<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://www.radiocsirt.com/wp-content/plugins/seriously-simple-podcasting/templates/feed-stylesheet.xsl"?><rss version="2.0"
	 xmlns:content="http://purl.org/rss/1.0/modules/content/"
	 xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	 xmlns:dc="http://purl.org/dc/elements/1.1/"
	 xmlns:atom="http://www.w3.org/2005/Atom"
	 xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	 xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	 xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"
	 xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"
	 xmlns:podcast="https://podcastindex.org/namespace/1.0"
	>
		<channel>
		<title>RadioCSIRT - Your Daily Cyber Security Brief</title>
		<atom:link href="https://www.radiocsirt.com/feed/podcast/radiocsirt-en/" rel="self" type="application/rss+xml"/>
		<link>https://www.radiocsirt.com/series/radiocsirt-en/</link>
		<description></description>
		<lastBuildDate>Sun, 12 Apr 2026 18:32:00 +0000</lastBuildDate>
		<language>en-US</language>
		<copyright>© 2025 RadioCSIRT</copyright>
		<itunes:subtitle>Don&#039;t think, Patch now !</itunes:subtitle>
		<itunes:author>RadioCSIRT</itunes:author>
		<itunes:summary></itunes:summary>
		<itunes:owner>
			<itunes:name>RadioCSIRT</itunes:name>
		</itunes:owner>
		<itunes:explicit>false</itunes:explicit>
		<itunes:image href="https://www.radiocsirt.com/wp-content/uploads/2025/10/0262-001-scaled.jpg"></itunes:image>
			<image>
				<url>https://www.radiocsirt.com/wp-content/uploads/2025/10/0262-001-scaled.jpg</url>
				<title>RadioCSIRT - Your Daily Cyber Security Brief</title>
				<link>https://www.radiocsirt.com/series/radiocsirt-en/</link>
			</image>
		<itunes:category text="Technology">
		</itunes:category>
		<itunes:category text="News">
									<itunes:category text="Tech News"></itunes:category>
							</itunes:category>
		<itunes:category text="Business">
									<itunes:category text="Non-Profit"></itunes:category>
							</itunes:category>
		<googleplay:author><![CDATA[RadioCSIRT]]></googleplay:author>
						<googleplay:description></googleplay:description>
			<googleplay:explicit>No</googleplay:explicit>
			<googleplay:image href="https://www.radiocsirt.com/wp-content/uploads/2025/10/0262-001-scaled.jpg"></googleplay:image>
			<podcast:locked>yes</podcast:locked>
		<podcast:guid>7576586f-5fab-5188-8a52-b74c43cfb0ea</podcast:guid>
		
		<!-- podcast_generator="SSP by Castos/3.14.4" Seriously Simple Podcasting plugin for WordPress (https://wordpress.org/plugins/seriously-simple-podcasting/) -->
		<generator>https://wordpress.org/?v=6.9.4</generator>

<item>
	<title>RadioCSIRT English Edition – Adobe ZeroDay &#8211; CVE-2026-34621 &#8211; Ep.78</title>
	<link>https://www.radiocsirt.com/podcast/radiocsirt-english-edition-adobe-zeroday-cve-2026-34621-ep-78/</link>
	<pubDate>Sun, 12 Apr 2026 14:43:31 +0000</pubDate>
	<dc:creator><![CDATA[RadioCSIRT]]></dc:creator>
	<guid isPermaLink="false">dfab2083-ebf3-5f72-add4-3b187fbbe8e2</guid>
	<description><![CDATA[On April 9, 2026, researcher Haifei Li, founder of EXPMON — a sandbox-based exploit detection system — publicly disclosed the existence of a zero-day vulnerability in Adobe Acrobat Reader actively exploited in the wild for at least five months. Adobe was notified on April 7. The vulnerability has since been confirmed by Adobe, assigned CVE-2026-34621, [&#8230;]]]></description>
	<itunes:subtitle><![CDATA[On April 9, 2026, researcher Haifei Li, founder of EXPMON — a sandbox-based exploit detection system — publicly disclosed the existence of a zero-day vulnerability in Adobe Acrobat Reader actively exploited in the wild for at least five months. Adobe was]]></itunes:subtitle>
	<content:encoded><![CDATA[On April 9, 2026, researcher Haifei Li, founder of EXPMON — a sandbox-based exploit detection system — publicly disclosed the existence of a zero-day vulnerability in Adobe Acrobat Reader actively exploited in the wild for at least five months. Adobe was notified on April 7. The vulnerability has since been confirmed by Adobe, assigned CVE-2026-34621, [&#8230;]]]></content:encoded>
