<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//www.itsecuritynews.info/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://www.itsecuritynews.info/microsoft-discloses-exchange-zero-day-with-no-patch-yet-available/</loc>
		<lastmod>2026-05-18T09:32:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/chaotic-eclipse-discloses-miniplasma-zero-day-suggesting-a-missing-or-undone-2020-windows-security-fix/</loc>
		<lastmod>2026-05-18T09:33:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/hackers-abuse-cloudflare-storage-to-exfiltrate-network-files/</loc>
		<lastmod>2026-05-18T09:33:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/microsoft-acknowledges-windows-11-update-failure-linked-to-error-0x800f0922/</loc>
		<lastmod>2026-05-18T09:33:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/security-researchers-find-47-zero-days-at-pwn2own-berlin/</loc>
		<lastmod>2026-05-18T10:02:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/first-shai-hulud-worm-clones-emerge/</loc>
		<lastmod>2026-05-18T10:02:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/mozilla-warns-uk-breaking-vpns-will-not-magically-fix-britains-age-check-mess/</loc>
		<lastmod>2026-05-18T10:02:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/an-ice-firearms-trainer-was-involved-in-at-least-4-deadly-shootings/</loc>
		<lastmod>2026-05-18T10:03:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/it-security-news-hourly-summary-2026-05-18-12h-10-posts/</loc>
		<lastmod>2026-05-18T10:05:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/ncsc-publishes-guidance-on-securing-agentic-ai-use/</loc>
		<lastmod>2026-05-18T10:36:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/researcher-drops-miniplasma-windows-exploit-for-unpatched-2020-cve/</loc>
		<lastmod>2026-05-18T11:02:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/f-35-software-delays-leave-uk-buying-time-with-us-glide-bombs/</loc>
		<lastmod>2026-05-18T11:02:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/microsoft-is-changing-edges-plaintext-password-behavior/</loc>
		<lastmod>2026-05-18T11:02:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/paper-werewolf-apt-spreads-echogather-rat-via-fake-adobe-installer/</loc>
		<lastmod>2026-05-18T11:03:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/7-eleven-data-breach-confirmed-after-shinyhunters-ransom-demand/</loc>
		<lastmod>2026-05-18T11:32:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/linus-torvalds-says-ai-bug-reports-have-made-linux-security-mailing-list-unmanageable/</loc>
		<lastmod>2026-05-18T11:32:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/four-malicious-npm-packages-steal-ssh-keys-cloud-credentials-and-crypto-wallets/</loc>
		<lastmod>2026-05-18T11:32:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/zero-day-exploit-against-windows-bitlocker/</loc>
		<lastmod>2026-05-18T11:32:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/critical-nginx-vulnerability-lets-hackers-launch-remote-code-execution-attacks/</loc>
		<lastmod>2026-05-18T11:32:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/the-gentlemen-ransomware-gang-hit-by-internal-breach-operations-exposed/</loc>
		<lastmod>2026-05-18T11:32:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/how-a-government-contest-launched-a-revolution-in-ai-based-bug-hunting/</loc>
		<lastmod>2026-05-18T12:02:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/linus-torvalds-ai-bug-reports-overwhelm-linux-security-list/</loc>
		<lastmod>2026-05-18T12:02:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/grafana-labs-github-breach-code-downloaded/</loc>
		<lastmod>2026-05-18T12:02:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/microsoft-edge-fixes-plaintext-password-storage/</loc>
		<lastmod>2026-05-18T12:02:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/paper-werewolf-apt-spreads-echogather-rat/</loc>
		<lastmod>2026-05-18T12:02:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/developer-workstations-are-now-part-of-the-software-supply-chain/</loc>
		<lastmod>2026-05-18T12:02:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/ivanti-fortinet-sap-vmware-n8n-patch-rce-sql-injection-privilege-escalation-flaws/</loc>
		<lastmod>2026-05-18T12:03:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/it-threat-evolution-in-q1-2026-mobile-statistics/</loc>
		<lastmod>2026-05-18T12:03:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/it-threat-evolution-in-q1-2026-non-mobile-statistics/</loc>
		<lastmod>2026-05-18T12:03:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/gremlin-stealer-hides-payloads-in-net-resources-to-evade-detection/</loc>
		<lastmod>2026-05-18T12:03:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/pwn2own-berlin-2026-47-zero-days-1-3m-rewards/</loc>
		<lastmod>2026-05-18T12:31:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/ncsc-releases-agentic-ai-security-guidance/</loc>
		<lastmod>2026-05-18T12:32:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/claw-chain-openclaw-flaws-allow-sandbox-escape-backdoor-delivery/</loc>
		<lastmod>2026-05-18T12:32:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/poland-directs-officials-to-ditch-signal-in-favor-of-secure-state-developed-alternative/</loc>
		<lastmod>2026-05-18T12:32:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/one-in-33-employees-is-driving-nearly-a-fifth-of-all-workplace-ai-activity-and-most-companies-are-only-just-waking-up-to-it/</loc>
		<lastmod>2026-05-18T12:32:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/philippine-govt-ios-receive-cybersecurity-training/</loc>
		<lastmod>2026-05-18T13:03:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/interpol-operation-ramz-201-arrested-in-mena-cybercrime/</loc>
		<lastmod>2026-05-18T13:03:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/ai-agents-for-web-testing-security-validation/</loc>
		<lastmod>2026-05-18T13:03:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/massive-student-data-breach-at-universities/</loc>
		<lastmod>2026-05-18T13:03:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/windows-11-update-failure-error-0x800f0922/</loc>
		<lastmod>2026-05-18T13:03:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/smartbear-expands-readyapi-with-ai-powered-api-testing-capabilities/</loc>
		<lastmod>2026-05-18T13:03:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/millions-impacted-across-several-us-healthcare-data-breaches/</loc>
		<lastmod>2026-05-18T13:03:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/dify-when-your-ai-platform-becomes-the-attack-surface/</loc>
		<lastmod>2026-05-18T13:04:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/gamaredon-deploys-gammadrop-gammaload-in-phishing-campaigns/</loc>
		<lastmod>2026-05-18T13:04:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/continuous-detection-continuous-response-mate-security-redefines-the-modern-soc/</loc>
		<lastmod>2026-05-18T13:04:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/why-credential-and-session-exposure-monitoring-should-be-a-baseline-security-practice/</loc>
		<lastmod>2026-05-18T13:04:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/it-security-news-hourly-summary-2026-05-18-15h-16-posts/</loc>
		<lastmod>2026-05-18T13:05:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/the-infosecurity-europe-cyber-startup-competition-meet-the-finalists/</loc>
		<lastmod>2026-05-18T13:32:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/nginx-rift-attackers-waste-no-time-targeting-exposed-servers/</loc>
		<lastmod>2026-05-18T13:32:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/public-amazon-bucket-leaks-sensitive-guest-data-from-japanese-hotel-platform-tabiq/</loc>
		<lastmod>2026-05-18T13:32:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/hacktivists-ransomware-and-a-124-surge-across-dach/</loc>
		<lastmod>2026-05-18T13:32:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/interpol-launches-sweeping-cybercrime-crackdown-in-mena-region/</loc>
		<lastmod>2026-05-18T14:02:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/how-to-reduce-phishing-exposure-before-it-turns-into-business-disruption/</loc>
