<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
  <url>
    <loc>https://cyberpings.com/article/comfyui-cryptomining-botnet-campaign-mnon</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T13:31:24.670Z</news:publication_date>
      <news:title>ComfyUI - Targeted in Active Cryptomining Botnet Campaign</news:title>
      <news:keywords>ComfyUI, cryptomining, botnet, XMRig, Hysteria V2</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cloudflare-post-quantum-security-2029-target-mnon</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T13:31:21.824Z</news:publication_date>
      <news:title>Cloudflare Targets 2029 for Complete Post-Quantum Security</news:title>
      <news:keywords>Cloudflare, post-quantum security, quantum computing, authentication, Google</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/critical-flaw-forticlient-ems-exploitation-mnon</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T13:31:17.068Z</news:publication_date>
      <news:title>Critical Flaw in FortiClient EMS Under Exploitation, Emergency Patch Released</news:title>
      <news:keywords>FortiClient, Fortinet, zero-day, CVE-2026-35616, vulnerability, cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/claude-code-packaging-error-distributes-malware-mnon</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T13:31:10.868Z</news:publication_date>
      <news:title>Claude Code Packaging Error - Malware Campaign Explained</news:title>
      <news:keywords>Vidar, GhostSocks, PureLog Stealer, Claude Code, malware distribution</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/building-detection-foundation-correlation-practice-mnon</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T13:31:10.308Z</news:publication_date>
      <news:title>Detection Engineering - Correlation Techniques Explained</news:title>
      <news:keywords>Sysmon, PowerShell, SIEM, Windows Security, Detection Engineering</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/gpubreach-attack-system-wide-compromise-root-shell-mnon</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T13:31:07.306Z</news:publication_date>
      <news:title>GPUBreach - New Attack Enables System-Wide Compromise</news:title>
      <news:keywords>GPUBreach, Rowhammer, NVIDIA, CPU, GDDR6</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/snyk-container-security-ai-era-mnom</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T13:01:31.122Z</news:publication_date>
      <news:title>Container Security - Snyk Launches New AI-Driven Features</news:title>
      <news:keywords>Snyk, Container Security, AI, Runtime Intelligence, Container Registry Sync</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cyberattack-rostelecom-ddos-disruption-mnom</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T13:01:27.537Z</news:publication_date>
      <news:title>Cyberattack on Rostelecom - Major DDoS Disruption Reported</news:title>
      <news:keywords>Rostelecom, DDoS attack, Russia, internet disruption, government services</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/arctic-wolf-gartner-peer-insights-2026-mnom</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T13:01:17.229Z</news:publication_date>
      <news:title>Arctic Wolf Recognized as 2026 Gartner Customers’ Choice</news:title>
      <news:keywords>Arctic Wolf, Gartner Peer Insights, Managed Detection and Response</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/supply-chain-integrity-risk-assessments-evaluation-criteria-mnom</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T13:01:16.607Z</news:publication_date>
      <news:title>Supply Chain Integrity Risk Assessments - Evaluation Criteria</news:title>
      <news:keywords>Supply Chain Integrity, Government of Canada, Cybersecurity, Risk Assessment</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/appsec-news-roundup-claude-code-leak-axios-npm-mnom</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T13:01:15.105Z</news:publication_date>
      <news:title>Claude Code Leak and Axios NPM Compromise - AppSec Insights</news:title>
      <news:keywords>Claude Code, Axios NPM, Application Security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/threat-actors-abuse-logmein-resolve-screenconnect-phishing-mnom</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T13:01:14.641Z</news:publication_date>
      <news:title>Phishing Campaign - Threat Actors Exploit LogMeIn Tools</news:title>
      <news:keywords>LogMeIn Resolve, ScreenConnect, phishing, remote monitoring, RMM tools</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/android-zero-interaction-vulnerability-dos-mnom</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T13:00:50.522Z</news:publication_date>
      <news:title>Android Zero-Interaction Vulnerability - Critical DoS Risk</news:title>
