<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"><url><loc>https://thehackernews.com/2026/05/9-year-old-linux-kernel-flaw-enables.html</loc><lastmod>2026-05-21T13:21:09+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-21T13:05:53+05:30</news:publication_date><news:title>9-Year-Old Linux Kernel Flaw Enables Root Command Execution on Major Distros</news:title><news:keywords>Debian, fedora, Kernel, linux, privilege escalation, Qualys, Ubuntu, Vulnerability</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/github-internal-repositories-breached.html</loc><lastmod>2026-05-21T11:26:01+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-21T09:57:01+05:30</news:publication_date><news:title>GitHub Internal Repositories Breached via Malicious Nx Console VS Code Extension</news:title><news:keywords>Credential Theft, cybersecurity, data breach, Developer Tools, GitHub, Malware, Open Source, Supply Chain Attack, TeamPCP, VS Code Extension</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/highly-critical-drupal-core-flaw.html</loc><lastmod>2026-05-21T09:29:40+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-21T09:14:11+05:30</news:publication_date><news:title>Highly Critical Drupal Core Flaw Exposes PostgreSQL Sites to RCE Attacks</news:title><news:keywords>cybersecurity, Drupal, PostgreSQL, privilege escalation, remote code execution, Symfony, Vulnerability</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/microsoft-open-sources-rampart-and.html</loc><lastmod>2026-05-21T10:09:18+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-20T22:36:54+05:30</news:publication_date><news:title>Microsoft Open-Sources RAMPART and Clarity to Secure AI Agents During Development</news:title><news:keywords>AI Agent, artificial intelligence, cybersecurity, Microsoft, Open Source, Prompt Injection, Red Teaming, Security Testing</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/microsoft-takes-down-malware-signing.html</loc><lastmod>2026-05-20T20:06:44+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-20T20:06:44+05:30</news:publication_date><news:title>Microsoft Takes Down Malware-Signing Service Behind Ransomware Attacks</news:title><news:keywords>Cloud security, code signing, Cybercrime, cybersecurity, digital Certificate, Malware, Microsoft, ransomware</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/webworm-deploys-echocreep-and-graphworm.html</loc><lastmod>2026-05-21T11:27:25+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-20T18:21:43+05:30</news:publication_date><news:title>Webworm Deploys EchoCreep and GraphWorm Backdoors Using Discord and MS Graph API</news:title><news:keywords>BadIIS, cybersecurity, Discord, Malware, Microsoft Graph API, Webworm</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/agent-ai-is-coming-are-you-ready.html</loc><lastmod>2026-05-20T17:32:45+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-20T17:28:00+05:30</news:publication_date><news:title>Agent AI is Coming. Are You Ready?</news:title><news:keywords>Access Management, Agent AI, cybersecurity, enterprise security, IAM, Identity Security</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/github-investigating-teampcp-claimed.html</loc><lastmod>2026-05-20T21:40:25+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-20T17:08:43+05:30</news:publication_date><news:title>GitHub Breached — Employee Device Hack Led to Exfiltration of 3,800+ Internal Repos</news:title><news:keywords>AWS, Cloud security, cybersecurity, GitHub, Kubernetes, Malware, Microsoft, PyPI, Software Supply Chain</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/typosquatting-is-no-longer-user-problem.html</loc><lastmod>2026-05-20T16:00:00+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-20T16:00:00+05:30</news:publication_date><news:title>Typosquatting Is No Longer a User Problem. It&#039;s a Supply Chain Problem</news:title><news:keywords>browser security, chrome extension, cybersecurity, Reflectiz, Supply Chain Attack, Typosquatting</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/microsoft-releases-mitigation-for.html</loc><lastmod>2026-05-20T18:07:34+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-20T13:58:26+05:30</news:publication_date><news:title>Microsoft Releases Mitigation for YellowKey BitLocker Bypass CVE-2026-45585 Exploit</news:title><news:keywords>BitLocker, cybersecurity, encryption, Microsoft, Vulnerability, Windows, Zero-Day</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/grafana-github-breach-exposes-source.html</loc><lastmod>2026-05-20T10:43:01+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-20T10:42:06+05:30</news:publication_date><news:title>Grafana GitHub Breach Exposes Source Code via TanStack npm Attack</news:title><news:keywords>Cloud security, cybersecurity, data breach, GitHub, Grafana, NPM, Source Code, Supply Chain Attack</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/trapdoor-android-ad-fraud-scheme-hit.html</loc><lastmod>2026-05-19T22:08:12+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-19T22:08:12+05:30</news:publication_date><news:title>Trapdoor Android Ad Fraud Scheme Hit 659 Million Daily Bid Requests Using 455 Apps</news:title><news:keywords>ad fraud, Android, cybersecurity, Google, Google Play, malvertising, Malware, mobile security, Threat Intelligence</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/dirtydecrypt-poc-released-for-linux.html</loc><lastmod>2026-05-20T09:40:17+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-19T20:26:26+05:30</news:publication_date><news:title>DirtyDecrypt PoC Released for Linux Kernel CVE-2026-31635 LPE Vulnerability</news:title><news:keywords>Arch Linux, Container Security, fedora, Kernel, linux, opensuse, privilege escalation, Rocky