<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 10, 2026 at 6:36 pm by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://cyberbytesdaily.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Cyberbytes Daily</title>
		<link><![CDATA[https://cyberbytesdaily.com]]></link>
		<description><![CDATA[Cyberbytes Daily]]></description>
		<lastBuildDate><![CDATA[Thu, 09 Apr 2026 13:33:50 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://cyberbytesdaily.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://cyberbytesdaily.com/attackers-deploy-hidden-magecart-skimmer-on-magento-using-svg-onload-abuse/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/attackers-deploy-hidden-magecart-skimmer-on-magento-using-svg-onload-abuse/]]></link>
			<title>Attackers Deploy Hidden Magecart Skimmer on Magento Using SVG onload Abuse</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 13:33:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/the-cyber-winners-and-losers-in-trumps-2027-budget/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/the-cyber-winners-and-losers-in-trumps-2027-budget/]]></link>
			<title>The cyber winners and losers in Trump’s 2027 budget</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 10:36:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/cmmc-compliance-in-the-age-of-ai/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/cmmc-compliance-in-the-age-of-ai/]]></link>
			<title>CMMC compliance in the age of AI</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 10:36:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/tp-link-devices-at-risk-as-multiple-security-flaws-enable-takeover/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/tp-link-devices-at-risk-as-multiple-security-flaws-enable-takeover/]]></link>
			<title>TP-Link Devices at Risk as Multiple Security Flaws Enable Takeover</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 10:36:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/mallory-launches-ai-native-threat-intelligence-platform-turning-global-threat-data-into-prioritized-action/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/mallory-launches-ai-native-threat-intelligence-platform-turning-global-threat-data-into-prioritized-action/]]></link>
			<title>Mallory Launches AI-Native Threat Intelligence Platform, Turning Global Threat Data Into Prioritized Action</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 10:36:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/google-rolls-out-dbsc-in-chrome-146-to-block-session-theft-on-windows/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/google-rolls-out-dbsc-in-chrome-146-to-block-session-theft-on-windows/]]></link>
			<title>Google Rolls Out DBSC in Chrome 146 to Block Session Theft on Windows</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 10:36:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/iranian-apt-alert-5219-rockwell-plcs-exposed-online/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/iranian-apt-alert-5219-rockwell-plcs-exposed-online/]]></link>
			<title>Iranian APT alert: 5,219 Rockwell PLCs exposed online</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 10:36:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/why-most-zero-trust-architectures-fail-at-the-traffic-layer/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/why-most-zero-trust-architectures-fail-at-the-traffic-layer/]]></link>
			<title>Why most zero-trust architectures fail at the traffic layer</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 10:36:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/threatsday-bulletin-hybrid-p2p-botnet-13-year-old-apache-rce-and-18-more-stories/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/threatsday-bulletin-hybrid-p2p-botnet-13-year-old-apache-rce-and-18-more-stories/]]></link>
			<title>ThreatsDay Bulletin: Hybrid P2P Botnet, 13-Year-Old Apache RCE and 18 More Stories</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 13:33:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/weak-at-the-seams-2/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/weak-at-the-seams-2/]]></link>
			<title>Weak at the seams</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 13:33:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/new-phishing-campaign-exploits-google-storage-to-deliver-remcos-rat/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/new-phishing-campaign-exploits-google-storage-to-deliver-remcos-rat/]]></link>
			<title>New Phishing Campaign Exploits Google Storage to Deliver Remcos RAT</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 13:33:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/new-clickfix-variant-bypasses-apple-safeguards-with-one-click-script-execution/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/new-clickfix-variant-bypasses-apple-safeguards-with-one-click-script-execution/]]></link>
			<title>New ClickFix variant bypasses Apple safeguards with one‑click script execution</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 13:33:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/the-hidden-security-risks-of-shadow-ai-in-enterprises/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/the-hidden-security-risks-of-shadow-ai-in-enterprises/]]></link>
			<title>The Hidden Security Risks of Shadow AI in Enterprises</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 13:33:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/miwic26-funke-omolere-senior-technology-compliance-product-owner-at-adobe/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/miwic26-funke-omolere-senior-technology-compliance-product-owner-at-adobe/]]></link>
			<title>MIWIC26: Funke Omolere, Senior Technology Compliance Product Owner at Adobe</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 09:19:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/ai-led-remediation-crisis-prompts-hackerone-to-pause-bug-bounties/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/ai-led-remediation-crisis-prompts-hackerone-to-pause-bug-bounties/]]></link>
			<title>AI-Led Remediation Crisis Prompts HackerOne to Pause Bug Bounties</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 20:06:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/clickfix-campaign-abuses-macos-script-editor-to-deploy-atomic-stealer/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/clickfix-campaign-abuses-macos-script-editor-to-deploy-atomic-stealer/]]></link>
			<title>ClickFix Campaign Abuses macOS Script Editor to Deploy Atomic Stealer</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 13:33:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/arelion-employs-netscout-arbor-ddos-protection-products/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/arelion-employs-netscout-arbor-ddos-protection-products/]]></link>
