<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/wp-content/plugins/xml-sitemap-feed/assets/sitemap-news.xsl?ver=5.4.9"?>
<!-- generated-on="2026-04-30T16:25:58+00:00" -->
<!-- generator="XML Sitemap & Google News for WordPress" -->
<!-- generator-url="https://status301.net/wordpress-plugins/xml-sitemap-feed/" -->
<!-- generator-version="5.4.9" -->
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" >
<url><loc>https://cybersecurity-see.com/linux-copy-fail-flaw-grants-root-level-access-to-distros/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-30T15:57:43+00:00</news:publication_date><news:title>Linux Copy Fail Flaw Grants Root-Level Access to Distros</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/poc-released-for-critical-root-rce-vulnerability-in-asustor-adm/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-30T15:42:15+00:00</news:publication_date><news:title>PoC Released for Critical Root RCE Vulnerability in ASUSTOR ADM</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cisa-and-partners-release-zero-trust-guidance-for-ot-security/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-30T14:19:49+00:00</news:publication_date><news:title>CISA and Partners Release Zero Trust Guidance for OT Security</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cisa-urges-critical-infrastructure-operators-to-dismantle-implicit-trust-in-ot-networks/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-30T13:41:32+00:00</news:publication_date><news:title>CISA Urges Critical Infrastructure Operators to Dismantle Implicit Trust in OT Networks</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/live-webinar-safeguarding-the-hybrid-attack-surface-from-ai-enabled-adversaries/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-30T13:36:31+00:00</news:publication_date><news:title>Live Webinar: Safeguarding the Hybrid Attack Surface from AI-Enabled Adversaries</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/max-severity-rce-flaw-discovered-in-google-gemini-cli/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-30T11:49:13+00:00</news:publication_date><news:title>Max Severity RCE Flaw Discovered in Google Gemini CLI</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/top-ai-security-tools-for-exposure-assessment-in-2026/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-30T11:40:16+00:00</news:publication_date><news:title>Top AI Security Tools for Exposure Assessment in 2026</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/live-webinar-protecting-ot-systems-after-windows-10-end-of-support/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-30T11:15:29+00:00</news:publication_date><news:title>Live Webinar: Protecting OT Systems After Windows 10 End of Support</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/malwarebytes-partners-with-claude-for-scam-detection/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-30T09:39:28+00:00</news:publication_date><news:title>Malwarebytes Partners with Claude for Scam Detection</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cloud-hsm-for-regulated-industries-compliance-and-security/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-30T09:18:31+00:00</news:publication_date><news:title>Cloud HSM for Regulated Industries &#8211; Compliance and Security</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/us-fda-pilots-ai-technology-for-real-time-clinical-trials/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-30T08:54:03+00:00</news:publication_date><news:title>US FDA Pilots AI Technology for Real-Time Clinical Trials</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/compromised-sap-npm-packages-discovered-collecting-developer-and-ci-cd-secrets/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-30T07:38:30+00:00</news:publication_date><news:title>Compromised SAP npm Packages Discovered Collecting Developer and CI/CD Secrets</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cisa-includes-actively-exploited-connectwise-and-windows-vulnerabilities-in-kev/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-30T06:33:12+00:00</news:publication_date><news:title>CISA Includes Actively Exploited ConnectWise and Windows Vulnerabilities in KEV</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/meta-faces-violations-of-eu-dsa-regulations/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-30T05:37:38+00:00</news:publication_date><news:title>Meta Faces Violations of EU DSA Regulations</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/openais-founding-promise-undergoes-judicial-examination/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-30T04:12:37+00:00</news:publication_date><news:title>OpenAI&#8217;s Founding Promise Undergoes Judicial Examination</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cursor-ai-coding-agent-vulnerability-allows-attackers-to-execute-code-on-developers-machines/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-30T03:36:10+00:00</news:publication_date><news:title>Cursor AI Coding Agent Vulnerability Allows Attackers to Execute Code on Developers&#8217; Machines</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/fbi-backed-operation-targets-crypto-scam-centers/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-30T01:51:41+00:00</news:publication_date><news:title>FBI-Backed Operation Targets Crypto Scam Centers</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/researchers-discover-industrial-sabotage-malware-that-predates-stuxnet-by-five-years/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-30T01:35:09+00:00</news:publication_date><news:title>Researchers discover industrial sabotage malware that predates Stuxnet by five