<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
  <url>
    <loc>https://cyberpings.com/article/ukraine-busts-bot-farm-fake-telegram-accounts-mo8n</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T13:31:50.802Z</news:publication_date>
      <news:title>Ukraine Dismantles Bot Farm Supplying Fake Telegram Accounts</news:title>
      <news:keywords>Russian intelligence, disinformation campaigns, bot farm, Telegram accounts, Ukraine</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/us-spy-laws-expire-warrantless-surveillance-mo8n</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T13:31:26.721Z</news:publication_date>
      <news:title>US Spy Laws Set to Expire - Lawmakers Split on Reforms</news:title>
      <news:keywords>Section 702, FISA, surveillance, privacy reform, data brokers</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ciso-role-survival-strategies-mo8n</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T13:31:08.057Z</news:publication_date>
      <news:title>CISO Role - Strategies for Survival in Cybersecurity</news:title>
      <news:keywords>CISO, cybersecurity, leadership, risk management, business objectives</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/moving-past-bots-vs-humans-mo8n</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T13:31:07.222Z</news:publication_date>
      <news:title>Privacy - AI Challenges Traditional Bot Detection Models</news:title>
      <news:keywords>AI assistants, privacy proxies, user privacy, data protection</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/silobreaker-mimir-agentic-ai-intelligence-workflows-mo8m</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T13:01:41.610Z</news:publication_date>
      <news:title>Silobreaker Mimir - New Agentic AI Enhances Intelligence Workflows</news:title>
      <news:keywords>Silobreaker, Mimir, agentic AI</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/aes-128-quantum-security-myths-mo8m</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T13:01:32.075Z</news:publication_date>
      <news:title>AES 128 - Debunking Myths in Quantum Security Readiness</news:title>
      <news:keywords>AES 128, quantum computing, Grover&apos;s algorithm, encryption, NIST</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/unsecured-perforce-servers-expose-sensitive-data-mo8m</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T13:01:23.798Z</news:publication_date>
      <news:title>Unsecured Perforce Servers Expose Sensitive Data Risk</news:title>
      <news:keywords>Perforce, data exposure, sensitive information, security misconfiguration, Morgan Robertson</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ivanti-neurons-ai-automates-it-operations-mo8m</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T13:01:21.274Z</news:publication_date>
      <news:title>Ivanti Neurons AI - Automating IT Operations and Security</news:title>
      <news:keywords>Ivanti Neurons, AI automation, IT operations, security risk, patch management</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/azure-sre-agent-authentication-flaw-eavesdropping-mo8m</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T13:01:19.089Z</news:publication_date>
      <news:title>Azure SRE Agent - Critical Flaw Allows Unauthorized Eavesdropping</news:title>
      <news:keywords>CVE-2026-32173, Azure SRE Agent, Microsoft, authentication flaw, Yanir Tsarimi</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/openai-chronicle-privacy-concerns-mo8l</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T12:31:16.775Z</news:publication_date>
      <news:title>OpenAI Chronicle - New Feature Raises Privacy Concerns</news:title>
      <news:keywords>OpenAI, Codex, Chronicle, privacy concerns, screen recording</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/wiz-expands-api-discovery-with-apigee-mo8l</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T12:31:06.904Z</news:publication_date>
      <news:title>Wiz Expands API Discovery with Apigee Integration</news:title>
      <news:keywords>Wiz, Apigee, API Security, Cloud Security, GCP</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/hackers-use-nightmare-eclipse-tools-fortigate-vpn-mo8l</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T12:31:06.349Z</news:publication_date>
      <news:title>Hackers Use Nightmare-Eclipse Tools After FortiGate VPN Breach</news:title>
      <news:keywords>FortiGate, Nightmare-Eclipse, BlueHammer, RedSun, UnDefend, VPN, cybersecurity, malware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/attackers-surge-before-vulnerability-disclosures-mo8l</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T12:30:53.151Z</news:publication_date>
      <news:title>Attackers Surge Before Vulnerability Disclosures - GreyNoise Report</news:title>
