<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 13, 2026 at 3:52 pm by All in One SEO Pro v4.9.5.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://cybernoz.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Cybernoz</title>
		<link><![CDATA[https://cybernoz.com]]></link>
		<description><![CDATA[Cybernoz]]></description>
		<lastBuildDate><![CDATA[Sun, 12 Apr 2026 02:35:21 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://cybernoz.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://cybernoz.com/patch-windows-collapse-as-time-to-exploit-accelerates/]]></guid>
			<link><![CDATA[https://cybernoz.com/patch-windows-collapse-as-time-to-exploit-accelerates/]]></link>
			<title>Patch windows collapse as time-to-exploit accelerates</title>
			<pubDate><![CDATA[Sun, 12 Apr 2026 02:35:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/seven-ibm-websphere-liberty-flaws-can-be-chained-into-full-takeover/]]></guid>
			<link><![CDATA[https://cybernoz.com/seven-ibm-websphere-liberty-flaws-can-be-chained-into-full-takeover/]]></link>
			<title>Seven IBM WebSphere Liberty flaws can be chained into full takeover</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 11:55:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/cyber-resilience-moves-beyond-incident-response-as-ai-threats-and-third-party-risks-grow/]]></guid>
			<link><![CDATA[https://cybernoz.com/cyber-resilience-moves-beyond-incident-response-as-ai-threats-and-third-party-risks-grow/]]></link>
			<title>Cyber resilience moves beyond incident response as AI threats and third-party risks grow</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 11:35:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/ndis-commission-to-have-a-new-intelligent-risk-engine-by-august/]]></guid>
			<link><![CDATA[https://cybernoz.com/ndis-commission-to-have-a-new-intelligent-risk-engine-by-august/]]></link>
			<title>NDIS Commission to have a new intelligent risk engine by August</title>
			<pubDate><![CDATA[Sun, 12 Apr 2026 23:40:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/ransomware-groups-standardize-double-extortion-and-ai-assisted-targeting-cyfirma-reports/]]></guid>
			<link><![CDATA[https://cybernoz.com/ransomware-groups-standardize-double-extortion-and-ai-assisted-targeting-cyfirma-reports/]]></link>
			<title>Ransomware groups standardize double extortion and AI-assisted targeting, Cyfirma reports</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 11:30:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/from-south-park-to-curriculaville/]]></guid>
			<link><![CDATA[https://cybernoz.com/from-south-park-to-curriculaville/]]></link>
			<title>From South Park to Curriculaville</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 11:15:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/apt37-abuses-facebook-telegram-and-tampered-installer-in-new-targeted-intrusion-attack/]]></guid>
			<link><![CDATA[https://cybernoz.com/apt37-abuses-facebook-telegram-and-tampered-installer-in-new-targeted-intrusion-attack/]]></link>
			<title>APT37 Abuses Facebook, Telegram, and Tampered Installer in New Targeted Intrusion Attack</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 11:00:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/security-affairs-malware-newsletter-round-92/]]></guid>
			<link><![CDATA[https://cybernoz.com/security-affairs-malware-newsletter-round-92/]]></link>
			<title>SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 92</title>
			<pubDate><![CDATA[Sun, 12 Apr 2026 23:25:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/the-dumbest-hack-of-the-year-exposed-a-very-real-problem/]]></guid>
			<link><![CDATA[https://cybernoz.com/the-dumbest-hack-of-the-year-exposed-a-very-real-problem/]]></link>
			<title>The Dumbest Hack of the Year Exposed a Very Real Problem</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 10:35:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/vipertunnel-python-backdoor-hidden-in-fake-dll-obfuscated-loader-chain/]]></guid>
			<link><![CDATA[https://cybernoz.com/vipertunnel-python-backdoor-hidden-in-fake-dll-obfuscated-loader-chain/]]></link>
			<title>VIPERTUNNEL Python Backdoor Hidden in Fake DLL, Obfuscated Loader Chain</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 10:20:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/seized-veriftools-servers-expose-915655-fake-ids-8-arrested/]]></guid>
			<link><![CDATA[https://cybernoz.com/seized-veriftools-servers-expose-915655-fake-ids-8-arrested/]]></link>
			<title>Seized VerifTools servers expose 915,655 fake IDs, 8 arrested</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 09:45:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/a-week-in-security-april-6-april-12/]]></guid>