      <news:keywords>CVE-2026-0049, Android, DoS, Google, Security Bulletin</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/threat-intelligence-fast-mttr-solution-mnom</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T13:00:27.474Z</news:publication_date>
      <news:title>Threat Intelligence - Key to Reducing MTTR for SOC Teams</news:title>
      <news:keywords></news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/hidden-cost-recurring-credential-incidents-mnol</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T12:31:45.640Z</news:publication_date>
      <news:title>Credential Security - Understanding Hidden Costs of Incidents</news:title>
      <news:keywords>credential security, password policies, Specops, identity security, helpdesk tickets</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/close-identity-gaps-2026-ai-exploits-risk-mnol</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T12:31:18.351Z</news:publication_date>
      <news:title>AI Security - Closing Identity Gaps Before 2026 Risks</news:title>
      <news:keywords>AI, Identity Management, Ponemon Institute, Zero Trust, SaaS Security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cyberattack-northern-ireland-school-network-mnol</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T12:31:10.895Z</news:publication_date>
      <news:title>Cyberattack Disrupts Northern Ireland’s Centralized School Network</news:title>
      <news:keywords>C2K system, Education Authority, Northern Ireland, Capita, cyberattack</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/portswigger-meta-bug-bounty-partnership-training-mnol</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T12:31:10.888Z</news:publication_date>
      <news:title>PortSwigger - Partners with Meta for Bug Bounty Training</news:title>
      <news:keywords>PortSwigger, Meta, Bug Bounty, Burp Suite, Web Security Academy</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/whatsapp-tee-security-audit-vulnerabilities-mnoj</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T11:31:34.574Z</news:publication_date>
      <news:title>WhatsApp TEE Security Audit Reveals Critical Vulnerabilities</news:title>
      <news:keywords>WhatsApp, Meta, TEE, security audit, encryption</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/top-enterprise-ai-gateways-security-integration-mnoi</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T11:01:46.160Z</news:publication_date>
      <news:title>Top Enterprise AI Gateways Ranked for Security and Integration</news:title>
      <news:keywords>AI Gateways, Security, Integration, Governance, Enterprise AI</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/weaponizing-saas-notification-pipelines-phishing-mnog</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T10:01:40.739Z</news:publication_date>
      <news:title>Weaponizing SaaS Notification Pipelines - New Phishing Tactics</news:title>
      <news:keywords>GitHub, Jira, phishing, credential harvesting, Cisco Talos</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/hong-kong-police-encryption-keys-mnog</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T10:01:28.241Z</news:publication_date>
      <news:title>Hong Kong Police Can Force You to Reveal Encryption Keys</news:title>
      <news:keywords>encryption, Hong Kong, passwords, police</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/openai-ai-safety-research-fellowship-applications-mnof</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T09:31:55.451Z</news:publication_date>
      <news:title>OpenAI - Applications Open for AI Safety Research Fellowship</news:title>
      <news:keywords>OpenAI, AI Safety Fellowship, AI alignment, research funding, safety evaluation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/engineering-fairness-multi-tenant-siem-solutions-mnof</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T09:31:47.211Z</news:publication_date>
      <news:title>Multi-Tenant SIEM Solutions - Engineering Fairness Explained</news:title>
      <news:keywords>SIEM, multi-tenancy, cloud security, resource management, threat detection</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/comp-ai-open-source-compliance-soc2-iso27001-hipaa-gdpr-mnof</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T09:31:22.069Z</news:publication_date>
      <news:title>Comp AI - Open-Source Solution for Compliance Automation</news:title>
      <news:keywords>SOC 2, ISO 27001, HIPAA, GDPR, Comp AI</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/github-copilot-rubber-duck-ai-review-mnof</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T09:30:59.461Z</news:publication_date>
      <news:title>GitHub Copilot - New Rubber Duck AI Review Feature Launched</news:title>
      <news:keywords>GitHub Copilot, Rubber Duck, AI Review, Claude Model, GPT-5.4</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/microsoft-defender-update-windows-11-10-server-mnoe</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T09:01:28.163Z</news:publication_date>
