<?xml version="1.0" encoding="UTF-8"?>
<urlset
  xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
  xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"
  xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
  <url>
    <loc>https://cyber.netsecops.io/articles/critical-authentication-bypass-vulnerability-in-moveit-automation-cve-2026-4670/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T15:00:00.000Z</news:publication_date>
      <news:title>MOVEit Automation Hit with Critical 9.8 CVSS Auth Bypass Flaw (CVE-2026-4670)</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/vulnerability.png</image:loc>
      <image:title>MOVEit Automation Hit with Critical 9.8 CVSS Auth Bypass Flaw (CVE-2026-4670)</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/critical-cpanel-zero-day-cve-2026-41940-exploited-for-months/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T15:00:00.000Z</news:publication_date>
      <news:title>cPanel Zero-Day Auth Bypass (CVE-2026-41940) Actively Exploited for Months Before Patch</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/vulnerability.png</image:loc>
      <image:title>cPanel Zero-Day Auth Bypass (CVE-2026-41940) Actively Exploited for Months Before Patch</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/malicious-ai-browser-extensions-reading-emails-and-stealing-data/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T15:00:00.000Z</news:publication_date>
      <news:title>That AI Extension Helping You Write? It's Actually a RAT Stealing Your Data</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/malware.png</image:loc>
      <image:title>That AI Extension Helping You Write? It's Actually a RAT Stealing Your Data</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/microsoft-report-qr-code-phishing-attacks-skyrocket-146-percent/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T15:00:00.000Z</news:publication_date>
      <news:title>QR Code Phishing Surges 146% in Q1 2026, Microsoft Warns</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/phishing.png</image:loc>
      <image:title>QR Code Phishing Surges 146% in Q1 2026, Microsoft Warns</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/palo-alto-networks-to-acquire-portkey-to-secure-autonomous-ai-agents/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T15:00:00.000Z</news:publication_date>
      <news:title>Palo Alto Networks to Acquire Portkey, an AI Gateway Startup, to Secure Autonomous AI Agents</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/security-operations.png</image:loc>
      <image:title>Palo Alto Networks to Acquire Portkey, an AI Gateway Startup, to Secure Autonomous AI Agents</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/uk-cyber-security-breaches-survey-2026-reveals-critical-gaps/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T15:00:00.000Z</news:publication_date>
      <news:title>UK Cyber Survey: 43% of Businesses Breached, But Only 25% Have an IR Plan</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/policy-and-compliance.png</image:loc>
      <image:title>UK Cyber Survey: 43% of Businesses Breached, But Only 25% Have an IR Plan</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/critical-copy-fail-linux-kernel-flaw-cve-2026-31431-root-access/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T15:00:00.000Z</news:publication_date>
      <news:title>Critical 'Copy Fail' Linux Flaw (CVE-2026-31431) Gives Instant Root on Major Distros</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/vulnerability.png</image:loc>
      <image:title>Critical 'Copy Fail' Linux Flaw (CVE-2026-31431) Gives Instant Root on Major Distros</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/critical-github-rce-flaw-cve-2026-3854-exposed-millions-of-repositories/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T15:00:00.000Z</news:publication_date>
      <news:title>Critical GitHub RCE Flaw (CVE-2026-3854) Allowed Full Server Compromise via Single 'git push'</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/vulnerability.png</image:loc>
      <image:title>Critical GitHub RCE Flaw (CVE-2026-3854) Allowed Full Server Compromise via Single 'git push'</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/europol-iocta-report-ai-encryption-fuel-industrialized-cybercrime/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T15:00:00.000Z</news:publication_date>
      <news:title>Europol IOCTA Report: AI, Encryption, and Data Theft are Fueling an Industrialized Cybercrime Wave</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/threat-intelligence.png</image:loc>
      <image:title>Europol IOCTA Report: AI, Encryption, and Data Theft are Fueling an Industrialized Cybercrime Wave</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/fortinet-report-ai-enabled-attacks-fuel-389-percent-surge-in-ransomware/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T15:00:00.000Z</news:publication_date>
      <news:title>Fortinet Report: AI-Enabled Attacks Fuel 389% Surge in Ransomware Victims</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/threat-intelligence.png</image:loc>
      <image:title>Fortinet Report: AI-Enabled Attacks Fuel 389% Surge in Ransomware Victims</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/medtronic-confirms-breach-after-shinyhunters-claims-theft-of-9-million-records/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T15:00:00.000Z</news:publication_date>
      <news:title>Medtronic Confirms Data Breach After ShinyHunters Claims Theft of 9 Million Records and Corporate Data</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/data-breach.png</image:loc>
      <image:title>Medtronic Confirms Data Breach After ShinyHunters Claims Theft of 9 Million Records and Corporate Data</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/microsoft-warns-actively-exploited-windows-zero-day-cve-2026-32202-credential-theft/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T15:00:00.000Z</news:publication_date>
      <news:title>Actively Exploited Windows Zero-Day (CVE-2026-32202) Steals NTLM Hashes Without User Clicks</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/vulnerability.png</image:loc>
      <image:title>Actively Exploited Windows Zero-Day (CVE-2026-32202) Steals NTLM Hashes Without User Clicks</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/shinyhunters-leaks-1-4m-udemy-user-records-after-failed-extortion/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T15:00:00.000Z</news:publication_date>
      <news:title>ShinyHunters Leaks 1.4 Million Udemy User Records, Including Financial Data, After Failed Extortion</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/data-breach.png</image:loc>
      <image:title>ShinyHunters Leaks 1.4 Million Udemy User Records, Including Financial Data, After Failed Extortion</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/stealthy-python-backdoor-deepdoor-steals-credentials-via-tunneling/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T15:00:00.000Z</news:publication_date>
      <news:title>New Stealthy Python Backdoor 'DEEP#DOOR' Steals Credentials Using Legitimate Tunneling Service</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/malware.png</image:loc>
      <image:title>New Stealthy Python Backdoor 'DEEP#DOOR' Steals Credentials Using Legitimate Tunneling Service</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/us-government-releases-joint-guidance-for-zero-trust-in-ot/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T15:00:00.000Z</news:publication_date>
      <news:title>CISA and Partners Release Joint Guidance for Applying Zero Trust Principles to OT Environments</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/policy-and-compliance.png</image:loc>
      <image:title>CISA and Partners Release Joint Guidance for Applying Zero Trust Principles to OT Environments</image:title>
    </image:image>
  </url>
</urlset>