<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 10, 2026 at 11:30 am by All in One SEO v4.9.3 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://thecybersecurity.network/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>The Cyber Security Network</title>
		<link><![CDATA[https://thecybersecurity.network]]></link>
		<description><![CDATA[The Cyber Security Network]]></description>
		<lastBuildDate><![CDATA[Fri, 10 Apr 2026 10:00:27 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://thecybersecurity.network/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://thecybersecurity.network/google-enhances-chrome-security-with-dbsc-on-windows/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/google-enhances-chrome-security-with-dbsc-on-windows/]]></link>
			<title>Google Enhances Chrome Security with DBSC on Windows</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 10:00:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/weekly-cybersecurity-roundup-hybrid-p2p-botnets-and-revitalized-apache-rce-vulnerabilities/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/weekly-cybersecurity-roundup-hybrid-p2p-botnets-and-revitalized-apache-rce-vulnerabilities/]]></link>
			<title>Weekly Cybersecurity Roundup: Hybrid P2P Botnets and Revitalized Apache RCE Vulnerabilities</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 08:40:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/engagelab-sdk-vulnerability-50m-android-users-exposed-to-data-breach/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/engagelab-sdk-vulnerability-50m-android-users-exposed-to-data-breach/]]></link>
			<title>EngageLab SDK Vulnerability: 50M Android Users Exposed to Data Breach</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 08:20:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/backdoored-smart-slider-3-pro-plugin-thousands-of-wordpress-sites-at-risk/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/backdoored-smart-slider-3-pro-plugin-thousands-of-wordpress-sites-at-risk/]]></link>
			<title>Backdoored Smart Slider 3 Pro Plugin: Thousands of WordPress Sites at Risk</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 08:00:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/mitigating-multi-os-cyberattacks-a-3-step-strategy-for-security-leaders/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/mitigating-multi-os-cyberattacks-a-3-step-strategy-for-security-leaders/]]></link>
			<title>Mitigating Multi-OS Cyberattacks: A 3-Step Strategy for Security Leaders</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 06:40:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cybersecurity-threats-hybrid-p2p-botnets-and-revitalized-apache-vulnerabilities/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cybersecurity-threats-hybrid-p2p-botnets-and-revitalized-apache-vulnerabilities/]]></link>
			<title>Cybersecurity Threats: Hybrid P2P Botnets and Revitalized Apache Vulnerabilities</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 06:20:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/android-users-exposed-engagelab-sdk-vulnerability-puts-50m-at-risk/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/android-users-exposed-engagelab-sdk-vulnerability-puts-50m-at-risk/]]></link>
			<title>Android Users Exposed: EngageLab SDK Vulnerability Puts 50M at Risk</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 06:00:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/protecting-against-multi-os-cyberattacks-a-3-step-strategy-2/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/protecting-against-multi-os-cyberattacks-a-3-step-strategy-2/]]></link>
			<title>Protecting Against Multi-OS Cyberattacks: A 3-Step Strategy</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 04:40:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/developer-machines-compromised-how-litellm-became-a-threat/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/developer-machines-compromised-how-litellm-became-a-threat/]]></link>
			<title>Developer Machines Compromised: How LiteLLM Became a Threat</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 22:40:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/china-linked-hackers-exploit-zero-days-to-deploy-medusa-ransomware-2/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/china-linked-hackers-exploit-zero-days-to-deploy-medusa-ransomware-2/]]></link>
			<title>China-Linked Hackers Exploit Zero-Days to Deploy Medusa Ransomware</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 04:20:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cyber-threats-escalate-hybrid-p2p-botnets-and-apache-vulnerabilities-resurface/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cyber-threats-escalate-hybrid-p2p-botnets-and-apache-vulnerabilities-resurface/]]></link>
			<title>Cyber Threats Escalate: Hybrid P2P Botnets and Apache Vulnerabilities Resurface</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 22:20:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/engagelab-sdk-vulnerability-puts-50m-android-users-at-risk-including-30m-crypto-wallets/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/engagelab-sdk-vulnerability-puts-50m-android-users-at-risk-including-30m-crypto-wallets/]]></link>
