<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
  <url>
    <loc>https://cyberpings.com/article/border-patrol-challenge-coins-regulation-issues-mnnl</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T19:31:19.158Z</news:publication_date>
      <news:title>Border Patrol Challenge Coins Raise Regulatory Concerns</news:title>
      <news:keywords>US Border Patrol, challenge coins, DHS, Proud Boys, immigration enforcement</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/bluehammer-windows-zero-day-exploit-leaked-mnnl</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T19:31:13.103Z</news:publication_date>
      <news:title>BlueHammer Windows Zero-Day Exploit Leaked by Researcher</news:title>
      <news:keywords>BlueHammer, Windows, zero-day, privilege escalation, Chaotic Eclipse</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/new-mexico-meta-ruling-encryption-implications-mnnl</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T19:31:05.498Z</news:publication_date>
      <news:title>New Mexico Ruling - Impacts on Meta&apos;s Encryption Practices</news:title>
      <news:keywords>Meta, encryption, privacy, court ruling, social media</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/microsoft-removes-support-recovery-assistant-mnnk</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T19:01:18.707Z</news:publication_date>
      <news:title>Microsoft Removes Support and Recovery Assistant from Windows</news:title>
      <news:keywords>Microsoft, SaRA, Get Help, Windows, Microsoft 365</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cve-2026-35616-fortinet-forticlient-ems-vulnerability-mnnf</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T17:01:26.152Z</news:publication_date>
      <news:title>CVE-2026-35616 - New Exploited Vulnerability Added by CISA</news:title>
      <news:keywords>CVE-2026-35616, Fortinet, FortiClient EMS, CISA, BOD 22-01</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/storm-1175-medusa-ransomware-operations-mnne</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T16:31:11.680Z</news:publication_date>
      <news:title>Storm-1175 - High-Tempo Medusa Ransomware Operations Unveiled</news:title>
      <news:keywords>Storm-1175, Medusa ransomware, CVE-2023-21529, CVE-2023-27351, CVE-2025-10035</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/n-able-report-proactive-risk-management-soc-operations-mnnd</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T16:04:21.695Z</news:publication_date>
      <news:title>N-able Report - Shift to Proactive Risk Management in SOC</news:title>
      <news:keywords>N-able, SOC, risk management</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/google-deepmind-web-attacks-ai-agents-mnnd</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T16:01:16.252Z</news:publication_date>
      <news:title>AI Security - Google DeepMind Maps Web Attacks Against AI Agents</news:title>
      <news:keywords>Google DeepMind, AI agents, web attacks, content manipulation, autonomous systems</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/trojanized-pypi-ai-proxy-exfiltrates-data-mnnc</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T15:31:04.003Z</news:publication_date>
      <news:title>Trojanized PyPI AI Proxy Steals User Data Silently</news:title>
      <news:keywords>hermes-px, PyPI, Claude, data exfiltration, JFrog Security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/multi-os-cyberattacks-socs-close-risk-steps-mnnb</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T15:01:24.012Z</news:publication_date>
      <news:title>Multi-OS Cyberattacks - How SOCs Address Critical Risks</news:title>
      <news:keywords>ANY.RUN, multi-OS attacks, SOC, ClickFix, endpoint security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/dprk-cyber-program-modular-malware-strategy-mnna</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T14:31:35.532Z</news:publication_date>
      <news:title>DPRK Cyber Program - Modular Malware Strategy Explained</news:title>
      <news:keywords>North Korea, DPRK Cyber Program, Lazarus Group, Kimsuky, Andariel</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/breach-monitoring-infostealers-credentials-2026-mnna</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T14:31:04.301Z</news:publication_date>
      <news:title>Breach Monitoring - Why Simple Solutions Fail Against Infostealers</news:title>
      <news:keywords>credentials, infostealer, breach monitoring, Lunar, cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/owasp-genai-security-update-tools-matrix-mnn9</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T14:01:28.693Z</news:publication_date>
      <news:title>OWASP GenAI Security Project - New Tools Matrix Released</news:title>
      <news:keywords>OWASP, GenAI, AI risks</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/is-localhost-ip-2-0-0-ssrf-vulnerability-mnn8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T13:31:17.817Z</news:publication_date>
      <news:title>is-localhost-ip 2.0.0 - SSRF Vulnerability Discovered</news:title>
      <news:keywords>is-localhost-ip, SSRF, nu11secur1ty, CVE-2025-9960, Express</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/bryan-fleming-sentencing-spyware-maker-mnn8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T13:31:03.570Z</news:publication_date>
