<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 8, 2026 at 8:44 pm by All in One SEO v4.9.3 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://thecybersecurity.network/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>The Cyber Security Network</title>
		<link><![CDATA[https://thecybersecurity.network]]></link>
		<description><![CDATA[The Cyber Security Network]]></description>
		<lastBuildDate><![CDATA[Wed, 08 Apr 2026 20:40:27 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://thecybersecurity.network/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://thecybersecurity.network/cisco-patches-critical-imc-vulnerability-with-9-8-cvss-score-7/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cisco-patches-critical-imc-vulnerability-with-9-8-cvss-score-7/]]></link>
			<title>Cisco Patches Critical IMC Vulnerability with 9.8 CVSS Score</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 20:40:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/simplifying-enterprise-identity-management-through-visibility-and-intelligence/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/simplifying-enterprise-identity-management-through-visibility-and-intelligence/]]></link>
			<title>Simplifying Enterprise Identity Management through Visibility and Intelligence</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 20:20:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/chaos-malware-expands-to-target-misconfigured-cloud-deployments-with-enhanced-capabilities/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/chaos-malware-expands-to-target-misconfigured-cloud-deployments-with-enhanced-capabilities/]]></link>
			<title>Chaos Malware Expands to Target Misconfigured Cloud Deployments with Enhanced Capabilities</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 20:00:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cisco-patches-critical-imc-and-ssm-vulnerabilities-with-9-8-cvss-score-2/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cisco-patches-critical-imc-and-ssm-vulnerabilities-with-9-8-cvss-score-2/]]></link>
			<title>Cisco Patches Critical IMC and SSM Vulnerabilities with 9.8 CVSS Score</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 18:40:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/reducing-identity-and-access-management-risks-with-enhanced-visibility/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/reducing-identity-and-access-management-risks-with-enhanced-visibility/]]></link>
			<title>Reducing Identity and Access Management Risks with Enhanced Visibility</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 18:20:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/masjesu-botnet-the-rising-ddos-for-hire-service-targeting-iot-devices/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/masjesu-botnet-the-rising-ddos-for-hire-service-targeting-iot-devices/]]></link>
			<title>Masjesu Botnet: The Rising DDoS-for-Hire Service Targeting IoT Devices</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 18:00:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/anthropics-ai-powered-claude-mythos-uncovers-thousands-of-zero-day-vulnerabilities/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/anthropics-ai-powered-claude-mythos-uncovers-thousands-of-zero-day-vulnerabilities/]]></link>
			<title>Anthropic&#8217;s AI-Powered Claude Mythos Uncovers Thousands of Zero-Day Vulnerabilities</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 16:40:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/reducing-enterprise-identity-risks-with-identity-visibility-and-intelligence/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/reducing-enterprise-identity-risks-with-identity-visibility-and-intelligence/]]></link>
			<title>Reducing Enterprise Identity Risks with Identity Visibility and Intelligence</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 16:20:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/apt28-targets-ukraine-and-nato-allies-with-sophisticated-prismex-malware/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/apt28-targets-ukraine-and-nato-allies-with-sophisticated-prismex-malware/]]></link>
			<title>APT28 Targets Ukraine and NATO Allies with Sophisticated PRISMEX Malware</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 16:00:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cisco-patches-critical-imc-vulnerability-with-9-8-cvss-score-6/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cisco-patches-critical-imc-vulnerability-with-9-8-cvss-score-6/]]></link>
			<title>Cisco Patches Critical IMC Vulnerability with 9.8 CVSS Score</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 14:40:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/ai-powered-security-anthropics-claude-mythos-uncovers-thousands-of-zero-day-vulnerabilities/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/ai-powered-security-anthropics-claude-mythos-uncovers-thousands-of-zero-day-vulnerabilities/]]></link>
			<title>AI-Powered Security: Anthropic&#8217;s Claude Mythos Uncovers Thousands of Zero-Day Vulnerabilities</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 14:20:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/mitigating-identity-risks-with-enhanced-visibility-in-enterprise-iam/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/mitigating-identity-risks-with-enhanced-visibility-in-enterprise-iam/]]></link>
