<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
  <url>
    <loc>https://cyberpings.com/article/texas-hospital-hack-257k-compromised-mnjg</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T22:02:25.586Z</news:publication_date>
      <news:title>Texas Hospital Hack - Over 257K Patients Compromised</news:title>
      <news:keywords>Nacogdoches Memorial Hospital, data breach, patient information, cyberattack, healthcare security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/bogus-installers-rat-cryptominer-spread-mnjg</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T22:02:19.863Z</news:publication_date>
      <news:title>Bogus Installers - RAT and Cryptominer Spread Alert</news:title>
      <news:keywords>REF1695, CNB Bot, PureMiner, PureRAT, XMRig</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/european-commission-breach-cert-eu-mnjg</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T22:02:02.162Z</news:publication_date>
      <news:title>European Commission Breach - Multiple EU Entities Affected</news:title>
      <news:keywords>European Commission, CERT-EU, TeamPCP, AWS, ShinyHunters</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/malicious-lnk-files-github-south-korea-malware-mnjg</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T22:01:52.620Z</news:publication_date>
      <news:title>Malicious LNK Files - GitHub Used in South Korea Malware Attack</news:title>
      <news:keywords>LNK files, PowerShell, GitHub, South Korea, malware campaign</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/akira-ransomware-intrusions-examined-mnjg</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T22:01:35.575Z</news:publication_date>
      <news:title>Akira Ransomware - Accelerated Intrusions Examined</news:title>
      <news:keywords>Akira ransomware, zero-day exploits, double-extortion, Halcyon analysis, FBI</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/brokk-hacked-play-ransomware-data-leaked-mnjg</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T22:01:27.024Z</news:publication_date>
      <news:title>Brokk Hacked - Play Ransomware Exposes Sensitive Data</news:title>
      <news:keywords>Play ransomware, Brokk, data leak, cyberattack, Russia-linked</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/meta-pauses-work-with-mercor-data-breach-mnjg</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T22:01:21.932Z</news:publication_date>
      <news:title>Meta Pauses Work With Mercor After Data Breach Incident</news:title>
      <news:keywords>Meta, Mercor, TeamPCP, LiteLLM, OpenAI</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/threat-intel-dark-sword-eviltokens-drain-drift-funds-mnjg</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T22:01:21.163Z</news:publication_date>
      <news:title>DarkSword and EvilTokens - Phishing Campaigns Exposed</news:title>
      <news:keywords>DarkSword, EvilTokens, Drift, Josh Marpet, Claude</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/inconsistent-privacy-labels-mobile-apps-mnjg</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T22:01:15.911Z</news:publication_date>
      <news:title>Inconsistent Privacy Labels - Users Left in the Dark</news:title>
      <news:keywords></news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/elastic-security-integrations-q1-2026-mnjf</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T21:31:15.594Z</news:publication_date>
      <news:title>Elastic Security - Nine New Integrations Announced</news:title>
      <news:keywords>Elastic Security, AWS Security Hub, IBM QRadar, Proofpoint Essentials, macOS Security Events</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/jurassic-fish-chokes-on-squid-mnjf</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T21:30:55.305Z</news:publication_date>
      <news:title>Jurassic Fish Chokes on Squid - A 150-Million-Year-Old Fossil</news:title>
      <news:keywords>fossil, squid, Jurassic, belemnite, extinction</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/linkedin-scans-chrome-extensions-data-collection-mnje</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T21:01:22.494Z</news:publication_date>
      <news:title>LinkedIn - Secretly Scans 6,000+ Chrome Extensions</news:title>
      <news:keywords>LinkedIn, BrowserGate, JavaScript, data collection, privacy concerns</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/openclaw-unauthenticated-admin-access-vulnerability-mnje</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T21:01:15.786Z</news:publication_date>
      <news:title>OpenClaw Vulnerability - Unauthenticated Admin Access Risk</news:title>
      <news:keywords>OpenClaw, CVE-2026-33579, AI security, privilege escalation, data exfiltration</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/claude-ai-coding-agent-source-code-leak-mnje</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T21:01:15.066Z</news:publication_date>
      <news:title>Claude AI Coding Agent - Source Code Leaked Online</news:title>
      <news:keywords>Claude Code, Anthropic, AI coding assistant, source code leak, npm package</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cloud-data-centers-under-fire-mnje</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T21:01:11.861Z</news:publication_date>
      <news:title>Cloud Data Centers Under Fire Amidst Wartime Cyber Threats</news:title>
      <news:keywords>Chinese hackers, video conferencing zero-day, React2Shell, Change Healthcare breach, insider extortion</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/internet-connected-coffee-machine-data-breach-mnjd</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T20:31:42.222Z</news:publication_date>
      <news:title>Internet-Connected Coffee Machine Leads to Major Data Breach</news:title>
      <news:keywords>IoT, data breach, internet-connected devices</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/axios-maintainers-post-mortem-social-engineering-attack-mnjd</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T20:31:36.417Z</news:publication_date>
      <news:title>Axios Maintainer&apos;s Post Mortem - Social Engineering Attack Explained</news:title>
      <news:keywords>UNC1069, axios, social engineering, remote access trojan, npm</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/fraudsters-exploit-vacant-properties-postal-services-mnjc</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T20:31:35.276Z</news:publication_date>
      <news:title>Fraudsters Exploit Vacant Properties for Identity Theft</news:title>
      <news:keywords>identity theft, postal services, fraud tactics, vacant properties, USPS</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/claude-code-leak-distribute-malware-mnjc</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T20:31:25.726Z</news:publication_date>
      <news:title>Claude Code Leak - Exploited to Distribute Malware</news:title>
      <news:keywords>Claude Code, malware, Vidar, GhostSocks, Zscaler</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/complexity-crisis-network-security-policy-governance-mnjc</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T20:31:18.335Z</news:publication_date>
      <news:title>Network Security - Understanding the Complexity Crisis</news:title>
      <news:keywords>network security, policy governance, zero trust, compliance, FireMon</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/storm-infostealer-bypasses-chrome-encryption-mnjc</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T20:31:16.729Z</news:publication_date>
      <news:title>Storm Infostealer - New Malware Bypasses Chrome Encryption</news:title>
      <news:keywords>Storm infostealer, Google Chrome, cryptocurrency, malware, Varonis Threat Labs</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/chaos-malware-targets-64-bit-linux-servers-mnjc</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T20:31:16.341Z</news:publication_date>
      <news:title>Chaos Malware - New Targeting of 64-bit Linux Servers</news:title>
      <news:keywords>Chaos malware, Darktrace, China-nexus threat actors, 64-bit Linux servers, SOCKS5 proxy</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/residential-proxies-ip-reputation-challenges-mnjc</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T20:31:06.911Z</news:publication_date>
      <news:title>Residential Proxies Undermine IP Reputation Systems, Researchers Warn</news:title>
      <news:keywords>residential proxies, IP reputation, GreyNoise, malicious sessions, network security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/duc-app-data-exposure-server-misconfiguration-mnjc</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T20:30:55.679Z</news:publication_date>
      <news:title>Duc App - Hundreds of Thousands of Personal Records Exposed</news:title>
      <news:keywords>Duc App, data exposure, personal records, server misconfiguration, Duales</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cve-2026-3502-trueconf-video-conferencing-bug-mnjb</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T20:01:13.985Z</news:publication_date>
      <news:title>Video Conferencing Bug - CISA Orders Agencies to Patch</news:title>
      <news:keywords>CVE-2026-3502, TrueConf, Chinese hackers, Check Point, Havoc</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/metrics-it-leaders-business-resilience-mnja</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T19:32:19.188Z</news:publication_date>
      <news:title>Business Resilience - 6 Metrics IT Leaders Must Track</news:title>
      <news:keywords>N-able, SOC Report, business resilience, cybersecurity metrics, IT leaders</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/break-free-from-alert-fatigue-mnja</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T19:32:09.957Z</news:publication_date>
      <news:title>Alert Fatigue - 5 Steps to Build Resilient Security Operations</news:title>
      <news:keywords>N-able, SOC, AI, automation, resilience</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/critical-mistakes-cyber-resilience-fixes-mnja</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T19:31:56.926Z</news:publication_date>
      <news:title>6 Critical Mistakes Undermining Cyber Resilience Explained</news:title>
      <news:keywords>N-able, cyber resilience, incident response, SOC, endpoint security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/improve-business-resilience-backup-recovery-mnja</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T19:31:45.861Z</news:publication_date>
      <news:title>Improve Business Resilience - 7 Essential Backup Strategies</news:title>
      <news:keywords>N-able, backup, recovery, ransomware, data protection</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/bulletproof-endpoint-security-steps-mnja</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T19:31:32.763Z</news:publication_date>
      <news:title>Endpoint Security - 5 Essential Steps to Bulletproof Your Defense</news:title>
      <news:keywords>N-able, endpoint security, automation, EDR, patch management</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/react2shell-hackers-dashboard-exposed-mnja</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T19:31:23.787Z</news:publication_date>
      <news:title>React2Shell - Researchers Expose Hackers’ Dashboard</news:title>
      <news:keywords>React2Shell, CVE-2025-55182, Cisco Talos, UAT-10608, credential harvesting</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/alcatraz-raises-50-million-ai-physical-security-mnja</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T19:31:21.134Z</news:publication_date>
      <news:title>Alcatraz Secures $50 Million for AI-Powered Security Solutions</news:title>
      <news:keywords>Alcatraz, AI, facial recognition, BlackPeak Capital, Series B funding</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/developer-credential-economy-supply-chain-attacks-mnja</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T19:31:07.691Z</news:publication_date>
      <news:title>Supply Chain Attacks - The Developer Credential Economy Emerges</news:title>
      <news:keywords>supply chain attacks, Developer Credential Economy, EDR, Axios npm package, North Korean state actor</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/metasploit-wrap-up-april-2026-mnja</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T19:31:05.344Z</news:publication_date>
      <news:title>Metasploit Updates - New Modules and Enhancements Released</news:title>
      <news:keywords>Metasploit, CVE-2026-27636, CVE-2025-50286, CVE-2026-28289, Windows Persistence</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/isc2-integrates-ai-security-certifications-mnja</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T19:30:58.712Z</news:publication_date>
      <news:title>ISC2 Integrates AI Security into Cybersecurity Certifications</news:title>
      <news:keywords>ISC2, AI security, cybersecurity certifications, continuing education, exam guidance</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/fcc-proposes-fine-voxbeam-foreign-call-traffic-mnja</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T19:30:55.282Z</news:publication_date>
      <news:title>FCC Proposes $4.5 Million Fine for Voxbeam&apos;s Fraudulent Calls</news:title>
      <news:keywords>Voxbeam, Axfone, FCC, robocalls, financial impersonation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/business-resilience-cybersecurity-steps-mnj9</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T19:01:41.938Z</news:publication_date>
      <news:title>Business Resilience - 5 Critical Steps for Cybersecurity</news:title>
      <news:keywords>N-able, business resilience, cybersecurity, Adlumin, SOC report</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/insider-threat-extortion-daniel-rhyne-guilty-mnj9</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T19:01:20.705Z</news:publication_date>
      <news:title>Insider Threat - Engineer Pleads Guilty to Extortion Attack</news:title>
      <news:keywords>insider threat, extortion, Daniel Rhyne, cybersecurity, network security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/weaponizing-trust-signals-claude-code-github-payloads-mnj9</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T19:01:19.039Z</news:publication_date>
      <news:title>Malware - Weaponizing Trust Signals with Claude Code Lures</news:title>
      <news:keywords>Vidar, GhostSocks, Claude Code, GitHub, Anthropic</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/future-of-ai-agents-rsac-2026-mnj8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T18:32:07.077Z</news:publication_date>
      <news:title>Future of AI Agents - Insights from Top Cybersecurity CEOs</news:title>
      <news:keywords>AI Agents, Cybersecurity, RSAC 2026, CrowdStrike, SentinelOne</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/intent-based-ai-security-importance-mnj8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T18:32:03.745Z</news:publication_date>
      <news:title>Intent-Based AI Security - Sumit Dhawan Explains Importance</news:title>
      <news:keywords></news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/protect-enterprise-value-merger-acquisition-mnj8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T18:31:37.932Z</news:publication_date>
      <news:title>Protecting Enterprise Value During Mergers and Acquisitions</news:title>
      <news:keywords></news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/russians-suspected-using-iphone-spyware-mnj8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T18:31:36.253Z</news:publication_date>
      <news:title>Russians Suspected of Using iPhone Spyware for Espionage</news:title>
      <news:keywords>iPhone, spyware, Russia</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/coolest-ai-security-products-rsac-2026-mnj8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T18:31:33.455Z</news:publication_date>
      <news:title>AI Security - Discover 20 Coolest Products at RSAC 2026</news:title>
      <news:keywords>RSAC 2026, AI Security, CrowdStrike, Palo Alto Networks, Okta</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/apple-patches-darksword-ios-18-mnj8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T18:31:15.929Z</news:publication_date>
      <news:title>Apple Patches DarkSword - Protects iOS 18 Users</news:title>
      <news:keywords>iOS 18, DarkSword, Apple</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ai-agents-insider-risk-threat-model-mnj8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T18:31:10.218Z</news:publication_date>
      <news:title>AI Agents - Redefining the Insider Risk Threat Model</news:title>
      <news:keywords>AI Agents, Insider Risk, Threat Model</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ai-security-risks-proofpoint-cso-ryan-kalember-mnj8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T18:31:09.402Z</news:publication_date>
