<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 9, 2026 at 3:33 pm by All in One SEO v4.9.3 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://thecybersecurity.network/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>The Cyber Security Network</title>
		<link><![CDATA[https://thecybersecurity.network]]></link>
		<description><![CDATA[The Cyber Security Network]]></description>
		<lastBuildDate><![CDATA[Thu, 09 Apr 2026 14:00:29 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://thecybersecurity.network/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://thecybersecurity.network/cybersecurity-threats-hybrid-p2p-botnet-and-unpatched-apache-vulnerabilities/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cybersecurity-threats-hybrid-p2p-botnet-and-unpatched-apache-vulnerabilities/]]></link>
			<title>Cybersecurity Threats: Hybrid P2P Botnet and Unpatched Apache Vulnerabilities</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 14:00:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/mena-region-under-siege-hack-for-hire-campaign-targets-journalists-and-activists/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/mena-region-under-siege-hack-for-hire-campaign-targets-journalists-and-activists/]]></link>
			<title>MENA Region Under Siege: Hack-for-Hire Campaign Targets Journalists and Activists</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 12:40:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/adobe-reader-zero-day-vulnerability-exploited-by-malicious-pdfs-since-december-2025/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/adobe-reader-zero-day-vulnerability-exploited-by-malicious-pdfs-since-december-2025/]]></link>
			<title>Adobe Reader Zero-Day Vulnerability Exploited by Malicious PDFs Since December 2025</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 12:20:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/mitigating-the-security-risks-of-unsanctioned-ai-in-the-enterprise/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/mitigating-the-security-risks-of-unsanctioned-ai-in-the-enterprise/]]></link>
			<title>Mitigating the Security Risks of Unsanctioned AI in the Enterprise</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 12:00:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/whatsapp-spyware-attack-200-users-targeted-by-fake-ios-app-2/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/whatsapp-spyware-attack-200-users-targeted-by-fake-ios-app-2/]]></link>
			<title>WhatsApp Spyware Attack: 200 Users Targeted by Fake iOS App</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 10:40:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/fortinet-releases-emergency-patch-for-actively-exploited-cve-2026-35616-vulnerability-in-forticlient-ems/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/fortinet-releases-emergency-patch-for-actively-exploited-cve-2026-35616-vulnerability-in-forticlient-ems/]]></link>
			<title>Fortinet Releases Emergency Patch for Actively Exploited CVE-2026-35616 Vulnerability in FortiClient EMS</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 10:20:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/malicious-npm-packages-target-redis-and-postgresql-with-persistent-implants/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/malicious-npm-packages-target-redis-and-postgresql-with-persistent-implants/]]></link>
			<title>Malicious npm Packages Target Redis and PostgreSQL with Persistent Implants</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 10:00:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/embracing-innovation-the-shift-away-from-doctor-no-in-enterprise-security/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/embracing-innovation-the-shift-away-from-doctor-no-in-enterprise-security/]]></link>
			<title>Embracing Innovation: The Shift Away from &#8216;Doctor No&#8217; in Enterprise Security</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 08:40:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/ukraine-cybersecurity-agency-impersonated-to-spread-agewheeze-malware-in-large-scale-phishing-campaign/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/ukraine-cybersecurity-agency-impersonated-to-spread-agewheeze-malware-in-large-scale-phishing-campaign/]]></link>
			<title>Ukraine Cybersecurity Agency Impersonated to Spread AGEWHEEZE Malware in Large-Scale Phishing Campaign</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 08:20:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/36-malicious-npm-packages-used-to-exploit-redis-and-postgresql-vulnerabilities/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/36-malicious-npm-packages-used-to-exploit-redis-and-postgresql-vulnerabilities/]]></link>
			<title>36 Malicious npm Packages Used to Exploit Redis and PostgreSQL Vulnerabilities</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 08:00:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/attackers-exploit-trusted-tools-to-bypass-security-measures/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/attackers-exploit-trusted-tools-to-bypass-security-measures/]]></link>
			<title>Attackers Exploit Trusted Tools to Bypass Security Measures</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 06:40:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/the-evolution-of-enterprise-security-moving-beyond-the-doctor-no-approach-4/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/the-evolution-of-enterprise-security-moving-beyond-the-doctor-no-approach-4/]]></link>