      <news:keywords>CVE-2026-20127, Cisco, SonicWall, GreyNoise, network vulnerabilities</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/google-antigravity-ide-patch-prompt-injection-mo8k</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T12:02:43.268Z</news:publication_date>
      <news:title>Google Patches Antigravity IDE Flaw Enabling Code Execution</news:title>
      <news:keywords>Antigravity, Google, prompt injection, code execution, find_by_name</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/be-prime-video-surveillance-data-leak-mo8k</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T12:01:28.196Z</news:publication_date>
      <news:title>Be Prime Faces Data Breach - Claims of Surveillance Footage Leak</news:title>
      <news:keywords>Be Prime, dylanmarly, video surveillance, Cisco Meraki, data leak</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/chinese-apt-targets-indian-banks-korean-policy-mo8k</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T12:01:14.880Z</news:publication_date>
      <news:title>Chinese APT Targets Indian Banks and Korean Policy Circles</news:title>
      <news:keywords>APT, China, India, cyber espionage, banking sector</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/data-breaches-healthcare-organizations-illinois-texas-mo8j</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T11:31:51.276Z</news:publication_date>
      <news:title>Data Breaches - Healthcare Organizations Affect 600,000 Patients</news:title>
      <news:keywords>Southern Illinois Dermatology, North Texas Behavioral Health Authority, Saint Anthony Hospital</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/met-police-snoop-tech-shoplifting-trial-mo8i</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T11:01:35.356Z</news:publication_date>
      <news:title>Met Police Trials Snoop Tech to Combat London Shoplifting</news:title>
      <news:keywords>Metropolitan Police, shoplifting, facial recognition, CCTV, privacy concerns</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/grapheneos-privacy-tool-legacy-conflict-mo8h</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T10:31:27.006Z</news:publication_date>
      <news:title>GrapheneOS - The Legacy and Conflict of a Privacy Tool</news:title>
      <news:keywords>GrapheneOS, CopperheadOS, Daniel Micay</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/stealtok-browser-extensions-tiktok-downloaders-compromised-mo8h</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T10:31:09.793Z</news:publication_date>
      <news:title>StealTok Malware - TikTok Downloader Extensions Compromised</news:title>
      <news:keywords>StealTok, TikTok Downloader, browser extensions, malware campaign, LayerX</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/proxy-smart-sim-farm-fraud-mo8f</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T09:31:14.469Z</news:publication_date>
      <news:title>ProxySmart - Powers Global SIM Farm Proxy Networks</news:title>
      <news:keywords>ProxySmart, SIM farm, mobile proxy, Infrawatch, cybercrime</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/human-aspect-of-red-teams-brian-fox-tom-tovar-mo8f</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T09:31:08.617Z</news:publication_date>
      <news:title>Human Aspect of Red Teams - Insights from Experts</news:title>
      <news:keywords>Red Teams, Cybersecurity, AI, Application Security, Threat Hunting</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/adaptavist-group-breach-ransomware-imposter-emails-mo8e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T09:01:35.606Z</news:publication_date>
      <news:title>Adaptavist Group Breach - Ransomware Crew Claims Mega-Haul</news:title>
      <news:keywords>Adaptavist Group, The Gentlemen, ransomware, data breach, phishing</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ngate-nfc-malware-targets-android-users-mo8e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T09:01:27.694Z</news:publication_date>
      <news:title>NGate NFC Malware - Targets Android Users via Trojanized HandyPay App</news:title>
      <news:keywords>NGate, HandyPay, Android, ESET, NFC malware, malware, cybercrime, NFC, payment fraud</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/panasonic-device-locked-qr-codes-facial-biometric-capture-mo8c</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T08:01:12.561Z</news:publication_date>
      <news:title>Panasonic - Device-Locked QR Codes Enhance Biometric Capture</news:title>
      <news:keywords>Panasonic, QR codes, facial recognition, biometrics, access control</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/wav-file-malware-payload-mo8b</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T07:31:16.391Z</news:publication_date>
      <news:title>.WAV File - New Malware Delivery Method Discovered</news:title>
      <news:keywords>malware, wav file, payload</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/iran-claims-us-backdoors-networking-equipment-mo88</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T06:31:26.769Z</news:publication_date>