		<lastmod>2026-05-18T14:02:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/attackers-are-exploiting-critical-nginx-vulnerability-cve-2026-42945/</loc>
		<lastmod>2026-05-18T14:03:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/open-source-tool-maker-grafana-labs-says-hackers-stole-its-code-refuses-to-pay-ransom/</loc>
		<lastmod>2026-05-18T14:03:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/soc-vs-mdr-what-cisos-need-to-consider/</loc>
		<lastmod>2026-05-18T14:03:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/government-backed-hackers-abuse-cloudflare-in-malaysian-espionage-campaign/</loc>
		<lastmod>2026-05-18T14:03:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/cyber-briefing-2026-05-16/</loc>
		<lastmod>2026-05-18T14:32:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/tanstack-weighs-invitation-only-pull-requests-after-supply-chain-attack/</loc>
		<lastmod>2026-05-18T14:32:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/cyber-attackers-bypass-traditional-defences-as-user-driven-attacks-surge-bridewell-warns/</loc>
		<lastmod>2026-05-18T14:32:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/shinyhunters-hack-7-eleven-franchisee-data-and-salesforce-records-exposed/</loc>
		<lastmod>2026-05-18T14:32:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/10-tips-for-phrasing-employee-feedback-in-reviews/</loc>
		<lastmod>2026-05-18T15:02:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/grafana-labs-says-hacker-gained-access-to-codebase-through-leaked-token/</loc>
		<lastmod>2026-05-18T15:32:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/%e2%9a%a1-weekly-recap-exchange-0-day-npm-worm-fake-ai-repo-cisco-exploit-and-more/</loc>
		<lastmod>2026-05-18T15:32:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/canadian-privacy-regulators-say-openai-violated-federal-and-provincial-privacy-laws/</loc>
		<lastmod>2026-05-18T15:32:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/delivery-label-scam-how-amazon-flipkart-boxes-can-steal-your-data/</loc>
		<lastmod>2026-05-18T15:32:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/4-key-areas-in-2026-for-organisation-safety-against-advanced-ai-threats/</loc>
		<lastmod>2026-05-18T15:32:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/trojanized-daemon-tools-used-to-deploy-persistent-backdoor-malware/</loc>
		<lastmod>2026-05-18T15:33:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/what-if-your-digital-footprint-could-shrink-2/</loc>
		<lastmod>2026-05-18T16:02:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/it-security-news-hourly-summary-2026-05-18-18h-7-posts/</loc>
		<lastmod>2026-05-18T16:05:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/linux-kernel-flaw-opens-root-only-files-to-unprivileged-users/</loc>
		<lastmod>2026-05-18T16:31:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/critical-n8n-vulnerabilities-expose-automation-nodes-to-full-rce/</loc>
		<lastmod>2026-05-18T16:32:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/agentic-governance-why-it-matters-now/</loc>
		<lastmod>2026-05-18T16:32:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/nyc-health-and-hospitals-says-hackers-stole-medical-data-and-fingerprints-during-breach-affecting-at-least-1-8-million-people/</loc>
		<lastmod>2026-05-18T17:02:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/bridging-gaps-in-soc-maturity-using-detection-engineering-and-automation/</loc>
		<lastmod>2026-05-18T17:02:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/game-over-for-74-suspected-scammers-after-dutch-cops-plastered-their-faces-on-billboards/</loc>
		<lastmod>2026-05-18T17:32:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/how-to-better-protect-your-growing-business-in-an-ai-powered-world/</loc>
		<lastmod>2026-05-18T17:32:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/secure-fast-reliable-the-best-cloud-storage-providers-for-businesses-in-2026/</loc>
		<lastmod>2026-05-18T17:32:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/the-6-best-enterprise-password-managers-youll-actually-trust-in-2026/</loc>
		<lastmod>2026-05-18T17:32:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/interpol-operation-ramz-disrupts-mena-cybercrime-networks-with-201-arrests/</loc>
		<lastmod>2026-05-18T18:02:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/ai-is-drowning-software-maintainers-in-junk-security-reports/</loc>
		<lastmod>2026-05-18T18:02:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/hackers-actively-exploiting-critical-nginx-rce-vulnerability-in-the-wild/</loc>
		<lastmod>2026-05-18T18:02:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/device-code-phishing-targets-microsoft-365-users/</loc>
		<lastmod>2026-05-18T18:02:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/apples-siri-revamp-may-add-auto-deleting-chats/</loc>
		<lastmod>2026-05-18T18:02:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/banned-nvidia-ai-chips-keep-reaching-china-despite-us-crackdown/</loc>
		<lastmod>2026-05-18T18:02:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/new-reaper-malware-uses-fake-microsoft-domain-to-steal-macos-passwords/</loc>
		<lastmod>2026-05-18T18:03:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/grafana-confirms-github-token-breach-cybercrime-group-claims-the-attack/</loc>
		<lastmod>2026-05-18T19:32:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/nyc-health-hospitals-says-hackers-stole-medical-data-and-fingerprints-during-breach-affecting-at-least-1-8-million-people/</loc>
		<lastmod>2026-05-18T19:32:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/openclaw-vulnerabilities-could-enable-full-ai-agent-takeover/</loc>
		<lastmod>2026-05-18T20:02:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/vulnerability-summary-for-the-week-of-may-11-2026/</loc>
		<lastmod>2026-05-18T20:32:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/10-top-osint-tools-every-investigator-should-know-in-2026/</loc>
		<lastmod>2026-05-18T20:32:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/cve-2026-42945-mitigating-a-critical-heap-buffer-overflow-vulnerability-in-nginx/</loc>
		<lastmod>2026-05-18T20:32:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/teampcp-supply-chain-campaign-activity-through-2026-05-17-mon-may-18th/</loc>
		<lastmod>2026-05-18T20:32:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/cisa-admin-leaked-aws-govcloud-keys-on-github/</loc>
		<lastmod>2026-05-18T21:04:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/securing-everything-mapping-the-right-identity-and-access-protocol-oidc-oauth2-and-saml-to-the-right-identity/</loc>
		<lastmod>2026-05-18T21:04:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/it-security-news-daily-summary-2026-05-18/</loc>
		<lastmod>2026-05-18T21:55:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/addi-34532941-breached-accounts/</loc>
		<lastmod>2026-05-18T22:03:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/it-security-news-hourly-summary-2026-05-19-00h-2-posts/</loc>
		<lastmod>2026-05-18T22:05:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/shai-hulud-copycat-worm-infects-yet-another-npm-package/</loc>
		<lastmod>2026-05-18T22:32:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/how-storm-2949-turned-a-compromised-identity-into-a-cloud-wide-breach/</loc>
		<lastmod>2026-05-18T23:31:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/do-fear-the-reaper-stealer-swipes-macos-users-passwords-wallets-then-backdoors-them/</loc>
		<lastmod>2026-05-19T00:02:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/are-attackers-hiding-inside-your-network-traffic/</loc>
		<lastmod>2026-05-19T00:02:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/ctt-468124-breached-accounts/</loc>
		<lastmod>2026-05-19T01:32:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/isc-stormcast-for-tuesday-may-19th-2026-https-isc-sans-edu-podcastdetail-9936-tue-may-19th/</loc>
		<lastmod>2026-05-19T02:02:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/exchange-zero-day-under-attack-ransomware-gets-smarter-fortinet-critical-flaws/</loc>
