<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/wp-content/plugins/xml-sitemap-feed/assets/sitemap-news.xsl?ver=5.4.9"?>
<!-- generated-on="2026-04-19T04:10:58+00:00" -->
<!-- generator="XML Sitemap & Google News for WordPress" -->
<!-- generator-url="https://status301.net/wordpress-plugins/xml-sitemap-feed/" -->
<!-- generator-version="5.4.9" -->
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" >
<url><loc>https://cybersecurity-see.com/openai-expands-access-to-gpt-5-4-cyber-for-trusted-organizations-globally/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-19T03:21:14+00:00</news:publication_date><news:title>OpenAI Expands Access to GPT-5.4-Cyber for Trusted Organizations Globally</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/two-senior-care-providers-attacked-by-ransomware/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-19T01:20:08+00:00</news:publication_date><news:title>Two Senior Care Providers Attacked by Ransomware</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/industrial-systems-targeted-by-new-email-worm-threat-wave/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-18T23:19:12+00:00</news:publication_date><news:title>Industrial Systems Targeted by New Email Worm Threat Wave</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/grinex-halts-trading-following-14-million-hack/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-18T21:18:13+00:00</news:publication_date><news:title>Grinex Halts Trading Following $14 Million Hack</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/researcher-claims-claude-opus-enabled-development-of-functional-chrome-exploit/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-18T19:16:58+00:00</news:publication_date><news:title>Researcher Claims Claude Opus Enabled Development of Functional Chrome Exploit</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/google-blocks-602-million-scam-ads/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-18T17:16:18+00:00</news:publication_date><news:title>Google Blocks 602 Million Scam Ads</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/first-ceo-advocates-for-cve-collaboration/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-18T13:14:17+00:00</news:publication_date><news:title>First CEO Advocates for CVE Collaboration</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/nexcorium-mirai-variant-exploits-tbk-dvr-vulnerability-in-new-iot-botnet-campaign/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-18T11:13:10+00:00</news:publication_date><news:title>Nexcorium Mirai Variant Exploits TBK DVR Vulnerability in New IoT Botnet Campaign</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/draftkings-hacker-receives-prison-sentence/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-18T09:12:33+00:00</news:publication_date><news:title>DraftKings Hacker Receives Prison Sentence</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/microsoft-addresses-two-zero-day-vulnerabilities-in-april-patch-tuesday/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-18T05:17:05+00:00</news:publication_date><news:title>Microsoft Addresses Two Zero-Day Vulnerabilities in April Patch Tuesday</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/circle-faces-lawsuit-for-stolen-usdc/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-18T05:10:10+00:00</news:publication_date><news:title>Circle Faces Lawsuit for Stolen USDC</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/operation-poweroff-disables-75000-ddos-attackers-and-over-50-service-domains/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-18T03:09:30+00:00</news:publication_date><news:title>Operation PowerOFF Disables 75,000 DDoS Attackers and Over 50 Service Domains</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/healthcare-cyber-research-programs-avoid-budget-cuts/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-18T03:04:49+00:00</news:publication_date><news:title>Healthcare Cyber Research Programs Avoid Budget Cuts</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/critical-sandbox-bypass-vulnerability-resolved-in-thymeleaf-java-template-engine/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-18T02:46:15+00:00</news:publication_date><news:title>Critical Sandbox Bypass Vulnerability Resolved in Thymeleaf Java Template Engine</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/ai-optimism-and-anxiety-at-rsac-2026-along-with-an-mia-u-s-government/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-18T01:08:21+00:00</news:publication_date><news:title>AI Optimism and Anxiety at RSAC 2026, Along with an MIA U.S. Government</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/scattered-spider-hacker-admits-guilt-in-u-s-federal-court/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-18T00:43:33+00:00</news:publication_date><news:title>Scattered Spider Hacker Admits Guilt in U.S. Federal Court</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/researchers-identify-increase-in-brute-force-attacks-originating-from-the-middle-east/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-18T00:15:20+00:00</news:publication_date><news:title>Researchers Identify Increase in Brute-Force Attacks Originating from the Middle East</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/pentagon-announces-new-appointments-for-cio-office/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T23:07:17+00:00</news:publication_date><news:title>Pentagon Announces New Appointments for CIO Office</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/finance-chiefs-caution-that-new-ai-models-could-disrupt-global-banking/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T22:22:53+00:00</news:publication_date><news:title>Finance Chiefs Caution That New AI Models Could Disrupt Global Banking</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/flawed-cisco-update-poses-risk-of-aps-missing-future-patches/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T21:44:28+00:00</news:publication_date><news:title>Flawed Cisco Update Poses Risk of APs Missing Future Patches</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/tp-link-routers-targeted-by-mirai-in-cve-2023-33538-attacks/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T21:06:18+00:00</news:publication_date><news:title>TP-Link Routers Targeted by Mirai in CVE-2023-33538 