<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
  <url>
    <loc>https://cyberpings.com/article/execution-gap-enterprise-digital-resilience-mo0d</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T18:31:21.975Z</news:publication_date>
      <news:title>Execution Gap - Major Threat to Enterprise Digital Resilience</news:title>
      <news:keywords>Telstra International, digital resilience, cybersecurity, governance, Ecosystem Coordination</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/qualys-vmdr-totalcloud-oracle-cloud-marketplace-mo0d</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T18:31:20.302Z</news:publication_date>
      <news:title>Qualys VMDR and TotalCloud Now Available on Oracle Cloud</news:title>
      <news:keywords>Qualys VMDR, TotalCloud, Oracle Cloud Marketplace, cloud security, risk management</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/n8n-webhooks-abused-malware-phishing-emails-mo0c</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T18:01:38.638Z</news:publication_date>
      <news:title>n8n Webhooks Abused - Malware Delivered via Phishing Emails</news:title>
      <news:keywords>n8n, phishing, malware, Cisco Talos, automation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/manifold-security-launches-manifest-ai-platform-mo0c</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T18:01:29.764Z</news:publication_date>
      <news:title>Manifold Security - Launches Manifest AI Supply Chain Platform</news:title>
      <news:keywords>Manifold Security, Manifest AI, Supply Chain Intelligence, AI Agents, Data Exfiltration</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/insider-risk-management-business-value-mo0b</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T17:31:17.707Z</news:publication_date>
      <news:title>Insider Risk Management - Turning Security Spend into Value</news:title>
      <news:keywords>Mimecast, Insider Risk Management, Data Protection, Cybersecurity, Shadow IT</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/data-privacy-for-cisos-privacy-first-strategy-mo09</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T16:31:26.006Z</news:publication_date>
      <news:title>Data Privacy for CISOs - Building a Privacy-First Strategy</news:title>
      <news:keywords>CISO, data privacy, regulatory compliance, AI risks, privacy-by-design</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/microsoft-pays-2-3m-zero-day-quest-cloud-ai-flaws-mo09</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T16:31:17.356Z</news:publication_date>
      <news:title>Microsoft Pays $2.3M for Cloud and AI Flaws Identified</news:title>
      <news:keywords>Microsoft, Zero Day Quest, cloud vulnerabilities, AI security, bug bounty</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/autovista-ransomware-service-disruption-mo09</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T16:31:14.583Z</news:publication_date>
      <news:title>Autovista Ransomware Attack Causes Major Service Disruption</news:title>
      <news:keywords>Autovista, ransomware, cyber attack</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/amd-security-advisory-av26-355-mo09</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T16:31:13.874Z</news:publication_date>
      <news:title>AMD Security Advisory - Critical Vulnerabilities Identified</news:title>
      <news:keywords>AMD EPYC, AMD Ryzen, vulnerabilities, security advisory, SMI Handler</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/enisa-seeks-top-tier-status-cve-program-mo08</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T16:01:30.674Z</news:publication_date>
      <news:title>ENISA Seeks Top-Tier Status in CVE Program for EU</news:title>
      <news:keywords>ENISA, CVE Program, CISA, MITRE, EU Cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/microsoft-salesforce-patch-ai-agent-data-leak-flaws-mo08</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T16:01:18.495Z</news:publication_date>
      <news:title>Microsoft and Salesforce Fix Critical Data Leak Flaws</news:title>
      <news:keywords>Salesforce, Microsoft, Copilot, Agentforce, data leak</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/eff-calls-kuwait-release-journalist-ahmed-shihab-eldin-mo07</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T15:31:01.899Z</news:publication_date>
      <news:title>EFF Calls on Kuwait to Release Journalist Ahmed Shihab-Eldin</news:title>
      <news:keywords>Ahmed Shihab-Eldin, Kuwait, free speech, EFF, journalism</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/windows-task-host-vulnerability-exploited-mo06</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T15:01:47.097Z</news:publication_date>
      <news:title>Windows Task Host Vulnerability - CISA Flags Active Exploits</news:title>
      <news:keywords>CVE-2025-60710, Windows Task Host, CISA, Microsoft, Privilege Escalation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/add-voice-to-your-agent-sdk-mo05</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T14:31:31.732Z</news:publication_date>
      <news:title>Add Voice to Your Agent - New SDK Feature Released</news:title>
      <news:keywords>Agents SDK, Cloudflare, voice interaction</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/runtime-context-vulnerability-management-mo05</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T14:31:25.028Z</news:publication_date>
      <news:title>Vulnerabilities - Using Runtime Context for Better Management</news:title>
      <news:keywords>CVE, OpenSSF, runtime security, static analysis, vulnerability management</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/broadcom-introduces-zero-trust-runtime-ai-agents-mo04</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T14:02:05.523Z</news:publication_date>
      <news:title>Broadcom Introduces Zero-Trust Runtime for Scalable AI Agents</news:title>
      <news:keywords>Broadcom, VMware Tanzu, AI agents, zero-trust, cloud security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/scanning-for-ai-models-probes-reported-mo04</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T14:01:33.133Z</news:publication_date>
      <news:title>AI Security - Probes Detected for Various AI Models</news:title>
