<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 3, 2026 at 5:35 pm by All in One SEO v4.9.3 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://thecybersecurity.network/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>The Cyber Security Network</title>
		<link><![CDATA[https://thecybersecurity.network]]></link>
		<description><![CDATA[The Cyber Security Network]]></description>
		<lastBuildDate><![CDATA[Fri, 03 Apr 2026 16:00:21 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://thecybersecurity.network/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://thecybersecurity.network/npm-supply-chain-attack-unc1069-uses-social-engineering-on-axios-maintainer-2/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/npm-supply-chain-attack-unc1069-uses-social-engineering-on-axios-maintainer-2/]]></link>
			<title>NPM Supply Chain Attack: UNC1069 Uses Social Engineering on Axios Maintainer</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 16:00:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/new-sparkcat-malware-variant-targets-ios-and-android-devices-to-steal-crypto-wallets-2/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/new-sparkcat-malware-variant-targets-ios-and-android-devices-to-steal-crypto-wallets-2/]]></link>
			<title>New SparkCat Malware Variant Targets iOS and Android Devices to Steal Crypto Wallets</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 14:40:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/closing-the-third-party-risk-gap-a-crucial-step-in-enhancing-client-security/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/closing-the-third-party-risk-gap-a-crucial-step-in-enhancing-client-security/]]></link>
			<title>Closing the Third-Party Risk Gap: A Crucial Step in Enhancing Client Security</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 14:20:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/npm-supply-chain-attack-unc1069-uses-social-engineering-on-axios-maintainer/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/npm-supply-chain-attack-unc1069-uses-social-engineering-on-axios-maintainer/]]></link>
			<title>npm Supply Chain Attack: UNC1069 Uses Social Engineering on Axios Maintainer</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 14:00:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/hackers-breach-766-next-js-hosts-using-cve-2025-55182-a-large-scale-credential-harvesting-operation-2/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/hackers-breach-766-next-js-hosts-using-cve-2025-55182-a-large-scale-credential-harvesting-operation-2/]]></link>
			<title>Hackers Breach 766 Next.js Hosts Using CVE-2025-55182: A Large-Scale Credential Harvesting Operation</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 12:40:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/new-sparkcat-malware-variant-targets-ios-and-android-users-crypto-wallets/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/new-sparkcat-malware-variant-targets-ios-and-android-users-crypto-wallets/]]></link>
			<title>New SparkCat Malware Variant Targets iOS and Android Users&#8217; Crypto Wallets</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 12:00:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/hackers-breach-766-next-js-hosts-using-cve-2025-55182-credential-harvesting-operation-uncovered/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/hackers-breach-766-next-js-hosts-using-cve-2025-55182-credential-harvesting-operation-uncovered/]]></link>
			<title>Hackers Breach 766 Next.js Hosts Using CVE-2025-55182: Credential Harvesting Operation Uncovered</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 10:40:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/drift-suffers-285-million-loss-in-sophisticated-durable-nonce-social-engineering-attack/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/drift-suffers-285-million-loss-in-sophisticated-durable-nonce-social-engineering-attack/]]></link>
			<title>Drift Suffers $285 Million Loss in Sophisticated Durable Nonce Social Engineering Attack</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 10:20:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/new-sparkcat-malware-variant-targets-ios-and-android-devices-to-steal-crypto-wallets/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/new-sparkcat-malware-variant-targets-ios-and-android-devices-to-steal-crypto-wallets/]]></link>
			<title>New SparkCat Malware Variant Targets iOS and Android Devices to Steal Crypto Wallets</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 10:00:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cybersecurity-alert-chain-exploits-rootkits-and-cloudtrail-evasion-on-the-rise/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cybersecurity-alert-chain-exploits-rootkits-and-cloudtrail-evasion-on-the-rise/]]></link>
			<title>Cybersecurity Alert: Chain Exploits, Rootkits, and CloudTrail Evasion on the Rise</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 08:40:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cisco-releases-critical-security-patches-for-imc-and-ssm-vulnerabilities/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cisco-releases-critical-security-patches-for-imc-and-ssm-vulnerabilities/]]></link>
			<title>Cisco Releases Critical Security Patches for IMC and SSM Vulnerabilities</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 08:20:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cve-2025-55182-exploited-in-large-scale-credential-harvesting-operation/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cve-2025-55182-exploited-in-large-scale-credential-harvesting-operation/]]></link>
