<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/wp-content/plugins/xml-sitemap-feed/assets/sitemap-news.xsl?ver=5.4.9"?>
<!-- generated-on="2026-04-17T15:04:58+00:00" -->
<!-- generator="XML Sitemap & Google News for WordPress" -->
<!-- generator-url="https://status301.net/wordpress-plugins/xml-sitemap-feed/" -->
<!-- generator-version="5.4.9" -->
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" >
<url><loc>https://cybersecurity-see.com/cyber-briefing-for-april-17-2026-cybermaterial/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T15:04:01+00:00</news:publication_date><news:title>Cyber Briefing for April 17, 2026 &#8211; CyberMaterial</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/white-house-enables-federal-agencies-to-access-anthropics-claude-mythos/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T14:11:14+00:00</news:publication_date><news:title>White House Enables Federal Agencies to Access Anthropic&#8217;s Claude Mythos</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/seo-poisoning-attack-leverages-microsoft-binary-to-install-rmm-tool/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T13:02:30+00:00</news:publication_date><news:title>SEO Poisoning Attack Leverages Microsoft Binary to Install RMM Tool</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/a-pivotal-moment-in-cybersecurity/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T12:58:46+00:00</news:publication_date><news:title>A Pivotal Moment in Cybersecurity</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/automotive-ransomware-attacks-surge-by-100-in-one-year/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T11:40:35+00:00</news:publication_date><news:title>Automotive Ransomware Attacks Surge by 100% in One Year</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/palo-altos-helmut-reisinger-anticipates-a-cyber-sea-change-with-advancements-in-ai/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T11:01:17+00:00</news:publication_date><news:title>Palo Alto&#8217;s Helmut Reisinger Anticipates a Cyber Sea Change with Advancements in AI</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/live-webinar-protecting-the-hybrid-attack-surface-from-ai-enabled-adversaries/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T10:37:36+00:00</news:publication_date><news:title>Live Webinar: Protecting the Hybrid Attack Surface from AI-Enabled Adversaries</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/systemic-flaw-in-mcp-protocol-may-expose-150-million-downloads/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T09:09:44+00:00</news:publication_date><news:title>Systemic Flaw in MCP Protocol May Expose 150 Million Downloads</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/qa-your-face-is-now-part-of-the-threat-landscape-warns-sarah-armstrong-smith/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T09:00:29+00:00</news:publication_date><news:title>Q&#038;A: Your Face Is Now Part of the Threat Landscape, Warns Sarah Armstrong-Smith</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/rethinking-cybersecurity-for-ai-acceleration-in-the-mythos-era/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T08:16:38+00:00</news:publication_date><news:title>Rethinking Cybersecurity for AI Acceleration in the Mythos Era</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/how-ai-is-improving-at-identifying-security-vulnerabilities-npr/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T07:59:02+00:00</news:publication_date><news:title>How AI is Improving at Identifying Security Vulnerabilities &#8211; NPR</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/manchester-tech-event-focused-on-ai-and-cyber-trust/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T06:59:18+00:00</news:publication_date><news:title>Manchester Tech Event Focused on AI and Cyber Trust</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/nist-reduces-cve-analysis-due-to-overwhelming-vulnerability-volume/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T06:39:19+00:00</news:publication_date><news:title>NIST Reduces CVE Analysis Due to Overwhelming Vulnerability Volume</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/openai-engages-banks-for-trusted-access-in-cybersecurity-partnership-initiative/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T05:55:14+00:00</news:publication_date><news:title>OpenAI Engages Banks for Trusted Access in Cybersecurity Partnership Initiative</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/abuse-of-microsoft-365-mailbox-rules-for-exfiltration-and-persistence/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T05:51:08+00:00</news:publication_date><news:title>Abuse of Microsoft 365 Mailbox Rules for Exfiltration and Persistence</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cargo-hackers-target-trucking-companies-to-steal-physical-shipments/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T04:58:13+00:00</news:publication_date><news:title>Cargo Hackers Target Trucking Companies to Steal Physical Shipments</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cookeville-hospital-reports-rhysida-breach-affecting-337917-individuals/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T04:08:19+00:00</news:publication_date><news:title>Cookeville Hospital Reports Rhysida Breach Affecting 337,917 Individuals</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/sumit-dhawan-discusses-nyse-floor-insights-proofpoint-ai-security/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T03:43:10+00:00</news:publication_date><news:title>Sumit Dhawan Discusses NYSE Floor Insights | Proofpoint AI Security</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/threatsday-bulletin-defender-0-day-sonicwall-brute-force-17-year-old-excel-rce-and-15-additional-stories/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T03:33:13+00:00</news:publication_date><news:title>ThreatsDay Bulletin: Defender 0-Day, SonicWall Brute-Force, 17-Year-Old Excel RCE, and 15 Additional Stories</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/rce-by-design-mcp-architectural-choices-impacting-the-ai-agent-ecosystem/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T02:57:18+00:00</news:publication_date><news:title>RCE by Design: MCP Architectural Choices Impacting the AI Agent Ecosystem</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cisco-systems-releases-three-advisories-addressing-critical-vulnerabilities-in-webex-and-ise/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T01:37:09+00:00</news:publication_date><news:title>Cisco