<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
  <url>
    <loc>https://cyberpings.com/article/strengthening-authentication-with-passkeys-playbook-moal</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T22:01:23.258Z</news:publication_date>
      <news:title>Strengthening Authentication - CISO Playbook for Passkeys</news:title>
      <news:keywords>CISO, playbook, toolkit, passkeys</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/fake-github-repositories-deliver-smartloader-stealc-moak</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T21:31:06.287Z</news:publication_date>
      <news:title>Fake GitHub Repositories - Delivering SmartLoader and StealC</news:title>
      <news:keywords>SmartLoader, StealC, GitHub, malware campaign, Hexastrike</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/house-republicans-national-privacy-bill-moai</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T20:31:04.978Z</news:publication_date>
      <news:title>House Republicans Introduce National Privacy Bill for Consumers</news:title>
      <news:keywords>Secure Data Act, data privacy, FTC, Brett Guthrie, John Joyce</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/malicious-kics-docker-images-checkmarx-supply-chain-moaf</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T19:01:31.253Z</news:publication_date>
      <news:title>Malicious KICS Docker Images Target Checkmarx Supply Chain</news:title>
      <news:keywords>Checkmarx, Docker, malware, Visual Studio Code, supply chain attack</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/zero-networks-ai-segmentation-prevent-breaches-moae</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T18:31:34.419Z</news:publication_date>
      <news:title>AI Security - Zero Networks Launches AI Segmentation Tool</news:title>
      <news:keywords>AI Segmentation, Zero Networks, AI agents, lateral movement, compliance</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ai-powered-defense-ai-accelerated-threat-landscape-moae</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T18:31:14.900Z</news:publication_date>
      <news:title>AI Security - Microsoft Partners with Anthropic for Defense</news:title>
      <news:keywords>Microsoft, Anthropic, AI-driven security, Claude Mythos, vulnerability discovery</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/blackberry-survey-government-security-risks-messaging-apps-moad</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T18:01:43.357Z</news:publication_date>
      <news:title>Government Security Risks - BlackBerry Survey Reveals Issues</news:title>
      <news:keywords>BlackBerry, encryption, government security, consumer messaging apps, data privacy</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/vendor-diversification-supply-chain-risk-management-moac</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T18:01:22.327Z</news:publication_date>
      <news:title>Vendor Diversification - Enhancing Supply Chain Resilience</news:title>
      <news:keywords>vendor diversification, supply chain risk management, cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/redsun-mitigation-microsoft-defender-moab</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T17:31:19.482Z</news:publication_date>
      <news:title>RedSun Vulnerability - Critical Risk in Microsoft Defender</news:title>
      <news:keywords>Microsoft Defender, RedSun, Local Privilege Escalation, Windows, Qualys VMDR</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/auraboros-rat-keylogging-cookie-hijacking-moaa</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T17:01:21.474Z</news:publication_date>
      <news:title>Auraboros RAT - Exposes Keylogging and Cookie Hijacking</news:title>
      <news:keywords>Auraboros RAT, keylogging, cookie hijacking, live audio streaming, DLL sideloading</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/phishing-defense-layer-top-cisos-moa9</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T16:31:26.709Z</news:publication_date>
      <news:title>Phishing Defense Layer - Essential Insights from Top CISOs</news:title>
      <news:keywords>phishing, CISO, ANY.RUN, SOC, cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/openai-privacy-filter-ai-model-redacting-pii-moa9</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T16:31:23.678Z</news:publication_date>
      <news:title>OpenAI Privacy Filter - New AI Model for PII Redaction</news:title>
      <news:keywords>OpenAI, Privacy Filter, PII detection, data privacy, AI model</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/rituals-data-breach-customer-membership-records-moa8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T16:01:20.228Z</news:publication_date>
      <news:title>Rituals Confirms Data Breach Affecting Customer Records</news:title>
      <news:keywords>Rituals, data breach, customer records</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/eff-sues-dhs-ice-records-subpoenas-online-critics-moa8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T16:01:19.886Z</news:publication_date>
      <news:title>EFF Sues DHS and ICE Over Subpoenas Targeting Critics</news:title>
      <news:keywords>DHS, ICE, EFF, subpoenas, First Amendment</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/spain-dismantles-manga-piracy-platform-arrests-four-moa7</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T15:31:23.044Z</news:publication_date>
      <news:title>Spain Dismantles Major $4.7M Manga Piracy Platform</news:title>