      <news:keywords>DShield, AI models, probes, Hugging Face, Claude</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/youtube-copyright-notices-phishing-scam-mo04</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T14:01:32.259Z</news:publication_date>
      <news:title>YouTube Copyright Scam - Phishing Attack Targets Creators</news:title>
      <news:keywords>YouTube, Google, phishing, copyright scam, credential theft</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/french-cops-free-mother-son-crypto-kidnap-mo04</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T14:01:25.070Z</news:publication_date>
      <news:title>French Cops Free Mother and Son from Crypto Kidnapper</news:title>
      <news:keywords>kidnapping, cryptocurrency, extortion, France, GIGN</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/hardening-github-actions-security-guide-mo04</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T14:01:14.685Z</news:publication_date>
      <news:title>GitHub Actions - Updated Guide for Enhanced Security</news:title>
      <news:keywords>GitHub Actions, security, workflow, TeamPCP, Axios</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/capsule-security-ai-agents-runtime-monitoring-mo04</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T14:01:07.010Z</news:publication_date>
      <news:title>Capsule Security - Secures AI Agents With New Funding and Expert Backing</news:title>
      <news:keywords>Capsule Security, AI agents, runtime monitoring, seed funding, data exfiltration, AI Security, Funding, Vulnerabilities, Cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ciso-conversations-ross-mckerchar-sophos-mo03</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T13:31:38.606Z</news:publication_date>
      <news:title>CISO Conversations - Insights from Sophos&apos; Ross McKerchar</news:title>
      <news:keywords>Sophos, CISO, Ross McKerchar, AI threats, cybersecurity leadership</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/bitdefender-gravityzone-email-threat-protection-mo03</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T13:31:03.855Z</news:publication_date>
      <news:title>Bitdefender - Launches GravityZone Email Threat Protection</news:title>
      <news:keywords>Bitdefender, GravityZone, email security, phishing, BEC</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/industrial-automation-threat-landscape-q4-2025-mo02</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T13:01:28.443Z</news:publication_date>
      <news:title>Industrial Automation Threat Landscape - Q4 2025 Insights</news:title>
      <news:keywords>Backdoor.MSIL.XWorm, industrial automation, malware, phishing, Kaspersky</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/axonius-updates-asset-cloud-ai-exposure-management-mo02</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T13:01:23.619Z</news:publication_date>
      <news:title>Axonius Updates Asset Cloud with AI and Exposure Management</news:title>
      <news:keywords>Axonius, AI, IoT, OT, exposure management</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/sweden-pro-russian-hackers-thermal-power-plant-mo01</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T12:31:00.742Z</news:publication_date>
      <news:title>Pro-Russian Hackers Target Sweden&apos;s Thermal Power Plant</news:title>
      <news:keywords>pro-Russian hackers, Öresundsverket, Uniper, Russian intelligence, critical infrastructure, cybersecurity, Russia, energy sector, cyberattack, hackers</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/rise-of-network-shutdowns-mo00</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T12:01:35.547Z</news:publication_date>
      <news:title>Network Shutdowns - A Growing Tool for Government Control</news:title>
      <news:keywords>internet shutdowns, civil rights, telecommunications, government control, digital rights</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/bitlocker-key-prompts-windows-server-2025-mo00</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T12:01:28.975Z</news:publication_date>
      <news:title>BitLocker Key Prompts - Microsoft Confirms Recovery Issues</news:title>
      <news:keywords>BitLocker, Windows Server 2025, KB5082063, Microsoft, TPM</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ai-companies-role-in-cve-program-mnzx</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T11:01:48.480Z</news:publication_date>
      <news:title>AI Companies - Enhancing Their Role in CVE Program</news:title>
      <news:keywords>CISA, CVE program, AI vulnerabilities, OpenAI, Anthropic</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/adware-hackers-control-25k-endpoints-mnzx</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T11:01:42.450Z</news:publication_date>
      <news:title>Adware - Hackers Could Control 25,000 Endpoints Worldwide</news:title>
      <news:keywords>adware, malware, Huntress, Dragon Boss Solutions, OT networks</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/sitehop-safe-core-edge-post-quantum-encryption-mnzx</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T11:01:31.385Z</news:publication_date>
      <news:title>Sitehop Launches SAFEcore Edge for Post-Quantum Encryption</news:title>
      <news:keywords>SAFEcore Edge, post-quantum encryption, Sitehop, quantum-resistant security, critical infrastructure</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ciso-gigs-equal-rsac-interviews-eset-mimecast-mnzx</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T11:01:30.705Z</news:publication_date>
      <news:title>CISO Roles Explored - Insights from ESET and Mimecast</news:title>
      <news:keywords>CISO, ESET, Mimecast, ransomware, cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/nwhstealer-infostealer-distributed-vpn-sites-gaming-mods-mnzx</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T11:01:17.630Z</news:publication_date>
      <news:title>NWHStealer - Infostealer Spreads via Fake VPN Sites</news:title>
      <news:keywords>NWHStealer, infostealer, malware, Proton VPN, DLL hijacking</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/microsoft-fixes-windows-server-2025-upgrade-issue-mnzw</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T10:31:17.095Z</news:publication_date>