Attacks</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/europe-advances-digital-sovereignty-with-213m-cloud-contract/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T20:01:34+00:00</news:publication_date><news:title>Europe Advances Digital Sovereignty with $213M Cloud Contract</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/international-police-action-disrupts-ddos-for-hire-services/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T19:13:09+00:00</news:publication_date><news:title>International Police Action Disrupts DDoS-For-Hire Services</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/another-microsoft-defender-privilege-escalation-bug-discovered-days-after-patch/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T19:05:10+00:00</news:publication_date><news:title>Another Microsoft Defender Privilege Escalation Bug Discovered Days After Patch</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/uk-government-raises-alarm-over-ai-security-risks/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T17:04:14+00:00</news:publication_date><news:title>UK Government Raises Alarm Over AI Security Risks</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/commercial-ai-models-demonstrate-swift-advancements-in-vulnerability-research/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T16:42:12+00:00</news:publication_date><news:title>Commercial AI Models Demonstrate Swift Advancements in Vulnerability Research</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cyber-briefing-for-april-17-2026-cybermaterial/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T15:04:01+00:00</news:publication_date><news:title>Cyber Briefing for April 17, 2026 &#8211; CyberMaterial</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/white-house-enables-federal-agencies-to-access-anthropics-claude-mythos/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T14:11:14+00:00</news:publication_date><news:title>White House Enables Federal Agencies to Access Anthropic&#8217;s Claude Mythos</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/seo-poisoning-attack-leverages-microsoft-binary-to-install-rmm-tool/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T13:02:30+00:00</news:publication_date><news:title>SEO Poisoning Attack Leverages Microsoft Binary to Install RMM Tool</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/a-pivotal-moment-in-cybersecurity/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T12:58:46+00:00</news:publication_date><news:title>A Pivotal Moment in Cybersecurity</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/automotive-ransomware-attacks-surge-by-100-in-one-year/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T11:40:35+00:00</news:publication_date><news:title>Automotive Ransomware Attacks Surge by 100% in One Year</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/palo-altos-helmut-reisinger-anticipates-a-cyber-sea-change-with-advancements-in-ai/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T11:01:17+00:00</news:publication_date><news:title>Palo Alto&#8217;s Helmut Reisinger Anticipates a Cyber Sea Change with Advancements in AI</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/live-webinar-protecting-the-hybrid-attack-surface-from-ai-enabled-adversaries/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T10:37:36+00:00</news:publication_date><news:title>Live Webinar: Protecting the Hybrid Attack Surface from AI-Enabled Adversaries</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/systemic-flaw-in-mcp-protocol-may-expose-150-million-downloads/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T09:09:44+00:00</news:publication_date><news:title>Systemic Flaw in MCP Protocol May Expose 150 Million Downloads</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/qa-your-face-is-now-part-of-the-threat-landscape-warns-sarah-armstrong-smith/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T09:00:29+00:00</news:publication_date><news:title>Q&#038;A: Your Face Is Now Part of the Threat Landscape, Warns Sarah Armstrong-Smith</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/rethinking-cybersecurity-for-ai-acceleration-in-the-mythos-era/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T08:16:38+00:00</news:publication_date><news:title>Rethinking Cybersecurity for AI Acceleration in the Mythos Era</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/how-ai-is-improving-at-identifying-security-vulnerabilities-npr/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T07:59:02+00:00</news:publication_date><news:title>How AI is Improving at Identifying Security Vulnerabilities &#8211; NPR</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/manchester-tech-event-focused-on-ai-and-cyber-trust/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T06:59:18+00:00</news:publication_date><news:title>Manchester Tech Event Focused on AI and Cyber Trust</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/nist-reduces-cve-analysis-due-to-overwhelming-vulnerability-volume/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T06:39:19+00:00</news:publication_date><news:title>NIST Reduces CVE Analysis Due to Overwhelming Vulnerability Volume</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/openai-engages-banks-for-trusted-access-in-cybersecurity-partnership-initiative/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T05:55:14+00:00</news:publication_date><news:title>OpenAI Engages Banks for Trusted Access in Cybersecurity Partnership Initiative</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/abuse-of-microsoft-365-mailbox-rules-for-exfiltration-and-persistence/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T05:51:08+00:00</news:publication_date><news:title>Abuse of Microsoft 365 Mailbox Rules for Exfiltration and Persistence</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
<url><loc>https://cybersecurity-see.com/cargo-hackers-target-trucking-companies-to-steal-physical-shipments/</loc><news:news><news:publication><news:name>CyberSecurity SEE</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-17T04:58:13+00:00</news:publication_date><news:title>Cargo Hackers Target Trucking Companies to Steal Physical Shipments</news:title><news:keywords></news:keywords><news:stock_tickers></news:stock_tickers></news:news></url>
</urlset>
