<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
  <url>
    <loc>https://cyberpings.com/article/vercel-cyber-incident-third-party-tool-exploitation-mo99</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T23:31:45.087Z</news:publication_date>
      <news:title>Vercel Confirms Cyber Incident After Third-Party Tool Exploitation</news:title>
      <news:keywords>Vercel, Context.ai, ShinyHunters, Google Workspace, API keys</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ransomware-negotiator-assisting-blackcat-scheme-mo99</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T23:31:02.470Z</news:publication_date>
      <news:title>Ransomware Negotiator - Caught Aiding BlackCat Extortion</news:title>
      <news:keywords>BlackCat, Angelo Martino, ransomware, extortion, cybercrime</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/bol-data-breach-400k-records-leaked-mo98</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T23:01:41.435Z</news:publication_date>
      <news:title>Bol Data Breach - Over 400K Records Allegedly Stolen</news:title>
      <news:keywords>Bol, data breach, personal information, hacker, data leak</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/nation-states-cyber-harm-not-just-steal-cash-mo97</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T22:31:05.743Z</news:publication_date>
      <news:title>Nation-States Want to Cause Harm, Not Just Steal Cash</news:title>
      <news:keywords>China, UK National Cyber Security Centre, cybersecurity, nation-state attacks, Richard Horne</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/suda-customizable-agentic-soc-mo96</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T22:01:04.392Z</news:publication_date>
      <news:title>SUDA - Customizable Framework for Agentic SOCs Explained</news:title>
      <news:keywords>AI SOC, SUDA, security operations, decision-making, automation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/crowdstrike-falcon-platform-achieves-441-roi-mo96</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T22:01:00.836Z</news:publication_date>
      <news:title>CrowdStrike Falcon Platform Achieves 441% ROI in Three Years</news:title>
      <news:keywords>CrowdStrike, Falcon Platform, ROI, IDC Study, Security Operations</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/windows-defender-exploits-active-attacks-mo93</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T21:01:23.404Z</news:publication_date>
      <news:title>Windows Defender - Unpatched Exploits Under Active Attack</news:title>
      <news:keywords>Windows Defender, exploit, proof-of-concept</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cloudflare-agent-lee-ai-assistant-mo90</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T19:31:28.017Z</news:publication_date>
      <news:title>Cloudflare&apos;s Agent Lee - New AI Assistant Simplifies Management</news:title>
      <news:keywords>Cloudflare, Agent Lee, AI assistant, TypeScript, Cloud security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/fortra-goanywhere-mft-vulnerabilities-april-2026-mo90</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T19:31:11.178Z</news:publication_date>
      <news:title>Fortra Addresses Vulnerabilities in GoAnywhere MFT Software</news:title>
      <news:keywords>Fortra, GoAnywhere MFT, SFTP Service, Brute Force Attack, FI-2026-002</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/thunderbird-150-encrypted-message-search-improvements-mo90</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T19:30:59.667Z</news:publication_date>
      <news:title>Thunderbird 150 - New Features Enhance Email Security</news:title>
      <news:keywords>Thunderbird, OpenPGP, S/MIME, Mozilla, PDF Viewer</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/lawmakers-terrorism-designations-hospital-ransomware-mo8z</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T19:02:17.699Z</news:publication_date>
      <news:title>Lawmakers Consider Terrorism Designations for Ransomware</news:title>
      <news:keywords>ransomware, hospital attacks, Congress, Cynthia Kaiser, FBI</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/lotus-data-wiper-targets-venezuelan-utilities-mo8z</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T19:01:22.201Z</news:publication_date>
      <news:title>Lotus Wiper - Targeting Venezuelan Energy Firms</news:title>
      <news:keywords>Lotus Wiper, Venezuela, Kaspersky, data wiper, PDVSA</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/zero-motorcycles-firmware-bluetooth-vulnerability-mo8x</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T18:02:58.752Z</news:publication_date>
      <news:title>Zero Motorcycles Firmware - Bluetooth Vulnerability Exposed</news:title>
      <news:keywords>CVE-2026-1354, Zero Motorcycles, Bluetooth vulnerability, firmware update, key exchange</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/siemens-sinec-nms-authorization-bypass-vulnerability-mo8x</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T18:02:03.611Z</news:publication_date>
      <news:title>Siemens SINEC NMS - Critical Authorization Bypass Vulnerability</news:title>