	<enclosure url="https://track.podcastics.com/8748/410841.mp3" length="1" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[On April 9, 2026, researcher Haifei Li, founder of EXPMON — a sandbox-based exploit detection system — publicly disclosed the existence of a zero-day vulnerability in Adobe Acrobat Reader actively exploited in the wild for at least five months. Adobe was notified on April 7. The vulnerability has since been confirmed by Adobe, assigned CVE-2026-34621, [&#8230;]]]></itunes:summary>
	<itunes:image href="https://www.radiocsirt.com/wp-content/uploads/2026/04/EN_RadioCSIRT78JPEG.jpeg"></itunes:image>
	<image>
		<url>https://www.radiocsirt.com/wp-content/uploads/2026/04/EN_RadioCSIRT78JPEG.jpeg</url>
		<title>RadioCSIRT English Edition – Adobe ZeroDay &#8211; CVE-2026-34621 &#8211; Ep.78</title>
	</image>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[RadioCSIRT]]></itunes:author>	<googleplay:description><![CDATA[On April 9, 2026, researcher Haifei Li, founder of EXPMON — a sandbox-based exploit detection system — publicly disclosed the existence of a zero-day vulnerability in Adobe Acrobat Reader actively exploited in the wild for at least five months. Adobe was notified on April 7. The vulnerability has since been confirmed by Adobe, assigned CVE-2026-34621, [&#8230;]]]></googleplay:description>
	<googleplay:image href="https://www.radiocsirt.com/wp-content/uploads/2026/04/EN_RadioCSIRT78JPEG.jpeg"></googleplay:image>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>RadioCSIRT English Edition &#8211; Update about Cyber situation on middle east &#8211; Ep. 77</title>
	<link>https://www.radiocsirt.com/podcast/radiocsirt-english-edition-update-about-cyber-situation-on-middle-east-ep-77/</link>
	<pubDate>Sun, 12 Apr 2026 14:26:13 +0000</pubDate>
	<dc:creator><![CDATA[RadioCSIRT]]></dc:creator>
	<guid isPermaLink="false">https://www.radiocsirt.com/?post_type=podcast&#038;p=501</guid>
	<description><![CDATA[In this episode: the cyber dimension of the Iran conflict — a six-week retrospective from the initial strikes of February 28 through the fragile ceasefire of April 9, 2026, covering the full evolution of Iranian and pro-Iranian cyber operations from the first hacktivist DDoS waves to confirmed exploitation of industrial control systems inside the United [&#8230;]]]></description>
	<itunes:subtitle><![CDATA[In this episode: the cyber dimension of the Iran conflict — a six-week retrospective from the initial strikes of February 28 through the fragile ceasefire of April 9, 2026, covering the full evolution of Iranian and pro-Iranian cyber operations from the ]]></itunes:subtitle>
	<content:encoded><![CDATA[In this episode: the cyber dimension of the Iran conflict — a six-week retrospective from the initial strikes of February 28 through the fragile ceasefire of April 9, 2026, covering the full evolution of Iranian and pro-Iranian cyber operations from the first hacktivist DDoS waves to confirmed exploitation of industrial control systems inside the United [&#8230;]]]></content:encoded>
	<enclosure url="https://track.podcastics.com/8748/410840.mp3" length="1" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[In this episode: the cyber dimension of the Iran conflict — a six-week retrospective from the initial strikes of February 28 through the fragile ceasefire of April 9, 2026, covering the full evolution of Iranian and pro-Iranian cyber operations from the first hacktivist DDoS waves to confirmed exploitation of industrial control systems inside the United [&#8230;]]]></itunes:summary>
	<itunes:image href="https://www.radiocsirt.com/wp-content/uploads/2026/04/EN_RadioCSIRT77JPEG.jpeg"></itunes:image>
	<image>
		<url>https://www.radiocsirt.com/wp-content/uploads/2026/04/EN_RadioCSIRT77JPEG.jpeg</url>
		<title>RadioCSIRT English Edition &#8211; Update about Cyber situation on middle east &#8211; Ep. 77</title>
	</image>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[RadioCSIRT]]></itunes:author>	<googleplay:description><![CDATA[In this episode: the cyber dimension of the Iran conflict — a six-week retrospective from the initial strikes of February 28 through the fragile ceasefire of April 9, 2026, covering the full evolution of Iranian and pro-Iranian cyber operations from the first hacktivist DDoS waves to confirmed exploitation of industrial control systems inside the United [&#8230;]]]></googleplay:description>
