<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
  <url>
    <loc>https://cyberpings.com/article/sean-plankey-cisa-nomination-withdrawn-mobz</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T21:31:36.925Z</news:publication_date>
      <news:title>Sean Plankey Withdraws CISA Nomination Amid Senate Stalemate</news:title>
      <news:keywords>CISA, Sean Plankey, Trump Administration, Cybersecurity, Senate</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/telecom-surveillance-campaigns-exposed-moby</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T21:01:23.283Z</news:publication_date>
      <news:title>Telecom Surveillance Campaigns Exposed - National Privacy Push</news:title>
      <news:keywords>China-linked actors, GopherWhisper, Microsoft Defender, telecom surveillance, AI poisoning</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/lizzie-oshea-digital-rights-privacy-moby</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T21:01:16.188Z</news:publication_date>
      <news:title>Lizzie O&apos;Shea - Advocating for Digital Rights and Privacy</news:title>
      <news:keywords>Lizzie O&apos;Shea, Digital Rights Watch, Australia</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/us-sanctions-cambodian-senator-scam-compounds-mobx</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T20:31:01.605Z</news:publication_date>
      <news:title>US Sanctions Cambodian Senator for Scam Compound Profits</news:title>
      <news:keywords>Kok An, scam compounds, U.S. sanctions, human trafficking, cryptocurrency fraud</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/trigona-ransomware-custom-exfiltration-tool-mobu</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T19:01:30.363Z</news:publication_date>
      <news:title>Trigona Ransomware - Custom Tool Steals Data Efficiently</news:title>
      <news:keywords>Trigona, ransomware, data exfiltration, Symantec, Mimikatz</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/gpt-5-5-bio-bug-bounty-mobt</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T18:31:27.368Z</news:publication_date>
      <news:title>GPT-5.5 Bio Bug Bounty - Challenge for AI Safety Experts</news:title>
      <news:keywords>GPT-5.5, OpenAI, biosecurity, red teaming, jailbreak</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/unc6692-impersonates-it-helpdesk-snow-malware-mobt</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T18:31:09.882Z</news:publication_date>
      <news:title>UNC6692 - Impersonates IT Helpdesk to Deploy SNOW Malware</news:title>
      <news:keywords>UNC6692, SNOW malware, Microsoft Teams, social engineering, malicious browser extension</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ai-assisted-lazarus-campaign-targets-developers-mobt</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T18:30:57.162Z</news:publication_date>
      <news:title>AI-Assisted Lazarus Campaign Targets Developers with Malware</news:title>
      <news:keywords>Lazarus Group, HexagonalRodent, BeaverTail, OtterCookie, VSCode</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/spicejet-online-booking-system-vulnerabilities-mobq</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T17:02:41.062Z</news:publication_date>
      <news:title>SpiceJet Online Booking System - Critical Vulnerabilities Disclosed</news:title>
      <news:keywords>CVE-2026-6375, CVE-2026-6376, SpiceJet, Online Booking System, Authorization Bypass</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/yadea-t5-electric-bicycle-weak-authentication-vulnerability-mobq</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T17:02:25.790Z</news:publication_date>
      <news:title>Yadea T5 Electric Bicycle - Weak Authentication Vulnerability</news:title>
      <news:keywords>CVE-2025-70994, Yadea, Electric Bicycle, Weak Authentication, Transportation Systems</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/intrado-911-emergency-gateway-vulnerability-mobq</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T17:02:06.254Z</news:publication_date>
      <news:title>Intrado 911 Emergency Gateway - Critical Vulnerability Alert</news:title>
      <news:keywords>CVE-2026-6074, Intrado, Emergency Gateway</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/hangzhou-xiongmai-xm530-ip-camera-authentication-bypass-mobq</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T17:02:00.119Z</news:publication_date>
      <news:title>Hangzhou Xiongmai XM530 IP Camera - Critical Auth Bypass Flaw</news:title>
      <news:keywords>CVE-2025-65856, Hangzhou Xiongmai Technology, XM530 IP Camera, authentication bypass, remote access</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/milesight-cameras-vulnerabilities-explained-mobq</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T17:01:40.344Z</news:publication_date>
      <news:title>Milesight Cameras - Multiple Vulnerabilities Exposed</news:title>
