<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Brandefense</title>
	<atom:link href="https://brandefense.io/feed/" rel="self" type="application/rss+xml" />
	<link>https://brandefense.io</link>
	<description>Digital Risk Protection Services Platform  &#124; Brandefense</description>
	<lastBuildDate>Fri, 17 Apr 2026 10:51:53 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://brandefense.io/wp-content/uploads/2021/05/logo_black-150x150.png</url>
	<title>Brandefense</title>
	<link>https://brandefense.io</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>What &#8220;Actionable Intelligence&#8221; Actually Means in 2026</title>
		<link>https://brandefense.io/blog/actionable-intelligence-2026/</link>
		
		<dc:creator><![CDATA[BRANDEFENSE]]></dc:creator>
		<pubDate>Mon, 20 Apr 2026 03:07:00 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[apt groups]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[Cyber Espionage]]></category>
		<category><![CDATA[Identity Security]]></category>
		<category><![CDATA[Iran APT]]></category>
		<category><![CDATA[Middle East Threat Landscape]]></category>
		<category><![CDATA[Russian APT Groups]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://brandefense.io/?p=34113</guid>

					<description><![CDATA[<p>“Actionable intelligence” is everywhere—but rarely actionable. Here’s what it actually means in 2026, and how AI closes the gap between data and decisions.</p>
<p>The post <a rel="nofollow" href="https://brandefense.io/blog/actionable-intelligence-2026/">What &#8220;Actionable Intelligence&#8221; Actually Means in 2026</a> appeared first on <a rel="nofollow" href="https://brandefense.io">Brandefense</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Agentic AI in Cybersecurity: How Autonomous Agents Are Transforming the SOC</title>
		<link>https://brandefense.io/blog/agentic-ai-cybersecurity-soc/</link>
		
		<dc:creator><![CDATA[BRANDEFENSE]]></dc:creator>
		<pubDate>Sat, 18 Apr 2026 10:40:32 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[APT Groups]]></category>
		<category><![CDATA[apt groups]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[Cyber Espionage]]></category>
		<category><![CDATA[Identity Security]]></category>
		<category><![CDATA[Iran APT]]></category>
		<category><![CDATA[Middle East Threat Landscape]]></category>
		<category><![CDATA[Russian APT Groups]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://brandefense.io/?p=34141</guid>

					<description><![CDATA[<p>Agentic AI is reshaping cybersecurity operations by enabling autonomous threat triage, investigations, and rapid containment. Learn how AI-powered SOC teams are defending at machine speed.</p>
<p>The post <a rel="nofollow" href="https://brandefense.io/blog/agentic-ai-cybersecurity-soc/">Agentic AI in Cybersecurity: How Autonomous Agents Are Transforming the SOC</a> appeared first on <a rel="nofollow" href="https://brandefense.io">Brandefense</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>From Weeks to Seconds: What AI Actually Changes in the CTI Lifecycle</title>
		<link>https://brandefense.io/blog/ai-cyber-threat-intelligence-lifecycle/</link>
		
		<dc:creator><![CDATA[BRANDEFENSE]]></dc:creator>
		<pubDate>Fri, 17 Apr 2026 13:49:34 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[APT Groups]]></category>
		<category><![CDATA[Attack Surface Monitoring]]></category>
		<category><![CDATA[Cyber Risk Exposure]]></category>
		<category><![CDATA[cyber threat intelligence]]></category>
		<category><![CDATA[dark web monitoring]]></category>
		<category><![CDATA[external attack surface management]]></category>
		<guid isPermaLink="false">https://brandefense.io/?p=34101</guid>

					<description><![CDATA[<p>Learn how AI-driven CTI platforms eliminate delays, reduce noise, and deliver real-time intelligence to stop threats before they escalate.</p>
<p>The post <a rel="nofollow" href="https://brandefense.io/blog/ai-cyber-threat-intelligence-lifecycle/">From Weeks to Seconds: What AI Actually Changes in the CTI Lifecycle</a> appeared first on <a rel="nofollow" href="https://brandefense.io">Brandefense</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>GC01 (Golden Chickens): Inside the Arsenal of a Premier E-Crime MaaS Provider</title>
		<link>https://brandefense.io/blog/golden-chickens-gc01-apt-group/</link>
		
