<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on May 20, 2026 at 11:48 pm by All in One SEO v4.9.7.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://cybersecnextgen.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Cybersec next gen</title>
		<link><![CDATA[https://cybersecnextgen.com]]></link>
		<description><![CDATA[Cybersec next gen]]></description>
		<lastBuildDate><![CDATA[Wed, 20 May 2026 18:57:32 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://cybersecnextgen.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://cybersecnextgen.com/the-case-for-a-vulnerability-operations-center/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/the-case-for-a-vulnerability-operations-center/]]></link>
			<title>The Case for a Vulnerability Operations Center</title>
			<pubDate><![CDATA[Wed, 20 May 2026 18:57:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/how-oauth-consent-bypasses-mfa/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/how-oauth-consent-bypasses-mfa/]]></link>
			<title>How OAuth Consent Bypasses MFA</title>
			<pubDate><![CDATA[Wed, 20 May 2026 05:57:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/popular-github-action-tags-redirected-to-imposter-commit-to-steal-ci-cd-credentials/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/popular-github-action-tags-redirected-to-imposter-commit-to-steal-ci-cd-credentials/]]></link>
			<title>Popular GitHub Action Tags Redirected to Imposter Commit to Steal CI/CD Credentials</title>
			<pubDate><![CDATA[Wed, 20 May 2026 04:57:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/turn-blind-trust-into-verified-control-with-prompt-security-for-agentic-ai/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/turn-blind-trust-into-verified-control-with-prompt-security-for-agentic-ai/]]></link>
			<title>Turn Blind Trust into Verified Control with Prompt Security for Agentic AI</title>
			<pubDate><![CDATA[Wed, 20 May 2026 02:57:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/trapdoor-android-ad-fraud-scheme-hit-659-million-daily-bid-requests-using-455-apps/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/trapdoor-android-ad-fraud-scheme-hit-659-million-daily-bid-requests-using-455-apps/]]></link>
			<title>Trapdoor Android Ad Fraud Scheme Hit 659 Million Daily Bid Requests Using 455 Apps</title>
			<pubDate><![CDATA[Wed, 20 May 2026 01:57:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/purelogs-infostealer-is-stealing-credentials-worldwide/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/purelogs-infostealer-is-stealing-credentials-worldwide/]]></link>
			<title>PureLogs infostealer is stealing credentials worldwide</title>
			<pubDate><![CDATA[Wed, 20 May 2026 00:57:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/inside-the-2026-verizon-dbir-what-one-billion-records-revealed-about-vulnerability-remediation/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/inside-the-2026-verizon-dbir-what-one-billion-records-revealed-about-vulnerability-remediation/]]></link>
			<title>Inside the 2026 Verizon DBIR: What One Billion Records Revealed About Vulnerability Remediation</title>
			<pubDate><![CDATA[Tue, 19 May 2026 16:57:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/android-adds-intrusion-logging-for-sophisticated-spyware-forensics/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/android-adds-intrusion-logging-for-sophisticated-spyware-forensics/]]></link>
			<title>Android Adds Intrusion Logging for Sophisticated Spyware Forensics</title>
			<pubDate><![CDATA[Tue, 19 May 2026 03:58:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/teampcp-supply-chain-campaign-activity-through-2026-05-17/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/teampcp-supply-chain-campaign-activity-through-2026-05-17/]]></link>
			<title>TeamPCP Supply Chain Campaign: Activity Through 2026-05-17</title>
			<pubDate><![CDATA[Tue, 19 May 2026 02:58:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/]]></link>
			<title>CYBERSECNEXTGEN</title>
			<pubDate><![CDATA[Sun, 17 May 2026 21:18:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/exchange-0-day-npm-worm-fake-ai-repo-cisco-exploit-and-more/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/exchange-0-day-npm-worm-fake-ai-repo-cisco-exploit-and-more/]]></link>
			<title>Exchange 0-Day, npm Worm, Fake AI Repo, Cisco Exploit and More</title>
			<pubDate><![CDATA[Tue, 19 May 2026 00:58:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/ico-publishes-five-step-plan-to-counter-emerging-ai-powered-attacks/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/ico-publishes-five-step-plan-to-counter-emerging-ai-powered-attacks/]]></link>
			<title>ICO Publishes Five-Step Plan to Counter Emerging AI-Powered Attacks</title>
