<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
  <url>
    <loc>https://cyberpings.com/article/court-rules-copyright-cant-stop-access-to-law-mnqg</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T19:31:30.707Z</news:publication_date>
      <news:title>Court Rules Copyright Can’t Stop Access to Public Laws</news:title>
      <news:keywords>Copyright, Fair Use, Building Codes, Third Circuit, UpCodes</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/arelion-netscout-ddos-protection-mnqg</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T19:31:04.473Z</news:publication_date>
      <news:title>Arelion Enhances DDoS Protection with NETSCOUT Solutions</news:title>
      <news:keywords>Arelion, NETSCOUT, DDoS Protection, Cloud Connect, Threat Intelligence</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/lebanon-emergency-system-digital-infrastructure-crisis-mnqe</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T19:01:14.423Z</news:publication_date>
      <news:title>Lebanon&apos;s Emergency System - Digital Infrastructure Crisis</news:title>
      <news:keywords>Lebanon, digital infrastructure, emergency system, humanitarian crisis, Kamal Shehadi</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/trellix-enhances-data-security-for-generative-ai-mnqd</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T18:31:24.168Z</news:publication_date>
      <news:title>Trellix Enhances Data Security for Generative AI Era</news:title>
      <news:keywords>Trellix, Data Loss Prevention, Data Encryption, Generative AI, Database Security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/mitel-security-advisory-vulnerabilities-micollab-mnqc</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T18:02:48.541Z</news:publication_date>
      <news:title>Mitel Security Advisory - Vulnerabilities in MiCollab Exposed</news:title>
      <news:keywords>Mitel, MiCollab, security advisory</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/netscout-arbor-ddos-protection-g2-leader-badges-mnqc</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T18:01:29.776Z</news:publication_date>
      <news:title>NETSCOUT Arbor DDoS Protection Earns G2 Leader Badges</news:title>
      <news:keywords>NETSCOUT, Arbor Threat Mitigation System, DDoS Protection, G2 Leader Badges, Arbor Sightline</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/eurail-data-breach-passport-numbers-leaked-mnqc</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T18:01:17.470Z</news:publication_date>
      <news:title>Eurail Data Breach - Over 300,000 Passport Numbers Exposed</news:title>
      <news:keywords>Eurail, data breach, passport numbers</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/anthropic-claude-mythos-zero-day-detection-mnqc</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T18:01:10.888Z</news:publication_date>
      <news:title>Claude Mythos - Unveils Zero-Day Detection Capabilities</news:title>
      <news:keywords>Claude Mythos, zero-day vulnerabilities, Project Glasswing, OpenBSD, FFmpeg</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/minnesota-national-guard-cyberattack-response-mnqb</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T17:31:13.332Z</news:publication_date>
      <news:title>Minnesota National Guard Deployed After Cyberattack Disrupts Services</news:title>
      <news:keywords>Minnesota National Guard, Winona County, cyberattack, FBI, ransomware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/teampcp-supply-chain-campaign-update-007-mnqb</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T17:31:05.105Z</news:publication_date>
      <news:title>TeamPCP Supply Chain Campaign - Cisco Source Code Stolen</news:title>
      <news:keywords>Cisco, TeamPCP, UNC6780, CISA, Trivy</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/hack-for-hire-spyware-campaign-targets-journalists-mnqa</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T17:01:17.591Z</news:publication_date>
      <news:title>Hack-for-Hire Spyware Campaign Targets Journalists in MENA</news:title>
      <news:keywords>Bitter, ProSpy, Access Now, Lookout, SMEX</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/selling-mass-surveillance-effector-38-7-mnq9</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T16:31:14.229Z</news:publication_date>
      <news:title>Mass Surveillance - EFFector Explores Troubling Trends</news:title>
      <news:keywords>mass surveillance, EFF, civil liberties, NSA spying, license plate readers</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/fraud-rockets-higher-mobile-first-latin-america-mnq9</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T16:31:11.832Z</news:publication_date>
      <news:title>Fraud Rockets Higher in Mobile-First Latin America</news:title>
      <news:keywords>mobile fraud, account takeover, financial institutions</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/outdated-software-macs-mobile-devices-security-risk-mnq8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T16:02:14.208Z</news:publication_date>
      <news:title>Outdated Software - Major Security Risks for Macs &amp; Mobile</news:title>
      <news:keywords>macOS, mobile devices, Jamf, vulnerabilities, security risks</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/lapd-hackers-steal-leak-sensitive-documents-mnq8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T16:01:27.326Z</news:publication_date>
