<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//cybersecurefox.com/news-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-news/0.9 http://www.google.com/schemas/sitemap-news/0.9/sitemap-news.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
	<url>
		<loc>https://cybersecurefox.com/es/ollama-bleeding-llama-rce-persistente-windows/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-11T07:08:00+00:00</news:publication_date>
			<news:title><![CDATA[Ollama: fallos críticos Bleeding Llama y RCE en Windows]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/kritychni-vrazlyvosti-ollama-bleeding-llama-rce/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-11T07:08:00+00:00</news:publication_date>
			<news:title><![CDATA[Критичні вразливості в Ollama: Bleeding Llama та RCE]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/ollama-bleeding-llama-windows-auto-update-rce/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-11T07:08:00+00:00</news:publication_date>
			<news:title><![CDATA[Kritische Ollama-Luecke: Bleeding Llama &amp; Windows-RCE]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/ollama-bleeding-llama-memory-leak-windows-rce/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-11T07:08:00+00:00</news:publication_date>
			<news:title><![CDATA[Ollama Bleeding Llama Memory Leak and Windows RCE Flaws]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/kriticheskie-uyazvimosti-ollama-bleeding-llama-rce/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-11T07:08:00+00:00</news:publication_date>
			<news:title><![CDATA[Критические уязвимости Ollama: Bleeding Llama и RCE]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/es/cve-2026-0300-vulnerabilidad-critica-pan-os-user-id-portal/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-10T14:52:00+00:00</news:publication_date>
			<news:title><![CDATA[CVE-2026-0300: fallo crítico en PAN-OS explotado en la red]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/cve-2026-0300-palo-alto-pan-os-user-id-portal/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-10T14:52:00+00:00</news:publication_date>
			<news:title><![CDATA[Критична вразливість CVE-2026-0300 в Palo Alto PAN-OS]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/pan-os-cve-2026-0300-user-id-authentication-portal/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-10T14:52:00+00:00</news:publication_date>
			<news:title><![CDATA[Kritische PAN-OS-Lücke CVE-2026-0300 im User-ID-Portal]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/palo-alto-pan-os-cve-2026-0300-user-id-rce/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-10T14:52:00+00:00</news:publication_date>
			<news:title><![CDATA[CVE-2026-0300: Critical PAN-OS User-ID RCE Vulnerability]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/kriticheskaya-uyazvimost-pan-os-cve-2026-0300/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-10T14:52:00+00:00</news:publication_date>
			<news:title><![CDATA[Критическая RCE в PAN-OS: эксплойт уже используется]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/cve-2026-29014-metinfo-cms-rce/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-10T10:22:00+00:00</news:publication_date>
			<news:title><![CDATA[Критическая RCE в MetInfo CMS уже активно эксплуатируется]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/es/cve-2026-29014-rce-critica-metinfo-cms-wechat/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-10T10:22:00+00:00</news:publication_date>
			<news:title><![CDATA[CVE-2026-29014: RCE crítica en MetInfo CMS vía WeChat]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/cve-2026-29014-krytychna-rce-vrazlyvist-metinfo-cms/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-10T10:22:00+00:00</news:publication_date>
			<news:title><![CDATA[CVE-2026-29014: критична RCE-вразливість у MetInfo CMS]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/metinfo-cms-cve-2026-29014-kritische-rce-luecke/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-10T10:22:00+00:00</news:publication_date>
			<news:title><![CDATA[Kritische RCE-Lücke CVE-2026-29014 in MetInfo CMS]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/cve-2026-29014-metinfo-cms-rce-wechat/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-10T10:22:00+00:00</news:publication_date>
			<news:title><![CDATA[CVE-2026-29014: Critical RCE Flaw in MetInfo CMS Exploited]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/es/muddywater-chaos-ransomware-ataques-microsoft-teams/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-10T06:58:00+00:00</news:publication_date>
			<news:title><![CDATA[MuddyWater se hace pasar por Chaos en ataques vía Teams]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/muddywater-chaos-microsoft-teams-spy-sabotage/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-10T06:58:00+00:00</news:publication_date>
			<news:title><![CDATA[MuddyWater маскується під Chaos через атаки в Microsoft Teams]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/muddywater-chaos-ransomware-teams-espionage/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-10T06:58:00+00:00</news:publication_date>
			<news:title><![CDATA[MuddyWater Masquerades as Chaos Ransomware in Teams]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/muddywater-chaos-ransomware-false-flag/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-10T06:58:00+00:00</news:publication_date>
			<news:title><![CDATA[Иранская MuddyWater маскирует кибершпионаж под Chaos‑ransomware]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/es/pcpjack-robo-credenciales-cloud-docker-kubernetes/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-09T14:59:00+00:00</news:publication_date>
			<news:title><![CDATA[PCPJack: nuevo framework para robo de credenciales cloud]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/pcpjack-kradizhka-khmarnih-oblikovykh-danyh/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-09T14:59:00+00:00</news:publication_date>
			<news:title><![CDATA[PCPJack: новий фреймворк крадіжки хмарних обліковок]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/pcpjack-framework-cloud-zugangsdaten-diebstahl/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-09T14:59:00+00:00</news:publication_date>
			<news:title><![CDATA[PCPJack: Neuer Stealer zielt auf offene Cloud-Dienste]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/pcpjack-cloud-credential-theft-framework/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-09T14:59:00+00:00</news:publication_date>
			<news:title><![CDATA[PCPJack: New Framework for Cloud Credential Theft]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/pcpjack-krazha-oblachnyh-uchetok-i-vytesnenie-teampcp/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-09T14:59:00+00:00</news:publication_date>
			<news:title><![CDATA[PCPJack вытесняет TeamPCP из облака и охотится за ключами]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/ru/dirty-frag-lpe-v-yadre-linux/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-09T09:54:00+00:00</news:publication_date>
			<news:title><![CDATA[Новая LPE Dirty Frag в ядре Linux обходит защиту]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/es/dirty-frag-vulnerabilidad-kernel-linux-root/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-09T09:54:00+00:00</news:publication_date>
			<news:title><![CDATA[Dirty Frag: nueva vulnerabilidad crítica en el kernel Linux]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/uk/dirty-frag-lpe-vrazlyvist-yadra-linux/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-09T09:54:00+00:00</news:publication_date>
			<news:title><![CDATA[Dirty Frag: вразливість локального підвищення прав у Linux]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/de/dirty-frag-linux-root-privilegieneskalation/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-09T09:54:00+00:00</news:publication_date>
			<news:title><![CDATA[Dirty Frag: Neue Linux-Root-Exploit-Schwachstelle ohne Fix]]></news:title>
		</news:news>
	</url>
	<url>
		<loc>https://cybersecurefox.com/en/dirty-frag-linux-kernel-local-privilege-escalation/</loc>
		<news:news>
			<news:publication>
				<news:name>CyberSecureFox</news:name>
				<news:language>en</news:language>
			</news:publication>
			<news:publication_date>2026-05-09T09:54:00+00:00</news:publication_date>
			<news:title><![CDATA[Dirty Frag: New Linux Kernel Local Privilege Escalation]]></news:title>
		</news:news>
	</url>
</urlset>
<!-- XML Sitemap generated by Rank Math SEO Plugin (c) Rank Math - rankmath.com -->