<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on May 5, 2026 at 12:11 pm by All in One SEO Pro v4.9.6.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://cybernoz.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Cybernoz</title>
		<link><![CDATA[https://cybernoz.com]]></link>
		<description><![CDATA[Cybernoz]]></description>
		<lastBuildDate><![CDATA[Tue, 05 May 2026 07:45:10 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://cybernoz.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://cybernoz.com/sektor-signs-semperis-distribution-agreement-across-australia-and-new-zealand/]]></guid>
			<link><![CDATA[https://cybernoz.com/sektor-signs-semperis-distribution-agreement-across-australia-and-new-zealand/]]></link>
			<title>Sektor signs Semperis distribution agreement across Australia and New Zealand</title>
			<pubDate><![CDATA[Tue, 05 May 2026 07:45:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/10-anzeichen-fur-einen-schlechten-cso/]]></guid>
			<link><![CDATA[https://cybernoz.com/10-anzeichen-fur-einen-schlechten-cso/]]></link>
			<title>10 Anzeichen für einen schlechten CSO</title>
			<pubDate><![CDATA[Tue, 05 May 2026 07:05:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/working-in-london-at-the-worlds-largest-intelligence-company/]]></guid>
			<link><![CDATA[https://cybernoz.com/working-in-london-at-the-worlds-largest-intelligence-company/]]></link>
			<title>Working in London at the World’s Largest Intelligence Company</title>
			<pubDate><![CDATA[Tue, 05 May 2026 06:30:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/legitimate-apps-as-traitorware-for-persistent-microsoft/]]></guid>
			<link><![CDATA[https://cybernoz.com/legitimate-apps-as-traitorware-for-persistent-microsoft/]]></link>
			<title>Legitimate Apps as Traitorware for Persistent Microsoft</title>
			<pubDate><![CDATA[Tue, 05 May 2026 06:25:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/backdoored-pytorch-lightning-package-drops-credential-stealer/]]></guid>
			<link><![CDATA[https://cybernoz.com/backdoored-pytorch-lightning-package-drops-credential-stealer/]]></link>
			<title>Backdoored PyTorch Lightning package drops credential stealer</title>
			<pubDate><![CDATA[Tue, 05 May 2026 06:15:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/pnpm-11-turns-on-minimum-release-age-by-default-to-reduce-npm-supply-chain-risk/]]></guid>
			<link><![CDATA[https://cybernoz.com/pnpm-11-turns-on-minimum-release-age-by-default-to-reduce-npm-supply-chain-risk/]]></link>
			<title>pnpm 11 Turns On Minimum Release Age by Default to Reduce npm Supply Chain Risk</title>
			<pubDate><![CDATA[Tue, 05 May 2026 06:10:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/platform-engineering-the-rise-of-a-disciplinary-rethink/]]></guid>
			<link><![CDATA[https://cybernoz.com/platform-engineering-the-rise-of-a-disciplinary-rethink/]]></link>
			<title>Platform Engineering: The Rise of a Disciplinary Rethink</title>
			<pubDate><![CDATA[Tue, 05 May 2026 06:00:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/microsoft-edge-found-storing-saved-passwords-in-cleartext-memory-at-startup/]]></guid>
			<link><![CDATA[https://cybernoz.com/microsoft-edge-found-storing-saved-passwords-in-cleartext-memory-at-startup/]]></link>
			<title>Microsoft Edge Found Storing Saved Passwords in Cleartext Memory at Startup</title>
			<pubDate><![CDATA[Tue, 05 May 2026 05:30:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/silver-fox-deploys-abcdoor-malware-via-tax-themed-phishing-in-india-and-russia/]]></guid>
			<link><![CDATA[https://cybernoz.com/silver-fox-deploys-abcdoor-malware-via-tax-themed-phishing-in-india-and-russia/]]></link>
			<title>Silver Fox Deploys ABCDoor Malware via Tax-Themed Phishing in India and Russia</title>
			<pubDate><![CDATA[Tue, 05 May 2026 04:45:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/defender-yanks-root-certs-as-windows-updates-blocks-backups/]]></guid>