      <news:title>Microsoft Fixes Windows Server 2025 Upgrade Issue</news:title>
      <news:keywords>Windows Server 2019, Windows Server 2022, Windows Server 2025</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/uk-big-tech-national-security-risk-mnzw</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T10:31:09.271Z</news:publication_date>
      <news:title>UK&apos;s Big Tech Dependency Now Poses National Security Risk</news:title>
      <news:keywords>UK, Big Tech, Open Rights Group, digital sovereignty, CLOUD Act</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/deepfake-nudes-crisis-schools-analysis-mnzw</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T10:31:07.381Z</news:publication_date>
      <news:title>Deepfake Nudes Crisis - Schools Face Growing AI Threat</news:title>
      <news:keywords>deepfake, AI, child protection, nudification, school safety</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/board-level-definition-cyber-resilience-mnzu</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T09:31:44.073Z</news:publication_date>
      <news:title>Cyber Resilience - Need for Board-Level Definition Explained</news:title>
      <news:keywords>cyber resilience, governance, regulatory frameworks, board responsibility, organizational outcomes</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/credit-resources-vault-scam-alert-mnzu</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T09:31:34.384Z</news:publication_date>
      <news:title>Credit Resources Vault - Scam Alert for Financial Vulnerability</news:title>
      <news:keywords>Credit Resources Vault, scam, phishing, data breach, financial fraud</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/eff-hope-26-conference-2026-mnzu</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T09:31:14.465Z</news:publication_date>
      <news:title>EFF at HOPE 26 - Join Us for Digital Rights Discussions</news:title>
      <news:keywords>EFF, HOPE 26, digital rights, free speech, privacy</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/raspberry-pi-os-6-2-passwordless-sudo-disabled-mnzt</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T09:01:37.310Z</news:publication_date>
      <news:title>Raspberry Pi OS 6.2 - Passwordless Sudo Disabled by Default</news:title>
      <news:keywords>Raspberry Pi OS, passwordless sudo, Trixie, Linux, security update</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/real-time-signals-autonomous-cloud-ops-mnzs</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T08:31:44.974Z</news:publication_date>
      <news:title>Real-Time Signals - Transforming Autonomous Cloud Operations</news:title>
      <news:keywords>cloud security, autonomous operations, real-time signals, Harvendra Singh, AI</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ics-patch-tuesday-industrial-security-advisories-mnzq</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T07:31:27.657Z</news:publication_date>
      <news:title>ICS Vulnerabilities - 8 Industrial Giants Release Advisories</news:title>
      <news:keywords>Siemens, Schneider Electric, Aveva, Rockwell Automation, Mitsubishi Electric</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/legitify-open-source-scanner-security-misconfigurations-mnzm</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T05:32:05.650Z</news:publication_date>
      <news:title>Legitify - Open-Source Scanner for Security Misconfigurations</news:title>
      <news:keywords>Legitify, GitHub, GitLab, open-source, security misconfigurations</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/eu-coordinated-vulnerability-disclosure-obligation-mnzm</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T05:31:37.355Z</news:publication_date>
      <news:title>EU Mandates Coordinated Vulnerability Disclosure - A Cultural Shift</news:title>
      <news:keywords>CVE, ENISA, Cyber Resilience Act, NIS2, vulnerability disclosure</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/dragon-boss-solutions-supply-chain-attack-mnzm</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T05:31:15.680Z</news:publication_date>
      <news:title>25,000+ Endpoints Exposed in Dragon Boss Solutions Attack</news:title>
      <news:keywords>Dragon Boss Solutions, supply chain attack, adware, endpoints exposed, security alerts</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/april-patch-tuesday-zero-day-vulnerabilities-mnzi</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T04:02:19.601Z</news:publication_date>
      <news:title>April Patch Tuesday - Critical Vulnerabilities Uncovered, Including Two Zero-Days</news:title>
      <news:keywords>CVE-2026-32201, CVE-2026-33824, CVE-2026-33826, CVE-2026-33827, CVE-2026-33825, Microsoft, Patch Tuesday, Vulnerabilities, Security, Zero-Day</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/risky-business-mythos-cisa-adobe-mnzi</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T04:01:53.674Z</news:publication_date>
      <news:title>Risky Business - The Great Mythos Freakout of 2026</news:title>
      <news:keywords>CISA, Adobe, Claude Mythos</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/network-segmentation-projects-fail-patterns-mnzi</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T04:01:29.239Z</news:publication_date>
      <news:title>Network Segmentation Projects - Common Failure Patterns Revealed</news:title>
      <news:keywords>network segmentation, survey, IT project management, failure patterns, enterprise networks</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/curity-reinvent-iam-runtime-authorization-ai-agents-mnzh</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T03:31:11.302Z</news:publication_date>
      <news:title>Curity Reinvents IAM with Runtime Authorization for AI Agents</news:title>
      <news:keywords>Curity, Identity Access Management, AI agents, Access Intelligence, OAuth</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/big-tech-ignores-user-opt-out-requests-mnzc</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T01:01:28.158Z</news:publication_date>
      <news:title>Big Tech Ignoring User Opt-Out Requests - New Research Revealed</news:title>
