<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/wp-content/plugins/xml-sitemap-feed/assets/sitemap-news.xsl?ver=5.4.9"?>
<!-- generated-on="2026-04-18T08:15:17+00:00" -->
<!-- generator="XML Sitemap & Google News for WordPress" -->
<!-- generator-url="https://status301.net/wordpress-plugins/xml-sitemap-feed/" -->
<!-- generator-version="5.4.9" -->
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" >
<url><loc>https://cybersecurity-see.com/microsoft-addresses-two-zero-day-vulnerabilities-in-april-patch-tuesday/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-18T05:17:05+00:00</news:publication_date><news:title>Microsoft Addresses Two Zero-Day Vulnerabilities in April Patch Tuesday</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/circle-faces-lawsuit-for-stolen-usdc/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-18T05:10:10+00:00</news:publication_date><news:title>Circle Faces Lawsuit for Stolen USDC</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/operation-poweroff-disables-75000-ddos-attackers-and-over-50-service-domains/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-18T03:09:30+00:00</news:publication_date><news:title>Operation PowerOFF Disables 75,000 DDoS Attackers and Over 50 Service Domains</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/healthcare-cyber-research-programs-avoid-budget-cuts/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-18T03:04:49+00:00</news:publication_date><news:title>Healthcare Cyber Research Programs Avoid Budget Cuts</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/critical-sandbox-bypass-vulnerability-resolved-in-thymeleaf-java-template-engine/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-18T02:46:15+00:00</news:publication_date><news:title>Critical Sandbox Bypass Vulnerability Resolved in Thymeleaf Java Template Engine</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/ai-optimism-and-anxiety-at-rsac-2026-along-with-an-mia-u-s-government/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-18T01:08:21+00:00</news:publication_date><news:title>AI Optimism and Anxiety at RSAC 2026, Along with an MIA U.S. Government</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/scattered-spider-hacker-admits-guilt-in-u-s-federal-court/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-18T00:43:33+00:00</news:publication_date><news:title>Scattered Spider Hacker Admits Guilt in U.S. Federal Court</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/researchers-identify-increase-in-brute-force-attacks-originating-from-the-middle-east/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-18T00:15:20+00:00</news:publication_date><news:title>Researchers Identify Increase in Brute-Force Attacks Originating from the Middle East</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/pentagon-announces-new-appointments-for-cio-office/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T23:07:17+00:00</news:publication_date><news:title>Pentagon Announces New Appointments for CIO Office</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/finance-chiefs-caution-that-new-ai-models-could-disrupt-global-banking/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T22:22:53+00:00</news:publication_date><news:title>Finance Chiefs Caution That New AI Models Could Disrupt Global Banking</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/flawed-cisco-update-poses-risk-of-aps-missing-future-patches/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T21:44:28+00:00</news:publication_date><news:title>Flawed Cisco Update Poses Risk of APs Missing Future Patches</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/tp-link-routers-targeted-by-mirai-in-cve-2023-33538-attacks/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T21:06:18+00:00</news:publication_date><news:title>TP-Link Routers Targeted by Mirai in CVE-2023-33538 Attacks</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/europe-advances-digital-sovereignty-with-213m-cloud-contract/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T20:01:34+00:00</news:publication_date><news:title>Europe Advances Digital Sovereignty with $213M Cloud Contract</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/international-police-action-disrupts-ddos-for-hire-services/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T19:13:09+00:00</news:publication_date><news:title>International Police Action Disrupts DDoS-For-Hire Services</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/another-microsoft-defender-privilege-escalation-bug-discovered-days-after-patch/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T19:05:10+00:00</news:publication_date><news:title>Another Microsoft Defender Privilege Escalation Bug Discovered Days After Patch</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/uk-government-raises-alarm-over-ai-security-risks/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T17:04:14+00:00</news:publication_date><news:title>UK Government Raises Alarm Over AI Security Risks</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/commercial-ai-models-demonstrate-swift-advancements-in-vulnerability-research/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T16:42:12+00:00</news:publication_date><news:title>Commercial AI Models Demonstrate Swift Advancements in Vulnerability Research</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cyber-briefing-for-april-17-2026-cybermaterial/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T15:04:01+00:00</news:publication_date><news:title>Cyber Briefing for April 17, 2026 &#8211; CyberMaterial</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/white-house-enables-federal-agencies-to-access-anthropics-claude-mythos/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T14:11:14+00:00</news:publication_date><news:title>White House Enables Federal Agencies to Access Anthropic&#8217;s Claude Mythos</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/seo-poisoning-attack-leverages-microsoft-binary-to-install-rmm-tool/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T13:02:30+00:00</news:publication_date><news:title>SEO Poisoning Attack Leverages Microsoft Binary to Install RMM