<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
  <url>
    <loc>https://www.hackwire.news/news/threatsday-bulletin-edge-plaintext-passwords-ics-0-days-patch-or-die-alerts-and</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T12:33:18.000Z</news:publication_date>
      <news:title>ThreatsDay Bulletin: Edge Plaintext Passwords, ICS 0-Days, Patch-or-Die Alerts and 25+ New Stories</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/fake-claude-ai-website-delivers-new-beagle-windows-malware</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T12:32:33.000Z</news:publication_date>
      <news:title>Fake Claude AI website delivers new &apos;Beagle&apos; Windows malware</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/palo-alto-networks-firewall-zero-day-exploited-for-nearly-a-month</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T12:31:42.000Z</news:publication_date>
      <news:title>Palo Alto Networks firewall zero-day exploited for nearly a month</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/webinar-why-modern-attacks-require-both-security-and-recovery</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T12:30:56.000Z</news:publication_date>
      <news:title>Webinar: Why modern attacks require both security and recovery</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/crypto-gang-member-gets-65-years-for-role-in-230-million-heist</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T12:30:07.000Z</news:publication_date>
      <news:title>Crypto gang member gets 6.5 years for role in $230 million heist</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/pypi-packages-deliver-zichatbot-malware-via-zulip-apis-on-windows-and-linux</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T09:30:06.000Z</news:publication_date>
      <news:title>PyPI Packages Deliver ZiChatBot Malware via Zulip APIs on Windows and Linux</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/claude-ai-guided-hackers-toward-ot-assets-during-water-utility-intrusion</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T08:11:04.000Z</news:publication_date>
      <news:title>Claude AI Guided Hackers Toward OT Assets During Water Utility Intrusion</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/vm2-nodejs-library-vulnerabilities-enable-sandbox-escape-and-arbitrary-code-exec</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T06:30:17.000Z</news:publication_date>
      <news:title>vm2 Node.js Library Vulnerabilities Enable Sandbox Escape and Arbitrary Code Execution</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/smashing-security-podcast-466-meta-sees-everything-copy-fail-and-a-deepfake-gets</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T00:32:01.000Z</news:publication_date>
      <news:title>Smashing Security podcast #466: Meta sees everything, Copy Fail, and a deepfake gets hired</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/yet-another-way-to-bypass-google-chromes-encryption-protection</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T00:30:49.000Z</news:publication_date>
      <news:title>Yet Another Way to Bypass Google Chrome&apos;s Encryption Protection</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/hackers-abuse-google-ads-for-godaddy-managewp-login-phishing</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-07T00:30:07.000Z</news:publication_date>
      <news:title>Hackers abuse Google ads for GoDaddy ManageWP login phishing</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/instructure-breach-exposes-schools-vendor-dependence</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T21:30:53.000Z</news:publication_date>
      <news:title>Instructure Breach Exposes Schools&apos; Vendor Dependence</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/mirai-based-xlabs-v1-botnet-exploits-adb-to-hijack-iot-devices-for-ddos-attacks</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T21:30:10.000Z</news:publication_date>
      <news:title>Mirai-Based xlabs_v1 Botnet Exploits ADB to Hijack IoT Devices for DDoS Attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/critical-vm2-sandbox-bug-lets-attackers-execute-code-on-hosts</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T20:11:46.000Z</news:publication_date>
      <news:title>Critical vm2 sandbox bug lets attackers execute code on hosts</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/new-cisco-dos-flaw-requires-manual-reboot-to-revive-devices</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T20:10:17.000Z</news:publication_date>
      <news:title>New Cisco DoS flaw requires manual reboot to revive devices</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/cisa-launches-ci-fortify-to-prepare-critical-infrastructure-for-geopolitical-cyb</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T18:32:41.000Z</news:publication_date>
      <news:title>CISA Launches CI Fortify to Prepare Critical Infrastructure for Geopolitical Cyber Conflict</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/romanian-man-extradited-to-us-for-role-in-hacking-scheme-17-years-ago</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T18:31:53.000Z</news:publication_date>
      <news:title>Romanian Man Extradited to US for Role in Hacking Scheme 17 Years Ago</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/daemon-tools-devs-confirm-breach-release-malware-free-version</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T18:31:01.000Z</news:publication_date>
      <news:title>DAEMON Tools devs confirm breach, release malware-free version</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/iranian-apt-intrusion-masquerades-as-chaos-ransomware-attack</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T15:33:07.000Z</news:publication_date>
      <news:title>Iranian APT Intrusion Masquerades as Chaos Ransomware Attack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/herd-security-raises-3-million-for-ai-powered-training-platform</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T15:32:22.000Z</news:publication_date>
      <news:title>Herd Security Raises $3 Million for AI-Powered Training Platform</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/autonomous-offensive-security-firm-xbow-raises-35-million</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T15:31:43.000Z</news:publication_date>
      <news:title>Autonomous Offensive Security Firm XBOW Raises $35 Million</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/attacks-abuse-windows-phone-link-to-steal-texts-amp-bypass-2fa</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T15:31:00.000Z</news:publication_date>
      <news:title>Attacks Abuse Windows Phone Link to Steal Texts &amp;amp; Bypass 2FA</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/muddywater-uses-microsoft-teams-to-steal-credentials-in-false-flag-ransomware-at</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T15:30:16.000Z</news:publication_date>