			<link><![CDATA[https://cybernoz.com/defender-yanks-root-certs-as-windows-updates-blocks-backups/]]></link>
			<title>Defender yanks root certs as Windows updates blocks backups</title>
			<pubDate><![CDATA[Tue, 05 May 2026 04:25:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/digicert-revokes-certificates-after-support-portal-hack/]]></guid>
			<link><![CDATA[https://cybernoz.com/digicert-revokes-certificates-after-support-portal-hack/]]></link>
			<title>DigiCert Revokes Certificates After Support Portal Hack</title>
			<pubDate><![CDATA[Tue, 05 May 2026 04:15:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/hackers-target-governments-and-msps-via-critical-cpanel-flaw-cve-2026-41940/]]></guid>
			<link><![CDATA[https://cybernoz.com/hackers-target-governments-and-msps-via-critical-cpanel-flaw-cve-2026-41940/]]></link>
			<title>Hackers target governments and MSPs via critical cPanel flaw CVE-2026-41940</title>
			<pubDate><![CDATA[Tue, 05 May 2026 04:10:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/arxis-implements-apra-aligned-resilience-framework-for-credit-union-sa/]]></guid>
			<link><![CDATA[https://cybernoz.com/arxis-implements-apra-aligned-resilience-framework-for-credit-union-sa/]]></link>
			<title>Arxis implements APRA-aligned resilience framework for Credit Union SA</title>
			<pubDate><![CDATA[Tue, 05 May 2026 03:00:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/anthropic-mythos-spurs-white-house-to-weigh-pre-release-reviews-for-high-risk-ai-models/]]></guid>
			<link><![CDATA[https://cybernoz.com/anthropic-mythos-spurs-white-house-to-weigh-pre-release-reviews-for-high-risk-ai-models/]]></link>
			<title>Anthropic Mythos spurs White House to weigh pre-release reviews for high-risk AI models</title>
			<pubDate><![CDATA[Tue, 05 May 2026 02:20:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/elastic-conversational-entity-analytics-for-threat-hunting-elastic-security-labs/]]></guid>
			<link><![CDATA[https://cybernoz.com/elastic-conversational-entity-analytics-for-threat-hunting-elastic-security-labs/]]></link>
			<title>Elastic Conversational Entity Analytics for threat hunting — Elastic Security Labs</title>
			<pubDate><![CDATA[Tue, 05 May 2026 01:40:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/weaver-e-cology-critical-bug-exploited-in-attacks-since-march/]]></guid>
			<link><![CDATA[https://cybernoz.com/weaver-e-cology-critical-bug-exploited-in-attacks-since-march/]]></link>
			<title>Weaver E-cology critical bug exploited in attacks since March</title>
			<pubDate><![CDATA[Tue, 05 May 2026 01:30:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/new-microstealer-malware-actively-attacking-telecom-education-sectors/]]></guid>
			<link><![CDATA[https://cybernoz.com/new-microstealer-malware-actively-attacking-telecom-education-sectors/]]></link>
			<title>New MicroStealer Malware Actively Attacking Telecom &#038; Education Sectors</title>
			<pubDate><![CDATA[Tue, 05 May 2026 01:25:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/retro-coding-and-the-roots-of-logic-why-the-byte-brothers-program-a-problem-still-matters/]]></guid>
			<link><![CDATA[https://cybernoz.com/retro-coding-and-the-roots-of-logic-why-the-byte-brothers-program-a-problem-still-matters/]]></link>
			<title>Retro-Coding and the Roots of Logic: Why The Byte Brothers: Program a Problem Still Matters</title>
			<pubDate><![CDATA[Tue, 05 May 2026 01:15:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/canvas-confirms-data-breach-following-shinyhunters-claim/]]></guid>
			<link><![CDATA[https://cybernoz.com/canvas-confirms-data-breach-following-shinyhunters-claim/]]></link>
			<title>Canvas Confirms Data Breach Following ShinyHunters Claim</title>
			<pubDate><![CDATA[Tue, 05 May 2026 00:45:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/the-2026-world-cup-scam-economy-is-already-running-before-the-first-whistle/]]></guid>
