<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://cyber-times.in</loc>
<lastmod>2026-04-28T12:33:12.646Z</lastmod>
<changefreq>daily</changefreq>
<priority>1</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch</loc>
<lastmod>2026-04-28T12:33:12.646Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://cyber-times.in/articles</loc>
<lastmod>2026-04-28T12:33:12.646Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://cyber-times.in/cve</loc>
<lastmod>2026-04-28T12:33:12.646Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/indian-scams</loc>
<lastmod>2026-04-28T12:33:12.646Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://cyber-times.in/learn</loc>
<lastmod>2026-04-28T12:33:12.646Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/checklists</loc>
<lastmod>2026-04-28T12:33:12.646Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://cyber-times.in/jobs</loc>
<lastmod>2026-04-28T12:33:12.646Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://cyber-times.in/about</loc>
<lastmod>2026-04-28T12:33:12.646Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cyber-times.in/privacy</loc>
<lastmod>2026-04-28T12:33:12.646Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.3</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/phishing attack</loc>
<lastmod>2026-04-28T12:33:12.653Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/email scam</loc>
<lastmod>2026-04-28T12:33:12.653Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/cyber security basics</loc>
<lastmod>2026-04-28T12:33:12.653Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/whatsapp hack</loc>
<lastmod>2026-04-28T12:33:12.653Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/otp scam whatsapp</loc>
<lastmod>2026-04-28T12:33:12.653Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/account hacking</loc>
<lastmod>2026-04-28T12:33:12.653Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/india cyber scam</loc>
<lastmod>2026-04-28T12:33:12.653Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/otp scam</loc>
<lastmod>2026-04-28T12:33:12.653Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/banking fraud</loc>
<lastmod>2026-04-28T12:33:12.653Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/otp fraud</loc>
<lastmod>2026-04-28T12:33:12.653Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/mobile security</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/upi scam</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/screen sharing scam</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/india cyber fraud</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/stuxnet</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/fast16</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/equation-group</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/nsa</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/shadow-brokers</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/cyber-sabotage</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/apt</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/nation-state</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/malware</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/cyberwarfare</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/information-security</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/cybersecurity</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/apple</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/ios</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/signal</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/push-notifications</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/digital-forensics</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/data-privacy</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/privacy</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/digital-security</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/cohere-ai</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/terrarium</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/sandbox-escape</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/container-security</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/pyodide</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/prototype-pollution</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/docker</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/ai-security</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/microsoft</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/patch-tuesday</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/sharepoint</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/zero-day</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/windows</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/remote-code-execution</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/cisa-kev</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/network-security</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/openai</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/gpt-5</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/ai-cybersecurity</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/threat-intelligence</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/codex-security</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/application-security</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/ai-for-defense</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/supply-chain-attack</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/axios-npm</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/north-korea</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/unc1069</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/macos</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/github-actions</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/software-security</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/adobe-acrobat</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/adobe-reader</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/endpoint-security</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/apache-activemq</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/phorpiex-botnet</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/weekly-roundup</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/npm</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/supply-chain</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/pdf-exploit</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/masjesu</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/xorbot</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/ddos-for-hire</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/botnet</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/iot</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/ddos</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/trellix</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/nsfocus</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/mirai</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/router</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/d-link</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/netgear</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/tp-link</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/huawei</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/gpon</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/mvpower</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/telegram</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/xor-encryption</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/vietnam</