      <news:title>Microsoft Defender - New Update Enhances Malware Protection</news:title>
      <news:keywords>Microsoft Defender, Windows 11, Windows 10, Windows Server, malware protection</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cambodia-scam-compound-operators-sentenced-mnoe</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T09:01:22.470Z</news:publication_date>
      <news:title>Cambodia&apos;s Scam Compound Operators Face Life Imprisonment</news:title>
      <news:keywords>Cambodia, scam compounds, romance scams, investment schemes, human trafficking</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/yahoo-japan-consolidates-openstack-clusters-mnoa</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T07:31:27.891Z</news:publication_date>
      <news:title>Yahoo Japan Consolidates 164 OpenStack Clusters into One</news:title>
      <news:keywords>Yahoo Japan, OpenStack, LY Corporation, cloud infrastructure, Flava</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/flowise-ai-agent-builder-cve-2025-59528-exploitation-mno7</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T06:01:43.042Z</news:publication_date>
      <news:title>Flowise AI - Critical RCE Vulnerability Under Active Exploitation</news:title>
      <news:keywords>CVE-2025-59528, Flowise, Remote Code Execution, VulnCheck, AI Security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/fixing-cwe-weakness-patterns-mno6</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T05:31:14.211Z</news:publication_date>
      <news:title>CWE Weakness Patterns - The Case for Systematic Fixes</news:title>
      <news:keywords>CWE, CVE, MITRE, vulnerability management, root-cause analysis</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cisa-budget-cuts-trump-2027-mno6</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T05:31:01.220Z</news:publication_date>
      <news:title>CISA Faces Major Budget Cuts Under Trump&apos;s 2027 Plan</news:title>
      <news:keywords>CISA, Trump Budget, Cybersecurity, Infrastructure Security, Government Funding, budget cuts, cybersecurity, Trump administration, critical infrastructure</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/google-study-llms-abuse-detection-mno4</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T04:31:41.465Z</news:publication_date>
      <news:title>Google Study - LLMs Enhance Abuse Detection Framework</news:title>
      <news:keywords>Google, LLMs, content moderation, bias detection, Abuse Detection Lifecycle</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cups-vulnerabilities-remote-code-execution-mnnt</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T23:31:19.091Z</news:publication_date>
      <news:title>CUPS Vulnerabilities - Critical Remote Code Execution Found</news:title>
      <news:keywords>CUPS, CVE-2026-34980, CVE-2026-34990, Linux, Unix</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/russian-cyberattacks-ukraine-evolution-mnnr</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T22:31:42.035Z</news:publication_date>
      <news:title>Evolving Russian Cyberattacks - Insights into New Tactics</news:title>
      <news:keywords>APT28, Fancy Bear, Void Blizzard, Ukraine, Russian cyberattacks</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/european-tourist-sites-ticketing-breach-mnnr</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T22:31:37.100Z</news:publication_date>
      <news:title>European Tourist Sites - Thousands Affected by Breach</news:title>
      <news:keywords>Vivaticket, RansomHouse, Irec SAS</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/gpubreach-attack-system-takeover-gpu-rowhammer-mnnq</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T22:01:29.660Z</news:publication_date>
      <news:title>GPUBreach Attack - System Takeover via GPU Rowhammer</news:title>
      <news:keywords>GPUBreach, Rowhammer, NVIDIA, GPU, Privilege Escalation, Attack, Hardware, Memory, Memory Corruption, Cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/1kosmos-dod-impact-level-4-authorization-mnno</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T21:01:17.308Z</news:publication_date>
      <news:title>1Kosmos Achieves DoD Impact Level 4 Authorization</news:title>
      <news:keywords>1Kosmos, DoD, Impact Level 4, identity platform, FedRAMP</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/risk-operations-center-importance-enterprise-security-mnnn</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T20:31:18.121Z</news:publication_date>
      <news:title>Risk Operations Center - Why Every Enterprise Needs One</news:title>
      <news:keywords>Qualys, Risk Operations Center, security operations</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/fbi-cyber-fraud-losses-2025-mnnn</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T20:31:10.139Z</news:publication_date>
