<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/wp-content/plugins/xml-sitemap-feed/assets/sitemap-news.xsl?ver=5.4.9"?>
<!-- generated-on="2026-04-22T22:07:57+00:00" -->
<!-- generator="XML Sitemap & Google News for WordPress" -->
<!-- generator-url="https://status301.net/wordpress-plugins/xml-sitemap-feed/" -->
<!-- generator-version="5.4.9" -->
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" >
<url><loc>https://cybersecurity-see.com/ai-and-chatbots-revolutionizing-the-future-of-consumer-lending/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T20:09:16+00:00</news:publication_date><news:title>AI and Chatbots Revolutionizing the Future of Consumer Lending</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/microsoft-releases-emergency-patch-for-critical-security-vulnerability-in-asp-net-core-update/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T20:03:15+00:00</news:publication_date><news:title>Microsoft Releases Emergency Patch for Critical Security Vulnerability in ASP.NET Core Update</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/systembc-c2-server-exposes-over-1570-victims-in-gentlemen-ransomware-operation/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T19:51:20+00:00</news:publication_date><news:title>SystemBC C2 Server Exposes Over 1,570 Victims in Gentlemen Ransomware Operation</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cyber-briefing-april-22-2026-cybermaterial/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T18:08:15+00:00</news:publication_date><news:title>Cyber Briefing &#8211; April 22, 2026 &#8211; CyberMaterial</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/macos-native-tools-facilitate-stealthy-enterprise-attacks/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T17:31:22+00:00</news:publication_date><news:title>MacOS Native Tools Facilitate Stealthy Enterprise Attacks</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/how-to-secure-ai-agents-and-machine-identities-at-enterprise-scale-webinar/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T17:30:28+00:00</news:publication_date><news:title>How to Secure AI Agents and Machine Identities at Enterprise Scale Webinar</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/destructive-new-malware-hits-venezuelas-energy-sector/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T16:27:57+00:00</news:publication_date><news:title>Destructive New Malware Hits Venezuela&#8217;s Energy Sector</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/mozilla-firefox-150-released-with-fixes-for-multiple-code-execution-vulnerabilities/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T16:07:10+00:00</news:publication_date><news:title>Mozilla Firefox 150 Released with Fixes for Multiple Code Execution Vulnerabilities</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/ransomware-negotiator-admits-guilt-in-assisting-blackcat-attacks-in-2023/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T15:09:31+00:00</news:publication_date><news:title>Ransomware Negotiator Admits Guilt in Assisting BlackCat Attacks in 2023</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/nfc-tap-to-pay-vulnerable-to-hackers/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T15:00:29+00:00</news:publication_date><news:title>NFC Tap-to-Pay Vulnerable to Hackers</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/router-security-hardening-steps-for-2026-including-default-credential-audits-and-automated-firmware-risk-monitoring/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T14:06:19+00:00</news:publication_date><news:title>Router Security Hardening Steps for 2026: Including Default Credential Audits and Automated Firmware Risk Monitoring</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/us-opm-health-insurance-data-collection-plan-raises-concerns/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T12:48:24+00:00</news:publication_date><news:title>US OPM Health Insurance Data Collection Plan Raises Concerns</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/ransomware-negotiator-admits-guilt-in-association-with-blackcat-cyber-gang/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T12:29:22+00:00</news:publication_date><news:title>Ransomware Negotiator Admits Guilt in Association with BlackCat Cyber Gang</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/poste-italiane-fined-e12-5-million-for-data-violations/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T12:04:38+00:00</news:publication_date><news:title>Poste Italiane Fined €12.5 Million for Data Violations</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/vercel-confirms-security-incident-linked-to-third-party-ai-tool-in-april-2026/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T10:27:25+00:00</news:publication_date><news:title>Vercel Confirms Security Incident Linked to Third-Party AI Tool in April 2026</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/microsoft-alerts-about-phony-it-worker-identities-breaching-cloud-environments/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T10:03:21+00:00</news:publication_date><news:title>Microsoft Alerts About Phony IT Worker Identities Breaching Cloud Environments</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/anthropic-invests-in-epss-to-address-upcoming-surge-in-bugs/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T09:58:26+00:00</news:publication_date><news:title>Anthropic Invests in EPSS to Address Upcoming Surge in Bugs</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/systembc-c2-infrastructure-exposes-1570-victims-in-ransomware-operations/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T08:26:14+00:00</news:publication_date><news:title>SystemBC C2 Infrastructure Exposes 1,570+ Victims in