<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on May 12, 2026 at 12:30 pm by All in One SEO Pro v4.9.6.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://cybernoz.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Cybernoz</title>
		<link><![CDATA[https://cybernoz.com]]></link>
		<description><![CDATA[Cybernoz]]></description>
		<lastBuildDate><![CDATA[Tue, 12 May 2026 09:20:06 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://cybernoz.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://cybernoz.com/hackers-exploit-vercel-genai-to-mass-produce-convincing-phishing-sites/]]></guid>
			<link><![CDATA[https://cybernoz.com/hackers-exploit-vercel-genai-to-mass-produce-convincing-phishing-sites/]]></link>
			<title>Hackers Exploit Vercel GenAI to Mass-Produce Convincing Phishing Sites</title>
			<pubDate><![CDATA[Tue, 12 May 2026 09:20:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/openais-daybreak-uses-codex-security-to-identify-risky-attack-paths/]]></guid>
			<link><![CDATA[https://cybernoz.com/openais-daybreak-uses-codex-security-to-identify-risky-attack-paths/]]></link>
			<title>OpenAI’s Daybreak uses Codex Security to identify risky attack paths</title>
			<pubDate><![CDATA[Tue, 12 May 2026 09:00:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/instructure-reaches-ransom-agreement-with-shinyhunters-to-stop-3-65tb-canvas-leak/]]></guid>
			<link><![CDATA[https://cybernoz.com/instructure-reaches-ransom-agreement-with-shinyhunters-to-stop-3-65tb-canvas-leak/]]></link>
			<title>Instructure Reaches Ransom Agreement with ShinyHunters to Stop 3.65TB Canvas Leak</title>
			<pubDate><![CDATA[Tue, 12 May 2026 08:50:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/the-netherlands-leads-in-quantum-technology-but-lags-on-quantum-security/]]></guid>
			<link><![CDATA[https://cybernoz.com/the-netherlands-leads-in-quantum-technology-but-lags-on-quantum-security/]]></link>
			<title>The Netherlands leads in quantum technology but lags on quantum security</title>
			<pubDate><![CDATA[Tue, 12 May 2026 08:45:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/ai-skills-development-could-define-europes-future/]]></guid>
			<link><![CDATA[https://cybernoz.com/ai-skills-development-could-define-europes-future/]]></link>
			<title>AI Skills Development Could Define Europe’s Future</title>
			<pubDate><![CDATA[Tue, 12 May 2026 08:40:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/openai-daybreak-introduces-gpt-5-5-for-security-operations/]]></guid>
			<link><![CDATA[https://cybernoz.com/openai-daybreak-introduces-gpt-5-5-for-security-operations/]]></link>
			<title>OpenAI Daybreak Introduces GPT-5.5 For Security Operations</title>
			<pubDate><![CDATA[Tue, 12 May 2026 08:35:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/trend-micros-enterprise-unit-shuts-sydney-engineering-team/]]></guid>
			<link><![CDATA[https://cybernoz.com/trend-micros-enterprise-unit-shuts-sydney-engineering-team/]]></link>
			<title>Trend Micro&#8217;s enterprise unit shuts Sydney engineering team</title>
			<pubDate><![CDATA[Tue, 12 May 2026 08:30:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/cloudflare-lays-off-1100-employees-in-ai-driven-restructuring/]]></guid>
			<link><![CDATA[https://cybernoz.com/cloudflare-lays-off-1100-employees-in-ai-driven-restructuring/]]></link>
			<title>Cloudflare Lays Off 1,100 Employees in AI-Driven Restructuring</title>
			<pubDate><![CDATA[Tue, 12 May 2026 08:20:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/android-banking-trojan-trickmo-evolves-using-ton-network-for-c2/]]></guid>
			<link><![CDATA[https://cybernoz.com/android-banking-trojan-trickmo-evolves-using-ton-network-for-c2/]]></link>
			<title>Android banking Trojan TrickMo evolves using TON network for C2</title>
			<pubDate><![CDATA[Tue, 12 May 2026 08:15:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/eyes-wide-open-how-to-mitigate-the-security-and-privacy-risks-of-smart-glasses/]]></guid>