Linux, Vulnerability</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/the-new-phishing-click-how-oauth.html</loc><lastmod>2026-05-19T17:00:00+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-19T17:00:00+05:30</news:publication_date><news:title>The New Phishing Click: How OAuth Consent Bypasses MFA</news:title><news:keywords>AI Security, cybersecurity, Identity Security, MFA, Microsoft 365, OAuth, Phishing, Reco, SaaS Security, Token Security</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/drupal-to-release-urgent-core-security.html</loc><lastmod>2026-05-20T20:10:58+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-19T16:14:45+05:30</news:publication_date><news:title>Drupal to Release Urgent Core Security Updates on May 20, Sites Told to Prepare</news:title><news:keywords>content management system, cybersecurity, Drupal, End Of Life, PHP, Security patch, Vulnerability, Website Security</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/seppmail-secure-e-mail-gateway.html</loc><lastmod>2026-05-19T14:53:15+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-19T14:53:15+05:30</news:publication_date><news:title>SEPPMail Secure E-Mail Gateway Vulnerabilities Enable RCE and Mail Traffic Access</news:title><news:keywords>cybersecurity, email security, Patch Management, remote code execution, SEPPMail, Vulnerability</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/compromised-nx-console-18950-targeted.html</loc><lastmod>2026-05-21T11:25:11+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-19T13:19:23+05:30</news:publication_date><news:title>Compromised Nx Console 18.95.0 Targeted VS Code Developers with Credential Stealer</news:title><news:keywords>Credential Theft, cybersecurity, Developer Security, GitHub, Malware, NPM, Supply Chain Attack, VS Code</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/github-actions-supply-chain-attack.html</loc><lastmod>2026-05-19T14:42:32+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-19T10:58:06+05:30</news:publication_date><news:title>Popular GitHub Action Tags Redirected to Imposter Commit to Steal CI/CD Credentials</news:title><news:keywords>CI/CD, Credential Theft, cybersecurity, GitHub Actions, Malware, Mini Sha-Hulud, NPM, Software Security, StepSecurity, Supply Chain Attack</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/mini-shai-hulud-pushes-malicious-antv.html</loc><lastmod>2026-05-21T11:26:20+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-19T10:24:17+05:30</news:publication_date><news:title>Mini Shai-Hulud Pushes Malicious AntV npm Packages via Compromised Maintainer Account</news:title><news:keywords>CI/CD, Credential Theft, cybersecurity, Data Visualization, GitHub Actions, Malware, NPM, Open Source, React, Supply Chain Attack</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/interpol-operation-ramz-disrupts-mena.html</loc><lastmod>2026-05-19T10:03:45+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-18T22:51:18+05:30</news:publication_date><news:title>INTERPOL Operation Ramz Disrupts MENA Cybercrime Networks with 201 Arrests</news:title><news:keywords>cryptocurrency, Cybercrime, cybersecurity, darknet, data theft, Fraud, Interpol, law enforcement, Malware, Phishing</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/weekly-recap-exchange-0-day-npm-worm.html</loc><lastmod>2026-05-19T10:03:06+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-18T19:20:17+05:30</news:publication_date><news:title>⚡ Weekly Recap: Exchange 0-Day, npm Worm, Fake AI Repo, Cisco Exploit and More</news:title><news:keywords>artificial intelligence, browser security, Cloud security, cybersecurity, Cybersecurity Recap, Identity Security, Malware, network security, Phishing, Vulnerability</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/how-to-reduce-phishing-exposure-before.html</loc><lastmod>2026-05-18T19:29:53+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-18T18:30:00+05:30</news:publication_date><news:title>How to Reduce Phishing Exposure Before It Turns into Business Disruption</news:title><news:keywords>Any.Run, Credential Theft, cybersecurity, Incident response, malware analysis, Phishing, security operations center, Threat Intelligence</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/developer-workstations-are-now-part-of.html</loc><lastmod>2026-05-18T16:53:41+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-18T16:53:41+05:30</news:publication_date><news:title>Developer Workstations Are Now Part of the Software Supply Chain</news:title><news:keywords>artificial intelligence, Cloud security, Credential Theft, cybersecurity, Developer Security, GitHub, Software Development, Supply Chain Attack</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/ivanti-fortinet-sap-vmware-n8n-patch.html</loc><lastmod>2026-05-18T22:32:25+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-18T16:24:05+05:30</news:publication_date><news:title>Ivanti, Fortinet, SAP, VMware, n8n Patch RCE, SQL Injection, Privilege Escalation Flaws</news:title><news:keywords>cybersecurity, Fortinet, Ivanti, Patch Management, privilege escalation, Prototype Pollution, remote code execution, SQL Injection, Vulnerability</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/miniplasma-windows-0-day-enables-system.html</loc><lastmod>2026-05-18T14:27:34+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-18T14:27:34+05:30</news:publication_date><news:title>MiniPlasma Windows 0-Day Enables SYSTEM Privilege Escalation on Fully Patched Systems</news:title><news:keywords>cybersecurity, Google Project Zero, Microsoft, privilege escalation, Vulnerability, Windows, Windows 11, Zero-Day</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/four-malicious-npm-packages-deliver.html</loc><lastmod>2026-05-18T14:27:26+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-18T14:27:26+05:30</news:publication_date><news:title>Four