Tool</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/a-pivotal-moment-in-cybersecurity/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T12:58:46+00:00</news:publication_date><news:title>A Pivotal Moment in Cybersecurity</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/automotive-ransomware-attacks-surge-by-100-in-one-year/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T11:40:35+00:00</news:publication_date><news:title>Automotive Ransomware Attacks Surge by 100% in One Year</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/palo-altos-helmut-reisinger-anticipates-a-cyber-sea-change-with-advancements-in-ai/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T11:01:17+00:00</news:publication_date><news:title>Palo Alto&#8217;s Helmut Reisinger Anticipates a Cyber Sea Change with Advancements in AI</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/live-webinar-protecting-the-hybrid-attack-surface-from-ai-enabled-adversaries/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T10:37:36+00:00</news:publication_date><news:title>Live Webinar: Protecting the Hybrid Attack Surface from AI-Enabled Adversaries</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/systemic-flaw-in-mcp-protocol-may-expose-150-million-downloads/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T09:09:44+00:00</news:publication_date><news:title>Systemic Flaw in MCP Protocol May Expose 150 Million Downloads</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/qa-your-face-is-now-part-of-the-threat-landscape-warns-sarah-armstrong-smith/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T09:00:29+00:00</news:publication_date><news:title>Q&#038;A: Your Face Is Now Part of the Threat Landscape, Warns Sarah Armstrong-Smith</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/rethinking-cybersecurity-for-ai-acceleration-in-the-mythos-era/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T08:16:38+00:00</news:publication_date><news:title>Rethinking Cybersecurity for AI Acceleration in the Mythos Era</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/how-ai-is-improving-at-identifying-security-vulnerabilities-npr/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T07:59:02+00:00</news:publication_date><news:title>How AI is Improving at Identifying Security Vulnerabilities &#8211; NPR</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/manchester-tech-event-focused-on-ai-and-cyber-trust/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T06:59:18+00:00</news:publication_date><news:title>Manchester Tech Event Focused on AI and Cyber Trust</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/nist-reduces-cve-analysis-due-to-overwhelming-vulnerability-volume/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T06:39:19+00:00</news:publication_date><news:title>NIST Reduces CVE Analysis Due to Overwhelming Vulnerability Volume</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/openai-engages-banks-for-trusted-access-in-cybersecurity-partnership-initiative/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T05:55:14+00:00</news:publication_date><news:title>OpenAI Engages Banks for Trusted Access in Cybersecurity Partnership Initiative</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/abuse-of-microsoft-365-mailbox-rules-for-exfiltration-and-persistence/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T05:51:08+00:00</news:publication_date><news:title>Abuse of Microsoft 365 Mailbox Rules for Exfiltration and Persistence</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cargo-hackers-target-trucking-companies-to-steal-physical-shipments/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T04:58:13+00:00</news:publication_date><news:title>Cargo Hackers Target Trucking Companies to Steal Physical Shipments</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cookeville-hospital-reports-rhysida-breach-affecting-337917-individuals/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T04:08:19+00:00</news:publication_date><news:title>Cookeville Hospital Reports Rhysida Breach Affecting 337,917 Individuals</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/sumit-dhawan-discusses-nyse-floor-insights-proofpoint-ai-security/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T03:43:10+00:00</news:publication_date><news:title>Sumit Dhawan Discusses NYSE Floor Insights | Proofpoint AI Security</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/threatsday-bulletin-defender-0-day-sonicwall-brute-force-17-year-old-excel-rce-and-15-additional-stories/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T03:33:13+00:00</news:publication_date><news:title>ThreatsDay Bulletin: Defender 0-Day, SonicWall Brute-Force, 17-Year-Old Excel RCE, and 15 Additional Stories</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/rce-by-design-mcp-architectural-choices-impacting-the-ai-agent-ecosystem/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T02:57:18+00:00</news:publication_date><news:title>RCE by Design: MCP Architectural Choices Impacting the AI Agent Ecosystem</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cisco-systems-releases-three-advisories-addressing-critical-vulnerabilities-in-webex-and-ise/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T01:37:09+00:00</news:publication_date><news:title>Cisco Systems Releases Three Advisories Addressing Critical Vulnerabilities in Webex and ISE</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cargo-theft-by-hackers-involves-sophisticated-remote-access-campaigns-researchers-discover/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T01:35:07+00:00</news:publication_date><news:title>Cargo Theft by Hackers Involves Sophisticated Remote Access Campaigns, Researchers Discover</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cisa-alerts-to-detrimental-capacity-impacts-amid-shutdown/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T01:12:28+00:00</news:publication_date><news:title>CISA Alerts to Detrimental Capacity Impacts Amid Shutdown</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/women-in-cyber-training-model-shecyber-expands-beyond-eu-funding-with-new-independent-adoption-by-countries/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T00:56:05+00:00</news:publication_date><news:title>Women-in-Cyber