			<title>EngageLab SDK Vulnerability Puts 50M Android Users at Risk, Including 30M Crypto Wallets</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 22:00:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cyber-threats-emerging-botnets-and-unpatched-vulnerabilities-2/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cyber-threats-emerging-botnets-and-unpatched-vulnerabilities-2/]]></link>
			<title>Cyber Threats: Emerging Botnets and Unpatched Vulnerabilities</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 04:00:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/german-authorities-uncover-identities-of-revil-ransomware-operators-2/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/german-authorities-uncover-identities-of-revil-ransomware-operators-2/]]></link>
			<title>German Authorities Uncover Identities of REvil Ransomware Operators</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 02:40:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/critical-flowise-ai-agent-builder-vulnerability-under-active-exploitation-2/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/critical-flowise-ai-agent-builder-vulnerability-under-active-exploitation-2/]]></link>
			<title>Critical Flowise AI Agent Builder Vulnerability Under Active Exploitation</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 02:20:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cybersecurity-threats-hybrid-p2p-botnet-and-13-year-old-apache-rce-vulnerability-exploited/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cybersecurity-threats-hybrid-p2p-botnet-and-13-year-old-apache-rce-vulnerability-exploited/]]></link>
			<title>Cybersecurity Threats: Hybrid P2P Botnet and 13-Year-Old Apache RCE Vulnerability Exploited</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 02:00:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/the-evolution-of-enterprise-security-moving-beyond-doctor-no-13/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/the-evolution-of-enterprise-security-moving-beyond-doctor-no-13/]]></link>
			<title>The Evolution of Enterprise Security: Moving Beyond Doctor No</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 00:40:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/qilin-and-warlock-ransomware-exploit-vulnerable-drivers-to-evade-security-tools/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/qilin-and-warlock-ransomware-exploit-vulnerable-drivers-to-evade-security-tools/]]></link>
			<title>Qilin and Warlock Ransomware Exploit Vulnerable Drivers to Evade Security Tools</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 00:20:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cybersecurity-threats-hybrid-p2p-botnet-and-apache-rce-vulnerability-2/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cybersecurity-threats-hybrid-p2p-botnet-and-apache-rce-vulnerability-2/]]></link>
			<title>Cybersecurity Threats: Hybrid P2P Botnet and Apache RCE Vulnerability</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 00:00:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/developer-machines-under-attack-how-litellm-exposed-credentials/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/developer-machines-under-attack-how-litellm-exposed-credentials/]]></link>
			<title>Developer Machines Under Attack: How LiteLLM Exposed Credentials</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 20:40:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cyber-threats-emerging-botnets-and-unpatched-vulnerabilities/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cyber-threats-emerging-botnets-and-unpatched-vulnerabilities/]]></link>
			<title>Cyber Threats: Emerging Botnets and Unpatched Vulnerabilities</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 20:20:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/android-users-exposed-engagelab-sdk-vulnerability-puts-millions-at-risk/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/android-users-exposed-engagelab-sdk-vulnerability-puts-millions-at-risk/]]></link>
			<title>Android Users Exposed: EngageLab SDK Vulnerability Puts Millions at Risk</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 20:00:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/iran-linked-hackers-target-microsoft-365-accounts-in-israel-and-u-a-e-with-password-spraying-campaign/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/iran-linked-hackers-target-microsoft-365-accounts-in-israel-and-u-a-e-with-password-spraying-campaign/]]></link>
			<title>Iran-Linked Hackers Target Microsoft 365 Accounts in Israel and U.A.E with Password-Spraying Campaign</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 18:40:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cybersecurity-threats-hybrid-p2p-botnet-and-apache-rce-vulnerability/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cybersecurity-threats-hybrid-p2p-botnet-and-apache-rce-vulnerability/]]></link>
			<title>Cybersecurity Threats: Hybrid P2P Botnet and Apache RCE Vulnerability</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 18:20:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/taiwanese-ngos-under-attack-uat-10362-and-lucidrook-malware-exposed/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/taiwanese-ngos-under-attack-uat-10362-and-lucidrook-malware-exposed/]]></link>
