<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//cybersecurefox.com/news-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-news/0.9 http://www.google.com/schemas/sitemap-news/0.9/sitemap-news.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
	<url>
		<loc>https://cybersecurefox.com/es/cve-2025-59528-vulnerabilidad-critica-flowise-ia/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-10T14:47:00+00:00</news:publication_date>
			<news:title><![CDATA[CVE-2025-59528 en Flowise: vulnerabilidad crítica expone plataformas de IA corporativas]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/flowise-cve-2025-59528-krytychna-urazlyvist/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-10T14:47:00+00:00</news:publication_date>
			<news:title><![CDATA[Критична уразливість Flowise CVE-2025-59528 (CVSS 10.0): ризики для бізнесу та захист ІІ-платформ]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/flowise-cve-2025-59528-kritische-sicherheitsluecke-rce/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-10T14:47:00+00:00</news:publication_date>
			<news:title><![CDATA[Kritische Flowise-Sicherheitsluecke CVE-2025-59528: Remote Code Execution in KI-Plattform]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/flowise-cve-2025-59528-critical-rce-vulnerability/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-10T14:47:00+00:00</news:publication_date>
			<news:title><![CDATA[Critical Flowise Vulnerability CVE-2025-59528 Enables Full Remote Code Execution on AI Servers]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/kriticheskaya-uyazvimost-cve-2025-59528-flowise-rce/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-10T14:47:00+00:00</news:publication_date>
			<news:title><![CDATA[Flowise и CVE-2025-59528: критическая RCE-уязвимость в платформе ИИ]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/es/ataques-password-spraying-microsoft-365-iran-pay2key/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-10T12:57:00+00:00</news:publication_date>
			<news:title><![CDATA[Ataques de password spraying contra Microsoft 365 vinculados a Irán: análisis, ransomware Pay2Key y defensas clave]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/masshtabni-password-spraying-ataky-na-microsoft-365/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-10T12:57:00+00:00</news:publication_date>
			<news:title><![CDATA[Масштабні password spraying-атаки на Microsoft 365: іранський слід, Pay2Key та BQTLock]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/massive-password-spraying-angriffe-microsoft-365-iranische-hacker/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-10T12:57:00+00:00</news:publication_date>
			<news:title><![CDATA[Massive Password-Spraying-Angriffe auf Microsoft 365: Iran-nahe Hacker zielen auf Cloud-Konten]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/iran-linked-password-spraying-attacks-microsoft-365-pay2key-bqtlock/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-10T12:57:00+00:00</news:publication_date>
			<news:title><![CDATA[Iran-Linked Password Spraying Campaign Targets Microsoft 365 and Fuels New Ransomware Wave]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/iran-cyberattack-microsoft-365-pay2key-ransomware/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-10T12:57:00+00:00</news:publication_date>
			<news:title><![CDATA[Иранская киберкампания против Microsoft 365 и эволюция вымогательского ПО Pay2Key]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/es/ta416-ciberespionaje-ue-otan-plugx/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-10T09:55:00+00:00</news:publication_date>
			<news:title><![CDATA[TA416 reanuda campañas de ciberespionaje contra la UE y la OTAN con PlugX y técnicas avanzadas]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/kitajskaya-hakerskaya-gruppa-ta416-atakuet-evropejskie-pravitelstva/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-10T09:55:00+00:00</news:publication_date>
			<news:title><![CDATA[Китайская хакерская группа TA416 возобновила кибершпионаж против правительств ЕС и НАТО с использованием PlugX и OAuth-атак]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/chinese-cyber-espionage-ta416-targets-eu-nato-middle-east/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-10T09:55:00+00:00</news:publication_date>
			<news:title><![CDATA[Chinese Cyber-Espionage Group TA416 Renews Attacks on EU, NATO and Middle East]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/ta416-chinesische-cyberspionage-eu-nato-naher-osten/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-10T09:55:00+00:00</news:publication_date>
			<news:title><![CDATA[TA416: Chinesische Cyberspionage gegen EU, NATO und Nahost]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/ta416-kytajska-kibershpionazhna-hrupa-es-nato/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-10T09:55:00+00:00</news:publication_date>
