<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 7, 2026 at 10:14 am by All in One SEO Pro v4.9.5.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://cybernoz.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Cybernoz</title>
		<link><![CDATA[https://cybernoz.com]]></link>
		<description><![CDATA[Cybernoz]]></description>
		<lastBuildDate><![CDATA[Tue, 07 Apr 2026 07:10:10 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://cybernoz.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://cybernoz.com/openai-codex-command-injection-vulnerability-let-attackers-steal-github-user-access-tokens/]]></guid>
			<link><![CDATA[https://cybernoz.com/openai-codex-command-injection-vulnerability-let-attackers-steal-github-user-access-tokens/]]></link>
			<title>OpenAI Codex Command Injection Vulnerability Let Attackers Steal GitHub User Access Tokens</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 07:10:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/new-microsoft-defender-update-issued-for-windows-11-windows-10-and-server-images/]]></guid>
			<link><![CDATA[https://cybernoz.com/new-microsoft-defender-update-issued-for-windows-11-windows-10-and-server-images/]]></link>
			<title>New Microsoft Defender Update Issued for Windows 11, Windows 10, and Server Images</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 06:30:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/the-case-for-fixing-cwe-weakness-patterns-instead-of-patching-one-bug-at-a-time/]]></guid>
			<link><![CDATA[https://cybernoz.com/the-case-for-fixing-cwe-weakness-patterns-instead-of-patching-one-bug-at-a-time/]]></link>
			<title>The case for fixing CWE weakness patterns instead of patching one bug at a time</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 05:55:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/how-litellm-turned-developer-machines-into-credential-vaults-for-attackers/]]></guid>
			<link><![CDATA[https://cybernoz.com/how-litellm-turned-developer-machines-into-credential-vaults-for-attackers/]]></link>
			<title>How LiteLLM Turned Developer Machines Into Credential Vaults for Attackers</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 05:45:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/dont-wait-for-2027-make-your-smart-product-security-visible-now/]]></guid>
			<link><![CDATA[https://cybernoz.com/dont-wait-for-2027-make-your-smart-product-security-visible-now/]]></link>
			<title>Don’t wait for 2027 – make your smart product security visible now</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 05:25:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/escaping-the-cots-trap-cso-online/]]></guid>
			<link><![CDATA[https://cybernoz.com/escaping-the-cots-trap-cso-online/]]></link>
			<title>Escaping the COTS trap | CSO Online</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 03:20:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/chaos-to-clarity-how-our-community-helped-transform-siem/]]></guid>
			<link><![CDATA[https://cybernoz.com/chaos-to-clarity-how-our-community-helped-transform-siem/]]></link>
			<title>Chaos to Clarity: How Our Community Helped Transform SIEM</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 02:40:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/german-authorities-identify-revil-and-gangcrab-ransomware-bosses/]]></guid>
			<link><![CDATA[https://cybernoz.com/german-authorities-identify-revil-and-gangcrab-ransomware-bosses/]]></link>
			<title>German authorities identify REvil and GangCrab ransomware bosses</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 02:30:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/hackers-drain-286-million-from-drift-protocol-in-suspected-north-korea-linked-exploit/]]></guid>
			<link><![CDATA[https://cybernoz.com/hackers-drain-286-million-from-drift-protocol-in-suspected-north-korea-linked-exploit/]]></link>
			<title>Hackers Drain $286 Million From Drift Protocol in Suspected North Korea-Linked Exploit</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 02:25:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/drift-protocol-hit-in-286m-suspected-north-korea-linked-crypto-heist/]]></guid>
			<link><![CDATA[https://cybernoz.com/drift-protocol-hit-in-286m-suspected-north-korea-linked-crypto-heist/]]></link>
			<title>Drift Protocol Hit in $286M Suspected North Korea-Linked Crypto Heist</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 01:45:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/why-security-researchers-and-red-teams-are-turning-to-workflow-automation/]]></guid>
			<link><![CDATA[https://cybernoz.com/why-security-researchers-and-red-teams-are-turning-to-workflow-automation/]]></link>
			<title>Why Security Researchers and Red Teams Are Turning to Workflow Automation</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 01:30:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/dprk-linked-hackers-use-github-as-c2-in-multi-stage-attacks-targeting-south-korea/]]></guid>
