<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on May 2, 2026 at 9:00 am by All in One SEO Pro v4.9.6.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://cybernoz.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Cybernoz</title>
		<link><![CDATA[https://cybernoz.com]]></link>
		<description><![CDATA[Cybernoz]]></description>
		<lastBuildDate><![CDATA[Sat, 02 May 2026 05:50:04 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://cybernoz.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://cybernoz.com/critical-cpanel-vulnerability-lets-attackers-bypass-login-gain-root-access/]]></guid>
			<link><![CDATA[https://cybernoz.com/critical-cpanel-vulnerability-lets-attackers-bypass-login-gain-root-access/]]></link>
			<title>Critical cPanel Vulnerability Lets Attackers Bypass Login, Gain Root Access</title>
			<pubDate><![CDATA[Sat, 02 May 2026 05:50:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/top-five-sales-challenges-costing-msps-cybersecurity-revenue/]]></guid>
			<link><![CDATA[https://cybernoz.com/top-five-sales-challenges-costing-msps-cybersecurity-revenue/]]></link>
			<title>Top Five Sales Challenges Costing MSPs Cybersecurity Revenue</title>
			<pubDate><![CDATA[Sat, 02 May 2026 05:20:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/vernon-building-society-uses-ai-to-amplify-human-touch/]]></guid>
			<link><![CDATA[https://cybernoz.com/vernon-building-society-uses-ai-to-amplify-human-touch/]]></link>
			<title>Vernon Building Society uses AI to amplify human touch</title>
			<pubDate><![CDATA[Sat, 02 May 2026 05:15:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/openais-latest-ai-models-codex-now-available-on-amazon-bedrock/]]></guid>
			<link><![CDATA[https://cybernoz.com/openais-latest-ai-models-codex-now-available-on-amazon-bedrock/]]></link>
			<title>OpenAI&#8217;s latest AI models, Codex now available on Amazon Bedrock</title>
			<pubDate><![CDATA[Sat, 02 May 2026 05:00:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/sophisticated-deepdoor-backdoor-enables-espionage-disruption/]]></guid>
			<link><![CDATA[https://cybernoz.com/sophisticated-deepdoor-backdoor-enables-espionage-disruption/]]></link>
			<title>Sophisticated Deep#Door Backdoor Enables Espionage, Disruption</title>
			<pubDate><![CDATA[Sat, 02 May 2026 04:50:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/us-and-allies-urge-careful-adoption-of-ai-agents/]]></guid>
			<link><![CDATA[https://cybernoz.com/us-and-allies-urge-careful-adoption-of-ai-agents/]]></link>
			<title>US and allies urge ‘careful adoption’ of AI agents</title>
			<pubDate><![CDATA[Sat, 02 May 2026 04:00:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/essential-data-sources-for-detection-beyond-the-endpoint/]]></guid>
			<link><![CDATA[https://cybernoz.com/essential-data-sources-for-detection-beyond-the-endpoint/]]></link>
			<title>Essential Data Sources for Detection Beyond the Endpoint</title>
			<pubDate><![CDATA[Sat, 02 May 2026 03:25:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/ai-agents-can-bypass-guardrails-and-put-credentials-at-risk-okta-study-finds/]]></guid>
			<link><![CDATA[https://cybernoz.com/ai-agents-can-bypass-guardrails-and-put-credentials-at-risk-okta-study-finds/]]></link>
			<title>AI agents can bypass guardrails and put credentials at risk, Okta study finds</title>
			<pubDate><![CDATA[Sat, 02 May 2026 02:55:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/abs-consulting-acquires-rmc-global-to-deepen-critical-infrastructure-protection-and-resiliency-expertise/]]></guid>
			<link><![CDATA[https://cybernoz.com/abs-consulting-acquires-rmc-global-to-deepen-critical-infrastructure-protection-and-resiliency-expertise/]]></link>
			<title>ABS Consulting acquires RMC Global to deepen critical infrastructure protection and resiliency expertise</title>
			<pubDate><![CDATA[Sat, 02 May 2026 02:30:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/what-the-nvd-slowdown-means-for-you-how-to-stay-ahead-in-vulnerability-management/]]></guid>
