<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
  <url>
    <loc>https://cyberpings.com/article/cisa-cancels-summer-internships-cyber-scholarship-mnz9</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T23:31:19.381Z</news:publication_date>
      <news:title>CISA Cancels Summer Internships for Cyber Scholarship Students</news:title>
      <news:keywords>CISA, DHS, Scholarship for Service, National Science Foundation, cybersecurity internships</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/defending-against-adversary-in-the-middle-phishing-mnz8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T23:05:34.559Z</news:publication_date>
      <news:title>Adversary-in-the-Middle Phishing - Defend with MFA Strategies</news:title>
      <news:keywords>adversary-in-the-middle, multi-factor authentication, phishing, cloud security, Microsoft Entra ID</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/microsoft-exchange-server-security-best-practices-mnz8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T23:05:14.854Z</news:publication_date>
      <news:title>Microsoft Exchange Server - Security Best Practices Released</news:title>
      <news:keywords>Microsoft Exchange, CISA, NSA, Cyber Centre, ASD</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/mitigating-risks-bulletproof-hosting-providers-mnz8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T23:04:29.941Z</news:publication_date>
      <news:title>Guidance Released on Mitigating Bulletproof Hosting Risks</news:title>
      <news:keywords>CISA, Cyber Centre, BPH providers, FBI, NSA</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cyber-threat-canada-water-systems-assessment-mitigation-mnz8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T23:03:53.950Z</news:publication_date>
      <news:title>Cyber Threat to Canada’s Water Systems - Assessment &amp; Mitigation</news:title>
      <news:keywords>Canada, water systems, cyber threats, state-sponsored actors, cybercriminals</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/brickstorm-malware-analysis-report-mnz8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T23:03:11.484Z</news:publication_date>
      <news:title>Brickstorm Malware - Joint Analysis Report Released</news:title>
      <news:keywords>Brickstorm, CISA, NSA, PRC, malware analysis</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/mercor-breach-lawsuits-litellm-mnz8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T23:02:12.414Z</news:publication_date>
      <news:title>Mercor Faces Multiple Lawsuits After Data Breach Incident</news:title>
      <news:keywords>Mercor, LiteLLM, data breach, class-action lawsuit, personal identifiable information</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/us-tech-force-opm-cybersecurity-hiring-mnz8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T23:01:42.319Z</news:publication_date>
      <news:title>US Tech Force - OPM Launches Cybersecurity Hiring Initiative</news:title>
      <news:keywords>US Tech Force, OPM, cybersecurity hiring, federal agencies, mentorship</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/sentinelone-ai-edr-cpu-z-watering-hole-attack-mnz8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T23:01:36.636Z</news:publication_date>
      <news:title>SentinelOne AI EDR Blocks CPU-Z Watering Hole Attack</news:title>
      <news:keywords>SentinelOne, CPU-Z, STX RAT</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/german-cybercrime-operator-arrested-thailand-mnz8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T23:01:30.428Z</news:publication_date>
      <news:title>German Cybercrime Operator Arrested in Thailand</news:title>
      <news:keywords>Noah Christopher, cybercrime-as-a-service, Neldowner, Fluxstress, DDoS attacks</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/microsoft-windows-protections-malicious-rdp-files-mnz7</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T22:31:05.762Z</news:publication_date>
      <news:title>Microsoft Enhances Windows Protections Against RDP Threats</news:title>
      <news:keywords>Remote Desktop Protocol, phishing, Microsoft, RDP files, APT29</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/microsoft-office-web-apps-sensitivity-labels-update-mnz7</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T22:31:01.768Z</news:publication_date>
      <news:title>Microsoft Office Web Apps - New Sensitivity Labels Feature</news:title>
      <news:keywords>Microsoft, Office, sensitivity labels</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/windows-adobe-acrobat-vulnerabilities-exploited-mnz6</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T22:02:20.433Z</news:publication_date>
      <news:title>Windows and Adobe Acrobat Vulnerabilities - Exploitation Alert</news:title>
      <news:keywords>CVE-2023-36424, CVE-2025-60710, CVE-2020-9715, Adobe Acrobat, Microsoft Windows</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/kraken-extorted-hackers-insider-breach-mnz6</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T22:01:25.771Z</news:publication_date>
      <news:title>Kraken Extorted by Hackers After Insider Breach Incident</news:title>
      <news:keywords>Kraken, Insider Threat, Extortion, Customer Data, Cybercrime</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cisos-revamp-security-programs-claude-mythos-mnz4</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T21:31:18.848Z</news:publication_date>
      <news:title>CISOs - Revamp Security Programs Following Claude Mythos</news:title>
      <news:keywords>Claude Mythos, AI vulnerabilities, Cloud Security Alliance, CISO recommendations, Project Glasswing</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/france-digital-sovereignty-breach-adobe-patch-mnz4</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T21:31:17.024Z</news:publication_date>
      <news:title>France&apos;s Digital Sovereignty Push Amidst Targeted Breaches</news:title>
      <news:keywords>Booking.com, Adobe, SAP, ViperTunnel, Predator spyware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/test-networks-ddos-attacks-peak-loads-mnz3</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T21:01:53.626Z</news:publication_date>
      <news:title>Testing Networks - Preparing for DDoS Attacks During Peaks</news:title>
      <news:keywords></news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/commvault-ai-protect-roll-back-rogue-agents-mnz3</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T21:01:22.231Z</news:publication_date>