      <news:title>LAPD Breach - Hackers Steal and Leak Sensitive Documents</news:title>
      <news:keywords>LAPD, World Leaks, data breach, sensitive documents, cybercrime, sensitive information</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/xibocms-3-3-4-remote-code-execution-mnq7</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T15:32:38.291Z</news:publication_date>
      <news:title>XiboCMS 3.3.4 - Critical Remote Code Execution Flaw</news:title>
      <news:keywords>CVE-2023-33177, XiboCMS, Remote Code Execution, path traversal, webshell</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/7-zip-24-00-directory-traversal-vulnerability-mnq7</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T15:32:07.376Z</news:publication_date>
      <news:title>7-Zip 24.00 - Critical Directory Traversal Vulnerability</news:title>
      <news:keywords>CVE-2025-11001, 7-Zip, Directory Traversal, Remote Code Execution, Mohammed Idrees Banyamer</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/nicole-bucala-databee-comcast-inspiring-women-cyber-mnq7</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T15:31:35.864Z</news:publication_date>
      <news:title>Nicole Bucala - Spotlighting a Leader in Cybersecurity</news:title>
      <news:keywords>Nicole Bucala, DataBee, Comcast, Most Inspiring Women in Cyber</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/veracrypt-issues-windows-boot-problems-mnq7</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T15:31:09.643Z</news:publication_date>
      <news:title>VeraCrypt - Windows Users May Face Boot Issues Soon</news:title>
      <news:keywords>VeraCrypt, Microsoft, encryption, boot issues, Mounir Idrassi</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ibm-identity-verify-access-vulnerabilities-mnq6</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T15:03:59.110Z</news:publication_date>
      <news:title>IBM Identity and Verify Access Vulnerabilities Exposed</news:title>
      <news:keywords>CVE-2026-2862, CVE-2026-1491, CVE-2026-1188, CVE-2026-1346, IBM</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/adobe-reader-0-day-exploit-attack-mnq6</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T15:02:51.315Z</news:publication_date>
      <news:title>Adobe Reader - Hackers Target Users with 0-Day Exploit</news:title>
      <news:keywords>Adobe Reader, 0-Day Exploit, EXPMON, Malicious PDF, Advanced Fingerprinting</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cia-elevates-cyber-espionage-division-mnq6</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T15:01:53.739Z</news:publication_date>
      <news:title>CIA Elevates Cyber Espionage Division for Enhanced Operations</news:title>
      <news:keywords>CIA, cyber espionage, John Ratcliffe, cyber threats, national security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/browser-guard-privacy-protection-mnq6</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T15:01:34.927Z</news:publication_date>
      <news:title>Browser Guard - Protecting Your Privacy from Extensions</news:title>
      <news:keywords>Browser Guard, Malwarebytes, privacy, browser extensions, data profiling</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/emotion-concepts-function-large-language-model-mnq6</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T15:01:29.890Z</news:publication_date>
      <news:title>Emotion Concepts - Exploring Their Role in AI Behavior</news:title>
      <news:keywords>Claude Sonnet 4.5, emotion concepts, AI behavior, neural representations</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/horilla-v1-3-rce-exploit-mnq5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T14:32:15.723Z</news:publication_date>
      <news:title>Horilla v1.3 - Critical RCE Vulnerability Exploited</news:title>
      <news:keywords>CVE-2025-48868, Horilla, RCE, web application, authenticated access</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/microsoft-mmc-msc-eviltwin-local-admin-creation-mnq5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T14:31:48.741Z</news:publication_date>
      <news:title>Microsoft MMC MSC EvilTwin - Local Admin Creation Exploit</news:title>
      <news:keywords>CVE-2025-26633, Windows, Microsoft MMC, Local Admin, Water Gamayun APT</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/gpu-password-cracking-specops-analysis-mnq5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T14:31:32.354Z</news:publication_date>
      <news:title>GPU Password Cracking - Specops Analyzes Performance Limits</news:title>
      <news:keywords>NVIDIA, Hashcat, Specops, password cracking, AI GPU</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/sqlite-3-50-1-heap-overflow-cve-2025-6965-mnq5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T14:31:21.313Z</news:publication_date>
      <news:title>SQLite 3.50.1 - Critical Heap Overflow Vulnerability Found</news:title>
      <news:keywords>CVE-2025-6965, SQLite, Windows Server, heap overflow, memory corruption</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/compliance-complexity-it-capacity-mnq5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T14:31:15.071Z</news:publication_date>
      <news:title>Compliance Complexity - Is IT Capacity Keeping Up?</news:title>
      <news:keywords>GDPR, ISO 27001, NIST CSF, PCI DSS, HIPAA</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/automated-magic-packet-generation-bpf-malware-mnq4</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T14:01:23.722Z</news:publication_date>
