<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 26, 2026 at 12:44 pm by All in One SEO Pro v4.9.6.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://cybernoz.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Cybernoz</title>
		<link><![CDATA[https://cybernoz.com]]></link>
		<description><![CDATA[Cybernoz]]></description>
		<lastBuildDate><![CDATA[Sun, 26 Apr 2026 08:25:20 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://cybernoz.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://cybernoz.com/mft-exploitation-and-adversary-operations/]]></guid>
			<link><![CDATA[https://cybernoz.com/mft-exploitation-and-adversary-operations/]]></link>
			<title>MFT Exploitation and Adversary Operations</title>
			<pubDate><![CDATA[Sun, 26 Apr 2026 08:25:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/dora-and-operational-resilience-credential-management-as-a-financial-risk-control/]]></guid>
			<link><![CDATA[https://cybernoz.com/dora-and-operational-resilience-credential-management-as-a-financial-risk-control/]]></link>
			<title>DORA and operational resilience: Credential management as a financial risk control</title>
			<pubDate><![CDATA[Sun, 26 Apr 2026 08:15:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/73-open-vsx-sleeper-extensions-linked-to-glassworm-activate-new-malware-campaign/]]></guid>
			<link><![CDATA[https://cybernoz.com/73-open-vsx-sleeper-extensions-linked-to-glassworm-activate-new-malware-campaign/]]></link>
			<title>73 Open VSX Sleeper Extensions Linked to GlassWorm Activate New Malware Campaign</title>
			<pubDate><![CDATA[Sun, 26 Apr 2026 08:10:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/california-engineer-identified-in-suspected-shooting-at-white-house-correspondents-dinner/]]></guid>
			<link><![CDATA[https://cybernoz.com/california-engineer-identified-in-suspected-shooting-at-white-house-correspondents-dinner/]]></link>
			<title>California Engineer Identified in Suspected Shooting at White House Correspondents&#8217; Dinner</title>
			<pubDate><![CDATA[Sun, 26 Apr 2026 07:45:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/a-study-of-1000-android-apps-finds-a-privacy-policy-logging-gap/]]></guid>
			<link><![CDATA[https://cybernoz.com/a-study-of-1000-android-apps-finds-a-privacy-policy-logging-gap/]]></link>
			<title>A study of 1,000 Android apps finds a privacy policy logging gap</title>
			<pubDate><![CDATA[Sun, 26 Apr 2026 06:55:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/apple-fixes-ios-flaw-that-let-fbi-recover-deleted-signal-messages/]]></guid>
			<link><![CDATA[https://cybernoz.com/apple-fixes-ios-flaw-that-let-fbi-recover-deleted-signal-messages/]]></link>
			<title>Apple Fixes iOS Flaw That Let FBI Recover Deleted Signal Messages</title>
			<pubDate><![CDATA[Sun, 26 Apr 2026 06:45:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/a-tsunami-of-flaws-when-frontier-ai-and-patch-tuesday-collide/]]></guid>
			<link><![CDATA[https://cybernoz.com/a-tsunami-of-flaws-when-frontier-ai-and-patch-tuesday-collide/]]></link>
			<title>A tsunami of flaws: When frontier AI and Patch Tuesday collide</title>
			<pubDate><![CDATA[Sun, 26 Apr 2026 06:40:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/copperhelm-raises-7-million-for-agentic-cloud-security-platform/]]></guid>
			<link><![CDATA[https://cybernoz.com/copperhelm-raises-7-million-for-agentic-cloud-security-platform/]]></link>
			<title>Copperhelm Raises $7 Million for Agentic Cloud Security Platform</title>
			<pubDate><![CDATA[Sun, 26 Apr 2026 06:15:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/macos-terms-and-trends-you-should-know-about/]]></guid>
			<link><![CDATA[https://cybernoz.com/macos-terms-and-trends-you-should-know-about/]]></link>
			<title>macOS Terms and Trends You Should Know About</title>
			<pubDate><![CDATA[Sun, 26 Apr 2026 03:40:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/microsoft-to-roll-out-entra-passkeys-on-windows-in-late-april/]]></guid>
			<link><![CDATA[https://cybernoz.com/microsoft-to-roll-out-entra-passkeys-on-windows-in-late-april/]]></link>
			<title>Microsoft to roll out Entra passkeys on Windows in late April</title>
			<pubDate><![CDATA[Sun, 26 Apr 2026 03:30:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/claude-ai-agents-close-186-deals-in-anthropics-marketplace-experiment/]]></guid>
			<link><![CDATA[https://cybernoz.com/claude-ai-agents-close-186-deals-in-anthropics-marketplace-experiment/]]></link>
			<title>Claude AI Agents Close 186 Deals in Anthropic&#8217;s Marketplace Experiment</title>
			<pubDate><![CDATA[Sun, 26 Apr 2026 03:20:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/hackers-exploit-ollama-model-uploads-to-leak-server-data/]]></guid>
			<link><![CDATA[https://cybernoz.com/hackers-exploit-ollama-model-uploads-to-leak-server-data/]]></link>
			<title>Hackers Exploit Ollama Model Uploads to Leak Server Data</title>
