<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/wp-content/plugins/xml-sitemap-feed/assets/sitemap-news.xsl?ver=5.4.9"?>
<!-- generated-on="2026-04-25T13:08:00+00:00" -->
<!-- generator="XML Sitemap & Google News for WordPress" -->
<!-- generator-url="https://status301.net/wordpress-plugins/xml-sitemap-feed/" -->
<!-- generator-version="5.4.9" -->
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" >
<url><loc>https://cybersecurity-see.com/chinese-cyber-espionage-through-compromised-devices/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-25T12:41:12+00:00</news:publication_date><news:title>Chinese Cyber Espionage Through Compromised Devices</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/fake-captcha-scam-sparks-expensive-sms-fraud/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-25T10:40:17+00:00</news:publication_date><news:title>Fake CAPTCHA Scam Sparks Expensive SMS Fraud</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/french-police-arrest-hexdex-hacker/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-25T08:39:08+00:00</news:publication_date><news:title>French Police Arrest HexDex Hacker</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/uk-confronts-a-cyber-perfect-storm/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-25T08:30:27+00:00</news:publication_date><news:title>UK Confronts a Cyber Perfect Storm</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cisa-investigates-cisco-backdoor-found-on-federal-network/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-25T06:39:29+00:00</news:publication_date><news:title>CISA Investigates Cisco Backdoor Found on Federal Network</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/claude-desktop-reportedly-introduces-browser-access-bridge-for-chromium-browsers/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-25T06:38:20+00:00</news:publication_date><news:title>Claude Desktop Reportedly Introduces Browser Access Bridge for Chromium Browsers</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/researchers-discover-proxysmart-software-driving-over-90-sim-farms/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-25T05:59:13+00:00</news:publication_date><news:title>Researchers Discover ProxySmart Software Driving Over 90 SIM Farms</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/top-5-siem-use-cases-in-the-enterprise/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-25T04:37:10+00:00</news:publication_date><news:title>Top 5 SIEM Use Cases in the Enterprise</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/unc6692-impersonates-it-help-desk-on-microsoft-teams-to-distribute-snow-malware/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-25T04:18:36+00:00</news:publication_date><news:title>UNC6692 Impersonates IT Help Desk on Microsoft Teams to Distribute SNOW Malware</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/surge-in-silent-subject-phishing-campaigns-targeting-vip-users/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-25T03:28:08+00:00</news:publication_date><news:title>Surge in Silent Subject Phishing Campaigns Targeting VIP Users</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/job-reductions-at-meta-and-microsoft/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-25T02:36:13+00:00</news:publication_date><news:title>Job Reductions at Meta and Microsoft</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/poor-risk-analysis-costs-four-firms-1-7-million-in-hipaa-fines/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-25T01:57:23+00:00</news:publication_date><news:title>Poor Risk Analysis Costs Four Firms $1.7 Million in HIPAA Fines</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/clear-market-trend-for-software-providers-assisting-with-ai-says-proofpoint-ceo/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-25T01:39:05+00:00</news:publication_date><news:title>Clear Market Trend for Software Providers Assisting with AI, Says Proofpoint CEO</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cisa-takes-final-spot-for-access-to-anthropic-mythos/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-25T00:57:09+00:00</news:publication_date><news:title>CISA Takes Final Spot for Access to Anthropic Mythos</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/gpt-5-5-bio-bug-bounty-program-aims-to-enhance-ai-safety-and-performance/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-25T00:35:09+00:00</news:publication_date><news:title>GPT-5.5 Bio Bug Bounty Program Aims to Enhance AI Safety and Performance</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/tekstream-aims-for-proactive-security-through-acquisition-of-imaginex-cyber/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-24T23:36:49+00:00</news:publication_date><news:title>TekStream Aims for Proactive Security Through Acquisition of ImagineX Cyber</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/new-us-house-privacy-bills-present-tough-challenges-for-enterprise-data-collection/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-24T22:34:21+00:00</news:publication_date><news:title>New US House Privacy Bills Present Tough Challenges for Enterprise Data Collection</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/ncsc-supports-passkeys-signaling-a-new-era-of-sign-in/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-24T22:26:08+00:00</news:publication_date><news:title>NCSC Supports Passkeys, Signaling a New Era of Sign-in</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/white-house-issues-warning-on-ai-model-extraction-campaigns/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-24T21:15:44+00:00</news:publication_date><news:title>White House Issues Warning on AI Model Extraction Campaigns</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/ncsc-chief-warns-of-perfect-storm-as-cyber-threats-intensify-at-cyberuk/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-24T20:33:24+00:00</news:publication_date><news:title>NCSC Chief Warns of Perfect Storm as Cyber Threats Intensify at