      <news:title>Cyber Fraud - FBI Reports $17.7 Billion in Losses</news:title>
      <news:keywords>FBI, cyber fraud, investment fraud, business email compromise, cryptocurrency theft, cryptocurrency scams, AI fraud, BEC scams, cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/border-patrol-challenge-coins-regulation-issues-mnnl</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T19:31:19.158Z</news:publication_date>
      <news:title>Border Patrol Challenge Coins Raise Regulatory Concerns</news:title>
      <news:keywords>US Border Patrol, challenge coins, DHS, Proud Boys, immigration enforcement</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/bluehammer-windows-zero-day-exploit-leaked-mnnl</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T19:31:13.103Z</news:publication_date>
      <news:title>BlueHammer Windows Zero-Day Exploit Leaked by Researcher, Demonstrates Full SYSTEM Access</news:title>
      <news:keywords>BlueHammer, Windows, zero-day, privilege escalation, Chaotic Eclipse, exploit, local privilege escalation, LPE</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/new-mexico-meta-ruling-encryption-implications-mnnl</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T19:31:05.498Z</news:publication_date>
      <news:title>New Mexico Ruling - Impacts on Meta&apos;s Encryption Practices</news:title>
      <news:keywords>Meta, encryption, privacy, court ruling, social media</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/microsoft-removes-support-recovery-assistant-mnnk</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T19:01:18.707Z</news:publication_date>
      <news:title>Microsoft Removes Support and Recovery Assistant from Windows</news:title>
      <news:keywords>Microsoft, SaRA, Get Help, Windows, Microsoft 365</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cve-2026-35616-fortinet-forticlient-ems-vulnerability-mnnf</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T17:01:26.152Z</news:publication_date>
      <news:title>CVE-2026-35616 - New Exploited Vulnerability Added by CISA, Urgent Hotfix Released</news:title>
      <news:keywords>CVE-2026-35616, Fortinet, FortiClient EMS, CISA, BOD 22-01, vulnerability, hotfix, cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/storm-1175-medusa-ransomware-operations-mnne</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T16:31:11.680Z</news:publication_date>
      <news:title>Storm-1175 - High-Tempo Medusa Ransomware Operations Unveiled</news:title>
      <news:keywords>Storm-1175, Medusa ransomware, CVE-2023-21529, CVE-2023-27351, CVE-2025-10035, Ransomware, Medusa, Cybersecurity, Threat Intelligence</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/n-able-report-proactive-risk-management-soc-operations-mnnd</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T16:04:21.695Z</news:publication_date>
      <news:title>N-able Report - Shift to Proactive Risk Management in SOC</news:title>
      <news:keywords>N-able, SOC, risk management</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/google-deepmind-web-attacks-ai-agents-mnnd</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T16:01:16.252Z</news:publication_date>
      <news:title>AI Security - Google DeepMind Maps Web Attacks Against AI Agents</news:title>
      <news:keywords>Google DeepMind, AI agents, web attacks, content manipulation, autonomous systems</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/trojanized-pypi-ai-proxy-exfiltrates-data-mnnc</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T15:31:04.003Z</news:publication_date>
      <news:title>Trojanized PyPI AI Proxy Steals User Data Silently</news:title>
      <news:keywords>hermes-px, PyPI, Claude, data exfiltration, JFrog Security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/multi-os-cyberattacks-socs-close-risk-steps-mnnb</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T15:01:24.012Z</news:publication_date>
      <news:title>Multi-OS Cyberattacks - How SOCs Address Critical Risks</news:title>
      <news:keywords>ANY.RUN, multi-OS attacks, SOC, ClickFix, endpoint security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/dprk-cyber-program-modular-malware-strategy-mnna</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T14:31:35.532Z</news:publication_date>
      <news:title>DPRK Cyber Program - Modular Malware Strategy Explained</news:title>
      <news:keywords>North Korea, DPRK Cyber Program, Lazarus Group, Kimsuky, Andariel</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/breach-monitoring-infostealers-credentials-2026-mnna</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T14:31:04.301Z</news:publication_date>
      <news:title>Breach Monitoring - Why Simple Solutions Fail Against Infostealers</news:title>