			<link><![CDATA[https://cybernoz.com/a-week-in-security-april-6-april-12/]]></link>
			<title>A week in security (April 6 &#8211; April 12)</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 09:40:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/insights-from-our-2024-cyber-threat-report/]]></guid>
			<link><![CDATA[https://cybernoz.com/insights-from-our-2024-cyber-threat-report/]]></link>
			<title>Insights from Our 2024 Cyber Threat Report</title>
			<pubDate><![CDATA[Sun, 12 Apr 2026 20:55:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/openai-revokes-macos-app-certificate-after-malicious-axios-supply-chain-incident/]]></guid>
			<link><![CDATA[https://cybernoz.com/openai-revokes-macos-app-certificate-after-malicious-axios-supply-chain-incident/]]></link>
			<title>OpenAI Revokes macOS App Certificate After Malicious Axios Supply Chain Incident</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 09:35:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/if-we-cant-kick-the-habit-how-do-we-manage-ais-energy-needs/]]></guid>
			<link><![CDATA[https://cybernoz.com/if-we-cant-kick-the-habit-how-do-we-manage-ais-energy-needs/]]></link>
			<title>If we can’t kick the habit, how do we manage AI’s energy needs?</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 09:30:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/authorities-dismantle-w3ll-phishing-empire/]]></guid>
			<link><![CDATA[https://cybernoz.com/authorities-dismantle-w3ll-phishing-empire/]]></link>
			<title>Authorities Dismantle ‘W3LL’ Phishing Empire</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 09:25:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/adobe-fixes-acrobat-reader-flaw-zero-day-cve-2026/]]></guid>
			<link><![CDATA[https://cybernoz.com/adobe-fixes-acrobat-reader-flaw-zero-day-cve-2026/]]></link>
			<title>Adobe Fixes Acrobat Reader Flaw Zero-Day CVE-2026</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 09:20:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/the-death-of-standing-privilege-in-the-age-of-ai-agents/]]></guid>
			<link><![CDATA[https://cybernoz.com/the-death-of-standing-privilege-in-the-age-of-ai-agents/]]></link>
			<title>The death of standing privilege in the age of AI agents</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 09:15:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/adobe-fixes-actively-exploited-acrobat-reader-flaw-cve-2026-34621/]]></guid>
			<link><![CDATA[https://cybernoz.com/adobe-fixes-actively-exploited-acrobat-reader-flaw-cve-2026-34621/]]></link>
			<title>Adobe fixes actively exploited Acrobat Reader flaw CVE-2026-34621</title>
			<pubDate><![CDATA[Sun, 12 Apr 2026 18:40:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/gmail-brings-end-to-end-encryption-to-android-and-ios-for-enterprise-users/]]></guid>
			<link><![CDATA[https://cybernoz.com/gmail-brings-end-to-end-encryption-to-android-and-ios-for-enterprise-users/]]></link>
			<title>Gmail Brings End-to-End Encryption to Android and iOS for Enterprise Users</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 09:05:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/cpuid-watering-hole-attack-spreads-stx-rat-malware/]]></guid>
			<link><![CDATA[https://cybernoz.com/cpuid-watering-hole-attack-spreads-stx-rat-malware/]]></link>
			<title>CPUID watering hole attack spreads STX RAT malware</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 09:00:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/was-ist-federated-identity-management/]]></guid>
			<link><![CDATA[https://cybernoz.com/was-ist-federated-identity-management/]]></link>
			<title>Was ist Federated Identity Management?</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 07:10:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/active-remediation-proactive-response-with-huntress-managed-edr/]]></guid>
			<link><![CDATA[https://cybernoz.com/active-remediation-proactive-response-with-huntress-managed-edr/]]></link>
			<title>Active Remediation: Proactive Response with Huntress Managed EDR</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 06:30:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/whatsapps-end-to-end-encryption-by-default-claim-called-major-consumer-fraud-by-pavel-durov/]]></guid>
			<link><![CDATA[https://cybernoz.com/whatsapps-end-to-end-encryption-by-default-claim-called-major-consumer-fraud-by-pavel-durov/]]></link>
			<title>WhatsApp&#8217;s &#8216;End-to-End Encryption by Default&#8217; Claim Called Major Consumer Fraud by Pavel Durov</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 06:15:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/elon-musk-announces-xchat-launch-with-self-destructing-messages/]]></guid>