			<title>Arelion employs NETSCOUT Arbor DDoS protection products</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 20:06:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/clickfix-malicious-dmgs-push-notnullosx-to-macos-users/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/clickfix-malicious-dmgs-push-notnullosx-to-macos-users/]]></link>
			<title>ClickFix, Malicious DMGs Push notnullOSX to macOS Users</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 13:33:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/keeper-security-expands-pam-browser-isolation-to-support-advanced-web-browsing-workflows/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/keeper-security-expands-pam-browser-isolation-to-support-advanced-web-browsing-workflows/]]></link>
			<title>Keeper Security Expands PAM Browser Isolation to Support Advanced Web Browsing Workflows</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 09:19:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/weak-at-the-seams/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/weak-at-the-seams/]]></link>
			<title>Weak at the seams</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 09:19:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/how-botnet-driven-ddos-attacks-evolved-in-2h-2025/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/how-botnet-driven-ddos-attacks-evolved-in-2h-2025/]]></link>
			<title>How botnet-driven DDoS attacks evolved in 2H 2025</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 18:35:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/masjesu-botnet-emerges-as-ddos-for-hire-service-targeting-global-iot-devices/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/masjesu-botnet-emerges-as-ddos-for-hire-service-targeting-global-iot-devices/]]></link>
			<title>Masjesu Botnet Emerges as DDoS-for-Hire Service Targeting Global IoT Devices</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 18:35:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/patch-windows-collapse-as-time-to-exploit-accelerates/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/patch-windows-collapse-as-time-to-exploit-accelerates/]]></link>
			<title>Patch windows collapse as time-to-exploit accelerates</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 09:19:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/hpe-aruba-private-5g-vulnerability-opens-door-to-credential-theft-attacks/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/hpe-aruba-private-5g-vulnerability-opens-door-to-credential-theft-attacks/]]></link>
			<title>HPE Aruba Private 5G Vulnerability Opens Door to Credential Theft Attacks</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 10:36:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/6-winter-2026-g2-leader-badges-prove-this-ddos-protection-stands-out/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/6-winter-2026-g2-leader-badges-prove-this-ddos-protection-stands-out/]]></link>
			<title>6 Winter 2026 G2 Leader Badges prove this DDoS protection stands out</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 18:35:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/new-chaos-variant-targets-misconfigured-cloud-deployments-adds-socks-proxy/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/new-chaos-variant-targets-misconfigured-cloud-deployments-adds-socks-proxy/]]></link>
			<title>New Chaos Variant Targets Misconfigured Cloud Deployments, Adds SOCKS Proxy</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 18:35:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/linux-foundation-leader-impersonated-in-slack-attack-on-open-source-developers/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/linux-foundation-leader-impersonated-in-slack-attack-on-open-source-developers/]]></link>
			<title>Linux Foundation Leader Impersonated in Slack Attack on Open Source Developers</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 09:19:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/most-organisations-face-an-unsecured-api-surge-as-ai-agents-outpace-security/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/most-organisations-face-an-unsecured-api-surge-as-ai-agents-outpace-security/]]></link>
			<title>Most Organisations Face an Unsecured API Surge As AI Agents Outpace Security</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 16:26:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/check-point-software-celebrates-partner-success-at-annual-uk-partner-awards/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/check-point-software-celebrates-partner-success-at-annual-uk-partner-awards/]]></link>
			<title>Check Point Software Celebrates Partner Success at Annual UK Partner Awards</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 16:26:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/miwic26-nicole-bucala-ceo-of-databee-a-comcast-company/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/miwic26-nicole-bucala-ceo-of-databee-a-comcast-company/]]></link>
			<title>MIWIC26: Nicole Bucala, CEO of DataBee, A Comcast Company</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 16:26:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/full-sail-university-to-open-ibm-cyber-defense-range-powered-by-aws-and-cloud-range-on-campus/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/full-sail-university-to-open-ibm-cyber-defense-range-powered-by-aws-and-cloud-range-on-campus/]]></link>
			<title>Full Sail University to Open IBM Cyber Defense Range Powered by AWS and Cloud Range on Campus</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 16:26:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/chinas-tianjin-supercomputer-center-allegedly-hit-in-10-petabyte-data-theft/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/chinas-tianjin-supercomputer-center-allegedly-hit-in-10-petabyte-data-theft/]]></link>
			<title>China’s Tianjin Supercomputer Center Allegedly Hit in 10-Petabyte Data Theft</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 09:19:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/niobium-introduces-the-fog/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/niobium-introduces-the-fog/]]></link>
			<title>Niobium Introduces The Fog</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 16:26:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/pluralsight-launches-secureready-to-help-organizations-build-job-ready-cybersecurity-teams/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/pluralsight-launches-secureready-to-help-organizations-build-job-ready-cybersecurity-teams/]]></link>