			<title>The Evolution of Enterprise Security: Moving Beyond the &#8216;Doctor No&#8217; Approach</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 06:20:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/ukraine-cybersecurity-agency-impersonated-to-spread-agewheeze-malware/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/ukraine-cybersecurity-agency-impersonated-to-spread-agewheeze-malware/]]></link>
			<title>Ukraine Cybersecurity Agency Impersonated to Spread AGEWHEEZE Malware</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 06:00:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/attackers-exploit-trusted-tools-3-reasons-youre-vulnerable/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/attackers-exploit-trusted-tools-3-reasons-youre-vulnerable/]]></link>
			<title>Attackers Exploit Trusted Tools: 3 Reasons You&#8217;re Vulnerable</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 04:40:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/casbaneiro-phishing-campaign-targets-latin-america-and-europe-with-dynamic-pdf-lures-5/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/casbaneiro-phishing-campaign-targets-latin-america-and-europe-with-dynamic-pdf-lures-5/]]></link>
			<title>Casbaneiro Phishing Campaign Targets Latin America and Europe with Dynamic PDF Lures</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 04:20:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/the-demise-of-doctor-no-embracing-innovation-in-enterprise-security/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/the-demise-of-doctor-no-embracing-innovation-in-enterprise-security/]]></link>
			<title>The Demise of Doctor No: Embracing Innovation in Enterprise Security</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 04:00:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/attackers-exploiting-trusted-tools-3-reasons-youre-vulnerable/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/attackers-exploiting-trusted-tools-3-reasons-youre-vulnerable/]]></link>
			<title>Attackers Exploiting Trusted Tools: 3 Reasons You&#8217;re Vulnerable</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 02:40:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/the-era-of-doctor-no-in-enterprise-security-comes-to-an-end/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/the-era-of-doctor-no-in-enterprise-security-comes-to-an-end/]]></link>
			<title>The Era of &#8216;Doctor No&#8217; in Enterprise Security Comes to an End</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 02:20:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/apple-releases-ios-18-7-7-update-to-counter-darksword-exploit-across-more-devices/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/apple-releases-ios-18-7-7-update-to-counter-darksword-exploit-across-more-devices/]]></link>
			<title>Apple Releases iOS 18.7.7 Update to Counter DarkSword Exploit Across More Devices</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 02:00:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/the-evolution-of-enterprise-security-moving-beyond-the-doctor-no-approach-3/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/the-evolution-of-enterprise-security-moving-beyond-the-doctor-no-approach-3/]]></link>
			<title>The Evolution of Enterprise Security: Moving Beyond the &#8216;Doctor No&#8217; Approach</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 00:40:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/microsoft-warns-of-whatsapp-delivered-vbs-malware-threat-to-windows-users/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/microsoft-warns-of-whatsapp-delivered-vbs-malware-threat-to-windows-users/]]></link>
			<title>Microsoft Warns of WhatsApp-Delivered VBS Malware Threat to Windows Users</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 00:20:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/microsoft-alerts-users-to-whatsapp-vbs-malware-campaign-with-uac-bypass/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/microsoft-alerts-users-to-whatsapp-vbs-malware-campaign-with-uac-bypass/]]></link>
			<title>Microsoft Alerts Users to WhatsApp VBS Malware Campaign with UAC Bypass</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 22:40:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cisco-imc-vulnerability-9-8-cvss-security-flaw-allows-remote-system-takeover/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cisco-imc-vulnerability-9-8-cvss-security-flaw-allows-remote-system-takeover/]]></link>
			<title>Cisco IMC Vulnerability: 9.8 CVSS Security Flaw Allows Remote System Takeover</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 00:00:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cisco-patches-critical-imc-vulnerability-with-9-8-cvss-score-8/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cisco-patches-critical-imc-vulnerability-with-9-8-cvss-score-8/]]></link>
			<title>Cisco Patches Critical IMC Vulnerability with 9.8 CVSS Score</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 22:20:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/new-chaos-malware-variant-exploits-misconfigured-cloud-deployments-with-enhanced-socks-proxy-capability/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/new-chaos-malware-variant-exploits-misconfigured-cloud-deployments-with-enhanced-socks-proxy-capability/]]></link>
