<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 9, 2026 at 10:05 am by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://cyberbytesdaily.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Cyberbytes Daily</title>
		<link><![CDATA[https://cyberbytesdaily.com]]></link>
		<description><![CDATA[Cyberbytes Daily]]></description>
		<lastBuildDate><![CDATA[Wed, 08 Apr 2026 16:26:58 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://cyberbytesdaily.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://cyberbytesdaily.com/miwic26-nicole-bucala-ceo-of-databee-a-comcast-company/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/miwic26-nicole-bucala-ceo-of-databee-a-comcast-company/]]></link>
			<title>MIWIC26: Nicole Bucala, CEO of DataBee, A Comcast Company</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 16:26:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/attackers-deploy-hidden-magecart-skimmer-on-magento-using-svg-onload-abuse/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/attackers-deploy-hidden-magecart-skimmer-on-magento-using-svg-onload-abuse/]]></link>
			<title>Attackers Deploy Hidden Magecart Skimmer on Magento Using SVG onload Abuse</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 13:33:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/threatsday-bulletin-hybrid-p2p-botnet-13-year-old-apache-rce-and-18-more-stories/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/threatsday-bulletin-hybrid-p2p-botnet-13-year-old-apache-rce-and-18-more-stories/]]></link>
			<title>ThreatsDay Bulletin: Hybrid P2P Botnet, 13-Year-Old Apache RCE and 18 More Stories</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 13:33:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/full-sail-university-to-open-ibm-cyber-defense-range-powered-by-aws-and-cloud-range-on-campus/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/full-sail-university-to-open-ibm-cyber-defense-range-powered-by-aws-and-cloud-range-on-campus/]]></link>
			<title>Full Sail University to Open IBM Cyber Defense Range Powered by AWS and Cloud Range on Campus</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 16:26:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/weak-at-the-seams-2/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/weak-at-the-seams-2/]]></link>
			<title>Weak at the seams</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 13:33:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/new-phishing-campaign-exploits-google-storage-to-deliver-remcos-rat/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/new-phishing-campaign-exploits-google-storage-to-deliver-remcos-rat/]]></link>
			<title>New Phishing Campaign Exploits Google Storage to Deliver Remcos RAT</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 13:33:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/new-clickfix-variant-bypasses-apple-safeguards-with-one-click-script-execution/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/new-clickfix-variant-bypasses-apple-safeguards-with-one-click-script-execution/]]></link>
			<title>New ClickFix variant bypasses Apple safeguards with one‑click script execution</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 13:33:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/niobium-introduces-the-fog/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/niobium-introduces-the-fog/]]></link>
			<title>Niobium Introduces The Fog</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 16:26:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/the-hidden-security-risks-of-shadow-ai-in-enterprises/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/the-hidden-security-risks-of-shadow-ai-in-enterprises/]]></link>
			<title>The Hidden Security Risks of Shadow AI in Enterprises</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 13:33:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/clickfix-campaign-abuses-macos-script-editor-to-deploy-atomic-stealer/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/clickfix-campaign-abuses-macos-script-editor-to-deploy-atomic-stealer/]]></link>
			<title>ClickFix Campaign Abuses macOS Script Editor to Deploy Atomic Stealer</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 13:33:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/clickfix-malicious-dmgs-push-notnullosx-to-macos-users/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/clickfix-malicious-dmgs-push-notnullosx-to-macos-users/]]></link>
			<title>ClickFix, Malicious DMGs Push notnullOSX to macOS Users</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 13:33:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/keeper-security-expands-pam-browser-isolation-to-support-advanced-web-browsing-workflows/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/keeper-security-expands-pam-browser-isolation-to-support-advanced-web-browsing-workflows/]]></link>
			<title>Keeper Security Expands PAM Browser Isolation to Support Advanced Web Browsing Workflows</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 09:19:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/apt28-deploys-prismex-malware-in-campaign-targeting-ukraine-and-nato-allies/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/apt28-deploys-prismex-malware-in-campaign-targeting-ukraine-and-nato-allies/]]></link>
			<title>APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 16:26:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/patch-windows-collapse-as-time-to-exploit-accelerates/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/patch-windows-collapse-as-time-to-exploit-accelerates/]]></link>
			<title>Patch windows collapse as time-to-exploit accelerates</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 09:19:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/chinas-tianjin-supercomputer-center-allegedly-hit-in-10-petabyte-data-theft/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/chinas-tianjin-supercomputer-center-allegedly-hit-in-10-petabyte-data-theft/]]></link>
			<title>China’s Tianjin Supercomputer Center Allegedly Hit in 10-Petabyte Data Theft</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 09:19:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/ai-led-remediation-crisis-prompts-hackerone-to-pause-bug-bounties/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/ai-led-remediation-crisis-prompts-hackerone-to-pause-bug-bounties/]]></link>
			<title>AI-Led Remediation Crisis Prompts HackerOne to Pause Bug Bounties</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 20:06:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/miwic26-funke-omolere-senior-technology-compliance-product-owner-at-adobe/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/miwic26-funke-omolere-senior-technology-compliance-product-owner-at-adobe/]]></link>