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/cyber-security</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/infosec</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/data-security</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/internet-security</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/computer-security</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/cve-2026-34040</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/docker-engine</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/authz-plugin</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/authorization-bypass</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/moby</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/container-escape</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/host-access</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/ai-agent</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/openclaw</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/prompt-injection</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/kubernetes</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/cyera</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/cvss-8-8</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/dprk</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/unc4736</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/drift-protocol</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/social-engineering</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/cryptocurrency</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/defi</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/solana</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/applejeus</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/citrine-sleet</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/golden-chollima</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/multisig</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/durable-nonce</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/radiant-capital</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/strapi</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/malicious-packages</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/redis</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/postgresql</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/safedep</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/reverse-shell</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/persistent-implant</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/credential-harvesting</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/postinstall</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/sock-puppet</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/guardarian</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/vs-code</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/iiolitelabs</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/open-vsx</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/php-webshell</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/cookie-controlled</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/cron-persistence</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/linux-hosting</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/self-healing</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/microsoft-defender</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/cpanel</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/jailshell</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/obfuscation</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/base64</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/living-off-the-land</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/web-shell</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/rce</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/server-hardening</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/php-fpm</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/axios</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/waveshaper</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/waveshaper-v2</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/silkbell</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/plain-crypto-js</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/gtig</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/google</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/mandiant</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/stepsecurity</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/backdoor</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/rat</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/command-injection</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/developer-security</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/ci-cd</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/github</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/chatgpt</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/codex</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/data-exfiltration</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/github-token</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/check-point</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/beyondtrust</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/side-channel</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/llm-security</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/github-oauth</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/browser-extensions</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/prompt-poaching</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/coruna</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/ios-exploit</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/operation-triangulation</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/iphone-security</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/mobile-security</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/kaspersky</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/plasmaloader</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/nation-state-attack</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/cve-2026-3055</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/cve-2026-4368</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/citrix</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/netscaler</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/netscaler-adc</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/netscaler-gateway</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/citrix-bleed</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/saml-idp</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/out-of-bounds-read</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/memory-leak</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/unauthenticated</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/enterprise-security</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/ssl-vpn</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/watchtowr</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/rapid7</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/cloud-software-group</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/cve-2026-21992</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/oracle</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/oracle-identity-manager</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/oracle-web-services-manager</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