<?xml version="1.0" encoding="UTF-8"?>
<urlset
  xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
  xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"
  xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
  <url>
    <loc>https://cyber.netsecops.io/articles/accenture-invests-in-xbow-to-advance-ai-powered-offensive-security-testing/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T15:00:00.000Z</news:publication_date>
      <news:title>Accenture Invests in AI-Powered Offensive Security Platform XBOW</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/security-operations.png</image:loc>
      <image:title>Accenture Invests in AI-Powered Offensive Security Platform XBOW</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/dozen-critical-sandbox-escape-vulnerabilities-disclosed-in-vm2-nodejs-library/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T15:00:00.000Z</news:publication_date>
      <news:title>A Dozen Critical Sandbox Escape Flaws Found in Popular 'vm2' Node.js Library</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/vulnerability.png</image:loc>
      <image:title>A Dozen Critical Sandbox Escape Flaws Found in Popular 'vm2' Node.js Library</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/european-space-agency-hosts-workshop-to-bolster-cybersecurity-for-space-systems/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T15:00:00.000Z</news:publication_date>
      <news:title>ESA Hosts Industry Workshop to Develop Standardized Cybersecurity for Space Systems</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/policy-and-compliance.png</image:loc>
      <image:title>ESA Hosts Industry Workshop to Develop Standardized Cybersecurity for Space Systems</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/ibm-italian-subsidiary-sistemi-informativi-hit-by-cyberattack-salt-typhoon-suspected/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T15:00:00.000Z</news:publication_date>
      <news:title>IBM's Italian Subsidiary, a Key Infrastructure Provider, Hit by Cyberattack; China-Linked Salt Typhoon Suspected</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/cyberattack.png</image:loc>
      <image:title>IBM's Italian Subsidiary, a Key Infrastructure Provider, Hit by Cyberattack; China-Linked Salt Typhoon Suspected</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/iranian-apt-muddywater-uses-microsoft-teams-for-false-flag-ransomware-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T15:00:00.000Z</news:publication_date>
      <news:title>Iranian APT MuddyWater Masquerades as Ransomware Group in Microsoft Teams-Based Espionage Campaign</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/threat-actor.png</image:loc>
      <image:title>Iranian APT MuddyWater Masquerades as Ransomware Group in Microsoft Teams-Based Espionage Campaign</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/malicious-pypi-packages-deliver-zichatbot-malware-using-zulip-apis-for-c2/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T15:00:00.000Z</news:publication_date>
      <news:title>Malicious PyPI Packages Use Zulip Chat App for C2 to Deploy 'ZiChatBot' Malware</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/supply-chain-attack.png</image:loc>
      <image:title>Malicious PyPI Packages Use Zulip Chat App for C2 to Deploy 'ZiChatBot' Malware</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/new-mirai-based-botnet-xlabs-v1-hijacks-iot-devices-via-exposed-adb-for-ddos-attacks/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T15:00:00.000Z</news:publication_date>
      <news:title>Mirai Variant 'xlabs_v1' Builds DDoS Botnet by Hijacking IoT Devices with Exposed ADB Ports</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/malware.png</image:loc>
      <image:title>Mirai Variant 'xlabs_v1' Builds DDoS Botnet by Hijacking IoT Devices with Exposed ADB Ports</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/orange-cyberdefense-authorized-as-cve-numbering-authority-cna/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T15:00:00.000Z</news:publication_date>
      <news:title>Orange Cyberdefense Becomes an Authorized CVE Numbering Authority (CNA)</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/policy-and-compliance.png</image:loc>
      <image:title>Orange Cyberdefense Becomes an Authorized CVE Numbering Authority (CNA)</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/apache-http-server-critical-rce-flaw-cve-2026-23918-in-http2-module/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T15:00:00.000Z</news:publication_date>
      <news:title>Critical RCE Flaw in Apache HTTP Server's HTTP/2 Module Patched</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/vulnerability.png</image:loc>
      <image:title>Critical RCE Flaw in Apache HTTP Server's HTTP/2 Module Patched</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/china-linked-apt-uat-8302-targets-governments-with-shared-malware/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T15:00:00.000Z</news:publication_date>
      <news:title>China-Nexus APT 'UAT-8302' Uses Shared Malware Toolkit to Target Governments</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/threat-actor.png</image:loc>
