<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
  <url>
    <loc>https://cyberpings.com/article/pluralsight-launches-secure-ready-cybersecurity-training-mnui</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T16:01:44.591Z</news:publication_date>
      <news:title>Pluralsight Launches SecureReady - Build Cybersecurity Teams</news:title>
      <news:keywords>Pluralsight, SecureReady, cybersecurity training</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/juniper-networks-patches-junos-os-vulnerabilities-mnug</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T15:00:32.975Z</news:publication_date>
      <news:title>Junos OS Vulnerabilities - Critical Flaw Patched by Juniper</news:title>
      <news:keywords>Junos OS, Juniper Networks, vulnerability</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/fbi-push-notifications-signal-encryption-privacy-mnu8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T11:01:27.275Z</news:publication_date>
      <news:title>FBI Accesses Encrypted Signal Messages via Push Notifications</news:title>
      <news:keywords>FBI, Signal, push notifications, encryption, privacy concerns</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/internet-broke-bullshit-detectors-mnu6</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T10:01:31.839Z</news:publication_date>
      <news:title>Internet Breaks Bullshit Detectors - AI and Propaganda Surge</news:title>
      <news:keywords>AI, propaganda, verification, satellite data, synthetic media</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/law-enforcement-webloc-tracking-devices-ad-data-mnu1</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T08:01:37.463Z</news:publication_date>
      <news:title>Law Enforcement - Tracking 500 Million Devices via Ad Data</news:title>
      <news:keywords>Webloc, Penlink, Cobwebs Technologies, Citizen Lab, surveillance</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/recovery-scammers-how-to-avoid-second-strike-mntu</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T04:31:25.877Z</news:publication_date>
      <news:title>Recovery Scammers - How to Avoid a Second Strike</news:title>
      <news:keywords>recovery scams, sucker lists, fraud prevention, advance fee fraud, cryptocurrency</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/anthropic-claude-beta-word-ai-editing-mntp</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-11T02:31:12.679Z</news:publication_date>
      <news:title>Anthropic Launches Claude Beta for Word - AI Editing Revolution</news:title>
      <news:keywords>Claude, Microsoft Word, Anthropic, AI assistant, productivity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ai-poisoning-amos-stealer-mac-threat-mnti</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T23:05:01.233Z</news:publication_date>
      <news:title>AI-Poisoning - Evolved AMOS Stealer Threatens macOS Users</news:title>
      <news:keywords>AI-Poisoning, AMOS Stealer, macOS, social engineering, cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/active-exploitation-solarwinds-web-help-desk-cve-2025-26399-mnti</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T23:04:27.336Z</news:publication_date>
      <news:title>Active Exploitation of SolarWinds Web Help Desk Alert</news:title>
      <news:keywords>CVE-2025-26399, SolarWinds, remote code execution</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/google-workspace-identity-breach-mnti</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T23:03:48.164Z</news:publication_date>
      <news:title>Google Workspace Breach - Misconfigured Permissions Exposed</news:title>
      <news:keywords>Google Workspace, data breach, misconfigured permissions</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/app-domain-manager-injection-explained-mnti</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T23:03:14.505Z</news:publication_date>
      <news:title>App Domain Manager Injection - Understanding the Threat</news:title>
      <news:keywords>App Domain Manager, .NET, code injection, application security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ai-enhanced-candidate-fraud-mnti</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T23:02:57.313Z</news:publication_date>
      <news:title>AI-Enhanced Candidate Fraud - The New Hiring Challenge</news:title>
      <news:keywords>AI, deepfakes, resume fraud</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/survivor-journey-cybercrime-underground-mnti</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T23:02:39.986Z</news:publication_date>
      <news:title>Cybercrime Underground - A Survivor&apos;s Journey Revealed</news:title>