			<pubDate><![CDATA[Sun, 17 May 2026 20:59:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/the-infosecurity-europe-cyber-startup-competition-meet-the-finalists/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/the-infosecurity-europe-cyber-startup-competition-meet-the-finalists/]]></link>
			<title>The Infosecurity Europe Cyber Startup Competition: Meet the Finalists</title>
			<pubDate><![CDATA[Mon, 18 May 2026 14:57:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/how-to-reduce-phishing-exposure-before-it-turns-into-business-disruption/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/how-to-reduce-phishing-exposure-before-it-turns-into-business-disruption/]]></link>
			<title>How to Reduce Phishing Exposure Before It Turns into Business Disruption</title>
			<pubDate><![CDATA[Mon, 18 May 2026 13:57:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/threatsday-bulletin-pan-os-rce-mythos-curl-bug-ai-tokenizer-attacks-and-10-stories/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/threatsday-bulletin-pan-os-rce-mythos-curl-bug-ai-tokenizer-attacks-and-10-stories/]]></link>
			<title>ThreatsDay Bulletin: PAN-OS RCE, Mythos cURL Bug, AI Tokenizer Attacks, and 10+ Stories</title>
			<pubDate><![CDATA[Sun, 17 May 2026 20:58:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/hackers-observed-using-ai-to-develop-zero-day-for-the-first-time/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/hackers-observed-using-ai-to-develop-zero-day-for-the-first-time/]]></link>
			<title>Hackers Observed Using AI to Develop Zero-Day for the First Time</title>
			<pubDate><![CDATA[Sun, 17 May 2026 20:52:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/the-good-the-bad-and-the-ugly-in-cybersecurity-week-20/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/the-good-the-bad-and-the-ugly-in-cybersecurity-week-20/]]></link>
			<title>The Good, the Bad and the Ugly in Cybersecurity – Week 20</title>
			<pubDate><![CDATA[Sun, 17 May 2026 15:57:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/trickmo-variant-routes-android-trojan-traffic-through-ton/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/trickmo-variant-routes-android-trojan-traffic-through-ton/]]></link>
			<title>TrickMo Variant Routes Android Trojan Traffic Through TON</title>
			<pubDate><![CDATA[Sun, 17 May 2026 14:58:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/week-in-review-cisco-patches-sd-wan-0-day-unpatched-microsoft-exchange-server-flaw-exploited/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/week-in-review-cisco-patches-sd-wan-0-day-unpatched-microsoft-exchange-server-flaw-exploited/]]></link>
			<title>Week in review: Cisco patches SD-WAN 0-day, unpatched Microsoft Exchange Server flaw exploited</title>
			<pubDate><![CDATA[Sun, 17 May 2026 13:57:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/product-showcase-mcafee-chatgpt-integration-turns-doubt-into-a-scam-check/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/product-showcase-mcafee-chatgpt-integration-turns-doubt-into-a-scam-check/]]></link>
			<title>Product showcase: McAfee + ChatGPT integration turns doubt into a scam check</title>
			<pubDate><![CDATA[Mon, 18 May 2026 23:57:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/fresh-mischief-and-digital-shenanigans/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/fresh-mischief-and-digital-shenanigans/]]></link>
			<title>Fresh mischief and digital shenanigans</title>
			<pubDate><![CDATA[Sat, 16 May 2026 23:58:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/tanstack-supply-chain-attack-hits-two-openai-employee-devices-forces-macos-updates/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/tanstack-supply-chain-attack-hits-two-openai-employee-devices-forces-macos-updates/]]></link>
			<title>TanStack Supply Chain Attack Hits Two OpenAI Employee Devices, Forces macOS Updates</title>
			<pubDate><![CDATA[Sat, 16 May 2026 19:57:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/ai-is-drowning-software-maintainers-in-junk-security-reports/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/ai-is-drowning-software-maintainers-in-junk-security-reports/]]></link>
			<title>AI is drowning software maintainers in junk security reports</title>
			<pubDate><![CDATA[Mon, 18 May 2026 22:57:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/the-security-mistakes-being-repeated-with-ai/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/the-security-mistakes-being-repeated-with-ai/]]></link>
			<title>The Security Mistakes Being Repeated With Ai</title>
			<pubDate><![CDATA[Sat, 16 May 2026 13:57:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/new-linux-kernel-vulnerability-fragnesia-allows-root-privilege-escalation/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/new-linux-kernel-vulnerability-fragnesia-allows-root-privilege-escalation/]]></link>