			<link><![CDATA[https://cybernoz.com/the-2026-world-cup-scam-economy-is-already-running-before-the-first-whistle/]]></link>
			<title>The 2026 World Cup scam economy is already running before the first whistle</title>
			<pubDate><![CDATA[Tue, 05 May 2026 00:05:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/progress-patches-critical-moveit-automation-bug-enabling-authentication-bypass/]]></guid>
			<link><![CDATA[https://cybernoz.com/progress-patches-critical-moveit-automation-bug-enabling-authentication-bypass/]]></link>
			<title>Progress Patches Critical MOVEit Automation Bug Enabling Authentication Bypass</title>
			<pubDate><![CDATA[Tue, 05 May 2026 00:00:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/woolworths-iq-taps-accelerator-for-impactful-ai-use-cases/]]></guid>
			<link><![CDATA[https://cybernoz.com/woolworths-iq-taps-accelerator-for-impactful-ai-use-cases/]]></link>
			<title>Woolworths IQ taps accelerator for impactful AI use cases</title>
			<pubDate><![CDATA[Mon, 04 May 2026 23:40:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/cisco-moves-to-acquire-astrix-security-to-tackle-non-human-identity-risks/]]></guid>
			<link><![CDATA[https://cybernoz.com/cisco-moves-to-acquire-astrix-security-to-tackle-non-human-identity-risks/]]></link>
			<title>Cisco Moves to Acquire Astrix Security to Tackle Non-Human Identity Risks</title>
			<pubDate><![CDATA[Mon, 04 May 2026 23:30:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/moveit-automation-flaws-could-enable-full-system-compromise/]]></guid>
			<link><![CDATA[https://cybernoz.com/moveit-automation-flaws-could-enable-full-system-compromise/]]></link>
			<title>MOVEit automation flaws could enable full system compromise</title>
			<pubDate><![CDATA[Mon, 04 May 2026 23:25:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/new-moveit-vulnerabilities-prompt-urgent-patch-warning/]]></guid>
			<link><![CDATA[https://cybernoz.com/new-moveit-vulnerabilities-prompt-urgent-patch-warning/]]></link>
			<title>New MOVEit vulnerabilities prompt urgent patch warning</title>
			<pubDate><![CDATA[Mon, 04 May 2026 22:40:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/copy-fail-is-a-real-linux-security-crisis-wrapped-in-ai-slop/]]></guid>
			<link><![CDATA[https://cybernoz.com/copy-fail-is-a-real-linux-security-crisis-wrapped-in-ai-slop/]]></link>
			<title>&#8216;Copy Fail&#8217; is a real Linux security crisis wrapped in AI slop</title>
			<pubDate><![CDATA[Mon, 04 May 2026 22:35:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/how-cisos-should-utilize-data-security-posture-management-to-inform-risk/]]></guid>
			<link><![CDATA[https://cybernoz.com/how-cisos-should-utilize-data-security-posture-management-to-inform-risk/]]></link>
			<title>How CISOs should utilize data security posture management to inform risk</title>
			<pubDate><![CDATA[Mon, 04 May 2026 21:35:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/another-papercut-cve-2023-39143-remote-code-execution/]]></guid>
			<link><![CDATA[https://cybernoz.com/another-papercut-cve-2023-39143-remote-code-execution/]]></link>
			<title>Another PaperCut: CVE-2023-39143 Remote Code Execution</title>
			<pubDate><![CDATA[Mon, 04 May 2026 20:55:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/amazon-ses-increasingly-abused-in-phishing-to-evade-detection/]]></guid>
			<link><![CDATA[https://cybernoz.com/amazon-ses-increasingly-abused-in-phishing-to-evade-detection/]]></link>
			<title>Amazon SES increasingly abused in phishing to evade detection</title>
			<pubDate><![CDATA[Mon, 04 May 2026 20:45:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/digicert-hacked-via-weaponized-screensaver-file-to-obtain-ev-code-signing-certificates/]]></guid>
			<link><![CDATA[https://cybernoz.com/digicert-hacked-via-weaponized-screensaver-file-to-obtain-ev-code-signing-certificates/]]></link>
