<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cybersecurity Archives - testRigor AI-Based Automated Testing Tool</title>
	<atom:link href="https://testrigor.com/blog/category/cybersecurity/feed/" rel="self" type="application/rss+xml" />
	<link>https://testrigor.com/blog/category/cybersecurity/</link>
	<description>Create stable tests in plain English emulating the way humans interact with web or mobile application.</description>
	<lastBuildDate>Wed, 13 May 2026 21:39:14 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>Vercel Hack 2026: A Wake-Up Call for Software Testing</title>
		<link>https://testrigor.com/blog/vercel-hack-2026-a-wake-up-call-for-software-testing/</link>
					<comments>https://testrigor.com/blog/vercel-hack-2026-a-wake-up-call-for-software-testing/#respond</comments>
		
		<dc:creator><![CDATA[Rincy John]]></dc:creator>
		<pubDate>Sat, 09 May 2026 18:00:41 +0000</pubDate>
				<category><![CDATA[AI in Testing]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://testrigor.com/?p=1132227</guid>

					<description><![CDATA[<div><img width="300" height="185" src="https://testrigor.com/wp-content/uploads/2026/05/The-Vercel-2026-Breach-Title-300x185.jpeg" class="attachment-medium size-medium wp-post-image" alt="" style="margin-bottom: 15px;" decoding="async" fetchpriority="high" srcset="https://testrigor.com/wp-content/uploads/2026/05/The-Vercel-2026-Breach-Title-300x185.jpeg 300w, https://testrigor.com/wp-content/uploads/2026/05/The-Vercel-2026-Breach-Title-768x473.jpeg 768w, https://testrigor.com/wp-content/uploads/2026/05/The-Vercel-2026-Breach-Title.jpeg 1002w" sizes="(max-width: 300px) 100vw, 300px" /></div>
<p>In April 2026, the incident drew significant attention across the software and security industries. Vercel, the company behind Next.js and a leader in modern web development, confirmed that its internal systems had been breached. The attack was not a direct compromise of Vercel&#8217;s infrastructure. Rather, the OAuth token theft from a third-party AI tool gave ...</p>
<p>The post <a href="https://testrigor.com/blog/vercel-hack-2026-a-wake-up-call-for-software-testing/">Vercel Hack 2026: A Wake-Up Call for Software Testing</a> appeared first on <a href="https://testrigor.com">testRigor AI-Based Automated Testing Tool</a>.</p>
]]></description>
		
					<wfw:commentRss>https://testrigor.com/blog/vercel-hack-2026-a-wake-up-call-for-software-testing/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How Hackers Break AI Without Breaking the App</title>
		<link>https://testrigor.com/blog/how-hackers-break-ai-without-breaking-the-app/</link>
					<comments>https://testrigor.com/blog/how-hackers-break-ai-without-breaking-the-app/#respond</comments>
		
		<dc:creator><![CDATA[Megana Natarajan]]></dc:creator>
		<pubDate>Fri, 08 May 2026 18:00:15 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Generative AI]]></category>
		<guid isPermaLink="false">https://testrigor.com/?p=1132220</guid>

					<description><![CDATA[<div><img width="300" height="110" src="https://testrigor.com/wp-content/uploads/2026/05/Why-AI-Security-is-Not-the-Same-as-App-Security-Title-300x110.jpeg" class="attachment-medium size-medium wp-post-image" alt="" style="margin-bottom: 15px;" decoding="async" srcset="https://testrigor.com/wp-content/uploads/2026/05/Why-AI-Security-is-Not-the-Same-as-App-Security-Title-300x110.jpeg 300w, https://testrigor.com/wp-content/uploads/2026/05/Why-AI-Security-is-Not-the-Same-as-App-Security-Title-1024x376.jpeg 1024w, https://testrigor.com/wp-content/uploads/2026/05/Why-AI-Security-is-Not-the-Same-as-App-Security-Title-768x282.jpeg 768w, https://testrigor.com/wp-content/uploads/2026/05/Why-AI-Security-is-Not-the-Same-as-App-Security-Title.jpeg 1368w" sizes="(max-width: 300px) 100vw, 300px" /></div>
<p>“The world breaks everyone, and afterward many are strong at the broken places” &#8211; Ernest Hemingway. The same is true for software applications, though we can not afford to wait for this to break all the time. For years, security teams have focused on one thing: protecting the application, patching the servers, securing the APIs, ...</p>
<p>The post <a href="https://testrigor.com/blog/how-hackers-break-ai-without-breaking-the-app/">How Hackers Break AI Without Breaking the App</a> appeared first on <a href="https://testrigor.com">testRigor AI-Based Automated Testing Tool</a>.</p>
]]></description>
		