      <news:keywords>manga piracy, Tu Manga Online, Spanish police, intellectual property, digital assets</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/silentglass-cyber-attack-monitor-protection-moa6</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T15:01:25.223Z</news:publication_date>
      <news:title>SilentGlass - New Device Shields Monitors from Cyber Threats</news:title>
      <news:keywords>SilentGlass, NCSC, Goldilock Labs, cybersecurity, monitor protection, monitor security, cyber threats, hardware security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/caller-as-a-service-fraud-scam-economy-moa5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T14:31:33.782Z</news:publication_date>
      <news:title>Caller-as-a-Service Fraud - Inside the Scam Economy&apos;s Hiring Process</news:title>
      <news:keywords>Caller-as-a-Service, social engineering, cybercrime, vishing, Flare</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/uk-government-spyware-hacking-threats-moa5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T14:31:24.221Z</news:publication_date>
      <news:title>UK Government Warns of Spyware Threats from 100 Countries</news:title>
      <news:keywords>NSO Group, Pegasus, Graphite, UK National Cyber Security Centre, DarkSword</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/microsoft-github-rce-vulnerability-moa5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T14:31:21.898Z</news:publication_date>
      <news:title>Microsoft GitHub RCE Vulnerability - Critical Flaw Fixed</news:title>
      <news:keywords>Microsoft, GitHub, RCE, Tenable, GITHUB_TOKEN</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/uk-cyber-perfect-storm-ncsc-warns-moa4</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T14:02:17.177Z</news:publication_date>
      <news:title>UK Faces Cyber &apos;Perfect Storm&apos; Amid Nation State Threats</news:title>
      <news:keywords>NCSC, nation-state threats, cybersecurity, AI, ransomware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/llm-reverse-engineering-obfuscation-arms-race-moa4</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T14:01:39.284Z</news:publication_date>
      <news:title>LLM-Driven Reverse Engineering - The New Obfuscation Battle</news:title>
      <news:keywords>LLM, obfuscation, reverse engineering, Elastic Security Labs, Tigress</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/china-cyber-capabilities-equal-us-intelligence-warning-moa4</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T14:01:19.013Z</news:publication_date>
      <news:title>China&apos;s Cyber Capabilities Now Equal to the US, Warns Intelligence</news:title>
      <news:keywords>China, cyber capabilities, MIVD, cyber espionage, PLA</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/rust-workers-panic-abort-recovery-moa4</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T14:01:15.186Z</news:publication_date>
      <news:title>Rust Workers - Enhancing Reliability with Panic Recovery</news:title>
      <news:keywords>Rust, wasm-bindgen, WebAssembly, Cloudflare Workers, panic recovery</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/avast-antivirus-25-11-unquoted-service-path-moa2</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T13:02:11.533Z</news:publication_date>
      <news:title>AVAST Antivirus 25.11 - Critical Unquoted Service Path Flaw</news:title>
      <news:keywords>AVAST, Windows, Unquoted Service Path</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/dindoor-backdoor-deno-runtime-evade-detection-moa2</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T13:01:45.757Z</news:publication_date>
      <news:title>DinDoor Backdoor - Abusing Deno Runtime for Stealthy Attacks</news:title>
      <news:keywords>DinDoor, Deno Runtime, Tsundere Botnet, MuddyWater, Seedworm</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/malicious-trading-website-drops-browser-hijacking-malware-moa2</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T13:01:39.643Z</news:publication_date>
      <news:title>Malicious Trading Website Drops Browser Hijacking Malware</news:title>
      <news:keywords>Needle Stealer, TradingClaw, malware, browser hijacking, data theft</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/surge-silent-subject-phishing-attacks-vip-users-moa2</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T13:01:32.605Z</news:publication_date>
      <news:title>Surge in Silent Subject Phishing Attacks Targets VIP Users</news:title>
      <news:keywords>phishing, QR codes, credential harvesting, Cyberproof, FlowerStorm</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/throttlestop-kernel-driver-privilege-escalation-moa2</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T13:01:19.850Z</news:publication_date>
      <news:title>Throttlestop Kernel Driver - Privilege Escalation Vulnerability</news:title>
      <news:keywords>CVE-2025-7771, Throttlestop, Windows, Privilege Escalation, Kernel Driver</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/autonomous-runtime-security-agentic-response-moa2</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T13:01:15.104Z</news:publication_date>
      <news:title>Autonomous Runtime Security - Transforming Incident Response</news:title>
      <news:keywords>AI Security, Cloud Workload Protection Platform, Container Security, Runtime Security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/sec-cybersecurity-disclosure-rules-moa1</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T12:31:13.855Z</news:publication_date>
      <news:title>SEC Cybersecurity Disclosure Rules - What Leaders Must Know</news:title>
