<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on May 20, 2026 at 3:51 pm by All in One SEO v4.9.7.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://cyberbytesdaily.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Cyberbytes Daily</title>
		<link><![CDATA[https://cyberbytesdaily.com]]></link>
		<description><![CDATA[Cyberbytes Daily]]></description>
		<lastBuildDate><![CDATA[Wed, 20 May 2026 10:06:27 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://cyberbytesdaily.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://cyberbytesdaily.com/joe-chen-joins-trellix-as-chief-technology-officer-govcon-wire/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/joe-chen-joins-trellix-as-chief-technology-officer-govcon-wire/]]></link>
			<title>Joe Chen Joins Trellix as Chief Technology Officer &#8211; GovCon Wire</title>
			<pubDate><![CDATA[Wed, 20 May 2026 10:06:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/marvel-heroes-most-likely-to-have-elite-cybersecurity-habits-comic-basics/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/marvel-heroes-most-likely-to-have-elite-cybersecurity-habits-comic-basics/]]></link>
			<title>Marvel Heroes Most Likely to Have Elite Cybersecurity Habits &#8211; Comic Basics</title>
			<pubDate><![CDATA[Wed, 20 May 2026 10:06:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/pardus-linux-vulnerability-lets-local-attackers-gain-silent-root-access/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/pardus-linux-vulnerability-lets-local-attackers-gain-silent-root-access/]]></link>
			<title>Pardus Linux Vulnerability Lets Local Attackers Gain Silent Root Access</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:52:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/microsoft-releases-mitigation-for-yellowkey-bitlocker-bypass-cve-2026-45585-exploit/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/microsoft-releases-mitigation-for-yellowkey-bitlocker-bypass-cve-2026-45585-exploit/]]></link>
			<title>Microsoft Releases Mitigation for YellowKey BitLocker Bypass CVE-2026-45585 Exploit</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:52:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/github-confirms-breach-of-3800-repos-via-malicious-vscode-extension/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/github-confirms-breach-of-3800-repos-via-malicious-vscode-extension/]]></link>
			<title>GitHub confirms breach of 3,800 repos via malicious VSCode extension</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:52:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/virtual-event-anatomy-of-a-data-breach-what-to-do-if-it-happens-to-you/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/virtual-event-anatomy-of-a-data-breach-what-to-do-if-it-happens-to-you/]]></link>
			<title>[Virtual Event] Anatomy of a Data Breach: What to Do if it Happens to You</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:52:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/why-some-security-fixes-never-reach-your-vulnerability-dashboard/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/why-some-security-fixes-never-reach-your-vulnerability-dashboard/]]></link>
			<title>Why some security fixes never reach your vulnerability dashboard</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:52:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/shadow-ai-your-employees-are-feeding-your-secrets-to-free-chatbots/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/shadow-ai-your-employees-are-feeding-your-secrets-to-free-chatbots/]]></link>
			<title>Shadow AI: Your Employees Are Feeding Your Secrets to Free Chatbots</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:52:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/dark-reading-celebrates-20-years-as-a-leading-authority-on-cybersecurity-highlighting-the-people-events-ideas-and-technologies-shaping-the-modern-risk-landscape/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/dark-reading-celebrates-20-years-as-a-leading-authority-on-cybersecurity-highlighting-the-people-events-ideas-and-technologies-shaping-the-modern-risk-landscape/]]></link>
			<title>Dark Reading Celebrates 20 Years as a Leading Authority on Cybersecurity, Highlighting the People, Events, Ideas, and Technologies Shaping the Modern Risk Landscape</title>
			<pubDate><![CDATA[Wed, 13 May 2026 20:26:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/microsoft-teams-vulnerability-allows-hackers-to-perform-spoofing-attacks/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/microsoft-teams-vulnerability-allows-hackers-to-perform-spoofing-attacks/]]></link>
			<title>Microsoft Teams Vulnerability Allows Hackers to Perform Spoofing Attacks</title>
			<pubDate><![CDATA[Wed, 13 May 2026 20:26:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/over-half-of-msps-admit-to-being-breached-multiple-times-in-past-year/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/over-half-of-msps-admit-to-being-breached-multiple-times-in-past-year/]]></link>