		<lastmod>2026-05-19T04:32:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/cybersecurity-jobs-available-right-now-may-19-2026/</loc>
		<lastmod>2026-05-19T04:32:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/mythos-preview-builds-poc-exploits-in-automated-vulnerability-research/</loc>
		<lastmod>2026-05-19T04:32:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/ai-infrastructure-is-cracking-under-sovereignty-demands/</loc>
		<lastmod>2026-05-19T05:02:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/github-actions-supply-chain-attack-redirects-tags-to-steal-ci-cd-credentials/</loc>
		<lastmod>2026-05-19T05:31:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/mini-shai-hulud-pushes-malicious-antv-npm-packages-via-compromised-maintainer-account/</loc>
		<lastmod>2026-05-19T05:32:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/earbud-sensors-can-authenticate-users-by-their-heartbeat-study-finds/</loc>
		<lastmod>2026-05-19T05:32:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/seppmail-gateway-flaws-expose-organizations-to-rce-and-email-traffic-interception/</loc>
		<lastmod>2026-05-19T05:32:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/mythos-preview-automates-poc-exploit-creation-for-vulnerability-research/</loc>
		<lastmod>2026-05-19T05:32:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/compromised-nx-console-vs-code-extension-steals-developer-and-cloud-secrets/</loc>
		<lastmod>2026-05-19T05:32:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/public-instagram-posts-provide-raw-material-for-ai-phishing-campaigns/</loc>
		<lastmod>2026-05-19T06:02:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/cisa-admin-reportedly-exposes-aws-govcloud-credentials-in-public-github-repository/</loc>
		<lastmod>2026-05-19T06:02:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/microsoft-to-retire-teams-together-mode-to-improve-performance/</loc>
		<lastmod>2026-05-19T06:02:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/critical-vulnerability-exposes-industrial-robot-fleets-to-hacking/</loc>
		<lastmod>2026-05-19T06:32:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/mini-shai-hulud-attack-hits-antv-npm-packages/</loc>
		<lastmod>2026-05-19T06:32:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/popular-github-action-tags-redirected-to-imposter-commit-to-steal-ci-cd-credentials/</loc>
		<lastmod>2026-05-19T07:02:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/compromised-github-action-steals-workflow-credentials/</loc>
		<lastmod>2026-05-19T07:02:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/it-security-news-hourly-summary-2026-05-19-09h-4-posts/</loc>
		<lastmod>2026-05-19T07:05:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/linus-torvalds-talks-ai-bug-hunters-7-eleven-ransom-demand-menas-new-cybercrime-op/</loc>
		<lastmod>2026-05-19T07:32:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/egnyte-unveils-email-capture-and-ai-features-to-unify-fragmented-data/</loc>
		<lastmod>2026-05-19T07:32:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/hackers-abuse-microsoft-entra-id-accounts-to-exfiltrate-microsoft-365-and-azure-data/</loc>
		<lastmod>2026-05-19T07:32:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/javascript-malware-campaign-drops-crypto-clipper-via-powershell/</loc>
		<lastmod>2026-05-19T07:32:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/youtube-expands-ai-likeness-detection-to-all-creators-aged-18-and-over/</loc>
		<lastmod>2026-05-19T08:02:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/babel-street-targets-ai-driven-threats-with-new-agentic-investigation-capabilities/</loc>
		<lastmod>2026-05-19T08:02:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/iproov-brings-identity-verification-to-video-meetings-to-reduce-fraud-risks/</loc>
		<lastmod>2026-05-19T08:02:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/hackers-exploit-entra-id-accounts-to-steal-microsoft-365-azure-data/</loc>
		<lastmod>2026-05-19T08:02:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/students-boo-former-google-chief-schmidt-over-ai-remarks/</loc>
		<lastmod>2026-05-19T08:02:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/jurors-dismiss-musks-openai-lawsuit/</loc>
		<lastmod>2026-05-19T08:03:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/jlr-profit-drops-99-percent-after-cyber-attack/</loc>
		<lastmod>2026-05-19T08:03:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/hackers-bypass-security-tools-to-target-users-directly/</loc>
		<lastmod>2026-05-19T08:32:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/compromised-nx-console-18-95-0-targeted-vs-code-developers-with-credential-stealer/</loc>
		<lastmod>2026-05-19T08:32:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/shai-hulud-worm-copycats-emerge-after-source-code-leak/</loc>
		<lastmod>2026-05-19T08:32:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/waymo-cars-flood-quiet-atlanta-cul-de-sac/</loc>
		<lastmod>2026-05-19T08:32:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/cisa-admin-exposes-aws-govcloud-credentials-on-public-github-repository/</loc>
		<lastmod>2026-05-19T09:02:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/four-faith-industrial-routers-targeted-in-botnet-hijacking-campaign/</loc>
		<lastmod>2026-05-19T09:02:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/postgresql-flaws-expose-databases-to-remote-code-execution-and-sql-injection/</loc>
		<lastmod>2026-05-19T09:02:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/uk-govt-saves-millions-by-ending-palantir-contract/</loc>
		<lastmod>2026-05-19T09:02:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/grafana-labs-confirms-hackers-stole-source-code/</loc>
		<lastmod>2026-05-19T09:32:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/how-em-is-boosting-the-career-trajectory-of-vm-analysts/</loc>
		<lastmod>2026-05-19T09:32:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/ncsc-warns-organisations-not-to-rush-into-agentic-ai/</loc>
		<lastmod>2026-05-19T09:32:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/7-eleven-notifies-franchise-applicants-after-breach-exposes-personal-data/</loc>
		<lastmod>2026-05-19T09:32:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/poland-shifts-away-from-signal-following-cyberattacks-on-officials-accounts/</loc>
		<lastmod>2026-05-19T09:32:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/massive-mena-cybercrime-operation-ramz-disrupts-infrastructure-and-arrests-201-suspects/</loc>
		<lastmod>2026-05-19T09:32:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/kimsuky-uses-lnk-jse-lures-to-target-recruiters-crypto-users-defense-officials/</loc>
		<lastmod>2026-05-19T09:32:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/20-year-old-postgresql-flaw-gets-public-poc-exploit-for-remote-code-execution/</loc>
		<lastmod>2026-05-19T09:32:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/bank-says-ev-expansion-faces-infrastructure-insurance-barriers/</loc>
		<lastmod>2026-05-19T09:32:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/poc-released-for-dirtydecrypt-linux-kernel-vulnerability/</loc>
		<lastmod>2026-05-19T10:02:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/hackers-compromise-antv-packages-in-mini-shai-hulud-npm-attack-wave/</loc>
		<lastmod>2026-05-19T10:02:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/how-to-make-apps-and-websites-remove-your-nonconsensual-nudes/</loc>
		<lastmod>2026-05-19T10:02:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/gentlemen-ransomware-targets-windows-linux-nas-bsd-and-esxi-systems/</loc>
		<lastmod>2026-05-19T10:02:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/ai-generated-bug-submissions-create-carnage/</loc>
		<lastmod>2026-05-19T10:02:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/from-pdb-strings-to-maas-tracking-a-commodity-badiis-ecosystem-used-by-chinese-speaking-threat/</loc>
		<lastmod>2026-05-19T10:02:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/it-security-news-hourly-summary-2026-05-19-12h-15-posts/</loc>
