<?xml version="1.0" encoding="UTF-8"?>
<urlset
  xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
  xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"
  xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
  <url>
    <loc>https://cyber.netsecops.io/articles/bwh-hotels-confirms-data-breach-exposing-guest-reservation-data/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T15:00:00.000Z</news:publication_date>
      <news:title>BWH Hotels Breach: Attackers Had Access for Six Months, Exposing Guest Data</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/data-breach.png</image:loc>
      <image:title>BWH Hotels Breach: Attackers Had Access for Six Months, Exposing Guest Data</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/china-aligned-webworm-apt-deploys-new-backdoors-using-discord-and-ms-graph/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T15:00:00.000Z</news:publication_date>
      <news:title>Chinese APT 'Webworm' Uses Discord and MS Graph API for C2 in New Backdoor Attacks</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/threat-actor.png</image:loc>
      <image:title>Chinese APT 'Webworm' Uses Discord and MS Graph API for C2 in New Backdoor Attacks</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/global-consulting-services-discloses-data-breach-exposing-pii/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T15:00:00.000Z</news:publication_date>
      <news:title>Global Consulting Services Breach Exposes PII of 1,320 Individuals</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/data-breach.png</image:loc>
      <image:title>Global Consulting Services Breach Exposes PII of 1,320 Individuals</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/nyc-health-hospitals-reports-massive-data-breach-affecting-1-8-million/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T15:00:00.000Z</news:publication_date>
      <news:title>NYC Health + Hospitals Breach May Affect 1.8 Million Patients and Employees</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/data-breach.png</image:loc>
      <image:title>NYC Health + Hospitals Breach May Affect 1.8 Million Patients and Employees</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/threat-actor-nightmare-eclipse-leaks-six-windows-zero-day-exploits/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T15:00:00.000Z</news:publication_date>
      <news:title>Six Windows Zero-Day Exploits Leaked by Threat Actor 'Nightmare-Eclipse'</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/vulnerability.png</image:loc>
      <image:title>Six Windows Zero-Day Exploits Leaked by Threat Actor 'Nightmare-Eclipse'</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/tracking-tamperedchef-clusters-via-certificate-and-code-reuse/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T15:00:00.000Z</news:publication_date>
      <news:title>TamperedChef Malware: Trojanized Apps Masquerade as Productivity Tools to Deploy Stealthy Payloads</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/malware.png</image:loc>
      <image:title>TamperedChef Malware: Trojanized Apps Masquerade as Productivity Tools to Deploy Stealthy Payloads</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/west-pharmaceutical-services-hit-by-ransomware-attack/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T15:00:00.000Z</news:publication_date>
      <news:title>Ransomware Attack on West Pharmaceutical Services Disrupts Global Operations</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/ransomware.png</image:loc>
      <image:title>Ransomware Attack on West Pharmaceutical Services Disrupts Global Operations</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/adex-details-xcsset-malware-supply-chain-attacks-on-macos-devs/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T15:00:00.000Z</news:publication_date>
      <news:title>XCSSET Malware Detailed: A Supply Chain Attack on macOS Developers via Xcode Projects</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/malware.png</image:loc>
      <image:title>XCSSET Malware Detailed: A Supply Chain Attack on macOS Developers via Xcode Projects</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/ai-powered-attacks-overwhelming-critical-infrastructure-defenders/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T15:00:00.000Z</news:publication_date>
      <news:title>AI-Powered Cyberattacks Are Overwhelming Critical Infrastructure Defenses, Experts Warn</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/industrial-control-systems.png</image:loc>
      <image:title>AI-Powered Cyberattacks Are Overwhelming Critical Infrastructure Defenses, Experts Warn</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/eu-cybersecurity-centre-seeks-experts-for-funding-programs/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T15:00:00.000Z</news:publication_date>
      <news:title>EU Cybersecurity Centre Opens Call for Experts to Oversee Billions in Digital Funding</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/policy-and-compliance.png</image:loc>
      <image:title>EU Cybersecurity Centre Opens Call for Experts to Oversee Billions in Digital Funding</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/japan-unveils-new-cyber-defense-strategy-for-critical-infrastructure/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T15:00:00.000Z</news:publication_date>
      <news:title>Japan Introduces New National Strategy to Defend Critical Infrastructure from Cyberattacks</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/policy-and-compliance.png</image:loc>
      <image:title>Japan Introduces New National Strategy to Defend Critical Infrastructure from Cyberattacks</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/microsoft-dismantles-fox-tempest-malware-signing-as-a-service/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T15:00:00.000Z</news:publication_date>
      <news:title>Microsoft Takes Down 'Fox Tempest' Cybercrime Service That Sold Forged Code-Signing Certificates</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/threat-actor.png</image:loc>
      <image:title>Microsoft Takes Down 'Fox Tempest' Cybercrime Service That Sold Forged Code-Signing Certificates</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/new-wanttocry-ransomware-encrypts-files-via-exposed-smb-services/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T15:00:00.000Z</news:publication_date>
      <news:title>New 'WantToCry' Ransomware Uses Exposed SMB Services for Novel Remote Encryption Attacks</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/ransomware.png</image:loc>
      <image:title>New 'WantToCry' Ransomware Uses Exposed SMB Services for Novel Remote Encryption Attacks</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/the-gentlemen-ransomware-group-suffers-internal-breach/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T15:00:00.000Z</news:publication_date>
      <news:title>Not So Gentle: 'The Gentlemen' Ransomware Gang Hacked, Internal Operations Exposed</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/ransomware.png</image:loc>
      <image:title>Not So Gentle: 'The Gentlemen' Ransomware Gang Hacked, Internal Operations Exposed</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/verizon-dbir-2026-vulnerability-exploitation-dethrones-stolen-credentials/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-19T15:00:00.000Z</news:publication_date>
      <news:title>Verizon DBIR 2026: Vulnerability Exploitation Now the #1 Cause of Breaches, Surpassing Stolen Credentials</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/threat-intelligence.png</image:loc>
      <image:title>Verizon DBIR 2026: Vulnerability Exploitation Now the #1 Cause of Breaches, Surpassing Stolen Credentials</image:title>
    </image:image>
  </url>
</urlset>