	<googleplay:image href="https://www.radiocsirt.com/wp-content/uploads/2026/04/EN_RadioCSIRT77JPEG.jpeg"></googleplay:image>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>RadioCSIRT English Edition – Patch Tuesday April 2026 &#8211; Episode 76</title>
	<link>https://www.radiocsirt.com/podcast/radiocsirt-english-edition-patch-tuesday-april-2026-episode-76/</link>
	<pubDate>Sun, 12 Apr 2026 14:11:11 +0000</pubDate>
	<dc:creator><![CDATA[RadioCSIRT]]></dc:creator>
	<guid isPermaLink="false">758f22de-eef2-5aee-96db-c152ff455dd5</guid>
	<description><![CDATA[RadioCSIRT English Edition – Episode 76 On April 14, 2026, Microsoft releases its monthly security update cycle. This Patch Tuesday warrants direct attention from every patch management team and every operations team running Windows infrastructure. The maximum severity is critical. The primary impact is remote code execution. The affected surface covers the most widely deployed [&#8230;]]]></description>
	<itunes:subtitle><![CDATA[RadioCSIRT English Edition – Episode 76 On April 14, 2026, Microsoft releases its monthly security update cycle. This Patch Tuesday warrants direct attention from every patch management team and every operations team running Windows infrastructure. The m]]></itunes:subtitle>
	<content:encoded><![CDATA[RadioCSIRT English Edition – Episode 76 On April 14, 2026, Microsoft releases its monthly security update cycle. This Patch Tuesday warrants direct attention from every patch management team and every operations team running Windows infrastructure. The maximum severity is critical. The primary impact is remote code execution. The affected surface covers the most widely deployed [&#8230;]]]></content:encoded>
	<enclosure url="https://track.podcastics.com/8748/410838.mp3" length="1" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[RadioCSIRT English Edition – Episode 76 On April 14, 2026, Microsoft releases its monthly security update cycle. This Patch Tuesday warrants direct attention from every patch management team and every operations team running Windows infrastructure. The maximum severity is critical. The primary impact is remote code execution. The affected surface covers the most widely deployed [&#8230;]]]></itunes:summary>
	<itunes:image href="https://www.radiocsirt.com/wp-content/uploads/2026/04/EN_RadioCSIRT76JPEG.jpeg"></itunes:image>
	<image>
		<url>https://www.radiocsirt.com/wp-content/uploads/2026/04/EN_RadioCSIRT76JPEG.jpeg</url>
		<title>RadioCSIRT English Edition – Patch Tuesday April 2026 &#8211; Episode 76</title>
	</image>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[RadioCSIRT]]></itunes:author>	<googleplay:description><![CDATA[RadioCSIRT English Edition – Episode 76 On April 14, 2026, Microsoft releases its monthly security update cycle. This Patch Tuesday warrants direct attention from every patch management team and every operations team running Windows infrastructure. The maximum severity is critical. The primary impact is remote code execution. The affected surface covers the most widely deployed [&#8230;]]]></googleplay:description>
	<googleplay:image href="https://www.radiocsirt.com/wp-content/uploads/2026/04/EN_RadioCSIRT76JPEG.jpeg"></googleplay:image>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>RadioCSIRT English Edition – Remus: Unmasking the 64-bit variant of the infamous Lumma Stealer &#8211; Ep.75</title>
	<link>https://www.radiocsirt.com/podcast/radiocsirt-english-edition-remus-unmasking-the-64-bit-variant-of-the-infamous-lumma-stealer-ep-75/</link>
	<pubDate>Sun, 12 Apr 2026 12:37:04 +0000</pubDate>
	<dc:creator><![CDATA[RadioCSIRT]]></dc:creator>
	<guid isPermaLink="false">ccc26984-3619-5c80-8916-f0a21cd501c1</guid>
	<description><![CDATA[On April 7, 2026, Gen Threat Labs, the research arm of Gen Digital, published a detailed technical analysis of Remus, a new 64-bit infostealer attributed to the Lumma Stealer family. Active campaigns involving Remus have been observed since February 2026 — directly following a doxxing campaign between August and October 2025 that exposed the presumed [&#8230;]]]></description>
