramz&#8217; Pioneers Cross-Region Collabs in Middle East</title>
			<pubDate><![CDATA[Wed, 20 May 2026 07:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/grafana-github-breach-exposes-source-code-via-tanstack-npm-attack/]]></guid>
			<link><![CDATA[https://inionline.net/grafana-github-breach-exposes-source-code-via-tanstack-npm-attack/]]></link>
			<title>Grafana GitHub Breach Exposes Source Code via TanStack npm Attack</title>
			<pubDate><![CDATA[Wed, 20 May 2026 05:12:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/github-investigating-teampcp-claimed-breach-of-4000-internal-repositories/]]></guid>
			<link><![CDATA[https://inionline.net/github-investigating-teampcp-claimed-breach-of-4000-internal-repositories/]]></link>
			<title>GitHub Investigating TeamPCP Claimed Breach of ~4,000 Internal Repositories</title>
			<pubDate><![CDATA[Wed, 20 May 2026 04:01:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/what-will-make-ai-boms-real/]]></guid>
			<link><![CDATA[https://inionline.net/what-will-make-ai-boms-real/]]></link>
			<title>What Will Make AI BOMs Real?</title>
			<pubDate><![CDATA[Tue, 19 May 2026 22:17:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/verizon-dbir-enterprises-face-a-dangerous-vulnerability-glut/]]></guid>
			<link><![CDATA[https://inionline.net/verizon-dbir-enterprises-face-a-dangerous-vulnerability-glut/]]></link>
			<title>Verizon DBIR: Enterprises Face a Dangerous Vulnerability Glut</title>
			<pubDate><![CDATA[Tue, 19 May 2026 21:55:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/windows-zero-day-barrage-continues-after-patch-tuesday/]]></guid>
			<link><![CDATA[https://inionline.net/windows-zero-day-barrage-continues-after-patch-tuesday/]]></link>
			<title>Windows Zero-Day Barrage Continues After Patch Tuesday</title>
			<pubDate><![CDATA[Tue, 19 May 2026 21:06:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/cisa-exposes-secrets-credentials-in-private-repo/]]></guid>
			<link><![CDATA[https://inionline.net/cisa-exposes-secrets-credentials-in-private-repo/]]></link>
			<title>CISA Exposes Secrets, Credentials in &#8216;Private&#8217; Repo</title>
			<pubDate><![CDATA[Tue, 19 May 2026 19:49:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/stealer-spoofs-google-microsoft-apple-then-backdoors-macos/]]></guid>
			<link><![CDATA[https://inionline.net/stealer-spoofs-google-microsoft-apple-then-backdoors-macos/]]></link>
			<title>Stealer Spoofs Google, Microsoft &amp; Apple, Then Backdoors macOS</title>
			<pubDate><![CDATA[Tue, 19 May 2026 19:49:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/trapdoor-android-ad-fraud-scheme-hit-659-million-daily-bid-requests-using-455-apps/]]></guid>
			<link><![CDATA[https://inionline.net/trapdoor-android-ad-fraud-scheme-hit-659-million-daily-bid-requests-using-455-apps/]]></link>
			<title>Trapdoor Android Ad Fraud Scheme Hit 659 Million Daily Bid Requests Using 455 Apps</title>
			<pubDate><![CDATA[Tue, 19 May 2026 16:38:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/dirtydecrypt-poc-released-for-linux-kernel-cve-2026-31635-lpe-vulnerability/]]></guid>
			<link><![CDATA[https://inionline.net/dirtydecrypt-poc-released-for-linux-kernel-cve-2026-31635-lpe-vulnerability/]]></link>
			<title>DirtyDecrypt PoC Released for Linux Kernel CVE-2026-31635 LPE Vulnerability</title>
			<pubDate><![CDATA[Tue, 19 May 2026 14:56:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/looking-back-looking-forward-digesting-a-dynamic-bouillabaisse-of-cyber-evolution/]]></guid>
			<link><![CDATA[https://inionline.net/looking-back-looking-forward-digesting-a-dynamic-bouillabaisse-of-cyber-evolution/]]></link>
			<title>Looking Back, Looking Forward: Digesting a Dynamic Bouillabaisse of Cyber Evolution</title>
			<pubDate><![CDATA[Tue, 19 May 2026 13:28:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/the-new-phishing-click-how-oauth-consent-bypasses-mfa/]]></guid>
			<link><![CDATA[https://inionline.net/the-new-phishing-click-how-oauth-consent-bypasses-mfa/]]></link>
			<title>The New Phishing Click: How OAuth Consent Bypasses MFA</title>
			<pubDate><![CDATA[Tue, 19 May 2026 11:30:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/ghostwriter-targets-ukraine-government-entities-with-prometheus-phishing-malware/]]></guid>
			<link><![CDATA[https://inionline.net/ghostwriter-targets-ukraine-government-entities-with-prometheus-phishing-malware/]]></link>
			<title>Ghostwriter Targets Ukraine Government Entities with Prometheus Phishing Malware</title>
			<pubDate><![CDATA[Fri, 22 May 2026 16:20:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/drupal-to-release-urgent-core-security-updates-on-may-20-sites-told-to-prepare/]]></guid>
			<link><![CDATA[https://inionline.net/drupal-to-release-urgent-core-security-updates-on-may-20-sites-told-to-prepare/]]></link>
			<title>Drupal to Release Urgent Core Security Updates on May 20, Sites Told to Prepare</title>
			<pubDate><![CDATA[Tue, 19 May 2026 10:44:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/seppmail-secure-e-mail-gateway-vulnerabilities-enable-rce-and-mail-traffic-access/]]></guid>
			<link><![CDATA[https://inionline.net/seppmail-secure-e-mail-gateway-vulnerabilities-enable-rce-and-mail-traffic-access/]]></link>
			<title>SEPPMail Secure E-Mail Gateway Vulnerabilities Enable RCE and Mail Traffic Access</title>
			<pubDate><![CDATA[Tue, 19 May 2026 09:23:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/compromised-nx-console-18-95-0-targeted-vs-code-developers-with-credential-stealer/]]></guid>
			<link><![CDATA[https://inionline.net/compromised-nx-console-18-95-0-targeted-vs-code-developers-with-credential-stealer/]]></link>
			<title>Compromised Nx Console 18.95.0 Targeted VS Code Developers with Credential Stealer</title>
			<pubDate><![CDATA[Tue, 19 May 2026 07:49:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/github-actions-supply-chain-attack-redirects-tags-to-steal-ci-cd-credentials/]]></guid>
			<link><![CDATA[https://inionline.net/github-actions-supply-chain-attack-redirects-tags-to-steal-ci-cd-credentials/]]></link>
			<title>GitHub Actions Supply Chain Attack Redirects Tags to Steal CI/CD Credentials</title>
			<pubDate><![CDATA[Tue, 19 May 2026 05:28:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/first-vpn-dismantled-in-global-takedown-over-use-by-25-ransomware-groups/]]></guid>
			<link><![CDATA[https://inionline.net/first-vpn-dismantled-in-global-takedown-over-use-by-25-ransomware-groups/]]></link>
			<title>First VPN Dismantled in Global Takedown Over Use by 25 Ransomware Groups</title>
			<pubDate><![CDATA[Fri, 22 May 2026 17:35:02 +0000]]></pubDate>
		</item>
				</channel>
</rss>