		<dc:creator><![CDATA[BRANDEFENSE]]></dc:creator>
		<pubDate>Thu, 16 Apr 2026 10:00:00 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[APT Groups]]></category>
		<category><![CDATA[apt groups]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[Cyber Espionage]]></category>
		<category><![CDATA[Identity Security]]></category>
		<category><![CDATA[Iran APT]]></category>
		<category><![CDATA[Middle East Threat Landscape]]></category>
		<category><![CDATA[Russian APT Groups]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://brandefense.io/?p=34052</guid>

					<description><![CDATA[<p>Golden Chickens (GC01) is a top-tier Malware-as-a-Service provider enabling cybercriminal operations worldwide. Discover its tools, tactics, and impact.</p>
<p>The post <a rel="nofollow" href="https://brandefense.io/blog/golden-chickens-gc01-apt-group/">GC01 (Golden Chickens): Inside the Arsenal of a Premier E-Crime MaaS Provider</a> appeared first on <a rel="nofollow" href="https://brandefense.io">Brandefense</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>BlackTech</title>
		<link>https://brandefense.io/blog/blacktech-apt-group/</link>
		
		<dc:creator><![CDATA[BRANDEFENSE]]></dc:creator>
		<pubDate>Tue, 14 Apr 2026 13:43:20 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[APT Groups]]></category>
		<category><![CDATA[apt groups]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[Cyber Espionage]]></category>
		<category><![CDATA[Identity Security]]></category>
		<category><![CDATA[Iran APT]]></category>
		<category><![CDATA[Middle East Threat Landscape]]></category>
		<category><![CDATA[Russian APT Groups]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://brandefense.io/?p=34040</guid>

					<description><![CDATA[<p>BlackTech is a China-aligned APT group specializing in long-term cyber espionage through network infrastructure compromise, targeting telecom, government, and tech sectors.</p>
<p>The post <a rel="nofollow" href="https://brandefense.io/blog/blacktech-apt-group/">BlackTech</a> appeared first on <a rel="nofollow" href="https://brandefense.io">Brandefense</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>UAC-0194: Inside a Rapidly Evolving NTLM-Exploiting Espionage Operation</title>
		<link>https://brandefense.io/blog/uac-0194-apt-group/</link>
		
		<dc:creator><![CDATA[BRANDEFENSE]]></dc:creator>
		<pubDate>Mon, 13 Apr 2026 13:27:50 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[APT Groups]]></category>
		<category><![CDATA[apt groups]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[Cyber Espionage]]></category>
		<category><![CDATA[Identity Security]]></category>
		<category><![CDATA[Iran APT]]></category>
		<category><![CDATA[Middle East Threat Landscape]]></category>
		<category><![CDATA[Russian APT Groups]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://brandefense.io/?p=34132</guid>

					<description><![CDATA[<p>UAC-0194 is a high-risk, Russian-affiliated threat actor leveraging NTLM vulnerabilities for stealthy credential theft and cyber espionage across Eastern Europe.</p>
<p>The post <a rel="nofollow" href="https://brandefense.io/blog/uac-0194-apt-group/">UAC-0194: Inside a Rapidly Evolving NTLM-Exploiting Espionage Operation</a> appeared first on <a rel="nofollow" href="https://brandefense.io">Brandefense</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>What Is Credential Stuffing? Attackers Don&#8217;t Crack Passwords, They Buy Them</title>
		<link>https://brandefense.io/blog/what-is-credential-stuffing/</link>
		
		<dc:creator><![CDATA[BRANDEFENSE]]></dc:creator>
		<pubDate>Sat, 04 Apr 2026 08:05:12 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[apt groups]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[Cyber Espionage]]></category>
		<category><![CDATA[Identity Security]]></category>
		<category><![CDATA[Iran APT]]></category>
		<category><![CDATA[Middle East Threat Landscape]]></category>
		<category><![CDATA[Russian APT Groups]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://brandefense.io/?p=34079</guid>