Malicious npm Packages Deliver Infostealers and Phantom Bot DDoS Malware</news:title><news:keywords>botnet, Cloud security, cybersecurity, ddos, GitHub, Infostealer, Malware, NPM, Supply Chain Attack</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/pre-stuxnet-fast16-malware-tampered.html</loc><lastmod>2026-05-18T14:09:26+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-18T12:16:37+05:30</news:publication_date><news:title>Pre-Stuxnet Fast16 Malware Tampered with Nuclear Weapons Simulations</news:title><news:keywords>Carbon Black, cybersecurity, Equation Group, Industrial Sabotage, Malware, SentinelOne, Simulation Software, Stuxnet, Symantec</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/nginx-cve-2026-42945-exploited-in-wild.html</loc><lastmod>2026-05-17T17:27:53+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-17T17:27:53+05:30</news:publication_date><news:title>NGINX CVE-2026-42945 Exploited in the Wild, Causing Worker Crashes and Possible RCE</news:title><news:keywords>Command Injection, cybersecurity, denial of service, exploitation, NGINX, remote code execution, VulnCheck, Vulnerability, Web Shell</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/grafana-github-token-breach-led-to.html</loc><lastmod>2026-05-18T22:38:23+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-17T12:43:33+05:30</news:publication_date><news:title>Grafana GitHub Token Breach Led to Codebase Download and Extortion Attempt</news:title><news:keywords>CoinbaseCartel, cybersecurity, Data Extortion, FBI, GitHub, Grafana, LAPSUS$, ransomware, Scattered Spider, ShinyHunters</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/funnel-builder-flaw-under-active.html</loc><lastmod>2026-05-16T20:50:48+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-16T20:50:48+05:30</news:publication_date><news:title>Funnel Builder Flaw Under Active Exploitation Enables WooCommerce Checkout Skimming</news:title><news:keywords>cybersecurity, data breach, E-commerce Security, JavaScript, Magecart, Skimming, Vulnerability, WooCommerce, WordPress</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/turla-turns-kazuar-backdoor-into.html</loc><lastmod>2026-05-17T12:49:47+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-15T22:40:25+05:30</news:publication_date><news:title>Turla Turns Kazuar Backdoor Into Modular P2P Botnet for Persistent Access</news:title><news:keywords>botnet, cybersecurity, Malware, Microsoft, Russia, Threat Intelligence</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/four-openclaw-flaws-enable-data-theft.html</loc><lastmod>2026-05-15T19:33:32+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-15T19:05:04+05:30</news:publication_date><news:title>Four OpenClaw Flaws Enable Data Theft, Privilege Escalation, and Persistence</news:title><news:keywords>cybersecurity, data theft, OpenClaw, OpenShell, privilege escalation, Sandbox Escape, Vulnerability</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/what-45-days-of-watching-your-own-tools.html</loc><lastmod>2026-05-15T16:30:00+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-15T16:30:00+05:30</news:publication_date><news:title>What 45 Days of Watching Your Own Tools Will Tell You About Your Real Attack Surface</news:title><news:keywords>Attack Surface, Bitdefender, cybersecurity, endpoint security, GravityZone, Living off the Land, powershell, Threat Detection</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/tanstack-supply-chain-attack-hits-two.html</loc><lastmod>2026-05-16T15:41:26+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-15T16:24:44+05:30</news:publication_date><news:title>TanStack Supply Chain Attack Hits Two OpenAI Employee Devices, Forces macOS Updates</news:title><news:keywords>AWS, code signing, Credential Theft, cybersecurity, MacOS, Malware, Mistral AI, OpenAI, Supply Chain Attack, TanStack</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/on-prem-microsoft-exchange-server-cve.html</loc><lastmod>2026-05-16T15:37:31+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-15T11:49:04+05:30</news:publication_date><news:title>On-Prem Microsoft Exchange Server CVE-2026-42897 Exploited via Crafted Email</news:title><news:keywords>Cross-site Scripting, cybersecurity, Exchange Server, Microsoft, Outlook, Vulnerability</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/cisa-adds-cisco-sd-wan-cve-2026-20182.html</loc><lastmod>2026-05-15T15:55:06+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-15T10:58:03+05:30</news:publication_date><news:title>CISA Adds Cisco SD-WAN CVE-2026-20182 to KEV After Admin Access Exploits</news:title><news:keywords>Authentication bypass, CISA, cisco, Command and Control, Credential Theft, cybersecurity, SD-WAN, Vulnerability, Web Shell</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/cisco-catalyst-sd-wan-controller-auth.html</loc><lastmod>2026-05-14T23:43:03+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-14T23:15:20+05:30</news:publication_date><news:title>Cisco Catalyst SD-WAN Controller Auth Bypass Actively Exploited to Gain Admin Access</news:title><news:keywords>Authentication bypass, cisco, cybersecurity, NETCONF, network security, Patch Management, rapid7, Vulnerability</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/stealer-backdoor-found-in-3-node-ipc.html</loc><lastmod>2026-05-16T20:27:01+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-14T22:52:43+05:30</news:publication_date><news:title>Stealer Backdoor Found in 3 Node-IPC Versions Targeting Developer Secrets</news:title><news:keywords>Cloud security, cybersecurity, data exfiltration, Developer Security, Malware, NPM, Open Source, Supply