			<title>Mitigating Identity Risks with Enhanced Visibility in Enterprise IAM</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 14:00:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cisco-patches-critical-imc-vulnerability-with-9-8-cvss-score-5/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cisco-patches-critical-imc-vulnerability-with-9-8-cvss-score-5/]]></link>
			<title>Cisco Patches Critical IMC Vulnerability with 9.8 CVSS Score</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 12:40:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/ai-powered-cybersecurity-initiative-uncovers-thousands-of-zero-day-vulnerabilities/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/ai-powered-cybersecurity-initiative-uncovers-thousands-of-zero-day-vulnerabilities/]]></link>
			<title>AI-Powered Cybersecurity Initiative Uncovers Thousands of Zero-Day Vulnerabilities</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 12:20:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/reducing-identity-related-risks-with-identity-visibility-and-intelligence/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/reducing-identity-related-risks-with-identity-visibility-and-intelligence/]]></link>
			<title>Reducing Identity-Related Risks with Identity Visibility and Intelligence</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 12:00:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/npm-supply-chain-attack-unc1069-uses-social-engineering-on-axios-maintainer-4/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/npm-supply-chain-attack-unc1069-uses-social-engineering-on-axios-maintainer-4/]]></link>
			<title>npm Supply Chain Attack: UNC1069 Uses Social Engineering on Axios Maintainer</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 10:40:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/north-korean-hackers-spread-malicious-packages-across-npm-pypi-and-other-ecosystems/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/north-korean-hackers-spread-malicious-packages-across-npm-pypi-and-other-ecosystems/]]></link>
			<title>North Korean Hackers Spread Malicious Packages Across npm, PyPI, and Other Ecosystems</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 10:20:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/ai-powered-cybersecurity-anthropics-claude-mythos-uncovers-thousands-of-zero-day-vulnerabilities/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/ai-powered-cybersecurity-anthropics-claude-mythos-uncovers-thousands-of-zero-day-vulnerabilities/]]></link>
			<title>AI-Powered Cybersecurity: Anthropic&#8217;s Claude Mythos Uncovers Thousands of Zero-Day Vulnerabilities</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 10:00:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/the-evolution-of-enterprise-security-moving-beyond-the-doctor-no-approach-2/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/the-evolution-of-enterprise-security-moving-beyond-the-doctor-no-approach-2/]]></link>
			<title>The Evolution of Enterprise Security: Moving Beyond the &#8216;Doctor No&#8217; Approach</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 08:40:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cookie-controlled-php-web-shells-a-growing-threat-to-linux-servers/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cookie-controlled-php-web-shells-a-growing-threat-to-linux-servers/]]></link>
			<title>Cookie-Controlled PHP Web Shells: A Growing Threat to Linux Servers</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 08:20:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/china-linked-ta416-targets-european-governments-with-sophisticated-malware-and-phishing-tactics-4/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/china-linked-ta416-targets-european-governments-with-sophisticated-malware-and-phishing-tactics-4/]]></link>
			<title>China-Linked TA416 Targets European Governments with Sophisticated Malware and Phishing Tactics</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 08:00:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/google-rolls-out-android-developer-verification-to-combat-harmful-apps-14/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/google-rolls-out-android-developer-verification-to-combat-harmful-apps-14/]]></link>
			<title>Google Rolls Out Android Developer Verification to Combat Harmful Apps</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 06:40:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/the-rise-of-risk-based-security-moving-beyond-the-doctor-no-approach/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/the-rise-of-risk-based-security-moving-beyond-the-doctor-no-approach/]]></link>
			<title>The Rise of Risk-Based Security: Moving Beyond the &#8216;Doctor No&#8217; Approach</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 06:20:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/iran-linked-hackers-target-us-critical-infrastructure/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/iran-linked-hackers-target-us-critical-infrastructure/]]></link>
			<title>Iran-Linked Hackers Target US Critical Infrastructure</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 06:00:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/the-evolution-of-enterprise-security-moving-beyond-doctor-no-11/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/the-evolution-of-enterprise-security-moving-beyond-doctor-no-11/]]></link>
