<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/wp-content/plugins/xml-sitemap-feed/assets/sitemap-news.xsl?ver=5.4.9"?>
<!-- generated-on="2026-04-23T10:17:46+00:00" -->
<!-- generator="XML Sitemap & Google News for WordPress" -->
<!-- generator-url="https://status301.net/wordpress-plugins/xml-sitemap-feed/" -->
<!-- generator-version="5.4.9" -->
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" >
<url><loc>https://cybersecurity-see.com/cybersmart-partners-with-renaissance-to-provide-comprehensive-cyber-confidence-for-smes/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-23T10:16:23+00:00</news:publication_date><news:title>CyberSmart Partners with Renaissance to Provide Comprehensive Cyber Confidence for SMEs</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/unwary-chinese-hackers-embed-hardcoded-credentials-in-backdoors/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-23T09:58:29+00:00</news:publication_date><news:title>Unwary Chinese Hackers Embed Hardcoded Credentials in Backdoors</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/claude-mythos-signals-a-new-era-in-ai-driven-security-by-identifying-271-flaws-in-firefox/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-23T08:40:04+00:00</news:publication_date><news:title>Claude Mythos Signals a New Era in AI-Driven Security by Identifying 271 Flaws in Firefox</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/roblox-reaches-settlement-with-alabama-and-west-virginia/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-23T08:15:10+00:00</news:publication_date><news:title>Roblox Reaches Settlement with Alabama and West Virginia</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/russian-hacking-escalates-to-new-levels-of-hostility/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-23T07:37:43+00:00</news:publication_date><news:title>Russian Hacking Escalates to New Levels of Hostility</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/tropic-trooper-utilizes-custom-beacon-and-vs-code-tunnels-for-discreet-remote-access/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-23T06:14:19+00:00</news:publication_date><news:title>Tropic Trooper Utilizes Custom Beacon and VS Code Tunnels for Discreet Remote Access</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/inside-cryptobind-hsm-vault-and-kms-architecture-for-quantum-ready-banks/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-23T06:09:21+00:00</news:publication_date><news:title>Inside CryptoBind: HSM, Vault, and KMS Architecture for Quantum-Ready Banks</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/discord-group-explores-claudes-allegedly-secret-mythos/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-23T05:16:26+00:00</news:publication_date><news:title>Discord Group Explores Claude&#8217;s Allegedly Secret Mythos</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/serial-to-ethernet-converters-threaten-critical-infrastructure-due-to-design-flaws/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-23T04:13:12+00:00</news:publication_date><news:title>Serial-to-Ethernet Converters Threaten Critical Infrastructure Due to Design Flaws</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/uk-commits-90m-to-cybersecurity-and-advocates-for-resilience-pledge/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-23T03:38:21+00:00</news:publication_date><news:title>UK Commits £90m to Cybersecurity and Advocates for Resilience Pledge</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/pharma-giant-merck-and-google-cloud-enter-1b-agentic-ai-agreement/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-23T02:55:26+00:00</news:publication_date><news:title>Pharma Giant Merck and Google Cloud Enter $1B Agentic AI Agreement</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/how-ai-is-revolutionizing-dentistry/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-23T02:12:29+00:00</news:publication_date><news:title>How AI is Revolutionizing Dentistry</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/malicious-pgserve-and-automagik-developer-tools-discovered-in-npm-registry/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-23T01:06:55+00:00</news:publication_date><news:title>Malicious pgserve and Automagik Developer Tools Discovered in npm Registry</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/ep-173-tarjeteros-the-cyber-post/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-23T00:34:19+00:00</news:publication_date><news:title>EP 173: Tarjeteros &#8211; The Cyber Post</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/nebula-attains-iso-27001-certification/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-23T00:11:31+00:00</news:publication_date><news:title>Nebula Attains ISO 27001 Certification</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/ncsc-launches-silentglass-device-to-safeguard-monitors-against-cyber-attacks/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T22:34:48+00:00</news:publication_date><news:title>NCSC Launches SilentGlass Device to Safeguard Monitors Against Cyber-Attacks</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/the-need-for-improved-threat-intelligence-in-the-ai-driven-arms-race/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T22:12:33+00:00</news:publication_date><news:title>The Need for Improved Threat Intelligence in the AI-Driven Arms Race</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/malicious-google-ads-target-crypto-users-with-wallet-drainers/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T22:10:20+00:00</news:publication_date><news:title>Malicious Google Ads Target Crypto Users with Wallet Drainers</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/ai-and-chatbots-revolutionizing-the-future-of-consumer-lending/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T20:09:16+00:00</news:publication_date><news:title>AI and Chatbots Revolutionizing the Future of Consumer Lending</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/microsoft-releases-emergency-patch-for-critical-security-vulnerability-in-asp-net-core-update/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T20:03:15+00:00</news:publication_date><news:title>Microsoft