<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
  <url>
    <loc>https://cyberpings.com/article/face-threat-landscape-sarah-armstrong-smith-mo5g</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T07:30:58.897Z</news:publication_date>
      <news:title>AI Security - Your Face Is Now Part of the Threat Landscape</news:title>
      <news:keywords>AI, Deepfake, Cybersecurity, Privacy, Image-based AI</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/agent-readiness-score-ai-agents-mo5g</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T07:30:57.360Z</news:publication_date>
      <news:title>Agent Readiness Score - Optimize Your Site for AI Agents</news:title>
      <news:keywords>Cloudflare, AI agents, Agent Readiness score, MCP Server Cards, API Catalog</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/two-factor-authentication-physical-security-mo5f</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T07:01:54.133Z</news:publication_date>
      <news:title>Two-Factor Authentication - Enhancing Physical Security</news:title>
      <news:keywords>Two-Factor Authentication, Security Systems, Threat Actors</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cloudflare-ai-training-redirects-canonical-content-mo5f</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T07:01:46.796Z</news:publication_date>
      <news:title>Cloudflare&apos;s AI Training Redirects Canonical Content</news:title>
      <news:keywords>Cloudflare, AI Training, Redirects, Crawlers, Canonical Tags</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/rce-design-mcp-architectural-choice-ai-agents-mo5f</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T07:01:41.847Z</news:publication_date>
      <news:title>AI Security Risk - RCE Flaw in Model Context Protocol Exposed</news:title>
      <news:keywords>Model Context Protocol, Anthropic, OX Security, remote code execution, STDIO</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/device-code-phishing-attackers-adopt-new-tactics-mo5f</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T07:01:35.381Z</news:publication_date>
      <news:title>Device Code Phishing - Attackers Adopt New Tactics</news:title>
      <news:keywords>phishing, device code, account access</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/satellite-cybersecurity-act-chrome-flaw-teen-hacker-arrested-mo5f</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T07:01:35.256Z</news:publication_date>
      <news:title>Satellite Cybersecurity Act - Chrome Flaw and Teen Hacker Arrested</news:title>
      <news:keywords>Satellite Cybersecurity Act, CVE-2026-6296, ShinyHunters, Chrome, EPA</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/android-17-beta-4-post-quantum-cryptography-mo5f</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T07:01:28.677Z</news:publication_date>
      <news:title>Android 17 Beta 4 - Post-Quantum Cryptography Introduced</news:title>
      <news:keywords>Android 17, post-quantum cryptography, Google, ML-DSA, Android Keystore</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/w3ll-phishing-takedown-agingfly-malware-nginx-exploit-mo5f</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T07:01:19.167Z</news:publication_date>
      <news:title>W3LL Phishing Takedown, AgingFly Malware, Nginx Exploit Alert</news:title>
      <news:keywords>W3LL, AgingFly, CVE-2026-33032, Nginx, Ukraine</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/massachusetts-court-section-230-social-media-claims-mo5f</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T07:01:16.102Z</news:publication_date>
      <news:title>Massachusetts Court Rules Against Meta&apos;s Section 230 Defense</news:title>
      <news:keywords>Massachusetts Supreme Judicial Court, Meta, Section 230, EPIC, social media design</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/white-house-anthropic-ai-security-meeting-mo5f</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T07:01:15.896Z</news:publication_date>
      <news:title>White House Engages Anthropic CEO on AI Security Risks</news:title>
      <news:keywords>Anthropic, Mythos, AI Security, Dario Amodei, National Security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/google-privacy-overhaul-android-17-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:33:10.238Z</news:publication_date>
      <news:title>Google Privacy Overhaul - Android 17 Blocks 8.3B Malicious Ads</news:title>
      <news:keywords>Google, Android 17, privacy overhaul, malvertising, Gemini AI</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/drupal-core-critical-cross-site-scripting-vulnerability-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:33:04.483Z</news:publication_date>
      <news:title>Drupal Core - Critical Cross-Site Scripting Vulnerability</news:title>
      <news:keywords>Drupal, SA-CORE-2026-001, Cross-site scripting</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/insurance-carriers-ai-coverage-exclusions-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:32:51.260Z</news:publication_date>
      <news:title>Insurance Carriers Withdraw Coverage for AI Outputs</news:title>
      <news:keywords>AI, insurance, cybersecurity, errors and omissions, liability</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/email-borne-worm-surge-industrial-control-systems-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:32:49.674Z</news:publication_date>
      <news:title>Email-Borne Worm Surge Drives New Threat Wave Across Industrial Control Systems</news:title>
      <news:keywords>Backdoor.MSIL.XWorm, phishing, industrial control systems, malware, Curriculum-vitae-catalina, email-borne worms, cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cios-security-concerns-ai-adoption-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:32:49.219Z</news:publication_date>
      <news:title>CIOs Face Rising Security Concerns Amid AI Adoption</news:title>
      <news:keywords>AI, CIO, security concerns, innovation, risk management</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/windows-zero-days-exploited-attacks-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:32:48.395Z</news:publication_date>
      <news:title>Windows Zero-Days - Exploited in Ongoing Attacks</news:title>
      <news:keywords>CVE-2026-33825, Windows 10, Windows 11, Microsoft Defender, Privilege Escalation, Windows, Zero-Day, Cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/glasswing-anthropic-cve-2026-4747-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:32:31.480Z</news:publication_date>
      <news:title>Glasswing&apos;s Limited Impact - Only One Confirmed CVE Found</news:title>
      <news:keywords>CVE-2026-4747, Project Glasswing, Anthropic, FreeBSD, VulnCheck</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/fortisandbox-vulnerability-poc-exploit-released-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:32:30.811Z</news:publication_date>
      <news:title>FortiSandbox Vulnerability - PoC Exploit Released Publicly</news:title>
      <news:keywords>CVE-2026-39808, FortiSandbox, Fortinet, vulnerability, exploit</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/underground-guide-vetting-stolen-credit-card-shops-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:32:26.649Z</news:publication_date>
