<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>Tech Sentinel</title><description>Daily cybersecurity news with a working-engineer&apos;s filter. Breach disclosures, CVEs that will actually get exploited, ransomware activity, threat actor profiles, and the operational patches that move the needle — sourced and dated.</description><link>https://techsentinel.news/</link><language>en</language><item><title>Deepfake Cybersecurity: How AI Voice Cloning Reshapes Fraud</title><link>https://techsentinel.news/posts/deepfake-cybersecurity/</link><guid isPermaLink="true">https://techsentinel.news/posts/deepfake-cybersecurity/</guid><description>Voice deepfake incidents rose 680% in 2025 as attackers clone executives from seconds of audio. Here is what security teams need to know about detection, FBI advisories, and NIST standards.</description><pubDate>Thu, 14 May 2026 00:00:00 GMT</pubDate><category>deepfake</category><category>social-engineering</category><category>fraud</category><category>voice-cloning</category><category>ai-threats</category><author>Tech Sentinel Newsroom</author></item><item><title>Machine Learning Security: Governance and Supply Chain Risk</title><link>https://techsentinel.news/posts/machine-learning-security-2/</link><guid isPermaLink="true">https://techsentinel.news/posts/machine-learning-security-2/</guid><description>Machine learning security requires more than adversarial testing. This guide maps NCSC attack categories to NIST AI RMF controls and covers model supply chain risks that most organizations haven&apos;t addressed.</description><pubDate>Thu, 14 May 2026 00:00:00 GMT</pubDate><category>machine-learning-security</category><category>nist-ai-rmf</category><category>model-supply-chain</category><category>adversarial-ml</category><category>threat-intel</category><author>Tech Sentinel Newsroom</author></item><item><title>Most Remediation Programs Never Confirm the Fix Actually Worked</title><link>https://techsentinel.news/posts/remediation-programs-never-confirm-fix-worked/</link><guid isPermaLink="true">https://techsentinel.news/posts/remediation-programs-never-confirm-fix-worked/</guid><description>Mandiant M-Trends 2026 puts mean time to exploit at negative seven days while Verizon&apos;s 2025 DBIR finds edge devices take 32 days to remediate. The deeper problem: closing tickets is not the same as closing exposures.</description><pubDate>Wed, 13 May 2026 00:00:00 GMT</pubDate><category>vulnerability-management</category><category>remediation</category><category>patch-management</category><category>exposure-management</category><category>threat-intel</category><author>Tech Sentinel Newsroom</author></item><item><title>How AI Fraud Detection Works: Techniques, Trade-offs, and Next</title><link>https://techsentinel.news/posts/ai-fraud-detection/</link><guid isPermaLink="true">https://techsentinel.news/posts/ai-fraud-detection/</guid><description>AI fraud detection systems catch 70–90% more suspicious activity than rules-based methods. Here&apos;s how machine learning, graph neural networks, and behavioral analysis work — and where the structural gaps remain.</description><pubDate>Tue, 12 May 2026 00:00:00 GMT</pubDate><category>fraud-detection</category><category>machine-learning</category><category>financial-security</category><category>graph-neural-networks</category><category>anomaly-detection</category><author>Tech Sentinel Newsroom</author></item><item><title>LLM Security Risks: The Top Threats to Language Models in 2025</title><link>https://techsentinel.news/posts/llm-security-risks/</link><guid isPermaLink="true">https://techsentinel.news/posts/llm-security-risks/</guid><description>Prompt injection, data poisoning, excessive agency, and system prompt leakage — a practitioner breakdown of the LLM security risks catalogued by OWASP and NIST for 2025 deployments.</description><pubDate>Tue, 12 May 2026 00:00:00 GMT</pubDate><category>llm-security</category><category>prompt-injection</category><category>owasp</category><category>generative-ai</category><category>ai-security</category><author>Tech Sentinel Newsroom</author></item><item><title>RubyGems Suspends Signups After Hundreds of Malicious Packages</title><link>https://techsentinel.news/posts/rubygems-suspends-signups-malicious-packages/</link><guid isPermaLink="true">https://techsentinel.news/posts/rubygems-suspends-signups-malicious-packages/</guid><description>RubyGems has temporarily disabled new account registrations after attackers uploaded hundreds of malicious packages and launched a DDoS campaign against the popular Ruby package registry.