/fusion-middleware</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/critical</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/out-of-band</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/kb878741</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/cve-2025-61757</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/cisa</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/identity-management</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/android</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/sideloading</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/play-protect</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/developer-verification</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/advanced-flow</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/scams</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/android-security</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/apk</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/google-play</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/darksword</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/iphone</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/exploit-kit</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/webkit</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/javascriptcore</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/safari</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/cve-2026-20700</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/cve-2025-43529</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/cve-2025-31277</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/cve-2025-14174</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/ghostblade</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/ghostknife</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/ghostsaber</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/unc6353</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/unc6748</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/pars-defense</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/iverify</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/lookout</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/state-sponsored</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/spyware</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/watering-hole</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/ukraine</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/cryptocurrency-theft</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/cve-2026-3888</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/ubuntu</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/snapd</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/snap-confine</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/systemd-tmpfiles</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/privilege-escalation</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/local-privilege-escalation</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/root</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/qualys</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/linux</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/lpe</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/usn-8102-1</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/ubuntu-24-04</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/uutils</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/coreutils</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/cve-2026-32746</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/telnetd</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/gnu-inetutils</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/port-23</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/buffer-overflow</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/linemode</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/slc</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/embedded-systems</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/legacy-protocol</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/dream-security</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/unpatched</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/glassworm</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/forcememo</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/python</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/pip</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/credential-theft</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/cursor</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/django</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/pypi</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/aikido</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/open-source-security</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/chrome</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/cve-2026-3909</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/cve-2026-3910</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/skia</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/v8</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/browser-security</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/out-of-bounds-write</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/javascript-engine</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/actively-exploited</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/patch-now</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/socksescort</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/avrecon</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/operation-lightning</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/fbi</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/europol</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/residential-proxy</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/router-security</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/soho</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/fraud</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/ransomware</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/account-takeover</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/cybercrime-takedown</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/doj</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/banking-trojan</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/pix</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/brazil</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/crypto</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/pixrevolution</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/taxispy</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/beatbanker</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/surxrat</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/accessibility-abuse</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/financial-fraud</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/nx</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/aws</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/unc6426</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/cloud-security</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/oidc</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/iam</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/devsecops</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/s1ngularity</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/cve-2026-0628</