			<link><![CDATA[https://cybernoz.com/what-the-nvd-slowdown-means-for-you-how-to-stay-ahead-in-vulnerability-management/]]></link>
			<title>What the NVD ‘Slowdown’ Means For You: How to Stay Ahead in Vulnerability Management</title>
			<pubDate><![CDATA[Sat, 02 May 2026 02:20:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/handling-the-vulnerability-surge-in-the-post-mythos-era/]]></guid>
			<link><![CDATA[https://cybernoz.com/handling-the-vulnerability-surge-in-the-post-mythos-era/]]></link>
			<title>Handling the Vulnerability Surge in the Post-Mythos Era</title>
			<pubDate><![CDATA[Sat, 02 May 2026 02:15:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/microsoft-tests-modern-windows-run-says-its-faster-than-legacy-dialog/]]></guid>
			<link><![CDATA[https://cybernoz.com/microsoft-tests-modern-windows-run-says-its-faster-than-legacy-dialog/]]></link>
			<title>Microsoft tests modern Windows Run, says it&#8217;s faster than legacy dialog</title>
			<pubDate><![CDATA[Sat, 02 May 2026 02:05:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/the-agency-mirage-why-ai-needs-real-engineering/]]></guid>
			<link><![CDATA[https://cybernoz.com/the-agency-mirage-why-ai-needs-real-engineering/]]></link>
			<title>The Agency Mirage: Why AI Needs Real Engineering</title>
			<pubDate><![CDATA[Sat, 02 May 2026 02:00:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/captcha-and-clickfix-abuse-fuels-credential-theft-surge/]]></guid>
			<link><![CDATA[https://cybernoz.com/captcha-and-clickfix-abuse-fuels-credential-theft-surge/]]></link>
			<title>CAPTCHA and ClickFix Abuse Fuels Credential Theft Surge</title>
			<pubDate><![CDATA[Sat, 02 May 2026 01:20:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/hackers-use-jenkins-access-to-deploy-ddos-botnet-against-gaming-servers/]]></guid>
			<link><![CDATA[https://cybernoz.com/hackers-use-jenkins-access-to-deploy-ddos-botnet-against-gaming-servers/]]></link>
			<title>Hackers Use Jenkins Access to Deploy DDoS Botnet Against Gaming Servers</title>
			<pubDate><![CDATA[Sat, 02 May 2026 01:05:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/nine-year-old-linux-kernel-flaw-enables-reliable-local-privilege-escalation-cve-2026-31431/]]></guid>
			<link><![CDATA[https://cybernoz.com/nine-year-old-linux-kernel-flaw-enables-reliable-local-privilege-escalation-cve-2026-31431/]]></link>
			<title>Nine-year-old Linux kernel flaw enables reliable local privilege escalation (CVE-2026-31431)</title>
			<pubDate><![CDATA[Sat, 02 May 2026 00:45:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/china-linked-hackers-target-asian-governments-nato-state-journalists-and-activists/]]></guid>
			<link><![CDATA[https://cybernoz.com/china-linked-hackers-target-asian-governments-nato-state-journalists-and-activists/]]></link>
			<title>China-Linked Hackers Target Asian Governments, NATO State, Journalists, and Activists</title>
			<pubDate><![CDATA[Sat, 02 May 2026 00:35:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/umbrella-companies-not-working-for-it-contractors-survey-finds/]]></guid>
			<link><![CDATA[https://cybernoz.com/umbrella-companies-not-working-for-it-contractors-survey-finds/]]></link>
			<title>Umbrella companies not working for IT contractors, survey finds</title>
			<pubDate><![CDATA[Sat, 02 May 2026 00:30:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/two-us-security-experts-sentenced-to-prison-for-helping-ransomware-gang/]]></guid>
			<link><![CDATA[https://cybernoz.com/two-us-security-experts-sentenced-to-prison-for-helping-ransomware-gang/]]></link>
			<title>Two US Security Experts Sentenced to Prison for Helping Ransomware Gang</title>
			<pubDate><![CDATA[Sat, 02 May 2026 00:05:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/anthropic-launches-claude-security-to-counter-rapid-ai-powered-exploits/]]></guid>
			<link><![CDATA[https://cybernoz.com/anthropic-launches-claude-security-to-counter-rapid-ai-powered-exploits/]]></link>
