<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://cybersecuritynewsbyte.com/wp-content/plugins/seriously-simple-podcasting/templates/feed-stylesheet.xsl"?><rss version="2.0"
	 xmlns:content="http://purl.org/rss/1.0/modules/content/"
	 xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	 xmlns:dc="http://purl.org/dc/elements/1.1/"
	 xmlns:atom="http://www.w3.org/2005/Atom"
	 xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	 xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	 xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"
	 xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"
	 xmlns:podcast="https://podcastindex.org/namespace/1.0"
	>
		<channel>
		<title>Cyber Security News Byte Podcast</title>
		<atom:link href="https://cybersecuritynewsbyte.com/feed/podcast/cyber-security-news-byte-podcast/" rel="self" type="application/rss+xml"/>
		<link>https://cybersecuritynewsbyte.com/podcasts/cyber-security-news-byte-podcast/</link>
		<description>A weekly podcast that covers the cyber security news stories that you need to know for the week, to help protect your organization or yourself. </description>
		<lastBuildDate>Tue, 10 Mar 2026 15:19:23 +0000</lastBuildDate>
		<language>en-US</language>
		<copyright>&#xA9; 2026 Cyber Security News Byte Podcast</copyright>
		<itunes:subtitle>CSNB Podcast</itunes:subtitle>
		<itunes:author>Cyber Security News Byte Podcast</itunes:author>
		<itunes:summary>A weekly podcast that covers the cyber security news stories that you need to know for the week, to help protect your organization or yourself. </itunes:summary>
		<itunes:owner>
			<itunes:name>Cyber Security News Byte Podcast</itunes:name>
		</itunes:owner>
		<itunes:explicit>false</itunes:explicit>
		<itunes:image href="https://cybersecuritynewsbyte.com/wp-content/uploads/2026/02/Cover-PNG.png"></itunes:image>
			<image>
				<url>https://cybersecuritynewsbyte.com/wp-content/uploads/2026/02/Cover-PNG.png</url>
				<title>Cyber Security News Byte Podcast</title>
				<link>https://cybersecuritynewsbyte.com/podcasts/cyber-security-news-byte-podcast/</link>
			</image>
		<itunes:category text="Technology">
		</itunes:category>
		<itunes:category text="News">
									<itunes:category text="Tech News"></itunes:category>
							</itunes:category>
		<googleplay:author><![CDATA[Cyber Security News Byte Podcast]]></googleplay:author>
						<googleplay:description>A weekly podcast that covers the cyber security news stories that you need to know for the week, to help protect your organization or yourself. </googleplay:description>
			<googleplay:explicit>No</googleplay:explicit>
			<googleplay:image href="https://cybersecuritynewsbyte.com/wp-content/uploads/2026/02/Cover-PNG.png"></googleplay:image>
			<podcast:locked>yes</podcast:locked>
		<podcast:guid>d72d9e48-dfd3-5776-96a4-2c0bf045d0ce</podcast:guid>
		
		<!-- podcast_generator="SSP by Castos/3.14.2" Seriously Simple Podcasting plugin for WordPress (https://wordpress.org/plugins/seriously-simple-podcasting/) -->
		<generator>https://wordpress.org/?v=6.9.4</generator>

<item>
	<title>Episode 88: Firmware, Fraud, and Federal Fumbles</title>
	<link>https://cybersecuritynewsbyte.com/podcast/firmware-fraud-and-federal-fumbles/</link>
	<pubDate>Mon, 12 May 2025 16:40:37 +0000</pubDate>
	<dc:creator><![CDATA[Cyber Security News Byte Podcast]]></dc:creator>
	<guid isPermaLink="false">35b9deac-441e-5b6b-b061-8c68a94c8528</guid>