			<link><![CDATA[https://cybernoz.com/eyes-wide-open-how-to-mitigate-the-security-and-privacy-risks-of-smart-glasses/]]></link>
			<title>Eyes wide open: How to mitigate the security and privacy risks of smart glasses</title>
			<pubDate><![CDATA[Tue, 12 May 2026 07:20:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/over-72000-hongkongers-hit-as-hkust-polyu-among-institutions-in-global-canvas-hack/]]></guid>
			<link><![CDATA[https://cybernoz.com/over-72000-hongkongers-hit-as-hkust-polyu-among-institutions-in-global-canvas-hack/]]></link>
			<title>Over 72,000 Hongkongers hit as HKUST, PolyU among institutions in global Canvas hack</title>
			<pubDate><![CDATA[Tue, 12 May 2026 07:10:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/cybersicherheitsvorschriften-so-erfullen-sie-ihre-compliance-anforderungen/]]></guid>
			<link><![CDATA[https://cybernoz.com/cybersicherheitsvorschriften-so-erfullen-sie-ihre-compliance-anforderungen/]]></link>
			<title>Cybersicherheitsvorschriften: So erfüllen Sie Ihre Compliance-Anforderungen</title>
			<pubDate><![CDATA[Tue, 12 May 2026 06:25:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/veeam-backup-replication-cve-2023-27532-response/]]></guid>
			<link><![CDATA[https://cybernoz.com/veeam-backup-replication-cve-2023-27532-response/]]></link>
			<title>Veeam Backup &#038; Replication CVE-2023-27532 Response</title>
			<pubDate><![CDATA[Tue, 12 May 2026 05:45:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/official-checkmarx-jenkins-package-compromised-with-infostealer/]]></guid>
			<link><![CDATA[https://cybernoz.com/official-checkmarx-jenkins-package-compromised-with-infostealer/]]></link>
			<title>Official CheckMarx Jenkins package compromised with infostealer</title>
			<pubDate><![CDATA[Tue, 12 May 2026 05:35:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/new-bitunlocker-downgrade-attack-on-windows-11-allows-access-to-encrypted-disks-in-5-minutes/]]></guid>
			<link><![CDATA[https://cybernoz.com/new-bitunlocker-downgrade-attack-on-windows-11-allows-access-to-encrypted-disks-in-5-minutes/]]></link>
			<title>New BitUnlocker Downgrade Attack on Windows 11 Allows Access to Encrypted Disks in 5 Minutes</title>
			<pubDate><![CDATA[Tue, 12 May 2026 05:30:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/python-infostealer-hides-in-github-releases-to-bypass-detection/]]></guid>
			<link><![CDATA[https://cybernoz.com/python-infostealer-hides-in-github-releases-to-bypass-detection/]]></link>
			<title>Python Infostealer Hides in GitHub Releases to Bypass Detection</title>
			<pubDate><![CDATA[Tue, 12 May 2026 04:50:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/cybersecurity-jobs-available-right-now-may-12-2026/]]></guid>
			<link><![CDATA[https://cybernoz.com/cybersecurity-jobs-available-right-now-may-12-2026/]]></link>
			<title>Cybersecurity jobs available right now: May 12, 2026</title>
			<pubDate><![CDATA[Tue, 12 May 2026 04:15:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/hackers-used-ai-to-develop-first-known-zero-day-2fa-bypass-for-mass-exploitation/]]></guid>
			<link><![CDATA[https://cybernoz.com/hackers-used-ai-to-develop-first-known-zero-day-2fa-bypass-for-mass-exploitation/]]></link>
			<title>Hackers Used AI to Develop First Known Zero-Day 2FA Bypass for Mass Exploitation</title>
			<pubDate><![CDATA[Tue, 12 May 2026 04:05:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/security-chiefs-too-polite-for-startups-says-cyber-flywheel-founder-alastair-paterson/]]></guid>
			<link><![CDATA[https://cybernoz.com/security-chiefs-too-polite-for-startups-says-cyber-flywheel-founder-alastair-paterson/]]></link>
			<title>Security chiefs ‘too polite’ for startups, says cyber flywheel founder Alastair Paterson</title>
			<pubDate><![CDATA[Tue, 12 May 2026 04:00:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/eu-says-openai-offers-to-open-access-to-cyber-security-model/]]></guid>