      <news:title>AI Security Risks - Insights from Proofpoint&apos;s CSO Ryan Kalember</news:title>
      <news:keywords>Proofpoint, Ryan Kalember, AI Security, RSA Conference 2026, Acuvity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/zero-trust-network-access-post-vpn-mnj8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T18:31:04.205Z</news:publication_date>
      <news:title>Zero Trust - Redefining Secure Network Access Post-VPN</news:title>
      <news:keywords>Zero Trust, ThreatLocker, Network Security, VPN, Cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/eu-cyber-agency-attributes-data-breach-team-pcp-mnj8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T18:30:58.275Z</news:publication_date>
      <news:title>EU Cyber Agency Attributes Major Data Breach to TeamPCP</news:title>
      <news:keywords>TeamPCP, CERT-EU, European Commission, AWS, ShinyHunters</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/china-ta416-targets-european-governments-phishing-mnj7</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T18:01:22.592Z</news:publication_date>
      <news:title>China-Linked TA416 Targets European Governments with Phishing</news:title>
      <news:keywords>TA416, PlugX, OAuth, cyber espionage, European governments</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/supply-chain-attacks-2026-mnj7</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T18:01:21.897Z</news:publication_date>
      <news:title>Supply Chain Attacks - Protecting Your Organization&apos;s Assets</news:title>
      <news:keywords>Axios, TeamPCP, Trivy, React2Shell, Log4j</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/regulation-procurement-ai-safety-mnj7</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T18:01:11.801Z</news:publication_date>
      <news:title>Regulation - Tech Nonprofits Urge Feds to Protect AI Safety</news:title>
      <news:keywords>Artificial Intelligence, General Services Administration, procurement, mass surveillance, privacy</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/hims-hers-data-breach-zendesk-support-tickets-mnj7</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T18:01:09.202Z</news:publication_date>
      <news:title>Hims &amp; Hers - Data Breach Exposes Support Ticket Information</news:title>
      <news:keywords>Hims &amp; Hers, Zendesk, ShinyHunters</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/f5-big-ip-apm-rce-vulnerability-exposed-mnj7</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T18:01:06.466Z</news:publication_date>
      <news:title>F5 BIG-IP APM Vulnerability - 14,000 Devices Exposed Online</news:title>
      <news:keywords>CVE-2025-53521, F5 BIG-IP APM, Remote Code Execution, CISA, Shadowserver</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/internet-bug-bounty-pauses-payouts-mnj6</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T17:31:36.811Z</news:publication_date>
      <news:title>Internet Bug Bounty Program - Payouts Temporarily Paused</news:title>
      <news:keywords>Internet Bug Bounty, HackerOne, open-source software, Node.js, AI vulnerability discovery</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cookie-controlled-php-web-shells-linux-servers-mnj6</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T17:31:19.072Z</news:publication_date>
      <news:title>PHP Web Shells - Microsoft Reveals Cookie-Controlled Threats</news:title>
      <news:keywords>PHP, Linux, Web Shell, Remote Code Execution, Microsoft Defender</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/google-patches-chrome-zero-day-cve-2026-5281-mnj6</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T17:31:19.055Z</news:publication_date>
      <news:title>Google Patches Fourth Chrome Zero-Day Vulnerability</news:title>
      <news:keywords>CVE-2026-5281, Chrome, Google, WebGPU, Dawn</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/trump-voter-database-suppression-warning-mnj5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T17:01:47.515Z</news:publication_date>
      <news:title>Trump’s Voter Database - Wyden Warns of Voter Suppression</news:title>
      <news:keywords>Trump administration, Social Security Administration, voter database, Ron Wyden, voter suppression</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/claude-code-vulnerability-explained-mnj5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T17:01:33.444Z</news:publication_date>
      <news:title>Claude Code Vulnerability - Exploit Risks Revealed</news:title>
      <news:keywords>Claude Code, Anthropic, Adversa, vulnerability, source code</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/axios-npm-supply-chain-incident-mnj5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T17:01:32.229Z</news:publication_date>
      <news:title>Axios NPM Supply Chain Incident - Malicious Packages Delivered</news:title>
      <news:keywords>Axios, supply chain attack, remote access trojan, npm, Cisco Talos</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/trump-budget-cuts-cisa-funding-mnj5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T17:01:27.033Z</news:publication_date>
      <news:title>Trump Budget Proposal Cuts CISA Funding by $707 Million</news:title>
      <news:keywords>CISA, Trump administration, Department of Homeland Security, Bennie Thompson, cybersecurity budget</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/rethinking-post-deployment-vulnerability-detection-mnj5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T17:01:19.906Z</news:publication_date>
      <news:title>Post-Deployment Vulnerability Detection - Rethinking Strategies</news:title>
      <news:keywords>CVE, SBOM, OpenSSF</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/qilin-ransomware-attack-die-linke-mnj5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T17:01:12.926Z</news:publication_date>
      <news:title>Qilin Ransomware - Data Stolen from Die Linke Party</news:title>
      <news:keywords>Qilin, Die Linke, ransomware, Germany, data breach</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/progress-sharefile-vulnerabilities-unauthenticated-exfiltration-mnj4</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T16:31:35.439Z</news:publication_date>
      <news:title>Progress ShareFile Vulnerabilities - Unauthenticated Exfiltration Risk</news:title>
      <news:keywords>CVE-2026-2699, CVE-2026-2701, Progress ShareFile, unauthenticated access, remote code execution</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/critical-flaws-progress-sharefile-mnj4</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T16:31:34.678Z</news:publication_date>
      <news:title>Critical Flaws in Progress ShareFile - Researchers Warn</news:title>
      <news:keywords>Progress ShareFile, remote code execution, vulnerabilities</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/trivy-supply-chain-attack-europa-data-breach-mnj4</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T16:31:15.047Z</news:publication_date>
      <news:title>Trivy Supply Chain Attack - Data Breach at Europa.eu Exposed</news:title>
      <news:keywords>Trivy, CERT-EU, TeamPCP, AWS, data breach</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/hybrid-work-security-challenges-mnj4</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T16:31:13.156Z</news:publication_date>
      <news:title>Hybrid Work - Addressing Security Challenges Ahead</news:title>
      <news:keywords>hybrid work, security, Cisco, credential theft, phishing</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/trump-fy2027-budget-targets-cisa-mnj4</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T16:31:11.829Z</news:publication_date>
      <news:title>Trump’s FY2027 Budget - Major Cuts Proposed for CISA</news:title>
      <news:keywords>CISA, budget, misinformation, White House, FY2027</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/shinyhunters-final-warning-cisco-data-theft-mnj4</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T16:31:09.923Z</news:publication_date>
      <news:title>ShinyHunters Issues Final Warning to Cisco Over Data Theft</news:title>
      <news:keywords>ShinyHunters, Cisco, Salesforce, AWS, data theft</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/eu-cyber-agency-blames-hacking-gangs-data-breach-mnj3</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T16:01:32.117Z</news:publication_date>
      <news:title>Europe’s Cyber Agency Blames Hacking Gangs for Breach</news:title>
      <news:keywords>TeamPCP, ShinyHunters, European Commission, AWS, Trivy</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/hims-hers-data-breach-customer-support-mnj3</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T16:01:31.086Z</news:publication_date>
      <news:title>Hims &amp; Hers Data Breach Exposes Customer Support Data</news:title>
      <news:keywords>Hims &amp; Hers, data breach, customer support, social engineering, personal data</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/privacy-defender-cindy-cohn-dc-events-mnj3</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T16:01:24.507Z</news:publication_date>
      <news:title>Privacy&apos;s Defender - Cindy Cohn Hosts Events in D.C.</news:title>
      <news:keywords>Cindy Cohn, EFF, Privacy&apos;s Defender, Gigi Sohn, WISP</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/teampcp-attacks-expanding-hacker-infighting-mnj3</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T16:01:23.315Z</news:publication_date>
      <news:title>TeamPCP Attacks - Hacker Infighting Expands Blast Radius</news:title>
      <news:keywords>TeamPCP, ShinyHunters, Lapsus$</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/sophos-gartner-peer-insights-customers-choice-2026-mnj2</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T15:31:10.037Z</news:publication_date>
      <news:title>Sophos - Named 2026 Gartner Customers&apos; Choice for MDR</news:title>
      <news:keywords>Gartner, Gartner Peer Insights, MDR, Sophos MDR, Third-Party Reviews</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cisco-imc-auth-bypass-vulnerability-cve-2026-20093-mnj2</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T15:30:59.188Z</news:publication_date>
      <news:title>Cisco IMC Vulnerability - Critical Auth Bypass Flaw Discovered</news:title>
      <news:keywords>CVE-2026-20093, Cisco, Integrated Management Controller, authentication bypass, security update</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ai-security-impact-web-traffic-mnj2</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T15:30:52.842Z</news:publication_date>
      <news:title>AI Security - Transforming Web Traffic Dynamics Forever</news:title>
      <news:keywords>AI agents, web traffic, security teams, automation, context-aware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/government-agencies-cyber-threats-ai-tools-mnj2</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T15:30:49.001Z</news:publication_date>
      <news:title>Government Agencies See Cyber Threats as Major Barrier</news:title>
      <news:keywords>cyber defense, AI tools, federal agencies</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/kimsuky-malicious-lnk-files-python-backdoor-mnj1</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T15:01:26.514Z</news:publication_date>
      <news:title>Kimsuky - Malicious LNK Files Deliver Python-Based Backdoor</news:title>
      <news:keywords>Kimsuky, Python backdoor, LNK files, PowerShell, malware campaign</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/blocking-children-social-media-privacy-risks-mnj1</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T15:01:16.250Z</news:publication_date>
      <news:title>Blocking Children from Social Media - A Misguided Approach</news:title>
      <news:keywords>social media, age verification, privacy risks, children, government regulation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/phishing-campaign-steals-bank-credentials-philippines-mnj0</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T14:31:28.675Z</news:publication_date>
      <news:title>Phishing Campaign - Hackers Steal Bank Credentials in Philippines</news:title>
      <news:keywords>phishing, banking, Group-IB, PHISLES, Philippines</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/securing-physical-world-cybersecurity-podcast-mnj0</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T14:31:15.183Z</news:publication_date>
      <news:title>Securing Operational Technology - Cyber Risk Insights Revealed</news:title>
      <news:keywords>Fortinet, Operational Technology, IT/OT Convergence, Cybersecurity, KPMG</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/visibility-problem-cybersecurity-explained-mnj0</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T14:31:15.126Z</news:publication_date>
      <news:title>Visibility Problem - Understanding Cybersecurity Gaps</news:title>
      <news:keywords>Rapid7, Surface Command, identity exposure</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/sophos-gartner-peer-insights-mdr-mnj0</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T14:31:09.496Z</news:publication_date>
      <news:title>Sophos Named 2026 Gartner Peer Insights Customers&apos; Choice</news:title>
      <news:keywords>Gartner, Sophos, MDR, Peer Insights, Endpoint Protection</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/axios-npm-compromise-social-engineering-attack-mnj0</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T14:31:09.349Z</news:publication_date>
      <news:title>Axios npm Compromise - Targeted Social Engineering Attack Exposed</news:title>
      <news:keywords>Axios, npm, social engineering, remote access trojan, dependency attack</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/multi-extortion-ransomware-evolution-mnj0</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T14:30:57.633Z</news:publication_date>
      <news:title>Multi-Extortion Ransomware - Understanding Its Evolution</news:title>
      <news:keywords>Ransomware, Penta Security, D.AMO, University of Mississippi Medical Center, BridgePay</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/massachusetts-emergency-communications-cyberattack-mnj0</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T14:30:53.131Z</news:publication_date>
      <news:title>Massachusetts Emergency Communications System Hit by Cyberattack</news:title>
      <news:keywords>Patriot Regional Emergency Communications Center, CodeRED, Crisis24</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/crystalx-rat-new-maas-malware-mniz</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T14:01:24.464Z</news:publication_date>
      <news:title>CrystalX RAT - New MaaS Malware Combines Spyware and Access</news:title>
      <news:keywords>CrystalX RAT, MaaS malware, Kaspersky, spyware, remote access</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/chainguard-factory-2-0-automate-software-supply-chain-mniz</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T14:01:14.942Z</news:publication_date>
      <news:title>Chainguard - Unveils Factory 2.0 for Software Supply Chain</news:title>
      <news:keywords>Chainguard, software supply chain, open-source</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/skull-vibrations-xr-headset-authentication-mnix</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T13:31:10.589Z</news:publication_date>
      <news:title>XR Headset Authentication - Skull Vibrations Explained</news:title>
      <news:keywords>XR headsets, authentication, vital signs, skull vibrations, AR</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ukraine-russian-hackers-revisiting-past-breaches-mnix</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T13:31:07.846Z</news:publication_date>
      <news:title>Russian Hackers Revisit Past Breaches for New Attacks</news:title>
      <news:keywords>APT28, Void Blizzard, CERT-UA</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/2026-ai-cybersecurity-summit-importance-mnix</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T13:31:03.049Z</news:publication_date>
      <news:title>2026 AI Cybersecurity Summit - Understanding Its Importance</news:title>
      <news:keywords>AI Cybersecurity Summit, Fortinet, GenAI, security strategy, attack surface</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/teampcp-supply-chain-campaign-update-006-mnix</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T13:31:00.702Z</news:publication_date>
      <news:title>TeamPCP Supply Chain Campaign - European Commission Cloud Breach</news:title>
      <news:keywords>TeamPCP, CERT-EU, Mandiant, SaaS, Supply Chain</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/new-phishing-platform-credential-theft-campaigns-mnix</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T13:30:57.845Z</news:publication_date>
