<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/wp-content/plugins/xml-sitemap-feed/assets/sitemap-news.xsl?ver=5.4.9"?>
<!-- generated-on="2026-05-13T11:32:11+00:00" -->
<!-- generator="XML Sitemap & Google News for WordPress" -->
<!-- generator-url="https://status301.net/wordpress-plugins/xml-sitemap-feed/" -->
<!-- generator-version="5.4.9" -->
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" >
<url><loc>https://cybersecurity-see.com/sure-please-provide-the-title-youd-like-to-rewrite/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-13T11:15:13+00:00</news:publication_date><news:title>Sure! Please provide the title you&#8217;d like to rewrite.</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/2026-cso-award-winners-highlight-business-enabling-cyber-innovation/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-13T10:16:33+00:00</news:publication_date><news:title>2026 CSO Award Winners Highlight Business-Enabling Cyber Innovation</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/ai-supply-chain-attacks-are-rising-discover-how-encryption-and-key-management-can-prevent-them/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-13T09:32:20+00:00</news:publication_date><news:title>AI Supply Chain Attacks are Rising – Discover How Encryption and Key Management Can Prevent Them</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/what-security-teams-are-overlooking-about-ai-enabled-threats-webinar-2/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-13T09:28:11+00:00</news:publication_date><news:title>What Security Teams Are Overlooking About AI-Enabled Threats Webinar</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/proofpoint-launches-dedicated-msp-business-unit-and-introduces-365-total-protection-for-north-america/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-13T09:07:30+00:00</news:publication_date><news:title>Proofpoint Launches Dedicated MSP Business Unit and Introduces 365 Total Protection for North America</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/california-reaches-12-75-million-settlement-with-gm-over-ccpa-case/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-13T08:15:15+00:00</news:publication_date><news:title>California Reaches $12.75 Million Settlement with GM Over CCPA Case</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/the-evolution-of-cyber-risk-and-addressing-geopolitical-threats/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-13T07:07:24+00:00</news:publication_date><news:title>The Evolution of Cyber Risk and Addressing Geopolitical Threats</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/attackers-integrate-clickfix-and-pysoxy-for-ongoing-persistence/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-13T07:00:19+00:00</news:publication_date><news:title>Attackers Integrate ClickFix and PySoxy for Ongoing Persistence</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/fake-finalshell-and-xshell-sites-distribute-kong-rat-malware/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-13T06:14:23+00:00</news:publication_date><news:title>Fake FinalShell and Xshell Sites Distribute Kong RAT Malware</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/instructure-reaches-ransom-agreement-with-shinyhunters-to-halt-3-65tb-canvas-data-leak/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-13T04:45:52+00:00</news:publication_date><news:title>Instructure Reaches Ransom Agreement with ShinyHunters to Halt 3.65TB Canvas Data Leak</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/apple-introduces-end-to-end-encryption-for-rcs-on-iphone-and-android/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-13T04:29:10+00:00</news:publication_date><news:title>Apple Introduces End-to-End Encryption for RCS on iPhone and Android</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cisos-embrace-the-ai-spotlight/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-13T04:13:26+00:00</news:publication_date><news:title>CISOs Embrace the AI Spotlight</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/how-ai-liability-risks-are-challenging-cyber-insurance/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-13T02:25:20+00:00</news:publication_date><news:title>How AI Liability Risks Are Challenging Cyber Insurance</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/threat-actors-exploit-vercel-ai-tools-to-generate-realistic-phishing-sites-at-scale/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-13T02:12:13+00:00</news:publication_date><news:title>Threat Actors Exploit Vercel AI Tools to Generate Realistic Phishing Sites at Scale</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/may-patch-tuesday-roundup-critical-vulnerabilities-in-windows-netlogon-dns-and-sap-s-4hana/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-13T01:57:03+00:00</news:publication_date><news:title>May Patch Tuesday Roundup: Critical Vulnerabilities in Windows Netlogon, DNS, and SAP S/4HANA</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cpanel-vulnerability-poses-hosting-supply-chain-risks-to-enterprises/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-13T00:11:11+00:00</news:publication_date><news:title>cPanel Vulnerability Poses Hosting Supply-Chain Risks to Enterprises</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/linux-defenders-confront-patch-and-exploit-race/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-13T00:04:24+00:00</news:publication_date><news:title>Linux Defenders Confront Patch and Exploit Race</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/mini-shai-hulud-launches-tanstack-npm-packages/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-12T23:26:14+00:00</news:publication_date><news:title>Mini Shai-Hulud Launches TanStack npm Packages</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/huntress-and-acrisure-partner-to-provide-zero-deductible-cyber-insurance-for-smbs/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-12T22:10:09+00:00</news:publication_date><news:title>Huntress and Acrisure Partner to Provide Zero-Deductible Cyber Insurance for SMBs</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/us-fcc-allows-consumer-routers-to-receive-updates-until-2028/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-12T21:43:42+00:00</news:publication_date><news:title>US FCC Allows Consumer Routers to Receive Updates Until 2028</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/mistral-ai-sdk-and-tanstack-router-targeted-in-npm-software-supply-chain-attack/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-12T20:55:17+00:00</news:publication_date><news:title>Mistral