<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
  <url>
    <loc>https://cyberpings.com/article/wav-file-malware-payload-mo8b</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T07:31:16.391Z</news:publication_date>
      <news:title>.WAV File - New Malware Delivery Method Discovered</news:title>
      <news:keywords>malware, wav file, payload</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/iran-claims-us-backdoors-networking-equipment-mo88</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T06:31:26.769Z</news:publication_date>
      <news:title>Iran Claims US Used Backdoors to Disable Networking Gear</news:title>
      <news:keywords>Iran, US Cyber Command, backdoors, networking equipment, China</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/us-spy-laws-expire-lawmakers-split-surveillance-mo85</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T05:02:02.532Z</news:publication_date>
      <news:title>US Spy Laws Set to Expire - Lawmakers Split on Reforms</news:title>
      <news:keywords>FISA, surveillance, privacy, data brokers, Trump Administration</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/browser-run-ai-agents-browser-mo84</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T04:31:52.450Z</news:publication_date>
      <news:title>Browser Run - Empower Your AI Agents with a Browser</news:title>
      <news:keywords>Browser Run, Cloudflare, AI agents, Chrome DevTools, WebMCP</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/encrypted-routing-layer-private-ai-inference-mo84</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T04:31:15.759Z</news:publication_date>
      <news:title>Encrypted Routing Layer - Enhancing Private AI Inference</news:title>
      <news:keywords>Secure Multi-Party Computation, AI inference, SecureRouter, encryption, University of Central Florida</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/poc-exploit-windows-snipping-tool-ntlm-hash-leak-mo84</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T04:31:07.184Z</news:publication_date>
      <news:title>Windows Snipping Tool - PoC Exploit for NTLM Hash Leak</news:title>
      <news:keywords>CVE-2026-33829, Windows Snipping Tool, Net-NTLM, Black Arrow Security, SMB, Windows, Snipping Tool, NTLM, vulnerability, exploit</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cve-2023-33538-attack-unsuccessful-mo83</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T04:01:31.672Z</news:publication_date>
      <news:title>CVE-2023-33538 - Year-long Attack Fails to Exploit Vulnerability</news:title>
      <news:keywords>CVE-2023-33538, TP-Link, command injection, Mirai, router vulnerabilities</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/iterm2-flaw-ssh-integration-code-execution-mo82</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T03:31:08.341Z</news:publication_date>
      <news:title>iTerm2 Vulnerability - SSH Integration Allows Code Execution</news:title>
      <news:keywords>iTerm2, RCE, SSH, Califio, macOS</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/incident-response-for-ai-same-fire-different-fuel-mo82</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T03:31:00.510Z</news:publication_date>
      <news:title>AI Incident Response - Adapting Practices for New Challenges</news:title>
      <news:keywords>AI Incident Response, Microsoft Security Copilot, Telemetry, Crisis Management, AI Safety</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/shinyhunters-breach-9m-records-leaked-mo7y</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T01:31:48.174Z</news:publication_date>
      <news:title>ShinyHunters Breaches Multiple Companies - 9M Records Exposed</news:title>
      <news:keywords>ShinyHunters, Zara, 7-Eleven, Carnival Corporation, data breach</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/trojanized-testdisk-installer-screenconnect-deployment-mo7y</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T01:31:42.904Z</news:publication_date>
      <news:title>Trojanized TestDisk Installer - Illicit ScreenConnect Deployment</news:title>
      <news:keywords>TestDisk, ScreenConnect, Microsoft, malware, DLL side-loading</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ponemon-survey-identity-overconfidence-mo7x</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T01:02:36.042Z</news:publication_date>
      <news:title>Ponemon Survey Exposes Identity Overconfidence in Enterprises</news:title>
      <news:keywords>Ponemon Institute, identity security, multifactor authentication, AI identities, Cerby</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/windows-vulnerabilities-active-exploitation-mo7x</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T01:02:09.455Z</news:publication_date>
      <news:title>Windows Vulnerabilities - Trio Under Active Exploitation</news:title>
      <news:keywords>Windows Defender, BlueHammer, UnDefend, RedSun, Chaotic Eclipse</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/executive-order-stronger-identity-proofing-mo7x</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T01:01:59.851Z</news:publication_date>
      <news:title>Executive Order - Push for Stronger Identity Proofing</news:title>