      <news:keywords>credentials, infostealer, breach monitoring, Lunar, cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/owasp-genai-security-update-tools-matrix-mnn9</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T14:01:28.693Z</news:publication_date>
      <news:title>OWASP GenAI Security Project - New Tools Matrix Released</news:title>
      <news:keywords>OWASP, GenAI, AI risks</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/is-localhost-ip-2-0-0-ssrf-vulnerability-mnn8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T13:31:17.817Z</news:publication_date>
      <news:title>is-localhost-ip - SSRF Vulnerability Discovered</news:title>
      <news:keywords>is-localhost-ip, SSRF, nu11secur1ty</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/bryan-fleming-sentencing-spyware-maker-mnn8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T13:31:03.570Z</news:publication_date>
      <news:title>Spyware Maker Bryan Fleming Avoids Jail Time at Sentencing, Receives Supervised Release</news:title>
      <news:keywords>Bryan Fleming, pcTattletale, spyware, stalkerware, data breach, bryan fleming, cybersecurity, pctattletale, security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/asp-net-8-0-10-bypass-vulnerability-mnn7</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T13:01:57.372Z</news:publication_date>
      <news:title>ASP.NET 8.0.10 - Critical Bypass Vulnerability Discovered</news:title>
      <news:keywords>CVE-2025-55315, ASP.NET, Kestrel, HTTP Request Smuggling, Authentication Bypass</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/wordpress-madara-local-file-inclusion-cve-2025-4524-mnn7</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T13:01:47.178Z</news:publication_date>
      <news:title>WordPress Madara - Local File Inclusion Vulnerability Alert</news:title>
      <news:keywords>CVE-2025-4524, WordPress, Local File Inclusion, Madara, Beatriz Fresno Naumova</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/zhiyuan-oa-arbitrary-file-upload-vulnerability-mnn7</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T13:01:40.211Z</news:publication_date>
      <news:title>Zhiyuan OA - Critical Arbitrary File Upload Vulnerability</news:title>
      <news:keywords>CVE-2025-34040, Zhiyuan OA, remote code execution, file upload vulnerability, path traversal</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/fortios-8-0-ai-quantum-security-mnn7</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T13:01:39.960Z</news:publication_date>
      <news:title>FortiOS 8.0 - Redefining Security for AI and Quantum Threats</news:title>
      <news:keywords>FortiOS 8.0, AI security, quantum computing, data loss prevention, cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/north-korean-it-worker-unmasked-job-interview-mnn7</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T13:01:20.515Z</news:publication_date>
      <news:title>North Korean IT Worker Unmasked During Job Interview Technique</news:title>
      <news:keywords>North Korea, Lazarus Group, Taro Aikuchi, cybersecurity, DeFi</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/major-outage-russian-banking-apps-metro-payments-mnn7</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T13:01:17.334Z</news:publication_date>
      <news:title>Major Outage Disrupts Russian Banking Apps and Metro Payments</news:title>
      <news:keywords>Sberbank, VTB, Alfa-Bank, T-Bank, Gazprombank</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/guardarian-users-targeted-malicious-strapi-npm-packages-mnn5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T12:01:14.137Z</news:publication_date>
      <news:title>Malicious Strapi NPM Packages Target Guardarian Users</news:title>
      <news:keywords>Strapi, NPM packages, Guardarian, malicious payloads, credential harvesting</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/dgraph-database-vulnerability-authentication-bypass-mnn4</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T11:32:00.502Z</news:publication_date>
      <news:title>Dgraph Database Vulnerability - Attackers Bypass Authentication</news:title>
      <news:keywords>CVE-2026-34976, Dgraph, authentication bypass, database vulnerability, Matthew McNeely</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/hackers-compromised-ilspy-wordpress-domain-deliver-malware-mnn4</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T11:31:16.475Z</news:publication_date>
      <news:title>ILSpy Domain Compromised - Malware Delivered to Developers</news:title>
      <news:keywords>ILSpy, malware, WordPress, browser extension, supply chain attack</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/google-transition-post-quantum-cryptography-2029-mnn2</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T11:01:04.054Z</news:publication_date>