	<itunes:subtitle><![CDATA[On April 7, 2026, Gen Threat Labs, the research arm of Gen Digital, published a detailed technical analysis of Remus, a new 64-bit infostealer attributed to the Lumma Stealer family. Active campaigns involving Remus have been observed since February 2026]]></itunes:subtitle>
	<content:encoded><![CDATA[On April 7, 2026, Gen Threat Labs, the research arm of Gen Digital, published a detailed technical analysis of Remus, a new 64-bit infostealer attributed to the Lumma Stealer family. Active campaigns involving Remus have been observed since February 2026 — directly following a doxxing campaign between August and October 2025 that exposed the presumed [&#8230;]]]></content:encoded>
	<enclosure url="https://track.podcastics.com/8748/410826.mp3" length="1" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[On April 7, 2026, Gen Threat Labs, the research arm of Gen Digital, published a detailed technical analysis of Remus, a new 64-bit infostealer attributed to the Lumma Stealer family. Active campaigns involving Remus have been observed since February 2026 — directly following a doxxing campaign between August and October 2025 that exposed the presumed [&#8230;]]]></itunes:summary>
	<itunes:image href="https://www.radiocsirt.com/wp-content/uploads/2026/04/EN_RadioCSIRT75JPEG.jpeg"></itunes:image>
	<image>
		<url>https://www.radiocsirt.com/wp-content/uploads/2026/04/EN_RadioCSIRT75JPEG.jpeg</url>
		<title>RadioCSIRT English Edition – Remus: Unmasking the 64-bit variant of the infamous Lumma Stealer &#8211; Ep.75</title>
	</image>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[RadioCSIRT]]></itunes:author>	<googleplay:description><![CDATA[On April 7, 2026, Gen Threat Labs, the research arm of Gen Digital, published a detailed technical analysis of Remus, a new 64-bit infostealer attributed to the Lumma Stealer family. Active campaigns involving Remus have been observed since February 2026 — directly following a doxxing campaign between August and October 2025 that exposed the presumed [&#8230;]]]></googleplay:description>
	<googleplay:image href="https://www.radiocsirt.com/wp-content/uploads/2026/04/EN_RadioCSIRT75JPEG.jpeg"></googleplay:image>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>RadioCSIRT English Edition – a new ransomware group operating under the name Payload -Ep.74</title>
	<link>https://www.radiocsirt.com/podcast/radiocsirt-english-edition-a-new-ransomware-group-operating-under-the-name-payload-ep-74/</link>
	<pubDate>Sun, 12 Apr 2026 12:20:46 +0000</pubDate>
	<dc:creator><![CDATA[RadioCSIRT]]></dc:creator>
	<guid isPermaLink="false">f595ae43-7f00-5602-9f74-808839a18c2d</guid>
	<description><![CDATA[Since February 2026, a new ransomware group operating under the name Payload has been conducting active double extortion campaigns against organizations across multiple sectors and geographies. In less than two months of observed activity, the group has claimed twenty-six victims across seven countries, declared 2,603 gigabytes of exfiltrated data, and demonstrated a level of technical [&#8230;]]]></description>
	<itunes:subtitle><![CDATA[Since February 2026, a new ransomware group operating under the name Payload has been conducting active double extortion campaigns against organizations across multiple sectors and geographies. In less than two months of observed activity, the group has ]]></itunes:subtitle>
	<content:encoded><![CDATA[Since February 2026, a new ransomware group operating under the name Payload has been conducting active double extortion campaigns against organizations across multiple sectors and geographies. In less than two months of observed activity, the group has claimed twenty-six victims across seven countries, declared 2,603 gigabytes of exfiltrated data, and demonstrated a level of technical [&#8230;]]]></content:encoded>
	<enclosure url="https://track.podcastics.com/8748/410825.mp3" length="1" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[Since February 2026, a new ransomware group operating under the name Payload has been conducting active double extortion campaigns against organizations across multiple sectors and geographies. In less than two months of observed activity, the group has claimed twenty-six victims across seven countries, declared 2,603 gigabytes of exfiltrated data, and demonstrated a level of technical [&#8230;]]]></itunes:summary>