      <news:keywords>Siemens, SINEC NMS, Authorization Bypass, CVE-2026-25654</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/hardy-barth-salia-ev-charge-controller-vulnerabilities-mo8x</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T18:01:55.191Z</news:publication_date>
      <news:title>Hardy Barth Salia EV Charge Controller - Critical Vulnerabilities Found</news:title>
      <news:keywords>CVE-2025-5873, CVE-2025-10371, Hardy Barth, Salia EV Charge Controller, buffer overflow</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/fortinet-architect-warns-ot-cloud-convergence-risk-mo8x</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T18:01:45.456Z</news:publication_date>
      <news:title>Fortinet Architect Warns of OT Cloud Convergence Risk</news:title>
      <news:keywords>Fortinet, cloud security, operational technology, cybersecurity, misconfiguration</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/senselive-x3050-vulnerabilities-explained-mo8x</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T18:01:39.524Z</news:publication_date>
      <news:title>SenseLive X3050 - Critical Vulnerabilities Exposed</news:title>
      <news:keywords>CVE-2026-40630, CVE-2026-25720, CVE-2026-35503, CVE-2026-39462, CVE-2026-27843</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/silex-technology-sd-330ac-amc-manager-vulnerabilities-mo8x</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T18:01:29.166Z</news:publication_date>
      <news:title>Silex Technology - Multiple Vulnerabilities Discovered</news:title>
      <news:keywords>CVE-2026-32955, CVE-2026-32956, CVE-2026-32957, CVE-2026-32958, Silex Technology</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/sysdig-report-end-human-led-cloud-defense-mo8x</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T18:01:25.486Z</news:publication_date>
      <news:title>Sysdig Report - End of Human-Led Cloud Defense Signals Shift</news:title>
      <news:keywords>Sysdig, cloud security, AI, automation, runtime detection</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cloud-detection-strategies-against-infiltrating-it-workers-mo8w</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T17:31:22.982Z</news:publication_date>
      <news:title>Cloud Detection Strategies - Protecting Against IT Worker Infiltration</news:title>
      <news:keywords>Microsoft Defender, Jasper Sleet, Workday, remote work, identity verification</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/breachlock-gartner-adversarial-exposure-validation-mo8v</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T17:01:16.307Z</news:publication_date>
      <news:title>BreachLock Recognized in 2026 Gartner Market Guide</news:title>
      <news:keywords>BreachLock, Gartner, Adversarial Exposure Validation, PTaaS, AI-powered security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/void-dokkaebi-malware-job-interview-lure-mo8u</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T16:31:12.855Z</news:publication_date>
      <news:title>Void Dokkaebi - Malware Spread via Fake Job Interviews</news:title>
      <news:keywords>Void Dokkaebi, malware, supply chain attack, VS Code, obfuscated JavaScript</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/tarjeteros-cybercrime-credit-card-fraud-mo8t</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T16:01:21.185Z</news:publication_date>
      <news:title>Tarjeteros - New Wave of Credit Card Fraud in NYC</news:title>
      <news:keywords>credit card fraud, cybercrime, tarjeteros, Dominican Republic, New York</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/bridewell-achieves-level-2-defence-cyber-certification-mo8t</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T16:01:19.105Z</news:publication_date>
      <news:title>Bridewell Achieves Level 2 Defence Cyber Certification</news:title>
      <news:keywords>Defence Cyber Certification, Bridewell, cybersecurity, UK Ministry of Defence, IASME</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ai-in-dfir-importance-of-investigator-judgement-mo8r</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T15:01:31.678Z</news:publication_date>
      <news:title>AI in DFIR - Importance of Investigator Judgement</news:title>
      <news:keywords>AI, DFIR, investigative judgement, cybersecurity, forensics</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/mexican-surveillance-company-expands-us-mo8r</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T15:01:17.093Z</news:publication_date>
      <news:title>Mexican Surveillance Company Expands into the US Market</news:title>
      <news:keywords>Grupo Seguritech, surveillance, privacy, Mexico, US expansion</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/stopping-fraud-customer-journey-mo8q</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T14:31:32.830Z</news:publication_date>
      <news:title>Fraud Prevention - Stopping Fraud Without Adding Friction</news:title>
      <news:keywords>IPQS, fraud prevention, account takeover, payment fraud, synthetic identities</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/kyber-ransomware-windows-esxi-attacks-explained-mo8q</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T14:31:32.330Z</news:publication_date>
      <news:title>Kyber Ransomware - Dual Attacks on Windows and ESXi Explained</news:title>