Chain</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/threatsday-bulletin-pan-os-rce-mythos.html</loc><lastmod>2026-05-14T23:37:35+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-14T21:37:46+05:30</news:publication_date><news:title>ThreatsDay Bulletin: PAN-OS RCE, Mythos cURL Bug, AI Tokenizer Attacks, and 10+ Stories</news:title><news:keywords>artificial intelligence, Cloud security, Cybercrime, cybersecurity, Malware, Privacy, ransomware, Threatsday Bulletin, Vulnerability</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/ghostwriter-targets-ukrainian.html</loc><lastmod>2026-05-15T15:56:55+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-14T19:30:37+05:30</news:publication_date><news:title>Ghostwriter Targets Ukrainian Government With Geofenced PDF Phishing, Cobalt Strike</news:title><news:keywords>Cobalt Strike, cybersecurity, data theft, Ghostwriter, Hacktivism, Remote Access Trojan, Spear Phishing</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/praisonai-cve-2026-44338-auth-bypass.html</loc><lastmod>2026-05-15T15:56:13+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-14T17:10:14+05:30</news:publication_date><news:title>PraisonAI CVE-2026-44338 Auth Bypass Targeted Within Hours of Disclosure</news:title><news:keywords>AI Agent, API Security, Authentication bypass, cybersecurity, PraisonAI, Sysdig, Threat Intelligence, Vulnerability</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/how-ai-hallucinations-are-creating-real.html</loc><lastmod>2026-05-14T17:00:00+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-14T17:00:00+05:30</news:publication_date><news:title>How AI Hallucinations Are Creating Real Security Risks</news:title><news:keywords>Access Control, AI Hallucination, artificial intelligence, critical infrastructure, cybersecurity, Identity Security, Incident response, Keeper Security</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/windows-zero-days-expose-bitlocker.html</loc><lastmod>2026-05-14T14:55:50+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-14T14:55:50+05:30</news:publication_date><news:title>Windows Zero-Days Expose BitLocker Bypasses And CTFMON Privilege Escalation</news:title><news:keywords>BitLocker, cybersecurity, Microsoft, privilege escalation, Secure Boot, Vulnerability, Windows, Zero-Day</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/new-fragnesia-linux-kernel-lpe-grants.html</loc><lastmod>2026-05-15T15:56:30+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-14T12:36:15+05:30</news:publication_date><news:title>New Fragnesia Linux Kernel LPE Grants Root Access via Page Cache Corruption</news:title><news:keywords>cybersecurity, Kernel, linux, privilege escalation, Vulnerability</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/18-year-old-nginx-rewrite-module-flaw.html</loc><lastmod>2026-05-21T12:54:27+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-14T11:30:09+05:30</news:publication_date><news:title>18-Year-Old NGINX Rewrite Module Flaw Enables Unauthenticated RCE</news:title><news:keywords>Application Security, cybersecurity, denial of service, F5, NGINX, remote code execution, Vulnerability, Web Server</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/microsofts-mdash-ai-system-finds-16.html</loc><lastmod>2026-05-13T19:16:16+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-13T19:16:02+05:30</news:publication_date><news:title>Microsoft&#039;s MDASH AI System Finds 16 Windows Flaws Fixed in Patch Tuesday</news:title><news:keywords>artificial intelligence, cybersecurity, Microsoft, patch Tuesday, remote code execution, Threat Modeling, Vulnerability, Windows</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/azerbaijani-energy-firm-hit-by-repeated.html</loc><lastmod>2026-05-13T18:31:05+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-13T18:30:00+05:30</news:publication_date><news:title>Azerbaijani Energy Firm Hit by Repeated Microsoft Exchange Exploitation</news:title><news:keywords>china, cybersecurity, Espionage, FamousSparrow, Microsoft Exchange, ProxyNotShell</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/webinar-why-your-appsec-tools-miss.html</loc><lastmod>2026-05-13T23:21:16+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-13T17:22:43+05:30</news:publication_date><news:title>[Webinar] How Modern Attack Paths Cross Code, Pipelines, and Cloud</news:title><news:keywords>Alert Fatigue, Application Security, Attack Path, Cloud security, DevSecOps, Threat Modeling</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/most-remediation-programs-never-confirm.html</loc><lastmod>2026-05-13T17:14:50+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-13T17:00:00+05:30</news:publication_date><news:title>Most Remediation Programs Never Confirm the Fix Actually Worked</news:title><news:keywords>Automation, Cloud security, cybersecurity, Pentera, Remediation, Risk management, vulnerability management</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/microsoft-patches-138-vulnerabilities.html</loc><lastmod>2026-05-13T18:28:21+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-13T16:06:10+05:30</news:publication_date><news:title>Microsoft Patches 138 Vulnerabilities, Including DNS and Netlogon RCE Flaws</news:title><news:keywords>artificial intelligence, Azure, Microsoft, patch Tuesday, privilege escalation, remote code execution, Secure Boot, Vulnerability, Windows</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/gemstuffer-abuses-150-rubygems-to.html</loc><lastmod>2026-05-13T13:38:54+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-13T13:38:54+05:30</news:publication_date><news:title>GemStuffer Abuses 150+ RubyGems to Exfiltrate Scraped U.K. Council Portal Data</news:title><news:keywords>cybersecurity, data exfiltration, Package Registry, Ruby, RubyGems, Software Supply Chain, Web