	<itunes:image href="https://www.radiocsirt.com/wp-content/uploads/2026/04/EN_RadioCSIRT74JPEG.jpeg"></itunes:image>
	<image>
		<url>https://www.radiocsirt.com/wp-content/uploads/2026/04/EN_RadioCSIRT74JPEG.jpeg</url>
		<title>RadioCSIRT English Edition – a new ransomware group operating under the name Payload -Ep.74</title>
	</image>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[RadioCSIRT]]></itunes:author>	<googleplay:description><![CDATA[Since February 2026, a new ransomware group operating under the name Payload has been conducting active double extortion campaigns against organizations across multiple sectors and geographies. In less than two months of observed activity, the group has claimed twenty-six victims across seven countries, declared 2,603 gigabytes of exfiltrated data, and demonstrated a level of technical [&#8230;]]]></googleplay:description>
	<googleplay:image href="https://www.radiocsirt.com/wp-content/uploads/2026/04/EN_RadioCSIRT74JPEG.jpeg"></googleplay:image>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>RadioCSIRT English Edition – Emergency meeting between the US Treasury -Episode 73</title>
	<link>https://www.radiocsirt.com/podcast/radiocsirt-english-edition-emergency-meeting-between-the-us-treasury-episode-73/</link>
	<pubDate>Sun, 12 Apr 2026 10:03:48 +0000</pubDate>
	<dc:creator><![CDATA[RadioCSIRT]]></dc:creator>
	<guid isPermaLink="false">8c3b2b38-ef6d-587b-b611-d193af56a142</guid>
	<description><![CDATA[In this episode, a single artificial intelligence model became the subject of an emergency meeting between the US Treasury, the Federal Reserve, and the CEOs of America&#8217;s largest systemically important financial institutions. That model is Claude Mythos Preview, developed by Anthropic. This marks the first time in American financial history that frontier AI capabilities have [&#8230;]]]></description>
	<itunes:subtitle><![CDATA[In this episode, a single artificial intelligence model became the subject of an emergency meeting between the US Treasury, the Federal Reserve, and the CEOs of America&#8217;s largest systemically important financial institutions. That model is Claude M]]></itunes:subtitle>
	<content:encoded><![CDATA[In this episode, a single artificial intelligence model became the subject of an emergency meeting between the US Treasury, the Federal Reserve, and the CEOs of America&#8217;s largest systemically important financial institutions. That model is Claude Mythos Preview, developed by Anthropic. This marks the first time in American financial history that frontier AI capabilities have [&#8230;]]]></content:encoded>
	<enclosure url="https://track.podcastics.com/8748/410820.mp3" length="1" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[In this episode, a single artificial intelligence model became the subject of an emergency meeting between the US Treasury, the Federal Reserve, and the CEOs of America&#8217;s largest systemically important financial institutions. That model is Claude Mythos Preview, developed by Anthropic. This marks the first time in American financial history that frontier AI capabilities have [&#8230;]]]></itunes:summary>
	<itunes:image href="https://www.radiocsirt.com/wp-content/uploads/2026/04/EN_RadioCSIRT73JPEG.jpeg"></itunes:image>
	<image>
		<url>https://www.radiocsirt.com/wp-content/uploads/2026/04/EN_RadioCSIRT73JPEG.jpeg</url>
		<title>RadioCSIRT English Edition – Emergency meeting between the US Treasury -Episode 73</title>
	</image>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[RadioCSIRT]]></itunes:author>	<googleplay:description><![CDATA[In this episode, a single artificial intelligence model became the subject of an emergency meeting between the US Treasury, the Federal Reserve, and the CEOs of America&#8217;s largest systemically important financial institutions. That model is Claude Mythos Preview, developed by Anthropic. This marks the first time in American financial history that frontier AI capabilities have [&#8230;]]]></googleplay:description>
