<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/wp-content/plugins/xml-sitemap-feed/assets/sitemap-news.xsl?ver=5.4.9"?>
<!-- generated-on="2026-04-14T19:58:31+00:00" -->
<!-- generator="XML Sitemap & Google News for WordPress" -->
<!-- generator-url="https://status301.net/wordpress-plugins/xml-sitemap-feed/" -->
<!-- generator-version="5.4.9" -->
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" >
<url><loc>https://cybersecurity-see.com/agentic-ai-and-the-identitys-last-mile-problem-webinar/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-14T19:09:19+00:00</news:publication_date><news:title>Agentic AI and the Identity&#8217;s Last Mile Problem Webinar</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/security-risk-advisors-purple-team-participants-now-eligible-for-cpe-credits-gbhackers-security/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-14T18:28:15+00:00</news:publication_date><news:title>Security Risk Advisors Purple Team Participants Now Eligible for CPE Credits &#8211; GBHackers Security</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cisos-encouraged-to-innovate-in-talent-retention-amid-declining-job-satisfaction/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-14T18:13:19+00:00</news:publication_date><news:title>CISOs Encouraged to Innovate in Talent Retention Amid Declining Job Satisfaction</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/goldman-sachs-takes-a-hyperaware-approach-in-testing-mythos-for-defense/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-14T16:48:31+00:00</news:publication_date><news:title>Goldman Sachs Takes a &#8216;Hyperaware&#8217; Approach in Testing Mythos for Defense</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cyber-inspekteur-zunahme-hybrider-attacken/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-14T16:27:06+00:00</news:publication_date><news:title>Cyber-Inspekteur: Zunahme hybrider Attacken</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/china-linked-cloud-credential-heist-exploits-typos-and-smtp/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-14T15:42:26+00:00</news:publication_date><news:title>China-Linked Cloud Credential Heist Exploits Typos and SMTP</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/live-webinar-understanding-cyber-risk-in-the-age-of-ai/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-14T14:27:39+00:00</news:publication_date><news:title>Live Webinar: Understanding Cyber Risk in the Age of AI</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/patchstack-bug-bounty-program-overview-cybermaterial/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-14T14:26:07+00:00</news:publication_date><news:title>Patchstack Bug Bounty Program Overview &#8211; CyberMaterial</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/ai-security-institute-promotes-security-best-practices-following-mythos-t/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-14T13:11:16+00:00</news:publication_date><news:title>AI Security Institute Promotes Security Best Practices Following Mythos T</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/janela-rat-distributes-through-fake-msi-installers-and-malicious-extensions/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-14T12:25:11+00:00</news:publication_date><news:title>Janela RAT Distributes Through Fake MSI Installers and Malicious Extensions</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cybersecurity-in-an-era-of-geopolitical-division/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-14T12:06:55+00:00</news:publication_date><news:title>Cybersecurity in an Era of Geopolitical Division</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/the-ai-inflection-point-necessary-actions-for-security-leaders-now/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-14T10:40:11+00:00</news:publication_date><news:title>The AI Inflection Point: Necessary Actions for Security Leaders Now</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/how-ai-transforms-threat-detection/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-14T10:24:15+00:00</news:publication_date><news:title>How AI Transforms Threat Detection</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/webinar-on-why-cloud-intrusions-still-evade-detection/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-14T09:45:45+00:00</news:publication_date><news:title>Webinar on Why Cloud Intrusions Still Evade Detection</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/fifa-world-cup-2026-over-one-third-of-official-partners-expose-public-to-email-fraud-risks/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-14T09:35:08+00:00</news:publication_date><news:title>FIFA World Cup 2026: Over One-Third of Official Partners Expose Public to Email Fraud Risks</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/uk-regulators-evaluate-risks-associated-with-ai-models/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-14T08:23:06+00:00</news:publication_date><news:title>UK Regulators Evaluate Risks Associated with AI Models</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/quantum-threats-to-phi-the-urgency-of-vault-adoption/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-14T08:09:36+00:00</news:publication_date><news:title>Quantum Threats to PHI: The Urgency of Vault Adoption</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/in-open-source-silicon-we-trust-bunnie-huangs-baochip/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-14T07:24:47+00:00</news:publication_date><news:title>In Open-Source Silicon We Trust: Bunnie Huang&#8217;s Baochip</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/synology-ssl-vpn-client-vulnerability-allows-remote-access-to-sensitive-files/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-14T06:22:09+00:00</news:publication_date><news:title>Synology SSL VPN Client Vulnerability Allows Remote Access to Sensitive Files</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/openai-revokes-macos-app-certificate-following-malicious-axios-supply-chain-incident/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-14T05:03:49+00:00</news:publication_date><news:title>OpenAI Revokes macOS App Certificate Following Malicious Axios Supply Chain Incident</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/uk-cyber-security-council-introduces-associate-title/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-14T04:21:14+00:00</news:publication_date><news:title>UK Cyber Security Council Introduces Associate Title</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/france-plans-major-shift-in-public-sector-away-from-us-technology/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-14T02:42:24+00:00</news:publication_date><news:title>France Plans Major Shift in Public Sector Away from US Technology</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/hackers-exploit-msbuild-lolbin-to-bypass-detection-in-fileless-windows-attacks/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-14T02:20:08+00:00</news:publication_date><news:title>Hackers Exploit MSBuild LOLBin to Bypass Detection in Fileless Windows