			<link><![CDATA[https://cybernoz.com/eu-says-openai-offers-to-open-access-to-cyber-security-model/]]></link>
			<title>EU says OpenAI offers to open access to cyber security model</title>
			<pubDate><![CDATA[Tue, 12 May 2026 03:45:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/skoda-data-breach-hits-online-shop-customers/]]></guid>
			<link><![CDATA[https://cybernoz.com/skoda-data-breach-hits-online-shop-customers/]]></link>
			<title>Skoda Data Breach Hits Online Shop Customers</title>
			<pubDate><![CDATA[Tue, 12 May 2026 03:35:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/u-s-cisa-adds-a-flaw-in-berriai-litellm-to-its-known-exploited-vulnerabilities-catalog/]]></guid>
			<link><![CDATA[https://cybernoz.com/u-s-cisa-adds-a-flaw-in-berriai-litellm-to-its-known-exploited-vulnerabilities-catalog/]]></link>
			<title>U.S. CISA adds a flaw in BerriAI LiteLLM to its Known Exploited Vulnerabilities catalog</title>
			<pubDate><![CDATA[Tue, 12 May 2026 03:30:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/pressure-mounts-on-canvas-as-data-leak-extortion-deadline-looms/]]></guid>
			<link><![CDATA[https://cybernoz.com/pressure-mounts-on-canvas-as-data-leak-extortion-deadline-looms/]]></link>
			<title>Pressure mounts on Canvas as data leak extortion deadline looms</title>
			<pubDate><![CDATA[Tue, 12 May 2026 02:40:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/japans-new-spy-agency-receives-fbi-backing-with-eyes-on-china-and-russia/]]></guid>
			<link><![CDATA[https://cybernoz.com/japans-new-spy-agency-receives-fbi-backing-with-eyes-on-china-and-russia/]]></link>
			<title>Japan’s new spy agency receives FBI backing with eyes on China and Russia</title>
			<pubDate><![CDATA[Tue, 12 May 2026 02:25:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/isaca-poll-finds-ai-adoption-outpaces-governance-and-roi/]]></guid>
			<link><![CDATA[https://cybernoz.com/isaca-poll-finds-ai-adoption-outpaces-governance-and-roi/]]></link>
			<title>ISACA poll finds AI adoption outpaces governance and ROI</title>
			<pubDate><![CDATA[Tue, 12 May 2026 02:20:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/linux-kernel-maintainers-suggest-a-kill-switch-to-protect-systems-until-a-zero-day-vulnerability-is-patched/]]></guid>
			<link><![CDATA[https://cybernoz.com/linux-kernel-maintainers-suggest-a-kill-switch-to-protect-systems-until-a-zero-day-vulnerability-is-patched/]]></link>
			<title>Linux kernel maintainers suggest a ‘kill switch’ to protect systems until a zero-day vulnerability is patched</title>
			<pubDate><![CDATA[Tue, 12 May 2026 01:40:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/linux-bitten-by-second-severe-vulnerability-in-as-many-weeks/]]></guid>
			<link><![CDATA[https://cybernoz.com/linux-bitten-by-second-severe-vulnerability-in-as-many-weeks/]]></link>
			<title>Linux bitten by second severe vulnerability in as many weeks</title>
			<pubDate><![CDATA[Tue, 12 May 2026 01:30:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/axonius-federal-systems-targets-fedramp-high-certification-to-support-mission-critical-federal-agencies/]]></guid>
			<link><![CDATA[https://cybernoz.com/axonius-federal-systems-targets-fedramp-high-certification-to-support-mission-critical-federal-agencies/]]></link>
			<title>Axonius Federal Systems targets FedRAMP High certification to support mission-critical federal agencies</title>
			<pubDate><![CDATA[Tue, 12 May 2026 01:20:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/cna-taps-atos-for-expanded-cybersecurity-identity-management-and-infrastructure-operations-support/]]></guid>
			<link><![CDATA[https://cybernoz.com/cna-taps-atos-for-expanded-cybersecurity-identity-management-and-infrastructure-operations-support/]]></link>
			<title>CNA taps Atos for expanded cybersecurity, identity management and infrastructure operations support</title>
			<pubDate><![CDATA[Tue, 12 May 2026 01:15:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/bringing-ai-code-security-into-qualys-etm/]]></guid>
