<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/wp-content/plugins/xml-sitemap-feed/assets/sitemap-news.xsl?ver=5.4.9"?>
<!-- generated-on="2026-04-28T18:56:40+00:00" -->
<!-- generator="XML Sitemap & Google News for WordPress" -->
<!-- generator-url="https://status301.net/wordpress-plugins/xml-sitemap-feed/" -->
<!-- generator-version="5.4.9" -->
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" >
<url><loc>https://cybersecurity-see.com/cyber-briefing-april-28-2026-cybermaterial/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-28T17:19:12+00:00</news:publication_date><news:title>Cyber Briefing &#8211; April 28, 2026: CyberMaterial</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/medtronic-acknowledges-data-breach-following-shinyhunters-allegations/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-28T17:02:13+00:00</news:publication_date><news:title>Medtronic Acknowledges Data Breach Following ShinyHunters Allegations</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/the-next-wave-of-identity-risk-securing-non-human-identities-in-an-ai-driven-world-webinar/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-28T16:57:29+00:00</news:publication_date><news:title>The Next Wave of Identity Risk: Securing Non-Human Identities in an AI-Driven World Webinar</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/hugging-face-lerobot-vulnerability-exposes-system-to-remote-code-execution-attacks/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-28T15:18:12+00:00</news:publication_date><news:title>Hugging Face LeRobot Vulnerability Exposes System to Remote Code Execution Attacks</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/freight-hacker-uses-code-signing-service-to-bypass-defenses-2/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-28T14:59:18+00:00</news:publication_date><news:title>Freight Hacker Uses Code-Signing Service to Bypass Defenses</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/researchers-identify-38-flaws-in-openemr-that-have-been-fixed/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-28T14:36:44+00:00</news:publication_date><news:title>Researchers Identify 38 Flaws in OpenEMR That Have Been Fixed</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/securing-rag-pipelines-in-enterprise-saas-solutions/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-28T14:31:22+00:00</news:publication_date><news:title>Securing RAG Pipelines in Enterprise SaaS Solutions</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/critical-cursor-bug-could-transform-routine-git-operations-into-rce/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-28T13:17:09+00:00</news:publication_date><news:title>Critical Cursor Bug Could Transform Routine Git Operations into RCE</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/linux-firestarter-backdoor-targeting-cisco-firepower-devices/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-28T13:05:04+00:00</news:publication_date><news:title>Linux FIRESTARTER Backdoor Targeting Cisco Firepower Devices</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/proofpoint-ceo-discusses-ai-security-innovations-at-rsac-2026-on-nasdaq/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-28T12:51:12+00:00</news:publication_date><news:title>Proofpoint CEO Discusses AI Security Innovations at RSAC 2026 on Nasdaq</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/breaking-the-endpoint-tax-aligning-security-and-risk/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-28T12:15:40+00:00</news:publication_date><news:title>Breaking the Endpoint Tax: Aligning Security and Risk</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/post-quantum-hsm-ensure-key-protection-now/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-28T12:01:02+00:00</news:publication_date><news:title>Post-Quantum HSM: Ensure Key Protection Now</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/beyond-the-perimeter-the-unified-narrative-of-identity-and-cybersecurity/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-28T11:16:31+00:00</news:publication_date><news:title>Beyond the Perimeter: The Unified Narrative of Identity and Cybersecurity</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/proofpoint-research-reveals-half-of-global-organizations-faced-ai-incidents-despite-implementing-ai-security-controls/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-28T10:43:31+00:00</news:publication_date><news:title>Proofpoint Research Reveals Half of Global Organizations Faced AI Incidents Despite Implementing AI Security Controls</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/how-organizations-strengthen-their-defenses/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-28T09:54:21+00:00</news:publication_date><news:title>How Organizations Strengthen Their Defenses</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/no-metrics-are-better-than-poor-metrics-in-the-soc-according-to-ncsc/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-28T09:29:16+00:00</news:publication_date><news:title>No Metrics Are Better Than Poor Metrics in the SOC, According to NCSC</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/google-plans-40-billion-investment-in-anthropic/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-28T09:15:11+00:00</news:publication_date><news:title>Google plans $40 billion investment in Anthropic</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/microsoft-confirms-active-exploitation-of-windows-shell-vulnerability-cve-2026-32202/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-28T09:03:53+00:00</news:publication_date><news:title>Microsoft Confirms Active Exploitation of Windows Shell Vulnerability CVE-2026-32202</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/phantomcore-exploits-trueconf-vulnerabilities-to-breach-russian-networks/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-28T07:33:36+00:00</news:publication_date><news:title>PhantomCore Exploits TrueConf Vulnerabilities to Breach Russian Networks</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/critical-litellm-vulnerability-allows-database-attacks-via-sql-injection/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-28T07:14:25+00:00</news:publication_date><news:title>Critical LiteLLM Vulnerability Allows Database Attacks via SQL Injection</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/fixing-the-agentic-ai-identity-crisis-in-cybersecurity/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-28T05:13:10+00:00</news:publication_date><news:title>Fixing the Agentic AI Identity Crisis in Cybersecurity</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cisa-director-nominee-withdraws-from-consideration-cybermaterial/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-28T03:12:41+00:00</news:publication_date><news:title>CISA Director Nominee Withdraws from Consideration &#8211; CyberMaterial</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/crypto-targeting-north-koreans-use-fake-zoom-meetings/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-28T02:51:31+00:00</news:publication_date><news:title>Crypto