<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
  <url>
    <loc>https://www.hackwire.news/news/smashing-security-podcast-466-meta-sees-everything-copy-fail-and-a-deepfake-gets</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T00:32:01.000Z</news:publication_date>
      <news:title>Smashing Security podcast #466: Meta sees everything, Copy Fail, and a deepfake gets hired</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/yet-another-way-to-bypass-google-chromes-encryption-protection</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T00:30:49.000Z</news:publication_date>
      <news:title>Yet Another Way to Bypass Google Chrome&apos;s Encryption Protection</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/hackers-abuse-google-ads-for-godaddy-managewp-login-phishing</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T00:30:07.000Z</news:publication_date>
      <news:title>Hackers abuse Google ads for GoDaddy ManageWP login phishing</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/instructure-breach-exposes-schools-vendor-dependence</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T21:30:53.000Z</news:publication_date>
      <news:title>Instructure Breach Exposes Schools&apos; Vendor Dependence</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/mirai-based-xlabs-v1-botnet-exploits-adb-to-hijack-iot-devices-for-ddos-attacks</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T21:30:10.000Z</news:publication_date>
      <news:title>Mirai-Based xlabs_v1 Botnet Exploits ADB to Hijack IoT Devices for DDoS Attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/critical-vm2-sandbox-bug-lets-attackers-execute-code-on-hosts</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T20:11:46.000Z</news:publication_date>
      <news:title>Critical vm2 sandbox bug lets attackers execute code on hosts</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/new-cisco-dos-flaw-requires-manual-reboot-to-revive-devices</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T20:10:17.000Z</news:publication_date>
      <news:title>New Cisco DoS flaw requires manual reboot to revive devices</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/cisa-launches-ci-fortify-to-prepare-critical-infrastructure-for-geopolitical-cyb</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T18:32:41.000Z</news:publication_date>
      <news:title>CISA Launches CI Fortify to Prepare Critical Infrastructure for Geopolitical Cyber Conflict</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/romanian-man-extradited-to-us-for-role-in-hacking-scheme-17-years-ago</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T18:31:53.000Z</news:publication_date>
      <news:title>Romanian Man Extradited to US for Role in Hacking Scheme 17 Years Ago</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/daemon-tools-devs-confirm-breach-release-malware-free-version</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T18:31:01.000Z</news:publication_date>
      <news:title>DAEMON Tools devs confirm breach, release malware-free version</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/iranian-apt-intrusion-masquerades-as-chaos-ransomware-attack</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T15:33:07.000Z</news:publication_date>
      <news:title>Iranian APT Intrusion Masquerades as Chaos Ransomware Attack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/herd-security-raises-3-million-for-ai-powered-training-platform</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T15:32:22.000Z</news:publication_date>
      <news:title>Herd Security Raises $3 Million for AI-Powered Training Platform</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/autonomous-offensive-security-firm-xbow-raises-35-million</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T15:31:43.000Z</news:publication_date>
      <news:title>Autonomous Offensive Security Firm XBOW Raises $35 Million</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/attacks-abuse-windows-phone-link-to-steal-texts-amp-bypass-2fa</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T15:31:00.000Z</news:publication_date>
      <news:title>Attacks Abuse Windows Phone Link to Steal Texts &amp;amp; Bypass 2FA</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/muddywater-uses-microsoft-teams-to-steal-credentials-in-false-flag-ransomware-at</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T15:30:16.000Z</news:publication_date>
      <news:title>MuddyWater Uses Microsoft Teams to Steal Credentials in False Flag Ransomware Attack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/your-ai-agents-are-already-inside-the-perimeter-do-you-know-what-theyre-doing</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T14:13:41.000Z</news:publication_date>
      <news:title>Your AI Agents Are Already Inside the Perimeter. Do You Know What They&apos;re Doing?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/the-hacker-news-launches-cybersecurity-stars-awards-2026-submissions-now-open</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T14:12:51.000Z</news:publication_date>
      <news:title>The Hacker News Launches &apos;Cybersecurity Stars Awards 2026&apos;  Submissions Now Open</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/webinar-why-network-incidents-escalate-and-how-to-fix-response-gaps</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T14:12:03.000Z</news:publication_date>
      <news:title>Webinar: Why network incidents escalate and how to fix response gaps</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/muddywater-hackers-use-chaos-ransomware-as-a-decoy-in-attacks</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T14:11:13.000Z</news:publication_date>
      <news:title>MuddyWater hackers use Chaos ransomware as a decoy in attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/why-ransomware-attacks-succeed-even-when-backups-exist</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T14:10:33.000Z</news:publication_date>
      <news:title>Why ransomware attacks succeed even when backups exist</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/why-security-leadership-makes-or-breaks-a-pen-test</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T12:33:43.000Z</news:publication_date>
      <news:title>Why Security Leadership Makes or Breaks a Pen Test</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/research-hub-bridges-cybersecurity-gap-for-under-resourced-organizations</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T12:32:54.000Z</news:publication_date>
