<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/wp-content/plugins/xml-sitemap-feed/assets/sitemap-news.xsl?ver=5.4.9"?>
<!-- generated-on="2026-04-07T10:39:13+00:00" -->
<!-- generator="XML Sitemap & Google News for WordPress" -->
<!-- generator-url="https://status301.net/wordpress-plugins/xml-sitemap-feed/" -->
<!-- generator-version="5.4.9" -->
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" >
<url><loc>https://cybersecurity-see.com/fortinet-releases-emergency-patch-following-exploit-of-forticlient-ems-bug/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-07T10:00:16+00:00</news:publication_date><news:title>Fortinet Releases Emergency Patch Following Exploit of FortiClient EMS Bug</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/attackers-exploit-flowise-injection-vulnerability-with-over-15000-instances-still-exposed/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-07T08:59:28+00:00</news:publication_date><news:title>Attackers Exploit Flowise Injection Vulnerability with Over 15,000 Instances Still Exposed</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/qilin-and-warlock-ransomware-exploit-vulnerable-drivers-to-disable-over-300-edr-tools/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-07T08:30:33+00:00</news:publication_date><news:title>Qilin and Warlock Ransomware Exploit Vulnerable Drivers to Disable Over 300 EDR Tools</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/bka-identifies-leaders-of-revil-ransomware-group/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-07T06:58:12+00:00</news:publication_date><news:title>BKA Identifies Leaders of REvil Ransomware Group</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/why-secops-and-grc-continue-to-face-alignment-challenges-in-financial-services-webinar/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-07T06:09:24+00:00</news:publication_date><news:title>Why SecOps and GRC Continue to Face Alignment Challenges in Financial Services Webinar</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/drift-protocol-targeted-in-286-million-suspected-crypto-heist-linked-to-north-korea/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-07T04:57:23+00:00</news:publication_date><news:title>Drift Protocol Targeted in $286 Million Suspected Crypto Heist Linked to North Korea</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/bka-identifies-revil-leaders-responsible-for-130-ransomware-attacks-in-germany/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-07T03:48:29+00:00</news:publication_date><news:title>BKA Identifies REvil Leaders Responsible for 130 Ransomware Attacks in Germany</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/ny-school-data-incidents-increase-by-72/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-07T02:56:12+00:00</news:publication_date><news:title>NY School Data Incidents Increase by 72%</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/censys-secures-70m-to-enhance-ai-driven-threat-intelligence/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-07T01:27:52+00:00</news:publication_date><news:title>Censys Secures $70M to Enhance AI-Driven Threat Intelligence</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/google-introduces-lazy-loading-for-media-files-in-latest-chrome-update/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-07T00:53:10+00:00</news:publication_date><news:title>Google Introduces Lazy Loading for Media Files in Latest Chrome Update</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/trumps-budget-proposal-aims-to-cut-cisa-funding-following-challenging-year/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-06T23:06:35+00:00</news:publication_date><news:title>Trump&#8217;s Budget Proposal Aims to Cut CISA Funding Following Challenging Year</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/key-insights-on-red-team-testing-and-legal-considerations/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-06T22:52:19+00:00</news:publication_date><news:title>Key Insights on Red Team Testing and Legal Considerations</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/flubot-android-banking-malware/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-06T20:51:31+00:00</news:publication_date><news:title>FluBot Android Banking Malware</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/models-break-rules-to-save-their-peers/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-06T20:45:43+00:00</news:publication_date><news:title>Models Break Rules to Save Their Peers</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/trojanized-pypi-ai-proxy-steals-claude-prompts-and-exfiltrates-data/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-06T18:50:30+00:00</news:publication_date><news:title>Trojanized PyPI AI Proxy Steals Claude Prompts and Exfiltrates Data</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/attackers-exploit-zero-day-vulnerability-in-fortinet-security-software/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-06T18:24:46+00:00</news:publication_date><news:title>Attackers Exploit Zero-Day Vulnerability in Fortinet Security Software</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/meaningful-metrics-show-the-value-of-cyber-resiliency/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-06T16:49:22+00:00</news:publication_date><news:title>Meaningful Metrics Show the Value of Cyber-Resiliency</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/escaping-the-cots-trap-cso-online/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-06T16:20:24+00:00</news:publication_date><news:title>Escaping the COTS Trap &#8211; CSO Online</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cyber-briefing-2026-04-06-cybermaterial/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-06T14:48:15+00:00</news:publication_date><news:title>Cyber Briefing &#8211; 2026.04.06 &#8211; CyberMaterial</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/north-korean-hackers-exploit-lnks-and-github-repositories-in-ongoing-campaign/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-06T13:49:33+00:00</news:publication_date><news:title>North Korean Hackers Exploit LNKs and GitHub Repositories in Ongoing Campaign</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/github-backed-malware-distribution-through-lnk-files-in-south-korea/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-06T12:47:19+00:00</news:publication_date><news:title>GitHub-Backed Malware Distribution through LNK Files in South Korea</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/six-methods-attackers-exploit-ai-services-to-compromise-your-business/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-06T11:17:27+00:00</news:publication_date><news:title>Six Methods Attackers Exploit AI Services to Compromise Your Business</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/authentication-is-broken-how-security-leaders-can-effectively-address-it/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-06T10:46:43+00:00</news:publication_date><news:title>Authentication is Broken: How Security Leaders Can Effectively Address It</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/apache-traffic-server-vulnerability-enabled-denial-of-service-attacks/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-06T08:45:11+00:00</news:publication_date><news:title>Apache Traffic Server Vulnerability Enabled Denial-of-Service Attacks</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/threat-actors-exploit-fake-microsoft-teams-domains-to-target-users/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-06T06:44:31+00:00</news:publication_date><news:title>Threat Actors Exploit Fake Microsoft Teams Domains to Target Users</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/casbaneiro-phishing-campaign-targets-europe-cybermaterial/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-05T22:41:29+00:00</news:publication_date><news:title>Casbaneiro Phishing Campaign Targets Europe &#8211; CyberMaterial</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/chrome-zero-day-cve-exploited/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-05T20:40:24+00:00</news:publication_date><news:title>Chrome Zero Day CVE Exploited</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/vertex-ai-vulnerability-exposes-cloud-data/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-05T18:39:19+00:00</news:publication_date><news:title>Vertex AI Vulnerability Exposes Cloud Data</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cyberattack-disrupts-phone-services-in-massachusetts-towns/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-05T16:38:13+00:00</news:publication_date><news:title>Cyberattack Disrupts Phone Services in Massachusetts Towns</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/mercor-suffers-cyberattack-impacting-supply-chain/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-05T14:37:10+00:00</news:publication_date><news:title>Mercor Suffers Cyberattack Impacting Supply Chain</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/ask-me-anything-cyber-cybermaterial-5/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-05T12:36:09+00:00</news:publication_date><news:title>Ask Me Anything Cyber &#8211; CyberMaterial</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
</urlset>
