<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 30, 2026 at 8:02 pm by All in One SEO Pro v4.9.6.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://cybernoz.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Cybernoz</title>
		<link><![CDATA[https://cybernoz.com]]></link>
		<description><![CDATA[Cybernoz]]></description>
		<lastBuildDate><![CDATA[Thu, 30 Apr 2026 17:00:18 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://cybernoz.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://cybernoz.com/introducing-incident-notification-huntress/]]></guid>
			<link><![CDATA[https://cybernoz.com/introducing-incident-notification-huntress/]]></link>
			<title>Introducing Incident Notification | Huntress</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 17:00:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/fbi-links-cybercriminals-to-sharp-surge-in-cargo-theft-attacks/]]></guid>
			<link><![CDATA[https://cybernoz.com/fbi-links-cybercriminals-to-sharp-surge-in-cargo-theft-attacks/]]></link>
			<title>FBI links cybercriminals to sharp surge in cargo theft attacks</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 16:50:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/qilin-ransomware-enumerates-rdp-authentication-history-on-a-compromised-server/]]></guid>
			<link><![CDATA[https://cybernoz.com/qilin-ransomware-enumerates-rdp-authentication-history-on-a-compromised-server/]]></link>
			<title>Qilin Ransomware Enumerates RDP Authentication History on a Compromised Server</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 16:45:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/forescout-launches-missionpossible-global-partner-tour-to-drive-channel-growth-across-90-cities/]]></guid>
			<link><![CDATA[https://cybernoz.com/forescout-launches-missionpossible-global-partner-tour-to-drive-channel-growth-across-90-cities/]]></link>
			<title>Forescout Launches Mission:Possible Global Partner Tour to Drive Channel Growth Across 90 Cities</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 16:30:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/anti-ddos-firm-heaped-attacks-on-brazilian-isps-krebs-on-security/]]></guid>
			<link><![CDATA[https://cybernoz.com/anti-ddos-firm-heaped-attacks-on-brazilian-isps-krebs-on-security/]]></link>
			<title>Anti-DDoS Firm Heaped Attacks on Brazilian ISPs – Krebs on Security</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 16:25:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/openai-unveils-cyber-defense-roadmap-focused-on-ai-powered-security/]]></guid>
			<link><![CDATA[https://cybernoz.com/openai-unveils-cyber-defense-roadmap-focused-on-ai-powered-security/]]></link>
			<title>OpenAI Unveils Cyber Defense Roadmap Focused on AI-Powered Security</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 16:05:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/ot-security-standards-final/]]></guid>
			<link><![CDATA[https://cybernoz.com/ot-security-standards-final/]]></link>
			<title>OT Security Standards – Final</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 15:55:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/managed-vs-self-managed-cloud-hosting-choosing-the-best-option-for-your-business/]]></guid>
			<link><![CDATA[https://cybernoz.com/managed-vs-self-managed-cloud-hosting-choosing-the-best-option-for-your-business/]]></link>
			<title>Managed vs Self-Managed Cloud Hosting: Choosing the Best Option for Your Business</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 15:50:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/benn-jordan-musician-scientist-and-youtuber-on-flock-safety-cameras-privacy-surveillance/]]></guid>
			<link><![CDATA[https://cybernoz.com/benn-jordan-musician-scientist-and-youtuber-on-flock-safety-cameras-privacy-surveillance/]]></link>
			<title>Benn Jordan, Musician, Scientist, and YouTuber on Flock Safety Cameras, Privacy &#038; Surveillance</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 15:35:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/cpanel-zero-day-exploited-for-months-before-patch-release-cve-2026-41940/]]></guid>
			<link><![CDATA[https://cybernoz.com/cpanel-zero-day-exploited-for-months-before-patch-release-cve-2026-41940/]]></link>
			<title>cPanel zero-day exploited for months before patch release (CVE-2026-41940)</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 15:30:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/artificial-intelligence-powers-egypts-usd-27bn-city-project/]]></guid>
			<link><![CDATA[https://cybernoz.com/artificial-intelligence-powers-egypts-usd-27bn-city-project/]]></link>
			<title>Artificial intelligence powers Egypt’s USD 27bn city project</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 15:15:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/cpanel-cve-2026-41940-auth-bypass-flaw-patch-now-fast/]]></guid>
			<link><![CDATA[https://cybernoz.com/cpanel-cve-2026-41940-auth-bypass-flaw-patch-now-fast/]]></link>