      <news:keywords>crypto scams, cybercrime, trafficking network</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/linux-threat-landscape-2026-mnti</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T23:01:59.410Z</news:publication_date>
      <news:title>Linux Threat Landscape - Rising Cross-Platform Attacks Explained</news:title>
      <news:keywords>Linux, ransomware, nation-state actors</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/bec-identity-problem-security-mnti</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T23:01:17.444Z</news:publication_date>
      <news:title>BEC - Understanding the Identity Crisis in Cybersecurity</news:title>
      <news:keywords>BEC, Google Workspace, identity theft</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/notnullosx-malware-targets-crypto-assets-mntg</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T22:02:15.118Z</news:publication_date>
      <news:title>NotnullOSX Malware - Targets High-Value Crypto Assets</news:title>
      <news:keywords>notnullOSX, crypto theft, 0xFFF, macOS, malware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/brazil-experian-breach-impact-mntg</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T22:01:28.224Z</news:publication_date>
      <news:title>Experian Breach - All Brazilians Potentially Impacted</news:title>
      <news:keywords>Experian, data breach, Serasa Experian</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/apiiro-cli-application-security-ai-development-mnte</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T21:01:58.352Z</news:publication_date>
      <news:title>Apiiro CLI - Integrates Security into AI Development Workflows</news:title>
      <news:keywords>Apiiro, application security, AI development, DevSecOps, CLI</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ai-arms-race-hits-finance-mnte</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T21:01:41.628Z</news:publication_date>
      <news:title>AI Arms Race - Treasury Secretary Addresses Banking Concerns</news:title>
      <news:keywords>AI, Finance, Cybersecurity, Data Theft, Deepfakes</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/sen-sanders-talks-ai-privacy-mntd</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T20:30:49.055Z</news:publication_date>
      <news:title>AI and Privacy - Sen. Sanders Engages with Claude</news:title>
      <news:keywords>AI, privacy, Sen. Sanders, Claude</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ai-export-regime-american-ai-adoption-mntc</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T20:01:43.166Z</news:publication_date>
      <news:title>AI Export Regime - Promoting American AI Adoption Abroad</news:title>
      <news:keywords>AI export, Department of Commerce, national security, cybersecurity, American AI</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/detection-model-shifts-credential-attacks-mnta</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T19:31:09.932Z</news:publication_date>
      <news:title>Detection Model Shifts - Combat Credential-Based Attacks</news:title>
      <news:keywords></news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/fbi-disrupts-gru-router-hijacking-operation-mnta</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T19:31:04.881Z</news:publication_date>
      <news:title>FBI Disrupts GRU Router Hijacking Operation Amid Rising Threats</news:title>
      <news:keywords>APT28, Iranian hackers, ClickFix, PLCs, malware, GRU, cyber espionage, DNS hijacking, TP-Link routers, FBI, cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/iranian-apt-targets-rockwell-plcs-mnt8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T18:31:19.747Z</news:publication_date>
      <news:title>Iranian APT Targets 5,219 Exposed Rockwell PLCs Worldwide, Disruption Reported</news:title>
      <news:keywords>Rockwell Automation, Allen-Bradley, APT, IRGC-CEC, CISA, Iranian APT, Rockwell PLCs, cybersecurity, critical infrastructure, malware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/big-tech-user-data-exposure-us-authorities-mnt8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T18:31:06.334Z</news:publication_date>
      <news:title>Big Tech - User Data Exposure to US Authorities Revealed</news:title>
      <news:keywords>Google, Apple, Meta</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/senator-inquiry-tech-giants-csam-reporting-mnt8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T18:31:00.693Z</news:publication_date>
      <news:title>Senator Inquiry - Tech Giants&apos; CSAM Reporting Failures</news:title>
