<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>CyberGuards Blog</title>
    <link>https://cyberguards.ai/blog/</link>
    <description>Expert insights on penetration testing, red team operations, AI security, and compliance from the CyberGuards team.</description>
    <language>en-us</language>
    <atom:link href="https://cyberguards.ai/feed.xml" rel="self" type="application/rss+xml"/>
    <item>
      <title>AI Red Teaming: Testing Large Language Models for Enterprise Security</title>
      <link>https://cyberguards.ai/blog/ai-red-teaming-testing-llms-enterprise-security/</link>
      <description>A practical guide to AI red teaming — testing LLMs and generative AI systems for prompt injection, data leakage, harmful outputs, and misuse in enterprise deployments.</description>
      <pubDate>Wed, 18 Feb 2026 00:00:00 GMT</pubDate>
      <category>AI Security</category>
      <guid isPermaLink="true">https://cyberguards.ai/blog/ai-red-teaming-testing-llms-enterprise-security/</guid>
    </item>
    <item>
      <title>The MITRE ATT&amp;CK Framework: A Penetration Tester&apos;s Guide</title>
      <link>https://cyberguards.ai/blog/mitre-attack-framework-penetration-testers-guide/</link>
      <description>Learn how penetration testers and red teams use the MITRE ATT&amp;CK framework to plan engagements, map techniques, and deliver actionable findings to defenders.</description>
      <pubDate>Wed, 04 Feb 2026 00:00:00 GMT</pubDate>
      <category>Red Team</category>
      <guid isPermaLink="true">https://cyberguards.ai/blog/mitre-attack-framework-penetration-testers-guide/</guid>
    </item>
    <item>
      <title>GraphQL Security: Common Vulnerabilities and Testing Approaches</title>
      <link>https://cyberguards.ai/blog/graphql-security-vulnerabilities-testing/</link>
      <description>Identify and test for GraphQL-specific vulnerabilities including introspection leaks, batching attacks, nested query DoS, and authorization bypass patterns.</description>
      <pubDate>Wed, 21 Jan 2026 00:00:00 GMT</pubDate>
      <category>API Security</category>
      <guid isPermaLink="true">https://cyberguards.ai/blog/graphql-security-vulnerabilities-testing/</guid>
    </item>
    <item>
      <title>HIPAA Penetration Testing: Protecting Healthcare Data in 2026</title>
      <link>https://cyberguards.ai/blog/hipaa-penetration-testing-healthcare-data/</link>
      <description>Navigate HIPAA penetration testing requirements for covered entities and business associates, including ePHI scope, technical safeguard testing, and audit preparation.</description>
      <pubDate>Wed, 07 Jan 2026 00:00:00 GMT</pubDate>
      <category>Compliance</category>
      <guid isPermaLink="true">https://cyberguards.ai/blog/hipaa-penetration-testing-healthcare-data/</guid>
    </item>
    <item>
      <title>Zero-Day Vulnerabilities: How Penetration Testers Find What Scanners Miss</title>
      <link>https://cyberguards.ai/blog/zero-day-vulnerabilities-how-pentesters-find-what-scanners-miss/</link>
      <description>Learn how skilled penetration testers discover zero-day and logic vulnerabilities that automated scanners cannot detect, with real-world case studies.</description>
      <pubDate>Wed, 17 Dec 2025 00:00:00 GMT</pubDate>
      <category>Penetration Testing</category>
      <guid isPermaLink="true">https://cyberguards.ai/blog/zero-day-vulnerabilities-how-pentesters-find-what-scanners-miss/</guid>
    </item>
    <item>
      <title>2025 Cybersecurity Year in Review: Top Breaches and Lessons Learned</title>
      <link>https://cyberguards.ai/blog/2025-cybersecurity-year-in-review-top-breaches/</link>
      <description>Review the most significant cybersecurity breaches and incidents of 2025, analyze attack patterns, and extract lessons to strengthen your security posture in 2026.</description>
      <pubDate>Wed, 03 Dec 2025 00:00:00 GMT</pubDate>
      <category>Industry</category>
      <guid isPermaLink="true">https://cyberguards.ai/blog/2025-cybersecurity-year-in-review-top-breaches/</guid>
    </item>
    <item>
      <title>Authenticated vs Unauthenticated Penetration Testing: When to Use Each</title>
      <link>https://cyberguards.ai/blog/authenticated-vs-unauthenticated-penetration-testing/</link>
      <description>Compare authenticated and unauthenticated penetration testing approaches, understand what each uncovers, and learn how to choose the right scope for your engagement.</description>
      <pubDate>Wed, 19 Nov 2025 00:00:00 GMT</pubDate>
      <category>Penetration Testing</category>
      <guid isPermaLink="true">https://cyberguards.ai/blog/authenticated-vs-unauthenticated-penetration-testing/</guid>
    </item>
    <item>
      <title>ISO 27001 Certification: How Penetration Testing Helps You Comply</title>
      <link>https://cyberguards.ai/blog/iso-27001-penetration-testing-compliance/</link>