      <news:keywords>Kyber Ransomware, VMware ESXi, Windows, Ransomware, Cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/stellantis-microsoft-partnership-ai-cybersecurity-mo8q</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T14:31:20.037Z</news:publication_date>
      <news:title>Stellantis Partners with Microsoft to Boost Cybersecurity</news:title>
      <news:keywords>Stellantis, Microsoft, AI, cybersecurity, cloud</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/malicious-crypto-apps-apple-app-store-mo8q</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T14:31:09.085Z</news:publication_date>
      <news:title>Malicious Crypto Apps - Over Two Dozen Found in App Store</news:title>
      <news:keywords>FakeWallet, Kaspersky, cryptocurrency, Apple App Store, malicious apps</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/fake-google-antigravity-trojan-stealing-accounts-mo8q</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T14:31:04.086Z</news:publication_date>
      <news:title>Fake Google Antigravity Trojan Stealing Accounts Quickly</news:title>
      <news:keywords>Google Antigravity, Trojan, PowerShell, Data Theft, Malware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/eu-targets-russian-propaganda-networks-sanctions-mo8q</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T14:30:56.697Z</news:publication_date>
      <news:title>EU Targets Russian Propaganda Networks with New Sanctions</news:title>
      <news:keywords>Euromore, Pravfond, Russian propaganda, EU sanctions, disinformation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/top-cyber-hygiene-tips-for-better-security-mo8p</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T14:03:49.121Z</news:publication_date>
      <news:title>Cyber Hygiene - Essential Tips for Better Digital Security</news:title>
      <news:keywords>MFA, cyber hygiene, password management, RDP security, Huntress</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/linux-incident-openai-codex-mo8p</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T14:02:19.926Z</news:publication_date>
      <news:title>AI Security - Linux Incident Investigated with OpenAI Codex</news:title>
      <news:keywords>OpenAI Codex, Huntress, Linux, cryptominer, DFIR</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/vpn-misconfiguration-leads-to-intrusions-mo8p</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T14:02:01.516Z</news:publication_date>
      <news:title>VPN Misconfiguration - Major Cause of Cyber Intrusions</news:title>
      <news:keywords>VPN, MFA, Huntress, ransomware, cybersecurity</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/uptick-bomgar-rmm-exploitation-mo8p</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T14:01:55.705Z</news:publication_date>
      <news:title>Bomgar RMM Exploitation - Surge in Ransomware Attacks</news:title>
      <news:keywords>Bomgar, CVE-2026-1731, LockBit, ransomware, Huntress SOC</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/disrupting-endpoint-attacks-huntress-managed-edr-mo8o</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T14:01:38.519Z</news:publication_date>
      <news:title>Huntress Managed EDR - Disrupting Endpoint Attacks Effectively</news:title>
      <news:keywords>Huntress, EDR, ransomware, Attack Disruption Engine, endpoint security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/uk-probes-telegram-csam-sharing-mo8o</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T14:01:32.801Z</news:publication_date>
      <news:title>UK Probes Telegram Over Child Sexual Abuse Material Sharing</news:title>
      <news:keywords>Ofcom, Telegram, CSAM, Online Safety Act, UK, Child Protection</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ukraine-busts-bot-farm-fake-telegram-accounts-mo8n</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T13:31:50.802Z</news:publication_date>
      <news:title>Ukraine Dismantles Bot Farm Supplying Fake Telegram Accounts</news:title>
      <news:keywords>Russian intelligence, disinformation campaigns, bot farm, Telegram accounts, Ukraine</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/moving-past-bots-vs-humans-mo8n</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T13:31:07.222Z</news:publication_date>
      <news:title>Privacy - AI Challenges Traditional Bot Detection Models</news:title>
      <news:keywords>AI assistants, privacy proxies, user privacy, data protection</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/silobreaker-mimir-agentic-ai-intelligence-workflows-mo8m</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T13:01:41.610Z</news:publication_date>
      <news:title>Silobreaker Mimir - New Agentic AI Enhances Intelligence Workflows</news:title>
      <news:keywords>Silobreaker, Mimir, agentic AI</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/aes-128-quantum-security-myths-mo8m</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T13:01:32.075Z</news:publication_date>
      <news:title>AES 128 - Debunking Myths in Quantum Security Readiness</news:title>
      <news:keywords>AES 128, quantum computing, Grover&apos;s algorithm, encryption, NIST</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/unsecured-perforce-servers-expose-sensitive-data-mo8m</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T13:01:23.798Z</news:publication_date>
