<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/wp-content/plugins/xml-sitemap-feed/assets/sitemap-news.xsl?ver=5.4.9"?>
<!-- generated-on="2026-05-01T05:01:16+00:00" -->
<!-- generator="XML Sitemap & Google News for WordPress" -->
<!-- generator-url="https://status301.net/wordpress-plugins/xml-sitemap-feed/" -->
<!-- generator-version="5.4.9" -->
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" >
<url><loc>https://cybersecurity-see.com/launch-of-cybercrime-fighters-club-cybermaterial/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-01T03:48:15+00:00</news:publication_date><news:title>Launch of Cybercrime Fighters Club &#8211; CyberMaterial</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/threatsday-bulletin-sms-blaster-shutdown-openemr-vulnerabilities-600k-roblox-hacks-and-25-additional-stories/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-01T03:42:42+00:00</news:publication_date><news:title>ThreatsDay Bulletin: SMS Blaster Shutdown, OpenEMR Vulnerabilities, 600K Roblox Hacks, and 25 Additional Stories</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/trivial-exploit-grants-attackers-root-access-to-linux-kernel/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-01T02:55:11+00:00</news:publication_date><news:title>Trivial Exploit Grants Attackers Root Access to Linux Kernel</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/openai-introduces-cyber-defense-roadmap-centered-on-ai-driven-security/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-01T01:47:14+00:00</news:publication_date><news:title>OpenAI Introduces Cyber Defense Roadmap Centered on AI-Driven Security</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/state-cisos-losing-confidence-amid-rising-ai-threats/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-01T01:21:30+00:00</news:publication_date><news:title>State CISOs Losing Confidence Amid Rising AI Threats</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/deep-door-python-backdoor-bypasses-detection-on-windows/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-01T00:24:06+00:00</news:publication_date><news:title>Deep Door Python Backdoor Bypasses Detection on Windows</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/bank-regulator-issues-warning-on-cybersecurity-threats-from-ai-models/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-30T23:46:16+00:00</news:publication_date><news:title>Bank Regulator Issues Warning on Cybersecurity Threats from AI Models</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/us-cyber-command-warns-of-election-threats/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-30T23:00:29+00:00</news:publication_date><news:title>US Cyber Command Warns of Election Threats</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/odni-advises-cisos-on-threat-assessments-youre-on-your-own/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-30T21:53:23+00:00</news:publication_date><news:title>ODNI Advises CISOs on Threat Assessments: You&#8217;re On Your Own</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cisos-guide-to-centralized-and-federated-security-models/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-30T21:45:20+00:00</news:publication_date><news:title>CISO&#8217;s Guide to Centralized and Federated Security Models</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/chinese-hacker-extradition-delivers-a-global-message/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-30T20:39:24+00:00</news:publication_date><news:title>Chinese Hacker Extradition Delivers a Global Message</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/forescout-unveils-missionpossible-global-partner-tour-to-enhance-channel-growth-in-90-cities/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-30T19:44:23+00:00</news:publication_date><news:title>Forescout Unveils Mission:Possible Global Partner Tour to Enhance Channel Growth in 90 Cities</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/three-arrested-for-hacking-more-than-610000-roblox-accounts/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-30T19:22:28+00:00</news:publication_date><news:title>Three Arrested for Hacking More than 610,000 Roblox Accounts</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/north-korea-acquires-majority-of-cryptocurrency-to-date/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-30T18:18:27+00:00</news:publication_date><news:title>North Korea Acquires Majority of Cryptocurrency to Date</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cyber-briefing-for-april-30-2026-cybermaterial/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-30T17:43:31+00:00</news:publication_date><news:title>Cyber Briefing for April 30, 2026 &#8211; CyberMaterial</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/sap-npm-package-attack-exposes-risks-in-developer-tools-and-ci-cd-pipelines/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-30T16:51:21+00:00</news:publication_date><news:title>SAP npm Package Attack Exposes Risks in Developer Tools and CI/CD Pipelines</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/linux-copy-fail-flaw-grants-root-level-access-to-distros/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-30T15:57:43+00:00</news:publication_date><news:title>Linux Copy Fail Flaw Grants Root-Level Access to Distros</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/poc-released-for-critical-root-rce-vulnerability-in-asustor-adm/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-30T15:42:15+00:00</news:publication_date><news:title>PoC Released for Critical Root RCE Vulnerability in ASUSTOR