      <news:title>Underground Guide - How Threat Actors Vet Carding Shops</news:title>
      <news:keywords>credit card fraud, cybercrime, carding shops, underground market, Flare</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/fake-slack-download-trojan-invisible-desktop-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:32:25.459Z</news:publication_date>
      <news:title>Fake Slack Download - Trojan Creates Invisible Desktop Access</news:title>
      <news:keywords>Slack, Trojan, Remote Access Trojan, HVNC, Typosquatting</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/anviz-multiple-products-vulnerabilities-explained-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:32:24.209Z</news:publication_date>
      <news:title>Anviz Multiple Products - Critical Vulnerabilities Exposed</news:title>
      <news:keywords>CVE-2026-32648, CVE-2026-40461, CVE-2026-35682, Anviz, CX2 Lite</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/adws-architecture-hides-powershell-enumeration-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:32:23.790Z</news:publication_date>
      <news:title>ADWS Architecture - Evasion of PowerShell AD Enumeration</news:title>
      <news:keywords>Active Directory, PowerShell, ADWS, Detection Evasion, Security Monitoring</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/windows-server-reboot-loops-april-patches-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:32:21.832Z</news:publication_date>
      <news:title>Windows Server Reboot Loops - April 2026 Patch Issues</news:title>
      <news:keywords>Windows Server 2025, Windows Server 2022, LSASS, Privileged Access Management, KB5082063</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/git-identity-spoof-ai-reviewer-bad-code-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:32:21.251Z</news:publication_date>
      <news:title>Git Identity Spoof - AI Reviewer Approves Malicious Code</news:title>
      <news:keywords>Claude, Git, Manifold Security, AI Review, Identity Spoofing</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/europol-email-ddos-attackers-stop-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:32:21.025Z</news:publication_date>
      <news:title>Europol Emails 75,000 DDoS Attackers to Cease Activities</news:title>
      <news:keywords>DDoS, Europol, cybercrime, Operation PowerOFF, for-hire services</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ukraine-apt28-campaign-targeting-prosecutors-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:32:16.463Z</news:publication_date>
      <news:title>APT28 Campaign - Ukraine Confirms Targeting of Prosecutors</news:title>
      <news:keywords>APT28, Roundcube, Ukraine, cyber-espionage, GRU</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/security-mindsets-to-abandon-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:32:13.718Z</news:publication_date>
      <news:title>Security Mindsets - 6 Mindsets to Abandon Now</news:title>
      <news:keywords>Cybersecurity, Mindset, Burnout, IT Security, Security Awareness</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/push-notifications-betray-privacy-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:32:12.758Z</news:publication_date>
      <news:title>Push Notifications - How They Can Compromise Your Privacy</news:title>
      <news:keywords>push notifications, privacy, law enforcement, Apple, Google</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/gitlab-18-11-ai-security-fixes-pipeline-analytics-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:32:09.146Z</news:publication_date>
      <news:title>GitLab 18.11 - Enhancing Security with Agentic AI</news:title>
      <news:keywords>GitLab, AI, DevSecOps, security remediation, pipeline configuration</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/horner-automation-cscape-xl4-xl7-plc-vulnerability-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:32:06.183Z</news:publication_date>
      <news:title>Horner Automation - Critical Vulnerability in PLC Systems</news:title>
      <news:keywords>CVE-2026-6284, Horner Automation, Cscape, XL4 PLC, XL7 PLC</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/microsoft-windows-recall-data-extraction-vulnerability-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:32:04.125Z</news:publication_date>
      <news:title>Microsoft Windows Recall - Vulnerable to Silent Data Extraction</news:title>
      <news:keywords>Microsoft, Windows Recall, Alexander Hagenah</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/north-korea-targets-macos-users-heist-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:32:03.884Z</news:publication_date>
      <news:title>North Korea Targets macOS Users in Latest Heist Alert, Fake Zoom Update Used</news:title>
      <news:keywords>North Korea, Sapphire Sleet, macOS, malware, social engineering, cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/fiverr-leaks-user-information-google-indexing-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:32:03.855Z</news:publication_date>
      <news:title>Fiverr Privacy Incident - User Data Leaked to Google Indexing</news:title>
      <news:keywords>Fiverr, PII, Cloudinary, FTC Safeguards Rule, Gramm-Leach-Bliley Act, privacy, data breach, Google indexing</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/hashicorp-vault-vulnerabilities-april-2026-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:32:02.090Z</news:publication_date>
      <news:title>HashiCorp Vault - Multiple Vulnerabilities Discovered</news:title>
      <news:keywords>HashiCorp, Vault, HCSEC-2026-05, HCSEC-2026-06</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/systemic-flaws-and-data-breach-updates-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:32:01.607Z</news:publication_date>
      <news:title>Data Breaches and Flaws - NIST and Cisco Face Challenges</news:title>
      <news:keywords>NIST, Cisco, Splunk, McGraw Hill, Tennessee hospital</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ftp-servers-exposed-2026-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:32:01.071Z</news:publication_date>
      <news:title>Nearly 6 Million Internet-Facing FTP Servers Still Exposed in 2026</news:title>
      <news:keywords>FTP, Censys, TLS, IIS, Pure-FTPd, security, encryption, vulnerabilities, data exposure</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/madison-square-garden-surveillance-secrets-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:32:00.592Z</news:publication_date>
      <news:title>Madison Square Garden&apos;s Surveillance - Tracking Controversies Exposed</news:title>
      <news:keywords>Madison Square Garden, Jim Dolan, surveillance, face-recognition, privacy invasion</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cochat-launches-ai-collaboration-platform-shadow-ai-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:32:00.065Z</news:publication_date>
      <news:title>CoChat Launches AI Collaboration Platform to Combat Shadow AI</news:title>
      <news:keywords>CoChat, Shadow AI, AI collaboration, OpenClaw, LLMs</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/uac-0247-targets-ukrainian-clinics-malware-campaign-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:59.852Z</news:publication_date>