      <news:title>Commvault&apos;s AI Protect - Roll Back Rogue AI Agents</news:title>
      <news:keywords>Commvault, AI Protect, AWS, Azure, GCP</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/questions-ask-outsourcing-mdr-mnz2</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T20:31:23.664Z</news:publication_date>
      <news:title>Outsourcing MDR - 4 Key Questions for Cyber Resilience</news:title>
      <news:keywords>Managed Detection and Response, MDR, cyber resilience, N-able, security teams</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ai-impact-cyber-compliance-space-force-mnz2</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T20:31:19.177Z</news:publication_date>
      <news:title>AI&apos;s Impact on Cyber Compliance - Space Force Official Insights</news:title>
      <news:keywords>AI, Cyber Compliance, Space Force, Large Language Models, Cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/russia-blocks-bluesky-social-media-mnz1</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T20:02:00.992Z</news:publication_date>
      <news:title>Russia Blocks Bluesky Social Media Amid Internet Crackdown</news:title>
      <news:keywords>Bluesky, Roskomnadzor, Russia, internet censorship, VPN</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/janaware-ransomware-targeting-turkey-mnz1</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T20:01:35.788Z</news:publication_date>
      <news:title>JanaWare Ransomware - Targeting Turkish Citizens Revealed</news:title>
      <news:keywords>JanaWare, Acronis, Adwind, ransomware, Turkey</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/mcgraw-hill-data-breach-extortion-threat-mnyz</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T19:01:40.980Z</news:publication_date>
      <news:title>McGraw-Hill Data Breach - Extortion Threat Confirmed</news:title>
      <news:keywords>McGraw-Hill, Salesforce, ShinyHunters</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/telegram-hosts-xinbi-guarantee-crypto-scam-mnyz</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T19:01:19.792Z</news:publication_date>
      <news:title>Telegram - Hosts $21 Billion Crypto Scammer Black Market</news:title>
      <news:keywords>Xinbi Guarantee, Telegram, crypto scams, human trafficking, UK sanctions</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/europeans-distrust-us-chinese-data-handling-mnyz</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T19:01:17.827Z</news:publication_date>
      <news:title>Europeans Distrust US and Chinese Data Handling, Favor Local Tech</news:title>
      <news:keywords>GDPR, data handling, European tech, US tech, Chinese tech</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/recorded-future-new-packaging-2026-mnyz</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T19:01:15.111Z</news:publication_date>
      <news:title>Recorded Future - New Solutions and Packages for 2026</news:title>
      <news:keywords>Recorded Future, cyber operations, digital risk protection, third-party risk, payment fraud</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/security-risk-advisors-purple-team-cpe-credits-mnyy</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T18:31:15.601Z</news:publication_date>
      <news:title>Security Risk Advisors - Purple Team Earns CPE Credits</news:title>
      <news:keywords>CPE credits, Purple Team, SRA, GIAC, ISC2, CPE Credits, Cybersecurity Training</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/improper-enforcement-locked-accounts-kiuwan-sast-mnyw</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T17:32:21.991Z</news:publication_date>
      <news:title>Kiuwan SAST - Improper Enforcement of Locked Accounts</news:title>
      <news:keywords>CVE-2026-24069, Kiuwan SAST, SSO, SEC Consult, vulnerability</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/google-broke-promise-ice-data-mnyw</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T17:31:21.530Z</news:publication_date>
      <news:title>Google Broke Promise - ICE Obtains User Data Without Notice</news:title>
      <news:keywords>Google, ICE, subpoena, Amandla Thomas-Johnson, Electronic Frontier Foundation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/multiple-vulnerabilities-siemens-sicam-a8000-mnyw</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T17:31:18.752Z</news:publication_date>
      <news:title>Siemens SICAM A8000 - Multiple Vulnerabilities Discovered</news:title>
      <news:keywords>CVE-2026-27664, Siemens, SICAM A8000, Denial of Service, Memory Corruption</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/microsoft-april-2026-patch-tuesday-vulnerabilities-mnyw</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T17:31:04.906Z</news:publication_date>
      <news:title>Microsoft April 2026 Patch Tuesday - 168 Vulnerabilities Fixed, Including Two Zero-Days</news:title>
      <news:keywords>CVE-2026-32201, CVE-2026-33825, Microsoft SharePoint, Remote Code Execution, Microsoft Defender, Microsoft, Patch Tuesday, Vulnerabilities, Cybersecurity, Zero-day</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cisa-warns-microsoft-exchange-windows-clfs-vulnerabilities-mnyv</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T17:02:54.867Z</news:publication_date>
      <news:title>CISA Warns of Microsoft Exchange and Windows CLFS Vulnerabilities</news:title>
      <news:keywords>CVE-2023-21529, CVE-2023-36424, Microsoft Exchange, Windows CLFS, CISA</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/etcd-auth-bypass-vulnerability-cve-2026-33413-mnyv</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T17:01:47.927Z</news:publication_date>
      <news:title>etcd Auth Bypass Vulnerability - Critical Flaw Exposed</news:title>
      <news:keywords>CVE-2026-33413, etcd, Kubernetes, authentication bypass, Strix</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/hackers-thinking-about-ai-cybercrime-innovation-mnyv</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T17:01:38.787Z</news:publication_date>
      <news:title>Hackers Thinking About AI - Examining Cybercrime Innovation</news:title>
      <news:keywords>AI, cybercrime, hacking, cyber threat intelligence, malicious use</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/fake-ledger-live-app-crypto-theft-mnyv</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T17:01:27.423Z</news:publication_date>