					<wfw:commentRss>https://testrigor.com/blog/how-hackers-break-ai-without-breaking-the-app/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Stryker Cyberattack 2026: Lessons in Security, Automation, and Reliability</title>
		<link>https://testrigor.com/blog/stryker-cyberattack-2026/</link>
					<comments>https://testrigor.com/blog/stryker-cyberattack-2026/#respond</comments>
		
		<dc:creator><![CDATA[Rincy John]]></dc:creator>
		<pubDate>Tue, 05 May 2026 18:00:40 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Quality Engineering]]></category>
		<guid isPermaLink="false">https://testrigor.com/?p=1132199</guid>

					<description><![CDATA[<div><img width="300" height="114" src="https://testrigor.com/wp-content/uploads/2026/05/Stryker-Cyberattack-2026-Title-300x114.jpeg" class="attachment-medium size-medium wp-post-image" alt="" style="margin-bottom: 15px;" decoding="async" srcset="https://testrigor.com/wp-content/uploads/2026/05/Stryker-Cyberattack-2026-Title-300x114.jpeg 300w, https://testrigor.com/wp-content/uploads/2026/05/Stryker-Cyberattack-2026-Title-1024x388.jpeg 1024w, https://testrigor.com/wp-content/uploads/2026/05/Stryker-Cyberattack-2026-Title-768x291.jpeg 768w, https://testrigor.com/wp-content/uploads/2026/05/Stryker-Cyberattack-2026-Title.jpeg 1329w" sizes="(max-width: 300px) 100vw, 300px" /></div>
<p>Key Takeaways: The Stryker cyberattack was not caused by any malware, but by stolen admin access. The hackers used Stryker&#8217;s own Microsoft Intune system to wipe data from devices around the world. A single compromised administrator account can cause significant damage in minutes. Automation systems without proper security controls can quickly become compromised. Internal admin ...</p>
<p>The post <a href="https://testrigor.com/blog/stryker-cyberattack-2026/">Stryker Cyberattack 2026: Lessons in Security, Automation, and Reliability</a> appeared first on <a href="https://testrigor.com">testRigor AI-Based Automated Testing Tool</a>.</p>
]]></description>
		
					<wfw:commentRss>https://testrigor.com/blog/stryker-cyberattack-2026/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Agentic AI Guardrails Create New Testing Challenges for Banks’ Digital Systems</title>
		<link>https://testrigor.com/blog/agentic-ai-guardrails-create-new-testing-challenges-for-banks-digital-systems/</link>
					<comments>https://testrigor.com/blog/agentic-ai-guardrails-create-new-testing-challenges-for-banks-digital-systems/#respond</comments>
		
		<dc:creator><![CDATA[Rincy John]]></dc:creator>
		<pubDate>Mon, 04 May 2026 18:00:15 +0000</pubDate>
				<category><![CDATA[AI in Testing]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://testrigor.com/?p=1132195</guid>