			<title>MIWIC26: Funke Omolere, Senior Technology Compliance Product Owner at Adobe</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 09:19:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/arelion-employs-netscout-arbor-ddos-protection-products/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/arelion-employs-netscout-arbor-ddos-protection-products/]]></link>
			<title>Arelion employs NETSCOUT Arbor DDoS protection products</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 20:06:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/how-botnet-driven-ddos-attacks-evolved-in-2h-2025/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/how-botnet-driven-ddos-attacks-evolved-in-2h-2025/]]></link>
			<title>How botnet-driven DDoS attacks evolved in 2H 2025</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 18:35:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/masjesu-botnet-emerges-as-ddos-for-hire-service-targeting-global-iot-devices/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/masjesu-botnet-emerges-as-ddos-for-hire-service-targeting-global-iot-devices/]]></link>
			<title>Masjesu Botnet Emerges as DDoS-for-Hire Service Targeting Global IoT Devices</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 18:35:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/6-winter-2026-g2-leader-badges-prove-this-ddos-protection-stands-out/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/6-winter-2026-g2-leader-badges-prove-this-ddos-protection-stands-out/]]></link>
			<title>6 Winter 2026 G2 Leader Badges prove this DDoS protection stands out</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 18:35:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/new-chaos-variant-targets-misconfigured-cloud-deployments-adds-socks-proxy/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/new-chaos-variant-targets-misconfigured-cloud-deployments-adds-socks-proxy/]]></link>
			<title>New Chaos Variant Targets Misconfigured Cloud Deployments, Adds SOCKS Proxy</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 18:35:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/most-organisations-face-an-unsecured-api-surge-as-ai-agents-outpace-security/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/most-organisations-face-an-unsecured-api-surge-as-ai-agents-outpace-security/]]></link>
			<title>Most Organisations Face an Unsecured API Surge As AI Agents Outpace Security</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 16:26:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/check-point-software-celebrates-partner-success-at-annual-uk-partner-awards/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/check-point-software-celebrates-partner-success-at-annual-uk-partner-awards/]]></link>
			<title>Check Point Software Celebrates Partner Success at Annual UK Partner Awards</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 16:26:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/weak-at-the-seams/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/weak-at-the-seams/]]></link>
			<title>Weak at the seams</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 09:19:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/cisa-issues-warning-on-critical-ivanti-epmm-flaw-exploited-in-ongoing-attacks/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/cisa-issues-warning-on-critical-ivanti-epmm-flaw-exploited-in-ongoing-attacks/]]></link>
			<title>CISA Issues Warning on Critical Ivanti EPMM Flaw Exploited in Ongoing Attacks</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 09:19:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/pluralsight-launches-secureready-to-help-organizations-build-job-ready-cybersecurity-teams/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/pluralsight-launches-secureready-to-help-organizations-build-job-ready-cybersecurity-teams/]]></link>
			<title>Pluralsight Launches SecureReady to Help Organizations Build Job-Ready Cybersecurity Teams</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 16:26:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/china-linked-storm-1175-exploits-zero-days-to-rapidly-deploy-medusa-ransomware/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/china-linked-storm-1175-exploits-zero-days-to-rapidly-deploy-medusa-ransomware/]]></link>
			<title>China-Linked Storm-1175 Exploits Zero-Days to Rapidly Deploy Medusa Ransomware</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 09:29:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/linux-foundation-leader-impersonated-in-slack-attack-on-open-source-developers/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/linux-foundation-leader-impersonated-in-slack-attack-on-open-source-developers/]]></link>
			<title>Linux Foundation Leader Impersonated in Slack Attack on Open Source Developers</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 09:19:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/roningloader-campaign-uses-dll-side-loading-code-injection-to-slip-past-defenses/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/roningloader-campaign-uses-dll-side-loading-code-injection-to-slip-past-defenses/]]></link>
			<title>RoningLoader Campaign Uses DLL Side-Loading, Code Injection to Slip Past Defenses</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 09:19:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/fraud-rockets-higher-in-mobile-first-latin-america/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/fraud-rockets-higher-in-mobile-first-latin-america/]]></link>
			<title>Fraud Rockets Higher in Mobile-First Latin America</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 16:26:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/yael-nardi-joins-minimus-as-chief-business-officer-to-drive-hyper-growth/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/yael-nardi-joins-minimus-as-chief-business-officer-to-drive-hyper-growth/]]></link>
			<title>Yael Nardi joins Minimus as Chief Business Officer to drive hyper-growth</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 16:26:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/new-microsoft-defender-update-issued-for-windows-11-windows-10-and-server-images/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/new-microsoft-defender-update-issued-for-windows-11-windows-10-and-server-images/]]></link>