      <news:keywords>CVE-2026-28747, CVE-2026-27785, CVE-2026-32644, CVE-2026-32649, CVE-2026-20766</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/carlson-software-vasco-b-gnss-receiver-vulnerability-mobq</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T17:01:30.467Z</news:publication_date>
      <news:title>Carlson Software VASCO-B GNSS Receiver - Critical Flaw Discovered</news:title>
      <news:keywords>CVE-2026-3893, Carlson Software, GNSS Receiver, Critical Manufacturing, ICS</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/google-gemini-models-cybersecurity-ai-mobq</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T17:01:21.442Z</news:publication_date>
      <news:title>Google Favors General-Purpose Gemini Models Over Cybersecurity AI</news:title>
      <news:keywords>Google, Gemini, AI models, cybersecurity, Anthropic</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/threatsday-bulletin-april-2026-mobn</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T15:31:36.106Z</news:publication_date>
      <news:title>ThreatsDay Bulletin - $290M DeFi Hack and Ongoing Threats</news:title>
      <news:keywords>North Korea, KelpDAO, CVE-2026-27175, MajorDoMo, AI prompt injection</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cisco-firepower-devices-targeted-by-uat-4356-mobn</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T15:31:21.850Z</news:publication_date>
      <news:title>Cisco Firepower Devices Targeted by UAT-4356 - Alert</news:title>
      <news:keywords>Cisco, FIRESTARTER, UAT-4356, CVE-2025-20333, CVE-2025-20362, Firepower, malware, CISA, APT</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cloudsmith-raises-72-million-series-c-funding-mobn</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T15:31:14.552Z</news:publication_date>
      <news:title>Cloudsmith Raises $72 Million in Series C Funding</news:title>
      <news:keywords>Cloudsmith, Series C Funding, AI, Software Supply Chain, Investment</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/bitwarden-cli-compromised-checkmarx-supply-chain-mobm</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T15:02:06.363Z</news:publication_date>
      <news:title>Bitwarden CLI Compromised - Ongoing Checkmarx Supply Chain Attack Exposes Millions</news:title>
      <news:keywords>Bitwarden, Checkmarx, supply chain attack, GitHub, npm, Supply Chain Attack, Credential Theft, GitHub Actions, Cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/jpmorgan-cyber-resilience-checklist-snyk-mobm</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T15:01:52.133Z</news:publication_date>
      <news:title>JPMorgan Cyber Resilience Checklist - Snyk&apos;s Coverage Explained</news:title>
      <news:keywords>JPMorganChase, Snyk, cyber resilience, AI security, vulnerability management</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/dissecting-mythos-security-stack-github-action-framework-mobm</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T15:01:46.407Z</news:publication_date>
      <news:title>Dissecting Mythos - New Tools for Security and CI/CD</news:title>
      <news:keywords>GitHub, CI/CD, Mythos, Cloud Security, RunZero</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/password-resets-security-risks-mobk</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T14:31:57.775Z</news:publication_date>
      <news:title>Password Resets - Security Risks Exposed by Recent Breach</news:title>
      <news:keywords>Specops Software, password reset, social engineering, Marks &amp; Spencer, Scattered Spider</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/critical-minerals-cyber-operations-geopolitical-risks-mobj</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T14:01:37.396Z</news:publication_date>
      <news:title>Critical Minerals - Rising Cyber Threats and Geopolitical Risks</news:title>
      <news:keywords>China, cyber operations, rare earth elements, mining sector, APT15</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/kerberos-with-titanis-mobj</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T14:01:21.769Z</news:publication_date>
      <news:title>Kerberos - Using Titanis for Authentication Explained</news:title>
      <news:keywords>Titanis, Kerberos, Active Directory</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/biobank-medical-data-sale-alibaba-mobh</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T13:01:35.162Z</news:publication_date>
      <news:title>Biobank Medical Data - 500K Volunteers Listed for Sale on Alibaba</news:title>
      <news:keywords>Biobank, medical data, Alibaba, UK, data breach, Cybersecurity, Data Breach, Health, UK Biobank</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/electricity-cyber-risk-manipulation-mobh</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T13:01:26.489Z</news:publication_date>
      <news:title>Electricity - Growing Cyber Risk from Voltage Manipulation</news:title>