Releases Emergency Patch for Critical Security Vulnerability in ASP.NET Core Update</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/systembc-c2-server-exposes-over-1570-victims-in-gentlemen-ransomware-operation/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T19:51:20+00:00</news:publication_date><news:title>SystemBC C2 Server Exposes Over 1,570 Victims in Gentlemen Ransomware Operation</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cyber-briefing-april-22-2026-cybermaterial/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T18:08:15+00:00</news:publication_date><news:title>Cyber Briefing &#8211; April 22, 2026 &#8211; CyberMaterial</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/macos-native-tools-facilitate-stealthy-enterprise-attacks/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T17:31:22+00:00</news:publication_date><news:title>MacOS Native Tools Facilitate Stealthy Enterprise Attacks</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/how-to-secure-ai-agents-and-machine-identities-at-enterprise-scale-webinar/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T17:30:28+00:00</news:publication_date><news:title>How to Secure AI Agents and Machine Identities at Enterprise Scale Webinar</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/destructive-new-malware-hits-venezuelas-energy-sector/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T16:27:57+00:00</news:publication_date><news:title>Destructive New Malware Hits Venezuela&#8217;s Energy Sector</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/mozilla-firefox-150-released-with-fixes-for-multiple-code-execution-vulnerabilities/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T16:07:10+00:00</news:publication_date><news:title>Mozilla Firefox 150 Released with Fixes for Multiple Code Execution Vulnerabilities</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/ransomware-negotiator-admits-guilt-in-assisting-blackcat-attacks-in-2023/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T15:09:31+00:00</news:publication_date><news:title>Ransomware Negotiator Admits Guilt in Assisting BlackCat Attacks in 2023</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/nfc-tap-to-pay-vulnerable-to-hackers/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T15:00:29+00:00</news:publication_date><news:title>NFC Tap-to-Pay Vulnerable to Hackers</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/router-security-hardening-steps-for-2026-including-default-credential-audits-and-automated-firmware-risk-monitoring/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T14:06:19+00:00</news:publication_date><news:title>Router Security Hardening Steps for 2026: Including Default Credential Audits and Automated Firmware Risk Monitoring</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/us-opm-health-insurance-data-collection-plan-raises-concerns/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T12:48:24+00:00</news:publication_date><news:title>US OPM Health Insurance Data Collection Plan Raises Concerns</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/ransomware-negotiator-admits-guilt-in-association-with-blackcat-cyber-gang/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T12:29:22+00:00</news:publication_date><news:title>Ransomware Negotiator Admits Guilt in Association with BlackCat Cyber Gang</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/poste-italiane-fined-e12-5-million-for-data-violations/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T12:04:38+00:00</news:publication_date><news:title>Poste Italiane Fined €12.5 Million for Data Violations</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/vercel-confirms-security-incident-linked-to-third-party-ai-tool-in-april-2026/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T10:27:25+00:00</news:publication_date><news:title>Vercel Confirms Security Incident Linked to Third-Party AI Tool in April 2026</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/microsoft-alerts-about-phony-it-worker-identities-breaching-cloud-environments/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T10:03:21+00:00</news:publication_date><news:title>Microsoft Alerts About Phony IT Worker Identities Breaching Cloud Environments</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/anthropic-invests-in-epss-to-address-upcoming-surge-in-bugs/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T09:58:26+00:00</news:publication_date><news:title>Anthropic Invests in EPSS to Address Upcoming Surge in Bugs</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/systembc-c2-infrastructure-exposes-1570-victims-in-ransomware-operations/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T08:26:14+00:00</news:publication_date><news:title>SystemBC C2 Infrastructure Exposes 1,570+ Victims in Ransomware Operations</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/no-exploit-needed-how-attackers-access-systems-through-identity-based-attacks/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T08:06:15+00:00</news:publication_date><news:title>No Exploit Needed &#8211; How Attackers Access Systems Through Identity-Based Attacks</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/advamed-cybersecurity-summit-cybermaterial/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T08:02:06+00:00</news:publication_date><news:title>AdvaMed Cybersecurity Summit &#8211; CyberMaterial</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/microsoft-signed-binary-supports-lotuslite-delivery-in-india-spy-campaign/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T06:01:15+00:00</news:publication_date><news:title>Microsoft-Signed Binary Supports LOTUSLITE Delivery in India Spy Campaign</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/airbus-acquires-quarkslab-to-combat-ai-reverse-engineering/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T05:45:24+00:00</news:publication_date><news:title>Airbus Acquires Quarkslab to Combat AI Reverse Engineering</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/vercel-confirms-cyber-incident-according-to-infosecurity-magazine/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T04:56:09+00:00</news:publication_date><news:title>Vercel