      <news:title>Spyware Maker Bryan Fleming Avoids Jail Time at Sentencing, Receives Supervised Release</news:title>
      <news:keywords>Bryan Fleming, pcTattletale, spyware, stalkerware, data breach, bryan fleming, cybersecurity, pctattletale, security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/asp-net-8-0-10-bypass-vulnerability-mnn7</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T13:01:57.372Z</news:publication_date>
      <news:title>ASP.NET 8.0.10 - Critical Bypass Vulnerability Discovered</news:title>
      <news:keywords>CVE-2025-55315, ASP.NET, Kestrel, HTTP Request Smuggling, Authentication Bypass</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/wordpress-madara-local-file-inclusion-cve-2025-4524-mnn7</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T13:01:47.178Z</news:publication_date>
      <news:title>WordPress Madara - Local File Inclusion Vulnerability Alert</news:title>
      <news:keywords>CVE-2025-4524, WordPress, Local File Inclusion, Madara, Beatriz Fresno Naumova</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/zhiyuan-oa-arbitrary-file-upload-vulnerability-mnn7</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T13:01:40.211Z</news:publication_date>
      <news:title>Zhiyuan OA - Critical Arbitrary File Upload Vulnerability</news:title>
      <news:keywords>CVE-2025-34040, Zhiyuan OA, remote code execution, file upload vulnerability, path traversal</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/fortios-8-0-ai-quantum-security-mnn7</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T13:01:39.960Z</news:publication_date>
      <news:title>FortiOS 8.0 - Redefining Security for AI and Quantum Threats</news:title>
      <news:keywords>FortiOS 8.0, AI security, quantum computing, data loss prevention, cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/north-korean-it-worker-unmasked-job-interview-mnn7</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T13:01:20.515Z</news:publication_date>
      <news:title>North Korean IT Worker Unmasked During Job Interview Technique</news:title>
      <news:keywords>North Korea, Lazarus Group, Taro Aikuchi, cybersecurity, DeFi</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/major-outage-russian-banking-apps-metro-payments-mnn7</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T13:01:17.334Z</news:publication_date>
      <news:title>Major Outage Disrupts Russian Banking Apps and Metro Payments</news:title>
      <news:keywords>Sberbank, VTB, Alfa-Bank, T-Bank, Gazprombank</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/guardarian-users-targeted-malicious-strapi-npm-packages-mnn5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T12:01:14.137Z</news:publication_date>
      <news:title>Malicious Strapi NPM Packages Target Guardarian Users</news:title>
      <news:keywords>Strapi, NPM packages, Guardarian, malicious payloads, credential harvesting</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/dgraph-database-vulnerability-authentication-bypass-mnn4</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T11:32:00.502Z</news:publication_date>
      <news:title>Dgraph Database Vulnerability - Attackers Bypass Authentication</news:title>
      <news:keywords>CVE-2026-34976, Dgraph, authentication bypass, database vulnerability, Matthew McNeely</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/hackers-compromised-ilspy-wordpress-domain-deliver-malware-mnn4</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T11:31:16.475Z</news:publication_date>
      <news:title>ILSpy Domain Compromised - Malware Delivered to Developers</news:title>
      <news:keywords>ILSpy, malware, WordPress, browser extension, supply chain attack</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/google-transition-post-quantum-cryptography-2029-mnn2</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T11:01:04.054Z</news:publication_date>
      <news:title>Google&apos;s Transition to Post-Quantum Cryptography by 2029</news:title>
      <news:keywords>Google, post-quantum cryptography, quantum computing</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/authentication-broken-fix-security-leaders-mnn1</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T10:31:07.952Z</news:publication_date>
      <news:title>Authentication Broken - Security Leaders Must Fix It Now</news:title>
      <news:keywords>authentication, CISO, FIDO2, passwordless, middleware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/battling-payment-fraud-tokenization-rsac-2026-mnn0</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T10:01:27.991Z</news:publication_date>
      <news:title>Payment Fraud - Battling with Tokenization Insights</news:title>
      <news:keywords>payment fraud, tokenization, FIS Global, OneSpan, Semperis</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/escaping-cots-trap-mnmz</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T09:31:42.268Z</news:publication_date>
      <news:title>Escaping the COTS Trap - Navigating Vendor Lock-In Risks</news:title>
      <news:keywords>COTS, cybersecurity, AI, vendor lock-in, enterprise architecture</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/metatron-ai-penetration-testing-assistant-linux-mnmu</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T07:01:23.283Z</news:publication_date>
