<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
  <url>
    <loc>https://cyberpings.com/article/zsh-5-9-rce-exploit-mnrr</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T17:31:31.400Z</news:publication_date>
      <news:title>ZSH 5.9 Vulnerability - Remote Code Execution Exploit</news:title>
      <news:keywords>ZSH, RCE, Linux, Exploit, CVE</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/eurail-data-breach-impact-300000-people-mnrr</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T17:31:27.014Z</news:publication_date>
      <news:title>Eurail Data Breach - 300,000 People Affected by Hack</news:title>
      <news:keywords>Eurail, data breach, passport numbers, cybercrime, AWS</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/high-value-corporations-extortion-helpdesk-phishing-mnrr</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T17:31:23.368Z</news:publication_date>
      <news:title>New Extortion Crew Targets High-Value Corporations via Phishing</news:title>
      <news:keywords>UNC6783, phishing, Adobe, data breach, social engineering</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/treasury-cyber-threat-sharing-initiative-crypto-mnrr</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T17:31:15.399Z</news:publication_date>
      <news:title>Treasury Department Launches Cyber Threat Sharing for Crypto</news:title>
      <news:keywords>U.S. Treasury, cyber threat intelligence, cryptocurrency, cybersecurity, North Korean hackers</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/apache-activemq-rce-vulnerability-cve-2026-34197-mnrr</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T17:31:14.711Z</news:publication_date>
      <news:title>Apache ActiveMQ RCE Vulnerability - Decade-Old Flaw Discovered</news:title>
      <news:keywords>CVE-2026-34197, Apache ActiveMQ, Remote Code Execution, Horizon3.ai, Naveen Sunkavally</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/jumbo-website-manager-remote-code-execution-mnrr</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T17:31:13.372Z</news:publication_date>
      <news:title>Jumbo Website Manager - Remote Code Execution Vulnerability</news:title>
      <news:keywords>Jumbo Website Manager, Remote Code Execution, PHP, EDB-ID: 52504</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/mitigate-risks-cracked-software-mnrq</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T17:01:32.903Z</news:publication_date>
      <news:title>Cracked Software - 5 Ways to Mitigate Security Risks</news:title>
      <news:keywords>cracked software, malware, shadow IT, endpoint protection, user awareness</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/storm-2755-payroll-pirate-attacks-canadian-employees-mnrp</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T16:30:52.062Z</news:publication_date>
      <news:title>Storm-2755 - Investigating Payroll Pirate Attacks in Canada</news:title>
      <news:keywords>Storm-2755, payroll fraud, malvertising, AiTM, Microsoft</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/gpl-odorizers-gpl750-vulnerability-explained-mnro</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T16:02:04.644Z</news:publication_date>
      <news:title>GPL Odorizers GPL750 - Vulnerability Exposed Critical Flaw</news:title>
      <news:keywords>GPL Odorizers, CVE-2026-4436, Industrial Control Systems, Critical Manufacturing, Modbus</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/contemporary-controls-basc-20t-vulnerability-explained-mnrn</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T16:01:31.660Z</news:publication_date>
      <news:title>Contemporary Controls BASC 20T - Critical Vulnerability Exposed</news:title>
      <news:keywords>CVE-2025-13926, Contemporary Controls, BASC 20T, Sedona Alliance, Industrial Control Systems</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/stx-rat-targets-finance-sector-stealth-tactics-mnrn</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T16:01:29.122Z</news:publication_date>
      <news:title>STX RAT - Targets Finance Sector With Stealth Tactics</news:title>
      <news:keywords>STX RAT, remote access trojan, financial services, eSentire, cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/chevin-fleetwave-software-security-scare-mnrm</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T15:31:26.543Z</news:publication_date>
      <news:title>Chevin FleetWave Software Faces Major Outage After Incident</news:title>
      <news:keywords>Chevin Fleet Solutions, FleetWave, SaaS, Azure, cybersecurity incident</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/russia-accuses-journalist-aiding-cyberattacks-ukraine-mnrm</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T15:31:17.592Z</news:publication_date>
      <news:title>Russia Accuses Journalist of Aiding Cyberattacks for Ukraine</news:title>
      <news:keywords>Russia, Ukraine, FSB, Telegram, Radio Free Europe</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/best-practices-securing-aws-cloud-2026-mnrl</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T15:01:26.334Z</news:publication_date>
      <news:title>AWS Cloud Security - 12 Best Practices for 2026</news:title>
      <news:keywords>AWS, cloud security, best practices, encryption, IAM</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/hybrid-p2p-botnet-13-year-old-apache-rce-mnri</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T13:31:17.262Z</news:publication_date>
      <news:title>Hybrid P2P Botnet and 13-Year-Old Apache RCE Exposed</news:title>
      <news:keywords>Phorpiex Botnet, CVE-2026-34197, Apache ActiveMQ, UNC6783, Magecart</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/apple-intelligence-prompt-injection-vulnerability-mnri</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T13:31:17.191Z</news:publication_date>
      <news:title>Apple Intelligence - Researchers Expose Prompt Injection Flaw</news:title>
