<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/wp-content/plugins/xml-sitemap-feed/assets/sitemap-news.xsl?ver=5.4.9"?>
<!-- generated-on="2026-04-16T22:46:10+00:00" -->
<!-- generator="XML Sitemap & Google News for WordPress" -->
<!-- generator-url="https://status301.net/wordpress-plugins/xml-sitemap-feed/" -->
<!-- generator-version="5.4.9" -->
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" >
<url><loc>https://cybersecurity-see.com/uac-0247-targets-hospitals-and-governments-with-browser-and-whatsapp-data-theft/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T20:54:19+00:00</news:publication_date><news:title>UAC-0247 Targets Hospitals and Governments with Browser and WhatsApp Data Theft</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/the-ongoing-debate-over-ciso-reporting-lines-and-its-implications-for-cybersecurity-leadership/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T20:34:41+00:00</news:publication_date><news:title>The Ongoing Debate Over CISO Reporting Lines and Its Implications for Cybersecurity Leadership</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/stryker-hack-impacts-first-quarter-results/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T20:30:19+00:00</news:publication_date><news:title>Stryker Hack Impacts First Quarter Results</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/how-to-respond-when-your-ai-guardrails-fail/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T18:53:28+00:00</news:publication_date><news:title>How to Respond When Your AI Guardrails Fail</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/current-security-trends-ai-escalation-identity-exposure-and-operationalizing-zero-trust/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T18:09:34+00:00</news:publication_date><news:title>Current Security Trends: AI Escalation, Identity Exposure, and Operationalizing Zero Trust</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/us-nationals-sentenced-for-running-fake-it-worker-scams-for-north-korea/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T18:03:11+00:00</news:publication_date><news:title>US Nationals Sentenced for Running Fake IT Worker Scams for North Korea</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cyber-briefing-april-16-2026-cybermaterial/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T16:52:30+00:00</news:publication_date><news:title>Cyber Briefing &#8211; April 16, 2026 &#8211; CyberMaterial</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/uac-0247-campaign-targeting-ukrainian-clinics-and-government/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T15:52:58+00:00</news:publication_date><news:title>UAC-0247 Campaign Targeting Ukrainian Clinics and Government</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/ai-enhancing-sast-accuracy-and-minimizing-developer-friction-webinar/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T15:48:11+00:00</news:publication_date><news:title>AI Enhancing SAST Accuracy and Minimizing Developer Friction Webinar</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/behind-the-mythos-hype-glasswing-has-only-one-confirmed-cve/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T15:32:08+00:00</news:publication_date><news:title>Behind the Mythos Hype, Glasswing Has Only One Confirmed CVE</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/when-pups-bite-huntress-uncovers-weaponized-adware-exposing-over-25000-systems/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T13:27:39+00:00</news:publication_date><news:title>When PUPs Bite: Huntress Uncovers Weaponized Adware Exposing Over 25,000 Systems</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/nist-discontinues-nvd-enrichment-for-vulnerabilities-before-march-2026/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T13:01:35+00:00</news:publication_date><news:title>NIST Discontinues NVD Enrichment for Vulnerabilities Before March 2026</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/microsofts-windows-recall-enables-silent-data-extraction/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T12:50:06+00:00</news:publication_date><news:title>Microsoft&#8217;s Windows Recall Enables Silent Data Extraction</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/freight-hacker-uses-code-signing-service-to-bypass-defenses/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T11:06:19+00:00</news:publication_date><news:title>Freight Hacker Uses Code-Signing Service to Bypass Defenses</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/strategies-for-implementing-an-enterprise-passkey-deployment/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T10:49:16+00:00</news:publication_date><news:title>Strategies for Implementing an Enterprise Passkey Deployment</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/insurance-carriers-discreetly-retreat-from-covering-ai-outputs/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T10:30:19+00:00</news:publication_date><news:title>Insurance Carriers Discreetly Retreat from Covering AI Outputs</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/only-16-of-businesses-fully-compliant-with-nis2-ahead-of-2024-deadline/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T08:48:40+00:00</news:publication_date><news:title>Only 16% of Businesses Fully Compliant with NIS2 Ahead of 2024 Deadline</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/openai-expands-cybersecurity-program-with-new-gpt-5-4-cyber-model/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T08:45:20+00:00</news:publication_date><news:title>OpenAI Expands Cybersecurity Program with New GPT-5.4-Cyber Model</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/ai-companies-to-take-on-greater-role-in-cve-program-according-to-cisa/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T07:59:31+00:00</news:publication_date><news:title>AI Companies to Take on Greater Role in CVE Program, According to CISA</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/117-5-million-comcast-settlement-following-data-breach/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T06:47:08+00:00</news:publication_date><news:title>$117.5 