Systems Releases Three Advisories Addressing Critical Vulnerabilities in Webex and ISE</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cargo-theft-by-hackers-involves-sophisticated-remote-access-campaigns-researchers-discover/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T01:35:07+00:00</news:publication_date><news:title>Cargo Theft by Hackers Involves Sophisticated Remote Access Campaigns, Researchers Discover</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cisa-alerts-to-detrimental-capacity-impacts-amid-shutdown/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T01:12:28+00:00</news:publication_date><news:title>CISA Alerts to Detrimental Capacity Impacts Amid Shutdown</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/women-in-cyber-training-model-shecyber-expands-beyond-eu-funding-with-new-independent-adoption-by-countries/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T00:56:05+00:00</news:publication_date><news:title>Women-in-Cyber Training Model SHE@CYBER Expands Beyond EU Funding with New Independent Adoption by Countries</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/apk-malformation-detected-in-thousands-of-android-malware-samples/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T23:05:52+00:00</news:publication_date><news:title>APK Malformation Detected in Thousands of Android Malware Samples</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/ai-red-and-blue-teaming-summit-hosted-by-packt/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T22:55:12+00:00</news:publication_date><news:title>AI Red and Blue Teaming Summit Hosted by Packt</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/mr-raccoon-seeks-your-password/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T22:51:31+00:00</news:publication_date><news:title>Mr. Raccoon Seeks Your Password</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/uac-0247-targets-hospitals-and-governments-with-browser-and-whatsapp-data-theft/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T20:54:19+00:00</news:publication_date><news:title>UAC-0247 Targets Hospitals and Governments with Browser and WhatsApp Data Theft</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/the-ongoing-debate-over-ciso-reporting-lines-and-its-implications-for-cybersecurity-leadership/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T20:34:41+00:00</news:publication_date><news:title>The Ongoing Debate Over CISO Reporting Lines and Its Implications for Cybersecurity Leadership</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/stryker-hack-impacts-first-quarter-results/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T20:30:19+00:00</news:publication_date><news:title>Stryker Hack Impacts First Quarter Results</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/how-to-respond-when-your-ai-guardrails-fail/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T18:53:28+00:00</news:publication_date><news:title>How to Respond When Your AI Guardrails Fail</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/current-security-trends-ai-escalation-identity-exposure-and-operationalizing-zero-trust/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T18:09:34+00:00</news:publication_date><news:title>Current Security Trends: AI Escalation, Identity Exposure, and Operationalizing Zero Trust</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/us-nationals-sentenced-for-running-fake-it-worker-scams-for-north-korea/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T18:03:11+00:00</news:publication_date><news:title>US Nationals Sentenced for Running Fake IT Worker Scams for North Korea</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cyber-briefing-april-16-2026-cybermaterial/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T16:52:30+00:00</news:publication_date><news:title>Cyber Briefing &#8211; April 16, 2026 &#8211; CyberMaterial</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/uac-0247-campaign-targeting-ukrainian-clinics-and-government/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T15:52:58+00:00</news:publication_date><news:title>UAC-0247 Campaign Targeting Ukrainian Clinics and Government</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/ai-enhancing-sast-accuracy-and-minimizing-developer-friction-webinar/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T15:48:11+00:00</news:publication_date><news:title>AI Enhancing SAST Accuracy and Minimizing Developer Friction Webinar</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/behind-the-mythos-hype-glasswing-has-only-one-confirmed-cve/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T15:32:08+00:00</news:publication_date><news:title>Behind the Mythos Hype, Glasswing Has Only One Confirmed CVE</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/when-pups-bite-huntress-uncovers-weaponized-adware-exposing-over-25000-systems/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T13:27:39+00:00</news:publication_date><news:title>When PUPs Bite: Huntress Uncovers Weaponized Adware Exposing Over 25,000 Systems</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/nist-discontinues-nvd-enrichment-for-vulnerabilities-before-march-2026/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T13:01:35+00:00</news:publication_date><news:title>NIST Discontinues NVD Enrichment for Vulnerabilities Before March 2026</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/microsofts-windows-recall-enables-silent-data-extraction/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T12:50:06+00:00</news:publication_date><news:title>Microsoft&#8217;s Windows Recall Enables Silent Data Extraction</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/freight-hacker-uses-code-signing-service-to-bypass-defenses/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T11:06:19+00:00</news:publication_date><news:title>Freight Hacker Uses Code-Signing Service to Bypass Defenses</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/strategies-for-implementing-an-enterprise-passkey-deployment/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T10:49:16+00:00</news:publication_date><news:title>Strategies for Implementing an Enterprise Passkey Deployment</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/insurance-carriers-discreetly-retreat-from-covering-ai-outputs/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T10:30:19+00:00</news:publication_date><news:title>Insurance Carriers Discreetly Retreat from Covering AI