      <news:keywords>Apple Intelligence, prompt injection, Neural Exec, RSAC, machine learning</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/android-intent-redirection-vulnerability-engagesdk-mnri</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T13:31:10.501Z</news:publication_date>
      <news:title>Android Intent Redirection Vulnerability Exposes Millions</news:title>
      <news:keywords>EngageSDK, Android, intent redirection, vulnerability, Microsoft</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/mallory-contextual-threat-intelligence-platform-mnrh</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T13:01:38.334Z</news:publication_date>
      <news:title>Mallory Launches AI-Native Threat Intelligence Platform</news:title>
      <news:keywords>Mallory, threat intelligence, AI platform, CISO, security operations</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/edge-decay-failing-perimeter-modern-intrusions-mnrh</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T13:01:26.896Z</news:publication_date>
      <news:title>Edge Decay - Modern Intrusions Exploit Failing Perimeter</news:title>
      <news:keywords>edge devices, identity compromise, automation, zero-day vulnerabilities, APT15</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/rethinking-linux-security-operations-mnrh</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T13:01:16.276Z</news:publication_date>
      <news:title>Linux Security Operations - Rethinking for Better Outcomes</news:title>
      <news:keywords>Linux Security, Security Operations, DevSecOps, Vulnerability Management, AI-driven Remediation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/us-operation-evicts-russia-hacked-routers-mnrg</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T12:30:55.103Z</news:publication_date>
      <news:title>US Operation Evicts Russia from Hacked SOHO Routers</news:title>
      <news:keywords>Russia, SOHO routers, cyberattack, critical infrastructure</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/hackers-impersonate-linux-foundation-leader-slack-mnrf</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T12:01:36.046Z</news:publication_date>
      <news:title>Hackers Target Open Source Developers via Slack Impersonation</news:title>
      <news:keywords>Linux Foundation, Slack, malware, social engineering, OpenSSF</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/zephyr-energy-cyber-attack-funds-diversion-mnrf</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T12:01:09.639Z</news:publication_date>
      <news:title>Zephyr Energy - £700K Lost in Cyber Attack on Payments</news:title>
      <news:keywords>Zephyr Energy, contractor payment, cyber attack, funds diversion, cybercrime</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/penetration-testing-ot-networks-methodology-mnrf</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T12:01:09.345Z</news:publication_date>
      <news:title>Penetration Testing - Safely Assessing OT Networks</news:title>
      <news:keywords>penetration testing, Operational Technology, OT networks, nmap, cybersecurity methodology</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/mylovely-ai-data-leak-exposes-70000-prompts-mnre</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T11:31:10.967Z</news:publication_date>
      <news:title>MyLovely.AI Data Leak Exposes 70,000 User Prompts</news:title>
      <news:keywords>MyLovely.AI, data leak, sextortion, doxxing, NSFW content</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/testing-handbook-c-cpp-security-checklist-mnre</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T11:31:03.300Z</news:publication_date>
      <news:title>C and C++ Security Checklist - New Testing Handbook Chapter</news:title>
      <news:keywords>C++, C, Testing Handbook, security checklist, code review</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/intruder-agentless-container-image-scanning-mnre</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T11:30:54.979Z</news:publication_date>
      <news:title>Intruder Expands Cloud Security with Agentless Scanning</news:title>
      <news:keywords>Intruder, Container Image Scanning, AWS, Google Cloud, Azure</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/microsoft-cloud-security-issues-mnrd</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T11:01:25.421Z</news:publication_date>
      <news:title>Microsoft Cloud Security - Federal Review Raises Concerns</news:title>
      <news:keywords>Microsoft, cloud computing, cybersecurity, government, FedRAMP</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/hidden-roi-of-visibility-security-mnrd</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T11:01:21.104Z</news:publication_date>
      <news:title>Visibility - Enhancing Security Through Better Decisions</news:title>
      <news:keywords>visibility, data-driven decisions, user behavior, security monitoring, risk assessment</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/phishing-attack-google-storage-remcos-rat-mnrc</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T10:32:11.865Z</news:publication_date>
      <news:title>Phishing Attack - Google Storage Delivers Remcos RAT</news:title>
      <news:keywords>Remcos RAT, Google Cloud Storage, phishing, remote access trojan, cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/advenica-file-scanner-kiosk-usb-malware-mnrc</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T10:31:06.744Z</news:publication_date>
      <news:title>Advenica Launches File Scanner Kiosk for USB Malware Detection</news:title>
      <news:keywords>Advenica, File Scanner Kiosk, malware detection, USB security, antivirus</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cybercriminals-target-accountants-drain-russian-firms-mnrc</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T10:31:01.937Z</news:publication_date>
      <news:title>Cybercriminals Target Accountants - Millions Stolen from Firms</news:title>