					<description><![CDATA[<div><img width="300" height="110" src="https://testrigor.com/wp-content/uploads/2026/05/Agentic-AI-Guardrails-Create-New-Testing-Challenges-for-Banks-Digital-Systems-Title-300x110.jpeg" class="attachment-medium size-medium wp-post-image" alt="" style="margin-bottom: 15px;" decoding="async" loading="lazy" srcset="https://testrigor.com/wp-content/uploads/2026/05/Agentic-AI-Guardrails-Create-New-Testing-Challenges-for-Banks-Digital-Systems-Title-300x110.jpeg 300w, https://testrigor.com/wp-content/uploads/2026/05/Agentic-AI-Guardrails-Create-New-Testing-Challenges-for-Banks-Digital-Systems-Title-1024x376.jpeg 1024w, https://testrigor.com/wp-content/uploads/2026/05/Agentic-AI-Guardrails-Create-New-Testing-Challenges-for-Banks-Digital-Systems-Title-768x282.jpeg 768w, https://testrigor.com/wp-content/uploads/2026/05/Agentic-AI-Guardrails-Create-New-Testing-Challenges-for-Banks-Digital-Systems-Title.jpeg 1376w" sizes="auto, (max-width: 300px) 100vw, 300px" /></div>
<p>How do we manage all our finances? Mostly through a banking application. Over the years, we&#8217;ve become used to a kind of reactive approach. Users initiate banking actions, and the application executes them based on explicit approval. Whether it&#8217;s permitting a money transfer, hitting the confirm button on our bank&#8217;s security messages, or setting up ...</p>
<p>The post <a href="https://testrigor.com/blog/agentic-ai-guardrails-create-new-testing-challenges-for-banks-digital-systems/">Agentic AI Guardrails Create New Testing Challenges for Banks’ Digital Systems</a> appeared first on <a href="https://testrigor.com">testRigor AI-Based Automated Testing Tool</a>.</p>
]]></description>
		
					<wfw:commentRss>https://testrigor.com/blog/agentic-ai-guardrails-create-new-testing-challenges-for-banks-digital-systems/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cloudflare Outage Lessons 2026: Improving Site Reliability (SRE)</title>
		<link>https://testrigor.com/blog/cloudflare-outage-lessons-2026-improving-site-reliability-sre/</link>
					<comments>https://testrigor.com/blog/cloudflare-outage-lessons-2026-improving-site-reliability-sre/#respond</comments>
		
		<dc:creator><![CDATA[Rincy John]]></dc:creator>
		<pubDate>Fri, 01 May 2026 18:00:25 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Quality Engineering]]></category>
		<guid isPermaLink="false">https://testrigor.com/?p=1132185</guid>

					<description><![CDATA[<div><img width="300" height="175" src="https://testrigor.com/wp-content/uploads/2026/05/Cloudflare-Outage-Lessons-to-Learn-Title-300x175.jpeg" class="attachment-medium size-medium wp-post-image" alt="" style="margin-bottom: 15px;" decoding="async" loading="lazy" srcset="https://testrigor.com/wp-content/uploads/2026/05/Cloudflare-Outage-Lessons-to-Learn-Title-300x175.jpeg 300w, https://testrigor.com/wp-content/uploads/2026/05/Cloudflare-Outage-Lessons-to-Learn-Title-1024x598.jpeg 1024w, https://testrigor.com/wp-content/uploads/2026/05/Cloudflare-Outage-Lessons-to-Learn-Title-768x448.jpeg 768w, https://testrigor.com/wp-content/uploads/2026/05/Cloudflare-Outage-Lessons-to-Learn-Title.jpeg 1412w" sizes="auto, (max-width: 300px) 100vw, 300px" /></div>
<p>Cloudflare experienced three major outages within four months. Notably, these incidents were not caused by cyberattacks or software bugs. It was due to the configuration changes made inside the company that caused widespread disruption across the network. These changes caused significant disruption to segments of the global network, without even giving engineers time to intervene. ...</p>
<p>The post <a href="https://testrigor.com/blog/cloudflare-outage-lessons-2026-improving-site-reliability-sre/">Cloudflare Outage Lessons 2026: Improving Site Reliability (SRE)</a> appeared first on <a href="https://testrigor.com">testRigor AI-Based Automated Testing Tool</a>.</p>
]]></description>
		
					<wfw:commentRss>https://testrigor.com/blog/cloudflare-outage-lessons-2026-improving-site-reliability-sre/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Return of PhantomRaven: New Waves of npm Supply Chain Attacks</title>
		<link>https://testrigor.com/blog/the-return-of-phantomraven-new-waves-of-npm-supply-chain-attacks/</link>
					<comments>https://testrigor.com/blog/the-return-of-phantomraven-new-waves-of-npm-supply-chain-attacks/#respond</comments>
		
		<dc:creator><![CDATA[Rincy John]]></dc:creator>
		<pubDate>Mon, 27 Apr 2026 18:00:48 +0000</pubDate>
				<category><![CDATA[CI/CD]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://testrigor.com/?p=1131840</guid>

