<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//www.itsecuritynews.info/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://www.itsecuritynews.info/it-security-news-hourly-summary-2026-04-23-09h-5-posts/</loc>
		<lastmod>2026-04-23T07:05:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/15-identity-providers-your-b2b-saas-must-support-to-close-enterprise-deals/</loc>
		<lastmod>2026-04-23T07:11:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/apple-fixes-notification-privacy-flaw-that-allowed-fbi-to-access-deleted-signal-messages/</loc>
		<lastmod>2026-04-23T07:11:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/fake-tradingview-ai-site-spreads-needle-stealer-through-phony-tradingclaw-app/</loc>
		<lastmod>2026-04-23T07:11:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/checkmarx-kics-docker-repo-hijacked-in-malicious-code-injection-attack/</loc>
		<lastmod>2026-04-23T07:11:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/sony-robot-challenges-humans-at-table-tennis/</loc>
		<lastmod>2026-04-23T07:11:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/new-openai-cyber-product-unauthorized-mythos-access-insurers-to-cap-llmjacking-payouts/</loc>
		<lastmod>2026-04-23T07:32:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/fake-document-real-access-foxit-impersonation-enables-stealth-vnc-control/</loc>
		<lastmod>2026-04-23T07:32:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/recent-microsoft-defender-vulnerability-exploited-as-zero-day/</loc>
		<lastmod>2026-04-23T08:12:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/roblox-clamps-down-on-chats-and-age-checks-as-legal-pressure-builds/</loc>
		<lastmod>2026-04-23T08:12:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/microsoft-graph-api-misused-by-new-gogra-linux-malware-for-hidden-communication/</loc>
		<lastmod>2026-04-23T08:12:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/pass-the-key-passwords-have-passed-their-sell-by-date/</loc>
		<lastmod>2026-04-23T08:12:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/xinference-pypi-breach-exposes-developers-to-cloud-credential-theft/</loc>
		<lastmod>2026-04-23T08:12:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/fake-wallpaper-app-youtube-channel-used-to-spread-notnullosx-malware/</loc>
		<lastmod>2026-04-23T08:12:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/lazarus-lures-developers-with-backdoored-coding-tests/</loc>
		<lastmod>2026-04-23T08:36:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/micron-pushes-us-lawmakers-to-restrict-china-sales/</loc>
		<lastmod>2026-04-23T08:36:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/fca-raids-london-properties-in-crypto-crackdown/</loc>
		<lastmod>2026-04-23T08:36:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/nio-hit-by-patent-claim-over-battery-swap-stations/</loc>
		<lastmod>2026-04-23T08:36:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/ncsc-backs-passkeys-hailing-a-new-era-of-sign-in/</loc>
		<lastmod>2026-04-23T09:10:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/apple-patches-ios-flaw-that-stored-deleted-signal-notifications-in-fbi-forensic-case/</loc>
		<lastmod>2026-04-23T09:10:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/gopherwhisper-apt-group-hides-command-and-control-traffic-in-slack-and-discord/</loc>
		<lastmod>2026-04-23T09:10:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/openai-tackles-a-bad-habit-people-have-when-interacting-with-ai/</loc>
		<lastmod>2026-04-23T09:10:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/apple-patches-ios-flaw-allowing-recovery-of-deleted-chats/</loc>
		<lastmod>2026-04-23T09:10:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/critical-pack2theroot-vulnerability-let-attackers-gain-root-access-or-compromise-the-system/</loc>
		<lastmod>2026-04-23T09:10:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/attackers-exploit-lmdeploy-flaw-in-the-wild-within-12-hours-of-advisory/</loc>
		<lastmod>2026-04-23T09:11:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/north-korean-fake-it-workers-infiltrate-firms-to-dodge-sanctions/</loc>
		<lastmod>2026-04-23T09:11:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/chinas-deepseek-holds-first-funding-round/</loc>
		<lastmod>2026-04-23T09:11:11+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->