Training Model SHE@CYBER Expands Beyond EU Funding with New Independent Adoption by Countries</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/apk-malformation-detected-in-thousands-of-android-malware-samples/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T23:05:52+00:00</news:publication_date><news:title>APK Malformation Detected in Thousands of Android Malware Samples</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/ai-red-and-blue-teaming-summit-hosted-by-packt/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T22:55:12+00:00</news:publication_date><news:title>AI Red and Blue Teaming Summit Hosted by Packt</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/mr-raccoon-seeks-your-password/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T22:51:31+00:00</news:publication_date><news:title>Mr. Raccoon Seeks Your Password</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/uac-0247-targets-hospitals-and-governments-with-browser-and-whatsapp-data-theft/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T20:54:19+00:00</news:publication_date><news:title>UAC-0247 Targets Hospitals and Governments with Browser and WhatsApp Data Theft</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/the-ongoing-debate-over-ciso-reporting-lines-and-its-implications-for-cybersecurity-leadership/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T20:34:41+00:00</news:publication_date><news:title>The Ongoing Debate Over CISO Reporting Lines and Its Implications for Cybersecurity Leadership</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/stryker-hack-impacts-first-quarter-results/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T20:30:19+00:00</news:publication_date><news:title>Stryker Hack Impacts First Quarter Results</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/how-to-respond-when-your-ai-guardrails-fail/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T18:53:28+00:00</news:publication_date><news:title>How to Respond When Your AI Guardrails Fail</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/current-security-trends-ai-escalation-identity-exposure-and-operationalizing-zero-trust/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T18:09:34+00:00</news:publication_date><news:title>Current Security Trends: AI Escalation, Identity Exposure, and Operationalizing Zero Trust</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/us-nationals-sentenced-for-running-fake-it-worker-scams-for-north-korea/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T18:03:11+00:00</news:publication_date><news:title>US Nationals Sentenced for Running Fake IT Worker Scams for North Korea</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cyber-briefing-april-16-2026-cybermaterial/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T16:52:30+00:00</news:publication_date><news:title>Cyber Briefing &#8211; April 16, 2026 &#8211; CyberMaterial</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/uac-0247-campaign-targeting-ukrainian-clinics-and-government/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T15:52:58+00:00</news:publication_date><news:title>UAC-0247 Campaign Targeting Ukrainian Clinics and Government</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/ai-enhancing-sast-accuracy-and-minimizing-developer-friction-webinar/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T15:48:11+00:00</news:publication_date><news:title>AI Enhancing SAST Accuracy and Minimizing Developer Friction Webinar</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/behind-the-mythos-hype-glasswing-has-only-one-confirmed-cve/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T15:32:08+00:00</news:publication_date><news:title>Behind the Mythos Hype, Glasswing Has Only One Confirmed CVE</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/when-pups-bite-huntress-uncovers-weaponized-adware-exposing-over-25000-systems/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T13:27:39+00:00</news:publication_date><news:title>When PUPs Bite: Huntress Uncovers Weaponized Adware Exposing Over 25,000 Systems</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/nist-discontinues-nvd-enrichment-for-vulnerabilities-before-march-2026/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T13:01:35+00:00</news:publication_date><news:title>NIST Discontinues NVD Enrichment for Vulnerabilities Before March 2026</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/microsofts-windows-recall-enables-silent-data-extraction/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T12:50:06+00:00</news:publication_date><news:title>Microsoft&#8217;s Windows Recall Enables Silent Data Extraction</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/freight-hacker-uses-code-signing-service-to-bypass-defenses/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T11:06:19+00:00</news:publication_date><news:title>Freight Hacker Uses Code-Signing Service to Bypass Defenses</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/strategies-for-implementing-an-enterprise-passkey-deployment/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T10:49:16+00:00</news:publication_date><news:title>Strategies for Implementing an Enterprise Passkey Deployment</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/insurance-carriers-discreetly-retreat-from-covering-ai-outputs/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T10:30:19+00:00</news:publication_date><news:title>Insurance Carriers Discreetly Retreat from Covering AI Outputs</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/only-16-of-businesses-fully-compliant-with-nis2-ahead-of-2024-deadline/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T08:48:40+00:00</news:publication_date><news:title>Only 16% of Businesses Fully Compliant with NIS2 Ahead of 2024 Deadline</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/openai-expands-cybersecurity-program-with-new-gpt-5-4-cyber-model/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T08:45:20+00:00</news:publication_date><news:title>OpenAI Expands Cybersecurity Program with New GPT-5.4-Cyber Model</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
</urlset>