			<link><![CDATA[https://cybernoz.com/dprk-linked-hackers-use-github-as-c2-in-multi-stage-attacks-targeting-south-korea/]]></link>
			<title>DPRK-Linked Hackers Use GitHub as C2 in Multi-Stage Attacks Targeting South Korea</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 01:00:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/australia-plays-hardball-on-social-media-ban/]]></guid>
			<link><![CDATA[https://cybernoz.com/australia-plays-hardball-on-social-media-ban/]]></link>
			<title>Australia plays hardball on social media ban</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 00:40:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/north-korean-hackers-target-high-profile-node-js-maintainers/]]></guid>
			<link><![CDATA[https://cybernoz.com/north-korean-hackers-target-high-profile-node-js-maintainers/]]></link>
			<title>North Korean Hackers Target High-Profile Node.js Maintainers</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 00:30:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/phishing-lnk-files-and-github-c2-power-new-dprk-cyber-attacks/]]></guid>
			<link><![CDATA[https://cybernoz.com/phishing-lnk-files-and-github-c2-power-new-dprk-cyber-attacks/]]></link>
			<title>Phishing LNK files and GitHub C2 power new DPRK cyber attacks</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 00:25:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/critical-flaw-in-forticlient-ems-under-exploitation/]]></guid>
			<link><![CDATA[https://cybernoz.com/critical-flaw-in-forticlient-ems-under-exploitation/]]></link>
			<title>Critical flaw in FortiClient EMS under exploitation</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 23:40:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/fortinet-customers-confront-actively-exploited-zero-day-with-a-full-patch-still-pending/]]></guid>
			<link><![CDATA[https://cybernoz.com/fortinet-customers-confront-actively-exploited-zero-day-with-a-full-patch-still-pending/]]></link>
			<title>Fortinet customers confront actively exploited zero-day, with a full patch still pending</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 23:35:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/6-ways-attackers-abuse-ai-services-to-hack-your-business/]]></guid>
			<link><![CDATA[https://cybernoz.com/6-ways-attackers-abuse-ai-services-to-hack-your-business/]]></link>
			<title>6 ways attackers abuse AI services to hack your business</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 22:35:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/convicted-spyware-maker-bryan-fleming-avoids-jail-at-sentencing/]]></guid>
			<link><![CDATA[https://cybernoz.com/convicted-spyware-maker-bryan-fleming-avoids-jail-at-sentencing/]]></link>
			<title>Convicted spyware maker Bryan Fleming avoids jail at sentencing</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 22:30:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/product-manager-at-recorded-future/]]></guid>
			<link><![CDATA[https://cybernoz.com/product-manager-at-recorded-future/]]></link>
			<title>Product Manager at Recorded Future</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 22:01:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/cve-2026-35616-fortinet-forticlientems-zero-day-exploited/]]></guid>
			<link><![CDATA[https://cybernoz.com/cve-2026-35616-fortinet-forticlientems-zero-day-exploited/]]></link>
			<title>CVE-2026-35616 Fortinet FortiClientEMS zero-day exploited</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 21:55:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/new-gpubreach-attack-enables-system-takeover-via-gpu-rowhammer/]]></guid>
			<link><![CDATA[https://cybernoz.com/new-gpubreach-attack-enables-system-takeover-via-gpu-rowhammer/]]></link>
			<title>New GPUBreach attack enables system takeover via GPU rowhammer</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 21:45:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/trojanized-pypi-ai-proxy-uses-stolen-claude-prompt-to-exfiltrates-data/]]></guid>
			<link><![CDATA[https://cybernoz.com/trojanized-pypi-ai-proxy-uses-stolen-claude-prompt-to-exfiltrates-data/]]></link>
			<title>Trojanized PyPI AI Proxy Uses Stolen Claude Prompt to Exfiltrates Data</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 21:40:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/border-patrol-agents-sold-challenge-coins-with-charlottes-web-characters-in-riot-gear/]]></guid>
			<link><![CDATA[https://cybernoz.com/border-patrol-agents-sold-challenge-coins-with-charlottes-web-characters-in-riot-gear/]]></link>
			<title>Border Patrol Agents Sold Challenge Coins With ‘Charlotte’s Web’ Characters in Riot Gear</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 21:15:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/google-brings-lazy-loading-to-media-files-in-new-chrome-release/]]></guid>