			<title>CVE-2025-55182 Exploited in Large-Scale Credential Harvesting Operation</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 08:00:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cybersecurity-threats-pre-auth-chains-android-rootkits-and-cloudtrail-evasion-2/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cybersecurity-threats-pre-auth-chains-android-rootkits-and-cloudtrail-evasion-2/]]></link>
			<title>Cybersecurity Threats: Pre-Auth Chains, Android Rootkits, and CloudTrail Evasion</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 06:40:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cisco-patches-critical-imc-vulnerability-with-9-8-cvss-score-4/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cisco-patches-critical-imc-vulnerability-with-9-8-cvss-score-4/]]></link>
			<title>Cisco Patches Critical IMC Vulnerability with 9.8 CVSS Score</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 06:20:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/next-js-hosting-breach-hackers-exploit-cve-2025-55182-for-credential-harvesting/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/next-js-hosting-breach-hackers-exploit-cve-2025-55182-for-credential-harvesting/]]></link>
			<title>Next.js Hosting Breach: Hackers Exploit CVE-2025-55182 for Credential Harvesting</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 06:00:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cybersecurity-threats-on-the-rise-pre-auth-chains-android-rootkits-and-cloudtrail-evasion/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cybersecurity-threats-on-the-rise-pre-auth-chains-android-rootkits-and-cloudtrail-evasion/]]></link>
			<title>Cybersecurity Threats on the Rise: Pre-Auth Chains, Android Rootkits and CloudTrail Evasion</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 04:40:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cisco-patches-critical-9-8-cvss-vulnerability-in-integrated-management-controller/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cisco-patches-critical-9-8-cvss-vulnerability-in-integrated-management-controller/]]></link>
			<title>Cisco Patches Critical 9.8 CVSS Vulnerability in Integrated Management Controller</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 04:20:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/massive-credential-harvesting-operation-exploits-cve-2025-55182-in-next-js-hosts-2/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/massive-credential-harvesting-operation-exploits-cve-2025-55182-in-next-js-hosts-2/]]></link>
			<title>Massive Credential Harvesting Operation Exploits CVE-2025-55182 in Next.js Hosts</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 04:00:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cybersecurity-threats-escalate-pre-auth-chains-android-rootkits-and-cloudtrail-evasion/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cybersecurity-threats-escalate-pre-auth-chains-android-rootkits-and-cloudtrail-evasion/]]></link>
			<title>Cybersecurity Threats Escalate: Pre-Auth Chains, Android Rootkits, and CloudTrail Evasion</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 02:40:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/hackers-breach-766-next-js-hosts-using-cve-2025-55182-a-large-scale-credential-harvesting-operation/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/hackers-breach-766-next-js-hosts-using-cve-2025-55182-a-large-scale-credential-harvesting-operation/]]></link>
			<title>Hackers Breach 766 Next.js Hosts Using CVE-2025-55182: A Large-Scale Credential Harvesting Operation</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 02:00:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cybersecurity-threats-pre-auth-chains-android-rootkits-and-cloudtrail-evasion/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cybersecurity-threats-pre-auth-chains-android-rootkits-and-cloudtrail-evasion/]]></link>
			<title>Cybersecurity Threats: Pre-Auth Chains, Android Rootkits, and CloudTrail Evasion</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 00:40:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cisco-patches-critical-imc-and-ssm-vulnerabilities-with-9-8-cvss-score/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cisco-patches-critical-imc-and-ssm-vulnerabilities-with-9-8-cvss-score/]]></link>
			<title>Cisco Patches Critical IMC and SSM Vulnerabilities with 9.8 CVSS Score</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 00:20:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/massive-credential-harvesting-operation-exploits-cve-2025-55182-in-next-js-hosts/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/massive-credential-harvesting-operation-exploits-cve-2025-55182-in-next-js-hosts/]]></link>
			<title>Massive Credential Harvesting Operation Exploits CVE-2025-55182 in Next.js Hosts</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 00:00:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/latest-cyber-threats-pre-auth-chains-android-rootkits-and-cloudtrail-evasion/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/latest-cyber-threats-pre-auth-chains-android-rootkits-and-cloudtrail-evasion/]]></link>