      <news:keywords>Hive0117, DarkWatchman, phishing, Russian firms, accountants</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/politicians-increased-security-due-to-violence-threats-mnrc</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T10:30:59.958Z</news:publication_date>
      <news:title>Politicians Increase Security Spending Amid Rising Threats</news:title>
      <news:keywords>political violence, security spending, Public Service Alliance, campaign security, threats against politicians</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/meta-employee-downloads-30000-private-images-mnrc</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T10:30:59.319Z</news:publication_date>
      <news:title>Meta Employee Allegedly Downloads 30,000 Private Images</news:title>
      <news:keywords>Meta, data breach, insider threat</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/incident-responders-year-in-review-mnrb</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T10:01:19.999Z</news:publication_date>
      <news:title>Incident Responders - Leveraging Year in Review Insights</news:title>
      <news:keywords>Cisco Talos, Year in Review, incident response, cybersecurity preparedness, MFA attacks</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/certes-launches-v7-quantum-safe-encryption-mnrb</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T10:01:12.133Z</news:publication_date>
      <news:title>Certes Launches v7 Platform with Quantum-Safe Encryption</news:title>
      <news:keywords>post-quantum cryptography, Certes, data protection, hybrid cloud, edge computing</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/weak-at-the-seams-cybersecurity-risks-mnra</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T09:31:16.275Z</news:publication_date>
      <news:title>Cybersecurity Risks - Weaknesses in Interconnected Systems</news:title>
      <news:keywords>cybersecurity, digital transformation, systemic risk, interconnected infrastructure, CISO</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/keeper-security-expands-pam-browser-isolation-mnra</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T09:31:03.345Z</news:publication_date>
      <news:title>Keeper Security Expands PAM Browser Isolation Capabilities</news:title>
      <news:keywords>Keeper Security, Remote Browser Isolation, KeeperPAM, AI monitoring, zero-trust</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/whatsapp-username-feature-privacy-control-mnra</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T09:30:53.525Z</news:publication_date>
      <news:title>WhatsApp - New Username Feature Enhances Privacy Control</news:title>
      <news:keywords>WhatsApp, username feature, privacy, Meta, end-to-end encryption</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/tianjin-supercomputer-center-data-breach-mnr7</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T08:31:19.630Z</news:publication_date>
      <news:title>Tianjin Supercomputer Center - Massive Data Theft Claims</news:title>
      <news:keywords>Tianjin Supercomputer Center, data breach, cyber intrusion, sensitive information, China</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/sticky-note-security-gym-hall-of-horrors-mnr7</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T08:31:07.641Z</news:publication_date>
      <news:title>Sticky-note Security - Gym&apos;s 80s Horror Show Revealed</news:title>
      <news:keywords>gym security, default passwords, network security, fitness equipment, data protection</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/internet-exposed-ics-devices-security-risks-mnr6</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T08:01:13.598Z</news:publication_date>
      <news:title>Internet-Exposed ICS Devices Raise Security Risks</news:title>
      <news:keywords>ICS, Modbus, Schneider Electric, Industroyer, Stuxnet</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/roningloader-malware-campaign-evade-detection-mnr5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T07:31:45.134Z</news:publication_date>
      <news:title>RoningLoader - New Malware Campaign Evades Detection Tactics</news:title>
      <news:keywords>RoningLoader, DragonBreath, gh0st RAT, DLL side-loading, code injection</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/epic-halts-meta-facial-recognition-glasses-mnr5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T07:31:18.533Z</news:publication_date>
      <news:title>EPIC Calls to Halt Meta’s Facial Recognition Glasses Plans</news:title>
      <news:keywords>Meta, facial recognition, EPIC, Consumer Federation of America, privacy rights</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/quantum-security-bet-cryptographers-mnr5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T07:30:54.929Z</news:publication_date>
      <news:title>Cryptographers Bet $5,000 on Quantum Computing&apos;s Future Impact</news:title>
      <news:keywords>quantum computing, cryptography, post-quantum cryptography, Google, wager</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/silver-fox-valleyrat-fake-telegram-installer-mnr4</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T07:01:33.382Z</news:publication_date>
      <news:title>Silver Fox Campaign - ValleyRAT Hidden in Telegram Installer</news:title>
      <news:keywords>ValleyRAT, Silver Fox, APT group, malware campaign, remote access trojan</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/bitcoin-depot-hack-3-6-million-stolen-mnr4</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T07:01:20.759Z</news:publication_date>
      <news:title>Bitcoin Depot Hack - $3.6 Million Stolen by Cybercriminals</news:title>
      <news:keywords>Bitcoin Depot, cyberattack, cryptocurrency, hacker, data breach</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/microsoft-suspends-developer-accounts-open-source-projects-mnr4</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T07:01:11.932Z</news:publication_date>
      <news:title>Microsoft Suspends Developer Accounts for Open Source Projects</news:title>