			<news:title><![CDATA[TA416: китайська кібершпіонажна група проти ЄС і НАТО]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/es/ataque-supply-chain-axios-npm-unc1069/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-10T06:54:00+00:00</news:publication_date>
			<news:title><![CDATA[Ataque a la cadena de suministro compromete Axios, uno de los paquetes npm más usados]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/supply-chain-ataka-na-npm-paket-axios/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-10T06:54:00+00:00</news:publication_date>
			<news:title><![CDATA[Supply chain атака на npm-пакет Axios: соціальна інженерія проти JavaScript-екосистеми]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/gezielter-supply-chain-angriff-auf-axios-npm/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-10T06:54:00+00:00</news:publication_date>
			<news:title><![CDATA[Gezielter Supply-Chain-Angriff auf Axios: Wie eine Social-Engineering-Kampagne die npm-Sicherheit erschütterte]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/axios-npm-supply-chain-attack-unc1069-ghostcall/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-10T06:54:00+00:00</news:publication_date>
			<news:title><![CDATA[Axios npm Package Hit by Sophisticated Supply Chain Attack Linked to UNC1069]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/komprometatsiya-axios-npm-supply-chain-ata-unc1069/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-10T06:54:00+00:00</news:publication_date>
			<news:title><![CDATA[Компрометация npm-пакета Axios: таргетированная supply chain атака группировки UNC1069 из КНДР]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/strapi-supply-chain-angriff-malizioese-npm-pakete/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-09T15:26:00+00:00</news:publication_date>
			<news:title><![CDATA[Strapi-Supply-Chain-Angriff: 36 malizioese npm-Pakete zielen auf Redis, PostgreSQL und CI/CD-Umgebungen]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/es/ataque-cadena-suministro-npm-paquetes-maliciosos-strapi/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-09T15:26:00+00:00</news:publication_date>
			<news:title><![CDATA[Ataque a la cadena de suministro: 36 paquetes npm maliciosos que suplantan plugins de Strapi]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/npm-strapi-supply-chain/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-09T15:26:00+00:00</news:publication_date>
			<news:title><![CDATA[Шкідливі npm-пакети Strapi: нова supply chain атака на ланцюг постачання ПЗ]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/malicious-npm-strapi-plugins-supply-chain-attack/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-09T15:26:00+00:00</news:publication_date>
			<news:title><![CDATA[Malicious npm Strapi Plugins Expose Software Supply Chain Risks]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/vredonosnye-npm-pakety-strapi-supply-chain-ataka/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-09T15:26:00+00:00</news:publication_date>
			<news:title><![CDATA[Вредоносные пакеты npm под видом плагинов Strapi: новая supply chain атака на разработчиков]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/es/ciberataques-norcoreanos-github-dropbox-c2/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-09T14:47:00+00:00</news:publication_date>
			<news:title><![CDATA[Ciberataques norcoreanos: abuso de GitHub y Dropbox como infraestructura C2 en campañas avanzadas]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/apt-github-dropbox-c2-lnk-powershell/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-09T14:47:00+00:00</news:publication_date>
			<news:title><![CDATA[Північнокорейські APT використовують GitHub і Dropbox як C2: аналіз ланцюжків атак через LNK та PowerShell]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/nordkorea-apt-github-dropbox-c2-powershell-lnk/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-09T14:47:00+00:00</news:publication_date>
			<news:title><![CDATA[Nordkoreanische APT-Gruppen missbrauchen GitHub und Dropbox als C2-Infrastruktur]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/north-korean-apts-github-dropbox-c2/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-09T14:47:00+00:00</news:publication_date>
			<news:title><![CDATA[North Korean APTs Abuse GitHub and Dropbox as Stealthy Command-and-Control Infrastructure]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/severokorejskie-hakery-github-dropbox-c2-ataki/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-09T14:47:00+00:00</news:publication_date>