Ransomware Operations</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/no-exploit-needed-how-attackers-access-systems-through-identity-based-attacks/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T08:06:15+00:00</news:publication_date><news:title>No Exploit Needed &#8211; How Attackers Access Systems Through Identity-Based Attacks</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/advamed-cybersecurity-summit-cybermaterial/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T08:02:06+00:00</news:publication_date><news:title>AdvaMed Cybersecurity Summit &#8211; CyberMaterial</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/microsoft-signed-binary-supports-lotuslite-delivery-in-india-spy-campaign/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T06:01:15+00:00</news:publication_date><news:title>Microsoft-Signed Binary Supports LOTUSLITE Delivery in India Spy Campaign</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/airbus-acquires-quarkslab-to-combat-ai-reverse-engineering/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T05:45:24+00:00</news:publication_date><news:title>Airbus Acquires Quarkslab to Combat AI Reverse Engineering</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/vercel-confirms-cyber-incident-according-to-infosecurity-magazine/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T04:56:09+00:00</news:publication_date><news:title>Vercel Confirms Cyber Incident According to Infosecurity Magazine</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/forescout-reveals-new-security-risks-in-popular-industrial-networking-devices/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T04:00:10+00:00</news:publication_date><news:title>Forescout Reveals New Security Risks in Popular Industrial Networking Devices</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cisa-adds-eight-exploited-flaws-to-kev-and-establishes-federal-deadlines-for-april-may-2026/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T03:24:10+00:00</news:publication_date><news:title>CISA Adds Eight Exploited Flaws to KEV and Establishes Federal Deadlines for April-May 2026</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/the-thin-gray-line-handala-cyberav3ngers-and-irans-proxy-operations/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T02:25:09+00:00</news:publication_date><news:title>The Thin Gray Line: Handala, CyberAv3ngers and Iran&#8217;s Proxy Operations</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/free-summer-cyber-and-ai-experience-camps/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T01:59:05+00:00</news:publication_date><news:title>Free Summer Cyber and AI Experience Camps</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/pentagon-cyber-leaders-support-1-5-trillion-budget-request/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T01:03:42+00:00</news:publication_date><news:title>Pentagon Cyber Leaders Support $1.5 Trillion Budget Request</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/breachlock-recognized-in-gartners-2026-aev-market-guide/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-21T23:58:10+00:00</news:publication_date><news:title>BreachLock Recognized in Gartner&#8217;s 2026 AEV Market Guide</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/gentlemen-ransomware-expands-through-rapid-affiliate-growth/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-21T23:54:09+00:00</news:publication_date><news:title>Gentlemen Ransomware Expands Through Rapid Affiliate Growth</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/rising-cyber-threats-and-stagnant-headcount/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-21T22:42:56+00:00</news:publication_date><news:title>Rising Cyber Threats and Stagnant Headcount</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/prompt-injection-transforms-googles-antigravity-file-search-into-remote-code-execution/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-21T21:57:12+00:00</news:publication_date><news:title>Prompt Injection Transforms Google’s Antigravity File Search into Remote Code Execution</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/thousands-of-apache-activemq-instances-remain-unpatched-weeks-after-discovery-of-actively-exploited-vulnerability/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-21T21:23:10+00:00</news:publication_date><news:title>Thousands of Apache ActiveMQ Instances Remain Unpatched Weeks After Discovery of Actively Exploited Vulnerability</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/europe-prepares-for-the-era-of-post-quantum-computing/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-21T20:22:20+00:00</news:publication_date><news:title>Europe Prepares for the Era of Post-Quantum Computing</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/beyond-awareness-human-risk-management-metrics-for-cisos/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-21T19:56:21+00:00</news:publication_date><news:title>Beyond Awareness: Human Risk Management Metrics for CISOs</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/trojanized-android-app-sparks-new-surge-in-nfc-fraud/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-21T18:52:07+00:00</news:publication_date><news:title>Trojanized Android App Sparks New Surge in NFC Fraud</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/bridewell-among-the-first-to-attain-level-2-defence-cyber-certification/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-21T17:55:27+00:00</news:publication_date><news:title>Bridewell Among the First to Attain Level 2 Defence Cyber Certification</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/azure-sre-agent-vulnerability-enables-silent-eavesdropping-on-enterprise-cloud-operations/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-21T16:21:18+00:00</news:publication_date><news:title>Azure