<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"><url><loc>https://www.cybermaterial.com/p/patchstack-bug-bounty-program</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-14T12:40:10+00:00</news:publication_date><news:title>Patchstack Bug Bounty Program</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/cybersecurity-of-critical-sectors</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-14T12:39:07+00:00</news:publication_date><news:title>Cybersecurity of Critical Sectors Handbook</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/australia-social-media-ban-faces</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-14T12:37:59+00:00</news:publication_date><news:title>Australia Social Media Ban Faces Questions</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/triad-nexus-evades-sanctions</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-14T12:36:40+00:00</news:publication_date><news:title>Triad Nexus Evades Sanctions</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/fifa-world-cup-2026-partners-expose</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-14T12:35:24+00:00</news:publication_date><news:title>FIFA World Cup 2026 Partners Expose Email Fraud Risk</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/web3-hacks-cost-464m-in-q1-2026</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-14T12:34:06+00:00</news:publication_date><news:title>Web3 hacks cost $464M in Q1 2026</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/google-adds-rust-dns-parser-to-pixel</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-14T12:33:11+00:00</news:publication_date><news:title>Google Adds Rust DNS Parser to Pixel Phones</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/rci-hospitality-reports-data-breach</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-14T12:31:39+00:00</news:publication_date><news:title>RCI Hospitality Reports Data Breach</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/bookingcom-confirms-data-breach</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-14T12:26:17+00:00</news:publication_date><news:title>Booking.com Confirms Data Breach</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/hackers-target-okta-with-vishing</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-14T12:23:55+00:00</news:publication_date><news:title>Hackers Target Okta with Vishing Attacks</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/hackers-exploit-obsidian-plugin-for</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-14T12:22:45+00:00</news:publication_date><news:title>Hackers Exploit Obsidian Plugin for Malware</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/cyber-briefing-20260413</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-13T14:03:38+00:00</news:publication_date><news:title>Cyber Briefing: 2026.04.13</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/univen-hackathon-promotes-cyber-security</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-13T13:28:01+00:00</news:publication_date><news:title>UNIVEN Hackathon Promotes Cyber Security Skills</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/uk-cyber-security-council-launches</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-13T13:27:11+00:00</news:publication_date><news:title>UK Cyber Security Council Launches Associate Title</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/uk-regulators-assess-ai-model-risks</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-13T13:26:03+00:00</news:publication_date><news:title>UK Regulators Assess AI Model Risks</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/dutch-police-arrest-8-in-identity</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-13T13:23:24+00:00</news:publication_date><news:title>Dutch police arrest 8 in identity fraud case</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/german-ddos-kingpin-arrested-in-thailand</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-13T13:20:53+00:00</news:publication_date><news:title>German DDoS Kingpin Arrested in Thailand</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/cisco-to-acquire-ai-startup-astrix</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-13T13:19:50+00:00</news:publication_date><news:title>Cisco to acquire AI startup Astrix for $350M</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/cloudcomputing-acquires-innovate</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-13T13:17:00+00:00</news:publication_date><news:title>Cloudcomputing Acquires Innovate IT</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/spring-lake-park-schools-ransomware</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-13T13:15:01+00:00</news:publication_date><news:title>Spring Lake Park Schools Ransomware Incident</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/handala-breaches-three-uae-organizations</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-13T13:14:13+00:00</news:publication_date><news:title>Handala breaches three UAE organizations</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/basic-fit-suffers-data-breach</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-13T13:12:58+00:00</news:publication_date><news:title>Basic-Fit Suffers Data Breach</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/critical-axios-vulnerability-enables</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-13T13:10:45+00:00</news:publication_date><news:title>Critical Axios Vulnerability Enables RCE</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/broken-access-control-in-gravity</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-13T13:08:40+00:00</news:publication_date><news:title>Broken Access Control in Gravity SMTP Plugin</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/apt37-uses-facebook-to-deliver-rokrat</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-13T13:06:28+00:00</news:publication_date><news:title>APT37 Uses Facebook to Deliver RokRAT</news:title></news:news></url></urlset>