<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 3, 2026 at 4:28 am by All in One SEO Pro v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://cybernoz.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Cybernoz</title>
		<link><![CDATA[https://cybernoz.com]]></link>
		<description><![CDATA[Cybernoz]]></description>
		<lastBuildDate><![CDATA[Fri, 03 Apr 2026 01:10:16 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://cybernoz.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://cybernoz.com/claude-code-leak-used-to-push-infostealer-malware-on-github/]]></guid>
			<link><![CDATA[https://cybernoz.com/claude-code-leak-used-to-push-infostealer-malware-on-github/]]></link>
			<title>Claude Code leak used to push infostealer malware on GitHub</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 01:10:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/aws-wasabi-cloudflare-and-backblaze-go-head-to-head-in-new-cloud-storage-test/]]></guid>
			<link><![CDATA[https://cybernoz.com/aws-wasabi-cloudflare-and-backblaze-go-head-to-head-in-new-cloud-storage-test/]]></link>
			<title>AWS, Wasabi, Cloudflare, and Backblaze go head-to-head in new cloud storage test</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 23:45:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/hackers-clone-cert-ua-site-to-trick-victims-into-installing-go-based-rat/]]></guid>
			<link><![CDATA[https://cybernoz.com/hackers-clone-cert-ua-site-to-trick-victims-into-installing-go-based-rat/]]></link>
			<title>Hackers Clone CERT-UA Site to Trick Victims Into Installing Go-Based RAT</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 01:05:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/critical-citrix-netscaler-flaw-draws-citrixbleed-comparisons-as-exploitation-window-narrows/]]></guid>
			<link><![CDATA[https://cybernoz.com/critical-citrix-netscaler-flaw-draws-citrixbleed-comparisons-as-exploitation-window-narrows/]]></link>
			<title>Critical Citrix NetScaler Flaw Draws CitrixBleed Comparisons as Exploitation Window Narrows</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 00:45:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/uncanny-valley-irans-threats-on-us-tech-trumps-plans-for-midterms-and-polymarkets-pop-up-flop/]]></guid>
			<link><![CDATA[https://cybernoz.com/uncanny-valley-irans-threats-on-us-tech-trumps-plans-for-midterms-and-polymarkets-pop-up-flop/]]></link>
			<title>‘Uncanny Valley’: Iran’s Threats on US Tech, Trump’s Plans for Midterms, and Polymarket’s Pop-up Flop</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 00:35:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/fake-cert-ua-site-spreads-go-based-rat-in-phishing-campaign/]]></guid>
			<link><![CDATA[https://cybernoz.com/fake-cert-ua-site-spreads-go-based-rat-in-phishing-campaign/]]></link>
			<title>Fake CERT-UA Site Spreads Go-Based RAT in Phishing Campaign</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 00:20:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/shinyhunters-hackers-claim-theft-of-3m-cisco-records-threaten-public-leak/]]></guid>
			<link><![CDATA[https://cybernoz.com/shinyhunters-hackers-claim-theft-of-3m-cisco-records-threaten-public-leak/]]></link>
			<title>ShinyHunters Hackers Claim Theft of 3M+ Cisco Records, Threaten Public Leak</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 00:05:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/hackers-exploit-cve-2025-55182-to-breach-766-next-js-hosts-steal-credentials/]]></guid>
			<link><![CDATA[https://cybernoz.com/hackers-exploit-cve-2025-55182-to-breach-766-next-js-hosts-steal-credentials/]]></link>
			<title>Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 23:35:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/how-wikipedia-of-cyber-helps-sap-make-sense-of-threat-data/]]></guid>
			<link><![CDATA[https://cybernoz.com/how-wikipedia-of-cyber-helps-sap-make-sense-of-threat-data/]]></link>
			<title>How ‘Wikipedia of cyber’ helps SAP make sense of threat data</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 23:30:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/apple-rolls-out-darksword-exploit-protection-to-more-devices/]]></guid>
			<link><![CDATA[https://cybernoz.com/apple-rolls-out-darksword-exploit-protection-to-more-devices/]]></link>
			<title>Apple Rolls Out DarkSword Exploit Protection to More Devices</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 23:05:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/hasbro-hit-by-cyberattack-investigates-possible-data-breach/]]></guid>
			<link><![CDATA[https://cybernoz.com/hasbro-hit-by-cyberattack-investigates-possible-data-breach/]]></link>
			<title>Hasbro hit by cyberattack, investigates possible data breach</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 23:00:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/retail-and-hospitality-cisos-expect-budget-growth-new-ai-headaches-and-opportunities/]]></guid>