			<title>The Evolution of Enterprise Security: Moving Beyond &#8216;Doctor No&#8217;</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 04:40:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/uncovering-ref1695-the-malicious-operation-spreading-rats-and-crypto-miners/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/uncovering-ref1695-the-malicious-operation-spreading-rats-and-crypto-miners/]]></link>
			<title>Uncovering REF1695: The Malicious Operation Spreading RATs and Crypto Miners</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 04:20:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cybersecurity-threats-pre-auth-chains-android-rootkits-and-cloudtrail-evasion-3/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cybersecurity-threats-pre-auth-chains-android-rootkits-and-cloudtrail-evasion-3/]]></link>
			<title>Cybersecurity Threats: Pre-Auth Chains, Android Rootkits, and CloudTrail Evasion</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 04:00:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/the-evolution-of-enterprise-security-moving-beyond-the-doctor-no-approach/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/the-evolution-of-enterprise-security-moving-beyond-the-doctor-no-approach/]]></link>
			<title>The Evolution of Enterprise Security: Moving Beyond the &#8216;Doctor No&#8217; Approach</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 02:40:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/malicious-operation-uses-fake-installers-to-spread-remote-access-trojans-and-crypto-miners/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/malicious-operation-uses-fake-installers-to-spread-remote-access-trojans-and-crypto-miners/]]></link>
			<title>Malicious Operation Uses Fake Installers to Spread Remote Access Trojans and Crypto Miners</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 02:20:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cybersecurity-threats-on-the-rise-pre-auth-chains-and-android-rootkits/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cybersecurity-threats-on-the-rise-pre-auth-chains-and-android-rootkits/]]></link>
			<title>Cybersecurity Threats on the Rise: Pre-Auth Chains and Android Rootkits</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 02:00:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/the-state-of-trusted-open-source-report-highlights-key-trends-and-vulnerabilities/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/the-state-of-trusted-open-source-report-highlights-key-trends-and-vulnerabilities/]]></link>
			<title>The State of Trusted Open Source Report Highlights Key Trends and Vulnerabilities</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 00:40:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cryptocurrency-mining-operation-exposed-how-hackers-use-fake-installers-to-spread-malware/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cryptocurrency-mining-operation-exposed-how-hackers-use-fake-installers-to-spread-malware/]]></link>
			<title>Cryptocurrency Mining Operation Exposed: How Hackers Use Fake Installers to Spread Malware</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 00:20:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/threatsday-bulletin-top-cybersecurity-threats-and-vulnerabilities/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/threatsday-bulletin-top-cybersecurity-threats-and-vulnerabilities/]]></link>
			<title>ThreatsDay Bulletin: Top Cybersecurity Threats and Vulnerabilities</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 00:00:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/breaking-cybersecurity-threats-chained-exploits-rootkits-and-cloud-evasion/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/breaking-cybersecurity-threats-chained-exploits-rootkits-and-cloud-evasion/]]></link>
			<title>Breaking Cybersecurity Threats: Chained Exploits, Rootkits, and Cloud Evasion</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 22:40:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/next-js-hosts-under-attack-hackers-exploit-cve-2025-55182-for-credential-harvesting/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/next-js-hosts-under-attack-hackers-exploit-cve-2025-55182-for-credential-harvesting/]]></link>
			<title>Next.js Hosts Under Attack: Hackers Exploit CVE-2025-55182 for Credential Harvesting</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 22:20:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/sparkcat-malware-resurfaces-android-and-ios-apps-targeted-with-crypto-wallet-theft/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/sparkcat-malware-resurfaces-android-and-ios-apps-targeted-with-crypto-wallet-theft/]]></link>
			<title>SparkCat Malware Resurfaces: Android and iOS Apps Targeted with Crypto Wallet Theft</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 22:00:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/massive-credential-harvesting-operation-exploits-next-js-vulnerability-cve-2025-55182/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/massive-credential-harvesting-operation-exploits-next-js-vulnerability-cve-2025-55182/]]></link>