			<title>Over Half of MSPs Admit to Being Breached Multiple Times in Past Year</title>
			<pubDate><![CDATA[Wed, 13 May 2026 20:26:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/the-boring-stuff-is-dangerous-now/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/the-boring-stuff-is-dangerous-now/]]></link>
			<title>The Boring Stuff is Dangerous Now</title>
			<pubDate><![CDATA[Fri, 15 May 2026 21:18:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/exchange-server-zero-day-vulnerability-can-be-triggered-by-opening-a-malicious-email/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/exchange-server-zero-day-vulnerability-can-be-triggered-by-opening-a-malicious-email/]]></link>
			<title>Exchange Server zero-day vulnerability can be triggered by opening a malicious email</title>
			<pubDate><![CDATA[Fri, 15 May 2026 21:18:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/windows-bitlocker-zero-day-gives-access-to-protected-drives-poc-released/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/windows-bitlocker-zero-day-gives-access-to-protected-drives-poc-released/]]></link>
			<title>Windows BitLocker zero-day gives access to protected drives, PoC released</title>
			<pubDate><![CDATA[Wed, 13 May 2026 20:26:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/new-critical-exim-mailer-flaw-allows-remote-code-execution/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/new-critical-exim-mailer-flaw-allows-remote-code-execution/]]></link>
			<title>New critical Exim mailer flaw allows remote code execution</title>
			<pubDate><![CDATA[Wed, 13 May 2026 20:26:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/why-insurance-companies-are-a-big-target-for-cyberattacks/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/why-insurance-companies-are-a-big-target-for-cyberattacks/]]></link>
			<title>Why Insurance Companies Are a Big Target for Cyberattacks</title>
			<pubDate><![CDATA[Wed, 13 May 2026 20:26:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/microsoft-defender-wrongly-flags-digicert-certs-as-trojanwin32-cerdigent-adha/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/microsoft-defender-wrongly-flags-digicert-certs-as-trojanwin32-cerdigent-adha/]]></link>
			<title>Microsoft Defender wrongly flags DigiCert certs as Trojan:Win32/Cerdigent.A!dha</title>
			<pubDate><![CDATA[Sun, 03 May 2026 19:41:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/expired-domain-leads-to-supply-chain-attack-on-node-ipc-npm-package/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/expired-domain-leads-to-supply-chain-attack-on-node-ipc-npm-package/]]></link>
			<title>Expired domain leads to supply chain attack on node-ipc npm package</title>
			<pubDate><![CDATA[Fri, 15 May 2026 21:18:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/telegram-mini-apps-abused-for-crypto-scams-android-malware-delivery/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/telegram-mini-apps-abused-for-crypto-scams-android-malware-delivery/]]></link>
			<title>Telegram Mini Apps abused for crypto scams, Android malware delivery</title>
			<pubDate><![CDATA[Sun, 03 May 2026 19:41:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/cisa-adds-actively-exploited-linux-root-access-bug-cve-2026-31431-to-kev/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/cisa-adds-actively-exploited-linux-root-access-bug-cve-2026-31431-to-kev/]]></link>
			<title>CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV</title>
			<pubDate><![CDATA[Sun, 03 May 2026 19:41:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/funnel-builder-wordpress-plugin-bug-exploited-to-steal-credit-cards/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/funnel-builder-wordpress-plugin-bug-exploited-to-steal-credit-cards/]]></link>
			<title>Funnel Builder WordPress plugin bug exploited to steal credit cards</title>
			<pubDate><![CDATA[Fri, 15 May 2026 21:18:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/critrical-cpanel-flaw-mass-exploited-in-sorry-ransomware-attacks/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/critrical-cpanel-flaw-mass-exploited-in-sorry-ransomware-attacks/]]></link>
			<title>Critrical cPanel flaw mass-exploited in &#8220;Sorry&#8221; ransomware attacks</title>
			<pubDate><![CDATA[Sun, 03 May 2026 19:41:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/consentfix-v3-attacks-target-azure-with-automated-oauth-abuse/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/consentfix-v3-attacks-target-azure-with-automated-oauth-abuse/]]></link>
			<title>ConsentFix v3 attacks target Azure with automated OAuth abuse</title>
			<pubDate><![CDATA[Sun, 03 May 2026 19:41:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/microsoft-exchange-windows-11-hacked-on-second-day-of-pwn2own/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/microsoft-exchange-windows-11-hacked-on-second-day-of-pwn2own/]]></link>
			<title>Microsoft Exchange, Windows 11 hacked on second day of Pwn2Own</title>