      <news:keywords>cybersecurity, electricity, cyberattack, voltage fluctuations, IT systems</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/surveillance-vendors-abuse-telcos-track-locations-mobg</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T12:31:25.414Z</news:publication_date>
      <news:title>Surveillance Vendors Abuse Telcos to Track Phone Locations</news:title>
      <news:keywords>Citizen Lab, SS7, Diameter, location tracking, surveillance</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/uk-warns-chinese-hackers-proxy-networks-mobg</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T12:31:23.506Z</news:publication_date>
      <news:title>UK Warns of Chinese Hackers Using Proxy Networks to Evade Detection</news:title>
      <news:keywords>Chinese hackers, proxy networks, botnets, NCSC-UK, Flax Typhoon</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/hackers-use-outlook-mailboxes-hide-linux-gogra-backdoor-mobg</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T12:31:13.984Z</news:publication_date>
      <news:title>Harvester APT - Hackers Use Outlook to Hide GoGra Malware</news:title>
      <news:keywords>Harvester APT, GoGra backdoor, Microsoft Outlook, Linux malware, social engineering</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/trailmark-open-source-code-graph-library-mobg</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T12:31:11.150Z</news:publication_date>
      <news:title>Trailmark - Open-Sourcing Code Graph Library for Analysis</news:title>
      <news:keywords>Trailmark, Claude, mutation testing, graph analysis, static analysis</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/google-gemini-enterprise-ai-agent-identities-mobf</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T12:01:27.502Z</news:publication_date>
      <news:title>Google Cloud - Unique AI Agent Identities Introduced</news:title>
      <news:keywords>Google Cloud, Gemini Enterprise, AI agents, anomaly detection, Model Armor</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/rilian-raises-17-5-million-ai-security-orchestration-mobf</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T12:01:23.637Z</news:publication_date>
      <news:title>Rilian Raises $17.5 Million for AI-Native Security Orchestration</news:title>
      <news:keywords>Rilian, AI, security orchestration, funding, cyber defense</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/defending-against-china-nexus-covert-networks-mobe</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T11:31:18.883Z</news:publication_date>
      <news:title>Defending Against China-Nexus Covert Networks Explained</news:title>
      <news:keywords>China-nexus, covert networks, cybersecurity, Volt Typhoon, Flax Typhoon, China, NCSC, cyber threats, threat intelligence, botnets</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/tropic-trooper-attack-custom-beacon-vs-code-tunnels-mobc</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T10:31:43.059Z</news:publication_date>
      <news:title>Tropic Trooper Attack - Custom Beacon and VS Code Tunnels Exploited</news:title>
      <news:keywords>Tropic Trooper, AdaptixC2, GitHub, VS Code, Cobalt Strike</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cyber-attacks-surge-63-percent-education-sector-mobc</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T10:31:22.496Z</news:publication_date>
      <news:title>Cyber-Attacks Surge 63% Annually in Education Sector</news:title>
      <news:keywords>Quorum Cyber, ransomware, hacktivism, education sector, data breaches</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ai-autonomously-hack-cloud-systems-mobc</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T10:31:06.393Z</news:publication_date>
      <news:title>AI Can Autonomously Hack Cloud Systems, Researchers Warn</news:title>
      <news:keywords>Palo Alto Networks, Zealot, AI penetration testing, cloud security, autonomous hacking</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ai-capabilities-staged-cloud-attack-mobb</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T10:01:21.219Z</news:publication_date>
      <news:title>AI Capabilities - Staged Cloud Attack Demonstrated</news:title>
      <news:keywords>AI, Cloud Security, Autonomous Attacks</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/gopherwhisper-china-apt-infects-mongolian-systems-moba</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T09:31:26.007Z</news:publication_date>
      <news:title>GopherWhisper - China-Linked APT Targets Mongolian Government, Dozens of Victims Identified</news:title>
      <news:keywords>GopherWhisper, APT, ESET, Mongolian Government, Malware, Advanced Persistent Threat, cybersecurity, Discord, Golang, Microsoft 365, Threat Intelligence</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/sharing-admin-password-leads-to-data-loss-moba</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T09:31:08.349Z</news:publication_date>
