<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/wp-content/plugins/xml-sitemap-feed/assets/sitemap-news.xsl?ver=5.4.9"?>
<!-- generated-on="2026-04-03T19:38:28+00:00" -->
<!-- generator="XML Sitemap & Google News for WordPress" -->
<!-- generator-url="https://status301.net/wordpress-plugins/xml-sitemap-feed/" -->
<!-- generator-version="5.4.9" -->
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" >
<url><loc>https://cybersecurity-see.com/why-third-party-risk-is-the-biggest-gap-in-your-security-posture/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-03T18:32:55+00:00</news:publication_date><news:title>Why Third-Party Risk Is the Biggest Gap in Your Security Posture</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/free-vpns-expose-data-despite-privacy-promises/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-03T18:14:54+00:00</news:publication_date><news:title>Free VPNs Expose Data Despite Privacy Promises</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/google-addresses-fourth-chrome-zero-day-vulnerability-this-year/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-03T17:50:23+00:00</news:publication_date><news:title>Google Addresses Fourth Chrome Zero-Day Vulnerability This Year</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/new-progress-sharefile-vulnerabilities-expose-servers-to-unauthorized-remote-takeover/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-03T16:14:11+00:00</news:publication_date><news:title>New Progress ShareFile Vulnerabilities Expose Servers to Unauthorized Remote Takeover</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/new-phishing-platform-active-in-credential-theft-campaigns/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-03T15:19:24+00:00</news:publication_date><news:title>New Phishing Platform Active in Credential Theft Campaigns</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/drift-loses-285-million-in-dprk-linked-social-engineering-attack/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-03T14:31:53+00:00</news:publication_date><news:title>Drift Loses $285 Million in DPRK-Linked Social Engineering Attack</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cyber-briefing-april-3-2026-cybermaterial/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-03T14:13:32+00:00</news:publication_date><news:title>Cyber Briefing &#8211; April 3, 2026 &#8211; CyberMaterial</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/ncsc-urges-immediate-patching-of-f5-big-ip-vulnerability/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-03T12:48:13+00:00</news:publication_date><news:title>NCSC Urges Immediate Patching of F5 BIG-IP Vulnerability</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/infrastructure-engineer-admits-guilt-in-locking-254-windows-servers-at-previous-employer/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-03T12:12:17+00:00</news:publication_date><news:title>Infrastructure Engineer Admits Guilt in Locking 254 Windows Servers at Previous Employer</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/impact-of-data-centers-as-military-targets/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-03T10:30:41+00:00</news:publication_date><news:title>Impact of Data Centers as Military Targets</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/12-cyber-industry-trends-unveiled-at-rsac-2026/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-03T10:17:18+00:00</news:publication_date><news:title>12 Cyber Industry Trends Unveiled at RSAC 2026</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/anthropic-addresses-claude-code-leak/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-03T10:11:15+00:00</news:publication_date><news:title>Anthropic Addresses Claude Code Leak</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/tp-link-router-vulnerabilities-enabled-dos-attacks-and-system-crashes/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-03T08:10:21+00:00</news:publication_date><news:title>TP-Link Router Vulnerabilities Enabled DoS Attacks and System Crashes</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/pentagon-commits-to-reform-cyber-talent-management-system/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-03T08:09:41+00:00</news:publication_date><news:title>Pentagon Commits to Reform Cyber Talent Management System</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/phantom-project-offers-infostealer-crypter-and-rat-bundles-for-sale/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-03T07:46:12+00:00</news:publication_date><news:title>Phantom Project Offers Infostealer, Crypter, and RAT Bundles for Sale</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/proton-introduces-privacy-focused-meeting-platform/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-03T06:09:21+00:00</news:publication_date><news:title>Proton Introduces Privacy-Focused Meeting Platform</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/feds-confirm-major-hack-of-fbi-system/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-03T05:48:28+00:00</news:publication_date><news:title>Feds Confirm Major Hack of FBI System</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/researchers-identify-ransomware-attacks-under-one-hour/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-03T05:15:13+00:00</news:publication_date><news:title>Researchers Identify Ransomware Attacks Under One Hour</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/iranian-hacker-group-handal-claims-to-have-breached-israeli-defense-firm/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-03T04:08:17+00:00</news:publication_date><news:title>Iranian Hacker Group Handal Claims to Have Breached Israeli Defense Firm</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/threatsday-bulletin-pre-auth-chains-android-rootkits-cloudtrail-evasion-and-10-additional-stories/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-03T03:27:30+00:00</news:publication_date><news:title>ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion, and 10 Additional