<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 3, 2026 at 3:04 pm by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://cyberbytesdaily.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Cyberbytes Daily</title>
		<link><![CDATA[https://cyberbytesdaily.com]]></link>
		<description><![CDATA[Cyberbytes Daily]]></description>
		<lastBuildDate><![CDATA[Fri, 03 Apr 2026 12:04:16 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://cyberbytesdaily.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://cyberbytesdaily.com/14000-f5-big-ip-apm-instances-exposed-online-as-attackers-exploit-rce-vulnerability/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/14000-f5-big-ip-apm-instances-exposed-online-as-attackers-exploit-rce-vulnerability/]]></link>
			<title>14,000+ F5 BIG-IP APM Instances Exposed Online as Attackers Exploit RCE Vulnerability</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 12:04:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/axios-npm-compromise-traced-to-targeted-social-engineering-attack/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/axios-npm-compromise-traced-to-targeted-social-engineering-attack/]]></link>
			<title>Axios npm compromise traced to targeted social engineering attack</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 12:04:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/trusted-platforms-exploited-to-steal-philippine-banking-credentials/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/trusted-platforms-exploited-to-steal-philippine-banking-credentials/]]></link>
			<title>Trusted Platforms Exploited to Steal Philippine Banking Credentials</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 09:47:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/ai-models-including-gemini-3-and-claude-haiku-4-5-secretly-protected-other-models-from-removal/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/ai-models-including-gemini-3-and-claude-haiku-4-5-secretly-protected-other-models-from-removal/]]></link>
			<title>AI Models Including Gemini 3 and Claude Haiku 4.5 Secretly Protected Other Models From Removal</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 09:47:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/new-sparkcat-variant-in-ios-android-apps-steals-crypto-wallet-recovery-phrase-images/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/new-sparkcat-variant-in-ios-android-apps-steals-crypto-wallet-recovery-phrase-images/]]></link>
			<title>New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 09:47:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/12-cyber-industry-trends-revealed-at-rsac-2026/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/12-cyber-industry-trends-revealed-at-rsac-2026/]]></link>
			<title>12 cyber industry trends revealed at RSAC 2026</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 09:47:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/drift-loses-285-million-in-durable-nonce-social-engineering-attack-linked-to-dprk/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/drift-loses-285-million-in-durable-nonce-social-engineering-attack-linked-to-dprk/]]></link>
			<title>Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 09:47:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/malicious-chrome-extension-chatgpt-ad-blocker-targets-users-steals-conversations/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/malicious-chrome-extension-chatgpt-ad-blocker-targets-users-steals-conversations/]]></link>
			<title>Malicious Chrome Extension “ChatGPT Ad Blocker” Targets Users, Steals Conversations</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 09:47:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/tp-link-router-flaws-allowed-attackers-to-launch-dos-attacks-and-cause-crashes/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/tp-link-router-flaws-allowed-attackers-to-launch-dos-attacks-and-cause-crashes/]]></link>
			<title>TP-Link Router Flaws Allowed Attackers to Launch DoS Attacks and Cause Crashes</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 08:32:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/hackers-weaponize-venom-stealer-via-clickfix-lures-for-massive-data-exfiltration/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/hackers-weaponize-venom-stealer-via-clickfix-lures-for-massive-data-exfiltration/]]></link>
			<title>Hackers Weaponize Venom Stealer via ClickFix Lures for Massive Data Exfiltration</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 08:32:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/cisco-fixes-critical-imc-auth-bypass-present-in-many-products/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/cisco-fixes-critical-imc-auth-bypass-present-in-many-products/]]></link>
			<title>Cisco fixes critical IMC auth bypass present in many products</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 23:24:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/phorpiex-botnet-fuels-ransomware-sextortion-and-crypto-theft-attacks/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/phorpiex-botnet-fuels-ransomware-sextortion-and-crypto-theft-attacks/]]></link>
			<title>Phorpiex Botnet Fuels Ransomware, Sextortion, and Crypto-Theft Attacks</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 07:11:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/attackers-abuse-react2shell-flaw-to-compromise-700-next-js-hosts/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/attackers-abuse-react2shell-flaw-to-compromise-700-next-js-hosts/]]></link>
			<title>Attackers Abuse React2Shell Flaw to Compromise 700+ Next.js Hosts</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 07:11:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/north-korea-linked-hackers-hit-axios-npm-in-supply-chain-attack/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/north-korea-linked-hackers-hit-axios-npm-in-supply-chain-attack/]]></link>
			<title>North Korea-Linked Hackers Hit Axios npm in Supply Chain Attack</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 07:11:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/adobe-data-breach-allegedly-exposes-13-million-support-tickets/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/adobe-data-breach-allegedly-exposes-13-million-support-tickets/]]></link>
			<title>Adobe Data Breach Allegedly Exposes 13 Million Support Tickets</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 05:49:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/die-besten-xdr-tools/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/die-besten-xdr-tools/]]></link>
