<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>cyberattack - ozngo</title>
	<atom:link href="https://ozngo.com/en/tag/cyberattack/feed/" rel="self" type="application/rss+xml" />
	<link>https://ozngo.com</link>
	<description>Communication &#38; Resilience</description>
	<lastBuildDate>Thu, 19 Mar 2026 08:46:19 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://ozngo.com/wp-content/uploads/2017/03/cropped-Logo_final_only-1-32x32.jpg</url>
	<title>cyberattack - ozngo</title>
	<link>https://ozngo.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>The Collapse of Proof in the Age of Deepfakes</title>
		<link>https://ozngo.com/en/the-collapse-of-proof-in-the-age-of-deepfakes/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-collapse-of-proof-in-the-age-of-deepfakes&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-collapse-of-proof-in-the-age-of-deepfakes</link>
		
		<dc:creator><![CDATA[MR]]></dc:creator>
		<pubDate>Tue, 24 Feb 2026 12:23:03 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Crisis]]></category>
		<category><![CDATA[cyber resilience]]></category>
		<category><![CDATA[cyberculture]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[English]]></category>
		<category><![CDATA[Governance]]></category>
		<category><![CDATA[Leader]]></category>
		<category><![CDATA[Strategy]]></category>
		<category><![CDATA[crisis communication]]></category>
		<category><![CDATA[crisis management]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[truth governance]]></category>
		<guid isPermaLink="false">https://ozngo.com/?p=172378</guid>

					<description><![CDATA[<p>Rethinking your concept of proof to defend your truth. Before AI, evidence rested on three pillars: documents (photos, texts), witness statements and recordings (videos, audio). Now, artificial intelligence renders all three open to challenge. Worse still, the truth can be called into question by falsehoods. This is the gateway to the systems that cybersecurity protects.&#8230;&#160;<a href="https://ozngo.com/en/the-collapse-of-proof-in-the-age-of-deepfakes/" rel="bookmark"><span class="screen-reader-text">The Collapse of Proof in the Age of Deepfakes</span></a></p>
<p>The post <a href="https://ozngo.com/en/the-collapse-of-proof-in-the-age-of-deepfakes/">The Collapse of Proof in the Age of Deepfakes</a> first appeared on <a href="https://ozngo.com">ozngo</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>CEO Vishing: Inside an Industrialised Attack</title>
		<link>https://ozngo.com/en/ceo-vishing-inside-an-industrialised-attack/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=ceo-vishing-inside-an-industrialised-attack&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=ceo-vishing-inside-an-industrialised-attack</link>
		
		<dc:creator><![CDATA[MR]]></dc:creator>
		<pubDate>Mon, 02 Feb 2026 19:15:50 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Crisis]]></category>
		<category><![CDATA[cyberculture]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[English]]></category>
		<category><![CDATA[Governance]]></category>
		<category><![CDATA[Insights]]></category>
		<category><![CDATA[CEO]]></category>
		<category><![CDATA[crisis]]></category>
		<category><![CDATA[crisis communication]]></category>
		<category><![CDATA[crisis management]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[vishing]]></category>
		<guid isPermaLink="false">https://ozngo.com/?p=171284</guid>

					<description><![CDATA[<p>Since 2023–2025, a new generation of attacks has emerged, combining social engineering with AI-based voice cloning: vishing. In this context, a CEO’s voice is no longer a signal of trust. It has become a full-fledged attack vector, and the phenomenon is rapidly gaining momentum. Advances in voice-cloning technology have dramatically lowered the technical barrier. Producing&#8230;&#160;<a href="https://ozngo.com/en/ceo-vishing-inside-an-industrialised-attack/" rel="bookmark"><span class="screen-reader-text">CEO Vishing: Inside an Industrialised Attack</span></a></p>
<p>The post <a href="https://ozngo.com/en/ceo-vishing-inside-an-industrialised-attack/">CEO Vishing: Inside an Industrialised Attack</a> first appeared on <a href="https://ozngo.com">ozngo</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>&#8220;Free&#8221; Case: Technical Compliance ≠ Trust Guarantee</title>
		<link>https://ozngo.com/en/free-crisis-when-fixing-the-problem-isnt-enough-to-restore-trust/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=free-crisis-when-fixing-the-problem-isnt-enough-to-restore-trust&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=free-crisis-when-fixing-the-problem-isnt-enough-to-restore-trust</link>
		
		<dc:creator><![CDATA[MR]]></dc:creator>
		<pubDate>Sun, 18 Jan 2026 20:27:41 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Crisis]]></category>
		<category><![CDATA[cyber resilience]]></category>
		<category><![CDATA[cyberculture]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[English]]></category>
		<category><![CDATA[crisis]]></category>
		<category><![CDATA[crisis communication]]></category>
		<category><![CDATA[cyberAI]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[GOVERNANCE]]></category>
		<category><![CDATA[résilience]]></category>
		<category><![CDATA[Truth]]></category>
		<category><![CDATA[weak signals]]></category>
		<guid isPermaLink="false">https://ozngo.com/?p=170447</guid>