			<link><![CDATA[https://cybernoz.com/retail-and-hospitality-cisos-expect-budget-growth-new-ai-headaches-and-opportunities/]]></link>
			<title>Retail and hospitality CISOs expect budget growth, new AI headaches and opportunities</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 22:15:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/house-dems-decry-confirmed-ice-usage-of-paragon-spyware/]]></guid>
			<link><![CDATA[https://cybernoz.com/house-dems-decry-confirmed-ice-usage-of-paragon-spyware/]]></link>
			<title>House Dems decry confirmed ICE usage of Paragon spyware</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 22:10:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/9-ways-cisos-can-combat-ai-hallucinations/]]></guid>
			<link><![CDATA[https://cybernoz.com/9-ways-cisos-can-combat-ai-hallucinations/]]></link>
			<title>9 ways CISOs can combat AI hallucinations</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 21:10:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/new-rowhammer-attacks-give-complete-control-of-machines-running-nvidia-gpus/]]></guid>
			<link><![CDATA[https://cybernoz.com/new-rowhammer-attacks-give-complete-control-of-machines-running-nvidia-gpus/]]></link>
			<title>New Rowhammer attacks give complete control of machines running Nvidia GPUs</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 21:00:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/inside-a-large-scale-automated-credential-harvesting-operation-targeting-web-applications/]]></guid>
			<link><![CDATA[https://cybernoz.com/inside-a-large-scale-automated-credential-harvesting-operation-targeting-web-applications/]]></link>
			<title>Inside a large-scale automated credential harvesting operation targeting web applications</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 20:35:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/thank-you-for-helping-us-earn-another-inc-power-partner/]]></guid>
			<link><![CDATA[https://cybernoz.com/thank-you-for-helping-us-earn-another-inc-power-partner/]]></link>
			<title>Thank You for Helping Us Earn Another Inc. Power Partner</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 20:30:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/drift-loses-280-million-as-hackers-seize-security-council-powers/]]></guid>
			<link><![CDATA[https://cybernoz.com/drift-loses-280-million-as-hackers-seize-security-council-powers/]]></link>
			<title>Drift loses $280 million as hackers seize Security Council powers</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 20:20:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/reduce-soc-escalation-rates-with-better-tier-1-alert-triage/]]></guid>
			<link><![CDATA[https://cybernoz.com/reduce-soc-escalation-rates-with-better-tier-1-alert-triage/]]></link>
			<title>Reduce SOC Escalation Rates with Better Tier-1 Alert Triage</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 20:15:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/miwic26-dr-catherine-knibbs-founder-and-ceo-of-children-and-tech/]]></guid>
			<link><![CDATA[https://cybernoz.com/miwic26-dr-catherine-knibbs-founder-and-ceo-of-children-and-tech/]]></link>
			<title>MIWIC26: Dr Catherine Knibbs, Founder and CEO of Children and Tech</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 20:00:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/what-happens-when-a-nuclear-site-is-hit/]]></guid>
			<link><![CDATA[https://cybernoz.com/what-happens-when-a-nuclear-site-is-hit/]]></link>
			<title>What Happens When a Nuclear Site Is Hit?</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 19:50:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/iranian-hacker-group-handal-claims-breach-of-israeli-defense-firm/]]></guid>
			<link><![CDATA[https://cybernoz.com/iranian-hacker-group-handal-claims-breach-of-israeli-defense-firm/]]></link>
			<title>Iranian Hacker Group Handal Claims Breach of Israeli Defense Firm</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 19:35:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/microsoft-warns-of-whatsapp-attachments-spreading-backdoor-on-windows-pcs/]]></guid>
			<link><![CDATA[https://cybernoz.com/microsoft-warns-of-whatsapp-attachments-spreading-backdoor-on-windows-pcs/]]></link>
			<title>Microsoft Warns of WhatsApp Attachments Spreading Backdoor on Windows PCs</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 19:20:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/software-supply-chain-hacks-trigger-wave-of-intrusions-data-theft/]]></guid>
			<link><![CDATA[https://cybernoz.com/software-supply-chain-hacks-trigger-wave-of-intrusions-data-theft/]]></link>
			<title>Software supply chain hacks trigger wave of intrusions, data theft</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 19:00:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/apple-expands-darksword-patches-to-ios-18-7-7/]]></guid>
			<link><![CDATA[https://cybernoz.com/apple-expands-darksword-patches-to-ios-18-7-7/]]></link>