			<pubDate><![CDATA[Sun, 26 Apr 2026 02:40:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/ai-is-speeding-up-nation-state-cyber-programs/]]></guid>
			<link><![CDATA[https://cybernoz.com/ai-is-speeding-up-nation-state-cyber-programs/]]></link>
			<title>AI is speeding up nation-state cyber programs</title>
			<pubDate><![CDATA[Sun, 26 Apr 2026 02:05:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/vercel-finds-more-compromised-accounts-in-context-ai-linked-breach/]]></guid>
			<link><![CDATA[https://cybernoz.com/vercel-finds-more-compromised-accounts-in-context-ai-linked-breach/]]></link>
			<title>Vercel Finds More Compromised Accounts in Context.ai-Linked Breach</title>
			<pubDate><![CDATA[Sun, 26 Apr 2026 01:55:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/egypt-targets-nearshore-it-outsourcing-market-as-global-demand-shifts/]]></guid>
			<link><![CDATA[https://cybernoz.com/egypt-targets-nearshore-it-outsourcing-market-as-global-demand-shifts/]]></link>
			<title>Egypt targets nearshore IT outsourcing market as global demand shifts</title>
			<pubDate><![CDATA[Sun, 26 Apr 2026 01:50:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/bitwarden-npm-package-hit-in-supply-chain-attack/]]></guid>
			<link><![CDATA[https://cybernoz.com/bitwarden-npm-package-hit-in-supply-chain-attack/]]></link>
			<title>Bitwarden NPM Package Hit in Supply Chain Attack</title>
			<pubDate><![CDATA[Sun, 26 Apr 2026 01:25:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/u-s-cisa-adds-simplehelp-samsung-and-d-link-flaws-to-its-known-exploited-vulnerabilities-catalog/]]></guid>
			<link><![CDATA[https://cybernoz.com/u-s-cisa-adds-simplehelp-samsung-and-d-link-flaws-to-its-known-exploited-vulnerabilities-catalog/]]></link>
			<title>U.S. CISA adds SimpleHelp, Samsung, and D-Link flaws to its Known Exploited Vulnerabilities catalog</title>
			<pubDate><![CDATA[Sun, 26 Apr 2026 01:20:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/malicious-pgserve-automagik-developer-tools-found-in-npm-registry/]]></guid>
			<link><![CDATA[https://cybernoz.com/malicious-pgserve-automagik-developer-tools-found-in-npm-registry/]]></link>
			<title>Malicious pgserve, automagik developer tools found in npm registry</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 23:30:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/cis-controls-security-awareness-training/]]></guid>
			<link><![CDATA[https://cybernoz.com/cis-controls-security-awareness-training/]]></link>
			<title>CIS Controls Security Awareness Training</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 22:50:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/threat-actor-uses-microsoft-teams-to-deploy-new-snow-malware/]]></guid>
			<link><![CDATA[https://cybernoz.com/threat-actor-uses-microsoft-teams-to-deploy-new-snow-malware/]]></link>
			<title>Threat actor uses Microsoft Teams to deploy new “Snow” malware</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 22:40:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/new-windows-rpc-vulnerability-lets-attackers-escalate-privileges-across-all-windows-versions/]]></guid>
			<link><![CDATA[https://cybernoz.com/new-windows-rpc-vulnerability-lets-attackers-escalate-privileges-across-all-windows-versions/]]></link>
			<title>New Windows RPC Vulnerability Lets Attackers Escalate Privileges Across All Windows Versions</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 22:35:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/void-dokkaebi-hackers-spread-malware-through-fake-job-interviews/]]></guid>
			<link><![CDATA[https://cybernoz.com/void-dokkaebi-hackers-spread-malware-through-fake-job-interviews/]]></link>
			<title>Void Dokkaebi Hackers Spread Malware Through Fake Job Interviews</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 21:55:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/ubuntu-26-04-lts-delivers-memory-safe-system-tools-and-live-patching-for-arm-servers/]]></guid>
			<link><![CDATA[https://cybernoz.com/ubuntu-26-04-lts-delivers-memory-safe-system-tools-and-live-patching-for-arm-servers/]]></link>
			<title>Ubuntu 26.04 LTS delivers memory-safe system tools and live patching for Arm servers</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 21:20:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/lmdeploy-cve-2026-33626-flaw-exploited-within-13-hours-of-disclosure/]]></guid>
			<link><![CDATA[https://cybernoz.com/lmdeploy-cve-2026-33626-flaw-exploited-within-13-hours-of-disclosure/]]></link>
			<title>LMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of Disclosure</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 21:10:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/microsoft-faces-court-battle-in-2bn-windows-server-class-action/]]></guid>
			<link><![CDATA[https://cybernoz.com/microsoft-faces-court-battle-in-2bn-windows-server-class-action/]]></link>