      <news:title>Fake Ledger Live App - $9.5M Cryptocurrency Theft Alert</news:title>
      <news:keywords>Ledger Live, cryptocurrency, Apple App Store</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/fortisandbox-critical-vulnerabilities-exploit-mnyu</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T16:32:23.370Z</news:publication_date>
      <news:title>Critical FortiSandbox Vulnerabilities Allow Command Execution</news:title>
      <news:keywords>CVE-2026-39808, CVE-2026-39813, FortiSandbox, Fortinet, OS Command Injection</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/secure-enterprise-virtual-desktops-mnyu</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T16:32:06.627Z</news:publication_date>
      <news:title>Securing Enterprise Virtual Desktops - Seven Best Practices</news:title>
      <news:keywords>virtual desktop infrastructure, VDI security, remote access, endpoint protection, network segmentation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/eff-investigates-google-deceptive-practice-mnyu</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T16:31:43.824Z</news:publication_date>
      <news:title>EFF Investigates Google - Broken Promise to Users Exposed</news:title>
      <news:keywords>Google, EFF, privacy, law enforcement, data disclosure</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/black-basta-affiliates-launch-intrusion-campaign-mnyu</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T16:30:58.877Z</news:publication_date>
      <news:title>Black Basta Affiliates Launch Fast-Scale Intrusion Campaign</news:title>
      <news:keywords>Black Basta, social engineering, data theft, ransomware, ReliaQuest</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ai-pushpaganda-scam-google-discover-scareware-ad-fraud-mnyt</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T16:01:47.614Z</news:publication_date>
      <news:title>AI-Driven Pushpaganda Scam Spreads Scareware via Google</news:title>
      <news:keywords>Google Discover, AI-generated content, scareware, ad fraud, Pushpaganda</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/openssl-4-0-0-release-deprecated-protocols-post-quantum-mnyt</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T16:01:36.499Z</news:publication_date>
      <news:title>OpenSSL 4.0.0 - Deprecated Protocols Removed, Gains Support</news:title>
      <news:keywords>OpenSSL, Encrypted Client Hello, post-quantum support</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/varonis-atlas-enables-iso-iec-42001-compliance-mnyt</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T16:01:22.313Z</news:publication_date>
      <news:title>Varonis Atlas - Enabling ISO/IEC 42001 Compliance for AI</news:title>
      <news:keywords>Varonis Atlas, ISO/IEC 42001, AI governance, risk management, compliance</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/microsoft-fast-track-reinstate-windows-dev-accounts-mnyt</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T16:01:21.509Z</news:publication_date>
      <news:title>Microsoft - Fast-Track Process to Reinstate Developer Accounts</news:title>
      <news:keywords>Microsoft, Windows Hardware Program, suspended accounts, identity verification, developer access</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cisos-innovate-talent-retention-job-satisfaction-declines-mnys</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T15:31:14.876Z</news:publication_date>
      <news:title>CISOs Urged to Innovate Talent Retention Amid Job Declines</news:title>
      <news:keywords>IANS, cybersecurity, talent retention, job satisfaction, CISO</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/brute-force-cyberattacks-middle-east-surge-q1-mnys</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T15:31:11.119Z</news:publication_date>
      <news:title>Brute-Force Cyberattacks Surge in Middle East - Q1 Report</news:title>
      <news:keywords>SonicWall, Fortinet, Brute-force attacks</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/claroty-advances-cps-security-visibility-orchestration-xdome-mnyo</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T14:01:38.170Z</news:publication_date>
      <news:title>Claroty Advances CPS Security with Visibility Orchestration</news:title>
      <news:keywords>Claroty, CPS security, Visibility Orchestration, xDome, AI-driven data</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/state-sponsored-threats-2025-review-mnyo</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T14:01:36.387Z</news:publication_date>
      <news:title>State-Sponsored Threats - Insights from 2025 Year in Review</news:title>
      <news:keywords>China, Russia, North Korea, Iran, Talos</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/benchmarking-self-hosted-llms-offensive-security-mnyo</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T14:01:20.392Z</news:publication_date>
      <news:title>Self-Hosted LLMs - Benchmarking for Offensive Security</news:title>
      <news:keywords>LLM, penetration testing, AI, Juice Shop, offensive security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cloudflare-mcp-adoption-architecture-mnyn</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T13:31:35.420Z</news:publication_date>
      <news:title>Cloudflare&apos;s MCP Adoption - Enhancing Security and Efficiency</news:title>
      <news:keywords>Cloudflare, MCP, AI Gateway, Access, Shadow MCP</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cloudflare-mesh-secure-private-networking-mnyn</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T13:31:19.059Z</news:publication_date>
      <news:title>Cloudflare Mesh - Introducing Secure Private Networking</news:title>
      <news:keywords>Cloudflare, Cloudflare Mesh, private networking, Zero Trust, SASE</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/securing-non-human-identities-oauth-scoped-permissions-mnyn</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T13:31:13.223Z</news:publication_date>
      <news:title>Securing Non-Human Identities - Enhancing OAuth and Permissions</news:title>
      <news:keywords>Cloudflare, OAuth, API tokens, credential leakage, least privilege</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/plugx-usb-worm-dll-sideloading-mnyn</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T13:31:12.528Z</news:publication_date>