      <news:keywords>California Consumer Privacy Act, Global Privacy Control, Google, Microsoft, Meta</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cisa-cancels-summer-internships-cyber-scholarship-mnz9</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T23:31:19.381Z</news:publication_date>
      <news:title>CISA Cancels Summer Internships for Cyber Scholarship Students</news:title>
      <news:keywords>CISA, DHS, Scholarship for Service, National Science Foundation, cybersecurity internships</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/microsoft-exchange-server-security-best-practices-mnz8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T23:05:14.854Z</news:publication_date>
      <news:title>Microsoft Exchange Server - Security Best Practices Released</news:title>
      <news:keywords>Microsoft Exchange, CISA, NSA, Cyber Centre, ASD</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/mitigating-risks-bulletproof-hosting-providers-mnz8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T23:04:29.941Z</news:publication_date>
      <news:title>Guidance Released on Mitigating Bulletproof Hosting Risks</news:title>
      <news:keywords>CISA, Cyber Centre, BPH providers, FBI, NSA</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cyber-threat-canada-water-systems-assessment-mitigation-mnz8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T23:03:53.950Z</news:publication_date>
      <news:title>Cyber Threat to Canada’s Water Systems - Assessment &amp; Mitigation</news:title>
      <news:keywords>Canada, water systems, cyber threats, state-sponsored actors, cybercriminals</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/brickstorm-malware-analysis-report-mnz8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T23:03:11.484Z</news:publication_date>
      <news:title>Brickstorm Malware - Joint Analysis Report Released</news:title>
      <news:keywords>Brickstorm, CISA, NSA, PRC, malware analysis</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/mercor-breach-lawsuits-litellm-mnz8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T23:02:12.414Z</news:publication_date>
      <news:title>Mercor Faces Multiple Lawsuits After Data Breach Incident</news:title>
      <news:keywords>Mercor, LiteLLM, data breach, class-action lawsuit, personal identifiable information</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/us-tech-force-opm-cybersecurity-hiring-mnz8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T23:01:42.319Z</news:publication_date>
      <news:title>US Tech Force - OPM Launches Cybersecurity Hiring Initiative</news:title>
      <news:keywords>US Tech Force, OPM, cybersecurity hiring, federal agencies, mentorship</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/german-cybercrime-operator-arrested-thailand-mnz8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T23:01:30.428Z</news:publication_date>
      <news:title>German Cybercrime Operator Arrested in Thailand</news:title>
      <news:keywords>Noah Christopher, cybercrime-as-a-service, Neldowner, Fluxstress, DDoS attacks</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/microsoft-windows-protections-malicious-rdp-files-mnz7</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T22:31:05.762Z</news:publication_date>
      <news:title>Microsoft Enhances Windows Protections Against RDP Threats</news:title>
      <news:keywords>Remote Desktop Protocol, phishing, Microsoft, RDP files, APT29</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/microsoft-office-web-apps-sensitivity-labels-update-mnz7</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T22:31:01.768Z</news:publication_date>
      <news:title>Microsoft Office Web Apps - New Sensitivity Labels Feature</news:title>
      <news:keywords>Microsoft, Office, sensitivity labels</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/windows-adobe-acrobat-vulnerabilities-exploited-mnz6</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T22:02:20.433Z</news:publication_date>
      <news:title>Windows and Adobe Acrobat Vulnerabilities - Exploitation Alert</news:title>
      <news:keywords>CVE-2023-36424, CVE-2025-60710, CVE-2020-9715, Adobe Acrobat, Microsoft Windows, Windows, CISA, Vulnerabilities, Cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/kraken-extorted-hackers-insider-breach-mnz6</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T22:01:25.771Z</news:publication_date>
      <news:title>Kraken Extorted by Hackers After Insider Breach Incident, Ransom Demand Issued</news:title>
      <news:keywords>Kraken, Insider Threat, Extortion, Customer Data, Cybercrime, Blackmail, CryptoCurrency</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cisos-revamp-security-programs-claude-mythos-mnz4</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T21:31:18.848Z</news:publication_date>
      <news:title>CISOs - Revamp Security Programs Following Claude Mythos</news:title>
      <news:keywords>Claude Mythos, AI vulnerabilities, Cloud Security Alliance, CISO recommendations, Project Glasswing</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/france-digital-sovereignty-breach-adobe-patch-mnz4</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T21:31:17.024Z</news:publication_date>
      <news:title>France&apos;s Digital Sovereignty Push Amidst Targeted Breaches</news:title>
      <news:keywords>Booking.com, Adobe, SAP, ViperTunnel, Predator spyware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/test-networks-ddos-attacks-peak-loads-mnz3</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T21:01:53.626Z</news:publication_date>
      <news:title>Testing Networks - Preparing for DDoS Attacks During Peaks</news:title>
      <news:keywords></news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/commvault-ai-protect-roll-back-rogue-agents-mnz3</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T21:01:22.231Z</news:publication_date>
      <news:title>Commvault&apos;s AI Protect - Roll Back Rogue AI Agents</news:title>
      <news:keywords>Commvault, AI Protect, AWS, Azure, GCP</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/questions-ask-outsourcing-mdr-mnz2</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T20:31:23.664Z</news:publication_date>
