<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 17, 2026 at 12:56 pm by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://cyberbytesdaily.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Cyberbytes Daily</title>
		<link><![CDATA[https://cyberbytesdaily.com]]></link>
		<description><![CDATA[Cyberbytes Daily]]></description>
		<lastBuildDate><![CDATA[Fri, 17 Apr 2026 11:14:32 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://cyberbytesdaily.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://cyberbytesdaily.com/poc-released-for-fortisandbox-flaw-enabling-arbitrary-command-execution/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/poc-released-for-fortisandbox-flaw-enabling-arbitrary-command-execution/]]></link>
			<title>PoC Released for FortiSandbox Flaw Enabling Arbitrary Command Execution</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 11:14:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/critical-flowise-flaw-enables-remote-command-execution-via-mcp-adapters/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/critical-flowise-flaw-enables-remote-command-execution-via-mcp-adapters/]]></link>
			<title>Critical Flowise Flaw Enables Remote Command Execution via MCP Adapters</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 11:14:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/weaponized-cve-2026-39987-pushes-blockchain-backdoor-through-hugging-face/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/weaponized-cve-2026-39987-pushes-blockchain-backdoor-through-hugging-face/]]></link>
			<title>Weaponized CVE-2026-39987 Pushes Blockchain Backdoor Through Hugging Face</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 11:14:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/hackers-deploy-athr-for-scalable-ai-driven-vishing-and-credential-theft/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/hackers-deploy-athr-for-scalable-ai-driven-vishing-and-credential-theft/]]></link>
			<title>Hackers Deploy ATHR for Scalable AI-Driven Vishing and Credential Theft</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 11:14:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/nist-limits-cve-enrichment-after-263-surge-in-vulnerability-submissions/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/nist-limits-cve-enrichment-after-263-surge-in-vulnerability-submissions/]]></link>
			<title>NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 11:14:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/payouts-king-emerges-new-ransomware-operation-tied-to-ex-blackbasta-members/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/payouts-king-emerges-new-ransomware-operation-tied-to-ex-blackbasta-members/]]></link>
			<title>Payouts King Emerges: New Ransomware Operation Tied to Ex-BlackBasta Members</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 11:14:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/anthropic-introduces-claude-opus-4-7-for-advanced-problem-solving/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/anthropic-introduces-claude-opus-4-7-for-advanced-problem-solving/]]></link>
			<title>Anthropic Introduces Claude Opus 4.7 for Advanced Problem-Solving</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 11:14:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/zionsiphon-malware-hits-israeli-desalination-plants/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/zionsiphon-malware-hits-israeli-desalination-plants/]]></link>
			<title>ZionSiphon Malware Hits Israeli Desalination Plants</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 11:14:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/the-human-layer-why-your-biggest-security-risk-still-has-a-pulse/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/the-human-layer-why-your-biggest-security-risk-still-has-a-pulse/]]></link>
			<title>The Human Layer: Why Your Biggest Security Risk Still Has a Pulse</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 11:14:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/middle-east-espionage-attack-uses-fake-secure-messaging-apps-to-deliver-prospy/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/middle-east-espionage-attack-uses-fake-secure-messaging-apps-to-deliver-prospy/]]></link>
			<title>Middle East Espionage Attack Uses Fake Secure Messaging Apps to Deliver ProSpy</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 10:36:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/hpe-aruba-private-5g-vulnerability-opens-door-to-credential-theft-attacks/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/hpe-aruba-private-5g-vulnerability-opens-door-to-credential-theft-attacks/]]></link>
			<title>HPE Aruba Private 5G Vulnerability Opens Door to Credential Theft Attacks</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 10:36:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/the-cyber-winners-and-losers-in-trumps-2027-budget/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/the-cyber-winners-and-losers-in-trumps-2027-budget/]]></link>
			<title>The cyber winners and losers in Trump’s 2027 budget</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 10:36:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/cmmc-compliance-in-the-age-of-ai/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/cmmc-compliance-in-the-age-of-ai/]]></link>
			<title>CMMC compliance in the age of AI</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 10:36:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/tp-link-devices-at-risk-as-multiple-security-flaws-enable-takeover/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/tp-link-devices-at-risk-as-multiple-security-flaws-enable-takeover/]]></link>
			<title>TP-Link Devices at Risk as Multiple Security Flaws Enable Takeover</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 10:36:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/mallory-launches-ai-native-threat-intelligence-platform-turning-global-threat-data-into-prioritized-action/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/mallory-launches-ai-native-threat-intelligence-platform-turning-global-threat-data-into-prioritized-action/]]></link>
			<title>Mallory Launches AI-Native Threat Intelligence Platform, Turning Global Threat Data Into Prioritized Action</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 10:36:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/google-rolls-out-dbsc-in-chrome-146-to-block-session-theft-on-windows/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/google-rolls-out-dbsc-in-chrome-146-to-block-session-theft-on-windows/]]></link>