			<title>CPanel CVE-2026-41940 Auth Bypass Flaw: Patch Now Fast!</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 15:05:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/telstra-not-seeking-to-lock-rivals-out-of-mobile-to-satellite-bands/]]></guid>
			<link><![CDATA[https://cybernoz.com/telstra-not-seeking-to-lock-rivals-out-of-mobile-to-satellite-bands/]]></link>
			<title>Telstra not seeking to lock rivals out of mobile-to-satellite bands</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 15:00:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/sap-npm-packages-targeted-in-supply-chain-attack/]]></guid>
			<link><![CDATA[https://cybernoz.com/sap-npm-packages-targeted-in-supply-chain-attack/]]></link>
			<title>SAP NPM Packages Targeted in Supply Chain Attack</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 14:50:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/meta-accused-of-violating-dsa-by-failing-to-safeguard-minors/]]></guid>
			<link><![CDATA[https://cybernoz.com/meta-accused-of-violating-dsa-by-failing-to-safeguard-minors/]]></link>
			<title>Meta accused of violating DSA by failing to safeguard minors</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 14:45:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/everyones-building-ai-agents-almost-nobodys-ready-for-what-they-do-to-identity/]]></guid>
			<link><![CDATA[https://cybernoz.com/everyones-building-ai-agents-almost-nobodys-ready-for-what-they-do-to-identity/]]></link>
			<title>Everyone’s building AI agents. Almost nobody’s ready for what they do to identity.</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 13:55:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/gaming-platform-roblox-to-require-facial-scans-for-users-under-16-in-indonesia/]]></guid>
			<link><![CDATA[https://cybernoz.com/gaming-platform-roblox-to-require-facial-scans-for-users-under-16-in-indonesia/]]></link>
			<title>Gaming platform Roblox to require facial scans for users under 16 in Indonesia</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 13:40:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/dismantle-implicit-trust-in-ot-networks-cisa-tells-critical-infrastructure-operators/]]></guid>
			<link><![CDATA[https://cybernoz.com/dismantle-implicit-trust-in-ot-networks-cisa-tells-critical-infrastructure-operators/]]></link>
			<title>Dismantle implicit trust in OT networks, CISA tells critical infrastructure operators</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 12:55:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/northwood-university-earns-nsa-cybersecurity-excellence-designation-as-demand-for-skilled-talent-grows/]]></guid>
			<link><![CDATA[https://cybernoz.com/northwood-university-earns-nsa-cybersecurity-excellence-designation-as-demand-for-skilled-talent-grows/]]></link>
			<title>Northwood University earns NSA Cybersecurity Excellence Designation, as demand for skilled talent grows</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 12:30:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/agentic-ai-security-risks-and-solutions/]]></guid>
			<link><![CDATA[https://cybernoz.com/agentic-ai-security-risks-and-solutions/]]></link>
			<title>Agentic AI security: Risks and solutions</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 12:15:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/critical-cpanel-and-whm-bug-exploited-as-a-zero-day-poc-now-available/]]></guid>
			<link><![CDATA[https://cybernoz.com/critical-cpanel-and-whm-bug-exploited-as-a-zero-day-poc-now-available/]]></link>
			<title>Critical cPanel and WHM bug exploited as a zero-day, PoC now available</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 12:05:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/cve-mcp-server-turns-claude-into-a-fully-capable-security-analyst-with-27-tools-across-21-apis/]]></guid>
			<link><![CDATA[https://cybernoz.com/cve-mcp-server-turns-claude-into-a-fully-capable-security-analyst-with-27-tools-across-21-apis/]]></link>
			<title>CVE MCP Server Turns Claude Into a Fully Capable Security Analyst With 27 Tools Across 21 APIs</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 12:00:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/best-ai-security-tools-for-exposure-assessment-in-2026/]]></guid>
			<link><![CDATA[https://cybernoz.com/best-ai-security-tools-for-exposure-assessment-in-2026/]]></link>
			<title>Best AI security tools for exposure assessment in 2026</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 11:45:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/exposed-data-illustrates-the-nightmare-scenario-for-a-stalkerware-victim/]]></guid>
			<link><![CDATA[https://cybernoz.com/exposed-data-illustrates-the-nightmare-scenario-for-a-stalkerware-victim/]]></link>
			<title>Exposed Data Illustrates the Nightmare Scenario for a Stalkerware Victim</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 11:35:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/poc-disclosed-for-critical-root-asustor-adm-rce-flaw/]]></guid>