		<lastmod>2026-05-19T10:05:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/seppmail-secure-e-mail-gateway-vulnerabilities-enable-rce-and-mail-traffic-access/</loc>
		<lastmod>2026-05-19T10:32:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/how-em-is-boosting-the-career-trajectory-of-vm-analysts-2/</loc>
		<lastmod>2026-05-19T10:32:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/hackers-actively-exploit-nginx-rift-vulnerability-affecting-nginx-f5-products/</loc>
		<lastmod>2026-05-19T10:32:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/201-arrested-in-crackdown-on-cybercrime-in-middle-east-north-africa/</loc>
		<lastmod>2026-05-19T11:02:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/laurie-anderson-is-quoting-me/</loc>
		<lastmod>2026-05-19T11:02:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/shinyhunters-takes-responsibility-for-attack-on-learning-management-platform/</loc>
		<lastmod>2026-05-19T11:02:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/hosting-service-standards-that-define-high-performing-agencies/</loc>
		<lastmod>2026-05-19T11:02:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/cyber-resilience-is-the-new-business-continuity-plan/</loc>
		<lastmod>2026-05-19T11:31:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/youtube-wants-your-face-to-fight-deepfakes/</loc>
		<lastmod>2026-05-19T11:32:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/macos-malware-abuses-fake-google-update-for-persistence/</loc>
		<lastmod>2026-05-19T11:32:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/operation-ramz-dismantles-53-servers-used-in-scam-and-malware-campaigns/</loc>
		<lastmod>2026-05-19T11:32:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/microsoft-edge-enhances-security-by-preventing-password-loading-at-startup/</loc>
		<lastmod>2026-05-19T11:32:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/agentic-ai-accelerates-software-builds-and-mobile-app-attacks/</loc>
		<lastmod>2026-05-19T12:03:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/b1acks-stash-marketplace-gives-away-4-6-million-stolen-credit-cards/</loc>
		<lastmod>2026-05-19T12:03:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/microsoft-to-retire-teams-together-mode-to-enhance-performance-improvements/</loc>
		<lastmod>2026-05-19T12:03:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/critical-marimo-security-vulnerability-enables-remote-code-execution-attacks/</loc>
		<lastmod>2026-05-19T12:03:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/critical-seppmail-gateway-flaws-allow-remote-code-execution-and-mail-traffic-theft/</loc>
		<lastmod>2026-05-19T12:03:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/ai-raises-the-bar-on-vulnerability-awareness-and-secure-by-design-software/</loc>
		<lastmod>2026-05-19T12:31:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/the-end-of-unencrypted-discord-calls-is-here/</loc>
		<lastmod>2026-05-19T12:32:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/crypto-at-risk-experts-believe-quantum-threat-arriving-by-2030/</loc>
		<lastmod>2026-05-19T12:32:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/github-token-exposure-at-grafana-triggered-codebase-theft-incident/</loc>
		<lastmod>2026-05-19T12:32:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/the-new-phishing-click-how-oauth-consent-bypasses-mfa/</loc>
		<lastmod>2026-05-19T13:02:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/drupal-to-release-urgent-core-security-updates-on-may-20-sites-told-to-prepare/</loc>
		<lastmod>2026-05-19T13:02:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/launchdarkly-adds-real-time-controls-for-ai-agents-in-production/</loc>
		<lastmod>2026-05-19T13:02:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/canonical-ships-ubuntu-core-26-with-15-years-of-security-maintenance/</loc>
		<lastmod>2026-05-19T13:03:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/new-macos-infostealer-impersonates-apple-microsoft-and-google-in-a-single-attack-chain/</loc>
		<lastmod>2026-05-19T13:03:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/legacy-windows-tool-mshta-fuels-surge-in-silent-malware-attacks/</loc>
		<lastmod>2026-05-19T13:03:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/unpatched-chromadb-vulnerability-can-lead-to-server-takeover/</loc>
		<lastmod>2026-05-19T13:03:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/zero-day-microsoft-exchange-servers-on-target-cve-2026-42897/</loc>
		<lastmod>2026-05-19T13:03:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/voidstealer-malware-targets-chrome-data-despite-built-in-browser-protections/</loc>
		<lastmod>2026-05-19T13:03:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/uac-0184-uses-bitsadmin-and-hta-files-to-deliver-gated-malware/</loc>
		<lastmod>2026-05-19T13:03:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/two-thirds-of-nonhuman-accounts-are-unseen-and-unmanaged-according-to-orchid-securitys-identity-gap-report/</loc>
		<lastmod>2026-05-19T13:03:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/inside-shadow-water-063s-banana-rat-from-build-server-to-banking-fraud/</loc>
		<lastmod>2026-05-19T13:04:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/it-security-news-hourly-summary-2026-05-19-15h-16-posts/</loc>
		<lastmod>2026-05-19T13:05:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/purelogs-infostealer-is-stealing-credentials-worldwide/</loc>
		<lastmod>2026-05-19T13:31:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/selector-extends-ai-driven-observability-into-multi-cloud-environments/</loc>
		<lastmod>2026-05-19T13:32:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/facebook-scam-promises-cheap-aldi-meat-boxes-steals-payment-info-instead/</loc>
		<lastmod>2026-05-19T13:32:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/new-voidstealer-malware-bypasses-chromes-app-bound-encryption-to-steal-passwords-and-cookies/</loc>
		<lastmod>2026-05-19T13:32:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/nx-console-vs-code-extension-compromised-to-steal-developer-and-cloud-secrets/</loc>
		<lastmod>2026-05-19T13:32:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/the-network-security-problem-no-one-could-solve-until-now/</loc>
		<lastmod>2026-05-19T13:32:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/criminal-ip-returns-to-infosecurity-europe-2026-with-advanced-ai-driven-ti-asm/</loc>
		<lastmod>2026-05-19T14:02:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/cyber-briefing-2026-05-19/</loc>
		<lastmod>2026-05-19T14:31:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/check-point-wants-ai-agents-to-do-what-security-teams-cant-manage-networks-at-machine-speed/</loc>
		<lastmod>2026-05-19T14:32:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/you-can-get-some-of-your-nudes-removed-from-the-internet-under-a-new-law/</loc>
		<lastmod>2026-05-19T14:32:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/telecom-sector-launches-its-own-private-isac/</loc>
		<lastmod>2026-05-19T15:02:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/microsoft-takes-down-fox-tempest-for-providing-ransomware-enabling-signing-tool/</loc>
		<lastmod>2026-05-19T15:02:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/dirtydecrypt-poc-released-for-linux-kernel-cve-2026-31635-lpe-vulnerability/</loc>
		<lastmod>2026-05-19T15:02:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/attackers-use-cloudflare-storage-endpoint-to-exfiltrate-files-from-compromised-networks/</loc>
		<lastmod>2026-05-19T15:02:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/new-voidstealer-malware-bypasses-chromes-protection-to-steal-user-data/</loc>
		<lastmod>2026-05-19T15:02:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/securing-the-ai-supply-chain-in-the-european-union/</loc>
		<lastmod>2026-05-19T15:02:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/fake-claude-ai-site-spreads-new-beagle-windows-backdoor-heres-how-to-stay-safe/</loc>
		<lastmod>2026-05-19T15:32:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/meta-challenges-ofcom-over-online-safety-act-fees-and-penalties/</loc>