      <news:keywords>Executive Order 14390, identity verification, cyber fraud, digital identity, Jordan Burris</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/non-human-identities-enterprise-risk-mo7x</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T01:01:39.849Z</news:publication_date>
      <news:title>Non-Human Identities - Center of Enterprise Risk Explained</news:title>
      <news:keywords>AI security, identity management, privileged access management, Delinea, WatchGuard</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/vercel-security-breach-malware-roblox-cheats-mo7x</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T01:01:35.700Z</news:publication_date>
      <news:title>Vercel Security Breach - Malware Disguised as Roblox Cheats</news:title>
      <news:keywords>Vercel, Context.ai, Lumma Stealer, ShinyHunters, Google Workspace</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/senate-surveillance-powers-renewal-april-2026-mo7x</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T01:01:17.428Z</news:publication_date>
      <news:title>Senate Extends Surveillance Powers Until April 30</news:title>
      <news:keywords>surveillance, privacy, FISA, Section 702, U.S. Congress</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/palantir-ice-human-rights-policy-issues-mo7x</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T01:01:08.464Z</news:publication_date>
      <news:title>Palantir&apos;s Human Rights Policy - Questions Arise Over ICE Work</news:title>
      <news:keywords>Palantir, ICE, EFF, human rights, data privacy</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ai-models-rapid-gains-vulnerability-research-mo7w</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T00:31:51.506Z</news:publication_date>
      <news:title>AI Models - Rapid Gains in Vulnerability Research Revealed</news:title>
      <news:keywords>AI models, vulnerability research, Forescout, zero-day vulnerabilities, exploit development</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/vercel-incident-supply-chain-attack-mo7w</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T00:31:27.724Z</news:publication_date>
      <news:title>Vercel Incident Raises Supply Chain Attack Concerns Amid New Findings</news:title>
      <news:keywords>Vercel, Context.ai, Google Workspace, supply chain attack, cybersecurity, Supply Chain Attack, Cybersecurity, OAuth, Security Incident, data breach</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/anthropic-mcp-design-vulnerability-rce-mo7v</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T00:02:12.855Z</news:publication_date>
      <news:title>Anthropic MCP Design Vulnerability Enables RCE Threat, Exposing 200,000 Servers</news:title>
      <news:keywords>Anthropic, Model Context Protocol, RCE, CVE-2025-65720, CVE-2026-30623, AI, Vulnerability, Remote Code Execution, Cybersecurity, Supply Chain Security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/gentlemen-ransomware-systembc-bot-powered-attacks-mo7v</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T00:02:11.774Z</news:publication_date>
      <news:title>Gentlemen Ransomware - SystemBC Powers New Bot Attacks</news:title>
      <news:keywords>Gentlemen ransomware, SystemBC, Cobalt Strike, botnet, ransomware-as-a-service</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cisa-adds-known-exploited-vulnerabilities-mo7v</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T00:02:10.714Z</news:publication_date>
      <news:title>CISA Adds Eight New Vulnerabilities to KEV Catalog</news:title>
      <news:keywords>CVE-2023-27351, CVE-2024-27199, CVE-2025-2749, CVE-2025-32975, CVE-2025-48700</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/white-house-federal-agencies-anthropic-claude-mythos-mo7v</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T00:02:07.249Z</news:publication_date>
      <news:title>AI Security - White House Authorizes Anthropic&apos;s Claude Mythos</news:title>
      <news:keywords>Anthropic, Claude Mythos, cybersecurity vulnerabilities, federal agencies, AI model, AI, Cybersecurity, Government, Vulnerabilities</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/crowdstrike-openai-tac-frontier-ai-defenders-mo7u</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T00:01:57.473Z</news:publication_date>
      <news:title>CrowdStrike Partners with OpenAI for Enhanced AI Security</news:title>
      <news:keywords>CrowdStrike, OpenAI, AI governance, GPT-5.4-Cyber, AgentWorks</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ai-model-claude-opus-exploits-bugs-mo7u</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T00:01:46.824Z</news:publication_date>
      <news:title>AI Model Claude Opus Turns Bugs into Exploits for $2,283</news:title>
      <news:keywords>Claude Opus, Chrome exploit, AI vulnerabilities, Mohan Pedhapati, bug bounty</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/france-ants-id-system-cyberattack-data-breach-mo7u</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T00:01:41.210Z</news:publication_date>
      <news:title>France&apos;s ANTS ID System - Cyberattack Exposes Personal Data</news:title>