      <news:title>New Phishing Platform - Credential Theft Targeting Executives</news:title>
      <news:keywords>Venom, credential theft, phishing, C-suite, Abnormal</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/supply-chain-oversight-issues-mniw</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T13:01:26.584Z</news:publication_date>
      <news:title>Supply Chain Vulnerabilities - Addressing Critical Oversight Gaps</news:title>
      <news:keywords></news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/chatgpt-data-leak-android-rootkit-ransomware-attack-mniw</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T13:01:25.107Z</news:publication_date>
      <news:title>ChatGPT Data Leak - Android Rootkit and Ransomware Attack</news:title>
      <news:keywords>ChatGPT, Android, Ransomware, Symantec, Intesa Sanpaolo</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/supply-chain-attack-litelm-axios-chrome-zero-day-mniw</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T13:01:16.895Z</news:publication_date>
      <news:title>Supply Chain Attack - SentinelOne Stops LiteLLM Threat</news:title>
      <news:keywords>CVE-2026-5281, SentinelOne, Axios, LiteLLM, UNC1069</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/trueconf-zero-day-exploited-asian-government-attacks-mniw</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T13:01:01.757Z</news:publication_date>
      <news:title>TrueConf Zero-Day Exploited in Asian Government Attacks</news:title>
      <news:keywords>CVE-2026-3502, TrueConf, Chinese threat actor, Check Point, Havoc</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/third-party-risk-security-posture-mniv</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T12:31:16.293Z</news:publication_date>
      <news:title>Third-Party Risk - The Biggest Gap in Client Security Posture</news:title>
      <news:keywords>Cynomi, third-party risk management, SaaS security, data breach, cyber insurance</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/spear-phishing-campaign-neutralizes-mfa-mniv</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T12:31:14.602Z</news:publication_date>
      <news:title>Spear-Phishing Campaign Neutralizes MFA for Executives</news:title>
      <news:keywords>spear-phishing, multi-factor authentication, VENOM, Abnormal AI, Microsoft 365</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/windows-security-secure-boot-status-indicators-mniv</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T12:31:06.804Z</news:publication_date>
      <news:title>Windows Security - New Secure Boot Status Indicators Added</news:title>
      <news:keywords>Microsoft, Secure Boot, Windows Security, 2026 expiration, IT administrators</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/critical-sharefile-flaws-unauthenticated-rce-mniv</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T12:31:06.290Z</news:publication_date>
      <news:title>Critical ShareFile Vulnerabilities Enable Unauthenticated RCE</news:title>
      <news:keywords>CVE-2026-2699, CVE-2026-2701, ShareFile, remote code execution, WatchTowr</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/crowdstrike-next-gen-siem-ingest-microsoft-defender-mniv</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T12:31:01.297Z</news:publication_date>
      <news:title>CrowdStrike Teams Up with Microsoft for Next-Gen SIEM</news:title>
      <news:keywords>CrowdStrike, Microsoft, SIEM, telemetry, collaboration</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/unc1069-social-engineering-axios-npm-supply-chain-attack-mniv</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T12:30:58.426Z</news:publication_date>
      <news:title>UNC1069 Social Engineering - Axios Maintainer Compromised</news:title>
      <news:keywords>UNC1069, Axios, social engineering, npm, malware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cobra-simplifying-mixed-boolean-arithmetic-obfuscation-mnit</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T11:31:15.855Z</news:publication_date>
      <news:title>CoBRA - Simplifying Mixed Boolean-Arithmetic Obfuscation</news:title>
      <news:keywords>CoBRA, Mixed Boolean-Arithmetic, obfuscation, LLVM, simplification</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/webinar-tv-secretly-records-zoom-meetings-mnit</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T11:31:11.467Z</news:publication_date>
      <news:title>WebinarTV - Secretly Recording Public Zoom Meetings</news:title>
      <news:keywords>WebinarTV, Zoom, privacy, surveillance, recordings</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/malicious-chatgpt-ad-blocker-chrome-extension-mnit</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T11:31:11.043Z</news:publication_date>
      <news:title>Malicious Chrome Extension Steals ChatGPT Conversations</news:title>
      <news:keywords>ChatGPT, Chrome Extension, malware, Discord, data theft</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/mobile-attack-surface-expands-enterprises-lose-control-mnit</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T11:30:56.141Z</news:publication_date>
      <news:title>Mobile Vulnerabilities - Enterprises Struggle with Control</news:title>
      <news:keywords>CVE-2025-43300, CVE-2025-24201, CVE-2025-10585, CVE-2025-48543, CVE-2024-53104</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/microsoft-exchange-online-mailbox-access-issues-mnit</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T11:30:50.377Z</news:publication_date>
      <news:title>Exchange Online - Microsoft Resolves Ongoing Mailbox Access Issues</news:title>
      <news:keywords>Exchange Online, Outlook, Microsoft, macOS, mobile</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/claude-code-source-leak-exploited-malware-mnis</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T11:01:28.854Z</news:publication_date>
      <news:title>Claude Code Source Leak - Malware Exploits Developers&apos; Trust</news:title>
      <news:keywords>Claude Code, Anthropic, Vidar, GhostSocks, Zscaler</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/react2shell-credential-harvesting-campaign-mnis</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T11:01:28.650Z</news:publication_date>
      <news:title>React2Shell - Large-Scale Credential Harvesting Campaign Uncovered</news:title>
      <news:keywords>CVE-2025-55182, React2Shell, Cisco Talos, UAT-10608, Nexus Listener</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/trivy-supply-chain-attack-eu-commission-aws-breach-mnir</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T10:31:42.984Z</news:publication_date>
      <news:title>Trivy Supply Chain Attack - European Commission AWS Breach</news:title>
      <news:keywords>Trivy, TeamPCP, AWS, ShinyHunters, CERT-EU</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/venom-stealer-clickfix-data-exfiltration-mnir</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T10:31:22.971Z</news:publication_date>
      <news:title>Venom Stealer - New Malware Turns ClickFix Lures Into Threats</news:title>
      <news:keywords>Venom Stealer, ClickFix, credential theft, malware-as-a-service, cybercrime</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/phorpiex-botnet-ransomware-sextortion-crypto-clipping-mnir</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T10:31:02.217Z</news:publication_date>
      <news:title>Phorpiex Botnet - Spreading Ransomware and Sextortion Tactics</news:title>
      <news:keywords>Phorpiex, ransomware, sextortion, crypto-clipping, LockBit</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/t-mobile-data-breach-insider-incident-mnir</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T10:30:59.063Z</news:publication_date>
      <news:title>T-Mobile - Clarifies Details on Recent Data Breach Incident</news:title>
      <news:keywords>T-Mobile, data breach, insider threat</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/nigerian-romance-scammer-jailed-fraud-mniq</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T10:01:11.943Z</news:publication_date>
      <news:title>Nigerian Romance Scammer Jailed After Fellow Fraudster Exposed Him</news:title>
      <news:keywords>romance scam, wire fraud, money laundering</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/north-korean-hackers-drain-285-million-drift-mniq</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T10:01:04.744Z</news:publication_date>
      <news:title>North Korean Hackers Drain $285 Million From Drift in Sophisticated Attack</news:title>
      <news:keywords>North Korea, Drift, cryptocurrency, DeFi, heist, hacking, cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/drift-social-engineering-attack-285-million-loss-mnip</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T09:31:41.143Z</news:publication_date>
      <news:title>Drift Loses $285 Million in Social Engineering Attack</news:title>
      <news:keywords>Drift, North Korea, social engineering, crypto theft, CarbonVote Token</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cyber-industry-trends-rsac-2026-mnip</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T09:31:22.706Z</news:publication_date>
      <news:title>Cyber Industry Trends - Insights from RSAC 2026</news:title>
      <news:keywords>RSA Conference, AI in Cybersecurity, CISO Trends, Managed Security Services, Microsoft Defender</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/sparkcat-variant-ios-android-apps-steals-crypto-wallet-mnip</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T09:31:16.286Z</news:publication_date>
      <news:title>SparkCat Variant - New Malware Steals Crypto Wallet Images</news:title>
      <news:keywords>SparkCat, Kaspersky, malware, cryptocurrency, iOS</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/windows-extortion-plot-daniel-rhyne-mnip</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T09:31:15.175Z</news:publication_date>
      <news:title>Windows Extortion Plot - Engineer Pleads Guilty to Charges</news:title>
      <news:keywords>extortion, Windows, Daniel Rhyne, ransom, Kansas City</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/microsoft-force-upgrades-windows-11-version-25h2-mnip</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T09:31:06.969Z</news:publication_date>
      <news:title>Microsoft Forcing Upgrades to Unmanaged Windows 11 Devices</news:title>
      <news:keywords>Windows 11, version 25H2, Microsoft, Windows Update, unmanaged devices</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cbp-facility-codes-leaked-quizlet-mnip</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T09:31:02.999Z</news:publication_date>
      <news:title>CBP Facility Codes Exposed in Quizlet Flashcards Leak</news:title>
      <news:keywords>Customs and Border Protection, Quizlet, sensitive information, security procedures, DHS</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/tp-link-vulnerabilities-dos-crash-routers-mnio</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T09:01:24.377Z</news:publication_date>
      <news:title>TP-Link Vulnerabilities - Attackers Can Crash Routers</news:title>
      <news:keywords>CVE-2026-34121, TP-Link, Tapo C520WS, Denial-of-Service, authentication bypass</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/iran-handala-breach-israeli-defence-contractor-mnio</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T09:01:21.321Z</news:publication_date>
      <news:title>Iran Handala Group Breaches Israeli Defence Contractor PSK Wind</news:title>
      <news:keywords>PSK Wind Technologies, Handala, Iran, data breach, Israel</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/hackers-compromised-nextjs-hosts-react2shell-vulnerability-mnim</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T08:01:38.828Z</news:publication_date>
      <news:title>React2Shell Vulnerability - Hackers Compromise 700+ Hosts</news:title>
      <news:keywords>CVE-2025-55182, Next.js, UAT-10608, React2Shell, Cisco Talos</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/microsoft-force-upgrades-windows-11-24h2-pcs-mnim</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T08:01:17.534Z</news:publication_date>
      <news:title>Microsoft Forces Upgrades for Unmanaged Windows 11 Devices</news:title>
      <news:keywords>Windows 11, Windows 25H2, Microsoft, upgrade, security updates</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/aperion-smartflow-sdk-secure-ai-governance-mnil</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T07:30:47.922Z</news:publication_date>
      <news:title>APERION Launches SmartFlow SDK for Secure AI Governance</news:title>
      <news:keywords>SmartFlow SDK, LiteLLM, TeamPCP, Aqua Security, AI governance</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/trivy-supply-chain-attack-eu-cloud-breach-mnik</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T07:01:41.819Z</news:publication_date>
      <news:title>Trivy Supply Chain Attack - European Commission Breached</news:title>
      <news:keywords>ShinyHunters, European Commission, Trivy, AWS, CERT-EU, data breach, supply chain attack, TeamPCP</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/european-commission-hack-exposes-data-30-eu-entities-mnik</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T07:01:34.019Z</news:publication_date>
      <news:title>European Commission Hack Exposes Data of 30 EU Entities</news:title>
      <news:keywords>TeamPCP, ShinyHunters, European Commission, AWS, data breach</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/north-korea-github-lnk-phishing-attacks-mnih</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T06:01:02.844Z</news:publication_date>
      <news:title>North Korea-Linked Campaign Uses GitHub for Phishing Attacks</news:title>
      <news:keywords>North Korea, LNK files, GitHub, Kimsuky, APT37</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/messaging-apps-android-permissions-analysis-mnig</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T05:31:40.045Z</news:publication_date>
      <news:title>Messaging Apps - Analyzing Permissions on Android Devices</news:title>
      <news:keywords>Messenger, Signal, Telegram</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/best-vpn-linux-2026-mnig</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T05:31:33.194Z</news:publication_date>
      <news:title>Best VPN for Linux in 2026 - Top Picks Explained</news:title>
      <news:keywords>Linux VPN, NordVPN, ExpressVPN, Proton VPN, Surfshark</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/microsoft-open-source-toolkit-autonomous-ai-governance-mnig</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T05:31:19.767Z</news:publication_date>
      <news:title>Microsoft&apos;s Open-Source Toolkit for Autonomous AI Governance</news:title>
      <news:keywords>Agent Governance Toolkit, Microsoft, autonomous AI agents, open source, LangChain</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/drift-protocol-north-korean-hackers-280-million-theft-mnig</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T05:31:14.302Z</news:publication_date>
      <news:title>Drift Protocol - North Korean Hackers Steal $280 Million</news:title>
      <news:keywords>Drift Protocol, North Korea, financial theft, Solana, PeckShield</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/best-application-performance-monitoring-tools-2026-mnig</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T05:31:12.919Z</news:publication_date>
      <news:title>Best Application Performance Monitoring Tools - 2026 Guide</news:title>
      <news:keywords>Application Performance Monitoring, New Relic, AppDynamics, Datadog, Dynatrace</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/beste-xdr-tools-2026-mnif</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T05:01:21.458Z</news:publication_date>
      <news:title>Best XDR Tools - Top Solutions for Enhanced Security</news:title>
      <news:keywords>XDR, CrowdStrike, Microsoft, Palo Alto Networks, Bitdefender</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/new-infosec-products-march-2026-mnie</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T04:31:40.356Z</news:publication_date>
      <news:title>New Infosec Tools - Highlights from March 2026 Releases</news:title>
      <news:keywords>Beazley, Bonfy.AI, Mend.io, Mimecast, NinjaOne</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/digital-trust-erosion-login-experience-mnie</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T04:31:15.018Z</news:publication_date>
      <news:title>Digital Trust Erosion - How Logins Impact User Confidence</news:title>
