<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/wp-content/plugins/xml-sitemap-feed/assets/sitemap-news.xsl?ver=5.4.9"?>
<!-- generated-on="2026-04-21T02:21:54+00:00" -->
<!-- generator="XML Sitemap & Google News for WordPress" -->
<!-- generator-url="https://status301.net/wordpress-plugins/xml-sitemap-feed/" -->
<!-- generator-version="5.4.9" -->
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" >
<url><loc>https://cybersecurity-see.com/smishing-triad/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-21T01:47:04+00:00</news:publication_date><news:title>Smishing Triad</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/health-ai-firm-sued-for-dna-data-use-and-disclosure/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-21T01:34:30+00:00</news:publication_date><news:title>Health AI Firm Sued for DNA Data Use and Disclosure</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/attackers-exploit-dvr-command-injection-vulnerability-to-deploy-botnet/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-21T01:15:11+00:00</news:publication_date><news:title>Attackers Exploit DVR Command Injection Vulnerability to Deploy Botnet</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/intel-utility-compromised-in-appdomain-attack-to-deploy-malware/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-20T23:46:19+00:00</news:publication_date><news:title>Intel Utility Compromised in AppDomain Attack to Deploy Malware</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/what-enterprise-ai-leaders-are-doing-right/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-20T23:13:20+00:00</news:publication_date><news:title>What Enterprise AI Leaders Are Doing Right</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/formbook-malware-campaign-employs-various-obfuscation-techniques/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-20T22:44:15+00:00</news:publication_date><news:title>Formbook Malware Campaign Employs Various Obfuscation Techniques</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cybersecurity-in-the-age-of-ai-bigger-and-faster-threats/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-20T21:45:18+00:00</news:publication_date><news:title>Cybersecurity in the Age of AI: Bigger and Faster Threats</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/maritime-cybersecurity-regulations-create-a-stir/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-20T20:52:39+00:00</news:publication_date><news:title>Maritime Cybersecurity Regulations Create a Stir</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/copilot-und-agentforce-anfallig-fur-prompt-injection-tricks/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-20T20:13:13+00:00</news:publication_date><news:title>Copilot und Agentforce anfällig für Prompt-Injection-Tricks</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cyber-briefing-april-20-2026-cybermaterial/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-20T19:44:33+00:00</news:publication_date><news:title>Cyber Briefing &#8211; April 20, 2026 &#8211; CyberMaterial</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/a-token-flaw-converted-azures-ai-agent-into-a-spy/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-20T18:32:29+00:00</news:publication_date><news:title>A Token Flaw Converted Azure&#8217;s AI Agent Into a Spy</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/ghost-rat-and-cloverplus-target-victims-in-combined-malware-campaign/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-20T17:43:13+00:00</news:publication_date><news:title>Ghost RAT and CloverPlus Target Victims in Combined Malware Campaign</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/zionsiphon-malware-attacks-water-infrastructure-systems/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-20T17:42:13+00:00</news:publication_date><news:title>ZionSiphon Malware Attacks Water Infrastructure Systems</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/ai-shifts-emphasis-to-real-time-cyber-defense/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-20T16:10:20+00:00</news:publication_date><news:title>AI Shifts Emphasis to Real-Time Cyber Defense</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/hackers-take-advantage-of-vercels-trust-in-ai-integration/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-20T15:42:37+00:00</news:publication_date><news:title>Hackers Take Advantage of Vercel&#8217;s Trust in AI Integration</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/attackers-exploit-microsoft-teams-to-impersonate-it-helpdesk-in-new-enterprise-intrusion-strategy/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-20T15:10:51+00:00</news:publication_date><news:title>Attackers Exploit Microsoft Teams to Impersonate IT Helpdesk in New Enterprise Intrusion Strategy</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/csle-a-platform-for-reinforcement-learning/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-20T13:41:20+00:00</news:publication_date><news:title>CSLE: A Platform for Reinforcement Learning</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/ncsc-unveils-coordinated-strategy-to-enhance-nhs-cyber-resilience/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-20T12:39:18+00:00</news:publication_date><news:title>NCSC Unveils Coordinated Strategy to Enhance NHS Cyber Resilience</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/north-korea-linked-unc1069-targets-crypto-professionals-through-fake-meetings/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-20T11:40:12+00:00</news:publication_date><news:title>North Korea-Linked UNC1069 Targets Crypto Professionals Through Fake Meetings</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cisos-transform-into-strategic-advisors-for-business-risk-management/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-20T10:08:28+00:00</news:publication_date><news:title>CISOs Transform into Strategic Advisors for Business Risk Management</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/claude-mythos-ist-der-hype-berechtigt/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-20T09:39:14+00:00</news:publication_date><news:title>Claude Mythos – Ist der Hype berechtigt?