<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//cybersecurefox.com/news-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-news/0.9 http://www.google.com/schemas/sitemap-news/0.9/sitemap-news.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
	<url>
		<loc>https://cybersecurefox.com/es/cve-2026-0300-vulnerabilidad-critica-pan-os-user-id-authentication-portal/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-13T10:03:00+00:00</news:publication_date>
			<news:title><![CDATA[CVE-2026-0300: explotación activa en PAN-OS]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/krytychna-vrazlyvist-cve-2026-0300-v-pan-os/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-13T10:03:00+00:00</news:publication_date>
			<news:title><![CDATA[Критична вразливість CVE-2026-0300 в Palo Alto PAN-OS]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/pan-os-cve-2026-0300-user-id-authentication-portal-2/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-13T10:03:00+00:00</news:publication_date>
			<news:title><![CDATA[PAN-OS Zero-Day CVE-2026-0300: Aktive Ausnutzung]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/palo-alto-pan-os-cve-2026-0300-active-exploitation/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-13T10:03:00+00:00</news:publication_date>
			<news:title><![CDATA[Palo Alto PAN-OS 0-day CVE-2026-0300 Actively Exploited]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/cve-2026-0300-pan-os-rce-aktivnaya-ekspluataciya/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-13T10:03:00+00:00</news:publication_date>
			<news:title><![CDATA[CVE-2026-0300: RCE в PAN-OS эксплуатируется в атаках]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/es/vulnerabilidades-criticas-vm2-escape-sandbox-nodejs/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-13T06:40:00+00:00</news:publication_date>
			<news:title><![CDATA[Vulnerabilidades críticas en vm2 permiten escape de sandbox]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/krytychni-vrazlyvosti-vm2-javascript-pisochnytsia/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-13T06:40:00+00:00</news:publication_date>
			<news:title><![CDATA[Критичні вразливості vm2: побіг з JavaScript-пісочниці]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/vm2-sandbox-escape-nodejs-sicherheitsluecke/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-13T06:40:00+00:00</news:publication_date>
			<news:title><![CDATA[Kritische vm2-Sicherheitslücken: Sandbox-Escape in Node.js]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/vm2-sandbox-escapes-cve-2026-22709/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-13T06:40:00+00:00</news:publication_date>
			<news:title><![CDATA[Critical vm2 Sandbox Escapes Expose Node.js Servers]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/kriticheskie-uyazvimosti-vm2-nodejs-pobeg-iz-pesochnicy/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-13T06:40:00+00:00</news:publication_date>
			<news:title><![CDATA[Уязвимости vm2: побег из песочницы Node.js (CVE-2026-22709)]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/pamdoora-linux-backdoor-pam-ssh-persistent-access/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-12T14:38:00+00:00</news:publication_date>
			<news:title><![CDATA[PamDOORa: новый Linux-бэкдор на базе PAM продаётся на форуме]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/es/backdoor-pamdoora-linux-pam-openssh/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-12T14:38:00+00:00</news:publication_date>
			<news:title><![CDATA[Nuevo backdoor PAM para Linux PamDOORa sale a la venta]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/pamdoora-linux-pam-bekdor/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-12T14:38:00+00:00</news:publication_date>
			<news:title><![CDATA[PamDOORa: новий бекдор для Linux на базі PAM-модулів]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/pamdoora-linux-pam-backdoor-ssh-zugang/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-12T14:38:00+00:00</news:publication_date>
			<news:title><![CDATA[PamDOORa: Neuer Linux-PAM-Backdoor im Untergrundmarkt]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/pamdoora-linux-pam-backdoor-flare-io-analysis/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-12T14:38:00+00:00</news:publication_date>
			<news:title><![CDATA[New PamDOORa Linux PAM Backdoor on Rehub Forum Exposed]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/es/cve-2026-23918-vulnerabilidad-critica-apache-http-server/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-12T10:00:00+00:00</news:publication_date>
			<news:title><![CDATA[CVE-2026-23918: vulnerabilidad crítica en Apache HTTP Server]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/kritychna-vrazlyvist-apache-http-server-cve-2026-23918/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-12T10:00:00+00:00</news:publication_date>
			<news:title><![CDATA[Критична вразливість Apache HTTP Server (CVE-2026-23918)]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/apache-http-server-cve-2026-23918-mod-http2-double-free/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-12T10:00:00+00:00</news:publication_date>
			<news:title><![CDATA[Kritische Apache HTTP Server Lücke CVE-2026-23918]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/apache-cve-2026-23918-http2-double-free/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-12T10:00:00+00:00</news:publication_date>
			<news:title><![CDATA[Apache fixes critical HTTP/2 double-free bug CVE-2026-23918]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/cve-2026-23918-double-free-apache-httpd-mod-http2-rce/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-12T10:00:00+00:00</news:publication_date>
			<news:title><![CDATA[CVE-2026-23918: double-free в Apache HTTP Server с RCE]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/es/botnet-mirai-xlabs-v1-adb-android-tv/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-12T07:26:00+00:00</news:publication_date>
			<news:title><![CDATA[Nuevo botnet Mirai xlabs_v1 explota ADB en Android TV]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/botnet-xlabs-v1-adb-5555-ddos/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-12T07:26:00+00:00</news:publication_date>
			<news:title><![CDATA[Ботнет xlabs_v1: DDoS через відкритий ADB-порт]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/mirai-botnet-xlabs-v1-android-adb-port-5555/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-12T07:26:00+00:00</news:publication_date>
			<news:title><![CDATA[Mirai-Botnet xlabs_v1 kapert Android- und IoT-Geräte]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/mirai-xlabs-v1-botnet-adb-android-ddos/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-12T07:26:00+00:00</news:publication_date>
			<news:title><![CDATA[Mirai-Based 'xlabs_v1' Botnet Targets ADB on Android]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/botnet-xlabs-v1-atakuet-android-ustrojstva-cherez-adb/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-12T07:26:00+00:00</news:publication_date>
			<news:title><![CDATA[Ботнет xlabs_v1 атакует Android-устройства через ADB]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/uyazimosti-cpanel-whm-cve-2026-29201-29202-29203/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-11T15:18:00+00:00</news:publication_date>
			<news:title><![CDATA[Три уязвимости в cPanel и WHM: патч от мая 2026]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/es/actualizaciones-seguridad-cpanel-whm-mayo-2026/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-11T15:18:00+00:00</news:publication_date>
			<news:title><![CDATA[cPanel corrige vulnerabilidades críticas en WHM y WP2]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/vrazlyvosti-cpanel-whm-wp-squared-2026/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-11T15:18:00+00:00</news:publication_date>
			<news:title><![CDATA[Критичні вразливості в cPanel та WHM: оновлення безпеки]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/cpanel-whm-sicherheitsupdates-drei-schwachstellen/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-11T15:18:00+00:00</news:publication_date>
			<news:title><![CDATA[cPanel/WHM: Sicherheitsupdates schließen drei Schwachstellen]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/cpanel-whm-wp-squared-security-update-three-cves/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-11T15:18:00+00:00</news:publication_date>
			<news:title><![CDATA[cPanel fixes three high-risk WHM and WP Squared flaws]]></news:title>
		</news:news>
	</url>
</urlset>
<!-- XML Sitemap generated by Rank Math SEO Plugin (c) Rank Math - rankmath.com -->