      <news:keywords>Thales Digital Trust Index, AI, MFA, data privacy, user experience</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/apple-ohttp-relay-third-party-endpoints-user-visibility-mnid</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T04:02:28.707Z</news:publication_date>
      <news:title>Apple OHTTP Relay - Exposes User Data Through Third-Party Endpoints</news:title>
      <news:keywords>Apple, Live Caller ID, OHTTP, data privacy, OpenAI</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cve-2026-33691-owasp-crs-whitespace-padding-bypass-mnid</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T04:02:13.423Z</news:publication_date>
      <news:title>CVE-2026-33691 - OWASP CRS Whitespace Padding Bypass Alert</news:title>
      <news:keywords>CVE-2026-33691, OWASP CRS, file upload vulnerability, web shell, RelunSec</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/local-privilege-escalation-vienna-assistant-macos-mnid</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T04:02:02.394Z</news:publication_date>
      <news:title>Local Privilege Escalation - Vulnerability in Vienna Assistant</news:title>
      <news:keywords>CVE-2026-24068, Vienna Assistant, local privilege escalation, SEC Consult, MacOS</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/metinfo-cms-php-code-injection-vulnerability-mnid</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T04:01:47.072Z</news:publication_date>
      <news:title>MetInfo CMS Vulnerability - PHP Code Injection Risk</news:title>
      <news:keywords>CVE-2026-29014, MetInfo CMS, PHP Code Injection</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/broken-access-control-open-webui-cve-2026-34222-mnid</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T04:01:34.836Z</news:publication_date>
      <news:title>Broken Access Control - High Risk in Open WebUI Discovered</news:title>
      <news:keywords>CVE-2026-34222, Open WebUI, SEC Consult</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cisco-imc-auth-bypass-patch-released-mnic</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T03:31:13.016Z</news:publication_date>
      <news:title>Cisco IMC Auth Bypass - Critical Vulnerability Patched</news:title>
      <news:keywords>CVE-2026-20093, Cisco IMC, BMC vulnerabilities, remote access, Cisco Unified Computing System, Cisco, Vulnerability, IMC, Security Patch, Remote Access</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/litelm-supply-chain-attack-affects-ai-recruiting-firm-mnic</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T03:31:03.998Z</news:publication_date>
      <news:title>LiteLLM Supply Chain Attack - AI Recruiting Firm Affected</news:title>
      <news:keywords>LiteLLM, Mercor, Lapsus$, TeamPCP, Trivy</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/microsoft-device-code-phishing-eviltokens-mnic</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T03:30:46.957Z</news:publication_date>
      <news:title>Microsoft Device Code Phishing - EvilTokens Kit Discovered</news:title>
      <news:keywords>Microsoft, EvilTokens, Augmented Marauder, phishing, business email compromise</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/adobe-breach-claims-leak-13-million-support-tickets-mnia</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T02:30:51.746Z</news:publication_date>
      <news:title>Adobe Breach - Threat Actor Claims Leak of 13 Million Records</news:title>
      <news:keywords>Adobe, Mr. Raccoon, data breach, support tickets, HackerOne</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/isc-stormcast-april-3-2026-mni9</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T02:00:59.297Z</news:publication_date>
      <news:title>ISC Stormcast - Insights from April 3rd, 2026</news:title>
      <news:keywords></news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cloudflare-emdash-wordpress-alternative-mni8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T01:31:10.387Z</news:publication_date>
      <news:title>Cloudflare’s EmDash - A New Alternative to WordPress</news:title>
      <news:keywords>Cloudflare, EmDash, WordPress, CMS, Cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ransomware-intrusion-north-dakota-water-facility-mni8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T01:30:53.065Z</news:publication_date>
      <news:title>Ransomware Intrusion - North Dakota Water Treatment Facility Hit</news:title>
      <news:keywords>North Dakota, ransomware, water treatment facility</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/how-world-got-owned-1990s-part-one-mni7</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T01:01:25.594Z</news:publication_date>
      <news:title>Hacking History - Exploring the 1990s Hacker Culture</news:title>
      <news:keywords>DefCon, Black Hat, Kevin Poulsen</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/nissan-third-party-hack-everest-ransomware-mni6</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T00:31:02.567Z</news:publication_date>
      <news:title>Nissan Confirms Data Breach from Everest Ransomware Attack</news:title>
      <news:keywords>Nissan, Everest ransomware, data breach, third-party vendor, customer data</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/rosariosis-6-7-2-cross-site-scripting-xss-mni5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T00:04:56.242Z</news:publication_date>
      <news:title>RosarioSIS 6.7.2 - Critical XSS Vulnerability Discovered</news:title>
      <news:keywords>RosarioSIS, XSS, 6.7.2</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/phpmyadmin-5-0-0-sql-injection-mni5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T00:04:42.646Z</news:publication_date>
      <news:title>phpMyAdmin 5.0.0 - Critical SQL Injection Vulnerability</news:title>
      <news:keywords>phpMyAdmin, SQL Injection</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/openrepeater-2-1-os-command-injection-mni5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T00:04:30.348Z</news:publication_date>
      <news:title>OpenRepeater 2.1 - High-Risk OS Command Injection Vulnerability</news:title>
      <news:keywords>OpenRepeater, OS Command Injection</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/phpipam-1-4-sql-injection-vulnerability-mni5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T00:04:18.919Z</news:publication_date>
      <news:title>phpIPAM 1.4 - Critical SQL Injection Vulnerability Found</news:title>
      <news:keywords>phpIPAM, SQL-Injection, CVE-2023-XXXX</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/mobiledetect-2-8-31-cross-site-scripting-mni5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T00:04:04.700Z</news:publication_date>
      <news:title>MobileDetect 2.8.31 - Critical XSS Vulnerability Discovered</news:title>
      <news:keywords>MobileDetect, XSS, vulnerability</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/django-5-1-13-sql-injection-mni5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T00:03:29.534Z</news:publication_date>
      <news:title>Django 5.1.13 - Critical SQL Injection Vulnerability Found</news:title>
      <news:keywords>Django, SQL Injection, CVE-2023-XXXX</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/mangoswebv4-4-0-6-reflected-xss-mni5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T00:03:13.016Z</news:publication_date>
      <news:title>MaNGOSWebV4 4.0.6 - Reflected XSS Vulnerability Found</news:title>
      <news:keywords>MaNGOSWebV4, XSS, vulnerability</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/phpmyfaq-2-9-8-csrf-vulnerability-mni5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T00:02:41.934Z</news:publication_date>
      <news:title>phpMyFAQ 2.9.8 - Cross-Site Request Forgery Vulnerability</news:title>
      <news:keywords>phpMyFAQ, CSRF, vulnerability</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/pluck-4-7-7-dev2-php-code-execution-mni5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T00:02:27.996Z</news:publication_date>
      <news:title>Pluck 4.7.7-dev2 - PHP Code Execution Vulnerability Alert</news:title>
      <news:keywords></news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/drift-protocol-crypto-heist-loss-mni5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T00:02:22.619Z</news:publication_date>
      <news:title>Drift Protocol - $285 Million Lost in Major Crypto Heist</news:title>
      <news:keywords>Drift Protocol, crypto heist, PeckShield, Solana, JLP tokens</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/esm-dev-136-path-traversal-mni5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T00:02:16.072Z</news:publication_date>
      <news:title>esm-dev 136 - Critical Path Traversal Vulnerability Found</news:title>
      <news:keywords>esm-dev, Path Traversal</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/chinese-cyberespionage-campaigns-strike-europe-mni5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T00:02:14.268Z</news:publication_date>
      <news:title>Chinese Cyberespionage - New Campaigns Target Europe</news:title>
      <news:keywords>TA416, PlugX, Mustang Panda, cyberespionage, Europe</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/americans-passports-stolen-hacktivist-attack-dubai-airport-mni5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T00:02:14.248Z</news:publication_date>
      <news:title>Americans&apos; Passports Stolen - Hacktivist Attack on Dubai Airport</news:title>
      <news:keywords>Nasir Security, Dubai International Airport, identity theft</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/summar-employee-portal-authenticated-sql-injection-mni5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T00:02:03.298Z</news:publication_date>
      <news:title>Summar Employee Portal - Authenticated SQL Injection Flaw</news:title>
      <news:keywords>Summar Employee Portal, SQL Injection, 3.98.0</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cisco-breach-shinyhunters-data-exposed-mni5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T00:02:03.107Z</news:publication_date>
      <news:title>Cisco Breach - ShinyHunters Claims Massive Data Theft</news:title>
      <news:keywords>Cisco, ShinyHunters, data breach, AWS, Salesforce</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/freebsd-rtsold-remote-code-execution-dnssl-mni5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T00:01:46.872Z</news:publication_date>
      <news:title>FreeBSD rtsold 15.x - Remote Code Execution Vulnerability</news:title>
      <news:keywords>FreeBSD, rtsold, Remote Code Execution</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/chained-quiz-unauthenticated-insecure-direct-object-reference-mni5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T00:01:33.995Z</news:publication_date>
      <news:title>Chained Quiz Vulnerability - Unauthenticated Access Risk</news:title>
      <news:keywords>Chained Quiz, Insecure Direct Object Reference, Cookie</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/wordpress-quiz-maker-sql-injection-vulnerability-mni5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T00:01:21.481Z</news:publication_date>
      <news:title>WordPress Quiz Maker - SQL Injection Vulnerability Discovered</news:title>
      <news:keywords>WordPress, SQL Injection, Quiz Maker</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/chrome-zero-day-patched-cve-2026-5281-mni5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T00:01:20.608Z</news:publication_date>
      <news:title>Chrome Zero-Day Patched - Actively Exploited Vulnerability Fixed</news:title>
      <news:keywords>CVE-2026-5281, Chrome, Google, WebGPU, Dawn</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/siklu-etherhaul-eh-8010-remote-command-execution-mni5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T00:01:05.995Z</news:publication_date>
      <news:title>Siklu EtherHaul EH-8010 - Remote Command Execution Vulnerability</news:title>
      <news:keywords>Siklu, EH-8010, Remote Command Execution</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/nist-sp-800-81-guidelines-dns-security-mni2</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T23:02:01.544Z</news:publication_date>
      <news:title>NIST SP 800-81 - New Guidelines for DNS Security Explained</news:title>
      <news:keywords>NIST SP 800-81, DNS security, Infoblox, Craig Sanderson, government regulations</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/weakening-speech-protections-punish-us-mni2</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T23:01:36.875Z</news:publication_date>
      <news:title>Weakening Speech Protections - Impact on All Users</news:title>
      <news:keywords>Meta, YouTube, First Amendment, Section 230, privacy law</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/limits-of-edr-detection-response-mni2</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T23:01:31.350Z</news:publication_date>
      <news:title>EDR - Understanding Its Limits and the Need for Integration</news:title>
      <news:keywords>EDR, autonomous IT management, cybersecurity, incident response, threat detection</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/aws-backblaze-cloudflare-wasabi-cloud-storage-test-mni1</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T22:31:09.584Z</news:publication_date>
      <news:title>Cloud Storage Test - AWS, Backblaze, Cloudflare, Wasabi Results</news:title>
      <news:keywords>AWS, Backblaze, Cloudflare, Wasabi, performance benchmarks</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/baseless-copyright-claim-against-web-host-mni0</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T22:01:27.340Z</news:publication_date>
      <news:title>Copyright Claim Against Web Host - Why It Failed</news:title>
      <news:keywords>copyright law, Higbee &amp; Associates, May First Movement Technology, Agence France-Presse, Digital Millennium Copyright Act</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/rethinking-privileged-access-security-mni0</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T22:01:26.274Z</news:publication_date>
      <news:title>Privileged Access Security - Rethinking the Vault Approach</news:title>
      <news:keywords>Privileged Access Management, Identity Security, Zero Trust, Silverfort, Access Control</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ai-security-router-explained-mni0</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T22:01:05.542Z</news:publication_date>
      <news:title>AI Security - Understanding Routers and Their Risks</news:title>
      <news:keywords>AI vulnerabilities, BIG-IP APM, axios supply chain breach, Linux KVM, FCC regulations</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/iran-threats-us-tech-firms-midterms-mnhz</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T21:31:09.198Z</news:publication_date>
      <news:title>Iran Threatens US Tech Firms Amid Escalating Tensions</news:title>
      <news:keywords>Iran, US Tech Firms, Cyber Threats, Islamic Revolutionary Guard Corps, Trump Administration</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/house-dems-criticize-ice-paragon-spyware-use-mnhz</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T21:31:08.004Z</news:publication_date>
      <news:title>House Democrats Criticize ICE&apos;s Use of Paragon Spyware</news:title>
      <news:keywords>ICE, Paragon spyware, Congress, Summer Lee, Shontel Brown</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/hims-hers-customer-support-hacked-mnhz</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T21:31:03.616Z</news:publication_date>
      <news:title>Hims &amp; Hers - Customer Support System Hacked in Breach</news:title>
      <news:keywords>Hims &amp; Hers, data breach, customer support, social engineering, California, cyberattack, cybersecurity, telehealth</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/arctic-wolf-data-explorer-security-insights-mnhz</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T21:30:49.360Z</news:publication_date>
      <news:title>Arctic Wolf Data Explorer - Unlocking Security Insights</news:title>
      <news:keywords>Arctic Wolf, Data Explorer, MDR, telemetry, SIEM</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/mitigate-iranian-cyberattacks-critical-infrastructure-mnhy</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T21:01:12.373Z</news:publication_date>
      <news:title>Iranian Cyberattacks - 4 Steps to Mitigate Risks</news:title>
      <news:keywords>MuddyWater, CyberAv3ngers, APT33, IOC, CISA</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/building-cyber-resilience-arctic-wolf-mnhy</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T21:01:06.344Z</news:publication_date>
      <news:title>Building Cyber Resilience - A Practical Approach Explained</news:title>