			<title>Pluralsight Launches SecureReady to Help Organizations Build Job-Ready Cybersecurity Teams</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 16:26:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/apt28-deploys-prismex-malware-in-campaign-targeting-ukraine-and-nato-allies/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/apt28-deploys-prismex-malware-in-campaign-targeting-ukraine-and-nato-allies/]]></link>
			<title>APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 16:26:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/fraud-rockets-higher-in-mobile-first-latin-america/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/fraud-rockets-higher-in-mobile-first-latin-america/]]></link>
			<title>Fraud Rockets Higher in Mobile-First Latin America</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 16:26:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/yael-nardi-joins-minimus-as-chief-business-officer-to-drive-hyper-growth/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/yael-nardi-joins-minimus-as-chief-business-officer-to-drive-hyper-growth/]]></link>
			<title>Yael Nardi joins Minimus as Chief Business Officer to drive hyper-growth</title>
			<pubDate><![CDATA[Wed, 08 Apr 2026 16:26:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/cisa-issues-warning-on-critical-ivanti-epmm-flaw-exploited-in-ongoing-attacks/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/cisa-issues-warning-on-critical-ivanti-epmm-flaw-exploited-in-ongoing-attacks/]]></link>
			<title>CISA Issues Warning on Critical Ivanti EPMM Flaw Exploited in Ongoing Attacks</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 09:19:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/china-linked-storm-1175-exploits-zero-days-to-rapidly-deploy-medusa-ransomware/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/china-linked-storm-1175-exploits-zero-days-to-rapidly-deploy-medusa-ransomware/]]></link>
			<title>China-Linked Storm-1175 Exploits Zero-Days to Rapidly Deploy Medusa Ransomware</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 09:29:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/new-microsoft-defender-update-issued-for-windows-11-windows-10-and-server-images/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/new-microsoft-defender-update-issued-for-windows-11-windows-10-and-server-images/]]></link>
			<title>New Microsoft Defender Update Issued for Windows 11, Windows 10, and Server Images</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 09:29:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/flowise-ai-agent-builder-under-active-cvss-10-0-rce-exploitation-12000-instances-exposed/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/flowise-ai-agent-builder-under-active-cvss-10-0-rce-exploitation-12000-instances-exposed/]]></link>
			<title>Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 09:29:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/the-noisy-tenants-engineering-fairness-in-multi-tenant-siem-solutions/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/the-noisy-tenants-engineering-fairness-in-multi-tenant-siem-solutions/]]></link>
			<title>The noisy tenants: Engineering fairness in multi-tenant SIEM solutions</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 09:29:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/attackers-exploit-flowise-injection-vulnerability-as-15000-instances-remain-exposed/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/attackers-exploit-flowise-injection-vulnerability-as-15000-instances-remain-exposed/]]></link>
			<title>Attackers Exploit Flowise Injection Vulnerability as 15,000+ Instances Remain Exposed</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 09:29:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/roningloader-campaign-uses-dll-side-loading-code-injection-to-slip-past-defenses/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/roningloader-campaign-uses-dll-side-loading-code-injection-to-slip-past-defenses/]]></link>
			<title>RoningLoader Campaign Uses DLL Side-Loading, Code Injection to Slip Past Defenses</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 09:19:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/fake-installers-spread-rats-monero-miners-in-ongoing-malware-campaign/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/fake-installers-spread-rats-monero-miners-in-ongoing-malware-campaign/]]></link>
			<title>Fake Installers Spread RATs, Monero Miners in Ongoing Malware Campaign</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 09:29:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/threat-actors-exploit-logmein-resolve-screenconnect-in-phishing-campaigns/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/threat-actors-exploit-logmein-resolve-screenconnect-in-phishing-campaigns/]]></link>
			<title>Threat Actors Exploit LogMeIn Resolve, ScreenConnect in Phishing Campaigns</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 09:29:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/critical-chrome-flaws-let-attackers-execute-arbitrary-code/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/critical-chrome-flaws-let-attackers-execute-arbitrary-code/]]></link>
			<title>Critical Chrome Flaws Let Attackers Execute Arbitrary Code</title>
			<pubDate><![CDATA[Thu, 09 Apr 2026 09:19:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/iran-linked-hackers-hit-m365-tenants-in-middle-east-password-spray-campaign/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/iran-linked-hackers-hit-m365-tenants-in-middle-east-password-spray-campaign/]]></link>
			<title>Iran-Linked Hackers Hit M365 Tenants in Middle East Password Spray Campaign</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 09:29:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/the-rise-of-proactive-cyber-why-defense-is-no-longer-enough/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/the-rise-of-proactive-cyber-why-defense-is-no-longer-enough/]]></link>
			<title>The rise of proactive cyber: Why defense is no longer enough</title>
			<pubDate><![CDATA[Tue, 07 Apr 2026 09:29:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://cyberbytesdaily.com/middle-east-espionage-attack-uses-fake-secure-messaging-apps-to-deliver-prospy/]]></guid>
			<link><![CDATA[https://cyberbytesdaily.com/middle-east-espionage-attack-uses-fake-secure-messaging-apps-to-deliver-prospy/]]></link>
			<title>Middle East Espionage Attack Uses Fake Secure Messaging Apps to Deliver ProSpy</title>
			<pubDate><![CDATA[Fri, 10 Apr 2026 10:36:44 +0000]]></pubDate>
		</item>
				</channel>
</rss>