			<pubDate><![CDATA[Fri, 15 May 2026 21:18:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/openclaw-flaws-expose-systems-to-policy-bypass-attacks/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/openclaw-flaws-expose-systems-to-policy-bypass-attacks/]]></link>
			<title>OpenClaw Flaws Expose Systems to Policy Bypass Attacks</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 10:11:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/the-manager-of-agents-how-ai-evolves-the-soc-analyst-role/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/the-manager-of-agents-how-ai-evolves-the-soc-analyst-role/]]></link>
			<title>The ‘manager of agents’: How AI evolves the SOC analyst role</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 10:11:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/critical-gemini-cli-flaw-raises-supply-chain-security-concerns/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/critical-gemini-cli-flaw-raises-supply-chain-security-concerns/]]></link>
			<title>Critical Gemini CLI Flaw Raises Supply Chain Security Concerns</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 10:11:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/north-korean-hackers-target-pharma-firms-with-malware-laced-excel-attacks/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/north-korean-hackers-target-pharma-firms-with-malware-laced-excel-attacks/]]></link>
			<title>North Korean Hackers Target Pharma Firms with Malware-Laced Excel Attacks</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 10:11:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/palo-altos-helmut-reisinger-sees-a-cyber-sea-change-ahead-as-ai-advances/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/palo-altos-helmut-reisinger-sees-a-cyber-sea-change-ahead-as-ai-advances/]]></link>
			<title>Palo Alto’s Helmut Reisinger sees a cyber sea change ahead as AI advances</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 11:14:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/fake-zoom-sdk-update-spreads-sapphire-sleet-malware-in-new-macos-attack-chain/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/fake-zoom-sdk-update-spreads-sapphire-sleet-malware-in-new-macos-attack-chain/]]></link>
			<title>Fake Zoom SDK Update Spreads Sapphire Sleet Malware in New macOS Attack Chain</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 11:14:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/poc-released-for-fortisandbox-flaw-enabling-arbitrary-command-execution/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/poc-released-for-fortisandbox-flaw-enabling-arbitrary-command-execution/]]></link>
			<title>PoC Released for FortiSandbox Flaw Enabling Arbitrary Command Execution</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 11:14:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/critical-flowise-flaw-enables-remote-command-execution-via-mcp-adapters/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/critical-flowise-flaw-enables-remote-command-execution-via-mcp-adapters/]]></link>
			<title>Critical Flowise Flaw Enables Remote Command Execution via MCP Adapters</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 11:14:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/weaponized-cve-2026-39987-pushes-blockchain-backdoor-through-hugging-face/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/weaponized-cve-2026-39987-pushes-blockchain-backdoor-through-hugging-face/]]></link>
			<title>Weaponized CVE-2026-39987 Pushes Blockchain Backdoor Through Hugging Face</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 11:14:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/hackers-deploy-athr-for-scalable-ai-driven-vishing-and-credential-theft/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/hackers-deploy-athr-for-scalable-ai-driven-vishing-and-credential-theft/]]></link>
			<title>Hackers Deploy ATHR for Scalable AI-Driven Vishing and Credential Theft</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 11:14:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/nist-limits-cve-enrichment-after-263-surge-in-vulnerability-submissions/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/nist-limits-cve-enrichment-after-263-surge-in-vulnerability-submissions/]]></link>
			<title>NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 11:14:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/payouts-king-emerges-new-ransomware-operation-tied-to-ex-blackbasta-members/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/payouts-king-emerges-new-ransomware-operation-tied-to-ex-blackbasta-members/]]></link>
			<title>Payouts King Emerges: New Ransomware Operation Tied to Ex-BlackBasta Members</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 11:14:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/anthropic-introduces-claude-opus-4-7-for-advanced-problem-solving/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/anthropic-introduces-claude-opus-4-7-for-advanced-problem-solving/]]></link>