      <news:title>Unsecured Perforce Servers Expose Sensitive Data Risk</news:title>
      <news:keywords>Perforce, data exposure, sensitive information, security misconfiguration, Morgan Robertson</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ivanti-neurons-ai-automates-it-operations-mo8m</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T13:01:21.274Z</news:publication_date>
      <news:title>Ivanti Neurons AI - Automating IT Operations and Security</news:title>
      <news:keywords>Ivanti Neurons, AI automation, IT operations, security risk, patch management</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/azure-sre-agent-authentication-flaw-eavesdropping-mo8m</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T13:01:19.089Z</news:publication_date>
      <news:title>Azure SRE Agent - Critical Flaw Allows Unauthorized Eavesdropping</news:title>
      <news:keywords>CVE-2026-32173, Azure SRE Agent, Microsoft, authentication flaw, Yanir Tsarimi</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/openai-chronicle-privacy-concerns-mo8l</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T12:31:16.775Z</news:publication_date>
      <news:title>OpenAI Chronicle - New Feature Raises Privacy Concerns</news:title>
      <news:keywords>OpenAI, Codex, Chronicle, privacy concerns, screen recording</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/wiz-expands-api-discovery-with-apigee-mo8l</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T12:31:06.904Z</news:publication_date>
      <news:title>Wiz Expands API Discovery with Apigee Integration</news:title>
      <news:keywords>Wiz, Apigee, API Security, Cloud Security, GCP</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/hackers-use-nightmare-eclipse-tools-fortigate-vpn-mo8l</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T12:31:06.349Z</news:publication_date>
      <news:title>Hackers Use Nightmare-Eclipse Tools After FortiGate VPN Breach</news:title>
      <news:keywords>FortiGate, Nightmare-Eclipse, BlueHammer, RedSun, UnDefend, VPN, cybersecurity, malware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/attackers-surge-before-vulnerability-disclosures-mo8l</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T12:30:53.151Z</news:publication_date>
      <news:title>Attackers Surge Before Vulnerability Disclosures - GreyNoise Report</news:title>
      <news:keywords>CVE-2026-20127, Cisco, SonicWall, GreyNoise, network vulnerabilities</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/google-antigravity-ide-patch-prompt-injection-mo8k</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T12:02:43.268Z</news:publication_date>
      <news:title>Google Patches Antigravity IDE Flaw Enabling Code Execution</news:title>
      <news:keywords>Antigravity, Google, prompt injection, code execution, find_by_name</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/be-prime-video-surveillance-data-leak-mo8k</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T12:01:28.196Z</news:publication_date>
      <news:title>Be Prime Faces Data Breach - Claims of Surveillance Footage Leak</news:title>
      <news:keywords>Be Prime, dylanmarly, video surveillance, Cisco Meraki, data leak</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/chinese-apt-targets-indian-banks-korean-policy-mo8k</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T12:01:14.880Z</news:publication_date>
      <news:title>Chinese APT Targets Indian Banks and Korean Policy Circles</news:title>
      <news:keywords>APT, China, India, cyber espionage, banking sector</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/data-breaches-healthcare-organizations-illinois-texas-mo8j</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T11:31:51.276Z</news:publication_date>
      <news:title>Data Breaches - Healthcare Organizations Affect 600,000 Patients</news:title>
      <news:keywords>Southern Illinois Dermatology, North Texas Behavioral Health Authority, Saint Anthony Hospital</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/met-police-snoop-tech-shoplifting-trial-mo8i</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T11:01:35.356Z</news:publication_date>
      <news:title>Met Police Trials Snoop Tech to Combat London Shoplifting</news:title>
      <news:keywords>Metropolitan Police, shoplifting, facial recognition, CCTV, privacy concerns</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/grapheneos-privacy-tool-legacy-conflict-mo8h</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T10:31:27.006Z</news:publication_date>
      <news:title>GrapheneOS - The Legacy and Conflict of a Privacy Tool</news:title>
      <news:keywords>GrapheneOS, CopperheadOS, Daniel Micay</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/stealtok-browser-extensions-tiktok-downloaders-compromised-mo8h</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T10:31:09.793Z</news:publication_date>
      <news:title>StealTok Malware - TikTok Downloader Extensions Compromised</news:title>
      <news:keywords>StealTok, TikTok Downloader, browser extensions, malware campaign, LayerX, malware, TikTok, data theft</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/proxy-smart-sim-farm-fraud-mo8f</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T09:31:14.469Z</news:publication_date>
