<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Blog &#8211; Brandefense</title>
	<atom:link href="https://brandefense.io/category/blog/feed/" rel="self" type="application/rss+xml" />
	<link>https://brandefense.io</link>
	<description>Digital Risk Protection Services Platform  &#124; Brandefense</description>
	<lastBuildDate>Tue, 14 Apr 2026 13:43:22 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://brandefense.io/wp-content/uploads/2021/05/logo_black-150x150.png</url>
	<title>Blog &#8211; Brandefense</title>
	<link>https://brandefense.io</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>BlackTech</title>
		<link>https://brandefense.io/blog/blacktech-apt-group/</link>
		
		<dc:creator><![CDATA[BRANDEFENSE]]></dc:creator>
		<pubDate>Tue, 14 Apr 2026 13:43:20 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[APT Groups]]></category>
		<category><![CDATA[apt groups]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[Cyber Espionage]]></category>
		<category><![CDATA[Identity Security]]></category>
		<category><![CDATA[Iran APT]]></category>
		<category><![CDATA[Middle East Threat Landscape]]></category>
		<category><![CDATA[Russian APT Groups]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://brandefense.io/?p=34040</guid>

					<description><![CDATA[<p>BlackTech is a China-aligned APT group specializing in long-term cyber espionage through network infrastructure compromise, targeting telecom, government, and tech sectors.</p>
<p>The post <a rel="nofollow" href="https://brandefense.io/blog/blacktech-apt-group/">BlackTech</a> appeared first on <a rel="nofollow" href="https://brandefense.io">Brandefense</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>UAC-0194: Inside a Rapidly Evolving NTLM-Exploiting Espionage Operation</title>
		<link>https://brandefense.io/blog/uac-0194-apt-group/</link>
		
		<dc:creator><![CDATA[BRANDEFENSE]]></dc:creator>
		<pubDate>Mon, 13 Apr 2026 13:27:50 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[APT Groups]]></category>
		<category><![CDATA[apt groups]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[Cyber Espionage]]></category>
		<category><![CDATA[Identity Security]]></category>
		<category><![CDATA[Iran APT]]></category>
		<category><![CDATA[Middle East Threat Landscape]]></category>
		<category><![CDATA[Russian APT Groups]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://brandefense.io/?p=34132</guid>

					<description><![CDATA[<p>UAC-0194 is a high-risk, Russian-affiliated threat actor leveraging NTLM vulnerabilities for stealthy credential theft and cyber espionage across Eastern Europe.</p>
<p>The post <a rel="nofollow" href="https://brandefense.io/blog/uac-0194-apt-group/">UAC-0194: Inside a Rapidly Evolving NTLM-Exploiting Espionage Operation</a> appeared first on <a rel="nofollow" href="https://brandefense.io">Brandefense</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>What Is Credential Stuffing? Attackers Don&#8217;t Crack Passwords, They Buy Them</title>
		<link>https://brandefense.io/blog/what-is-credential-stuffing/</link>
		
		<dc:creator><![CDATA[BRANDEFENSE]]></dc:creator>
		<pubDate>Sat, 04 Apr 2026 08:05:12 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[apt groups]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[Cyber Espionage]]></category>
		<category><![CDATA[Identity Security]]></category>
		<category><![CDATA[Iran APT]]></category>
		<category><![CDATA[Middle East Threat Landscape]]></category>
		<category><![CDATA[Russian APT Groups]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://brandefense.io/?p=34079</guid>

					<description><![CDATA[<p>A massive Komiko AI data breach exposed over 1 million users, including OAuth tokens and session data—creating critical account takeover risks. Here’s what happened and how Brandefense detected it early.</p>
<p>The post <a rel="nofollow" href="https://brandefense.io/blog/what-is-credential-stuffing/">What Is Credential Stuffing? Attackers Don&#8217;t Crack Passwords, They Buy Them</a> appeared first on <a rel="nofollow" href="https://brandefense.io">Brandefense</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>What Is Triple Extortion? The Anatomy of the Encryption + Leakage + DDoS Trio</title>
		<link>https://brandefense.io/blog/what-is-triple-extortion/</link>
		