					<description><![CDATA[<p>Free fixed the breach. Paid the astronomical €42M fine. And yet, trust hasn&#8217;t returned. The reputational crisis continues. Why? Because a crisis plays out as much in perception as it does in facts. The CNIL* fine closes the regulatory file. It doesn&#8217;t close the trust crisis. The CNIL&#8217;s decision notes more than 2,500 complaints filed&#8230;&#160;<a href="https://ozngo.com/en/free-crisis-when-fixing-the-problem-isnt-enough-to-restore-trust/" rel="bookmark"><span class="screen-reader-text">&#8220;Free&#8221; Case: Technical Compliance ≠ Trust Guarantee</span></a></p>
<p>The post <a href="https://ozngo.com/en/free-crisis-when-fixing-the-problem-isnt-enough-to-restore-trust/">“Free” Case: Technical Compliance ≠ Trust Guarantee</a> first appeared on <a href="https://ozngo.com">ozngo</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>Hotels, travel agencies: Fake blue screen, real manipulation</title>
		<link>https://ozngo.com/en/hotels-travel-agencies-fake-blue-screen-real-manipulation/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=hotels-travel-agencies-fake-blue-screen-real-manipulation&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=hotels-travel-agencies-fake-blue-screen-real-manipulation</link>
		
		<dc:creator><![CDATA[MR]]></dc:creator>
		<pubDate>Thu, 15 Jan 2026 14:38:58 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Crisis]]></category>
		<category><![CDATA[cyberculture]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[English]]></category>
		<category><![CDATA[Governance]]></category>
		<category><![CDATA[Insights]]></category>
		<category><![CDATA[crisis communication]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[GOVERNANCE]]></category>
		<guid isPermaLink="false">https://ozngo.com/?p=170050</guid>

					<description><![CDATA[<p>Since late 2025, a new attack campaign called PHALT#BLYX has been targeting the hotel and travel industry in Europe on a massive scale. The Airbnb platform is also likely to be affected. Contrary to what one might imagine, it is not a “Windows technical flaw” that is being exploited, but an organized human manipulation called&#8230;&#160;<a href="https://ozngo.com/en/hotels-travel-agencies-fake-blue-screen-real-manipulation/" rel="bookmark"><span class="screen-reader-text">Hotels, travel agencies: Fake blue screen, real manipulation</span></a></p>
<p>The post <a href="https://ozngo.com/en/hotels-travel-agencies-fake-blue-screen-real-manipulation/">Hotels, travel agencies: Fake blue screen, real manipulation</a> first appeared on <a href="https://ozngo.com">ozngo</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>SMEs, Cybersecurity &#038; AI in 2026: Beware the Risk</title>
		<link>https://ozngo.com/en/smes-cybersecurity-ai-in-2026-beware-the-risk/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=smes-cybersecurity-ai-in-2026-beware-the-risk&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=smes-cybersecurity-ai-in-2026-beware-the-risk</link>
		
		<dc:creator><![CDATA[MR]]></dc:creator>
		<pubDate>Tue, 23 Dec 2025 22:39:18 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Crisis]]></category>
		<category><![CDATA[cyber resilience]]></category>
		<category><![CDATA[cyberculture]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[English]]></category>
		<category><![CDATA[Governance]]></category>
		<category><![CDATA[Insights]]></category>
		<category><![CDATA[crisis]]></category>
		<category><![CDATA[crisis communication]]></category>
		<category><![CDATA[crisis management]]></category>
		<category><![CDATA[cyber culture]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[GOVERNANCE]]></category>
		<category><![CDATA[SMEs]]></category>
		<guid isPermaLink="false">https://ozngo.com/?p=168628</guid>

					<description><![CDATA[<p>Most SME managers believe they are ‘more or less covered’ when it comes to cybersecurity. This is not Oz&#8217;n&#8217;gO&#8217;s opinion, but that of official bodies such as ENISA*. Their surveys and studies show that a majority of European SMEs claim to have implemented cybersecurity measures, but few have a formalised strategy, incident response plans or&#8230;&#160;<a href="https://ozngo.com/en/smes-cybersecurity-ai-in-2026-beware-the-risk/" rel="bookmark"><span class="screen-reader-text">SMEs, Cybersecurity &#38; AI in 2026: Beware the Risk</span></a></p>
<p>The post <a href="https://ozngo.com/en/smes-cybersecurity-ai-in-2026-beware-the-risk/">SMEs, Cybersecurity & AI in 2026: Beware the Risk</a> first appeared on <a href="https://ozngo.com">ozngo</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>Bots, Fake Accounts and Manipulation: What You Need to Know</title>
		<link>https://ozngo.com/en/bots-fake-accounts-and-manipulation-what-you-need-to-know/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=bots-fake-accounts-and-manipulation-what-you-need-to-know&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=bots-fake-accounts-and-manipulation-what-you-need-to-know</link>
		
