<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>malware &#8211; SteelCloud</title>
	<atom:link href="https://www.steelcloud.com/tag/malware/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.steelcloud.com</link>
	<description></description>
	<lastBuildDate>Mon, 25 Aug 2025 19:28:05 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.steelcloud.com/wp-content/uploads/favicon.png</url>
	<title>malware &#8211; SteelCloud</title>
	<link>https://www.steelcloud.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Top Cybersecurity Threats of 2025</title>
		<link>https://www.steelcloud.com/top-cybersecurity-threats-of-2025/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Tue, 14 Jan 2025 16:51:00 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[CIS Benchmarks]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[STIG]]></category>
		<category><![CDATA[supply chain]]></category>
		<category><![CDATA[threat mitigation]]></category>
		<category><![CDATA[threats]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=90050</guid>

					<description><![CDATA[4 Cybersecurity Threats to Have on Your Radar In 2025 If there’s one thing to know as we enter 2025, it’s that the bad guys are getting better and stronger. The statistics are daunting. In 2024, the costs of cybercrime were projected to be $9.5 trillion. From ransomware threats to phishing, the pace, number and ...]]></description>
		
		
		
			</item>
		<item>
		<title>Gain Maximum Cybersecurity Protection from Minimal Budget Increases</title>
		<link>https://www.steelcloud.com/gain-maximum-cybersecurity-protection-from-minimal-budget-increases/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Tue, 16 Jul 2024 17:15:24 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[budget]]></category>
		<category><![CDATA[CIS Benchmarks]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Higher Ed]]></category>
		<category><![CDATA[higher education]]></category>
		<category><![CDATA[IT]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[SLED]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=89605</guid>

					<description><![CDATA[Gain Maximum Cybersecurity Protection from Minimal Budget Increases In 2018, at least a third of Atlanta government services were attacked, including police dashboard cams, utility payments and Wi-Fi at Hartsfield-Jackson International Airport, the busiest airport in the world. When all was said and done, that breach cost the city $9.5M to recover from. Experts say ...]]></description>
		
		
		
			</item>
		<item>
		<title>The State of Cybersecurity By The Numbers</title>
		<link>https://www.steelcloud.com/the-state-of-cybersecurity-by-the-numbers/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Tue, 14 May 2024 14:53:27 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Automation]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[threats]]></category>
		<category><![CDATA[workforce]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=89481</guid>

					<description><![CDATA[The State of Cybersecurity By The Numbers Workforce, Threats, and Automation Stats That May Surprise You Click the link to download our data sheet or read on below! The state of the cybersecurity workforce. Demand for qualified professionals is outpacing growth year-over-year, making cybersecurity professionals highly sought after. This cyberworkforce shortage is expect to continue ...]]></description>
		
		
		
			</item>
		<item>
		<title>STIG 101: Understanding the Basics of Compliance</title>
		<link>https://www.steelcloud.com/security-technical-implementation-guides-101/</link>
		
		<dc:creator><![CDATA[Stephanie Plona]]></dc:creator>
		<pubDate>Mon, 08 Jan 2024 04:33:25 +0000</pubDate>
				<category><![CDATA[All Resources]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[disa]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[STIG]]></category>
		<category><![CDATA[STIG automation]]></category>
		<category><![CDATA[STIG compliance]]></category>
		<guid isPermaLink="false">https://www.steelcloud.com/?p=88936</guid>

					<description><![CDATA[Security Technical Implementation Guides 101: The Basics What are Security Technical Implementation Guides? As we speak, there are as many as 10,000 vulnerabilities in your system that, if not secured, could be a gateway to phishing, hacking or malware. This is why the Defense Information Systems Agency (DISA) created Security Technical Implementation Guides (STIGs). Security Technical ...]]></description>
		
		
		
			</item>
	</channel>
</rss>