</description><pubDate>Tue, 12 May 2026 00:00:00 GMT</pubDate><category>supply-chain</category><category>open-source</category><category>malware</category><category>package-registry</category><category>rubygems</category><author>Tech Sentinel Newsroom</author></item><item><title>Generative AI Risks: A Practitioner&apos;s Guide to What Matters</title><link>https://techsentinel.news/posts/generative-ai-risks/</link><guid isPermaLink="true">https://techsentinel.news/posts/generative-ai-risks/</guid><description>From prompt injection to supply chain poisoning, the generative AI risk landscape is broader than most security teams realize. Here is what the frameworks say and what attackers are doing.</description><pubDate>Mon, 11 May 2026 00:00:00 GMT</pubDate><category>generative-ai</category><category>ai-security</category><category>llm-security</category><category>prompt-injection</category><category>ai-risks</category><author>Tech Sentinel Newsroom</author></item><item><title>Machine Learning Security: Key Threats, Attacks, and Defenses</title><link>https://techsentinel.news/posts/machine-learning-security/</link><guid isPermaLink="true">https://techsentinel.news/posts/machine-learning-security/</guid><description>Machine learning security covers adversarial attacks, data poisoning, model theft, and supply chain risks targeting ML systems. Here is what practitioners need to know.</description><pubDate>Mon, 11 May 2026 00:00:00 GMT</pubDate><category>machine-learning</category><category>adversarial-ml</category><category>data-poisoning</category><category>ai-security</category><category>model-security</category><author>Tech Sentinel Newsroom</author></item><item><title>ChatGPT Security: Key Risks, Vulnerabilities, Enterprise Controls</title><link>https://techsentinel.news/posts/chatgpt-security/</link><guid isPermaLink="true">https://techsentinel.news/posts/chatgpt-security/</guid><description>From DNS-based data exfiltration and command injection in Codex to credential theft and prompt injection, here is what security teams need to know about ChatGPT security in practice.</description><pubDate>Sun, 10 May 2026 00:00:00 GMT</pubDate><category>chatgpt</category><category>ai-security</category><category>prompt-injection</category><category>enterprise-security</category><category>vulnerability</category><author>Tech Sentinel Newsroom</author></item><item><title>AI Agents Are Rewriting the Threat Model: Are Defenders Ready?</title><link>https://techsentinel.news/posts/ai-agents-rewriting-threat-model-security-teams/</link><guid isPermaLink="true">https://techsentinel.news/posts/ai-agents-rewriting-threat-model-security-teams/</guid><description>Three incidents in three months — Clinejection, the FortiGate campaign, and the OpenClaw exposure wave — show how autonomous AI assistants are collapsing the boundaries security programs were built around.</description><pubDate>Tue, 05 May 2026 00:00:00 GMT</pubDate><category>agentic-ai</category><category>prompt-injection</category><category>supply-chain</category><category>threat-intel</category><category>ai-security</category><category>deep-dive</category><author>Tech Sentinel Newsroom</author></item><item><title>Cybersecurity Burnout Is a Structural Problem, Not a Personal One</title><link>https://techsentinel.news/posts/cyber-burnout/</link><guid isPermaLink="true">https://techsentinel.news/posts/cyber-burnout/</guid><description>A Sophos survey of 5,000 practitioners found 76% experiencing burnout — and it&apos;s getting worse. As AI accelerates vulnerability discovery, the operating model that created this problem is about to be stress-tested even harder.</description><pubDate>Sun, 03 May 2026 00:00:00 GMT</pubDate><category>burnout</category><category>cybersecurity-workforce</category><category>patch-management</category><category>vulnerability-management</category><category>ai</category><author>Tech Sentinel Newsroom</author></item><item><title>What this site is for</title><link>https://techsentinel.news/posts/welcome/</link><guid isPermaLink="true">https://techsentinel.news/posts/welcome/</guid><description>Tech Sentinel covers cybersecurity news with an engineer&apos;s filter. Here&apos;s what we publish, what we don&apos;t, and how to read it.</description><pubDate>Sat, 02 May 2026 00:00:00 GMT</pubDate><category>meta</category><author>Tech Sentinel Newsroom</author></item></channel></rss>