			<link><![CDATA[https://cybernoz.com/google-brings-lazy-loading-to-media-files-in-new-chrome-release/]]></link>
			<title>Google Brings Lazy Loading to Media Files in New Chrome Release</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 21:00:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/missile-alert-phishing-exploits-iran-us-israel-conflict-for-microsoft-logins/]]></guid>
			<link><![CDATA[https://cybernoz.com/missile-alert-phishing-exploits-iran-us-israel-conflict-for-microsoft-logins/]]></link>
			<title>Missile Alert Phishing Exploits Iran-US-Israel Conflict for Microsoft Logins</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 20:45:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/iran-linked-password-spraying-campaign-targets-300-israeli-microsoft-365-organizations/]]></guid>
			<link><![CDATA[https://cybernoz.com/iran-linked-password-spraying-campaign-targets-300-israeli-microsoft-365-organizations/]]></link>
			<title>Iran-Linked Password-Spraying Campaign Targets 300+ Israeli Microsoft 365 Organizations</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 20:15:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/fcc-fines-firm-over-scam-calls/]]></guid>
			<link><![CDATA[https://cybernoz.com/fcc-fines-firm-over-scam-calls/]]></link>
			<title>FCC Fines Firm Over Scam Calls</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 20:05:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/education-authority-cyberattack-hits-n-ireland-schools/]]></guid>
			<link><![CDATA[https://cybernoz.com/education-authority-cyberattack-hits-n-ireland-schools/]]></link>
			<title>Education Authority Cyberattack Hits N. Ireland Schools</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 20:00:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/cba-onboards-customers-with-nfc-scans-of-epassports/]]></guid>
			<link><![CDATA[https://cybernoz.com/cba-onboards-customers-with-nfc-scans-of-epassports/]]></link>
			<title>CBA onboards customers with NFC scans of ePassports</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 19:55:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/google-deepmind-researchers-map-web-attacks-against-ai-agents/]]></guid>
			<link><![CDATA[https://cybernoz.com/google-deepmind-researchers-map-web-attacks-against-ai-agents/]]></link>
			<title>Google DeepMind Researchers Map Web Attacks Against AI Agents</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 19:45:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/attackers-exploit-rce-flaw-as-14000-f5-big-ip-apm-instances-remain-exposed/]]></guid>
			<link><![CDATA[https://cybernoz.com/attackers-exploit-rce-flaw-as-14000-f5-big-ip-apm-instances-remain-exposed/]]></link>
			<title>Attackers Exploit RCE Flaw as 14,000 F5 BIG-IP APM Instances Remain Exposed</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 19:40:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/hims-hers-says-limited-data-stolen-in-social-engineering-attack/]]></guid>
			<link><![CDATA[https://cybernoz.com/hims-hers-says-limited-data-stolen-in-social-engineering-attack/]]></link>
			<title>Hims &#038; Hers says limited data stolen in social engineering attack</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 18:55:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/pctattletale-stalkerware-maker-sentence-includes-fine-supervised-release/]]></guid>
			<link><![CDATA[https://cybernoz.com/pctattletale-stalkerware-maker-sentence-includes-fine-supervised-release/]]></link>
			<title>pcTattleTale stalkerware maker sentence includes fine, supervised release</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 18:50:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/authentication-is-broken-heres-how-security-leaders-can-actually-fix-it/]]></guid>
			<link><![CDATA[https://cybernoz.com/authentication-is-broken-heres-how-security-leaders-can-actually-fix-it/]]></link>
			<title>Authentication is broken: Here’s how security leaders can actually fix it</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 17:50:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/ticket-savings-of-up-to-500-this-week-for-disrupt-2026/]]></guid>
			<link><![CDATA[https://cybernoz.com/ticket-savings-of-up-to-500-this-week-for-disrupt-2026/]]></link>
			<title>Ticket savings of up to $500 this week for Disrupt 2026</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 17:45:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/youre-the-why-behind-the-huntress-hub/]]></guid>
			<link><![CDATA[https://cybernoz.com/youre-the-why-behind-the-huntress-hub/]]></link>
			<title>You’re the “Why” Behind the Huntress Hub</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 17:10:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/microsoft-links-medusa-ransomware-affiliate-to-zero-day-attacks/]]></guid>