CyberUK</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/scattered-spider-co-conspirator-pleads-guilty/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-24T19:55:11+00:00</news:publication_date><news:title>Scattered Spider Co-Conspirator Pleads Guilty</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/surge-of-supply-chain-software-library-attacks/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-24T18:54:34+00:00</news:publication_date><news:title>Surge of Supply-Chain Software Library Attacks</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cyber-briefing-for-april-24-2026-cybermaterial/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-24T18:32:15+00:00</news:publication_date><news:title>Cyber Briefing for April 24, 2026 &#8211; CyberMaterial</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/npm-supply-chain-attack-employs-worm-like-propagation/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-24T17:24:21+00:00</news:publication_date><news:title>NPM Supply Chain Attack Employs Worm-Like Propagation</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/what-the-ai-mirror-reveals-about-our-thinking/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-24T16:33:30+00:00</news:publication_date><news:title>What the AI Mirror Reveals About Our Thinking</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/hackers-take-advantage-of-agent-id-administrator-role-to-hijack-service-principals/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-24T16:31:14+00:00</news:publication_date><news:title>Hackers Take Advantage of Agent ID Administrator Role to Hijack Service Principals</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/uk-biobank-data-breach-health-information-of-500000-available-for-sale-in-china/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-24T14:53:13+00:00</news:publication_date><news:title>UK Biobank Data Breach: Health Information of 500,000 Available for Sale in China</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/news-brief-ongoing-ai-challenges-for-security-leaders/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-24T14:30:15+00:00</news:publication_date><news:title>News Brief: Ongoing AI Challenges for Security Leaders</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/sase-outlook-2026-and-beyond-top-5-predictions-and-trends-webinar/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-24T14:12:31+00:00</news:publication_date><news:title>SASE Outlook 2026 and Beyond: Top 5 Predictions and Trends Webinar</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/apple-addresses-security-vulnerability-in-signal-app/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-24T12:29:13+00:00</news:publication_date><news:title>Apple addresses security vulnerability in Signal app</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/ai-rush-revives-past-cybersecurity-mistakes-warns-mandiant-vp/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-24T12:22:11+00:00</news:publication_date><news:title>AI Rush Revives Past Cybersecurity Mistakes, Warns Mandiant VP</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/myth-or-mythos-the-illusion-of-advantage-in-the-ai-cybersecurity-race/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-24T11:51:31+00:00</news:publication_date><news:title>Myth or Mythos: The Illusion of Advantage in the AI Cybersecurity Race</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/hackers-use-pastebin-powershell-script-to-hijack-telegram-sessions/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-24T10:28:34+00:00</news:publication_date><news:title>Hackers Use Pastebin PowerShell Script to Hijack Telegram Sessions</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/google-drafts-ai-agents-enhance-security-against-ai-hackers/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-24T09:51:12+00:00</news:publication_date><news:title>Google Drafts AI Agents Enhance Security Against AI Hackers</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/unc6692-impersonates-it-helpdesk-on-microsoft-teams-to-deploy-snow-malware/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-24T09:29:40+00:00</news:publication_date><news:title>UNC6692 Impersonates IT Helpdesk on Microsoft Teams to Deploy SNOW Malware</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/hackers-pose-as-it-helpdesk-on-microsoft-teams-to-deploy-custom-snow-malware/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-24T08:37:50+00:00</news:publication_date><news:title>Hackers Pose as IT Helpdesk on Microsoft Teams to Deploy Custom SNOW Malware</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/deepfake-era-requires-proof-based-security-over-mere-awareness/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-24T08:27:10+00:00</news:publication_date><news:title>Deepfake Era Requires Proof-Based Security Over Mere Awareness</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/researchers-discover-10-real-world-indirect-prompt-injection-attacks/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-24T07:20:08+00:00</news:publication_date><news:title>Researchers Discover 10 Real-World Indirect Prompt Injection Attacks</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/doctor-lobby-urges-congress-to-implement-safeguards-for-ai-chatbots/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-24T07:08:28+00:00</news:publication_date><news:title>Doctor Lobby Urges Congress to Implement Safeguards for AI Chatbots</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/uk-court-supports-facial-recognition-policy/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-24T06:26:04+00:00</news:publication_date><news:title>UK Court Supports Facial Recognition Policy</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/the-intriguing-situation-surrounding-sean-plankeys-derailed-cisa-nomination/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-24T04:49:21+00:00</news:publication_date><news:title>The Intriguing Situation Surrounding Sean Plankey’s Derailed CISA