      <news:keywords>Arctic Wolf, Cyber Resilience Assessment, security frameworks</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/claude-code-leak-infostealer-malware-github-mnhy</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T21:01:05.280Z</news:publication_date>
      <news:title>Claude Code Leak - Infostealer Malware Delivered via GitHub</news:title>
      <news:keywords>Claude Code, Vidar, GitHub, Zscaler, malware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/whatsapp-impostor-spreads-spyware-and-breach-mnhy</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T21:01:03.090Z</news:publication_date>
      <news:title>WhatsApp Impostor - Spyware Spreading and Major Breaches</news:title>
      <news:keywords>WhatsApp, Texas hospital breach, Cisco, EvilTokens, CrystalRAT</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/hasbro-attack-remediation-weeks-mnhy</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T21:00:59.803Z</news:publication_date>
      <news:title>Hasbro Attack - Weeks Needed for Full Remediation</news:title>
      <news:keywords>Hasbro, unauthorized access, business continuity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/new-us-national-cyber-strategy-overview-mnhx</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T20:31:21.176Z</news:publication_date>
      <news:title>U.S. National Cyber Strategy - Key Pillars Explained</news:title>
      <news:keywords>National Cyber Strategy, White House, cybersecurity, artificial intelligence, workforce development</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ai-security-future-tools-cisos-mnhx</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T20:31:06.690Z</news:publication_date>
      <news:title>AI in Cybersecurity - CISOs Embrace Future Tools</news:title>
      <news:keywords>AI, CISO, Frederick Lee, Dave Gruber, cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/rsac-2026-arctic-wolf-ai-cybersecurity-mnhx</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T20:30:57.816Z</news:publication_date>
      <news:title>AI Cybersecurity - Arctic Wolf Defines Future at RSAC 2026</news:title>
      <news:keywords>Aurora Superintelligence Platform, Aurora Agentic SOC, Arctic Wolf, RSAC 2026, AI in cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cve-2025-55182-nextjs-credential-harvesting-mnhx</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T20:30:50.788Z</news:publication_date>
      <news:title>CVE-2025-55182 - Hackers Breach 766 Next.js Hosts</news:title>
      <news:keywords>CVE-2025-55182, Next.js, AWS, Cisco Talos, credential harvesting</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/api-credentials-exposed-public-websites-mnhw</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T20:02:06.377Z</news:publication_date>
      <news:title>API Credentials Exposed - Thousands Found on Public Sites</news:title>
      <news:keywords>API credentials, AWS, GitHub, Stripe, cloud security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/crystalrat-malware-as-a-service-remote-access-prankware-mnhw</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T20:01:56.295Z</news:publication_date>
      <news:title>CrystalRAT - New Malware-as-a-Service Offers Remote Access</news:title>
      <news:keywords>CrystalRAT, malware-as-a-service, remote access, keylogging, prankware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/novice-android-malware-steals-whatsapp-data-mnhw</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T20:01:42.677Z</news:publication_date>
      <news:title>NoVoice Android Malware - Steals WhatsApp Data via Apps</news:title>
      <news:keywords>NoVoice, WhatsApp, Android malware, Google Play, McAfee</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/exabeam-expands-ai-agent-monitoring-mnhw</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T20:01:30.664Z</news:publication_date>
      <news:title>Exabeam Expands Platform to Monitor AI Agent Activity</news:title>
      <news:keywords>Exabeam, AI agent activity, ChatGPT, Copilot, Gemini</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/openssh-security-advisory-av26-312-mnhw</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T20:01:07.359Z</news:publication_date>
      <news:title>OpenSSH Vulnerabilities - Security Advisory Released</news:title>
      <news:keywords>OpenSSH, security advisory, vulnerability, version 10.3</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/sentinelone-ai-edr-stops-axios-attack-mnhw</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T20:01:00.805Z</news:publication_date>
      <news:title>SentinelOne AI EDR Stops Axios Supply Chain Attack Autonomously</news:title>
      <news:keywords>SentinelOne, Axios, UNC1069, RAT, npm</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/drift-protocol-hacked-280-million-theft-mnhv</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T19:31:13.343Z</news:publication_date>
      <news:title>Drift Protocol Hacked - $280 Million Stolen in Heist</news:title>
      <news:keywords>Drift Protocol, Solana, financial theft, crypto, PeckShield</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/whatsapp-spyware-fake-iphone-app-mnhv</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T19:30:45.935Z</news:publication_date>
      <news:title>WhatsApp Alerts Users About Spyware in Fake iPhone App</news:title>
      <news:keywords>WhatsApp, SIO, Spyrtacus, iPhone spyware, fake app</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/gartner-voice-of-customer-managed-detection-response-mnhv</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T19:30:44.588Z</news:publication_date>
      <news:title>Gartner&apos;s Voice of Customer - Insights on MDR Solutions</news:title>
      <news:keywords>MDR solutions, customer reviews, Gartner</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ransomware-attackers-exploit-legitimate-tools-mnhu</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T19:02:01.905Z</news:publication_date>
      <news:title>Ransomware Attackers Exploit Legitimate IT Tools to Bypass Antivirus</news:title>
      <news:keywords>LockBit Black 3.0, Dharma ransomware, Process Hacker, IOBit Unlocker, Mimikatz</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/phishing-campaign-casbaneiro-horabot-trojans-mnhu</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T19:01:40.656Z</news:publication_date>
      <news:title>Phishing Campaign - Delivers Casbaneiro and Horabot Trojans</news:title>
      <news:keywords>Casbaneiro, Horabot, Augmented Marauder</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/progress-sharefile-vulnerability-advisory-av26-310-mnhu</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T19:01:30.137Z</news:publication_date>
      <news:title>Progress ShareFile - Security Vulnerability Advisory Released</news:title>
      <news:keywords>Progress ShareFile, AV26-310, vulnerability, security advisory, update</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/claude-code-prompt-injection-vulnerability-mnhu</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T19:01:26.344Z</news:publication_date>
      <news:title>Claude Code - Vulnerable to Prompt Injection Attacks</news:title>
      <news:keywords>Claude Code, prompt injection, Adversa, tree-sitter, curl command</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/gartner-report-evaluating-ai-soc-agents-mnhu</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T19:01:15.807Z</news:publication_date>
      <news:title>Gartner Report - Framework for Evaluating AI SOC Agents</news:title>
      <news:keywords>Gartner, AI SOC agents, security operations center, alert triage, evaluation framework</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cesanta-mongoose-security-advisory-av26-311-mnhu</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T19:01:11.704Z</news:publication_date>
      <news:title>Mongoose Vulnerabilities - Cesanta Issues Security Advisory</news:title>
      <news:keywords>Cesanta, Mongoose, security advisory</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/whatsapp-fake-ios-app-spyware-alert-mnhu</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T19:01:06.682Z</news:publication_date>
      <news:title>WhatsApp Alerts Users After Fake iOS App Installs Spyware</news:title>
      <news:keywords>WhatsApp, spyware, iOS, Asigint, SIO</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/hasbro-cyberattack-investigation-data-breach-mnhu</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T19:00:57.814Z</news:publication_date>
      <news:title>Hasbro Cyberattack - Investigating Possible Data Breach</news:title>
      <news:keywords>Hasbro, cyberattack, data breach</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/lite-llm-ai-blast-radius-security-mnht</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T18:31:13.218Z</news:publication_date>
      <news:title>LiteLLM Compromise - Understanding Your AI Blast Radius</news:title>
      <news:keywords>LiteLLM, Evo AI-SPM, Mercor, AI supply chain, credential theft</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/us-iran-war-nuclear-threats-mnht</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T18:31:00.816Z</news:publication_date>
      <news:title>US-Iran War - Risks of Attacking Nuclear Sites Explained</news:title>
      <news:keywords>Iran, nuclear facilities, IAEA, US-Iran war, radiological disaster</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/arctic-wolf-active-response-security-stack-mnht</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T18:30:57.590Z</news:publication_date>
      <news:title>Arctic Wolf Active Response - Enhancing Your Security Stack</news:title>
      <news:keywords>Arctic Wolf, Managed Detection and Response, Active Response, Endpoint Defense, Integration</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/whatsapp-fake-app-spyware-distribution-mnht</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T18:30:41.667Z</news:publication_date>
      <news:title>WhatsApp Alerts Users of Fake App Distributing Spyware</news:title>
      <news:keywords>WhatsApp, spyware, SIO, ASIGINT, iPhone</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/jacob-mchangama-free-speech-interview-mnhs</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T18:02:00.365Z</news:publication_date>
      <news:title>Jacob Mchangama - Discusses Free Speech and Its Challenges</news:title>
      <news:keywords>Jacob Mchangama, free speech, Justitia, human rights, The Future of Free Speech</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/print-blocking-anti-consumer-3d-printing-legislation-mnhs</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T18:01:42.467Z</news:publication_date>
      <news:title>3D Printing Regulation - Print Blocking Threatens Innovation</news:title>
      <news:keywords>3D printing, digital rights management, censorship, legislation, open source</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cisco-critical-high-severity-flaws-patched-mnhs</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T18:01:29.195Z</news:publication_date>
      <news:title>Cisco Patches Critical and High-Severity Vulnerabilities</news:title>
      <news:keywords>CVE-2026-20093, CVE-2026-20160, CVE-2026-20131, Cisco, authentication bypass</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/critical-vulnerability-claude-code-anthropic-leak-mnhs</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T18:01:22.512Z</news:publication_date>
      <news:title>Critical Vulnerability Found in Claude Code After Source Leak</news:title>
      <news:keywords>Claude Code, Anthropic, Adversa AI, TypeScript, prompt injection</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/rethinking-identity-security-borderless-attack-surface-mnhs</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T18:01:22.255Z</news:publication_date>
      <news:title>Identity Security - Rethinking for a Borderless Attack Surface</news:title>
      <news:keywords>identity security, AI agents, credential theft</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/democratisation-business-email-compromise-fraud-mnhs</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T18:01:20.775Z</news:publication_date>
      <news:title>Business Email Compromise - The New Threat Landscape Explained</news:title>
      <news:keywords>business email compromise, social engineering, fraud prevention, nonprofit, AI</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/drift-crypto-platform-hack-280-million-stolen-mnhs</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T18:01:19.057Z</news:publication_date>
      <news:title>Drift Crypto Platform Hack - $280 Million Stolen by North Korea</news:title>
      <news:keywords>Drift, North Korea, crypto theft, Elliptic, social engineering</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/malware-attack-leaked-claude-code-source-mnhs</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T18:01:18.545Z</news:publication_date>
      <news:title>Malware Attack - Users Download Fake Claude Code Source</news:title>
      <news:keywords>Vidar, GhostSocks, Claude Code, malware, GitHub</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/3d-print-blocking-regulations-impact-mnhs</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T18:01:16.947Z</news:publication_date>
      <news:title>3D Printing - New Regulations Threaten Hobbyists and Professionals</news:title>
      <news:keywords>3D printing, blueprint blockers, firearm detection, CNC machines, vendor software</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cve-2026-3502-trueconf-client-vulnerability-mnhs</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T18:01:12.438Z</news:publication_date>
      <news:title>CVE-2026-3502 - CISA Adds New Exploited Vulnerability</news:title>
      <news:keywords>CVE-2026-3502, TrueConf, CISA, BOD 22-01, federal enterprise</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/hasbro-cyberattack-resolution-delay-mnhs</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T18:01:05.077Z</news:publication_date>
      <news:title>Hasbro Confirms Cyberattack - Weeks-Long Resolution Expected</news:title>
      <news:keywords>Hasbro, cyberattack, data security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/codex-flexible-pricing-teams-mnhs</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T18:01:00.930Z</news:publication_date>
      <news:title>Codex - New Flexible Pricing Model for Teams Announced</news:title>
      <news:keywords>Codex, ChatGPT, Business, Enterprise</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/new-rowhammer-attacks-nvidia-gpus-mnhr</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T17:31:09.741Z</news:publication_date>
      <news:title>New Rowhammer Attacks - Full Control of Nvidia GPUs</news:title>
      <news:keywords>Rowhammer, Nvidia RTX 3060, Nvidia RTX 6000, GDDR6, IOMMU</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/us-bans-foreign-made-consumer-routers-mnhr</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T17:30:59.441Z</news:publication_date>
      <news:title>US Bans Foreign-Made Consumer Routers - New Regulations Explained</news:title>
      <news:keywords>FCC, national security, cybersecurity, routers, China</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/openai-acquires-tbpn-accelerate-ai-conversations-mnhr</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T17:30:49.150Z</news:publication_date>
      <news:title>OpenAI Acquires TBPN to Accelerate AI Conversations</news:title>
      <news:keywords>OpenAI, TBPN, acquisition, independent media, AI</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/siemens-sicam-8-products-vulnerabilities-mnhq</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T17:02:15.000Z</news:publication_date>
      <news:title>Siemens SICAM 8 Products - Multiple Vulnerabilities Found</news:title>
      <news:keywords>CVE-2026-27663, CVE-2026-27664, Siemens, SICAM 8, Industrial Control Systems</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/hitachi-energy-ellipse-jasper-report-vulnerability-mnhq</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T17:01:57.423Z</news:publication_date>
      <news:title>Hitachi Energy Ellipse - Critical Jasper Report Vulnerability</news:title>
      <news:keywords>CVE-2025-10492, Hitachi Energy, Jasper Report, Ellipse, Remote Code Execution</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cookie-controlled-php-webshells-linux-hosting-mnhq</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T17:01:49.351Z</news:publication_date>
      <news:title>PHP Webshells - Cookie-Controlled Tactics in Linux Hosting</news:title>
      <news:keywords>PHP webshells, Linux hosting, HTTP cookies, Microsoft Defender, remote code execution</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/elite-socs-improve-escalation-rates-threat-intelligence-mnhq</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T17:01:29.790Z</news:publication_date>
