<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 3, 2026 at 7:45 pm by All in One SEO v4.8.7 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://firewall.firm.in/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Firewall Security Company India</title>
		<link><![CDATA[https://firewall.firm.in]]></link>
		<description><![CDATA[Firewall Security Company India]]></description>
		<lastBuildDate><![CDATA[Wed, 01 Apr 2026 16:58:50 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://firewall.firm.in/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://firewall.firm.in/block-the-prompt-not-the-work-the-end-of/]]></guid>
			<link><![CDATA[https://firewall.firm.in/block-the-prompt-not-the-work-the-end-of/]]></link>
			<title>Block the Prompt, Not the Work: The End of</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 16:58:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewall.firm.in/f5-and-forcepoint-expand-ai-security-collaboration/]]></guid>
			<link><![CDATA[https://firewall.firm.in/f5-and-forcepoint-expand-ai-security-collaboration/]]></link>
			<title>F5 and Forcepoint expand AI security collaboration</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 16:19:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewall.firm.in/barracuda-expands-ai-security-capabilities-and-partner-program-etciso/]]></guid>
			<link><![CDATA[https://firewall.firm.in/barracuda-expands-ai-security-capabilities-and-partner-program-etciso/]]></link>
			<title>Barracuda expands AI security capabilities and partner program, ETCISO</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 16:04:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewall.firm.in/data-privacy-is-becoming-an-infrastructure-imperative/]]></guid>
			<link><![CDATA[https://firewall.firm.in/data-privacy-is-becoming-an-infrastructure-imperative/]]></link>
			<title>Data privacy is becoming an infrastructure imperative</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 16:02:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewall.firm.in/microsoft-warns-of-whatsapp-delivered-vbs-malware-hijacking-windows-via-uac-bypass/]]></guid>
			<link><![CDATA[https://firewall.firm.in/microsoft-warns-of-whatsapp-delivered-vbs-malware-hijacking-windows-via-uac-bypass/]]></link>
			<title>Microsoft Warns of WhatsApp-Delivered VBS Malware Hijacking Windows via UAC Bypass</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 15:12:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewall.firm.in/ai-acceleration-in-apac-exposes-growing-api-security-gap/]]></guid>
			<link><![CDATA[https://firewall.firm.in/ai-acceleration-in-apac-exposes-growing-api-security-gap/]]></link>
			<title>AI acceleration in APAC exposes growing API security gap</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 14:15:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewall.firm.in/ai-cybersecurity-digital-and-data-skills-emerge-as-indias-most-critical-future-capabilities-etciso/]]></guid>
			<link><![CDATA[https://firewall.firm.in/ai-cybersecurity-digital-and-data-skills-emerge-as-indias-most-critical-future-capabilities-etciso/]]></link>
			<title>AI, cybersecurity, digital and data skills emerge as India&#8217;s most critical future capabilities, ETCISO</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 14:06:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewall.firm.in/84-of-female-entrepreneurs-use-upi-cohort-shows-the-highest-levels-of-digital-adoption-report/]]></guid>
			<link><![CDATA[https://firewall.firm.in/84-of-female-entrepreneurs-use-upi-cohort-shows-the-highest-levels-of-digital-adoption-report/]]></link>
			<title>84% of female entrepreneurs use UPI; cohort shows the highest levels of digital adoption: Report</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 08:16:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewall.firm.in/porter-partners-with-incognia-to-curb-delivery-partner-account-misuse-etciso/]]></guid>
			<link><![CDATA[https://firewall.firm.in/porter-partners-with-incognia-to-curb-delivery-partner-account-misuse-etciso/]]></link>
