<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 4, 2026 at 2:03 am by All in One SEO Pro v4.9.5.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://cybernoz.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Cybernoz</title>
		<link><![CDATA[https://cybernoz.com]]></link>
		<description><![CDATA[Cybernoz]]></description>
		<lastBuildDate><![CDATA[Fri, 03 Apr 2026 22:35:18 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://cybernoz.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://cybernoz.com/15-top-cybersecurity-ceos-on-the-future-of-ai-agents-rsac-2026/]]></guid>
			<link><![CDATA[https://cybernoz.com/15-top-cybersecurity-ceos-on-the-future-of-ai-agents-rsac-2026/]]></link>
			<title>15 Top Cybersecurity CEOs On The Future Of AI Agents: RSAC 2026</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 22:35:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/the-developer-credential-economy-why-exposure-data-is-the-new-front-line-in-the-supply-chain-war/]]></guid>
			<link><![CDATA[https://cybernoz.com/the-developer-credential-economy-why-exposure-data-is-the-new-front-line-in-the-supply-chain-war/]]></link>
			<title>The Developer Credential Economy: Why Exposure Data Is the New Front Line in the Supply Chain War</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 22:30:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/linkedin-secretely-scans-for-6000-chrome-extensions-collects-data/]]></guid>
			<link><![CDATA[https://cybernoz.com/linkedin-secretely-scans-for-6000-chrome-extensions-collects-data/]]></link>
			<title>LinkedIn secretely scans for 6,000+ Chrome extensions, collects data</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 22:24:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/researchers-warn-of-critical-flaws-in-progress-sharefile/]]></guid>
			<link><![CDATA[https://cybernoz.com/researchers-warn-of-critical-flaws-in-progress-sharefile/]]></link>
			<title>Researchers warn of critical flaws in Progress ShareFile</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 22:15:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/wyden-warns-social-security-chief-trumps-voter-database-is-blatant-voter-suppression/]]></guid>
			<link><![CDATA[https://cybernoz.com/wyden-warns-social-security-chief-trumps-voter-database-is-blatant-voter-suppression/]]></link>
			<title>Wyden warns Social Security chief: Trump’s voter database is ‘blatant voter suppression’</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 22:10:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/security-lapse-lets-researchers-view-react2shell-hackers-dashboard/]]></guid>
			<link><![CDATA[https://cybernoz.com/security-lapse-lets-researchers-view-react2shell-hackers-dashboard/]]></link>
			<title>Security lapse lets researchers view React2Shell hackers’ dashboard</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 21:10:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/openclaw-gives-users-yet-another-reason-to-be-freaked-out-about-security/]]></guid>
			<link><![CDATA[https://cybernoz.com/openclaw-gives-users-yet-another-reason-to-be-freaked-out-about-security/]]></link>
			<title>OpenClaw gives users yet another reason to be freaked out about security</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 21:00:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/proofpoint-cso-ryan-kalember-live-at-rsac-2026/]]></guid>
			<link><![CDATA[https://cybernoz.com/proofpoint-cso-ryan-kalember-live-at-rsac-2026/]]></link>
			<title>Proofpoint CSO Ryan Kalember, Live at RSAC 2026</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 20:35:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/top-3-cybersecurity-threats-of-2024-so-far/]]></guid>
			<link><![CDATA[https://cybernoz.com/top-3-cybersecurity-threats-of-2024-so-far/]]></link>
			<title>Top 3 Cybersecurity Threats of 2024 (So Far)</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 20:30:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/hims-hers-warns-of-data-breach-after-zendesk-support-ticket-breach/]]></guid>
			<link><![CDATA[https://cybernoz.com/hims-hers-warns-of-data-breach-after-zendesk-support-ticket-breach/]]></link>
			<title>Hims &#038; Hers warns of data breach after Zendesk support ticket breach</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 20:20:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/14000-f5-big-ip-apm-devices-exposed-online-amid-active-rce-vulnerability-exploits/]]></guid>
			<link><![CDATA[https://cybernoz.com/14000-f5-big-ip-apm-devices-exposed-online-amid-active-rce-vulnerability-exploits/]]></link>
			<title>14,000+ F5 BIG-IP APM Devices Exposed Online Amid Active RCE Vulnerability Exploits</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 20:15:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/microsoft-forces-unmanaged-windows-11-devices-to-upgrade-to-version-24h2/]]></guid>
