<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/wp-content/plugins/xml-sitemap-feed/assets/sitemap-news.xsl?ver=5.4.9"?>
<!-- generated-on="2026-05-24T18:48:00+00:00" -->
<!-- generator="XML Sitemap & Google News for WordPress" -->
<!-- generator-url="https://status301.net/wordpress-plugins/xml-sitemap-feed/" -->
<!-- generator-version="5.4.9" -->
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" >
<url><loc>https://cybersecurity-see.com/tulane-university-investigates-data-breach/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-24T18:36:08+00:00</news:publication_date><news:title>Tulane University Investigates Data Breach</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/baidam-and-auscert-sign-mou-for-cybersecurity-collaboration/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-24T16:35:28+00:00</news:publication_date><news:title>Baidam and AUSCERT Sign MOU for Cybersecurity Collaboration</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/top-10-sast-tools-for-static-application-security-testing-in-2026/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-24T14:34:17+00:00</news:publication_date><news:title>Top 10 SAST Tools for Static Application Security Testing in 2026</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/71-of-organizations-affected-by-identity-breaches-according-to-sophos/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-24T12:33:05+00:00</news:publication_date><news:title>71% of Organizations Affected by Identity Breaches, According to Sophos</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/nist-pnt-framework-enhances-gps-interference-protections/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-24T10:32:04+00:00</news:publication_date><news:title>NIST PNT Framework Enhances GPS Interference Protections</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/russian-hackers-leverage-rdp-vpns-and-supply-chains-for-initial-access/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-24T08:31:16+00:00</news:publication_date><news:title>Russian Hackers Leverage RDP, VPNs, and Supply Chains for Initial Access</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/exiftool-cve-2026-3102-rce-through-image-metadata/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-24T06:30:17+00:00</news:publication_date><news:title>ExifTool CVE-2026-3102 RCE through Image Metadata</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/claude-mythos-preview-uncovers-over-10000-0-days-in-glasswing/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-24T04:29:14+00:00</news:publication_date><news:title>Claude Mythos Preview Uncovers Over 10,000 0-Days in Glasswing</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/litespeed-cpanel-plugin-cve-2026-48172-used-for-root-script-execution/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-24T04:00:05+00:00</news:publication_date><news:title>LiteSpeed cPanel Plugin CVE-2026-48172 Used for Root Script Execution</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/malicious-vs-code-extension-compromises-github/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-24T02:28:06+00:00</news:publication_date><news:title>Malicious VS Code Extension Compromises GitHub</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/hackers-compromise-laravel-lang-packages-in-700-github-repositories/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-24T00:27:22+00:00</news:publication_date><news:title>Hackers Compromise Laravel-Lang Packages in 700 GitHub Repositories</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/surge-of-738-in-ai-driven-ddos-attacks-within-the-finance-sector/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-23T22:26:05+00:00</news:publication_date><news:title>Surge of 738% in AI-Driven DDoS Attacks Within the Finance Sector</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/ubiquiti-addresses-serious-unifi-os-privilege-escalation-vulnerabilities/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-23T20:25:11+00:00</news:publication_date><news:title>Ubiquiti Addresses Serious UniFi OS Privilege Escalation Vulnerabilities</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/uk-gca-launches-2-9b-defense-tech-framework-for-smes/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-23T18:24:04+00:00</news:publication_date><news:title>UK GCA Launches £2.9B Defense Tech Framework for SMEs</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/litespeed-cpanel-plugin-zero-day-exploit-allows-server-root-access/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-23T16:23:24+00:00</news:publication_date><news:title>LiteSpeed cPanel Plugin Zero-Day Exploit Allows Server Root Access</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/graphworm-malware-utilizes-onedrive-for-command-and-control/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-23T14:22:13+00:00</news:publication_date><news:title>GraphWorm Malware Utilizes OneDrive for Command and Control</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/hackers-exploit-f5-big-ip-for-ssh-access-and-lateral-movement-into-linux-networks/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-23T12:21:06+00:00</news:publication_date><news:title>Hackers