			<title>Microsoft faces court battle in £2bn Windows Server class action</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 21:05:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/vulnerabilities-patched-in-crowdstrike-tenable-products/]]></guid>
			<link><![CDATA[https://cybernoz.com/vulnerabilities-patched-in-crowdstrike-tenable-products/]]></link>
			<title>Vulnerabilities Patched in CrowdStrike, Tenable Products</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 20:40:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/claude-mythos-signals-a-new-era-in-ai-driven-security-finding-271-flaws-in-firefox/]]></guid>
			<link><![CDATA[https://cybernoz.com/claude-mythos-signals-a-new-era-in-ai-driven-security-finding-271-flaws-in-firefox/]]></link>
			<title>Claude Mythos signals a new era in AI-driven security, finding 271 flaws in Firefox</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 18:45:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/huntress-mdr-for-microsoft-365-update/]]></guid>
			<link><![CDATA[https://cybernoz.com/huntress-mdr-for-microsoft-365-update/]]></link>
			<title>Huntress MDR for Microsoft 365 Update</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 18:05:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/microsoft-rolls-out-revamped-windows-insider-program/]]></guid>
			<link><![CDATA[https://cybernoz.com/microsoft-rolls-out-revamped-windows-insider-program/]]></link>
			<title>Microsoft rolls out revamped Windows Insider Program</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 17:55:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/cisa-warns-of-multiple-simplehelp-vulnerabilities-exploited-in-attack/]]></guid>
			<link><![CDATA[https://cybernoz.com/cisa-warns-of-multiple-simplehelp-vulnerabilities-exploited-in-attack/]]></link>
			<title>CISA Warns of Multiple SimpleHelp Vulnerabilities Exploited in Attack</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 17:50:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/xiongmai-ip-camera-flaw-lets-attackers-bypass-authentication/]]></guid>
			<link><![CDATA[https://cybernoz.com/xiongmai-ip-camera-flaw-lets-attackers-bypass-authentication/]]></link>
			<title>Xiongmai IP Camera Flaw Lets Attackers Bypass Authentication</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 17:10:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/meta-is-overhauling-how-you-sign-in-manage-settings-and-protect-your-accounts/]]></guid>
			<link><![CDATA[https://cybernoz.com/meta-is-overhauling-how-you-sign-in-manage-settings-and-protect-your-accounts/]]></link>
			<title>Meta is overhauling how you sign in, manage settings, and protect your accounts</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 16:35:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/tropic-trooper-uses-trojanized-sumatrapdf-and-github-to-deploy-adaptixc2/]]></guid>
			<link><![CDATA[https://cybernoz.com/tropic-trooper-uses-trojanized-sumatrapdf-and-github-to-deploy-adaptixc2/]]></link>
			<title>Tropic Trooper Uses Trojanized SumatraPDF and GitHub to Deploy AdaptixC2</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 16:25:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/lloyds-register-evaluates-ai-based-nautical-navigation/]]></guid>
			<link><![CDATA[https://cybernoz.com/lloyds-register-evaluates-ai-based-nautical-navigation/]]></link>
			<title>Lloyds Register evaluates AI-based nautical navigation</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 16:20:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/us-federal-agencys-cisco-firewall-infected-with-firestarter-backdoor/]]></guid>
			<link><![CDATA[https://cybernoz.com/us-federal-agencys-cisco-firewall-infected-with-firestarter-backdoor/]]></link>
			<title>US Federal Agency&#8217;s Cisco Firewall Infected With &#8216;Firestarter&#8217; Backdoor</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 15:55:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/over-400000-sites-at-risk-as-hackers-exploit-breeze-cache-plugin-flaw-cve-2026-3844/]]></guid>
			<link><![CDATA[https://cybernoz.com/over-400000-sites-at-risk-as-hackers-exploit-breeze-cache-plugin-flaw-cve-2026-3844/]]></link>
			<title>Over 400,000 sites at risk as hackers exploit Breeze Cache plugin flaw (CVE-2026-3844)</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 15:50:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/riddled-with-flaws-serial-to-ethernet-converters-endanger-critical-infrastructure/]]></guid>
			<link><![CDATA[https://cybernoz.com/riddled-with-flaws-serial-to-ethernet-converters-endanger-critical-infrastructure/]]></link>
			<title>Riddled with flaws, serial-to-Ethernet converters endanger critical infrastructure</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 14:00:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/exploring-the-value-of-indicators-in-small-business-defense/]]></guid>
			<link><![CDATA[https://cybernoz.com/exploring-the-value-of-indicators-in-small-business-defense/]]></link>