      <news:title>MuddyWater Uses Microsoft Teams to Steal Credentials in False Flag Ransomware Attack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/your-ai-agents-are-already-inside-the-perimeter-do-you-know-what-theyre-doing</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T14:13:41.000Z</news:publication_date>
      <news:title>Your AI Agents Are Already Inside the Perimeter. Do You Know What They&apos;re Doing?</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/the-hacker-news-launches-cybersecurity-stars-awards-2026-submissions-now-open</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T14:12:51.000Z</news:publication_date>
      <news:title>The Hacker News Launches &apos;Cybersecurity Stars Awards 2026&apos;  Submissions Now Open</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/webinar-why-network-incidents-escalate-and-how-to-fix-response-gaps</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T14:12:03.000Z</news:publication_date>
      <news:title>Webinar: Why network incidents escalate and how to fix response gaps</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/muddywater-hackers-use-chaos-ransomware-as-a-decoy-in-attacks</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T14:11:13.000Z</news:publication_date>
      <news:title>MuddyWater hackers use Chaos ransomware as a decoy in attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/why-ransomware-attacks-succeed-even-when-backups-exist</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T14:10:33.000Z</news:publication_date>
      <news:title>Why ransomware attacks succeed even when backups exist</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/why-security-leadership-makes-or-breaks-a-pen-test</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T12:33:43.000Z</news:publication_date>
      <news:title>Why Security Leadership Makes or Breaks a Pen Test</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/research-hub-bridges-cybersecurity-gap-for-under-resourced-organizations</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T12:32:54.000Z</news:publication_date>
      <news:title>Research Hub Bridges Cybersecurity Gap for Under-Resourced Organizations</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/from-stuxnet-to-chatgpt-20-news-events-that-shaped-cyber</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T12:32:02.000Z</news:publication_date>
      <news:title>From Stuxnet to ChatGPT: 20 News Events That Shaped Cyber</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/windows-phone-link-exploited-by-cloudz-rat-to-steal-credentials-and-otps</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T12:30:54.000Z</news:publication_date>
      <news:title>Windows Phone Link Exploited by CloudZ RAT to Steal Credentials and OTPs</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/googles-android-apps-get-public-verification-to-stop-supply-chain-attacks</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T12:30:08.000Z</news:publication_date>
      <news:title>Google&apos;s Android Apps Get Public Verification to Stop Supply Chain Attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/government-scientific-entities-hit-via-daemon-tools-supply-chain-attack</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T09:30:51.000Z</news:publication_date>
      <news:title>Government, Scientific Entities Hit via Daemon Tools Supply Chain Attack</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/palo-alto-networks-warns-of-firewall-rce-zero-day-exploited-in-attacks</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T09:30:05.000Z</news:publication_date>
      <news:title>Palo Alto Networks warns of firewall RCE zero-day exploited in attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/oracle-debuts-monthly-critical-security-patch-updates</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T08:11:21.000Z</news:publication_date>
      <news:title>Oracle Debuts Monthly Critical Security Patch Updates</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/palo-alto-pan-os-flaw-under-active-exploitation-enables-remote-code-execution</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T08:10:33.000Z</news:publication_date>
      <news:title>Palo Alto PAN-OS Flaw Under Active Exploitation Enables Remote Code Execution</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/palo-alto-networks-to-patch-zero-day-exploited-to-hack-firewalls</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T06:30:53.000Z</news:publication_date>
      <news:title>Palo Alto Networks to Patch Zero-Day Exploited to Hack Firewalls</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/middle-east-cyber-battle-field-broadens-especially-in-uae</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T06:30:11.000Z</news:publication_date>
      <news:title>Middle East Cyber Battle Field Broadens  Especially in UAE</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/new-stealthy-quasar-linux-malware-targets-software-developers</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T03:30:15.000Z</news:publication_date>
      <news:title>New stealthy Quasar Linux malware targets software developers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/instructure-hacker-claims-data-theft-from-8800-schools-universities</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-06T00:30:07.000Z</news:publication_date>
      <news:title>Instructure hacker claims data theft from 8,800 schools, universities</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/abb-br-pvi</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T21:33:29.000Z</news:publication_date>
      <news:title>ABB B&amp;R PVI</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/johnson-controls-cem-ac2000</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T21:32:50.000Z</news:publication_date>
      <news:title>Johnson Controls CEM AC2000</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/hitachi-energy-pcm600</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T21:32:08.000Z</news:publication_date>
      <news:title>Hitachi Energy PCM600</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/abb-br-automation-runtime</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T21:31:22.000Z</news:publication_date>
      <news:title>ABB B&amp;R Automation Runtime</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.hackwire.news/news/trellix-source-code-breach-highlights-growing-supply-chain-threats</loc>
    <news:news>
      <news:publication>
        <news:name>HackWire</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T21:30:42.000Z</news:publication_date>
      <news:title>Trellix Source Code Breach Highlights Growing Supply Chain Threats</news:title>
    </news:news>
  </url>
</urlset>