Targeting North Koreans Use Fake Zoom Meetings</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/infected-cisco-firewalls-require-cold-start-to-remove-persistent-firestarter-backdoor/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-28T01:56:12+00:00</news:publication_date><news:title>Infected Cisco Firewalls Require Cold Start to Remove Persistent Firestarter Backdoor</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/fake-youtube-downloads-distribute-vidar-malware-to-steal-corporate-credentials/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-28T01:12:15+00:00</news:publication_date><news:title>Fake YouTube Downloads Distribute Vidar Malware to Steal Corporate Credentials</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/pentagons-anthropic-initiative-faces-criticism-from-former-dod-leaders/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-28T00:30:44+00:00</news:publication_date><news:title>Pentagon&#8217;s Anthropic Initiative Faces Criticism from Former DOD Leaders</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/researchers-discover-fast16-sabotage-malware-predating-stuxnet/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-27T23:25:12+00:00</news:publication_date><news:title>Researchers Discover Fast16 Sabotage Malware Predating Stuxnet</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/belgium-unveils-new-cyber-crisis-response-plan/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-27T23:11:14+00:00</news:publication_date><news:title>Belgium Unveils New Cyber Crisis Response Plan</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/medical-device-maker-medtronic-reports-cybersecurity-breach/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-27T22:09:56+00:00</news:publication_date><news:title>Medical Device Maker Medtronic Reports Cybersecurity Breach</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/eu-proposes-mandating-google-to-share-search-data-with-competitors-under-dma/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-27T21:10:16+00:00</news:publication_date><news:title>EU Proposes Mandating Google to Share Search Data with Competitors Under DMA</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/common-browser-extensions-that-sell-user-data/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-27T20:54:30+00:00</news:publication_date><news:title>Common Browser Extensions That Sell User Data</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/ai-red-teaming-is-distinct-from-prompt-injection/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-27T19:48:42+00:00</news:publication_date><news:title>AI Red Teaming Is Distinct from Prompt Injection</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cyber-briefing-for-april-27-2026-cybermaterial/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-27T19:09:11+00:00</news:publication_date><news:title>Cyber Briefing for April 27, 2026 &#8211; CyberMaterial</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/utilities-tech-supplier-itron-reveals-cyber-attack/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-27T18:23:20+00:00</news:publication_date><news:title>Utilities Tech Supplier Itron Reveals Cyber-Attack</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/home-security-firm-adt-suffers-data-breach-affecting-5-5-million-customers/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-27T17:26:29+00:00</news:publication_date><news:title>Home Security Firm ADT Suffers Data Breach Affecting 5.5 Million Customers</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/new-malware-utilizes-obfuscation-and-staged-payloads/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-27T17:08:12+00:00</news:publication_date><news:title>New Malware Utilizes Obfuscation and Staged Payloads</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/us-sanctions-focus-on-leaders-of-cambodian-scam-network/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-27T15:52:22+00:00</news:publication_date><news:title>US Sanctions Focus on Leaders of Cambodian Scam Network</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/microsoft-resolved-an-unpatched-agent-only-role-issue/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-27T15:07:08+00:00</news:publication_date><news:title>Microsoft resolved an unpatched &#8216;agent-only&#8217; role issue.</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/many-cybersecurity-professionals-feel-undervalued-and-underpaid/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-27T13:21:18+00:00</news:publication_date><news:title>Many Cybersecurity Professionals Feel Undervalued and Underpaid</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/aspiritech-celebrates-cybersecurity-apprenticeship-program/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-27T13:06:24+00:00</news:publication_date><news:title>Aspiritech Celebrates Cybersecurity Apprenticeship Program</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/linux-elf-malware-generator-bypasses-ml-detection-through-semantic-preserving-modifications/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-27T11:05:07+00:00</news:publication_date><news:title>Linux ELF Malware Generator Bypasses ML Detection Through Semantic-Preserving Modifications</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/ai-is-transforming-devsecops-by-integrating-security-with-code/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-27T10:50:18+00:00</news:publication_date><news:title>AI is Transforming DevSecOps by Integrating Security with Code</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/is-your-iam-prepared-for-ai/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-27T10:23:22+00:00</news:publication_date><news:title>Is Your IAM Prepared for AI?</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/manager-of-agents-how-ai-evolves-the-soc-analyst-role/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-27T09:04:11+00:00</news:publication_date><news:title>Manager of Agents: How AI Evolves the SOC Analyst Role</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/post-mythos-security-and-cyber-risk-resilience/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-27T08:57:55+00:00</news:publication_date><news:title>Post-Mythos Security and Cyber Risk Resilience</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/blackfile-group-aims-at-retail-and-hospitality-sector-with-vishing-attacks/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-27T08:19:21+00:00</news:publication_date><news:title>BlackFile Group Aims at Retail and Hospitality Sector with Vishing Attacks</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/clickfix-attack-replaces-powershell-with-cmdkey-and-remote-regsvr32-payloads/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-27T07:03:16+00:00</news:publication_date><news:title>ClickFix Attack Replaces PowerShell with Cmdkey and Remote Regsvr32 Payloads</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
</urlset>