      <news:keywords>SEC, cybersecurity disclosure, risk management, incident reporting, compliance</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/router-security-hardening-steps-2026-moa1</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T12:31:01.830Z</news:publication_date>
      <news:title>Router Security - Essential Hardening Steps for 2026</news:title>
      <news:keywords>router security, firmware monitoring, network hardening, NIS2 compliance, credential audits</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/sboms-failing-supply-chain-attacks-rise-moa0</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T12:01:50.618Z</news:publication_date>
      <news:title>SBOMs Failing - Supply Chain Attacks Surge Amid Confusion</news:title>
      <news:keywords>SBOM, VEX, supply chain attacks, security governance, vulnerability management</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/moltbook-data-breach-exposes-email-addresses-api-tokens-mo9z</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T11:32:09.448Z</news:publication_date>
      <news:title>Moltbook Data Breach Exposes 35,000 Emails and API Tokens</news:title>
      <news:keywords>Moltbook, API tokens, OpenAI, data exposure, SaaS security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/scotland-yard-live-facial-recognition-judges-decision-mo9z</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T11:31:14.615Z</news:publication_date>
      <news:title>Scotland Yard - Judges Allow Live Facial Recognition Use</news:title>
      <news:keywords>facial recognition, Scotland Yard, Big Brother Watch, human rights, privacy laws</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/compromised-namastex-npm-packages-canisterworm-malware-mo9z</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T11:31:06.046Z</news:publication_date>
      <news:title>Namastex npm Packages Compromised by CanisterWorm Malware</news:title>
      <news:keywords>CanisterWorm, TeamPCP, Namastex, npm, malware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/new-gogra-malware-linux-microsoft-graph-api-mo9w</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T10:31:27.731Z</news:publication_date>
      <news:title>New GoGra Malware - Linux Variant Uses Microsoft Graph API</news:title>
      <news:keywords>GoGra, Linux, Microsoft Graph API, Harvester, malware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cybersmart-partners-with-renaissance-for-smes-mo9w</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T10:31:07.996Z</news:publication_date>
      <news:title>CyberSmart Partners with Renaissance to Boost SME Cybersecurity</news:title>
      <news:keywords>CyberSmart, Renaissance, SMEs, cybersecurity, compliance</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/microsoft-universal-print-issues-graph-api-code-change-mo9w</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T10:31:01.623Z</news:publication_date>
      <news:title>Microsoft Cloud Print Issues - Traced to Graph API Code Change</news:title>
      <news:keywords>Microsoft, Universal Print, Graph API, Entra ID, printer shares</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/anthropic-bets-on-epss-for-bug-surge-mo9u</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T09:31:15.587Z</news:publication_date>
      <news:title>Anthropic Bets on EPSS to Manage Vulnerability Surge</news:title>
      <news:keywords>EPSS, Mythos, vulnerability management, AI, CVE</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cohere-ai-terrarium-sandbox-flaw-root-code-execution-mo9s</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T08:31:38.043Z</news:publication_date>
      <news:title>Cohere AI Terrarium Sandbox Flaw Enables Root Code Execution</news:title>
      <news:keywords>CVE-2026-5752, Cohere AI, Terrarium, Python, WebAssembly</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/crowdstrike-logscale-vulnerability-path-traversal-mo9r</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T08:01:38.276Z</news:publication_date>
      <news:title>CrowdStrike LogScale - Critical Path Traversal Vulnerability</news:title>
      <news:keywords>CVE-2026-40050, CrowdStrike, LogScale, path-traversal, unauthenticated access</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/reddit-community-moderation-section-230-mo9q</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T07:31:19.177Z</news:publication_date>
      <news:title>Reddit Empowers Community Moderation - Understanding Section 230</news:title>
      <news:keywords>Section 230, Reddit, content moderation, user speech, EFF</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/microsoft-signed-binary-lotuslite-espionage-india-mo9p</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T07:01:27.387Z</news:publication_date>
      <news:title>LOTUSLITE - Microsoft-Signed Binary Used in Espionage Campaign</news:title>
      <news:keywords>LOTUSLITE, DLL sideloading, Mustang Panda, espionage, Microsoft</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/fraud-operation-mule-account-creation-fintech-france-mo9p</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T07:01:17.789Z</news:publication_date>
      <news:title>Fraud Operation - Mule Account Creation on Fintech Platforms</news:title>
      <news:keywords>B2B Fintech, Fraud Operations, Mule Accounts, Device Fingerprinting, Financial Fraud</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/oracle-april-2026-critical-patch-update-mo9o</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T06:31:21.309Z</news:publication_date>
      <news:title>Oracle April 2026 Critical Patch Update Addresses 241 CVEs, Highlights Critical Vulnerabilities</news:title>
