<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"><url><loc>https://www.cybermaterial.com/p/university-of-arizona-leads-cyber</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-21T01:30:08+00:00</news:publication_date><news:title>University of Arizona leads cyber operations education</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/uk-gca-opens-29b-defense-tech-framework</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-21T01:28:10+00:00</news:publication_date><news:title>UK GCA Opens £2.9B Defense Tech Framework to SMEs</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/ai-driven-ddos-attacks-surge-738</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-21T01:26:57+00:00</news:publication_date><news:title>AI-Driven DDoS Attacks Surge 738% in Finance</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/malicious-vs-code-extension-breaches</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-21T01:23:36+00:00</news:publication_date><news:title>Malicious VS Code Extension Breaches GitHub</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/exiftool-cve-2026-3102-rce-via-image</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-21T01:20:12+00:00</news:publication_date><news:title>ExifTool CVE-2026-3102: RCE via Image Metadata</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/cyber-briefing-20260520</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-20T14:02:11+00:00</news:publication_date><news:title>Cyber Briefing: 2026.05.20</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/indiana-launches-military-aligned</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-20T12:10:18+00:00</news:publication_date><news:title>Indiana launches military-aligned cybersecurity pathway</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/nist-pnt-framework-strengthens-gps</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-20T12:04:18+00:00</news:publication_date><news:title>NIST PNT Framework Strengthens GPS Interference Defenses</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/according-to-sophos-71-of-orgs-hit</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-20T12:03:02+00:00</news:publication_date><news:title>According to Sophos 71% of orgs hit by identity breaches</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/baidam-and-auscert-sign-mou-for-cybersecurity</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-20T11:59:43+00:00</news:publication_date><news:title>Baidam and AUSCERT sign MOU for cybersecurity collaboration</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/tulane-university-data-breach-investigation</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-20T11:57:15+00:00</news:publication_date><news:title>Tulane University Data Breach Investigation</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/crafted-jpegs-trigger-php-memory</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-20T11:53:37+00:00</news:publication_date><news:title>Crafted JPEGs Trigger PHP Memory Bugs</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/ottercookie-rat-steals-dev-secrets</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-20T11:51:39+00:00</news:publication_date><news:title>OtterCookie RAT Steals Dev Secrets and Cloud Credentials</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/cyber-briefing-20260519</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-05-19T14:00:51+00:00</news:publication_date><news:title>Cyber Briefing: 2026.05.19</news:title></news:news></url></urlset>