      <description>Map ISO 27001 Annex A controls to penetration testing activities and learn how to use pentest findings to strengthen your ISMS and pass certification audits.</description>
      <pubDate>Wed, 05 Nov 2025 00:00:00 GMT</pubDate>
      <category>Compliance</category>
      <guid isPermaLink="true">https://cyberguards.ai/blog/iso-27001-penetration-testing-compliance/</guid>
    </item>
    <item>
      <title>Vulnerability Scanning vs Penetration Testing: Key Differences Explained</title>
      <link>https://cyberguards.ai/blog/vulnerability-scanning-vs-penetration-testing/</link>
      <description>Understand the critical differences between vulnerability scanning and penetration testing, when to use each, and why most organizations need both.</description>
      <pubDate>Wed, 15 Oct 2025 00:00:00 GMT</pubDate>
      <category>Penetration Testing</category>
      <guid isPermaLink="true">https://cyberguards.ai/blog/vulnerability-scanning-vs-penetration-testing/</guid>
    </item>
    <item>
      <title>LLM Security: Preventing Prompt Injection and Data Leakage</title>
      <link>https://cyberguards.ai/blog/llm-security-preventing-prompt-injection-data-leakage/</link>
      <description>Deep dive into LLM vulnerabilities including prompt injection, jailbreaking, training data extraction, and the OWASP LLM Top 10 with practical mitigations.</description>
      <pubDate>Wed, 01 Oct 2025 00:00:00 GMT</pubDate>
      <category>AI Security</category>
      <guid isPermaLink="true">https://cyberguards.ai/blog/llm-security-preventing-prompt-injection-data-leakage/</guid>
    </item>
    <item>
      <title>Why San Francisco Startups Need Penetration Testing Before Series A</title>
      <link>https://cyberguards.ai/blog/san-francisco-startups-penetration-testing-before-series-a/</link>
      <description>Investors and enterprise customers are asking for pentest reports. Learn why Bay Area startups should prioritize security testing before their Series A round.</description>
      <pubDate>Wed, 17 Sep 2025 00:00:00 GMT</pubDate>
      <category>Penetration Testing</category>
      <guid isPermaLink="true">https://cyberguards.ai/blog/san-francisco-startups-penetration-testing-before-series-a/</guid>
    </item>
    <item>
      <title>OWASP API Security Top 10: A Practical Testing Guide</title>
      <link>https://cyberguards.ai/blog/owasp-api-security-top-10-practical-guide/</link>
      <description>Walk through each OWASP API Security Top 10 vulnerability with practical testing techniques, real-world examples, and remediation guidance.</description>
      <pubDate>Wed, 03 Sep 2025 00:00:00 GMT</pubDate>
      <category>API Security</category>
      <guid isPermaLink="true">https://cyberguards.ai/blog/owasp-api-security-top-10-practical-guide/</guid>
    </item>
    <item>
      <title>Social Engineering in Red Team Operations: Techniques and Defenses</title>
      <link>https://cyberguards.ai/blog/social-engineering-red-team-operations/</link>
      <description>Explore the social engineering tactics red teams use — phishing, pretexting, tailgating, and vishing — and how to build organizational resilience against them.</description>
      <pubDate>Wed, 20 Aug 2025 00:00:00 GMT</pubDate>
      <category>Red Team</category>
      <guid isPermaLink="true">https://cyberguards.ai/blog/social-engineering-red-team-operations/</guid>
    </item>
    <item>
      <title>PCI DSS v4.0: New Penetration Testing Requirements for 2025</title>
      <link>https://cyberguards.ai/blog/pci-dss-v4-penetration-testing-requirements/</link>
      <description>Navigate the updated PCI DSS v4.0 penetration testing requirements, including authenticated internal testing, segmentation checks, and the new customized approach.</description>
      <pubDate>Wed, 06 Aug 2025 00:00:00 GMT</pubDate>
      <category>Compliance</category>
      <guid isPermaLink="true">https://cyberguards.ai/blog/pci-dss-v4-penetration-testing-requirements/</guid>
    </item>
    <item>
      <title>Cloud Penetration Testing: AWS, Azure, and GCP Security Assessment</title>
      <link>https://cyberguards.ai/blog/cloud-penetration-testing-aws-azure-gcp/</link>
      <description>A comprehensive guide to cloud penetration testing across AWS, Azure, and GCP, covering shared responsibility, common misconfigurations, and testing methodology.</description>
      <pubDate>Wed, 16 Jul 2025 00:00:00 GMT</pubDate>
      <category>Penetration Testing</category>
      <guid isPermaLink="true">https://cyberguards.ai/blog/cloud-penetration-testing-aws-azure-gcp/</guid>
    </item>
    <item>
      <title>The Rise of AI-Powered Cyber Attacks: What You Need to Know</title>
      <link>https://cyberguards.ai/blog/ai-powered-cyber-attacks-what-you-need-to-know/</link>
      <description>How threat actors are using AI to automate phishing, generate malware, and bypass security controls — and what defenders can do to stay ahead.</description>
      <pubDate>Wed, 02 Jul 2025 00:00:00 GMT</pubDate>
