<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 7, 2026 at 3:46 pm by All in One SEO v4.9.3 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://thecybersecurity.network/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>The Cyber Security Network</title>
		<link><![CDATA[https://thecybersecurity.network]]></link>
		<description><![CDATA[The Cyber Security Network]]></description>
		<lastBuildDate><![CDATA[Tue, 07 Apr 2026 14:40:28 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://thecybersecurity.network/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://thecybersecurity.network/the-devastating-financial-impact-of-recurring-credential-incidents/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/the-devastating-financial-impact-of-recurring-credential-incidents/]]></link>
			<title>The Devastating Financial Impact of Recurring Credential Incidents</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 14:40:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/closing-identity-gaps-in-enterprise-security-a-growing-concern-in-2026/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/closing-identity-gaps-in-enterprise-security-a-growing-concern-in-2026/]]></link>
			<title>Closing Identity Gaps in Enterprise Security: A Growing Concern in 2026</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 14:20:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/comfyui-instances-under-siege-cryptomining-botnet-campaign-exploits-vulnerabilities/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/comfyui-instances-under-siege-cryptomining-botnet-campaign-exploits-vulnerabilities/]]></link>
			<title>ComfyUI Instances Under Siege: Cryptomining Botnet Campaign Exploits Vulnerabilities</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 14:00:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cve-2025-55182-exploited-in-massive-credential-harvesting-operation/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cve-2025-55182-exploited-in-massive-credential-harvesting-operation/]]></link>
			<title>CVE-2025-55182 Exploited in Massive Credential Harvesting Operation</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 12:40:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cybersecurity-weekly-recap-high-profile-hacks-and-0-day-exploits-3/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cybersecurity-weekly-recap-high-profile-hacks-and-0-day-exploits-3/]]></link>
			<title>Cybersecurity Weekly Recap: High-Profile Hacks and 0-Day Exploits</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 12:20:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/gpubreach-attack-new-cpu-privilege-escalation-vulnerability-in-gpus/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/gpubreach-attack-new-cpu-privilege-escalation-vulnerability-in-gpus/]]></link>
			<title>GPUBreach Attack: New CPU Privilege Escalation Vulnerability in GPUs</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 12:00:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/north-korea-linked-to-285-million-drift-hack-in-sophisticated-social-engineering-operation/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/north-korea-linked-to-285-million-drift-hack-in-sophisticated-social-engineering-operation/]]></link>
			<title>North Korea Linked to $285 Million Drift Hack in Sophisticated Social Engineering Operation</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 10:40:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cybersecurity-weekly-recap-high-profile-hacks-and-0-day-exploits-2/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cybersecurity-weekly-recap-high-profile-hacks-and-0-day-exploits-2/]]></link>
			<title>Cybersecurity Weekly Recap: High-Profile Hacks and 0-Day Exploits</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 10:20:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/gpubreach-attack-how-rowhammer-exploits-can-take-full-control-of-host-systems/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/gpubreach-attack-how-rowhammer-exploits-can-take-full-control-of-host-systems/]]></link>
			<title>GPUBreach Attack: How RowHammer Exploits Can Take Full Control of Host Systems</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 10:00:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cybersecurity-weekly-recap-top-threats-and-vulnerabilities-3/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cybersecurity-weekly-recap-top-threats-and-vulnerabilities-3/]]></link>
			<title>Cybersecurity Weekly Recap: Top Threats and Vulnerabilities</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 08:40:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/mitigating-multi-os-cyberattacks-a-3-step-strategy-for-socs/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/mitigating-multi-os-cyberattacks-a-3-step-strategy-for-socs/]]></link>
			<title>Mitigating Multi-OS Cyberattacks: A 3-Step Strategy for SOCs</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 08:20:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/china-linked-hackers-exploit-zero-days-to-deploy-medusa-ransomware/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/china-linked-hackers-exploit-zero-days-to-deploy-medusa-ransomware/]]></link>
