<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/wp-content/plugins/xml-sitemap-feed/assets/sitemap-news.xsl?ver=5.4.9"?>
<!-- generated-on="2026-04-08T12:21:00+00:00" -->
<!-- generator="XML Sitemap & Google News for WordPress" -->
<!-- generator-url="https://status301.net/wordpress-plugins/xml-sitemap-feed/" -->
<!-- generator-version="5.4.9" -->
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" >
<url><loc>https://cybersecurity-see.com/bluehammer-windows-zero-day-vulnerability-exposed-cybermaterial/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-08T11:12:37+00:00</news:publication_date><news:title>BlueHammer Windows Zero-Day Vulnerability Exposed &#8211; CyberMaterial</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/llm-generated-passwords-are-insecure-your-codebase-might-confirm-it/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-08T11:11:35+00:00</news:publication_date><news:title>LLM-Generated Passwords Are Insecure; Your Codebase Might Confirm It</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/massachusetts-hospital-diverts-ambulances-amidst-attack-response/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-08T10:22:38+00:00</news:publication_date><news:title>Massachusetts Hospital Diverts Ambulances Amidst Attack Response</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/greynoise-introduces-c2-detection-for-compromised-edge-devices/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-08T09:10:35+00:00</news:publication_date><news:title>GreyNoise Introduces C2 Detection for Compromised Edge Devices</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/iran-backed-threat-actors-target-us-critical-national-infrastructure-providers-through-internet-facing-ot/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-08T08:40:16+00:00</news:publication_date><news:title>Iran-Backed Threat Actors Target US Critical National Infrastructure Providers Through Internet-Facing OT</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/china-linked-storm-1175-exploits-zero-day-vulnerabilities-to-swiftly-deploy-medusa-ransomware/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-08T08:01:33+00:00</news:publication_date><news:title>China-Linked Storm-1175 Exploits Zero-Day Vulnerabilities to Swiftly Deploy Medusa Ransomware</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/five-strategies-to-enhance-identity-security-and-boost-attack-resilience/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-08T07:09:40+00:00</news:publication_date><news:title>Five Strategies to Enhance Identity Security and Boost Attack Resilience</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/iran-linked-hackers-target-u-s-critical-infrastructure-through-exposed-industrial-controllers/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-08T07:00:52+00:00</news:publication_date><news:title>Iran-Linked Hackers Target U.S. Critical Infrastructure Through Exposed Industrial Controllers</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/five-steps-to-enhance-supply-chain-security-and-boost-cyber-resilience/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-08T06:09:25+00:00</news:publication_date><news:title>Five Steps to Enhance Supply Chain Security and Boost Cyber Resilience</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/new-esentire-ceo-drives-ai-enhanced-managed-security-transformation/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-08T05:41:03+00:00</news:publication_date><news:title>New eSentire CEO Drives AI-Enhanced Managed Security Transformation</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/the-role-of-agentic-ai-in-amplifying-and-creating-insider-risks/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-08T05:08:44+00:00</news:publication_date><news:title>The Role of Agentic AI in Amplifying and Creating Insider Risks</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/grafanaghost-exploit-eases-past-ai-guardrails-for-silent-data-exfiltration/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-08T03:38:14+00:00</news:publication_date><news:title>GrafanaGhost Exploit Eases Past AI Guardrails for Silent Data Exfiltration</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/us-critical-infrastructure-vulnerable-to-iranian-linked-ot-threats/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-08T03:19:30+00:00</news:publication_date><news:title>US Critical Infrastructure Vulnerable to Iranian-Linked OT Threats</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/microsoft-connects-medusa-to-zero-day-attacks/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-08T03:07:18+00:00</news:publication_date><news:title>Microsoft Connects Medusa to Zero-Day Attacks</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/what-anthropic-glasswing-indicates-for-the-future-of-vulnerability-discovery/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-08T01:07:46+00:00</news:publication_date><news:title>What Anthropic Glasswing Indicates for the Future of Vulnerability Discovery</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/bpfdoor-variants-concealment-utilizing-stateless-c2-and-icmp-relay-tactics/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-08T01:06:34+00:00</news:publication_date><news:title>BPFDoor Variants Concealment Utilizing Stateless C2 and ICMP Relay Tactics</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/anthropic-deems-its-new-model-too-dangerous-for-release/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-08T00:58:18+00:00</news:publication_date><news:title>Anthropic Deems Its New Model Too Dangerous for Release</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/fortinet-issues-emergency-hotfix-for-zero-day-flaw-in-forticlient-ems/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-07T23:05:13+00:00</news:publication_date><news:title>Fortinet