<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//cybersecurefox.com/news-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-news/0.9 http://www.google.com/schemas/sitemap-news/0.9/sitemap-news.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
	<url>
		<loc>https://cybersecurefox.com/es/mcpwn-cve-2026-33032-vulnerabilidad-critica-nginx-ui/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-23T14:59:00+00:00</news:publication_date>
			<news:title><![CDATA[MCPwn (CVE-2026-33032): vulnerabilidad crítica en nginx-ui permite el control total de Nginx]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/kritychna-urazlyvist-nginx-ui-cve-2026-33032-mcpwn/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-23T14:59:00+00:00</news:publication_date>
			<news:title><![CDATA[Критична уразливість nginx-ui CVE-2026-33032 (MCPwn): обхід автентифікації та повний захоплення Nginx]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/kritische-sicherheitsluecke-nginx-ui-cve-2026-33032-mcpwn/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-23T14:59:00+00:00</news:publication_date>
			<news:title><![CDATA[Kritische Sicherheitsluecke MCPwn (CVE-2026-33032) in nginx-ui ermoeglicht komplette Uebernahme von Nginx-Servern]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/cve-2026-33032-nginx-ui-mcpwn-authentication-bypass/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-23T14:59:00+00:00</news:publication_date>
			<news:title><![CDATA[CVE-2026-33032: Critical nginx-ui MCPwn Authentication Bypass]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/kriticheskaya-uyazvimost-nginx-ui-cve-2026-33032/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-23T14:59:00+00:00</news:publication_date>
			<news:title><![CDATA[Критическая уязвимость nginx-ui CVE-2026-33032: обход аутентификации и полный захват Nginx]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/es/bloqueo-cuentas-windows-hardware-program-microsoft/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-23T10:01:00+00:00</news:publication_date>
			<news:title><![CDATA[Microsoft acelera la recuperación de cuentas bloqueadas en Windows Hardware Program]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/microsoft-blokuvannia-windows-hardware-program/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-23T10:01:00+00:00</news:publication_date>
			<news:title><![CDATA[Microsoft екстрено розблоковує акаунти Windows Hardware Program: ризики для підпису драйверів та кібербезпеки]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/microsoft-windows-hardware-programm-account-sperrung-treibersignierung/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-23T10:01:00+00:00</news:publication_date>
			<news:title><![CDATA[Microsoft reagiert auf Account-Sperrungen im Windows Hardware Program: Risiken für Treibersignierung und Cybersicherheit]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/windows-hardware-program-account-suspension-driver-signing/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-23T10:01:00+00:00</news:publication_date>
			<news:title><![CDATA[Microsoft Speeds Up Recovery for Windows Hardware Program Accounts After Driver Signing Disruption]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/microsoft-uskoryaet-vosstanovlenie-akkauntov-razrabotchikov/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-23T10:01:00+00:00</news:publication_date>
			<news:title><![CDATA[Microsoft ускоряет восстановление заблокированных аккаунтов разработчиков в Windows Hardware Program]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/zero-day-uyazvimosti-microsoft-defender-bluehammer-redsun-undefend/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-23T07:04:00+00:00</news:publication_date>
			<news:title><![CDATA[Zero‑day уязвимости в Microsoft Defender: эксплойты BlueHammer, RedSun и UnDefend уже используются в атаках]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/es/bluehammer-redsun-undefend-vulnerabilidades-microsoft-defender/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-23T07:04:00+00:00</news:publication_date>
			<news:title><![CDATA[BlueHammer, RedSun y UnDefend: nuevas vulnerabilidades zero‑day en Microsoft Defender ponen en riesgo Windows]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/bluehammer-redsun-undefend-microsoft-defender-zero-day/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-23T07:04:00+00:00</news:publication_date>
			<news:title><![CDATA[Уразливості BlueHammer, RedSun і UnDefend у Microsoft Defender: zero-day атаки та захист Windows]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/microsoft-defender-zero-day-bluehammer-redsun-undefend/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-23T07:04:00+00:00</news:publication_date>
			<news:title><![CDATA[Zero-Day-Luecken in Microsoft Defender: BlueHammer, RedSun und UnDefend werden aktiv ausgenutzt]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/microsoft-defender-zero-day-bluehammer-redsun-undefend/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-23T07:04:00+00:00</news:publication_date>
