<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//cybersecurefox.com/news-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-news/0.9 http://www.google.com/schemas/sitemap-news/0.9/sitemap-news.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
	<url>
		<loc>https://cybersecurefox.com/es/microsoft-patch-tuesday-mayo-2026-138-vulnerabilidades/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-14T10:09:00+00:00</news:publication_date>
			<news:title><![CDATA[Microsoft corrige 138 fallos en Patch Tuesday de mayo]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/patch-tuesday-2026-138-vrazlyvostei-microsoft/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-14T10:09:00+00:00</news:publication_date>
			<news:title><![CDATA[Patch Tuesday: 138 вразливостей у продуктах Microsoft]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/microsoft-patch-tuesday-mai-2026-windows-azure-dynamics/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-14T10:09:00+00:00</news:publication_date>
			<news:title><![CDATA[Microsoft Patch Tuesday Mai 2026: 138 Lücken geschlossen]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/microsoft-may-2026-patch-tuesday-138-vulnerabilities/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-14T10:09:00+00:00</news:publication_date>
			<news:title><![CDATA[Microsoft May 2026 Patch Tuesday: 138 Critical Fixes]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/may-2026-patch-tuesday-microsoft-138-uyazvimostey/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-14T10:09:00+00:00</news:publication_date>
			<news:title><![CDATA[Майский Patch Tuesday Microsoft: 138 уязвимостей и ИИ]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/es/qlnx-linux-rat-roba-credenciales-desarrolladores/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-14T06:53:00+00:00</news:publication_date>
			<news:title><![CDATA[QLNX: nuevo Linux RAT roba credenciales de desarrolladores]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/qlnx-quasar-linux-rat-atakuye-rozrobnykiv/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-14T06:53:00+00:00</news:publication_date>
			<news:title><![CDATA[Шкідливий QLNX: новий Linux RAT, що полює на секрети DevOps]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/quasar-linux-rat-qlnx-entwickler-devops-secrets/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-14T06:53:00+00:00</news:publication_date>
			<news:title><![CDATA[Quasar Linux RAT: Neue DevOps-Malware QLNX entdeckt]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/quasar-linux-rat-qlnx-devops-credentials/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-14T06:53:00+00:00</news:publication_date>
			<news:title><![CDATA[Quasar Linux RAT Targets Developer and DevOps Secrets]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/qlnx-linux-implant-krazha-uchetnykh-dannykh-razrabotchikov/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-14T06:53:00+00:00</news:publication_date>
			<news:title><![CDATA[QLNX: Linux-имплант нацелен на разработчиков и CI/CD]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/analiz-25-mln-alertov-slepye-zony-soc-edr/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-13T14:55:00+00:00</news:publication_date>
			<news:title><![CDATA[Почему SOC пропускает угрозы: анализ 25 млн алертов]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/es/alertas-baja-prioridad-puntos-ciegos-soc/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-13T14:55:00+00:00</news:publication_date>
			<news:title><![CDATA[Alertas de baja prioridad esconden amenazas reales en SOC]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/doslidzhennia-25-mln-alertiv-edr-soc/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-13T14:55:00+00:00</news:publication_date>
			<news:title><![CDATA[Як низькопріоритетні алерти приховують реальні атаки]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/soc-triage-blinde-flecken-edr-phishing-aws-s3/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-13T14:55:00+00:00</news:publication_date>
			<news:title><![CDATA[Verlorene Alarme: Wie SOC-Triage echte Angriffe uebersieht]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/low-priority-alerts-edr-mitigated-risks/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-13T14:55:00+00:00</news:publication_date>
			<news:title><![CDATA[Hidden Risks in Low-Priority Alerts and 'Mitigated' EDR]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/es/cve-2026-0300-vulnerabilidad-critica-pan-os-user-id-authentication-portal/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-13T10:03:00+00:00</news:publication_date>
			<news:title><![CDATA[CVE-2026-0300: explotación activa en PAN-OS]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/krytychna-vrazlyvist-cve-2026-0300-v-pan-os/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-13T10:03:00+00:00</news:publication_date>
			<news:title><![CDATA[Критична вразливість CVE-2026-0300 в Palo Alto PAN-OS]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/pan-os-cve-2026-0300-user-id-authentication-portal-2/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-13T10:03:00+00:00</news:publication_date>
			<news:title><![CDATA[PAN-OS Zero-Day CVE-2026-0300: Aktive Ausnutzung]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/palo-alto-pan-os-cve-2026-0300-active-exploitation/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-13T10:03:00+00:00</news:publication_date>
			<news:title><![CDATA[Palo Alto PAN-OS 0-day CVE-2026-0300 Actively Exploited]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/cve-2026-0300-pan-os-rce-aktivnaya-ekspluataciya/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-13T10:03:00+00:00</news:publication_date>
			<news:title><![CDATA[CVE-2026-0300: RCE в PAN-OS эксплуатируется в атаках]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/es/vulnerabilidades-criticas-vm2-escape-sandbox-nodejs/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-13T06:40:00+00:00</news:publication_date>
			<news:title><![CDATA[Vulnerabilidades críticas en vm2 permiten escape de sandbox]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/krytychni-vrazlyvosti-vm2-javascript-pisochnytsia/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-13T06:40:00+00:00</news:publication_date>
			<news:title><![CDATA[Критичні вразливості vm2: побіг з JavaScript-пісочниці]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/vm2-sandbox-escape-nodejs-sicherheitsluecke/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-13T06:40:00+00:00</news:publication_date>
			<news:title><![CDATA[Kritische vm2-Sicherheitslücken: Sandbox-Escape in Node.js]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/vm2-sandbox-escapes-cve-2026-22709/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-13T06:40:00+00:00</news:publication_date>
			<news:title><![CDATA[Critical vm2 Sandbox Escapes Expose Node.js Servers]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/kriticheskie-uyazvimosti-vm2-nodejs-pobeg-iz-pesochnicy/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-13T06:40:00+00:00</news:publication_date>
			<news:title><![CDATA[Уязвимости vm2: побег из песочницы Node.js (CVE-2026-22709)]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/pamdoora-linux-backdoor-pam-ssh-persistent-access/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-12T14:38:00+00:00</news:publication_date>
			<news:title><![CDATA[PamDOORa: новый Linux-бэкдор на базе PAM продаётся на форуме]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/es/backdoor-pamdoora-linux-pam-openssh/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-12T14:38:00+00:00</news:publication_date>
			<news:title><![CDATA[Nuevo backdoor PAM para Linux PamDOORa sale a la venta]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/pamdoora-linux-pam-bekdor/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-12T14:38:00+00:00</news:publication_date>
			<news:title><![CDATA[PamDOORa: новий бекдор для Linux на базі PAM-модулів]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/pamdoora-linux-pam-backdoor-ssh-zugang/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-12T14:38:00+00:00</news:publication_date>
			<news:title><![CDATA[PamDOORa: Neuer Linux-PAM-Backdoor im Untergrundmarkt]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/pamdoora-linux-pam-backdoor-flare-io-analysis/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-12T14:38:00+00:00</news:publication_date>
			<news:title><![CDATA[New PamDOORa Linux PAM Backdoor on Rehub Forum Exposed]]></news:title>
		</news:news>
	</url>
</urlset>
<!-- XML Sitemap generated by Rank Math SEO Plugin (c) Rank Math - rankmath.com -->