      <news:title>PlugX USB Worm - Spreading Globally via DLL Sideloading</news:title>
      <news:keywords>PlugX, DLL Sideloading, Mustang Panda, Sophos, USB Worm, malware, DLL sideloading, USB threat, APT</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/oligo-runtime-exploit-blocking-detection-mnyn</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T13:31:11.422Z</news:publication_date>
      <news:title>Oligo Launches Real-Time Exploit Detection and Blocking</news:title>
      <news:keywords>Oligo Security, Runtime Exploit Blocking, Application Security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/codex-hacks-samsung-tv-root-exploiting-driver-interfaces-mnym</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T13:02:13.610Z</news:publication_date>
      <news:title>Codex Hacks Samsung TV - Privilege Escalation Exploit Revealed</news:title>
      <news:keywords>Samsung, Codex, Tizen, Kernel Driver, Privilege Escalation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/davmail-6-6-0-patches-regex-flaw-mnym</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T13:01:49.504Z</news:publication_date>
      <news:title>DavMail 6.6.0 - Patches Regex Flaw and Updates Backend</news:title>
      <news:keywords>DavMail, Microsoft Graph, regex vulnerability</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/omnistealer-blockchain-malware-stealing-credentials-mnyl</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T12:31:38.190Z</news:publication_date>
      <news:title>Omnistealer - New Malware Steals Everything via Blockchain</news:title>
      <news:keywords>Omnistealer, malware, password managers, crypto wallets, cloud storage</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/china-linked-cloud-credential-heist-mnyl</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T12:31:34.112Z</news:publication_date>
      <news:title>China-linked Hackers Steal Cloud Credentials Using SMTP</news:title>
      <news:keywords>APT41, cloud security, Linux backdoor, credential theft, typosquatting</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/shadow-data-detection-reduce-cost-risk-cloud-mnyl</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T12:31:20.283Z</news:publication_date>
      <news:title>Shadow Data Detection - Reduce Cost and Risk in Cloud</news:title>
      <news:keywords>Wiz, Shadow Data Detection, Cloud Security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/datavisor-ai-agents-fraud-aml-operations-mnyl</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T12:31:11.267Z</news:publication_date>
      <news:title>DataVisor - New AI Agents Transform Fraud Prevention</news:title>
      <news:keywords>DataVisor, Vera, AI agents, financial crime, AML</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/hackers-weaponize-obsidian-shell-commands-plugin-mnyk</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T12:01:45.091Z</news:publication_date>
      <news:title>Hackers Exploit Obsidian Plugin for Attacks, Targeting Financial Sectors</news:title>
      <news:keywords>Obsidian, PHANTOMPULSE, malware attack, Shell Commands plugin, financial sector, malware, cybersecurity, social engineering</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/triad-nexus-evades-sanctions-cybercrime-mnyi</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T11:01:31.749Z</news:publication_date>
      <news:title>Triad Nexus - Evades Sanctions to Fuel Cybercrime Operations, Expands Tactics</news:title>
      <news:keywords>Triad Nexus, cybercrime, cryptocurrency fraud, sanctions evasion, brand impersonation, Cybercrime, Fraud, Cybersecurity, Scams, Sanctions</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/hackers-target-okta-identity-systems-vishing-mnyi</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T11:01:22.473Z</news:publication_date>
      <news:title>Hackers Target Okta Identity Systems Using Vishing Attacks</news:title>
      <news:keywords>Okta, vishing, identity theft, cloud security, social engineering</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/google-penalize-back-button-hijacking-mnyh</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T10:31:16.332Z</news:publication_date>
      <news:title>Google Penalizes Back Button Hijacking Practices</news:title>
      <news:keywords>Google, back button hijacking, spam policies</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/reverse-engineered-zero-day-disable-crowdstrike-edr-mnyg</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T10:02:49.299Z</news:publication_date>
      <news:title>Zero-Day Vulnerability - Researcher Disables CrowdStrike EDR</news:title>
      <news:keywords>CrowdStrike, BYOVD, zero-day, kernel driver, PoisonKiller</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/securing-software-owasp-spvs-mnyg</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T10:01:40.855Z</news:publication_date>
      <news:title>OWASP SPVS - Enhancing Software Security Standards Explained</news:title>
      <news:keywords>OWASP SPVS, Application Security, Supply Chain Security, Generative AI, AI Penetration Testing</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/rci-hospitality-reports-data-breach-mnyg</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T10:01:20.034Z</news:publication_date>
      <news:title>RCI Hospitality Reports Data Breach - Contractor Data Exposed</news:title>
      <news:keywords>RCI Hospitality, data breach, IDOR vulnerability, contractor data, SEC filing</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/fifa-world-cup-2026-email-fraud-risk-mnyf</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T09:31:09.403Z</news:publication_date>
      <news:title>FIFA World Cup 2026 - Official Partners Risk Email Fraud</news:title>
      <news:keywords>FIFA World Cup 2026, email fraud, DMARC, cybersecurity, Proofpoint</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/hybrid-attacks-increase-germany-nato-exercise-mnya</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T07:31:30.230Z</news:publication_date>
      <news:title>Hybrid Attacks - Rising Threats to Germany&apos;s Infrastructure</news:title>
      <news:keywords>Germany, NATO, Cybersecurity, Hybrid Attacks, Critical Infrastructure</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/psychology-of-information-security-review-mny9</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T07:01:33.655Z</news:publication_date>