		<lastmod>2026-05-19T15:32:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/compromised-github-action-exfiltrates-workflow-credentials-to-attacker-domain/</loc>
		<lastmod>2026-05-19T15:32:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/critical-apache-flink-vulnerability-enables-remote-code-execution-attacks/</loc>
		<lastmod>2026-05-19T15:32:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/microsoft-edge-stops-loading-saved-passwords-into-memory-at-startup/</loc>
		<lastmod>2026-05-19T15:32:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/us-cyber-agency-cisa-exposed-reams-of-passwords-and-cloud-keys-to-the-open-web/</loc>
		<lastmod>2026-05-19T15:32:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/exposing-fox-tempest-a-malware-signing-service-operation/</loc>
		<lastmod>2026-05-19T16:02:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/clear-your-calendar-drupal-user-you-have-a-critically-urgent-patch-to-install/</loc>
		<lastmod>2026-05-19T16:02:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/hackers-have-compromised-dozens-of-popular-open-source-packages-in-an-ongoing-supply-chain-attack/</loc>
		<lastmod>2026-05-19T16:02:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/pwn2own-berlin-2026-closes-with-1-3-million-in-zero-day-payouts/</loc>
		<lastmod>2026-05-19T16:02:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/tp-link-photoshop-openvpn-norton-vpn-vulnerabilities/</loc>
		<lastmod>2026-05-19T16:02:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/it-security-news-hourly-summary-2026-05-19-18h-11-posts/</loc>
		<lastmod>2026-05-19T16:05:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/governing-infrastructure-as-code-using-pattern-based-policy-as-code/</loc>
		<lastmod>2026-05-19T16:31:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/drupal-to-patch-highly-critical-vulnerability-at-risk-of-quick-exploitation/</loc>
		<lastmod>2026-05-19T16:31:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/microsoft-disrupts-malware-signing-service-run-by-fox-tempest/</loc>
		<lastmod>2026-05-19T16:32:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/biometrics-diagnoses-and-bank-details-exposed-in-major-healthcare-breach/</loc>
		<lastmod>2026-05-19T16:32:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/critical-postgresql-vulnerabilities-enables-code-execution-and-sql-injections/</loc>
		<lastmod>2026-05-19T16:32:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/kieback-peter-ddc-building-controllers/</loc>
		<lastmod>2026-05-19T16:32:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/siemens-ruggedcom-ape1808-devices-3/</loc>
		<lastmod>2026-05-19T16:32:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/abb-coresense-hm-and-coresense-m10/</loc>
		<lastmod>2026-05-19T16:32:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/scadabr/</loc>
		<lastmod>2026-05-19T16:32:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/zkteco-cctv-cameras/</loc>
		<lastmod>2026-05-19T16:32:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/why-commercial-cyber-threat-intelligence-is-failing-defence-operations/</loc>
		<lastmod>2026-05-19T17:02:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/how-parts-inventory-management-software-fixes-inventory-challenges/</loc>
		<lastmod>2026-05-19T17:02:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/trapdoor-android-ad-fraud-scheme-hit-659-million-daily-bid-requests-using-455-apps/</loc>
		<lastmod>2026-05-19T17:31:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/cyber-agony-aunts-new-book-offers-practical-look-at-resilience/</loc>
		<lastmod>2026-05-19T17:32:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/the-invisible-workforce-why-your-household-apps-now-have-their-own-digital-ids/</loc>
		<lastmod>2026-05-19T17:32:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/americas-top-cyber-defense-agency-left-a-github-repo-open-with-with-passwords-keys-tokens-and-incredibly-obvious-filenames/</loc>
		<lastmod>2026-05-19T18:02:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/microsoft-confirms-windows-update-bug-blocking-security-fixes/</loc>
		<lastmod>2026-05-19T18:02:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/advancedhealth-ransomware-claim-includes-2-3m-patient-data-lines/</loc>
		<lastmod>2026-05-19T18:02:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/grafana-rejects-ransom-demand-after-github-breach-exposes-codebase-theft/</loc>
		<lastmod>2026-05-19T18:02:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/malware-campaign-uses-javascript-powershell-and-shellcode-to-deliver-crypto-clipper/</loc>
		<lastmod>2026-05-19T18:32:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/dirtydecrypt-linux-kernel-vulnerability-poc-exploit-code-released/</loc>
		<lastmod>2026-05-19T18:32:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/3-tactics-elite-socs-use-to-operationalize-threat-intelligence/</loc>
		<lastmod>2026-05-19T18:32:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/operation-ramz-seizes-53-servers-linked-to-cyber-scams-and-malware-threats/</loc>
		<lastmod>2026-05-19T18:32:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/microsoft-dismantled-malware-signing-network-fox-tempest/</loc>
		<lastmod>2026-05-19T18:32:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/it-security-news-hourly-summary-2026-05-19-21h-5-posts/</loc>
		<lastmod>2026-05-19T19:05:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/kimsuky-hackers-use-lnk-and-jse-lures-to-target-recruiters-crypto-users-and-defense-officials/</loc>
		<lastmod>2026-05-19T19:34:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/offsec-launches-instructor-led-live-training-for-enterprise-security-teams/</loc>
		<lastmod>2026-05-19T20:02:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/cisa-github-leak-exposes-aws-govcloud-secrets/</loc>
		<lastmod>2026-05-19T20:02:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/drupal-is-rolling-out-an-emergency-security-update-on-may-20-you-cannot-miss-it/</loc>
		<lastmod>2026-05-19T20:32:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/hackers-have-compromised-dozens-of-popular-open-source-packages-in-an-ongoing-supply-chain-attack-2/</loc>
		<lastmod>2026-05-19T21:02:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/the-gentlemen-ransomware-attacks-windows-linux-nas-bsd-and-esxi-attacks/</loc>
		<lastmod>2026-05-19T21:34:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/discord-enables-end-to-end-encrypted-voice-and-video-calling-for-every-user/</loc>
		<lastmod>2026-05-19T21:34:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/from-teen-hacker-to-iron-dome-researcher-this-founder-raised-28m-to-fight-ai-phishing/</loc>
		<lastmod>2026-05-19T21:34:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/ai-agent-security-automating-workflow-without-creating-prompt-injection-or-data-leak-risks/</loc>
		<lastmod>2026-05-19T21:34:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/it-security-news-daily-summary-2026-05-19/</loc>
		<lastmod>2026-05-19T21:55:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/cirt-insights-how-to-help-prevent-unauthorized-account-removals-from-aws-organizations/</loc>
		<lastmod>2026-05-19T22:04:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/microsoft-shuts-down-illegal-code-signing-operation-used-by-ransomware-crims-to-mask-their-malware/</loc>
		<lastmod>2026-05-19T22:04:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/it-security-news-hourly-summary-2026-05-20-00h-7-posts/</loc>
		<lastmod>2026-05-19T22:05:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/uac-0184-malware-chain-uses-bitsadmin-and-hta-files-for-gated-payload-delivery/</loc>
		<lastmod>2026-05-19T22:31:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/macos-malware-installs-fake-google-software-update-launchagent-for-persistence/</loc>
		<lastmod>2026-05-19T22:32:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/verizon-dbir-2026-vulnerability-exploitation-overtakes-credential-theft-as-top-breach-vector/</loc>