ADM</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cisa-and-partners-release-zero-trust-guidance-for-ot-security/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-30T14:19:49+00:00</news:publication_date><news:title>CISA and Partners Release Zero Trust Guidance for OT Security</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cisa-urges-critical-infrastructure-operators-to-dismantle-implicit-trust-in-ot-networks/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-30T13:41:32+00:00</news:publication_date><news:title>CISA Urges Critical Infrastructure Operators to Dismantle Implicit Trust in OT Networks</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/live-webinar-safeguarding-the-hybrid-attack-surface-from-ai-enabled-adversaries/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-30T13:36:31+00:00</news:publication_date><news:title>Live Webinar: Safeguarding the Hybrid Attack Surface from AI-Enabled Adversaries</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/max-severity-rce-flaw-discovered-in-google-gemini-cli/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-30T11:49:13+00:00</news:publication_date><news:title>Max Severity RCE Flaw Discovered in Google Gemini CLI</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/top-ai-security-tools-for-exposure-assessment-in-2026/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-30T11:40:16+00:00</news:publication_date><news:title>Top AI Security Tools for Exposure Assessment in 2026</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/live-webinar-protecting-ot-systems-after-windows-10-end-of-support/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-30T11:15:29+00:00</news:publication_date><news:title>Live Webinar: Protecting OT Systems After Windows 10 End of Support</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/malwarebytes-partners-with-claude-for-scam-detection/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-30T09:39:28+00:00</news:publication_date><news:title>Malwarebytes Partners with Claude for Scam Detection</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cloud-hsm-for-regulated-industries-compliance-and-security/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-30T09:18:31+00:00</news:publication_date><news:title>Cloud HSM for Regulated Industries &#8211; Compliance and Security</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/us-fda-pilots-ai-technology-for-real-time-clinical-trials/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-30T08:54:03+00:00</news:publication_date><news:title>US FDA Pilots AI Technology for Real-Time Clinical Trials</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/compromised-sap-npm-packages-discovered-collecting-developer-and-ci-cd-secrets/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-30T07:38:30+00:00</news:publication_date><news:title>Compromised SAP npm Packages Discovered Collecting Developer and CI/CD Secrets</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cisa-includes-actively-exploited-connectwise-and-windows-vulnerabilities-in-kev/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-30T06:33:12+00:00</news:publication_date><news:title>CISA Includes Actively Exploited ConnectWise and Windows Vulnerabilities in KEV</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/meta-faces-violations-of-eu-dsa-regulations/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-30T05:37:38+00:00</news:publication_date><news:title>Meta Faces Violations of EU DSA Regulations</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/openais-founding-promise-undergoes-judicial-examination/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-30T04:12:37+00:00</news:publication_date><news:title>OpenAI&#8217;s Founding Promise Undergoes Judicial Examination</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cursor-ai-coding-agent-vulnerability-allows-attackers-to-execute-code-on-developers-machines/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-30T03:36:10+00:00</news:publication_date><news:title>Cursor AI Coding Agent Vulnerability Allows Attackers to Execute Code on Developers&#8217; Machines</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/fbi-backed-operation-targets-crypto-scam-centers/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-30T01:51:41+00:00</news:publication_date><news:title>FBI-Backed Operation Targets Crypto Scam Centers</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/researchers-discover-industrial-sabotage-malware-that-predates-stuxnet-by-five-years/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-30T01:35:09+00:00</news:publication_date><news:title>Researchers discover industrial sabotage malware that predates Stuxnet by five years</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/most-common-authentication-methods/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T23:34:08+00:00</news:publication_date><news:title>Most Common Authentication Methods</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/silverfort-acquires-fabrix-to-enhance-access-decisions-with-ai/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T23:30:33+00:00</news:publication_date><news:title>Silverfort Acquires Fabrix to Enhance Access Decisions with AI</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/critical-flaw-transforms-vect-ransomware-into-a-data-destructive-wiper/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T23:14:24+00:00</news:publication_date><news:title>Critical Flaw Transforms Vect Ransomware into a Data-Destructive