			<title>Google Rolls Out DBSC in Chrome 146 to Block Session Theft on Windows</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 10:36:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/iranian-apt-alert-5219-rockwell-plcs-exposed-online/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/iranian-apt-alert-5219-rockwell-plcs-exposed-online/]]></link>
			<title>Iranian APT alert: 5,219 Rockwell PLCs exposed online</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 10:36:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/attackers-deploy-hidden-magecart-skimmer-on-magento-using-svg-onload-abuse/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/attackers-deploy-hidden-magecart-skimmer-on-magento-using-svg-onload-abuse/]]></link>
			<title>Attackers Deploy Hidden Magecart Skimmer on Magento Using SVG onload Abuse</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 13:33:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/fake-zoom-sdk-update-spreads-sapphire-sleet-malware-in-new-macos-attack-chain/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/fake-zoom-sdk-update-spreads-sapphire-sleet-malware-in-new-macos-attack-chain/]]></link>
			<title>Fake Zoom SDK Update Spreads Sapphire Sleet Malware in New macOS Attack Chain</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 11:14:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/why-most-zero-trust-architectures-fail-at-the-traffic-layer/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/why-most-zero-trust-architectures-fail-at-the-traffic-layer/]]></link>
			<title>Why most zero-trust architectures fail at the traffic layer</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 10:36:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/ai-led-remediation-crisis-prompts-hackerone-to-pause-bug-bounties/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/ai-led-remediation-crisis-prompts-hackerone-to-pause-bug-bounties/]]></link>
			<title>AI-Led Remediation Crisis Prompts HackerOne to Pause Bug Bounties</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 20:06:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/arelion-employs-netscout-arbor-ddos-protection-products/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/arelion-employs-netscout-arbor-ddos-protection-products/]]></link>
			<title>Arelion employs NETSCOUT Arbor DDoS protection products</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 20:06:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/threatsday-bulletin-hybrid-p2p-botnet-13-year-old-apache-rce-and-18-more-stories/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/threatsday-bulletin-hybrid-p2p-botnet-13-year-old-apache-rce-and-18-more-stories/]]></link>
			<title>ThreatsDay Bulletin: Hybrid P2P Botnet, 13-Year-Old Apache RCE and 18 More Stories</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 13:33:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/new-phishing-campaign-exploits-google-storage-to-deliver-remcos-rat/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/new-phishing-campaign-exploits-google-storage-to-deliver-remcos-rat/]]></link>
			<title>New Phishing Campaign Exploits Google Storage to Deliver Remcos RAT</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 13:33:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/clickfix-campaign-abuses-macos-script-editor-to-deploy-atomic-stealer/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/clickfix-campaign-abuses-macos-script-editor-to-deploy-atomic-stealer/]]></link>
			<title>ClickFix Campaign Abuses macOS Script Editor to Deploy Atomic Stealer</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 13:33:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/keeper-security-expands-pam-browser-isolation-to-support-advanced-web-browsing-workflows/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/keeper-security-expands-pam-browser-isolation-to-support-advanced-web-browsing-workflows/]]></link>
			<title>Keeper Security Expands PAM Browser Isolation to Support Advanced Web Browsing Workflows</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 09:19:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/patch-windows-collapse-as-time-to-exploit-accelerates/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/patch-windows-collapse-as-time-to-exploit-accelerates/]]></link>
			<title>Patch windows collapse as time-to-exploit accelerates</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 09:19:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/weak-at-the-seams/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/weak-at-the-seams/]]></link>
			<title>Weak at the seams</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 09:19:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/chinas-tianjin-supercomputer-center-allegedly-hit-in-10-petabyte-data-theft/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/chinas-tianjin-supercomputer-center-allegedly-hit-in-10-petabyte-data-theft/]]></link>
			<title>China’s Tianjin Supercomputer Center Allegedly Hit in 10-Petabyte Data Theft</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 09:19:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/miwic26-funke-omolere-senior-technology-compliance-product-owner-at-adobe/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/miwic26-funke-omolere-senior-technology-compliance-product-owner-at-adobe/]]></link>
			<title>MIWIC26: Funke Omolere, Senior Technology Compliance Product Owner at Adobe</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 09:19:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/cisa-issues-warning-on-critical-ivanti-epmm-flaw-exploited-in-ongoing-attacks/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/cisa-issues-warning-on-critical-ivanti-epmm-flaw-exploited-in-ongoing-attacks/]]></link>
			<title>CISA Issues Warning on Critical Ivanti EPMM Flaw Exploited in Ongoing Attacks</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 09:19:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/how-botnet-driven-ddos-attacks-evolved-in-2h-2025/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/how-botnet-driven-ddos-attacks-evolved-in-2h-2025/]]></link>
			<title>How botnet-driven DDoS attacks evolved in 2H 2025</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 18:35:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/clickfix-malicious-dmgs-push-notnullosx-to-macos-users/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/clickfix-malicious-dmgs-push-notnullosx-to-macos-users/]]></link>
