<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//cybersecurefox.com/news-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-news/0.9 http://www.google.com/schemas/sitemap-news/0.9/sitemap-news.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
	<url>
		<loc>https://cybersecurefox.com/es/vulnerabilidad-critica-litellm-cve-2026-42208-sql-injection/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T07:23:00+00:00</news:publication_date>
			<news:title><![CDATA[Vulnerabilidad crítica en LiteLLM (CVE‑2026‑42208): SQL injection en pasarela de IA ya está siendo explotada]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/kritychna-urazlyvist-cve-2026-42208-litellm-sql-iniektsiia/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T07:23:00+00:00</news:publication_date>
			<news:title><![CDATA[Критична уразливість CVE-2026-42208 в LiteLLM: активна експлуатація SQL-інʼєкції в AI‑шлюзі]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/litellm-cve-2026-42208-sql-injection-ai-gateway/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T07:23:00+00:00</news:publication_date>
			<news:title><![CDATA[LiteLLM Sicherheitsluecke CVE-2026-42208: Kritische SQL-Injection im AI-Gateway]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/litellm-cve-2026-42208-sql-injection-ai-gateway/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T07:23:00+00:00</news:publication_date>
			<news:title><![CDATA[Critical LiteLLM Vulnerability CVE-2026-42208: SQL Injection in AI Gateway Under Active Exploitation]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/kriticheskaya-uyazvimost-litellm-sql-injektsiya-cve-2026-42208/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-04T07:23:00+00:00</news:publication_date>
			<news:title><![CDATA[Критическая уязвимость LiteLLM CVE-2026-42208: SQL-инъекция в AI gateway уже эксплуатируется]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/es/critica-vulnerabilidad-autenticacion-cpanel-actualizacion-seguridad/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-03T14:46:00+00:00</news:publication_date>
			<news:title><![CDATA[Crítica vulnerabilidad de autenticación en cPanel: parches de seguridad y medidas urgentes]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/kritichna-urazlivist-v-cpanel-onovlennya-bezpeky-namecheap/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-03T14:46:00+00:00</news:publication_date>
			<news:title><![CDATA[Критична уразливість в cPanel: оновлення безпеки, дії Namecheap та рекомендації з кіберзахисту]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/kritische-cpanel-sicherheitsluecke-authentifizierung-namecheap-ports-2083-2087/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-03T14:46:00+00:00</news:publication_date>
			<news:title><![CDATA[Kritische cPanel-Sicherheitsluecke: Authentifizierungs-Exploit zwingt Hosting-Anbieter zu Notmassnahmen]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/cpanel-critical-authentication-vulnerability-namecheap-response/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-03T14:46:00+00:00</news:publication_date>
			<news:title><![CDATA[Critical cPanel Authentication Vulnerability: Namecheap Response and Security Guidance]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/uyazvimost-cpanel-eksployt-autentifikacii-namecheap/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-03T14:46:00+00:00</news:publication_date>
			<news:title><![CDATA[Уязвимость cPanel: эксплойт аутентификации и меры Namecheap по защите клиентов]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/microsoft-entra-agent-id-administrator-privilege-escalation/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-03T09:38:00+00:00</news:publication_date>
			<news:title><![CDATA[Уязвимость в Microsoft Entra ID: эскалация привилегий через роль Agent ID Administrator]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/es/vulnerabilidad-agent-id-administrator-microsoft-entra-id/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-03T09:38:00+00:00</news:publication_date>
			<news:title><![CDATA[Vulnerabilidad en Microsoft Entra ID permite escalada de privilegios vía rol Agent ID Administrator]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/urazlyvist-agent-id-administrator-microsoft-entra-id/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-03T09:38:00+00:00</news:publication_date>
			<news:title><![CDATA[Уразливість Agent ID Administrator у Microsoft Entra ID: ризики ескалації привілеїв через service principal]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/microsoft-entra-id-sicherheitsluecke-agent-id-administrator-service-principal/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-03T09:38:00+00:00</news:publication_date>
			<news:title><![CDATA[Microsoft Entra ID Sicherheitsluecke: Agent ID Administrator ermoeglichte Uebernahme von Service Principals]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/microsoft-entra-id-agent-id-administrator-vulnerability/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-03T09:38:00+00:00</news:publication_date>