			<link><![CDATA[https://cybernoz.com/microsoft-forces-unmanaged-windows-11-devices-to-upgrade-to-version-24h2/]]></link>
			<title>Microsoft Forces Unmanaged Windows 11 Devices to Upgrade to Version 24H2</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 19:35:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/north-korean-hackers-abuse-github-to-spy-on-south-korean-firms/]]></guid>
			<link><![CDATA[https://cybernoz.com/north-korean-hackers-abuse-github-to-spy-on-south-korean-firms/]]></link>
			<title>North Korean Hackers Abuse GitHub to Spy on South Korean Firms</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 19:15:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/fal-con-2026-secure-the-ai-revolution/]]></guid>
			<link><![CDATA[https://cybernoz.com/fal-con-2026-secure-the-ai-revolution/]]></link>
			<title>FAL.CON 2026: Secure The AI Revolution</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 19:00:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/windows-security-app-gets-secure-boot-certificate-status-indicators-as-2026-expiration-approaches/]]></guid>
			<link><![CDATA[https://cybernoz.com/windows-security-app-gets-secure-boot-certificate-status-indicators-as-2026-expiration-approaches/]]></link>
			<title>Windows Security app gets Secure Boot certificate status indicators as 2026 expiration approaches</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 18:55:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/blocking-children-from-social-media-is-a-badly-executed-good-idea/]]></guid>
			<link><![CDATA[https://cybernoz.com/blocking-children-from-social-media-is-a-badly-executed-good-idea/]]></link>
			<title>Blocking children from social media is a badly executed good idea</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 18:50:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/china-linked-ta416-targets-european-governments-with-plugx-and-oauth-based-phishing/]]></guid>
			<link><![CDATA[https://cybernoz.com/china-linked-ta416-targets-european-governments-with-plugx-and-oauth-based-phishing/]]></link>
			<title>China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 18:45:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/middle-east-datacentre-capacity-set-to-triple-by-2030/]]></guid>
			<link><![CDATA[https://cybernoz.com/middle-east-datacentre-capacity-set-to-triple-by-2030/]]></link>
			<title>Middle East datacentre capacity set to triple by 2030</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 18:40:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/in-other-news-chatgpt-data-leak-android-rootkit-water-facility-hit-by-ransomware/]]></guid>
			<link><![CDATA[https://cybernoz.com/in-other-news-chatgpt-data-leak-android-rootkit-water-facility-hit-by-ransomware/]]></link>
			<title>In Other News: ChatGPT Data Leak, Android Rootkit, Water Facility Hit by Ransomware</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 18:15:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/north-korea-linked-hackers-drain-285m-from-drift-in-sophisticated-attack/]]></guid>
			<link><![CDATA[https://cybernoz.com/north-korea-linked-hackers-drain-285m-from-drift-in-sophisticated-attack/]]></link>
			<title>North Korea–linked hackers drain $285M from Drift in sophisticated attack</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 18:10:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/trumps-fy2027-budget-again-targets-cisa/]]></guid>
			<link><![CDATA[https://cybernoz.com/trumps-fy2027-budget-again-targets-cisa/]]></link>
			<title>Trump’s FY2027 budget again targets CISA</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 17:25:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/trump-budget-proposal-would-cut-hundreds-of-millions-more-from-cisa/]]></guid>
			<link><![CDATA[https://cybernoz.com/trump-budget-proposal-would-cut-hundreds-of-millions-more-from-cisa/]]></link>
			<title>Trump budget proposal would cut hundreds of millions more from CISA</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 17:20:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/sri-lanka-arrests-152-in-alleged-chinese-run-cyberscam/]]></guid>
			<link><![CDATA[https://cybernoz.com/sri-lanka-arrests-152-in-alleged-chinese-run-cyberscam/]]></link>
			<title>Sri Lanka arrests 152 in alleged Chinese-run cyberscam</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 17:05:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/cert-eu-blames-trivy-supply-chain-attack-for-europa-eu-data-breach/]]></guid>
			<link><![CDATA[https://cybernoz.com/cert-eu-blames-trivy-supply-chain-attack-for-europa-eu-data-breach/]]></link>
			<title>CERT-EU blames Trivy supply chain attack for Europa.eu data breach</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 16:20:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/how-aws-kms-and-aws-encryption-sdk-overcome-symmetric-encryption-bounds/]]></guid>