      <news:title>ProxySmart - Powers Global SIM Farm Proxy Networks</news:title>
      <news:keywords>ProxySmart, SIM farm, mobile proxy, Infrawatch, cybercrime</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/human-aspect-of-red-teams-brian-fox-tom-tovar-mo8f</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T09:31:08.617Z</news:publication_date>
      <news:title>Human Aspect of Red Teams - Insights from Experts</news:title>
      <news:keywords>Red Teams, Cybersecurity, AI, Application Security, Threat Hunting</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/adaptavist-group-breach-ransomware-imposter-emails-mo8e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T09:01:35.606Z</news:publication_date>
      <news:title>Adaptavist Group Breach - Ransomware Crew Claims Mega-Haul</news:title>
      <news:keywords>Adaptavist Group, The Gentlemen, ransomware, data breach, phishing</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ngate-nfc-malware-targets-android-users-mo8e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T09:01:27.694Z</news:publication_date>
      <news:title>NGate NFC Malware - Targets Android Users via Trojanized HandyPay App</news:title>
      <news:keywords>NGate, HandyPay, Android, ESET, NFC malware, malware, cybercrime, NFC, payment fraud</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/panasonic-device-locked-qr-codes-facial-biometric-capture-mo8c</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T08:01:12.561Z</news:publication_date>
      <news:title>Panasonic - Device-Locked QR Codes Enhance Biometric Capture</news:title>
      <news:keywords>Panasonic, QR codes, facial recognition, biometrics, access control</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/wav-file-malware-payload-mo8b</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T07:31:16.391Z</news:publication_date>
      <news:title>.WAV File - New Malware Delivery Method Discovered</news:title>
      <news:keywords>malware, wav file, payload</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/iran-claims-us-backdoors-networking-equipment-mo88</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T06:31:26.769Z</news:publication_date>
      <news:title>Iran Claims US Used Backdoors to Disable Networking Gear</news:title>
      <news:keywords>Iran, US Cyber Command, backdoors, networking equipment, China</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/browser-run-ai-agents-browser-mo84</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T04:31:52.450Z</news:publication_date>
      <news:title>Browser Run - Empower Your AI Agents with a Browser</news:title>
      <news:keywords>Browser Run, Cloudflare, AI agents, Chrome DevTools, WebMCP</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/encrypted-routing-layer-private-ai-inference-mo84</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T04:31:15.759Z</news:publication_date>
      <news:title>Encrypted Routing Layer - Enhancing Private AI Inference</news:title>
      <news:keywords>Secure Multi-Party Computation, AI inference, SecureRouter, encryption, University of Central Florida</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/iterm2-flaw-ssh-integration-code-execution-mo82</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T03:31:08.341Z</news:publication_date>
      <news:title>iTerm2 Vulnerability - SSH Integration Allows Code Execution</news:title>
      <news:keywords>iTerm2, RCE, SSH, Califio, macOS</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/trojanized-testdisk-installer-screenconnect-deployment-mo7y</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T01:31:42.904Z</news:publication_date>
      <news:title>Trojanized TestDisk Installer - Illicit ScreenConnect Deployment</news:title>
      <news:keywords>TestDisk, ScreenConnect, Microsoft, malware, DLL side-loading</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ponemon-survey-identity-overconfidence-mo7x</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T01:02:36.042Z</news:publication_date>
      <news:title>Ponemon Survey Exposes Identity Overconfidence in Enterprises</news:title>
      <news:keywords>Ponemon Institute, identity security, multifactor authentication, AI identities, Cerby</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/executive-order-stronger-identity-proofing-mo7x</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T01:01:59.851Z</news:publication_date>
      <news:title>Executive Order - Push for Stronger Identity Proofing</news:title>
      <news:keywords>Executive Order 14390, identity verification, cyber fraud, digital identity, Jordan Burris</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/palantir-ice-human-rights-policy-issues-mo7x</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T01:01:08.464Z</news:publication_date>
      <news:title>Palantir&apos;s Human Rights Policy - Questions Arise Over ICE Work</news:title>
      <news:keywords>Palantir, ICE, EFF, human rights, data privacy</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ai-model-claude-opus-exploits-bugs-mo7u</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T00:01:46.824Z</news:publication_date>