Scraping</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/android-adds-intrusion-logging-for.html</loc><lastmod>2026-05-13T12:25:42+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-13T12:25:42+05:30</news:publication_date><news:title>Android Adds Intrusion Logging for Sophisticated Spyware Forensics</news:title><news:keywords>Advanced Protection, Android, Banking Fraud, cybersecurity, encryption, Forensics, Google, Malware, Privacy, Spyware</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/new-exim-bdat-vulnerability-exposes.html</loc><lastmod>2026-05-14T11:00:43+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-12T22:14:00+05:30</news:publication_date><news:title>New Exim BDAT Vulnerability Exposes GnuTLS Builds to Potential Code Execution</news:title><news:keywords>cybersecurity, email security, exim, GnuTLS, Memory Corruption, remote code execution, SMTP, Vulnerability</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/rubygems-suspends-new-signups-after.html</loc><lastmod>2026-05-18T14:10:30+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-12T20:17:00+05:30</news:publication_date><news:title>RubyGems Suspends New Signups After Hundreds of Malicious Packages Are Uploaded</news:title><news:keywords>Credential Theft, cybersecurity, Google, Malware, Open Source, ransomware, RubyGems, software security, supply chain attack</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/new-trickmo-variant-uses-ton-c2-and.html</loc><lastmod>2026-05-12T19:59:07+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-12T18:20:00+05:30</news:publication_date><news:title>New TrickMo Variant Uses TON C2 and SOCKS5 to Create Android Network Pivots</news:title><news:keywords>Android, banking Trojan, Blockchain, cryptocurrency, cybersecurity, Fraud Detection, Malware, mobile security, ThreatFabric</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/webinar-what-riskiest-soc-alerts-go.html</loc><lastmod>2026-05-12T17:28:00+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-12T17:28:00+05:30</news:publication_date><news:title>Webinar: What the Riskiest SOC Alerts Go Unanswered - and How Radiant Security Can Help</news:title><news:keywords>AI Security, cybersecurity, DLP, MDR, MSSP, OT Security, SoC, Supply Chain Security, threat detection, WAF</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/mini-shai-hulud-worm-compromises.html</loc><lastmod>2026-05-13T12:13:04+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-12T17:16:00+05:30</news:publication_date><news:title>Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI &amp; More Packages</news:title><news:keywords>Cloud security, Credential Theft, cybersecurity, GitHub Actions, Malware, NPM, Open Source, PyPI, supply chain attack, TanStack</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/why-agentic-ai-is-securitys-next-blind.html</loc><lastmod>2026-05-12T16:00:00+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-12T16:00:00+05:30</news:publication_date><news:title>Why Agentic AI Is Security&#039;s Next Blind Spot</news:title><news:keywords>Agentic AI, artificial intelligence, Claude Code, Cloud security, cybersecurity, GitHub Copilot, MCP, OWASP, threat detection</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/instructure-reaches-ransom-agreement.html</loc><lastmod>2026-05-12T13:07:45+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-12T13:07:00+05:30</news:publication_date><news:title>Instructure Reaches Ransom Agreement with ShinyHunters to Stop 3.65TB Canvas Leak</news:title><news:keywords>Canvas, cybersecurity, data breach, network security, Phishing, ransomware, Vulnerability</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/openai-launches-daybreak-for-ai-powered.html</loc><lastmod>2026-05-14T14:46:16+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-12T12:25:00+05:30</news:publication_date><news:title>OpenAI Launches Daybreak for AI-Powered Vulnerability Detection and Patch Validation</news:title><news:keywords>AI Security, artificial intelligence, bug bounty, Cloud security, cybersecurity, OpenAI, Penetration Testing, software security, Threat Modeling, Vulnerability</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/ios-265-brings-default-end-to-end.html</loc><lastmod>2026-05-12T12:06:25+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-12T10:48:00+05:30</news:publication_date><news:title>iOS 26.5 Brings Default End-to-End Encrypted RCS Messaging Between iPhone and Android</news:title><news:keywords>Android, Apple, cybersecurity, end-to-end encryption, Google, GSMA, iOS, mobile security, RCS Messaging</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/teampcp-compromises-checkmarx-jenkins.html</loc><lastmod>2026-05-13T10:36:14+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-12T00:00:00+05:30</news:publication_date><news:title>TeamPCP Compromises Checkmarx Jenkins AST Plugin Weeks After KICS Supply Chain Attack</news:title><news:keywords>Checkmarx, cybersecurity, DevSecOps, GitHub, Jenkins, Malware, software security, supply chain attack, TeamPCP</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/cpanel-cve-2026-41940-under-active.html</loc><lastmod>2026-05-13T10:35:34+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-11T23:24:00+05:30</news:publication_date><news:title>cPanel CVE-2026-41940 Under Active Exploitation to Deploy Filemanager Backdoor</news:title><news:keywords>Authentication bypass, Backdoor, botnet, cPanel, Credential Theft, Cryptomining, cybersecurity, ransomware, Vulnerability, WebHost Manager</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/hackers-used-ai-to-develop-first-known.html</loc><lastmod>2026-05-13T10:48:50+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-11T21:15:00+05:30</news:publication_date><news:title>Hackers