<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
  <url>
    <loc>https://cyberpings.com/article/syria-security-failures-hack-exposed-mnlk</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T09:31:15.761Z</news:publication_date>
      <news:title>Syria’s Security Failures Exposed by Government Account Hack</news:title>
      <news:keywords>Syria, cybersecurity, government accounts, hacking, X platform</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cloudsec-list-issue-332-mnlk</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T09:30:54.505Z</news:publication_date>
      <news:title>Cloud Security Insights - New Vulnerabilities and Tools</news:title>
      <news:keywords>OpenAI Codex, GCP Vertex AI, axios, EvilTokens, AWS Security Agent</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/malware-roundup-qilin-ransomware-cyber-attacks-mnlj</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T09:01:34.321Z</news:publication_date>
      <news:title>Qilin Ransomware - Claims Hack on German Political Party</news:title>
      <news:keywords>Qilin Ransomware, CVE-2026-3055, Drift Protocol, CrystalX RAT, TrueConf Client</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/malicious-email-delivers-cmd-malware-mnlj</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T09:01:14.582Z</news:publication_date>
      <news:title>Malicious Email Delivers CMD Malware - Privilege Escalation Alert</news:title>
      <news:keywords>cmd malware, privilege escalation, Windows Defender, malicious email, curl</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/anjali-hansen-cross-team-collaboration-mnlg</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T07:31:13.062Z</news:publication_date>
      <news:title>Anjali Hansen - Emphasizes Cross-Team Collaboration in Privacy</news:title>
      <news:keywords>Anjali Hansen, Noname Security, Privacy Counsel</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/fortinet-patches-cve-2026-35616-forticlient-ems-mnld</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T06:31:13.259Z</news:publication_date>
      <news:title>Fortinet Patches Critical CVE-2026-35616 in FortiClient EMS</news:title>
      <news:keywords>CVE-2026-35616, FortiClient EMS, Fortinet, privilege escalation, API security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/malicious-npm-packages-exploit-redis-postgresql-mnlc</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T06:01:08.486Z</news:publication_date>
      <news:title>Malicious npm Packages Exploit Redis, PostgreSQL for Attacks</news:title>
      <news:keywords>npm, malicious packages, Strapi CMS, Redis exploitation, PostgreSQL</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/axios-npm-package-compromised-supply-chain-attack-mnks</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T20:31:00.239Z</news:publication_date>
      <news:title>Axios NPM Package Compromised - Supply Chain Attack Exposed</news:title>
      <news:keywords>Axios, npm, RAT, supply chain attack, plain-crypto-js</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/device-code-phishing-attacks-surge-2026-mnki</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T16:01:31.793Z</news:publication_date>
      <news:title>Device Code Phishing - Attacks Surge 37 Times in 2026</news:title>
      <news:keywords>OAuth, EvilTokens, Phishing-as-a-Service, Phishing Kit, Push Security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/node-js-maintainers-targeted-social-engineering-scheme-mnke</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T14:01:39.511Z</news:publication_date>
      <news:title>Node.js Maintainers Targeted - Sophisticated Social Engineering Scheme</news:title>
      <news:keywords>Node.js, Axios, UNC1069, Remote Access Trojan, npm</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/fortinet-forticlient-ems-zero-day-exploited-mnkd</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T13:31:00.781Z</news:publication_date>
      <news:title>Fortinet FortiClient EMS - Critical 0-Day Vulnerability Exploited</news:title>
      <news:keywords>CVE-2026-35616, FortiClient EMS, Fortinet, API vulnerability, zero-day, FortiClient, vulnerability, API security, patch management</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cybersecurity-veteran-hacking-drones-mnkc</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T13:01:40.475Z</news:publication_date>
      <news:title>Cybersecurity Veteran Mikko Hyppönen Now Hacking Drones</news:title>
      <news:keywords>Mikko Hyppönen, drones, cybersecurity, malware, Sensofusion</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/transparent-tribe-targets-india-startups-mnk0</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T07:31:11.779Z</news:publication_date>
      <news:title>Transparent Tribe Targets India&apos;s Startup Ecosystem - New Threat</news:title>
      <news:keywords>Transparent Tribe, Acronis, Crimson RAT, India startups, OSINT</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/best-user-access-management-tools-2026-mnjy</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T06:31:27.869Z</news:publication_date>
      <news:title>Best User Access Management Tools - Top Picks for 2026</news:title>
      <news:keywords>User Access Management, Okta, Azure AD, OneLogin, CyberArk</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/anthropic-ends-claude-subscriptions-third-party-tools-mnjr</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T03:31:05.676Z</news:publication_date>
      <news:title>Anthropic Ends Claude Subscriptions for Third-Party Tools</news:title>
      <news:keywords>Claude, OpenClaw, Anthropic, AI agent, Boris Cherny</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/job-scams-coca-cola-ferrari-phishing-mnjj</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T23:31:05.394Z</news:publication_date>
      <news:title>Job Scams - Coca-Cola and Ferrari Offers Are Traps</news:title>
