<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dinamicamente generated on Abril 3, 2026 at 9:33 pm by All in One SEO v4.9.3 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://cybersecnextgen.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Cybersec next gen</title>
		<link><![CDATA[https://cybersecnextgen.com]]></link>
		<description><![CDATA[Cybersec next gen]]></description>
		<lastBuildDate><![CDATA[Thu, 02 Apr 2026 13:57:10 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://cybersecnextgen.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://cybersecnextgen.com/teampcp-supply-chain-campaign-update-005/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/teampcp-supply-chain-campaign-update-005/]]></link>
			<title>TeamPCP Supply Chain Campaign: Update 005</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 13:57:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/cert-ua-impersonation-campaign-spread-agewheeze-malware-to-1-million-emails/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/cert-ua-impersonation-campaign-spread-agewheeze-malware-to-1-million-emails/]]></link>
			<title>CERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million Emails</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 09:57:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/cybercriminals-take-aim-at-hasbro-weeks-of-recovery-ahead/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/cybercriminals-take-aim-at-hasbro-weeks-of-recovery-ahead/]]></link>
			<title>Cybercriminals take aim at Hasbro, weeks of recovery ahead</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 03:57:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/teampcp-supply-chain-campaign-update-006/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/teampcp-supply-chain-campaign-update-006/]]></link>
			<title>TeamPCP Supply Chain Campaign: Update 006</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 15:57:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/the-implementation-blind-spot-why-organizations-are-confusing-temporary-friction-with-permanent-safety/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/the-implementation-blind-spot-why-organizations-are-confusing-temporary-friction-with-permanent-safety/]]></link>
			<title>The Implementation Blind Spot | Why Organizations Are Confusing Temporary Friction with Permanent Safety</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 05:57:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/hackers-exploit-cve-2025-55182-to-breach-766-next-js-hosts-steal-credentials/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/hackers-exploit-cve-2025-55182-to-breach-766-next-js-hosts-steal-credentials/]]></link>
			<title>Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 04:57:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/how-sentinelones-ai-edr-stops-the-axios-attack-autonomously/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/how-sentinelones-ai-edr-stops-the-axios-attack-autonomously/]]></link>
			<title>How SentinelOne®’s AI EDR Stops the Axios Attack Autonomously</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 02:57:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/the-state-of-trusted-open-source-report/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/the-state-of-trusted-open-source-report/]]></link>
			<title>The State of Trusted Open Source Report</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 01:57:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/google-attributes-axios-npm-supply-chain-attack-to-north-korean-group-unc1069/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/google-attributes-axios-npm-supply-chain-attack-to-north-korean-group-unc1069/]]></link>
			<title>Google Attributes Axios npm Supply Chain Attack to North Korean Group UNC1069</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 02:57:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/claude-code-source-leaked-via-npm-packaging-error-anthropic-confirms/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/claude-code-source-leaked-via-npm-packaging-error-anthropic-confirms/]]></link>
			<title>Claude Code Source Leaked via npm Packaging Error, Anthropic Confirms</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 07:57:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/cloud-workload-security-mind-the-gaps/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/cloud-workload-security-mind-the-gaps/]]></link>
			<title>Cloud workload security: Mind the gaps</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 01:59:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/the-ai-arms-race-why-unified-exposure-management-is-becoming-a-boardroom-priority/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/the-ai-arms-race-why-unified-exposure-management-is-becoming-a-boardroom-priority/]]></link>