			<link><![CDATA[https://cybernoz.com/microsoft-links-medusa-ransomware-affiliate-to-zero-day-attacks/]]></link>
			<title>Microsoft links Medusa ransomware affiliate to zero-day attacks</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 17:00:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/cisa-warns-of-fortinet-0-day-vulnerability-actively-exploited-in-attacks/]]></guid>
			<link><![CDATA[https://cybernoz.com/cisa-warns-of-fortinet-0-day-vulnerability-actively-exploited-in-attacks/]]></link>
			<title>CISA Warns of Fortinet 0-Day Vulnerability Actively Exploited in Attacks</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 16:55:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/trojanized-pypi-ai-proxy-steals-claude-prompt-exfiltrates-data/]]></guid>
			<link><![CDATA[https://cybernoz.com/trojanized-pypi-ai-proxy-steals-claude-prompt-exfiltrates-data/]]></link>
			<title>Trojanized PyPI AI Proxy Steals Claude Prompt, Exfiltrates Data</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 16:15:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/cloudflare-targets-wordpress-with-new-ai-powered-emdash-cms/]]></guid>
			<link><![CDATA[https://cybernoz.com/cloudflare-targets-wordpress-with-new-ai-powered-emdash-cms/]]></link>
			<title>Cloudflare Targets WordPress With New AI-Powered EmDash CMS</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 16:00:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/this-is-how-they-tell-me-the-world-ends/]]></guid>
			<link><![CDATA[https://cybernoz.com/this-is-how-they-tell-me-the-world-ends/]]></link>
			<title>This Is How They Tell Me The World Ends</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 15:45:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/it-talent-looks-the-other-way-as-wireless-security-incidents-pile-up/]]></guid>
			<link><![CDATA[https://cybernoz.com/it-talent-looks-the-other-way-as-wireless-security-incidents-pile-up/]]></link>
			<title>IT talent looks the other way as wireless security incidents pile up</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 15:40:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/how-socs-close-a-critical-risk-in-3-steps/]]></guid>
			<link><![CDATA[https://cybernoz.com/how-socs-close-a-critical-risk-in-3-steps/]]></link>
			<title>How SOCs Close a Critical Risk in 3 Steps</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 15:30:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/european-commission-cloud-breach-stolen-data-posted-online/]]></guid>
			<link><![CDATA[https://cybernoz.com/european-commission-cloud-breach-stolen-data-posted-online/]]></link>
			<title>European Commission Cloud Breach: Stolen Data Posted Online</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 15:20:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/phishing-emails-cyberattacks-drive-75-of-attacks-uae-warns/]]></guid>
			<link><![CDATA[https://cybernoz.com/phishing-emails-cyberattacks-drive-75-of-attacks-uae-warns/]]></link>
			<title>Phishing Emails Cyberattacks Drive 75% Of Attacks, UAE Warns</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 15:15:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/guardarian-users-targeted-with-malicious-strapi-npm-packages/]]></guid>
			<link><![CDATA[https://cybernoz.com/guardarian-users-targeted-with-malicious-strapi-npm-packages/]]></link>
			<title>Guardarian Users Targeted With Malicious Strapi NPM Packages</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 15:00:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/bka-unmasks-two-revil-ransomware-operators-behind-130-german-attacks/]]></guid>
			<link><![CDATA[https://cybernoz.com/bka-unmasks-two-revil-ransomware-operators-behind-130-german-attacks/]]></link>
			<title>BKA unmasks two REvil Ransomware operators behind 130+ German attacks</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 14:55:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/north-korean-hackers-abuse-lnks-and-github-repos-in-ongoing-campaign/]]></guid>
			<link><![CDATA[https://cybernoz.com/north-korean-hackers-abuse-lnks-and-github-repos-in-ongoing-campaign/]]></link>
			<title>North Korean hackers abuse LNKs and GitHub repos in ongoing campaign</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 13:05:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/check-point-tracks-iranian-password-spraying-waves-targeting-government-and-energy-sectors-in-israel-and-uae/]]></guid>
			<link><![CDATA[https://cybernoz.com/check-point-tracks-iranian-password-spraying-waves-targeting-government-and-energy-sectors-in-israel-and-uae/]]></link>
			<title>Check Point tracks Iranian password-spraying waves targeting government and energy sectors in Israel and UAE</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 12:45:07 +0000]]></pubDate>
		</item>
				</channel>
</rss>