		<lastmod>2026-05-20T00:31:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/it-security-news-hourly-summary-2026-05-20-03h-1-posts/</loc>
		<lastmod>2026-05-20T01:05:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/isc-stormcast-for-wednesday-may-20th-2026-https-isc-sans-edu-podcastdetail-9938-wed-may-20th/</loc>
		<lastmod>2026-05-20T02:31:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/github-source-code-breach-teampcp-claims-access-to-internal-source-code/</loc>
		<lastmod>2026-05-20T03:32:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/it-security-news-hourly-summary-2026-05-20-06h-1-posts/</loc>
		<lastmod>2026-05-20T04:05:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/windows-11-bitlocker-zero-day-teampcp-malware-leak-iran-gas-station-hacks-cybersecurity-today/</loc>
		<lastmod>2026-05-20T04:32:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/github-investigating-teampcp-claimed-breach-of-4000-internal-repositories/</loc>
		<lastmod>2026-05-20T04:32:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/shinyhunters-claims-credit-for-cyber-attack-on-online-learning-management-system/</loc>
		<lastmod>2026-05-20T04:32:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/what-happens-when-your-identity-provider-becomes-the-kill-chain/</loc>
		<lastmod>2026-05-20T05:02:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/what-cisos-need-to-know-about-ai-audit-logs/</loc>
		<lastmod>2026-05-20T05:02:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/7-hard-truths-security-pros-should-know-2026-devops-threats-report/</loc>
		<lastmod>2026-05-20T05:32:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/ivanti-patches-new-epmm-vulnerability-linked-to-active-zero-day-exploitation/</loc>
		<lastmod>2026-05-20T05:32:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/whatsapp-encryption-comes-under-spotlight-following-federal-allegations/</loc>
		<lastmod>2026-05-20T05:32:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/github-source-code-reportedly-compromised-teampcp-claims-breach/</loc>
		<lastmod>2026-05-20T05:32:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/grafana-github-breach-exposes-source-code-via-tanstack-npm-attack/</loc>
		<lastmod>2026-05-20T06:02:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/when-your-ai-assistant-has-the-keys-to-production/</loc>
		<lastmod>2026-05-20T06:02:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/github-hacked-internal-source-code-repositories-compromised-via-employee-device/</loc>
		<lastmod>2026-05-20T06:02:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/poc-exploit-released-for-20-year-old-postgresql-rce-vulnerability/</loc>
		<lastmod>2026-05-20T06:02:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/poc-exploit-released-for-dirtydecrypt-linux-kernel-vulnerability/</loc>
		<lastmod>2026-05-20T06:02:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/hackers-exploit-mshta-to-deploy-lummastealer-and-amatera-malware/</loc>
		<lastmod>2026-05-20T06:02:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/cve-lite-cli-open-source-dependency-vulnerability-scanner/</loc>
		<lastmod>2026-05-20T06:32:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/alleged-huawei-zero-day-blamed-for-the-2025-luxembourg-telecom-crash/</loc>
		<lastmod>2026-05-20T06:32:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/freepbx-security-flaw-lets-attackers-access-user-portals/</loc>
		<lastmod>2026-05-20T06:32:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/devilnfc-malware-traps-android-users-in-nfc-relay-attacks/</loc>
		<lastmod>2026-05-20T06:32:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/mini-shai-hulud-attack-hits-npm-ecosystem-compromising-over-600-packages/</loc>
		<lastmod>2026-05-20T06:32:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/single-letter-go-module-typosquat-drops-dns-based-backdoor/</loc>
		<lastmod>2026-05-20T06:32:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/communicating-cyber-risk-in-dollars-boards-understand/</loc>
		<lastmod>2026-05-20T07:02:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/the-quest-for-greater-tech-independence/</loc>
		<lastmod>2026-05-20T07:02:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/new-nginx-vulnerability-exposes-servers-to-malicious-code-execution/</loc>
		<lastmod>2026-05-20T07:02:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/trapdoor-android-ad-fraud-ring-abuses-455-apps-for-fake-clicks/</loc>
		<lastmod>2026-05-20T07:02:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/it-security-news-hourly-summary-2026-05-20-09h-10-posts/</loc>
		<lastmod>2026-05-20T07:05:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/microsoft-hits-fox-tempest-robotics-os-flaw-cisa-admins-leaks-keys/</loc>
		<lastmod>2026-05-20T07:31:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/breaking-teampcp-hacks-4000-github-repos-and-compromised-tanstack-npm/</loc>
		<lastmod>2026-05-20T07:32:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/chinas-moonshot-ai-to-unwind-offshore-structure/</loc>
		<lastmod>2026-05-20T07:32:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/cambridge-university-satellite-ai-model-protects-hedgehogs/</loc>
		<lastmod>2026-05-20T07:32:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/void-botnet-leverages-ethereum-for-resilient-c2/</loc>
		<lastmod>2026-05-20T08:02:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/google-samsung-show-upcoming-ai-glasses/</loc>
		<lastmod>2026-05-20T08:02:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/fintech-and-agentic-commerce-when-ai-becomes-the-customer/</loc>
		<lastmod>2026-05-20T08:02:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/is-the-uk-ready-for-a-state-backed-cyberwar/</loc>
		<lastmod>2026-05-20T08:02:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/fox-tempest-malware-signing-service-abused-microsoft-artifact-signing-to-certify-malware/</loc>
		<lastmod>2026-05-20T08:34:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/dirtydecrypt-poc-released-for-yet-another-linux-flaw/</loc>
		<lastmod>2026-05-20T08:34:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/meta-offers-limited-free-ai-access-to-whatsapp/</loc>
		<lastmod>2026-05-20T08:34:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/discord-enables-end-to-end-encryption-by-default-for-all-voice-and-video-calls/</loc>
		<lastmod>2026-05-20T09:02:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/verizon-dbir-vulnerability-exploits-overtake-credentials-as-top-access-vector/</loc>
		<lastmod>2026-05-20T09:02:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/microsoft-provides-mitigation-for-yellowkey-bitlocker-bypass-flaw-cve-2026-45585/</loc>
		<lastmod>2026-05-20T09:02:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/pardus-linux-vulnerability-lets-local-attackers-gain-silent-root-access/</loc>
		<lastmod>2026-05-20T09:02:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/mistral-buys-austrias-emmi-ai-for-industrial-tech/</loc>
		<lastmod>2026-05-20T09:02:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/encryption-consulting-launches-certsecure-manager-v3-3-with-zero-touch-certificate-renewals/</loc>
		<lastmod>2026-05-20T09:32:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/darwinium-updates-mobile-sdks-to-detect-remote-access-scam-activity/</loc>
		<lastmod>2026-05-20T09:32:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/github-confirms-hack-impacting-3800-internal-repositories/</loc>
		<lastmod>2026-05-20T09:32:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/how-an-image-could-compromise-your-mac-understanding-an-exiftool-vulnerability-cve-2026-3102/</loc>
		<lastmod>2026-05-20T09:32:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/a-malicious-vs-code-extension-just-breached-github-s-internal-repositories/</loc>
		<lastmod>2026-05-20T09:32:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/data-brokers-and-ai-firms-opt-out-forms-are-built-to-fail-report-finds/</loc>
		<lastmod>2026-05-20T09:32:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/banana-rat-malware-in-fake-invoices-hits-customers-at-16-brazilian-banks/</loc>