			<title>Exploring the Value of Indicators In Small Business Defense</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 13:20:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/new-blackfile-extortion-group-linked-to-surge-of-vishing-attacks/]]></guid>
			<link><![CDATA[https://cybernoz.com/new-blackfile-extortion-group-linked-to-surge-of-vishing-attacks/]]></link>
			<title>New BlackFile extortion group linked to surge of vishing attacks</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 13:10:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/gpt-5-5-bio-bug-bounty-to-strengthen-advanced-ai-capabilities/]]></guid>
			<link><![CDATA[https://cybernoz.com/gpt-5-5-bio-bug-bounty-to-strengthen-advanced-ai-capabilities/]]></link>
			<title>GPT‑5.5 Bio Bug Bounty to Strengthen Advanced AI Capabilities</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 13:05:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/discord-sleuths-gained-unauthorized-access-to-anthropics-mythos/]]></guid>
			<link><![CDATA[https://cybernoz.com/discord-sleuths-gained-unauthorized-access-to-anthropics-mythos/]]></link>
			<title>Discord Sleuths Gained Unauthorized Access to Anthropic’s Mythos</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 12:40:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/hackers-exploit-pastebin-powershell-script-to-hijack-telegram-sessions/]]></guid>
			<link><![CDATA[https://cybernoz.com/hackers-exploit-pastebin-powershell-script-to-hijack-telegram-sessions/]]></link>
			<title>Hackers Exploit Pastebin PowerShell Script to Hijack Telegram Sessions</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 12:25:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/fake-captcha-pages-exploit-clicks-to-send-costly-international-texts/]]></guid>
			<link><![CDATA[https://cybernoz.com/fake-captcha-pages-exploit-clicks-to-send-costly-international-texts/]]></link>
			<title>Fake CAPTCHA Pages Exploit Clicks to Send Costly International Texts</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 12:10:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/new-cisco-firewall-malware-can-only-be-killed-by-pulling-the-plug/]]></guid>
			<link><![CDATA[https://cybernoz.com/new-cisco-firewall-malware-can-only-be-killed-by-pulling-the-plug/]]></link>
			<title>New Cisco firewall malware can only be killed by pulling the plug</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 11:50:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/researchers-uncover-pre-stuxnet-fast16-malware-targeting-engineering-software/]]></guid>
			<link><![CDATA[https://cybernoz.com/researchers-uncover-pre-stuxnet-fast16-malware-targeting-engineering-software/]]></link>
			<title>Researchers Uncover Pre-Stuxnet ‘fast16’ Malware Targeting Engineering Software</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 11:40:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/government-should-drop-capita-from-civil-service-scheme-after-it-loses-royal-mail-role-says-union/]]></guid>
			<link><![CDATA[https://cybernoz.com/government-should-drop-capita-from-civil-service-scheme-after-it-loses-royal-mail-role-says-union/]]></link>
			<title>Government should drop Capita from civil service scheme after it loses Royal Mail role, says union</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 11:35:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/china-linked-apt-gopherwhisper-abuses-legitimate-services-in-government-attacks/]]></guid>
			<link><![CDATA[https://cybernoz.com/china-linked-apt-gopherwhisper-abuses-legitimate-services-in-government-attacks/]]></link>
			<title>China-Linked APT GopherWhisper Abuses Legitimate Services in Government Attacks</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 11:10:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/the-calm-before-the-ransomware-storm-what-you-see-is-not-all-there-is/]]></guid>
			<link><![CDATA[https://cybernoz.com/the-calm-before-the-ransomware-storm-what-you-see-is-not-all-there-is/]]></link>
			<title>The calm before the ransomware storm: What you see is not all there is</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 10:10:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/google-drafts-ai-agents-to-secure-systems-against-ai-hackers/]]></guid>
			<link><![CDATA[https://cybernoz.com/google-drafts-ai-agents-to-secure-systems-against-ai-hackers/]]></link>
			<title>Google drafts AI agents to secure systems against AI hackers</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 09:15:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/orienting-intelligence-requirements-to-the-small-business-space/]]></guid>
			<link><![CDATA[https://cybernoz.com/orienting-intelligence-requirements-to-the-small-business-space/]]></link>
			<title>Orienting Intelligence Requirements to the Small Business Space</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 08:35:23 +0000]]></pubDate>
		</item>
				</channel>
</rss>