      <news:title>Admin Password Sharing Leads to Major Data Loss Incident</news:title>
      <news:keywords>admin password, data loss, security breach</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/roblox-age-checks-chat-limits-child-safety-mob8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T08:31:09.051Z</news:publication_date>
      <news:title>Roblox - Implements Age Checks and Chat Limits Amid Settlements</news:title>
      <news:keywords>Roblox, child safety, age verification, settlement, online safety</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/epic-amicus-brief-flock-alpr-fourth-amendment-mob5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T07:32:16.389Z</news:publication_date>
      <news:title>EPIC Files Amicus Brief Against Flock ALPR&apos;s Use</news:title>
      <news:keywords>Flock ALPR, Fourth Amendment, EPIC, mass surveillance, predictive policing</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ftc-strategic-plan-2026-2030-consumer-protection-mob5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T07:31:52.142Z</news:publication_date>
      <news:title>FTC’s New Strategic Plan - Lacks Consumer Protection Focus</news:title>
      <news:keywords>FTC, consumer protection, strategic plan, Chair Ferguson, EPIC</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/epic-privacy-voter-rolls-doj-demand-mob5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T07:31:29.693Z</news:publication_date>
      <news:title>EPIC Urges Court to Protect Voter Privacy Against DOJ Demand</news:title>
      <news:keywords>EPIC, DOJ, voter privacy, Michigan, voter rolls</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/epic-eu-leaders-digital-rights-mob5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T07:31:28.574Z</news:publication_date>
      <news:title>EPIC Urges EU Leaders to Defend Digital Rights Amid U.S. Pressure</news:title>
      <news:keywords>EPIC, EU Digital Rights, U.S. Civil Society, Privacy Protection, Digital Regulation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/critical-pack2theroot-vulnerability-linux-root-access-mob4</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T07:01:34.315Z</news:publication_date>
      <news:title>Critical Pack2TheRoot Vulnerability Lets Attackers Gain Root</news:title>
      <news:keywords>CVE-2026-41651, PackageKit, Linux, Deutsche Telekom, Privilege Escalation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/gmail-blue-checkmark-email-marketing-impact-moax</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T03:32:03.642Z</news:publication_date>
      <news:title>Gmail Blue Checkmark - Transforming Email Marketing Strategies</news:title>
      <news:keywords>Gmail, email marketing, blue checkmark, authentication, BIMI</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/chinese-language-telegram-guarantee-marketplaces-moav</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T02:31:21.484Z</news:publication_date>
      <news:title>Chinese-Language Guarantee Telegram Marketplaces - Evolving Threats</news:title>
      <news:keywords>Dabai Guarantee, Telegram, Chinese cybercrime, fraud, guarantee marketplaces</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/malicious-pgserve-automagik-developer-tools-npm-moaq</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T00:31:30.949Z</news:publication_date>
      <news:title>Malicious pgserve &amp; automagik Tools Found in npm Registry</news:title>
      <news:keywords>pgserve, automagik, npm registry, malware, supply chain attack</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/everest-ransomware-breach-citizens-frost-bank-moap</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T00:02:32.472Z</news:publication_date>
      <news:title>Everest Ransomware - Major Breaches at Citizens and Frost Bank</news:title>
      <news:keywords>Everest Ransomware, Citizens Financial Group, Frost Bank, data breach, ransomware attack</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ai-cyber-threats-fed-nominee-approach-moap</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T00:01:51.592Z</news:publication_date>
      <news:title>AI Cyber Threats - Fed Nominee Urges Proactive Measures</news:title>
      <news:keywords>AI cyber threats, Kevin Warsh, Federal Reserve, financial sector, cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/gpt-rosalind-ai-accelerate-scientific-research-moap</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T00:01:48.537Z</news:publication_date>
      <news:title>GPT-Rosalind - Accelerating Life Sciences Research with AI</news:title>
      <news:keywords>GPT-Rosalind, OpenAI, drug discovery, biological research, scientific workflows</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/crypto-scam-lures-ships-strait-hormuz-moam</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T22:31:21.878Z</news:publication_date>
      <news:title>Crypto Scam Lures Ships in Strait of Hormuz - Safe Passage Deceived</news:title>