		<lastmod>2026-05-20T09:32:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/google-hires-contextual-ai-researchers-chief-executive/</loc>
		<lastmod>2026-05-20T09:32:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/researchers-warn-cypherloc-scareware-has-targeted-millions-of-users/</loc>
		<lastmod>2026-05-20T10:02:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/microsoft-releases-mitigation-for-yellowkey-bitlocker-bypass-cve-2026-45585-exploit/</loc>
		<lastmod>2026-05-20T10:02:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/virtual-event-today-threat-detection-incident-response-summit/</loc>
		<lastmod>2026-05-20T10:02:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/londons-police-asked-big-tech-for-comms-data-over-700000-times-last-year/</loc>
		<lastmod>2026-05-20T10:02:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/microsoft-releases-mitigation-for-windows-bitlocker-security-bypass-0-day-vulnerability/</loc>
		<lastmod>2026-05-20T10:02:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/new-nginx-vulnerability-allow-remote-attackers-to-trigger-malicious-code/</loc>
		<lastmod>2026-05-20T10:02:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/microsoft-set-to-bring-biggest-india-data-centre-online/</loc>
		<lastmod>2026-05-20T10:02:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/tracking-tamperedchef-clusters-via-certificate-and-code-reuse/</loc>
		<lastmod>2026-05-20T10:02:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/it-security-news-hourly-summary-2026-05-20-12h-16-posts/</loc>
		<lastmod>2026-05-20T10:05:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/real-world-ics-security-tales-from-the-trenches/</loc>
		<lastmod>2026-05-20T10:34:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/github-says-internal-repos-exfiltrated-after-poisoned-vs-code-extension-attack/</loc>
		<lastmod>2026-05-20T10:34:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/certes-research-warns-legacy-systems-are-biggest-barrier-to-quantum-security-readiness/</loc>
		<lastmod>2026-05-20T10:34:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/this-is-a-hold-up-financial-services-under-attack/</loc>
		<lastmod>2026-05-20T10:34:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/github-confirms-breach-of-internal-repositories-via-malicious-vs-code-extension/</loc>
		<lastmod>2026-05-20T11:05:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/typosquatting-is-no-longer-a-user-problem-its-a-supply-chain-problem/</loc>
		<lastmod>2026-05-20T11:05:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/teampcp-breached-githubs-internal-codebase-via-poisoned-vs-code-extension/</loc>
		<lastmod>2026-05-20T11:05:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/trust3-ai-focuses-on-ai-agent-risks-with-mcp-security-layer/</loc>
		<lastmod>2026-05-20T11:05:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/caught-off-guard-securing-ai-after-it-hits-production/</loc>
		<lastmod>2026-05-20T11:05:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/fake-tax-assessment-pages-spread-windows-malware/</loc>
		<lastmod>2026-05-20T11:05:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/china-linked-webworm-apt-evolves-tactics-expands-to-european-targets/</loc>
		<lastmod>2026-05-20T11:31:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/fbi-388-million-lost-in-crypto-atm-scams-in-2026/</loc>
		<lastmod>2026-05-20T11:32:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/armorcode-gives-security-teams-ai-workers-for-exposure-and-remediation/</loc>
		<lastmod>2026-05-20T11:32:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/novata-uses-ai-to-map-risk-across-portfolios-and-supply-chains/</loc>
		<lastmod>2026-05-20T11:32:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/over-320-npm-packages-hit-by-fresh-mini-shai-hulud-supply-chain-attack/</loc>
		<lastmod>2026-05-20T11:32:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/graphworm-malware-uses-microsoft-onedrive-as-command-and-control-infrastructure/</loc>
		<lastmod>2026-05-20T11:32:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/graphworm-malware-abuses-microsoft-onedrive-for-stealthy-c2-operations/</loc>
		<lastmod>2026-05-20T11:32:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/fox-tempest-linked-to-malware-signing-service-abusing-microsoft-artifact-signing/</loc>
		<lastmod>2026-05-20T11:32:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/fake-word-phishing-reveals-enterprise-blind-spot-in-trusted-remote-access-tools/</loc>
		<lastmod>2026-05-20T11:32:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/baidam-and-auscert-sign-mou-for-cybersecurity-collaboration/</loc>
		<lastmod>2026-05-20T12:02:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/tulane-university-data-breach-investigation/</loc>
		<lastmod>2026-05-20T12:02:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/crafted-jpegs-trigger-php-memory-bugs/</loc>
		<lastmod>2026-05-20T12:02:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/ottercookie-rat-steals-dev-secrets-and-cloud-credentials/</loc>
		<lastmod>2026-05-20T12:02:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/github-breached-employee-device-hack-led-to-exfiltration-of-3800-internal-repos/</loc>
		<lastmod>2026-05-20T12:02:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/indiana-launches-military-aligned-cybersecurity-pathway/</loc>
		<lastmod>2026-05-20T12:32:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/nist-pnt-framework-strengthens-gps-interference-defenses/</loc>
		<lastmod>2026-05-20T12:32:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/according-to-sophos-71-of-orgs-hit-by-identity-breaches/</loc>
		<lastmod>2026-05-20T12:32:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/firefox-151-packs-big-privacy-upgrades-into-a-small-update/</loc>
		<lastmod>2026-05-20T12:32:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/microsoft-durabletask-python-client-targeted-in-teampcp-cyberattack/</loc>
		<lastmod>2026-05-20T12:32:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/old-breaches-resold-as-new-corporate-data-leaks/</loc>
		<lastmod>2026-05-20T12:32:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/nvidia-triton-inference-server-flaw-raises-risk-of-unauthorized-access/</loc>
		<lastmod>2026-05-20T12:32:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/anthropic-silently-patches-claude-code-sandbox-bypass/</loc>
		<lastmod>2026-05-20T13:04:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/hackers-use-single-letter-go-module-typosquat-to-deploy-dns-based-backdoor/</loc>
		<lastmod>2026-05-20T13:04:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/microsoft-python-client-durabletask-compromised-by-teampcp-hackers/</loc>
		<lastmod>2026-05-20T13:04:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/hackers-abuse-mshta-legacy-windows-tool-to-deliver-lummastealer-and-amatera-malware/</loc>
		<lastmod>2026-05-20T13:04:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/gremlin-stealer-hides-c2-and-exfiltration-paths-in-encrypted-resources/</loc>
		<lastmod>2026-05-20T13:05:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/verizon-dbir-ai-helped-hackers-exploit-vulnerabilities-in-31-of-recent-breaches/</loc>
		<lastmod>2026-05-20T13:05:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/it-security-news-hourly-summary-2026-05-20-15h-13-posts/</loc>
		<lastmod>2026-05-20T13:05:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/webworm-deploys-echocreep-and-graphworm-backdoors-using-discord-and-ms-graph-api/</loc>
		<lastmod>2026-05-20T13:34:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/agent-ai-is-coming-are-you-ready/</loc>
		<lastmod>2026-05-20T13:34:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/exploited-faster-patched-slower-verizon-dbir-2026-shows-security-teams-losing-ground/</loc>
		<lastmod>2026-05-20T13:34:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/carding-site-b1acks-stash-dumps-4-6-million-stolen-cards-for-free/</loc>
