<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cybersecurity &#8211; EITHOS &#8211; European Identity Theft Observatory System</title>
	<atom:link href="https://eithos.eu/cybersecurity-category/feed/" rel="self" type="application/rss+xml" />
	<link>https://eithos.eu</link>
	<description></description>
	<lastBuildDate>Tue, 23 Sep 2025 11:11:08 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.2</generator>

<image>
	<url>https://eithos.eu/wp-content/uploads/2023/01/Vertical-1-e1704440772655.jpg</url>
	<title>Cybersecurity &#8211; EITHOS &#8211; European Identity Theft Observatory System</title>
	<link>https://eithos.eu</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Safeguarding Digital Identity in the Age of Cyber Threats</title>
		<link>https://eithos.eu/safeguarding-digital-identity-in-the-age-of-cyber-threats/</link>
		
		<dc:creator><![CDATA[Anthony Lamaudiere]]></dc:creator>
		<pubDate>Tue, 23 Sep 2025 11:11:05 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[Flash News]]></category>
		<guid isPermaLink="false">https://eithos.eu/?p=7011</guid>

					<description><![CDATA[<p><a rel="nofollow" href="https://eithos.eu">EITHOS - European Identity Theft Observatory System</a><br />
<img src="https://eithos.eu/wp-content/uploads/2025/09/10221134-1024x683.jpg" style="display: block; margin: 1em auto"><br />
<a rel="nofollow" href="https://eithos.eu">EITHOS - European Identity Theft Observatory System - </a></p>
<p>In the digital era, our identity is no longer confined to physical documents such as passports or ID cards. Instead, it exists in the form of digital identity—a combination of data, credentials, and digital footprints that define who we are online. This includes usernames, passwords, banking details, and even the traces we leave behind on [&#8230;]</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Deepfake Repeaters in the Wild: How Identity Verification Probes Become Evidence</title>
		<link>https://eithos.eu/deepfake-repeaters-in-the-wild-how-identity-verification-probes-become-evidence/</link>
		
		<dc:creator><![CDATA[Anthony Lamaudiere]]></dc:creator>
		<pubDate>Mon, 01 Sep 2025 07:50:43 +0000</pubDate>
				<category><![CDATA[Flash News]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://eithos.eu/?p=6993</guid>

					<description><![CDATA[<p><a rel="nofollow" href="https://eithos.eu">EITHOS - European Identity Theft Observatory System</a><br />
<img src="https://eithos.eu/wp-content/uploads/2023/02/logobucato.png" style="display: block; margin: 1em auto"><br />
<a rel="nofollow" href="https://eithos.eu">EITHOS - European Identity Theft Observatory System - </a></p>
<p>How Project EITHOS helps police authorities detect and investigate pre-attack deepfake probes What’s happening A growing tactic in identity-crime operations is the use of deepfake repeaters: synthetic selfies or short “liveness” clips submitted repeatedly to onboarding and verification systems. These attempts are not intended to succeed; they function as probes: tests designed to learn thresholds [&#8230;]</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Current challenges of the European union’s internal security motivated and enhanced in its cyberspace</title>
		<link>https://eithos.eu/current-challenges-of-the-european-unions-internal-security-motivated-and-enhanced-in-its-cyberspace/</link>
		
		<dc:creator><![CDATA[Anthony Lamaudiere]]></dc:creator>
		<pubDate>Wed, 20 Aug 2025 14:36:36 +0000</pubDate>
				<category><![CDATA[Flash News]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://eithos.eu/?p=6962</guid>

					<description><![CDATA[<p><a rel="nofollow" href="https://eithos.eu">EITHOS - European Identity Theft Observatory System</a><br />
<img src="https://eithos.eu/wp-content/uploads/2025/07/europol.png" style="display: block; margin: 1em auto"><br />
<a rel="nofollow" href="https://eithos.eu">EITHOS - European Identity Theft Observatory System - </a></p>
<p>Reviewing EUROPOL’s SOCTA Report In an interview given by CyberLeaders in their last report Confiance 5.0 (2025), Vice-director of operations at Europol Jean-Philippe Lecouffe, declared that&#160; “Though Europol traditionally identifies three families of cybercrime : ransomware &#38; DDoS ; Online Identity theft and CSAM (Child Sexual Abuse Material) ; our society being increasingly digitized, we [&#8230;]</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Outsmarting Scammers Through Secret Code Verification.</title>
		<link>https://eithos.eu/outsmarting-scammers-through-secret-code-verification/</link>
		