Used AI to Develop First Known Zero-Day 2FA Bypass for Mass Exploitation</news:title><news:keywords>Android, artificial intelligence, cybersecurity, data security, Gemini, Google, Malware, Threat Intelligence, Vulnerability</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/weekly-recap-linux-rootkit-macos-crypto.html</loc><lastmod>2026-05-11T18:06:29+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-11T18:06:00+05:30</news:publication_date><news:title>⚡ Weekly Recap: Linux Rootkit, macOS Crypto Stealer, WebSocket Skimmers and More</news:title><news:keywords>artificial intelligence, browser security, Cloud security, cybersecurity, Cybersecurity Recap, Identity Security, Malware, network security, Phishing, Vulnerability</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/your-purple-team-isnt-purple-its-just.html</loc><lastmod>2026-05-11T17:21:48+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-11T17:00:00+05:30</news:publication_date><news:title>Your Purple Team Isn&#039;t Purple — It&#039;s Just Red and Blue in the Same Room</news:title><news:keywords>artificial intelligence, BAS, cybersecurity, Penetration Testing, Purple Teaming, SIEM, SoC, threat detection, Vulnerability</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/fake-openai-privacy-filter-repo-hits-1.html</loc><lastmod>2026-05-11T23:52:46+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-11T12:35:00+05:30</news:publication_date><news:title>Fake OpenAI Privacy Filter Repo Hits #1 on Hugging Face, Draws 244K Downloads</news:title><news:keywords>cybersecurity, Hugging Face, Malware, OpenAI, powershell, supply chain attack, Threat Intelligence, windows security</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/ollama-out-of-bounds-read-vulnerability.html</loc><lastmod>2026-05-11T23:53:05+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-10T18:11:00+05:30</news:publication_date><news:title>Ollama Out-of-Bounds Read Vulnerability Allows Remote Process Memory Leak</news:title><news:keywords>cybersecurity, data breach, LLM Security, Memory Leak, Ollama, Vulnerability</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/cpanel-whm-patch-3-new-vulnerabilities.html</loc><lastmod>2026-05-09T15:45:42+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-09T12:46:00+05:30</news:publication_date><news:title>cPanel, WHM Release Fixes for Three New Vulnerabilities — Patch Now</news:title><news:keywords>Code Execution, cPanel, cybersecurity, denial of service, privilege escalation, Vulnerability, web hosting, WHM</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/tclbanker-banking-trojan-targets.html</loc><lastmod>2026-05-16T15:39:57+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-08T23:42:00+05:30</news:publication_date><news:title>TCLBANKER Banking Trojan Targets Financial Platforms via WhatsApp and Outlook Worms</news:title><news:keywords>banking security, banking Trojan, cryptocurrency, cybersecurity, Financial Fraud, Malware, Microsoft Outlook, Phishing, Threat Intelligence, Whatsapp</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/fake-call-history-apps-stole-payments.html</loc><lastmod>2026-05-08T20:38:53+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-08T20:38:00+05:30</news:publication_date><news:title>Fake Call History Apps Stole Payments From Users After 7.3 Million Play Store Downloads</news:title><news:keywords>Android, cybersecurity, ESET, Google Play Store, Group-IB, mobile security, social engineering</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/one-click-total-shutdown-patient-zero.html</loc><lastmod>2026-05-08T19:31:27+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-08T19:31:00+05:30</news:publication_date><news:title>One Click, Total Shutdown: The &quot;Patient Zero&quot; Webinar on Killing Stealth Breaches</news:title><news:keywords>artificial intelligence, cybersecurity, data breach, email security, Incident response, Malware, network security, Phishing, threat detection, Zero Trust</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/quasar-linux-rat-steals-developer.html</loc><lastmod>2026-05-08T16:30:21+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-08T16:30:00+05:30</news:publication_date><news:title>Quasar Linux RAT Steals Developer Credentials for Software Supply Chain Compromise</news:title><news:keywords>Credential Harvesting, cybersecurity, DevOps, linux, Remote Access Trojan, rootkit, Supply Chain</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/one-missed-threat-per-week-what-25m.html</loc><lastmod>2026-05-08T16:00:00+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-08T16:00:00+05:30</news:publication_date><news:title>One Missed Threat Per Week: What 25M Alerts Reveal About Low-Severity Risk</news:title><news:keywords>AI Security, AWS, Cloud security, cybersecurity, EDR, endpoint security, Malware, Phishing, SoC, threat detection</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/new-linux-pamdoora-backdoor-uses-pam.html</loc><lastmod>2026-05-09T11:53:06+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-08T14:11:00+05:30</news:publication_date><news:title>New Linux PamDOORa Backdoor Uses PAM Modules to Steal SSH Credentials</news:title><news:keywords>Authentication, Backdoor, Credential Theft, cybersecurity, linux, Malware, Threat Intelligence</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/linux-kernel-dirty-frag-lpe-exploit.html</loc><lastmod>2026-05-14T12:42:39+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-08T10:42:00+05:30</news:publication_date><news:title>Linux Kernel Dirty Frag LPE Exploit Enables Root Access Across Major Distributions</news:title><news:keywords>cybersecurity, fedora, linux, privilege escalation, red