<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
  <url>
    <loc>https://cyberpings.com/article/collapse-of-the-patch-window-mnt2</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T15:31:47.652Z</news:publication_date>
      <news:title>Vulnerabilities - Exploitation Speed Accelerates Significantly</news:title>
      <news:keywords>vulnerability exploitation, AI-assisted tooling, React2Shell</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/iran-hackers-target-critical-infrastructure-mnt1</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T15:05:09.234Z</news:publication_date>
      <news:title>Iran Hackers Target Critical Infrastructure - Industry Reactions</news:title>
      <news:keywords>Iran, CISA, Rockwell Automation, SCADA, PLC</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/danii-shchukin-europol-most-wanted-hacker-mnt1</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T15:02:04.627Z</news:publication_date>
      <news:title>Danii Shchukin - Europol Names Notorious Ransomware Leader</news:title>
      <news:keywords>Danii Shchukin, GandCrab, Anatoly Kravchuk, Europol, ransomware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/france-ditches-windows-for-linux-mnt1</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T15:01:54.192Z</news:publication_date>
      <news:title>France Ditches Windows for Linux to Boost Digital Sovereignty</news:title>
      <news:keywords>France, Linux, Microsoft, digital sovereignty, open-source</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/section-702-privacy-reform-urgent-action-needed-mnt1</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T15:01:52.182Z</news:publication_date>
      <news:title>Section 702 - Urgent Action Needed for Privacy Reform</news:title>
      <news:keywords>Section 702, FISA, NSA, privacy reform, surveillance</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cyberattack-strikes-stryker-jones-day-breach-mnt1</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T15:01:34.361Z</news:publication_date>
      <news:title>Cyberattack Strikes Stryker, Jones Day Breach Exposed Data</news:title>
      <news:keywords>Stryker, Jones Day, DocketWise, FlamingChina, NotnullOSX</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/d-link-dir-650in-authenticated-command-injection-mnt0</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T14:33:01.910Z</news:publication_date>
      <news:title>D-Link DIR-650IN - Authenticated Command Injection Vulnerability</news:title>
      <news:keywords>D-Link, DIR-650IN, Authenticated Command Injection, CVE: N/A, Sanjay Singh</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cisa-kev-remediation-analysis-limits-human-security-mnt0</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T14:32:05.240Z</news:publication_date>
      <news:title>CISA KEV Remediation Analysis - Limits of Human Security Exposed</news:title>
      <news:keywords>CISA, Qualys, vulnerability management, remediation, AI in cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/netbt-e-fatura-privilege-escalation-vulnerability-mnt0</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T14:31:57.412Z</news:publication_date>
      <news:title>NetBT e-Fatura - Privilege Escalation Vulnerability Exposed</news:title>
      <news:keywords>CVE-2025-14018, NetBT e-Fatura, Seccops</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/russian-gru-exploiting-vulnerable-routers-mnt0</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T14:31:54.166Z</news:publication_date>
      <news:title>Russian GRU - Exploiting Vulnerable Routers to Steal Data, Operation Masquerade Disrupts Network</news:title>
      <news:keywords>Russian GRU, cyber security advisory, vulnerable routers, DNS hijacking, SOHO routers, GRU, cybersecurity, routers, APT28, Operation Masquerade, router vulnerabilities</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/glassworm-campaign-zig-dropper-infects-developer-ides-mnt0</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T14:31:53.344Z</news:publication_date>
      <news:title>GlassWorm Campaign - Zig Dropper Infects Developer IDEs</news:title>
      <news:keywords>GlassWorm, Zig dropper, VS Code, malware, remote access trojan</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/case-for-funding-strong-effective-cisa-mnt0</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T14:31:50.060Z</news:publication_date>
      <news:title>CISA Funding Cuts - A Threat to National Cybersecurity Strategy</news:title>
      <news:keywords>CISA, cybersecurity funding, national security, AI threats, budget cuts</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/florida-investigates-openai-chatgpt-role-shooting-mnt0</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T14:31:40.594Z</news:publication_date>
      <news:title>Florida Investigates OpenAI - ChatGPT&apos;s Role in Shooting</news:title>
      <news:keywords>OpenAI, ChatGPT, Florida State University, mass shooting, AI psychosis</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/bts-world-tour-ticket-scam-mnsz</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T14:01:49.892Z</news:publication_date>
      <news:title>BTS World Tour Ticket Scam - Cybercriminals Target Fans</news:title>
      <news:keywords>BTS, ticket scam, cybercrime, Kaspersky, Brazil</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/hungarian-government-email-passwords-exposed-mnsy</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T13:31:53.155Z</news:publication_date>
      <news:title>Hungarian Government Email Passwords Exposed Ahead of Election</news:title>
      <news:keywords>Hungarian government, email accounts, password exposure, Bellingcat, national security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/uk-exposes-russian-submarine-activity-undersea-cables-mnsy</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T13:31:39.223Z</news:publication_date>
      <news:title>UK Exposes Russian Submarine Activity Near Undersea Cables</news:title>