      <news:title>Research Hub Bridges Cybersecurity Gap for Under-Resourced Organizations</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/from-stuxnet-to-chatgpt-20-news-events-that-shaped-cyber</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T12:32:02.000Z</news:publication_date>
      <news:title>From Stuxnet to ChatGPT: 20 News Events That Shaped Cyber</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/windows-phone-link-exploited-by-cloudz-rat-to-steal-credentials-and-otps</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T12:30:54.000Z</news:publication_date>
      <news:title>Windows Phone Link Exploited by CloudZ RAT to Steal Credentials and OTPs</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/googles-android-apps-get-public-verification-to-stop-supply-chain-attacks</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T12:30:08.000Z</news:publication_date>
      <news:title>Google&apos;s Android Apps Get Public Verification to Stop Supply Chain Attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/government-scientific-entities-hit-via-daemon-tools-supply-chain-attack</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T09:30:51.000Z</news:publication_date>
      <news:title>Government, Scientific Entities Hit via Daemon Tools Supply Chain Attack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/palo-alto-networks-warns-of-firewall-rce-zero-day-exploited-in-attacks</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T09:30:05.000Z</news:publication_date>
      <news:title>Palo Alto Networks warns of firewall RCE zero-day exploited in attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/oracle-debuts-monthly-critical-security-patch-updates</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T08:11:21.000Z</news:publication_date>
      <news:title>Oracle Debuts Monthly Critical Security Patch Updates</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/palo-alto-pan-os-flaw-under-active-exploitation-enables-remote-code-execution</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T08:10:33.000Z</news:publication_date>
      <news:title>Palo Alto PAN-OS Flaw Under Active Exploitation Enables Remote Code Execution</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/palo-alto-networks-to-patch-zero-day-exploited-to-hack-firewalls</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T06:30:53.000Z</news:publication_date>
      <news:title>Palo Alto Networks to Patch Zero-Day Exploited to Hack Firewalls</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/middle-east-cyber-battle-field-broadens-especially-in-uae</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T06:30:11.000Z</news:publication_date>
      <news:title>Middle East Cyber Battle Field Broadens  Especially in UAE</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/new-stealthy-quasar-linux-malware-targets-software-developers</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T03:30:15.000Z</news:publication_date>
      <news:title>New stealthy Quasar Linux malware targets software developers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/instructure-hacker-claims-data-theft-from-8800-schools-universities</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T00:30:07.000Z</news:publication_date>
      <news:title>Instructure hacker claims data theft from 8,800 schools, universities</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/abb-br-pvi</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T21:33:29.000Z</news:publication_date>
      <news:title>ABB B&amp;R PVI</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/johnson-controls-cem-ac2000</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T21:32:50.000Z</news:publication_date>
      <news:title>Johnson Controls CEM AC2000</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/hitachi-energy-pcm600</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T21:32:08.000Z</news:publication_date>
      <news:title>Hitachi Energy PCM600</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/abb-br-automation-runtime</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T21:31:22.000Z</news:publication_date>
      <news:title>ABB B&amp;R Automation Runtime</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/trellix-source-code-breach-highlights-growing-supply-chain-threats</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T21:30:42.000Z</news:publication_date>
      <news:title>Trellix Source Code Breach Highlights Growing Supply Chain Threats</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/abb-br-automation-studio</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T20:14:06.000Z</news:publication_date>
      <news:title>ABB B&amp;R Automation Studio</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/critical-high-severity-vulnerabilities-patched-in-apache-mina-http-server</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T20:13:18.000Z</news:publication_date>
      <news:title>Critical, High-Severity Vulnerabilities Patched in Apache MINA, HTTP Server</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/physical-cargo-theft-gets-a-boost-from-cybercriminals</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T20:12:37.000Z</news:publication_date>
      <news:title>Physical Cargo Theft Gets a Boost From Cybercriminals</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/microsoft-edge-stores-passwords-in-process-memory-posing-enterprise-risk</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T20:11:54.000Z</news:publication_date>
      <news:title>Microsoft Edge Stores Passwords in Process Memory, Posing Enterprise Risk</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/daemon-tools-trojanized-in-supply-chain-attack-to-deploy-backdoor</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T20:11:10.000Z</news:publication_date>
      <news:title>DAEMON Tools trojanized in supply-chain attack to deploy backdoor</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/china-linked-uat-8302-targets-governments-using-shared-apt-malware-across-region</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T18:33:29.000Z</news:publication_date>
      <news:title>China-Linked UAT-8302 Targets Governments Using Shared APT Malware Across Regions</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/daemon-tools-supply-chain-attack-compromises-official-installers-with-malware</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T18:32:44.000Z</news:publication_date>
      <news:title>DAEMON Tools Supply Chain Attack Compromises Official Installers with Malware</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/critical-apache-http2-flaw-cve-2026-23918-enables-dos-and-potential-rce</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T18:31:52.000Z</news:publication_date>