SRE Agent Vulnerability Enables Silent Eavesdropping on Enterprise Cloud Operations</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cyber-briefing-april-21-2026-cybermaterial/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-21T15:54:10+00:00</news:publication_date><news:title>Cyber Briefing &#8211; April 21, 2026 &#8211; CyberMaterial</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/ai-powered-ngate-malware-successfully-evades-detection-in-nfc-payment-applications/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-21T13:53:24+00:00</news:publication_date><news:title>AI-Powered NGate Malware Successfully Evades Detection in NFC Payment Applications</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/ai-agents-contribute-to-cybersecurity-incidents-at-two-thirds-of-companies/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-21T13:50:41+00:00</news:publication_date><news:title>AI Agents Contribute to Cybersecurity Incidents at Two-Thirds of Companies</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/effective-techniques-attackers-use-to-infiltrate-your-systems-today/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-21T11:52:20+00:00</news:publication_date><news:title>Effective Techniques Attackers Use to Infiltrate Your Systems Today</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/identity-as-the-driving-force-behind-digital-transformation/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-21T11:19:19+00:00</news:publication_date><news:title>Identity as the Driving Force Behind Digital Transformation</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/senate-expands-surveillance-authority-cybermaterial/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-21T09:52:45+00:00</news:publication_date><news:title>Senate Expands Surveillance Authority &#8211; CyberMaterial</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/north-korea-accused-of-290-million-kelpdao-crypto-heist/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-21T08:48:16+00:00</news:publication_date><news:title>North Korea Accused of $290 Million KelpDAO Crypto Heist</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/github-issue-alerts-exploited-in-oauth-phishing-scam-targeting-developers/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-21T07:50:12+00:00</news:publication_date><news:title>GitHub Issue Alerts Exploited in OAuth Phishing Scam Targeting Developers</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/hsm-kms-vault/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-21T06:17:30+00:00</news:publication_date><news:title>HSM KMS Vault</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/the-7-leading-ai-soc-platforms-to-watch-in-2026/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-21T06:16:35+00:00</news:publication_date><news:title>The 7 Leading AI SOC Platforms to Watch in 2026</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/canadas-cyber-resilience-plan-addresses-ai-threats/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-21T05:49:06+00:00</news:publication_date><news:title>Canada&#8217;s Cyber Resilience Plan Addresses AI Threats</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/securing-the-hybrid-workplace-in-the-age-of-ai-driven-threats-webinar/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-21T03:55:23+00:00</news:publication_date><news:title>Securing the Hybrid Workplace in the Age of AI-Driven Threats Webinar</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/anthropic-mcp-faces-major-vulnerability-allowing-remote-code-execution/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-21T03:48:13+00:00</news:publication_date><news:title>Anthropic MCP Faces Major Vulnerability Allowing Remote Code Execution</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/crypto-exchange-grinex-accuses-western-spies-of-13-million-theft/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-21T03:46:22+00:00</news:publication_date><news:title>Crypto Exchange Grinex Accuses Western Spies of $13 Million Theft</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/smishing-triad/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-21T01:47:04+00:00</news:publication_date><news:title>Smishing Triad</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/health-ai-firm-sued-for-dna-data-use-and-disclosure/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-21T01:34:30+00:00</news:publication_date><news:title>Health AI Firm Sued for DNA Data Use and Disclosure</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/attackers-exploit-dvr-command-injection-vulnerability-to-deploy-botnet/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-21T01:15:11+00:00</news:publication_date><news:title>Attackers Exploit DVR Command Injection Vulnerability to Deploy Botnet</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/intel-utility-compromised-in-appdomain-attack-to-deploy-malware/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-20T23:46:19+00:00</news:publication_date><news:title>Intel Utility Compromised in AppDomain Attack to Deploy Malware</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/what-enterprise-ai-leaders-are-doing-right/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-20T23:13:20+00:00</news:publication_date><news:title>What Enterprise AI Leaders Are Doing Right</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/formbook-malware-campaign-employs-various-obfuscation-techniques/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-20T22:44:15+00:00</news:publication_date><news:title>Formbook Malware Campaign Employs Various Obfuscation Techniques</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
</urlset>