      <news:title>Automated Magic Packet Generation - Enhancing Malware Analysis</news:title>
      <news:keywords>BPF, Z3, BPFDoor, malware, packet generation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/secrets-detection-security-workflow-mnq1</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T12:31:43.682Z</news:publication_date>
      <news:title>Secrets Detection - Integrating It into Your Security Workflow</news:title>
      <news:keywords>secrets detection, credential exposure, DevSecOps, security workflow, automated validation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/fortinet-emergency-patch-critical-vulnerability-mnpz</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T12:01:51.666Z</news:publication_date>
      <news:title>Fortinet Releases Emergency Patch for Critical Vulnerability</news:title>
      <news:keywords>Fortinet, vulnerability, emergency patch, banking apps, scammers</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/dutch-healthcare-software-vendor-ransomware-attack-mnpz</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T12:01:41.375Z</news:publication_date>
      <news:title>Dutch Healthcare Software Vendor - Ransomware Attack Disrupts Services</news:title>
      <news:keywords>ChipSoft, ransomware, Z-CERT, Dutch healthcare, cyberattack</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/masjesu-ddos-botnet-targets-iot-devices-mnpz</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T12:01:38.076Z</news:publication_date>
      <news:title>Masjesu DDoS Botnet Targets IoT Devices with Evasive Tactics</news:title>
      <news:keywords>Masjesu, DDoS, IoT, botnet, Trellix</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/identity-visibility-intelligence-platforms-ivip-mnpz</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T12:01:25.895Z</news:publication_date>
      <news:title>Identity Visibility - Shrinking the IAM Attack Surface</news:title>
      <news:keywords>Identity Management, Zero Trust, AI, Orchid Security, IVIP</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/windows-11-update-start-menu-issue-mnpz</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T12:01:25.712Z</news:publication_date>
      <news:title>Windows 11 Update - Start Menu Functionality Disrupted</news:title>
      <news:keywords>Windows 11, Start Menu, Microsoft, WI1273488</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/forest-blizzard-aitm-attacks-outlook-sessions-mnpx</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T11:01:45.541Z</news:publication_date>
      <news:title>Forest Blizzard - Launches AiTM Attacks Targeting Outlook</news:title>
      <news:keywords>Forest Blizzard, AiTM attacks, Microsoft Outlook, DNS hijacking, APT28</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/timeshare-owners-warned-cartel-linked-scams-mnpx</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T11:01:38.857Z</news:publication_date>
      <news:title>Timeshare Owners - Beware of Cartel-Linked Scams</news:title>
      <news:keywords>timeshare scams, Jalisco New Generation Cartel, advance-fee fraud, FBI, US Treasury</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/amazon-s3-files-cloud-storage-update-mnpx</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T11:01:24.393Z</news:publication_date>
      <news:title>Amazon S3 Files - New Cloud Storage Feature Explained</news:title>
      <news:keywords>Amazon S3, AWS, cloud storage, file system, data security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/nhs-scotland-domains-hijacked-adult-content-mnpw</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T10:31:32.080Z</news:publication_date>
      <news:title>NHS Scotland Domains Hijacked - Adult Content Served</news:title>
      <news:keywords>NHS Scotland, cybersecurity, domain hijacking, The New Surgery, Lerwick GP Practice</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/lua-based-malware-lucidrook-targets-taiwanese-ngos-mnpw</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T10:31:16.478Z</news:publication_date>
      <news:title>Lua-Based Malware LucidRook Targets Taiwanese NGOs</news:title>
      <news:keywords>LucidRook, spear-phishing, Taiwanese NGOs, Cisco Talos, LucidPawn</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/zero-day-timeline-collapsed-security-leaders-next-mnpw</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T10:31:08.361Z</news:publication_date>
      <news:title>Zero-Day Vulnerabilities - Security Leaders Must Act Now</news:title>
      <news:keywords>zero-day, AI, vulnerability discovery, cybersecurity, agentic AI</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/flatpak-1-16-4-fixes-sandbox-escape-security-flaws-mnpt</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T09:01:38.776Z</news:publication_date>
      <news:title>Flatpak 1.16.4 - Critical Sandbox Escape Fixed</news:title>
      <news:keywords>CVE-2026-34078, CVE-2026-34079, GHSA-2fxp-43j9-pwvc, GHSA-89xm-3m96-w3jg, Flatpak</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/secureframe-user-access-reviews-automated-governance-mnps</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T08:31:22.266Z</news:publication_date>
      <news:title>Secureframe - Launches User Access Reviews for Governance</news:title>