      <news:keywords>crypto scam, Iran, shipping, Strait of Hormuz, Technomar</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/mythos-leaks-dod-cyber-strategy-moam</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T22:31:18.887Z</news:publication_date>
      <news:title>Mythos Leaks - DOD Prepares Aggressive Cyber Strategy</news:title>
      <news:keywords>Lotus Wiper, Mirai Botnet, Harvester APT, GoGra Backdoor, LOTUSLITE</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/strengthening-authentication-with-passkeys-playbook-moal</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T22:01:23.258Z</news:publication_date>
      <news:title>Strengthening Authentication - CISO Playbook for Passkeys</news:title>
      <news:keywords>CISO, playbook, toolkit, passkeys, authentication, cybersecurity, MFA, security best practices</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/fake-github-repositories-deliver-smartloader-stealc-moak</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T21:31:06.287Z</news:publication_date>
      <news:title>Fake GitHub Repositories - Delivering SmartLoader and StealC</news:title>
      <news:keywords>SmartLoader, StealC, GitHub, malware campaign, Hexastrike</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/house-republicans-national-privacy-bill-moai</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T20:31:04.978Z</news:publication_date>
      <news:title>House Republicans Introduce National Privacy Bill for Consumers, Raising Concerns Over State Protections</news:title>
      <news:keywords>Secure Data Act, data privacy, FTC, Brett Guthrie, John Joyce, privacy, data protection, SECURE Data Act, regulation, consumer rights</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/malicious-kics-docker-images-checkmarx-supply-chain-moaf</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T19:01:31.253Z</news:publication_date>
      <news:title>Malicious KICS Docker Images Target Checkmarx Supply Chain, Credential Theft Confirmed</news:title>
      <news:keywords>Checkmarx, Docker, malware, Visual Studio Code, supply chain attack, Cloud security, cybersecurity, Malware, software security, Supply Chain Attack, Credential Theft, KICS</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/zero-networks-ai-segmentation-prevent-breaches-moae</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T18:31:34.419Z</news:publication_date>
      <news:title>AI Security - Zero Networks Launches AI Segmentation Tool</news:title>
      <news:keywords>AI Segmentation, Zero Networks, AI agents, lateral movement, compliance</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ai-powered-defense-ai-accelerated-threat-landscape-moae</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T18:31:14.900Z</news:publication_date>
      <news:title>AI Security - Microsoft Partners with Anthropic for Enhanced Defense</news:title>
      <news:keywords>Microsoft, Anthropic, AI-driven security, Claude Mythos, vulnerability discovery, AI, Cybersecurity, Vulnerability Detection</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/blackberry-survey-government-security-risks-messaging-apps-moad</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T18:01:43.357Z</news:publication_date>
      <news:title>Government Security Risks - BlackBerry Survey Reveals Issues</news:title>
      <news:keywords>BlackBerry, encryption, government security, consumer messaging apps, data privacy</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/vendor-diversification-supply-chain-risk-management-moac</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T18:01:22.327Z</news:publication_date>
      <news:title>Vendor Diversification - Enhancing Supply Chain Resilience</news:title>
      <news:keywords>vendor diversification, supply chain risk management, cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/redsun-mitigation-microsoft-defender-moab</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T17:31:19.482Z</news:publication_date>
      <news:title>RedSun Vulnerability - Critical Risk in Microsoft Defender</news:title>
      <news:keywords>Microsoft Defender, RedSun, Local Privilege Escalation, Windows, Qualys VMDR</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/auraboros-rat-keylogging-cookie-hijacking-moaa</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T17:01:21.474Z</news:publication_date>
      <news:title>Auraboros RAT - Exposes Keylogging and Cookie Hijacking</news:title>
      <news:keywords>Auraboros RAT, keylogging, cookie hijacking, live audio streaming, DLL sideloading</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/phishing-defense-layer-top-cisos-moa9</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T16:31:26.709Z</news:publication_date>
      <news:title>Phishing Defense Layer - Essential Insights from Top CISOs</news:title>
