<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//cybersecurefox.com/news-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-news/0.9 http://www.google.com/schemas/sitemap-news/0.9/sitemap-news.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
	<url>
		<loc>https://cybersecurefox.com/es/shadow-earth-053-shadowpad-glitter-carp-sequin-carp/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-06T14:51:00+00:00</news:publication_date>
			<news:title><![CDATA[ShadowPad y campañas chinas contra gobiernos y medios]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/shadow-earth-053-shadowpad-exchange-iis/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-06T14:51:00+00:00</news:publication_date>
			<news:title><![CDATA[Китайські APT SHADOW-EARTH-053 атакують Exchange &amp; IIS]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/china-cyberangriffe-shadowpad-exchange-iis-phishing/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-06T14:51:00+00:00</news:publication_date>
			<news:title><![CDATA[China-Cyberangriffe: ShadowPad zielt auf Exchange/IIS]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/chinese-apt-shadow-earth-053-shadowpad-exchange-iis/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-06T14:51:00+00:00</news:publication_date>
			<news:title><![CDATA[Chinese APT Shadow-Earth-053 exploits Exchange and IIS]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/shadow-earth-053-kampaniya-cherez-iis-exchange/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-06T14:51:00+00:00</news:publication_date>
			<news:title><![CDATA[Шпионаж SHADOW-EARTH-053 через IIS и Exchange]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/es/cve-2026-31431-copy-fail-linux-elevacion-privilegios/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-06T10:23:00+00:00</news:publication_date>
			<news:title><![CDATA[CVE-2026-31431: Copy Fail, elevación de privilegios en Linux]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/cisa-copy-fail-cve-2026-31431-linux-kernel/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-06T10:23:00+00:00</news:publication_date>
			<news:title><![CDATA[CISA підтвердила експлуатацію Copy Fail у ядрі Linux]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/linux-kernel-copy-fail-cve-2026-31431/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-06T10:23:00+00:00</news:publication_date>
			<news:title><![CDATA[Linux-Kernel-Exploit Copy Fail (CVE-2026-31431) aktiv]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/cisa-linux-copy-fail-cve-2026-31431/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-06T10:23:00+00:00</news:publication_date>
			<news:title><![CDATA[CISA Warns of Linux Kernel Copy Fail CVE-2026-31431]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/copy-fail-cve-2026-31431-linux-kev/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-06T10:23:00+00:00</news:publication_date>
			<news:title><![CDATA[Copy Fail (CVE-2026-31431): LPE в Linux уже эксплуатируется]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/vietnamskaya-kampaniya-google-appsheet-facebook/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-06T07:17:00+00:00</news:publication_date>
			<news:title><![CDATA[Вьетнамская кампания через Google AppSheet против Facebook]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/es/accountdumpling-phishing-appsheet-facebook-business/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-06T07:17:00+00:00</news:publication_date>
			<news:title><![CDATA[AccountDumpling: phishing en AppSheet contra Facebook]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/operatsiya-accountdumpling-phishing-facebook-business/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-06T07:17:00+00:00</news:publication_date>
			<news:title><![CDATA[AccountDumpling: фішинг через AppSheet проти Facebook]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/accountdumpling-appsheet-facebook-business-phishing/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-06T07:17:00+00:00</news:publication_date>
			<news:title><![CDATA[AccountDumpling: Phishing-Kampagne gegen Facebook Business]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/accountdumpling-google-appsheet-facebook-business-phishing/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-06T07:17:00+00:00</news:publication_date>
			<news:title><![CDATA[AccountDumpling Uses Google AppSheet to Hijack Facebook]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/es/ataques-npm-promptmink-paquetes-maliciosos-web3/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T15:01:00+00:00</news:publication_date>