      <news:keywords>Russia, undersea cables, GUGI, UK Ministry of Defence, submarine activity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/industrial-controllers-vulnerable-cyber-conflicts-mnsy</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T13:31:36.526Z</news:publication_date>
      <news:title>Industrial Controllers Vulnerable - Cyber Conflicts Intensify</news:title>
      <news:keywords>programmable logic controllers, operational technology, US government, vulnerabilities, cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/capability-centric-governance-access-control-legacy-systems-mnsx</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T13:01:44.612Z</news:publication_date>
      <news:title>Capability-Centric Governance - Redefining Access Control</news:title>
      <news:keywords>access governance, identity management, IBM, z/OS, capability-centric</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/tenable-hexa-ai-axios-supply-chain-attack-response-mnsv</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T12:31:55.850Z</news:publication_date>
      <news:title>Tenable Hexa AI - Responding to Axios Supply Chain Threat</news:title>
      <news:keywords>Tenable Hexa AI, Axios npm, supply chain attack, vulnerability management, agentic AI</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ai-router-vulnerabilities-inject-malicious-code-mnsv</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T12:31:50.995Z</news:publication_date>
      <news:title>AI Router Vulnerabilities - Attackers Inject Malicious Code</news:title>
      <news:keywords>AI agents, API routers, malicious code, UC Santa Barbara, LLM supply chain</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/chrome-147-patches-60-vulnerabilities-critical-flaws-mnsu</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T12:03:27.901Z</news:publication_date>
      <news:title>Chrome 147 Patches 60 Vulnerabilities, Two Critical Flaws</news:title>
      <news:keywords>CVE-2026-5858, CVE-2026-5859, Chrome, WebML, Google</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/little-snitch-linux-network-monitoring-mnst</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T11:32:53.689Z</news:publication_date>
      <news:title>Little Snitch for Linux - New Tool Monitors App Connections</news:title>
      <news:keywords>Little Snitch, Linux, eBPF, network monitoring, Objective Development</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/uk-government-signal-jammers-regulation-mnst</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T11:31:36.893Z</news:publication_date>
      <news:title>UK Government Considers Ban on Signal Jammers Amid Concerns</news:title>
      <news:keywords>UK Government, signal jammers, crime prevention, telecommunications, public safety</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/poisoned-office-365-search-results-stolen-paychecks-mnst</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T11:31:36.612Z</news:publication_date>
      <news:title>Poisoned Office 365 Search Results Lead to Stolen Paychecks</news:title>
      <news:keywords>Storm-2755, Office 365, malvertising, phishing, AiTM</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/gmail-end-to-end-encryption-mobile-mnsq</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T10:01:53.608Z</news:publication_date>
      <news:title>Gmail - End-to-End Encryption Now Available on Mobile</news:title>
      <news:keywords>Gmail, encryption, Google, mobile security, client-side encryption</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/mitre-releases-fight-fraud-framework-mnsq</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T10:01:29.789Z</news:publication_date>
      <news:title>MITRE Releases Fight Fraud Framework to Combat Fraudsters</news:title>
      <news:keywords>MITRE F3, fraud detection, cyber fraud, TTPs, behavior-based model</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cmmc-compliance-age-of-ai-mnsp</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T09:32:14.134Z</news:publication_date>
      <news:title>CMMC Compliance - Navigating AI&apos;s Role in Regulations</news:title>
      <news:keywords>CMMC 2.0, AI, federal contractors, compliance, CUI</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/critical-marimo-flaw-exploited-hours-after-disclosure-mnsp</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T09:31:38.727Z</news:publication_date>
      <news:title>Critical Marimo Flaw Exploited Hours After Public Disclosure</news:title>
      <news:keywords>CVE-2026-39987, Marimo, remote code execution, Sysdig, WebSocket, RCE, vulnerability, cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cpuid-website-compromised-deliver-weaponized-tools-mnsn</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T08:31:35.877Z</news:publication_date>
      <news:title>CPUID Website Compromised - Weaponized HWMonitor and CPU-Z Tools</news:title>
      <news:keywords>HWMonitor, CPU-Z, trojan, CPUID, malware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/jailbreak-ai-models-sockpuppeting-technique-mnsk</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T07:02:33.441Z</news:publication_date>
      <news:title>AI Security Alert - Jailbreak Technique Exposes Major Models</news:title>
      <news:keywords>ChatGPT, Claude, Gemini</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/obfuscated-javascript-phishing-email-mnsk</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T07:01:38.921Z</news:publication_date>
      <news:title>Obfuscated JavaScript Delivered via Phishing Email Alert</news:title>
      <news:keywords>JavaScript, Phishing, VirusTotal</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/aws-patches-critical-rce-privilege-escalation-vulnerabilities-mnsj</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T06:31:25.116Z</news:publication_date>
      <news:title>AWS Patches Critical RCE and Privilege Escalation Flaws</news:title>
      <news:keywords>CVE-2026-5707, CVE-2026-5708, CVE-2026-5709, AWS, Research and Engineering Studio</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/session-messenger-privacy-metadata-mnsf</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T05:01:42.970Z</news:publication_date>