      <news:title>Critical Apache HTTP/2 Flaw (CVE-2026-23918) Enables DoS and Potential RCE</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/the-eol-blind-spot-in-your-cve-feed-what-sca-tools-miss</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T18:31:09.000Z</news:publication_date>
      <news:title>The EOL Blind Spot in Your CVE Feed: What SCA Tools Miss</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/student-hacked-taiwan-high-speed-rail-to-trigger-emergency-brakes</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T18:30:18.000Z</news:publication_date>
      <news:title>Student hacked Taiwan high-speed rail to trigger emergency brakes</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/critical-remote-code-execution-vulnerability-patched-in-android</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T15:33:08.000Z</news:publication_date>
      <news:title>Critical Remote Code Execution Vulnerability Patched in Android</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/critical-bug-could-expose-300000-ollama-deployments-to-information-theft</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T15:32:20.000Z</news:publication_date>
      <news:title>Critical Bug Could Expose 300,000 Ollama Deployments to Information Theft</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/hacker-conversations-joey-melo-on-hacking-ai</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T15:31:39.000Z</news:publication_date>
      <news:title>Hacker Conversations: Joey Melo on Hacking AI</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/microsoft-warns-of-sophisticated-phishing-campaign-targeting-us-organizations</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T15:30:53.000Z</news:publication_date>
      <news:title>Microsoft Warns of Sophisticated Phishing Campaign Targeting US Organizations</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/ftc-to-ban-data-broker-kochava-from-selling-americans-location-data</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T15:30:14.000Z</news:publication_date>
      <news:title>FTC to ban data broker Kochava from selling Americans location data</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/metinfo-cms-cve-2026-29014-exploited-for-remote-code-execution-attacks</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T14:13:55.000Z</news:publication_date>
      <news:title>MetInfo CMS CVE-2026-29014 Exploited for Remote Code Execution Attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/the-back-door-attackers-know-about-and-most-security-teams-still-havent-closed</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T14:13:17.000Z</news:publication_date>
      <news:title>The Back Door Attackers Know About  and Most Security Teams Still Havent Closed</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/vimeo-data-breach-exposes-personal-information-of-119000-people</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T14:12:20.000Z</news:publication_date>
      <news:title>Vimeo data breach exposes personal information of 119,000 people</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/the-eol-blind-spot-in-your-cve-feed-what-sca-tools-dont-check</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T14:11:34.000Z</news:publication_date>
      <news:title>The EOL Blind Spot in Your CVE Feed: What SCA Tools Don&apos;t Check.</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/scarcruft-hacks-gaming-platform-to-deploy-birdcall-malware-on-android-and-window</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T14:10:48.000Z</news:publication_date>
      <news:title>ScarCruft Hacks Gaming Platform to Deploy BirdCall Malware on Android and Windows</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/how-the-story-of-a-usb-penetration-test-went-viral</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T12:34:32.000Z</news:publication_date>
      <news:title>How the Story of a USB Penetration Test Went Viral</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/we-scanned-1-million-exposed-ai-services-heres-how-bad-the-security-actually-is</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T12:32:41.000Z</news:publication_date>
      <news:title>We Scanned 1 Million Exposed AI Services. Here&apos;s How Bad the Security Actually Is</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/cloudz-malware-abuses-microsoft-phone-link-to-steal-sms-and-otps</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T12:31:55.000Z</news:publication_date>
      <news:title>CloudZ malware abuses Microsoft Phone Link to steal SMS and OTPs</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/karakurt-extortion-gang-cold-case-negotiator-gets-85-years-in-prison</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T12:31:06.000Z</news:publication_date>
      <news:title>Karakurt extortion gang cold case negotiator gets 8.5 years in prison</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/google-now-offers-up-to-15-million-for-some-android-exploits</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T12:30:18.000Z</news:publication_date>
      <news:title>Google now offers up to $1.5 million for some Android exploits</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/whatsapp-discloses-file-spoofing-arbitrary-url-scheme-vulnerabilities</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T09:31:03.000Z</news:publication_date>
      <news:title>WhatsApp Discloses File Spoofing, Arbitrary URL Scheme Vulnerabilities</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/scarcruft-hackers-push-birdcall-android-malware-via-game-platform</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T09:30:11.000Z</news:publication_date>
      <news:title>ScarCruft hackers push BirdCall Android malware via game platform</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/microsoft-details-phishing-campaign-targeting-35000-users-across-26-countries</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T08:11:28.000Z</news:publication_date>
      <news:title>Microsoft Details Phishing Campaign Targeting 35,000 Users Across 26 Countries</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/weaver-e-cology-rce-flaw-cve-2026-22679-actively-exploited-via-debug-api</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T08:10:49.000Z</news:publication_date>
      <news:title>Weaver E-cology RCE Flaw CVE-2026-22679 Actively Exploited via Debug API</news:title>
    </news:news>
  </url>
</urlset>