	<description><![CDATA[Links https://www.wral.com/news/education/threat-actor-claims-to-have-nc-student-data-may-2025 https://www.wral.com/story/a-hacker-s-ransom-inside-the-cyberattack-that-compromised-nc-student-and-teacher-records/21989281 https://thehackernews.com/2025/05/breaking-7000-device-proxy-botnet-using.html https://www.bleepingcomputer.com/news/security/magento-supply-chain-attack-compromises-hundreds-of-e-stores https://www.washingtonpost.com/technology/2025/05/06/signal-archive-cybersecurity-waltz-wyden https://www.washingtonpost.com/politics/2025/05/01/waltz-signal-app-photo-cabinet https://en.wikipedia.org/wiki/United_States_government_group_chat_leaks PowerSchool Breach: When &#8216;Delete&#8217; Doesn&#8217;t Mean Gone When Your Toaster Joins a Cybercrime Ring The Phantom Backdoor: Six Years of Silent Sabotage The TeleMessage Debacle in Government Communications Develop an incident response plan to address security breaches swiftly. This includes identifying the breach, containing it, notifying affected...]]></description>
	<itunes:subtitle><![CDATA[Links https://www.wral.com/news/education/threat-actor-claims-to-have-nc-student-data-may-2025 https://www.wral.com/story/a-hacker-s-ransom-inside-the-cyberattack-that-compromised-nc-student-and-teacher-records/21989281 https://thehackernews.com/2025/05/]]></itunes:subtitle>
	<itunes:episodeType>full</itunes:episodeType>
	<itunes:title><![CDATA[Firmware, Fraud, and Federal Fumbles]]></itunes:title>
	<itunes:episode>88</itunes:episode>
	<itunes:season>2025</itunes:season>
	<content:encoded><![CDATA[Links https://www.wral.com/news/education/threat-actor-claims-to-have-nc-student-data-may-2025 https://www.wral.com/story/a-hacker-s-ransom-inside-the-cyberattack-that-compromised-nc-student-and-teacher-records/21989281 https://thehackernews.com/2025/05/breaking-7000-device-proxy-botnet-using.html https://www.bleepingcomputer.com/news/security/magento-supply-chain-attack-compromises-hundreds-of-e-stores https://www.washingtonpost.com/technology/2025/05/06/signal-archive-cybersecurity-waltz-wyden https://www.washingtonpost.com/politics/2025/05/01/waltz-signal-app-photo-cabinet https://en.wikipedia.org/wiki/United_States_government_group_chat_leaks PowerSchool Breach: When &#8216;Delete&#8217; Doesn&#8217;t Mean Gone When Your Toaster Joins a Cybercrime Ring The Phantom Backdoor: Six Years of Silent Sabotage The TeleMessage Debacle in Government Communications Develop an incident response plan to address security breaches swiftly. This includes identifying the breach, containing it, notifying affected...]]></content:encoded>
	<enclosure url="https://cybersecuritynewsbyte.com/mp3/CSNB_Ep88_20250512.mp3" length="1" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[Links https://www.wral.com/news/education/threat-actor-claims-to-have-nc-student-data-may-2025 https://www.wral.com/story/a-hacker-s-ransom-inside-the-cyberattack-that-compromised-nc-student-and-teacher-records/21989281 https://thehackernews.com/2025/05/breaking-7000-device-proxy-botnet-using.html https://www.bleepingcomputer.com/news/security/magento-supply-chain-attack-compromises-hundreds-of-e-stores https://www.washingtonpost.com/technology/2025/05/06/signal-archive-cybersecurity-waltz-wyden https://www.washingtonpost.com/politics/2025/05/01/waltz-signal-app-photo-cabinet https://en.wikipedia.org/wiki/United_States_government_group_chat_leaks PowerSchool Breach: When &#8216;Delete&#8217; Doesn&#8217;t Mean Gone When Your Toaster Joins a Cybercrime Ring The Phantom Backdoor: Six Years of Silent Sabotage The TeleMessage Debacle in Government Communications Develop an incident response plan to address security breaches swiftly. This includes identifying the breach, containing it, notifying affected...]]></itunes:summary>
	<itunes:image href="https://cybersecuritynewsbyte.com/wp-content/uploads/2026/02/Cover-PNG.png"></itunes:image>
	<image>
		<url>https://cybersecuritynewsbyte.com/wp-content/uploads/2026/02/Cover-PNG.png</url>
		<title>Episode 88: Firmware, Fraud, and Federal Fumbles</title>
	</image>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>21:00</itunes:duration>