</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/janaware-ransomware-targets-turkish-users-through-custom-adwind-rat/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-20T07:38:26+00:00</news:publication_date><news:title>JanaWare Ransomware Targets Turkish Users Through Custom Adwind RAT</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/pro-russian-threat-actors-attempt-cyberattack-on-swedish-heat-and-power-plant/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-20T06:46:16+00:00</news:publication_date><news:title>Pro-Russian Threat Actors Attempt Cyberattack on Swedish Heat and Power Plant</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/the-real-cyber-awards-and-conference-now-accepting-entries/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-20T04:25:15+00:00</news:publication_date><news:title>The Real Cyber Awards and Conference Now Accepting Entries</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/fiverr-reveals-user-files-via-google-search/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-20T03:35:16+00:00</news:publication_date><news:title>Fiverr Reveals User Files via Google Search</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/mcgraw-hill-data-breach-impacts-13-5-million-accounts/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-20T01:33:50+00:00</news:publication_date><news:title>McGraw Hill Data Breach Impacts 13.5 Million Accounts</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/bluesky-experiences-downtime-as-users-encounter-access-issues/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-19T23:33:14+00:00</news:publication_date><news:title>Bluesky Experiences Downtime as Users Encounter Access Issues</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/insurance-carriers-rethink-ai-insurance-coverage/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-19T21:32:12+00:00</news:publication_date><news:title>Insurance Carriers Rethink AI Insurance Coverage</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/automotive-ransomware-attacks-expected-to-double-by-2025/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-19T19:31:11+00:00</news:publication_date><news:title>Automotive Ransomware Attacks Expected to Double by 2025</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/us-nationals-imprisoned-for-north-korean-scheme/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-19T17:30:21+00:00</news:publication_date><news:title>US Nationals Imprisoned for North Korean Scheme</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/poc-released-for-fortisandbox-vulnerability-allowing-arbitrary-command-execution/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-19T15:29:50+00:00</news:publication_date><news:title>PoC Released for FortiSandbox Vulnerability Allowing Arbitrary Command Execution</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/microsoft-defender-zero-day-vulnerabilities-exploited-cybermaterial/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-19T13:26:07+00:00</news:publication_date><news:title>Microsoft Defender Zero-Day Vulnerabilities Exploited &#8211; CyberMaterial</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/fake-zoom-sdk-update-spreads-sapphire-sleet-malware-in-new-macos-attack-chain/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-19T11:25:13+00:00</news:publication_date><news:title>Fake Zoom SDK Update Spreads Sapphire Sleet Malware in New macOS Attack Chain</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cisa-alerts-on-apache-activemq-vulnerability/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-19T09:24:10+00:00</news:publication_date><news:title>CISA Alerts on Apache ActiveMQ Vulnerability</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/microsoft-addresses-reboot-loop-issue-on-windows-servers-after-april-patches/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-19T07:23:09+00:00</news:publication_date><news:title>Microsoft Addresses Reboot Loop Issue on Windows Servers After April Patches</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/fake-zoom-sdk-update-spreads-sapphire-sleet-malware/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-19T05:22:10+00:00</news:publication_date><news:title>Fake Zoom SDK Update Spreads Sapphire Sleet Malware</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/13-74m-hack-closes-sanctioned-grinex-exchange-following-intelligence-allegations/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-19T04:55:16+00:00</news:publication_date><news:title>$13.74M Hack Closes Sanctioned Grinex Exchange Following Intelligence Allegations</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/openai-expands-access-to-gpt-5-4-cyber-for-trusted-organizations-globally/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-19T03:21:14+00:00</news:publication_date><news:title>OpenAI Expands Access to GPT-5.4-Cyber for Trusted Organizations Globally</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
</urlset>