		<dc:creator><![CDATA[BRANDEFENSE]]></dc:creator>
		<pubDate>Fri, 03 Apr 2026 07:26:59 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[intelligence]]></category>
		<category><![CDATA[security awareness]]></category>
		<guid isPermaLink="false">https://brandefense.io/?p=34065</guid>

					<description><![CDATA[<p>Triple extortion ransomware is reshaping cyber threats. Discover how attackers operate and how to detect threats before encryption begins.</p>
<p>The post <a rel="nofollow" href="https://brandefense.io/blog/what-is-triple-extortion/">What Is Triple Extortion? The Anatomy of the Encryption + Leakage + DDoS Trio</a> appeared first on <a rel="nofollow" href="https://brandefense.io">Brandefense</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>MFA Doesn&#8217;t Protect You — Cookies Give You Away: The Rise of Session Hijacking</title>
		<link>https://brandefense.io/blog/mfa-doesnt-protect-you-cookies-give-you-away-the-rise-of-session-hijacking/</link>
		
		<dc:creator><![CDATA[BRANDEFENSE]]></dc:creator>
		<pubDate>Thu, 26 Mar 2026 14:18:21 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Digital Risk Protection]]></category>
		<category><![CDATA[apt groups]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[Cyber Espionage]]></category>
		<category><![CDATA[Identity Security]]></category>
		<category><![CDATA[Iran APT]]></category>
		<category><![CDATA[Middle East Threat Landscape]]></category>
		<category><![CDATA[Russian APT Groups]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://brandefense.io/?p=34004</guid>

					<description><![CDATA[<p>Session hijacking allows attackers to bypass MFA by stealing authentication cookies. Discover how it works and how to detect stolen session tokens before exploitation.</p>
<p>The post <a rel="nofollow" href="https://brandefense.io/blog/mfa-doesnt-protect-you-cookies-give-you-away-the-rise-of-session-hijacking/">MFA Doesn&#8217;t Protect You — Cookies Give You Away: The Rise of Session Hijacking</a> appeared first on <a rel="nofollow" href="https://brandefense.io">Brandefense</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Fake Mobile App: How Is Your Clone on the App Store Stealing Your Users?</title>
		<link>https://brandefense.io/blog/fake-mobile-app-how-is-your-clone-on-the-app-store-stealing-your-users/</link>
		
		<dc:creator><![CDATA[BRANDEFENSE]]></dc:creator>
		<pubDate>Wed, 25 Mar 2026 13:26:10 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Digital Risk Protection]]></category>
		<category><![CDATA[apt groups]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[Cyber Espionage]]></category>
		<category><![CDATA[Identity Security]]></category>
		<category><![CDATA[Iran APT]]></category>
		<category><![CDATA[Middle East Threat Landscape]]></category>
		<category><![CDATA[Russian APT Groups]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://brandefense.io/?p=34025</guid>

					<description><![CDATA[<p>Fake mobile apps replicate your brand to steal user credentials, financial data, and trust. Discover how attackers build, distribute, and monetize clone apps—and how to stop them early.</p>
<p>The post <a rel="nofollow" href="https://brandefense.io/blog/fake-mobile-app-how-is-your-clone-on-the-app-store-stealing-your-users/">Fake Mobile App: How Is Your Clone on the App Store Stealing Your Users?</a> appeared first on <a rel="nofollow" href="https://brandefense.io">Brandefense</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>UAC-0102: Inside a Covert Espionage Operation Targeting Ukraine and Beyond</title>
		<link>https://brandefense.io/blog/uac-0102-apt-group/</link>
		
		<dc:creator><![CDATA[BRANDEFENSE]]></dc:creator>
		<pubDate>Mon, 23 Mar 2026 08:37:00 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[APT Groups]]></category>
		<category><![CDATA[apt groups]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[Cyber Espionage]]></category>
		<category><![CDATA[Identity Security]]></category>
		<category><![CDATA[Iran APT]]></category>
		<category><![CDATA[Middle East Threat Landscape]]></category>
		<category><![CDATA[Russian APT Groups]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://brandefense.io/?p=33998</guid>