			<title>Latest Cyber Threats: Pre-Auth Chains, Android Rootkits, and CloudTrail Evasion</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 22:40:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cisco-patches-critical-imc-vulnerability-with-9-8-cvss-score-3/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cisco-patches-critical-imc-vulnerability-with-9-8-cvss-score-3/]]></link>
			<title>Cisco Patches Critical IMC Vulnerability with 9.8 CVSS Score</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 22:20:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/massive-credential-harvesting-operation-exploits-react2shell-vulnerability-cve-2025-55182/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/massive-credential-harvesting-operation-exploits-react2shell-vulnerability-cve-2025-55182/]]></link>
			<title>Massive Credential Harvesting Operation Exploits React2Shell Vulnerability CVE-2025-55182</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 22:00:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/new-cryptojacking-campaign-uncovered-ref1695-operation-spreads-rats-and-miners/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/new-cryptojacking-campaign-uncovered-ref1695-operation-spreads-rats-and-miners/]]></link>
			<title>New Cryptojacking Campaign Uncovered: REF1695 Operation Spreads RATs and Miners</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 20:40:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cisco-patches-critical-imc-vulnerability-with-9-8-cvss-score-2/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cisco-patches-critical-imc-vulnerability-with-9-8-cvss-score-2/]]></link>
			<title>Cisco Patches Critical IMC Vulnerability with 9.8 CVSS Score</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 20:00:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/researchers-expose-large-scale-cryptojacking-operation-using-fake-iso-files/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/researchers-expose-large-scale-cryptojacking-operation-using-fake-iso-files/]]></link>
			<title>Researchers Expose Large-Scale Cryptojacking Operation Using Fake ISO Files</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 18:40:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cybersecurity-alert-pre-auth-chains-android-rootkits-and-cloudtrail-evasion/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cybersecurity-alert-pre-auth-chains-android-rootkits-and-cloudtrail-evasion/]]></link>
			<title>Cybersecurity Alert: Pre-Auth Chains, Android Rootkits and CloudTrail Evasion</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 18:20:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cisco-patches-critical-imc-vulnerability-with-9-8-cvss-score/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cisco-patches-critical-imc-vulnerability-with-9-8-cvss-score/]]></link>
			<title>Cisco Patches Critical IMC Vulnerability with 9.8 CVSS Score</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 18:00:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/the-state-of-open-source-security-insights-and-trends/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/the-state-of-open-source-security-insights-and-trends/]]></link>
			<title>The State of Open Source Security: Insights and Trends</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 16:40:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cyber-attackers-use-fake-iso-files-to-spread-remote-access-trojans-and-crypto-miners/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cyber-attackers-use-fake-iso-files-to-spread-remote-access-trojans-and-crypto-miners/]]></link>
			<title>Cyber Attackers Use Fake ISO Files to Spread Remote Access Trojans and Crypto Miners</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 16:20:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cybersecurity-threats-latest-pre-auth-chain-exploits-android-rootkits-and-cloudtrail-evasion-techniques/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cybersecurity-threats-latest-pre-auth-chain-exploits-android-rootkits-and-cloudtrail-evasion-techniques/]]></link>
			<title>Cybersecurity Threats: Latest Pre-Auth Chain Exploits, Android Rootkits and CloudTrail Evasion Techniques</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 16:00:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/whatsapp-spyware-attack-200-users-targeted-via-fake-ios-app-2/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/whatsapp-spyware-attack-200-users-targeted-via-fake-ios-app-2/]]></link>
			<title>WhatsApp Spyware Attack: 200 Users Targeted via Fake iOS App</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:40:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/state-of-trusted-open-source-report-highlights-open-source-consumption-and-vulnerabilities/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/state-of-trusted-open-source-report-highlights-open-source-consumption-and-vulnerabilities/]]></link>
			<title>State of Trusted Open Source Report Highlights Open Source Consumption and Vulnerabilities</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:20:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/researchers-expose-crypto-mining-operation-using-fake-iso-files-to-spread-malware/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/researchers-expose-crypto-mining-operation-using-fake-iso-files-to-spread-malware/]]></link>
