<?xml version="1.0" encoding="UTF-8"?>
<urlset
  xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
  xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"
  xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
  <url>
    <loc>https://cyber.netsecops.io/articles/cisa-adds-seven-known-exploited-vulnerabilities-to-kev-catalog-may-20-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T15:00:00.000Z</news:publication_date>
      <news:title>CISA Adds Seven New Vulnerabilities to 'Must-Patch' KEV Catalog</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/vulnerability.png</image:loc>
      <image:title>CISA Adds Seven New Vulnerabilities to 'Must-Patch' KEV Catalog</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/cisa-invites-security-community-to-nominate-known-exploited-vulnerabilities/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T15:00:00.000Z</news:publication_date>
      <news:title>CISA Opens KEV Catalog to Public Submissions to Speed Up Threat Response</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/policy-and-compliance.png</image:loc>
      <image:title>CISA Opens KEV Catalog to Public Submissions to Speed Up Threat Response</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/crowdstrike-report-dprk-stole-billions-financial-intrusions-spiked/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T15:00:00.000Z</news:publication_date>
      <news:title>CrowdStrike: North Korea Stole Billions in Crypto, Financial Sector Attacks Up 43%</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/threat-actor.png</image:loc>
      <image:title>CrowdStrike: North Korea Stole Billions in Crypto, Financial Sector Attacks Up 43%</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/microsoft-defender-vulnerabilities-actively-exploited-for-privilege-escalation/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T15:00:00.000Z</news:publication_date>
      <news:title>Warning: Microsoft Defender Flaws Actively Exploited to Gain SYSTEM Privileges</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/vulnerability.png</image:loc>
      <image:title>Warning: Microsoft Defender Flaws Actively Exploited to Gain SYSTEM Privileges</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/supply-chain-security-crisis-velocity-without-visibility/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T15:00:00.000Z</news:publication_date>
      <news:title>Supply Chain in Crisis: Exploits Now Arrive Before Companies Know They're Vulnerable</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/supply-chain-attack.png</image:loc>
      <image:title>Supply Chain in Crisis: Exploits Now Arrive Before Companies Know They're Vulnerable</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/bwh-hotels-confirms-data-breach-exposing-guest-reservation-data/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T15:00:00.000Z</news:publication_date>
      <news:title>BWH Hotels Breach: Attackers Had Access for Six Months, Exposing Guest Data</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/data-breach.png</image:loc>
      <image:title>BWH Hotels Breach: Attackers Had Access for Six Months, Exposing Guest Data</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/china-aligned-webworm-apt-deploys-new-backdoors-using-discord-and-ms-graph/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T15:00:00.000Z</news:publication_date>
      <news:title>Chinese APT 'Webworm' Uses Discord and MS Graph API for C2 in New Backdoor Attacks</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/threat-actor.png</image:loc>
      <image:title>Chinese APT 'Webworm' Uses Discord and MS Graph API for C2 in New Backdoor Attacks</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/global-consulting-services-discloses-data-breach-exposing-pii/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T15:00:00.000Z</news:publication_date>
      <news:title>Global Consulting Services Breach Exposes PII of 1,320 Individuals</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/data-breach.png</image:loc>
      <image:title>Global Consulting Services Breach Exposes PII of 1,320 Individuals</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/microsoft-disrupts-fox-tempest-malware-signing-as-a-service/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T15:00:00.000Z</news:publication_date>
      <news:title>Microsoft Takedown: 'Fox Tempest' Malware-Signing-as-a-Service Disrupted</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/threat-actor.png</image:loc>
      <image:title>Microsoft Takedown: 'Fox Tempest' Malware-Signing-as-a-Service Disrupted</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/nyc-health-hospitals-reports-massive-data-breach-affecting-1-8-million/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T15:00:00.000Z</news:publication_date>
      <news:title>NYC Health + Hospitals Breach May Affect 1.8 Million Patients and Employees</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/data-breach.png</image:loc>
      <image:title>NYC Health + Hospitals Breach May Affect 1.8 Million Patients and Employees</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/threat-actor-nightmare-eclipse-leaks-six-windows-zero-day-exploits/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T15:00:00.000Z</news:publication_date>
      <news:title>Six Windows Zero-Day Exploits Leaked by Threat Actor 'Nightmare-Eclipse'</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/vulnerability.png</image:loc>
      <image:title>Six Windows Zero-Day Exploits Leaked by Threat Actor 'Nightmare-Eclipse'</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/tracking-tamperedchef-clusters-via-certificate-and-code-reuse/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T15:00:00.000Z</news:publication_date>
      <news:title>TamperedChef Malware: Trojanized Apps Masquerade as Productivity Tools to Deploy Stealthy Payloads</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/malware.png</image:loc>
      <image:title>TamperedChef Malware: Trojanized Apps Masquerade as Productivity Tools to Deploy Stealthy Payloads</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/west-pharmaceutical-services-hit-by-ransomware-attack/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-20T15:00:00.000Z</news:publication_date>
      <news:title>Ransomware Attack on West Pharmaceutical Services Disrupts Global Operations</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/ransomware.png</image:loc>
      <image:title>Ransomware Attack on West Pharmaceutical Services Disrupts Global Operations</image:title>
    </image:image>
  </url>
</urlset>