			<title>Taiwanese NGOs Under Attack: UAT-10362 and LucidRook Malware Exposed</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 18:00:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/the-evolution-of-enterprise-security-moving-beyond-doctor-no-12/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/the-evolution-of-enterprise-security-moving-beyond-doctor-no-12/]]></link>
			<title>The Evolution of Enterprise Security: Moving Beyond &#8216;Doctor No&#8217;</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 16:40:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/developer-workstations-under-attack-the-growing-threat-of-credential-theft/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/developer-workstations-under-attack-the-growing-threat-of-credential-theft/]]></link>
			<title>Developer Workstations Under Attack: The Growing Threat of Credential Theft</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 16:20:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/new-threats-emerge-hybrid-p2p-botnets-and-13-year-old-apache-rce-vulnerabilities/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/new-threats-emerge-hybrid-p2p-botnets-and-13-year-old-apache-rce-vulnerabilities/]]></link>
			<title>New Threats Emerge: Hybrid P2P Botnets and 13-Year-Old Apache RCE Vulnerabilities</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 16:00:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/north-korean-hackers-utilize-github-for-command-and-control-in-sophisticated-attacks-on-south-korea/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/north-korean-hackers-utilize-github-for-command-and-control-in-sophisticated-attacks-on-south-korea/]]></link>
			<title>North Korean Hackers Utilize GitHub for Command and Control in Sophisticated Attacks on South Korea</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 14:40:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/the-growing-threat-of-shadow-ai-uncovering-hidden-security-risks-in-enterprise-environments/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/the-growing-threat-of-shadow-ai-uncovering-hidden-security-risks-in-enterprise-environments/]]></link>
			<title>The Growing Threat of Shadow AI: Uncovering Hidden Security Risks in Enterprise Environments</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 14:20:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cybersecurity-threats-hybrid-p2p-botnet-and-unpatched-apache-vulnerabilities/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cybersecurity-threats-hybrid-p2p-botnet-and-unpatched-apache-vulnerabilities/]]></link>
			<title>Cybersecurity Threats: Hybrid P2P Botnet and Unpatched Apache Vulnerabilities</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 14:00:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/mena-region-under-siege-hack-for-hire-campaign-targets-journalists-and-activists/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/mena-region-under-siege-hack-for-hire-campaign-targets-journalists-and-activists/]]></link>
			<title>MENA Region Under Siege: Hack-for-Hire Campaign Targets Journalists and Activists</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 12:40:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/adobe-reader-zero-day-vulnerability-exploited-by-malicious-pdfs-since-december-2025/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/adobe-reader-zero-day-vulnerability-exploited-by-malicious-pdfs-since-december-2025/]]></link>
			<title>Adobe Reader Zero-Day Vulnerability Exploited by Malicious PDFs Since December 2025</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 12:20:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/mitigating-the-security-risks-of-unsanctioned-ai-in-the-enterprise/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/mitigating-the-security-risks-of-unsanctioned-ai-in-the-enterprise/]]></link>
			<title>Mitigating the Security Risks of Unsanctioned AI in the Enterprise</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 12:00:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/whatsapp-spyware-attack-200-users-targeted-by-fake-ios-app-2/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/whatsapp-spyware-attack-200-users-targeted-by-fake-ios-app-2/]]></link>
			<title>WhatsApp Spyware Attack: 200 Users Targeted by Fake iOS App</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 10:40:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/fortinet-releases-emergency-patch-for-actively-exploited-cve-2026-35616-vulnerability-in-forticlient-ems/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/fortinet-releases-emergency-patch-for-actively-exploited-cve-2026-35616-vulnerability-in-forticlient-ems/]]></link>
			<title>Fortinet Releases Emergency Patch for Actively Exploited CVE-2026-35616 Vulnerability in FortiClient EMS</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 10:20:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/malicious-npm-packages-target-redis-and-postgresql-with-persistent-implants/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/malicious-npm-packages-target-redis-and-postgresql-with-persistent-implants/]]></link>
			<title>Malicious npm Packages Target Redis and PostgreSQL with Persistent Implants</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 10:00:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/embracing-innovation-the-shift-away-from-doctor-no-in-enterprise-security/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/embracing-innovation-the-shift-away-from-doctor-no-in-enterprise-security/]]></link>