			<title>Researchers Expose Crypto Mining Operation Using Fake ISO Files to Spread Malware</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 14:00:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/whatsapp-warns-200-users-of-spyware-attack-via-fake-ios-app/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/whatsapp-warns-200-users-of-spyware-attack-via-fake-ios-app/]]></link>
			<title>WhatsApp Warns 200 Users of Spyware Attack via Fake iOS App</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 12:40:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/2026-open-source-security-report-trends-and-vulnerabilities/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/2026-open-source-security-report-trends-and-vulnerabilities/]]></link>
			<title>2026 Open Source Security Report: Trends and Vulnerabilities</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 12:20:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cryptocurrency-mining-operation-spreads-rats-and-miners-via-fake-iso-files/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cryptocurrency-mining-operation-spreads-rats-and-miners-via-fake-iso-files/]]></link>
			<title>Cryptocurrency Mining Operation Spreads RATs and Miners via Fake ISO Files</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 12:00:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/ukraine-cyber-agency-impersonated-1-million-emails-targeted-with-agewheeze-malware/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/ukraine-cyber-agency-impersonated-1-million-emails-targeted-with-agewheeze-malware/]]></link>
			<title>Ukraine Cyber Agency Impersonated: 1 Million Emails Targeted with AGEWHEEZE Malware</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 11:32:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/whatsapp-spyware-attack-200-users-targeted-via-fake-ios-app/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/whatsapp-spyware-attack-200-users-targeted-via-fake-ios-app/]]></link>
			<title>WhatsApp Spyware Attack: 200 Users Targeted via Fake iOS App</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 10:55:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/whatsapp-users-targeted-by-fake-ios-app-with-spyware-200-users-alerted/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/whatsapp-users-targeted-by-fake-ios-app-with-spyware-200-users-alerted/]]></link>
			<title>WhatsApp Users Targeted by Fake iOS App with Spyware: 200 Users Alerted</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 10:52:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/apple-rolls-out-ios-18-7-7-update-to-combat-darksword-exploit-across-more-devices/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/apple-rolls-out-ios-18-7-7-update-to-combat-darksword-exploit-across-more-devices/]]></link>
			<title>Apple Rolls Out iOS 18.7.7 Update to Combat DarkSword Exploit Across More Devices</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 10:00:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/third-party-risk-the-hidden-gap-in-client-security-posture/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/third-party-risk-the-hidden-gap-in-client-security-posture/]]></link>
			<title>Third-Party Risk: The Hidden Gap in Client Security Posture</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 16:20:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/casbaneiro-phishing-campaign-hits-latin-america-and-europe-with-sophisticated-pdf-lures/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/casbaneiro-phishing-campaign-hits-latin-america-and-europe-with-sophisticated-pdf-lures/]]></link>
			<title>Casbaneiro Phishing Campaign Hits Latin America and Europe with Sophisticated PDF Lures</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 10:00:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/google-chrome-zero-day-vulnerability-cve-2026-5281-exploited-in-the-wild-patch-now/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/google-chrome-zero-day-vulnerability-cve-2026-5281-exploited-in-the-wild-patch-now/]]></link>
			<title>Google Chrome Zero-Day Vulnerability CVE-2026-5281 Exploited in the Wild &#8211; Patch Now</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 10:00:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/casbaneiro-phishing-campaign-targets-latin-america-and-europe-with-dynamic-pdf-lures-4/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/casbaneiro-phishing-campaign-targets-latin-america-and-europe-with-dynamic-pdf-lures-4/]]></link>
			<title>Casbaneiro Phishing Campaign Targets Latin America and Europe with Dynamic PDF Lures</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 08:00:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/google-chrome-zero-day-vulnerability-cve-2026-5281-patch-now-to-avoid-active-exploits/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/google-chrome-zero-day-vulnerability-cve-2026-5281-patch-now-to-avoid-active-exploits/]]></link>
			<title>Google Chrome Zero-Day Vulnerability CVE-2026-5281: Patch Now to Avoid Active Exploits</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 08:00:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/new-sparkcat-malware-variant-targets-ios-and-android-devices-to-steal-crypto-wallet-recovery-phrases/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/new-sparkcat-malware-variant-targets-ios-and-android-devices-to-steal-crypto-wallet-recovery-phrases/]]></link>
			<title>New SparkCat Malware Variant Targets iOS and Android Devices to Steal Crypto Wallet Recovery Phrases</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 16:40:21 +0000]]></pubDate>
		</item>
				</channel>
</rss>