      <news:title>Elite SOCs - Enhance Tier 1 Analysts with Better Intelligence</news:title>
      <news:keywords>Threat Intelligence Lookup, ANY.RUN, Security Operations Center, Tier 1 Analysts, escalation rates</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ai-cyberattacks-threat-actor-abuse-mnhq</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T17:01:29.137Z</news:publication_date>
      <news:title>AI Cyberattacks - Threat Actor Abuse Accelerates Rapidly</news:title>
      <news:keywords>AI, phishing, Storm-1747, MFA bypass, Microsoft</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/yokogawa-centum-vp-cve-2025-7741-vulnerability-mnhq</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T17:01:26.701Z</news:publication_date>
      <news:title>Yokogawa CENTUM VP - Vulnerability Exposed via Hard-Coded Password</news:title>
      <news:keywords>CVE-2025-7741, Yokogawa, CENTUM VP, hard-coded password, ICS vulnerabilities</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/google-amazon-ignored-human-rights-responsibilities-mnhq</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T17:01:23.105Z</news:publication_date>
      <news:title>Google and Amazon - Ignored Human Rights Responsibilities</news:title>
      <news:keywords>Google, Amazon, Project Nimbus, human rights, cloud computing</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/apple-darksword-exploit-protection-rollout-mnhq</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T17:01:20.607Z</news:publication_date>
      <news:title>Apple Rolls Out DarkSword Exploit Protection to More Devices</news:title>
      <news:keywords>DarkSword, iOS 18, Apple, exploit kit, vulnerabilities</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/arctic-wolf-active-response-existing-security-stack-mnhq</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T17:01:10.497Z</news:publication_date>
      <news:title>Arctic Wolf - Enabling Active Response with Existing Tools</news:title>
      <news:keywords>Arctic Wolf, Managed Detection and Response, Active Response, Cybersecurity, Integration</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/french-senate-social-media-ban-children-under-15-mnhq</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T17:01:04.412Z</news:publication_date>
      <news:title>French Senate Passes Bill to Ban Children Under 15 from Social Media</news:title>
      <news:keywords>French Senate, social media ban, children under 15, Emmanuel Macron, European Union</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cyber-ready-workforce-act-apprenticeship-grants-mnho</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T16:31:36.378Z</news:publication_date>
      <news:title>Cybersecurity Apprenticeship Grants - Lawmakers Push for Action</news:title>
      <news:keywords>Cyber Ready Workforce Act, Department of Labor, cybersecurity apprenticeship, Sen. Jacky Rosen, Rep. Susie Lee</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/akira-lookalike-ransomware-south-america-mnho</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T16:31:34.840Z</news:publication_date>
      <news:title>Akira Lookalike Ransomware - New Campaign Targets Windows Users</news:title>
      <news:keywords>Akira, Babuk, ransomware, South America, ESET Research</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ai-dominates-rsac-2026-security-community-mnho</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T16:31:28.929Z</news:publication_date>
      <news:title>AI Dominates RSAC 2026 - Community&apos;s Role in Security Discussed</news:title>
      <news:keywords>AI, cybersecurity, RSAC 2026, automation, human intelligence</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/akira-ransomware-initial-access-encryption-mnho</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T16:31:20.795Z</news:publication_date>
      <news:title>Akira Ransomware - Achieves Data Encryption in Under an Hour</news:title>
      <news:keywords>Akira ransomware, Conti group, double-extortion, zero-day vulnerabilities, Halcyon report</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/hackers-clone-cert-ua-site-install-go-based-rat-mnho</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T16:31:16.449Z</news:publication_date>
      <news:title>Malware - Hackers Clone CERT-UA Site to Install RAT</news:title>
      <news:keywords>AGEWHEEZE, UAC-0255, CERT-UA, remote access trojan, phishing</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/duc-app-data-exposure-driver-licenses-passports-mnho</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T16:31:14.274Z</news:publication_date>
      <news:title>Duc App Data Exposure - Thousands of Licenses Leaked Online</news:title>
      <news:keywords>Duc App, data exposure, driver&apos;s licenses, passports, Duales</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cisco-patches-imc-ssm-flaws-remote-compromise-mnho</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T16:31:10.873Z</news:publication_date>
      <news:title>Cisco Patches Critical IMC and SSM Flaws - Immediate Action Required</news:title>
      <news:keywords>CVE-2026-20093, CVE-2026-20160, Cisco, IMC, SSM</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/spectrum-consulting-overview-mnho</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T16:30:57.409Z</news:publication_date>
      <news:title>Spectrum Consulting - Overview of Services and Solutions</news:title>
      <news:keywords></news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/bpfdoor-variants-discovered-rapid7-research-mnhn</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T16:01:29.704Z</news:publication_date>
      <news:title>BPFDoor Variants Discovered - Rapid7 Research Unveils Threats</news:title>
      <news:keywords>BPFDoor, Rapid7, APTs, httpShell, icmpShell</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ice-buys-paragon-spyware-drug-trafficking-mnhn</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T16:01:26.823Z</news:publication_date>
      <news:title>ICE Buys Paragon Spyware for Drug Trafficking Cases</news:title>
      <news:keywords>Paragon Solutions, ICE, spyware, Homeland Security Investigations, encrypted communications, cybersecurity, DHS, HSI, paragon, Security, Spyware, privacy</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/f5-big-ip-critical-flaw-exploitation-risk-mnhn</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T16:01:23.114Z</news:publication_date>
      <news:title>F5 BIG-IP - Critical Flaw Faces Wide Exploitation Risk</news:title>
      <news:keywords>F5 BIG-IP, security advisory, exploitation risk</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/qilin-ransomware-edr-solutions-disabling-mnhn</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T16:01:18.634Z</news:publication_date>
      <news:title>Qilin Ransomware - Disables Major EDR Solutions with DLL</news:title>
      <news:keywords>Qilin Ransomware, msimg32.dll, EDR solutions, Cisco Talos, ransomware-as-a-service</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/evolution-human-risk-management-precision-interventions-mnhn</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T16:01:03.528Z</news:publication_date>
      <news:title>Human Risk Management - Evolution Towards Precision Interventions</news:title>
      <news:keywords>risk management, security awareness training, behavioral risk scoring, dynamic watchlists, adaptive controls</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/residential-proxies-evade-ip-reputation-checks-mnhm</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T15:31:24.548Z</news:publication_date>
      <news:title>Residential Proxies - Evaded IP Reputation Checks in 78% of Sessions</news:title>
      <news:keywords>GreyNoise, residential proxies, IP reputation, malicious traffic, IoT botnets</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/software-supply-chain-hacks-data-theft-mnhm</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T15:31:21.751Z</news:publication_date>
      <news:title>Software Supply Chain Hacks - Wave of Data Theft Unleashed</news:title>
      <news:keywords>North Korean hackers, Axios npm, TeamPCP, Lapsus$, LiteLLM</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/stryker-iranian-cyberattack-wiper-recovery-mnhm</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T15:31:18.453Z</news:publication_date>
      <news:title>Stryker Back to Operations After Iranian Wiper Attack, Investigation Ongoing</news:title>
      <news:keywords>Stryker, Handala, cyberattack, wiper attack, Iranian hackers, Iran, healthcare, cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/retail-hospitality-cisos-budget-growth-ai-governance-mnhm</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T15:31:15.901Z</news:publication_date>
      <news:title>Retail and Hospitality CISOs Expect Budget Growth and AI Challenges</news:title>
      <news:keywords>CISO, AI governance, retail, hospitality, security budget</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/watchguard-fireware-os-security-bulletin-april-2026-mnhm</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T15:31:14.254Z</news:publication_date>
      <news:title>WatchGuard Fireware OS - Security Vulnerabilities Addressed</news:title>
      <news:keywords>Fireware OS, WatchGuard, vulnerability, security bulletin, patch</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/apple-darksword-patches-ios-18-7-7-mnhm</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T15:31:05.399Z</news:publication_date>
      <news:title>Apple Expands DarkSword Patches to iOS 18.7.7</news:title>
      <news:keywords>DarkSword, iOS 18.7.7, Apple, WebKit, zero-day</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/chrome-zero-day-vulnerability-exploited-mnhl</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T15:01:57.908Z</news:publication_date>
      <news:title>Chrome Zero-Day Vulnerability - CISA Issues Urgent Warning</news:title>
      <news:keywords>CVE-2026-5281, Google Chrome, Chromium, CISA, Use-After-Free</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/malware-campaign-boeing-rfq-docx-attack-mnhl</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T15:01:39.239Z</news:publication_date>
      <news:title>Boeing RFQ Malware Campaign - Hackers Deploy Six-Stage Attack</news:title>
      <news:keywords>Cobalt Strike, NKFZ5966PURCHASE, malicious DOCX, malware campaign, Python</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/vsphere-brickstorm-malware-defenders-guide-mnhl</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T15:01:34.498Z</news:publication_date>
      <news:title>vSphere and BRICKSTORM Malware - A Defender&apos;s Guide</news:title>
      <news:keywords>BRICKSTORM, vSphere, VMware, vCenter Server Appliance, ESXi</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/github-supply-chain-security-roadmap-vulnerability-management-mnhl</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T15:01:33.088Z</news:publication_date>
      <news:title>GitHub&apos;s Supply Chain Security - Roadmap and AI Management</news:title>
      <news:keywords>GitHub, supply chain security, vulnerability management, AI, CodeQL</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ai-security-openssf-oss-crs-advances-open-source-mnhl</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T15:01:32.440Z</news:publication_date>
      <news:title>AI Security - OSS-CRS Joins OpenSSF to Enhance Open Source</news:title>
      <news:keywords>OpenSSF, OSS-CRS, AIxCC, Cyber Reasoning Systems, vulnerabilities</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cisco-imc-authentication-bypass-admin-access-mnhl</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T15:01:28.787Z</news:publication_date>
      <news:title>Cisco IMC Authentication Bypass - Critical Admin Access Flaw</news:title>
      <news:keywords>CVE-2026-20093, Cisco, Integrated Management Controller, authentication bypass, RCE</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/uac-0255-cert-ua-phishing-agewheeze-malware-mnhl</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T15:01:18.969Z</news:publication_date>
      <news:title>UAC-0255 - Phishing Campaign Spreads AGEWHEEZE Malware</news:title>
      <news:keywords>AGEWHEEZE, UAC-0255, CERT-UA, phishing, malware, cybersecurity, Ukraine</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/openssh-10-3-security-fixes-rekeying-support-dropped-mnhl</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T15:01:18.383Z</news:publication_date>
      <news:title>OpenSSH 10.3 - Patches Security Bugs and Drops Rekeying Support</news:title>
      <news:keywords>OpenSSH, security fixes, CVE-2026-5281</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/amazon-guardduty-sophos-threat-intelligence-integration-mnhl</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T15:01:18.019Z</news:publication_date>
      <news:title>Amazon GuardDuty - Enhanced Detection with Sophos Intelligence</news:title>
      <news:keywords>AWS, Sophos Intelix, amazon, Amazon GuardDuty, Sophos OEM</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/exploit-exposed-vite-installs-cve-2025-30208-mnhl</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T15:01:16.723Z</news:publication_date>
      <news:title>Vulnerabilities in Vite - Exploitation Attempts Rising</news:title>
      <news:keywords>CVE-2025-30208, Vite, frontend tooling</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/apple-ios-18-security-updates-darksword-exploit-mnhl</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T15:01:15.873Z</news:publication_date>
      <news:title>Apple Expands iOS 18 Security Updates Against DarkSword Threat</news:title>
      <news:keywords>DarkSword, iOS 18, Apple, exploit kit, malware, iOS, security updates, cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/openssh-10-3-shell-injection-security-issues-mnhl</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T15:01:14.788Z</news:publication_date>
      <news:title>OpenSSH 10.3 - Fixes Shell Injection and Security Flaws</news:title>
      <news:keywords>OpenSSH, shell injection, ProxyJump, security hardening, SSH</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ncsc-security-alert-whatsapp-signal-hackers-mnhk</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T14:31:40.964Z</news:publication_date>
      <news:title>NCSC Issues Security Alert Over WhatsApp and Signal Hacks</news:title>
      <news:keywords>NCSC, WhatsApp, Signal, social engineering, Russia</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/storm-infostealer-remotely-decrypts-credentials-mnhk</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T14:31:24.281Z</news:publication_date>
      <news:title>Storm Infostealer - New Malware Remotely Decrypts Credentials</news:title>
      <news:keywords>Storm, infostealer, credential theft, malware, cybercrime</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/threatsday-bulletin-april-2026-cybersecurity-updates-mnhk</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T14:31:23.608Z</news:publication_date>
      <news:title>ThreatsDay Bulletin - Key Cybersecurity Updates Explained</news:title>
      <news:keywords>CVE-2026-2699, CVE-2026-2701, NoVoice, GhostSocks, Android Malware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/vacant-homes-mail-interception-fraud-mnhk</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T14:31:19.995Z</news:publication_date>
      <news:title>Vacant Homes - Adversaries Exploit Mail for Fraud</news:title>
      <news:keywords>mail fraud, identity theft, drop addresses, postal services, fraud tutorials</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/geopolitics-ai-cybersecurity-insights-rsac-2026-mnhk</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T14:31:14.213Z</news:publication_date>
      <news:title>AI Security - Key Insights from RSAC 2026 Conference</news:title>
      <news:keywords>AI, RSAC 2026, cybersecurity, global leadership, threats</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cybersecurity-ma-roundup-march-2026-mnhk</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T14:31:02.806Z</news:publication_date>
      <news:title>Cybersecurity M&amp;A Roundup - 38 Deals Announced in March 2026</news:title>
      <news:keywords>Airbus, Cellebrite, OpenAI, Rapid7, Databricks</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/github-covert-channel-malware-campaign-mnhj</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T14:02:49.746Z</news:publication_date>
      <news:title>GitHub Used as Covert Channel in Multi-Stage Malware Attack</news:title>
      <news:keywords>GitHub, PowerShell, malware campaign, South Korea, LNK files</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/akira-ransomware-attack-under-one-hour-mnhj</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T14:02:25.815Z</news:publication_date>