      <news:title>Psychology of Information Security - A Comprehensive Review</news:title>
      <news:keywords>Leron Zinatullin, ISO 27001, COM-B model, Fogg Behaviour Model, nudge theory</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/zero-trust-year-two-challenges-mny8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T06:31:48.195Z</news:publication_date>
      <news:title>Zero Trust - Challenges and AI Agents at Year Two</news:title>
      <news:keywords>zero trust, AI agents, identity security, Oleria, Jim Alkove, Zero Trust, Identity Security, AI Agents, Cybersecurity, Access Management</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/agentic-ai-memory-attacks-explained-mny8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T06:31:23.061Z</news:publication_date>
      <news:title>Agentic AI Memory Attacks - Organizations Unprepared for Threats</news:title>
      <news:keywords>Agentic AI, MemoryTrap, Cisco, Claude Code, AI memory attacks</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/showdoc-rce-flaw-cve-2025-0520-exploitation-mny7</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T06:01:31.587Z</news:publication_date>
      <news:title>ShowDoc RCE Flaw CVE-2025-0520 Actively Exploited, Urgent Updates Required</news:title>
      <news:keywords>CVE-2025-0520, ShowDoc, remote code execution, cybersecurity, network security, software security, Threat Intelligence, Vulnerability, web security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/hacking-hospital-waspi-scams-mny1</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T03:04:52.818Z</news:publication_date>
      <news:title>Hacking Hospital Networks and WASPI Scams Exposed</news:title>
      <news:keywords>WASPI scams, Jeffrey Bowie, Oklahoma hospital, phishing, spyware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/high-street-retailers-cyber-attack-chaos-mny1</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T03:04:34.672Z</news:publication_date>
      <news:title>High Street Retailers Hit by Cyber Attacks - Chaos Ensues</news:title>
      <news:keywords>M&amp;S, Co-op, Harrods, cyber attack, Scattered Spider</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/sextortion-scams-discord-hijack-mny1</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T03:04:15.632Z</news:publication_date>
      <news:title>Sextortion Scams - Discord Hijack Exposed</news:title>
      <news:keywords>sextortion, Ledger, Discord, phishing, cryptocurrency</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/uk-legal-aid-hack-instagram-scams-mny1</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T03:03:57.875Z</news:publication_date>
      <news:title>UK Legal Aid Hack Exposes Sensitive Data Amid Instagram Scams</news:title>
      <news:keywords>UK Legal Aid, Instagram Scams, Data Exposure</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/google-privacy-hole-ice-scammers-mny1</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T03:03:39.520Z</news:publication_date>
      <news:title>Google Privacy Hole Exposed - ICE Scammers Target Migrants</news:title>
      <news:keywords>Google, ICE Scammers, Brute-force Attack, ICE, privacy, scams, cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/surveillance-spyware-self-driving-snafus-mny1</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T03:03:18.607Z</news:publication_date>
      <news:title>Surveillance - Drug Cartel Uses Spyware Against FBI</news:title>
      <news:keywords>Mexican drug cartel, FBI, surveillance technology, spyware, self-driving cars</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/call-of-duty-wwii-hijack-scammers-mny1</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T03:03:01.368Z</news:publication_date>
      <news:title>Call of Duty: WWII - Hackers Hijack PCs During Matches</news:title>
      <news:keywords>Call of Duty: WWII, Microsoft Game Pass, hijack, scammers, bail bond scam</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/2g-sms-scams-explained-mny1</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T03:02:40.997Z</news:publication_date>
      <news:title>2G SMS Scams - Why It&apos;s Time to Say Goodbye to 2G</news:title>
      <news:keywords>SMS scams, phishing, 2G network, cybercrime, scammers</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/tea-app-data-leak-70k-private-images-mny1</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T03:02:22.499Z</news:publication_date>
      <news:title>Tea App Data Leak - 70K Private Images Exposed</news:title>
      <news:keywords>Tea app, data leak, private images, chat logs, women&apos;s safety</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/eff-leaving-x-platform-digital-rights-mny1</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T03:01:30.739Z</news:publication_date>
      <news:title>EFF Leaves X - Digital Rights Advocacy Shift</news:title>
      <news:keywords>EFF, X, digital rights, Elon Musk, social media</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/burger-king-hack-ethical-hackers-trade-secrets-mny1</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T03:01:19.306Z</news:publication_date>
      <news:title>Burger King Hack - Ethical Hackers Expose Security Flaws</news:title>
      <news:keywords>Burger King, ethical hackers, trade secrets, AI, insider threats</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ransomware-gold-heist-shai-hulud-worm-mny1</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T03:01:02.167Z</news:publication_date>
      <news:title>Ransomware Enables €600,000 Gold Heist at Museum</news:title>
      <news:keywords>ransomware, Shai Hulud, Natural History Museum, npm packages, data theft</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/infodesk-breach-affecting-pharma-financial-firms-mnxs</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T23:02:34.232Z</news:publication_date>
      <news:title>InfoDesk Breach - Hacker Claims Data Sale from Pharma Firms</news:title>
      <news:keywords>InfoDesk, pharmaceuticals, financial firms, data breach, cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/experian-study-facial-recognition-skepticism-mnxq</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T22:02:24.817Z</news:publication_date>
      <news:title>Experian Study Reveals Deep Skepticism of Facial Recognition</news:title>