      <news:keywords>Coca-Cola, Ferrari, phishing, job scams, Google</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/faa-drone-restrictions-first-amendment-violation-mnjh</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T22:31:18.686Z</news:publication_date>
      <news:title>FAA Drone Restrictions - First Amendment Rights Under Attack</news:title>
      <news:keywords>First Amendment, FAA, ICE, CBP, drone restrictions</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/gaming-industry-cybersecurity-threats-mnjh</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T22:31:15.643Z</news:publication_date>
      <news:title>Gaming Industry - High-Stakes Cybersecurity Threats Explained</news:title>
      <news:keywords>cybercriminal groups, gaming industry, DDoS attacks, ransomware, data privacy</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/brokk-hacked-play-ransomware-data-leaked-mnjg</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T22:01:27.024Z</news:publication_date>
      <news:title>Brokk Hacked - Play Ransomware Exposes Sensitive Data</news:title>
      <news:keywords>Play ransomware, Brokk, data leak, cyberattack, Russia-linked</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/inconsistent-privacy-labels-mobile-apps-mnjg</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T22:01:15.911Z</news:publication_date>
      <news:title>Inconsistent Privacy Labels - Users Left in the Dark</news:title>
      <news:keywords></news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/elastic-security-integrations-q1-2026-mnjf</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T21:31:15.594Z</news:publication_date>
      <news:title>Elastic Security - Nine New Integrations Announced</news:title>
      <news:keywords>Elastic Security, AWS Security Hub, IBM QRadar, Proofpoint Essentials, macOS Security Events</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/jurassic-fish-chokes-on-squid-mnjf</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T21:30:55.305Z</news:publication_date>
      <news:title>Jurassic Fish Chokes on Squid - A 150-Million-Year-Old Fossil</news:title>
      <news:keywords>fossil, squid, Jurassic, belemnite, extinction</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/linkedin-scans-chrome-extensions-data-collection-mnje</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T21:01:22.494Z</news:publication_date>
      <news:title>LinkedIn - Secretly Scans 6,000+ Chrome Extensions</news:title>
      <news:keywords>LinkedIn, BrowserGate, JavaScript, data collection, privacy concerns</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/complexity-crisis-network-security-policy-governance-mnjc</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T20:31:18.335Z</news:publication_date>
      <news:title>Network Security - Understanding the Complexity Crisis</news:title>
      <news:keywords>network security, policy governance, zero trust, compliance, FireMon</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/chaos-malware-targets-64-bit-linux-servers-mnjc</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T20:31:16.341Z</news:publication_date>
      <news:title>Chaos Malware - New Targeting of 64-bit Linux Servers</news:title>
      <news:keywords>Chaos malware, Darktrace, China-nexus threat actors, 64-bit Linux servers, SOCKS5 proxy</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cve-2026-3502-trueconf-video-conferencing-bug-mnjb</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T20:01:13.985Z</news:publication_date>
      <news:title>Video Conferencing Bug - CISA Orders Agencies to Patch</news:title>
      <news:keywords>CVE-2026-3502, TrueConf, Chinese hackers, Check Point, Havoc</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/metrics-it-leaders-business-resilience-mnja</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T19:32:19.188Z</news:publication_date>
      <news:title>Business Resilience - 6 Metrics IT Leaders Must Track</news:title>
      <news:keywords>N-able, SOC Report, business resilience, cybersecurity metrics, IT leaders</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/critical-mistakes-cyber-resilience-fixes-mnja</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T19:31:56.926Z</news:publication_date>
      <news:title>6 Critical Mistakes Undermining Cyber Resilience Explained</news:title>
      <news:keywords>N-able, cyber resilience, incident response, SOC, endpoint security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/improve-business-resilience-backup-recovery-mnja</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T19:31:45.861Z</news:publication_date>
      <news:title>Improve Business Resilience - 7 Essential Backup Strategies</news:title>
      <news:keywords>N-able, backup, recovery, ransomware, data protection</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/alcatraz-raises-50-million-ai-physical-security-mnja</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T19:31:21.134Z</news:publication_date>
      <news:title>Alcatraz Secures $50 Million for AI-Powered Security Solutions</news:title>
      <news:keywords>Alcatraz, AI, facial recognition, BlackPeak Capital, Series B funding</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/fcc-proposes-fine-voxbeam-foreign-call-traffic-mnja</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T19:30:55.282Z</news:publication_date>
      <news:title>FCC Proposes $4.5 Million Fine for Voxbeam&apos;s Fraudulent Calls</news:title>
      <news:keywords>Voxbeam, Axfone, FCC, robocalls, financial impersonation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/intent-based-ai-security-importance-mnj8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T18:32:03.745Z</news:publication_date>
      <news:title>Intent-Based AI Security - Sumit Dhawan Explains Importance</news:title>
