<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//cybersecurefox.com/news-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-news/0.9 http://www.google.com/schemas/sitemap-news/0.9/sitemap-news.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
	<url>
		<loc>https://cybersecurefox.com/es/cve-2026-23918-vulnerabilidad-critica-apache-http-server/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-12T10:00:00+00:00</news:publication_date>
			<news:title><![CDATA[CVE-2026-23918: vulnerabilidad crítica en Apache HTTP Server]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/kritychna-vrazlyvist-apache-http-server-cve-2026-23918/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-12T10:00:00+00:00</news:publication_date>
			<news:title><![CDATA[Критична вразливість Apache HTTP Server (CVE-2026-23918)]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/apache-http-server-cve-2026-23918-mod-http2-double-free/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-12T10:00:00+00:00</news:publication_date>
			<news:title><![CDATA[Kritische Apache HTTP Server Lücke CVE-2026-23918]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/apache-cve-2026-23918-http2-double-free/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-12T10:00:00+00:00</news:publication_date>
			<news:title><![CDATA[Apache fixes critical HTTP/2 double-free bug CVE-2026-23918]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/cve-2026-23918-double-free-apache-httpd-mod-http2-rce/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-12T10:00:00+00:00</news:publication_date>
			<news:title><![CDATA[CVE-2026-23918: double-free в Apache HTTP Server с RCE]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/es/botnet-mirai-xlabs-v1-adb-android-tv/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-12T07:26:00+00:00</news:publication_date>
			<news:title><![CDATA[Nuevo botnet Mirai xlabs_v1 explota ADB en Android TV]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/botnet-xlabs-v1-adb-5555-ddos/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-12T07:26:00+00:00</news:publication_date>
			<news:title><![CDATA[Ботнет xlabs_v1: DDoS через відкритий ADB-порт]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/mirai-botnet-xlabs-v1-android-adb-port-5555/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-12T07:26:00+00:00</news:publication_date>
			<news:title><![CDATA[Mirai-Botnet xlabs_v1 kapert Android- und IoT-Geräte]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/mirai-xlabs-v1-botnet-adb-android-ddos/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-12T07:26:00+00:00</news:publication_date>
			<news:title><![CDATA[Mirai-Based 'xlabs_v1' Botnet Targets ADB on Android]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/botnet-xlabs-v1-atakuet-android-ustrojstva-cherez-adb/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-12T07:26:00+00:00</news:publication_date>
			<news:title><![CDATA[Ботнет xlabs_v1 атакует Android-устройства через ADB]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/uyazimosti-cpanel-whm-cve-2026-29201-29202-29203/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-11T15:18:00+00:00</news:publication_date>
			<news:title><![CDATA[Три уязвимости в cPanel и WHM: патч от мая 2026]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/es/actualizaciones-seguridad-cpanel-whm-mayo-2026/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-11T15:18:00+00:00</news:publication_date>
			<news:title><![CDATA[cPanel corrige vulnerabilidades críticas en WHM y WP2]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/vrazlyvosti-cpanel-whm-wp-squared-2026/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-11T15:18:00+00:00</news:publication_date>
			<news:title><![CDATA[Критичні вразливості в cPanel та WHM: оновлення безпеки]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/cpanel-whm-sicherheitsupdates-drei-schwachstellen/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-11T15:18:00+00:00</news:publication_date>
			<news:title><![CDATA[cPanel/WHM: Sicherheitsupdates schließen drei Schwachstellen]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/cpanel-whm-wp-squared-security-update-three-cves/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-11T15:18:00+00:00</news:publication_date>
			<news:title><![CDATA[cPanel fixes three high-risk WHM and WP Squared flaws]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/callphantom-goldfactory-mobilne-shahraistvo-apac/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-11T09:56:00+00:00</news:publication_date>
			<news:title><![CDATA[CallPhantom і GoldFactory: нові мобільні шахрайські кампанії]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/callphantom-goldfactory-mobiler-betrug-apac/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-11T09:56:00+00:00</news:publication_date>
			<news:title><![CDATA[CallPhantom &amp; GoldFactory: Mobiler Betrug in der APAC]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/callphantom-goldfactory-mobile-fraud-apac/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-11T09:56:00+00:00</news:publication_date>
			<news:title><![CDATA[CallPhantom and GoldFactory: Mobile Fraud in APAC]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/callphantom-goldfactory-android-moshennichestvo/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-11T09:56:00+00:00</news:publication_date>
			<news:title><![CDATA[CallPhantom и GoldFactory: масштабное Android-мошенничество]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/es/ollama-bleeding-llama-rce-persistente-windows/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-11T07:08:00+00:00</news:publication_date>
			<news:title><![CDATA[Ollama: fallos críticos Bleeding Llama y RCE en Windows]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/kritychni-vrazlyvosti-ollama-bleeding-llama-rce/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-11T07:08:00+00:00</news:publication_date>
			<news:title><![CDATA[Критичні вразливості в Ollama: Bleeding Llama та RCE]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/ollama-bleeding-llama-windows-auto-update-rce/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-11T07:08:00+00:00</news:publication_date>
			<news:title><![CDATA[Kritische Ollama-Luecke: Bleeding Llama &amp; Windows-RCE]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/ollama-bleeding-llama-memory-leak-windows-rce/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-11T07:08:00+00:00</news:publication_date>
			<news:title><![CDATA[Ollama Bleeding Llama Memory Leak and Windows RCE Flaws]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/kriticheskie-uyazvimosti-ollama-bleeding-llama-rce/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-11T07:08:00+00:00</news:publication_date>
			<news:title><![CDATA[Критические уязвимости Ollama: Bleeding Llama и RCE]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/kriticheskaya-uyazvimost-pan-os-cve-2026-0300/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-10T14:52:00+00:00</news:publication_date>
			<news:title><![CDATA[Критическая RCE в PAN-OS: эксплойт уже используется]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/es/cve-2026-0300-vulnerabilidad-critica-pan-os-user-id-portal/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-10T14:52:00+00:00</news:publication_date>
			<news:title><![CDATA[CVE-2026-0300: fallo crítico en PAN-OS explotado en la red]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/cve-2026-0300-palo-alto-pan-os-user-id-portal/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-10T14:52:00+00:00</news:publication_date>
			<news:title><![CDATA[Критична вразливість CVE-2026-0300 в Palo Alto PAN-OS]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/pan-os-cve-2026-0300-user-id-authentication-portal/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-10T14:52:00+00:00</news:publication_date>
			<news:title><![CDATA[Kritische PAN-OS-Lücke CVE-2026-0300 im User-ID-Portal]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/palo-alto-pan-os-cve-2026-0300-user-id-rce/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-10T14:52:00+00:00</news:publication_date>
			<news:title><![CDATA[CVE-2026-0300: Critical PAN-OS User-ID RCE Vulnerability]]></news:title>
		</news:news>
	</url>
</urlset>
<!-- XML Sitemap generated by Rank Math SEO Plugin (c) Rank Math - rankmath.com -->