      <news:keywords>ANTS, France, data breach, personal data, cyberattack</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cibercrime-america-latina-caribe-2025-mo7u</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T00:01:40.618Z</news:publication_date>
      <news:title>Cibercrime na América Latina e Caribe - Tendências em 2025</news:title>
      <news:keywords>Insikt Group, LAC, ransomware, malware, phishing</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/lovable-data-leak-hackerone-response-mo7u</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T00:01:37.438Z</news:publication_date>
      <news:title>Lovable Denies Data Leak, Blames HackerOne for Vulnerability</news:title>
      <news:keywords>Lovable, HackerOne, BOLA vulnerability</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/automotive-ransomware-attacks-double-mo7t</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T23:33:01.546Z</news:publication_date>
      <news:title>Automotive Ransomware Attacks - Doubling Threats in 2025</news:title>
      <news:keywords>ransomware, automotive, Halcyon, cyber attacks, Jaguar Land Rover</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/attackers-exploit-dvr-command-injection-mirai-botnet-mo7t</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T23:32:57.452Z</news:publication_date>
      <news:title>Attackers Exploit DVR Command Injection Flaw to Deploy Mirai Botnet</news:title>
      <news:keywords>CVE-2024-3721, Mirai, Nexcorium, DVR, FortiGuard Labs</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/mcp-protocol-vulnerability-exposes-150-million-downloads-mo7t</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T23:32:30.486Z</news:publication_date>
      <news:title>MCP Protocol - Critical Vulnerability Exposes 150 Million Downloads</news:title>
      <news:keywords>MCP Protocol, Anthropic, Ox Security, AI Supply Chain, Arbitrary Command Execution</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/nist-stop-rating-non-priority-flaws-mo7t</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T23:32:12.119Z</news:publication_date>
      <news:title>NIST Stops Rating Non-Priority Flaws Amid Submission Surge</news:title>
      <news:keywords>NIST, CVE, NVD, vulnerability management, CISA, Vulnerability Management, Cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/microsoft-defender-zero-days-exploited-mo7t</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T23:32:11.487Z</news:publication_date>
      <news:title>Microsoft Defender - New Zero-Days Exploited in the Wild, Two Still Unpatched</news:title>
      <news:keywords>Microsoft Defender, CVE-2026-33825, RedSun, UnDefend, Chaotic Eclipse, zero-day, vulnerability, exploit, cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ransomware-negotiations-cisos-should-know-mo7t</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T23:31:14.658Z</news:publication_date>
      <news:title>Ransomware Negotiations - What CISOs Must Understand</news:title>
      <news:keywords>Ransomware, CISO, Negotiation, Cybercriminals, Threat Actors</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/kelpdao-290-million-heist-lazarus-hackers-mo7r</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T22:31:13.103Z</news:publication_date>
      <news:title>KelpDAO Suffers $290 Million Heist Linked to Lazarus Hackers</news:title>
      <news:keywords>KelpDAO, Lazarus Group, crypto theft, DeFi, rsETH, North Korea, LayerZero</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/securing-ai-application-development-mo7q</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T22:01:30.898Z</news:publication_date>
      <news:title>Securing AI Application Development - Protecting Sensitive Data</news:title>
      <news:keywords>AI development, data security, sensitive data, credentials, Varonis</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/gh0st-rat-cloverplus-dual-payload-malware-campaign-mo7o</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T21:01:22.703Z</news:publication_date>
      <news:title>Gh0st RAT and CloverPlus Adware - New Dual-Payload Malware</news:title>
      <news:keywords>Gh0st RAT, CloverPlus, malware campaign, remote access trojan, adware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ftc-ai-portfolio-expansion-deepfakes-voice-cloning-mo7o</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T21:01:11.053Z</news:publication_date>
      <news:title>FTC&apos;s AI Portfolio Expands - New Law Targets Deepfakes</news:title>
      <news:keywords>FTC, Take It Down Act, deepfakes, voice cloning, AI scams</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/mastodon-ddos-attack-april-2026-mo7n</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T20:31:36.814Z</news:publication_date>
      <news:title>Mastodon Hit by DDoS Attack - Service Disrupted Temporarily</news:title>
      <news:keywords>Mastodon, DDoS, Bluesky</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/claude-desktop-privacy-issues-browser-access-mo7m</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T20:01:14.038Z</news:publication_date>