      <news:keywords>CVE-2026-XXXX, Oracle, Critical Patch Update, Security Patches, Oracle Communications, Patch Update, Cybersecurity, CVEs, Vulnerabilities, April 2026, CVE, Critical Vulnerabilities</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/systembc-c2-server-gentlemen-ransomware-victims-mo9j</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T04:01:39.632Z</news:publication_date>
      <news:title>SystemBC Malware - 1,570+ Victims Discovered in Ransomware Attack</news:title>
      <news:keywords>SystemBC, The Gentlemen, ransomware, botnet, C2 server</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/software-bill-of-materials-explained-mo9i</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T04:01:32.311Z</news:publication_date>
      <news:title>Software Bill of Materials - Explained for Developers</news:title>
      <news:keywords>Software Bill of Materials, SBOM, Open Source, Cybersecurity, Supply Chain Security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/copyright-dmca-best-practices-fediverse-operators-mo9a</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T00:01:26.524Z</news:publication_date>
      <news:title>Copyright Best Practices - DMCA Guidance for Fediverse Operators</news:title>
      <news:keywords>DMCA, copyright, Mastodon, ActivityPub, Bluesky</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/bol-data-breach-400k-records-leaked-mo98</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T23:01:41.435Z</news:publication_date>
      <news:title>Bol Data Breach - Over 400K Records Allegedly Stolen</news:title>
      <news:keywords>Bol, data breach, personal information, hacker, data leak</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/nation-states-cyber-harm-not-just-steal-cash-mo97</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T22:31:05.743Z</news:publication_date>
      <news:title>Nation-States Want to Cause Harm, Not Just Steal Cash</news:title>
      <news:keywords>China, UK National Cyber Security Centre, cybersecurity, nation-state attacks, Richard Horne</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/suda-customizable-agentic-soc-mo96</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T22:01:04.392Z</news:publication_date>
      <news:title>SUDA - Customizable Framework for Agentic SOCs Explained</news:title>
      <news:keywords>AI SOC, SUDA, security operations, decision-making, automation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/crowdstrike-falcon-platform-achieves-441-roi-mo96</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T22:01:00.836Z</news:publication_date>
      <news:title>CrowdStrike Falcon Platform Achieves 441% ROI in Three Years</news:title>
      <news:keywords>CrowdStrike, Falcon Platform, ROI, IDC Study, Security Operations</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/windows-defender-exploits-active-attacks-mo93</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T21:01:23.404Z</news:publication_date>
      <news:title>Windows Defender - Unpatched Exploits Under Active Attack</news:title>
      <news:keywords>Windows Defender, exploit, proof-of-concept</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cloudflare-agent-lee-ai-assistant-mo90</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T19:31:28.017Z</news:publication_date>
      <news:title>Cloudflare&apos;s Agent Lee - New AI Assistant Simplifies Management</news:title>
      <news:keywords>Cloudflare, Agent Lee, AI assistant, TypeScript, Cloud security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/fortra-goanywhere-mft-vulnerabilities-april-2026-mo90</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T19:31:11.178Z</news:publication_date>
      <news:title>Fortra Addresses Vulnerabilities in GoAnywhere MFT Software</news:title>
      <news:keywords>Fortra, GoAnywhere MFT, SFTP Service, Brute Force Attack, FI-2026-002</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/thunderbird-150-encrypted-message-search-improvements-mo90</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T19:30:59.667Z</news:publication_date>
      <news:title>Thunderbird 150 - New Features Enhance Email Security</news:title>
      <news:keywords>Thunderbird, OpenPGP, S/MIME, Mozilla, PDF Viewer</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/lawmakers-terrorism-designations-hospital-ransomware-mo8z</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T19:02:17.699Z</news:publication_date>
      <news:title>Lawmakers Consider Terrorism Designations for Ransomware</news:title>
      <news:keywords>ransomware, hospital attacks, Congress, Cynthia Kaiser, FBI</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/lotus-data-wiper-targets-venezuelan-utilities-mo8z</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T19:01:22.201Z</news:publication_date>
      <news:title>Lotus Wiper - Targeting Venezuelan Energy Firms with Destructive Malware</news:title>
      <news:keywords>Lotus Wiper, Venezuela, Kaspersky, data wiper, PDVSA, malware, cybersecurity, Data Wiper, Wiper, Malware, Critical Infrastructure</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/zero-motorcycles-firmware-bluetooth-vulnerability-mo8x</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T18:02:58.752Z</news:publication_date>
      <news:title>Zero Motorcycles Firmware - Bluetooth Vulnerability Exposed</news:title>
      <news:keywords>CVE-2026-1354, Zero Motorcycles, Bluetooth vulnerability, firmware update, key exchange</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/siemens-sinec-nms-authorization-bypass-vulnerability-mo8x</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T18:02:03.611Z</news:publication_date>