      <news:title>Session Messenger - Protecting Privacy Without Metadata</news:title>
      <news:keywords>Session, encryption, metadata, instant messaging, privacy concerns</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/health-insurance-lead-sites-sell-personal-data-mnsf</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T05:01:22.948Z</news:publication_date>
      <news:title>Health Insurance Lead Sites - Personal Data Sold Instantly</news:title>
      <news:keywords>health insurance, data privacy, lead generation, UC Davis, Stanford University</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/check-point-software-uk-partner-awards-2026-mnse</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T04:31:05.680Z</news:publication_date>
      <news:title>Check Point Software Celebrates Partner Success at Awards</news:title>
      <news:keywords>Check Point, UK Partner Awards, cyber resilience, AI, Softcat</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/moschusochsen-cisos-drittanbieter-risiken-mnsb</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T03:01:33.445Z</news:publication_date>
      <news:title>CISOs Can Learn from Musk Oxen - Third-Party Risks Explained</news:title>
      <news:keywords>APT29, TeamViewer, Third-Party Risk Management, Cybersecurity, FS-ISAC</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/new-model-secure-saas-access-mns5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T00:01:13.178Z</news:publication_date>
      <news:title>New Model for Secure SaaS Access - Embracing Zero Trust</news:title>
      <news:keywords>Zero Trust, ThreatLocker, SaaS Security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/contagious-interview-campaign-expands-mns4</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T23:31:41.270Z</news:publication_date>
      <news:title>Contagious Interview Campaign Expands - New Malicious Packages Found</news:title>
      <news:keywords>UNC1069, Contagious Interview campaign, malicious packages, information-stealing trojan, Socket security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/misconfiguration-exposes-40m-smtp-records-mns3</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T23:01:41.641Z</news:publication_date>
      <news:title>Misconfiguration Exposes 40M SMTP Records from Major Firms</news:title>
      <news:keywords>Alinto, SMTP records, DHL, L&apos;Oreal, Renault</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/colombian-banks-breach-data-leaked-mns2</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T23:01:30.063Z</news:publication_date>
      <news:title>Colombian Banks Breached - Data Exposed on DarkForums</news:title>
      <news:keywords>Bancolombia, Banco De Bogota, data leak, DarkForums, cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/venom-phishing-attacks-steal-executives-logins-mns0</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T22:01:13.372Z</news:publication_date>
      <news:title>VENOM Phishing Attacks Target C-Suite Microsoft Logins</news:title>
      <news:keywords>VENOM, phishing, C-suite, Microsoft, credential theft</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/claude-managed-agents-ai-workflows-mnrz</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T21:31:28.065Z</news:publication_date>
      <news:title>Claude Managed Agents - Enhancing AI Agent Workflows</news:title>
      <news:keywords>Claude Managed Agents, Anthropic, AI workflows, sandboxed execution, credential management</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/russia-fancy-bear-global-onslaught-mnrz</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T21:31:23.415Z</news:publication_date>
      <news:title>Russia&apos;s Fancy Bear APT Continues Its Global Onslaught</news:title>
      <news:keywords>Fancy Bear, APT, cybercrime, zero trust, patching</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/qualcomm-security-advisory-april-2026-mnry</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T21:01:24.954Z</news:publication_date>
      <news:title>Qualcomm Security Advisory - April 2026 Vulnerabilities</news:title>
      <news:keywords>Qualcomm, security bulletin, vulnerabilities</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cyberav3ngers-irgc-targeting-critical-infrastructure-mnry</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T21:01:12.332Z</news:publication_date>
      <news:title>CyberAv3ngers - IRGC-Linked Group Targets Critical Infrastructure</news:title>
      <news:keywords>CyberAv3ngers, IRGC, ICS Malware, CVE-2021-22681, Rockwell Automation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/comparison-shopping-not-computer-crime-mnrx</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T20:31:20.940Z</news:publication_date>
      <news:title>Amazon&apos;s CFAA Claims Against AI Tools - What You Need to Know</news:title>
      <news:keywords>Computer Fraud and Abuse Act, Amazon, Perplexity, AI tools, comparison shopping</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/real-time-visibility-ai-driven-world-mnrw</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T20:01:49.706Z</news:publication_date>
      <news:title>Real-Time Visibility - Essential in AI-Driven Cybersecurity</news:title>
      <news:keywords>AI-driven attacks, endpoint visibility, cybersecurity, real-time monitoring, threat detection</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/nerc-monitoring-grid-iran-cyber-threat-mnru</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T19:01:23.155Z</news:publication_date>
      <news:title>NERC Actively Monitoring Grid Amid Iran-Linked Cyber Threat</news:title>
      <news:keywords>Iran, Cybersecurity and Infrastructure Security Agency, critical infrastructure</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/elastic-cloud-defence-cyber-marvel-2026-overview-mnru</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T19:01:11.980Z</news:publication_date>
      <news:title>Elastic Cloud - Overview of Defence Cyber Marvel 2026</news:title>
