<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 25, 2026 at 10:32 am by All in One SEO Pro v4.9.6.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://cybernoz.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Cybernoz</title>
		<link><![CDATA[https://cybernoz.com]]></link>
		<description><![CDATA[Cybernoz]]></description>
		<lastBuildDate><![CDATA[Sat, 25 Apr 2026 07:05:05 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://cybernoz.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://cybernoz.com/compromised-everyday-devices-power-chinese-cyber-espionage-operations/]]></guid>
			<link><![CDATA[https://cybernoz.com/compromised-everyday-devices-power-chinese-cyber-espionage-operations/]]></link>
			<title>Compromised everyday devices power Chinese cyber espionage operations</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 07:05:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/cisa-adds-4-exploited-flaws-to-kev-sets-may-2026-federal-deadline/]]></guid>
			<link><![CDATA[https://cybernoz.com/cisa-adds-4-exploited-flaws-to-kev-sets-may-2026-federal-deadline/]]></link>
			<title>CISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal Deadline</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 06:55:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/science-innovation-and-technology-committee-chair-questions-uks-tech-sovereignty-approach/]]></guid>
			<link><![CDATA[https://cybernoz.com/science-innovation-and-technology-committee-chair-questions-uks-tech-sovereignty-approach/]]></link>
			<title>Science, Innovation and Technology committee chair questions UK’s tech sovereignty approach</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 06:50:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/anz-banking-group-finds-ai-chief/]]></guid>
			<link><![CDATA[https://cybernoz.com/anz-banking-group-finds-ai-chief/]]></link>
			<title>ANZ Banking Group finds AI chief</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 06:35:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/locked-shields-2026-41-nations-strengthen-cyber-resilience-in-worlds-biggest-exercise/]]></guid>
			<link><![CDATA[https://cybernoz.com/locked-shields-2026-41-nations-strengthen-cyber-resilience-in-worlds-biggest-exercise/]]></link>
			<title>Locked Shields 2026: 41 Nations Strengthen Cyber Resilience in World&#8217;s Biggest Exercise</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 06:25:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/china-linked-threat-actors-use-consumer-device-botnets-to-evade-detection-warn-uk-and-partners/]]></guid>
			<link><![CDATA[https://cybernoz.com/china-linked-threat-actors-use-consumer-device-botnets-to-evade-detection-warn-uk-and-partners/]]></link>
			<title>China-linked threat actors use consumer device botnets to evade detection, warn UK and partners</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 06:20:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/cisa-last-in-line-for-access-to-anthropic-mythos/]]></guid>
			<link><![CDATA[https://cybernoz.com/cisa-last-in-line-for-access-to-anthropic-mythos/]]></link>
			<title>CISA last in line for access to Anthropic Mythos</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 04:30:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/teach-yourself-to-phish-huntress/]]></guid>
			<link><![CDATA[https://cybernoz.com/teach-yourself-to-phish-huntress/]]></link>
			<title>Teach Yourself to Phish | Huntress</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 03:50:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/firestarter-malware-survives-cisco-firewall-updates-security-patches/]]></guid>
			<link><![CDATA[https://cybernoz.com/firestarter-malware-survives-cisco-firewall-updates-security-patches/]]></link>
			<title>Firestarter malware survives Cisco firewall updates, security patches</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 03:40:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/adt-confirms-data-breach-following-shinyhunters-data-leak-claim/]]></guid>
			<link><![CDATA[https://cybernoz.com/adt-confirms-data-breach-following-shinyhunters-data-leak-claim/]]></link>
			<title>ADT Confirms Data Breach Following ShinyHunters Data Leak Claim</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 03:35:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/fake-captcha-scam-triggers-costly-sms-fraud/]]></guid>
			<link><![CDATA[https://cybernoz.com/fake-captcha-scam-triggers-costly-sms-fraud/]]></link>
			<title>Fake CAPTCHA Scam Triggers Costly SMS Fraud</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 02:55:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/indirect-prompt-injection-is-taking-hold-in-the-wild/]]></guid>
			<link><![CDATA[https://cybernoz.com/indirect-prompt-injection-is-taking-hold-in-the-wild/]]></link>