					<description><![CDATA[<p>A massive Komiko AI data breach exposed over 1 million users, including OAuth tokens and session data—creating critical account takeover risks. Here’s what happened and how Brandefense detected it early.</p>
<p>The post <a rel="nofollow" href="https://brandefense.io/blog/what-is-credential-stuffing/">What Is Credential Stuffing? Attackers Don&#8217;t Crack Passwords, They Buy Them</a> appeared first on <a rel="nofollow" href="https://brandefense.io">Brandefense</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>What Is Triple Extortion? The Anatomy of the Encryption + Leakage + DDoS Trio</title>
		<link>https://brandefense.io/blog/what-is-triple-extortion/</link>
		
		<dc:creator><![CDATA[BRANDEFENSE]]></dc:creator>
		<pubDate>Fri, 03 Apr 2026 07:26:59 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[intelligence]]></category>
		<category><![CDATA[security awareness]]></category>
		<guid isPermaLink="false">https://brandefense.io/?p=34065</guid>

					<description><![CDATA[<p>Triple extortion ransomware is reshaping cyber threats. Discover how attackers operate and how to detect threats before encryption begins.</p>
<p>The post <a rel="nofollow" href="https://brandefense.io/blog/what-is-triple-extortion/">What Is Triple Extortion? The Anatomy of the Encryption + Leakage + DDoS Trio</a> appeared first on <a rel="nofollow" href="https://brandefense.io">Brandefense</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>MFA Doesn&#8217;t Protect You — Cookies Give You Away: The Rise of Session Hijacking</title>
		<link>https://brandefense.io/blog/mfa-doesnt-protect-you-cookies-give-you-away-the-rise-of-session-hijacking/</link>
		
		<dc:creator><![CDATA[BRANDEFENSE]]></dc:creator>
		<pubDate>Thu, 26 Mar 2026 14:18:21 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Digital Risk Protection]]></category>
		<category><![CDATA[apt groups]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[Cyber Espionage]]></category>
		<category><![CDATA[Identity Security]]></category>
		<category><![CDATA[Iran APT]]></category>
		<category><![CDATA[Middle East Threat Landscape]]></category>
		<category><![CDATA[Russian APT Groups]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://brandefense.io/?p=34004</guid>

					<description><![CDATA[<p>Session hijacking allows attackers to bypass MFA by stealing authentication cookies. Discover how it works and how to detect stolen session tokens before exploitation.</p>
<p>The post <a rel="nofollow" href="https://brandefense.io/blog/mfa-doesnt-protect-you-cookies-give-you-away-the-rise-of-session-hijacking/">MFA Doesn&#8217;t Protect You — Cookies Give You Away: The Rise of Session Hijacking</a> appeared first on <a rel="nofollow" href="https://brandefense.io">Brandefense</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Fake Mobile App: How Is Your Clone on the App Store Stealing Your Users?</title>
		<link>https://brandefense.io/blog/fake-mobile-app-how-is-your-clone-on-the-app-store-stealing-your-users/</link>
		
		<dc:creator><![CDATA[BRANDEFENSE]]></dc:creator>
		<pubDate>Wed, 25 Mar 2026 13:26:10 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Digital Risk Protection]]></category>
		<category><![CDATA[apt groups]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[Cyber Espionage]]></category>
		<category><![CDATA[Identity Security]]></category>
		<category><![CDATA[Iran APT]]></category>
		<category><![CDATA[Middle East Threat Landscape]]></category>
		<category><![CDATA[Russian APT Groups]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://brandefense.io/?p=34025</guid>

					<description><![CDATA[<p>Fake mobile apps replicate your brand to steal user credentials, financial data, and trust. Discover how attackers build, distribute, and monetize clone apps—and how to stop them early.</p>
<p>The post <a rel="nofollow" href="https://brandefense.io/blog/fake-mobile-app-how-is-your-clone-on-the-app-store-stealing-your-users/">Fake Mobile App: How Is Your Clone on the App Store Stealing Your Users?</a> appeared first on <a rel="nofollow" href="https://brandefense.io">Brandefense</a>.</p>
]]></description>
		
		
		
			</item>
	</channel>
</rss>