      <news:title>Akira Ransomware - Attacks Now Completed in Under One Hour</news:title>
      <news:keywords>Akira, ransomware, VPN vulnerabilities, double-extortion, Halcyon</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/miwic26-nkiruka-joy-aimienoho-standard-chartered-mnhj</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T14:01:28.635Z</news:publication_date>
      <news:title>Nkiruka Joy Aimienoho - Spotlighting Cybersecurity Leadership</news:title>
      <news:keywords>Nkiruka Joy Aimienoho, Standard Chartered Bank, Most Inspiring Women in Cyber, Eskenzi PR, IT Security Guru</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/bpfdoor-variants-research-rapid7-mnhj</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T14:01:28.474Z</news:publication_date>
      <news:title>BPFDoor Variants - New Threats Uncovered by Rapid7 Research</news:title>
      <news:keywords>BPFDoor, Rapid7, APTs, httpShell, icmpShell</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/progress-sharefile-pre-auth-rce-vulnerabilities-mnhj</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T14:01:24.730Z</news:publication_date>
      <news:title>Progress ShareFile - Critical Flaws Enable Pre-Auth RCE Attacks</news:title>
      <news:keywords>CVE-2026-2699, CVE-2026-2701, Progress ShareFile, RCE, watchTowr</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/latin-america-caribbean-cybercrime-landscape-2025-mnhj</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T14:01:23.111Z</news:publication_date>
      <news:title>Latin America Cybercrime Landscape - Trends and Insights</news:title>
      <news:keywords>Insikt Group, ransomware, LAC, cybercrime, Telegram</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/novice-android-rootkit-attacks-millions-mnhj</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T14:01:21.882Z</news:publication_date>
      <news:title>NoVoice - Dangerous Android Rootkit Attacks Millions Worldwide</news:title>
      <news:keywords>NoVoice, Android Rootkit, Malware, McAfee, Google Play</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/stryker-medtech-data-wiping-attack-mnhi</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T13:31:22.679Z</news:publication_date>
      <news:title>Stryker Fully Operational After Data-Wiping Cyberattack</news:title>
      <news:keywords>Stryker, Handala, data wiper, cyberattack, Iran</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/dprk-campaigns-lnk-github-c2-analysis-mnhi</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T13:31:17.576Z</news:publication_date>
      <news:title>DPRK Campaigns - Analyzing LNK and GitHub C2 Tactics</news:title>
      <news:keywords>DPRK, GitHub, PowerShell, LNK files, XenoRAT</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/red-hat-enterprise-linux-extended-life-cycle-mnhi</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T13:31:15.191Z</news:publication_date>
      <news:title>Red Hat Enterprise Linux - New Subscription Simplifies Support</news:title>
      <news:keywords>Red Hat, Enterprise Linux, IDC, cloud innovation, security patches</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/bank-trojan-casbaneiro-worms-latin-america-mnhi</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T13:31:14.663Z</news:publication_date>
      <news:title>Bank Trojan Casbaneiro Worms Through Latin America</news:title>
      <news:keywords>Casbaneiro, Augmented Marauder, banking Trojan</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/rethinking-cache-ai-era-mnhi</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T13:31:13.893Z</news:publication_date>
      <news:title>Rethinking Cache Design for the AI Era - Cloudflare Insights</news:title>
      <news:keywords>Cloudflare, AI traffic, CDN, cache design, ETH Zurich</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/malwarebytes-vpn-third-party-audit-results-mnhi</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T13:31:08.450Z</news:publication_date>
      <news:title>Malwarebytes VPN - Third-Party Audit Reveals Vulnerabilities</news:title>
      <news:keywords>Malwarebytes, VPN, X41 D-Sec, CVSS, AzireVPN</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/passkeys-security-testing-report-uri-mnhi</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T13:31:06.231Z</news:publication_date>
      <news:title>Passkeys Security Testing - Report URI&apos;s Implementation Reviewed</news:title>
      <news:keywords>WebAuthn, Passkeys, Pentest Ltd</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/attackers-trusted-users-identity-access-mnhi</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T13:31:05.503Z</news:publication_date>
      <news:title>Attackers Become Trusted Users - Identity Exploitation Explained</news:title>
      <news:keywords>identity access, MFA, internal phishing, Cisco Talos, 2025 Year in Review</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ios-18-7-7-update-darksword-exploit-mnhh</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T13:01:45.299Z</news:publication_date>
      <news:title>iOS 18.7.7 Update - Shields Users from DarkSword Exploit</news:title>
      <news:keywords>iOS 18.7.7, DarkSword, CVE-2026-28865, CVE-2026-20687, Apple</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/mobile-data-extractor-automation-tool-mnhh</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T13:01:38.322Z</news:publication_date>
      <news:title>Mobile Data Extractor - Automate Mobile App Data Tasks</news:title>
      <news:keywords>Mobile Data Extractor, Python, Mobile Security, iOS, Android</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/organizational-security-privacy-controls-medium-impact-mnhh</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T13:01:35.054Z</news:publication_date>
      <news:title>Organizational Security - Suggested Controls for Medium Impact</news:title>
      <news:keywords>Canadian Centre for Cyber Security, ITSP.10.033-01, security controls, privacy controls, cyber security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/axios-npm-supply-chain-attack-mitigation-mnhh</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T13:01:18.657Z</news:publication_date>
      <news:title>Axios npm Supply Chain Attack - Microsoft Mitigates Threat</news:title>
      <news:keywords>Axios, Sapphire Sleet, npm, malware, supply chain attack</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/eviltokens-microsoft-device-code-phishing-mnhh</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T13:01:14.816Z</news:publication_date>
      <news:title>EvilTokens - New Phishing Campaign Abuses Microsoft Login</news:title>
      <news:keywords>EvilTokens, Microsoft, phishing, device code authentication, PhaaS</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cisco-patches-critical-high-severity-vulnerabilities-mnhh</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T13:01:09.723Z</news:publication_date>
      <news:title>Cisco Patches Critical and High-Severity Vulnerabilities</news:title>
      <news:keywords>CVE-2026-20160, CVE-2026-20093, Cisco, EPNM, IMC</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/identity-paradox-hidden-risks-valid-credentials-mnhh</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T13:01:06.193Z</news:publication_date>
      <news:title>Identity Paradox - Hidden Risks in Valid Credentials Explained</news:title>
      <news:keywords>identity theft, credential theft, automation, phishing, SentinelOne</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/state-of-trusted-open-source-report-2026-mnhf</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T12:02:10.418Z</news:publication_date>
      <news:title>Trusted Open Source Report - Insights on Vulnerabilities</news:title>
      <news:keywords>Chainguard, Python, PostgreSQL, CVE, container images</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/mining-operation-iso-lures-rats-crypto-miners-mnhf</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T12:01:40.519Z</news:publication_date>
      <news:title>Mining Operation - Researchers Uncover RATs and Crypto Miners</news:title>
      <news:keywords>RATs, crypto miners, REF1695, CNB Bot, PureRAT</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ransomware-hits-hospitals-defense-rehearsals-mnhf</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T12:01:26.042Z</news:publication_date>
      <news:title>Ransomware Threat - Hospitals Prepare for Inevitable Attacks</news:title>
      <news:keywords>ransomware, hospitals, cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/nacogdoches-memorial-hospital-data-breach-mnhf</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T12:01:16.497Z</news:publication_date>
      <news:title>Data Breach - 250,000 Affected at Nacogdoches Memorial Hospital</news:title>
      <news:keywords>Nacogdoches Memorial Hospital, data breach, personal information, health information</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/whatsapp-spyware-attack-weaponized-app-mnhe</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T11:31:32.059Z</news:publication_date>
      <news:title>WhatsApp Users Targeted by Spyware Attack via Fraudulent App</news:title>
      <news:keywords>WhatsApp, Spyrtacus, ASIGINT, spyware, social engineering</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/mercor-litelm-supply-chain-attack-mnhe</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T11:31:21.123Z</news:publication_date>
      <news:title>Mercor Data Breach - Lapsus$ Claims 4TB Stolen Data</news:title>
      <news:keywords>Mercor, LiteLLM, Lapsus$, TeamPCP, Trivy</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/darksword-exploit-apple-patching-policy-mnhe</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T11:31:21.062Z</news:publication_date>
      <news:title>DarkSword Exploit - Apple Loosens Patching Policy for iOS</news:title>
      <news:keywords>DarkSword, iOS 18, Apple, security update, Coruna</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/zap-ptk-add-on-browser-security-alerts-mnhe</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T11:31:10.351Z</news:publication_date>
      <news:title>ZAP PTK Add-On - Enhances Browser Security Alerts Integration</news:title>
      <news:keywords>OWASP ZAP, PTK, application security, vulnerability detection, JavaScript</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/eff-submission-un-ohchr-human-rights-defenders-mnhe</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T11:31:07.314Z</news:publication_date>
      <news:title>EFF Submits to UN on Protecting Human Rights Defenders</news:title>
      <news:keywords>human rights defenders, digital surveillance, freedom of expression, internet access, cybercrime laws</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/oracle-lays-off-employees-ai-investment-mnhc</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T10:31:36.084Z</news:publication_date>
      <news:title>Oracle Lays Off 30,000 Employees Amid AI Investment Shift</news:title>
      <news:keywords>Oracle, AI investment, workforce reduction, financial strategy, debt</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cisco-smart-software-manager-vulnerability-cve-2026-20160-mnhc</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T10:31:16.660Z</news:publication_date>
      <news:title>Cisco Smart Software Manager Vulnerability - Critical Flaw Exposed</news:title>
      <news:keywords>CVE-2026-20160, Cisco, Smart Software Manager, SSM On-Prem, vulnerability</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/us-government-iphone-hacking-tool-leaked-mnhc</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T10:31:08.169Z</news:publication_date>
      <news:title>US Government iPhone Hacking Tool Leaked - Coruna Exposed</news:title>
      <news:keywords>Coruna, iOS, L3Harris, malware, US government</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/paramilitary-agents-trump-immigration-crackdown-mnhc</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T10:31:02.371Z</news:publication_date>
      <news:title>Paramilitary Agents - Unmasking Trump&apos;s Immigration Tactics</news:title>
      <news:keywords>BORTAC, Operation Midway Blitz, DHS, Trump Administration, Border Patrol</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/talos-2025-year-in-review-threat-landscape-mnhb</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T10:02:14.410Z</news:publication_date>
      <news:title>Talos 2025 Year in Review - Insights for Cyber Defenders</news:title>
      <news:keywords>Cisco Talos, identity attacks, AI threats, vulnerabilities, state-sponsored activity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/qilin-ransomware-msimg32-dll-infection-chain-mnhb</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T10:01:56.397Z</news:publication_date>
      <news:title>Qilin Ransomware - Analyzing the EDR Killer Infection Chain</news:title>
      <news:keywords>Qilin ransomware, msimg32.dll, EDR bypass, malicious DLL, Takahiro Takeda</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/fbi-warns-chinese-mobile-apps-user-data-exposure-mnhb</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T10:01:52.391Z</news:publication_date>
      <news:title>FBI Warns of Chinese Mobile Apps Exposing User Data</news:title>
      <news:keywords>FBI, mobile apps, data security, China, user data</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ransomware-threats-japan-2025-qilin-insights-mnhb</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T10:01:44.826Z</news:publication_date>
      <news:title>Ransomware Threats in Japan - Qilin&apos;s Rising Impact Explained</news:title>
      <news:keywords>Qilin, ransomware, Japan, EDR killer, cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/automated-credential-harvesting-operation-uat-10608-mnhb</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T10:01:38.475Z</news:publication_date>
      <news:title>Credential Harvesting - Inside UAT-10608&apos;s Operations</news:title>
      <news:keywords>UAT-10608, NEXUS Listener, CVE-2025-55182, credential harvesting, Next.js</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/px4-autopilot-vulnerability-drone-control-mnhb</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T10:01:34.169Z</news:publication_date>
      <news:title>PX4 Autopilot Vulnerability - Attackers Can Control Drones</news:title>
      <news:keywords>CVE-2026-1579, PX4 Autopilot, CISA, drone security, Dolev Aviv</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/sophisticated-crystalx-rat-emerges-mnhb</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T10:01:11.590Z</news:publication_date>
      <news:title>CrystalX RAT Emerges - A New Threat in Malware Landscape</news:title>
      <news:keywords>CrystalX RAT, malware-as-a-service, Kaspersky, remote access, information stealing</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ai-security-instant-software-customization-mnh9</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T09:31:31.420Z</news:publication_date>
      <news:title>AI Security - Instant Software&apos;s Impact on Cyber Defense</news:title>
      <news:keywords>AI, cybersecurity, instant software, vulnerabilities, patching</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/uk-manufacturers-cyber-incidents-impact-mnh9</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T09:31:30.344Z</news:publication_date>
      <news:title>UK Manufacturers Face Alarming Cyber Incident Surge</news:title>
      <news:keywords>ESET, UK manufacturers, cyber incidents, Jaguar Land Rover, AI-enabled attacks</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/microsoft-outlook-email-delivery-issues-mnh9</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T09:31:21.182Z</news:publication_date>
      <news:title>Microsoft Outlook - Investigates Email Delivery Problems</news:title>
      <news:keywords>Outlook, Microsoft 365, Email Delivery, NDR Error, Exchange</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ta416-expands-espionage-europe-web-bug-malware-mnh9</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T09:31:15.617Z</news:publication_date>
      <news:title>TA416 Expands Espionage Operations Across Europe</news:title>
      <news:keywords>TA416, PlugX, Proofpoint, diplomatic phishing, cyber espionage</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/whatsapp-malware-vbs-scripts-msi-backdoors-mnh9</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T09:30:58.300Z</news:publication_date>
      <news:title>WhatsApp Malware Campaign - New VBS Scripts Exploit Users</news:title>