			<title>Indirect prompt injection is taking hold in the wild</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 02:20:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/26-fakewallet-apps-found-on-apple-app-store-targeting-crypto-seed-phrases/]]></guid>
			<link><![CDATA[https://cybernoz.com/26-fakewallet-apps-found-on-apple-app-store-targeting-crypto-seed-phrases/]]></link>
			<title>26 FakeWallet Apps Found on Apple App Store Targeting Crypto Seed Phrases</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 02:10:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/london-marathon-runners-get-ai-to-go-the-extra-mile/]]></guid>
			<link><![CDATA[https://cybernoz.com/london-marathon-runners-get-ai-to-go-the-extra-mile/]]></link>
			<title>London Marathon runners get AI to go the extra mile</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 02:05:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/why-cybersecurity-must-rethink-defense-in-the-age-of-autonomous-agents/]]></guid>
			<link><![CDATA[https://cybernoz.com/why-cybersecurity-must-rethink-defense-in-the-age-of-autonomous-agents/]]></link>
			<title>Why Cybersecurity Must Rethink Defense in the Age of Autonomous Agents</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 01:40:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/cisa-reports-persistent-firestarter-backdoor-on-cisco-asa-device-in-federal-network/]]></guid>
			<link><![CDATA[https://cybernoz.com/cisa-reports-persistent-firestarter-backdoor-on-cisco-asa-device-in-federal-network/]]></link>
			<title>CISA reports persistent FIRESTARTER backdoor on Cisco ASA device in federal network</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 01:35:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/latest-spy-power-reauthorization-bill-leaves-critics-unimpressed/]]></guid>
			<link><![CDATA[https://cybernoz.com/latest-spy-power-reauthorization-bill-leaves-critics-unimpressed/]]></link>
			<title>Latest spy power reauthorization bill leaves critics unimpressed</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 00:45:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/tgr-sta-1030-new-activity-in-central-and-south-america/]]></guid>
			<link><![CDATA[https://cybernoz.com/tgr-sta-1030-new-activity-in-central-and-south-america/]]></link>
			<title>TGR-STA-1030: New Activity in Central and South America</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 00:15:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/new-us-house-privacy-bills-raise-hard-questions-about-enterprise-data-collection/]]></guid>
			<link><![CDATA[https://cybernoz.com/new-us-house-privacy-bills-raise-hard-questions-about-enterprise-data-collection/]]></link>
			<title>New US House privacy bills raise hard questions about enterprise data collection</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 23:45:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/why-are-top-university-websites-serving-porn-it-comes-down-to-shoddy-housekeeping/]]></guid>
			<link><![CDATA[https://cybernoz.com/why-are-top-university-websites-serving-porn-it-comes-down-to-shoddy-housekeeping/]]></link>
			<title>Why are top university websites serving porn? It comes down to shoddy housekeeping.</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 23:35:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/protecting-your-secrets-from-tomorrows-quantum-risks/]]></guid>
			<link><![CDATA[https://cybernoz.com/protecting-your-secrets-from-tomorrows-quantum-risks/]]></link>
			<title>Protecting your secrets from tomorrow’s quantum risks</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 23:15:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/from-overwhelmed-to-autonomous-rethinking-threat-intelligence-in-2026/]]></guid>
			<link><![CDATA[https://cybernoz.com/from-overwhelmed-to-autonomous-rethinking-threat-intelligence-in-2026/]]></link>
			<title>From Overwhelmed to Autonomous: Rethinking Threat Intelligence in 2026</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 23:10:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/effortless-phishing-simulations-now-part-of-huntress/]]></guid>
			<link><![CDATA[https://cybernoz.com/effortless-phishing-simulations-now-part-of-huntress/]]></link>
			<title>Effortless Phishing Simulations Now Part of Huntress</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 23:05:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/adt-confirms-data-breach-after-shinyhunters-leak-threat/]]></guid>
			<link><![CDATA[https://cybernoz.com/adt-confirms-data-breach-after-shinyhunters-leak-threat/]]></link>
			<title>ADT confirms data breach after ShinyHunters leak threat</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 22:55:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/hackers-use-fake-captcha-pages-to-trigger-costly-international-sms-fraud/]]></guid>
			<link><![CDATA[https://cybernoz.com/hackers-use-fake-captcha-pages-to-trigger-costly-international-sms-fraud/]]></link>