			<title>New Linux Kernel Vulnerability Fragnesia Allows Root Privilege Escalation</title>
			<pubDate><![CDATA[Sat, 16 May 2026 12:57:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/fedramp-high-authorized-qualys-totalcloud-cnapp-from-compliance-to-defense/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/fedramp-high-authorized-qualys-totalcloud-cnapp-from-compliance-to-defense/]]></link>
			<title>FedRAMP High Authorized: Qualys TotalCloud CNAPP &#8211; From Compliance to Defense</title>
			<pubDate><![CDATA[Sat, 16 May 2026 11:57:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/what-45-days-of-watching-your-own-tools-will-tell-you-about-your-real-attack-surface/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/what-45-days-of-watching-your-own-tools-will-tell-you-about-your-real-attack-surface/]]></link>
			<title>What 45 Days of Watching Your Own Tools Will Tell You About Your Real Attack Surface</title>
			<pubDate><![CDATA[Sat, 16 May 2026 09:57:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/blog/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/blog/]]></link>
			<title>Blog</title>
			<pubDate><![CDATA[Mon, 16 Sep 2024 11:49:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/microsoft-patches-138-vulnerabilities-including-dns-and-netlogon-rce-flaws/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/microsoft-patches-138-vulnerabilities-including-dns-and-netlogon-rce-flaws/]]></link>
			<title>Microsoft Patches 138 Vulnerabilities, Including DNS and Netlogon RCE Flaws</title>
			<pubDate><![CDATA[Thu, 14 May 2026 15:57:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/how-to-be-prepared-to-respond-to-advanced-threats/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/how-to-be-prepared-to-respond-to-advanced-threats/]]></link>
			<title>How to be prepared to respond to advanced threats</title>
			<pubDate><![CDATA[Thu, 14 May 2026 09:57:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/attackers-combine-clickfix-with-pysoxy-to-maintain-persistence/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/attackers-combine-clickfix-with-pysoxy-to-maintain-persistence/]]></link>
			<title>Attackers Combine ClickFix With PySoxy to Maintain Persistence</title>
			<pubDate><![CDATA[Thu, 14 May 2026 08:57:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/south-staffordshire-water-fined-1m-after-data-breach/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/south-staffordshire-water-fined-1m-after-data-breach/]]></link>
			<title>South Staffordshire Water Fined £1m After Data Breach</title>
			<pubDate><![CDATA[Thu, 14 May 2026 07:58:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/ai-powered-dns-defense/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/ai-powered-dns-defense/]]></link>
			<title>AI-powered DNS defense</title>
			<pubDate><![CDATA[Fri, 15 May 2026 11:57:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/cisco-patches-another-sd-wan-zero-day-the-sixth-exploited-in-2026/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/cisco-patches-another-sd-wan-zero-day-the-sixth-exploited-in-2026/]]></link>
			<title>Cisco Patches Another SD-WAN Zero-Day, the Sixth Exploited in 2026</title>
			<pubDate><![CDATA[Fri, 15 May 2026 10:57:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/stop-chasing-threats-top-insights-from-2025-sans-asm-survey/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/stop-chasing-threats-top-insights-from-2025-sans-asm-survey/]]></link>
			<title>Stop Chasing Threats: Top Insights from 2025 SANS ASM Survey</title>
			<pubDate><![CDATA[Fri, 15 May 2026 09:57:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/how-shinyhunters-hacked-the-worlds-biggest-universities-graham-cluley/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/how-shinyhunters-hacked-the-worlds-biggest-universities-graham-cluley/]]></link>
			<title>How ShinyHunters hacked the world’s biggest universities • Graham Cluley</title>
			<pubDate><![CDATA[Thu, 14 May 2026 05:57:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/microsofts-mdash-ai-system-finds-16-windows-flaws-fixed-in-patch-tuesday/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/microsofts-mdash-ai-system-finds-16-windows-flaws-fixed-in-patch-tuesday/]]></link>
			<title>Microsoft&#8217;s MDASH AI System Finds 16 Windows Flaws Fixed in Patch Tuesday</title>
			<pubDate><![CDATA[Wed, 13 May 2026 13:57:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/wannacry-the-ransomware-attack-that-changed-the-history-of-cybersecurity/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/wannacry-the-ransomware-attack-that-changed-the-history-of-cybersecurity/]]></link>