      <news:keywords></news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/protect-enterprise-value-merger-acquisition-mnj8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T18:31:37.932Z</news:publication_date>
      <news:title>Protecting Enterprise Value During Mergers and Acquisitions</news:title>
      <news:keywords></news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/china-ta416-targets-european-governments-phishing-mnj7</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T18:01:22.592Z</news:publication_date>
      <news:title>China-Linked TA416 Targets European Governments with Phishing</news:title>
      <news:keywords>TA416, PlugX, OAuth, cyber espionage, European governments</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/regulation-procurement-ai-safety-mnj7</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T18:01:11.801Z</news:publication_date>
      <news:title>Regulation - Tech Nonprofits Urge Feds to Protect AI Safety</news:title>
      <news:keywords>Artificial Intelligence, General Services Administration, procurement, mass surveillance, privacy</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/internet-bug-bounty-pauses-payouts-mnj6</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T17:31:36.811Z</news:publication_date>
      <news:title>Internet Bug Bounty Program - Payouts Temporarily Paused</news:title>
      <news:keywords>Internet Bug Bounty, HackerOne, open-source software, Node.js, AI vulnerability discovery</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/trump-voter-database-suppression-warning-mnj5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T17:01:47.515Z</news:publication_date>
      <news:title>Trump’s Voter Database - Wyden Warns of Voter Suppression</news:title>
      <news:keywords>Trump administration, Social Security Administration, voter database, Ron Wyden, voter suppression</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/rethinking-post-deployment-vulnerability-detection-mnj5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T17:01:19.906Z</news:publication_date>
      <news:title>Post-Deployment Vulnerability Detection - Rethinking Strategies</news:title>
      <news:keywords>CVE, SBOM, OpenSSF</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/hybrid-work-security-challenges-mnj4</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T16:31:13.156Z</news:publication_date>
      <news:title>Hybrid Work - Addressing Security Challenges Ahead</news:title>
      <news:keywords>hybrid work, security, Cisco, credential theft, phishing</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/government-agencies-cyber-threats-ai-tools-mnj2</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T15:30:49.001Z</news:publication_date>
      <news:title>Government Agencies See Cyber Threats as Major Barrier</news:title>
      <news:keywords>cyber defense, AI tools, federal agencies</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/blocking-children-social-media-privacy-risks-mnj1</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T15:01:16.250Z</news:publication_date>
      <news:title>Blocking Children from Social Media - A Misguided Approach</news:title>
      <news:keywords>social media, age verification, privacy risks, children, government regulation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/massachusetts-emergency-communications-cyberattack-mnj0</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T14:30:53.131Z</news:publication_date>
      <news:title>Massachusetts Emergency Communications System Hit by Cyberattack</news:title>
      <news:keywords>Patriot Regional Emergency Communications Center, CodeRED, Crisis24</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/skull-vibrations-xr-headset-authentication-mnix</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T13:31:10.589Z</news:publication_date>
      <news:title>XR Headset Authentication - Skull Vibrations Explained</news:title>
      <news:keywords>XR headsets, authentication, vital signs, skull vibrations, AR</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/third-party-risk-security-posture-mniv</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T12:31:16.293Z</news:publication_date>
      <news:title>Third-Party Risk - The Biggest Gap in Client Security Posture</news:title>
      <news:keywords>Cynomi, third-party risk management, SaaS security, data breach, cyber insurance</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/spear-phishing-campaign-neutralizes-mfa-mniv</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T12:31:14.602Z</news:publication_date>
      <news:title>Spear-Phishing Campaign Neutralizes MFA for Executives</news:title>
      <news:keywords>spear-phishing, multi-factor authentication, VENOM, Abnormal AI, Microsoft 365</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cobra-simplifying-mixed-boolean-arithmetic-obfuscation-mnit</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T11:31:15.855Z</news:publication_date>
      <news:title>CoBRA - Simplifying Mixed Boolean-Arithmetic Obfuscation</news:title>
      <news:keywords>CoBRA, Mixed Boolean-Arithmetic, obfuscation, LLVM, simplification</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/webinar-tv-secretly-records-zoom-meetings-mnit</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T11:31:11.467Z</news:publication_date>
      <news:title>WebinarTV - Secretly Recording Public Zoom Meetings</news:title>
      <news:keywords>WebinarTV, Zoom, privacy, surveillance, recordings</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/mobile-attack-surface-expands-enterprises-lose-control-mnit</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T11:30:56.141Z</news:publication_date>
      <news:title>Mobile Vulnerabilities - Enterprises Struggle with Control</news:title>
      <news:keywords>CVE-2025-43300, CVE-2025-24201, CVE-2025-10585, CVE-2025-48543, CVE-2024-53104</news:keywords>
    </news:news>
  </url>
</urlset>