      <news:keywords>phishing, CISO, ANY.RUN, SOC, cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/openai-privacy-filter-ai-model-redacting-pii-moa9</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T16:31:23.678Z</news:publication_date>
      <news:title>OpenAI Privacy Filter - New AI Model for PII Redaction</news:title>
      <news:keywords>OpenAI, Privacy Filter, PII detection, data privacy, AI model</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/rituals-data-breach-customer-membership-records-moa8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T16:01:20.228Z</news:publication_date>
      <news:title>Rituals Confirms Data Breach Affecting Customer Records</news:title>
      <news:keywords>Rituals, data breach, customer records</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/eff-sues-dhs-ice-records-subpoenas-online-critics-moa8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T16:01:19.886Z</news:publication_date>
      <news:title>EFF Sues DHS and ICE Over Subpoenas Targeting Critics</news:title>
      <news:keywords>DHS, ICE, EFF, subpoenas, First Amendment</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/spain-dismantles-manga-piracy-platform-arrests-four-moa7</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T15:31:23.044Z</news:publication_date>
      <news:title>Spain Dismantles Major $4.7M Manga Piracy Platform</news:title>
      <news:keywords>manga piracy, Tu Manga Online, Spanish police, intellectual property, digital assets</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/silentglass-cyber-attack-monitor-protection-moa6</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T15:01:25.223Z</news:publication_date>
      <news:title>SilentGlass - New Device Shields Monitors from Cyber Threats, Now Available for Purchase</news:title>
      <news:keywords>SilentGlass, NCSC, Goldilock Labs, cybersecurity, monitor protection, monitor security, cyber threats, hardware security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/caller-as-a-service-fraud-scam-economy-moa5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T14:31:33.782Z</news:publication_date>
      <news:title>Caller-as-a-Service Fraud - Inside the Scam Economy&apos;s Hiring Process</news:title>
      <news:keywords>Caller-as-a-Service, social engineering, cybercrime, vishing, Flare</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/uk-government-spyware-hacking-threats-moa5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T14:31:24.221Z</news:publication_date>
      <news:title>UK Government Warns of Spyware Threats from 100 Countries</news:title>
      <news:keywords>NSO Group, Pegasus, Graphite, UK National Cyber Security Centre, DarkSword</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/microsoft-github-rce-vulnerability-moa5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T14:31:21.898Z</news:publication_date>
      <news:title>Microsoft GitHub RCE Vulnerability - Critical Flaw Fixed</news:title>
      <news:keywords>Microsoft, GitHub, RCE, Tenable, GITHUB_TOKEN</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/uk-cyber-perfect-storm-ncsc-warns-moa4</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T14:02:17.177Z</news:publication_date>
      <news:title>UK Faces Cyber &apos;Perfect Storm&apos; Amid Nation State Threats</news:title>
      <news:keywords>NCSC, nation-state threats, cybersecurity, AI, ransomware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/llm-reverse-engineering-obfuscation-arms-race-moa4</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T14:01:39.284Z</news:publication_date>
      <news:title>LLM-Driven Reverse Engineering - The New Obfuscation Battle</news:title>
      <news:keywords>LLM, obfuscation, reverse engineering, Elastic Security Labs, Tigress</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/china-cyber-capabilities-equal-us-intelligence-warning-moa4</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T14:01:19.013Z</news:publication_date>
      <news:title>China&apos;s Cyber Capabilities Now Equal to the US, Warns Intelligence</news:title>
      <news:keywords>China, cyber capabilities, MIVD, cyber espionage, PLA</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/rust-workers-panic-abort-recovery-moa4</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T14:01:15.186Z</news:publication_date>
      <news:title>Rust Workers - Enhancing Reliability with Panic Recovery</news:title>
      <news:keywords>Rust, wasm-bindgen, WebAssembly, Cloudflare Workers, panic recovery</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/avast-antivirus-25-11-unquoted-service-path-moa2</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T13:02:11.533Z</news:publication_date>
      <news:title>AVAST Antivirus 25.11 - Critical Unquoted Service Path Flaw</news:title>
      <news:keywords>AVAST, Windows, Unquoted Service Path</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/dindoor-backdoor-deno-runtime-evade-detection-moa2</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T13:01:45.757Z</news:publication_date>