			<link><![CDATA[https://cybernoz.com/how-aws-kms-and-aws-encryption-sdk-overcome-symmetric-encryption-bounds/]]></link>
			<title>How AWS KMS and AWS Encryption SDK overcome symmetric encryption bounds</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 15:50:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/how-to-prevent-business-email-compromise-a-guide-for-2026/]]></guid>
			<link><![CDATA[https://cybernoz.com/how-to-prevent-business-email-compromise-a-guide-for-2026/]]></link>
			<title>How to Prevent Business Email Compromise: A Guide for 2026</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 15:40:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/evolution-of-ransomware-multi-extortion-ransomware-attacks/]]></guid>
			<link><![CDATA[https://cybernoz.com/evolution-of-ransomware-multi-extortion-ransomware-attacks/]]></link>
			<title>Evolution of Ransomware: Multi-Extortion Ransomware Attacks</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 15:30:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/kimsuky-deploys-malicious-lnk-files-to-deliver-python-based-backdoor-in-multi-stage-attack/]]></guid>
			<link><![CDATA[https://cybernoz.com/kimsuky-deploys-malicious-lnk-files-to-deliver-python-based-backdoor-in-multi-stage-attack/]]></link>
			<title>Kimsuky Deploys Malicious LNK Files to Deliver Python-Based Backdoor in Multi-Stage Attack</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 15:25:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/new-progress-sharefile-flaws-expose-servers-to-unauthorized-remote-takeover/]]></guid>
			<link><![CDATA[https://cybernoz.com/new-progress-sharefile-flaws-expose-servers-to-unauthorized-remote-takeover/]]></link>
			<title>New Progress ShareFile Flaws Expose Servers to Unauthorized Remote Takeover</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 14:45:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/the-leading-international-ai-and-web3-forum-to-take-place-in-april/]]></guid>
			<link><![CDATA[https://cybernoz.com/the-leading-international-ai-and-web3-forum-to-take-place-in-april/]]></link>
			<title>The Leading International AI and Web3 Forum to Take Place in April</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 14:30:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/cisco-imc-auth-bypass-vulnerability-allows-attackers-to-alter-user-passwords-cve-2026-20093/]]></guid>
			<link><![CDATA[https://cybernoz.com/cisco-imc-auth-bypass-vulnerability-allows-attackers-to-alter-user-passwords-cve-2026-20093/]]></link>
			<title>Cisco IMC auth bypass vulnerability allows attackers to alter user passwords (CVE-2026-20093)</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 14:10:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/unc1069-social-engineering-of-axios-maintainer-led-to-npm-supply-chain-attack/]]></guid>
			<link><![CDATA[https://cybernoz.com/unc1069-social-engineering-of-axios-maintainer-led-to-npm-supply-chain-attack/]]></link>
			<title>UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 14:00:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/data-dive-government-2030-datacentre-capacity-targets-look-shaky/]]></guid>
			<link><![CDATA[https://cybernoz.com/data-dive-government-2030-datacentre-capacity-targets-look-shaky/]]></link>
			<title>Data dive: Government 2030 datacentre capacity targets look shaky</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 13:55:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/trueconf-zero-day-exploited-in-asian-government-attacks/]]></guid>
			<link><![CDATA[https://cybernoz.com/trueconf-zero-day-exploited-in-asian-government-attacks/]]></link>
			<title>TrueConf Zero-Day Exploited in Asian Government Attacks</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 13:30:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/pro-iran-handala-group-breached-israeli-defence-contractor-psk-wind-technologies/]]></guid>
			<link><![CDATA[https://cybernoz.com/pro-iran-handala-group-breached-israeli-defence-contractor-psk-wind-technologies/]]></link>
			<title>Pro-Iran Handala group breached Israeli defence contractor PSK Wind Technologies</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 13:25:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/12-cyber-industry-trends-revealed-at-rsac-2026/]]></guid>
			<link><![CDATA[https://cybernoz.com/12-cyber-industry-trends-revealed-at-rsac-2026/]]></link>
			<title>12 cyber industry trends revealed at RSAC 2026</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 11:35:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/what-is-behavioral-analysis-in-cybersecurity/]]></guid>
			<link><![CDATA[https://cybernoz.com/what-is-behavioral-analysis-in-cybersecurity/]]></link>
			<title>What is Behavioral Analysis in Cybersecurity?</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 10:55:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/man-admits-to-locking-thousands-of-windows-devices-in-extortion-plot/]]></guid>