Million Comcast Settlement Following Data Breach</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/what-cisos-need-to-know-about-ai-risk-webinar/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T06:24:20+00:00</news:publication_date><news:title>What CISOs Need to Know About AI Risk Webinar</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/adware-campaign-deactivates-antivirus-software-on-23000-systems/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T05:28:15+00:00</news:publication_date><news:title>Adware Campaign Deactivates Antivirus Software on 23,000 Systems</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/top-10-application-security-testing-companies-to-watch-in-2026/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T04:46:20+00:00</news:publication_date><news:title>Top 10 Application Security Testing Companies to Watch in 2026</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/hscc-guide-addresses-third-party-ai-risks-in-healthcare/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T04:03:41+00:00</news:publication_date><news:title>HSCC Guide Addresses Third-Party AI Risks in Healthcare</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/eu-regulators-primarily-deny-access-to-anthropic-mythos/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T02:57:04+00:00</news:publication_date><news:title>EU Regulators Primarily Deny Access to Anthropic Mythos</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/curity-aims-to-transform-iam-with-runtime-authorization-for-ai-agents/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T02:45:13+00:00</news:publication_date><news:title>Curity Aims to Transform IAM with Runtime Authorization for AI Agents</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/artemis-secures-70m-to-develop-ai-agents-for-detection-and-response/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T01:42:40+00:00</news:publication_date><news:title>Artemis Secures $70M to Develop AI Agents for Detection and Response</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/inside-the-soc-that-secured-the-rsac-2026-conference/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T00:44:37+00:00</news:publication_date><news:title>Inside the SOC that Secured the RSAC 2026 Conference</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/enisa-aims-for-premier-status-in-cve-program/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-16T00:26:13+00:00</news:publication_date><news:title>ENISA Aims for Premier Status in CVE Program</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/federal-employees-continue-using-claude-despite-trump-orders/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-15T23:22:00+00:00</news:publication_date><news:title>Federal Employees Continue Using Claude Despite Trump Orders</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/the-role-of-the-enterprise-supply-chain-in-expanding-the-global-attack-surface/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-15T22:43:23+00:00</news:publication_date><news:title>The Role of the Enterprise Supply Chain in Expanding the Global Attack Surface</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/critical-nginx-ui-tool-vulnerability-exposes-web-servers-to-complete-compromise/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-15T21:55:05+00:00</news:publication_date><news:title>Critical Nginx UI Tool Vulnerability Exposes Web Servers to Complete Compromise</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/us-fcc-grants-netgear-temporary-exemption-from-router-ban/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-15T21:00:34+00:00</news:publication_date><news:title>US FCC Grants Netgear Temporary Exemption from Router Ban</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cisa-cancels-cybercorps-summer-internships/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-15T20:42:10+00:00</news:publication_date><news:title>CISA Cancels CyberCorps Summer Internships</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/openai-launches-gpt-5-4-cyber-to-enhance-cyber-defense-using-ai/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-15T19:24:31+00:00</news:publication_date><news:title>OpenAI Launches GPT-5.4-Cyber to Enhance Cyber Defense Using AI</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/top-10-api-security-providers-for-web-apps-in-2026/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-15T18:41:47+00:00</news:publication_date><news:title>Top 10 API Security Providers for Web Apps in 2026</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/why-fraudsters-continue-to-prevail-despite-technological-advancements/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-15T18:39:29+00:00</news:publication_date><news:title>Why Fraudsters Continue to Prevail Despite Technological Advancements</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/copilot-and-agentforce-yield-to-form-based-prompt-injection-techniques/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-15T16:53:21+00:00</news:publication_date><news:title>Copilot and Agentforce Yield to Form-Based Prompt Injection Techniques</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/the-future-of-modern-observability/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-15T16:18:46+00:00</news:publication_date><news:title>The Future of Modern Observability</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cyber-briefing-2026-04-15-cybermaterial/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-15T14:39:57+00:00</news:publication_date><news:title>Cyber Briefing &#8211; 2026.04.15 &#8211; CyberMaterial</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/critical-nginx-ui-mcp-vulnerability-actively-exploited-in-the-wild/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-15T14:22:13+00:00</news:publication_date><news:title>Critical Nginx-ui MCP Vulnerability Actively Exploited in the Wild</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/the-importance-of-data-trust-for-ai-success/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-15T13:57:41+00:00</news:publication_date><news:title>The Importance of Data Trust for AI