			<title>Apple expands “DarkSword” patches to iOS 18.7.7</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 18:55:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/cisco-patches-9-8-cvss-imc-and-ssm-flaws-allowing-remote-system-compromise/]]></guid>
			<link><![CDATA[https://cybernoz.com/cisco-patches-9-8-cvss-imc-and-ssm-flaws-allowing-remote-system-compromise/]]></link>
			<title>Cisco Patches 9.8 CVSS IMC and SSM Flaws Allowing Remote System Compromise</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 18:50:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/identity-and-ai-questions-of-data-security-trust-and-control/]]></guid>
			<link><![CDATA[https://cybernoz.com/identity-and-ai-questions-of-data-security-trust-and-control/]]></link>
			<title>Identity and AI: Questions of data security, trust and control</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 18:45:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/hasbro-cyberattack-company-investigates-security-breach/]]></guid>
			<link><![CDATA[https://cybernoz.com/hasbro-cyberattack-company-investigates-security-breach/]]></link>
			<title>Hasbro Cyberattack: Company Investigates Security Breach</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 18:40:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/intesa-sanpaolo-data-breach-reveals-monitoring-gaps/]]></guid>
			<link><![CDATA[https://cybernoz.com/intesa-sanpaolo-data-breach-reveals-monitoring-gaps/]]></link>
			<title>Intesa Sanpaolo Data Breach Reveals Monitoring Gaps</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 18:35:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/critical-vulnerability-in-claude-code-emerges-days-after-source-leak/]]></guid>
			<link><![CDATA[https://cybernoz.com/critical-vulnerability-in-claude-code-emerges-days-after-source-leak/]]></link>
			<title>Critical Vulnerability in Claude Code Emerges Days After Source Leak</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 18:20:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/cisco-fixed-critical-and-high-severity-flaws/]]></guid>
			<link><![CDATA[https://cybernoz.com/cisco-fixed-critical-and-high-severity-flaws/]]></link>
			<title>Cisco fixed critical and high-severity flaws</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 18:15:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/critical-flaw-in-f5-big-ip-faces-wide-exploitation-risk/]]></guid>
			<link><![CDATA[https://cybernoz.com/critical-flaw-in-f5-big-ip-faces-wide-exploitation-risk/]]></link>
			<title>Critical flaw in F5 BIG-IP faces wide exploitation risk</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 17:30:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/akira-ransomware-group-can-achieve-initial-access-to-data-encryption-in-less-than-an-hour/]]></guid>
			<link><![CDATA[https://cybernoz.com/akira-ransomware-group-can-achieve-initial-access-to-data-encryption-in-less-than-an-hour/]]></link>
			<title>Akira ransomware group can achieve initial access to data encryption in less than an hour</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 17:25:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/stealthy-bpfdoor-variants-are-a-needle-that-looks-like-hay/]]></guid>
			<link><![CDATA[https://cybernoz.com/stealthy-bpfdoor-variants-are-a-needle-that-looks-like-hay/]]></link>
			<title>Stealthy BPFDoor Variants are a Needle That Looks Like Hay</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 16:40:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/eviltokens-abuses-microsoft-device-code-flow-for-account-takeovers/]]></guid>
			<link><![CDATA[https://cybernoz.com/eviltokens-abuses-microsoft-device-code-flow-for-account-takeovers/]]></link>
			<title>EvilTokens abuses Microsoft device code flow for account takeovers</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 16:25:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/hitachi-digital-services-boosts-ot-it-integration-with-manufacturing-operations-management-platform/]]></guid>
			<link><![CDATA[https://cybernoz.com/hitachi-digital-services-boosts-ot-it-integration-with-manufacturing-operations-management-platform/]]></link>
			<title>Hitachi Digital Services boosts OT-IT integration with Manufacturing Operations Management platform</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 16:05:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/eset-reports-78-of-uk-manufacturers-face-cyber-incidents-as-disruption-becomes-widespread/]]></guid>
			<link><![CDATA[https://cybernoz.com/eset-reports-78-of-uk-manufacturers-face-cyber-incidents-as-disruption-becomes-widespread/]]></link>
			<title>ESET reports 78% of UK manufacturers face cyber incidents as disruption becomes widespread</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 16:00:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/ask-the-mac-guy-whats-the-deal-with-full-disk-access-for-mac/]]></guid>