      <news:keywords>CSAM, NCMEC, Chuck Grassley, Meta, Amazon</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/france-replace-windows-linux-government-desktops-mnt7</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T18:02:11.510Z</news:publication_date>
      <news:title>France to Replace Windows with Linux on Government Desktops</news:title>
      <news:keywords>France, Linux, Windows, digital sovereignty, ANSSI</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/uk-government-jail-time-tech-bosses-nudification-tools-mnt7</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T18:01:38.220Z</news:publication_date>
      <news:title>UK Government Threatens Tech Bosses with Jail Time Over Nudification</news:title>
      <news:keywords>UK government, Ofcom, Grok scandal, nonconsensual images, Elon Musk</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/finra-launches-financial-intelligence-fusion-center-mnt4</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T16:31:27.447Z</news:publication_date>
      <news:title>FINRA Launches Financial Intelligence Fusion Center</news:title>
      <news:keywords>FINRA, cybersecurity, fraud, financial intelligence, fusion center</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cisa-kev-remediation-analysis-limits-human-security-mnt0</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T14:32:05.240Z</news:publication_date>
      <news:title>CISA KEV Remediation Analysis - Limits of Human Security Exposed</news:title>
      <news:keywords>CISA, Qualys, vulnerability management, remediation, AI in cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/netbt-e-fatura-privilege-escalation-vulnerability-mnt0</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T14:31:57.412Z</news:publication_date>
      <news:title>NetBT e-Fatura - Privilege Escalation Vulnerability Exposed</news:title>
      <news:keywords>CVE-2025-14018, NetBT e-Fatura, Seccops</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/florida-investigates-openai-chatgpt-role-shooting-mnt0</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T14:31:40.594Z</news:publication_date>
      <news:title>Florida Investigates OpenAI - ChatGPT&apos;s Role in Shooting</news:title>
      <news:keywords>OpenAI, ChatGPT, Florida State University, mass shooting, AI psychosis</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/bts-world-tour-ticket-scam-mnsz</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T14:01:49.892Z</news:publication_date>
      <news:title>BTS World Tour Ticket Scam - Cybercriminals Target Fans</news:title>
      <news:keywords>BTS, ticket scam, cybercrime, Kaspersky, Brazil</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/hungarian-government-email-passwords-exposed-mnsy</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T13:31:53.155Z</news:publication_date>
      <news:title>Hungarian Government Email Passwords Exposed Ahead of Election</news:title>
      <news:keywords>Hungarian government, email accounts, password exposure, Bellingcat, national security, Hungary, Cybersecurity, Data Breach, Passwords, Government</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/uk-exposes-russian-submarine-activity-undersea-cables-mnsy</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T13:31:39.223Z</news:publication_date>
      <news:title>UK Exposes Russian Submarine Activity Near Undersea Cables</news:title>
      <news:keywords>Russia, undersea cables, GUGI, UK Ministry of Defence, submarine activity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/industrial-controllers-vulnerable-cyber-conflicts-mnsy</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T13:31:36.526Z</news:publication_date>
      <news:title>Industrial Controllers Vulnerable - Cyber Conflicts Intensify</news:title>
      <news:keywords>programmable logic controllers, operational technology, US government, vulnerabilities, cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/capability-centric-governance-access-control-legacy-systems-mnsx</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T13:01:44.612Z</news:publication_date>
      <news:title>Capability-Centric Governance - Redefining Access Control</news:title>
      <news:keywords>access governance, identity management, IBM, z/OS, capability-centric</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/tenable-hexa-ai-axios-supply-chain-attack-response-mnsv</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T12:31:55.850Z</news:publication_date>
      <news:title>Tenable Hexa AI - Responding to Axios Supply Chain Threat</news:title>
      <news:keywords>Tenable Hexa AI, Axios npm, supply chain attack, vulnerability management, agentic AI</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/chrome-147-patches-60-vulnerabilities-critical-flaws-mnsu</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T12:03:27.901Z</news:publication_date>