			<title>Hackers Use Fake CAPTCHA Pages to Trigger Costly International SMS Fraud</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 22:50:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/claude-desktop-reportedly-adds-browser-access-bridge-for-chromium-browsers/]]></guid>
			<link><![CDATA[https://cybernoz.com/claude-desktop-reportedly-adds-browser-access-bridge-for-chromium-browsers/]]></link>
			<title>Claude Desktop Reportedly Adds Browser Access Bridge for Chromium Browsers</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 22:10:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/new-clickfix-attack-hides-in-native-windows-tools-to-reduce-detection-risk/]]></guid>
			<link><![CDATA[https://cybernoz.com/new-clickfix-attack-hides-in-native-windows-tools-to-reduce-detection-risk/]]></link>
			<title>New ClickFix attack Hides in Native Windows Tools to Reduce Detection Risk</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 21:55:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/users-advised-to-drop-passwords-and-make-room-for-passkeys/]]></guid>
			<link><![CDATA[https://cybernoz.com/users-advised-to-drop-passwords-and-make-room-for-passkeys/]]></link>
			<title>Users advised to drop passwords and make room for passkeys</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 21:35:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/firestarter-backdoor-hit-federal-cisco-firepower-device-survives-security-patches/]]></guid>
			<link><![CDATA[https://cybernoz.com/firestarter-backdoor-hit-federal-cisco-firepower-device-survives-security-patches/]]></link>
			<title>FIRESTARTER Backdoor Hit Federal Cisco Firepower Device, Survives Security Patches</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 21:25:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/wiz-founder-hack-yourself-with-ai-before-the-bad-guys-do/]]></guid>
			<link><![CDATA[https://cybernoz.com/wiz-founder-hack-yourself-with-ai-before-the-bad-guys-do/]]></link>
			<title>Wiz founder: Hack yourself with AI, before the bad guys do</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 21:20:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/university-of-melbourne-rmit-build-ties-with-aws/]]></guid>
			<link><![CDATA[https://cybernoz.com/university-of-melbourne-rmit-build-ties-with-aws/]]></link>
			<title>University of Melbourne, RMIT build ties with AWS</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 21:05:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/in-other-news-unauthorized-mythos-access-plankey-cisa-nomination-ends-new-display-security-device/]]></guid>
			<link><![CDATA[https://cybernoz.com/in-other-news-unauthorized-mythos-access-plankey-cisa-nomination-ends-new-display-security-device/]]></link>
			<title>In Other News: Unauthorized Mythos Access, Plankey CISA Nomination Ends, New Display Security Device</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 20:55:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/12-year-old-pack2theroot-bug-lets-linux-users-gain-root-privileges/]]></guid>
			<link><![CDATA[https://cybernoz.com/12-year-old-pack2theroot-bug-lets-linux-users-gain-root-privileges/]]></link>
			<title>12-year-old Pack2TheRoot bug lets Linux users gain root privileges</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 20:50:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/scattered-spider-co-conspirator-pleads-guilty/]]></guid>
			<link><![CDATA[https://cybernoz.com/scattered-spider-co-conspirator-pleads-guilty/]]></link>
			<title>Scattered Spider co-conspirator pleads guilty</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 19:00:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/another-spyware-maker-caught-distributing-fake-android-snooping-apps/]]></guid>
			<link><![CDATA[https://cybernoz.com/another-spyware-maker-caught-distributing-fake-android-snooping-apps/]]></link>
			<title>Another spyware maker caught distributing fake Android snooping apps</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 18:55:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/dragos-dismisses-zionsiphon-narrative-says-code-flaws-and-weak-ics-logic-render-ot-malware-operationally-ineffective/]]></guid>
			<link><![CDATA[https://cybernoz.com/dragos-dismisses-zionsiphon-narrative-says-code-flaws-and-weak-ics-logic-render-ot-malware-operationally-ineffective/]]></link>
			<title>Dragos dismisses ZionSiphon narrative, says code flaws and weak ICS logic render OT malware operationally ineffective</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 18:35:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/what-cybersecurity-leaders-must-prioritize-in-2026/]]></guid>
			<link><![CDATA[https://cybernoz.com/what-cybersecurity-leaders-must-prioritize-in-2026/]]></link>
			<title>What Cybersecurity Leaders Must Prioritize in 2026</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 18:20:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/new-pack2theroot-flaw-gives-hackers-root-linux-access/]]></guid>