			<title>The AI Arms Race – Why Unified Exposure Management Is Becoming a Boardroom Priority</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 00:57:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/teampcp-supply-chain-campaign-update-004/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/teampcp-supply-chain-campaign-update-004/]]></link>
			<title>TeamPCP Supply Chain Campaign: Update 004</title>
			<pubDate><![CDATA[Tue, 31 Mar 2026 09:57:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/openai-patches-chatgpt-data-exfiltration-flaw-and-codex-github-token-vulnerability/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/openai-patches-chatgpt-data-exfiltration-flaw-and-codex-github-token-vulnerability/]]></link>
			<title>OpenAI Patches ChatGPT Data Exfiltration Flaw and Codex GitHub Token Vulnerability</title>
			<pubDate><![CDATA[Tue, 31 Mar 2026 05:57:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/week-in-review-nist-updates-dns-security-guidance-compromised-litellm-pypi-packages/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/week-in-review-nist-updates-dns-security-guidance-compromised-litellm-pypi-packages/]]></link>
			<title>Week in review: NIST updates DNS security guidance, compromised LiteLLM PyPI packages</title>
			<pubDate><![CDATA[Sun, 29 Mar 2026 21:57:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/glassworm-malware-uses-solana-dead-drops-to-deliver-rat-and-steal-browser-crypto-data/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/glassworm-malware-uses-solana-dead-drops-to-deliver-rat-and-steal-browser-crypto-data/]]></link>
			<title>GlassWorm Malware Uses Solana Dead Drops to Deliver RAT and Steal Browser, Crypto Data</title>
			<pubDate><![CDATA[Sun, 29 Mar 2026 20:57:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/deepload-malware-uses-clickfix-and-wmi-persistence-to-steal-browser-credentials/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/deepload-malware-uses-clickfix-and-wmi-persistence-to-steal-browser-credentials/]]></link>
			<title>DeepLoad Malware Uses ClickFix and WMI Persistence to Steal Browser Credentials</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 22:57:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/optimizing-risk-discovery-and-remediation-with-qualys-gateway-service-qgs/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/optimizing-risk-discovery-and-remediation-with-qualys-gateway-service-qgs/]]></link>
			<title>Optimizing Risk Discovery and Remediation with Qualys Gateway Service (QGS)</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 21:57:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/3-soc-process-fixes-that-unlock-tier-1-productivity/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/3-soc-process-fixes-that-unlock-tier-1-productivity/]]></link>
			<title>3 SOC Process Fixes That Unlock Tier 1 Productivity</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 19:57:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/three-china-linked-clusters-target-southeast-asian-government-in-2025-cyber-campaign/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/three-china-linked-clusters-target-southeast-asian-government-in-2025-cyber-campaign/]]></link>
			<title>Three China-Linked Clusters Target Southeast Asian Government in 2025 Cyber Campaign</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 07:57:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/the-importance-of-behavioral-analytics-in-ai-enabled-cyber-attacks/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/the-importance-of-behavioral-analytics-in-ai-enabled-cyber-attacks/]]></link>
			<title>The Importance of Behavioral Analytics in AI-Enabled Cyber Attacks</title>
			<pubDate><![CDATA[Mon, 30 Mar 2026 03:57:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/]]></link>
			<title>CYBERSECNEXTGEN</title>
			<pubDate><![CDATA[Mon, 10 Nov 2025 19:40:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/teampcp-supply-chain-campaign-update-003/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/teampcp-supply-chain-campaign-update-003/]]></link>
			<title>TeamPCP Supply Chain Campaign: Update 003</title>
			<pubDate><![CDATA[Sun, 29 Mar 2026 05:57:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/langchain-langgraph-flaws-expose-files-secrets-databases-in-widely-used-ai-frameworks/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/langchain-langgraph-flaws-expose-files-secrets-databases-in-widely-used-ai-frameworks/]]></link>
			<title>LangChain, LangGraph Flaws Expose Files, Secrets, Databases in Widely Used AI Frameworks</title>
			<pubDate><![CDATA[Sun, 29 Mar 2026 01:57:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/cisa-flags-apple-craft-cms-laravel-bugs-in-kev-orders-patching-by-april-3-2026/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/cisa-flags-apple-craft-cms-laravel-bugs-in-kev-orders-patching-by-april-3-2026/]]></link>