		<dc:creator><![CDATA[MR]]></dc:creator>
		<pubDate>Wed, 17 Dec 2025 09:28:53 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Crisis]]></category>
		<category><![CDATA[cyberculture]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[English]]></category>
		<category><![CDATA[Governance]]></category>
		<category><![CDATA[Insights]]></category>
		<category><![CDATA[AI-generated]]></category>
		<category><![CDATA[crisis communication]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[GOVERNANCE]]></category>
		<category><![CDATA[resilient communication]]></category>
		<category><![CDATA[risk management]]></category>
		<guid isPermaLink="false">https://ozngo.com/?p=168222</guid>

					<description><![CDATA[<p>In France and Switzerland, municipal elections are approaching. But regardless of the date and the country, as the days go by, AI techniques are improving and being refined to take control of public debate. All means are permitted to create buzz and sway opinions. Machines, automated scripts, networks of fake accounts&#8230; bots that like, comment,&#8230;&#160;<a href="https://ozngo.com/en/bots-fake-accounts-and-manipulation-what-you-need-to-know/" rel="bookmark"><span class="screen-reader-text">Bots, Fake Accounts and Manipulation: What You Need to Know</span></a></p>
<p>The post <a href="https://ozngo.com/en/bots-fake-accounts-and-manipulation-what-you-need-to-know/">Bots, Fake Accounts and Manipulation: What You Need to Know</a> first appeared on <a href="https://ozngo.com">ozngo</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>Truth Governance: If You Don’t Take Charge, Hackers Will</title>
		<link>https://ozngo.com/en/truth-governance-if-you-dont-take-charge-hackers-will/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=truth-governance-if-you-dont-take-charge-hackers-will&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=truth-governance-if-you-dont-take-charge-hackers-will</link>
		
		<dc:creator><![CDATA[MR]]></dc:creator>
		<pubDate>Sun, 14 Dec 2025 10:11:50 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Crisis]]></category>
		<category><![CDATA[cyber resilience]]></category>
		<category><![CDATA[cyberculture]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[English]]></category>
		<category><![CDATA[Governance]]></category>
		<category><![CDATA[AI-generated]]></category>
		<category><![CDATA[communication]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[truth governance]]></category>
		<guid isPermaLink="false">https://ozngo.com/?p=167855</guid>

					<description><![CDATA[<p>Truth has become a strategic asset, just like your data, equipment, talent, etc. And like any asset, it must be protected. This statement may seem mind-boggling&#8230; out of context. But, when we look at the major trends in AI cyberattacks, the statement becomes much more obvious, even frightening, not only for organisations—both private and public—but&#8230;&#160;<a href="https://ozngo.com/en/truth-governance-if-you-dont-take-charge-hackers-will/" rel="bookmark"><span class="screen-reader-text">Truth Governance: If You Don’t Take Charge, Hackers Will</span></a></p>
<p>The post <a href="https://ozngo.com/en/truth-governance-if-you-dont-take-charge-hackers-will/">Truth Governance: If You Don’t Take Charge, Hackers Will</a> first appeared on <a href="https://ozngo.com">ozngo</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>Reputation potentially at risk: 5 warning signs</title>
		<link>https://ozngo.com/en/reputation-potentially-at-risk-5-warning-signs/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=reputation-potentially-at-risk-5-warning-signs&#038;utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=reputation-potentially-at-risk-5-warning-signs</link>
		
		<dc:creator><![CDATA[MR]]></dc:creator>
		<pubDate>Mon, 20 Jan 2025 14:37:54 +0000</pubDate>
				<category><![CDATA[Crisis]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[English]]></category>
		<category><![CDATA[Insights]]></category>
		<category><![CDATA[Toolbox]]></category>
		<category><![CDATA[crisis communication]]></category>
		<category><![CDATA[crisis management]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[reputational risk]]></category>
		<category><![CDATA[resilient communication]]></category>
		<category><![CDATA[risk management]]></category>
		<guid isPermaLink="false">https://ozngo.com/?p=29364</guid>

					<description><![CDATA[<p>Reputation doesn’t collapse overnight — it erodes through subtle signals. This article outlines five early warning signs, from rising internal tension to increased media scrutiny, that leaders should monitor to detect reputational fragility before it turns into a full-blown crisis.</p>
<p>The post <a href="https://ozngo.com/en/reputation-potentially-at-risk-5-warning-signs/">Reputation potentially at risk: 5 warning signs</a> first appeared on <a href="https://ozngo.com">ozngo</a>.</p>]]></description>
		
		
		
			</item>
	</channel>
</rss>