      <news:keywords>Secureframe, User Access Reviews, GRC automation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/indian-bank-fake-lpg-payment-kyc-update-scams-mnps</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T08:31:15.838Z</news:publication_date>
      <news:title>Indian Bank Alerts Users About Fake LPG Payment Scams</news:title>
      <news:keywords>Indian Bank, LPG scams, KYC update scams, banking fraud, cybercrime</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/openssl-vulnerabilities-rsa-kem-exposes-sensitive-data-mnpr</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T08:02:06.670Z</news:publication_date>
      <news:title>OpenSSL Vulnerabilities - Sensitive Data Exposed in RSA KEM</news:title>
      <news:keywords>OpenSSL, CVE-2026-31790, RSA KEM, cryptographic libraries, data leakage, vulnerabilities, security update</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/north-korea-insider-threat-ai-strategies-mnpq</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T07:31:28.389Z</news:publication_date>
      <news:title>North Korean Threat Actors - Insider Threat Tactics Revealed</news:title>
      <news:keywords>North Korea, insider threat, AI, synthetic identities, cyber espionage</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/telegram-hacking-tools-abuse-women-mnpq</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T07:31:12.371Z</news:publication_date>
      <news:title>Telegram Hacking Tools - Men Targeting Women Exposed</news:title>
      <news:keywords>Telegram, nonconsensual images, spyware, doxing, AI Forensics</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/microsoft-datacenter-design-war-zones-mnpp</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T07:01:42.043Z</news:publication_date>
      <news:title>Microsoft Considers New Datacenter Designs for War Zones</news:title>
      <news:keywords>Microsoft, datacenters, Iran, cyberattacks, Brad Smith</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ai-agent-compromise-illicit-web-content-mnpo</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T06:31:53.116Z</news:publication_date>
      <news:title>AI Agent Compromise - Illicit Web Content Attacks Detailed</news:title>
      <news:keywords>AI agents, malicious web content, DeepMind, cognitive biases, command injection</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/openssl-3-6-2-cve-fixes-mnpk</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T05:01:52.136Z</news:publication_date>
      <news:title>OpenSSL 3.6.2 - Eight CVEs Fixed in Latest Release</news:title>
      <news:keywords>OpenSSL, CVE-2026-31790, CVE-2026-2673, CVE-2026-28386, CVE-2026-28387, CVE, security update, vulnerabilities, encryption</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/6g-network-ai-security-architecture-mnpk</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T05:01:23.436Z</news:publication_date>
      <news:title>6G Network Design - AI at the Core of Security Challenges</news:title>
      <news:keywords>6G, AI, Harokopio University, network security, data poisoning</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cybercriminals-hiding-in-edge-infrastructure-mnpj</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T04:31:29.161Z</news:publication_date>
      <news:title>Cybercriminals Move Deeper into Networks, Hiding in Edge Infrastructure</news:title>
      <news:keywords>Lumen, Aisuru, DanaBot, Rhadamanthys, Kimwolf</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/fiber-optic-cables-hidden-microphones-eavesdropping-mnpg</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T03:01:43.330Z</news:publication_date>
      <news:title>Fiber Optic Cables - New Threat as Hidden Microphones Exposed</news:title>
      <news:keywords>fiber optic cables, eavesdropping, acoustic attack, NDSS 2026, data privacy</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/russia-backed-espionage-network-takedown-mnpb</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T00:31:14.989Z</news:publication_date>
      <news:title>Russia-Backed Espionage Network - Feds Neutralize Threat</news:title>
      <news:keywords>Forest Blizzard, APT28, GRU, espionage, DNS hijacking</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ninja-forms-wordpress-plugin-critical-vulnerability-mnp7</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T22:31:22.377Z</news:publication_date>
      <news:title>Ninja Forms - Critical Flaw Allows Remote Code Execution</news:title>
      <news:keywords>CVE-2026-0740, Ninja Forms, WordPress, remote code execution, vulnerability, Actively Exploited, File Upload, Plugin, Vulnerability, Website Takeover</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/niobium-encrypted-cloud-platform-private-ai-mnp4</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T21:32:19.080Z</news:publication_date>
      <news:title>Encrypted Cloud Platform - Niobium Launches Private AI Solution</news:title>
      <news:keywords>Niobium, The Fog, homomorphic encryption, AI workloads, cloud security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ai-diff-tool-finds-behavioral-differences-mnp2</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T20:31:11.898Z</news:publication_date>
      <news:title>AI Diff Tool - Uncovering Behavioral Differences in Models</news:title>
      <news:keywords>AI models, model diffing, behavioral differences, Anthropic, GPT-OSS-20B</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/vmware-security-advisory-vulnerabilities-tanzu-products-mnp1</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T20:02:08.594Z</news:publication_date>