			<link><![CDATA[https://cybernoz.com/poc-disclosed-for-critical-root-asustor-adm-rce-flaw/]]></link>
			<title>PoC Disclosed for Critical Root ASUSTOR ADM RCE Flaw</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 11:20:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/9-year-old-linux-kernel-vulnerability-copy-fail-enables-full-root-access/]]></guid>
			<link><![CDATA[https://cybernoz.com/9-year-old-linux-kernel-vulnerability-copy-fail-enables-full-root-access/]]></link>
			<title>9-Year-Old Linux Kernel Vulnerability “Copy Fail” Enables Full Root Access</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 11:05:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/new-linux-copy-fail-vulnerability-enables-root-access-on-major-distributions/]]></guid>
			<link><![CDATA[https://cybernoz.com/new-linux-copy-fail-vulnerability-enables-root-access-on-major-distributions/]]></link>
			<title>New Linux &#8216;Copy Fail&#8217; Vulnerability Enables Root Access on Major Distributions</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 10:35:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/cloud-revenues-up-35-yoy-in-a-hot-market-thats-accelerating/]]></guid>
			<link><![CDATA[https://cybernoz.com/cloud-revenues-up-35-yoy-in-a-hot-market-thats-accelerating/]]></link>
			<title>Cloud revenues up 35% YoY in a hot market that’s accelerating</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 10:30:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/apra-ai-risk-warning-australia-flags-financial-sector-gaps/]]></guid>
			<link><![CDATA[https://cybernoz.com/apra-ai-risk-warning-australia-flags-financial-sector-gaps/]]></link>
			<title>APRA AI Risk Warning: Australia Flags Financial Sector Gaps</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 10:25:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/chipsoft-cyberattack-patient-data-reportedly-destroyed/]]></guid>
			<link><![CDATA[https://cybernoz.com/chipsoft-cyberattack-patient-data-reportedly-destroyed/]]></link>
			<title>ChipSoft Cyberattack: Patient Data Reportedly Destroyed</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 10:20:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/qld-government-digitises-more-licence-credentials/]]></guid>
			<link><![CDATA[https://cybernoz.com/qld-government-digitises-more-licence-credentials/]]></link>
			<title>Qld government digitises more licence credentials</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 10:15:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/sandhills-medical-says-ransomware-breach-affects-170000/]]></guid>
			<link><![CDATA[https://cybernoz.com/sandhills-medical-says-ransomware-breach-affects-170000/]]></link>
			<title>Sandhills Medical Says Ransomware Breach Affects 170,000</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 10:05:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/large-scale-roblox-hacking-operation-shut-down-by-ukrainian-authorities/]]></guid>
			<link><![CDATA[https://cybernoz.com/large-scale-roblox-hacking-operation-shut-down-by-ukrainian-authorities/]]></link>
			<title>Large-scale Roblox hacking operation shut down by Ukrainian authorities</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 10:00:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/macquarie-technology-group-and-macquarie-university-partner-on-cyber-and-cloud-research/]]></guid>
			<link><![CDATA[https://cybernoz.com/macquarie-technology-group-and-macquarie-university-partner-on-cyber-and-cloud-research/]]></link>
			<title>Macquarie Technology Group and Macquarie University partner on cyber and cloud research</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 08:50:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/10-wichtige-security-eigenschaften-so-setzen-sie-die-kraft-ihres-it-sicherheitstechnik-teams-frei/]]></guid>
			<link><![CDATA[https://cybernoz.com/10-wichtige-security-eigenschaften-so-setzen-sie-die-kraft-ihres-it-sicherheitstechnik-teams-frei/]]></link>
			<title>10 wichtige Security-Eigenschaften: So setzen Sie die Kraft Ihres IT-Sicherheitstechnik-Teams frei</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 08:10:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/how-ai-can-streamline-your-security-testing/]]></guid>
			<link><![CDATA[https://cybernoz.com/how-ai-can-streamline-your-security-testing/]]></link>
			<title>How AI can streamline your security testing</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 07:30:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/popular-wordpress-redirect-plugin-hid-dormant-backdoor-for-years/]]></guid>
			<link><![CDATA[https://cybernoz.com/popular-wordpress-redirect-plugin-hid-dormant-backdoor-for-years/]]></link>
			<title>Popular WordPress redirect plugin hid dormant backdoor for years</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 07:20:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/new-etherrat-variant-uses-trojanized-tftpd64-installer-to-bridge-web2-malware-and-web3-theft/]]></guid>