      <news:title>Claude Desktop - Privacy Concerns Over Browser Access Settings</news:title>
      <news:keywords>Claude Desktop, Anthropic, ePrivacy Directive, browser extensions, privacy violation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/tyler-buchanan-pleads-guilty-crypto-theft-mo7l</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T19:31:05.504Z</news:publication_date>
      <news:title>Tyler Buchanan Pleads Guilty - Major Crypto Theft Case</news:title>
      <news:keywords>Tyler Buchanan, Scattered Spider, cryptocurrency theft, SMS phishing, wire fraud, cybercrime, phishing, SIM swap, cryptocurrency</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/sglang-cve-2026-5760-remote-code-execution-mo7k</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T19:01:57.444Z</news:publication_date>
      <news:title>SGLang CVE-2026-5760 - Critical RCE Vulnerability Disclosed</news:title>
      <news:keywords>CVE-2026-5760, SGLang, Remote Code Execution, Jinja2, GGUF</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ai-soc-customization-importance-mo7k</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T19:01:36.897Z</news:publication_date>
      <news:title>AI SOC Customization - Why Your Security Needs Control</news:title>
      <news:keywords>AI SOC, automation, security operations, incident response, customization</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/progress-security-advisory-cve-2026-3517-3518-3519-4048-21876-mo7j</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T18:31:35.908Z</news:publication_date>
      <news:title>Progress Security Advisory - Critical Vulnerabilities Found</news:title>
      <news:keywords>CVE-2026-3517, CVE-2026-3518, CVE-2026-3519, CVE-2026-4048, CVE-2026-21876</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/seiko-usa-website-defaced-customer-data-theft-mo7j</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T18:31:26.087Z</news:publication_date>
      <news:title>Seiko USA Website Defaced - Customer Data Theft Claimed</news:title>
      <news:keywords>Seiko USA, Shopify, data breach, customer data, extortion</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/making-cyberattacks-harder-by-design-mo7j</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T18:31:02.945Z</news:publication_date>
      <news:title>Making Cyberattacks Harder - Microsoft’s New Security Approach</news:title>
      <news:keywords>Microsoft, Dynamics 365, Power Platform, credential elimination, platform engineering</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/iran-mois-coordinated-cyber-campaign-mo7f</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T17:01:10.840Z</news:publication_date>
      <news:title>Iran MOIS - Coordinated Cyber Campaign Using Multiple Personas</news:title>
      <news:keywords>Iran MOIS, Homeland Justice, Karma, Handala, Void Manticore</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ai-help-networks-pocket-presence-mo7e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T16:31:23.811Z</news:publication_date>
      <news:title>AI - Enhancing Telecom Security with Pocket Presence</news:title>
      <news:keywords>AI, telecom security, Salt Typhoon, UNC3886, BPFDoor</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/lovable-ai-app-builder-api-flaw-exposes-data-mo7e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T16:31:09.968Z</news:publication_date>
      <news:title>Lovable AI App Builder - Critical API Flaw Exposes Data, Legacy Projects at Risk</news:title>
      <news:keywords>Lovable, API Vulnerability, Broken Object Level Authorization, Data Exposure, HackerOne, BOLA, Cybersecurity, API, vulnerability, data breach, AI, security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/satoshi-nakamoto-adam-back-identity-mo7e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T16:31:02.504Z</news:publication_date>
      <news:title>Satoshi Nakamoto - Is Adam Back Really the Creator?</news:title>
      <news:keywords>bitcoin, cryptocurrency, Adam Back</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/serial-to-ip-converter-vulnerabilities-expose-systems-mo7d</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T16:01:24.711Z</news:publication_date>
      <news:title>Serial-to-IP Converter Vulnerabilities Expose OT Systems</news:title>
      <news:keywords>Lantronix, Silex, BRIDGE:BREAK, CISA, OT security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/elon-musk-questioning-french-police-ai-images-mo7c</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T15:31:15.786Z</news:publication_date>
      <news:title>Elon Musk - Fails to Appear for French Police Questioning</news:title>
      <news:keywords>Elon Musk, X, AI images, French police, child sexual abuse material</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/enterprise-remediation-benchmark-comparison-mo7c</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T15:31:11.609Z</news:publication_date>
      <news:title>Enterprise Remediation Benchmark - Compare Your Organization</news:title>
      <news:keywords>Google Chrome, Visual C++, Microsoft Edge, Qualys, patch management</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/big-tech-can-stop-scams-mo7b</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T15:01:19.196Z</news:publication_date>