			<title>CISA Flags Apple, Craft CMS, Laravel Bugs in KEV, Orders Patching by April 3, 2026</title>
			<pubDate><![CDATA[Sun, 22 Mar 2026 17:57:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/what-our-research-reveals-about-agentic-ai-security/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/what-our-research-reveals-about-agentic-ai-security/]]></link>
			<title>What Our Research Reveals About Agentic AI Security</title>
			<pubDate><![CDATA[Sat, 28 Mar 2026 19:57:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/the-rise-of-managed-risk-operations-how-the-new-qualys-mroc-portal-helps-partners-scale-the-risk-operations-center/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/the-rise-of-managed-risk-operations-how-the-new-qualys-mroc-portal-helps-partners-scale-the-risk-operations-center/]]></link>
			<title>The Rise of Managed Risk Operations: How the New Qualys mROC Portal Helps Partners Scale the Risk Operations Center</title>
			<pubDate><![CDATA[Thu, 26 Mar 2026 13:57:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/iran-linked-hackers-breach-fbi-directors-personal-email-hit-stryker-with-wiper-attack/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/iran-linked-hackers-breach-fbi-directors-personal-email-hit-stryker-with-wiper-attack/]]></link>
			<title>Iran-Linked Hackers Breach FBI Director’s Personal Email, Hit Stryker With Wiper Attack</title>
			<pubDate><![CDATA[Sat, 28 Mar 2026 18:57:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/how-hackers-and-art-forgers-perfect-the-art-of-deception/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/how-hackers-and-art-forgers-perfect-the-art-of-deception/]]></link>
			<title>How Hackers and Art Forgers Perfect the Art of Deception</title>
			<pubDate><![CDATA[Sat, 28 Mar 2026 15:57:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/the-kill-chain-is-obsolete-when-your-ai-agent-is-the-threat/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/the-kill-chain-is-obsolete-when-your-ai-agent-is-the-threat/]]></link>
			<title>The Kill Chain Is Obsolete When Your AI Agent Is the Threat</title>
			<pubDate><![CDATA[Wed, 25 Mar 2026 19:57:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/teampcp-supply-chain-campaign-update-002/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/teampcp-supply-chain-campaign-update-002/]]></link>
			<title>TeamPCP Supply Chain Campaign: Update 002</title>
			<pubDate><![CDATA[Sat, 28 Mar 2026 03:57:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/device-code-phishing-hits-340-microsoft-365-orgs-across-five-countries-via-oauth-abuse/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/device-code-phishing-hits-340-microsoft-365-orgs-across-five-countries-via-oauth-abuse/]]></link>
			<title>Device Code Phishing Hits 340+ Microsoft 365 Orgs Across Five Countries via OAuth Abuse</title>
			<pubDate><![CDATA[Wed, 25 Mar 2026 12:57:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/ghost-campaign-uses-7-npm-packages-to-steal-crypto-wallets-and-credentials/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/ghost-campaign-uses-7-npm-packages-to-steal-crypto-wallets-and-credentials/]]></link>
			<title>Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials</title>
			<pubDate><![CDATA[Tue, 24 Mar 2026 17:57:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/securityscorecard-automates-third-party-risk-management-with-titan-ai/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/securityscorecard-automates-third-party-risk-management-with-titan-ai/]]></link>
			<title>SecurityScorecard automates third-party risk management with TITAN AI</title>
			<pubDate><![CDATA[Tue, 24 Mar 2026 10:57:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/agent-val-qualys-exploitability-validation-at-machine-speed-2026/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/agent-val-qualys-exploitability-validation-at-machine-speed-2026/]]></link>
			<title>Agent Val Qualys: Exploitability Validation at Machine Speed 2026</title>
			<pubDate><![CDATA[Tue, 24 Mar 2026 09:58:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/ci-cd-backdoor-fbi-buys-location-data-whatsapp-ditches-numbers-more/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/ci-cd-backdoor-fbi-buys-location-data-whatsapp-ditches-numbers-more/]]></link>
			<title>CI/CD Backdoor, FBI Buys Location Data, WhatsApp Ditches Numbers &#038; More</title>
			<pubDate><![CDATA[Tue, 24 Mar 2026 07:57:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/from-vision-to-real-time-threat-intelligence-trulens-for-etm/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/from-vision-to-real-time-threat-intelligence-trulens-for-etm/]]></link>
			<title>From Vision to Real-time Threat Intelligence: TruLens for ETM</title>