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/gemini</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/extensions</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/unit42</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/palo-alto</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/glic-jack</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/open-source</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/vulnerability-scanning</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/gnupg</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/chromium</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/php</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/hikvision</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/rockwell-automation</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/critical-infrastructure</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/ics</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/ot-security</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/cameras</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/cve-2017-7921</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/cve-2021-22681</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/transparent-tribe</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/ai-malware</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/india</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/pakistan</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/government</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/freepbx</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/voip</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/wordpress</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/cms</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/remote-access</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/website</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/operating-system</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/updates</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/browser</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/email</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/outlook</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/data-breach</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/smart-home</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/tag/camera</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/pre-stuxnet-fast16-malware-discovered-2005-nsa-linked-cyber-sabotage-framework-rewrites-history-of-state-cyberweapons-202604</loc>
<lastmod>2026-04-26T08:23:01.113Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/cve-2026-33626-lmdeploy-ssrf-flaw-exploited-in-12-hours-attackers-stole-aws-cloud-credentials-via-ai-image-loader-202604</loc>
<lastmod>2026-04-24T11:45:19.825Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/cve-2026-33626-lmdeploy-ssrf-flaw-exploited-in-12-hours-attackers-stole-aws-cloud-credentials-via-ai-image-loader-202604</loc>
<lastmod>2026-04-24T11:44:49.430Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/cve-2026-28950-apple-patches-ios-flaw-that-let-fbi-extract-deleted-signal-messages-from-push-notification-database-202604</loc>
<lastmod>2026-04-23T13:11:37.312Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/cve-2026-5752-cohere-ai-terrarium-sandbox-flaw-allows-root-code-execution-and-container-escape-no-patch-coming-202604</loc>
<lastmod>2026-04-22T11:41:09.486Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/microsoft-april-2026-patch-tuesday-sharepoint-zero-day-cve-2026-32201-actively-exploited-cvss-9-8-windows-ike-rce-among-169-fixes-202604</loc>
<lastmod>2026-04-15T12:03:11.905Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/openai-launches-gpt-5-4-cyber-ai-built-for-cybersecurity-defenders-with-codex-security-fixing-3-000-critical-flaws-202604</loc>
<lastmod>2026-04-15T11:52:37.382Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/openai-revokes-macos-app-certificate-after-north-korea-s-axios-supply-chain-attack-update-chatgpt-before-may-8-202604</loc>
<lastmod>2026-04-13T13:44:25.394Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/cve-2026-34621-adobe-releases-emergency-patch-for-actively-exploited-acrobat-reader-flaw-update-now-202604</loc>
<lastmod>2026-04-12T18:30:21.164Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/cve-2026-34197-13-year-old-apache-activemq-rce-flaw-chains-with-auth-bypass-plus-20-more-threats-this-week-202604</loc>
<lastmod>2026-04-11T11:57:07.472Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/this-week-in-cybersecurity-april-11-2026-npm-backdoors-adobe-zero-day-docker-escape-202604</loc>
<lastmod>2026-04-11T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/adobe-reader-zero-day-actively-exploited-via-fake-invoice-pdfs-no-patch-available-yet-202604</loc>
<lastmod>2026-04-09T12:48:54.874Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/masjesu-botnet-the-stealthy-ddos-for-hire-service-quietly-hijacking-iot-devices-since-2023-now-hitting-300-gbps-202604</loc>
<lastmod>2026-04-08T18:03:20.040Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/cve-2026-34040-docker-authz-plugin-bypass-lets-attackers-escape-containers-and-gain-full-host-access-ai-agents-can-trigger-it-automatically-202604</loc>
<lastmod>2026-04-07T17:54:11.237Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/285-million-drift-hack-north-korea-s-unc4736-spent-six-months-building-trust-before-draining-everything-in-10-seconds-202604</loc>
<lastmod>2026-04-06T07:20:22.073Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/36-malicious-npm-packages-disguised-as-strapi-plugins-exploit-redis-and-postgresql-to-deploy-persistent-implants-and-reverse-shells-202604</loc>
<lastmod>2026-04-05T14:06:36.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/microsoft-exposes-cookie-controlled-php-web-shells-that-resurrect-themselves-via-cron-a-new-stealthy-linux-persistence-technique-202604</loc>
<lastmod>2026-04-04T17:10:36.111Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/cve-2025-55182-react2shell-actively-exploited-uat-10608-breaches-766-next-js-hosts-and-steals-aws-keys-ssh-keys-stripe-tokens-202604</loc>
<lastmod>2026-04-03T10:32:41.580Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/north-korea-s-unc1069-backdoored-axios-npm-package-183-million-weekly-downloads-exposed-to-waveshaper-v2-backdoor-202604</loc>
<lastmod>2026-04-01T11:45:03.082Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/openai-patches-two-critical-vulnerabilities-chatgpt-data-exfiltration-via-side-channel-and-codex-command-injection-exposing-github-tokens-202603</loc>
<lastmod>2026-03-31T10:18:58.316Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/coruna-ios-exploit-kit-linked-to-operation-triangulation-millions-of-iphones-at-risk-202603</loc>
<lastmod>2026-03-26T13:30:12.046Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/cve-2026-3055-citrix-netscaler-critical-flaw-leaks-sensitive-memory-patch-immediately-before-exploitation-begins-202603</loc>
<lastmod>2026-03-25T06:44:04.764Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/cve-2026-21992-oracle-issues-emergency-patch-for-critical-unauthenticated-rce-in-identity-manager-and-web-services-manager-202603</loc>
<lastmod>2026-03-21T17:22:14.757Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/google-s-24-hour-android-sideloading-wait-what-it-means-for-you-and-why-it-exists-202603</loc>
<lastmod>2026-03-20T16:47:40.242Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/darksword-ios-exploit-kit-6-vulnerabilities-3-zero-days-full-iphone-takeover-221-million-devices-still-at-risk-202603</loc>