      <news:keywords>Microsoft, open source, WireGuard, VeraCrypt, Windscribe</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/meta-business-manager-phishing-campaign-mnr2</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T06:01:06.559Z</news:publication_date>
      <news:title>Phishing Alert - Cybercriminals Exploit Meta Notifications</news:title>
      <news:keywords>Meta, phishing, Business Manager, SpiderLabs, cybercrime</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/asqav-open-source-sdk-ai-agent-governance-mnr0</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T05:01:23.338Z</news:publication_date>
      <news:title>Asqav - New Open-Source SDK for AI Agent Governance</news:title>
      <news:keywords>Asqav, AI governance, quantum security, open source, Python SDK</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/post-incident-review-best-practices-mnqy</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T04:01:26.097Z</news:publication_date>
      <news:title>Post-Incident Review - Essential Steps for Improvement</news:title>
      <news:keywords>Post-Incident Review, Incident Response, Cybersecurity, Security Best Practices, Root Cause Analysis</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/malaysia-cyber-threats-structural-shift-mnqn</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T23:01:33.775Z</news:publication_date>
      <news:title>Malaysia Faces Structural Shift in Cyber Threats Landscape</news:title>
      <news:keywords>APT41, Mustang Panda, Lazarus Group, FIN7, UNC6783</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/hackers-hide-credit-card-stealer-svg-trick-mnqn</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T23:01:28.455Z</news:publication_date>
      <news:title>Hackers Use Pixel-Large SVG Trick to Steal Credit Cards</news:title>
      <news:keywords>Magento, credit card skimmer, PolyShell vulnerability, Sansec, e-commerce</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/automation-nhi-security-risks-report-mnqn</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T23:01:03.261Z</news:publication_date>
      <news:title>Automation and NHI Security Risks - Key Findings Revealed</news:title>
      <news:keywords>Keeper Security, NHI, AI, automation, security risks</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/wireguard-microsoft-account-lockout-software-updates-mnql</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T22:01:35.616Z</news:publication_date>
      <news:title>WireGuard VPN Developer Locked Out by Microsoft Account, Wider Impact on Open Source Projects</news:title>
      <news:keywords>WireGuard, Microsoft, VeraCrypt, VPN, Windows, security, open-source, Open Source, Security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/criminal-wannabes-more-dangerous-than-pros-mnql</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T22:01:18.299Z</news:publication_date>
      <news:title>Criminal Wannabes - More Dangerous Than Cyber Pros, Says Ex-FBI Chief</news:title>
      <news:keywords>Cynthia Kaiser, ransomware, Pay2Key, Sicarii, Akira</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/unc6783-hackers-steal-zendesk-support-tickets-mnql</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T22:01:15.666Z</news:publication_date>
      <news:title>UNC6783 Hackers Steal Corporate Zendesk Support Tickets</news:title>
      <news:keywords>UNC6783, Zendesk, Raccoon, social engineering, data extortion</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/threat-actors-emojis-evade-detection-mnql</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T22:01:11.439Z</news:publication_date>
      <news:title>Threat Actors Use Emojis to Evade Detection Mechanisms</news:title>
      <news:keywords>emojis, threat actors, cybersecurity, ransom, malicious communication</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cloudflare-godaddy-rogue-ai-bots-mnql</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T22:01:06.935Z</news:publication_date>
      <news:title>Cloudflare and GoDaddy Unite Against Rogue AI Bots</news:title>
      <news:keywords>Cloudflare, GoDaddy, AI Crawl Control</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/sonicwall-sma1000-vulnerabilities-advisory-mnqj</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T21:01:25.898Z</news:publication_date>
      <news:title>SonicWall SMA1000 - Multiple Vulnerabilities Discovered, Immediate Patching Required</news:title>
      <news:keywords>SonicWall, SMA1000, security advisory, vulnerabilities, SQL injection, multi-factor authentication, vulnerability, patch</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/palo-alto-networks-security-advisory-av26-331-mnqi</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T20:31:21.497Z</news:publication_date>
      <news:title>Palo Alto Networks - Security Advisory AV26-331 Released</news:title>
      <news:keywords>Cortex XDR, Autonomous Digital Experience Manager, CVE-2026-0234</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/tiktok-removes-covert-networks-hungary-elections-mnqi</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T20:31:11.496Z</news:publication_date>
      <news:title>TikTok Removes Covert Networks Amid Hungary Election Concerns</news:title>
      <news:keywords>TikTok, disinformation, Hungary elections, Péter Magyar, Viktor Orbán</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/court-rules-copyright-cant-stop-access-to-law-mnqg</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T19:31:30.707Z</news:publication_date>
      <news:title>Court Rules Copyright Can’t Stop Access to Public Laws</news:title>
      <news:keywords>Copyright, Fair Use, Building Codes, Third Circuit, UpCodes</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/arelion-netscout-ddos-protection-mnqg</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T19:31:04.473Z</news:publication_date>
      <news:title>Arelion Enhances DDoS Protection with NETSCOUT Solutions</news:title>