Issues Emergency Hotfix for Zero-Day Flaw in FortiClient EMS</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/hims-hers-telehealth-company-reveals-data-breach/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-07T22:37:42+00:00</news:publication_date><news:title>Hims &#038; Hers Telehealth Company Reveals Data Breach</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/gpu-rowhammer-attack-facilitates-privilege-escalation/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-07T22:36:24+00:00</news:publication_date><news:title>GPU Rowhammer Attack Facilitates Privilege Escalation</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/identity-security-at-rsac-2026-navigating-new-enterprise-dynamics/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-07T21:04:19+00:00</news:publication_date><news:title>Identity Security at RSAC 2026: Navigating New Enterprise Dynamics</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/russian-hackers-target-soho-routers-in-cyberespionage-campaign/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-07T20:15:25+00:00</news:publication_date><news:title>Russian Hackers Target SOHO Routers in Cyberespionage Campaign</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/5-practical-steps-to-enhance-attack-resilience-through-attack-surface-management/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-07T20:05:37+00:00</news:publication_date><news:title>5 Practical Steps to Enhance Attack Resilience through Attack Surface Management</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/miwic26-anmol-agarwal-senior-security-researcher-at-nokia/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-07T19:03:40+00:00</news:publication_date><news:title>MIWIC26 &#8211; Anmol Agarwal, Senior Security Researcher at Nokia</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/the-quiet-revolt-and-insights-from-the-2026-world-happiness-report-for-security-professionals/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-07T17:54:21+00:00</news:publication_date><news:title>The Quiet Revolt and Insights from the 2026 World Happiness Report for Security Professionals</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/russian-apt28-hackers-compromise-routers-to-acquire-credentials/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-07T17:33:51+00:00</news:publication_date><news:title>Russian APT28 Hackers Compromise Routers to Acquire Credentials</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/white-house-reduces-cisa-funding-by-707-million/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-07T17:02:15+00:00</news:publication_date><news:title>White House Reduces CISA Funding by $707 Million</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/iran-linked-password-spraying-campaign-targets-over-300-israeli-microsoft-365-organizations/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-07T15:33:33+00:00</news:publication_date><news:title>Iran-Linked Password-Spraying Campaign Targets Over 300 Israeli Microsoft 365 Organizations</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/microsoft-reports-medusa-linked-storm-1175-accelerating-ransomware-attacks/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-07T15:02:46+00:00</news:publication_date><news:title>Microsoft Reports Medusa-Linked Storm-1175 Accelerating Ransomware Attacks</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cups-vulnerabilities-may-enable-remote-attackers-to-attain-root-level-code-execution/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-07T15:01:43+00:00</news:publication_date><news:title>CUPS Vulnerabilities May Enable Remote Attackers to Attain Root-Level Code Execution</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/what-ai-vulnerability-discovery-means-for-cyber-defense/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-07T14:57:14+00:00</news:publication_date><news:title>What AI Vulnerability Discovery Means for Cyber Defense</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/latest-breachforums-reboot-linked-to-faux-shinyhunters-admin/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-07T13:12:30+00:00</news:publication_date><news:title>Latest BreachForums Reboot Linked to Faux ShinyHunters Admin</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/zero-click-grafana-ai-attack-enables-enterprise-data-exfiltration/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-07T13:00:45+00:00</news:publication_date><news:title>Zero-click Grafana AI Attack Enables Enterprise Data Exfiltration</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/building-secure-ai-data-pipelines-using-cryptobind/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-07T12:31:30+00:00</news:publication_date><news:title>Building Secure AI Data Pipelines Using CryptoBind</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/eu-commission-breach-exposes-sensitive-data/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-07T11:00:25+00:00</news:publication_date><news:title>EU Commission Breach Exposes Sensitive Data</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/the-cybersecurity-skills-gap-a-partially-self-inflicted-issue/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-07T10:51:43+00:00</news:publication_date><news:title>The Cybersecurity Skills Gap: A Partially Self-Inflicted Issue</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/fortinet-releases-emergency-patch-following-exploit-of-forticlient-ems-bug/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-07T10:00:16+00:00</news:publication_date><news:title>Fortinet Releases Emergency Patch Following Exploit of FortiClient EMS