			<title>Anthropic launches Claude Security to counter rapid AI-Powered exploits</title>
			<pubDate><![CDATA[Sat, 02 May 2026 00:00:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/white-house-questions-tech-industry-on-defensive-ai-use-cybersecurity-resilience/]]></guid>
			<link><![CDATA[https://cybernoz.com/white-house-questions-tech-industry-on-defensive-ai-use-cybersecurity-resilience/]]></link>
			<title>White House questions tech industry on defensive AI use, cybersecurity resilience</title>
			<pubDate><![CDATA[Fri, 01 May 2026 23:15:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/windows-shell-spoofing-vulnerability-puts-sensitive-data-at-risk/]]></guid>
			<link><![CDATA[https://cybernoz.com/windows-shell-spoofing-vulnerability-puts-sensitive-data-at-risk/]]></link>
			<title>Windows shell spoofing vulnerability puts sensitive data at risk</title>
			<pubDate><![CDATA[Fri, 01 May 2026 22:10:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/ubuntu-infrastructure-has-been-down-for-more-than-a-day/]]></guid>
			<link><![CDATA[https://cybernoz.com/ubuntu-infrastructure-has-been-down-for-more-than-a-day/]]></link>
			<title>Ubuntu infrastructure has been down for more than a day</title>
			<pubDate><![CDATA[Fri, 01 May 2026 22:00:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/txone-networks-unveils-sennin-platform-to-bridge-persistent-divide-between-ot-risk-assessment-and-action/]]></guid>
			<link><![CDATA[https://cybernoz.com/txone-networks-unveils-sennin-platform-to-bridge-persistent-divide-between-ot-risk-assessment-and-action/]]></link>
			<title>TXOne Networks unveils Sennin platform to bridge persistent divide between OT risk assessment and action</title>
			<pubDate><![CDATA[Fri, 01 May 2026 21:50:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/tenable-updates-tenable-one-platform-with-simplified-pricing-modular-packaging-as-ai-intensifies-landscape/]]></guid>
			<link><![CDATA[https://cybernoz.com/tenable-updates-tenable-one-platform-with-simplified-pricing-modular-packaging-as-ai-intensifies-landscape/]]></link>
			<title>Tenable updates Tenable One platform with simplified pricing, modular packaging as AI intensifies landscape</title>
			<pubDate><![CDATA[Fri, 01 May 2026 21:45:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/social-engineering-leveled-up-has-your-security-program/]]></guid>
			<link><![CDATA[https://cybernoz.com/social-engineering-leveled-up-has-your-security-program/]]></link>
			<title>Social Engineering Leveled Up. Has Your Security Program?</title>
			<pubDate><![CDATA[Fri, 01 May 2026 21:30:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/15-year-old-detained-over-french-govt-agency-data-breach/]]></guid>
			<link><![CDATA[https://cybernoz.com/15-year-old-detained-over-french-govt-agency-data-breach/]]></link>
			<title>15-year-old detained over French govt agency data breach</title>
			<pubDate><![CDATA[Fri, 01 May 2026 21:20:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/ai-agent-fails-lessons-learned/]]></guid>
			<link><![CDATA[https://cybernoz.com/ai-agent-fails-lessons-learned/]]></link>
			<title>AI Agent fails lessons learned</title>
			<pubDate><![CDATA[Fri, 01 May 2026 21:00:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/dangerous-new-linux-exploit-gives-attackers-root-access-to-countless-computers/]]></guid>
			<link><![CDATA[https://cybernoz.com/dangerous-new-linux-exploit-gives-attackers-root-access-to-countless-computers/]]></link>
			<title>Dangerous New Linux Exploit Gives Attackers Root Access to Countless Computers</title>
			<pubDate><![CDATA[Fri, 01 May 2026 20:50:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/criminal-ip-securonix-threatq-boost-threat-intelligence/]]></guid>
			<link><![CDATA[https://cybernoz.com/criminal-ip-securonix-threatq-boost-threat-intelligence/]]></link>
			<title>Criminal IP &#038; Securonix ThreatQ Boost Threat Intelligence</title>