      <news:title>Iran Claims US Used Backdoors to Disable Networking Gear</news:title>
      <news:keywords>Iran, US Cyber Command, backdoors, networking equipment, China</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/browser-run-ai-agents-browser-mo84</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T04:31:52.450Z</news:publication_date>
      <news:title>Browser Run - Empower Your AI Agents with a Browser</news:title>
      <news:keywords>Browser Run, Cloudflare, AI agents, Chrome DevTools, WebMCP</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/encrypted-routing-layer-private-ai-inference-mo84</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T04:31:15.759Z</news:publication_date>
      <news:title>Encrypted Routing Layer - Enhancing Private AI Inference</news:title>
      <news:keywords>Secure Multi-Party Computation, AI inference, SecureRouter, encryption, University of Central Florida</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/iterm2-flaw-ssh-integration-code-execution-mo82</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T03:31:08.341Z</news:publication_date>
      <news:title>iTerm2 Vulnerability - SSH Integration Allows Code Execution</news:title>
      <news:keywords>iTerm2, RCE, SSH, Califio, macOS</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/trojanized-testdisk-installer-screenconnect-deployment-mo7y</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T01:31:42.904Z</news:publication_date>
      <news:title>Trojanized TestDisk Installer - Illicit ScreenConnect Deployment</news:title>
      <news:keywords>TestDisk, ScreenConnect, Microsoft, malware, DLL side-loading</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ponemon-survey-identity-overconfidence-mo7x</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T01:02:36.042Z</news:publication_date>
      <news:title>Ponemon Survey Exposes Identity Overconfidence in Enterprises</news:title>
      <news:keywords>Ponemon Institute, identity security, multifactor authentication, AI identities, Cerby</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/executive-order-stronger-identity-proofing-mo7x</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T01:01:59.851Z</news:publication_date>
      <news:title>Executive Order - Push for Stronger Identity Proofing</news:title>
      <news:keywords>Executive Order 14390, identity verification, cyber fraud, digital identity, Jordan Burris</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/palantir-ice-human-rights-policy-issues-mo7x</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T01:01:08.464Z</news:publication_date>
      <news:title>Palantir&apos;s Human Rights Policy - Questions Arise Over ICE Work</news:title>
      <news:keywords>Palantir, ICE, EFF, human rights, data privacy</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ai-model-claude-opus-exploits-bugs-mo7u</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T00:01:46.824Z</news:publication_date>
      <news:title>AI Model Claude Opus Turns Bugs into Exploits for $2,283</news:title>
      <news:keywords>Claude Opus, Chrome exploit, AI vulnerabilities, Mohan Pedhapati, bug bounty</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cibercrime-america-latina-caribe-2025-mo7u</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T00:01:40.618Z</news:publication_date>
      <news:title>Cibercrime na América Latina e Caribe - Tendências em 2025</news:title>
      <news:keywords>Insikt Group, LAC, ransomware, malware, phishing</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/kelpdao-290-million-heist-lazarus-hackers-mo7r</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T22:31:13.103Z</news:publication_date>
      <news:title>KelpDAO Suffers $290 Million Heist Linked to Lazarus Hackers</news:title>
      <news:keywords>KelpDAO, Lazarus Group, crypto theft, DeFi, rsETH, North Korea, LayerZero</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/securing-ai-application-development-mo7q</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T22:01:30.898Z</news:publication_date>
      <news:title>Securing AI Application Development - Protecting Sensitive Data</news:title>
      <news:keywords>AI development, data security, sensitive data, credentials, Varonis</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/gh0st-rat-cloverplus-dual-payload-malware-campaign-mo7o</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T21:01:22.703Z</news:publication_date>
      <news:title>Gh0st RAT and CloverPlus Adware - New Dual-Payload Malware</news:title>
      <news:keywords>Gh0st RAT, CloverPlus, malware campaign, remote access trojan, adware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ftc-ai-portfolio-expansion-deepfakes-voice-cloning-mo7o</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T21:01:11.053Z</news:publication_date>