	<googleplay:image href="https://www.radiocsirt.com/wp-content/uploads/2026/04/EN_RadioCSIRT73JPEG.jpeg"></googleplay:image>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>RadioCSIRT English Edition — Special Edition Claude (Ep.72)</title>
	<link>https://www.radiocsirt.com/podcast/radiocsirt-english-edition-special-edition-claude-ep-72/</link>
	<pubDate>Sat, 11 Apr 2026 22:15:11 +0000</pubDate>
	<dc:creator><![CDATA[RadioCSIRT]]></dc:creator>
	<guid isPermaLink="false">https://www.radiocsirt.com/?post_type=podcast&#038;p=482</guid>
	<description><![CDATA[🎧🎙️Large Language Models &#38; Cybersecurity Claude 4.6, Project Glasswing &#38; Claude Mythos Preview Welcome to this special edition of RadioCSIRT ⚡️ 🤖 Claude 4.6 Family — A Cybersecurity Perspective Claude Opus 4.6, Sonnet 4.6 and Haiku 4.5 share a context window of up to one million tokens, multimodal text/image support and extended thinking capabilities. Direct [&#8230;]]]></description>
	<itunes:subtitle><![CDATA[🎧🎙️Large Language Models &#38; Cybersecurity Claude 4.6, Project Glasswing &#38; Claude Mythos Preview Welcome to this special edition of RadioCSIRT ⚡️ 🤖 Claude 4.6 Family — A Cybersecurity Perspective Claude Opus 4.6, Sonnet 4.6 and Haiku 4.5 share a co]]></itunes:subtitle>
	<content:encoded><![CDATA[🎧🎙️Large Language Models &#38; Cybersecurity Claude 4.6, Project Glasswing &#38; Claude Mythos Preview Welcome to this special edition of RadioCSIRT ⚡️ 🤖 Claude 4.6 Family — A Cybersecurity Perspective Claude Opus 4.6, Sonnet 4.6 and Haiku 4.5 share a context window of up to one million tokens, multimodal text/image support and extended thinking capabilities. Direct [&#8230;]]]></content:encoded>
	<enclosure url="https://track.podcastics.com/8748/410805.mp3" length="1" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[🎧🎙️Large Language Models &#38; Cybersecurity Claude 4.6, Project Glasswing &#38; Claude Mythos Preview Welcome to this special edition of RadioCSIRT ⚡️ 🤖 Claude 4.6 Family — A Cybersecurity Perspective Claude Opus 4.6, Sonnet 4.6 and Haiku 4.5 share a context window of up to one million tokens, multimodal text/image support and extended thinking capabilities. Direct [&#8230;]]]></itunes:summary>
	<itunes:image href="https://www.radiocsirt.com/wp-content/uploads/2026/04/EN-RadioCSIRT72.jpeg"></itunes:image>
	<image>
		<url>https://www.radiocsirt.com/wp-content/uploads/2026/04/EN-RadioCSIRT72.jpeg</url>
		<title>RadioCSIRT English Edition — Special Edition Claude (Ep.72)</title>
	</image>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[RadioCSIRT]]></itunes:author>	<googleplay:description><![CDATA[🎧🎙️Large Language Models &#38; Cybersecurity Claude 4.6, Project Glasswing &#38; Claude Mythos Preview Welcome to this special edition of RadioCSIRT ⚡️ 🤖 Claude 4.6 Family — A Cybersecurity Perspective Claude Opus 4.6, Sonnet 4.6 and Haiku 4.5 share a context window of up to one million tokens, multimodal text/image support and extended thinking capabilities. Direct [&#8230;]]]></googleplay:description>
	<googleplay:image href="https://www.radiocsirt.com/wp-content/uploads/2026/04/EN-RadioCSIRT72.jpeg"></googleplay:image>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>Your Cybersecurity News for Saturday, February 28, 2026 (Ep. 71)</title>
	<link>https://www.radiocsirt.com/podcast/your-cybersecurity-news-for-saturday-february-28-2026-ep-71/</link>
	<pubDate>Sat, 28 Feb 2026 11:30:06 +0000</pubDate>
	<dc:creator><![CDATA[RadioCSIRT]]></dc:creator>
	<guid isPermaLink="false">https://www.radiocsirt.com/?post_type=podcast&#038;p=468</guid>
	<description><![CDATA[We open this recap with the Winter Olympic Games in Milano Cortina, facing a wave of cyberattacks attributed to Russia. According to The Register, Italy’s Minister of Foreign Affairs confirmed the targeting of diplomatic offices and Olympic infrastructure. The defensive posture is further strained by supply chain tensions, as Cloudflare’s CEO threatened to withdraw pro [&#8230;]]]></description>