			<link><![CDATA[https://cybernoz.com/bringing-ai-code-security-into-qualys-etm/]]></link>
			<title>Bringing AI Code Security into Qualys ETM</title>
			<pubDate><![CDATA[Tue, 12 May 2026 01:00:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/gm-agrees-to-12-75m-california-settlement-over-sale-of-drivers-data/]]></guid>
			<link><![CDATA[https://cybernoz.com/gm-agrees-to-12-75m-california-settlement-over-sale-of-drivers-data/]]></link>
			<title>GM agrees to $12.75M California settlement over sale of drivers’ data</title>
			<pubDate><![CDATA[Tue, 12 May 2026 00:50:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/google-warns-of-hackers-using-ai-to-create-working-zero-day-exploit/]]></guid>
			<link><![CDATA[https://cybernoz.com/google-warns-of-hackers-using-ai-to-create-working-zero-day-exploit/]]></link>
			<title>Google Warns of Hackers Using AI to Create Working Zero-Day Exploit</title>
			<pubDate><![CDATA[Tue, 12 May 2026 00:45:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/cpanel-and-whm-servers-targeted-in-attacks-exploiting-cve-2026-41940/]]></guid>
			<link><![CDATA[https://cybernoz.com/cpanel-and-whm-servers-targeted-in-attacks-exploiting-cve-2026-41940/]]></link>
			<title>cPanel and WHM Servers Targeted in Attacks Exploiting CVE-2026-41940</title>
			<pubDate><![CDATA[Tue, 12 May 2026 00:05:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/google-says-hackers-used-ai-to-develop-a-zero-day-exploit/]]></guid>
			<link><![CDATA[https://cybernoz.com/google-says-hackers-used-ai-to-develop-a-zero-day-exploit/]]></link>
			<title>Google Says Hackers Used AI to Develop a Zero-Day Exploit</title>
			<pubDate><![CDATA[Mon, 11 May 2026 23:50:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/ios-26-5-is-out-bringing-encrypted-rcs-messaging-to-iphone-and-android-users/]]></guid>
			<link><![CDATA[https://cybernoz.com/ios-26-5-is-out-bringing-encrypted-rcs-messaging-to-iphone-and-android-users/]]></link>
			<title>iOS 26.5 is out, bringing encrypted RCS messaging to iPhone and Android users</title>
			<pubDate><![CDATA[Mon, 11 May 2026 23:30:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/teampcp-compromises-checkmarx-jenkins-ast-plugin-weeks-after-kics-supply-chain-attack/]]></guid>
			<link><![CDATA[https://cybernoz.com/teampcp-compromises-checkmarx-jenkins-ast-plugin-weeks-after-kics-supply-chain-attack/]]></link>
			<title>TeamPCP Compromises Checkmarx Jenkins AST Plugin Weeks After KICS Supply Chain Attack</title>
			<pubDate><![CDATA[Mon, 11 May 2026 23:20:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/ico-fines-cl0p-victim-south-staffs-water-over-data-breach/]]></guid>
			<link><![CDATA[https://cybernoz.com/ico-fines-cl0p-victim-south-staffs-water-over-data-breach/]]></link>
			<title>ICO fines Cl0p victim South Staffs Water over data breach</title>
			<pubDate><![CDATA[Mon, 11 May 2026 23:15:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/lendi-group-runs-first-project-through-agentic-sdlc/]]></guid>
			<link><![CDATA[https://cybernoz.com/lendi-group-runs-first-project-through-agentic-sdlc/]]></link>
			<title>Lendi Group runs first project through &#8220;agentic SDLC&#8221;</title>
			<pubDate><![CDATA[Mon, 11 May 2026 23:00:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/build-application-firewalls-aim-to-stop-the-next-supply-chain-attack/]]></guid>
			<link><![CDATA[https://cybernoz.com/build-application-firewalls-aim-to-stop-the-next-supply-chain-attack/]]></link>
			<title>Build Application Firewalls Aim to Stop the Next Supply Chain Attack</title>
			<pubDate><![CDATA[Mon, 11 May 2026 22:50:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/identity-security-firm-sailpoint-discloses-github-repository-breach/]]></guid>
			<link><![CDATA[https://cybernoz.com/identity-security-firm-sailpoint-discloses-github-repository-breach/]]></link>
			<title>Identity security firm SailPoint discloses GitHub repository breach</title>