      <news:title>Outsourcing MDR - 4 Key Questions for Cyber Resilience</news:title>
      <news:keywords>Managed Detection and Response, MDR, cyber resilience, N-able, security teams</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ai-impact-cyber-compliance-space-force-mnz2</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T20:31:19.177Z</news:publication_date>
      <news:title>AI&apos;s Impact on Cyber Compliance - Space Force Official Insights</news:title>
      <news:keywords>AI, Cyber Compliance, Space Force, Large Language Models, Cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/russia-blocks-bluesky-social-media-mnz1</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T20:02:00.992Z</news:publication_date>
      <news:title>Russia Blocks Bluesky Social Media Amid Internet Crackdown</news:title>
      <news:keywords>Bluesky, Roskomnadzor, Russia, internet censorship, VPN</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/janaware-ransomware-targeting-turkey-mnz1</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T20:01:35.788Z</news:publication_date>
      <news:title>JanaWare Ransomware - Targeting Turkish Citizens Revealed</news:title>
      <news:keywords>JanaWare, Acronis, Adwind, ransomware, Turkey</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/mcgraw-hill-data-breach-extortion-threat-mnyz</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T19:01:40.980Z</news:publication_date>
      <news:title>McGraw-Hill Data Breach - Extortion Threat Confirmed</news:title>
      <news:keywords>McGraw-Hill, Salesforce, ShinyHunters</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/telegram-hosts-xinbi-guarantee-crypto-scam-mnyz</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T19:01:19.792Z</news:publication_date>
      <news:title>Telegram - Hosts $21 Billion Crypto Scammer Black Market</news:title>
      <news:keywords>Xinbi Guarantee, Telegram, crypto scams, human trafficking, UK sanctions</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/recorded-future-new-packaging-2026-mnyz</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T19:01:15.111Z</news:publication_date>
      <news:title>Recorded Future - New Solutions and Packages for 2026</news:title>
      <news:keywords>Recorded Future, cyber operations, digital risk protection, third-party risk, payment fraud</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/security-risk-advisors-purple-team-cpe-credits-mnyy</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T18:31:15.601Z</news:publication_date>
      <news:title>Security Risk Advisors - Purple Team Earns CPE Credits</news:title>
      <news:keywords>CPE credits, Purple Team, SRA, GIAC, ISC2, CPE Credits, Cybersecurity Training</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/improper-enforcement-locked-accounts-kiuwan-sast-mnyw</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T17:32:21.991Z</news:publication_date>
      <news:title>Kiuwan SAST - Improper Enforcement of Locked Accounts</news:title>
      <news:keywords>CVE-2026-24069, Kiuwan SAST, SSO, SEC Consult, vulnerability</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cisa-warns-microsoft-exchange-windows-clfs-vulnerabilities-mnyv</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T17:02:54.867Z</news:publication_date>
      <news:title>CISA Warns of Microsoft Exchange and Windows CLFS Vulnerabilities</news:title>
      <news:keywords>CVE-2023-21529, CVE-2023-36424, Microsoft Exchange, Windows CLFS, CISA</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/etcd-auth-bypass-vulnerability-cve-2026-33413-mnyv</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T17:01:47.927Z</news:publication_date>
      <news:title>etcd Auth Bypass Vulnerability - Critical Flaw Exposed</news:title>
      <news:keywords>CVE-2026-33413, etcd, Kubernetes, authentication bypass, Strix</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/fake-ledger-live-app-crypto-theft-mnyv</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T17:01:27.423Z</news:publication_date>
      <news:title>Fake Ledger Live App - $9.5M Cryptocurrency Theft Alert</news:title>
      <news:keywords>Ledger Live, cryptocurrency, Apple App Store</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/secure-enterprise-virtual-desktops-mnyu</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T16:32:06.627Z</news:publication_date>
      <news:title>Securing Enterprise Virtual Desktops - Seven Best Practices</news:title>
      <news:keywords>virtual desktop infrastructure, VDI security, remote access, endpoint protection, network segmentation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/eff-investigates-google-deceptive-practice-mnyu</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T16:31:43.824Z</news:publication_date>
      <news:title>EFF Investigates Google - Broken Promise to Users Exposed</news:title>
      <news:keywords>Google, EFF, privacy, law enforcement, data disclosure</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/black-basta-affiliates-launch-intrusion-campaign-mnyu</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T16:30:58.877Z</news:publication_date>
      <news:title>Black Basta Affiliates Launch Fast-Scale Intrusion Campaign</news:title>
      <news:keywords>Black Basta, social engineering, data theft, ransomware, ReliaQuest</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ai-pushpaganda-scam-google-discover-scareware-ad-fraud-mnyt</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T16:01:47.614Z</news:publication_date>
      <news:title>AI-Driven Pushpaganda Scam Spreads Scareware via Google</news:title>
      <news:keywords>Google Discover, AI-generated content, scareware, ad fraud, Pushpaganda</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/openssl-4-0-0-release-deprecated-protocols-post-quantum-mnyt</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T16:01:36.499Z</news:publication_date>
      <news:title>OpenSSL 4.0.0 - Deprecated Protocols Removed, Gains Support</news:title>
      <news:keywords>OpenSSL, Encrypted Client Hello, post-quantum support</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/varonis-atlas-enables-iso-iec-42001-compliance-mnyt</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T16:01:22.313Z</news:publication_date>