Stories</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/github-utilized-as-a-covert-channel-in-multi-stage-malware-campaign/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-03T02:44:21+00:00</news:publication_date><news:title>GitHub Utilized as a Covert Channel in Multi-Stage Malware Campaign</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cloudflares-new-cms-a-wordpress-alternative-not-a-wordpress-killer/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-03T02:07:29+00:00</news:publication_date><news:title>Cloudflare’s New CMS: A WordPress Alternative, Not a WordPress Killer</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/charges-in-the-uranium-finance-case/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-03T01:06:32+00:00</news:publication_date><news:title>Charges in the Uranium Finance Case</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cisco-addresses-critical-imc-authentication-bypass-affecting-multiple-products/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-03T00:13:20+00:00</news:publication_date><news:title>Cisco Addresses Critical IMC Authentication Bypass Affecting Multiple Products</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cloud-security-architecture-a-comprehensive-blueprint-for-cisos-in-the-enterprise-cloud/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-03T00:06:35+00:00</news:publication_date><news:title>Cloud Security Architecture &#8211; A Comprehensive Blueprint for CISOs in the Enterprise Cloud</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/startup-linx-secures-50m-amid-intensifying-identity-threats/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-02T22:44:21+00:00</news:publication_date><news:title>Startup Linx Secures $50M Amid Intensifying Identity Threats</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cyber-briefing-april-2-2026-cybermaterial/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-02T22:05:28+00:00</news:publication_date><news:title>Cyber Briefing &#8211; April 2, 2026: CyberMaterial</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/apple-expands-ios-18-security-updates-in-response-to-darksword-threat/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-02T21:42:38+00:00</news:publication_date><news:title>Apple Expands iOS 18 Security Updates in Response to DarkSword Threat</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/reengineering-aml-for-the-era-of-instant-payments/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-02T20:23:52+00:00</news:publication_date><news:title>Reengineering AML for the Era of Instant Payments</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/akira-style-ransomware-campaign-targets-windows-users-in-south-america/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-02T20:04:13+00:00</news:publication_date><news:title>Akira-Style Ransomware Campaign Targets Windows Users in South America</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/new-storm-infostealer-remotely-decrypts-stolen-credentials/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-02T19:11:20+00:00</news:publication_date><news:title>New Storm Infostealer Remotely Decrypts Stolen Credentials</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cert-ua-impersonation-campaign-spread-agewheeze-malware-to-1-million-emails/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-02T18:25:31+00:00</news:publication_date><news:title>CERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million Emails</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/top-5-soc-as-a-service-providers-and-evaluation-criteria/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-02T18:03:06+00:00</news:publication_date><news:title>Top 5 SOC-as-a-Service Providers and Evaluation Criteria</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/hasbro-cyberattack-a-timeline-its-impact-and-industry-implications/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-02T18:01:59+00:00</news:publication_date><news:title>Hasbro Cyberattack: A Timeline, its Impact, and Industry Implications</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/ncsc-issues-security-alert-regarding-hackers-targeting-whatsapp-and-signal/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-02T16:40:24+00:00</news:publication_date><news:title>NCSC Issues Security Alert Regarding Hackers Targeting WhatsApp and Signal</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/miwic26-nkiruka-joy-aimienoho-chief-information-security-officer-at-standard-chartered-bank-ng/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-02T16:00:18+00:00</news:publication_date><news:title>MIWIC26: Nkiruka Joy Aimienoho, Chief Information Security Officer at Standard Chartered Bank NG</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/your-ai-vendors-biggest-challenge-its-own-development-pipeline/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-02T15:39:21+00:00</news:publication_date><news:title>Your AI Vendor&#8217;s Biggest Challenge: Its Own Development Pipeline</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/eviltokens-exploits-microsoft-device-code-flow-for-account-takeovers/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-02T14:09:12+00:00</news:publication_date><news:title>EvilTokens Exploits Microsoft Device Code Flow for Account Takeovers</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/apple-expands-ios-update-to-prevent-exploit/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-02T13:59:11+00:00</news:publication_date><news:title>Apple Expands iOS Update to Prevent Exploit</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/enterprise-ai-security-assessing-benefits-and-risks-in-2026/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-02T13:18:04+00:00</news:publication_date><news:title>Enterprise AI Security: Assessing Benefits and Risks in 2026</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/imposter-cert-ua-website-distributes-go-based-rat-in-phishing-campaign/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-02T11:57:58+00:00</news:publication_date><news:title>Imposter CERT-UA Website Distributes Go-Based RAT in Phishing