AI SDK and TanStack Router Targeted in NPM Software Supply Chain Attack</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cyber-briefing-for-may-12-2026-cybermaterial/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-12T20:09:24+00:00</news:publication_date><news:title>Cyber Briefing for May 12, 2026 &#8211; CyberMaterial</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/openai-launches-cybersecurity-model-for-europe/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-12T19:22:25+00:00</news:publication_date><news:title>OpenAI Launches Cybersecurity Model for Europe</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/building-a-dpdp-compliant-ai-data-architecture/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-12T18:24:13+00:00</news:publication_date><news:title>Building a DPDP-Compliant AI Data Architecture</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/zoom-rooms-and-workplace-vulnerabilities-increase-risk-of-elevated-access-attacks/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-12T18:08:10+00:00</news:publication_date><news:title>Zoom Rooms and Workplace Vulnerabilities Increase Risk of Elevated Access Attacks</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/the-threat-window-is-shrinking-while-the-response-gap-persists/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-12T17:01:23+00:00</news:publication_date><news:title>The Threat Window Is Shrinking While the Response Gap Persists</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/fake-claude-code-uncovers-browser-secrets-through-the-ielevator/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-12T16:07:28+00:00</news:publication_date><news:title>Fake Claude Code Uncovers Browser Secrets through the IElevator</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/openai-launches-daybreak-to-facilitate-the-development-of-secure-by-design-software/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-12T15:53:43+00:00</news:publication_date><news:title>OpenAI Launches Daybreak to Facilitate the Development of Secure By Design Software</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/why-hospitals-need-to-rethink-cyber-resilience/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-12T14:40:32+00:00</news:publication_date><news:title>Why Hospitals Need to Rethink Cyber Resilience</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/implementing-zero-trust-for-ai/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-12T14:06:37+00:00</news:publication_date><news:title>Implementing Zero Trust for AI</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/openai-launches-daybreak-cyber-platform-to-compete-with-anthropic-mythos/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-12T13:22:10+00:00</news:publication_date><news:title>OpenAI Launches Daybreak Cyber Platform to Compete with Anthropic Mythos</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/how-organizations-strengthen-defenses-against-scattered-spider/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-12T12:19:24+00:00</news:publication_date><news:title>How Organizations Strengthen Defenses Against Scattered Spider</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/worknest-introduces-worknest-secure-to-enhance-cybersecurity-and-compliance-services/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-12T12:05:14+00:00</news:publication_date><news:title>WorkNest Introduces WorkNest Secure to Enhance Cybersecurity and Compliance Services</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/malicious-typosquatting-in-hugging-face-repository-targets-openai/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-12T10:51:20+00:00</news:publication_date><news:title>Malicious Typosquatting in Hugging Face Repository Targets OpenAI</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/dirty-frag-linux-vulnerability-enables-root-access-across-major-distributions/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-12T10:30:54+00:00</news:publication_date><news:title>“Dirty Frag” Linux Vulnerability Enables Root Access Across Major Distributions</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/police-shut-down-relaunched-crimenetwork-dark-web-marketplace/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-12T10:04:41+00:00</news:publication_date><news:title>Police Shut Down Relaunched Crimenetwork Dark Web Marketplace</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/what-security-teams-are-overlooking-about-ai-enabled-threats-webinar/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-12T09:58:09+00:00</news:publication_date><news:title>What Security Teams Are Overlooking About AI-Enabled Threats Webinar</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/ai-security-repeats-endpoint-securitys-biggest-mistake/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-12T08:20:03+00:00</news:publication_date><news:title>AI Security Repeats Endpoint Security&#8217;s Biggest Mistake</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/openai-daybreak-automates-vulnerability-detection-and-patching/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-12T08:03:13+00:00</news:publication_date><news:title>OpenAI Daybreak Automates Vulnerability Detection and Patching</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/canvas-cyberattack-disrupts-universities-as-shinyhunters-threatens-major-data-leak/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-12T07:37:16+00:00</news:publication_date><news:title>Canvas Cyberattack Disrupts Universities as ShinyHunters Threatens Major Data Leak</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/linux-kernel-maintainers-propose-kill-switch-to-safeguard-systems-until-zero-day-vulnerability-is-patched/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-12T06:02:02+00:00</news:publication_date><news:title>Linux Kernel Maintainers Propose Kill Switch to Safeguard Systems Until Zero-Day Vulnerability is Patched</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/encryption-best-practices-for-enterprise-ai-systems/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-12T05:49:15+00:00</news:publication_date><news:title>Encryption Best Practices for Enterprise AI Systems</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cpanel-cve-2026-41940-actively-being-exploited-to-deploy-filemanager-backdoor/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-12T05:16:10+00:00</news:publication_date><news:title>cPanel CVE-2026-41940 Actively Being Exploited to Deploy Filemanager