      <news:title>DinDoor Backdoor - Abusing Deno Runtime for Stealthy Attacks</news:title>
      <news:keywords>DinDoor, Deno Runtime, Tsundere Botnet, MuddyWater, Seedworm</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/malicious-trading-website-drops-browser-hijacking-malware-moa2</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T13:01:39.643Z</news:publication_date>
      <news:title>Malicious Trading Website Drops Browser Hijacking Malware</news:title>
      <news:keywords>Needle Stealer, TradingClaw, malware, browser hijacking, data theft</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/surge-silent-subject-phishing-attacks-vip-users-moa2</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T13:01:32.605Z</news:publication_date>
      <news:title>Surge in Silent Subject Phishing Attacks Targets VIP Users</news:title>
      <news:keywords>phishing, QR codes, credential harvesting, Cyberproof, FlowerStorm</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/throttlestop-kernel-driver-privilege-escalation-moa2</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T13:01:19.850Z</news:publication_date>
      <news:title>Throttlestop Kernel Driver - Privilege Escalation Vulnerability</news:title>
      <news:keywords>CVE-2025-7771, Throttlestop, Windows, Privilege Escalation, Kernel Driver</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/autonomous-runtime-security-agentic-response-moa2</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T13:01:15.104Z</news:publication_date>
      <news:title>Autonomous Runtime Security - Transforming Incident Response</news:title>
      <news:keywords>AI Security, Cloud Workload Protection Platform, Container Security, Runtime Security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/sec-cybersecurity-disclosure-rules-moa1</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T12:31:13.855Z</news:publication_date>
      <news:title>SEC Cybersecurity Disclosure Rules - What Leaders Must Know</news:title>
      <news:keywords>SEC, cybersecurity disclosure, risk management, incident reporting, compliance</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/router-security-hardening-steps-2026-moa1</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T12:31:01.830Z</news:publication_date>
      <news:title>Router Security - Essential Hardening Steps for 2026</news:title>
      <news:keywords>router security, firmware monitoring, network hardening, NIS2 compliance, credential audits</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/sboms-failing-supply-chain-attacks-rise-moa0</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T12:01:50.618Z</news:publication_date>
      <news:title>SBOMs Failing - Supply Chain Attacks Surge Amid Confusion</news:title>
      <news:keywords>SBOM, VEX, supply chain attacks, security governance, vulnerability management</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/moltbook-data-breach-exposes-email-addresses-api-tokens-mo9z</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T11:32:09.448Z</news:publication_date>
      <news:title>Moltbook Data Breach Exposes 35,000 Emails and API Tokens</news:title>
      <news:keywords>Moltbook, API tokens, OpenAI, data exposure, SaaS security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/scotland-yard-live-facial-recognition-judges-decision-mo9z</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T11:31:14.615Z</news:publication_date>
      <news:title>Scotland Yard - Judges Allow Live Facial Recognition Use</news:title>
      <news:keywords>facial recognition, Scotland Yard, Big Brother Watch, human rights, privacy laws</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/compromised-namastex-npm-packages-canisterworm-malware-mo9z</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T11:31:06.046Z</news:publication_date>
      <news:title>Namastex npm Packages Compromised by CanisterWorm Malware</news:title>
      <news:keywords>CanisterWorm, TeamPCP, Namastex, npm, malware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/new-gogra-malware-linux-microsoft-graph-api-mo9w</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T10:31:27.731Z</news:publication_date>
      <news:title>New GoGra Malware - Linux Variant Uses Microsoft Graph API</news:title>
      <news:keywords>GoGra, Linux, Microsoft Graph API, Harvester, malware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cybersmart-partners-with-renaissance-for-smes-mo9w</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T10:31:07.996Z</news:publication_date>
      <news:title>CyberSmart Partners with Renaissance to Boost SME Cybersecurity</news:title>
      <news:keywords>CyberSmart, Renaissance, SMEs, cybersecurity, compliance</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/microsoft-universal-print-issues-graph-api-code-change-mo9w</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T10:31:01.623Z</news:publication_date>