			<news:title><![CDATA[Active Exploitation of Microsoft Defender Zero‑Days: BlueHammer, RedSun and UnDefend]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/es/botnet-mirai-nexcorium-condi-tbk-dvr-tp-link/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-22T14:53:00+00:00</news:publication_date>
			<news:title><![CDATA[Botnets tipo Mirai explotan vulnerabilidades en TBK DVR y routers TP-Link: riesgos y defensa para la seguridad IoT]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/iot-botnet-mirai-nexcorium-condi-tbk-dvr-tp-link/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-22T14:53:00+00:00</news:publication_date>
			<news:title><![CDATA[Botnet Mirai, Nexcorium ta Condi: ataky cherez urazlyvi TBK DVR ta TP-Link routery]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/mirai-botnet-iot-angriffe-tbk-dvr-tp-link-router/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-22T14:53:00+00:00</news:publication_date>
			<news:title><![CDATA[Mirai-Botnet kehrt zurück: IoT-Angriffe auf TBK-DVR und TP-Link-Router]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/mirai-botnets-tbk-dvr-tp-link-router-vulnerabilities/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-22T14:53:00+00:00</news:publication_date>
			<news:title><![CDATA[Mirai Botnets Exploit TBK DVR and TP-Link Router Vulnerabilities]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/ekspluataciya-uazvimostei-tbk-dvr-tp-link-mirai-botnet/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-22T14:53:00+00:00</news:publication_date>
			<news:title><![CDATA[Ботнет Mirai атакует уязвимые TBK DVR и роутеры TP-Link: новые вариации Nexcorium и Condi]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/es/google-android-17-privacidad-contactos-geolocalizacion-gemini-publicidad-fraudulenta/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-22T09:30:00+00:00</news:publication_date>
			<news:title><![CDATA[Google refuerza la privacidad en Android 17 y despliega IA Gemini contra la publicidad fraudulenta]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/google-play-android-17-konfidentsiinist-gemini/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-22T09:30:00+00:00</news:publication_date>
			<news:title><![CDATA[Оновлена політика Google Play: посилений захист контактів, геолокації та боротьба з шахрайською рекламою за допомогою Gemini]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/android-17-google-play-datenschutz-contact-picker-gemini-werbung/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-22T09:30:00+00:00</news:publication_date>
			<news:title><![CDATA[Android 17: Neue Google-Play-Datenschutzrichtlinien, Contact Picker und KI-Schutz vor Fake-Werbung]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/google-play-android-17-privacy-gemini-ai-ad-fraud/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-22T09:30:00+00:00</news:publication_date>
			<news:title><![CDATA[Google Tightens Google Play Privacy Rules and Uses Gemini AI to Fight Fraudulent Ads]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/novye-pravila-google-play-android-17-privatnost-reklama/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-22T09:30:00+00:00</news:publication_date>
			<news:title><![CDATA[Новые правила Google Play: защита контактов, геолокации и борьба с мошеннической рекламой]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/ataka-cherez-obsidian-troyan-phantompulse/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-22T07:13:00+00:00</news:publication_date>
			<news:title><![CDATA[Атака через Obsidian: новая кампания социальной инженерии с трояном PHANTOMPULSE против финансового и криптовалютного сектора]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/es/ingenieria-social-obsidian-rat-phantompulse/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-22T07:13:00+00:00</news:publication_date>
			<news:title><![CDATA[Ataque de ingeniería social con Obsidian despliega RAT PHANTOMPULSE]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/ataka-cherez-obsidian-troyan-phantompulse/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-22T07:13:00+00:00</news:publication_date>
			<news:title><![CDATA[Атака через Obsidian: новий троян PHANTOMPULSE б’є по фінансовому сектору]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/obsidian-plugins-social-engineering-phantompulse-trojaner/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-22T07:13:00+00:00</news:publication_date>
			<news:title><![CDATA[Obsidian-Plugins als Angriffsvektor: PHANTOMPULSE-Trojaner zielt auf Finanz- und Kryptounternehmen]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/obsidian-plugins-malware-phantompulse-ref6598/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-22T07:13:00+00:00</news:publication_date>
			<news:title><![CDATA[Obsidian Note App Abused in Targeted Cyber Attack on Crypto and Financial Firms]]></news:title>
		</news:news>
	</url>
</urlset>
<!-- XML Sitemap generated by Rank Math SEO Plugin (c) Rank Math - rankmath.com -->