			<title>Anthropic Introduces Claude Opus 4.7 for Advanced Problem-Solving</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 11:14:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/zionsiphon-malware-hits-israeli-desalination-plants/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/zionsiphon-malware-hits-israeli-desalination-plants/]]></link>
			<title>ZionSiphon Malware Hits Israeli Desalination Plants</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 11:14:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/the-human-layer-why-your-biggest-security-risk-still-has-a-pulse/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/the-human-layer-why-your-biggest-security-risk-still-has-a-pulse/]]></link>
			<title>The Human Layer: Why Your Biggest Security Risk Still Has a Pulse</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 11:14:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/middle-east-espionage-attack-uses-fake-secure-messaging-apps-to-deliver-prospy/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/middle-east-espionage-attack-uses-fake-secure-messaging-apps-to-deliver-prospy/]]></link>
			<title>Middle East Espionage Attack Uses Fake Secure Messaging Apps to Deliver ProSpy</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 10:36:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/hpe-aruba-private-5g-vulnerability-opens-door-to-credential-theft-attacks/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/hpe-aruba-private-5g-vulnerability-opens-door-to-credential-theft-attacks/]]></link>
			<title>HPE Aruba Private 5G Vulnerability Opens Door to Credential Theft Attacks</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 10:36:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/the-cyber-winners-and-losers-in-trumps-2027-budget/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/the-cyber-winners-and-losers-in-trumps-2027-budget/]]></link>
			<title>The cyber winners and losers in Trump’s 2027 budget</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 10:36:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/cmmc-compliance-in-the-age-of-ai/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/cmmc-compliance-in-the-age-of-ai/]]></link>
			<title>CMMC compliance in the age of AI</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 10:36:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/tp-link-devices-at-risk-as-multiple-security-flaws-enable-takeover/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/tp-link-devices-at-risk-as-multiple-security-flaws-enable-takeover/]]></link>
			<title>TP-Link Devices at Risk as Multiple Security Flaws Enable Takeover</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 10:36:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/mallory-launches-ai-native-threat-intelligence-platform-turning-global-threat-data-into-prioritized-action/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/mallory-launches-ai-native-threat-intelligence-platform-turning-global-threat-data-into-prioritized-action/]]></link>
			<title>Mallory Launches AI-Native Threat Intelligence Platform, Turning Global Threat Data Into Prioritized Action</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 10:36:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/google-rolls-out-dbsc-in-chrome-146-to-block-session-theft-on-windows/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/google-rolls-out-dbsc-in-chrome-146-to-block-session-theft-on-windows/]]></link>
			<title>Google Rolls Out DBSC in Chrome 146 to Block Session Theft on Windows</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 10:36:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/iranian-apt-alert-5219-rockwell-plcs-exposed-online/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/iranian-apt-alert-5219-rockwell-plcs-exposed-online/]]></link>
			<title>Iranian APT alert: 5,219 Rockwell PLCs exposed online</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 10:36:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/why-most-zero-trust-architectures-fail-at-the-traffic-layer/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/why-most-zero-trust-architectures-fail-at-the-traffic-layer/]]></link>
			<title>Why most zero-trust architectures fail at the traffic layer</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 10:36:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/attackers-deploy-hidden-magecart-skimmer-on-magento-using-svg-onload-abuse/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/attackers-deploy-hidden-magecart-skimmer-on-magento-using-svg-onload-abuse/]]></link>
			<title>Attackers Deploy Hidden Magecart Skimmer on Magento Using SVG onload Abuse</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 13:33:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/ai-is-reshaping-devsecops-to-bring-security-closer-to-the-code/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/ai-is-reshaping-devsecops-to-bring-security-closer-to-the-code/]]></link>
			<title>AI is reshaping DevSecOps to bring security closer to the code</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 10:11:42 +0000]]></pubDate>
		</item>
				</channel>
</rss>