      <news:title>Big Tech Can Stop Scams - Why They Don’t Act</news:title>
      <news:keywords>financial scams, older adults, Malwarebytes, FTC, Marti DeLiema</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/backup-myth-businesses-risk-bcdr-mo7a</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T14:31:14.064Z</news:publication_date>
      <news:title>Backup Myth - Why BCDR is Essential for Businesses</news:title>
      <news:keywords>Datto, BCDR, business continuity, ransomware, data protection</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/decipio-community-tool-credential-theft-detection-mo7a</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T14:31:09.077Z</news:publication_date>
      <news:title>Decipio - New AI Tool to Catch Credential Theft Early</news:title>
      <news:keywords>Decipio, Arctic Wolf, credential theft, cybersecurity tool, AI-driven detection</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/wiz-code-secures-build-environment-mo77</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T13:01:20.485Z</news:publication_date>
      <news:title>Wiz Code Secures CI/CD Pipelines Against Supply Chain Attacks</news:title>
      <news:keywords>Wiz, CI/CD, supply chain attack, GitHub Actions, AI agents</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/why-ai-deployments-stall-after-demo-mo76</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T12:31:12.616Z</news:publication_date>
      <news:title>AI Deployments - Why They Stall After the Demo</news:title>
      <news:keywords>AI, Data Governance, Machine Learning, Enterprise Software, Privacy</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/scattered-spider-hacker-pleads-guilty-mo76</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T12:31:07.396Z</news:publication_date>
      <news:title>Scattered Spider Hacker Pleads Guilty to Cryptocurrency Theft, Faces 22 Years in Prison</news:title>
      <news:keywords>Scattered Spider, Tyler Buchanan, SIM swapping, cryptocurrency theft, phishing, cybercrime, cryptocurrency, hacking</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/athr-ai-platform-voice-phishing-mo74</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T11:31:18.648Z</news:publication_date>
      <news:title>ATHR AI Platform - Automates Voice Phishing Operations</news:title>
      <news:keywords>ATHR, voice phishing, AI, cybercrime, vishing</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/handling-cve-flood-with-epss-mo74</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T11:30:53.654Z</news:publication_date>
      <news:title>Handling the CVE Flood - Understanding the Challenge</news:title>
      <news:keywords></news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/fud-crypt-microsoft-signed-malware-mo72</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T10:31:38.560Z</news:publication_date>
      <news:title>FUD Crypt - Hackers Generate Microsoft-Signed Malware</news:title>
      <news:keywords>FUD Crypt, Microsoft, malware-as-a-service, DLL sideloading, C2</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/network-background-noise-predicts-edge-device-vulnerability-mo72</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T10:31:16.950Z</news:publication_date>
      <news:title>Network Background Noise - Predicts Edge-Device Vulnerability</news:title>
      <news:keywords>GreyNoise, edge-device vulnerability, Cisco, Palo Alto Networks, Fortinet</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/syncthing-secure-private-file-synchronization-mo72</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T10:30:58.204Z</news:publication_date>
      <news:title>Syncthing - Secure and Private File Synchronization Tool</news:title>
      <news:keywords>Syncthing, file synchronization, open source, peer-to-peer, privacy</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/microsoft-teams-service-update-failures-mo70</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T10:01:37.008Z</news:publication_date>
      <news:title>Microsoft Teams - Service Update Causes Launch Failures, Rollback Underway</news:title>
      <news:keywords>Microsoft, Teams, service update, Microsoft Teams, Service Update, Launch Failures, Incident TM1283300</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/china-spy-alysa-liu-father-mo70</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T10:01:36.203Z</news:publication_date>
      <news:title>China&apos;s Surveillance of Alysa Liu and Her Father Exposed</news:title>
      <news:keywords>China, Alysa Liu, surveillance, Matthew Ziburis, Frank Liu</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/copilot-agentforce-prompt-injection-vulnerabilities-mo70</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T10:01:35.517Z</news:publication_date>
      <news:title>Prompt Injection Vulnerabilities in Copilot &amp; Agentforce</news:title>