      <news:title>UAC-0247 - Data-Theft Malware Targets Ukrainian Clinics</news:title>
      <news:keywords>UAC-0247, AGINGFLY, ChromElevator, WhatsApp, CERT-UA</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/event-5156-adws-attribution-solved-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:59.312Z</news:publication_date>
      <news:title>Event 5156 - Solving ADWS Attribution Challenges</news:title>
      <news:keywords>Event 5156, Active Directory, ADWS, SIEM, BloodHound</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/staging-environments-importance-security-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:59.156Z</news:publication_date>
      <news:title>Staging Environments - Critical Security Oversight Revealed</news:title>
      <news:keywords>staging environments, cybersecurity, attack surface, vulnerability, incident response</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/delta-electronics-asda-soft-vulnerability-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:58.408Z</news:publication_date>
      <news:title>Delta Electronics ASDA-Soft - Critical Vulnerability Alert</news:title>
      <news:keywords>CVE-2026-5726, Delta Electronics, ASDA-Soft, buffer overflow, critical manufacturing</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/palo-alto-ai-security-initiative-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:56.183Z</news:publication_date>
      <news:title>Palo Alto Networks - AI Security Initiative Signals Change</news:title>
      <news:keywords>Palo Alto Networks, Project Glasswing, AI, Cybersecurity, Helmut Reisinger</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/clickfix-phishing-campaign-claude-installer-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:54.659Z</news:publication_date>
      <news:title>ClickFix Phishing Campaign - Masquerading as Claude Installer</news:title>
      <news:keywords>ClickFix, Phishing, Rapid7, Claude, Incident Response</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/epic-amicus-brief-surveillance-first-amendment-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:51.939Z</news:publication_date>
      <news:title>EPIC Files Amicus Brief Against Big Tech&apos;s Surveillance Claims</news:title>
      <news:keywords>EPIC, South Carolina, Age-Appropriate Design Code, NetChoice, Big Tech</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/global-adware-av-killer-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:50.421Z</news:publication_date>
      <news:title>Global Adware - Transforms Into an AV Killer</news:title>
      <news:keywords>Dragon Boss, adware, Windows Defender</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/your-shipment-has-arrived-email-hides-remote-access-software-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:49.452Z</news:publication_date>
      <news:title>Malware - DHL Shipment Email Hides Remote Access Software</news:title>
      <news:keywords>SimpleHelp, DHL, remote access, malware, ransomware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ciso-reporting-line-debate-cybersecurity-leadership-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:48.351Z</news:publication_date>
      <news:title>CISO Reporting Line Debate - Insights on Cybersecurity Leadership</news:title>
      <news:keywords>CISO, cybersecurity leadership, reporting line, organizational structure, governance</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/social-media-bans-kids-privacy-risks-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:47.589Z</news:publication_date>
      <news:title>Social Media Bans - Risks of Increased Data Collection</news:title>
      <news:keywords>social media, age verification, privacy concerns, data breach, cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/threatsday-bulletin-defender-0-day-sonicwall-brute-force-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:47.480Z</news:publication_date>
      <news:title>Defender 0-Day and SonicWall Brute-Force Attacks Unveiled</news:title>
      <news:keywords>Microsoft Defender, CVE-2026-33825, UNC1069, JanaWare, Zerion</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cisco-ios-xe-flash-memory-overflow-vulnerability-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:44.953Z</news:publication_date>
      <news:title>Cisco IOS XE - Critical Flash Memory Overflow Vulnerability</news:title>
      <news:keywords>Cisco, IOS XE, access points, flash memory overflow, vulnerability</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/shinyhunters-kemper-corporation-hack-exposes-records-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:43.340Z</news:publication_date>
      <news:title>Kemper Corporation Hack - ShinyHunters Exposes 13M Records</news:title>
      <news:keywords>Kemper Corporation, ShinyHunters, data breach, 13 million records, cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/powmix-botnet-compromises-czech-workforce-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:42.268Z</news:publication_date>
      <news:title>PowMix Botnet - Covertly Compromises Czech Workforce with Advanced Techniques</news:title>
      <news:keywords>PowMix, botnet, Czech Republic, malware, cybersecurity, phishing</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/multiple-attacks-weaponizing-marimo-rce-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:41.565Z</news:publication_date>
      <news:title>Multiple Attacks Exploit Critical Marimo RCE Vulnerability</news:title>
      <news:keywords>Marimo, RCE, vulnerability</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/endpoint-detection-response-explained-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:41.452Z</news:publication_date>
      <news:title>Endpoint Detection - Understanding Its Importance</news:title>
      <news:keywords>Endpoint Detection, Cybersecurity, Remote Access, Threat Report, Arctic Wolf</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/building-cryptographic-inventory-quantum-safe-readiness-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:41.281Z</news:publication_date>
      <news:title>Building Cryptographic Inventory - Strengthening Quantum-Safe Readiness</news:title>
      <news:keywords>Microsoft, cryptographic inventory, quantum-safe, security tools, PQC</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cve-2026-39987-marimo-backdoor-hugging-face-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:41.204Z</news:publication_date>
      <news:title>CVE-2026-39987 - Critical Vulnerability Exploited for Backdoor</news:title>
      <news:keywords>CVE-2026-39987, NKAbuse, marimo, Hugging Face, kagent, backdoor, cybersecurity, vulnerability, malware, remote code execution</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/q1-2026-vulnerability-statistics-overview-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:41.150Z</news:publication_date>
      <news:title>Q1 2026 Vulnerability Statistics - Key Trends Revealed</news:title>
      <news:keywords>CVE, AI, vulnerability statistics, patch management, automation platforms</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/anthropic-mcp-design-flaw-risk-200k-servers-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:40.908Z</news:publication_date>