			<title>New Chaos Malware Variant Exploits Misconfigured Cloud Deployments with Enhanced SOCKS Proxy Capability</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 22:00:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cisco-patches-critical-imc-vulnerability-with-9-8-cvss-score-7/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cisco-patches-critical-imc-vulnerability-with-9-8-cvss-score-7/]]></link>
			<title>Cisco Patches Critical IMC Vulnerability with 9.8 CVSS Score</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 20:40:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/simplifying-enterprise-identity-management-through-visibility-and-intelligence/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/simplifying-enterprise-identity-management-through-visibility-and-intelligence/]]></link>
			<title>Simplifying Enterprise Identity Management through Visibility and Intelligence</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 20:20:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/chaos-malware-expands-to-target-misconfigured-cloud-deployments-with-enhanced-capabilities/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/chaos-malware-expands-to-target-misconfigured-cloud-deployments-with-enhanced-capabilities/]]></link>
			<title>Chaos Malware Expands to Target Misconfigured Cloud Deployments with Enhanced Capabilities</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 20:00:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cisco-patches-critical-imc-and-ssm-vulnerabilities-with-9-8-cvss-score-2/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cisco-patches-critical-imc-and-ssm-vulnerabilities-with-9-8-cvss-score-2/]]></link>
			<title>Cisco Patches Critical IMC and SSM Vulnerabilities with 9.8 CVSS Score</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 18:40:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/reducing-identity-and-access-management-risks-with-enhanced-visibility/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/reducing-identity-and-access-management-risks-with-enhanced-visibility/]]></link>
			<title>Reducing Identity and Access Management Risks with Enhanced Visibility</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 18:20:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/masjesu-botnet-the-rising-ddos-for-hire-service-targeting-iot-devices/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/masjesu-botnet-the-rising-ddos-for-hire-service-targeting-iot-devices/]]></link>
			<title>Masjesu Botnet: The Rising DDoS-for-Hire Service Targeting IoT Devices</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 18:00:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/anthropics-ai-powered-claude-mythos-uncovers-thousands-of-zero-day-vulnerabilities/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/anthropics-ai-powered-claude-mythos-uncovers-thousands-of-zero-day-vulnerabilities/]]></link>
			<title>Anthropic&#8217;s AI-Powered Claude Mythos Uncovers Thousands of Zero-Day Vulnerabilities</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 16:40:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/reducing-enterprise-identity-risks-with-identity-visibility-and-intelligence/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/reducing-enterprise-identity-risks-with-identity-visibility-and-intelligence/]]></link>
			<title>Reducing Enterprise Identity Risks with Identity Visibility and Intelligence</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 16:20:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/apt28-targets-ukraine-and-nato-allies-with-sophisticated-prismex-malware/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/apt28-targets-ukraine-and-nato-allies-with-sophisticated-prismex-malware/]]></link>
			<title>APT28 Targets Ukraine and NATO Allies with Sophisticated PRISMEX Malware</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 16:00:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cisco-patches-critical-imc-vulnerability-with-9-8-cvss-score-6/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cisco-patches-critical-imc-vulnerability-with-9-8-cvss-score-6/]]></link>
			<title>Cisco Patches Critical IMC Vulnerability with 9.8 CVSS Score</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 14:40:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/ai-powered-security-anthropics-claude-mythos-uncovers-thousands-of-zero-day-vulnerabilities/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/ai-powered-security-anthropics-claude-mythos-uncovers-thousands-of-zero-day-vulnerabilities/]]></link>
			<title>AI-Powered Security: Anthropic&#8217;s Claude Mythos Uncovers Thousands of Zero-Day Vulnerabilities</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 14:20:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/mitigating-identity-risks-with-enhanced-visibility-in-enterprise-iam/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/mitigating-identity-risks-with-enhanced-visibility-in-enterprise-iam/]]></link>
			<title>Mitigating Identity Risks with Enhanced Visibility in Enterprise IAM</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 14:00:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cisco-patches-critical-imc-vulnerability-with-9-8-cvss-score-5/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cisco-patches-critical-imc-vulnerability-with-9-8-cvss-score-5/]]></link>
