<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//cybersecurefox.com/news-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-news/0.9 http://www.google.com/schemas/sitemap-news/0.9/sitemap-news.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
	<url>
		<loc>https://cybersecurefox.com/es/vulnerabilidad-critica-mcp-model-context-protocol-rce-supply-chain-ia/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-26T15:16:00+00:00</news:publication_date>
			<news:title><![CDATA[Vulnerabilidad crítica en Model Context Protocol (MCP) expone a herramientas LLM a ejecución remota de código]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/krytychna-urazlyvist-mcp-rce-llm-ai-supply-chain/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-26T15:16:00+00:00</news:publication_date>
			<news:title><![CDATA[Критична уразливість MCP: RCE в екосистемі LLM та ризики для ланцюга постачання ІІ]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/mcp-sicherheitsluecke-rce-llm-ai-supply-chain/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-26T15:16:00+00:00</news:publication_date>
			<news:title><![CDATA[Kritische MCP-Sicherheitsluecke: Remote Code Execution bedroht LLM-Tools und AI-Supply-Chain]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/model-context-protocol-mcp-remote-code-execution-vulnerability/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-26T15:16:00+00:00</news:publication_date>
			<news:title><![CDATA[Critical Model Context Protocol (MCP) Vulnerability Enables Remote Code Execution in LLM Ecosystem]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/kriticheskaya-uiazvimost-mcp-anthropic-rce-ai-supply-chain/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-26T15:16:00+00:00</news:publication_date>
			<news:title><![CDATA[Критическая уязвимость в Model Context Protocol (MCP) Anthropic: риск RCE и атаки на цепочку поставок ИИ]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/es/ataques-credenciales-identidad-modelo-dair/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-26T10:06:00+00:00</news:publication_date>
			<news:title><![CDATA[Ataques a credenciales e identidad digital: cómo el modelo DAIR refuerza la respuesta a incidentes]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/kradeni-oblikovi-dani-model-dair-reaguvannia-na-kyberataky/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-26T10:06:00+00:00</news:publication_date>
			<news:title><![CDATA[Крадені облікові дані та модель DAIR: сучасний підхід до реагування на кібератаки]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/gestohlene-zugangsdaten-dair-incident-response-ki-angriffe/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-26T10:06:00+00:00</news:publication_date>
			<news:title><![CDATA[Gestohlene Zugangsdaten, KI-Angriffe und das DAIR-Modell: Moderne Strategien für Incident Response]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/stolen-credentials-dair-incident-response-ai/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-26T10:06:00+00:00</news:publication_date>
			<news:title><![CDATA[Stolen Credentials and the DAIR Model: Modern Incident Response for Identity-Based Attacks]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/identity-based-attacks-dair-incident-response/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-26T10:06:00+00:00</news:publication_date>
			<news:title><![CDATA[Атаки на учетные данные и динамический подход к реагированию на инциденты (DAIR)]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/novye-uyazvimosti-cisa-kev-cisco-sd-wan-teamcity-sonicwall/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-26T06:44:00+00:00</news:publication_date>
			<news:title><![CDATA[Новые уязвимости в каталоге CISA KEV: атаки на Cisco SD-WAN, TeamCity и корпоративные шлюзы]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/es/vulnerabilidades-cisa-kev-cisco-sd-wan-teamcity-sma/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-26T06:44:00+00:00</news:publication_date>
			<news:title><![CDATA[Vulnerabilidades explotadas en Cisco SD-WAN, TeamCity y SMA: nuevas alertas del catálogo CISA KEV]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/cisa-kev-novi-ekspluatovani-vrazlyvosti-cisco-sd-wan-teamcity-sma/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-26T06:44:00+00:00</news:publication_date>
			<news:title><![CDATA[CISA оновила каталог KEV: критичні вразливості в Cisco SD-WAN, JetBrains TeamCity та SMA]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/cisa-kev-acht-neue-ausgenutzte-sicherheitsluecken-cisco-sd-wan-teamcity-sma/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-26T06:44:00+00:00</news:publication_date>
			<news:title><![CDATA[CISA erweitert KEV-Katalog: Ausgenutzte Schwachstellen in Cisco SD-WAN, JetBrains TeamCity und SMA-VPN]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/cisa-kev-eight-exploited-vulnerabilities-cisco-sd-wan-teamcity-sma/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-26T06:44:00+00:00</news:publication_date>