      <news:title>Anthropic MCP Design Flaw Puts 200K Servers at Risk, Exposes 150 Million Downloads</news:title>
      <news:keywords>Anthropic, MCP, CVE-2026-30625, CVE-2025-65720, CVE-2026-30615, AI, Open Source, Vulnerability, Security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cursor-ai-vulnerability-exposed-developer-devices-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:39.586Z</news:publication_date>
      <news:title>Cursor AI Vulnerability - Exposed Developer Devices Risk</news:title>
      <news:keywords>Cursor AI, sandbox bypass, remote tunnel, indirect prompt injection</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/republican-mutiny-sinks-trump-surveillance-extension-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:38.303Z</news:publication_date>
      <news:title>Republican Mutiny Sinks Trump&apos;s Push to Extend Surveillance</news:title>
      <news:keywords>Section 702, FBI, Donald Trump, House Freedom Caucus, surveillance</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/adobe-security-advisory-april-2026-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:37.820Z</news:publication_date>
      <news:title>Adobe Security Advisory - Critical Vulnerabilities Addressed</news:title>
      <news:keywords>Adobe Acrobat, Adobe Reader, Adobe Connect, Adobe Photoshop, Adobe ColdFusion</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/virginia-bans-sale-geolocation-data-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:37.788Z</news:publication_date>
      <news:title>Virginia Bans Sale of Precise Geolocation Data - New Law Enacted</news:title>
      <news:keywords>Virginia, geolocation data, S.B. 338, privacy law, EPIC</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cloudflare-agent-memory-introduction-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:37.748Z</news:publication_date>
      <news:title>Cloudflare Introduces Agent Memory for AI Agents</news:title>
      <news:keywords>Cloudflare, Agent Memory, AI agents</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/operation-poweroff-seizes-ddos-domains-criminal-accounts-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:37.432Z</news:publication_date>
      <news:title>Operation PowerOFF - Seizes 53 DDoS Domains Worldwide, 75,000 Warned</news:title>
      <news:keywords>DDoS, Operation PowerOFF, Europol, cybercrime, botnet, Cybercrime, Law Enforcement, Cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cisco-webex-sso-flaw-certificate-update-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:37.132Z</news:publication_date>
      <news:title>Cisco Webex SSO Flaw - Critical Certificate Update Required</news:title>
      <news:keywords>CVE-2026-20184, Cisco Webex, SAML certificate, SSO, identity provider, Cisco, Webex, Vulnerability, Security, Identity Management, Vulnerabilities, Identity Services</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cookeville-regional-medical-center-data-breach-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:37.003Z</news:publication_date>
      <news:title>Cookeville Regional Medical Center - Major Data Breach Exposed Over 337K Patients</news:title>
      <news:keywords>Cookeville Regional Medical Center, Rhysida, ransomware, data breach, identity theft protection, healthcare security, Ransomware, Data Breach, Healthcare, Cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/apk-malformation-android-malware-samples-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:36.551Z</news:publication_date>
      <news:title>APK Malformation - New Evasion Tactic Found in Android Malware</news:title>
      <news:keywords>Android, APK malformation, malware evasion, Cleafy, Teabot</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/bluehammer-poc-exploit-released-microsoft-dispute-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:36.208Z</news:publication_date>
      <news:title>BlueHammer PoC Exploit Released After Microsoft Dispute, Hackers Now Exploiting Vulnerabilities</news:title>
      <news:keywords>CVE-2026-33825, Microsoft Defender, Chaotic Eclipse, Microsoft, Vulnerability, Exploit, Cybersecurity, BlueHammer, RedSun</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/icloud-storage-scam-payment-details-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:34.729Z</news:publication_date>
      <news:title>iCloud Storage Scam - Urgent Warning for Apple Users</news:title>
      <news:keywords>iCloud, scam, phishing, Apple, Malwarebytes</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ot-vulnerability-management-unified-visibility-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:34.310Z</news:publication_date>
      <news:title>OT Vulnerability Management - Unlocking Unified Visibility</news:title>
      <news:keywords>Tenable, OT Security, Vulnerability Management</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/security-programs-modern-threats-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:33.966Z</news:publication_date>
      <news:title>Security Programs - Adapting to Modern Identity Threats</news:title>
      <news:keywords>Huntress, identity threats, cybersecurity, AI, security teams</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cloudflare-ai-gateway-inference-layer-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:31.949Z</news:publication_date>
      <news:title>Cloudflare AI Gateway - Unified Inference Layer for Developers</news:title>
      <news:keywords>Cloudflare, AI Gateway, Workers AI, multimodal models, Replicate</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cve-2026-33032-nginx-ui-missing-authentication-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:31.828Z</news:publication_date>
      <news:title>CVE-2026-33032 - Critical Nginx UI Authentication Flaw</news:title>
      <news:keywords>CVE-2026-33032, Nginx UI, Pluto Security, CVE-2026-27944, Yotam Perkal, Emerging Threats, Emergent Threat Response, Nginx, Vulnerability</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/zionsiphon-malware-targets-israeli-water-systems-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:31.696Z</news:publication_date>
      <news:title>ZionSiphon Malware - Targeting Israeli Water Systems Revealed</news:title>
      <news:keywords>ZionSiphon, water treatment systems, Darktrace, malware, OT security, water treatment, Israel, cybersecurity, OT systems, ICS</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/hpe-cray-supercomputing-ex420-vulnerability-advisory-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:30.805Z</news:publication_date>
      <news:title>HPE Cray Supercomputing EX420 - Security Vulnerabilities Addressed</news:title>
      <news:keywords>HPE, Cray Supercomputing, Intel TDX, vulnerability, security advisory</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/dutch-navy-frigate-location-bluetooth-tracker-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:30.574Z</news:publication_date>
      <news:title>Dutch Navy Frigate Location Exposed by Bluetooth Tracker</news:title>
      <news:keywords>Dutch Navy, Bluetooth Tracker, Operational Security, HNLMS Evertsen</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/temporary-fix-section-702-cyber-risk-concerns-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:30.206Z</news:publication_date>