Exploit F5 BIG-IP for SSH Access and Lateral Movement into Linux Networks</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/taxtrident-campaign-distributes-windows-malware/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-23T10:20:09+00:00</news:publication_date><news:title>TAX#TRIDENT Campaign Distributes Windows Malware</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/hackers-exploit-seo-poisoning-to-create-fake-gemini-cli-and-claude-installers/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-23T08:19:17+00:00</news:publication_date><news:title>Hackers Exploit SEO Poisoning to Create Fake Gemini CLI and Claude Installers</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/zscaler-aims-to-mitigate-ai-identity-risk-through-symmetry-acquisition/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-23T06:51:14+00:00</news:publication_date><news:title>Zscaler Aims to Mitigate AI Identity Risk Through Symmetry Acquisition</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/russia-hacks-bluesky-accounts-to-spread-disinformation-about-ukraine/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-23T06:18:04+00:00</news:publication_date><news:title>Russia Hacks Bluesky Accounts to Spread Disinformation About Ukraine</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/first-vpn-dismantled-in-global-takedown-used-by-25-ransomware-groups/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-23T04:30:11+00:00</news:publication_date><news:title>First VPN Dismantled in Global Takedown Used by 25 Ransomware Groups</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/world-cup-phishing-surge-identifies-203-malicious-ips/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-23T04:17:18+00:00</news:publication_date><news:title>World Cup Phishing Surge Identifies 203 Malicious IPs</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/verizon-2026-dbir-highlights-6-essential-takeaways-for-cisos/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-23T02:16:06+00:00</news:publication_date><news:title>Verizon 2026 DBIR Highlights: 6 Essential Takeaways for CISOs</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/fbi-directors-former-apparel-brand-targeted-by-malware/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-23T02:09:21+00:00</news:publication_date><news:title>FBI Director&#8217;s Former Apparel Brand Targeted by Malware</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/google-reveals-details-on-chromium-bug-that-can-transform-browsers-into-bots/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-23T01:05:23+00:00</news:publication_date><news:title>Google Reveals Details on Chromium Bug That Can Transform Browsers into Bots</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/trust3-ai-introduces-mcp-security-for-ai-agents/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-23T00:15:06+00:00</news:publication_date><news:title>Trust3 AI Introduces MCP Security for AI Agents</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/rondodox-botnet-takes-advantage-of-2018-vulnerability-in-asus-routers/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-22T23:48:19+00:00</news:publication_date><news:title>RondoDox Botnet Takes Advantage of 2018 Vulnerability in Asus Routers</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/microsoft-announces-plans-to-make-ai-safe-for-work-in-your-browser/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-22T22:34:10+00:00</news:publication_date><news:title>Microsoft announces plans to make AI safe for work in your browser</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/googles-exploit-code-release-raises-concerns-about-unpatched-chromium-security-vulnerability/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-22T22:14:20+00:00</news:publication_date><news:title>Google&#8217;s Exploit Code Release Raises Concerns About Unpatched Chromium Security Vulnerability</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/the-governance-issues-confronting-openai/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-22T21:27:35+00:00</news:publication_date><news:title>The Governance Issues Confronting OpenAI</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/police-shut-down-vpn-service-for-compelling-reasons/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-22T20:13:04+00:00</news:publication_date><news:title>Police shut down VPN service for compelling reasons</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/fbi-issues-warning-about-kali-oauth-stealers/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-22T20:03:13+00:00</news:publication_date><news:title>FBI Issues Warning About Kali OAuth Stealers</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/23-year-old-canadian-charged-in-kimwolf-botnet-operation/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-22T19:06:21+00:00</news:publication_date><news:title>23-Year-Old Canadian Charged in KimWolf Botnet Operation</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
</urlset>