      <news:keywords>Arelion, NETSCOUT, DDoS Protection, Cloud Connect, Threat Intelligence</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/lebanon-emergency-system-digital-infrastructure-crisis-mnqe</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T19:01:14.423Z</news:publication_date>
      <news:title>Lebanon&apos;s Emergency System - Digital Infrastructure Crisis</news:title>
      <news:keywords>Lebanon, digital infrastructure, emergency system, humanitarian crisis, Kamal Shehadi</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/trellix-enhances-data-security-for-generative-ai-mnqd</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T18:31:24.168Z</news:publication_date>
      <news:title>Trellix Enhances Data Security for Generative AI Era</news:title>
      <news:keywords>Trellix, Data Loss Prevention, Data Encryption, Generative AI, Database Security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/mitel-security-advisory-vulnerabilities-micollab-mnqc</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T18:02:48.541Z</news:publication_date>
      <news:title>Mitel Security Advisory - Vulnerabilities in MiCollab Exposed</news:title>
      <news:keywords>Mitel, MiCollab, security advisory</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/netscout-arbor-ddos-protection-g2-leader-badges-mnqc</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T18:01:29.776Z</news:publication_date>
      <news:title>NETSCOUT Arbor DDoS Protection Earns G2 Leader Badges</news:title>
      <news:keywords>NETSCOUT, Arbor Threat Mitigation System, DDoS Protection, G2 Leader Badges, Arbor Sightline</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/eurail-data-breach-passport-numbers-leaked-mnqc</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T18:01:17.470Z</news:publication_date>
      <news:title>Eurail Data Breach - Over 300,000 Passport Numbers Exposed</news:title>
      <news:keywords>Eurail, data breach, passport numbers, cybersecurity, personal information, Data Breach, Cybersecurity, Travel, Personal Information</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/anthropic-claude-mythos-zero-day-detection-mnqc</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T18:01:10.888Z</news:publication_date>
      <news:title>Claude Mythos - Unveils Zero-Day Detection Capabilities</news:title>
      <news:keywords>Claude Mythos, zero-day vulnerabilities, Project Glasswing, OpenBSD, FFmpeg</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/minnesota-national-guard-cyberattack-response-mnqb</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T17:31:13.332Z</news:publication_date>
      <news:title>Minnesota National Guard Deployed After Cyberattack Disrupts Services</news:title>
      <news:keywords>Minnesota National Guard, Winona County, cyberattack, FBI, ransomware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/teampcp-supply-chain-campaign-update-007-mnqb</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T17:31:05.105Z</news:publication_date>
      <news:title>TeamPCP Supply Chain Campaign - Cisco Source Code Stolen</news:title>
      <news:keywords>Cisco, TeamPCP, UNC6780, CISA, Trivy</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/hack-for-hire-spyware-campaign-targets-journalists-mnqa</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T17:01:17.591Z</news:publication_date>
      <news:title>Hack-for-Hire Spyware Campaign Targets Journalists in MENA</news:title>
      <news:keywords>Bitter, ProSpy, Access Now, Lookout, SMEX</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/selling-mass-surveillance-effector-38-7-mnq9</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T16:31:14.229Z</news:publication_date>
      <news:title>Mass Surveillance - EFFector Explores Troubling Trends</news:title>
      <news:keywords>mass surveillance, EFF, civil liberties, NSA spying, license plate readers</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/fraud-rockets-higher-mobile-first-latin-america-mnq9</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T16:31:11.832Z</news:publication_date>
      <news:title>Fraud Rockets Higher in Mobile-First Latin America</news:title>
      <news:keywords>mobile fraud, account takeover, financial institutions</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/outdated-software-macs-mobile-devices-security-risk-mnq8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T16:02:14.208Z</news:publication_date>
      <news:title>Outdated Software - Major Security Risks for Macs &amp; Mobile</news:title>
      <news:keywords>macOS, mobile devices, Jamf, vulnerabilities, security risks</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/lapd-hackers-steal-leak-sensitive-documents-mnq8</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T16:01:27.326Z</news:publication_date>
      <news:title>LAPD Breach - Hackers Steal and Leak Sensitive Documents</news:title>
      <news:keywords>LAPD, World Leaks, data breach, sensitive documents, cybercrime, sensitive information, cybersecurity, hackers</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/xibocms-3-3-4-remote-code-execution-mnq7</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T15:32:38.291Z</news:publication_date>
      <news:title>XiboCMS 3.3.4 - Critical Remote Code Execution Flaw</news:title>
      <news:keywords>CVE-2023-33177, XiboCMS, Remote Code Execution, path traversal, webshell</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/7-zip-24-00-directory-traversal-vulnerability-mnq7</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T15:32:07.376Z</news:publication_date>
      <news:title>7-Zip 24.00 - Critical Directory Traversal Vulnerability</news:title>
      <news:keywords>CVE-2025-11001, 7-Zip, Directory Traversal, Remote Code Execution, Mohammed Idrees Banyamer</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/nicole-bucala-databee-comcast-inspiring-women-cyber-mnq7</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T15:31:35.864Z</news:publication_date>
      <news:title>Nicole Bucala - Spotlighting a Leader in Cybersecurity</news:title>