			<link><![CDATA[https://cybernoz.com/man-admits-to-locking-thousands-of-windows-devices-in-extortion-plot/]]></link>
			<title>Man admits to locking thousands of Windows devices in extortion plot</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 10:45:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/hackers-use-phorpiex-botnet-to-spread-ransomware-sextortion-and-crypto-clipping-malware/]]></guid>
			<link><![CDATA[https://cybernoz.com/hackers-use-phorpiex-botnet-to-spread-ransomware-sextortion-and-crypto-clipping-malware/]]></link>
			<title>Hackers Use Phorpiex Botnet to Spread Ransomware, Sextortion, and Crypto-Clipping Malware</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 10:40:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/miwic26-kerlyn-manyi-cybersecurity-practitioner-nucleus-systems-founder-of-cyberfoundher-initiative/]]></guid>
			<link><![CDATA[https://cybernoz.com/miwic26-kerlyn-manyi-cybersecurity-practitioner-nucleus-systems-founder-of-cyberfoundher-initiative/]]></link>
			<title>MIWIC26: Kerlyn Manyi, Cybersecurity Practitioner, Nucleus Systems &#038; Founder of CyberFoundHer Initiative</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 10:25:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/cbp-facility-codes-sure-seem-to-have-leaked-via-online-flashcards/]]></guid>
			<link><![CDATA[https://cybernoz.com/cbp-facility-codes-sure-seem-to-have-leaked-via-online-flashcards/]]></link>
			<title>CBP Facility Codes Sure Seem to Have Leaked Via Online Flashcards</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 10:15:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/malicious-chrome-extension-chatgpt-ad-blocker-targets-users-steals-conversations/]]></guid>
			<link><![CDATA[https://cybernoz.com/malicious-chrome-extension-chatgpt-ad-blocker-targets-users-steals-conversations/]]></link>
			<title>Malicious Chrome Extension &#8220;ChatGPT Ad Blocker&#8221; Targets Users, Steals Conversations</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 10:00:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/why-github-developers-are-targeted-by-token-giveaway-scams/]]></guid>
			<link><![CDATA[https://cybernoz.com/why-github-developers-are-targeted-by-token-giveaway-scams/]]></link>
			<title>Why GitHub Developers Are Targeted by Token Giveaway Scams</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 09:45:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/trivy-supply-chain-attack-enabled-european-commission-cloud-breach/]]></guid>
			<link><![CDATA[https://cybernoz.com/trivy-supply-chain-attack-enabled-european-commission-cloud-breach/]]></link>
			<title>Trivy supply chain attack enabled European Commission cloud breach</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 09:25:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/new-sparkcat-variant-in-ios-android-apps-steals-crypto-wallet-recovery-phrase-images/]]></guid>
			<link><![CDATA[https://cybernoz.com/new-sparkcat-variant-in-ios-android-apps-steals-crypto-wallet-recovery-phrase-images/]]></link>
			<title>New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 09:15:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/uae-advances-sovereign-ai-ambitions-with-launch-of-falcon-perception/]]></guid>
			<link><![CDATA[https://cybernoz.com/uae-advances-sovereign-ai-ambitions-with-launch-of-falcon-perception/]]></link>
			<title>UAE advances sovereign AI ambitions with launch of Falcon Perception</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 09:10:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/ransomware-supply-chain-threats/]]></guid>
			<link><![CDATA[https://cybernoz.com/ransomware-supply-chain-threats/]]></link>
			<title>Ransomware &#038; Supply Chain Threats</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 09:00:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/250000-affected-by-data-breach-at-nacogdoches-memorial-hospital/]]></guid>
			<link><![CDATA[https://cybernoz.com/250000-affected-by-data-breach-at-nacogdoches-memorial-hospital/]]></link>
			<title>250,000 Affected by Data Breach at Nacogdoches Memorial Hospital</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 08:45:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/medtech-giant-stryker-says-its-back-up-after-iranian-cyberattack/]]></guid>
			<link><![CDATA[https://cybernoz.com/medtech-giant-stryker-says-its-back-up-after-iranian-cyberattack/]]></link>
			<title>Medtech giant Stryker says it’s back up after Iranian cyberattack</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 07:50:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/die-besten-xdr-tools/]]></guid>
			<link><![CDATA[https://cybernoz.com/die-besten-xdr-tools/]]></link>
			<title>Die besten XDR-Tools</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 06:50:16 +0000]]></pubDate>
		</item>
				</channel>
</rss>
