<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"><url><loc>https://www.cybermaterial.com/p/google-shifts-bug-bounty-focus-toward</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-04T12:35:36+00:00</news:publication_date><news:title>Google Shifts Bug Bounty Focus Toward High Impact Exploits and Android Security</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/russian-cyber-operative-admits-to</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-04T12:34:43+00:00</news:publication_date><news:title>Russian cyber operative admits to sabotaging international energy infrastructure</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/ai-accelerates-vulnerability-discovery</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-04T12:33:39+00:00</news:publication_date><news:title>AI accelerates vulnerability discovery and forces rapid updates according to UK NCSC</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/salt-typhoon-linked-to-ibm-subsidiary</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-04T12:32:09+00:00</news:publication_date><news:title>Salt Typhoon Linked to IBM Subsidiary Breach</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/shinyhunters-targets-instructure</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-04T12:30:13+00:00</news:publication_date><news:title>ShinyHunters Targets Instructure in Massive Data Breach Affecting Millions</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/ubuntu-infrastructure-disruptions</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-04T12:29:18+00:00</news:publication_date><news:title>Ubuntu Infrastructure Disruptions Linked to Coordinated DDoS Campaign</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/cybercrime-syndicates-exploit-vishing</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-04T12:27:44+00:00</news:publication_date><news:title>Cybercrime Syndicates Exploit Vishing and SSO Vulnerabilities for High-Speed Cloud Extortion </news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/cisa-adds-major-linux-kernel-vulnerability</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-04T12:25:31+00:00</news:publication_date><news:title>CISA Adds Major Linux Kernel Vulnerability to Known Exploited Vulnerabilities Catalog</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/goldpickaxe</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-02T14:01:48+00:00</news:publication_date><news:title>GoldPickaxe</news:title></news:news></url></urlset>