      <news:title>Google&apos;s Transition to Post-Quantum Cryptography by 2029</news:title>
      <news:keywords>Google, post-quantum cryptography, quantum computing</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/authentication-broken-fix-security-leaders-mnn1</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T10:31:07.952Z</news:publication_date>
      <news:title>Authentication Broken - Security Leaders Must Fix It Now</news:title>
      <news:keywords>authentication, CISO, FIDO2, passwordless, middleware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/battling-payment-fraud-tokenization-rsac-2026-mnn0</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T10:01:27.991Z</news:publication_date>
      <news:title>Payment Fraud - Battling with Tokenization Insights</news:title>
      <news:keywords>payment fraud, tokenization, FIS Global, OneSpan, Semperis</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/escaping-cots-trap-mnmz</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T09:31:42.268Z</news:publication_date>
      <news:title>Escaping the COTS Trap - Navigating Vendor Lock-In Risks</news:title>
      <news:keywords>COTS, cybersecurity, AI, vendor lock-in, enterprise architecture</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/metatron-ai-penetration-testing-assistant-linux-mnmu</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T07:01:23.283Z</news:publication_date>
      <news:title>METATRON - New AI Tool Enhances Penetration Testing on Linux</news:title>
      <news:keywords>METATRON, penetration testing, AI, vulnerability assessment, Parrot OS</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/proton-authenticator-open-source-2fa-app-mnmq</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T05:01:28.300Z</news:publication_date>
      <news:title>Proton Authenticator - End-to-End Encrypted 2FA App Explained</news:title>
      <news:keywords>Proton Authenticator, two-factor authentication, TOTP, open source, encryption</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/surge-in-app-exploits-ai-cyber-attacks-mnml</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T03:05:01.537Z</news:publication_date>
      <news:title>Surge in App Exploits - AI Accelerates Cyber-Attacks</news:title>
      <news:keywords>IBM, X-Force, cyber-attacks, AI, public apps</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/uks-data-watchdog-makeover-mnml</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T03:04:20.277Z</news:publication_date>
      <news:title>UK&apos;s Data Watchdog - Major Overhaul for Modern Demands</news:title>
      <news:keywords></news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/exploitable-vulnerabilities-organizations-mnml</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T03:04:07.821Z</news:publication_date>
      <news:title>Exploitable Vulnerabilities - 87% of Organizations at Risk</news:title>
      <news:keywords>Datadog, exploitable vulnerabilities, security report</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/phishing-emails-identity-attacks-2025-mnml</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T03:03:50.813Z</news:publication_date>
      <news:title>Phishing Emails - 32 Million Flagged as Identity Attacks Rise, New Tactics Emerged</news:title>
      <news:keywords>phishing, identity theft, Darktrace, cybersecurity, email security, fraud prevention</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/project-compass-arrests-cybercrime-gang-mnml</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T03:03:23.156Z</news:publication_date>
      <news:title>Project Compass - 30 Members of Cybercrime Gang Arrested</news:title>
      <news:keywords>Europol, cybercrime, ransomware, extortion, Project Compass</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/north-korea-apt37-tools-breach-air-gapped-networks-mnml</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T03:02:53.096Z</news:publication_date>
      <news:title>APT37 Expands Toolkit to Breach Air-Gapped Networks</news:title>
      <news:keywords>APT37, North Korea, Zscaler, cyber espionage, air-gapped networks</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/germany-doxes-unkn-revil-gang-leader-mnmk</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T02:31:00.843Z</news:publication_date>
      <news:title>Germany Doxes UNKN - Leader of REvil and GandCrab Gangs</news:title>
      <news:keywords>REvil, GandCrab, Daniil Shchukin, cybercrime, Germany BKA</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/malware-newsletter-round-91-april-2026-mnlw</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T15:01:20.197Z</news:publication_date>
      <news:title>Malware Newsletter Round 91 - Latest Threats and Insights</news:title>
      <news:keywords>Infiniti Stealer, RoadK1ll, npm Supply Chain Attack, North Korea, DeepLoad</news:keywords>
    </news:news>
  </url>
</urlset>