			<pubDate><![CDATA[Fri, 01 May 2026 20:35:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/45000-attacks-5300-backdoors-tied-to-china-linked-cybercrime-operation/]]></guid>
			<link><![CDATA[https://cybernoz.com/45000-attacks-5300-backdoors-tied-to-china-linked-cybercrime-operation/]]></link>
			<title>45,000 Attacks, 5,300+ Backdoors Tied to China-Linked Cybercrime Operation</title>
			<pubDate><![CDATA[Fri, 01 May 2026 20:20:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/new-infosec-products-of-the-month-april-2026/]]></guid>
			<link><![CDATA[https://cybernoz.com/new-infosec-products-of-the-month-april-2026/]]></link>
			<title>New infosec products of the month: April 2026</title>
			<pubDate><![CDATA[Fri, 01 May 2026 20:00:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/30000-facebook-accounts-hacked-via-google-appsheet-phishing-campaign/]]></guid>
			<link><![CDATA[https://cybernoz.com/30000-facebook-accounts-hacked-via-google-appsheet-phishing-campaign/]]></link>
			<title>30,000 Facebook Accounts Hacked via Google AppSheet Phishing Campaign</title>
			<pubDate><![CDATA[Fri, 01 May 2026 19:50:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/iam-tools-help-oracle-red-bull-racing-keep-pace-with-strict-f1-regulations/]]></guid>
			<link><![CDATA[https://cybernoz.com/iam-tools-help-oracle-red-bull-racing-keep-pace-with-strict-f1-regulations/]]></link>
			<title>IAM tools help Oracle Red Bull Racing keep pace with strict F1 regulations</title>
			<pubDate><![CDATA[Fri, 01 May 2026 19:45:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/why-backing-up-your-microsoft-365-data-is-only-half-the-job/]]></guid>
			<link><![CDATA[https://cybernoz.com/why-backing-up-your-microsoft-365-data-is-only-half-the-job/]]></link>
			<title>Why Backing Up Your Microsoft 365 Data Is Only Half the Job</title>
			<pubDate><![CDATA[Fri, 01 May 2026 19:30:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/in-other-news-scattered-spider-hacker-arrested-soc-effectiveness-metrics-nsa-tool-vulnerability/]]></guid>
			<link><![CDATA[https://cybernoz.com/in-other-news-scattered-spider-hacker-arrested-soc-effectiveness-metrics-nsa-tool-vulnerability/]]></link>
			<title>In Other News: Scattered Spider Hacker Arrested, SOC Effectiveness Metrics, NSA Tool Vulnerability </title>
			<pubDate><![CDATA[Fri, 01 May 2026 19:20:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/digital-attacks-drive-a-new-wave-of-cargo-theft-fbi-says/]]></guid>
			<link><![CDATA[https://cybernoz.com/digital-attacks-drive-a-new-wave-of-cargo-theft-fbi-says/]]></link>
			<title>Digital attacks drive a new wave of cargo theft, FBI says</title>
			<pubDate><![CDATA[Fri, 01 May 2026 19:15:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/as-email-phishing-evolves-malicious-attachments-decline-and-qr-codes-surge/]]></guid>
			<link><![CDATA[https://cybernoz.com/as-email-phishing-evolves-malicious-attachments-decline-and-qr-codes-surge/]]></link>
			<title>As email phishing evolves, malicious attachments decline and QR codes surge</title>
			<pubDate><![CDATA[Fri, 01 May 2026 18:30:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/us-government-allies-publish-guidance-on-how-to-safely-deploy-ai-agents/]]></guid>
			<link><![CDATA[https://cybernoz.com/us-government-allies-publish-guidance-on-how-to-safely-deploy-ai-agents/]]></link>
			<title>US government, allies publish guidance on how to safely deploy AI agents</title>
			<pubDate><![CDATA[Fri, 01 May 2026 18:25:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/just-34-of-cyber-pros-plan-to-stick-with-their-current-employer/]]></guid>
			<link><![CDATA[https://cybernoz.com/just-34-of-cyber-pros-plan-to-stick-with-their-current-employer/]]></link>
			<title>Just 34% of cyber pros plan to stick with their current employer</title>
			<pubDate><![CDATA[Fri, 01 May 2026 17:25:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/amid-mythos-hyped-cybersecurity-prowess-researchers-find-gpt-5-5-is-just-as-good/]]></guid>