      <news:title>Section 702 Extended - Cyber Risk Concerns Raised</news:title>
      <news:keywords>Section 702, CISA, ZionSiphon, ActiveMQ, WordPress</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/bluesky-ddos-attack-service-outages-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:29.474Z</news:publication_date>
      <news:title>Bluesky Faces Ongoing App Outages from DDoS Attack</news:title>
      <news:keywords>Bluesky, DDoS attack, cybersecurity, service outage, social media</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/apple-airtag-replay-bluetooth-signals-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:28.548Z</news:publication_date>
      <news:title>Apple AirTag - Replay Attack Misleads Location Tracking</news:title>
      <news:keywords>Apple, AirTag, Bluetooth, location tracking, relay attack</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/microsoft-defender-privilege-escalation-bug-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:28.229Z</news:publication_date>
      <news:title>Microsoft Defender - New Privilege Escalation Bug Discovered, Exploits in the Wild</news:title>
      <news:keywords>Microsoft Defender, RedSun, CVE-2026-33825, vulnerability, privilege escalation, cybersecurity, zero-day, Microsoft, Defender, Vulnerabilities, Cybersecurity, Exploits</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/server-room-lock-security-vulnerability-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:28.076Z</news:publication_date>
      <news:title>Server Room Lock - Major Security Vulnerability Exposed</news:title>
      <news:keywords>physical security, ISO 27001, two-factor authentication, server room, security vulnerability</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/house-extends-fisa-surveillance-program-10-days-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:27.116Z</news:publication_date>
      <news:title>House Extends FISA Surveillance Program for 10 Days</news:title>
      <news:keywords>FISA, Trump administration, government surveillance, privacy, Section 702</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/big-tech-quantum-security-readiness-2029-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:25.454Z</news:publication_date>
      <news:title>Big Tech Races for Quantum Security Readiness by 2029</news:title>
      <news:keywords>Google, Cloudflare, PQC, ECC, RSA</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/nigerian-scam-advance-fee-twist-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:25.234Z</news:publication_date>
      <news:title>Nigerian Scam - Classic Advance-Fee Scheme Still Thrives</news:title>
      <news:keywords>Nigerian scam, advance-fee scam, Malwarebytes, social engineering, scam awareness</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/youth-ai-privacy-act-senator-markey-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:24.269Z</news:publication_date>
      <news:title>Youth AI Privacy Act - Protecting Minors from Chatbot Harms</news:title>
      <news:keywords>Youth AI Privacy Act, Ed Markey, AI companies, chatbots, privacy guardrails</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/she-cyber-training-model-expands-beyond-eu-funding-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:23.555Z</news:publication_date>
      <news:title>SHE@CYBER - Training Model Expands Beyond EU Funding</news:title>
      <news:keywords>SHE@CYBER, ISACA, Erasmus+, cybersecurity training, women in tech</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/understanding-endpoints-in-cybersecurity-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:23.435Z</news:publication_date>
      <news:title>Understanding Endpoints - Importance in Cybersecurity</news:title>
      <news:keywords>endpoint security, telemetry, attack surface, remote access, cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/openai-gpt5-4-cyber-github-action-security-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:23.361Z</news:publication_date>
      <news:title>OpenAI&apos;s GPT-5.4-Cyber - New AI Model for Cybersecurity with Expanded Access</news:title>
      <news:keywords>OpenAI, GitHub Actions, AI Security, Cybersecurity, Automation, AI, GPT-5.4-Cyber, Vulnerabilities, cybersecurity, Trusted Access for Cyber</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/predictive-shielding-domain-compromise-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:22.721Z</news:publication_date>
      <news:title>Predictive Shielding - Stopping Domain Compromise in Its Tracks</news:title>
      <news:keywords>Microsoft Defender, Credential Theft, Domain Compromise</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/fake-claude-download-security-implications-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:22.584Z</news:publication_date>
      <news:title>Fake Claude Download - Security Risks of AI Tools Explored</news:title>
      <news:keywords>malware, AI tools, credential theft, malvertising, Huntress</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/proxy-execution-vulnerability-webview2-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:22.266Z</news:publication_date>
      <news:title>WebView2 Vulnerability - Exploitation Risks Explained</news:title>
      <news:keywords>WebView2, Microsoft Edge, DLL hijacking, domain_actions.dll, Cobalt Strike</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/express-customer-data-exposing-website-flaw-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:22.064Z</news:publication_date>
      <news:title>Express Remediates Customer Data-Exposing Website Flaw</news:title>
      <news:keywords>Express, customer data, website flaw, data breach, security flaw, privacy</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/supreme-court-hacker-sentenced-probation-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:21.662Z</news:publication_date>
      <news:title>Supreme Court Hacker Sentenced to Probation for Breach</news:title>
      <news:keywords>U.S. Supreme Court, Nicholas Moore, AmeriCorps, Department of Veterans Affairs, cybercrime</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/south-carolina-chatbot-regulation-epic-supports-bills-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:21.652Z</news:publication_date>
      <news:title>South Carolina Chatbot Regulation - EPIC Supports New Bills</news:title>
      <news:keywords>South Carolina, EPIC, chatbot regulation, data privacy, People-First Chatbot Bill</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/eliminate-ghost-identities-cloud-security-webinar-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:21.159Z</news:publication_date>
      <news:title>Eliminate Ghost Identities - Secure Your Cloud Environment</news:title>
      <news:keywords>cloud breaches, API keys, service accounts, identity management, enterprise security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/mythos-ai-security-exploits-vulnerabilities-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:20.629Z</news:publication_date>
      <news:title>AI Security - Anthropic&apos;s Mythos Model Raises Concerns About Data Security, Federal Agencies to Access Modified Version</news:title>