		<lastmod>2026-05-20T13:34:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/github-says-hackers-stole-data-from-thousands-of-internal-repositories/</loc>
		<lastmod>2026-05-20T13:34:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/taking-care-of-business-the-cisos-role-in-a-cyber-crisis/</loc>
		<lastmod>2026-05-20T13:34:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/critical-exiftool-vulnerability-lets-hackers-compromise-macs-via-malicious-images/</loc>
		<lastmod>2026-05-20T13:34:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/1password-teams-with-openai-to-stop-ai-coding-agents-from-leaking-credentials/</loc>
		<lastmod>2026-05-20T14:02:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/grafana-github-security-incident-reportedly-connected-to-tanstack-npm-ransomware/</loc>
		<lastmod>2026-05-20T14:02:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/github-breach-teampcp-steals-3800-repositories-via-vs-code-extension/</loc>
		<lastmod>2026-05-20T14:02:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/cyber-briefing-2026-05-20/</loc>
		<lastmod>2026-05-20T14:31:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/verizon-dbir-vulnerability-exploitation-is-the-dominant-initial-access-vector/</loc>
		<lastmod>2026-05-20T14:32:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/nanoco-lands-12-million-seed-funding-launches-enterprise-assistant-built-on-nanoclaw/</loc>
		<lastmod>2026-05-20T14:32:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/critical-flaw-in-software-powering-a-third-of-the-internet-is-already-being-exploited-free-checker-now-available/</loc>
		<lastmod>2026-05-20T14:32:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/on-ai-security/</loc>
		<lastmod>2026-05-20T14:32:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/7-eleven-hit-by-data-breach/</loc>
		<lastmod>2026-05-20T15:04:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/mini-shai-hulud-hits-hundreds-of-npm-packages-in-antv-ecosystem/</loc>
		<lastmod>2026-05-20T15:04:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/microsoft-takes-down-malware-signing-service-behind-ransomware-attacks/</loc>
		<lastmod>2026-05-20T15:04:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/webworm-apt-targets-european-government-organizations-with-new-backdoors/</loc>
		<lastmod>2026-05-20T15:04:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/ai-powered-app-attacks-are-faster-more-frequent-and-harder-to-stop/</loc>
		<lastmod>2026-05-20T15:04:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/grafana-github-breach-linked-to-tanstack-npm-supply-chain-ransomware/</loc>
		<lastmod>2026-05-20T15:05:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/pardus-linux-local-privilege-escalation-flaw-allows-silent-root-access/</loc>
		<lastmod>2026-05-20T15:05:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/freepbx-vulnerability-allow-attackers-to-gain-access-to-user-portals/</loc>
		<lastmod>2026-05-20T15:05:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/critical-exiftool-vulnerability-allows-attackers-to-compromise-macs-via-single-malicious-image/</loc>
		<lastmod>2026-05-20T15:05:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/understanding-trend-structure-higher-highs-and-lower-lows-explained/</loc>
		<lastmod>2026-05-20T15:05:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/android-malware-campaign-used-hundreds-of-fake-apps-to-silently-charge-users/</loc>
		<lastmod>2026-05-20T15:34:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/token-pilfering-how-token-theft-is-plaguing-cybersecurity/</loc>
		<lastmod>2026-05-20T15:34:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/pcpjack-worm-steals-cloud-credentials-while-wiping-out-teampcp-infections/</loc>
		<lastmod>2026-05-20T15:34:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/european-union-agrees-to-ban-ai-generated-non-consensual-sexualized-deepfakes/</loc>
		<lastmod>2026-05-20T15:34:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/microsoft-issues-yellowkey-mitigation-no-patch-yet/</loc>
		<lastmod>2026-05-20T15:34:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/customers-say-trump-mobile-is-leaking-their-personal-information/</loc>
		<lastmod>2026-05-20T15:34:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/pulitzer-winning-journalists-expose-the-human-cost-and-hidden-network-behind-digital-arrest-scams/</loc>
		<lastmod>2026-05-20T16:04:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/quantum-bridge-raises-8-million-for-quantum-safe-key-distribution-solution/</loc>
		<lastmod>2026-05-20T16:04:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/microsoft-rolls-out-mitigations-for-yellowkey-bitlocker-bypass/</loc>
		<lastmod>2026-05-20T16:04:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/fake-malware-signing-service-fox-tempest-dismantled-by-microsoft/</loc>
		<lastmod>2026-05-20T16:04:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/it-security-news-hourly-summary-2026-05-20-18h-15-posts/</loc>
		<lastmod>2026-05-20T16:05:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/introducing-rampart-and-clarity-open-source-tools-to-bring-safety-into-agent-development-workflow/</loc>
		<lastmod>2026-05-20T16:31:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/madison-square-garden-bans-lawyer-representing-new-york-cop-injured-at-a-boxing-match/</loc>
		<lastmod>2026-05-20T16:32:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/microsoft-open-sources-rampart-and-clarity-to-secure-ai-agents-during-development/</loc>
		<lastmod>2026-05-20T17:34:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/how-to-close-the-most-expensive-gap-in-your-soc/</loc>
		<lastmod>2026-05-20T17:34:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/a-new-york-cop-got-injured-at-a-boxing-match-now-madison-square-garden-is-banning-his-lawyer/</loc>
		<lastmod>2026-05-20T17:34:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/aws-security-hub-extended-why-enterprise-security-products-should-sell-themselves/</loc>
		<lastmod>2026-05-20T18:04:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/securing-the-gaming-culture-of-cultures/</loc>
		<lastmod>2026-05-20T18:04:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/cisa-adds-seven-known-exploited-vulnerabilities-to-catalog-3/</loc>
		<lastmod>2026-05-20T18:04:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/cisa-contractor-exposed-sensitive-credentials-in-public-github-repository/</loc>
		<lastmod>2026-05-20T18:04:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/microsoft-launches-new-surface-ai-pcs-for-business-buyers/</loc>
		<lastmod>2026-05-20T18:05:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/mac-users-face-new-malware-threat-spoofing-apple-google-and-microsoft/</loc>
		<lastmod>2026-05-20T18:05:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/mini-shai-hulud-compromised-antv-npm-packages-enable-ci-cd-credential-theft/</loc>
		<lastmod>2026-05-20T18:34:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/devilnfc-android-malware-uses-kiosk-mode-to-trap-victims-during-nfc-relay-attacks/</loc>
		<lastmod>2026-05-20T18:34:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/pintheft-linux-vulnerability-let-attackers-gain-root-access-poc-released/</loc>
		<lastmod>2026-05-20T18:34:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/securing-the-american-experience/</loc>
		<lastmod>2026-05-20T19:04:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/detecting-bugs-and-vulnerabilities-in-java-with-sonarqube/</loc>
		<lastmod>2026-05-20T19:04:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/it-security-news-hourly-summary-2026-05-20-21h-7-posts/</loc>
		<lastmod>2026-05-20T19:05:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/microsoft-disrupts-malware-signing-service-used-by-ransomware-gangs/</loc>
		<lastmod>2026-05-20T20:02:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.itsecuritynews.info/the-npm-threat-landscape-attack-surface-and-mitigations-updated-may-20/</loc>
		<lastmod>2026-05-20T20:02:29+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->