			<pubDate><![CDATA[Mon, 11 May 2026 22:45:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/the-main-path-to-truly-creative-ai/]]></guid>
			<link><![CDATA[https://cybernoz.com/the-main-path-to-truly-creative-ai/]]></link>
			<title>The Main Path to Truly Creative AI</title>
			<pubDate><![CDATA[Mon, 11 May 2026 22:35:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/entries-now-open-for-the-2026-cso30-australia-awards/]]></guid>
			<link><![CDATA[https://cybernoz.com/entries-now-open-for-the-2026-cso30-australia-awards/]]></link>
			<title>Entries now open for the 2026 CSO30 Australia Awards</title>
			<pubDate><![CDATA[Mon, 11 May 2026 20:50:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/bsidesnola-2026-brings-industrial-security-ics-education-and-cyber-resilience-into-focus/]]></guid>
			<link><![CDATA[https://cybernoz.com/bsidesnola-2026-brings-industrial-security-ics-education-and-cyber-resilience-into-focus/]]></link>
			<title>BSidesNOLA 2026 brings industrial security, ICS education and cyber resilience into focus</title>
			<pubDate><![CDATA[Mon, 11 May 2026 20:30:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/uae-cybersecurity-council-nozomi-enter-alliance-to-advance-national-cyber-capabilities-and-resilience/]]></guid>
			<link><![CDATA[https://cybernoz.com/uae-cybersecurity-council-nozomi-enter-alliance-to-advance-national-cyber-capabilities-and-resilience/]]></link>
			<title>UAE Cybersecurity Council, Nozomi enter alliance to advance national cyber capabilities and resilience</title>
			<pubDate><![CDATA[Mon, 11 May 2026 20:25:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/complimentary-virtual-training-get-hands-on-with-aws-security-services/]]></guid>
			<link><![CDATA[https://cybernoz.com/complimentary-virtual-training-get-hands-on-with-aws-security-services/]]></link>
			<title>Complimentary virtual training: Get hands-on with AWS Security Services</title>
			<pubDate><![CDATA[Mon, 11 May 2026 20:20:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/elastic-security-mcp-app-fast-interactive-security-operations-elastic-security-labs/]]></guid>
			<link><![CDATA[https://cybernoz.com/elastic-security-mcp-app-fast-interactive-security-operations-elastic-security-labs/]]></link>
			<title>Elastic Security MCP App: fast &#038; interactive security operations — Elastic Security Labs</title>
			<pubDate><![CDATA[Mon, 11 May 2026 20:10:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/instructure-confirms-hackers-used-canvas-flaw-to-deface-portals/]]></guid>
			<link><![CDATA[https://cybernoz.com/instructure-confirms-hackers-used-canvas-flaw-to-deface-portals/]]></link>
			<title>Instructure confirms hackers used Canvas flaw to deface portals</title>
			<pubDate><![CDATA[Mon, 11 May 2026 20:00:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/popular-go-library-fsnotify-raises-supply-chain-alarms-after-maintainer-access-changes/]]></guid>
			<link><![CDATA[https://cybernoz.com/popular-go-library-fsnotify-raises-supply-chain-alarms-after-maintainer-access-changes/]]></link>
			<title>Popular Go Library fsnotify Raises Supply Chain Alarms After Maintainer Access Changes</title>
			<pubDate><![CDATA[Mon, 11 May 2026 19:55:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/lyrie-ai-joins-anthropic-cyber-verification-program/]]></guid>
			<link><![CDATA[https://cybernoz.com/lyrie-ai-joins-anthropic-cyber-verification-program/]]></link>
			<title>Lyrie.ai Joins Anthropic Cyber Verification Program</title>
			<pubDate><![CDATA[Mon, 11 May 2026 19:15:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybernoz.com/9-year-old-dirty-frag-vulnerability-enables-root-access-on-linux-systems/]]></guid>
			<link><![CDATA[https://cybernoz.com/9-year-old-dirty-frag-vulnerability-enables-root-access-on-linux-systems/]]></link>
			<title>9-Year-Old Dirty Frag Vulnerability Enables Root Access on Linux Systems</title>
			<pubDate><![CDATA[Mon, 11 May 2026 19:00:09 +0000]]></pubDate>
		</item>
				</channel>
</rss>