Success</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/google-implements-rust-based-firmware-in-pixel-10-modem-for-enhanced-memory-safety/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-15T12:38:24+00:00</news:publication_date><news:title>Google Implements Rust-Based Firmware in Pixel 10 Modem for Enhanced Memory Safety</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/the-importance-of-establishing-a-board-level-definition-of-cyber-resilience/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-15T11:51:04+00:00</news:publication_date><news:title>The Importance of Establishing a Board-Level Definition of Cyber Resilience</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/openai-gpt-5-4-cyber-launch-and-security-implications/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-15T11:46:02+00:00</news:publication_date><news:title>OpenAI GPT-5.4-Cyber Launch and Security Implications</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/why-data-protection-vendor-commvault-is-considering-a-move-to-going-private/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-15T11:36:32+00:00</news:publication_date><news:title>Why Data Protection Vendor Commvault Is Considering a Move to Going Private</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/the-deepfake-dilemma-from-financial-fraud-to-reputational-crisis/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-15T10:37:37+00:00</news:publication_date><news:title>The Deepfake Dilemma &#8211; From Financial Fraud to Reputational Crisis</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/pci-dss-4-0-roadmap-for-dpos-utilizing-vault/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-15T09:20:53+00:00</news:publication_date><news:title>PCI DSS 4.0 Roadmap for DPOs Utilizing Vault</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/off-the-shelf-llms-unprepared-for-clinical-use/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-15T09:15:37+00:00</news:publication_date><news:title>Off-the-Shelf LLMs Unprepared for Clinical Use</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/improving-the-soc-analyst-experience-and-its-importance/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-15T08:36:14+00:00</news:publication_date><news:title>Improving the SOC Analyst Experience and Its Importance</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/25000-endpoints-exposed-via-dragon-boss-solutions-supply-chain-weakness/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-15T07:44:22+00:00</news:publication_date><news:title>25,000+ Endpoints Exposed via Dragon Boss Solutions Supply Chain Weakness</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cisa-employees-recalled-amid-shutdown/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-15T06:54:21+00:00</news:publication_date><news:title>CISA Employees Recalled Amid Shutdown</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/mallory-unveils-ai-native-threat-intelligence-platform-to-transform-global-threat-data-into-prioritized-actions/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-15T06:49:33+00:00</news:publication_date><news:title>Mallory Unveils AI-Native Threat Intelligence Platform to Transform Global Threat Data into Prioritized Actions</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/australias-social-media-ban-faces-scrutiny/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-15T06:36:05+00:00</news:publication_date><news:title>Australia&#8217;s Social Media Ban Faces Scrutiny</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/plugx-usb-worm-spreads-across-continents-through-dll-sideloading/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-15T04:34:59+00:00</news:publication_date><news:title>PlugX USB Worm Spreads Across Continents Through DLL Sideloading</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cisa-expands-list-of-known-exploited-flaws-in-fortinet-microsoft-and-adobe-software-by-adding-six-vulnerabilities/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-15T04:33:28+00:00</news:publication_date><news:title>CISA Expands List of Known Exploited Flaws in Fortinet, Microsoft, and Adobe Software by Adding Six Vulnerabilities</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/malicious-chrome-extensions-campaign-exposes-user-data/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-15T04:17:19+00:00</news:publication_date><news:title>Malicious Chrome Extensions Campaign Exposes User Data</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cybersecurity-for-critical-sectors-handbook/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-15T02:32:06+00:00</news:publication_date><news:title>Cybersecurity for Critical Sectors Handbook</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/openai-announces-expanded-access-to-its-new-cyber-model/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-15T02:12:47+00:00</news:publication_date><news:title>OpenAI Announces Expanded Access to Its New Cyber Model</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/april-patch-tuesday-roundup-zero-day-vulnerabilities-and-critical-bugs/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-15T01:46:26+00:00</news:publication_date><news:title>April Patch Tuesday Roundup: Zero-Day Vulnerabilities and Critical Bugs</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/mirax-android-rat-turns-infected-phones-into-residential-proxies/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-15T00:31:37+00:00</news:publication_date><news:title>Mirax Android RAT Turns Infected Phones into Residential Proxies</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/mirax-rat-aims-at-android-devices-via-meta-applications/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-14T23:51:32+00:00</news:publication_date><news:title>Mirax RAT Aims at Android Devices via Meta Applications</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/triad-nexus-expands-global-fraud-operations-amid-us-sanctions/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-14T23:15:12+00:00</news:publication_date><news:title>Triad Nexus Expands Global Fraud Operations Amid US Sanctions</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
</urlset>