			<title>Die besten XDR-Tools</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 05:49:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/openssh-10-3-released-with-patch-for-shell-injection-and-other-security-flaws/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/openssh-10-3-released-with-patch-for-shell-injection-and-other-security-flaws/]]></link>
			<title>OpenSSH 10.3 Released With Patch for Shell Injection and Other Security Flaws</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 05:49:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/north-korea-uses-github-as-c2-in-new-lnk-phishing-campaign/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/north-korea-uses-github-as-c2-in-new-lnk-phishing-campaign/]]></link>
			<title>North Korea Uses GitHub as C2 in New LNK Phishing Campaign</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 05:49:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/top-10-best-saas-security-posture-management-sspm-tools-2026/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/top-10-best-saas-security-posture-management-sspm-tools-2026/]]></link>
			<title>Top 10 Best SaaS Security Posture Management (SSPM) Tools 2026</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 05:49:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/qilin-ransomware-deploys-malicious-dll-to-disable-most-edr-defenses/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/qilin-ransomware-deploys-malicious-dll-to-disable-most-edr-defenses/]]></link>
			<title>Qilin Ransomware Deploys Malicious DLL to Disable Most EDR Defenses</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 05:49:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/cloudflares-new-cms-is-not-a-wordpress-killer-its-a-wordpress-alternative/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/cloudflares-new-cms-is-not-a-wordpress-killer-its-a-wordpress-alternative/]]></link>
			<title>Cloudflare’s new CMS is not a WordPress killer, it’s a WordPress alternative</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 02:07:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/geopolitics-ai-and-cybersecurity-insights-from-rsac-2026/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/geopolitics-ai-and-cybersecurity-insights-from-rsac-2026/]]></link>
			<title>Geopolitics, AI, and Cybersecurity: Insights From RSAC 2026</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 22:07:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/not-toying-around-hasbro-attack-may-take-weeks-to-remediate/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/not-toying-around-hasbro-attack-may-take-weeks-to-remediate/]]></link>
			<title>Not Toying Around: Hasbro Attack May Take &#8216;Weeks&#8217; to Remediate</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 22:07:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/hackers-exploit-cve-2025-55182-to-breach-766-next-js-hosts-steal-credentials/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/hackers-exploit-cve-2025-55182-to-breach-766-next-js-hosts-steal-credentials/]]></link>
			<title>Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 22:07:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/security-bosses-are-all-in-on-ai-heres-why/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/security-bosses-are-all-in-on-ai-heres-why/]]></link>
			<title>Security Bosses Are All-In on AI. Here&#8217;s Why</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 22:07:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/rsac-2026-ai-dominates-but-community-remains-key-to-security/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/rsac-2026-ai-dominates-but-community-remains-key-to-security/]]></link>
			<title>RSAC 2026: AI Dominates, But Community Remains Key to Security</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 22:07:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/cisco-patches-9-8-cvss-imc-and-ssm-flaws-allowing-remote-system-compromise/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/cisco-patches-9-8-cvss-imc-and-ssm-flaws-allowing-remote-system-compromise/]]></link>
			<title>Cisco Patches 9.8 CVSS IMC and SSM Flaws Allowing Remote System Compromise</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 22:07:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/miwic26-nkiruka-joy-aimienoho-chief-information-security-officer-standard-chartered-bank-ng/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/miwic26-nkiruka-joy-aimienoho-chief-information-security-officer-standard-chartered-bank-ng/]]></link>
			<title>MIWIC26: Nkiruka Joy Aimienoho, Chief Information Security Officer, Standard Chartered Bank NG</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 22:07:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/akira-style-ransomware-campaign-hits-windows-users-across-south-america/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/akira-style-ransomware-campaign-hits-windows-users-across-south-america/]]></link>
			<title>Akira-Style Ransomware Campaign Hits Windows Users Across South America</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 22:07:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/bank-trojan-casbaneiro-worms-through-latin-america/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/bank-trojan-casbaneiro-worms-through-latin-america/]]></link>
			<title>Bank Trojan &#8216;Casbaneiro&#8217; Worms Through Latin America</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 22:07:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/researchers-uncover-mining-operation-using-iso-lures-to-spread-rats-and-crypto-miners/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/researchers-uncover-mining-operation-using-iso-lures-to-spread-rats-and-crypto-miners/]]></link>
			<title>Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 12:00:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/the-state-of-trusted-open-source-report/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/the-state-of-trusted-open-source-report/]]></link>
			<title>The State of Trusted Open Source Report</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 12:00:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/fake-cert-ua-site-spreads-go-based-rat-in-phishing-campaign/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/fake-cert-ua-site-spreads-go-based-rat-in-phishing-campaign/]]></link>
			<title>Fake CERT-UA Site Spreads Go-Based RAT in Phishing Campaign</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 12:00:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/rfq-malware-campaign-uses-docx-rtf-js-and-python/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/rfq-malware-campaign-uses-docx-rtf-js-and-python/]]></link>