			<title>DigiCert Hacked via Weaponized Screensaver File to Obtain EV Code Signing Certificates</title>
			<pubDate><![CDATA[Mon, 04 May 2026 20:40:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/cybersecurity-risks-in-2026-cyber-defense-magazine/]]></guid>
			<link><![CDATA[https://cybernoz.com/cybersecurity-risks-in-2026-cyber-defense-magazine/]]></link>
			<title>Cybersecurity Risks in 2026 &#8211; Cyber Defense Magazine</title>
			<pubDate><![CDATA[Mon, 04 May 2026 20:30:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/cisco-launches-ai-provenance-tool-to-strengthen-security-and-compliance/]]></guid>
			<link><![CDATA[https://cybernoz.com/cisco-launches-ai-provenance-tool-to-strengthen-security-and-compliance/]]></link>
			<title>Cisco Launches AI Provenance Tool to Strengthen Security and Compliance</title>
			<pubDate><![CDATA[Mon, 04 May 2026 20:00:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/wiz-zeroday-cloud-event-reveals-20-year-old-postgresql-vulnerabilities/]]></guid>
			<link><![CDATA[https://cybernoz.com/wiz-zeroday-cloud-event-reveals-20-year-old-postgresql-vulnerabilities/]]></link>
			<title>Wiz ZeroDay.Cloud Event Reveals 20-Year-Old PostgreSQL Vulnerabilities</title>
			<pubDate><![CDATA[Mon, 04 May 2026 19:45:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/cyberattacks-are-raising-your-prices-lock-and-code-s07e09/]]></guid>
			<link><![CDATA[https://cybernoz.com/cyberattacks-are-raising-your-prices-lock-and-code-s07e09/]]></link>
			<title>Cyberattacks are raising your prices (Lock and Code S07E09)</title>
			<pubDate><![CDATA[Mon, 04 May 2026 19:20:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/phishing-campaign-hits-80-orgs-using-simplehelp-and-screenconnect-rmm-tools/]]></guid>
			<link><![CDATA[https://cybernoz.com/phishing-campaign-hits-80-orgs-using-simplehelp-and-screenconnect-rmm-tools/]]></link>
			<title>Phishing Campaign Hits 80+ Orgs Using SimpleHelp and ScreenConnect RMM Tools</title>
			<pubDate><![CDATA[Mon, 04 May 2026 19:15:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/uks-ncsc-warns-of-wave-of-patches/]]></guid>
			<link><![CDATA[https://cybernoz.com/uks-ncsc-warns-of-wave-of-patches/]]></link>
			<title>UK&#8217;s NCSC warns of ‘wave of patches’</title>
			<pubDate><![CDATA[Mon, 04 May 2026 19:10:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/uks-online-age-checks-are-failing-kids-are-beating-them-with-ai-fake-beards/]]></guid>
			<link><![CDATA[https://cybernoz.com/uks-online-age-checks-are-failing-kids-are-beating-them-with-ai-fake-beards/]]></link>
			<title>UK&#8217;s Online Age Checks Are Failing—Kids Are Beating Them With AI, Fake Beards</title>
			<pubDate><![CDATA[Mon, 04 May 2026 19:05:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/trellix-confirms-source-code-repository-breach/]]></guid>
			<link><![CDATA[https://cybernoz.com/trellix-confirms-source-code-repository-breach/]]></link>
			<title>Trellix Confirms Source Code Repository Breach</title>
			<pubDate><![CDATA[Mon, 04 May 2026 19:00:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/university-of-queensland-aligns-resilience-approach-across-operations/]]></guid>
			<link><![CDATA[https://cybernoz.com/university-of-queensland-aligns-resilience-approach-across-operations/]]></link>
			<title>University of Queensland aligns resilience approach across operations</title>
			<pubDate><![CDATA[Mon, 04 May 2026 18:55:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/trellix-source-code-repository-breached/]]></guid>
			<link><![CDATA[https://cybernoz.com/trellix-source-code-repository-breached/]]></link>
			<title>Trellix Source Code Repository Breached</title>
			<pubDate><![CDATA[Mon, 04 May 2026 18:45:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/ai-speeds-flaw-discovery-forcing-rapid-updates-uk-ncsc-warns/]]></guid>