Attacks</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/operation-atlantic-seizes-12-million-in-cryptocurrency-losses/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-14T00:36:11+00:00</news:publication_date><news:title>Operation Atlantic Seizes $12 Million in Cryptocurrency Losses</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/ai-illegally-records-doctor-patient-encounters/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-14T00:21:23+00:00</news:publication_date><news:title>AI Illegally Records Doctor-Patient Encounters</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/anthropics-mythos-indicates-a-structural-shift-in-cybersecurity/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-14T00:19:34+00:00</news:publication_date><news:title>Anthropic&#8217;s Mythos Indicates a Structural Shift in Cybersecurity</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/univen-hackathon-enhances-cyber-security-skills/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-13T22:18:17+00:00</news:publication_date><news:title>UNIVEN Hackathon Enhances Cyber Security Skills</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/fbi-takes-down-20-million-phishing-operation-w3ll/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-13T22:05:20+00:00</news:publication_date><news:title>FBI Takes Down $20 Million Phishing Operation W3LL</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/claude-mythos-could-overwhelm-vendors-with-deferred-fixes/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-13T22:00:49+00:00</news:publication_date><news:title>Claude Mythos Could Overwhelm Vendors With Deferred Fixes</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/new-patch-for-critical-security-flaws-in-nginx-1-29-8-and-freenginx-versions/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-13T20:17:41+00:00</news:publication_date><news:title>New Patch for Critical Security Flaws in Nginx 1.29.8 and FreeNginx Versions</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/banks-must-operate-like-interpol-to-combat-fraud-networks/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-13T19:39:43+00:00</news:publication_date><news:title>Banks Must Operate Like Interpol to Combat Fraud Networks</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/mirax-android-trojan-converts-devices-into-residential-proxy-nodes/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-13T19:34:13+00:00</news:publication_date><news:title>Mirax Android Trojan Converts Devices into Residential Proxy Nodes</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cyber-briefing-april-13-2026-cybermaterial/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-13T18:15:53+00:00</news:publication_date><news:title>Cyber Briefing &#8211; April 13, 2026: CyberMaterial</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cybersecurity-risks-exceed-corporate-management-capabilities/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-13T17:18:30+00:00</news:publication_date><news:title>Cybersecurity Risks Exceed Corporate Management Capabilities</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/mailbox-rule-abuse-emerges-as-a-stealthy-threat-after-compromise/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-13T17:03:47+00:00</news:publication_date><news:title>Mailbox Rule Abuse Emerges as a Stealthy Threat After Compromise</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/github-and-jira-alerts-exploited-for-trusted-saas-phishing/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-13T16:15:17+00:00</news:publication_date><news:title>GitHub and Jira Alerts Exploited for Trusted SaaS Phishing</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/seven-ibm-websphere-liberty-vulnerabilities-can-be-exploited-for-complete-takeover/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-13T14:32:17+00:00</news:publication_date><news:title>Seven IBM WebSphere Liberty Vulnerabilities Can Be Exploited for Complete Takeover</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/critical-flaw-in-marimo-python-notebook-exploited-within-ten-hours-of-disclosure/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-13T14:14:24+00:00</news:publication_date><news:title>Critical Flaw in Marimo Python Notebook Exploited Within Ten Hours of Disclosure</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/iranian-apt-targets-plcs-in-the-us/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-13T12:13:17+00:00</news:publication_date><news:title>Iranian APT Targets PLCs in the US</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/uk-cyber-security-council-launches-associate-cyber-security-role/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-13T12:01:24+00:00</news:publication_date><news:title>UK Cyber Security Council Launches Associate Cyber Security Role</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/vipertunnel-python-backdoor-disguised-as-a-fake-dll-with-an-obfuscated-loader-chain/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-13T10:12:31+00:00</news:publication_date><news:title>VIPERTUNNEL: Python Backdoor Disguised as a Fake DLL with an Obfuscated Loader Chain</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cisos-address-the-ai-visibility-gap/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-13T09:30:11+00:00</news:publication_date><news:title>CISOs Address the AI Visibility Gap</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/eurail-data-breach-exposes-information-of-300000-users/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-13T08:11:09+00:00</news:publication_date><news:title>Eurail Data Breach Exposes Information of 300,000 Users</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/edr-killers-expand-ransomware-strategies-according-to-eset/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-13T06:10:13+00:00</news:publication_date><news:title>EDR Killers Expand Ransomware Strategies, According to ESET</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/ransomware-attack-targets-chipsoft-cybermaterial/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-13T04:10:10+00:00</news:publication_date><news:title>Ransomware Attack Targets ChipSoft &#8211; CyberMaterial</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/minnesota-activates-national-guard-following-cyberattack/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-13T02:08:21+00:00</news:publication_date><news:title>Minnesota Activates National Guard Following Cyberattack</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/openai-plans-gradual-model-rollout/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-13T00:07:15+00:00</news:publication_date><news:title>OpenAI Plans Gradual Model Rollout</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/inside-ekoparty-miami-featuring-federico-kirschbaum/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-12T22:07:28+00:00</news:publication_date><news:title>Inside EkoParty Miami Featuring Federico Kirschbaum</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/imposter-microsoft-support-website-deceives-users-into-downloading-malware/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-12T20:06:49+00:00</news:publication_date><news:title>Imposter Microsoft Support Website Deceives Users into Downloading Malware</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
</urlset>