Confirms Cyber Incident According to Infosecurity Magazine</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/forescout-reveals-new-security-risks-in-popular-industrial-networking-devices/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T04:00:10+00:00</news:publication_date><news:title>Forescout Reveals New Security Risks in Popular Industrial Networking Devices</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cisa-adds-eight-exploited-flaws-to-kev-and-establishes-federal-deadlines-for-april-may-2026/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T03:24:10+00:00</news:publication_date><news:title>CISA Adds Eight Exploited Flaws to KEV and Establishes Federal Deadlines for April-May 2026</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/the-thin-gray-line-handala-cyberav3ngers-and-irans-proxy-operations/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T02:25:09+00:00</news:publication_date><news:title>The Thin Gray Line: Handala, CyberAv3ngers and Iran&#8217;s Proxy Operations</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/free-summer-cyber-and-ai-experience-camps/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T01:59:05+00:00</news:publication_date><news:title>Free Summer Cyber and AI Experience Camps</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/pentagon-cyber-leaders-support-1-5-trillion-budget-request/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-22T01:03:42+00:00</news:publication_date><news:title>Pentagon Cyber Leaders Support $1.5 Trillion Budget Request</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/breachlock-recognized-in-gartners-2026-aev-market-guide/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-21T23:58:10+00:00</news:publication_date><news:title>BreachLock Recognized in Gartner&#8217;s 2026 AEV Market Guide</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/gentlemen-ransomware-expands-through-rapid-affiliate-growth/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-21T23:54:09+00:00</news:publication_date><news:title>Gentlemen Ransomware Expands Through Rapid Affiliate Growth</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/rising-cyber-threats-and-stagnant-headcount/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-21T22:42:56+00:00</news:publication_date><news:title>Rising Cyber Threats and Stagnant Headcount</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/prompt-injection-transforms-googles-antigravity-file-search-into-remote-code-execution/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-21T21:57:12+00:00</news:publication_date><news:title>Prompt Injection Transforms Google’s Antigravity File Search into Remote Code Execution</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/thousands-of-apache-activemq-instances-remain-unpatched-weeks-after-discovery-of-actively-exploited-vulnerability/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-21T21:23:10+00:00</news:publication_date><news:title>Thousands of Apache ActiveMQ Instances Remain Unpatched Weeks After Discovery of Actively Exploited Vulnerability</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/europe-prepares-for-the-era-of-post-quantum-computing/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-21T20:22:20+00:00</news:publication_date><news:title>Europe Prepares for the Era of Post-Quantum Computing</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/beyond-awareness-human-risk-management-metrics-for-cisos/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-21T19:56:21+00:00</news:publication_date><news:title>Beyond Awareness: Human Risk Management Metrics for CISOs</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/trojanized-android-app-sparks-new-surge-in-nfc-fraud/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-21T18:52:07+00:00</news:publication_date><news:title>Trojanized Android App Sparks New Surge in NFC Fraud</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/bridewell-among-the-first-to-attain-level-2-defence-cyber-certification/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-21T17:55:27+00:00</news:publication_date><news:title>Bridewell Among the First to Attain Level 2 Defence Cyber Certification</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/azure-sre-agent-vulnerability-enables-silent-eavesdropping-on-enterprise-cloud-operations/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-21T16:21:18+00:00</news:publication_date><news:title>Azure SRE Agent Vulnerability Enables Silent Eavesdropping on Enterprise Cloud Operations</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cyber-briefing-april-21-2026-cybermaterial/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-21T15:54:10+00:00</news:publication_date><news:title>Cyber Briefing &#8211; April 21, 2026 &#8211; CyberMaterial</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/ai-powered-ngate-malware-successfully-evades-detection-in-nfc-payment-applications/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-21T13:53:24+00:00</news:publication_date><news:title>AI-Powered NGate Malware Successfully Evades Detection in NFC Payment Applications</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/ai-agents-contribute-to-cybersecurity-incidents-at-two-thirds-of-companies/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-21T13:50:41+00:00</news:publication_date><news:title>AI Agents Contribute to Cybersecurity Incidents at Two-Thirds of Companies</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/effective-techniques-attackers-use-to-infiltrate-your-systems-today/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-21T11:52:20+00:00</news:publication_date><news:title>Effective Techniques Attackers Use to Infiltrate Your Systems Today</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/identity-as-the-driving-force-behind-digital-transformation/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-21T11:19:19+00:00</news:publication_date><news:title>Identity as the Driving Force Behind Digital Transformation</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
</urlset>