      <news:title>VMware Security Advisory - Critical Vulnerabilities Identified</news:title>
      <news:keywords>VMware, Tanzu Data Intelligence, MySQL for Kubernetes, Tanzu Data Services, Tanzu Data Suite</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/snowflake-customers-data-theft-saas-integrator-breach-mnp1</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T20:01:40.823Z</news:publication_date>
      <news:title>Snowflake Customers Targeted in Data Theft After SaaS Integrator Breach</news:title>
      <news:keywords>Snowflake, Anodot, ShinyHunters, data theft, authentication tokens, Authentication Tokens, Cyberattack, Data Theft, Extortion</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/erlang-security-advisory-av26-320-mnp1</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T20:01:40.089Z</news:publication_date>
      <news:title>Erlang Security Advisory - Critical Vulnerabilities Addressed</news:title>
      <news:keywords>Erlang, OTP, Public_key, ssl, inets</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/eu-parliament-blocks-mass-scanning-chats-mnp0</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:31:26.082Z</news:publication_date>
      <news:title>EU Parliament Blocks Mass-Scanning of Chats - Privacy Win</news:title>
      <news:keywords>EU Parliament, Chat Control, e-Privacy, encryption, privacy rights</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/continuous-identity-threat-detection-need-mnoy</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T18:31:25.346Z</news:publication_date>
      <news:title>Continuous Identity Threat Detection - Why It Matters Now</news:title>
      <news:keywords>ID Dataweb, identity verification, AI security, continuous identity detection, social engineering</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ai-powered-project-glasswing-identify-software-vulnerabilities-mnoy</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T18:31:18.773Z</news:publication_date>
      <news:title>AI-Powered Project Glasswing Identifies Software Vulnerabilities</news:title>
      <news:keywords>Project Glasswing, Anthropic, AI vulnerabilities, software security, open source</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/anthropic-mythos-ai-cybersecurity-initiative-mnox</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T18:01:40.560Z</news:publication_date>
      <news:title>Anthropic&apos;s Mythos - New AI Model for Cybersecurity Defense Unveiled with Industry Collaboration</news:title>
      <news:keywords>Mythos, Anthropic, Project Glasswing, AI cybersecurity, zero-day vulnerabilities, AI, Cybersecurity, Vulnerabilities, Collaboration</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/trent-ai-ai-agents-security-funding-mnov</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T17:02:08.145Z</news:publication_date>
      <news:title>Trent AI - Secures AI Agents With $13 Million Funding</news:title>
      <news:keywords>Trent AI, AI agents, security solution, funding, autonomous systems, AI Security, Funding, Cybersecurity, Vulnerabilities</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/charming-kitten-iran-social-engineering-espionage-mnot</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T16:02:47.235Z</news:publication_date>
      <news:title>Charming Kitten - Iran Group Leverages Social Engineering Tactics</news:title>
      <news:keywords>Charming Kitten, Iran, cyber espionage, social engineering, phishing</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/uffizi-galleries-cyberattack-data-stolen-mnot</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T16:02:17.498Z</news:publication_date>
      <news:title>Uffizi Galleries Cyberattack - Data Stolen but Restored</news:title>
      <news:keywords>Uffizi Galleries, cyberattack, data theft, photographic archive, backup restoration</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/apt28-hackers-hijack-routers-credentials-theft-mnot</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T16:02:03.214Z</news:publication_date>
      <news:title>APT28 Hackers Hijack Routers to Steal Credentials, New Insights Revealed</news:title>
      <news:keywords>APT28, DNS Hijacking, TP-Link, CVE-2023-50224, UK NCSC, cybersecurity, DNS hijacking, router vulnerabilities, credential theft, cyber espionage</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/authorities-disrupt-frostarmada-dns-hijacks-mnot</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T16:01:53.635Z</news:publication_date>
      <news:title>Authorities Disrupt FrostArmada DNS Hijacks Targeting Microsoft</news:title>
      <news:keywords>APT28, FrostArmada, Microsoft 365, DNS hijacking, MikroTik</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/microsoft-edge-security-advisory-cve-2026-5281-mnot</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T16:01:25.079Z</news:publication_date>
      <news:title>Microsoft Edge - Critical Security Advisory Released</news:title>
      <news:keywords>CVE-2026-5281, Microsoft Edge, security update</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/threat-cluster-extortion-campaign-social-engineering-mnot</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T16:00:38.203Z</news:publication_date>
      <news:title>Threat Cluster Launches Extortion Campaign Using Social Engineering</news:title>