Bug</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/attackers-exploit-flowise-injection-vulnerability-with-over-15000-instances-still-exposed/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-07T08:59:28+00:00</news:publication_date><news:title>Attackers Exploit Flowise Injection Vulnerability with Over 15,000 Instances Still Exposed</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/qilin-and-warlock-ransomware-exploit-vulnerable-drivers-to-disable-over-300-edr-tools/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-07T08:30:33+00:00</news:publication_date><news:title>Qilin and Warlock Ransomware Exploit Vulnerable Drivers to Disable Over 300 EDR Tools</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/bka-identifies-leaders-of-revil-ransomware-group/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-07T06:58:12+00:00</news:publication_date><news:title>BKA Identifies Leaders of REvil Ransomware Group</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/why-secops-and-grc-continue-to-face-alignment-challenges-in-financial-services-webinar/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-07T06:09:24+00:00</news:publication_date><news:title>Why SecOps and GRC Continue to Face Alignment Challenges in Financial Services Webinar</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/drift-protocol-targeted-in-286-million-suspected-crypto-heist-linked-to-north-korea/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-07T04:57:23+00:00</news:publication_date><news:title>Drift Protocol Targeted in $286 Million Suspected Crypto Heist Linked to North Korea</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/bka-identifies-revil-leaders-responsible-for-130-ransomware-attacks-in-germany/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-07T03:48:29+00:00</news:publication_date><news:title>BKA Identifies REvil Leaders Responsible for 130 Ransomware Attacks in Germany</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/ny-school-data-incidents-increase-by-72/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-07T02:56:12+00:00</news:publication_date><news:title>NY School Data Incidents Increase by 72%</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/censys-secures-70m-to-enhance-ai-driven-threat-intelligence/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-07T01:27:52+00:00</news:publication_date><news:title>Censys Secures $70M to Enhance AI-Driven Threat Intelligence</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/google-introduces-lazy-loading-for-media-files-in-latest-chrome-update/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-07T00:53:10+00:00</news:publication_date><news:title>Google Introduces Lazy Loading for Media Files in Latest Chrome Update</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/trumps-budget-proposal-aims-to-cut-cisa-funding-following-challenging-year/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-06T23:06:35+00:00</news:publication_date><news:title>Trump&#8217;s Budget Proposal Aims to Cut CISA Funding Following Challenging Year</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/key-insights-on-red-team-testing-and-legal-considerations/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-06T22:52:19+00:00</news:publication_date><news:title>Key Insights on Red Team Testing and Legal Considerations</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/flubot-android-banking-malware/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-06T20:51:31+00:00</news:publication_date><news:title>FluBot Android Banking Malware</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/models-break-rules-to-save-their-peers/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-06T20:45:43+00:00</news:publication_date><news:title>Models Break Rules to Save Their Peers</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/trojanized-pypi-ai-proxy-steals-claude-prompts-and-exfiltrates-data/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-06T18:50:30+00:00</news:publication_date><news:title>Trojanized PyPI AI Proxy Steals Claude Prompts and Exfiltrates Data</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/attackers-exploit-zero-day-vulnerability-in-fortinet-security-software/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-06T18:24:46+00:00</news:publication_date><news:title>Attackers Exploit Zero-Day Vulnerability in Fortinet Security Software</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/meaningful-metrics-show-the-value-of-cyber-resiliency/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-06T16:49:22+00:00</news:publication_date><news:title>Meaningful Metrics Show the Value of Cyber-Resiliency</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/escaping-the-cots-trap-cso-online/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-06T16:20:24+00:00</news:publication_date><news:title>Escaping the COTS Trap &#8211; CSO Online</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cyber-briefing-2026-04-06-cybermaterial/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-06T14:48:15+00:00</news:publication_date><news:title>Cyber Briefing &#8211; 2026.04.06 &#8211; CyberMaterial</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/north-korean-hackers-exploit-lnks-and-github-repositories-in-ongoing-campaign/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-06T13:49:33+00:00</news:publication_date><news:title>North Korean Hackers Exploit LNKs and GitHub Repositories in Ongoing Campaign</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/github-backed-malware-distribution-through-lnk-files-in-south-korea/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-06T12:47:19+00:00</news:publication_date><news:title>GitHub-Backed Malware Distribution through LNK Files in South Korea</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
</urlset>