			<title>ClickFix, Malicious DMGs Push notnullOSX to macOS Users</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 13:33:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/linux-foundation-leader-impersonated-in-slack-attack-on-open-source-developers/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/linux-foundation-leader-impersonated-in-slack-attack-on-open-source-developers/]]></link>
			<title>Linux Foundation Leader Impersonated in Slack Attack on Open Source Developers</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 09:19:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/roningloader-campaign-uses-dll-side-loading-code-injection-to-slip-past-defenses/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/roningloader-campaign-uses-dll-side-loading-code-injection-to-slip-past-defenses/]]></link>
			<title>RoningLoader Campaign Uses DLL Side-Loading, Code Injection to Slip Past Defenses</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 09:19:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/critical-chrome-flaws-let-attackers-execute-arbitrary-code/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/critical-chrome-flaws-let-attackers-execute-arbitrary-code/]]></link>
			<title>Critical Chrome Flaws Let Attackers Execute Arbitrary Code</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 09:19:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/masjesu-botnet-emerges-as-ddos-for-hire-service-targeting-global-iot-devices/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/masjesu-botnet-emerges-as-ddos-for-hire-service-targeting-global-iot-devices/]]></link>
			<title>Masjesu Botnet Emerges as DDoS-for-Hire Service Targeting Global IoT Devices</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 18:35:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/weak-at-the-seams-2/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/weak-at-the-seams-2/]]></link>
			<title>Weak at the seams</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 13:33:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/6-winter-2026-g2-leader-badges-prove-this-ddos-protection-stands-out/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/6-winter-2026-g2-leader-badges-prove-this-ddos-protection-stands-out/]]></link>
			<title>6 Winter 2026 G2 Leader Badges prove this DDoS protection stands out</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 18:35:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/new-chaos-variant-targets-misconfigured-cloud-deployments-adds-socks-proxy/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/new-chaos-variant-targets-misconfigured-cloud-deployments-adds-socks-proxy/]]></link>
			<title>New Chaos Variant Targets Misconfigured Cloud Deployments, Adds SOCKS Proxy</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 18:35:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/most-organisations-face-an-unsecured-api-surge-as-ai-agents-outpace-security/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/most-organisations-face-an-unsecured-api-surge-as-ai-agents-outpace-security/]]></link>
			<title>Most Organisations Face an Unsecured API Surge As AI Agents Outpace Security</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 16:26:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/check-point-software-celebrates-partner-success-at-annual-uk-partner-awards/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/check-point-software-celebrates-partner-success-at-annual-uk-partner-awards/]]></link>
			<title>Check Point Software Celebrates Partner Success at Annual UK Partner Awards</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 16:26:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/miwic26-nicole-bucala-ceo-of-databee-a-comcast-company/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/miwic26-nicole-bucala-ceo-of-databee-a-comcast-company/]]></link>
			<title>MIWIC26: Nicole Bucala, CEO of DataBee, A Comcast Company</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 16:26:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/new-clickfix-variant-bypasses-apple-safeguards-with-one-click-script-execution/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/new-clickfix-variant-bypasses-apple-safeguards-with-one-click-script-execution/]]></link>
			<title>New ClickFix variant bypasses Apple safeguards with one‑click script execution</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 13:33:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/full-sail-university-to-open-ibm-cyber-defense-range-powered-by-aws-and-cloud-range-on-campus/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/full-sail-university-to-open-ibm-cyber-defense-range-powered-by-aws-and-cloud-range-on-campus/]]></link>
			<title>Full Sail University to Open IBM Cyber Defense Range Powered by AWS and Cloud Range on Campus</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 16:26:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/niobium-introduces-the-fog/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/niobium-introduces-the-fog/]]></link>
			<title>Niobium Introduces The Fog</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 16:26:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/the-hidden-security-risks-of-shadow-ai-in-enterprises/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/the-hidden-security-risks-of-shadow-ai-in-enterprises/]]></link>
			<title>The Hidden Security Risks of Shadow AI in Enterprises</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 13:33:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/pluralsight-launches-secureready-to-help-organizations-build-job-ready-cybersecurity-teams/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/pluralsight-launches-secureready-to-help-organizations-build-job-ready-cybersecurity-teams/]]></link>
			<title>Pluralsight Launches SecureReady to Help Organizations Build Job-Ready Cybersecurity Teams</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 16:26:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/apt28-deploys-prismex-malware-in-campaign-targeting-ukraine-and-nato-allies/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/apt28-deploys-prismex-malware-in-campaign-targeting-ukraine-and-nato-allies/]]></link>
			<title>APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 16:26:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/palo-altos-helmut-reisinger-sees-a-cyber-sea-change-ahead-as-ai-advances/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/palo-altos-helmut-reisinger-sees-a-cyber-sea-change-ahead-as-ai-advances/]]></link>
			<title>Palo Alto’s Helmut Reisinger sees a cyber sea change ahead as AI advances</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 11:14:32 +0000]]></pubDate>
		</item>
				</channel>
</rss>