      <news:title>FTC&apos;s AI Portfolio Expands - New Law Targets Deepfakes</news:title>
      <news:keywords>FTC, Take It Down Act, deepfakes, voice cloning, AI scams</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/mastodon-ddos-attack-april-2026-mo7n</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T20:31:36.814Z</news:publication_date>
      <news:title>Mastodon Hit by DDoS Attack - Service Disrupted Temporarily</news:title>
      <news:keywords>Mastodon, DDoS, Bluesky</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/claude-desktop-privacy-issues-browser-access-mo7m</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T20:01:14.038Z</news:publication_date>
      <news:title>Claude Desktop - Privacy Concerns Over Browser Access Settings</news:title>
      <news:keywords>Claude Desktop, Anthropic, ePrivacy Directive, browser extensions, privacy violation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/tyler-buchanan-pleads-guilty-crypto-theft-mo7l</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T19:31:05.504Z</news:publication_date>
      <news:title>Tyler Buchanan Pleads Guilty - Major Crypto Theft Case</news:title>
      <news:keywords>Tyler Buchanan, Scattered Spider, cryptocurrency theft, SMS phishing, wire fraud, cybercrime, phishing, SIM swap, cryptocurrency</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/sglang-cve-2026-5760-remote-code-execution-mo7k</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T19:01:57.444Z</news:publication_date>
      <news:title>SGLang CVE-2026-5760 - Critical RCE Vulnerability Disclosed</news:title>
      <news:keywords>CVE-2026-5760, SGLang, Remote Code Execution, Jinja2, GGUF</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ai-soc-customization-importance-mo7k</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T19:01:36.897Z</news:publication_date>
      <news:title>AI SOC Customization - Why Your Security Needs Control</news:title>
      <news:keywords>AI SOC, automation, security operations, incident response, customization</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/progress-security-advisory-cve-2026-3517-3518-3519-4048-21876-mo7j</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T18:31:35.908Z</news:publication_date>
      <news:title>Progress Security Advisory - Critical Vulnerabilities Found</news:title>
      <news:keywords>CVE-2026-3517, CVE-2026-3518, CVE-2026-3519, CVE-2026-4048, CVE-2026-21876</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/seiko-usa-website-defaced-customer-data-theft-mo7j</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T18:31:26.087Z</news:publication_date>
      <news:title>Seiko USA Website Defaced - Customer Data Theft Claimed</news:title>
      <news:keywords>Seiko USA, Shopify, data breach, customer data, extortion</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/making-cyberattacks-harder-by-design-mo7j</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T18:31:02.945Z</news:publication_date>
      <news:title>Making Cyberattacks Harder - Microsoft’s New Security Approach</news:title>
      <news:keywords>Microsoft, Dynamics 365, Power Platform, credential elimination, platform engineering</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/iran-mois-coordinated-cyber-campaign-mo7f</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T17:01:10.840Z</news:publication_date>
      <news:title>Iran MOIS - Coordinated Cyber Campaign Using Multiple Personas</news:title>
      <news:keywords>Iran MOIS, Homeland Justice, Karma, Handala, Void Manticore</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ai-help-networks-pocket-presence-mo7e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T16:31:23.811Z</news:publication_date>
      <news:title>AI - Enhancing Telecom Security with Pocket Presence</news:title>
      <news:keywords>AI, telecom security, Salt Typhoon, UNC3886, BPFDoor</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/lovable-ai-app-builder-api-flaw-exposes-data-mo7e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T16:31:09.968Z</news:publication_date>
      <news:title>Lovable AI App Builder - Critical API Flaw Exposes Data, Legacy Projects at Risk</news:title>
      <news:keywords>Lovable, API Vulnerability, Broken Object Level Authorization, Data Exposure, HackerOne, BOLA, Cybersecurity, API, vulnerability, data breach, AI, security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/satoshi-nakamoto-adam-back-identity-mo7e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T16:31:02.504Z</news:publication_date>
      <news:title>Satoshi Nakamoto - Is Adam Back Really the Creator?</news:title>
      <news:keywords>bitcoin, cryptocurrency, Adam Back</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/serial-to-ip-converter-vulnerabilities-expose-systems-mo7d</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T16:01:24.711Z</news:publication_date>