      <news:title>Chrome 147 Patches 60 Vulnerabilities, Two Critical Flaws</news:title>
      <news:keywords>CVE-2026-5858, CVE-2026-5859, Chrome, WebML, Google</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/little-snitch-linux-network-monitoring-mnst</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T11:32:53.689Z</news:publication_date>
      <news:title>Little Snitch for Linux - New Tool Monitors App Connections</news:title>
      <news:keywords>Little Snitch, Linux, eBPF, network monitoring, Objective Development</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/uk-government-signal-jammers-regulation-mnst</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T11:31:36.893Z</news:publication_date>
      <news:title>UK Government Considers Ban on Signal Jammers Amid Concerns</news:title>
      <news:keywords>UK Government, signal jammers, crime prevention, telecommunications, public safety</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/poisoned-office-365-search-results-stolen-paychecks-mnst</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T11:31:36.612Z</news:publication_date>
      <news:title>Poisoned Office 365 Search Results Lead to Stolen Paychecks</news:title>
      <news:keywords>Storm-2755, Office 365, malvertising, phishing, AiTM</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/gmail-end-to-end-encryption-mobile-mnsq</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T10:01:53.608Z</news:publication_date>
      <news:title>Gmail - End-to-End Encryption Now Available on Mobile</news:title>
      <news:keywords>Gmail, encryption, Google, mobile security, client-side encryption</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/mitre-releases-fight-fraud-framework-mnsq</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T10:01:29.789Z</news:publication_date>
      <news:title>MITRE Releases Fight Fraud Framework to Combat Fraudsters</news:title>
      <news:keywords>MITRE F3, fraud detection, cyber fraud, TTPs, behavior-based model</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cmmc-compliance-age-of-ai-mnsp</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T09:32:14.134Z</news:publication_date>
      <news:title>CMMC Compliance - Navigating AI&apos;s Role in Regulations</news:title>
      <news:keywords>CMMC 2.0, AI, federal contractors, compliance, CUI</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/critical-marimo-flaw-exploited-hours-after-disclosure-mnsp</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T09:31:38.727Z</news:publication_date>
      <news:title>Critical Marimo Flaw Exploited Hours After Public Disclosure</news:title>
      <news:keywords>CVE-2026-39987, Marimo, remote code execution, Sysdig, WebSocket, RCE, vulnerability, cybersecurity, credential theft</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cpuid-website-compromised-deliver-weaponized-tools-mnsn</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T08:31:35.877Z</news:publication_date>
      <news:title>CPUID Website Compromised - Weaponized HWMonitor and CPU-Z Tools</news:title>
      <news:keywords>HWMonitor, CPU-Z, trojan, CPUID, malware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/jailbreak-ai-models-sockpuppeting-technique-mnsk</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T07:02:33.441Z</news:publication_date>
      <news:title>AI Security Alert - Jailbreak Technique Exposes Major Models</news:title>
      <news:keywords>ChatGPT, Claude, Gemini</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/obfuscated-javascript-phishing-email-mnsk</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T07:01:38.921Z</news:publication_date>
      <news:title>Obfuscated JavaScript Delivered via Phishing Email Alert</news:title>
      <news:keywords>JavaScript, Phishing, VirusTotal</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/aws-patches-critical-rce-privilege-escalation-vulnerabilities-mnsj</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T06:31:25.116Z</news:publication_date>
      <news:title>AWS Patches Critical RCE and Privilege Escalation Flaws</news:title>
      <news:keywords>CVE-2026-5707, CVE-2026-5708, CVE-2026-5709, AWS, Research and Engineering Studio</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/session-messenger-privacy-metadata-mnsf</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T05:01:42.970Z</news:publication_date>
      <news:title>Session Messenger - Protecting Privacy Without Metadata</news:title>