      <news:keywords>Nicole Bucala, DataBee, Comcast, Most Inspiring Women in Cyber</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/veracrypt-issues-windows-boot-problems-mnq7</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T15:31:09.643Z</news:publication_date>
      <news:title>VeraCrypt - Windows Users May Face Boot Issues Soon</news:title>
      <news:keywords>VeraCrypt, Microsoft, encryption, boot issues, Mounir Idrassi</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ibm-identity-verify-access-vulnerabilities-mnq6</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T15:03:59.110Z</news:publication_date>
      <news:title>IBM Identity and Verify Access Vulnerabilities Exposed</news:title>
      <news:keywords>CVE-2026-2862, CVE-2026-1491, CVE-2026-1188, CVE-2026-1346, IBM</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/adobe-reader-0-day-exploit-attack-mnq6</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T15:02:51.315Z</news:publication_date>
      <news:title>Adobe Reader - Hackers Target Users with 0-Day Exploit, Researcher Seeks Community Help</news:title>
      <news:keywords>Adobe Reader, 0-Day Exploit, EXPMON, Malicious PDF, Advanced Fingerprinting, Zero-Day, Exploit, Cybersecurity, Malware, Adobe, Reader, PDF, RCE, Remote Code Execution, Sandbox Escape</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cia-elevates-cyber-espionage-division-mnq6</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T15:01:53.739Z</news:publication_date>
      <news:title>CIA Elevates Cyber Espionage Division for Enhanced Operations</news:title>
      <news:keywords>CIA, cyber espionage, John Ratcliffe, cyber threats, national security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/browser-guard-privacy-protection-mnq6</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T15:01:34.927Z</news:publication_date>
      <news:title>Browser Guard - Protecting Your Privacy from Extensions</news:title>
      <news:keywords>Browser Guard, Malwarebytes, privacy, browser extensions, data profiling</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/emotion-concepts-function-large-language-model-mnq6</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T15:01:29.890Z</news:publication_date>
      <news:title>Emotion Concepts - Exploring Their Role in AI Behavior</news:title>
      <news:keywords>Claude Sonnet 4.5, emotion concepts, AI behavior, neural representations</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/horilla-v1-3-rce-exploit-mnq5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T14:32:15.723Z</news:publication_date>
      <news:title>Horilla v1.3 - Critical RCE Vulnerability Exploited</news:title>
      <news:keywords>CVE-2025-48868, Horilla, RCE, web application, authenticated access</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/microsoft-mmc-msc-eviltwin-local-admin-creation-mnq5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T14:31:48.741Z</news:publication_date>
      <news:title>Microsoft MMC MSC EvilTwin - Local Admin Creation Exploit</news:title>
      <news:keywords>CVE-2025-26633, Windows, Microsoft MMC, Local Admin, Water Gamayun APT</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/gpu-password-cracking-specops-analysis-mnq5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T14:31:32.354Z</news:publication_date>
      <news:title>GPU Password Cracking - Specops Analyzes Performance Limits</news:title>
      <news:keywords>NVIDIA, Hashcat, Specops, password cracking, AI GPU</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/sqlite-3-50-1-heap-overflow-cve-2025-6965-mnq5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T14:31:21.313Z</news:publication_date>
      <news:title>SQLite 3.50.1 - Critical Heap Overflow Vulnerability Found</news:title>
      <news:keywords>CVE-2025-6965, SQLite, Windows Server, heap overflow, memory corruption</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/compliance-complexity-it-capacity-mnq5</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T14:31:15.071Z</news:publication_date>
      <news:title>Compliance Complexity - Is IT Capacity Keeping Up?</news:title>
      <news:keywords>GDPR, ISO 27001, NIST CSF, PCI DSS, HIPAA</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/automated-magic-packet-generation-bpf-malware-mnq4</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T14:01:23.722Z</news:publication_date>
      <news:title>Automated Magic Packet Generation - Enhancing Malware Analysis</news:title>
      <news:keywords>BPF, Z3, BPFDoor, malware, packet generation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/secrets-detection-security-workflow-mnq1</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T12:31:43.682Z</news:publication_date>
      <news:title>Secrets Detection - Integrating It into Your Security Workflow</news:title>
      <news:keywords>secrets detection, credential exposure, DevSecOps, security workflow, automated validation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/fortinet-emergency-patch-critical-vulnerability-mnpz</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T12:01:51.666Z</news:publication_date>
      <news:title>Fortinet Releases Emergency Patch for Critical Vulnerability</news:title>
      <news:keywords>Fortinet, vulnerability, emergency patch, banking apps, scammers</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/dutch-healthcare-software-vendor-ransomware-attack-mnpz</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T12:01:41.375Z</news:publication_date>
      <news:title>Dutch Healthcare Software Vendor - Ransomware Attack Disrupts Services</news:title>
      <news:keywords>ChipSoft, ransomware, Z-CERT, Dutch healthcare, cyberattack, healthcare, cybersecurity, Netherlands</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/masjesu-ddos-botnet-targets-iot-devices-mnpz</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T12:01:38.076Z</news:publication_date>
      <news:title>Masjesu DDoS Botnet Targets IoT Devices with Evasive Tactics</news:title>
