<?xml version="1.0" encoding="UTF-8"?>
<urlset
  xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
  xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"
  xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
  <url>
    <loc>https://cyber.netsecops.io/articles/gemstuffer-campaign-abuses-rubygems-repository-for-data-exfiltration/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T15:00:00.000Z</news:publication_date>
      <news:title>Novel 'GemStuffer' Campaign Abuses RubyGems Repository as Data Exfiltration Channel</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/threat-intelligence.png</image:loc>
      <image:title>Novel 'GemStuffer' Campaign Abuses RubyGems Repository as Data Exfiltration Channel</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/praisonai-auth-bypass-cve-2026-44338-exploited-within-hours-of-disclosure/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T15:00:00.000Z</news:publication_date>
      <news:title>PraisonAI Auth Bypass (CVE-2026-44338) Exploited Within Four Hours of Disclosure</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/vulnerability.png</image:loc>
      <image:title>PraisonAI Auth Bypass (CVE-2026-44338) Exploited Within Four Hours of Disclosure</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/researcher-leaks-two-windows-zero-day-exploits-yellowkey-and-greenplasma/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T15:00:00.000Z</news:publication_date>
      <news:title>Researcher Leaks Two Windows Zero-Day Exploits, 'YellowKey' and 'GreenPlasma', Amid Dispute with Microsoft</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/vulnerability.png</image:loc>
      <image:title>Researcher Leaks Two Windows Zero-Day Exploits, 'YellowKey' and 'GreenPlasma', Amid Dispute with Microsoft</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/sap-patches-critical-vulnerabilities-in-commerce-cloud-and-s4hana/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-14T15:00:00.000Z</news:publication_date>
      <news:title>SAP Patches Critical Flaws in Commerce Cloud and S/4HANA with 9.6 CVSS Score</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/vulnerability.png</image:loc>
      <image:title>SAP Patches Critical Flaws in Commerce Cloud and S/4HANA with 9.6 CVSS Score</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/american-lending-center-notifies-123k-individuals-of-2025-data-breach/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T15:00:00.000Z</news:publication_date>
      <news:title>American Lending Center Breach Exposes 123K SSNs from 2025 Ransomware Attack</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/data-breach.png</image:loc>
      <image:title>American Lending Center Breach Exposes 123K SSNs from 2025 Ransomware Attack</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/cisa-and-g7-release-guidance-for-ai-software-bill-of-materials/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T15:00:00.000Z</news:publication_date>
      <news:title>CISA and G7 Partners Release New Guidance for AI SBOMs</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/policy-and-compliance.png</image:loc>
      <image:title>CISA and G7 Partners Release New Guidance for AI SBOMs</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/critical-command-injection-flaw-found-in-webdriverio-framework/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T15:00:00.000Z</news:publication_date>
      <news:title>WebdriverIO Flaw (CVSS 9.8) Allows CI/CD Takeover via Malicious Git Branches</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/vulnerability.png</image:loc>
      <image:title>WebdriverIO Flaw (CVSS 9.8) Allows CI/CD Takeover via Malicious Git Branches</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/foxconn-confirms-ransomware-attack-by-nitrogen-gang-on-us-factories/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T15:00:00.000Z</news:publication_date>
      <news:title>Foxconn Hit by Nitrogen Ransomware; Gang Claims Theft of Apple, Intel Data</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/ransomware.png</image:loc>
      <image:title>Foxconn Hit by Nitrogen Ransomware; Gang Claims Theft of Apple, Intel Data</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/frame-security-launches-with-50m-to-fight-ai-driven-social-engineering/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T15:00:00.000Z</news:publication_date>
      <news:title>Frame Security Launches with $50M to Combat AI-Powered Phishing and Deepfakes</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/phishing.png</image:loc>
      <image:title>Frame Security Launches with $50M to Combat AI-Powered Phishing and Deepfakes</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/microsofts-may-2026-patch-tuesday-fixes-137-vulnerabilities/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T15:00:00.000Z</news:publication_date>
      <news:title>Microsoft's May Patch Tuesday: 137 Flaws Fixed, Including Critical Netlogon RCE</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/patch-management.png</image:loc>
      <image:title>Microsoft's May Patch Tuesday: 137 Flaws Fixed, Including Critical Netlogon RCE</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/ncc-group-report-warns-of-heightened-cyber-risk-to-ot-sector/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T15:00:00.000Z</news:publication_date>
      <news:title>Industrial Sector Most Targeted by Ransomware, NCC Group Report Warns</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/threat-intelligence.png</image:loc>
      <image:title>Industrial Sector Most Targeted by Ransomware, NCC Group Report Warns</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/openai-launches-daybreak-to-automate-cyber-defense/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T15:00:00.000Z</news:publication_date>
      <news:title>OpenAI Launches 'Daybreak' to Automate Vulnerability Hunting with AI</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/security-operations.png</image:loc>
      <image:title>OpenAI Launches 'Daybreak' to Automate Vulnerability Hunting with AI</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/siemens-discloses-multiple-critical-vulnerabilities-in-industrial-control-systems/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T15:00:00.000Z</news:publication_date>
      <news:title>Siemens Patches Critical Flaws in SIMATIC S7 PLCs, RUGGEDCOM Devices</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/industrial-control-systems.png</image:loc>
      <image:title>Siemens Patches Critical Flaws in SIMATIC S7 PLCs, RUGGEDCOM Devices</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/critical-vulnerabilities-found-in-ai-coding-agents-and-browser-extensions/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T15:00:00.000Z</news:publication_date>
      <news:title>Critical Flaws in AI Coding Agents and Browser Extensions Expose Developer Workflows</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/vulnerability.png</image:loc>
      <image:title>Critical Flaws in AI Coding Agents and Browser Extensions Expose Developer Workflows</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/inside-ad-cs-escalation-unpacking-advanced-misuse-techniques-and-tools/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T15:00:00.000Z</news:publication_date>
      <news:title>AD CS Escalation Deep Dive: How Attackers Abuse Certificate Templates for Domain Dominance</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/threat-intelligence.png</image:loc>
      <image:title>AD CS Escalation Deep Dive: How Attackers Abuse Certificate Templates for Domain Dominance</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/jetbrains-teamcity-vulnerability-cve-2026-44413-exposes-api/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T15:00:00.000Z</news:publication_date>
      <news:title>High-Severity Flaw in JetBrains TeamCity On-Premises Allows API Exposure (CVE-2026-44413)</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/vulnerability.png</image:loc>
      <image:title>High-Severity Flaw in JetBrains TeamCity On-Premises Allows API Exposure (CVE-2026-44413)</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/ransomware-trends-2026-post-quantum-encryption-and-data-leak-extortion/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T15:00:00.000Z</news:publication_date>
      <news:title>Ransomware Evolves in 2026: Attackers Adopt Post-Quantum Crypto and Encryptionless Extortion</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/ransomware.png</image:loc>
      <image:title>Ransomware Evolves in 2026: Attackers Adopt Post-Quantum Crypto and Encryptionless Extortion</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/threat-actors-abuse-legitimate-platforms-like-teams-and-github/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T15:00:00.000Z</news:publication_date>
      <news:title>Living Off the Land: Threat Actors Increasingly Abuse Legitimate Platforms Like Teams and GitHub</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/threat-actor.png</image:loc>
      <image:title>Living Off the Land: Threat Actors Increasingly Abuse Legitimate Platforms Like Teams and GitHub</image:title>
    </image:image>
  </url>
</urlset>