			<link><![CDATA[https://cybernoz.com/new-pack2theroot-flaw-gives-hackers-root-linux-access/]]></link>
			<title>New ‘Pack2TheRoot’ flaw gives hackers root Linux access</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 18:10:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/claude-desktop-reportedly-adds-browser-access-bridge-to-multiple-chromium-based-browsers/]]></guid>
			<link><![CDATA[https://cybernoz.com/claude-desktop-reportedly-adds-browser-access-bridge-to-multiple-chromium-based-browsers/]]></link>
			<title>Claude Desktop Reportedly Adds Browser Access Bridge to Multiple Chromium-Based Browsers</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 18:05:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/ncsc-perfect-storm-it-security-guru/]]></guid>
			<link><![CDATA[https://cybernoz.com/ncsc-perfect-storm-it-security-guru/]]></link>
			<title>NCSC Perfect Storm- IT Security Guru</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 17:50:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/the-latest-push-to-extend-key-us-spy-powers-is-still-a-mess/]]></guid>
			<link><![CDATA[https://cybernoz.com/the-latest-push-to-extend-key-us-spy-powers-is-still-a-mess/]]></link>
			<title>The Latest Push to Extend Key US Spy Powers Is Still a Mess</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 17:40:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/gpt-5-5-bio-bug-bounty-program-aims-to-improve-ai-safety-and-performance/]]></guid>
			<link><![CDATA[https://cybernoz.com/gpt-5-5-bio-bug-bounty-program-aims-to-improve-ai-safety-and-performance/]]></link>
			<title>GPT-5.5 Bio Bug Bounty Program Aims to Improve AI Safety and Performance</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 17:25:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/teampcp-hijacks-bitwarden-cli-uses-dependabot-to-deploy-shai-hulud-malware/]]></guid>
			<link><![CDATA[https://cybernoz.com/teampcp-hijacks-bitwarden-cli-uses-dependabot-to-deploy-shai-hulud-malware/]]></link>
			<title>TeamPCP Hijacks Bitwarden CLI, Uses Dependabot to Deploy Shai-Hulud Malware</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 17:10:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/one-ciso-for-10000-companies-cybersecurity-on-too-few-shoulders/]]></guid>
			<link><![CDATA[https://cybernoz.com/one-ciso-for-10000-companies-cybersecurity-on-too-few-shoulders/]]></link>
			<title>One CISO For 10,000 companies: Cybersecurity On Too Few Shoulders</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 16:55:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/medical-data-of-500000-uk-volunteers-listed-for-sale-on-alibaba/]]></guid>
			<link><![CDATA[https://cybernoz.com/medical-data-of-500000-uk-volunteers-listed-for-sale-on-alibaba/]]></link>
			<title>Medical data of 500,000 UK volunteers listed for sale on Alibaba</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 16:45:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/nasa-employees-duped-in-chinese-phishing-scheme-targeting-u-s-defense-software/]]></guid>
			<link><![CDATA[https://cybernoz.com/nasa-employees-duped-in-chinese-phishing-scheme-targeting-u-s-defense-software/]]></link>
			<title>NASA Employees Duped in Chinese Phishing Scheme Targeting U.S. Defense Software</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 16:40:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/bt-has-now-blocked-over-a-billion-clicks-to-malicious-websites-says-ncsc/]]></guid>
			<link><![CDATA[https://cybernoz.com/bt-has-now-blocked-over-a-billion-clicks-to-malicious-websites-says-ncsc/]]></link>
			<title>BT has now blocked over a billion clicks to malicious websites, says NCSC</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 16:35:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/tce-weekly-roundup-data-breaches-malware-fraud-updates/]]></guid>
			<link><![CDATA[https://cybernoz.com/tce-weekly-roundup-data-breaches-malware-fraud-updates/]]></link>
			<title>TCE Weekly Roundup: Data Breaches, Malware &#038; Fraud Updates</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 16:25:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/in-two-amazon-units-builder-replaces-traditional-job-titles/]]></guid>
			<link><![CDATA[https://cybernoz.com/in-two-amazon-units-builder-replaces-traditional-job-titles/]]></link>
			<title>In two Amazon units, &#8216;builder&#8217; replaces traditional job titles</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 16:20:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/pre-stuxnet-sabotage-malware-fast16-linked-to-us-iran-cyber-tensions/]]></guid>
			<link><![CDATA[https://cybernoz.com/pre-stuxnet-sabotage-malware-fast16-linked-to-us-iran-cyber-tensions/]]></link>
			<title>Pre-Stuxnet Sabotage Malware &#8216;Fast16&#8217; Linked to US-Iran Cyber Tensions</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 16:10:12 +0000]]></pubDate>
		</item>
				</channel>
</rss>