			<news:title><![CDATA[CISA Adds Eight New Known Exploited Vulnerabilities, Spotlight on Cisco SD-WAN, TeamCity and SMA Gateways]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/es/cve-2026-34197-apache-activemq-classic-jolokia-explotacion-activa/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-25T14:42:00+00:00</news:publication_date>
			<news:title><![CDATA[CVE-2026-34197 en Apache ActiveMQ Classic: explotación activa, riesgos y cómo proteger tu infraestructura]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/cve-2026-34197-apache-activemq-classic-rce/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-25T14:42:00+00:00</news:publication_date>
			<news:title><![CDATA[CVE-2026-34197 в Apache ActiveMQ Classic: критична RCE‑уразливість, підтверджена CISA]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/apache-activemq-classic-cve-2026-34197-jolokia-rce/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-25T14:42:00+00:00</news:publication_date>
			<news:title><![CDATA[CVE-2026-34197 in Apache ActiveMQ Classic: CISA warnt vor aktiv ausgenutzter RCE-Schwachstelle]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/cve-2026-34197-apache-activemq-classic-jolokia-rce/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-25T14:42:00+00:00</news:publication_date>
			<news:title><![CDATA[Critical CVE-2026-34197 Apache ActiveMQ Classic Vulnerability Exploited via Jolokia]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/apache-activemq-classic-cve-2026-34197-udaljonnoe-vypolnenie-koda/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-25T14:42:00+00:00</news:publication_date>
			<news:title><![CDATA[Критическая уязвимость CVE-2026-34197 в Apache ActiveMQ Classic: атаки через Jolokia и удалённое выполнение кода]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/es/operation-poweroff-ddos-for-hire-booter-stresser/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-25T10:25:00+00:00</news:publication_date>
			<news:title><![CDATA[Operation PowerOFF: Europol desmantela servicios DDoS-for-hire y refuerza la lucha contra los booter]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/operation-poweroff-mizhnarodna-borotba-z-ddos-for-hire/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-25T10:25:00+00:00</news:publication_date>
			<news:title><![CDATA[Operation PowerOFF: міжнародна операція проти DDoS-for-hire сервісів і ризики для бізнесу]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/operation-poweroff-ddos-for-hire-booter-abschaltung/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-25T10:25:00+00:00</news:publication_date>
			<news:title><![CDATA[Operation PowerOFF: Internationaler Schlag gegen DDoS-for-Hire- und Booter-Services]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/operation-poweroff-ddos-for-hire-booter-takedown/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-25T10:25:00+00:00</news:publication_date>
			<news:title><![CDATA[Operation PowerOFF: Global Crackdown on DDoS‑for‑Hire Booter Services]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/ddos-for-hire-operaciya-poweroff-likvidaciya-booter-servisov/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-25T10:25:00+00:00</news:publication_date>
			<news:title><![CDATA[Международная операция PowerOFF: закрытие DDoS‑for‑hire сервисов и удар по рынку booter-атак]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/nist-nvd-cve-risk-based-prioritization/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-25T06:33:00+00:00</news:publication_date>
			<news:title><![CDATA[NIST меняет правила работы с уязвимостями CVE в NVD: переход к риск-ориентированному подходу]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/es/nvd-nist-priorizacion-cve-gestion-vulnerabilidades-riesgo/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-25T06:33:00+00:00</news:publication_date>
			<news:title><![CDATA[NIST cambia la NVD: priorización de CVE y gestión de vulnerabilidades basada en riesgo]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/nist-nvd-nova-priorytetyzatsiia-cve/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-25T06:33:00+00:00</news:publication_date>
			<news:title><![CDATA[NIST змінює правила NVD: новий ризик-орієнтований підхід до уразливостей CVE]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/nist-nvd-neue-cve-priorisierung-vulnerability-management/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-25T06:33:00+00:00</news:publication_date>
			<news:title><![CDATA[NIST aendert NVD-Regeln: Neue CVE-Priorisierung und Folgen fuer Vulnerability Management]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/nist-nvd-risk-based-vulnerability-prioritization/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-04-25T06:33:00+00:00</news:publication_date>
			<news:title><![CDATA[NIST Overhauls NVD Processing: Risk‑Based Prioritization for CVE Vulnerabilities]]></news:title>
		</news:news>
	</url>
</urlset>
<!-- XML Sitemap generated by Rank Math SEO Plugin (c) Rank Math - rankmath.com -->