      <news:title>Serial-to-IP Converter Vulnerabilities Expose OT Systems</news:title>
      <news:keywords>Lantronix, Silex, BRIDGE:BREAK, CISA, OT security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/elon-musk-questioning-french-police-ai-images-mo7c</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T15:31:15.786Z</news:publication_date>
      <news:title>Elon Musk - Fails to Appear for French Police Questioning</news:title>
      <news:keywords>Elon Musk, X, AI images, French police, child sexual abuse material</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/enterprise-remediation-benchmark-comparison-mo7c</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T15:31:11.609Z</news:publication_date>
      <news:title>Enterprise Remediation Benchmark - Compare Your Organization</news:title>
      <news:keywords>Google Chrome, Visual C++, Microsoft Edge, Qualys, patch management</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/big-tech-can-stop-scams-mo7b</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T15:01:19.196Z</news:publication_date>
      <news:title>Big Tech Can Stop Scams - Why They Don’t Act</news:title>
      <news:keywords>financial scams, older adults, Malwarebytes, FTC, Marti DeLiema</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/backup-myth-businesses-risk-bcdr-mo7a</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T14:31:14.064Z</news:publication_date>
      <news:title>Backup Myth - Why BCDR is Essential for Businesses</news:title>
      <news:keywords>Datto, BCDR, business continuity, ransomware, data protection</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/decipio-community-tool-credential-theft-detection-mo7a</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T14:31:09.077Z</news:publication_date>
      <news:title>Decipio - New AI Tool to Catch Credential Theft Early</news:title>
      <news:keywords>Decipio, Arctic Wolf, credential theft, cybersecurity tool, AI-driven detection</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/wiz-code-secures-build-environment-mo77</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T13:01:20.485Z</news:publication_date>
      <news:title>Wiz Code Secures CI/CD Pipelines Against Supply Chain Attacks</news:title>
      <news:keywords>Wiz, CI/CD, supply chain attack, GitHub Actions, AI agents</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/why-ai-deployments-stall-after-demo-mo76</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T12:31:12.616Z</news:publication_date>
      <news:title>AI Deployments - Why They Stall After the Demo</news:title>
      <news:keywords>AI, Data Governance, Machine Learning, Enterprise Software, Privacy</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/scattered-spider-hacker-pleads-guilty-mo76</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T12:31:07.396Z</news:publication_date>
      <news:title>Scattered Spider Hacker Pleads Guilty to Cryptocurrency Theft, Faces 22 Years in Prison</news:title>
      <news:keywords>Scattered Spider, Tyler Buchanan, SIM swapping, cryptocurrency theft, phishing, cybercrime, cryptocurrency, hacking</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/athr-ai-platform-voice-phishing-mo74</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T11:31:18.648Z</news:publication_date>
      <news:title>ATHR AI Platform - Automates Voice Phishing Operations</news:title>
      <news:keywords>ATHR, voice phishing, AI, cybercrime, vishing</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/handling-cve-flood-with-epss-mo74</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T11:30:53.654Z</news:publication_date>
      <news:title>Handling the CVE Flood - Understanding the Challenge</news:title>
      <news:keywords></news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/fud-crypt-microsoft-signed-malware-mo72</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T10:31:38.560Z</news:publication_date>
      <news:title>FUD Crypt - Hackers Generate Microsoft-Signed Malware</news:title>
      <news:keywords>FUD Crypt, Microsoft, malware-as-a-service, DLL sideloading, C2</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/network-background-noise-predicts-edge-device-vulnerability-mo72</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T10:31:16.950Z</news:publication_date>
      <news:title>Network Background Noise - Predicts Edge-Device Vulnerability</news:title>
      <news:keywords>GreyNoise, edge-device vulnerability, Cisco, Palo Alto Networks, Fortinet</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/syncthing-secure-private-file-synchronization-mo72</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T10:30:58.204Z</news:publication_date>
      <news:title>Syncthing - Secure and Private File Synchronization Tool</news:title>