			<title>Porter partners with Incognia to curb delivery partner account misuse, ETCISO</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 20:04:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewall.firm.in/google-attributes-axios-npm-supply-chain-attack-to-north-korean-group-unc1069/]]></guid>
			<link><![CDATA[https://firewall.firm.in/google-attributes-axios-npm-supply-chain-attack-to-north-korean-group-unc1069/]]></link>
			<title>Google Attributes Axios npm Supply Chain Attack to North Korean Group UNC1069</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 08:12:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewall.firm.in/cyber-resilience-turns-a-boardroom-priority/]]></guid>
			<link><![CDATA[https://firewall.firm.in/cyber-resilience-turns-a-boardroom-priority/]]></link>
			<title>Cyber resilience turns a boardroom priority</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 07:18:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewall.firm.in/accenture-and-anthropic-partner-on-ai-driven-cybersecurity-operations-etciso/]]></guid>
			<link><![CDATA[https://firewall.firm.in/accenture-and-anthropic-partner-on-ai-driven-cybersecurity-operations-etciso/]]></link>
			<title>Accenture and Anthropic partner on AI-driven cybersecurity operations, ETCISO</title>
			<pubDate><![CDATA[Tue, 31 Mar 2026 18:23:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewall.firm.in/tru-identifies-mobile-spyware-campaign-using-fake-red-alert-app-in-israel/]]></guid>
			<link><![CDATA[https://firewall.firm.in/tru-identifies-mobile-spyware-campaign-using-fake-red-alert-app-in-israel/]]></link>
			<title>TRU identifies mobile spyware campaign using fake Red Alert app in Israel</title>
			<pubDate><![CDATA[Tue, 31 Mar 2026 11:49:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewall.firm.in/axios-supply-chain-attack-pushes-cross-platform-rat-via-compromised-npm-account/]]></guid>
			<link><![CDATA[https://firewall.firm.in/axios-supply-chain-attack-pushes-cross-platform-rat-via-compromised-npm-account/]]></link>
			<title>Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm Account</title>
			<pubDate><![CDATA[Tue, 31 Mar 2026 11:45:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewall.firm.in/millions-of-infected-devices-fueled-massive-cyberattacks/]]></guid>
			<link><![CDATA[https://firewall.firm.in/millions-of-infected-devices-fueled-massive-cyberattacks/]]></link>
			<title>Millions of infected devices fueled massive cyberattacks</title>
			<pubDate><![CDATA[Thu, 26 Mar 2026 15:05:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewall.firm.in/china-linked-hackers-plant-stealth-malware-deep-in-global-telecom-networks/]]></guid>
			<link><![CDATA[https://firewall.firm.in/china-linked-hackers-plant-stealth-malware-deep-in-global-telecom-networks/]]></link>
			<title>China-linked hackers plant stealth malware deep in global telecom networks</title>
			<pubDate><![CDATA[Sun, 29 Mar 2026 19:42:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewall.firm.in/48-enterprises-flag-mule-networks-as-top-fraud-threat-etciso/]]></guid>
			<link><![CDATA[https://firewall.firm.in/48-enterprises-flag-mule-networks-as-top-fraud-threat-etciso/]]></link>
			<title>48% enterprises flag mule networks as top fraud threat, ETCISO</title>
			<pubDate><![CDATA[Sun, 29 Mar 2026 19:07:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewall.firm.in/anthropics-most-powerful-ai-model-claude-mythos-data-leaked/]]></guid>
			<link><![CDATA[https://firewall.firm.in/anthropics-most-powerful-ai-model-claude-mythos-data-leaked/]]></link>
			<title>Anthropic&#8217;s most powerful AI model &#8216;Claude Mythos&#8217; data leaked</title>
			<pubDate><![CDATA[Sat, 28 Mar 2026 11:46:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewall.firm.in/open-vsx-bug-let-malicious-vs-code-extensions-bypass-pre-publish-security-checks/]]></guid>
			<link><![CDATA[https://firewall.firm.in/open-vsx-bug-let-malicious-vs-code-extensions-bypass-pre-publish-security-checks/]]></link>
			<title>Open VSX Bug Let Malicious VS Code Extensions Bypass Pre-Publish Security Checks</title>
			<pubDate><![CDATA[Fri, 27 Mar 2026 17:06:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewall.firm.in/india-tightens-digital-security-with-strict-rules/]]></guid>
			<link><![CDATA[https://firewall.firm.in/india-tightens-digital-security-with-strict-rules/]]></link>