			<title>China-Linked Hackers Exploit Zero-Days to Deploy Medusa Ransomware</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 08:00:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cybersecurity-weekly-recap-high-profile-hacks-and-0-day-exploits/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cybersecurity-weekly-recap-high-profile-hacks-and-0-day-exploits/]]></link>
			<title>Cybersecurity Weekly Recap: High-Profile Hacks and 0-Day Exploits</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 06:40:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/mitigating-multi-os-cyberattacks-a-3-step-approach-for-security-leaders/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/mitigating-multi-os-cyberattacks-a-3-step-approach-for-security-leaders/]]></link>
			<title>Mitigating Multi-OS Cyberattacks: A 3-Step Approach for Security Leaders</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 06:20:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/critical-flowise-ai-agent-builder-vulnerability-under-active-exploitation/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/critical-flowise-ai-agent-builder-vulnerability-under-active-exploitation/]]></link>
			<title>Critical Flowise AI Agent Builder Vulnerability Under Active Exploitation</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 06:00:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/german-authorities-unmask-revil-ransomware-leaders-behind-130-attacks/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/german-authorities-unmask-revil-ransomware-leaders-behind-130-attacks/]]></link>
			<title>German Authorities Unmask REvil Ransomware Leaders Behind 130 Attacks</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 04:40:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cybersecurity-weekly-recap-key-vulnerabilities-and-exploits-exposed/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cybersecurity-weekly-recap-key-vulnerabilities-and-exploits-exposed/]]></link>
			<title>Cybersecurity Weekly Recap: Key Vulnerabilities and Exploits Exposed</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 04:20:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/protecting-against-multi-os-cyberattacks-a-3-step-strategy/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/protecting-against-multi-os-cyberattacks-a-3-step-strategy/]]></link>
			<title>Protecting Against Multi-OS Cyberattacks: A 3-Step Strategy</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 04:00:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/german-authorities-uncover-identities-of-revil-ransomware-operators/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/german-authorities-uncover-identities-of-revil-ransomware-operators/]]></link>
			<title>German Authorities Uncover Identities of REvil Ransomware Operators</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 02:40:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cybersecurity-weekly-recap-top-threats-and-vulnerabilities-2/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cybersecurity-weekly-recap-top-threats-and-vulnerabilities-2/]]></link>
			<title>Cybersecurity Weekly Recap: Top Threats and Vulnerabilities</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 02:20:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/mitigating-multi-os-cyberattacks-a-3-step-strategy-for-soc-teams/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/mitigating-multi-os-cyberattacks-a-3-step-strategy-for-soc-teams/]]></link>
			<title>Mitigating Multi-OS Cyberattacks: A 3-Step Strategy for SOC Teams</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 02:00:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/qilin-and-warlock-ransomware-exploit-vulnerable-drivers-to-evade-detection/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/qilin-and-warlock-ransomware-exploit-vulnerable-drivers-to-evade-detection/]]></link>
			<title>Qilin and Warlock Ransomware Exploit Vulnerable Drivers to Evade Detection</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 00:40:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cybersecurity-weekly-recap-high-profile-hacks-and-exploits-2/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cybersecurity-weekly-recap-high-profile-hacks-and-exploits-2/]]></link>
			<title>Cybersecurity Weekly Recap: High-Profile Hacks and Exploits</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 00:20:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/multi-os-cyberattacks-protecting-your-enterprise-in-a-fragmented-landscape-2/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/multi-os-cyberattacks-protecting-your-enterprise-in-a-fragmented-landscape-2/]]></link>
			<title>Multi-OS Cyberattacks: Protecting Your Enterprise in a Fragmented Landscape</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 00:00:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/whatsapp-spyware-attack-200-users-targeted-by-fake-ios-app/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/whatsapp-spyware-attack-200-users-targeted-by-fake-ios-app/]]></link>