      <news:title>Siemens SINEC NMS - Critical Authorization Bypass Vulnerability</news:title>
      <news:keywords>Siemens, SINEC NMS, Authorization Bypass, CVE-2026-25654</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/hardy-barth-salia-ev-charge-controller-vulnerabilities-mo8x</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T18:01:55.191Z</news:publication_date>
      <news:title>Hardy Barth Salia EV Charge Controller - Critical Vulnerabilities Found</news:title>
      <news:keywords>CVE-2025-5873, CVE-2025-10371, Hardy Barth, Salia EV Charge Controller, buffer overflow</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/fortinet-architect-warns-ot-cloud-convergence-risk-mo8x</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T18:01:45.456Z</news:publication_date>
      <news:title>Fortinet Architect Warns of OT Cloud Convergence Risk</news:title>
      <news:keywords>Fortinet, cloud security, operational technology, cybersecurity, misconfiguration</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/senselive-x3050-vulnerabilities-explained-mo8x</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T18:01:39.524Z</news:publication_date>
      <news:title>SenseLive X3050 - Critical Vulnerabilities Exposed</news:title>
      <news:keywords>CVE-2026-40630, CVE-2026-25720, CVE-2026-35503, CVE-2026-39462, CVE-2026-27843</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/silex-technology-sd-330ac-amc-manager-vulnerabilities-mo8x</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T18:01:29.166Z</news:publication_date>
      <news:title>Silex Technology - Multiple Vulnerabilities Discovered, Exposing Thousands of Devices</news:title>
      <news:keywords>CVE-2026-32955, CVE-2026-32956, CVE-2026-32957, CVE-2026-32958, Silex Technology, vulnerabilities, cybersecurity, critical infrastructure, remote code execution</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/sysdig-report-end-human-led-cloud-defense-mo8x</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T18:01:25.486Z</news:publication_date>
      <news:title>Sysdig Report - End of Human-Led Cloud Defense Signals Shift</news:title>
      <news:keywords>Sysdig, cloud security, AI, automation, runtime detection</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cloud-detection-strategies-against-infiltrating-it-workers-mo8w</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T17:31:22.982Z</news:publication_date>
      <news:title>Cloud Detection Strategies - Protecting Against IT Worker Infiltration</news:title>
      <news:keywords>Microsoft Defender, Jasper Sleet, Workday, remote work, identity verification</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/breachlock-gartner-adversarial-exposure-validation-mo8v</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T17:01:16.307Z</news:publication_date>
      <news:title>BreachLock Recognized in 2026 Gartner Market Guide</news:title>
      <news:keywords>BreachLock, Gartner, Adversarial Exposure Validation, PTaaS, AI-powered security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/void-dokkaebi-malware-job-interview-lure-mo8u</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T16:31:12.855Z</news:publication_date>
      <news:title>Void Dokkaebi - Malware Spread via Fake Job Interviews</news:title>
      <news:keywords>Void Dokkaebi, malware, supply chain attack, VS Code, obfuscated JavaScript</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/tarjeteros-cybercrime-credit-card-fraud-mo8t</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T16:01:21.185Z</news:publication_date>
      <news:title>Tarjeteros - New Wave of Credit Card Fraud in NYC</news:title>
      <news:keywords>credit card fraud, cybercrime, tarjeteros, Dominican Republic, New York</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/bridewell-achieves-level-2-defence-cyber-certification-mo8t</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T16:01:19.105Z</news:publication_date>
      <news:title>Bridewell Achieves Level 2 Defence Cyber Certification</news:title>
      <news:keywords>Defence Cyber Certification, Bridewell, cybersecurity, UK Ministry of Defence, IASME</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ai-in-dfir-importance-of-investigator-judgement-mo8r</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T15:01:31.678Z</news:publication_date>
      <news:title>AI in DFIR - Importance of Investigator Judgement</news:title>
      <news:keywords>AI, DFIR, investigative judgement, cybersecurity, forensics</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/mexican-surveillance-company-expands-us-mo8r</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T15:01:17.093Z</news:publication_date>
      <news:title>Mexican Surveillance Company Expands into the US Market</news:title>
      <news:keywords>Grupo Seguritech, surveillance, privacy, Mexico, US expansion</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/stopping-fraud-customer-journey-mo8q</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T14:31:32.830Z</news:publication_date>
      <news:title>Fraud Prevention - Stopping Fraud Without Adding Friction</news:title>
      <news:keywords>IPQS, fraud prevention, account takeover, payment fraud, synthetic identities</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/kyber-ransomware-windows-esxi-attacks-explained-mo8q</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T14:31:32.330Z</news:publication_date>
      <news:title>Kyber Ransomware - Dual Attacks on Windows and ESXi Explained</news:title>