      <news:keywords>Experian, facial recognition, identity theft, AI, online fraud</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/android-banking-trojan-forced-labor-scam-mnxq</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T22:02:07.668Z</news:publication_date>
      <news:title>Android Banking Trojan - Linked to Forced Labor Scam</news:title>
      <news:keywords>Android banking trojan, forced labor scam, malware distribution, human trafficking, Infoblox</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/survey-92-fail-rotate-machine-credentials-mnxq</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T22:01:35.070Z</news:publication_date>
      <news:title>AI Security - 92% of Organizations Fail to Rotate Credentials</news:title>
      <news:keywords>SANS Institute, AI agents, credential rotation, security governance, identity management</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/fbi-disrupts-phishing-ring-openai-supply-chain-attack-mnxo</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T21:01:37.734Z</news:publication_date>
      <news:title>FBI Disrupts Major Phishing Ring Amid Cyber Threats</news:title>
      <news:keywords>FBI, OpenAI, Rockstar Games, Slack, North Korea</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ot-cryptographic-readiness-tools-mnxn</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T20:31:16.914Z</news:publication_date>
      <news:title>OT Asset Owners Face Cryptographic Readiness Challenges</news:title>
      <news:keywords></news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/critical-flaw-wolfssl-forged-certificate-mnxm</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T20:01:56.929Z</news:publication_date>
      <news:title>Critical Flaw in wolfSSL Library Enables Forged Certificates</news:title>
      <news:keywords>wolfSSL, CVE-2026-5194, ECDSA, cryptographic flaw, security vulnerability, vulnerability, security, cryptography</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/eff-updated-guide-surveillance-technology-border-mnxi</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T18:01:23.910Z</news:publication_date>
      <news:title>EFF Updates Guide on Surveillance Tech at US-Mexico Border</news:title>
      <news:keywords>Electronic Frontier Foundation, border surveillance, Customs and Border Protection, human rights, surveillance technology</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/booking-com-data-breach-reservation-pin-resets-mnxg</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T17:31:02.891Z</news:publication_date>
      <news:title>Booking.com Data Breach - Reservation PINs Reset After Hack</news:title>
      <news:keywords>Booking.com, data breach, reservation PIN, Customer Data, Data Breach, Hotel, Notification, Security Breach, Phishing</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/obsidian-abused-deliver-phantompulse-rat-mnxf</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T17:01:56.625Z</news:publication_date>
      <news:title>Obsidian Abused to Deliver PhantomPulse RAT - New Threat Uncovered</news:title>
      <news:keywords>PhantomPulse, Obsidian, Elastic Security Labs, social engineering, RAT</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/dr-jean-linis-dinco-activism-human-rights-technology-mnxf</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T17:01:36.652Z</news:publication_date>
      <news:title>Dr. Jean Linis-Dinco - Activist Championing Digital Rights</news:title>
      <news:keywords>Dr. Jean Linis-Dinco, Manushya Foundation, digital rights, freedom of expression</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/claude-ai-intermittent-500-errors-mnxf</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T17:01:28.241Z</news:publication_date>
      <news:title>Claude AI - Users Report Intermittent 500 Errors</news:title>
      <news:keywords>Claude AI, HTTP 500, Anthropic, API, server errors</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/vip-credential-monitoring-importance-mnxe</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T16:31:22.903Z</news:publication_date>
      <news:title>VIP Credential Monitoring - Protecting Sensitive Accounts</news:title>
      <news:keywords>Recorded Future, credential theft, VIP Credential Monitoring, infostealer malware, data breach</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/architectural-vulnerabilities-agentic-llm-browsers-mnxe</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T16:31:16.961Z</news:publication_date>
      <news:title>Architectural Vulnerabilities - Exploring Agentic LLM Browsers</news:title>
      <news:keywords>LLM Browsers, Agentic Browsers, OpenAI Atlas, Comet, Edge Copilot</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/us-indonesia-shut-down-phishing-kit-mnxd</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T16:01:37.591Z</news:publication_date>
      <news:title>US, Indonesia Shut Down Sophisticated Phishing Kit</news:title>
      <news:keywords>phishing, cybercrime, login portals</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cisos-gaps-incident-response-playbooks-mnxd</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T16:01:16.479Z</news:publication_date>
      <news:title>CISOs Identify Gaps in Incident Response Playbooks</news:title>
      <news:keywords>Sygnia, CISO, incident response, cyberattack, security leaders</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/gulf-states-tightening-screws-on-speech-mnxc</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T15:31:28.701Z</news:publication_date>
      <news:title>Gulf States Tighten Speech Restrictions Amid Ongoing Conflict</news:title>
      <news:keywords>Bahrain, Jordan, UAE, Qatar, Saudi Arabia</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/mailbox-rule-abuse-post-compromise-threat-mnxc</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T15:31:13.886Z</news:publication_date>
      <news:title>Mailbox Rule Abuse - Stealthy Threat After Account Compromise</news:title>
      <news:keywords>Microsoft 365, mailbox rules, data exfiltration, Proofpoint, account compromise</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/apt41-delivers-zero-detection-backdoor-mnxc</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T15:31:08.019Z</news:publication_date>
      <news:title>APT41 Delivers &apos;Zero-Detection&apos; Backdoor to Harvest Cloud Credentials</news:title>