	<itunes:subtitle><![CDATA[We open this recap with the Winter Olympic Games in Milano Cortina, facing a wave of cyberattacks attributed to Russia. According to The Register, Italy’s Minister of Foreign Affairs confirmed the targeting of diplomatic offices and Olympic infrastructur]]></itunes:subtitle>
	<content:encoded><![CDATA[We open this recap with the Winter Olympic Games in Milano Cortina, facing a wave of cyberattacks attributed to Russia. According to The Register, Italy’s Minister of Foreign Affairs confirmed the targeting of diplomatic offices and Olympic infrastructure. The defensive posture is further strained by supply chain tensions, as Cloudflare’s CEO threatened to withdraw pro [&#8230;]]]></content:encoded>
	<enclosure url="https://track.podcastics.com/8748/405734.mp3" length="1" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[We open this recap with the Winter Olympic Games in Milano Cortina, facing a wave of cyberattacks attributed to Russia. According to The Register, Italy’s Minister of Foreign Affairs confirmed the targeting of diplomatic offices and Olympic infrastructure. The defensive posture is further strained by supply chain tensions, as Cloudflare’s CEO threatened to withdraw pro [&#8230;]]]></itunes:summary>
	<itunes:image href="https://www.radiocsirt.com/wp-content/uploads/2026/02/EN-RadioCSIRT71-JPEG.jpeg"></itunes:image>
	<image>
		<url>https://www.radiocsirt.com/wp-content/uploads/2026/02/EN-RadioCSIRT71-JPEG.jpeg</url>
		<title>Your Cybersecurity News for Saturday, February 28, 2026 (Ep. 71)</title>
	</image>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[RadioCSIRT]]></itunes:author>	<googleplay:description><![CDATA[We open this recap with the Winter Olympic Games in Milano Cortina, facing a wave of cyberattacks attributed to Russia. According to The Register, Italy’s Minister of Foreign Affairs confirmed the targeting of diplomatic offices and Olympic infrastructure. The defensive posture is further strained by supply chain tensions, as Cloudflare’s CEO threatened to withdraw pro [&#8230;]]]></googleplay:description>
	<googleplay:image href="https://www.radiocsirt.com/wp-content/uploads/2026/02/EN-RadioCSIRT71-JPEG.jpeg"></googleplay:image>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>Your Cybersecurity News : Jan 31- Feb 6, 2026 (Ep. 70)</title>
	<link>https://www.radiocsirt.com/podcast/your-cybersecurity-news-jan-31-feb-6-2026-ep-70/</link>
	<pubDate>Sun, 08 Feb 2026 16:12:33 +0000</pubDate>
	<dc:creator><![CDATA[RadioCSIRT]]></dc:creator>
	<guid isPermaLink="false">0273f465-522e-5f93-b4e4-e79a5f78be00</guid>
	<description><![CDATA[We open this weekly recap with a critical alert regarding the active exploitation of a Microsoft Office Zero-Day, CVE-2026-21509. According to CERT-UA, the Russian-linked group APT28 has integrated this flaw into phishing campaigns targeting Ukrainian administrations and several EU nations, utilizing a complex infection chain involving WebDAV and the Covenant post-exploitation framework. In a simultaneous [&#8230;]]]></description>
	<itunes:subtitle><![CDATA[We open this weekly recap with a critical alert regarding the active exploitation of a Microsoft Office Zero-Day, CVE-2026-21509. According to CERT-UA, the Russian-linked group APT28 has integrated this flaw into phishing campaigns targeting Ukrainian ad]]></itunes:subtitle>
	<content:encoded><![CDATA[We open this weekly recap with a critical alert regarding the active exploitation of a Microsoft Office Zero-Day, CVE-2026-21509. According to CERT-UA, the Russian-linked group APT28 has integrated this flaw into phishing campaigns targeting Ukrainian administrations and several EU nations, utilizing a complex infection chain involving WebDAV and the Covenant post-exploitation framework. In a simultaneous [&#8230;]]]></content:encoded>
	<enclosure url="https://track.podcastics.com/8748/403307.mp3" length="1" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[We open this weekly recap with a critical alert regarding the active exploitation of a Microsoft Office Zero-Day, CVE-2026-21509. According to CERT-UA, the Russian-linked group APT28 has integrated this flaw into phishing campaigns targeting Ukrainian administrations and several EU nations, utilizing a complex infection chain involving WebDAV and the Covenant post-exploitation framework. In a simultaneous [&#8230;]]]></itunes:summary>