      <news:keywords>Kyber Ransomware, VMware ESXi, Windows, Ransomware, Cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/stellantis-microsoft-partnership-ai-cybersecurity-mo8q</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T14:31:20.037Z</news:publication_date>
      <news:title>Stellantis Partners with Microsoft to Boost Cybersecurity</news:title>
      <news:keywords>Stellantis, Microsoft, AI, cybersecurity, cloud</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/malicious-crypto-apps-apple-app-store-mo8q</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T14:31:09.085Z</news:publication_date>
      <news:title>Malicious Crypto Apps - Over Two Dozen Found in App Store</news:title>
      <news:keywords>FakeWallet, Kaspersky, cryptocurrency, Apple App Store, malicious apps, malware, phishing</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/fake-google-antigravity-trojan-stealing-accounts-mo8q</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T14:31:04.086Z</news:publication_date>
      <news:title>Fake Google Antigravity Trojan Stealing Accounts Quickly</news:title>
      <news:keywords>Google Antigravity, Trojan, PowerShell, Data Theft, Malware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/eu-targets-russian-propaganda-networks-sanctions-mo8q</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T14:30:56.697Z</news:publication_date>
      <news:title>EU Targets Russian Propaganda Networks with New Sanctions</news:title>
      <news:keywords>Euromore, Pravfond, Russian propaganda, EU sanctions, disinformation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/top-cyber-hygiene-tips-for-better-security-mo8p</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T14:03:49.121Z</news:publication_date>
      <news:title>Cyber Hygiene - Essential Tips for Better Digital Security</news:title>
      <news:keywords>MFA, cyber hygiene, password management, RDP security, Huntress</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/linux-incident-openai-codex-mo8p</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T14:02:19.926Z</news:publication_date>
      <news:title>AI Security - Linux Incident Investigated with OpenAI Codex</news:title>
      <news:keywords>OpenAI Codex, Huntress, Linux, cryptominer, DFIR</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/vpn-misconfiguration-leads-to-intrusions-mo8p</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T14:02:01.516Z</news:publication_date>
      <news:title>VPN Misconfiguration - Major Cause of Cyber Intrusions</news:title>
      <news:keywords>VPN, MFA, Huntress, ransomware, cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/uptick-bomgar-rmm-exploitation-mo8p</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T14:01:55.705Z</news:publication_date>
      <news:title>Bomgar RMM Exploitation - Surge in Ransomware Attacks</news:title>
      <news:keywords>Bomgar, CVE-2026-1731, LockBit, ransomware, Huntress SOC</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/disrupting-endpoint-attacks-huntress-managed-edr-mo8o</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T14:01:38.519Z</news:publication_date>
      <news:title>Huntress Managed EDR - Disrupting Endpoint Attacks Effectively</news:title>
      <news:keywords>Huntress, EDR, ransomware, Attack Disruption Engine, endpoint security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/uk-probes-telegram-csam-sharing-mo8o</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T14:01:32.801Z</news:publication_date>
      <news:title>UK Probes Telegram Over Child Sexual Abuse Material Sharing</news:title>
      <news:keywords>Ofcom, Telegram, CSAM, Online Safety Act, UK, Child Protection</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ukraine-busts-bot-farm-fake-telegram-accounts-mo8n</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T13:31:50.802Z</news:publication_date>
      <news:title>Ukraine Dismantles Bot Farm Supplying Fake Telegram Accounts</news:title>
      <news:keywords>Russian intelligence, disinformation campaigns, bot farm, Telegram accounts, Ukraine</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/moving-past-bots-vs-humans-mo8n</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T13:31:07.222Z</news:publication_date>
      <news:title>Privacy - AI Challenges Traditional Bot Detection Models</news:title>
      <news:keywords>AI assistants, privacy proxies, user privacy, data protection</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/silobreaker-mimir-agentic-ai-intelligence-workflows-mo8m</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T13:01:41.610Z</news:publication_date>
      <news:title>Silobreaker Mimir - New Agentic AI Enhances Intelligence Workflows</news:title>
      <news:keywords>Silobreaker, Mimir, agentic AI</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/aes-128-quantum-security-myths-mo8m</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T13:01:32.075Z</news:publication_date>
      <news:title>AES 128 - Debunking Myths in Quantum Security Readiness</news:title>
      <news:keywords>AES 128, quantum computing, Grover&apos;s algorithm, encryption, NIST</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/unsecured-perforce-servers-expose-sensitive-data-mo8m</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T13:01:23.798Z</news:publication_date>
      <news:title>Unsecured Perforce Servers Expose Sensitive Data Risk</news:title>
      <news:keywords>Perforce, data exposure, sensitive information, security misconfiguration, Morgan Robertson</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ivanti-neurons-ai-automates-it-operations-mo8m</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T13:01:21.274Z</news:publication_date>