      <news:title>Microsoft Cloud Print Issues - Traced to Graph API Code Change</news:title>
      <news:keywords>Microsoft, Universal Print, Graph API, Entra ID, printer shares</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/anthropic-bets-on-epss-for-bug-surge-mo9u</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T09:31:15.587Z</news:publication_date>
      <news:title>Anthropic Bets on EPSS to Manage Vulnerability Surge</news:title>
      <news:keywords>EPSS, Mythos, vulnerability management, AI, CVE</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cohere-ai-terrarium-sandbox-flaw-root-code-execution-mo9s</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T08:31:38.043Z</news:publication_date>
      <news:title>Cohere AI Terrarium Sandbox Flaw Enables Root Code Execution</news:title>
      <news:keywords>CVE-2026-5752, Cohere AI, Terrarium, Python, WebAssembly</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/crowdstrike-logscale-vulnerability-path-traversal-mo9r</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T08:01:38.276Z</news:publication_date>
      <news:title>CrowdStrike LogScale - Critical Path Traversal Vulnerability</news:title>
      <news:keywords>CVE-2026-40050, CrowdStrike, LogScale, path-traversal, unauthenticated access</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/reddit-community-moderation-section-230-mo9q</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T07:31:19.177Z</news:publication_date>
      <news:title>Reddit Empowers Community Moderation - Understanding Section 230</news:title>
      <news:keywords>Section 230, Reddit, content moderation, user speech, EFF</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/microsoft-signed-binary-lotuslite-espionage-india-mo9p</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T07:01:27.387Z</news:publication_date>
      <news:title>LOTUSLITE - Microsoft-Signed Binary Used in Espionage Campaign</news:title>
      <news:keywords>LOTUSLITE, DLL sideloading, Mustang Panda, espionage, Microsoft</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/fraud-operation-mule-account-creation-fintech-france-mo9p</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T07:01:17.789Z</news:publication_date>
      <news:title>Fraud Operation - Mule Account Creation on Fintech Platforms</news:title>
      <news:keywords>B2B Fintech, Fraud Operations, Mule Accounts, Device Fingerprinting, Financial Fraud</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/oracle-april-2026-critical-patch-update-mo9o</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T06:31:21.309Z</news:publication_date>
      <news:title>Oracle April 2026 Critical Patch Update Addresses 241 CVEs, Highlights Critical Vulnerabilities</news:title>
      <news:keywords>CVE-2026-XXXX, Oracle, Critical Patch Update, Security Patches, Oracle Communications, Patch Update, Cybersecurity, CVEs, Vulnerabilities, April 2026, CVE, Critical Vulnerabilities</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/systembc-c2-server-gentlemen-ransomware-victims-mo9j</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T04:01:39.632Z</news:publication_date>
      <news:title>SystemBC Malware - 1,570+ Victims Discovered in Ransomware Attack</news:title>
      <news:keywords>SystemBC, The Gentlemen, ransomware, botnet, C2 server</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/software-bill-of-materials-explained-mo9i</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T04:01:32.311Z</news:publication_date>
      <news:title>Software Bill of Materials - Explained for Developers</news:title>
      <news:keywords>Software Bill of Materials, SBOM, Open Source, Cybersecurity, Supply Chain Security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/copyright-dmca-best-practices-fediverse-operators-mo9a</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T00:01:26.524Z</news:publication_date>
      <news:title>Copyright Best Practices - DMCA Guidance for Fediverse Operators</news:title>
      <news:keywords>DMCA, copyright, Mastodon, ActivityPub, Bluesky</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/bol-data-breach-400k-records-leaked-mo98</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T23:01:41.435Z</news:publication_date>
      <news:title>Bol Data Breach - Over 400K Records Allegedly Stolen</news:title>
      <news:keywords>Bol, data breach, personal information, hacker, data leak</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/nation-states-cyber-harm-not-just-steal-cash-mo97</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T22:31:05.743Z</news:publication_date>
      <news:title>Nation-States Want to Cause Harm, Not Just Steal Cash</news:title>
      <news:keywords>China, UK National Cyber Security Centre, cybersecurity, nation-state attacks, Richard Horne</news:keywords>
    </news:news>
  </url>
</urlset>