      <news:keywords>Session, encryption, metadata, instant messaging, privacy concerns</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/health-insurance-lead-sites-sell-personal-data-mnsf</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T05:01:22.948Z</news:publication_date>
      <news:title>Health Insurance Lead Sites - Personal Data Sold Instantly</news:title>
      <news:keywords>health insurance, data privacy, lead generation, UC Davis, Stanford University</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/check-point-software-uk-partner-awards-2026-mnse</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T04:31:05.680Z</news:publication_date>
      <news:title>Check Point Software Celebrates Partner Success at Awards</news:title>
      <news:keywords>Check Point, UK Partner Awards, cyber resilience, AI, Softcat</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/moschusochsen-cisos-drittanbieter-risiken-mnsb</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T03:01:33.445Z</news:publication_date>
      <news:title>CISOs Can Learn from Musk Oxen - Third-Party Risks Explained</news:title>
      <news:keywords>APT29, TeamViewer, Third-Party Risk Management, Cybersecurity, FS-ISAC</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/new-model-secure-saas-access-mns5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T00:01:13.178Z</news:publication_date>
      <news:title>New Model for Secure SaaS Access - Embracing Zero Trust</news:title>
      <news:keywords>Zero Trust, ThreatLocker, SaaS Security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/contagious-interview-campaign-expands-mns4</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T23:31:41.270Z</news:publication_date>
      <news:title>Contagious Interview Campaign Expands - New Malicious Packages Found</news:title>
      <news:keywords>UNC1069, Contagious Interview campaign, malicious packages, information-stealing trojan, Socket security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/misconfiguration-exposes-40m-smtp-records-mns3</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T23:01:41.641Z</news:publication_date>
      <news:title>Misconfiguration Exposes 40M SMTP Records from Major Firms</news:title>
      <news:keywords>Alinto, SMTP records, DHL, L&apos;Oreal, Renault</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/colombian-banks-breach-data-leaked-mns2</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T23:01:30.063Z</news:publication_date>
      <news:title>Colombian Banks Breached - Data Exposed on DarkForums</news:title>
      <news:keywords>Bancolombia, Banco De Bogota, data leak, DarkForums, cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/venom-phishing-attacks-steal-executives-logins-mns0</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T22:01:13.372Z</news:publication_date>
      <news:title>VENOM Phishing Attacks Target C-Suite Microsoft Logins</news:title>
      <news:keywords>VENOM, phishing, C-suite, Microsoft, credential theft</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/claude-managed-agents-ai-workflows-mnrz</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T21:31:28.065Z</news:publication_date>
      <news:title>Claude Managed Agents - Enhancing AI Agent Workflows</news:title>
      <news:keywords>Claude Managed Agents, Anthropic, AI workflows, sandboxed execution, credential management</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/russia-fancy-bear-global-onslaught-mnrz</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T21:31:23.415Z</news:publication_date>
      <news:title>Russia&apos;s Fancy Bear APT Continues Its Global Onslaught</news:title>
      <news:keywords>Fancy Bear, APT, cybercrime, zero trust, patching</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/qualcomm-security-advisory-april-2026-mnry</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T21:01:24.954Z</news:publication_date>
      <news:title>Qualcomm Security Advisory - April 2026 Vulnerabilities</news:title>
      <news:keywords>Qualcomm, security bulletin, vulnerabilities</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cyberav3ngers-irgc-targeting-critical-infrastructure-mnry</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T21:01:12.332Z</news:publication_date>
      <news:title>CyberAv3ngers - IRGC-Linked Group Targets Critical Infrastructure</news:title>
      <news:keywords>CyberAv3ngers, IRGC, ICS Malware, CVE-2021-22681, Rockwell Automation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/comparison-shopping-not-computer-crime-mnrx</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T20:31:20.940Z</news:publication_date>
      <news:title>Amazon&apos;s CFAA Claims Against AI Tools - What You Need to Know</news:title>