      <news:title>METATRON - New AI Tool Enhances Penetration Testing on Linux</news:title>
      <news:keywords>METATRON, penetration testing, AI, vulnerability assessment, Parrot OS</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/proton-authenticator-open-source-2fa-app-mnmq</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T05:01:28.300Z</news:publication_date>
      <news:title>Proton Authenticator - End-to-End Encrypted 2FA App Explained</news:title>
      <news:keywords>Proton Authenticator, two-factor authentication, TOTP, open source, encryption</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/surge-in-app-exploits-ai-cyber-attacks-mnml</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T03:05:01.537Z</news:publication_date>
      <news:title>Surge in App Exploits - AI Accelerates Cyber-Attacks</news:title>
      <news:keywords>IBM, X-Force, cyber-attacks, AI, public apps</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/uks-data-watchdog-makeover-mnml</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T03:04:20.277Z</news:publication_date>
      <news:title>UK&apos;s Data Watchdog - Major Overhaul for Modern Demands</news:title>
      <news:keywords></news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/exploitable-vulnerabilities-organizations-mnml</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T03:04:07.821Z</news:publication_date>
      <news:title>Exploitable Vulnerabilities - 87% of Organizations at Risk</news:title>
      <news:keywords>Datadog, exploitable vulnerabilities, security report</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/phishing-emails-identity-attacks-2025-mnml</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T03:03:50.813Z</news:publication_date>
      <news:title>Phishing Emails - 32 Million Flagged as Identity Attacks Rise, New Tactics Emerged</news:title>
      <news:keywords>phishing, identity theft, Darktrace, cybersecurity, email security, fraud prevention</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/project-compass-arrests-cybercrime-gang-mnml</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T03:03:23.156Z</news:publication_date>
      <news:title>Project Compass - 30 Members of Cybercrime Gang Arrested</news:title>
      <news:keywords>Europol, cybercrime, ransomware, extortion, Project Compass</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/north-korea-apt37-tools-breach-air-gapped-networks-mnml</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T03:02:53.096Z</news:publication_date>
      <news:title>APT37 Expands Toolkit to Breach Air-Gapped Networks</news:title>
      <news:keywords>APT37, North Korea, Zscaler, cyber espionage, air-gapped networks</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/germany-doxes-unkn-revil-gang-leader-mnmk</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T02:31:00.843Z</news:publication_date>
      <news:title>Germany Doxes UNKN - Leader of REvil and GandCrab Gangs</news:title>
      <news:keywords>REvil, GandCrab, Daniil Shchukin, cybercrime, Germany BKA</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/malware-newsletter-round-91-april-2026-mnlw</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T15:01:20.197Z</news:publication_date>
      <news:title>Malware Newsletter Round 91 - Latest Threats and Insights</news:title>
      <news:keywords>Infiniti Stealer, RoadK1ll, npm Supply Chain Attack, North Korea, DeepLoad</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/researchers-roast-cybercriminals-dark-web-mnls</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T13:31:16.105Z</news:publication_date>
      <news:title>Researchers Roast Cybercriminals to Diminish Their Glamour</news:title>
      <news:keywords>Dark Web Roast, cybercrime, John Fokker, CVE-2026-20045, LockBit</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/syria-security-failures-hack-exposed-mnlk</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T09:31:15.761Z</news:publication_date>
      <news:title>Syria’s Security Failures Exposed by Government Account Hack</news:title>
      <news:keywords>Syria, cybersecurity, government accounts, hacking, X platform</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/malicious-email-delivers-cmd-malware-mnlj</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T09:01:14.582Z</news:publication_date>
      <news:title>Malicious Email Delivers CMD Malware - Privilege Escalation Alert</news:title>
      <news:keywords>cmd malware, privilege escalation, Windows Defender, malicious email, curl</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/anjali-hansen-cross-team-collaboration-mnlg</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T07:31:13.062Z</news:publication_date>
      <news:title>Anjali Hansen - Emphasizes Cross-Team Collaboration in Privacy</news:title>
      <news:keywords>Anjali Hansen, Noname Security, Privacy Counsel</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/axios-npm-package-compromised-supply-chain-attack-mnks</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T20:31:00.239Z</news:publication_date>
      <news:title>Axios NPM Package Compromised - Supply Chain Attack Exposed</news:title>
      <news:keywords>Axios, npm, RAT, supply chain attack, plain-crypto-js</news:keywords>
    </news:news>
  </url>
</urlset>