      <news:keywords>APT41, cloud credentials, typosquatting, AWS, Azure, cloud security, cyber espionage, credential theft, malware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cloudflare-new-cli-local-explorer-mnxc</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T15:31:07.752Z</news:publication_date>
      <news:title>Cloudflare - New Unified CLI and Local Explorer Released</news:title>
      <news:keywords>Cloudflare, CLI, API, Local Explorer, Wrangler</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/nginx-1-29-8-freenignx-critical-security-updates-mnxb</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T15:02:12.984Z</news:publication_date>
      <news:title>Nginx 1.29.8 - Critical Security Updates Released</news:title>
      <news:keywords>Nginx, FreeNginx, OpenSSL, security updates, HTTP headers</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/deep-scan-vulnerability-detection-advanced-techniques-mnxb</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T15:01:34.015Z</news:publication_date>
      <news:title>Deep Scan - Enhancing Vulnerability Detection Techniques</news:title>
      <news:keywords>Deep Scan, TruRisk, vulnerability detection, software security, non-standard installations</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/anodot-breach-leaves-companies-facing-extortion-mnxb</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T15:01:27.207Z</news:publication_date>
      <news:title>Anodot Breach - Over a Dozen Companies Face Extortion Amid Rockstar Games Threat</news:title>
      <news:keywords>Anodot, ShinyHunters, Rockstar Games, data breach, Snowflake, anadot, cybersecurity, Security, shinyhunters</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/msbuild-lolbin-fileless-windows-attacks-mnxa</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T14:32:30.170Z</news:publication_date>
      <news:title>MSBuild LOLBin - Hackers Launch Fileless Windows Attacks</news:title>
      <news:keywords>MSBuild, fileless attacks, C2 server, DLL sideloading, phishing</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/nhs-microsoft-licensing-benchmarking-contract-mnxa</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T14:32:07.263Z</news:publication_date>
      <news:title>NHS Prepares for Microsoft Licensing Negotiations</news:title>
      <news:keywords>NHS, Microsoft, software licensing, IDC, G-Cloud</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/getting-started-in-pentesting-advice-bhis-lead-mnx9</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T14:01:13.914Z</news:publication_date>
      <news:title>Pentesting - Essential Advice from BHIS Pentest Lead</news:title>
      <news:keywords>pentesting, cybersecurity, BHIS, offensive security, training</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/threat-intelligence-report-april-2026-mnx8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T13:31:33.707Z</news:publication_date>
      <news:title>Data Breaches and Ransomware Attacks - April 2026 Report</news:title>
      <news:keywords>Los Angeles Police Department, ChipSoft, Qilin, Bitcoin Depot, CVE-2026-1340</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ai-powered-log-summary-for-soc-teams-mnx8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T13:31:32.484Z</news:publication_date>
      <news:title>AI-Powered Log Summary - Enhancing SOC Team Efficiency</news:title>
      <news:keywords>Rapid7, AI-Powered Log Summary, SOC Teams, SIEM, Incident Command</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/encystphp-webshell-scans-mnx8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T13:31:16.344Z</news:publication_date>
      <news:title>EncystPHP Webshell - Scans Indicate Growing Threat</news:title>
      <news:keywords>EncystPHP, webshell, FreePBX, Fortinet, cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/openai-north-korea-axios-supply-chain-hack-mnx7</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T13:01:14.539Z</news:publication_date>
      <news:title>OpenAI - North Korea-Linked Axios Supply Chain Hack Impact</news:title>
      <news:keywords>OpenAI, Axios, North Korea, UNC1069, supply chain attack</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/hackers-hide-vipertunnel-python-backdoor-mnx7</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T13:00:30.606Z</news:publication_date>
      <news:title>VIPERTUNNEL - Hackers Deploy Python Backdoor via Fake DLL, Targeting US and UK Businesses</news:title>
      <news:keywords>VIPERTUNNEL, Python backdoor, SOCKS5 proxy, malware, command-and-control, Python, backdoor, DLL, ransomware, enterprise security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/fbi-dismantles-20m-phishing-operation-w3ll-mnx6</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T12:31:42.015Z</news:publication_date>
      <news:title>FBI Dismantles $20M Phishing Operation W3LL</news:title>
      <news:keywords>W3LL, phishing, FBI, cybercrime, fraud, Microsoft 365, BEC</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ibm-websphere-liberty-flaws-full-takeover-mnx5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T12:01:23.249Z</news:publication_date>
      <news:title>IBM WebSphere Liberty Flaws - Chain Leads to Full Server Takeover</news:title>
      <news:keywords>CVE-2026-1561, IBM WebSphere, SAML Web SSO, remote code execution, access control</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/google-pixel-10-modem-firmware-security-improvements-mnx4</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T11:31:35.236Z</news:publication_date>
      <news:title>Google Enhances Pixel 10 Modem Firmware Security with Rust-Based DNS Parser</news:title>
      <news:keywords>Google, Pixel 10, Rust, DNS parser, firmware, security, DNS</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/basic-fit-data-breach-exposes-users-mnx3</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T11:02:37.264Z</news:publication_date>
      <news:title>Basic-Fit Data Breach Exposes Millions of Users&apos; Data Across Multiple Countries</news:title>
      <news:keywords>Basic-Fit, data breach, GDPR, personal information, Netherlands, cybersecurity, personal data</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/rockstar-games-data-breach-shinyhunters-threat-mnx3</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T11:01:46.740Z</news:publication_date>
      <news:title>Rockstar Games - Data Breach Threat from ShinyHunters Group</news:title>