			<link><![CDATA[https://cybernoz.com/new-etherrat-variant-uses-trojanized-tftpd64-installer-to-bridge-web2-malware-and-web3-theft/]]></link>
			<title>New EtherRAT Variant Uses Trojanized Tftpd64 Installer to Bridge Web2 Malware and Web3 Theft</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 07:15:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/compromised-sap-npm-packages-found-harvesting-developer-and-ci-cd-secrets/]]></guid>
			<link><![CDATA[https://cybernoz.com/compromised-sap-npm-packages-found-harvesting-developer-and-ci-cd-secrets/]]></link>
			<title>Compromised SAP npm Packages Found Harvesting Developer and CI/CD Secrets</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 06:35:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/polymarket-rejects-data-breach-claims-as-hacker-alleges-300k-records-stolen/]]></guid>
			<link><![CDATA[https://cybernoz.com/polymarket-rejects-data-breach-claims-as-hacker-alleges-300k-records-stolen/]]></link>
			<title>Polymarket Rejects Data Breach Claims as Hacker Alleges 300K Records Stolen</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 06:20:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/what-to-look-for-in-an-exposure-management-platform-and-what-most-of-them-get-wrong/]]></guid>
			<link><![CDATA[https://cybernoz.com/what-to-look-for-in-an-exposure-management-platform-and-what-most-of-them-get-wrong/]]></link>
			<title>What to Look for in an Exposure Management Platform (And What Most of Them Get Wrong)</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 05:50:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/mp-committees-to-double-up-on-capitas-civil-service-pension-crisis/]]></guid>
			<link><![CDATA[https://cybernoz.com/mp-committees-to-double-up-on-capitas-civil-service-pension-crisis/]]></link>
			<title>MP committees to double up on Capita’s civil service pension crisis</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 05:45:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/276-arrested-in-operation-tri-force-sentinel-global-bust/]]></guid>
			<link><![CDATA[https://cybernoz.com/276-arrested-in-operation-tri-force-sentinel-global-bust/]]></link>
			<title>276 Arrested In Operation Tri-Force Sentinel Global Bust</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 05:35:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/copy-fail-linux-privesc-bug-lay-dormant-in-kernel-since-2017/]]></guid>
			<link><![CDATA[https://cybernoz.com/copy-fail-linux-privesc-bug-lay-dormant-in-kernel-since-2017/]]></link>
			<title>&#8216;Copy Fail&#8217; Linux privesc bug lay dormant in kernel since 2017</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 05:30:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/iranian-cyber-group-handala-targets-us-troops-in-bahrain/]]></guid>
			<link><![CDATA[https://cybernoz.com/iranian-cyber-group-handala-targets-us-troops-in-bahrain/]]></link>
			<title>Iranian Cyber Group Handala Targets US Troops in Bahrain</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 05:20:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/shinyhunters-exploit-anodot-incident-to-target-vimeo/]]></guid>
			<link><![CDATA[https://cybernoz.com/shinyhunters-exploit-anodot-incident-to-target-vimeo/]]></link>
			<title>ShinyHunters exploit Anodot incident to target Vimeo</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 05:15:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/australia-post-partners-with-alpha-level-to-expand-ai-driven-cyber-threat-detection/]]></guid>
			<link><![CDATA[https://cybernoz.com/australia-post-partners-with-alpha-level-to-expand-ai-driven-cyber-threat-detection/]]></link>
			<title>Australia Post partners with Alpha Level to expand AI-driven cyber threat detection</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 04:05:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/researchers-unearth-industrial-sabotage-malware-that-predated-stuxnet-by-5-years/]]></guid>
			<link><![CDATA[https://cybernoz.com/researchers-unearth-industrial-sabotage-malware-that-predated-stuxnet-by-5-years/]]></link>
			<title>Researchers unearth industrial sabotage malware that predated Stuxnet by 5 years</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 03:25:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/humans-vs-ai-the-critical-role-of-human-expertise/]]></guid>
			<link><![CDATA[https://cybernoz.com/humans-vs-ai-the-critical-role-of-human-expertise/]]></link>
			<title>Humans vs. AI: The Critical Role of Human Expertise</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 02:45:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/official-sap-npm-packages-compromised-to-steal-credentials/]]></guid>
			<link><![CDATA[https://cybernoz.com/official-sap-npm-packages-compromised-to-steal-credentials/]]></link>
			<title>Official SAP npm packages compromised to steal credentials</title>
			<pubDate><![CDATA[Thu, 30 Apr 2026 02:35:16 +0000]]></pubDate>
		</item>
				</channel>
</rss>