      <news:keywords>Computer Fraud and Abuse Act, Amazon, Perplexity, AI tools, comparison shopping</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/real-time-visibility-ai-driven-world-mnrw</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T20:01:49.706Z</news:publication_date>
      <news:title>Real-Time Visibility - Essential in AI-Driven Cybersecurity</news:title>
      <news:keywords>AI-driven attacks, endpoint visibility, cybersecurity, real-time monitoring, threat detection</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/nerc-monitoring-grid-iran-cyber-threat-mnru</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T19:01:23.155Z</news:publication_date>
      <news:title>NERC Actively Monitoring Grid Amid Iran-Linked Cyber Threat</news:title>
      <news:keywords>Iran, Cybersecurity and Infrastructure Security Agency, critical infrastructure</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/elastic-cloud-defence-cyber-marvel-2026-overview-mnru</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T19:01:11.980Z</news:publication_date>
      <news:title>Elastic Cloud - Overview of Defence Cyber Marvel 2026</news:title>
      <news:keywords>Elastic Security, UK Ministry of Defence, Defence Cyber Marvel 2026, AI infrastructure, cyber exercise</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/google-chrome-infostealer-protection-session-cookies-mnru</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T19:01:08.178Z</news:publication_date>
      <news:title>Google Chrome - New Protection Against Session Cookie Theft</news:title>
      <news:keywords>Google Chrome, Device Bound Session Credentials, session cookies, infostealer, malware, Cookie, DBSC, Infostealer, Windows</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cryptocurrency-scam-45-million-operation-atlantic-mnrt</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T18:31:01.807Z</news:publication_date>
      <news:title>Cryptocurrency Scam - $45 Million Disrupted in Operation Atlantic</news:title>
      <news:keywords>cryptocurrency, scam, Operation Atlantic, cybercrime, fraud, international collaboration</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/romm-4-4-0-xss-csrf-chain-vulnerability-mnrs</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T18:01:46.958Z</news:publication_date>
      <news:title>RomM 4.4.0 - Critical XSS/CSRF Vulnerability Discovered</news:title>
      <news:keywords>CVE-2025-65027, RomM, XSS, CSRF, admin takeover</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cyberasap-secures-10m-funding-uk-cyber-innovation-mnrs</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T18:01:34.662Z</news:publication_date>
      <news:title>CyberASAP Secures £10M Boost for UK Cyber Innovators</news:title>
      <news:keywords>CyberASAP, UK Cybersecurity, Funding, Innovation, Cybersecurity Startups</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/threat-hunters-gambit-outsmarting-threat-actors-mnrs</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T18:01:23.147Z</news:publication_date>
      <news:title>Threat Hunters&apos; Gambit - Outsmarting Evolving Threat Actors</news:title>
      <news:keywords>Cisco Talos, Platform-as-a-Proxy, phishing, SaaS, Zero-Trust</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/zsh-5-9-rce-exploit-mnrr</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T17:31:31.400Z</news:publication_date>
      <news:title>ZSH 5.9 Vulnerability - Remote Code Execution Exploit</news:title>
      <news:keywords>ZSH, RCE, Linux, Exploit, CVE</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/treasury-cyber-threat-sharing-initiative-crypto-mnrr</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T17:31:15.399Z</news:publication_date>
      <news:title>Treasury Department Launches Cyber Threat Sharing for Crypto</news:title>
      <news:keywords>U.S. Treasury, cyber threat intelligence, cryptocurrency, cybersecurity, North Korean hackers</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/jumbo-website-manager-remote-code-execution-mnrr</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T17:31:13.372Z</news:publication_date>
      <news:title>Jumbo Website Manager - Remote Code Execution Vulnerability</news:title>
      <news:keywords>Jumbo Website Manager, Remote Code Execution, PHP, EDB-ID: 52504</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/mitigate-risks-cracked-software-mnrq</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T17:01:32.903Z</news:publication_date>
      <news:title>Cracked Software - 5 Ways to Mitigate Security Risks</news:title>
      <news:keywords>cracked software, malware, shadow IT, endpoint protection, user awareness</news:keywords>
    </news:news>
  </url>
</urlset>