			<title>New Microsoft Defender Update Issued for Windows 11, Windows 10, and Server Images</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 09:29:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/flowise-ai-agent-builder-under-active-cvss-10-0-rce-exploitation-12000-instances-exposed/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/flowise-ai-agent-builder-under-active-cvss-10-0-rce-exploitation-12000-instances-exposed/]]></link>
			<title>Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 09:29:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/the-noisy-tenants-engineering-fairness-in-multi-tenant-siem-solutions/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/the-noisy-tenants-engineering-fairness-in-multi-tenant-siem-solutions/]]></link>
			<title>The noisy tenants: Engineering fairness in multi-tenant SIEM solutions</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 09:29:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/attackers-exploit-flowise-injection-vulnerability-as-15000-instances-remain-exposed/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/attackers-exploit-flowise-injection-vulnerability-as-15000-instances-remain-exposed/]]></link>
			<title>Attackers Exploit Flowise Injection Vulnerability as 15,000+ Instances Remain Exposed</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 09:29:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/fake-installers-spread-rats-monero-miners-in-ongoing-malware-campaign/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/fake-installers-spread-rats-monero-miners-in-ongoing-malware-campaign/]]></link>
			<title>Fake Installers Spread RATs, Monero Miners in Ongoing Malware Campaign</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 09:29:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/threat-actors-exploit-logmein-resolve-screenconnect-in-phishing-campaigns/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/threat-actors-exploit-logmein-resolve-screenconnect-in-phishing-campaigns/]]></link>
			<title>Threat Actors Exploit LogMeIn Resolve, ScreenConnect in Phishing Campaigns</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 09:29:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/iran-linked-hackers-hit-m365-tenants-in-middle-east-password-spray-campaign/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/iran-linked-hackers-hit-m365-tenants-in-middle-east-password-spray-campaign/]]></link>
			<title>Iran-Linked Hackers Hit M365 Tenants in Middle East Password Spray Campaign</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 09:29:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/the-rise-of-proactive-cyber-why-defense-is-no-longer-enough/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/the-rise-of-proactive-cyber-why-defense-is-no-longer-enough/]]></link>
			<title>The rise of proactive cyber: Why defense is no longer enough</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 09:29:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/critical-chrome-flaws-let-attackers-execute-arbitrary-code/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/critical-chrome-flaws-let-attackers-execute-arbitrary-code/]]></link>
			<title>Critical Chrome Flaws Let Attackers Execute Arbitrary Code</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 09:19:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/iran-linked-password-spraying-campaign-targets-300-israeli-microsoft-365-organizations/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/iran-linked-password-spraying-campaign-targets-300-israeli-microsoft-365-organizations/]]></link>
			<title>Iran-Linked Password-Spraying Campaign Targets 300+ Israeli Microsoft 365 Organizations</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 20:21:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/automated-credential-harvesting-campaign-exploits-react2shell-flaw/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/automated-credential-harvesting-campaign-exploits-react2shell-flaw/]]></link>
			<title>Automated Credential Harvesting Campaign Exploits React2Shell Flaw</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 18:47:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/shadow-ai-in-healthcare-is-here-to-stay/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/shadow-ai-in-healthcare-is-here-to-stay/]]></link>
			<title>Shadow AI in Healthcare Is Here to Stay</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 18:47:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/owasp-genai-security-project-gets-update-new-tools-matrix/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/owasp-genai-security-project-gets-update-new-tools-matrix/]]></link>
			<title>OWASP GenAI Security Project Gets Update, New Tools Matrix</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 18:47:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/trojanized-pypi-ai-proxy-steals-claude-prompt-exfiltrates-data/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/trojanized-pypi-ai-proxy-steals-claude-prompt-exfiltrates-data/]]></link>
			<title>Trojanized PyPI AI Proxy Steals Claude Prompt, Exfiltrates Data</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 18:47:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/google-brings-lazy-loading-to-media-files-in-new-chrome-release/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/google-brings-lazy-loading-to-media-files-in-new-chrome-release/]]></link>
			<title>Google Brings Lazy Loading to Media Files in New Chrome Release</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 18:47:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/drift-protocol-hit-in-286m-suspected-north-korea-linked-crypto-heist/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/drift-protocol-hit-in-286m-suspected-north-korea-linked-crypto-heist/]]></link>
			<title>Drift Protocol Hit in $286M Suspected North Korea-Linked Crypto Heist</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 18:47:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/multi-os-cyberattacks-how-socs-close-a-critical-risk-in-3-steps/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/multi-os-cyberattacks-how-socs-close-a-critical-risk-in-3-steps/]]></link>
			<title>Multi-OS Cyberattacks: How SOCs Close a Critical Risk in 3 Steps</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 18:47:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/⚡-weekly-recap-axios-hack-chrome-0-day-fortinet-exploits-paragon-spyware-and-more/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/⚡-weekly-recap-axios-hack-chrome-0-day-fortinet-exploits-paragon-spyware-and-more/]]></link>
			<title>⚡ Weekly Recap: Axios Hack, Chrome 0-Day, Fortinet Exploits, Paragon Spyware and More</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 18:47:03 +0000]]></pubDate>
		</item>
				</channel>
</rss>
