<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/wp-content/plugins/xml-sitemap-feed/assets/sitemap-news.xsl?ver=5.4.9"?>
<!-- generated-on="2026-04-28T04:12:00+00:00" -->
<!-- generator="XML Sitemap & Google News for WordPress" -->
<!-- generator-url="https://status301.net/wordpress-plugins/xml-sitemap-feed/" -->
<!-- generator-version="5.4.9" -->
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" >
<url><loc>https://cybersecurity-see.com/cisa-director-nominee-withdraws-from-consideration-cybermaterial/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-28T03:12:41+00:00</news:publication_date><news:title>CISA Director Nominee Withdraws from Consideration &#8211; CyberMaterial</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/crypto-targeting-north-koreans-use-fake-zoom-meetings/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-28T02:51:31+00:00</news:publication_date><news:title>Crypto Targeting North Koreans Use Fake Zoom Meetings</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/infected-cisco-firewalls-require-cold-start-to-remove-persistent-firestarter-backdoor/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-28T01:56:12+00:00</news:publication_date><news:title>Infected Cisco Firewalls Require Cold Start to Remove Persistent Firestarter Backdoor</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/fake-youtube-downloads-distribute-vidar-malware-to-steal-corporate-credentials/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-28T01:12:15+00:00</news:publication_date><news:title>Fake YouTube Downloads Distribute Vidar Malware to Steal Corporate Credentials</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/pentagons-anthropic-initiative-faces-criticism-from-former-dod-leaders/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-28T00:30:44+00:00</news:publication_date><news:title>Pentagon&#8217;s Anthropic Initiative Faces Criticism from Former DOD Leaders</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/researchers-discover-fast16-sabotage-malware-predating-stuxnet/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-27T23:25:12+00:00</news:publication_date><news:title>Researchers Discover Fast16 Sabotage Malware Predating Stuxnet</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/belgium-unveils-new-cyber-crisis-response-plan/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-27T23:11:14+00:00</news:publication_date><news:title>Belgium Unveils New Cyber Crisis Response Plan</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/medical-device-maker-medtronic-reports-cybersecurity-breach/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-27T22:09:56+00:00</news:publication_date><news:title>Medical Device Maker Medtronic Reports Cybersecurity Breach</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/eu-proposes-mandating-google-to-share-search-data-with-competitors-under-dma/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-27T21:10:16+00:00</news:publication_date><news:title>EU Proposes Mandating Google to Share Search Data with Competitors Under DMA</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/common-browser-extensions-that-sell-user-data/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-27T20:54:30+00:00</news:publication_date><news:title>Common Browser Extensions That Sell User Data</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/ai-red-teaming-is-distinct-from-prompt-injection/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-27T19:48:42+00:00</news:publication_date><news:title>AI Red Teaming Is Distinct from Prompt Injection</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cyber-briefing-for-april-27-2026-cybermaterial/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-27T19:09:11+00:00</news:publication_date><news:title>Cyber Briefing for April 27, 2026 &#8211; CyberMaterial</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/utilities-tech-supplier-itron-reveals-cyber-attack/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-27T18:23:20+00:00</news:publication_date><news:title>Utilities Tech Supplier Itron Reveals Cyber-Attack</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/home-security-firm-adt-suffers-data-breach-affecting-5-5-million-customers/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-27T17:26:29+00:00</news:publication_date><news:title>Home Security Firm ADT Suffers Data Breach Affecting 5.5 Million Customers</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/new-malware-utilizes-obfuscation-and-staged-payloads/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-27T17:08:12+00:00</news:publication_date><news:title>New Malware Utilizes Obfuscation and Staged Payloads</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/us-sanctions-focus-on-leaders-of-cambodian-scam-network/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-27T15:52:22+00:00</news:publication_date><news:title>US Sanctions Focus on Leaders of Cambodian Scam Network</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/microsoft-resolved-an-unpatched-agent-only-role-issue/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-27T15:07:08+00:00</news:publication_date><news:title>Microsoft resolved an unpatched &#8216;agent-only&#8217; role issue.</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/many-cybersecurity-professionals-feel-undervalued-and-underpaid/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-27T13:21:18+00:00</news:publication_date><news:title>Many Cybersecurity Professionals Feel Undervalued and Underpaid</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/aspiritech-celebrates-cybersecurity-apprenticeship-program/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-27T13:06:24+00:00</news:publication_date><news:title>Aspiritech Celebrates Cybersecurity Apprenticeship Program</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/linux-elf-malware-generator-bypasses-ml-detection-through-semantic-preserving-modifications/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-27T11:05:07+00:00</news:publication_date><news:title>Linux ELF Malware Generator Bypasses ML Detection Through Semantic-Preserving Modifications</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/ai-is-transforming-devsecops-by-integrating-security-with-code/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-27T10:50:18+00:00</news:publication_date><news:title>AI is Transforming DevSecOps by Integrating Security with Code</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/is-your-iam-prepared-for-ai/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-27T10:23:22+00:00</news:publication_date><news:title>Is Your IAM Prepared for AI?</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/manager-of-agents-how-ai-evolves-the-soc-analyst-role/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-27T09:04:11+00:00</news:publication_date><news:title>Manager of Agents: How AI Evolves the SOC Analyst Role</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/post-mythos-security-and-cyber-risk-resilience/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-27T08:57:55+00:00</news:publication_date><news:title>Post-Mythos Security and Cyber Risk Resilience</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/blackfile-group-aims-at-retail-and-hospitality-sector-with-vishing-attacks/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-27T08:19:21+00:00</news:publication_date><news:title>BlackFile Group Aims at Retail and Hospitality Sector with Vishing Attacks</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/clickfix-attack-replaces-powershell-with-cmdkey-and-remote-regsvr32-payloads/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-27T07:03:16+00:00</news:publication_date><news:title>ClickFix Attack Replaces PowerShell with Cmdkey and Remote Regsvr32 Payloads</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/ransomware-negotiator-enters-guilty-plea-cybermaterial/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-26T16:56:12+00:00</news:publication_date><news:title>Ransomware Negotiator Enters Guilty Plea &#8211; CyberMaterial</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/new-threats-against-ai-assistants/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-26T14:55:34+00:00</news:publication_date><news:title>New Threats Against AI Assistants</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/trigona-ransomware-employs-unique-exfiltration-tool/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-26T12:54:30+00:00</news:publication_date><news:title>Trigona Ransomware Employs Unique Exfiltration Tool</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/rituals-reveals-data-breach-cybermaterial/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-26T10:53:23+00:00</news:publication_date><news:title>Rituals Reveals Data Breach &#8211; CyberMaterial</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/checkmarx-supply-chain-security-breach/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-26T08:51:13+00:00</news:publication_date><news:title>Checkmarx Supply Chain Security Breach</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/hackers-exploit-ollama-model-uploads-to-expose-server-data/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-26T06:50:08+00:00</news:publication_date><news:title>Hackers Exploit Ollama Model Uploads to Expose Server Data</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/ismg-editors-discuss-the-drive-for-ai-innovation/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-26T06:10:27+00:00</news:publication_date><news:title>ISMG Editors Discuss the Drive for AI Innovation</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cyber-attacks-in-the-education-sector-surge-by-63/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-26T04:49:09+00:00</news:publication_date><news:title>Cyber Attacks in the Education Sector Surge by 63%</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
</urlset>