Backdoor</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/anthropic-and-south-korea-explore-ai-safety-collaboration/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-12T04:01:34+00:00</news:publication_date><news:title>Anthropic and South Korea Explore AI Safety Collaboration</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/fake-claude-code-page-promotes-powershell-stealer-to-developers/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-12T03:18:17+00:00</news:publication_date><news:title>Fake Claude Code Page Promotes PowerShell Stealer to Developers</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/hackers-infiltrated-major-uk-water-utility-for-almost-two-years/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-12T02:55:53+00:00</news:publication_date><news:title>Hackers Infiltrated Major UK Water Utility for Almost Two Years</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/fsnotify-maintainer-access-change-raises-concerns-about-supply-chain-security/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-12T02:00:12+00:00</news:publication_date><news:title>Fsnotify Maintainer Access Change Raises Concerns About Supply Chain Security</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/new-dirty-frag-exploit-targets-linux-kernel-for-root-access/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-12T00:46:39+00:00</news:publication_date><news:title>New Dirty Frag Exploit Targets Linux Kernel for Root Access</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cloudflare-reduces-workforce-by-1100-arctic-wolf-cuts-250-jobs-amid-ai-growth/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-12T00:34:34+00:00</news:publication_date><news:title>Cloudflare Reduces Workforce by 1,100, Arctic Wolf Cuts 250 Jobs Amid AI Growth</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/malicious-hugging-face-model-masquerading-as-openai-release-reaches-244k-downloads/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-11T23:59:13+00:00</news:publication_date><news:title>Malicious Hugging Face Model Masquerading as OpenAI Release Reaches 244K Downloads</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/rushed-patches-after-breach-of-linux-kernel-vulnerability-embargo/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-11T22:15:12+00:00</news:publication_date><news:title>Rushed Patches After Breach of Linux Kernel Vulnerability Embargo</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/gentlemen-ransomware-group-experiences-data-leak/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-11T22:14:01+00:00</news:publication_date><news:title>Gentlemen Ransomware Group Experiences Data Leak</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/data-after-the-breach-the-economics-of-the-dark-web/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-11T21:58:45+00:00</news:publication_date><news:title>Data After the Breach: The Economics of the Dark Web</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cyber-briefing-may-11-2026-cybermaterial/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-11T19:57:49+00:00</news:publication_date><news:title>Cyber Briefing &#8211; May 11, 2026 &#8211; CyberMaterial</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/ai-researchers-address-siem-migration-challenges/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-11T19:52:28+00:00</news:publication_date><news:title>AI Researchers Address SIEM Migration Challenges</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/entries-now-open-for-the-2026-cso30-australia-awards/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-11T19:44:23+00:00</news:publication_date><news:title>Entries Now Open for the 2026 CSO30 Australia Awards</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/lyrie-ai-joins-anthropic-cyber-verification-program/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-11T17:56:25+00:00</news:publication_date><news:title>Lyrie.ai Joins Anthropic Cyber Verification Program</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cops-shut-down-rebooted-german-language-cybercrime-market/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-11T17:31:11+00:00</news:publication_date><news:title>Cops Shut Down Rebooted German Language Cybercrime Market</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/trickmo-variant-diverts-android-trojan-traffic-via-ton/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-11T17:13:11+00:00</news:publication_date><news:title>TrickMo Variant Diverts Android Trojan Traffic via TON</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/google-uncovers-ai-generated-weaponized-zero-day-exploits/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-11T15:55:07+00:00</news:publication_date><news:title>Google Uncovers AI-Generated Weaponized Zero-Day Exploits</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/online-safety-act-failing-to-achieve-significant-progress-for-children/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-11T15:10:26+00:00</news:publication_date><news:title>Online Safety Act Failing to Achieve Significant Progress for Children</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/lyrie-ai-joins-the-initial-group-of-anthropics-cyber-verification-program/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-11T14:42:45+00:00</news:publication_date><news:title>Lyrie.ai Joins the Initial Group of Anthropic’s Cyber Verification Program</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/arkansas-state-introduces-cybersecurity-training-center/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-11T13:54:08+00:00</news:publication_date><news:title>Arkansas State Introduces Cybersecurity Training Center</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/zara-owner-inditex-confirms-data-breach-impacting-almost-200000-customers/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-11T12:49:26+00:00</news:publication_date><news:title>Zara Owner Inditex Confirms Data Breach Impacting Almost 200,000 Customers</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/fcc-eases-ban-on-foreign-made-routers-to-facilitate-security-updates/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-11T12:11:17+00:00</news:publication_date><news:title>FCC Eases Ban on Foreign-Made Routers to Facilitate Security Updates</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/fake-claude-campaign-employs-plugx-style-dll-sideloading-chain/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-11T11:52:54+00:00</news:publication_date><news:title>Fake Claude Campaign Employs PlugX-Style DLL Sideloading Chain</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
</urlset>