      <news:keywords>Claude Mythos, Anthropic, AI vulnerabilities, Project Glasswing, software security, AI, cybersecurity, vulnerabilities, data security, government</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/microsoft-teams-edge-update-paste-bug-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:20.202Z</news:publication_date>
      <news:title>Microsoft Teams - Right-Click Paste Bug Caused by Edge Update</news:title>
      <news:keywords>Microsoft Teams, Microsoft Edge, copy and paste, bug, update, Microsoft, Teams, Edge, Bug, Update, Paste Issue</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/coast-guard-cybersecurity-rules-lessons-for-cisos-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:19.934Z</news:publication_date>
      <news:title>Coast Guard&apos;s Cybersecurity Rules - Lessons for CISOs</news:title>
      <news:keywords>Maritime Transportation Security Act, CISO, OT security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/supply-chain-dependencies-blind-spots-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:19.473Z</news:publication_date>
      <news:title>Supply Chain Dependencies - Identifying Critical Blind Spots</news:title>
      <news:keywords>supply chain, cybersecurity, third-party risk, ESET, ransomware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/unweight-llm-compression-cloudflare-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:19.354Z</news:publication_date>
      <news:title>Unweight - Cloudflare&apos;s Lossless Compression for LLMs</news:title>
      <news:keywords>Unweight, Cloudflare, LLM, GPU, compression</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ransomware-attack-disrupts-healthcare-london-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:18.933Z</news:publication_date>
      <news:title>Ransomware Attack - Ongoing Disruption in London Healthcare</news:title>
      <news:keywords>Qilin ransomware, NHS, Synnovis, South London and Maudsley NHS Foundation Trust, ransomware attack</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/webinar-phishing-fallout-msps-security-recovery-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:18.352Z</news:publication_date>
      <news:title>Phishing Fallout - MSPs Must Rethink Security and Recovery</news:title>
      <news:keywords>phishing, MSP, Kaseya, cyber resilience, ransomware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/jetbrains-youtrack-vulnerability-advisory-av26-364-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:18.349Z</news:publication_date>
      <news:title>JetBrains Youtrack - Security Vulnerability Advisory Released</news:title>
      <news:keywords>JetBrains, Youtrack, AV26-364</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/chrome-exploit-opus-4-6-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:18.257Z</news:publication_date>
      <news:title>Chrome Vulnerability - Exploit Developed for $2,283</news:title>
      <news:keywords>Chrome, Exploit, V8 JavaScript Engine, Discord, Opus 4.6, Vulnerability, AI, Security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/eu-age-verification-app-hacked-in-2-minutes-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:16.667Z</news:publication_date>
      <news:title>EU Age Verification App - Hacked in Under 2 Minutes</news:title>
      <news:keywords>EU age verification app, security vulnerability, Paul Moore, Ursula von der Leyen, hacking</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/mozilla-thunderbolt-open-source-ai-client-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:16.648Z</news:publication_date>
      <news:title>Mozilla Launches Thunderbolt - Open-Source AI Client for Control</news:title>
      <news:keywords>Mozilla, Thunderbolt, open-source AI, Haystack platform, MZLA Technologies</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/critical-sandbox-bypass-thymeleaf-java-template-engine-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:16.217Z</news:publication_date>
      <news:title>Critical Vulnerability in Thymeleaf - Immediate Action Required</news:title>
      <news:keywords>CVE-2026-40478, Thymeleaf, Java, Server-Side Template Injection, Spring Framework</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cve-2023-33538-tplink-command-injection-exploitation-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:16.001Z</news:publication_date>
      <news:title>CVE-2023-33538 - Exploitation Attempts Analyzed with New Insights</news:title>
      <news:keywords>CVE-2023-33538, TP-Link, Mirai, Command Injection, IoT Security, Botnet, Command injection, WiFi routers</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/april-2026-patch-tuesday-vulnerabilities-released-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:15.699Z</news:publication_date>
      <news:title>April 2026 Patch Tuesday - Microsoft Releases 167 Vulnerabilities, Significant Increase in Submissions</news:title>
      <news:keywords>CVE-2026-32201, CVE-2026-33825, CVE-2026-33824, CVE-2026-33826, Microsoft, Patch Tuesday, vulnerabilities, security, AI, cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/draftkings-hacker-sentenced-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:14.958Z</news:publication_date>
      <news:title>DraftKings Hacker Sentenced - Stokes Sold Stolen Credentials from Massive Attack</news:title>
      <news:keywords>DraftKings, Kamerin Stokes, stolen credentials, Credential Stuffing, Hacking, Cybercrime, Data Breach, credential stuffing, hacking, cybercrime, data breach</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/third-party-notices-supply-chain-security-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:14.541Z</news:publication_date>
      <news:title>Third-Party Notices - Addressing Compliance Challenges</news:title>
      <news:keywords>Third-Party Notices, Software Supply Chain, Open Source, Compliance, Security Intelligence</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cybercrime-trends-latin-america-caribbean-2025-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:14.530Z</news:publication_date>
      <news:title>Cybercrime Trends - Insights from Latin America and Caribbean</news:title>
      <news:keywords>Insikt Group, ransomware, malicious actors, LAC, cybercrime</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/quantum-security-improvements-trail-of-bits-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:13.270Z</news:publication_date>
      <news:title>Quantum Security - Trail of Bits Improves Google’s Proof</news:title>
      <news:keywords>Google, Trail of Bits, zero-knowledge proof, quantum cryptography, Rust</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/sapphire-sleet-macos-intrusion-campaign-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:12.840Z</news:publication_date>
      <news:title>Sapphire Sleet - Analyzing macOS Intrusion Campaign with New Insights</news:title>
      <news:keywords>Sapphire Sleet, macOS, credential theft, social engineering, North Korea, Credential theft, Elevation of privilege, Phishing, Sleet</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/oklahoma-alabama-weak-privacy-laws-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:12.709Z</news:publication_date>