			<title>WhatsApp Spyware Attack: 200 Users Targeted by Fake iOS App</title>
			<pubDate><![CDATA[Sun, 05 Apr 2026 08:20:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cybercriminals-unleash-fake-installers-to-spread-remote-access-trojans-and-crypto-miners/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cybercriminals-unleash-fake-installers-to-spread-remote-access-trojans-and-crypto-miners/]]></link>
			<title>Cybercriminals Unleash Fake Installers to Spread Remote Access Trojans and Crypto Miners</title>
			<pubDate><![CDATA[Sun, 05 Apr 2026 08:00:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/iran-linked-hackers-launch-password-spraying-attacks-on-microsoft-365/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/iran-linked-hackers-launch-password-spraying-attacks-on-microsoft-365/]]></link>
			<title>Iran-Linked Hackers Launch Password-Spraying Attacks on Microsoft 365</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 22:00:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cybersecurity-weekly-recap-high-profile-hacks-and-exploits/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cybersecurity-weekly-recap-high-profile-hacks-and-exploits/]]></link>
			<title>Cybersecurity Weekly Recap: High-Profile Hacks and Exploits</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 20:40:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/protecting-against-multi-os-cyberattacks-a-3-step-strategy-for-socs/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/protecting-against-multi-os-cyberattacks-a-3-step-strategy-for-socs/]]></link>
			<title>Protecting Against Multi-OS Cyberattacks: A 3-Step Strategy for SOCs</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 20:20:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/iran-linked-hackers-launch-password-spraying-attacks-on-microsoft-365-accounts/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/iran-linked-hackers-launch-password-spraying-attacks-on-microsoft-365-accounts/]]></link>
			<title>Iran-Linked Hackers Launch Password-Spraying Attacks on Microsoft 365 Accounts</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 20:00:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cybersecurity-weekly-recap-top-threats-and-vulnerabilities/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cybersecurity-weekly-recap-top-threats-and-vulnerabilities/]]></link>
			<title>Cybersecurity Weekly Recap: Top Threats and Vulnerabilities</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 18:40:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/protecting-multi-os-environments-from-cyber-threats-a-3-step-approach/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/protecting-multi-os-environments-from-cyber-threats-a-3-step-approach/]]></link>
			<title>Protecting Multi-OS Environments from Cyber Threats: A 3-Step Approach</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 18:20:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/developer-machines-compromised-how-litellm-turned-workstations-into-credential-vaults/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/developer-machines-compromised-how-litellm-turned-workstations-into-credential-vaults/]]></link>
			<title>Developer Machines Compromised: How LiteLLM Turned Workstations into Credential Vaults</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 16:40:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/multi-os-cyberattacks-protecting-your-enterprise-in-a-fragmented-landscape/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/multi-os-cyberattacks-protecting-your-enterprise-in-a-fragmented-landscape/]]></link>
			<title>Multi-OS Cyberattacks: Protecting Your Enterprise in a Fragmented Landscape</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 16:00:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/the-evolution-of-enterprise-security-moving-beyond-doctor-no-10/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/the-evolution-of-enterprise-security-moving-beyond-doctor-no-10/]]></link>
			<title>The Evolution of Enterprise Security: Moving Beyond Doctor No</title>
			<pubDate><![CDATA[Sun, 05 Apr 2026 08:40:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/fortinet-patches-actively-exploited-vulnerability-in-forticlient-ems/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/fortinet-patches-actively-exploited-vulnerability-in-forticlient-ems/]]></link>
			<title>Fortinet Patches Actively Exploited Vulnerability in FortiClient EMS</title>
			<pubDate><![CDATA[Sun, 05 Apr 2026 06:20:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/malicious-npm-packages-exploit-redis-and-postgresql-to-deploy-persistent-implants/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/malicious-npm-packages-exploit-redis-and-postgresql-to-deploy-persistent-implants/]]></link>
			<title>Malicious npm Packages Exploit Redis and PostgreSQL to Deploy Persistent Implants</title>
			<pubDate><![CDATA[Sun, 05 Apr 2026 06:00:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/north-korean-hackers-utilize-github-in-sophisticated-attacks-on-south-korean-organizations/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/north-korean-hackers-utilize-github-in-sophisticated-attacks-on-south-korean-organizations/]]></link>