      <news:title>Varonis Atlas - Enabling ISO/IEC 42001 Compliance for AI</news:title>
      <news:keywords>Varonis Atlas, ISO/IEC 42001, AI governance, risk management, compliance</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/microsoft-fast-track-reinstate-windows-dev-accounts-mnyt</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T16:01:21.509Z</news:publication_date>
      <news:title>Microsoft - Fast-Track Process to Reinstate Developer Accounts</news:title>
      <news:keywords>Microsoft, Windows Hardware Program, suspended accounts, identity verification, developer access</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cisos-innovate-talent-retention-job-satisfaction-declines-mnys</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T15:31:14.876Z</news:publication_date>
      <news:title>CISOs Urged to Innovate Talent Retention Amid Job Declines</news:title>
      <news:keywords>IANS, cybersecurity, talent retention, job satisfaction, CISO</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/brute-force-cyberattacks-middle-east-surge-q1-mnys</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T15:31:11.119Z</news:publication_date>
      <news:title>Brute-Force Cyberattacks Surge in Middle East - Q1 Report</news:title>
      <news:keywords>SonicWall, Fortinet, Brute-force attacks, cybersecurity, brute-force attacks, Middle East, cyber threats</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/claroty-advances-cps-security-visibility-orchestration-xdome-mnyo</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T14:01:38.170Z</news:publication_date>
      <news:title>Claroty Advances CPS Security with Visibility Orchestration</news:title>
      <news:keywords>Claroty, CPS security, Visibility Orchestration, xDome, AI-driven data</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/state-sponsored-threats-2025-review-mnyo</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T14:01:36.387Z</news:publication_date>
      <news:title>State-Sponsored Threats - Insights from 2025 Year in Review</news:title>
      <news:keywords>China, Russia, North Korea, Iran, Talos</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/benchmarking-self-hosted-llms-offensive-security-mnyo</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T14:01:20.392Z</news:publication_date>
      <news:title>Self-Hosted LLMs - Benchmarking for Offensive Security</news:title>
      <news:keywords>LLM, penetration testing, AI, Juice Shop, offensive security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cloudflare-mcp-adoption-architecture-mnyn</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T13:31:35.420Z</news:publication_date>
      <news:title>Cloudflare&apos;s MCP Adoption - Enhancing Security and Efficiency</news:title>
      <news:keywords>Cloudflare, MCP, AI Gateway, Access, Shadow MCP</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cloudflare-mesh-secure-private-networking-mnyn</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T13:31:19.059Z</news:publication_date>
      <news:title>Cloudflare Mesh - Introducing Secure Private Networking</news:title>
      <news:keywords>Cloudflare, Cloudflare Mesh, private networking, Zero Trust, SASE</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/securing-non-human-identities-oauth-scoped-permissions-mnyn</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T13:31:13.223Z</news:publication_date>
      <news:title>Securing Non-Human Identities - Enhancing OAuth and Permissions</news:title>
      <news:keywords>Cloudflare, OAuth, API tokens, credential leakage, least privilege</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/plugx-usb-worm-dll-sideloading-mnyn</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T13:31:12.528Z</news:publication_date>
      <news:title>PlugX USB Worm - Spreading Globally via DLL Sideloading</news:title>
      <news:keywords>PlugX, DLL Sideloading, Mustang Panda, Sophos, USB Worm, malware, DLL sideloading, USB threat, APT</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/oligo-runtime-exploit-blocking-detection-mnyn</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T13:31:11.422Z</news:publication_date>
      <news:title>Oligo Launches Real-Time Exploit Detection and Blocking</news:title>
      <news:keywords>Oligo Security, Runtime Exploit Blocking, Application Security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/codex-hacks-samsung-tv-root-exploiting-driver-interfaces-mnym</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T13:02:13.610Z</news:publication_date>
      <news:title>Codex Hacks Samsung TV - Privilege Escalation Exploit Revealed</news:title>
      <news:keywords>Samsung, Codex, Tizen, Kernel Driver, Privilege Escalation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/davmail-6-6-0-patches-regex-flaw-mnym</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T13:01:49.504Z</news:publication_date>
      <news:title>DavMail 6.6.0 - Patches Regex Flaw and Updates Backend</news:title>
      <news:keywords>DavMail, Microsoft Graph, regex vulnerability</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/omnistealer-blockchain-malware-stealing-credentials-mnyl</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T12:31:38.190Z</news:publication_date>
      <news:title>Omnistealer - New Malware Steals Everything via Blockchain</news:title>
      <news:keywords>Omnistealer, malware, password managers, crypto wallets, cloud storage</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/china-linked-cloud-credential-heist-mnyl</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T12:31:34.112Z</news:publication_date>
      <news:title>China-linked Hackers Steal Cloud Credentials Using SMTP</news:title>
      <news:keywords>APT41, cloud security, Linux backdoor, credential theft, typosquatting</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/shadow-data-detection-reduce-cost-risk-cloud-mnyl</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T12:31:20.283Z</news:publication_date>
      <news:title>Shadow Data Detection - Reduce Cost and Risk in Cloud</news:title>