	<itunes:image href="https://www.radiocsirt.com/wp-content/uploads/2026/02/EN-RadioCSIRT70-JPEG.jpeg"></itunes:image>
	<image>
		<url>https://www.radiocsirt.com/wp-content/uploads/2026/02/EN-RadioCSIRT70-JPEG.jpeg</url>
		<title>Your Cybersecurity News : Jan 31- Feb 6, 2026 (Ep. 70)</title>
	</image>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[RadioCSIRT]]></itunes:author>	<googleplay:description><![CDATA[We open this weekly recap with a critical alert regarding the active exploitation of a Microsoft Office Zero-Day, CVE-2026-21509. According to CERT-UA, the Russian-linked group APT28 has integrated this flaw into phishing campaigns targeting Ukrainian administrations and several EU nations, utilizing a complex infection chain involving WebDAV and the Covenant post-exploitation framework. In a simultaneous [&#8230;]]]></googleplay:description>
	<googleplay:image href="https://www.radiocsirt.com/wp-content/uploads/2026/02/EN-RadioCSIRT70-JPEG.jpeg"></googleplay:image>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>Ep. 69: CISA&#8217;s KEV Surge, Sandworm Returns &#038; The ChatGPT Leak</title>
	<link>https://www.radiocsirt.com/podcast/ep-69-cisas-kev-surge-sandworm-returns-the-chatgpt-leak/</link>
	<pubDate>Sat, 31 Jan 2026 17:16:19 +0000</pubDate>
	<dc:creator><![CDATA[RadioCSIRT]]></dc:creator>
	<guid isPermaLink="false">73aaff83-ed7c-5b4f-b033-c59cd56b19ca</guid>
	<description><![CDATA[This week, the vulnerability floodgates opened. From an 11-year-old Telnet flaw to critical VMware exploits, the CISA KEV catalog is overflowing. But the biggest shocker? Operational security failures at the highest levels of government. In this episode of RadioCSIRT English Edition: 🚨 Critical Patch Overload: A massive week for the CISA KEV catalog, featuring Oracle, [&#8230;]]]></description>
	<itunes:subtitle><![CDATA[This week, the vulnerability floodgates opened. From an 11-year-old Telnet flaw to critical VMware exploits, the CISA KEV catalog is overflowing. But the biggest shocker? Operational security failures at the highest levels of government. In this episode ]]></itunes:subtitle>
	<content:encoded><![CDATA[This week, the vulnerability floodgates opened. From an 11-year-old Telnet flaw to critical VMware exploits, the CISA KEV catalog is overflowing. But the biggest shocker? Operational security failures at the highest levels of government. In this episode of RadioCSIRT English Edition: 🚨 Critical Patch Overload: A massive week for the CISA KEV catalog, featuring Oracle, [&#8230;]]]></content:encoded>
	<enclosure url="https://track.podcastics.com/8748/402508.mp3" length="1" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[This week, the vulnerability floodgates opened. From an 11-year-old Telnet flaw to critical VMware exploits, the CISA KEV catalog is overflowing. But the biggest shocker? Operational security failures at the highest levels of government. In this episode of RadioCSIRT English Edition: 🚨 Critical Patch Overload: A massive week for the CISA KEV catalog, featuring Oracle, [&#8230;]]]></itunes:summary>
	<itunes:image href="https://www.radiocsirt.com/wp-content/uploads/2026/01/EN-RadioCSIRT69-JPEG.jpeg"></itunes:image>
	<image>
		<url>https://www.radiocsirt.com/wp-content/uploads/2026/01/EN-RadioCSIRT69-JPEG.jpeg</url>
		<title>Ep. 69: CISA&#8217;s KEV Surge, Sandworm Returns &#038; The ChatGPT Leak</title>
	</image>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[RadioCSIRT]]></itunes:author>	<googleplay:description><![CDATA[This week, the vulnerability floodgates opened. From an 11-year-old Telnet flaw to critical VMware exploits, the CISA KEV catalog is overflowing. But the biggest shocker? Operational security failures at the highest levels of government. In this episode of RadioCSIRT English Edition: 🚨 Critical Patch Overload: A massive week for the CISA KEV catalog, featuring Oracle, [&#8230;]]]></googleplay:description>
	<googleplay:image href="https://www.radiocsirt.com/wp-content/uploads/2026/01/EN-RadioCSIRT69-JPEG.jpeg"></googleplay:image>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>
	</channel>
</rss>