			<title>RFQ Malware Campaign Uses DOCX, RTF, JS, and Python</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 10:40:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/whatsapp-alerts-200-users-after-fake-ios-app-installed-spyware-italian-firm-faces-action/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/whatsapp-alerts-200-users-after-fake-ios-app-installed-spyware-italian-firm-faces-action/]]></link>
			<title>WhatsApp Alerts 200 Users After Fake iOS App Installed Spyware; Italian Firm Faces Action</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 10:40:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/novoice-on-google-play-exploits-22-flaws-to-hit-millions-of-android-users/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/novoice-on-google-play-exploits-22-flaws-to-hit-millions-of-android-users/]]></link>
			<title>NoVoice on Google Play Exploits 22 Flaws to Hit Millions of Android Users</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 10:40:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/cisa-issues-alert-on-chrome-zero-day-under-active-exploitation/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/cisa-issues-alert-on-chrome-zero-day-under-active-exploitation/]]></link>
			<title>CISA Issues Alert on Chrome Zero-Day Under Active Exploitation</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 10:40:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/apple-releases-ios-18-7-7-update-to-defend-against-darksword-exploit/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/apple-releases-ios-18-7-7-update-to-defend-against-darksword-exploit/]]></link>
			<title>Apple Releases iOS 18.7.7 Update to Defend Against DarkSword Exploit</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 10:40:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/axios-npm-supply-chain-breach-microsoft-shares-mitigation-steps/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/axios-npm-supply-chain-breach-microsoft-shares-mitigation-steps/]]></link>
			<title>Axios npm Supply Chain Breach: Microsoft Shares Mitigation Steps</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 10:40:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/cybersecurity-in-the-age-of-instant-software/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/cybersecurity-in-the-age-of-instant-software/]]></link>
			<title>Cybersecurity in the age of instant software</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 10:40:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/fbi-warns-chinese-mobile-apps-could-expose-user-data-to-cyberattacks/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/fbi-warns-chinese-mobile-apps-could-expose-user-data-to-cyberattacks/]]></link>
			<title>FBI Warns Chinese Mobile Apps Could Expose User Data to Cyberattacks</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 10:40:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/new-zap-ptk-add-on-converts-browser-security-findings-into-native-zap-alerts/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/new-zap-ptk-add-on-converts-browser-security-findings-into-native-zap-alerts/]]></link>
			<title>New ZAP PTK Add-On Converts Browser Security Findings Into Native ZAP Alerts</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 10:40:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/cisco-smart-software-manager-flaw-allowed-arbitrary-command-execution/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/cisco-smart-software-manager-flaw-allowed-arbitrary-command-execution/]]></link>
			<title>Cisco Smart Software Manager Flaw Allowed Arbitrary Command Execution</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 07:10:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/critical-px4-autopilot-vulnerability-let-attackers-gain-control-of-drones/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/critical-px4-autopilot-vulnerability-let-attackers-gain-control-of-drones/]]></link>
			<title>Critical PX4 Autopilot Vulnerability Let Attackers Gain Control of Drones</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 07:10:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/cisa-includes-trueconf-security-flaw-in-kev-catalog-after-exploitation-in-the-wild/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/cisa-includes-trueconf-security-flaw-in-kev-catalog-after-exploitation-in-the-wild/]]></link>
			<title>CISA Includes TrueConf Security Flaw in KEV Catalog After Exploitation in the Wild</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 12:04:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/ta416-broadens-europe-spy-campaign-with-web-bugs-and-malware/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/ta416-broadens-europe-spy-campaign-with-web-bugs-and-malware/]]></link>
			<title>TA416 Broadens Europe Spy Campaign With Web Bugs and Malware</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 07:10:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/whatsapp-attack-chain-delivers-vbs-cloud-payloads-msi-backdoor/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/whatsapp-attack-chain-delivers-vbs-cloud-payloads-msi-backdoor/]]></link>
			<title>WhatsApp Attack Chain Delivers VBS, Cloud Payloads, MSI Backdoor</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 07:10:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/cisco-warns-of-critical-imc-vulnerability-enabling-authentication-bypass/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/cisco-warns-of-critical-imc-vulnerability-enabling-authentication-bypass/]]></link>
			<title>Cisco Warns of Critical IMC Vulnerability Enabling Authentication Bypass</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 07:10:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/remcos-rat-attack-uses-obfuscated-scripts-trusted-windows-tools/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/remcos-rat-attack-uses-obfuscated-scripts-trusted-windows-tools/]]></link>
			<title>Remcos RAT Attack Uses Obfuscated Scripts, Trusted Windows Tools</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 07:10:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/kimsuky-uses-malicious-lnk-files-to-drop-python-backdoor/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/kimsuky-uses-malicious-lnk-files-to-drop-python-backdoor/]]></link>
			<title>Kimsuky Uses Malicious LNK Files to Drop Python Backdoor</title>
			<pubDate><![CDATA[Fri, 03 Apr 2026 12:04:16 +0000]]></pubDate>
		</item>
				</channel>
</rss>