      <news:title>AI Model Claude Opus Turns Bugs into Exploits for $2,283</news:title>
      <news:keywords>Claude Opus, Chrome exploit, AI vulnerabilities, Mohan Pedhapati, bug bounty</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/cibercrime-america-latina-caribe-2025-mo7u</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T00:01:40.618Z</news:publication_date>
      <news:title>Cibercrime na América Latina e Caribe - Tendências em 2025</news:title>
      <news:keywords>Insikt Group, LAC, ransomware, malware, phishing</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/kelpdao-290-million-heist-lazarus-hackers-mo7r</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T22:31:13.103Z</news:publication_date>
      <news:title>KelpDAO Suffers $290 Million Heist Linked to Lazarus Hackers</news:title>
      <news:keywords>KelpDAO, Lazarus Group, crypto theft, DeFi, rsETH, North Korea, LayerZero</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/securing-ai-application-development-mo7q</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T22:01:30.898Z</news:publication_date>
      <news:title>Securing AI Application Development - Protecting Sensitive Data</news:title>
      <news:keywords>AI development, data security, sensitive data, credentials, Varonis</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/gh0st-rat-cloverplus-dual-payload-malware-campaign-mo7o</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T21:01:22.703Z</news:publication_date>
      <news:title>Gh0st RAT and CloverPlus Adware - New Dual-Payload Malware</news:title>
      <news:keywords>Gh0st RAT, CloverPlus, malware campaign, remote access trojan, adware</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ftc-ai-portfolio-expansion-deepfakes-voice-cloning-mo7o</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T21:01:11.053Z</news:publication_date>
      <news:title>FTC&apos;s AI Portfolio Expands - New Law Targets Deepfakes</news:title>
      <news:keywords>FTC, Take It Down Act, deepfakes, voice cloning, AI scams</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/mastodon-ddos-attack-april-2026-mo7n</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T20:31:36.814Z</news:publication_date>
      <news:title>Mastodon Hit by DDoS Attack, Service Disrupted Temporarily</news:title>
      <news:keywords>Mastodon, DDoS, Bluesky, Cyberattack, Social Media, Security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/claude-desktop-privacy-issues-browser-access-mo7m</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T20:01:14.038Z</news:publication_date>
      <news:title>Claude Desktop - Privacy Concerns Over Browser Access Settings</news:title>
      <news:keywords>Claude Desktop, Anthropic, ePrivacy Directive, browser extensions, privacy violation</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/tyler-buchanan-pleads-guilty-crypto-theft-mo7l</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T19:31:05.504Z</news:publication_date>
      <news:title>Tyler Buchanan Pleads Guilty - Major Crypto Theft Case</news:title>
      <news:keywords>Tyler Buchanan, Scattered Spider, cryptocurrency theft, SMS phishing, wire fraud, cybercrime, phishing, SIM swap, cryptocurrency</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/sglang-cve-2026-5760-remote-code-execution-mo7k</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T19:01:57.444Z</news:publication_date>
      <news:title>SGLang CVE-2026-5760 - Critical RCE Vulnerability Disclosed</news:title>
      <news:keywords>CVE-2026-5760, SGLang, Remote Code Execution, Jinja2, GGUF</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ai-soc-customization-importance-mo7k</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T19:01:36.897Z</news:publication_date>
      <news:title>AI SOC Customization - Why Your Security Needs Control</news:title>
      <news:keywords>AI SOC, automation, security operations, incident response, customization</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/progress-security-advisory-cve-2026-3517-3518-3519-4048-21876-mo7j</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T18:31:35.908Z</news:publication_date>
      <news:title>Progress Security Advisory - Critical Vulnerabilities Found</news:title>
      <news:keywords>CVE-2026-3517, CVE-2026-3518, CVE-2026-3519, CVE-2026-4048, CVE-2026-21876</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/seiko-usa-website-defaced-customer-data-theft-mo7j</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T18:31:26.087Z</news:publication_date>
      <news:title>Seiko USA Website Defaced - Customer Data Theft Claimed</news:title>
      <news:keywords>Seiko USA, Shopify, data breach, customer data, extortion</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/making-cyberattacks-harder-by-design-mo7j</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T18:31:02.945Z</news:publication_date>
      <news:title>Making Cyberattacks Harder - Microsoft’s New Security Approach</news:title>
      <news:keywords>Microsoft, Dynamics 365, Power Platform, credential elimination, platform engineering</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/iran-mois-coordinated-cyber-campaign-mo7f</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T17:01:10.840Z</news:publication_date>