			<title>WannaCry, the ransomware attack that changed the history of cybersecurity</title>
			<pubDate><![CDATA[Wed, 13 May 2026 07:59:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/west-pharmaceutical-services-hit-by-disruptive-ransomware-attack/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/west-pharmaceutical-services-hit-by-disruptive-ransomware-attack/]]></link>
			<title>West Pharmaceutical Services Hit by Disruptive Ransomware Attack</title>
			<pubDate><![CDATA[Wed, 13 May 2026 06:57:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/microsoft-and-adobe-patch-tuesday-may-2026-security-update-review/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/microsoft-and-adobe-patch-tuesday-may-2026-security-update-review/]]></link>
			<title>Microsoft and Adobe Patch Tuesday, May 2026 Security Update Review</title>
			<pubDate><![CDATA[Wed, 13 May 2026 05:57:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/webinar-what-the-riskiest-soc-alerts-go-unanswered/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/webinar-what-the-riskiest-soc-alerts-go-unanswered/]]></link>
			<title>Webinar: What the Riskiest SOC Alerts Go Unanswered</title>
			<pubDate><![CDATA[Tue, 12 May 2026 13:57:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/why-agentic-ai-is-securitys-next-blind-spot/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/why-agentic-ai-is-securitys-next-blind-spot/]]></link>
			<title>Why Agentic AI Is Security&#8217;s Next Blind Spot</title>
			<pubDate><![CDATA[Tue, 12 May 2026 11:57:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/identity-security-firm-sailpoint-discloses-github-repository-breach/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/identity-security-firm-sailpoint-discloses-github-repository-breach/]]></link>
			<title>Identity security firm SailPoint discloses GitHub repository breach</title>
			<pubDate><![CDATA[Tue, 12 May 2026 05:57:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/hackers-used-ai-to-develop-first-known-zero-day-2fa-bypass-for-mass-exploitation/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/hackers-used-ai-to-develop-first-known-zero-day-2fa-bypass-for-mass-exploitation/]]></link>
			<title>Hackers Used AI to Develop First Known Zero-Day 2FA Bypass for Mass Exploitation</title>
			<pubDate><![CDATA[Tue, 12 May 2026 04:57:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/google-warns-artificial-intelligence-is-accelerating-cyberattacks-and-zero-day-exploits/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/google-warns-artificial-intelligence-is-accelerating-cyberattacks-and-zero-day-exploits/]]></link>
			<title>Google warns artificial intelligence is accelerating cyberattacks and zero-day exploits</title>
			<pubDate><![CDATA[Tue, 12 May 2026 03:57:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/your-purple-team-isnt-purple-its-just-red-and-blue-in-the-same-room/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/your-purple-team-isnt-purple-its-just-red-and-blue-in-the-same-room/]]></link>
			<title>Your Purple Team Isn&#8217;t Purple — It&#8217;s Just Red and Blue in the Same Room</title>
			<pubDate><![CDATA[Tue, 12 May 2026 01:57:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/four-openclaw-flaws-enable-data-theft-privilege-escalation-and-persistence/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/four-openclaw-flaws-enable-data-theft-privilege-escalation-and-persistence/]]></link>
			<title>Four OpenClaw Flaws Enable Data Theft, Privilege Escalation, and Persistence</title>
			<pubDate><![CDATA[Fri, 15 May 2026 17:57:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/scarcruft-compromises-gaming-platform-in-a-supply-chain-attack/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/scarcruft-compromises-gaming-platform-in-a-supply-chain-attack/]]></link>
			<title>ScarCruft compromises gaming platform in a supply-chain attack</title>
			<pubDate><![CDATA[Mon, 11 May 2026 13:57:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/fake-openai-privacy-filter-repo-hits-1-on-hugging-face-draws-244k-downloads/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/fake-openai-privacy-filter-repo-hits-1-on-hugging-face-draws-244k-downloads/]]></link>
			<title>Fake OpenAI Privacy Filter Repo Hits #1 on Hugging Face, Draws 244K Downloads</title>
			<pubDate><![CDATA[Mon, 11 May 2026 09:57:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/turla-turns-kazuar-backdoor-into-modular-p2p-botnet-for-persistent-access/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/turla-turns-kazuar-backdoor-into-modular-p2p-botnet-for-persistent-access/]]></link>
			<title>Turla Turns Kazuar Backdoor Into Modular P2P Botnet for Persistent Access</title>
			<pubDate><![CDATA[Fri, 15 May 2026 21:57:13 +0000]]></pubDate>
		</item>
				</channel>
</rss>