      <news:keywords>Syncthing, file synchronization, open source, peer-to-peer, privacy</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/microsoft-teams-service-update-failures-mo70</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T10:01:37.008Z</news:publication_date>
      <news:title>Microsoft Teams - Service Update Causes Launch Failures, Rollback Underway</news:title>
      <news:keywords>Microsoft, Teams, service update, Microsoft Teams, Service Update, Launch Failures, Incident TM1283300</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/china-spy-alysa-liu-father-mo70</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T10:01:36.203Z</news:publication_date>
      <news:title>China&apos;s Surveillance of Alysa Liu and Her Father Exposed</news:title>
      <news:keywords>China, Alysa Liu, surveillance, Matthew Ziburis, Frank Liu</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/copilot-agentforce-prompt-injection-vulnerabilities-mo70</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T10:01:35.517Z</news:publication_date>
      <news:title>Prompt Injection Vulnerabilities in Copilot &amp; Agentforce</news:title>
      <news:keywords>Microsoft Copilot, Salesforce Agentforce, Prompt Injection, Data Exfiltration, Capsule Security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/notion-pages-leak-profile-photos-emails-mo6z</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T09:31:02.480Z</news:publication_date>
      <news:title>Notion Pages Expose Editors&apos; Profile Photos and Emails</news:title>
      <news:keywords>Notion, PII, data leak, email exposure, profile photos</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/eu-cloud-sovereignty-initiative-awards-180-million-mo6w</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T08:01:35.803Z</news:publication_date>
      <news:title>EU Cloud Sovereignty Initiative - €180 Million Awarded</news:title>
      <news:keywords>EU, cloud sovereignty, European Commission, cloud services, digital sovereignty</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/openai-codex-update-ai-capabilities-mo6r</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T05:31:36.933Z</news:publication_date>
      <news:title>OpenAI Codex Update - Expands AI Capabilities Across Apps</news:title>
      <news:keywords>OpenAI, Codex, ChatGPT, AI, macOS</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/smokedmeat-open-source-tool-cicd-attacks-mo6r</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T05:31:12.950Z</news:publication_date>
      <news:title>SmokedMeat - New Tool Demonstrates CI/CD Attack Scenarios</news:title>
      <news:keywords>SmokedMeat, CI/CD, Boost Security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/liongard-upgrades-liongardiq-ai-access-live-asset-data-mo6q</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T05:01:51.187Z</news:publication_date>
      <news:title>LiongardIQ - New AI Access and Enhanced Asset Intelligence</news:title>
      <news:keywords>LiongardIQ, AI integration, asset intelligence, network discovery, identity mapping</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/dungeons-and-daemons-cybersecurity-rpg-mo6k</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T02:31:23.241Z</news:publication_date>
      <news:title>Dungeons and Daemons - Experience Cybersecurity as a Game</news:title>
      <news:keywords>Dungeons and Daemons, TrustedSec, Red Team, Cybersecurity RPG</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/shared-dictionaries-compression-web-performance-mo6k</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T02:31:08.021Z</news:publication_date>
      <news:title>Shared Dictionaries - Enhancing Web Compression Efficiency</news:title>
      <news:keywords>Cloudflare, Shared Dictionaries, Compression, Web Performance</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/human-trust-ai-agents-mo65</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T19:31:02.955Z</news:publication_date>
      <news:title>Human Trust in AI Agents - New Research Explores Expectations</news:title>
      <news:keywords>AI, LLMs, strategic games, human behavior, trust</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/vercel-breach-hackers-selling-stolen-data-mo62</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T18:01:36.415Z</news:publication_date>
      <news:title>Vercel Breach - Hackers Claim to Sell Stolen Data for $2 Million</news:title>
      <news:keywords>Vercel, ShinyHunters, data breach, cybersecurity, OAuth, Data Breach, Context.ai, Google Workspace</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/apple-account-change-alerts-phishing-emails-mo5z</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T16:31:20.914Z</news:publication_date>
      <news:title>Apple Account Change Alerts - Phishing Emails Exploited</news:title>
      <news:keywords>Apple, phishing, callback phishing, email scams, Apple Account, Phishing, Email, Callback Scams</news:keywords>
    </news:news>
  </url>
</urlset>