      <news:keywords>Elastic Security, UK Ministry of Defence, Defence Cyber Marvel 2026, AI infrastructure, cyber exercise</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/google-chrome-infostealer-protection-session-cookies-mnru</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T19:01:08.178Z</news:publication_date>
      <news:title>Google Chrome - New Protection Against Session Cookie Theft</news:title>
      <news:keywords>Google Chrome, Device Bound Session Credentials, session cookies, infostealer, malware, Cookie, DBSC, Infostealer, Windows</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cryptocurrency-scam-45-million-operation-atlantic-mnrt</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T18:31:01.807Z</news:publication_date>
      <news:title>Cryptocurrency Scam - $45 Million Disrupted in Operation Atlantic</news:title>
      <news:keywords>cryptocurrency, scam, Operation Atlantic</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/romm-4-4-0-xss-csrf-chain-vulnerability-mnrs</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T18:01:46.958Z</news:publication_date>
      <news:title>RomM 4.4.0 - Critical XSS/CSRF Vulnerability Discovered</news:title>
      <news:keywords>CVE-2025-65027, RomM, XSS, CSRF, admin takeover</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cyberasap-secures-10m-funding-uk-cyber-innovation-mnrs</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T18:01:34.662Z</news:publication_date>
      <news:title>CyberASAP Secures £10M Boost for UK Cyber Innovators</news:title>
      <news:keywords>CyberASAP, UK Cybersecurity, Funding, Innovation, Cybersecurity Startups</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/threat-hunters-gambit-outsmarting-threat-actors-mnrs</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T18:01:23.147Z</news:publication_date>
      <news:title>Threat Hunters&apos; Gambit - Outsmarting Evolving Threat Actors</news:title>
      <news:keywords>Cisco Talos, Platform-as-a-Proxy, phishing, SaaS, Zero-Trust</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/zsh-5-9-rce-exploit-mnrr</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T17:31:31.400Z</news:publication_date>
      <news:title>ZSH 5.9 Vulnerability - Remote Code Execution Exploit</news:title>
      <news:keywords>ZSH, RCE, Linux, Exploit, CVE</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/treasury-cyber-threat-sharing-initiative-crypto-mnrr</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T17:31:15.399Z</news:publication_date>
      <news:title>Treasury Department Launches Cyber Threat Sharing for Crypto</news:title>
      <news:keywords>U.S. Treasury, cyber threat intelligence, cryptocurrency, cybersecurity, North Korean hackers</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/jumbo-website-manager-remote-code-execution-mnrr</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T17:31:13.372Z</news:publication_date>
      <news:title>Jumbo Website Manager - Remote Code Execution Vulnerability</news:title>
      <news:keywords>Jumbo Website Manager, Remote Code Execution, PHP, EDB-ID: 52504</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/mitigate-risks-cracked-software-mnrq</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T17:01:32.903Z</news:publication_date>
      <news:title>Cracked Software - 5 Ways to Mitigate Security Risks</news:title>
      <news:keywords>cracked software, malware, shadow IT, endpoint protection, user awareness</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/storm-2755-payroll-pirate-attacks-canadian-employees-mnrp</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T16:30:52.062Z</news:publication_date>
      <news:title>Storm-2755 - Investigating Payroll Pirate Attacks in Canada</news:title>
      <news:keywords>Storm-2755, payroll fraud, malvertising, AiTM, Microsoft, Adversary-in-the-middle (AiTM), Storm, Payroll Pirate, Cybercrime, Business Email Compromise</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/gpl-odorizers-gpl750-vulnerability-explained-mnro</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T16:02:04.644Z</news:publication_date>
      <news:title>GPL Odorizers GPL750 - Vulnerability Exposed Critical Flaw</news:title>
      <news:keywords>GPL Odorizers, CVE-2026-4436, Industrial Control Systems, Critical Manufacturing, Modbus</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/contemporary-controls-basc-20t-vulnerability-explained-mnrn</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T16:01:31.660Z</news:publication_date>
      <news:title>Contemporary Controls BASC 20T - Critical Vulnerability Exposed</news:title>
      <news:keywords>CVE-2025-13926, Contemporary Controls, BASC 20T, Sedona Alliance, Industrial Control Systems</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/stx-rat-targets-finance-sector-stealth-tactics-mnrn</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T16:01:29.122Z</news:publication_date>
      <news:title>STX RAT - Targets Finance Sector With Stealth Tactics</news:title>
      <news:keywords>STX RAT, remote access trojan, financial services, eSentire, cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/chevin-fleetwave-software-security-scare-mnrm</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T15:31:26.543Z</news:publication_date>
      <news:title>Chevin FleetWave Software Faces Major Outage After Incident</news:title>
      <news:keywords>Chevin Fleet Solutions, FleetWave, SaaS, Azure, cybersecurity incident</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/russia-accuses-journalist-aiding-cyberattacks-ukraine-mnrm</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T15:31:17.592Z</news:publication_date>
      <news:title>Russia Accuses Journalist of Aiding Cyberattacks for Ukraine</news:title>
      <news:keywords>Russia, Ukraine, FSB, Telegram, Radio Free Europe</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/best-practices-securing-aws-cloud-2026-mnrl</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T15:01:26.334Z</news:publication_date>