      <news:title>Iran MOIS - Coordinated Cyber Campaign Using Multiple Personas</news:title>
      <news:keywords>Iran MOIS, Homeland Justice, Karma, Handala, Void Manticore</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/ai-help-networks-pocket-presence-mo7e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T16:31:23.811Z</news:publication_date>
      <news:title>AI - Enhancing Telecom Security with Pocket Presence</news:title>
      <news:keywords>AI, telecom security, Salt Typhoon, UNC3886, BPFDoor</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/lovable-ai-app-builder-api-flaw-exposes-data-mo7e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T16:31:09.968Z</news:publication_date>
      <news:title>Lovable AI App Builder - Critical API Flaw Exposes Data, Legacy Projects at Risk</news:title>
      <news:keywords>Lovable, API Vulnerability, Broken Object Level Authorization, Data Exposure, HackerOne, BOLA, Cybersecurity, API, vulnerability, data breach, AI, security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/satoshi-nakamoto-adam-back-identity-mo7e</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T16:31:02.504Z</news:publication_date>
      <news:title>Satoshi Nakamoto - Is Adam Back Really the Creator?</news:title>
      <news:keywords>bitcoin, cryptocurrency, Adam Back</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/serial-to-ip-converter-vulnerabilities-expose-systems-mo7d</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T16:01:24.711Z</news:publication_date>
      <news:title>Serial-to-IP Converter Vulnerabilities Expose OT Systems, Thousands of Devices Potentially at Risk</news:title>
      <news:keywords>Lantronix, Silex, BRIDGE:BREAK, CISA, OT security, cybersecurity, vulnerabilities, Forescout, industrial control systems</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/elon-musk-questioning-french-police-ai-images-mo7c</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T15:31:15.786Z</news:publication_date>
      <news:title>Elon Musk - Fails to Appear for French Police Questioning</news:title>
      <news:keywords>Elon Musk, X, AI images, French police, child sexual abuse material</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/enterprise-remediation-benchmark-comparison-mo7c</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T15:31:11.609Z</news:publication_date>
      <news:title>Enterprise Remediation Benchmark - Compare Your Organization</news:title>
      <news:keywords>Google Chrome, Visual C++, Microsoft Edge, Qualys, patch management</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/big-tech-can-stop-scams-mo7b</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T15:01:19.196Z</news:publication_date>
      <news:title>Big Tech Can Stop Scams - Why They Don’t Act</news:title>
      <news:keywords>financial scams, older adults, Malwarebytes, FTC, Marti DeLiema</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/backup-myth-businesses-risk-bcdr-mo7a</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T14:31:14.064Z</news:publication_date>
      <news:title>Backup Myth - Why BCDR is Essential for Businesses</news:title>
      <news:keywords>Datto, BCDR, business continuity, ransomware, data protection</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/decipio-community-tool-credential-theft-detection-mo7a</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T14:31:09.077Z</news:publication_date>
      <news:title>Decipio - New AI Tool to Catch Credential Theft Early</news:title>
      <news:keywords>Decipio, Arctic Wolf, credential theft, cybersecurity tool, AI-driven detection</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/wiz-code-secures-build-environment-mo77</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T13:01:20.485Z</news:publication_date>
      <news:title>Wiz Code Secures CI/CD Pipelines Against Supply Chain Attacks</news:title>
      <news:keywords>Wiz, CI/CD, supply chain attack, GitHub Actions, AI agents</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/why-ai-deployments-stall-after-demo-mo76</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T12:31:12.616Z</news:publication_date>
      <news:title>AI Deployments - Why They Stall After the Demo</news:title>
      <news:keywords>AI, Data Governance, Machine Learning, Enterprise Software, Privacy</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/scattered-spider-hacker-pleads-guilty-mo76</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T12:31:07.396Z</news:publication_date>
      <news:title>Scattered Spider Hacker Pleads Guilty to Cryptocurrency Theft, Faces 22 Years in Prison</news:title>
      <news:keywords>Scattered Spider, Tyler Buchanan, SIM swapping, cryptocurrency theft, phishing, cybercrime, cryptocurrency, hacking</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/athr-ai-platform-voice-phishing-mo74</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T11:31:18.648Z</news:publication_date>
      <news:title>ATHR AI Platform - Automates Voice Phishing Operations</news:title>
      <news:keywords>ATHR, voice phishing, AI, cybercrime, vishing</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/handling-cve-flood-with-epss-mo74</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T11:30:53.654Z</news:publication_date>