      <news:keywords></news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/malicious-chrome-extension-amazing-refresh-mnos</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T15:31:29.126Z</news:publication_date>
      <news:title>Malicious Chrome Extension - Injects Malware in Browsers</news:title>
      <news:keywords>Amazing Refresh, malware, JavaScript, browser extension, Report URI</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/soho-router-compromise-dns-hijacking-attacks-mnos</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T15:31:28.568Z</news:publication_date>
      <news:title>SOHO Router Compromise - DNS Hijacking and AiTM Attacks Uncovered</news:title>
      <news:keywords>Forest Blizzard, DNS Hijacking, Adversary-in-the-Middle, Microsoft Outlook, TLS, Adversary-in-the-middle (AiTM), Cyberespionage, Forest Blizzard (STRONTIUM), State-sponsored threat actor</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/three-finger-test-deepfake-security-mnor</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T15:02:33.154Z</news:publication_date>
      <news:title>Three-Finger Test - Outdated in Deepfake Security Measures</news:title>
      <news:keywords>deepfake, identity-based attacks, social engineering, security processes, AI threats</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/grafanaghost-exploit-silent-data-exfiltration-mnoq</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T15:01:40.337Z</news:publication_date>
      <news:title>GrafanaGhost Exploit Bypasses AI Guardrails for Data Theft</news:title>
      <news:keywords>GrafanaGhost, data exfiltration, AI vulnerabilities, Noma Threat Research, indirect prompt injection</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/nightspire-ransomware-iocs-analysis-mnoq</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T15:01:36.743Z</news:publication_date>
      <news:title>NightSpire Ransomware - Analyzing Evolving IOCs and TTPs</news:title>
      <news:keywords>NightSpire, Ransomware, RaaS, Huntress, Cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/severe-strongbox-vulnerability-patched-android-mnoq</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T15:01:33.291Z</news:publication_date>
      <news:title>Severe StrongBox Vulnerability Patched in Android Update</news:title>
      <news:keywords>CVE-2026-0049, CVE-2025-48651, Android, StrongBox, DoS</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cybercrime-industrialization-explained-mnop</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T14:31:24.367Z</news:publication_date>
      <news:title>Cybercrime - Industrialization and Its Implications Explained</news:title>
      <news:keywords>cybercrime, public-private cooperation, cyber hygiene, Jürgen Stock, Fortinet</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/open-source-ai-security-brian-fox-mnop</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T14:31:18.309Z</news:publication_date>
      <news:title>Open Source AI Security - Brian Fox Discusses Future Risks</news:title>
      <news:keywords>OpenSSF, AI, Sonatype, Software Supply Chain, Brian Fox</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/uk-exposes-russian-cyber-unit-hijacking-routers-mnop</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T14:31:15.493Z</news:publication_date>
      <news:title>Russian Cyber Unit Exposed for Hijacking Home Routers</news:title>
      <news:keywords>APT28, Fancy Bear, GRU, router vulnerabilities, cyber espionage</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/webinar-automated-pentesting-not-enough-mnoo</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T14:01:39.298Z</news:publication_date>
      <news:title>Automated Pentesting - Why It&apos;s Not Enough for Security</news:title>
      <news:keywords>Automated Penetration Testing, Validation Framework, Security Tools</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/acronis-mdr-launch-for-msps-mnoo</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T14:01:21.285Z</news:publication_date>
      <news:title>Acronis MDR Launch - 24/7 Managed Detection for MSPs</news:title>
      <news:keywords>Acronis, MDR, MSP, cyber resilience, threat detection, cybersecurity, incident response</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/building-detection-foundation-correlation-practice-mnon</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T13:31:10.308Z</news:publication_date>
      <news:title>Detection Engineering - Correlation Techniques Explained</news:title>
      <news:keywords>Sysmon, PowerShell, SIEM, Windows Security, Detection Engineering</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/snyk-container-security-ai-era-mnom</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T13:01:31.122Z</news:publication_date>
      <news:title>Container Security - Snyk Launches New AI-Driven Features</news:title>
      <news:keywords>Snyk, Container Security, AI, Runtime Intelligence, Container Registry Sync</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cyberattack-rostelecom-ddos-disruption-mnom</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T13:01:27.537Z</news:publication_date>
      <news:title>Cyberattack on Rostelecom - Major DDoS Disruption Reported</news:title>
      <news:keywords>Rostelecom, DDoS attack, Russia, internet disruption, government services</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/supply-chain-integrity-risk-assessments-evaluation-criteria-mnom</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T13:01:16.607Z</news:publication_date>