      <image:title>China-Nexus APT 'UAT-8302' Uses Shared Malware Toolkit to Target Governments</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/cloudz-rat-abuses-windows-phone-link-to-steal-sms-and-otps/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T15:00:00.000Z</news:publication_date>
      <news:title>CloudZ RAT Exploits Windows Phone Link to Intercept SMS and OTPs from Phones</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/malware.png</image:loc>
      <image:title>CloudZ RAT Exploits Windows Phone Link to Intercept SMS and OTPs from Phones</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/keeper-security-report-highlights-identity-sprawl-and-ai-risks/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T15:00:00.000Z</news:publication_date>
      <news:title>89% of IT Leaders Struggle with Identity Sprawl Amid AI Expansion: Report</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/security-operations.png</image:loc>
      <image:title>89% of IT Leaders Struggle with Identity Sprawl Amid AI Expansion: Report</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/north-korean-apt-scarcruft-targets-gamers-in-supply-chain-attack/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T15:00:00.000Z</news:publication_date>
      <news:title>North Korean APT ScarCruft Hits Gaming Platform in Supply-Chain Attack</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/threat-actor.png</image:loc>
      <image:title>North Korean APT ScarCruft Hits Gaming Platform in Supply-Chain Attack</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/palo-alto-networks-pan-os-zero-day-cve-2026-0300-under-active-exploitation/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T15:00:00.000Z</news:publication_date>
      <news:title>Critical Palo Alto Networks Zero-Day (CVE-2026-0300) Actively Exploited for RCE</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/vulnerability.png</image:loc>
      <image:title>Critical Palo Alto Networks Zero-Day (CVE-2026-0300) Actively Exploited for RCE</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/redis-restore-command-vulnerability-cve-2026-25243-may-lead-to-rce/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T15:00:00.000Z</news:publication_date>
      <news:title>High-Severity Redis Flaw (CVE-2026-25243) Allows for Potential RCE</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/vulnerability.png</image:loc>
      <image:title>High-Severity Redis Flaw (CVE-2026-25243) Allows for Potential RCE</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/attackers-actively-exploit-critical-rce-flaw-in-metinfo-cms/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T15:00:00.000Z</news:publication_date>
      <news:title>Critical MetInfo CMS Vulnerability Under Active Exploitation</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/vulnerability.png</image:loc>
      <image:title>Critical MetInfo CMS Vulnerability Under Active Exploitation</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/cisa-launches-ci-fortify-to-strengthen-critical-infrastructure-resilience/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T15:00:00.000Z</news:publication_date>
      <news:title>CISA Launches 'CI Fortify' to Bolster Critical Infrastructure Resilience</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/policy-and-compliance.png</image:loc>
      <image:title>CISA Launches 'CI Fortify' to Bolster Critical Infrastructure Resilience</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/cloudz-malware-abuses-microsoft-phone-link-to-steal-mobile-data/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T15:00:00.000Z</news:publication_date>
      <news:title>New 'CloudZ' Malware Abuses Microsoft Phone Link to Steal Mobile Data</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/malware.png</image:loc>
      <image:title>New 'CloudZ' Malware Abuses Microsoft Phone Link to Steal Mobile Data</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/daemon-tools-installers-compromised-in-ongoing-supply-chain-attack/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T15:00:00.000Z</news:publication_date>
      <news:title>DAEMON Tools Installers Compromised in Ongoing Supply-Chain Attack</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/supply-chain-attack.png</image:loc>
      <image:title>DAEMON Tools Installers Compromised in Ongoing Supply-Chain Attack</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/microsoft-details-large-scale-phishing-campaign-targeting-35000-users/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T15:00:00.000Z</news:publication_date>
      <news:title>Microsoft Details Phishing Campaign Targeting 35,000 Users</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/phishing.png</image:loc>
      <image:title>Microsoft Details Phishing Campaign Targeting 35,000 Users</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/sans-and-serc-partner-for-critical-infrastructure-cybersecurity-training/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T15:00:00.000Z</news:publication_date>
      <news:title>SANS and SERC Partner to Bolster Grid Cybersecurity Training</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/policy-and-compliance.png</image:loc>
      <image:title>SANS and SERC Partner to Bolster Grid Cybersecurity Training</image:title>
    </image:image>
  </url>
</urlset>