      <news:title>Handling the CVE Flood - Understanding the Challenge</news:title>
      <news:keywords></news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/fud-crypt-microsoft-signed-malware-mo72</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T10:31:38.560Z</news:publication_date>
      <news:title>FUD Crypt - Hackers Generate Microsoft-Signed Malware</news:title>
      <news:keywords>FUD Crypt, Microsoft, malware-as-a-service, DLL sideloading, C2</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/network-background-noise-predicts-edge-device-vulnerability-mo72</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T10:31:16.950Z</news:publication_date>
      <news:title>Network Background Noise - Predicts Edge-Device Vulnerability</news:title>
      <news:keywords>GreyNoise, edge-device vulnerability, Cisco, Palo Alto Networks, Fortinet</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/syncthing-secure-private-file-synchronization-mo72</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T10:30:58.204Z</news:publication_date>
      <news:title>Syncthing - Secure and Private File Synchronization Tool</news:title>
      <news:keywords>Syncthing, file synchronization, open source, peer-to-peer, privacy</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/microsoft-teams-service-update-failures-mo70</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T10:01:37.008Z</news:publication_date>
      <news:title>Microsoft Teams - Service Update Causes Launch Failures, Rollback Underway</news:title>
      <news:keywords>Microsoft, Teams, service update, Microsoft Teams, Service Update, Launch Failures, Incident TM1283300</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/china-spy-alysa-liu-father-mo70</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T10:01:36.203Z</news:publication_date>
      <news:title>China&apos;s Surveillance of Alysa Liu and Her Father Exposed</news:title>
      <news:keywords>China, Alysa Liu, surveillance, Matthew Ziburis, Frank Liu</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/copilot-agentforce-prompt-injection-vulnerabilities-mo70</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T10:01:35.517Z</news:publication_date>
      <news:title>Prompt Injection Vulnerabilities in Copilot &amp; Agentforce</news:title>
      <news:keywords>Microsoft Copilot, Salesforce Agentforce, Prompt Injection, Data Exfiltration, Capsule Security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/notion-pages-leak-profile-photos-emails-mo6z</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T09:31:02.480Z</news:publication_date>
      <news:title>Notion Pages Expose Editors&apos; Profile Photos and Emails</news:title>
      <news:keywords>Notion, PII, data leak, email exposure, profile photos</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/eu-cloud-sovereignty-initiative-awards-180-million-mo6w</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T08:01:35.803Z</news:publication_date>
      <news:title>EU Cloud Sovereignty Initiative - €180 Million Awarded</news:title>
      <news:keywords>EU, cloud sovereignty, European Commission, cloud services, digital sovereignty</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/openai-codex-update-ai-capabilities-mo6r</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T05:31:36.933Z</news:publication_date>
      <news:title>OpenAI Codex Update - Expands AI Capabilities Across Apps</news:title>
      <news:keywords>OpenAI, Codex, ChatGPT, AI, macOS</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/smokedmeat-open-source-tool-cicd-attacks-mo6r</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T05:31:12.950Z</news:publication_date>
      <news:title>SmokedMeat - New Tool Demonstrates CI/CD Attack Scenarios</news:title>
      <news:keywords>SmokedMeat, CI/CD, Boost Security</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/liongard-upgrades-liongardiq-ai-access-live-asset-data-mo6q</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T05:01:51.187Z</news:publication_date>
      <news:title>LiongardIQ - New AI Access and Enhanced Asset Intelligence</news:title>
      <news:keywords>LiongardIQ, AI integration, asset intelligence, network discovery, identity mapping</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/dungeons-and-daemons-cybersecurity-rpg-mo6k</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T02:31:23.241Z</news:publication_date>
      <news:title>Dungeons and Daemons - Experience Cybersecurity as a Game</news:title>
      <news:keywords>Dungeons and Daemons, TrustedSec, Red Team, Cybersecurity RPG</news:keywords>
    </news:news>
  </url>
  <url>
    <loc>https://cyberpings.com/article/shared-dictionaries-compression-web-performance-mo6k</loc>
    <news:news>
      <news:publication>
        <news:name>CyberPings</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-20T02:31:08.021Z</news:publication_date>
      <news:title>Shared Dictionaries - Enhancing Web Compression Efficiency</news:title>
      <news:keywords>Cloudflare, Shared Dictionaries, Compression, Web Performance</news:keywords>
    </news:news>
  </url>
</urlset>