Campaign</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/most-cni-firms-experience-up-to-5m-in-downtime-due-to-ot-attacks/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-02T11:38:18+00:00</news:publication_date><news:title>Most CNI Firms Experience Up to £5m in Downtime Due to OT Attacks</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/the-hidden-danger-in-llm-powered-applications-webinar-2/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-02T10:55:58+00:00</news:publication_date><news:title>The Hidden Danger in LLM-Powered Applications Webinar</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cybersecurity-in-the-era-of-instant-software/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-02T09:57:17+00:00</news:publication_date><news:title>Cybersecurity in the Era of Instant Software</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/data-discovery-and-mapping-guide/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-02T09:06:24+00:00</news:publication_date><news:title>Data Discovery and Mapping Guide</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/european-commission-confirms-attack-on-europa-web-platform/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-02T08:34:31+00:00</news:publication_date><news:title>European Commission Confirms Attack on Europa Web Platform</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/android-developer-verification-rollout-begins/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-02T07:56:10+00:00</news:publication_date><news:title>Android Developer Verification Rollout Begins</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/google-unveils-android-dev-verification-amidst-openness-debate/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-02T06:35:24+00:00</news:publication_date><news:title>Google Unveils Android Dev Verification Amidst Openness Debate</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/ais-role-in-reducing-noise-and-enhancing-appsec-outcomes-webinar/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-02T06:13:28+00:00</news:publication_date><news:title>AI&#8217;s Role in Reducing Noise and Enhancing AppSec Outcomes Webinar</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/whatsapp-attack-chain-distributes-vbs-cloud-payloads-and-msi-backdoor/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-02T05:55:43+00:00</news:publication_date><news:title>WhatsApp Attack Chain Distributes VBS, Cloud Payloads, and MSI Backdoor</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/tools-zur-sicherung-des-mcp-servers-cso-online/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-02T04:04:29+00:00</news:publication_date><news:title>Tools zur Sicherung des MCP-Servers | CSO Online</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/openai-shuts-down-sora-app-due-to-deepfake-concerns/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-02T03:54:06+00:00</news:publication_date><news:title>OpenAI Shuts Down Sora App Due to Deepfake Concerns</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/simplify-security-and-strengthen-recovery-in-govinfosecurity/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-02T03:52:34+00:00</news:publication_date><news:title>Simplify Security and Strengthen Recovery in GovInfoSecurity</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/microsoft-teams-enhances-privacy-by-removing-exif-data/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-02T01:53:27+00:00</news:publication_date><news:title>Microsoft Teams Enhances Privacy by Removing EXIF Data</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/hackers-compromise-axios-npm-package-to-distribute-rats/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-02T01:33:19+00:00</news:publication_date><news:title>Hackers Compromise Axios npm Package to Distribute RATs</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/hhs-reassigns-internal-cybersecurity-and-ai-oversight-to-cio-office/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-02T01:31:29+00:00</news:publication_date><news:title>HHS Reassigns Internal Cybersecurity and AI Oversight to CIO Office</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/criminal-service-profits-from-ransomware-data/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-01T23:52:27+00:00</news:publication_date><news:title>Criminal Service Profits from Ransomware Data</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/qodo-secures-70m-in-series-b-funding-to-address-ai-code-risks-and-enhance-quality/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-01T23:10:39+00:00</news:publication_date><news:title>Qodo Secures $70M in Series B Funding to Address AI Code Risks and Enhance Quality</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/9-strategies-for-cisos-to-combat-ai-hallucinations/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-01T23:01:21+00:00</news:publication_date><news:title>9 Strategies for CISOs to Combat AI Hallucinations</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/google-issues-urgent-warning-about-active-exploitation-of-new-chrome-zero-day-vulnerability-users-encouraged-to-update-now/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-01T21:51:17+00:00</news:publication_date><news:title>Google Issues Urgent Warning About Active Exploitation of New Chrome Zero-Day Vulnerability, Users Encouraged to Update Now</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/latest-anthropic-misstep-creates-tension-between-ai-and-cybersecurity-companies/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-01T20:49:36+00:00</news:publication_date><news:title>Latest Anthropic Misstep Creates Tension Between AI and Cybersecurity Companies</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/reconsidering-human-risk-in-enterprise-security-security-awareness-as-a-non-control-measure/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-01T19:50:18+00:00</news:publication_date><news:title>Reconsidering Human Risk in Enterprise Security: Security Awareness as a Non-Control Measure</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
</urlset>