Wiper</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/canada-proposes-ban-on-crypto-atms/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T21:33:09+00:00</news:publication_date><news:title>Canada Proposes Ban on Crypto ATMs</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/researchers-identify-2-9-billion-compromised-credentials/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T20:43:22+00:00</news:publication_date><news:title>Researchers Identify 2.9 Billion Compromised Credentials</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cursor-ai-extension-vulnerability-exposes-developer-tokens-to-credential-theft/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T19:31:49+00:00</news:publication_date><news:title>Cursor AI Extension Vulnerability Exposes Developer Tokens to Credential Theft</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/europe-moves-towards-mandatory-online-age-verification/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T18:48:34+00:00</news:publication_date><news:title>Europe Moves Towards Mandatory Online Age Verification</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/malicious-npm-dependency-associated-with-ai-driven-commit-targets-in-cryptocurrency/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T18:12:18+00:00</news:publication_date><news:title>Malicious npm Dependency Associated with AI-Driven Commit Targets in Cryptocurrency</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cyber-briefing-april-29-2026-cybermaterial/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T17:31:21+00:00</news:publication_date><news:title>Cyber Briefing &#8211; April 29, 2026 &#8211; CyberMaterial</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/appsec-is-dead-long-live-ai-security/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T16:27:19+00:00</news:publication_date><news:title>AppSec Is Dead: Long Live AI Security</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cursor-extension-flaw-exposes-developer-api-keys/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T15:41:18+00:00</news:publication_date><news:title>Cursor Extension Flaw Exposes Developer API Keys</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/lazarus-targets-macos-users-with-new-mach-o-man-malware-kit/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T15:30:51+00:00</news:publication_date><news:title>Lazarus Targets macOS Users with New Mach-O Man Malware Kit</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/the-new-rules-of-war-lack-rules/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T14:06:32+00:00</news:publication_date><news:title>The New Rules of War Lack Rules</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/pentagon-initiates-cyber-apprenticeship-program/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T13:29:32+00:00</news:publication_date><news:title>Pentagon Initiates Cyber Apprenticeship Program</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/critical-github-rce-vulnerability-exposes-millions-of-repositories/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T13:10:26+00:00</news:publication_date><news:title>Critical GitHub RCE Vulnerability Exposes Millions of Repositories</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/u-s-charges-suspected-scattered-spider-member-in-cyber-intrusions/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T11:28:06+00:00</news:publication_date><news:title>U.S. Charges Suspected Scattered Spider Member in Cyber Intrusions</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/a-quarter-of-healthcare-organizations-report-attacks-on-medical-devices/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T10:39:12+00:00</news:publication_date><news:title>A Quarter of Healthcare Organizations Report Attacks on Medical Devices</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/aws-relies-on-past-innovations-to-address-future-ai-and-quantum-challenges/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T09:27:17+00:00</news:publication_date><news:title>AWS Relies on Past Innovations to Address Future AI and Quantum Challenges</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/webinar-governing-ai-at-scale-for-trust-control-and-confidence-in-banking/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T09:24:23+00:00</news:publication_date><news:title>Webinar: Governing AI at Scale for Trust, Control, and Confidence in Banking</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/u-s-companies-encounter-historic-privacy-fines-in-2025/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T07:26:07+00:00</news:publication_date><news:title>U.S. Companies Encounter Historic Privacy Fines in 2025</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/google-invests-up-to-40b-in-anthropic-as-ai-compute-competition-intensifies/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T07:03:27+00:00</news:publication_date><news:title>Google Invests Up to $40B in Anthropic as AI Compute Competition Intensifies</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/north-korean-hackers-target-crypto-firms-using-clickfix-and-zoom-tactics/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T05:37:17+00:00</news:publication_date><news:title>North Korean Hackers Target Crypto Firms Using ClickFix and Zoom Tactics</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/bluenoroff-launches-fileless-powershell-attack-in-ai-driven-zoom-phishing-campaign/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T05:25:17+00:00</news:publication_date><news:title>BlueNoroff Launches Fileless PowerShell Attack in AI-Driven Zoom Phishing Campaign</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
</urlset>