			<title>Cisco Patches Critical IMC Vulnerability with 9.8 CVSS Score</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 12:40:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/ai-powered-cybersecurity-initiative-uncovers-thousands-of-zero-day-vulnerabilities/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/ai-powered-cybersecurity-initiative-uncovers-thousands-of-zero-day-vulnerabilities/]]></link>
			<title>AI-Powered Cybersecurity Initiative Uncovers Thousands of Zero-Day Vulnerabilities</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 12:20:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/reducing-identity-related-risks-with-identity-visibility-and-intelligence/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/reducing-identity-related-risks-with-identity-visibility-and-intelligence/]]></link>
			<title>Reducing Identity-Related Risks with Identity Visibility and Intelligence</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 12:00:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/npm-supply-chain-attack-unc1069-uses-social-engineering-on-axios-maintainer-4/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/npm-supply-chain-attack-unc1069-uses-social-engineering-on-axios-maintainer-4/]]></link>
			<title>npm Supply Chain Attack: UNC1069 Uses Social Engineering on Axios Maintainer</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 10:40:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/north-korean-hackers-spread-malicious-packages-across-npm-pypi-and-other-ecosystems/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/north-korean-hackers-spread-malicious-packages-across-npm-pypi-and-other-ecosystems/]]></link>
			<title>North Korean Hackers Spread Malicious Packages Across npm, PyPI, and Other Ecosystems</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 10:20:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/ai-powered-cybersecurity-anthropics-claude-mythos-uncovers-thousands-of-zero-day-vulnerabilities/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/ai-powered-cybersecurity-anthropics-claude-mythos-uncovers-thousands-of-zero-day-vulnerabilities/]]></link>
			<title>AI-Powered Cybersecurity: Anthropic&#8217;s Claude Mythos Uncovers Thousands of Zero-Day Vulnerabilities</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 10:00:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/the-evolution-of-enterprise-security-moving-beyond-the-doctor-no-approach-2/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/the-evolution-of-enterprise-security-moving-beyond-the-doctor-no-approach-2/]]></link>
			<title>The Evolution of Enterprise Security: Moving Beyond the &#8216;Doctor No&#8217; Approach</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 08:40:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/the-growing-threat-of-shadow-ai-uncovering-hidden-security-risks-in-enterprise-environments/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/the-growing-threat-of-shadow-ai-uncovering-hidden-security-risks-in-enterprise-environments/]]></link>
			<title>The Growing Threat of Shadow AI: Uncovering Hidden Security Risks in Enterprise Environments</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 14:20:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cookie-controlled-php-web-shells-a-growing-threat-to-linux-servers/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cookie-controlled-php-web-shells-a-growing-threat-to-linux-servers/]]></link>
			<title>Cookie-Controlled PHP Web Shells: A Growing Threat to Linux Servers</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 08:20:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/china-linked-ta416-targets-european-governments-with-sophisticated-malware-and-phishing-tactics-4/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/china-linked-ta416-targets-european-governments-with-sophisticated-malware-and-phishing-tactics-4/]]></link>
			<title>China-Linked TA416 Targets European Governments with Sophisticated Malware and Phishing Tactics</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 08:00:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/google-rolls-out-android-developer-verification-to-combat-harmful-apps-14/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/google-rolls-out-android-developer-verification-to-combat-harmful-apps-14/]]></link>
			<title>Google Rolls Out Android Developer Verification to Combat Harmful Apps</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 06:40:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/the-rise-of-risk-based-security-moving-beyond-the-doctor-no-approach/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/the-rise-of-risk-based-security-moving-beyond-the-doctor-no-approach/]]></link>
			<title>The Rise of Risk-Based Security: Moving Beyond the &#8216;Doctor No&#8217; Approach</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 06:20:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/north-korean-hackers-utilize-github-for-command-and-control-in-sophisticated-attacks-on-south-korea/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/north-korean-hackers-utilize-github-for-command-and-control-in-sophisticated-attacks-on-south-korea/]]></link>
			<title>North Korean Hackers Utilize GitHub for Command and Control in Sophisticated Attacks on South Korea</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 14:40:29 +0000]]></pubDate>
		</item>
				</channel>
</rss>