years</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/most-common-authentication-methods/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T23:34:08+00:00</news:publication_date><news:title>Most Common Authentication Methods</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/silverfort-acquires-fabrix-to-enhance-access-decisions-with-ai/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T23:30:33+00:00</news:publication_date><news:title>Silverfort Acquires Fabrix to Enhance Access Decisions with AI</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/critical-flaw-transforms-vect-ransomware-into-a-data-destructive-wiper/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T23:14:24+00:00</news:publication_date><news:title>Critical Flaw Transforms Vect Ransomware into a Data-Destructive Wiper</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/canada-proposes-ban-on-crypto-atms/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T21:33:09+00:00</news:publication_date><news:title>Canada Proposes Ban on Crypto ATMs</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/researchers-identify-2-9-billion-compromised-credentials/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T20:43:22+00:00</news:publication_date><news:title>Researchers Identify 2.9 Billion Compromised Credentials</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cursor-ai-extension-vulnerability-exposes-developer-tokens-to-credential-theft/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T19:31:49+00:00</news:publication_date><news:title>Cursor AI Extension Vulnerability Exposes Developer Tokens to Credential Theft</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/europe-moves-towards-mandatory-online-age-verification/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T18:48:34+00:00</news:publication_date><news:title>Europe Moves Towards Mandatory Online Age Verification</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/malicious-npm-dependency-associated-with-ai-driven-commit-targets-in-cryptocurrency/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T18:12:18+00:00</news:publication_date><news:title>Malicious npm Dependency Associated with AI-Driven Commit Targets in Cryptocurrency</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cyber-briefing-april-29-2026-cybermaterial/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T17:31:21+00:00</news:publication_date><news:title>Cyber Briefing &#8211; April 29, 2026 &#8211; CyberMaterial</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/appsec-is-dead-long-live-ai-security/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T16:27:19+00:00</news:publication_date><news:title>AppSec Is Dead: Long Live AI Security</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cursor-extension-flaw-exposes-developer-api-keys/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T15:41:18+00:00</news:publication_date><news:title>Cursor Extension Flaw Exposes Developer API Keys</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/lazarus-targets-macos-users-with-new-mach-o-man-malware-kit/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T15:30:51+00:00</news:publication_date><news:title>Lazarus Targets macOS Users with New Mach-O Man Malware Kit</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/the-new-rules-of-war-lack-rules/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T14:06:32+00:00</news:publication_date><news:title>The New Rules of War Lack Rules</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/pentagon-initiates-cyber-apprenticeship-program/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T13:29:32+00:00</news:publication_date><news:title>Pentagon Initiates Cyber Apprenticeship Program</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/critical-github-rce-vulnerability-exposes-millions-of-repositories/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T13:10:26+00:00</news:publication_date><news:title>Critical GitHub RCE Vulnerability Exposes Millions of Repositories</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/u-s-charges-suspected-scattered-spider-member-in-cyber-intrusions/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T11:28:06+00:00</news:publication_date><news:title>U.S. Charges Suspected Scattered Spider Member in Cyber Intrusions</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/a-quarter-of-healthcare-organizations-report-attacks-on-medical-devices/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T10:39:12+00:00</news:publication_date><news:title>A Quarter of Healthcare Organizations Report Attacks on Medical Devices</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/aws-relies-on-past-innovations-to-address-future-ai-and-quantum-challenges/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T09:27:17+00:00</news:publication_date><news:title>AWS Relies on Past Innovations to Address Future AI and Quantum Challenges</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/webinar-governing-ai-at-scale-for-trust-control-and-confidence-in-banking/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T09:24:23+00:00</news:publication_date><news:title>Webinar: Governing AI at Scale for Trust, Control, and Confidence in Banking</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/u-s-companies-encounter-historic-privacy-fines-in-2025/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T07:26:07+00:00</news:publication_date><news:title>U.S. Companies Encounter Historic Privacy Fines in 2025</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/google-invests-up-to-40b-in-anthropic-as-ai-compute-competition-intensifies/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T07:03:27+00:00</news:publication_date><news:title>Google