			<news:title><![CDATA[Северокорейские хакеры используют GitHub и Dropbox как C2 в целевых атаках на Южную Корею]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/linux-cookie-controlled-php-web-shell-attacks/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-09T09:59:00+00:00</news:publication_date>
			<news:title><![CDATA[Linux Servers Hit by Cookie-Controlled PHP Web Shell Attacks | Cookie-Gated Execution Explained]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/linux-php-web-shell-cookie-based-attack/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-09T09:59:00+00:00</news:publication_date>
			<news:title><![CDATA[Новая техника атак на Linux: скрытые PHP web shell с управлением через cookies]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/cookie-gesteuerte-php-webshells-linux-server-sicherheit/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-09T09:59:00+00:00</news:publication_date>
			<news:title><![CDATA[Cookie-gesteuerte PHP-Webshells: Neue Angriffe auf Linux-Server]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/cookie-based-php-web-shell-na-linux-serverah/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-09T09:59:00+00:00</news:publication_date>
			<news:title><![CDATA[Cookie-based PHP web shell: новий вектор атак на Linux-сервери через HTTP cookies]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/es/ataques-web-shell-php-cookies-linux/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-09T09:59:00+00:00</news:publication_date>
			<news:title><![CDATA[Aumento de ataques a servidores Linux con web shells PHP controlados por cookies HTTP]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/es/drift-protocol-hack-solana-corea-del-norte/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-09T06:50:00+00:00</news:publication_date>
			<news:title><![CDATA[Hack a Drift Protocol en Solana: análisis del ataque DeFi vinculado a Corea del Norte]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/vzlom-drift-protocol-solana-defi-social-engineering-dprk/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-09T06:50:00+00:00</news:publication_date>
			<news:title><![CDATA[Взлом Drift Protocol на Solana: аналіз атаки на DeFi, соціальної інженерії та північнокорейського сліду]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/drift-protocol-hack-solana-defi-nordkorea/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-09T06:50:00+00:00</news:publication_date>
			<news:title><![CDATA[Drift-Protocol-Hack auf Solana: 285 Mio. Dollar Verlust durch Social Engineering und DeFi-Governance-Schwachstellen]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/drift-protocol-hack-solana-durable-nonce-dprk/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-09T06:50:00+00:00</news:publication_date>
			<news:title><![CDATA[Drift Protocol Hack on Solana: How a Durable Nonce Exploit Enabled a $285M DeFi Heist]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/vzlom-drift-solana-285m-severnaya-koreya/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-09T06:50:00+00:00</news:publication_date>
			<news:title><![CDATA[Взлом DeFi-платформы Drift на Solana: утечка 285 млн $, северокорейский след и провал мультиподписи]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/krossplatformennye-ataki-any-run-sandbox/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-08T15:25:00+00:00</news:publication_date>
			<news:title><![CDATA[Кроссплатформенные атаки: как ANY.RUN Sandbox помогает SOC закрыть пробелы в защите Windows, macOS и Linux]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/es/ataques-multi-os-sandbox-any-run/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-08T15:25:00+00:00</news:publication_date>
			<news:title><![CDATA[Ataques multi-OS y sandbox ANY.RUN: cómo enfrentar campañas multiplataforma en Windows, macOS y Linux]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/krosplatformeni-ataky-windows-macos-linux-any-run-clickfix-amos-stealer/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-08T15:25:00+00:00</news:publication_date>
			<news:title><![CDATA[Кросплатформені атаки на Windows, macOS і Linux: як ANY.RUN допомагає SOC скоротити час розслідування]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/multi-os-angriffe-any-run-sandbox/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-08T15:25:00+00:00</news:publication_date>
			<news:title><![CDATA[Multi-OS-Angriffe: Warum krosplattform Sandboxes wie ANY.RUN fuer moderne SOCs entscheidend sind]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/cross-platform-malware-analysis-multi-os-attacks/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-08T15:25:00+00:00</news:publication_date>
			<news:title><![CDATA[Why SOC Teams Need Cross-Platform Malware Analysis to Stop Multi-OS Attacks]]></news:title>
		</news:news>
	</url>
</urlset>
<!-- XML Sitemap generated by Rank Math SEO Plugin (c) Rank Math - rankmath.com -->