			<link><![CDATA[https://cybernoz.com/elon-musk-announces-xchat-launch-with-self-destructing-messages/]]></link>
			<title>Elon Musk Announces XChat Launch With Self-Destructing Messages</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 05:35:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/critical-marimo-pre-auth-rce-flaw-now-under-active-exploitation/]]></guid>
			<link><![CDATA[https://cybernoz.com/critical-marimo-pre-auth-rce-flaw-now-under-active-exploitation/]]></link>
			<title>Critical Marimo pre-auth RCE flaw now under active exploitation</title>
			<pubDate><![CDATA[Sun, 12 Apr 2026 16:00:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/bringing-governance-and-visibility-to-machine-and-ai-identities/]]></guid>
			<link><![CDATA[https://cybernoz.com/bringing-governance-and-visibility-to-machine-and-ai-identities/]]></link>
			<title>Bringing governance and visibility to machine and AI identities</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 05:00:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/australian-payments-plus-continues-operating-model-harmonisation/]]></guid>
			<link><![CDATA[https://cybernoz.com/australian-payments-plus-continues-operating-model-harmonisation/]]></link>
			<title>Australian Payments Plus continues &#8220;operating model harmonisation&#8221;</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 04:30:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/check-point-launches-perth-data-residency-instance-for-workplace-security-sase/]]></guid>
			<link><![CDATA[https://cybernoz.com/check-point-launches-perth-data-residency-instance-for-workplace-security-sase/]]></link>
			<title>Check Point launches Perth data residency instance for Workplace Security SASE</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 03:05:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/time-to-act-huntress/]]></guid>
			<link><![CDATA[https://cybernoz.com/time-to-act-huntress/]]></link>
			<title>Time to Act | Huntress</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 01:45:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/ai-only-has-to-beat-3-10/]]></guid>
			<link><![CDATA[https://cybernoz.com/ai-only-has-to-beat-3-10/]]></link>
			<title>AI Only Has to Beat 3/10</title>
			<pubDate><![CDATA[Sun, 12 Apr 2026 23:20:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/fbi-atlanta-and-indonesian-national-police-take-down-w3llstore-phishing-market/]]></guid>
			<link><![CDATA[https://cybernoz.com/fbi-atlanta-and-indonesian-national-police-take-down-w3llstore-phishing-market/]]></link>
			<title>FBI Atlanta and Indonesian National Police Take Down W3LLSTORE Phishing Market</title>
			<pubDate><![CDATA[Sun, 12 Apr 2026 19:45:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/flowise-ai-agent-builder-under-active-cvss-10-0-rce-exploitation-12000-instances-exposed/]]></guid>
			<link><![CDATA[https://cybernoz.com/flowise-ai-agent-builder-under-active-cvss-10-0-rce-exploitation-12000-instances-exposed/]]></link>
			<title>Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed</title>
			<pubDate><![CDATA[Sun, 12 Apr 2026 19:15:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/its-time-for-full-activation/]]></guid>
			<link><![CDATA[https://cybernoz.com/its-time-for-full-activation/]]></link>
			<title>It&#8217;s Time for Full Activation</title>
			<pubDate><![CDATA[Sun, 12 Apr 2026 18:35:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/smugglers-gambit-huntress/]]></guid>
			<link><![CDATA[https://cybernoz.com/smugglers-gambit-huntress/]]></link>
			<title>Smuggler’s Gambit | Huntress</title>
			<pubDate><![CDATA[Sun, 12 Apr 2026 16:10:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/hacker-used-claude-code-gpt-4-1-to-exfiltrate-hundreds-of-millions-of-mexican-records/]]></guid>
			<link><![CDATA[https://cybernoz.com/hacker-used-claude-code-gpt-4-1-to-exfiltrate-hundreds-of-millions-of-mexican-records/]]></link>
			<title>Hacker Used Claude Code, GPT-4.1 to Exfiltrate Hundreds of Millions of Mexican Records</title>
			<pubDate><![CDATA[Sun, 12 Apr 2026 15:00:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/adobe-patches-actively-exploited-acrobat-reader-flaw-cve-2026-34621/]]></guid>
			<link><![CDATA[https://cybernoz.com/adobe-patches-actively-exploited-acrobat-reader-flaw-cve-2026-34621/]]></link>
			<title>Adobe Patches Actively Exploited Acrobat Reader Flaw CVE-2026-34621</title>
			<pubDate><![CDATA[Sun, 12 Apr 2026 14:30:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/hackers-claim-control-over-venice-san-marco-anti-flood-pumps/]]></guid>