Invests Up to $40B in Anthropic as AI Compute Competition Intensifies</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/north-korean-hackers-target-crypto-firms-using-clickfix-and-zoom-tactics/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T05:37:17+00:00</news:publication_date><news:title>North Korean Hackers Target Crypto Firms Using ClickFix and Zoom Tactics</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/bluenoroff-launches-fileless-powershell-attack-in-ai-driven-zoom-phishing-campaign/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T05:25:17+00:00</news:publication_date><news:title>BlueNoroff Launches Fileless PowerShell Attack in AI-Driven Zoom Phishing Campaign</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/vect-2-0-ransomware-permanently-destroys-files-larger-than-131kb-on-windows-linux-and-esxi/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T04:42:10+00:00</news:publication_date><news:title>VECT 2.0 Ransomware Permanently Destroys Files Larger than 131KB on Windows, Linux, and ESXi</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cybersecurity-professionals-feel-underappreciated/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T03:24:10+00:00</news:publication_date><news:title>Cybersecurity Professionals Feel Underappreciated</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/more-fraudulent-extensions-associated-with-glassworm-discovered-in-open-vsx-code-marketplace/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T03:06:12+00:00</news:publication_date><news:title>More Fraudulent Extensions Associated with GlassWorm Discovered in Open VSX Code Marketplace</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/ai-governance-transitions-from-theory-to-practice/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T02:21:31+00:00</news:publication_date><news:title>AI Governance Transitions from Theory to Practice</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/silk-typhoon-hacker-extradited-from-italy-to-the-u-s/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T01:23:14+00:00</news:publication_date><news:title>Silk Typhoon Hacker Extradited from Italy to the U.S.</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/chinese-national-extradited-in-connection-with-silk-typhoon-cyber-campaign/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T00:35:22+00:00</news:publication_date><news:title>Chinese National Extradited in Connection with Silk Typhoon Cyber Campaign</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/ot-cybersecurity-excluded-by-frontier-labs/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T00:00:35+00:00</news:publication_date><news:title>OT Cybersecurity Excluded by Frontier Labs</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/stopping-aitm-attacks-effective-defenses-after-authentication-success/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-28T23:22:21+00:00</news:publication_date><news:title>Stopping AiTM Attacks: Effective Defenses After Authentication Success</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/ransomware-turf-war-0apt-and-krybit-groups-clash/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-28T22:04:30+00:00</news:publication_date><news:title>Ransomware Turf War: 0APT and KryBit Groups Clash</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/germany-involved-in-potential-russian-signal-phishing-attack/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-28T21:38:52+00:00</news:publication_date><news:title>Germany Involved in Potential Russian Signal Phishing Attack</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/shadow-code-a-hidden-threat-to-enterprise-it/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-28T21:21:14+00:00</news:publication_date><news:title>Shadow Code: A Hidden Threat to Enterprise IT</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/what-cisos-must-get-right-as-identity-enters-the-agentic-era/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-28T19:33:34+00:00</news:publication_date><news:title>What CISOs Must Get Right as Identity Enters the Agentic Era</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/dora-and-the-practical-assessment-of-operational-resilience/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-28T19:20:35+00:00</news:publication_date><news:title>DORA and the Practical Assessment of Operational Resilience</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/ai-agent-deletes-startup-data-in-just-9-seconds-via-api-call/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-28T19:18:33+00:00</news:publication_date><news:title>AI Agent Deletes Startup Data in Just 9 Seconds via API Call</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cyber-briefing-april-28-2026-cybermaterial/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-28T17:19:12+00:00</news:publication_date><news:title>Cyber Briefing &#8211; April 28, 2026: CyberMaterial</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/medtronic-acknowledges-data-breach-following-shinyhunters-allegations/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-28T17:02:13+00:00</news:publication_date><news:title>Medtronic Acknowledges Data Breach Following ShinyHunters Allegations</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/the-next-wave-of-identity-risk-securing-non-human-identities-in-an-ai-driven-world-webinar/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-28T16:57:29+00:00</news:publication_date><news:title>The Next Wave of Identity Risk: Securing Non-Human Identities in an AI-Driven World Webinar</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
</urlset>