      <news:title>Oklahoma and Alabama Enact Weak Privacy Laws for Consumers</news:title>
      <news:keywords>Oklahoma, Alabama, privacy laws</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/foxit-libraw-vulnerabilities-disclosed-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:12.439Z</news:publication_date>
      <news:title>Foxit Reader and LibRaw Vulnerabilities Disclosed</news:title>
      <news:keywords>Foxit Reader, LibRaw, CVE-2026-3779, CVE-2026-20911, CVE-2026-21413</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/dragon-boss-solutions-malware-supply-chain-risk-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:11.574Z</news:publication_date>
      <news:title>Dragon Boss Solutions - Malware Operation Exposed with Risk</news:title>
      <news:keywords>Dragon Boss Solutions, adware, malware, Huntress, AV killer</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/tycoon-2fa-loses-phishing-kit-crown-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:10.924Z</news:publication_date>
      <news:title>Tycoon 2FA - Phishing Kit Crown Lost Amid Attack Surge</news:title>
      <news:keywords>Tycoon 2FA, Mamba 2FA, EvilProxy, phishing, Barracuda Networks</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/agentic-ai-have-i-been-pwned-apis-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:10.130Z</news:publication_date>
      <news:title>Agentic AI - Exploring Have I Been Pwned&apos;s APIs</news:title>
      <news:keywords>Have I Been Pwned, OpenClaw, AI applications</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/uk-government-alarm-ai-security-risk-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:09.298Z</news:publication_date>
      <news:title>UK Government Sounds Alarm Over AI Security Risks Amid Congressional Concerns</news:title>
      <news:keywords>UK Government, AI Security, Cyber Threats, National Cyber Security Centre, Cyber Essentials, Cybersecurity, Government, Regulation, Threat Intelligence</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/defending-enterprise-ai-models-vulnerabilities-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:09.109Z</news:publication_date>
      <news:title>AI Security - Defending Enterprises Against AI-Driven Threats</news:title>
      <news:keywords>AI models, vulnerability discovery, exploit development, security operations, zero trust</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cve-2026-34197-apache-activemq-patch-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:08.883Z</news:publication_date>
      <news:title>Apache ActiveMQ Vulnerability - CISA Urges Immediate Patching</news:title>
      <news:keywords>CVE-2026-34197, Apache ActiveMQ, remote code execution, CISA, Jolokia API, Vulnerability, Cybersecurity, Remote Code Execution</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/steaelite-rat-enables-double-extortion-attacks-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:08.717Z</news:publication_date>
      <news:title>Steaelite RAT - New Trojan Enables Double Extortion Attacks</news:title>
      <news:keywords>Steaelite RAT, BlackFog, double extortion, remote access trojan, credential theft</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/government-ai-surveillance-data-privacy-loopholes-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:08.622Z</news:publication_date>
      <news:title>Government AI Surveillance - Urgent Call to Protect Privacy</news:title>
      <news:keywords>Section 702, data brokers, surveillance, AI, Fourth Amendment</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/tracking-nexcorium-iot-botnet-campaign-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:08.293Z</news:publication_date>
      <news:title>Nexcorium - Tracking a New IoT Botnet Campaign Targeting TBK DVRs</news:title>
      <news:keywords>Nexcorium, CVE-2024-3721, CVE-2017-17215, Mirai, TBK DVR, IoT, DDoS, Fortinet, botnet, IoT security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/north-korea-laptop-farm-facilitators-sentenced-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:08.011Z</news:publication_date>
      <news:title>North Korean Laptop Farm Facilitators Sentenced to Prison for Espionage and Fraud</news:title>
      <news:keywords>North Korea, Kejia Wang, Zhenxing Wang, FBI, IT worker scheme, Espionage, Cybersecurity, Fraud, Identity Theft</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/aveva-pipeline-simulation-unauthenticated-access-vulnerability-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:07.958Z</news:publication_date>
      <news:title>AVEVA Pipeline Simulation - Critical Vulnerability Exposed</news:title>
      <news:keywords>AVEVA Pipeline Simulation, CVE-2026-5387, Critical Manufacturing, Missing Authorization, Privilege Escalation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/tenable-hexa-ai-automated-patching-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:07.591Z</news:publication_date>
      <news:title>Tenable Hexa AI - Automating Patching Against Machine-Speed Threats</news:title>
      <news:keywords>Tenable Hexa AI, Claude Mythos, vulnerability management, automated patching, risk reduction</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ai-mediated-narratives-new-threat-vector-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:07.164Z</news:publication_date>
      <news:title>AI-Mediated Narratives - New Threat Vector Emerges</news:title>
      <news:keywords>AI-generated narratives, cyber crisis response, false breaches, narrative response, cybersecurity communication</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/apple-fix-iphone-passcode-bug-czech-keyboard-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:06.672Z</news:publication_date>
      <news:title>Apple Works on Fix for iPhone Passcode Bug Linked to Keyboard</news:title>
      <news:keywords>iOS 26, Apple, Czech keyboard, passcode bug, Connor Byrne, iPhone, passcode, keyboard bug, security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/google-gemini-ai-wipes-out-scam-ads-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:05.474Z</news:publication_date>
      <news:title>Google&apos;s Gemini AI - 602 Million Scam Ads Blocked</news:title>
      <news:keywords>Google, Gemini AI, malvertising, scam ads, cybercrime</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/anonymous-s3-requests-evade-aws-logging-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:05.008Z</news:publication_date>
      <news:title>Anonymous S3 Requests - Evading AWS Logging Exposed</news:title>
      <news:keywords>AWS, CloudTrail, S3, VPC, Varonis</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cyber-centre-ciren-initiative-critical-infrastructure-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:04.917Z</news:publication_date>
      <news:title>Cyber Centre Launches CIREN Initiative for Critical Infrastructure</news:title>
      <news:keywords>CIREN, Canadian Centre for Cyber Security, critical infrastructure, cyber threats, AI</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/singer-loses-life-savings-fake-wallet-app-store-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:04.379Z</news:publication_date>
      <news:title>Singer Loses Life Savings to Fake Wallet Downloaded from App Store</news:title>