			<title>India tightens digital security with strict rules</title>
			<pubDate><![CDATA[Fri, 27 Mar 2026 09:47:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewall.firm.in/silent-mobile-verification-eradicates-sms-otp-anxiety-etciso/]]></guid>
			<link><![CDATA[https://firewall.firm.in/silent-mobile-verification-eradicates-sms-otp-anxiety-etciso/]]></link>
			<title>Silent Mobile Verification Eradicates SMS/OTP Anxiety, ETCISO</title>
			<pubDate><![CDATA[Fri, 27 Mar 2026 04:32:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewall.firm.in/webinar-stop-guessing-learn-to-validate-your-defenses-against-real-attacks/]]></guid>
			<link><![CDATA[https://firewall.firm.in/webinar-stop-guessing-learn-to-validate-your-defenses-against-real-attacks/]]></link>
			<title>[Webinar] Stop Guessing. Learn to Validate Your Defenses Against Real Attacks</title>
			<pubDate><![CDATA[Thu, 26 Mar 2026 14:04:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewall.firm.in/sebi-leverages-ai-to-combat-finfluencer-fraud-on-google-platforms/]]></guid>
			<link><![CDATA[https://firewall.firm.in/sebi-leverages-ai-to-combat-finfluencer-fraud-on-google-platforms/]]></link>
			<title>Sebi leverages AI to combat finfluencer fraud on Google platforms</title>
			<pubDate><![CDATA[Thu, 26 Mar 2026 11:00:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewall.firm.in/safeguarding-your-organization-from-shadow-ai-risks-etciso/]]></guid>
			<link><![CDATA[https://firewall.firm.in/safeguarding-your-organization-from-shadow-ai-risks-etciso/]]></link>
			<title>Safeguarding Your Organization from Shadow AI Risks, ETCISO</title>
			<pubDate><![CDATA[Wed, 25 Mar 2026 18:30:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewall.firm.in/nhrc-issues-notices-over-alleged-dpdp-act-violations-by-ai-social-media-edtech-platforms/]]></guid>
			<link><![CDATA[https://firewall.firm.in/nhrc-issues-notices-over-alleged-dpdp-act-violations-by-ai-social-media-edtech-platforms/]]></link>
			<title>NHRC issues notices over alleged DPDP Act violations by AI, social media, edtech platforms</title>
			<pubDate><![CDATA[Wed, 25 Mar 2026 18:18:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewall.firm.in/glassworm-malware-uses-solana-dead-drops-to-deliver-rat-and-steal-browser-crypto-data/]]></guid>
			<link><![CDATA[https://firewall.firm.in/glassworm-malware-uses-solana-dead-drops-to-deliver-rat-and-steal-browser-crypto-data/]]></link>
			<title>GlassWorm Malware Uses Solana Dead Drops to Deliver RAT and Steal Browser, Crypto Data</title>
			<pubDate><![CDATA[Wed, 25 Mar 2026 16:00:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewall.firm.in/protectt-ai-introduces-its-ai-security-posture-management-platform-ai-spm-at-rsac-2026-to-tackle-risks-related-to-autonomous-ai-agents/]]></guid>
			<link><![CDATA[https://firewall.firm.in/protectt-ai-introduces-its-ai-security-posture-management-platform-ai-spm-at-rsac-2026-to-tackle-risks-related-to-autonomous-ai-agents/]]></link>
			<title>Protectt.ai Introduces Its AI Security Posture Management Platform (AI-SPM) at RSAC 2026 to Tackle Risks Related to Autonomous AI Agents</title>
			<pubDate><![CDATA[Wed, 25 Mar 2026 10:27:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewall.firm.in/ai-apps-to-drive-50-of-cyber-incident-response-by-2028-etciso/]]></guid>
			<link><![CDATA[https://firewall.firm.in/ai-apps-to-drive-50-of-cyber-incident-response-by-2028-etciso/]]></link>
			<title>AI apps to drive 50% of cyber incident response by 2028, ETCISO</title>
			<pubDate><![CDATA[Wed, 25 Mar 2026 09:25:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewall.firm.in/data-leaks-are-the-new-retention-crisis-for-d2c-brands/]]></guid>
			<link><![CDATA[https://firewall.firm.in/data-leaks-are-the-new-retention-crisis-for-d2c-brands/]]></link>
			<title>Data leaks are the new retention crisis for D2C brands</title>
			<pubDate><![CDATA[Tue, 24 Mar 2026 06:28:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewall.firm.in/weekly-recap-ci-cd-backdoor-fbi-buys-location-data-whatsapp-ditches-numbers-more/]]></guid>
			<link><![CDATA[https://firewall.firm.in/weekly-recap-ci-cd-backdoor-fbi-buys-location-data-whatsapp-ditches-numbers-more/]]></link>