			<link><![CDATA[https://cybernoz.com/ask-the-mac-guy-whats-the-deal-with-full-disk-access-for-mac/]]></link>
			<title>Ask the Mac Guy: What&#8217;s the Deal with Full Disk Access for Mac?</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 15:45:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/residential-proxies-evaded-ip-reputation-checks-in-78-of-4b-sessions/]]></guid>
			<link><![CDATA[https://cybernoz.com/residential-proxies-evaded-ip-reputation-checks-in-78-of-4b-sessions/]]></link>
			<title>Residential proxies evaded IP reputation checks in 78% of 4B sessions</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 15:35:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/openssh-10-3-fixes-shell-injection-and-multiple-ssh-security-issues/]]></guid>
			<link><![CDATA[https://cybernoz.com/openssh-10-3-fixes-shell-injection-and-multiple-ssh-security-issues/]]></link>
			<title>OpenSSH 10.3 Fixes Shell Injection and Multiple SSH Security Issues</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 15:30:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/miwic26-nkiruka-joy-aimienoho-chief-information-security-officer-standard-chartered-bank-ng/]]></guid>
			<link><![CDATA[https://cybernoz.com/miwic26-nkiruka-joy-aimienoho-chief-information-security-officer-standard-chartered-bank-ng/]]></link>
			<title>MIWIC26: Nkiruka Joy Aimienoho, Chief Information Security Officer, Standard Chartered Bank NG</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 15:15:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/akira-style-ransomware-campaign-hits-windows-users-across-south-america/]]></guid>
			<link><![CDATA[https://cybernoz.com/akira-style-ransomware-campaign-hits-windows-users-across-south-america/]]></link>
			<title>Akira-Style Ransomware Campaign Hits Windows Users Across South America</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:50:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/yurei-ransomware-uses-common-tools-adds-stranger-things-references/]]></guid>
			<link><![CDATA[https://cybernoz.com/yurei-ransomware-uses-common-tools-adds-stranger-things-references/]]></link>
			<title>Yurei Ransomware Uses Common Tools, Adds Stranger Things References</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:35:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/2026-ciso-salary-and-compensation-data/]]></guid>
			<link><![CDATA[https://cybernoz.com/2026-ciso-salary-and-compensation-data/]]></link>
			<title>2026 CISO Salary And Compensation Data</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:20:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/detecting-malicious-use-of-lolbins-pt-ii/]]></guid>
			<link><![CDATA[https://cybernoz.com/detecting-malicious-use-of-lolbins-pt-ii/]]></link>
			<title>Detecting Malicious Use of LOLBins, Pt. II</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 01:20:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/darksword-exploit-forces-apple-to-loosen-its-patching-policy/]]></guid>
			<link><![CDATA[https://cybernoz.com/darksword-exploit-forces-apple-to-loosen-its-patching-policy/]]></link>
			<title>DarkSword exploit forces Apple to loosen its patching policy</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:15:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/malwarebytes-privacy-vpn-receives-full-third-party-audit/]]></guid>
			<link><![CDATA[https://cybernoz.com/malwarebytes-privacy-vpn-receives-full-third-party-audit/]]></link>
			<title>Malwarebytes Privacy VPN receives full third-party audit</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:10:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/pre-auth-chains-android-rootkits-cloudtrail-evasion-10-more-stories/]]></guid>
			<link><![CDATA[https://cybernoz.com/pre-auth-chains-android-rootkits-cloudtrail-evasion-10-more-stories/]]></link>
			<title>Pre-Auth Chains, Android Rootkits, CloudTrail Evasion &#038; 10 More Stories</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:05:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/fujitsu-injects-another-80m-into-uk-arm-amid-post-office-scandal-fallout/]]></guid>
			<link><![CDATA[https://cybernoz.com/fujitsu-injects-another-80m-into-uk-arm-amid-post-office-scandal-fallout/]]></link>
			<title>Fujitsu injects another £80m into UK arm amid Post Office scandal fallout</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:00:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/an-overview-of-ransomware-threats-in-japan-in-2025-and-early-detection-insights-from-qilin-cases/]]></guid>
			<link><![CDATA[https://cybernoz.com/an-overview-of-ransomware-threats-in-japan-in-2025-and-early-detection-insights-from-qilin-cases/]]></link>
			<title>An overview of ransomware threats in Japan in 2025 and early detection insights from Qilin cases</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 01:25:12 +0000]]></pubDate>
		</item>
				</channel>
</rss>