      <category>AI Security</category>
      <guid isPermaLink="true">https://cyberguards.ai/blog/ai-powered-cyber-attacks-what-you-need-to-know/</guid>
    </item>
    <item>
      <title>SOC 2 Penetration Testing Requirements Explained</title>
      <link>https://cyberguards.ai/blog/soc-2-penetration-testing-requirements-explained/</link>
      <description>Understand SOC 2 Type II penetration testing requirements, what auditors expect, and how to scope a pentest that satisfies your SOC 2 audit.</description>
      <pubDate>Wed, 18 Jun 2025 00:00:00 GMT</pubDate>
      <category>Compliance</category>
      <guid isPermaLink="true">https://cyberguards.ai/blog/soc-2-penetration-testing-requirements-explained/</guid>
    </item>
    <item>
      <title>API Security Best Practices: Lessons from Real-World Breaches</title>
      <link>https://cyberguards.ai/blog/api-security-best-practices-real-world-breaches/</link>
      <description>Examine major API breaches, identify common patterns attackers exploit, and learn actionable best practices to secure your REST, GraphQL, and gRPC APIs.</description>
      <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
      <category>API Security</category>
      <guid isPermaLink="true">https://cyberguards.ai/blog/api-security-best-practices-real-world-breaches/</guid>
    </item>
    <item>
      <title>Web Application Penetration Testing Checklist for Startups</title>
      <link>https://cyberguards.ai/blog/web-application-penetration-testing-checklist-startups/</link>
      <description>A practical web application penetration testing checklist designed for startups preparing for SOC 2, raising funding, or launching customer-facing products.</description>
      <pubDate>Wed, 21 May 2025 00:00:00 GMT</pubDate>
      <category>Web Security</category>
      <guid isPermaLink="true">https://cyberguards.ai/blog/web-application-penetration-testing-checklist-startups/</guid>
    </item>
    <item>
      <title>AI Security Testing: Protecting Machine Learning Models from Attack</title>
      <link>https://cyberguards.ai/blog/ai-security-testing-protecting-ml-models/</link>
      <description>Discover how adversarial attacks target machine learning models, why traditional security testing falls short, and how to assess AI system resilience.</description>
      <pubDate>Wed, 07 May 2025 00:00:00 GMT</pubDate>
      <category>AI Security</category>
      <guid isPermaLink="true">https://cyberguards.ai/blog/ai-security-testing-protecting-ml-models/</guid>
    </item>
    <item>
      <title>How Often Should Your Company Conduct Penetration Tests?</title>
      <link>https://cyberguards.ai/blog/how-often-should-you-conduct-penetration-tests/</link>
      <description>Determine the right penetration testing frequency for your organization based on industry, compliance requirements, risk profile, and change velocity.</description>
      <pubDate>Wed, 23 Apr 2025 00:00:00 GMT</pubDate>
      <category>Penetration Testing</category>
      <guid isPermaLink="true">https://cyberguards.ai/blog/how-often-should-you-conduct-penetration-tests/</guid>
    </item>
    <item>
      <title>The OWASP Top 10 (2021): What Every Developer and Security Team Needs to Know</title>
      <link>https://cyberguards.ai/blog/owasp-top-10-2025-what-changed/</link>
      <description>A comprehensive breakdown of the OWASP Top 10 2021 edition, what each category covers, and how to test for each vulnerability in your web applications.</description>
      <pubDate>Wed, 09 Apr 2025 00:00:00 GMT</pubDate>
      <category>Web Security</category>
      <guid isPermaLink="true">https://cyberguards.ai/blog/owasp-top-10-2025-what-changed/</guid>
    </item>
    <item>
      <title>Red Team vs Blue Team: Understanding Offensive and Defensive Security</title>
      <link>https://cyberguards.ai/blog/red-team-vs-blue-team-offensive-defensive-security/</link>
      <description>Explore the differences between red team and blue team security operations, how purple teaming bridges the gap, and which approach your organization needs.</description>
      <pubDate>Wed, 26 Mar 2025 00:00:00 GMT</pubDate>
      <category>Red Team</category>
      <guid isPermaLink="true">https://cyberguards.ai/blog/red-team-vs-blue-team-offensive-defensive-security/</guid>
    </item>
    <item>
      <title>What Is Penetration Testing? A Complete Guide for 2025</title>
      <link>https://cyberguards.ai/blog/what-is-penetration-testing-complete-guide/</link>
      <description>Learn what penetration testing is, how it works, the different types, and why every organization needs regular pentests to protect against cyber threats.</description>
      <pubDate>Wed, 12 Mar 2025 00:00:00 GMT</pubDate>
      <category>Penetration Testing</category>
      <guid isPermaLink="true">https://cyberguards.ai/blog/what-is-penetration-testing-complete-guide/</guid>
    </item>
  </channel>
</rss>