	<itunes:author><![CDATA[Cyber Security News Byte Podcast]]></itunes:author>	<googleplay:description><![CDATA[Links https://www.wral.com/news/education/threat-actor-claims-to-have-nc-student-data-may-2025 https://www.wral.com/story/a-hacker-s-ransom-inside-the-cyberattack-that-compromised-nc-student-and-teacher-records/21989281 https://thehackernews.com/2025/05/breaking-7000-device-proxy-botnet-using.html https://www.bleepingcomputer.com/news/security/magento-supply-chain-attack-compromises-hundreds-of-e-stores https://www.washingtonpost.com/technology/2025/05/06/signal-archive-cybersecurity-waltz-wyden https://www.washingtonpost.com/politics/2025/05/01/waltz-signal-app-photo-cabinet https://en.wikipedia.org/wiki/United_States_government_group_chat_leaks PowerSchool Breach: When &#8216;Delete&#8217; Doesn&#8217;t Mean Gone When Your Toaster Joins a Cybercrime Ring The Phantom Backdoor: Six Years of Silent Sabotage The TeleMessage Debacle in Government Communications Develop an incident response plan to address security breaches swiftly. This includes identifying the breach, containing it, not]]></googleplay:description>
	<googleplay:image href="https://cybersecuritynewsbyte.com/wp-content/uploads/2026/02/Cover-PNG.png"></googleplay:image>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>Episode 87: Phish, RATs, and Rogue Routers: This Week’s Cyber Soap Opera</title>
	<link>https://cybersecuritynewsbyte.com/podcast/episode-87-phish-rats-and-rogue-routers-this-weeks-cyber-soap-opera/</link>
	<pubDate>Mon, 12 May 2025 15:02:42 +0000</pubDate>
	<dc:creator><![CDATA[Cyber Security News Byte Podcast]]></dc:creator>
	<guid isPermaLink="false">https://cybersecuritynewsbyte.com/?post_type=podcast&#038;p=858</guid>
	<description><![CDATA[Links https://ismailtasdelen.medium.com/commvaults-azure-breach-a-zero-day-tale-of-webshells-and-nation-state-hackers-%EF%B8%8F-%EF%B8%8F-4d23a46467d6 https://gbhackers.com/commvault-confirms-zero-day-attack https://thehackernews.com/2025/05/commvault-confirms-hackers-exploited.html https://nvd.nist.gov/vuln/detail/cve-2025-3928 https://www.commvault.com/blogs/security-advisory-march-7-2025 https://cybersecuritynews.com/harrods-store-hit-by-cyber-attack https://www.thetimes.co.uk/article/harrods-cyberattack-marks-and-spencer-coop-mj7vjkdkv https://cybersecuritynews.com/nebulous-mantis-hackers-actively-deploying-romcom-rat https://thehackernews.com/2025/04/nebulous-mantis-targets-nato-linked.html https://www.bleepingcomputer.com/news/security/hackers-abuse-ipv6-networking-feature-to-hijack-software-updates https://cybersecuritynews.com/hackers-abuse-ipv6-stateless-address-for-aitm-attack https://thehackernews.com/2025/04/chinese-hackers-abuse-ipv6-slaac-for.html Commvault’s Zero-Day Drama Harrods Joins the Cyber Hit List The Malware Love Story You Didn&#8217;t Swipe Right On When Your Router Turns Against You Employee Training: Educate staff about the risks associated with IPv6 and the importance of network security hygiene.]]></description>
	<itunes:subtitle><![CDATA[Links https://ismailtasdelen.medium.com/commvaults-azure-breach-a-zero-day-tale-of-webshells-and-nation-state-hackers-%EF%B8%8F-%EF%B8%8F-4d23a46467d6 https://gbhackers.com/commvault-confirms-zero-day-attack https://thehackernews.com/2025/05/commvault-co]]></itunes:subtitle>
	<itunes:episodeType>full</itunes:episodeType>
	<itunes:title><![CDATA[Phish, RATs, and Rogue Routers: This Week’s Cyber Soap Opera]]></itunes:title>
	<itunes:episode>87</itunes:episode>
	<itunes:season>2025</itunes:season>