      <news:title>Ivanti Neurons AI - Automating IT Operations and Security</news:title>
      <news:keywords>Ivanti Neurons, AI automation, IT operations, security risk, patch management</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/azure-sre-agent-authentication-flaw-eavesdropping-mo8m</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T13:01:19.089Z</news:publication_date>
      <news:title>Azure SRE Agent - Critical Flaw Allows Unauthorized Eavesdropping</news:title>
      <news:keywords>CVE-2026-32173, Azure SRE Agent, Microsoft, authentication flaw, Yanir Tsarimi</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/openai-chronicle-privacy-concerns-mo8l</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T12:31:16.775Z</news:publication_date>
      <news:title>OpenAI Chronicle - New Feature Raises Privacy Concerns</news:title>
      <news:keywords>OpenAI, Codex, Chronicle, privacy concerns, screen recording</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/wiz-expands-api-discovery-with-apigee-mo8l</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T12:31:06.904Z</news:publication_date>
      <news:title>Wiz Expands API Discovery with Apigee Integration</news:title>
      <news:keywords>Wiz, Apigee, API Security, Cloud Security, GCP</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/hackers-use-nightmare-eclipse-tools-fortigate-vpn-mo8l</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T12:31:06.349Z</news:publication_date>
      <news:title>Hackers Use Nightmare-Eclipse Tools After FortiGate VPN Breach</news:title>
      <news:keywords>FortiGate, Nightmare-Eclipse, BlueHammer, RedSun, UnDefend, VPN, cybersecurity, malware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/attackers-surge-before-vulnerability-disclosures-mo8l</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T12:30:53.151Z</news:publication_date>
      <news:title>Attackers Surge Before Vulnerability Disclosures - GreyNoise Report</news:title>
      <news:keywords>CVE-2026-20127, Cisco, SonicWall, GreyNoise, network vulnerabilities</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/google-antigravity-ide-patch-prompt-injection-mo8k</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T12:02:43.268Z</news:publication_date>
      <news:title>Google Patches Antigravity IDE Flaw Enabling Code Execution</news:title>
      <news:keywords>Antigravity, Google, prompt injection, code execution, find_by_name</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/be-prime-video-surveillance-data-leak-mo8k</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T12:01:28.196Z</news:publication_date>
      <news:title>Be Prime Faces Data Breach - Claims of Surveillance Footage Leak</news:title>
      <news:keywords>Be Prime, dylanmarly, video surveillance, Cisco Meraki, data leak</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/chinese-apt-targets-indian-banks-korean-policy-mo8k</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T12:01:14.880Z</news:publication_date>
      <news:title>Chinese APT Targets Indian Banks and Korean Policy Circles</news:title>
      <news:keywords>APT, China, India, cyber espionage, banking sector</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/data-breaches-healthcare-organizations-illinois-texas-mo8j</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T11:31:51.276Z</news:publication_date>
      <news:title>Data Breaches - Healthcare Organizations Affect 600,000 Patients</news:title>
      <news:keywords>Southern Illinois Dermatology, North Texas Behavioral Health Authority, Saint Anthony Hospital</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/met-police-snoop-tech-shoplifting-trial-mo8i</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T11:01:35.356Z</news:publication_date>
      <news:title>Met Police Trials Snoop Tech to Combat London Shoplifting</news:title>
      <news:keywords>Metropolitan Police, shoplifting, facial recognition, CCTV, privacy concerns</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/grapheneos-privacy-tool-legacy-conflict-mo8h</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T10:31:27.006Z</news:publication_date>
      <news:title>GrapheneOS - The Legacy and Conflict of a Privacy Tool</news:title>
      <news:keywords>GrapheneOS, CopperheadOS, Daniel Micay</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/stealtok-browser-extensions-tiktok-downloaders-compromised-mo8h</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T10:31:09.793Z</news:publication_date>
      <news:title>StealTok Malware - TikTok Downloader Extensions Compromised</news:title>
      <news:keywords>StealTok, TikTok Downloader, browser extensions, malware campaign, LayerX, malware, TikTok, data theft</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/proxy-smart-sim-farm-fraud-mo8f</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T09:31:14.469Z</news:publication_date>
      <news:title>ProxySmart - Powers Global SIM Farm Proxy Networks, Enabling Cybercrime on an Industrial Scale</news:title>
      <news:keywords>ProxySmart, SIM farm, mobile proxy, Infrawatch, cybercrime, SIM farms, fraud, Belarus</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/human-aspect-of-red-teams-brian-fox-tom-tovar-mo8f</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T09:31:08.617Z</news:publication_date>
      <news:title>Human Aspect of Red Teams - Insights from Experts</news:title>