			<news:title><![CDATA[Microsoft Entra ID Vulnerability in Agent ID Administrator Role Enabled Service Principal Takeover]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/es/silk-typhoon-hafnium-microsoft-exchange-ciberespionaje/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-03T06:50:00+00:00</news:publication_date>
			<news:title><![CDATA[Silk Typhoon y Hafnium: extradición de presunto hacker chino y ataques a Microsoft Exchange Server]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/ekstradytsiia-kytaiskoho-khakera-silk-typhoon-do-ssha/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-03T06:50:00+00:00</news:publication_date>
			<news:title><![CDATA[Екстрадиція підозрюваного хакера Silk Typhoon до США: кібершпигунство, Hafnium та уразливості Microsoft Exchange]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/silk-typhoon-hafnium-microsoft-exchange-usa-anklage/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-03T06:50:00+00:00</news:publication_date>
			<news:title><![CDATA[Silk Typhoon und Hafnium: Mutmasslicher chinesischer Hacker wegen Angriffen auf Microsoft Exchange und COVID-19-Forschung in den USA angeklagt]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/silk-typhoon-extradition-microsoft-exchange-hafnium/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-03T06:50:00+00:00</news:publication_date>
			<news:title><![CDATA[Silk Typhoon Suspect Extradited to the US: What the Microsoft Exchange and COVID‑19 Espionage Case Means for Cybersecurity]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/ekstradiciya-kitajskogo-hakera-silk-typhoon-v-ssha/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-03T06:50:00+00:00</news:publication_date>
			<news:title><![CDATA[Экстрадиция предполагаемого хакера Silk Typhoon в США: атаки на Microsoft Exchange и кража данных о COVID‑19]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/es/cve-2026-25874-vulnerabilidad-lerobot-hugging-face/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-02T15:08:00+00:00</news:publication_date>
			<news:title><![CDATA[CVE-2026-25874: crítica vulnerabilidad de ejecución remota de código en LeRobot de Hugging Face]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/cve-2026-25874-lerobot-hugging-face-vrazlyvist-rce/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-02T15:08:00+00:00</news:publication_date>
			<news:title><![CDATA[CVE-2026-25874 у Hugging Face LeRobot: критична уразливість віддаленого виконання коду]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/lerobot-cve-2026-25874-remote-code-execution-pickle/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-02T15:08:00+00:00</news:publication_date>
			<news:title><![CDATA[Kritische LeRobot-Sicherheitsluecke CVE-2026-25874: Remote-Code-Ausfuehrung durch unsichere Deserialisierung]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/cve-2026-25874-lerobot-remote-code-execution/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-02T15:08:00+00:00</news:publication_date>
			<news:title><![CDATA[Critical CVE-2026-25874 Remote Code Execution Vulnerability in Hugging Face LeRobot]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/kriticheskaya-uyazvimost-lerobot-cve-2026-25874/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-02T15:08:00+00:00</news:publication_date>
			<news:title><![CDATA[Критическая уязвимость CVE-2026-25874 в LeRobot от Hugging Face: удалённое выполнение кода через небезопасную десериализацию]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/ios-uyazvimost-uvedomleniya-signal-cve-2026-28950/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-02T10:19:00+00:00</news:publication_date>
			<news:title><![CDATA[Apple закрыла уязвимость iOS в системе уведомлений: как FBI смогла читать сообщения Signal]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/es/ios-vulnerabilidad-cve-2026-28950-notificaciones-signal/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-02T10:19:00+00:00</news:publication_date>
			<news:title><![CDATA[Apple corrige la vulnerabilidad CVE-2026-28950 que filtraba notificaciones borradas en iOS y iPadOS]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/kritychna-urazlyvist-ios-notification-services-cve-2026-28950/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-02T10:19:00+00:00</news:publication_date>
			<news:title><![CDATA[Критична уразливість iOS у службі сповіщень: як Apple виправила CVE-2026-28950]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/ios-sicherheitsluecke-push-benachrichtigungen-cve-2026-28950/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-02T10:19:00+00:00</news:publication_date>
			<news:title><![CDATA[iOS-Sicherheitsluecke: geloeschte Push-Benachrichtigungen blieben auf iPhones gespeichert]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/apple-ios-notification-services-bug-cve-2026-28950/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-02T10:19:00+00:00</news:publication_date>
			<news:title><![CDATA[Apple Fixes iOS Notification Services Bug That Exposed Deleted Signal Messages (CVE-2026-28950)]]></news:title>
		</news:news>
	</url>
</urlset>
<!-- XML Sitemap generated by Rank Math SEO Plugin (c) Rank Math - rankmath.com -->