			<title>North Korean Hackers Utilize GitHub in Sophisticated Attacks on South Korean Organizations</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 18:00:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/chrome-zero-day-vulnerability-cve-2026-5281-exploited-update-released/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/chrome-zero-day-vulnerability-cve-2026-5281-exploited-update-released/]]></link>
			<title>Chrome Zero-Day Vulnerability CVE-2026-5281 Exploited: Update Released</title>
			<pubDate><![CDATA[Sun, 05 Apr 2026 04:40:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/the-evolution-of-enterprise-security-overcoming-the-doctor-no-mindset/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/the-evolution-of-enterprise-security-overcoming-the-doctor-no-mindset/]]></link>
			<title>The Evolution of Enterprise Security: Overcoming the &#8216;Doctor No&#8217; Mindset</title>
			<pubDate><![CDATA[Sun, 05 Apr 2026 04:20:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/ukraine-cybersecurity-agency-impersonated-1-million-emails-infected-with-agewheeze-malware/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/ukraine-cybersecurity-agency-impersonated-1-million-emails-infected-with-agewheeze-malware/]]></link>
			<title>Ukraine Cybersecurity Agency Impersonated: 1 Million Emails Infected with AGEWHEEZE Malware</title>
			<pubDate><![CDATA[Sun, 05 Apr 2026 04:00:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/google-rolls-out-android-developer-verification-to-combat-harmful-apps-13/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/google-rolls-out-android-developer-verification-to-combat-harmful-apps-13/]]></link>
			<title>Google Rolls Out Android Developer Verification to Combat Harmful Apps</title>
			<pubDate><![CDATA[Sun, 05 Apr 2026 02:40:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/google-chrome-zero-day-vulnerability-cve-2026-5281-exploited-in-the-wild-update-now/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/google-chrome-zero-day-vulnerability-cve-2026-5281-exploited-in-the-wild-update-now/]]></link>
			<title>Google Chrome Zero-Day Vulnerability CVE-2026-5281 Exploited in the Wild &#8211; Update Now</title>
			<pubDate><![CDATA[Sun, 05 Apr 2026 02:20:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cybersecurity-weekly-recap-high-profile-hacks-and-vulnerabilities/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cybersecurity-weekly-recap-high-profile-hacks-and-vulnerabilities/]]></link>
			<title>Cybersecurity Weekly Recap: High-Profile Hacks and Vulnerabilities</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 16:20:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/the-evolution-of-enterprise-security-moving-beyond-doctor-no-9/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/the-evolution-of-enterprise-security-moving-beyond-doctor-no-9/]]></link>
			<title>The Evolution of Enterprise Security: Moving Beyond &#8216;Doctor No&#8217;</title>
			<pubDate><![CDATA[Sun, 05 Apr 2026 02:00:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/casbaneiro-phishing-campaign-targets-latin-america-and-europe-with-sophisticated-pdf-lures/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/casbaneiro-phishing-campaign-targets-latin-america-and-europe-with-sophisticated-pdf-lures/]]></link>
			<title>Casbaneiro Phishing Campaign Targets Latin America and Europe with Sophisticated PDF Lures</title>
			<pubDate><![CDATA[Sun, 05 Apr 2026 00:40:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cybersecurity-weekly-recap-top-vulnerabilities-and-threats/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cybersecurity-weekly-recap-top-vulnerabilities-and-threats/]]></link>
			<title>Cybersecurity Weekly Recap: Top Vulnerabilities and Threats</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 22:40:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/the-decline-of-the-security-gatekeeper-embracing-innovation-over-obstruction/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/the-decline-of-the-security-gatekeeper-embracing-innovation-over-obstruction/]]></link>
			<title>The Decline of the Security Gatekeeper: Embracing Innovation Over Obstruction</title>
			<pubDate><![CDATA[Sun, 05 Apr 2026 00:20:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/apple-releases-ios-18-7-7-update-to-combat-darksword-exploit-across-more-devices/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/apple-releases-ios-18-7-7-update-to-combat-darksword-exploit-across-more-devices/]]></link>
			<title>Apple Releases iOS 18.7.7 Update to Combat DarkSword Exploit Across More Devices</title>
			<pubDate><![CDATA[Sun, 05 Apr 2026 00:00:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/protecting-against-multi-os-cyberattacks-a-3-step-strategy-for-socs-2/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/protecting-against-multi-os-cyberattacks-a-3-step-strategy-for-socs-2/]]></link>
			<title>Protecting Against Multi-OS Cyberattacks: A 3-Step Strategy for SOCs</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 22:20:28 +0000]]></pubDate>
		</item>
				</channel>
</rss>