					<description><![CDATA[<p>UAC-0102 is a stealth-focused cyber espionage group targeting Ukrainian government and infrastructure entities using spearphishing and cloud-based C2 techniques.</p>
<p>The post <a rel="nofollow" href="https://brandefense.io/blog/uac-0102-apt-group/">UAC-0102: Inside a Covert Espionage Operation Targeting Ukraine and Beyond</a> appeared first on <a rel="nofollow" href="https://brandefense.io">Brandefense</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Inside the Operations of Crazy Evil: The Rise of a Global Crypto-Focused Cybercrime Network</title>
		<link>https://brandefense.io/blog/crazy-evil-apt-group/</link>
		
		<dc:creator><![CDATA[BRANDEFENSE]]></dc:creator>
		<pubDate>Sun, 22 Mar 2026 11:21:00 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[APT Groups]]></category>
		<category><![CDATA[apt groups]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[Cyber Espionage]]></category>
		<category><![CDATA[Identity Security]]></category>
		<category><![CDATA[Iran APT]]></category>
		<category><![CDATA[Middle East Threat Landscape]]></category>
		<category><![CDATA[Russian APT Groups]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://brandefense.io/?p=33990</guid>

					<description><![CDATA[<p>An in-depth analysis of Crazy Evil, a financially motivated cybercrime group targeting Web3, crypto platforms, and digital identities through advanced social engineering and malware campaigns.</p>
<p>The post <a rel="nofollow" href="https://brandefense.io/blog/crazy-evil-apt-group/">Inside the Operations of Crazy Evil: The Rise of a Global Crypto-Focused Cybercrime Network</a> appeared first on <a rel="nofollow" href="https://brandefense.io">Brandefense</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>1 Million User Records Exposed: A Deep Dive into the Komiko AI App Data Breach</title>
		<link>https://brandefense.io/blog/komiko-ai-app-data-breach/</link>
		
		<dc:creator><![CDATA[BRANDEFENSE]]></dc:creator>
		<pubDate>Sat, 21 Mar 2026 07:12:56 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[APT Groups]]></category>
		<category><![CDATA[apt groups]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[Cyber Espionage]]></category>
		<category><![CDATA[Identity Security]]></category>
		<category><![CDATA[Iran APT]]></category>
		<category><![CDATA[Middle East Threat Landscape]]></category>
		<category><![CDATA[Russian APT Groups]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://brandefense.io/?p=34012</guid>

					<description><![CDATA[<p>A massive Komiko AI data breach exposed over 1 million users, including OAuth tokens and session data—creating critical account takeover risks. Here’s what happened and how Brandefense detected it early.</p>
<p>The post <a rel="nofollow" href="https://brandefense.io/blog/komiko-ai-app-data-breach/">1 Million User Records Exposed: A Deep Dive into the Komiko AI App Data Breach</a> appeared first on <a rel="nofollow" href="https://brandefense.io">Brandefense</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Konni (Vedalia / TA406 / Opal Sleet): North Korea’s Steady Hand in Espionage Operations</title>
		<link>https://brandefense.io/blog/konni-apt-group/</link>
		
		<dc:creator><![CDATA[BRANDEFENSE]]></dc:creator>
		<pubDate>Thu, 19 Mar 2026 06:54:12 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[APT Groups]]></category>
		<category><![CDATA[apt groups]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[Cyber Espionage]]></category>
		<category><![CDATA[Identity Security]]></category>
		<category><![CDATA[Iran APT]]></category>
		<category><![CDATA[Middle East Threat Landscape]]></category>
		<category><![CDATA[Russian APT Groups]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://brandefense.io/?p=33994</guid>

					<description><![CDATA[<p>Konni is a North Korea-aligned APT group focused on long-term cyber espionage through spearphishing, credential harvesting, and lightweight malware campaigns.</p>
<p>The post <a rel="nofollow" href="https://brandefense.io/blog/konni-apt-group/">Konni (Vedalia / TA406 / Opal Sleet): North Korea’s Steady Hand in Espionage Operations</a> appeared first on <a rel="nofollow" href="https://brandefense.io">Brandefense</a>.</p>
]]></description>
		
		
		
			</item>
	</channel>
</rss>
