<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/wp-content/plugins/xml-sitemap-feed/assets/sitemap-news.xsl?ver=5.4.9"?>
<!-- generated-on="2026-04-27T11:16:53+00:00" -->
<!-- generator="XML Sitemap & Google News for WordPress" -->
<!-- generator-url="https://status301.net/wordpress-plugins/xml-sitemap-feed/" -->
<!-- generator-version="5.4.9" -->
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" >
<url><loc>https://cybersecurity-see.com/linux-elf-malware-generator-bypasses-ml-detection-through-semantic-preserving-modifications/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-27T11:05:07+00:00</news:publication_date><news:title>Linux ELF Malware Generator Bypasses ML Detection Through Semantic-Preserving Modifications</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/ai-is-transforming-devsecops-by-integrating-security-with-code/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-27T10:50:18+00:00</news:publication_date><news:title>AI is Transforming DevSecOps by Integrating Security with Code</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/is-your-iam-prepared-for-ai/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-27T10:23:22+00:00</news:publication_date><news:title>Is Your IAM Prepared for AI?</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/manager-of-agents-how-ai-evolves-the-soc-analyst-role/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-27T09:04:11+00:00</news:publication_date><news:title>Manager of Agents: How AI Evolves the SOC Analyst Role</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/post-mythos-security-and-cyber-risk-resilience/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-27T08:57:55+00:00</news:publication_date><news:title>Post-Mythos Security and Cyber Risk Resilience</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/blackfile-group-aims-at-retail-and-hospitality-sector-with-vishing-attacks/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-27T08:19:21+00:00</news:publication_date><news:title>BlackFile Group Aims at Retail and Hospitality Sector with Vishing Attacks</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/clickfix-attack-replaces-powershell-with-cmdkey-and-remote-regsvr32-payloads/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-27T07:03:16+00:00</news:publication_date><news:title>ClickFix Attack Replaces PowerShell with Cmdkey and Remote Regsvr32 Payloads</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/ransomware-negotiator-enters-guilty-plea-cybermaterial/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-26T16:56:12+00:00</news:publication_date><news:title>Ransomware Negotiator Enters Guilty Plea &#8211; CyberMaterial</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/new-threats-against-ai-assistants/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-26T14:55:34+00:00</news:publication_date><news:title>New Threats Against AI Assistants</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/trigona-ransomware-employs-unique-exfiltration-tool/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-26T12:54:30+00:00</news:publication_date><news:title>Trigona Ransomware Employs Unique Exfiltration Tool</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/rituals-reveals-data-breach-cybermaterial/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-26T10:53:23+00:00</news:publication_date><news:title>Rituals Reveals Data Breach &#8211; CyberMaterial</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/checkmarx-supply-chain-security-breach/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-26T08:51:13+00:00</news:publication_date><news:title>Checkmarx Supply Chain Security Breach</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/hackers-exploit-ollama-model-uploads-to-expose-server-data/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-26T06:50:08+00:00</news:publication_date><news:title>Hackers Exploit Ollama Model Uploads to Expose Server Data</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/ismg-editors-discuss-the-drive-for-ai-innovation/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-26T06:10:27+00:00</news:publication_date><news:title>ISMG Editors Discuss the Drive for AI Innovation</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cyber-attacks-in-the-education-sector-surge-by-63/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-26T04:49:09+00:00</news:publication_date><news:title>Cyber Attacks in the Education Sector Surge by 63%</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cisa-adds-four-exploited-flaws-to-kev-and-establishes-may-2026-federal-deadline/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-26T03:49:22+00:00</news:publication_date><news:title>CISA Adds Four Exploited Flaws to KEV and Establishes May 2026 Federal Deadline</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/python-vulnerability-allows-out-of-bounds-write-on-windows/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-26T02:48:12+00:00</news:publication_date><news:title>Python Vulnerability Allows Out-of-Bounds Write on Windows</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/hackers-exploit-powershell-script-to-hijack-telegram-accounts/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-26T00:47:16+00:00</news:publication_date><news:title>Hackers Exploit PowerShell Script to Hijack Telegram Accounts</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/void-dokkaebi-hackers-distribute-malware-via-phony-job-interviews/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-25T22:46:20+00:00</news:publication_date><news:title>Void Dokkaebi Hackers Distribute Malware via Phony Job Interviews</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/fake-captcha-scam-sparks-sms-fraud/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-25T20:45:09+00:00</news:publication_date><news:title>Fake CAPTCHA Scam Sparks SMS Fraud</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/xiongmai-ip-camera-vulnerability-allows-attackers-to-bypass-authentication/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-25T18:44:25+00:00</news:publication_date><news:title>Xiongmai IP Camera Vulnerability Allows Attackers to Bypass Authentication</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/uk-biobank-data-breach-raises-alarm/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-25T16:43:18+00:00</news:publication_date><news:title>UK Biobank Data Breach Raises Alarm</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/hackers-exploit-cisco-firepower-n-day-vulnerabilities-for-unauthorized-access/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-25T14:42:22+00:00</news:publication_date><news:title>Hackers Exploit Cisco Firepower N-Day Vulnerabilities for Unauthorized Access</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/chinese-cyber-espionage-through-compromised-devices/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-25T12:41:12+00:00</news:publication_date><news:title>Chinese Cyber Espionage Through Compromised Devices</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
</urlset>