					<description><![CDATA[<div><img width="300" height="146" src="https://testrigor.com/wp-content/uploads/2026/04/New-PhantomRaven-npm-Attack-Steals-Secrets-Title-300x146.jpeg" class="attachment-medium size-medium wp-post-image" alt="" style="margin-bottom: 15px;" decoding="async" loading="lazy" srcset="https://testrigor.com/wp-content/uploads/2026/04/New-PhantomRaven-npm-Attack-Steals-Secrets-Title-300x146.jpeg 300w, https://testrigor.com/wp-content/uploads/2026/04/New-PhantomRaven-npm-Attack-Steals-Secrets-Title-1024x497.jpeg 1024w, https://testrigor.com/wp-content/uploads/2026/04/New-PhantomRaven-npm-Attack-Steals-Secrets-Title-768x373.jpeg 768w, https://testrigor.com/wp-content/uploads/2026/04/New-PhantomRaven-npm-Attack-Steals-Secrets-Title.jpeg 1339w" sizes="auto, (max-width: 300px) 100vw, 300px" /></div>
<p>Key Takeaways: PhantomRaven attack is an npm supply chain attack targeting CI/CD secrets and developer credentials (developer credential theft). The malware hides outside the npm registry using Remote Dynamic Dependencies (RDD). Most static analysis and SBOM tools could not detect the hidden payload. Attackers used fake package names. GitHub Actions, GitLab CI, Jenkins, CircleCI, and ...</p>
<p>The post <a href="https://testrigor.com/blog/the-return-of-phantomraven-new-waves-of-npm-supply-chain-attacks/">The Return of PhantomRaven: New Waves of npm Supply Chain Attacks</a> appeared first on <a href="https://testrigor.com">testRigor AI-Based Automated Testing Tool</a>.</p>
]]></description>
		
					<wfw:commentRss>https://testrigor.com/blog/the-return-of-phantomraven-new-waves-of-npm-supply-chain-attacks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Starbucks Phishing Breach 2026: Lessons for QA Teams</title>
		<link>https://testrigor.com/blog/starbucks-phishing-breach-2026-lessons-for-qa-teams/</link>
					<comments>https://testrigor.com/blog/starbucks-phishing-breach-2026-lessons-for-qa-teams/#respond</comments>
		
		<dc:creator><![CDATA[Rincy John]]></dc:creator>
		<pubDate>Sun, 26 Apr 2026 18:00:59 +0000</pubDate>
				<category><![CDATA[AI in Testing]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://testrigor.com/?p=1131822</guid>

					<description><![CDATA[<div><img width="300" height="147" src="https://testrigor.com/wp-content/uploads/2026/04/Phishing-at-Starbucks-Title-300x147.jpeg" class="attachment-medium size-medium wp-post-image" alt="" style="margin-bottom: 15px;" decoding="async" loading="lazy" srcset="https://testrigor.com/wp-content/uploads/2026/04/Phishing-at-Starbucks-Title-300x147.jpeg 300w, https://testrigor.com/wp-content/uploads/2026/04/Phishing-at-Starbucks-Title-1024x501.jpeg 1024w, https://testrigor.com/wp-content/uploads/2026/04/Phishing-at-Starbucks-Title-768x376.jpeg 768w, https://testrigor.com/wp-content/uploads/2026/04/Phishing-at-Starbucks-Title.jpeg 1353w" sizes="auto, (max-width: 300px) 100vw, 300px" /></div>
<p>Key Takeaways: In early 2026, a phishing attack on Starbucks&#8217; Partner Central portal resulted in the theft of 889 employees&#8217; social security numbers and bank details, marking a serious Starbucks data breach. The breach went on for 23 days without anyone noticing. The fact that the hackers were able to remain in the system for ...</p>
<p>The post <a href="https://testrigor.com/blog/starbucks-phishing-breach-2026-lessons-for-qa-teams/">Starbucks Phishing Breach 2026: Lessons for QA Teams</a> appeared first on <a href="https://testrigor.com">testRigor AI-Based Automated Testing Tool</a>.</p>
]]></description>
		
					<wfw:commentRss>https://testrigor.com/blog/starbucks-phishing-breach-2026-lessons-for-qa-teams/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