			<pubDate><![CDATA[Fri, 27 Mar 2026 17:57:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/kaspersky-global-report-by-kaspersky-security-services-2026/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/kaspersky-global-report-by-kaspersky-security-services-2026/]]></link>
			<title>Kaspersky Global Report by Kaspersky Security Services 2026</title>
			<pubDate><![CDATA[Fri, 27 Mar 2026 13:57:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/critical-langflow-flaw-cve-2026-33017-triggers-attacks-within-20-hours-of-disclosure/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/critical-langflow-flaw-cve-2026-33017-triggers-attacks-within-20-hours-of-disclosure/]]></link>
			<title>Critical Langflow Flaw CVE-2026-33017 Triggers Attacks within 20 Hours of Disclosure</title>
			<pubDate><![CDATA[Thu, 26 Mar 2026 21:58:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/bearlyfy-hits-russian-firms-with-custom-genielocker-ransomware/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/bearlyfy-hits-russian-firms-with-custom-genielocker-ransomware/]]></link>
			<title>Bearlyfy Hits Russian Firms with Custom GenieLocker Ransomware</title>
			<pubDate><![CDATA[Fri, 27 Mar 2026 16:57:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/etherrat-techniques-bypass-security-via-ethereum-smart-contracts/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/etherrat-techniques-bypass-security-via-ethereum-smart-contracts/]]></link>
			<title>EtherRAT Techniques Bypass Security Via Ethereum Smart Contracts</title>
			<pubDate><![CDATA[Thu, 26 Mar 2026 15:57:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/webinar-stop-guessing-learn-to-validate-your-defenses-against-real-attacks/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/webinar-stop-guessing-learn-to-validate-your-defenses-against-real-attacks/]]></link>
			<title>[Webinar] Stop Guessing. Learn to Validate Your Defenses Against Real Attacks</title>
			<pubDate><![CDATA[Thu, 26 Mar 2026 14:57:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/microsoft-warns-irs-phishing-hits-29000-users-deploys-rmm-malware/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/microsoft-warns-irs-phishing-hits-29000-users-deploys-rmm-malware/]]></link>
			<title>Microsoft Warns IRS Phishing Hits 29,000 Users, Deploys RMM Malware</title>
			<pubDate><![CDATA[Mon, 23 Mar 2026 15:57:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/teampcp-supply-chain-campaign-update-001/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/teampcp-supply-chain-campaign-update-001/]]></link>
			<title>TeamPCP Supply Chain Campaign: Update 001</title>
			<pubDate><![CDATA[Fri, 27 Mar 2026 01:57:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/vorlon-adds-forensics-and-response-to-secure-ai-agents/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/vorlon-adds-forensics-and-response-to-secure-ai-agents/]]></link>
			<title>Vorlon adds forensics and response to secure AI agents</title>
			<pubDate><![CDATA[Wed, 25 Mar 2026 13:57:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/meet-your-incident-responders/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/meet-your-incident-responders/]]></link>
			<title>Meet Your Incident Responders</title>
			<pubDate><![CDATA[Mon, 23 Mar 2026 09:57:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/booz-allens-vellox-brings-ai-vs-ai-defense-to-protect-critical-infrastructure-and-national-security/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/booz-allens-vellox-brings-ai-vs-ai-defense-to-protect-critical-infrastructure-and-national-security/]]></link>
			<title>Booz Allen’s Vellox brings AI vs. AI defense to protect critical infrastructure and national security</title>
			<pubDate><![CDATA[Mon, 23 Mar 2026 08:57:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/enterprise-cybersecurity-software-fails-20-of-the-time-warns-report/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/enterprise-cybersecurity-software-fails-20-of-the-time-warns-report/]]></link>
			<title>Enterprise Cybersecurity Software Fails 20% of the Time, Warns Report</title>
			<pubDate><![CDATA[Fri, 27 Mar 2026 16:01:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/trivy-supply-chain-attack-triggers-self-spreading-canisterworm-across-47-npm-packages/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/trivy-supply-chain-attack-triggers-self-spreading-canisterworm-across-47-npm-packages/]]></link>
			<title>Trivy Supply Chain Attack Triggers Self-Spreading CanisterWorm Across 47 npm Packages</title>
			<pubDate><![CDATA[Sun, 22 Mar 2026 13:57:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cybersecnextgen.com/blog/]]></guid>
			<link><![CDATA[https://cybersecnextgen.com/blog/]]></link>
			<title>Blog</title>
			<pubDate><![CDATA[Mon, 16 Sep 2024 11:49:28 +0000]]></pubDate>
		</item>
				</channel>
</rss>