hat, Ubuntu, Vulnerability</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/ivanti-epmm-cve-2026-6973-rce-under.html</loc><lastmod>2026-05-07T23:25:53+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-07T23:25:00+05:30</news:publication_date><news:title>Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access</news:title><news:keywords>CISA, cybersecurity, data security, network security, remote code execution, Threat Intelligence, Vulnerability</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/pcpjack-credential-stealer-exploits-5.html</loc><lastmod>2026-05-07T23:15:36+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-07T23:15:00+05:30</news:publication_date><news:title>PCPJack Credential Stealer Exploits 5 CVEs to Spread Worm-Like Across Cloud Systems</news:title><news:keywords>Cloud Infrastructure, Cloud security, cybersecurity, data exfiltration, Docker, Kubernetes, Malware, Threat Intelligence</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/pan-os-rce-exploit-under-active-use.html</loc><lastmod>2026-05-07T23:28:45+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-07T19:04:00+05:30</news:publication_date><news:title>PAN-OS RCE Exploit Under Active Use Enabling Root Access and Espionage</news:title><news:keywords>cyber espionage, cybersecurity, data security, Malware, network security, Palo Alto Networks, remote code execution, Vulnerability</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/threatsday-bulletin-edge-plaintext.html</loc><lastmod>2026-05-07T23:29:58+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-07T17:03:00+05:30</news:publication_date><news:title>ThreatsDay Bulletin: Edge Plaintext Passwords, ICS 0-Days, Patch-or-Die Alerts and 25+ New Stories</news:title><news:keywords>artificial intelligence, Cloud security, Cybercrime, cybersecurity, Malware, Privacy, ransomware, Threatsday Bulletin, Vulnerability</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/day-zero-readiness-operational-gaps.html</loc><lastmod>2026-05-07T16:24:15+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-07T16:24:00+05:30</news:publication_date><news:title>Day Zero Readiness: The Operational Gaps That Break Incident Response</news:title><news:keywords>Cloud security, cybersecurity, data breach, endpoint security, Identity Management, Incident response, network security, Risk management, SIEM</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/pypi-packages-deliver-zichatbot-malware.html</loc><lastmod>2026-05-07T14:50:39+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-07T14:50:00+05:30</news:publication_date><news:title>PyPI Packages Deliver ZiChatBot Malware via Zulip APIs on Windows and Linux</news:title><news:keywords>cybersecurity, linux, Malware, Open Source, PyPI, Python, supply chain attack, Threat Intelligence, windows security</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/vm2-nodejs-library-vulnerabilities.html</loc><lastmod>2026-05-11T09:25:55+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-07T09:45:00+05:30</news:publication_date><news:title>vm2 Node.js Library Vulnerabilities Enable Sandbox Escape and Arbitrary Code Execution</news:title><news:keywords>Code Injection, cybersecurity, JavaScript, Open Source, remote code execution, sandbox, software security, Vulnerability</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/mirai-based-xlabsv1-botnet-exploits-adb.html</loc><lastmod>2026-05-07T01:51:02+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-07T01:51:00+05:30</news:publication_date><news:title>Mirai-Based xlabs_v1 Botnet Exploits ADB to Hijack IoT Devices for DDoS Attacks</news:title><news:keywords>Android, botnet, cybersecurity, ddos, Gaming Industry, iot security, Malware, network security, Threat Intelligence, Vulnerability</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/muddywater-uses-microsoft-teams-to.html</loc><lastmod>2026-05-07T14:16:48+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-06T18:30:00+05:30</news:publication_date><news:title>MuddyWater Uses Microsoft Teams to Steal Credentials in False Flag Ransomware Attack</news:title><news:keywords>Cybercrime, cybersecurity, data breach, Malware, Microsoft Teams, ransomware, Remote Access Tools, social engineering, Threat Intelligence</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/the-hacker-news-launches-cybersecurity.html</loc><lastmod>2026-05-15T18:58:16+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-06T17:33:00+05:30</news:publication_date><news:title>The Hacker News Launches &#039;Cybersecurity Stars Awards 2026&#039; — Submissions Now Open</news:title><news:keywords>Cloud security, cybersecurity, CyberStars Awards, data protection, endpoint security, enterprise security, Identity Management, threat detection</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/your-ai-agents-are-already-inside.html</loc><lastmod>2026-05-06T16:34:50+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-06T16:27:00+05:30</news:publication_date><news:title>Your AI Agents Are Already Inside the Perimeter. Do You Know What They&#039;re Doing?