			<title>Massive Credential Harvesting Operation Exploits Next.js Vulnerability CVE-2025-55182</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 20:40:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/sparkcat-malware-variant-targets-ios-and-android-devices-to-steal-crypto-wallets/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/sparkcat-malware-variant-targets-ios-and-android-devices-to-steal-crypto-wallets/]]></link>
			<title>SparkCat Malware Variant Targets iOS and Android Devices to Steal Crypto Wallets</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 20:20:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cybersecurity-weekly-recap-axios-hack-chrome-0-day-and-fortinet-exploits/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cybersecurity-weekly-recap-axios-hack-chrome-0-day-and-fortinet-exploits/]]></link>
			<title>Cybersecurity Weekly Recap: Axios Hack, Chrome 0-Day, and Fortinet Exploits</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 20:00:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/closing-the-third-party-risk-gap-in-client-security-posture/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/closing-the-third-party-risk-gap-in-client-security-posture/]]></link>
			<title>Closing the Third-Party Risk Gap in Client Security Posture</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 18:40:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cybersecurity-weekly-recap-high-profile-hacks-and-exploits-3/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cybersecurity-weekly-recap-high-profile-hacks-and-exploits-3/]]></link>
			<title>Cybersecurity Weekly Recap: High-Profile Hacks and Exploits</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 18:20:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/russian-apt28-hackers-launch-global-dns-hijacking-campaign-via-soho-routers/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/russian-apt28-hackers-launch-global-dns-hijacking-campaign-via-soho-routers/]]></link>
			<title>Russian APT28 Hackers Launch Global DNS Hijacking Campaign via SOHO Routers</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 18:00:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/closing-the-third-party-risk-gap-the-next-frontier-in-cybersecurity/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/closing-the-third-party-risk-gap-the-next-frontier-in-cybersecurity/]]></link>
			<title>Closing the Third-Party Risk Gap: The Next Frontier in Cybersecurity</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 16:40:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cybersecurity-weekly-recap-high-profile-hacks-and-exploits-exposed/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cybersecurity-weekly-recap-high-profile-hacks-and-exploits-exposed/]]></link>
			<title>Cybersecurity Weekly Recap: High-Profile Hacks and Exploits Exposed</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 16:20:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/docker-engine-vulnerability-exposes-host-access-to-attackers/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/docker-engine-vulnerability-exposes-host-access-to-attackers/]]></link>
			<title>Docker Engine Vulnerability Exposes Host Access to Attackers</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 16:00:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/the-devastating-financial-impact-of-recurring-credential-incidents/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/the-devastating-financial-impact-of-recurring-credential-incidents/]]></link>
			<title>The Devastating Financial Impact of Recurring Credential Incidents</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 14:40:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/closing-identity-gaps-in-enterprise-security-a-growing-concern-in-2026/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/closing-identity-gaps-in-enterprise-security-a-growing-concern-in-2026/]]></link>
			<title>Closing Identity Gaps in Enterprise Security: A Growing Concern in 2026</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 14:20:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/comfyui-instances-under-siege-cryptomining-botnet-campaign-exploits-vulnerabilities/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/comfyui-instances-under-siege-cryptomining-botnet-campaign-exploits-vulnerabilities/]]></link>
			<title>ComfyUI Instances Under Siege: Cryptomining Botnet Campaign Exploits Vulnerabilities</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 14:00:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cve-2025-55182-exploited-in-massive-credential-harvesting-operation/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cve-2025-55182-exploited-in-massive-credential-harvesting-operation/]]></link>
			<title>CVE-2025-55182 Exploited in Massive Credential Harvesting Operation</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 12:40:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://thecybersecurity.network/cybersecurity-weekly-recap-high-profile-hacks-and-0-day-exploits-3/]]></guid>
			<link><![CDATA[https://thecybersecurity.network/cybersecurity-weekly-recap-high-profile-hacks-and-0-day-exploits-3/]]></link>
			<title>Cybersecurity Weekly Recap: High-Profile Hacks and 0-Day Exploits</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 12:20:29 +0000]]></pubDate>
		</item>
				</channel>
</rss>
