<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//www.itsecuritynews.info/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://www.itsecuritynews.info/randall-munroes-xkcd-bazookasaurus/</loc>
		<lastmod>2026-04-15T18:13:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/patch-these-critical-fortinet-sandbox-bugs-that-let-attackers-bypass-login-run-commands-over-http/</loc>
		<lastmod>2026-04-15T18:13:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/ai-clickbait-can-turn-your-notifications-into-a-scam-feed/</loc>
		<lastmod>2026-04-15T18:13:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/how-the-enterprise-supply-chain-has-created-a-global-attack-surface/</loc>
		<lastmod>2026-04-15T18:14:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/only-16-of-businesses-are-fully-compliant-with-nis2-despite-2024-compliance-deadline/</loc>
		<lastmod>2026-04-15T18:14:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/the-platform-or-the-pile-how-gitops-and-developer-platforms-are-settling-the-infrastructure-debt-reckoning/</loc>
		<lastmod>2026-04-15T18:14:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/it-security-news-hourly-summary-2026-04-15-21h-6-posts/</loc>
		<lastmod>2026-04-15T19:05:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/inside-a-stealth-multipath-zero-trust-transport-layer-for-ai/</loc>
		<lastmod>2026-04-15T19:09:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/cve-2026-33032-severe-nginx-ui-bug-grants-unauthenticated-server-access/</loc>
		<lastmod>2026-04-15T19:09:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/comcasts-117-5m-breach-settlement-up-to-30m-people-may-qualify/</loc>
		<lastmod>2026-04-15T19:09:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/unprompted-2026-tenderizing-the-target/</loc>
		<lastmod>2026-04-15T19:36:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/shadow-admins-in-active-directory-hidden-privilege-paths-attackers-exploit/</loc>
		<lastmod>2026-04-15T19:36:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/how-to-roll-out-an-enterprise-passkey-deployment/</loc>
		<lastmod>2026-04-15T19:36:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/ai-prompt-injection-attacks-examples-prevention-grip/</loc>
		<lastmod>2026-04-15T20:09:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/encryption-without-friction-making-quantum-safe-security-invisible-for-users/</loc>
		<lastmod>2026-04-15T20:09:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/identity-protection-in-the-ai-era/</loc>
		<lastmod>2026-04-15T20:09:28+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->