	<content:encoded><![CDATA[Links https://ismailtasdelen.medium.com/commvaults-azure-breach-a-zero-day-tale-of-webshells-and-nation-state-hackers-%EF%B8%8F-%EF%B8%8F-4d23a46467d6 https://gbhackers.com/commvault-confirms-zero-day-attack https://thehackernews.com/2025/05/commvault-confirms-hackers-exploited.html https://nvd.nist.gov/vuln/detail/cve-2025-3928 https://www.commvault.com/blogs/security-advisory-march-7-2025 https://cybersecuritynews.com/harrods-store-hit-by-cyber-attack https://www.thetimes.co.uk/article/harrods-cyberattack-marks-and-spencer-coop-mj7vjkdkv https://cybersecuritynews.com/nebulous-mantis-hackers-actively-deploying-romcom-rat https://thehackernews.com/2025/04/nebulous-mantis-targets-nato-linked.html https://www.bleepingcomputer.com/news/security/hackers-abuse-ipv6-networking-feature-to-hijack-software-updates https://cybersecuritynews.com/hackers-abuse-ipv6-stateless-address-for-aitm-attack https://thehackernews.com/2025/04/chinese-hackers-abuse-ipv6-slaac-for.html Commvault’s Zero-Day Drama Harrods Joins the Cyber Hit List The Malware Love Story You Didn&#8217;t Swipe Right On When Your Router Turns Against You Employee Training: Educate staff about the risks associated with IPv6 and the importance of network security hygiene.]]></content:encoded>
	<enclosure url="https://cybersecuritynewsbyte.com/mp3/CSNB_Ep87_20250505.mp3" length="22" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[Links https://ismailtasdelen.medium.com/commvaults-azure-breach-a-zero-day-tale-of-webshells-and-nation-state-hackers-%EF%B8%8F-%EF%B8%8F-4d23a46467d6 https://gbhackers.com/commvault-confirms-zero-day-attack https://thehackernews.com/2025/05/commvault-confirms-hackers-exploited.html https://nvd.nist.gov/vuln/detail/cve-2025-3928 https://www.commvault.com/blogs/security-advisory-march-7-2025 https://cybersecuritynews.com/harrods-store-hit-by-cyber-attack https://www.thetimes.co.uk/article/harrods-cyberattack-marks-and-spencer-coop-mj7vjkdkv https://cybersecuritynews.com/nebulous-mantis-hackers-actively-deploying-romcom-rat https://thehackernews.com/2025/04/nebulous-mantis-targets-nato-linked.html https://www.bleepingcomputer.com/news/security/hackers-abuse-ipv6-networking-feature-to-hijack-software-updates https://cybersecuritynews.com/hackers-abuse-ipv6-stateless-address-for-aitm-attack https://thehackernews.com/2025/04/chinese-hackers-abuse-ipv6-slaac-for.html Commvault’s Zero-Day Drama Harrods Joins the Cyber Hit List The Malware Love Story You Didn&#8217;t Swipe Right On When Your Router Turns Against You Employee Training: Educate staff about the risks associated with IPv6 and the importance of network security hygiene.]]></itunes:summary>
	<itunes:image href="https://cybersecuritynewsbyte.com/wp-content/uploads/2026/02/cropped-Cover-PNG.png"></itunes:image>
	<image>
		<url>https://cybersecuritynewsbyte.com/wp-content/uploads/2026/02/cropped-Cover-PNG.png</url>
		<title>Episode 87: Phish, RATs, and Rogue Routers: This Week’s Cyber Soap Opera</title>
	</image>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>19:01</itunes:duration>
	<itunes:author><![CDATA[Cyber Security News Byte Podcast]]></itunes:author>	<googleplay:description><![CDATA[Links https://ismailtasdelen.medium.com/commvaults-azure-breach-a-zero-day-tale-of-webshells-and-nation-state-hackers-%EF%B8%8F-%EF%B8%8F-4d23a46467d6 https://gbhackers.com/commvault-confirms-zero-day-attack https://thehackernews.com/2025/05/commvault-confirms-hackers-exploited.html https://nvd.nist.gov/vuln/detail/cve-2025-3928 https://www.commvault.com/blogs/security-advisory-march-7-2025 https://cybersecuritynews.com/harrods-store-hit-by-cyber-attack https://www.thetimes.co.uk/article/harrods-cyberattack-marks-and-spencer-coop-mj7vjkdkv https://cybersecuritynews.com/nebulous-mantis-hackers-actively-deploying-romcom-rat https://thehackernews.com/2025/04/nebulous-mantis-targets-nato-linked.html https://www.bleepingcomputer.com/news/security/hackers-abuse-ipv6-networking-feature-to-hijack-software-updates https://cybersecuritynews.com/hackers-abuse-ipv6-stateless-address-for-aitm-attack https://thehackernews.com/2025/04/chinese-hackers-abuse-ipv6-slaac-for.html Commvault’s Zero-Day Dr]]></googleplay:description>