      <news:title>Supply Chain Integrity Risk Assessments - Evaluation Criteria</news:title>
      <news:keywords>Supply Chain Integrity, Government of Canada, Cybersecurity, Risk Assessment</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/threat-actors-abuse-logmein-resolve-screenconnect-phishing-mnom</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T13:01:14.641Z</news:publication_date>
      <news:title>Phishing Campaign - Threat Actors Exploit LogMeIn Tools</news:title>
      <news:keywords>LogMeIn Resolve, ScreenConnect, phishing, remote monitoring, RMM tools</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/android-zero-interaction-vulnerability-dos-mnom</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T13:00:50.522Z</news:publication_date>
      <news:title>Android Zero-Interaction Vulnerability - Critical DoS Risk</news:title>
      <news:keywords>CVE-2026-0049, Android, DoS, Google, Security Bulletin, Vulnerability, Denial of Service, Security Update</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/threat-intelligence-fast-mttr-solution-mnom</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T13:00:27.474Z</news:publication_date>
      <news:title>Threat Intelligence - Key to Reducing MTTR for SOC Teams</news:title>
      <news:keywords></news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/hidden-cost-recurring-credential-incidents-mnol</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T12:31:45.640Z</news:publication_date>
      <news:title>Credential Security - Understanding Hidden Costs of Incidents</news:title>
      <news:keywords>credential security, password policies, Specops, identity security, helpdesk tickets</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cyberattack-northern-ireland-school-network-mnol</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T12:31:10.895Z</news:publication_date>
      <news:title>Cyberattack Disrupts Northern Ireland’s Centralized School Network</news:title>
      <news:keywords>C2K system, Education Authority, Northern Ireland, Capita, cyberattack</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/portswigger-meta-bug-bounty-partnership-training-mnol</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T12:31:10.888Z</news:publication_date>
      <news:title>PortSwigger - Partners with Meta for Bug Bounty Training</news:title>
      <news:keywords>PortSwigger, Meta, Bug Bounty, Burp Suite, Web Security Academy</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/whatsapp-tee-security-audit-vulnerabilities-mnoj</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T11:31:34.574Z</news:publication_date>
      <news:title>WhatsApp TEE Security Audit Reveals Critical Vulnerabilities</news:title>
      <news:keywords>WhatsApp, Meta, TEE, security audit, encryption</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/top-enterprise-ai-gateways-security-integration-mnoi</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T11:01:46.160Z</news:publication_date>
      <news:title>Top Enterprise AI Gateways Ranked for Security and Integration</news:title>
      <news:keywords>AI Gateways, Security, Integration, Governance, Enterprise AI</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/weaponizing-saas-notification-pipelines-phishing-mnog</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T10:01:40.739Z</news:publication_date>
      <news:title>Weaponizing SaaS Notification Pipelines - New Phishing Tactics</news:title>
      <news:keywords>GitHub, Jira, phishing, credential harvesting, Cisco Talos</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/hong-kong-police-encryption-keys-mnog</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T10:01:28.241Z</news:publication_date>
      <news:title>Hong Kong Police Can Force You to Reveal Encryption Keys</news:title>
      <news:keywords>encryption, Hong Kong, passwords, police</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/openai-ai-safety-research-fellowship-applications-mnof</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T09:31:55.451Z</news:publication_date>
      <news:title>OpenAI - Applications Open for AI Safety Research Fellowship</news:title>
      <news:keywords>OpenAI, AI Safety Fellowship, AI alignment, research funding, safety evaluation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/engineering-fairness-multi-tenant-siem-solutions-mnof</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T09:31:47.211Z</news:publication_date>
      <news:title>Multi-Tenant SIEM Solutions - Engineering Fairness Explained</news:title>
      <news:keywords>SIEM, multi-tenancy, cloud security, resource management, threat detection</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/comp-ai-open-source-compliance-soc2-iso27001-hipaa-gdpr-mnof</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T09:31:22.069Z</news:publication_date>
      <news:title>Comp AI - Open-Source Solution for Compliance Automation</news:title>
      <news:keywords>SOC 2, ISO 27001, HIPAA, GDPR, Comp AI</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/github-copilot-rubber-duck-ai-review-mnof</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T09:30:59.461Z</news:publication_date>
      <news:title>GitHub Copilot - New Rubber Duck AI Review Feature Launched</news:title>