      <news:keywords>Wiz, Shadow Data Detection, Cloud Security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/datavisor-ai-agents-fraud-aml-operations-mnyl</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T12:31:11.267Z</news:publication_date>
      <news:title>DataVisor - New AI Agents Transform Fraud Prevention</news:title>
      <news:keywords>DataVisor, Vera, AI agents, financial crime, AML</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/hackers-weaponize-obsidian-shell-commands-plugin-mnyk</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T12:01:45.091Z</news:publication_date>
      <news:title>Hackers Exploit Obsidian Plugin for Attacks, Targeting Financial Sectors</news:title>
      <news:keywords>Obsidian, PHANTOMPULSE, malware attack, Shell Commands plugin, financial sector, malware, cybersecurity, social engineering</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/triad-nexus-evades-sanctions-cybercrime-mnyi</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T11:01:31.749Z</news:publication_date>
      <news:title>Triad Nexus - Evades Sanctions to Fuel Cybercrime Operations, Expands Tactics</news:title>
      <news:keywords>Triad Nexus, cybercrime, cryptocurrency fraud, sanctions evasion, brand impersonation, Cybercrime, Fraud, Cybersecurity, Scams, Sanctions</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/hackers-target-okta-identity-systems-vishing-mnyi</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T11:01:22.473Z</news:publication_date>
      <news:title>Hackers Target Okta Identity Systems Using Vishing Attacks</news:title>
      <news:keywords>Okta, vishing, identity theft, cloud security, social engineering</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/google-penalize-back-button-hijacking-mnyh</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T10:31:16.332Z</news:publication_date>
      <news:title>Google Penalizes Back Button Hijacking Practices</news:title>
      <news:keywords>Google, back button hijacking, spam policies</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/reverse-engineered-zero-day-disable-crowdstrike-edr-mnyg</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T10:02:49.299Z</news:publication_date>
      <news:title>Zero-Day Vulnerability - Researcher Disables CrowdStrike EDR</news:title>
      <news:keywords>CrowdStrike, BYOVD, zero-day, kernel driver, PoisonKiller</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/securing-software-owasp-spvs-mnyg</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T10:01:40.855Z</news:publication_date>
      <news:title>OWASP SPVS - Enhancing Software Security Standards Explained</news:title>
      <news:keywords>OWASP SPVS, Application Security, Supply Chain Security, Generative AI, AI Penetration Testing</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/rci-hospitality-reports-data-breach-mnyg</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T10:01:20.034Z</news:publication_date>
      <news:title>RCI Hospitality Reports Data Breach - Contractor Data Exposed</news:title>
      <news:keywords>RCI Hospitality, data breach, IDOR vulnerability, contractor data, SEC filing</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/fifa-world-cup-2026-email-fraud-risk-mnyf</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T09:31:09.403Z</news:publication_date>
      <news:title>FIFA World Cup 2026 - Official Partners Risk Email Fraud</news:title>
      <news:keywords>FIFA World Cup 2026, email fraud, DMARC, cybersecurity, Proofpoint</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/hybrid-attacks-increase-germany-nato-exercise-mnya</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T07:31:30.230Z</news:publication_date>
      <news:title>Hybrid Attacks - Rising Threats to Germany&apos;s Infrastructure</news:title>
      <news:keywords>Germany, NATO, Cybersecurity, Hybrid Attacks, Critical Infrastructure</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/psychology-of-information-security-review-mny9</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T07:01:33.655Z</news:publication_date>
      <news:title>Psychology of Information Security - A Comprehensive Review</news:title>
      <news:keywords>Leron Zinatullin, ISO 27001, COM-B model, Fogg Behaviour Model, nudge theory</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/zero-trust-year-two-challenges-mny8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T06:31:48.195Z</news:publication_date>
      <news:title>Zero Trust - Challenges and AI Agents at Year Two</news:title>
      <news:keywords>zero trust, AI agents, identity security, Oleria, Jim Alkove, Zero Trust, Identity Security, AI Agents, Cybersecurity, Access Management</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/agentic-ai-memory-attacks-explained-mny8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T06:31:23.061Z</news:publication_date>
      <news:title>Agentic AI Memory Attacks - Organizations Unprepared for Threats</news:title>
      <news:keywords>Agentic AI, MemoryTrap, Cisco, Claude Code, AI memory attacks</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/showdoc-rce-flaw-cve-2025-0520-exploitation-mny7</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T06:01:31.587Z</news:publication_date>
      <news:title>ShowDoc RCE Flaw CVE-2025-0520 Actively Exploited, Urgent Updates Required</news:title>
      <news:keywords>CVE-2025-0520, ShowDoc, remote code execution, cybersecurity, network security, software security, Threat Intelligence, Vulnerability, web security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/hacking-hospital-waspi-scams-mny1</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T03:04:52.818Z</news:publication_date>
      <news:title>Hacking Hospital Networks and WASPI Scams Exposed</news:title>
      <news:keywords>WASPI scams, Jeffrey Bowie, Oklahoma hospital, phishing, spyware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/high-street-retailers-cyber-attack-chaos-mny1</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T03:04:34.672Z</news:publication_date>
      <news:title>High Street Retailers Hit by Cyber Attacks - Chaos Ensues</news:title>