      <news:title>AWS Cloud Security - 12 Best Practices for 2026</news:title>
      <news:keywords>AWS, cloud security, best practices, encryption, IAM</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/hybrid-p2p-botnet-13-year-old-apache-rce-mnri</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T13:31:17.262Z</news:publication_date>
      <news:title>Hybrid P2P Botnet and 13-Year-Old Apache RCE Exposed</news:title>
      <news:keywords>Phorpiex Botnet, CVE-2026-34197, Apache ActiveMQ, UNC6783, Magecart</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/apple-intelligence-prompt-injection-vulnerability-mnri</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T13:31:17.191Z</news:publication_date>
      <news:title>Apple Intelligence - Researchers Expose Prompt Injection Flaw</news:title>
      <news:keywords>Apple Intelligence, prompt injection, Neural Exec, RSAC, machine learning</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/android-intent-redirection-vulnerability-engagesdk-mnri</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T13:31:10.501Z</news:publication_date>
      <news:title>Android Intent Redirection Vulnerability Exposes Millions, Including 30M Crypto Wallet Users</news:title>
      <news:keywords>EngageSDK, Android, intent redirection, vulnerability, Microsoft, cryptocurrency, cybersecurity, data protection, Google Play, mobile security, Supply Chain Security, Vulnerability</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/mallory-contextual-threat-intelligence-platform-mnrh</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T13:01:38.334Z</news:publication_date>
      <news:title>Mallory Launches AI-Native Threat Intelligence Platform, Now with Enhanced Contextual Insights</news:title>
      <news:keywords>Mallory, threat intelligence, AI platform, CISO, security operations, AI, Threat Intelligence, Cybersecurity, Security Operations, Vulnerability Management</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/edge-decay-failing-perimeter-modern-intrusions-mnrh</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T13:01:26.896Z</news:publication_date>
      <news:title>Edge Decay - Modern Intrusions Exploit Failing Perimeter</news:title>
      <news:keywords>edge devices, identity compromise, automation, zero-day vulnerabilities, APT15</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/rethinking-linux-security-operations-mnrh</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T13:01:16.276Z</news:publication_date>
      <news:title>Linux Security Operations - Rethinking for Better Outcomes</news:title>
      <news:keywords>Linux Security, Security Operations, DevSecOps, Vulnerability Management, AI-driven Remediation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/us-operation-evicts-russia-hacked-routers-mnrg</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T12:30:55.103Z</news:publication_date>
      <news:title>US Operation Evicts Russia from Hacked SOHO Routers</news:title>
      <news:keywords>Russia, SOHO routers, cyberattack, critical infrastructure</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/hackers-impersonate-linux-foundation-leader-slack-mnrf</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T12:01:36.046Z</news:publication_date>
      <news:title>Hackers Target Open Source Developers via Slack Impersonation</news:title>
      <news:keywords>Linux Foundation, Slack, malware, social engineering, OpenSSF</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/zephyr-energy-cyber-attack-funds-diversion-mnrf</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T12:01:09.639Z</news:publication_date>
      <news:title>Zephyr Energy - £700K Lost in Cyber Attack on Payments</news:title>
      <news:keywords>Zephyr Energy, contractor payment, cyber attack, funds diversion, cybercrime</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/penetration-testing-ot-networks-methodology-mnrf</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T12:01:09.345Z</news:publication_date>
      <news:title>Penetration Testing - Safely Assessing OT Networks</news:title>
      <news:keywords>penetration testing, Operational Technology, OT networks, nmap, cybersecurity methodology</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/mylovely-ai-data-leak-exposes-70000-prompts-mnre</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T11:31:10.967Z</news:publication_date>
      <news:title>MyLovely.AI Data Leak Exposes 70,000 User Prompts</news:title>
      <news:keywords>MyLovely.AI, data leak, sextortion, doxxing, NSFW content</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/testing-handbook-c-cpp-security-checklist-mnre</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T11:31:03.300Z</news:publication_date>
      <news:title>C and C++ Security Checklist - New Testing Handbook Chapter</news:title>
      <news:keywords>C++, C, Testing Handbook, security checklist, code review</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/intruder-agentless-container-image-scanning-mnre</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T11:30:54.979Z</news:publication_date>
      <news:title>Intruder Expands Cloud Security with Agentless Scanning</news:title>
      <news:keywords>Intruder, Container Image Scanning, AWS, Google Cloud, Azure</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/microsoft-cloud-security-issues-mnrd</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T11:01:25.421Z</news:publication_date>
      <news:title>Microsoft Cloud Security - Federal Review Raises Concerns</news:title>
      <news:keywords>Microsoft, cloud computing, cybersecurity, government, FedRAMP</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/hidden-roi-of-visibility-security-mnrd</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T11:01:21.104Z</news:publication_date>
      <news:title>Visibility - Enhancing Security Through Better Decisions</news:title>
      <news:keywords>visibility, data-driven decisions, user behavior, security monitoring, risk assessment</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/phishing-attack-google-storage-remcos-rat-mnrc</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T10:32:11.865Z</news:publication_date>