      <news:keywords>G. Love, Ledger Live, cryptocurrency, Apple App Store, scam</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/grinex-cryptocurrency-exchange-hack-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:03.908Z</news:publication_date>
      <news:title>Grinex Cryptocurrency Exchange - $15 Million Heist Revealed</news:title>
      <news:keywords>Grinex, TokenSpot, cryptocurrency exchange, hack, USDT, cryptocurrency, cybercrime, Russia, heist, hacking, sanctions</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/strengthening-cyber-resilience-nhs-collaboration-innovation-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:03.618Z</news:publication_date>
      <news:title>NHS Cyber Resilience - Strengthening Through Collaboration</news:title>
      <news:keywords>NHS, NCSC, cyber resilience, Active Cyber Defence, vulnerability management</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cargo-thieving-hackers-remote-access-campaigns-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:03.601Z</news:publication_date>
      <news:title>Cargo Thieving Hackers - Sophisticated Remote Access Campaigns</news:title>
      <news:keywords>Proofpoint, cargo theft, remote access tools, cybercrime, logistics industry</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/microsoft-teams-helpdesk-impersonation-data-exfiltration-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:02.338Z</news:publication_date>
      <news:title>Microsoft Teams - Helpdesk Impersonation Leads to Data Theft</news:title>
      <news:keywords>Microsoft Teams, data exfiltration, remote access, social engineering, Microsoft Defender</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/w3ll-unmasked-global-phishing-takedown-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:01.694Z</news:publication_date>
      <news:title>W3LL Unmasked - Takedown of Global Phishing Ecosystem</news:title>
      <news:keywords>phishing, W3LL, cybercrime, malware, fraud prevention, international cooperation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/iac-inventory-unified-view-code-deployments-cloud-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:01.624Z</news:publication_date>
      <news:title>IaC Inventory - Unified View Enhances Cloud Security</news:title>
      <news:keywords>Wiz Code, IaC Inventory, AI applications, Pulumi, cloud security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/metasploit-wrap-up-april-2026-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:01.495Z</news:publication_date>
      <news:title>Metasploit - Seven New Modules Released This Week</news:title>
      <news:keywords>Metasploit, AVideo, openDCIM, Selenium Grid, ChurchCRM</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ai-guardrails-fail-microsoft-copilot-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:01.029Z</news:publication_date>
      <news:title>AI Guardrails Fail - Microsoft 365 Copilot Bug Exposed Risks</news:title>
      <news:keywords>Microsoft 365 Copilot, AI governance, Data Loss Prevention, sensitivity labels, Data Protection Act</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/qemu-abused-ransomware-delivery-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:31:00.468Z</news:publication_date>
      <news:title>QEMU Abuse - Ransomware Delivery and Evasion Techniques</news:title>
      <news:keywords>QEMU, PayoutsKing, ransomware, STAC4713, STAC3725, Ransomware, Cybersecurity, Malware, Data Theft</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/protobuf-js-rce-vulnerability-exploit-released-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:30:59.787Z</news:publication_date>
      <news:title>Protobuf.js RCE Vulnerability - Critical Flaw Exposed</news:title>
      <news:keywords>protobuf.js, RCE, JavaScript, Endor Labs, GHSA-xq3m-2v4x-88gg</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/what-is-a-proxy-server-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:30:59.750Z</news:publication_date>
      <news:title>Proxy Server - Understanding Its Role in Network Security</news:title>
      <news:keywords>proxy server, network security, traffic control</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/data-breach-scam-alerts-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:30:59.702Z</news:publication_date>
      <news:title>Data Breach Alerts - Beware of Potential Scams</news:title>
      <news:keywords>data breach scams, phishing, identity theft</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/business-impersonation-fraud-ai-scams-checks-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:30:59.605Z</news:publication_date>
      <news:title>Business Impersonation Fraud - AI Scams and Check Fraud Rise</news:title>
      <news:keywords>business impersonation, AI scams, check fraud, online shopping scams, financial institutions</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/maine-online-data-privacy-act-fails-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:30:59.205Z</news:publication_date>
      <news:title>Maine Online Data Privacy Act - Legislation Fails to Pass</news:title>
      <news:keywords>Maine Online Data Privacy Act, data protection, privacy legislation, EPIC, data minimization</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/openai-cyber-defense-initiative-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:30:58.526Z</news:publication_date>
      <news:title>OpenAI&apos;s Cyber Defense Initiative - Strengthening Global Security with CrowdStrike and Frontier AI Insights</news:title>
      <news:keywords>OpenAI, GPT-5.4-Cyber, cyber defense, API grants, CrowdStrike, cybersecurity, AI, Trusted Access for Cyber, Cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/insider-threats-behaviors-to-spot-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:30:58.137Z</news:publication_date>
      <news:title>Insider Threats - 6 Behaviors Your Solution Must Spot</news:title>
      <news:keywords>insider threats, data loss prevention, AI tools, behavioral analytics, Mimecast</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/surveillance-law-congress-702-expiration-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:30:54.278Z</news:publication_date>
      <news:title>Surveillance Law Faces Expiration Amid Privacy Concerns and Calls for Reform</news:title>
      <news:keywords>Section 702, FISA, privacy concerns, surveillance law, Congress, surveillance, privacy, civil liberties, NSA, government reform</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/mythos-memory-loss-infosec-missing-mo5e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T06:30:51.890Z</news:publication_date>
      <news:title>Mythos - Understanding Its Impact on InfoSec Practices</news:title>
      <news:keywords>Mythos, AI, vulnerability research, ransomware, extortion</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/securing-ai-applications-from-inception-to-deployment-mo2n</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-17T08:31:08.622Z</news:publication_date>
      <news:title>Securing AI Applications - Protecting from Inception to Deployment</news:title>
      <news:keywords>Wiz Code, AI, Application Security, SAST, Red Agent</news:keywords>
    </news:news>
  </url>
</urlset>