Outputs</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/only-16-of-businesses-fully-compliant-with-nis2-ahead-of-2024-deadline/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T08:48:40+00:00</news:publication_date><news:title>Only 16% of Businesses Fully Compliant with NIS2 Ahead of 2024 Deadline</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/openai-expands-cybersecurity-program-with-new-gpt-5-4-cyber-model/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T08:45:20+00:00</news:publication_date><news:title>OpenAI Expands Cybersecurity Program with New GPT-5.4-Cyber Model</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/ai-companies-to-take-on-greater-role-in-cve-program-according-to-cisa/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T07:59:31+00:00</news:publication_date><news:title>AI Companies to Take on Greater Role in CVE Program, According to CISA</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/117-5-million-comcast-settlement-following-data-breach/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T06:47:08+00:00</news:publication_date><news:title>$117.5 Million Comcast Settlement Following Data Breach</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/what-cisos-need-to-know-about-ai-risk-webinar/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T06:24:20+00:00</news:publication_date><news:title>What CISOs Need to Know About AI Risk Webinar</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/adware-campaign-deactivates-antivirus-software-on-23000-systems/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T05:28:15+00:00</news:publication_date><news:title>Adware Campaign Deactivates Antivirus Software on 23,000 Systems</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/top-10-application-security-testing-companies-to-watch-in-2026/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T04:46:20+00:00</news:publication_date><news:title>Top 10 Application Security Testing Companies to Watch in 2026</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/hscc-guide-addresses-third-party-ai-risks-in-healthcare/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T04:03:41+00:00</news:publication_date><news:title>HSCC Guide Addresses Third-Party AI Risks in Healthcare</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/eu-regulators-primarily-deny-access-to-anthropic-mythos/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T02:57:04+00:00</news:publication_date><news:title>EU Regulators Primarily Deny Access to Anthropic Mythos</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/curity-aims-to-transform-iam-with-runtime-authorization-for-ai-agents/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T02:45:13+00:00</news:publication_date><news:title>Curity Aims to Transform IAM with Runtime Authorization for AI Agents</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/artemis-secures-70m-to-develop-ai-agents-for-detection-and-response/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T01:42:40+00:00</news:publication_date><news:title>Artemis Secures $70M to Develop AI Agents for Detection and Response</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/inside-the-soc-that-secured-the-rsac-2026-conference/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T00:44:37+00:00</news:publication_date><news:title>Inside the SOC that Secured the RSAC 2026 Conference</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/enisa-aims-for-premier-status-in-cve-program/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T00:26:13+00:00</news:publication_date><news:title>ENISA Aims for Premier Status in CVE Program</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/federal-employees-continue-using-claude-despite-trump-orders/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-15T23:22:00+00:00</news:publication_date><news:title>Federal Employees Continue Using Claude Despite Trump Orders</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/the-role-of-the-enterprise-supply-chain-in-expanding-the-global-attack-surface/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-15T22:43:23+00:00</news:publication_date><news:title>The Role of the Enterprise Supply Chain in Expanding the Global Attack Surface</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/critical-nginx-ui-tool-vulnerability-exposes-web-servers-to-complete-compromise/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-15T21:55:05+00:00</news:publication_date><news:title>Critical Nginx UI Tool Vulnerability Exposes Web Servers to Complete Compromise</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/us-fcc-grants-netgear-temporary-exemption-from-router-ban/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-15T21:00:34+00:00</news:publication_date><news:title>US FCC Grants Netgear Temporary Exemption from Router Ban</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cisa-cancels-cybercorps-summer-internships/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-15T20:42:10+00:00</news:publication_date><news:title>CISA Cancels CyberCorps Summer Internships</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/openai-launches-gpt-5-4-cyber-to-enhance-cyber-defense-using-ai/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-15T19:24:31+00:00</news:publication_date><news:title>OpenAI Launches GPT-5.4-Cyber to Enhance Cyber Defense Using AI</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/top-10-api-security-providers-for-web-apps-in-2026/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-15T18:41:47+00:00</news:publication_date><news:title>Top 10 API Security Providers for Web Apps in 2026</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/why-fraudsters-continue-to-prevail-despite-technological-advancements/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-15T18:39:29+00:00</news:publication_date><news:title>Why Fraudsters Continue to Prevail Despite Technological Advancements</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/copilot-and-agentforce-yield-to-form-based-prompt-injection-techniques/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-15T16:53:21+00:00</news:publication_date><news:title>Copilot and Agentforce Yield to Form-Based Prompt Injection Techniques</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/the-future-of-modern-observability/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-15T16:18:46+00:00</news:publication_date><news:title>The Future of Modern Observability</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
</urlset>