      <news:keywords>Rockstar Games, ShinyHunters, Anodot, data breach, Snowflake, cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/veriftools-servers-seized-identity-fraud-mnx2</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T10:32:28.996Z</news:publication_date>
      <news:title>VerifTools Servers Seized - 915,655 Fake IDs Exposed</news:title>
      <news:keywords>VerifTools, identity fraud, Dutch police, cybercrime, forgery</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/north-korea-apt37-facebook-social-engineering-rokrat-mnx1</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T10:31:26.072Z</news:publication_date>
      <news:title>APT37 Uses Facebook Social Engineering to Spread RokRAT, New Insights Revealed</news:title>
      <news:keywords>APT37, RokRAT, social engineering, malware, North Korea, cybersecurity, Facebook, Malware, Threat Intelligence</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ai-chatbots-and-trust-issues-mnx1</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T10:31:10.912Z</news:publication_date>
      <news:title>AI Chatbots - Trust Issues Arise from Sycophantic Responses</news:title>
      <news:keywords>AI, chatbots, trust, academic papers</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/siemens-industrial-automation-datacenter-ai-security-mnx1</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T10:31:06.075Z</news:publication_date>
      <news:title>Siemens Expands Industrial Automation DataCenter with AI Security</news:title>
      <news:keywords>Siemens, NVIDIA, Palo Alto Networks, Industrial Automation, AI Security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/handala-claims-breach-uae-organizations-mnx0</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T10:01:15.833Z</news:publication_date>
      <news:title>Handala Claims Major Breach of Three UAE Organizations, Massive Data Destruction Alleged</news:title>
      <news:keywords>Handala, UAE, cyberattack, data breach, Iran, Hacking, Cybersecurity, Data Breach</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/uk-cyber-security-council-associate-title-launch-mnwz</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T09:31:17.648Z</news:publication_date>
      <news:title>UK Cyber Security Council - Launches Associate Title for Pros</news:title>
      <news:keywords>UK Cyber Security Council, Associate Cyber Security Professional, cybersecurity skills gap, professional development, early-career professionals</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/janelarats-latin-american-financial-threat-mnwy</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T09:01:33.673Z</news:publication_date>
      <news:title>JanelaRAT - New Financial Malware Targets Latin America with Increased Attacks</news:title>
      <news:keywords>JanelaRAT, Kaspersky, financial malware, Latin America, BX RAT, malware, financial threats, cybersecurity, phishing</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/elon-musk-launches-xchat-self-destruct-messages-mnwx</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T08:31:59.432Z</news:publication_date>
      <news:title>XChat - Elon Musk Launches Self-Destruct Messaging Feature</news:title>
      <news:keywords>XChat, Elon Musk, self-destruct messages, end-to-end encryption, privacy controls</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/zeroid-open-source-identity-platform-autonomous-ai-agents-mnwx</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T08:31:14.906Z</news:publication_date>
      <news:title>ZeroID - Open-Source Identity Platform for AI Agents</news:title>
      <news:keywords>ZeroID, Highflame, OpenID, RFC 8693, Continuous Access Evaluation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/windows-11-push-button-reset-issue-mnwx</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T08:30:58.396Z</news:publication_date>
      <news:title>Windows 11 - Recent Updates Break Push Button Reset Feature</news:title>
      <news:keywords>Windows 11, KB5079420, Push-button reset</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/chatgpt-ai-tools-healthcare-clinical-workflows-mnwu</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T07:02:00.354Z</news:publication_date>
      <news:title>ChatGPT - Supporting Clinicians in Patient Care</news:title>
      <news:keywords>ChatGPT, HIPAA, AI tools, healthcare, clinical documentation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/fixing-vulnerability-data-quality-architecture-mnwt</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T06:31:28.773Z</news:publication_date>
      <news:title>Vulnerability Data Quality - Fixing Architecture Issues First</news:title>
      <news:keywords>vulnerability management, data quality, Minimum Viable Vulnerability Enumeration</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/spf-flattening-guide-office-365-google-workspace-mnwr</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T05:31:15.872Z</news:publication_date>
      <news:title>SPF Flattening - Essential Guide for Office 365 and Google Workspace</news:title>
      <news:keywords>SPF, Office 365, Google Workspace, SaaS, email authentication</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/federated-identity-management-explained-mnwp</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T04:31:08.127Z</news:publication_date>
      <news:title>Federated Identity Management - Enhancing Security and Usability</news:title>
      <news:keywords>Federated Identity Management, Single Sign-On, Identity Provider, OAuth 2.0, SAML</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/whatsapp-end-to-end-encryption-consumer-fraud-mnwl</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T03:01:25.632Z</news:publication_date>
      <news:title>WhatsApp&apos;s Encryption Claims Called Consumer Fraud by Durov</news:title>
      <news:keywords>WhatsApp, Pavel Durov, end-to-end encryption, Telegram, Meta</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/china-ai-education-lesson-preparation-homework-marking-mnwk</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T02:31:15.820Z</news:publication_date>
      <news:title>China&apos;s AI Plan - Preparing Lessons and Grading Homework</news:title>
      <news:keywords>China, AI in Education, National Data Administration, Digital Textbooks</news:keywords>
    </news:news>
  </url>
</urlset>