      <news:title>Phishing Attack - Google Storage Delivers Remcos RAT</news:title>
      <news:keywords>Remcos RAT, Google Cloud Storage, phishing, remote access trojan, cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/advenica-file-scanner-kiosk-usb-malware-mnrc</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T10:31:06.744Z</news:publication_date>
      <news:title>Advenica Launches File Scanner Kiosk for USB Malware Detection</news:title>
      <news:keywords>Advenica, File Scanner Kiosk, malware detection, USB security, antivirus</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cybercriminals-target-accountants-drain-russian-firms-mnrc</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T10:31:01.937Z</news:publication_date>
      <news:title>Cybercriminals Target Accountants - Millions Stolen from Firms</news:title>
      <news:keywords>Hive0117, DarkWatchman, phishing, Russian firms, accountants</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/politicians-increased-security-due-to-violence-threats-mnrc</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T10:30:59.958Z</news:publication_date>
      <news:title>Politicians Increase Security Spending Amid Rising Threats</news:title>
      <news:keywords>political violence, security spending, Public Service Alliance, campaign security, threats against politicians</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/meta-employee-downloads-30000-private-images-mnrc</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T10:30:59.319Z</news:publication_date>
      <news:title>Meta Employee Allegedly Downloads 30,000 Private Images</news:title>
      <news:keywords>Meta, data breach, insider threat</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/incident-responders-year-in-review-mnrb</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T10:01:19.999Z</news:publication_date>
      <news:title>Incident Responders - Leveraging Year in Review Insights</news:title>
      <news:keywords>Cisco Talos, Year in Review, incident response, cybersecurity preparedness, MFA attacks</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/certes-launches-v7-quantum-safe-encryption-mnrb</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T10:01:12.133Z</news:publication_date>
      <news:title>Certes Launches v7 Platform with Quantum-Safe Encryption</news:title>
      <news:keywords>post-quantum cryptography, Certes, data protection, hybrid cloud, edge computing</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/weak-at-the-seams-cybersecurity-risks-mnra</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T09:31:16.275Z</news:publication_date>
      <news:title>Cybersecurity Risks - Weaknesses in Interconnected Systems</news:title>
      <news:keywords>cybersecurity, digital transformation, systemic risk, interconnected infrastructure, CISO</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/keeper-security-expands-pam-browser-isolation-mnra</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T09:31:03.345Z</news:publication_date>
      <news:title>Keeper Security Expands PAM Browser Isolation Capabilities</news:title>
      <news:keywords>Keeper Security, Remote Browser Isolation, KeeperPAM, AI monitoring, zero-trust</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/whatsapp-username-feature-privacy-control-mnra</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T09:30:53.525Z</news:publication_date>
      <news:title>WhatsApp - New Username Feature Enhances Privacy Control</news:title>
      <news:keywords>WhatsApp, username feature, privacy, Meta, end-to-end encryption, security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/tianjin-supercomputer-center-data-breach-mnr7</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T08:31:19.630Z</news:publication_date>
      <news:title>Tianjin Supercomputer Center - Massive Data Theft Claims</news:title>
      <news:keywords>Tianjin Supercomputer Center, data breach, cyber intrusion, sensitive information, China</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/sticky-note-security-gym-hall-of-horrors-mnr7</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T08:31:07.641Z</news:publication_date>
      <news:title>Sticky-note Security - Gym&apos;s 80s Horror Show Revealed</news:title>
      <news:keywords>gym security, default passwords, network security, fitness equipment, data protection</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/internet-exposed-ics-devices-security-risks-mnr6</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T08:01:13.598Z</news:publication_date>
      <news:title>Internet-Exposed ICS Devices Raise Security Risks</news:title>
      <news:keywords>ICS, Modbus, Schneider Electric, Industroyer, Stuxnet</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/roningloader-malware-campaign-evade-detection-mnr5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T07:31:45.134Z</news:publication_date>
      <news:title>RoningLoader - New Malware Campaign Evades Detection Tactics</news:title>
      <news:keywords>RoningLoader, DragonBreath, gh0st RAT, DLL side-loading, code injection</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/epic-halts-meta-facial-recognition-glasses-mnr5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T07:31:18.533Z</news:publication_date>
      <news:title>EPIC Calls to Halt Meta’s Facial Recognition Glasses Plans</news:title>
      <news:keywords>Meta, facial recognition, EPIC, Consumer Federation of America, privacy rights</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/quantum-security-bet-cryptographers-mnr5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T07:30:54.929Z</news:publication_date>
      <news:title>Cryptographers Bet $5,000 on Quantum Computing&apos;s Future Impact</news:title>
      <news:keywords>quantum computing, cryptography, post-quantum cryptography, Google, wager</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/silver-fox-valleyrat-fake-telegram-installer-mnr4</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T07:01:33.382Z</news:publication_date>