Nomination</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/threatsday-bulletin-290m-defi-hack-macos-lotl-abuse-proxysmart-sim-farms-and-25-new-stories/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-24T04:47:35+00:00</news:publication_date><news:title>ThreatsDay Bulletin: $290M DeFi Hack, macOS LotL Abuse, ProxySmart SIM Farms, and 25 New Stories</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/outlook-mailboxes-misused-to-hide-linux-gogra-backdoor-traffic/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-24T04:25:20+00:00</news:publication_date><news:title>Outlook Mailboxes Misused to Hide Linux GoGra Backdoor Traffic</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cloudsmith-secures-72-million-for-software-supply-chain-security/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-24T02:26:35+00:00</news:publication_date><news:title>Cloudsmith Secures $72 Million for Software Supply Chain Security</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/three-practical-ways-ai-threat-detection-enhances-enterprise-cyber-resilience/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-24T02:24:22+00:00</news:publication_date><news:title>Three Practical Ways AI Threat Detection Enhances Enterprise Cyber Resilience</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/google-unveils-distinct-ai-agent-identities-in-latest-gemini-enterprise-update/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-24T02:18:14+00:00</news:publication_date><news:title>Google Unveils Distinct AI Agent Identities in Latest Gemini Enterprise Update</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/is-soar-alive-or-dead-kind-of/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-24T00:23:09+00:00</news:publication_date><news:title>Is SOAR Alive or Dead? Kind Of</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/myanmar-scam-compound-managers-face-charges/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-24T00:05:47+00:00</news:publication_date><news:title>Myanmar Scam Compound Managers Face Charges</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/bitwarden-cli-password-manager-compromised-in-supply-chain-attack/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-23T23:47:07+00:00</news:publication_date><news:title>Bitwarden CLI Password Manager Compromised in Supply Chain Attack</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cybersecurity-program-expands-at-ewu/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-23T22:22:09+00:00</news:publication_date><news:title>Cybersecurity Program Expands at EWU</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/germany-makes-another-attempt-at-isp-data-retention-mandate/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-23T21:45:04+00:00</news:publication_date><news:title>Germany Makes Another Attempt at ISP Data Retention Mandate</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/google-prefers-general-purpose-gemini-models-over-cybersecurity-specific-solutions/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-23T21:16:06+00:00</news:publication_date><news:title>Google Prefers General-Purpose Gemini Models Over Cybersecurity-Specific Solutions</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/gitlab-addresses-vulnerabilities-that-could-enable-user-session-hijacking/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-23T20:21:08+00:00</news:publication_date><news:title>GitLab Addresses Vulnerabilities That Could Enable User Session Hijacking</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/trumps-leading-cyber-nominee-withdraws-following-turbulent-process/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-23T19:23:16+00:00</news:publication_date><news:title>Trump&#8217;s Leading Cyber Nominee Withdraws Following Turbulent Process</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/microsoft-partners-with-anthropics-mythos-to-enhance-secure-software-development/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-23T18:45:16+00:00</news:publication_date><news:title>Microsoft Partners with Anthropic’s Mythos to Enhance Secure Software Development</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/push-for-digital-sovereignty-essential-insights-for-cisos/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-23T18:20:17+00:00</news:publication_date><news:title>Push for Digital Sovereignty: Essential Insights for CISOs</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/how-integrated-gis-powers-the-next-generation-of-industrial-cyber-resilience/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-23T17:02:40+00:00</news:publication_date><news:title>How Integrated GIS Powers the Next Generation of Industrial Cyber Resilience</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cyber-briefing-april-23-2026-cybermaterial/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-23T16:19:10+00:00</news:publication_date><news:title>Cyber Briefing &#8211; April 23, 2026 &#8211; CyberMaterial</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/apple-resolves-ios-notification-issue-revealing-deleted-messages/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-23T16:13:22+00:00</news:publication_date><news:title>Apple Resolves iOS Notification Issue Revealing Deleted Messages</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cisco-considers-acquisition-of-non-human-identity-startup-astrix/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-23T14:41:11+00:00</news:publication_date><news:title>Cisco Considers Acquisition of Non-Human Identity Startup Astrix</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/vercel-confirms-security-breach-impacting-customer-accounts/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-23T14:18:29+00:00</news:publication_date><news:title>Vercel Confirms Security Breach Impacting Customer Accounts</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/uks-ncsc-advises-enterprises-to-provide-customers-with-default-passkeys/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-23T13:42:21+00:00</news:publication_date><news:title>UK&#8217;s NCSC Advises Enterprises to Provide Customers with Default Passkeys</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
</urlset>