			<title>&#x26a1; Weekly Recap: CI/CD Backdoor, FBI Buys Location Data, WhatsApp Ditches Numbers &#038; More</title>
			<pubDate><![CDATA[Mon, 23 Mar 2026 18:01:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewall.firm.in/google-and-security-companies-have-warned-iphone-users-of-darksword-spy-attack/]]></guid>
			<link><![CDATA[https://firewall.firm.in/google-and-security-companies-have-warned-iphone-users-of-darksword-spy-attack/]]></link>
			<title>Google and security companies have warned iPhone users of DarkSword spy attack</title>
			<pubDate><![CDATA[Mon, 23 Mar 2026 10:42:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewall.firm.in/reimagining-cybersecurity-in-indias-financial-sector-etciso/]]></guid>
			<link><![CDATA[https://firewall.firm.in/reimagining-cybersecurity-in-indias-financial-sector-etciso/]]></link>
			<title>Reimagining cybersecurity in India&#8217;s financial sector, ETCISO</title>
			<pubDate><![CDATA[Mon, 23 Mar 2026 09:39:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewall.firm.in/personal-data-breach-affected-over-165000-accounts-coupang/]]></guid>
			<link><![CDATA[https://firewall.firm.in/personal-data-breach-affected-over-165000-accounts-coupang/]]></link>
			<title>Personal data breach affected over 165,000 accounts: Coupang</title>
			<pubDate><![CDATA[Tue, 03 Mar 2026 23:20:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewall.firm.in/bits-ai-security-analyst-reduces-threat-investigation-time-by-up-to-98/]]></guid>
			<link><![CDATA[https://firewall.firm.in/bits-ai-security-analyst-reduces-threat-investigation-time-by-up-to-98/]]></link>
			<title>Bits AI Security Analyst reduces threat investigation time by up to 98%</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 20:10:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewall.firm.in/tech-giants-join-hands-to-fight-online-scams/]]></guid>
			<link><![CDATA[https://firewall.firm.in/tech-giants-join-hands-to-fight-online-scams/]]></link>
			<title>Tech giants join hands to fight online scams</title>
			<pubDate><![CDATA[Sun, 22 Mar 2026 21:51:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewall.firm.in/critical-langflow-flaw-cve-2026-33017-triggers-attacks-within-20-hours-of-disclosure/]]></guid>
			<link><![CDATA[https://firewall.firm.in/critical-langflow-flaw-cve-2026-33017-triggers-attacks-within-20-hours-of-disclosure/]]></link>
			<title>Critical Langflow Flaw CVE-2026-33017 Triggers Attacks within 20 Hours of Disclosure</title>
			<pubDate><![CDATA[Fri, 20 Mar 2026 17:06:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewall.firm.in/transparent-tribe-uses-ai-to-mass-produce-malware-implants-in-campaign-targeting-india/]]></guid>
			<link><![CDATA[https://firewall.firm.in/transparent-tribe-uses-ai-to-mass-produce-malware-implants-in-campaign-targeting-india/]]></link>
			<title>Transparent Tribe Uses AI to Mass-Produce Malware Implants in Campaign Targeting India</title>
			<pubDate><![CDATA[Sat, 07 Mar 2026 08:00:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewall.firm.in/ai-deepfakes-digital-warfare-5-indian-companies-reinventing-national-security/]]></guid>
			<link><![CDATA[https://firewall.firm.in/ai-deepfakes-digital-warfare-5-indian-companies-reinventing-national-security/]]></link>
			<title>AI, deepfakes &#038; digital warfare: 5 Indian companies reinventing national security</title>
			<pubDate><![CDATA[Sat, 07 Mar 2026 04:50:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewall.firm.in/cognizant-unit-trizetto-breach-exposes-data-of-3-4m-people/]]></guid>
			<link><![CDATA[https://firewall.firm.in/cognizant-unit-trizetto-breach-exposes-data-of-3-4m-people/]]></link>
			<title>Cognizant unit TriZetto breach exposes data of 3.4m people</title>
			<pubDate><![CDATA[Mon, 09 Mar 2026 08:46:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewall.firm.in/maruti-suzukis-dr-tapan-sahoo-calls-for-re-engineering-trust-in-the-digital-mobility-era-etciso/]]></guid>
			<link><![CDATA[https://firewall.firm.in/maruti-suzukis-dr-tapan-sahoo-calls-for-re-engineering-trust-in-the-digital-mobility-era-etciso/]]></link>