			<link><![CDATA[https://cybernoz.com/amid-mythos-hyped-cybersecurity-prowess-researchers-find-gpt-5-5-is-just-as-good/]]></link>
			<title>Amid Mythos&#8217; hyped cybersecurity prowess, researchers find GPT-5.5 is just as good</title>
			<pubDate><![CDATA[Fri, 01 May 2026 17:15:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/isa-names-palindrome-technologies-as-iso-iec-17065-isasecure-certification-body-advancing-industrial-cybersecurity-standards/]]></guid>
			<link><![CDATA[https://cybernoz.com/isa-names-palindrome-technologies-as-iso-iec-17065-isasecure-certification-body-advancing-industrial-cybersecurity-standards/]]></link>
			<title>ISA names Palindrome Technologies as ISO/IEC 17065 ISASecure certification body, advancing industrial cybersecurity standards</title>
			<pubDate><![CDATA[Fri, 01 May 2026 17:05:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/lawmakers-open-inquiry-into-cybersecurity-risks-posed-by-prc-origin-ai-models-deployed-in-critical-infrastructure-systems/]]></guid>
			<link><![CDATA[https://cybernoz.com/lawmakers-open-inquiry-into-cybersecurity-risks-posed-by-prc-origin-ai-models-deployed-in-critical-infrastructure-systems/]]></link>
			<title>Lawmakers open inquiry into cybersecurity risks posed by PRC-origin AI models deployed in critical infrastructure systems</title>
			<pubDate><![CDATA[Fri, 01 May 2026 17:00:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/risk-scenarios-for-the-uss-strategic-pivot/]]></guid>
			<link><![CDATA[https://cybernoz.com/risk-scenarios-for-the-uss-strategic-pivot/]]></link>
			<title>Risk Scenarios for the US’s Strategic Pivot</title>
			<pubDate><![CDATA[Fri, 01 May 2026 16:50:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/evolution-of-usb-borne-malware-raspberry-robin/]]></guid>
			<link><![CDATA[https://cybernoz.com/evolution-of-usb-borne-malware-raspberry-robin/]]></link>
			<title>Evolution of USB-Borne Malware, Raspberry Robin</title>
			<pubDate><![CDATA[Fri, 01 May 2026 16:45:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/etherrat-campaign-uses-seo-poisoning-and-github-facades-to-target-enterprise-admins/]]></guid>
			<link><![CDATA[https://cybernoz.com/etherrat-campaign-uses-seo-poisoning-and-github-facades-to-target-enterprise-admins/]]></link>
			<title>EtherRAT Campaign Uses SEO Poisoning and GitHub Facades to Target Enterprise Admins</title>
			<pubDate><![CDATA[Fri, 01 May 2026 16:30:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/bridewell-first-cni-cyber-security/]]></guid>
			<link><![CDATA[https://cybernoz.com/bridewell-first-cni-cyber-security/]]></link>
			<title>Bridewell FIRST CNI cyber security</title>
			<pubDate><![CDATA[Fri, 01 May 2026 16:15:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/etherrat-uses-seo-poisoning-and-fake-github-pages-to-target-enterprise-admins/]]></guid>
			<link><![CDATA[https://cybernoz.com/etherrat-uses-seo-poisoning-and-fake-github-pages-to-target-enterprise-admins/]]></link>
			<title>EtherRAT Uses SEO Poisoning and Fake GitHub Pages to Target Enterprise Admins</title>
			<pubDate><![CDATA[Fri, 01 May 2026 15:50:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/criminal-ip-and-securonix-threatq-collaborate-to-enhance-threat-intelligence-operations/]]></guid>
			<link><![CDATA[https://cybernoz.com/criminal-ip-and-securonix-threatq-collaborate-to-enhance-threat-intelligence-operations/]]></link>
			<title>Criminal IP and Securonix ThreatQ Collaborate to Enhance Threat Intelligence Operations</title>
			<pubDate><![CDATA[Fri, 01 May 2026 15:35:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/ethical-hacking-gone-wrong-in-1999-french-software-engineer-looks-back/]]></guid>
			<link><![CDATA[https://cybernoz.com/ethical-hacking-gone-wrong-in-1999-french-software-engineer-looks-back/]]></link>
			<title>Ethical Hacking Gone Wrong In 1999: French Software Engineer Looks Back</title>
			<pubDate><![CDATA[Fri, 01 May 2026 15:20:05 +0000]]></pubDate>
		</item>
				</channel>
</rss>