      <news:keywords>GitHub Copilot, Rubber Duck, AI Review, Claude Model, GPT-5.4</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/microsoft-defender-update-windows-11-10-server-mnoe</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T09:01:28.163Z</news:publication_date>
      <news:title>Microsoft Defender - New Update Enhances Malware Protection</news:title>
      <news:keywords>Microsoft Defender, Windows 11, Windows 10, Windows Server, malware protection</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cambodia-scam-compound-operators-sentenced-mnoe</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T09:01:22.470Z</news:publication_date>
      <news:title>Cambodia&apos;s Scam Compound Operators Face Life Imprisonment</news:title>
      <news:keywords>Cambodia, scam compounds, romance scams, investment schemes, human trafficking</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/yahoo-japan-consolidates-openstack-clusters-mnoa</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T07:31:27.891Z</news:publication_date>
      <news:title>Yahoo Japan Consolidates 164 OpenStack Clusters into One</news:title>
      <news:keywords>Yahoo Japan, OpenStack, LY Corporation, cloud infrastructure, Flava</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/flowise-ai-agent-builder-cve-2025-59528-exploitation-mno7</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T06:01:43.042Z</news:publication_date>
      <news:title>Flowise AI - Critical RCE Vulnerability Under Active Exploitation</news:title>
      <news:keywords>CVE-2025-59528, Flowise, Remote Code Execution, VulnCheck, AI Security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/fixing-cwe-weakness-patterns-mno6</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T05:31:14.211Z</news:publication_date>
      <news:title>CWE Weakness Patterns - The Case for Systematic Fixes</news:title>
      <news:keywords>CWE, CVE, MITRE, vulnerability management, root-cause analysis</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cisa-budget-cuts-trump-2027-mno6</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T05:31:01.220Z</news:publication_date>
      <news:title>CISA Faces Major Budget Cuts Under Trump&apos;s 2027 Plan</news:title>
      <news:keywords>CISA, Trump Budget, Cybersecurity, Infrastructure Security, Government Funding, budget cuts, cybersecurity, Trump administration, critical infrastructure</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/google-study-llms-abuse-detection-mno4</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T04:31:41.465Z</news:publication_date>
      <news:title>Google Study - LLMs Enhance Abuse Detection Framework</news:title>
      <news:keywords>Google, LLMs, content moderation, bias detection, Abuse Detection Lifecycle</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cups-vulnerabilities-remote-code-execution-mnnt</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T23:31:19.091Z</news:publication_date>
      <news:title>CUPS Vulnerabilities - Critical Remote Code Execution Found</news:title>
      <news:keywords>CUPS, CVE-2026-34980, CVE-2026-34990, Linux, Unix</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/russian-cyberattacks-ukraine-evolution-mnnr</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T22:31:42.035Z</news:publication_date>
      <news:title>Evolving Russian Cyberattacks - Insights into New Tactics</news:title>
      <news:keywords>APT28, Fancy Bear, Void Blizzard, Ukraine, Russian cyberattacks</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/european-tourist-sites-ticketing-breach-mnnr</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T22:31:37.100Z</news:publication_date>
      <news:title>European Tourist Sites - Thousands Affected by Breach</news:title>
      <news:keywords>Vivaticket, RansomHouse, Irec SAS</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/gpubreach-attack-system-takeover-gpu-rowhammer-mnnq</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T22:01:29.660Z</news:publication_date>
      <news:title>GPUBreach Attack - System Takeover via GPU Rowhammer</news:title>
      <news:keywords>GPUBreach, Rowhammer, NVIDIA, GPU, Privilege Escalation, Attack, Hardware, Memory, Memory Corruption, Cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/1kosmos-dod-impact-level-4-authorization-mnno</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T21:01:17.308Z</news:publication_date>
      <news:title>1Kosmos Achieves DoD Impact Level 4 Authorization</news:title>
      <news:keywords>1Kosmos, DoD, Impact Level 4, identity platform, FedRAMP</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/risk-operations-center-importance-enterprise-security-mnnn</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T20:31:18.121Z</news:publication_date>
      <news:title>Risk Operations Center - Why Every Enterprise Needs One</news:title>
      <news:keywords>Qualys, Risk Operations Center, security operations</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/fbi-cyber-fraud-losses-2025-mnnn</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T20:31:10.139Z</news:publication_date>
      <news:title>Cyber Fraud - FBI Reports $17.7 Billion in Losses</news:title>
      <news:keywords>FBI, cyber fraud, investment fraud, business email compromise, cryptocurrency theft, cryptocurrency scams, AI fraud, BEC scams, cybersecurity, cybercrime, scams, ransomware, AI</news:keywords>
    </news:news>
  </url>
</urlset>