			<news:title><![CDATA[Ataques a la cadena de suministro en npm: campaña PromptMink y paquetes maliciosos contra desarrolladores Web3]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/promptmink-npm-ataky-na-open-source-ta-web3/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T15:01:00+00:00</news:publication_date>
			<news:title><![CDATA[PromptMink: атаки через npm на open source та Web3‑розробників]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/promptmink-npm-supply-chain-angriff-open-source-web3/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T15:01:00+00:00</news:publication_date>
			<news:title><![CDATA[Nordkoreanische PromptMink-Kampagne: Supply-Chain-Angriffe auf npm, Open Source und Web3-Entwickler]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/promptmink-npm-supply-chain-attack-web3-developers/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T15:01:00+00:00</news:publication_date>
			<news:title><![CDATA[North Korean PromptMink Campaign Targets npm, Web3 Developers and Open Source Supply Chains]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/severnaya-koreya-npm-supply-chain-kriptokoshelki-promptmink/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T15:01:00+00:00</news:publication_date>
			<news:title><![CDATA[Северокорейская кампания PromptMink: вредоносные npm‑пакеты и кража криптовалюты через цепочку поставок ПО]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/es/ransomware-vect-2-0-wiper-error-criptografico/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T09:49:00+00:00</news:publication_date>
			<news:title><![CDATA[VECT 2.0: el falso ransomware que destruye datos por un error criptográfico]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/vect-2-0-ransomware-chi-vayper/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T09:49:00+00:00</news:publication_date>
			<news:title><![CDATA[VECT 2.0: псевдо-ransomware, що знищує дані замість шифрування]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/vect-2-0-ransomware-wiper-fehlerhafte-verschluesselung/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T09:49:00+00:00</news:publication_date>
			<news:title><![CDATA[VECT 2.0: Fehlkonstruierte Ransomware-as-a-Service entpuppt sich als Datenwiper]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/vect-2-0-ransomware-chacha20-encryption-flaw-wiper/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T09:49:00+00:00</news:publication_date>
			<news:title><![CDATA[VECT 2.0 Ransomware: Encryption Flaw Turns RaaS into Data-Wiping Wiper]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/vect-2-0-ransomware-kotoroe-unichtozhaet-dannye/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T09:49:00+00:00</news:publication_date>
			<news:title><![CDATA[VECT 2.0: псевдо‑рансомваре, которое безвозвратно уничтожает данные]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/kriticheskaya-uyazvimost-gemini-cli-i-cursor-rce-v-ci-cd/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T06:59:00+00:00</news:publication_date>
			<news:title><![CDATA[Критическая уязвимость в Google Gemini CLI и AI‑IDE Cursor: риск удалённого выполнения кода в CI/CD]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/es/vulnerabilidades-gemini-cli-cursor-ide-ai-seguridad/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T06:59:00+00:00</news:publication_date>
			<news:title><![CDATA[Vulnerabilidades críticas en Gemini CLI y Cursor IDE: RCE en CI/CD y riesgo para la cadena de suministro de software]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/kritichna-urazlyvist-gemini-cli-ta-ai-ide-cursor/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T06:59:00+00:00</news:publication_date>
			<news:title><![CDATA[Критична уразливість Gemini CLI та AI‑IDE Cursor]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/kritische-rce-sicherheitsluecke-in-google-gemini-cli-und-neue-angriffsvektoren-in-der-ai-ide-cursor/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T06:59:00+00:00</news:publication_date>
			<news:title><![CDATA[Kritische RCE-Sicherheitsluecke in Google Gemini CLI und neue Angriffsvektoren in der AI-IDE Cursor]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/gemini-cli-cursor-ide-critical-ai-security-vulnerabilities/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-05T06:59:00+00:00</news:publication_date>
			<news:title><![CDATA[Critical Gemini CLI and Cursor IDE Vulnerabilities Expose AI Development Security Risks]]></news:title>
		</news:news>
	</url>
</urlset>
<!-- XML Sitemap generated by Rank Math SEO Plugin (c) Rank Math - rankmath.com -->