			<link><![CDATA[https://cybernoz.com/ai-speeds-flaw-discovery-forcing-rapid-updates-uk-ncsc-warns/]]></link>
			<title>AI speeds flaw discovery, forcing rapid updates, UK NCSC warns</title>
			<pubDate><![CDATA[Mon, 04 May 2026 18:40:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/critical-vulnerability-in-cpanel-leads-to-widespread-exploitation/]]></guid>
			<link><![CDATA[https://cybernoz.com/critical-vulnerability-in-cpanel-leads-to-widespread-exploitation/]]></link>
			<title>Critical vulnerability in cPanel leads to widespread exploitation</title>
			<pubDate><![CDATA[Mon, 04 May 2026 17:50:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/a-college-student-is-suing-a-dating-app-that-allegedly-used-her-tiktok-videos-to-target-men-in-her-dormitory/]]></guid>
			<link><![CDATA[https://cybernoz.com/a-college-student-is-suing-a-dating-app-that-allegedly-used-her-tiktok-videos-to-target-men-in-her-dormitory/]]></link>
			<title>A college student is suing a dating app that allegedly used her TikTok videos to target men in her dormitory</title>
			<pubDate><![CDATA[Mon, 04 May 2026 17:45:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/the-fake-it-worker-problem-cisos-cant-ignore/]]></guid>
			<link><![CDATA[https://cybernoz.com/the-fake-it-worker-problem-cisos-cant-ignore/]]></link>
			<title>The fake IT worker problem CISOs can’t ignore</title>
			<pubDate><![CDATA[Mon, 04 May 2026 16:45:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/5-days-to-get-50-off-a-second-disrupt-2026-pass/]]></guid>
			<link><![CDATA[https://cybernoz.com/5-days-to-get-50-off-a-second-disrupt-2026-pass/]]></link>
			<title>5 days to get 50% off a second Disrupt 2026 pass</title>
			<pubDate><![CDATA[Mon, 04 May 2026 16:40:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/everfield-germany-to-acquire-rhebo-expanding-ot-cybersecurity-footprint-across-dach-industrial-markets/]]></guid>
			<link><![CDATA[https://cybernoz.com/everfield-germany-to-acquire-rhebo-expanding-ot-cybersecurity-footprint-across-dach-industrial-markets/]]></link>
			<title>Everfield Germany to acquire Rhebo, expanding OT cybersecurity footprint across DACH industrial markets</title>
			<pubDate><![CDATA[Mon, 04 May 2026 16:25:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/cisa-and-partners-release-agentic-ai-security-guidance-to-protect-critical-infrastructure-outline-mitigation-action/]]></guid>
			<link><![CDATA[https://cybernoz.com/cisa-and-partners-release-agentic-ai-security-guidance-to-protect-critical-infrastructure-outline-mitigation-action/]]></link>
			<title>CISA and partners release agentic AI security guidance to protect critical infrastructure, outline mitigation action</title>
			<pubDate><![CDATA[Mon, 04 May 2026 16:20:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/how-businesses-should-be-scaling-their-security/]]></guid>
			<link><![CDATA[https://cybernoz.com/how-businesses-should-be-scaling-their-security/]]></link>
			<title>How Businesses Should Be Scaling Their Security</title>
			<pubDate><![CDATA[Mon, 04 May 2026 16:05:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/they-dont-hack-they-borrow-how-fraudsters-target-credit-unions/]]></guid>
			<link><![CDATA[https://cybernoz.com/they-dont-hack-they-borrow-how-fraudsters-target-credit-unions/]]></link>
			<title>They don’t hack, they borrow: How fraudsters target credit unions</title>
			<pubDate><![CDATA[Mon, 04 May 2026 15:55:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/new-xlabs_v1-botnet-targets-minecraft-servers-through-adb-exposed-android-devices/]]></guid>
			<link><![CDATA[https://cybernoz.com/new-xlabs_v1-botnet-targets-minecraft-servers-through-adb-exposed-android-devices/]]></link>
			<title>New xlabs_v1 Botnet Targets Minecraft Servers Through ADB-Exposed Android Devices</title>
			<pubDate><![CDATA[Mon, 04 May 2026 15:50:07 +0000]]></pubDate>
		</item>
				</channel>
</rss>