		<dc:creator><![CDATA[Anthony Lamaudiere]]></dc:creator>
		<pubDate>Thu, 17 Jul 2025 11:02:10 +0000</pubDate>
				<category><![CDATA[Flash News]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://eithos.eu/?p=6948</guid>

					<description><![CDATA[<p><a rel="nofollow" href="https://eithos.eu">EITHOS - European Identity Theft Observatory System</a><br />
<img src="https://eithos.eu/wp-content/uploads/2023/02/logobucato.png" style="display: block; margin: 1em auto"><br />
<a rel="nofollow" href="https://eithos.eu">EITHOS - European Identity Theft Observatory System - </a></p>
<p>In today’s digital world, cyber scams are becoming a serious threat by taking advantage of the trust people place in family members and close friends. Scammers use fake messages and phone calls to impersonate loved ones, sometimes using advanced technologies like AI-driven voice cloning to deceive victims. To help prevent scams such as the well-known [&#8230;]</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>European commission’s initiative to strengthen its cyber-resilience</title>
		<link>https://eithos.eu/european-commissions-initiative-to-strengthen-its-cyber-resilience/</link>
		
		<dc:creator><![CDATA[Anthony Lamaudiere]]></dc:creator>
		<pubDate>Mon, 30 Jun 2025 14:44:48 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Flash News]]></category>
		<category><![CDATA[blueprint]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Eithos]]></category>
		<category><![CDATA[Europeancommission]]></category>
		<category><![CDATA[online identity theft]]></category>
		<guid isPermaLink="false">https://eithos.eu/?p=6914</guid>

					<description><![CDATA[<p><a rel="nofollow" href="https://eithos.eu">EITHOS - European Identity Theft Observatory System</a><br />
<img src="https://eithos.eu/wp-content/uploads/2025/06/eu-counterintelligence-division-agent-maintains-air-space-superiority_482257-90007.avif" style="display: block; margin: 1em auto"><br />
<a rel="nofollow" href="https://eithos.eu">EITHOS - European Identity Theft Observatory System - </a></p>
<p>EU council Blueprint fostering collaboration for countering cyberattacks Last Friday June 6th 2025, the EU Council adopted its Blueprint policy to manage cyber-crisis and incidents. In such a worrying context where the European landscape is facing increasingly serious issues in terms of cybersecurity, the EU has taken a step forward to enhancing its cyber-resilience in [&#8230;]</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>UN last Convention against Cybercrime: a viable framework amid complex challenges – insights of a conference of FIC 2025</title>
		<link>https://eithos.eu/un-last-convention-against-cybercrime-a-viable-framework-amid-complexchallenges-insights-of-a-conference-of-fic-2025/</link>
		
		<dc:creator><![CDATA[Anthony Lamaudiere]]></dc:creator>
		<pubDate>Wed, 14 May 2025 14:10:40 +0000</pubDate>
				<category><![CDATA[Flash News]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[Europe]]></category>
		<category><![CDATA[FIC25]]></category>
		<category><![CDATA[Incyber]]></category>
		<category><![CDATA[UN]]></category>
		<category><![CDATA[UnitedNations]]></category>
		<guid isPermaLink="false">https://eithos.eu/?p=6623</guid>

					<description><![CDATA[<p><a rel="nofollow" href="https://eithos.eu">EITHOS - European Identity Theft Observatory System</a><br />
<img src="https://eithos.eu/wp-content/uploads/2025/05/ONU-FIC-1024x627.jpg" style="display: block; margin: 1em auto"><br />
<a rel="nofollow" href="https://eithos.eu">EITHOS - European Identity Theft Observatory System - </a></p>
<p>  During the InCyber Forum in Lille, EITHOS took the opportunity to attend several conferences led by cyberspace experts, military officers, and representatives from EU agencies. One session that particularly stood out featured Gabrielle Miséré. from France’s Ministry of Europe and Foreign Affairs, law enforcement officer Stewart Garrick, EC policy officer Janos Drienvosky, and Colonel [&#8230;]</p>
]]></description>
		
		
		
			</item>
	</channel>
</rss>