      <news:keywords>Masjesu, DDoS, IoT, botnet, Trellix</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/identity-visibility-intelligence-platforms-ivip-mnpz</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T12:01:25.895Z</news:publication_date>
      <news:title>Identity Visibility - Shrinking the IAM Attack Surface</news:title>
      <news:keywords>Identity Management, Zero Trust, AI, Orchid Security, IVIP</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/windows-11-update-start-menu-issue-mnpz</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T12:01:25.712Z</news:publication_date>
      <news:title>Windows 11 Update - Start Menu Functionality Disrupted</news:title>
      <news:keywords>Windows 11, Start Menu, Microsoft, WI1273488</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/forest-blizzard-aitm-attacks-outlook-sessions-mnpx</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T11:01:45.541Z</news:publication_date>
      <news:title>Forest Blizzard - Launches AiTM Attacks Targeting Outlook</news:title>
      <news:keywords>Forest Blizzard, AiTM attacks, Microsoft Outlook, DNS hijacking, APT28</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/timeshare-owners-warned-cartel-linked-scams-mnpx</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T11:01:38.857Z</news:publication_date>
      <news:title>Timeshare Owners - Beware of Cartel-Linked Scams</news:title>
      <news:keywords>timeshare scams, Jalisco New Generation Cartel, advance-fee fraud, FBI, US Treasury</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/amazon-s3-files-cloud-storage-update-mnpx</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T11:01:24.393Z</news:publication_date>
      <news:title>Amazon S3 Files - New Cloud Storage Feature Explained</news:title>
      <news:keywords>Amazon S3, AWS, cloud storage, file system, data security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/nhs-scotland-domains-hijacked-adult-content-mnpw</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T10:31:32.080Z</news:publication_date>
      <news:title>NHS Scotland Domains Hijacked - Adult Content Served</news:title>
      <news:keywords>NHS Scotland, cybersecurity, domain hijacking, The New Surgery, Lerwick GP Practice</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/lua-based-malware-lucidrook-targets-taiwanese-ngos-mnpw</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T10:31:16.478Z</news:publication_date>
      <news:title>Lua-Based Malware LucidRook Targets Taiwanese NGOs, Uses Fake Security Software</news:title>
      <news:keywords>LucidRook, spear-phishing, Taiwanese NGOs, Cisco Talos, LucidPawn, malware, Taiwan, cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/zero-day-timeline-collapsed-security-leaders-next-mnpw</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T10:31:08.361Z</news:publication_date>
      <news:title>Zero-Day Vulnerabilities - Security Leaders Must Act Now</news:title>
      <news:keywords>zero-day, AI, vulnerability discovery, cybersecurity, agentic AI, vulnerabilities, security strategy</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/flatpak-1-16-4-fixes-sandbox-escape-security-flaws-mnpt</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T09:01:38.776Z</news:publication_date>
      <news:title>Flatpak 1.16.4 - Critical Sandbox Escape Fixed</news:title>
      <news:keywords>CVE-2026-34078, CVE-2026-34079, GHSA-2fxp-43j9-pwvc, GHSA-89xm-3m96-w3jg, Flatpak</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/secureframe-user-access-reviews-automated-governance-mnps</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T08:31:22.266Z</news:publication_date>
      <news:title>Secureframe - Launches User Access Reviews for Governance</news:title>
      <news:keywords>Secureframe, User Access Reviews, GRC automation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/indian-bank-fake-lpg-payment-kyc-update-scams-mnps</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T08:31:15.838Z</news:publication_date>
      <news:title>Indian Bank Alerts Users About Fake LPG Payment Scams</news:title>
      <news:keywords>Indian Bank, LPG scams, KYC update scams, banking fraud, cybercrime</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/openssl-vulnerabilities-rsa-kem-exposes-sensitive-data-mnpr</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T08:02:06.670Z</news:publication_date>
      <news:title>OpenSSL Vulnerabilities - Sensitive Data Exposed in RSA KEM</news:title>
      <news:keywords>OpenSSL, CVE-2026-31790, RSA KEM, cryptographic libraries, data leakage, vulnerabilities, security update</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/north-korea-insider-threat-ai-strategies-mnpq</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T07:31:28.389Z</news:publication_date>
      <news:title>North Korean Threat Actors - Insider Threat Tactics Revealed</news:title>
      <news:keywords>North Korea, insider threat, AI, synthetic identities, cyber espionage</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/telegram-hacking-tools-abuse-women-mnpq</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T07:31:12.371Z</news:publication_date>
      <news:title>Telegram Hacking Tools - Men Targeting Women Exposed</news:title>
      <news:keywords>Telegram, nonconsensual images, spyware, doxing, AI Forensics</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/microsoft-datacenter-design-war-zones-mnpp</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T07:01:42.043Z</news:publication_date>
      <news:title>Microsoft Considers New Datacenter Designs for War Zones</news:title>
      <news:keywords>Microsoft, datacenters, Iran, cyberattacks, Brad Smith</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ai-agent-compromise-illicit-web-content-mnpo</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T06:31:53.116Z</news:publication_date>
      <news:title>AI Agent Compromise - Illicit Web Content Attacks Detailed</news:title>