      <news:keywords>WhatsApp, VBS, malware campaign, MSI backdoors, Microsoft Defender</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/microsoft-copilot-terms-of-service-ai-liability-mnh8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T09:01:50.133Z</news:publication_date>
      <news:title>Microsoft Copilot - Terms of Service Raise AI Liability Concerns</news:title>
      <news:keywords>Microsoft Copilot, terms of service, AI liability, data privacy, intellectual property</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cni-firms-downtime-ot-attacks-mnh8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T09:01:40.118Z</news:publication_date>
      <news:title>CNI Firms Face Up to £5m in Downtime from OT Attacks</news:title>
      <news:keywords>CNI, OT attacks, cybersecurity, e2e-assure, Iran</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/trueconf-zero-day-vulnerability-update-malware-mnh8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T09:01:25.268Z</news:publication_date>
      <news:title>TrueConf Zero-Day Vulnerability - Malware Delivery Exploit</news:title>
      <news:keywords>CVE-2026-3502, TrueConf, malware, government, China</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/security-hole-breakroom-coffee-machine-mnh7</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T08:31:32.378Z</news:publication_date>
      <news:title>Data Breach - Coffee Machine Exposes Corporate Network</news:title>
      <news:keywords>data breach, internet-connected devices, default passwords</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/f5-big-ip-apm-rce-vulnerability-exposed-mnh7</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T08:31:31.342Z</news:publication_date>
      <news:title>F5 BIG-IP APM - Over 14,000 Instances Exposed to RCE Attacks</news:title>
      <news:keywords>CVE-2025-53521, F5, BIG-IP APM, Shadowserver, Remote Code Execution, BIG-IP, CISA, vulnerabilities</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/variance-funding-compliance-investigation-platform-mnh7</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T08:31:14.236Z</news:publication_date>
      <news:title>Variance Raises $21.5M for AI-Powered Compliance Platform</news:title>
      <news:keywords>Variance, AI, compliance, funding, risk management</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ios-18-7-7-update-blocks-darksword-exploit-mnh6</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T08:01:32.255Z</news:publication_date>
      <news:title>iOS 18.7.7 Update - Apple Expands to Block DarkSword Exploit with Critical Patches</news:title>
      <news:keywords>iOS 18.7.7, DarkSword, Apple, iPadOS, exploit kit, cybersecurity, Device Protection, iOS, mobile security, Vulnerability, web security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/fake-whatsapp-app-spyware-asigint-mnh6</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T08:01:29.167Z</news:publication_date>
      <news:title>Fake WhatsApp App - Italian Spyware Vendor Targets Users</news:title>
      <news:keywords>WhatsApp, Asigint, SIO, spyware, social engineering</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/government-buying-data-without-warrant-mnh5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T07:32:08.420Z</news:publication_date>
      <news:title>Government Buying Data Without Warrant - Privacy Concerns Rise</news:title>
      <news:keywords>government surveillance, data privacy, Electronic Privacy Information Center</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/trump-backs-section-702-reauthorization-fisa-mnh5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T07:32:02.639Z</news:publication_date>
      <news:title>Trump Backs Section 702 Reauthorization Amid Privacy Concerns</news:title>
      <news:keywords>FISA, Section 702, Trump, privacy, surveillance</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/remcos-rat-infection-chain-obfuscated-scripts-mnh5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T07:31:56.702Z</news:publication_date>
      <news:title>Remcos RAT - Multi-Stage Infection Chain Exposed</news:title>
      <news:keywords>Remcos RAT, phishing, PowerShell, malware, C2 server</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/router-security-firmware-updates-advice-mnh5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T07:31:56.216Z</news:publication_date>
      <news:title>Router Security - Wait Before Buying New Devices</news:title>
      <news:keywords>router security, firmware updates, privacy concerns</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/epic-amendments-maryland-chatbots-bill-mnh5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T07:31:42.503Z</news:publication_date>
      <news:title>EPIC Urges Amendments to Maryland Chatbots Bill for Privacy</news:title>
      <news:keywords>EPIC, Maryland, chatbots, H.B. 952, privacy</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/epic-scotus-wireless-carriers-location-data-mnh5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T07:31:37.153Z</news:publication_date>
      <news:title>EPIC Urges SCOTUS to Hold Carriers Accountable for Data Sales</news:title>
      <news:keywords>FCC, Verizon, AT&amp;T, EPIC, location data</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/maine-sea-dogs-mariner-privacy-legislation-mnh5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T07:31:33.471Z</news:publication_date>
      <news:title>Maine Sports Teams Concerned Over Privacy Legislation Impact</news:title>
      <news:keywords>Maine, Electronic Privacy Information Center, Caitriona Fitzgerald</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ftc-age-assurance-privacy-standards-mnh5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T07:31:20.983Z</news:publication_date>
      <news:title>FTC - Privacy Groups Demand Stronger Age Assurance Standards</news:title>
      <news:keywords>FTC, COPPA, age verification, privacy rights, Center for Digital Democracy</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cisco-imc-vulnerability-bypass-authentication-mnh5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T07:31:08.386Z</news:publication_date>
      <news:title>Cisco IMC Vulnerability - Critical Authentication Bypass Flaw Exposes Remote Access Risks</news:title>
      <news:keywords>CVE-2026-20093, Cisco IMC, authentication bypass, security flaw, Cisco hardware, Cisco, Vulnerability, Authentication Bypass, Security Update, Integrated Management Controller</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/symantec-dlp-agent-privilege-escalation-vulnerability-mnh4</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T07:01:19.151Z</news:publication_date>
      <news:title>Symantec DLP Agent Vulnerability - Privilege Escalation Risk</news:title>
      <news:keywords>CVE-2026-3991, Symantec DLP, Broadcom, Manuel Feifel</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/starbucks-breach-10gb-stolen-source-code-mnh3</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T06:31:27.664Z</news:publication_date>
      <news:title>Starbucks Breach - 10GB of Source Code Allegedly Stolen</news:title>
      <news:keywords>Starbucks, ShadowByt3s, Amazon S3, BlackVortex1, data breach</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/best-vpn-for-privacy-2026-mnh2</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T06:01:29.674Z</news:publication_date>
      <news:title>Best VPNs for Privacy in 2026 - Top Choices Explained</news:title>
      <news:keywords>NordVPN, Proton VPN, Surfshark, ExpressVPN, CyberGhost</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/best-digital-forensic-tools-2026-mnh1</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T05:31:34.080Z</news:publication_date>
      <news:title>Best Digital Forensic Tools - Top Picks for 2026</news:title>
      <news:keywords>digital forensics, investigation tools, cybersecurity, data recovery, evidence analysis</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ciso-security-business-value-mnh1</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T05:31:31.708Z</news:publication_date>
      <news:title>CISO Insights - Making Security Drive Business Value</news:title>
      <news:keywords>CISO, cybersecurity, PPG, business value, trust</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/microsoft-exchange-online-high-volume-email-mnh0</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T05:01:54.433Z</news:publication_date>
      <news:title>Microsoft Exchange Online - High Volume Email Feature Launched</news:title>
      <news:keywords>Microsoft, Exchange Online, High Volume Email</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/tracking-drones-5g-tower-mnh0</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T05:01:28.970Z</news:publication_date>
      <news:title>Drone Detection - Tracking Drones with 5G Technology</news:title>
      <news:keywords>5G-A, drone detection, BSense, University of Science and Technology of China, Huawei</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/isc-stormcast-april-2-2026-mngz</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T04:31:24.161Z</news:publication_date>
      <news:title>ISC Stormcast - Latest Cybersecurity Insights Explained</news:title>
      <news:keywords></news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/tools-secure-mcp-server-mngz</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T04:31:11.210Z</news:publication_date>
      <news:title>Tools to Secure MCP Servers - Essential Solutions Explained</news:title>
      <news:keywords>MCP-Server, AI Security, Cloudflare, AWS, Microsoft</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/linx-security-raises-funding-identity-governance-mngz</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T04:31:05.778Z</news:publication_date>
      <news:title>Linx Security Raises $50 Million for Identity Governance</news:title>
      <news:keywords>Linx Security, Identity Security, Funding, Insight Partners, AI</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/customer-authentication-fraud-scammer-mngy</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T04:01:32.515Z</news:publication_date>
      <news:title>Customer Authentication - Why Are They Sending Money to Scammers?</news:title>
      <news:keywords>Feedzai, digital fraud, customer identity, scams, cybercrime</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/vim-modeline-bypass-arbitrary-os-commands-mngx</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T03:31:26.351Z</news:publication_date>
      <news:title>Vim Vulnerability - Attackers Can Execute OS Commands</news:title>
      <news:keywords>CVE-2026-34982, Vim, command injection, Avishay Matayev, dfwjj x</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/supply-chain-attack-axios-npm-package-mngx</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T03:31:01.383Z</news:publication_date>
      <news:title>Supply Chain Attack - Axios npm Package Compromised</news:title>
      <news:keywords>Axios, npm, supply chain attack, malicious package, remote access trojan</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/linux-rootkit-detection-engineering-mngw</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T03:01:21.906Z</news:publication_date>
      <news:title>Linux Rootkit Detection - Importance of Behavioral Analysis</news:title>
      <news:keywords>rootkit, Linux, detection, behavioral analysis, static detection</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/microsoft-teams-remove-exif-data-privacy-update-mngu</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T02:31:23.339Z</news:publication_date>
      <news:title>Microsoft Teams - Removing EXIF Data for Enhanced Privacy</news:title>
      <news:keywords>Microsoft Teams, EXIF data, corporate privacy</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/android-developer-verification-sideloading-security-mngu</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T02:31:22.689Z</news:publication_date>
      <news:title>Android Developer Verification - Google&apos;s New Security Measure</news:title>
      <news:keywords>Android, Google, developer verification, sideloading, malicious apps</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/nginx-ui-backup-restore-vulnerability-exploit-mngu</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T02:30:58.113Z</news:publication_date>
      <news:title>Nginx-UI Vulnerability - Critical PoC Exploit Released</news:title>
      <news:keywords>CVE-2026-33026, Nginx-UI, AES-256-CBC, dapickle, backup security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/digital-assets-after-death-managing-fraud-risks-mngt</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T02:01:10.111Z</news:publication_date>
      <news:title>Digital Assets After Death - Managing Fraud Risks Explained</news:title>
      <news:keywords>digital assets, fraud, scams, inheritance, estate planning</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/falcon-it-windows-secure-boot-certificate-management-mngq</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T00:31:13.010Z</news:publication_date>
      <news:title>Windows Secure Boot - Falcon IT Enhances Certificate Management</news:title>
      <news:keywords>Windows Secure Boot, CrowdStrike, UEFI CA 2023, firmware trust, certificate lifecycle</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/stardust-chollima-compromises-axios-npm-package-mngq</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T00:30:53.947Z</news:publication_date>
      <news:title>STARDUST CHOLLIMA - Compromises Axios npm Package</news:title>
      <news:keywords>STARDUST CHOLLIMA, Axios, ZshBucket, npm, supply chain attack</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/axios-supply-chain-attack-detection-mngq</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T00:30:51.776Z</news:publication_date>
      <news:title>Axios Supply Chain Attack - How It Was Detected</news:title>
      <news:keywords>Axios, npm, TeamPCP</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ransomware-stolen-data-monetization-leak-bazaar-mngp</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T00:01:19.643Z</news:publication_date>
      <news:title>Ransomware - New Cybercrime Service Promotes Data Monetization</news:title>
      <news:keywords>Leak Bazaar, ransomware, cybercrime, data monetization</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/google-dawn-flaw-cve-2026-5281-exploited-mngp</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T00:01:16.688Z</news:publication_date>
      <news:title>Google Dawn Flaw - CISA Adds CVE-2026-5281 to Catalog</news:title>
      <news:keywords>CVE-2026-5281, Google, Chrome, CISA</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/march-content-overview-didier-stevens-mngp</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T00:01:15.119Z</news:publication_date>
      <news:title>Tools Update - Overview of March Content Releases</news:title>
      <news:keywords>base64dump.py, emldump.py, Wireshark, YARA-X, CVE-2026-0866</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ajax-football-club-data-breach-exposes-fans-mngo</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-01T23:31:23.831Z</news:publication_date>
      <news:title>Ajax Football Club Data Breach Exposes 300,000 Fans&apos; Details</news:title>
      <news:keywords>Ajax Football Club, data breach, personal details, Bitcoin, cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/bitcoin-fishing-rod-ajax-data-breach-mngo</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-01T23:31:07.873Z</news:publication_date>
      <news:title>Bitcoin Hidden in Fishing Rod - Ajax FC Data Breach Exposed</news:title>
      <news:keywords>Bitcoin, Ajax Football Club, data breach, cybersecurity, Irish drug dealer</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/new-crystalrat-malware-rat-stealer-prankware-features-mngo</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-01T23:30:57.069Z</news:publication_date>
      <news:title>CrystalRAT Malware - New Features Include Prankware and Theft</news:title>
      <news:keywords>CrystalRAT, malware-as-a-service, data theft, keylogging, prankware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/drift-suspends-deposits-withdrawals-crypto-hack-mngn</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-01T23:01:29.647Z</news:publication_date>
      <news:title>Drift Suspends Deposits and Withdrawals After Crypto Hack</news:title>
      <news:keywords>Drift, cryptocurrency, hack, CertiK, Arkham</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/axios-npm-supply-chain-attack-mitigation-mngm</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-01T22:30:54.498Z</news:publication_date>
      <news:title>Axios npm Supply Chain Attack - Mitigation Steps Explained</news:title>
      <news:keywords>Axios, Sapphire Sleet, npm, malware, supply chain attack</news:keywords>
    </news:news>
  </url>
</urlset>