<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"><url><loc>https://www.cybermaterial.com/p/cyber-briefing-20260429</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T14:02:53+00:00</news:publication_date><news:title>Cyber Briefing: 2026.04.29</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/pentagon-launches-cyber-apprenticeship</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T12:23:17+00:00</news:publication_date><news:title>Pentagon launches cyber apprenticeship program</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/canada-proposes-crypto-atm-ban</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T12:22:20+00:00</news:publication_date><news:title>Canada proposes crypto ATM ban</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/meta-faces-eu-dsa-violations</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T12:21:19+00:00</news:publication_date><news:title>Meta Faces EU DSA Violations</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/malwarebytes-integrates-with-claude</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T12:20:10+00:00</news:publication_date><news:title>Malwarebytes integrates with Claude for scam checks</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/polymarket-denies-data-breach-claims</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T12:18:12+00:00</news:publication_date><news:title>Polymarket denies data breach claims</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/checkmarx-data-stolen-in-supply-chain</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T12:15:33+00:00</news:publication_date><news:title>Checkmarx Data Stolen in Supply Chain Attack</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/github-fixes-critical-remote-code</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T12:13:29+00:00</news:publication_date><news:title>GitHub fixes critical remote code execution flaw</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/critical-flaw-in-vect-ransomware</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-29T12:11:48+00:00</news:publication_date><news:title>Critical Flaw in Vect Ransomware</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/cyber-briefing-20260428</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-28T14:03:14+00:00</news:publication_date><news:title>Cyber Briefing: 2026.04.28</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/cybersecurity-professionals-feel</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-28T12:44:17+00:00</news:publication_date><news:title>Cybersecurity Professionals Feel Undervalued</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/us-companies-face-record-privacy</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-28T12:42:39+00:00</news:publication_date><news:title>U.S. Companies Face Record Privacy Fines in 2025</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/dora-and-operational-resilience</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-28T12:41:30+00:00</news:publication_date><news:title>DORA and Operational Resilience</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/proofpoint-ai-incident-report-2026</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-28T12:40:43+00:00</news:publication_date><news:title>Proofpoint AI Incident Report 2026</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/chinese-engineer-stole-us-military</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-28T12:34:56+00:00</news:publication_date><news:title>Chinese Engineer Stole US Military Software</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/medtronic-confirms-data-breach</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-28T12:33:54+00:00</news:publication_date><news:title>Medtronic Confirms Data Breach</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/itron-discloses-security-breach</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-28T12:31:38+00:00</news:publication_date><news:title>Itron discloses security breach</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/sandworm-uses-ssh-over-tor-tunnel</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-28T12:29:47+00:00</news:publication_date><news:title>Sandworm Uses SSH-over-Tor Tunnel</news:title></news:news></url><url><loc>https://www.cybermaterial.com/p/fake-captcha-scam-leads-to-costly</loc><news:news><news:publication><news:name>CyberMaterial</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-28T12:27:59+00:00</news:publication_date><news:title>Fake CAPTCHA scam leads to costly phone bills</news:title></news:news></url></urlset>