<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//cybersecurefox.com/news-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-news/0.9 http://www.google.com/schemas/sitemap-news/0.9/sitemap-news.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
	<url>
		<loc>https://cybersecurefox.com/es/alertas-baja-prioridad-puntos-ciegos-soc/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-13T14:55:00+00:00</news:publication_date>
			<news:title><![CDATA[Alertas de baja prioridad esconden amenazas reales en SOC]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/doslidzhennia-25-mln-alertiv-edr-soc/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-13T14:55:00+00:00</news:publication_date>
			<news:title><![CDATA[Як низькопріоритетні алерти приховують реальні атаки]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/soc-triage-blinde-flecken-edr-phishing-aws-s3/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-13T14:55:00+00:00</news:publication_date>
			<news:title><![CDATA[Verlorene Alarme: Wie SOC-Triage echte Angriffe uebersieht]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/low-priority-alerts-edr-mitigated-risks/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-13T14:55:00+00:00</news:publication_date>
			<news:title><![CDATA[Hidden Risks in Low-Priority Alerts and 'Mitigated' EDR]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/analiz-25-mln-alertov-slepye-zony-soc-edr/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-13T14:55:00+00:00</news:publication_date>
			<news:title><![CDATA[Почему SOC пропускает угрозы: анализ 25 млн алертов]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/es/cve-2026-0300-vulnerabilidad-critica-pan-os-user-id-authentication-portal/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-13T10:03:00+00:00</news:publication_date>
			<news:title><![CDATA[CVE-2026-0300: explotación activa en PAN-OS]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/krytychna-vrazlyvist-cve-2026-0300-v-pan-os/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-13T10:03:00+00:00</news:publication_date>
			<news:title><![CDATA[Критична вразливість CVE-2026-0300 в Palo Alto PAN-OS]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/pan-os-cve-2026-0300-user-id-authentication-portal-2/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-13T10:03:00+00:00</news:publication_date>
			<news:title><![CDATA[PAN-OS Zero-Day CVE-2026-0300: Aktive Ausnutzung]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/palo-alto-pan-os-cve-2026-0300-active-exploitation/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-13T10:03:00+00:00</news:publication_date>
			<news:title><![CDATA[Palo Alto PAN-OS 0-day CVE-2026-0300 Actively Exploited]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/cve-2026-0300-pan-os-rce-aktivnaya-ekspluataciya/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-13T10:03:00+00:00</news:publication_date>
			<news:title><![CDATA[CVE-2026-0300: RCE в PAN-OS эксплуатируется в атаках]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/kriticheskie-uyazvimosti-vm2-nodejs-pobeg-iz-pesochnicy/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-13T06:40:00+00:00</news:publication_date>
			<news:title><![CDATA[Уязвимости vm2: побег из песочницы Node.js (CVE-2026-22709)]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/es/vulnerabilidades-criticas-vm2-escape-sandbox-nodejs/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-13T06:40:00+00:00</news:publication_date>
			<news:title><![CDATA[Vulnerabilidades críticas en vm2 permiten escape de sandbox]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/krytychni-vrazlyvosti-vm2-javascript-pisochnytsia/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-13T06:40:00+00:00</news:publication_date>
			<news:title><![CDATA[Критичні вразливості vm2: побіг з JavaScript-пісочниці]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/vm2-sandbox-escape-nodejs-sicherheitsluecke/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-13T06:40:00+00:00</news:publication_date>
			<news:title><![CDATA[Kritische vm2-Sicherheitslücken: Sandbox-Escape in Node.js]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/vm2-sandbox-escapes-cve-2026-22709/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-13T06:40:00+00:00</news:publication_date>
			<news:title><![CDATA[Critical vm2 Sandbox Escapes Expose Node.js Servers]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/es/backdoor-pamdoora-linux-pam-openssh/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-12T14:38:00+00:00</news:publication_date>
			<news:title><![CDATA[Nuevo backdoor PAM para Linux PamDOORa sale a la venta]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/pamdoora-linux-pam-bekdor/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-12T14:38:00+00:00</news:publication_date>
			<news:title><![CDATA[PamDOORa: новий бекдор для Linux на базі PAM-модулів]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/pamdoora-linux-pam-backdoor-ssh-zugang/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-12T14:38:00+00:00</news:publication_date>
			<news:title><![CDATA[PamDOORa: Neuer Linux-PAM-Backdoor im Untergrundmarkt]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/pamdoora-linux-pam-backdoor-flare-io-analysis/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-12T14:38:00+00:00</news:publication_date>
			<news:title><![CDATA[New PamDOORa Linux PAM Backdoor on Rehub Forum Exposed]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/pamdoora-linux-backdoor-pam-ssh-persistent-access/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-12T14:38:00+00:00</news:publication_date>
			<news:title><![CDATA[PamDOORa: новый Linux-бэкдор на базе PAM продаётся на форуме]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/es/cve-2026-23918-vulnerabilidad-critica-apache-http-server/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-12T10:00:00+00:00</news:publication_date>
			<news:title><![CDATA[CVE-2026-23918: vulnerabilidad crítica en Apache HTTP Server]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/kritychna-vrazlyvist-apache-http-server-cve-2026-23918/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-12T10:00:00+00:00</news:publication_date>
			<news:title><![CDATA[Критична вразливість Apache HTTP Server (CVE-2026-23918)]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/apache-http-server-cve-2026-23918-mod-http2-double-free/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-12T10:00:00+00:00</news:publication_date>
			<news:title><![CDATA[Kritische Apache HTTP Server Lücke CVE-2026-23918]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/apache-cve-2026-23918-http2-double-free/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-12T10:00:00+00:00</news:publication_date>
			<news:title><![CDATA[Apache fixes critical HTTP/2 double-free bug CVE-2026-23918]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/cve-2026-23918-double-free-apache-httpd-mod-http2-rce/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-12T10:00:00+00:00</news:publication_date>
			<news:title><![CDATA[CVE-2026-23918: double-free в Apache HTTP Server с RCE]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/botnet-xlabs-v1-atakuet-android-ustrojstva-cherez-adb/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-12T07:26:00+00:00</news:publication_date>
			<news:title><![CDATA[Ботнет xlabs_v1 атакует Android-устройства через ADB]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/es/botnet-mirai-xlabs-v1-adb-android-tv/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-12T07:26:00+00:00</news:publication_date>
			<news:title><![CDATA[Nuevo botnet Mirai xlabs_v1 explota ADB en Android TV]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/botnet-xlabs-v1-adb-5555-ddos/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-12T07:26:00+00:00</news:publication_date>
			<news:title><![CDATA[Ботнет xlabs_v1: DDoS через відкритий ADB-порт]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/mirai-botnet-xlabs-v1-android-adb-port-5555/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-12T07:26:00+00:00</news:publication_date>
			<news:title><![CDATA[Mirai-Botnet xlabs_v1 kapert Android- und IoT-Geräte]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/mirai-xlabs-v1-botnet-adb-android-ddos/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-12T07:26:00+00:00</news:publication_date>
			<news:title><![CDATA[Mirai-Based 'xlabs_v1' Botnet Targets ADB on Android]]></news:title>
		</news:news>
	</url>
</urlset>
<!-- XML Sitemap generated by Rank Math SEO Plugin (c) Rank Math - rankmath.com -->