      <news:keywords>M&amp;S, Co-op, Harrods, cyber attack, Scattered Spider</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/sextortion-scams-discord-hijack-mny1</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T03:04:15.632Z</news:publication_date>
      <news:title>Sextortion Scams - Discord Hijack Exposed</news:title>
      <news:keywords>sextortion, Ledger, Discord, phishing, cryptocurrency</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/uk-legal-aid-hack-instagram-scams-mny1</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T03:03:57.875Z</news:publication_date>
      <news:title>UK Legal Aid Hack Exposes Sensitive Data Amid Instagram Scams</news:title>
      <news:keywords>UK Legal Aid, Instagram Scams, Data Exposure</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/google-privacy-hole-ice-scammers-mny1</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T03:03:39.520Z</news:publication_date>
      <news:title>Google Privacy Hole Exposed - ICE Scammers Target Migrants</news:title>
      <news:keywords>Google, ICE Scammers, Brute-force Attack, ICE, privacy, scams, cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/surveillance-spyware-self-driving-snafus-mny1</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T03:03:18.607Z</news:publication_date>
      <news:title>Surveillance - Drug Cartel Uses Spyware Against FBI</news:title>
      <news:keywords>Mexican drug cartel, FBI, surveillance technology, spyware, self-driving cars</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/call-of-duty-wwii-hijack-scammers-mny1</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T03:03:01.368Z</news:publication_date>
      <news:title>Call of Duty: WWII - Hackers Hijack PCs During Matches</news:title>
      <news:keywords>Call of Duty: WWII, Microsoft Game Pass, hijack, scammers, bail bond scam</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/2g-sms-scams-explained-mny1</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T03:02:40.997Z</news:publication_date>
      <news:title>2G SMS Scams - Why It&apos;s Time to Say Goodbye to 2G</news:title>
      <news:keywords>SMS scams, phishing, 2G network, cybercrime, scammers</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/tea-app-data-leak-70k-private-images-mny1</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T03:02:22.499Z</news:publication_date>
      <news:title>Tea App Data Leak - 70K Private Images Exposed</news:title>
      <news:keywords>Tea app, data leak, private images, chat logs, women&apos;s safety</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/eff-leaving-x-platform-digital-rights-mny1</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T03:01:30.739Z</news:publication_date>
      <news:title>EFF Leaves X - Digital Rights Advocacy Shift</news:title>
      <news:keywords>EFF, X, digital rights, Elon Musk, social media</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/burger-king-hack-ethical-hackers-trade-secrets-mny1</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T03:01:19.306Z</news:publication_date>
      <news:title>Burger King Hack - Ethical Hackers Expose Security Flaws</news:title>
      <news:keywords>Burger King, ethical hackers, trade secrets, AI, insider threats</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ransomware-gold-heist-shai-hulud-worm-mny1</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T03:01:02.167Z</news:publication_date>
      <news:title>Ransomware Enables €600,000 Gold Heist at Museum</news:title>
      <news:keywords>ransomware, Shai Hulud, Natural History Museum, npm packages, data theft</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/infodesk-breach-affecting-pharma-financial-firms-mnxs</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T23:02:34.232Z</news:publication_date>
      <news:title>InfoDesk Breach - Hacker Claims Data Sale from Pharma Firms</news:title>
      <news:keywords>InfoDesk, pharmaceuticals, financial firms, data breach, cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/experian-study-facial-recognition-skepticism-mnxq</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T22:02:24.817Z</news:publication_date>
      <news:title>Experian Study Reveals Deep Skepticism of Facial Recognition</news:title>
      <news:keywords>Experian, facial recognition, identity theft, AI, online fraud</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/android-banking-trojan-forced-labor-scam-mnxq</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T22:02:07.668Z</news:publication_date>
      <news:title>Android Banking Trojan - Linked to Forced Labor Scam</news:title>
      <news:keywords>Android banking trojan, forced labor scam, malware distribution, human trafficking, Infoblox</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/survey-92-fail-rotate-machine-credentials-mnxq</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T22:01:35.070Z</news:publication_date>
      <news:title>AI Security - 92% of Organizations Fail to Rotate Credentials</news:title>
      <news:keywords>SANS Institute, AI agents, credential rotation, security governance, identity management</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/fbi-disrupts-phishing-ring-openai-supply-chain-attack-mnxo</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T21:01:37.734Z</news:publication_date>
      <news:title>FBI Disrupts Major Phishing Ring Amid Cyber Threats</news:title>
      <news:keywords>FBI, OpenAI, Rockstar Games, Slack, North Korea</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ot-cryptographic-readiness-tools-mnxn</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T20:31:16.914Z</news:publication_date>
      <news:title>OT Asset Owners Face Cryptographic Readiness Challenges</news:title>
      <news:keywords></news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/critical-flaw-wolfssl-forged-certificate-mnxm</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T20:01:56.929Z</news:publication_date>
      <news:title>Critical Flaw in wolfSSL Library Enables Forged Certificates</news:title>
      <news:keywords>wolfSSL, CVE-2026-5194, ECDSA, cryptographic flaw, security vulnerability, vulnerability, security, cryptography</news:keywords>
    </news:news>
  </url>
</urlset>