      <news:keywords>AI agents, malicious web content, DeepMind, cognitive biases, command injection</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/openssl-3-6-2-cve-fixes-mnpk</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T05:01:52.136Z</news:publication_date>
      <news:title>OpenSSL 3.6.2 - Eight CVEs Fixed in Latest Release</news:title>
      <news:keywords>OpenSSL, CVE-2026-31790, CVE-2026-2673, CVE-2026-28386, CVE-2026-28387, CVE, security update, vulnerabilities, encryption</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/6g-network-ai-security-architecture-mnpk</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T05:01:23.436Z</news:publication_date>
      <news:title>6G Network Design - AI at the Core of Security Challenges</news:title>
      <news:keywords>6G, AI, Harokopio University, network security, data poisoning</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cybercriminals-hiding-in-edge-infrastructure-mnpj</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T04:31:29.161Z</news:publication_date>
      <news:title>Cybercriminals Move Deeper into Networks, Hiding in Edge Infrastructure</news:title>
      <news:keywords>Lumen, Aisuru, DanaBot, Rhadamanthys, Kimwolf</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/fiber-optic-cables-hidden-microphones-eavesdropping-mnpg</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T03:01:43.330Z</news:publication_date>
      <news:title>Fiber Optic Cables - New Threat as Hidden Microphones Exposed</news:title>
      <news:keywords>fiber optic cables, eavesdropping, acoustic attack, NDSS 2026, data privacy</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/russia-backed-espionage-network-takedown-mnpb</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T00:31:14.989Z</news:publication_date>
      <news:title>Russia-Backed Espionage Network - Feds Neutralize Threat</news:title>
      <news:keywords>Forest Blizzard, APT28, GRU, espionage, DNS hijacking</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ninja-forms-wordpress-plugin-critical-vulnerability-mnp7</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T22:31:22.377Z</news:publication_date>
      <news:title>Ninja Forms - Critical Flaw Allows Remote Code Execution</news:title>
      <news:keywords>CVE-2026-0740, Ninja Forms, WordPress, remote code execution, vulnerability, Actively Exploited, File Upload, Plugin, Vulnerability, Website Takeover</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/niobium-encrypted-cloud-platform-private-ai-mnp4</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T21:32:19.080Z</news:publication_date>
      <news:title>Encrypted Cloud Platform - Niobium Launches Private AI Solution</news:title>
      <news:keywords>Niobium, The Fog, homomorphic encryption, AI workloads, cloud security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ai-diff-tool-finds-behavioral-differences-mnp2</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T20:31:11.898Z</news:publication_date>
      <news:title>AI Diff Tool - Uncovering Behavioral Differences in Models</news:title>
      <news:keywords>AI models, model diffing, behavioral differences, Anthropic, GPT-OSS-20B</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/vmware-security-advisory-vulnerabilities-tanzu-products-mnp1</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T20:02:08.594Z</news:publication_date>
      <news:title>VMware Security Advisory - Critical Vulnerabilities Identified</news:title>
      <news:keywords>VMware, Tanzu Data Intelligence, MySQL for Kubernetes, Tanzu Data Services, Tanzu Data Suite</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/snowflake-customers-data-theft-saas-integrator-breach-mnp1</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T20:01:40.823Z</news:publication_date>
      <news:title>Snowflake Customers Targeted in Data Theft After SaaS Integrator Breach</news:title>
      <news:keywords>Snowflake, Anodot, ShinyHunters, data theft, authentication tokens, Authentication Tokens, Cyberattack, Data Theft, Extortion</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/erlang-security-advisory-av26-320-mnp1</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T20:01:40.089Z</news:publication_date>
      <news:title>Erlang Security Advisory - Critical Vulnerabilities Addressed</news:title>
      <news:keywords>Erlang, OTP, Public_key, ssl, inets</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/eu-parliament-blocks-mass-scanning-chats-mnp0</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T19:31:26.082Z</news:publication_date>
      <news:title>EU Parliament Blocks Mass-Scanning of Chats - Privacy Win</news:title>
      <news:keywords>EU Parliament, Chat Control, e-Privacy, encryption, privacy rights</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/continuous-identity-threat-detection-need-mnoy</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T18:31:25.346Z</news:publication_date>
      <news:title>Continuous Identity Threat Detection - Why It Matters Now</news:title>
      <news:keywords>ID Dataweb, identity verification, AI security, continuous identity detection, social engineering</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ai-powered-project-glasswing-identify-software-vulnerabilities-mnoy</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T18:31:18.773Z</news:publication_date>
      <news:title>AI-Powered Project Glasswing Identifies Software Vulnerabilities</news:title>
      <news:keywords>Project Glasswing, Anthropic, AI vulnerabilities, software security, open source</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/anthropic-mythos-ai-cybersecurity-initiative-mnox</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T18:01:40.560Z</news:publication_date>
      <news:title>Anthropic&apos;s Mythos - New AI Model for Cybersecurity Defense Unveiled with Industry Collaboration</news:title>
      <news:keywords>Mythos, Anthropic, Project Glasswing, AI cybersecurity, zero-day vulnerabilities, AI, Cybersecurity, Vulnerabilities, Collaboration</news:keywords>
    </news:news>
  </url>
</urlset>