      <news:keywords>Microsoft Copilot, Salesforce Agentforce, Prompt Injection, Data Exfiltration, Capsule Security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/notion-pages-leak-profile-photos-emails-mo6z</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T09:31:02.480Z</news:publication_date>
      <news:title>Notion Pages Expose Editors&apos; Profile Photos and Emails</news:title>
      <news:keywords>Notion, PII, data leak, email exposure, profile photos</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/eu-cloud-sovereignty-initiative-awards-180-million-mo6w</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T08:01:35.803Z</news:publication_date>
      <news:title>EU Cloud Sovereignty Initiative - €180 Million Awarded</news:title>
      <news:keywords>EU, cloud sovereignty, European Commission, cloud services, digital sovereignty</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/openai-codex-update-ai-capabilities-mo6r</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T05:31:36.933Z</news:publication_date>
      <news:title>OpenAI Codex Update - Expands AI Capabilities Across Apps</news:title>
      <news:keywords>OpenAI, Codex, ChatGPT, AI, macOS</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/smokedmeat-open-source-tool-cicd-attacks-mo6r</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T05:31:12.950Z</news:publication_date>
      <news:title>SmokedMeat - New Tool Demonstrates CI/CD Attack Scenarios</news:title>
      <news:keywords>SmokedMeat, CI/CD, Boost Security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/liongard-upgrades-liongardiq-ai-access-live-asset-data-mo6q</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T05:01:51.187Z</news:publication_date>
      <news:title>LiongardIQ - New AI Access and Enhanced Asset Intelligence</news:title>
      <news:keywords>LiongardIQ, AI integration, asset intelligence, network discovery, identity mapping</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/dungeons-and-daemons-cybersecurity-rpg-mo6k</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T02:31:23.241Z</news:publication_date>
      <news:title>Dungeons and Daemons - Experience Cybersecurity as a Game</news:title>
      <news:keywords>Dungeons and Daemons, TrustedSec, Red Team, Cybersecurity RPG</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/shared-dictionaries-compression-web-performance-mo6k</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T02:31:08.021Z</news:publication_date>
      <news:title>Shared Dictionaries - Enhancing Web Compression Efficiency</news:title>
      <news:keywords>Cloudflare, Shared Dictionaries, Compression, Web Performance</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/human-trust-ai-agents-mo65</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T19:31:02.955Z</news:publication_date>
      <news:title>Human Trust in AI Agents - New Research Explores Expectations</news:title>
      <news:keywords>AI, LLMs, strategic games, human behavior, trust</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/vercel-breach-hackers-selling-stolen-data-mo62</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T18:01:36.415Z</news:publication_date>
      <news:title>Vercel Breach - Hackers Claim to Sell Stolen Data for $2 Million</news:title>
      <news:keywords>Vercel, ShinyHunters, data breach, cybersecurity, OAuth, Data Breach, Context.ai, Google Workspace</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/apple-account-change-alerts-phishing-emails-mo5z</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T16:31:20.914Z</news:publication_date>
      <news:title>Apple Account Change Alerts - Phishing Emails Exploited</news:title>
      <news:keywords>Apple, phishing, callback phishing, email scams</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ai-vendors-responsibility-for-vulnerabilities-mo5p</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T12:01:21.655Z</news:publication_date>
      <news:title>AI Vendors - Shrug Off Responsibility for Vulnerabilities</news:title>
      <news:keywords>Anthropic, Google, Microsoft, AI vulnerabilities, security flaws</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/poweroff-ddos-for-hire-takedown-arrests-mo5l</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T10:01:25.035Z</news:publication_date>
      <news:title>DDoS-for-Hire Takedown - Four Arrested in Global Operation</news:title>
      <news:keywords>DDoS, PowerOFF, Vac Stresser, Mythical Stress, Europol, Cybercrime, Law Enforcement, Operation PowerOFF</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ai-search-hybrid-retrieval-agents-mo5k</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T09:31:39.767Z</news:publication_date>
      <news:title>AI Search - Enhancing Agent Retrieval with Hybrid Search</news:title>
      <news:keywords>AI Search, Hybrid Search, Agents SDK, Cloudflare</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/microsoft-announces-extended-security-updates-mo5h</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-19T08:02:09.885Z</news:publication_date>
      <news:title>Microsoft Announces Extended Security Updates for Legacy Products</news:title>
      <news:keywords>Microsoft, Exchange Server, Skype for Business</news:keywords>
    </news:news>
  </url>
</urlset>