      <news:keywords>Red Teams, Cybersecurity, AI, Application Security, Threat Hunting</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/adaptavist-group-breach-ransomware-imposter-emails-mo8e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T09:01:35.606Z</news:publication_date>
      <news:title>Adaptavist Group Breach - Ransomware Crew Claims Mega-Haul</news:title>
      <news:keywords>Adaptavist Group, The Gentlemen, ransomware, data breach, phishing, Adaptavist, Ransomware, Data Breach, Cybersecurity, Phishing</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ngate-nfc-malware-targets-android-users-mo8e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T09:01:27.694Z</news:publication_date>
      <news:title>NGate NFC Malware - Targets Android Users via Trojanized HandyPay App</news:title>
      <news:keywords>NGate, HandyPay, Android, ESET, NFC malware, malware, cybercrime, NFC, payment fraud</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/panasonic-device-locked-qr-codes-facial-biometric-capture-mo8c</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T08:01:12.561Z</news:publication_date>
      <news:title>Panasonic - Device-Locked QR Codes Enhance Biometric Capture</news:title>
      <news:keywords>Panasonic, QR codes, facial recognition, biometrics, access control</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/wav-file-malware-payload-mo8b</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T07:31:16.391Z</news:publication_date>
      <news:title>.WAV File - New Malware Delivery Method Discovered</news:title>
      <news:keywords>malware, wav file, payload</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/iran-claims-us-backdoors-networking-equipment-mo88</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T06:31:26.769Z</news:publication_date>
      <news:title>Iran Claims US Used Backdoors to Disable Networking Gear</news:title>
      <news:keywords>Iran, US Cyber Command, backdoors, networking equipment, China</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/browser-run-ai-agents-browser-mo84</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T04:31:52.450Z</news:publication_date>
      <news:title>Browser Run - Empower Your AI Agents with a Browser</news:title>
      <news:keywords>Browser Run, Cloudflare, AI agents, Chrome DevTools, WebMCP</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/encrypted-routing-layer-private-ai-inference-mo84</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T04:31:15.759Z</news:publication_date>
      <news:title>Encrypted Routing Layer - Enhancing Private AI Inference</news:title>
      <news:keywords>Secure Multi-Party Computation, AI inference, SecureRouter, encryption, University of Central Florida</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/iterm2-flaw-ssh-integration-code-execution-mo82</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T03:31:08.341Z</news:publication_date>
      <news:title>iTerm2 Vulnerability - SSH Integration Allows Code Execution</news:title>
      <news:keywords>iTerm2, RCE, SSH, Califio, macOS</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/trojanized-testdisk-installer-screenconnect-deployment-mo7y</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T01:31:42.904Z</news:publication_date>
      <news:title>Trojanized TestDisk Installer - Illicit ScreenConnect Deployment</news:title>
      <news:keywords>TestDisk, ScreenConnect, Microsoft, malware, DLL side-loading</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ponemon-survey-identity-overconfidence-mo7x</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T01:02:36.042Z</news:publication_date>
      <news:title>Ponemon Survey Exposes Identity Overconfidence in Enterprises</news:title>
      <news:keywords>Ponemon Institute, identity security, multifactor authentication, AI identities, Cerby</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/executive-order-stronger-identity-proofing-mo7x</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T01:01:59.851Z</news:publication_date>
      <news:title>Executive Order - Push for Stronger Identity Proofing</news:title>
      <news:keywords>Executive Order 14390, identity verification, cyber fraud, digital identity, Jordan Burris</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/palantir-ice-human-rights-policy-issues-mo7x</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T01:01:08.464Z</news:publication_date>
      <news:title>Palantir&apos;s Human Rights Policy - Questions Arise Over ICE Work</news:title>
      <news:keywords>Palantir, ICE, EFF, human rights, data privacy</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ai-model-claude-opus-exploits-bugs-mo7u</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T00:01:46.824Z</news:publication_date>
      <news:title>AI Model Claude Opus Turns Bugs into Exploits for $2,283</news:title>
      <news:keywords>Claude Opus, Chrome exploit, AI vulnerabilities, Mohan Pedhapati, bug bounty</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cibercrime-america-latina-caribe-2025-mo7u</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T00:01:40.618Z</news:publication_date>
      <news:title>Cibercrime na América Latina e Caribe - Tendências em 2025</news:title>
      <news:keywords>Insikt Group, LAC, ransomware, malware, phishing</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/kelpdao-290-million-heist-lazarus-hackers-mo7r</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T22:31:13.103Z</news:publication_date>
      <news:title>KelpDAO Suffers $290 Million Heist Linked to Lazarus Hackers</news:title>
      <news:keywords>KelpDAO, Lazarus Group, crypto theft, DeFi, rsETH, North Korea, LayerZero</news:keywords>
    </news:news>
  </url>
</urlset>