			<title>Maruti Suzuki’s Dr Tapan Sahoo calls for re-engineering trust in the digital mobility era, ETCISO</title>
			<pubDate><![CDATA[Fri, 13 Mar 2026 17:07:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewall.firm.in/cloudflare-threat-report-highlights-trends-underpinning-10t-cybercrime-economy-etciso/]]></guid>
			<link><![CDATA[https://firewall.firm.in/cloudflare-threat-report-highlights-trends-underpinning-10t-cybercrime-economy-etciso/]]></link>
			<title>Cloudflare threat report highlights trends underpinning $10T cybercrime economy, ETCISO</title>
			<pubDate><![CDATA[Fri, 06 Mar 2026 17:06:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewall.firm.in/fake-tech-support-spam-deploys-customized-havoc-c2-across-organizations/]]></guid>
			<link><![CDATA[https://firewall.firm.in/fake-tech-support-spam-deploys-customized-havoc-c2-across-organizations/]]></link>
			<title>Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations</title>
			<pubDate><![CDATA[Tue, 03 Mar 2026 21:17:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewall.firm.in/proofpoint-integrates-with-aws-security-hub-extended-plan/]]></guid>
			<link><![CDATA[https://firewall.firm.in/proofpoint-integrates-with-aws-security-hub-extended-plan/]]></link>
			<title>Proofpoint integrates with AWS Security Hub extended plan</title>
			<pubDate><![CDATA[Tue, 03 Mar 2026 21:13:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewall.firm.in/f5-labs-launches-ai-security-risk-leaderboards-and-monthly-benchmarks-to-grade-ai-models-etciso/]]></guid>
			<link><![CDATA[https://firewall.firm.in/f5-labs-launches-ai-security-risk-leaderboards-and-monthly-benchmarks-to-grade-ai-models-etciso/]]></link>
			<title>F5 Labs Launches AI Security Risk Leaderboards and Monthly Benchmarks to Grade AI Models, ETCISO</title>
			<pubDate><![CDATA[Tue, 03 Mar 2026 19:21:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewall.firm.in/cisos-must-speak-the-language-of-growth-not-just-risk-say-industry-leaders/]]></guid>
			<link><![CDATA[https://firewall.firm.in/cisos-must-speak-the-language-of-growth-not-just-risk-say-industry-leaders/]]></link>
			<title>CISOs must speak the language of growth, not just risk, say industry leaders</title>
			<pubDate><![CDATA[Sun, 15 Mar 2026 11:30:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewall.firm.in/india-in-talks-with-30-nations-to-curb-ai-misuse/]]></guid>
			<link><![CDATA[https://firewall.firm.in/india-in-talks-with-30-nations-to-curb-ai-misuse/]]></link>
			<title>India in talks with 30+ nations to curb AI misuse</title>
			<pubDate><![CDATA[Tue, 03 Mar 2026 16:00:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewall.firm.in/ai-agents-the-next-wave-identity-dark-matter-powerful-invisible-and-unmanaged/]]></guid>
			<link><![CDATA[https://firewall.firm.in/ai-agents-the-next-wave-identity-dark-matter-powerful-invisible-and-unmanaged/]]></link>
			<title>AI Agents: The Next Wave Identity Dark Matter &#8211; Powerful, Invisible, and Unmanaged</title>
			<pubDate><![CDATA[Tue, 03 Mar 2026 12:37:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewall.firm.in/upwind-expands-india-presence-to-support-cloud-and-ai-security-needs/]]></guid>
			<link><![CDATA[https://firewall.firm.in/upwind-expands-india-presence-to-support-cloud-and-ai-security-needs/]]></link>
			<title>Upwind expands India presence to support cloud and AI security needs</title>
			<pubDate><![CDATA[Tue, 03 Mar 2026 12:14:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewall.firm.in/can-you-answer-what-happened-before-the-first-hour-is-gone-etciso/]]></guid>
			<link><![CDATA[https://firewall.firm.in/can-you-answer-what-happened-before-the-first-hour-is-gone-etciso/]]></link>
			<title>Can you answer ‘What Happened?’ Before the first hour is gone?, ETCISO</title>
			<pubDate><![CDATA[Tue, 03 Mar 2026 12:01:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://firewall.firm.in/hackers-exploit-cve-2025-55182-to-breach-766-next-js-hosts-steal-credentials/]]></guid>
			<link><![CDATA[https://firewall.firm.in/hackers-exploit-cve-2025-55182-to-breach-766-next-js-hosts-steal-credentials/]]></link>
			<title>Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 23:43:44 +0000]]></pubDate>
		</item>
				</channel>
</rss>