</news:title><news:keywords>AI Agents, Cloud security, Compliance, cybersecurity, data security, enterprise security, Identity Management, Zero Trust</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/android-apps-get-public-verification.html</loc><lastmod>2026-05-06T16:11:22+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-06T14:43:00+05:30</news:publication_date><news:title>Google&#039;s Android Apps Get Public Verification to Stop Supply Chain Attacks</news:title><news:keywords>Android, Application Security, cybersecurity, data security, encryption, Google, Malware, Software Integrity, supply chain attack, threat detection</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/windows-phone-link-exploited-by-cloudz.html</loc><lastmod>2026-05-06T14:04:23+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-06T14:04:00+05:30</news:publication_date><news:title>Windows Phone Link Exploited by CloudZ RAT to Steal Credentials and OTPs</news:title><news:keywords>Cloud security, Credential Theft, cybersecurity, endpoint security, Malware, Remote Access Trojan, Threat Intelligence, windows security</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/palo-alto-pan-os-flaw-under-active.html</loc><lastmod>2026-05-07T14:16:36+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-06T11:44:00+05:30</news:publication_date><news:title>Palo Alto PAN-OS Flaw Under Active Exploitation Enables Remote Code Execution</news:title><news:keywords>cybersecurity, Firewall, network security, Palo Alto Networks, remote code execution, Threat Intelligence, Vulnerability, zero day</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/critical-apache-http2-flaw-cve-2026.html</loc><lastmod>2026-05-05T22:16:45+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-05T21:49:00+05:30</news:publication_date><news:title>Critical Apache HTTP/2 Flaw (CVE-2026-23918) Enables DoS and Potential RCE</news:title><news:keywords>Apache, cybersecurity, denial of service, HTTP2, linux, remote code execution, server security, Vulnerability</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/daemon-tools-supply-chain-attack.html</loc><lastmod>2026-05-06T21:30:00+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-05T21:37:00+05:30</news:publication_date><news:title>DAEMON Tools Supply Chain Attack Compromises Official Installers with Malware</news:title><news:keywords>cybersecurity, data breach, endpoint security, Malware, network security, Remote Access Trojan, software security, supply chain attack, Threat Intelligence</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/china-linked-uat-8302-targets.html</loc><lastmod>2026-05-05T21:30:36+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-05T19:49:00+05:30</news:publication_date><news:title>China-Linked UAT-8302 Targets Governments Using Shared APT Malware Across Regions</news:title><news:keywords>Cloud security, cybersecurity, data breach, endpoint security, Malware, network security, Threat Intelligence</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/the-back-door-attackers-know-about-and.html</loc><lastmod>2026-05-05T17:28:00+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-05T17:28:00+05:30</news:publication_date><news:title>The Back Door Attackers Know About — and Most Security Teams Still Haven’t Closed</news:title><news:keywords>Access Control, API Security, Cloud security, cybersecurity, data breach, enterprise security, Identity Management, OAuth, SaaS Security, Threat Intelligence</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/metinfo-cms-cve-2026-29014-exploited.html</loc><lastmod>2026-05-05T17:26:49+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-05T17:26:00+05:30</news:publication_date><news:title>MetInfo CMS CVE-2026-29014 Exploited for Remote Code Execution Attacks</news:title><news:keywords>content management system, cybersecurity, network security, Open Source Software, remote code execution, Vulnerability, web security</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/we-scanned-1-million-exposed-ai.html</loc><lastmod>2026-05-05T16:00:00+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-05T16:00:00+05:30</news:publication_date><news:title>We Scanned 1 Million Exposed AI Services. Here&#039;s How Bad the Security Actually Is</news:title><news:keywords>Access Control, API Security, artificial intelligence, Cloud security, cybersecurity, data breach, Infrastructure Security, Risk management, software development, Vulnerability</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/scarcruft-hacks-gaming-platform-to.html</loc><lastmod>2026-05-05T21:30:04+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-05T14:37:00+05:30</news:publication_date><news:title>ScarCruft Hacks Gaming Platform to Deploy BirdCall Malware on Android and Windows</news:title><news:keywords>Android, Cloud security, cyber espionage, cybersecurity, data theft, Malware, supply chain attack, surveillance, Threat Intelligence</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/weaver-e-cology-rce-flaw-cve-2026-22679.html</loc><lastmod>2026-05-06T06:44:09+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-05T13:07:00+05:30</news:publication_date><news:title>Weaver E-cology RCE Flaw CVE-2026-22679 Actively Exploited via Debug API</news:title><news:keywords>cybersecurity, data security, Enterprise Software, Malware, network security, remote code execution, Threat Intelligence, Vulnerability</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/microsoft-details-phishing-campaign.html</loc><lastmod>2026-05-05T13:16:28+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-05T12:05:00+05:30</news:publication_date><news:title>Microsoft Details Phishing Campaign Targeting 35,000 Users Across 26 Countries</news:title><news:keywords>Cloud security, cybersecurity, data breach, email security, identity theft, Malware, Microsoft, Phishing, social engineering, Threat Intelligence</news:keywords></news:news></url><url><loc>https://thehackernews.com/2026/05/phishing-campaign-hits-80-orgs-using.html</loc><lastmod>2026-05-05T10:38:03+05:30</lastmod><news:news><news:publication><news:name>The Hacker News</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-04T23:36:00+05:30</news:publication_date><news:title>Phishing Campaign Hits 80+ Orgs Using SimpleHelp and ScreenConnect RMM Tools</news:title><news:keywords>cybersecurity, data breach, endpoint security, Malware, network security, Phishing, ransomware, Remote Access, social engineering, Threat Intelligence</news:keywords></news:news></url></urlset>