			<title>Embracing Innovation: The Shift Away from &#8216;Doctor No&#8217; in Enterprise Security</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 08:40:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/ukraine-cybersecurity-agency-impersonated-to-spread-agewheeze-malware-in-large-scale-phishing-campaign/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/ukraine-cybersecurity-agency-impersonated-to-spread-agewheeze-malware-in-large-scale-phishing-campaign/]]></link>
			<title>Ukraine Cybersecurity Agency Impersonated to Spread AGEWHEEZE Malware in Large-Scale Phishing Campaign</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 08:20:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/36-malicious-npm-packages-used-to-exploit-redis-and-postgresql-vulnerabilities/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/36-malicious-npm-packages-used-to-exploit-redis-and-postgresql-vulnerabilities/]]></link>
			<title>36 Malicious npm Packages Used to Exploit Redis and PostgreSQL Vulnerabilities</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 08:00:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/attackers-exploit-trusted-tools-to-bypass-security-measures/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/attackers-exploit-trusted-tools-to-bypass-security-measures/]]></link>
			<title>Attackers Exploit Trusted Tools to Bypass Security Measures</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 06:40:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/the-evolution-of-enterprise-security-moving-beyond-the-doctor-no-approach-4/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/the-evolution-of-enterprise-security-moving-beyond-the-doctor-no-approach-4/]]></link>
			<title>The Evolution of Enterprise Security: Moving Beyond the &#8216;Doctor No&#8217; Approach</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 06:20:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/ukraine-cybersecurity-agency-impersonated-to-spread-agewheeze-malware/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/ukraine-cybersecurity-agency-impersonated-to-spread-agewheeze-malware/]]></link>
			<title>Ukraine Cybersecurity Agency Impersonated to Spread AGEWHEEZE Malware</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 06:00:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/attackers-exploit-trusted-tools-3-reasons-youre-vulnerable/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/attackers-exploit-trusted-tools-3-reasons-youre-vulnerable/]]></link>
			<title>Attackers Exploit Trusted Tools: 3 Reasons You&#8217;re Vulnerable</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 04:40:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/backdoored-smart-slider-3-pro-update-distributed-via-compromised-nextend-servers/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/backdoored-smart-slider-3-pro-update-distributed-via-compromised-nextend-servers/]]></link>
			<title>Backdoored Smart Slider 3 Pro Update Distributed via Compromised Nextend Servers</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 10:20:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/casbaneiro-phishing-campaign-targets-latin-america-and-europe-with-dynamic-pdf-lures-5/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/casbaneiro-phishing-campaign-targets-latin-america-and-europe-with-dynamic-pdf-lures-5/]]></link>
			<title>Casbaneiro Phishing Campaign Targets Latin America and Europe with Dynamic PDF Lures</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 04:20:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/the-demise-of-doctor-no-embracing-innovation-in-enterprise-security/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/the-demise-of-doctor-no-embracing-innovation-in-enterprise-security/]]></link>
			<title>The Demise of Doctor No: Embracing Innovation in Enterprise Security</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 04:00:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/attackers-exploiting-trusted-tools-3-reasons-youre-vulnerable/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/attackers-exploiting-trusted-tools-3-reasons-youre-vulnerable/]]></link>
			<title>Attackers Exploiting Trusted Tools: 3 Reasons You&#8217;re Vulnerable</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 02:40:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/the-era-of-doctor-no-in-enterprise-security-comes-to-an-end/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/the-era-of-doctor-no-in-enterprise-security-comes-to-an-end/]]></link>
			<title>The Era of &#8216;Doctor No&#8217; in Enterprise Security Comes to an End</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 02:20:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/engagelab-sdk-security-vulnerability-puts-50m-android-users-at-risk/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/engagelab-sdk-security-vulnerability-puts-50m-android-users-at-risk/]]></link>
			<title>EngageLab SDK Security Vulnerability Puts 50M Android Users at Risk</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 10:40:27 +0000]]></pubDate>
		</item>
				</channel>
</rss>