      <news:title>Silver Fox Campaign - ValleyRAT Hidden in Telegram Installer</news:title>
      <news:keywords>ValleyRAT, Silver Fox, APT group, malware campaign, remote access trojan</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/bitcoin-depot-hack-3-6-million-stolen-mnr4</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T07:01:20.759Z</news:publication_date>
      <news:title>Bitcoin Depot Hack - $3.6 Million Stolen by Cybercriminals</news:title>
      <news:keywords>Bitcoin Depot, cyberattack, cryptocurrency, hacker, data breach</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/microsoft-suspends-developer-accounts-open-source-projects-mnr4</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T07:01:11.932Z</news:publication_date>
      <news:title>Microsoft Suspends Developer Accounts for Open Source Projects</news:title>
      <news:keywords>Microsoft, open source, WireGuard, VeraCrypt, Windscribe</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/meta-business-manager-phishing-campaign-mnr2</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T06:01:06.559Z</news:publication_date>
      <news:title>Phishing Alert - Cybercriminals Exploit Meta Notifications</news:title>
      <news:keywords>Meta, phishing, Business Manager, SpiderLabs, cybercrime</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/asqav-open-source-sdk-ai-agent-governance-mnr0</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T05:01:23.338Z</news:publication_date>
      <news:title>Asqav - New Open-Source SDK for AI Agent Governance</news:title>
      <news:keywords>Asqav, AI governance, quantum security, open source, Python SDK</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/post-incident-review-best-practices-mnqy</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T04:01:26.097Z</news:publication_date>
      <news:title>Post-Incident Review - Essential Steps for Improvement</news:title>
      <news:keywords>Post-Incident Review, Incident Response, Cybersecurity, Security Best Practices, Root Cause Analysis</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/malaysia-cyber-threats-structural-shift-mnqn</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T23:01:33.775Z</news:publication_date>
      <news:title>Malaysia Faces Structural Shift in Cyber Threats Landscape</news:title>
      <news:keywords>APT41, Mustang Panda, Lazarus Group, FIN7, UNC6783</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/hackers-hide-credit-card-stealer-svg-trick-mnqn</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T23:01:28.455Z</news:publication_date>
      <news:title>Hackers Use Pixel-Large SVG Trick to Steal Credit Cards, New Evasion Technique Discovered</news:title>
      <news:keywords>Magento, credit card skimmer, PolyShell vulnerability, Sansec, e-commerce, credit card, data theft, MageCart, payment card, skimmer</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/automation-nhi-security-risks-report-mnqn</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T23:01:03.261Z</news:publication_date>
      <news:title>Automation and NHI Security Risks - Key Findings Revealed</news:title>
      <news:keywords>Keeper Security, NHI, AI, automation, security risks</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/wireguard-microsoft-account-lockout-software-updates-mnql</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T22:01:35.616Z</news:publication_date>
      <news:title>WireGuard VPN Developer Locked Out by Microsoft Account, Wider Impact on Open Source Projects</news:title>
      <news:keywords>WireGuard, Microsoft, VeraCrypt, VPN, Windows, security, open-source, Open Source, Security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/criminal-wannabes-more-dangerous-than-pros-mnql</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T22:01:18.299Z</news:publication_date>
      <news:title>Criminal Wannabes - More Dangerous Than Cyber Pros, Says Ex-FBI Chief</news:title>
      <news:keywords>Cynthia Kaiser, ransomware, Pay2Key, Sicarii, Akira</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/unc6783-hackers-steal-zendesk-support-tickets-mnql</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T22:01:15.666Z</news:publication_date>
      <news:title>UNC6783 Hackers Steal Corporate Zendesk Support Tickets</news:title>
      <news:keywords>UNC6783, Zendesk, Raccoon, social engineering, data extortion</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/threat-actors-emojis-evade-detection-mnql</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T22:01:11.439Z</news:publication_date>
      <news:title>Threat Actors Use Emojis to Evade Detection Mechanisms</news:title>
      <news:keywords>emojis, threat actors, cybersecurity, ransom, malicious communication, threat intelligence, detection evasion</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cloudflare-godaddy-rogue-ai-bots-mnql</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T22:01:06.935Z</news:publication_date>
      <news:title>Cloudflare and GoDaddy Unite Against Rogue AI Bots</news:title>
      <news:keywords>Cloudflare, GoDaddy, AI Crawl Control</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/sonicwall-sma1000-vulnerabilities-advisory-mnqj</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T21:01:25.898Z</news:publication_date>
      <news:title>SonicWall SMA1000 - Multiple Vulnerabilities Discovered, Immediate Patching Required</news:title>
      <news:keywords>SonicWall, SMA1000, security advisory, vulnerabilities, SQL injection, multi-factor authentication, vulnerability, patch</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/palo-alto-networks-security-advisory-av26-331-mnqi</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T20:31:21.497Z</news:publication_date>
      <news:title>Palo Alto Networks - Security Advisory AV26-331 Released</news:title>