	<googleplay:image href="https://cybersecuritynewsbyte.com/wp-content/uploads/2026/02/cropped-Cover-PNG.png"></googleplay:image>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>Episode 86: Stolen Cookies, Lazarus Strikes, and the TikTok Breach Drama</title>
	<link>https://cybersecuritynewsbyte.com/podcast/episode-86-stolen-cookies-lazarus-strikes-and-the-tiktok-breach-drama/</link>
	<pubDate>Mon, 28 Apr 2025 15:15:23 +0000</pubDate>
	<dc:creator><![CDATA[Cyber Security News Byte Podcast]]></dc:creator>
	<guid isPermaLink="false">https://cybersecuritynewsbyte.com/?post_type=podcast&#038;p=860</guid>
	<description><![CDATA[Links https://cybersecuritynews.com/cookie-bite-attack https://cybersecuritynews.com/lazarus-apt-attacking-organizations https://cybersecuritynews.com/hackers-abuse-cloudflare-tunnel-infrastructure https://cybersecuritynews.com/hackers-allegedly-breach-tiktok Cookie-Bite Attacks: Emerging Threat to Cloud and MFA Security Lazarus Strikes Before You Update Hackers Exploit Cloudflare Tunnels to Infiltrate Systems R00TK1T&#8217;s TikTok Takedown]]></description>
	<itunes:subtitle><![CDATA[Links https://cybersecuritynews.com/cookie-bite-attack https://cybersecuritynews.com/lazarus-apt-attacking-organizations https://cybersecuritynews.com/hackers-abuse-cloudflare-tunnel-infrastructure https://cybersecuritynews.com/hackers-allegedly-breach-t]]></itunes:subtitle>
	<itunes:episodeType>full</itunes:episodeType>
	<itunes:title><![CDATA[Stolen Cookies, Lazarus Strikes, and the TikTok Breach Drama]]></itunes:title>
	<itunes:episode>86</itunes:episode>
	<itunes:season>2025</itunes:season>
	<content:encoded><![CDATA[Links https://cybersecuritynews.com/cookie-bite-attack https://cybersecuritynews.com/lazarus-apt-attacking-organizations https://cybersecuritynews.com/hackers-abuse-cloudflare-tunnel-infrastructure https://cybersecuritynews.com/hackers-allegedly-breach-tiktok Cookie-Bite Attacks: Emerging Threat to Cloud and MFA Security Lazarus Strikes Before You Update Hackers Exploit Cloudflare Tunnels to Infiltrate Systems R00TK1T&#8217;s TikTok Takedown]]></content:encoded>
	<enclosure url="https://cybersecuritynewsbyte.com/mp3/CSNB_Ep86_20250428.mp3" length="26" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[Links https://cybersecuritynews.com/cookie-bite-attack https://cybersecuritynews.com/lazarus-apt-attacking-organizations https://cybersecuritynews.com/hackers-abuse-cloudflare-tunnel-infrastructure https://cybersecuritynews.com/hackers-allegedly-breach-tiktok Cookie-Bite Attacks: Emerging Threat to Cloud and MFA Security Lazarus Strikes Before You Update Hackers Exploit Cloudflare Tunnels to Infiltrate Systems R00TK1T&#8217;s TikTok Takedown]]></itunes:summary>
	<itunes:image href="https://cybersecuritynewsbyte.com/wp-content/uploads/2026/02/cropped-Cover-PNG.png"></itunes:image>
	<image>
		<url>https://cybersecuritynewsbyte.com/wp-content/uploads/2026/02/cropped-Cover-PNG.png</url>
		<title>Episode 86: Stolen Cookies, Lazarus Strikes, and the TikTok Breach Drama</title>
	</image>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>22:34</itunes:duration>
	<itunes:author><![CDATA[Cyber Security News Byte Podcast]]></itunes:author>	<googleplay:description><![CDATA[Links https://cybersecuritynews.com/cookie-bite-attack https://cybersecuritynews.com/lazarus-apt-attacking-organizations https://cybersecuritynews.com/hackers-abuse-cloudflare-tunnel-infrastructure https://cybersecuritynews.com/hackers-allegedly-breach-tiktok Cookie-Bite Attacks: Emerging Threat to Cloud and MFA Security Lazarus Strikes Before You Update Hackers Exploit Cloudflare Tunnels to Infiltrate Systems R00TK1T&#8217;s TikTok Takedown]]></googleplay:description>
	<googleplay:image href="https://cybersecuritynewsbyte.com/wp-content/uploads/2026/02/cropped-Cover-PNG.png"></googleplay:image>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>
	</channel>
</rss>