			<link><![CDATA[https://cybernoz.com/hackers-claim-control-over-venice-san-marco-anti-flood-pumps/]]></link>
			<title>Hackers claim control over Venice San Marco anti-flood pumps</title>
			<pubDate><![CDATA[Sun, 12 Apr 2026 13:55:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/the-rise-of-social-engineering-across-healthcare/]]></guid>
			<link><![CDATA[https://cybernoz.com/the-rise-of-social-engineering-across-healthcare/]]></link>
			<title>The Rise of Social Engineering Across Healthcare</title>
			<pubDate><![CDATA[Sun, 12 Apr 2026 11:25:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/france-to-replace-windows-with-linux-on-government-desktops/]]></guid>
			<link><![CDATA[https://cybernoz.com/france-to-replace-windows-with-linux-on-government-desktops/]]></link>
			<title>France to Replace Windows with Linux on Government Desktops</title>
			<pubDate><![CDATA[Sun, 12 Apr 2026 11:10:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/cpuid-breach-distributes-stx-rat-via-trojanized-cpu-z-and-hwmonitor-downloads/]]></guid>
			<link><![CDATA[https://cybernoz.com/cpuid-breach-distributes-stx-rat-via-trojanized-cpu-z-and-hwmonitor-downloads/]]></link>
			<title>CPUID Breach Distributes STX RAT via Trojanized CPU-Z and HWMonitor Downloads</title>
			<pubDate><![CDATA[Sun, 12 Apr 2026 09:45:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/adobe-patches-reader-zero-day-exploited-for-months/]]></guid>
			<link><![CDATA[https://cybernoz.com/adobe-patches-reader-zero-day-exploited-for-months/]]></link>
			<title>Adobe Patches Reader Zero-Day Exploited for Months</title>
			<pubDate><![CDATA[Sun, 12 Apr 2026 09:15:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/security-affairs-newsletter-round-572-by-pierluigi-paganini-international-edition/]]></guid>
			<link><![CDATA[https://cybernoz.com/security-affairs-newsletter-round-572-by-pierluigi-paganini-international-edition/]]></link>
			<title>Security Affairs newsletter Round 572 by Pierluigi Paganini – INTERNATIONAL EDITION</title>
			<pubDate><![CDATA[Sun, 12 Apr 2026 09:10:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/attack-behaviors-huntress/]]></guid>
			<link><![CDATA[https://cybernoz.com/attack-behaviors-huntress/]]></link>
			<title>Attack Behaviors | Huntress</title>
			<pubDate><![CDATA[Sun, 12 Apr 2026 06:40:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/webinar-from-noise-to-signal/]]></guid>
			<link><![CDATA[https://cybernoz.com/webinar-from-noise-to-signal/]]></link>
			<title>Webinar: From noise to signal</title>
			<pubDate><![CDATA[Sun, 12 Apr 2026 06:30:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/anthropic-launches-claude-beta-for-word-bringing-ai-powered-editing-to-microsoft-docs/]]></guid>
			<link><![CDATA[https://cybernoz.com/anthropic-launches-claude-beta-for-word-bringing-ai-powered-editing-to-microsoft-docs/]]></link>
			<title>Anthropic Launches Claude Beta for Word, Bringing AI-Powered Editing to Microsoft Docs</title>
			<pubDate><![CDATA[Sun, 12 Apr 2026 06:25:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/tp-link-devices-at-risk-as-multiple-security-flaws-enable-takeover/]]></guid>
			<link><![CDATA[https://cybernoz.com/tp-link-devices-at-risk-as-multiple-security-flaws-enable-takeover/]]></link>
			<title>TP-Link Devices at Risk as Multiple Security Flaws Enable Takeover</title>
			<pubDate><![CDATA[Sun, 12 Apr 2026 05:45:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/china-linked-storm-1175-exploits-zero-days-to-rapidly-deploy-medusa-ransomware/]]></guid>
			<link><![CDATA[https://cybernoz.com/china-linked-storm-1175-exploits-zero-days-to-rapidly-deploy-medusa-ransomware/]]></link>
			<title>China-Linked Storm-1175 Exploits Zero-Days to Rapidly Deploy Medusa Ransomware</title>
			<pubDate><![CDATA[Sun, 12 Apr 2026 05:00:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/the-fully-free-linux-os-trisquel-gets-a-major-update-with-version-12-0-ecne/]]></guid>
			<link><![CDATA[https://cybernoz.com/the-fully-free-linux-os-trisquel-gets-a-major-update-with-version-12-0-ecne/]]></link>
			<title>The fully free Linux OS Trisquel gets a major update with version 12.0 Ecne</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 00:15:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/bka-identifies-revil-leaders-behind-130-german-ransomware-attacks/]]></guid>
			<link><![CDATA[https://cybernoz.com/bka-identifies-revil-leaders-behind-130-german-ransomware-attacks/]]></link>
			<title>BKA Identifies REvil Leaders Behind 130 German Ransomware Attacks</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 00:05:08 +0000]]></pubDate>
		</item>
				</channel>
</rss>