      <news:keywords>Cortex XDR, Autonomous Digital Experience Manager, CVE-2026-0234</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/tiktok-removes-covert-networks-hungary-elections-mnqi</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T20:31:11.496Z</news:publication_date>
      <news:title>TikTok Removes Covert Networks Amid Hungary Election Concerns</news:title>
      <news:keywords>TikTok, disinformation, Hungary elections, Péter Magyar, Viktor Orbán</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/court-rules-copyright-cant-stop-access-to-law-mnqg</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T19:31:30.707Z</news:publication_date>
      <news:title>Court Rules Copyright Can’t Stop Access to Public Laws</news:title>
      <news:keywords>Copyright, Fair Use, Building Codes, Third Circuit, UpCodes</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/arelion-netscout-ddos-protection-mnqg</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T19:31:04.473Z</news:publication_date>
      <news:title>Arelion Enhances DDoS Protection with NETSCOUT Solutions</news:title>
      <news:keywords>Arelion, NETSCOUT, DDoS Protection, Cloud Connect, Threat Intelligence</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/lebanon-emergency-system-digital-infrastructure-crisis-mnqe</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T19:01:14.423Z</news:publication_date>
      <news:title>Lebanon&apos;s Emergency System - Digital Infrastructure Crisis</news:title>
      <news:keywords>Lebanon, digital infrastructure, emergency system, humanitarian crisis, Kamal Shehadi</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/trellix-enhances-data-security-for-generative-ai-mnqd</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T18:31:24.168Z</news:publication_date>
      <news:title>Trellix Enhances Data Security for Generative AI Era</news:title>
      <news:keywords>Trellix, Data Loss Prevention, Data Encryption, Generative AI, Database Security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/mitel-security-advisory-vulnerabilities-micollab-mnqc</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T18:02:48.541Z</news:publication_date>
      <news:title>Mitel Security Advisory - Vulnerabilities in MiCollab Exposed</news:title>
      <news:keywords>Mitel, MiCollab, security advisory</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/netscout-arbor-ddos-protection-g2-leader-badges-mnqc</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T18:01:29.776Z</news:publication_date>
      <news:title>NETSCOUT Arbor DDoS Protection Earns G2 Leader Badges</news:title>
      <news:keywords>NETSCOUT, Arbor Threat Mitigation System, DDoS Protection, G2 Leader Badges, Arbor Sightline</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/eurail-data-breach-passport-numbers-leaked-mnqc</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T18:01:17.470Z</news:publication_date>
      <news:title>Eurail Data Breach - Over 300,000 Passport Numbers Exposed</news:title>
      <news:keywords>Eurail, data breach, passport numbers, cybersecurity, personal information, Data Breach, Cybersecurity, Travel, Personal Information</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/anthropic-claude-mythos-zero-day-detection-mnqc</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T18:01:10.888Z</news:publication_date>
      <news:title>Claude Mythos - Unveils Zero-Day Detection Capabilities</news:title>
      <news:keywords>Claude Mythos, zero-day vulnerabilities, Project Glasswing, OpenBSD, FFmpeg</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/minnesota-national-guard-cyberattack-response-mnqb</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T17:31:13.332Z</news:publication_date>
      <news:title>Minnesota National Guard Deployed After Cyberattack Disrupts Services</news:title>
      <news:keywords>Minnesota National Guard, Winona County, cyberattack, FBI, ransomware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/teampcp-supply-chain-campaign-update-007-mnqb</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T17:31:05.105Z</news:publication_date>
      <news:title>TeamPCP Supply Chain Campaign - Cisco Source Code Stolen</news:title>
      <news:keywords>Cisco, TeamPCP, UNC6780, CISA, Trivy</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/hack-for-hire-spyware-campaign-targets-journalists-mnqa</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T17:01:17.591Z</news:publication_date>
      <news:title>Hack-for-Hire Spyware Campaign Targets Journalists in MENA</news:title>
      <news:keywords>Bitter, ProSpy, Access Now, Lookout, SMEX</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/selling-mass-surveillance-effector-38-7-mnq9</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T16:31:14.229Z</news:publication_date>
      <news:title>Mass Surveillance - EFFector Explores Troubling Trends</news:title>
      <news:keywords>mass surveillance, EFF, civil liberties, NSA spying, license plate readers</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/fraud-rockets-higher-mobile-first-latin-america-mnq9</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T16:31:11.832Z</news:publication_date>
      <news:title>Fraud Rockets Higher in Mobile-First Latin America</news:title>
      <news:keywords>mobile fraud, account takeover, financial institutions</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/outdated-software-macs-mobile-devices-security-risk-mnq8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T16:02:14.208Z</news:publication_date>
      <news:title>Outdated Software - Major Security Risks for Macs &amp; Mobile</news:title>
      <news:keywords>macOS, mobile devices, Jamf, vulnerabilities, security risks</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/lapd-hackers-steal-leak-sensitive-documents-mnq8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T16:01:27.326Z</news:publication_date>
      <news:title>LAPD Breach - Hackers Steal and Leak Sensitive Documents</news:title>
      <news:keywords>LAPD, World Leaks, data breach, sensitive documents, cybercrime, sensitive information, cybersecurity, hackers</news:keywords>
    </news:news>
  </url>
</urlset>