<?xml version="1.0" encoding="UTF-8"?>
<urlset
  xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
  xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"
  xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
  <url>
    <loc>https://cyber.netsecops.io/articles/ai-exacerbates-cybersecurity-risks-in-global-supply-chains/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T15:00:00.000Z</news:publication_date>
      <news:title>AI Amplifies Supply Chain Threats, Creating New and Complex Cyber Risks</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/supply-chain-attack.png</image:loc>
      <image:title>AI Amplifies Supply Chain Threats, Creating New and Complex Cyber Risks</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/cisa-adds-langflow-and-trend-micro-bugs-to-kev-catalog/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T15:00:00.000Z</news:publication_date>
      <news:title>CISA KEV Catalog Updated: Actively Exploited Langflow and Trend Micro Flaws Demand Urgent Patching</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/vulnerability.png</image:loc>
      <image:title>CISA KEV Catalog Updated: Actively Exploited Langflow and Trend Micro Flaws Demand Urgent Patching</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/foxconn-and-skoda-auto-hit-by-separate-cyberattacks-in-may-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T15:00:00.000Z</news:publication_date>
      <news:title>Industrial Giants Under Siege: Foxconn and Škoda Auto Suffer Major Cyberattacks</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/ransomware.png</image:loc>
      <image:title>Industrial Giants Under Siege: Foxconn and Škoda Auto Suffer Major Cyberattacks</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/germany-faces-escalating-cyber-campaigns-from-hacktivists-and-ransomware/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T15:00:00.000Z</news:publication_date>
      <news:title>Germany Becomes Epicenter of European Cyber Conflict with 124% Surge in Attacks</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/cyberattack.png</image:loc>
      <image:title>Germany Becomes Epicenter of European Cyber Conflict with 124% Surge in Attacks</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/hipaa-data-breaches-expose-patient-data-across-multiple-us-healthcare-entities/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T15:00:00.000Z</news:publication_date>
      <news:title>Massive HIPAA Breach Wave Hits U.S. Healthcare, Exposing Thousands of Patient Records</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/data-breach.png</image:loc>
      <image:title>Massive HIPAA Breach Wave Hits U.S. Healthcare, Exposing Thousands of Patient Records</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/iranian-apt-screening-serpens-escalates-espionage-with-new-rats/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T15:00:00.000Z</news:publication_date>
      <news:title>Iranian APT 'Screening Serpens' Intensifies Espionage with New RATs Targeting US, Israel, and UAE</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/threat-actor.png</image:loc>
      <image:title>Iranian APT 'Screening Serpens' Intensifies Espionage with New RATs Targeting US, Israel, and UAE</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/new-aur0ra-ransomware-employs-dual-extortion-without-renaming-files/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T15:00:00.000Z</news:publication_date>
      <news:title>New 'Aur0ra' Ransomware Emerges with Stealthy Dual-Extortion Tactics</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/ransomware.png</image:loc>
      <image:title>New 'Aur0ra' Ransomware Emerges with Stealthy Dual-Extortion Tactics</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/roadtools-nation-state-tactics-in-the-cloud/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T15:00:00.000Z</news:publication_date>
      <news:title>Nation-State Actors Weaponize Open-Source ROADtools for Azure Cloud Attacks, Bypassing MFA and Persisting in Networks</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/cloud-security.png</image:loc>
      <image:title>Nation-State Actors Weaponize Open-Source ROADtools for Azure Cloud Attacks, Bypassing MFA and Persisting in Networks</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/tracking-iranian-apt-screening-serpens-2026-espionage-campaigns/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T15:00:00.000Z</news:publication_date>
      <news:title>Iranian APT Screening Serpens Unleashes New RATs in Espionage Campaign Against US, Israel, and UAE</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/threat-actor.png</image:loc>
      <image:title>Iranian APT Screening Serpens Unleashes New RATs in Espionage Campaign Against US, Israel, and UAE</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/vietnamese-ministry-systems-breached-in-major-cyberattack/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-22T15:00:00.000Z</news:publication_date>
      <news:title>Vietnam Government Systems Breached, SOCs Fail to Detect Intrusions</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/cyberattack.png</image:loc>
      <image:title>Vietnam Government Systems Breached, SOCs Fail to Detect Intrusions</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/cisa-adds-seven-known-exploited-vulnerabilities-to-kev-catalog-may-20-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T15:00:00.000Z</news:publication_date>
      <news:title>CISA Adds Seven New Vulnerabilities to 'Must-Patch' KEV Catalog</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/vulnerability.png</image:loc>
      <image:title>CISA Adds Seven New Vulnerabilities to 'Must-Patch' KEV Catalog</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/cisa-invites-security-community-to-nominate-known-exploited-vulnerabilities/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T15:00:00.000Z</news:publication_date>
      <news:title>CISA Opens KEV Catalog to Public Submissions to Speed Up Threat Response</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/policy-and-compliance.png</image:loc>
      <image:title>CISA Opens KEV Catalog to Public Submissions to Speed Up Threat Response</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/crowdstrike-report-dprk-stole-billions-financial-intrusions-spiked/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T15:00:00.000Z</news:publication_date>
      <news:title>CrowdStrike: North Korea Stole Billions in Crypto, Financial Sector Attacks Up 43%</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/threat-actor.png</image:loc>
      <image:title>CrowdStrike: North Korea Stole Billions in Crypto, Financial Sector Attacks Up 43%</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/microsoft-defender-vulnerabilities-actively-exploited-for-privilege-escalation/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T15:00:00.000Z</news:publication_date>
      <news:title>Warning: Microsoft Defender Flaws Actively Exploited to Gain SYSTEM Privileges</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/vulnerability.png</image:loc>
      <image:title>Warning: Microsoft Defender Flaws Actively Exploited to Gain SYSTEM Privileges</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://cyber.netsecops.io/articles/supply-chain-security-crisis-velocity-without-visibility/</loc>
    <news:news>
      <news:publication>
        <news:name>CyberNetSec.io</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-21T15:00:00.000Z</news:publication_date>
      <news:title>Supply Chain in Crisis: Exploits Now Arrive Before Companies Know They're Vulnerable</news:title>
    </news:news>
    <image:image>
      <image:loc>https://cyber.netsecops.io/images/categories/supply-chain-attack.png</image:loc>
      <image:title>Supply Chain in Crisis: Exploits Now Arrive Before Companies Know They're Vulnerable</image:title>
    </image:image>
  </url>
</urlset>