<lastmod>2026-03-19T16:58:54.661Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/cve-2026-3888-ubuntu-default-installation-flaw-lets-unprivileged-attackers-escalate-to-root-via-systemd-cleanup-timing-202603</loc>
<lastmod>2026-03-18T11:50:28.118Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/cve-2026-32746-critical-unpatched-telnetd-flaw-allows-unauthenticated-root-rce-via-port-23-no-patch-until-april-2026-202603</loc>
<lastmod>2026-03-18T11:31:16.887Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/glassworm-forcememo-stolen-github-tokens-used-to-silently-inject-malware-into-240-python-repositories-attack-still-active-202603</loc>
<lastmod>2026-03-17T12:47:41.450Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/google-patches-two-chrome-zero-days-actively-exploited-in-the-wild-skia-and-v8-engine-both-affected-202603</loc>
<lastmod>2026-03-13T11:56:53.873Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/operation-lightning-authorities-dismantle-socksescort-proxy-botnet-that-hijacked-369-000-home-routers-across-163-countries-202603</loc>
<lastmod>2026-03-13T11:20:49.357Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/apple-backports-security-fixes-for-older-iphones-targeted-by-the-coruna-exploit-kit-update-now-if-you-have-an-iphone-6s-through-iphone-x-202603</loc>
<lastmod>2026-03-12T12:32:57.319Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/six-new-android-malware-families-discovered-targeting-banking-apps-pix-payments-and-crypto-wallets-in-real-time-202603</loc>
<lastmod>2026-03-12T12:00:26.371Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/microsoft-march-2026-patch-tuesday-84-flaws-fixed-including-two-zero-days-a-cvss-9-8-rce-and-a-zero-click-copilot-data-leak-202603</loc>
<lastmod>2026-03-11T12:39:38.217Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/from-a-stolen-token-to-full-aws-admin-access-in-72-hours-the-unc6426-nx-supply-chain-attack-explained-202603</loc>
<lastmod>2026-03-11T12:14:41.682Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/glic-jack-chrome-vulnerability-let-malicious-extensions-hijack-gemini-panel-and-access-your-camera-files-and-mic-202603</loc>
<lastmod>2026-03-10T07:20:45.470Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/openai-codex-security-ai-agent-scanned-1-2-million-code-commits-and-found-10-561-high-severity-vulnerabilities-202603</loc>
<lastmod>2026-03-09T08:43:42.971Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/cisa-flags-hikvision-and-rockwell-automation-cvss-9-8-flaws-as-actively-exploited-patch-by-march-26-202603</loc>
<lastmod>2026-03-07T08:09:33.850Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/transparent-tribe-uses-ai-to-mass-produce-malware-in-campaign-targeting-india-202603</loc>
<lastmod>2026-03-07T07:54:30.125Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/900-freepbx-phone-systems-hacked-via-critical-command-injection-flaw-202602</loc>
<lastmod>2026-02-28T11:33:58.308Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/wordpress-critical-security-flaw-feb-2026</loc>
<lastmod>2026-02-08T15:30:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/windows-security-update-feb-2026</loc>
<lastmod>2026-02-05T14:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/chrome-browser-privacy-leak-feb-2026</loc>
<lastmod>2026-02-01T10:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/outlook-email-security-flaw-feb-2026</loc>
<lastmod>2026-02-07T18:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/threat-watch/smart-home-camera-vulnerability-feb-2026</loc>
<lastmod>2026-02-06T12:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/indian-scams/whatsapp-account-hacking-scam-hackers</loc>
<lastmod>2026-04-28T12:10:08.741Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/indian-scams/otp-scam-hackers-trick-sharing</loc>
<lastmod>2026-04-28T11:54:36.929Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/indian-scams/fake-job-scam-telegram-whatsapp</loc>
<lastmod>2026-04-27T15:46:18.975Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/indian-scams/upi-scam-screen-sharing-apps</loc>
<lastmod>2026-04-26T13:44:34.624Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/learn/phishing-attack-explained-hackers-trick</loc>
<lastmod>2026-04-28T12:32:24.912Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://cyber-times.in/cve/CVE-2026-33626</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/cve/CVE-2026-28950</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/cve/CVE-2026-5752</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/cve/CVE-2026-32201</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/cve/CVE-2026-33634</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/cve/CVE-2026-34621</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/cve/CVE-2026-34197</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/cve/CVE-2014-8361</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/cve/CVE-2017-17215</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/cve/CVE-2023-1389</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/cve/CVE-2026-34040</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/cve/CVE-2025-55182</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/cve/CVE-2023-32434</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/cve/CVE-2023-38606</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/cve/CVE-2026-3055</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/cve/CVE-2026-4368</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/cve/CVE-2026-21992</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/cve/CVE-2025-31277</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/cve/CVE-2025-43529</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/cve/CVE-2026-20700</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/cve/CVE-2025-14174</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/cve/CVE-2025-43510</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/cve/CVE-2025-43520</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/cve/CVE-2026-3888</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/cve/CVE-2026-3909</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/cve/CVE-2026-3910</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/cve/CVE-2023-43010</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/cve/CVE-2023-41974</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/cve/CVE-2023-43000</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/cve/CVE-2024-23222</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/cve/CVE-2026-26127</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/cve/CVE-2026-21262</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/cve/CVE-2026-21536</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/cve/CVE-2026-26144</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/cve/CVE-2026-25187</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/cve/CVE-2026-26118</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/cve/CVE-2026-0628</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/cve/CVE-2026-24881</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/cve/CVE-2025-35430</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/cve/CVE-2025-35431</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/cve/CVE-2017-7921</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/cve/CVE-2021-22681</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/cve/CVE-2025-64328</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/cve/CVE-2024-12345</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/cve/CVE-2024-12346</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/cve/CVE-2024-12347</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/cve/CVE-2024-12348</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyber-times.in/cve/CVE-2024-12349</loc>
<lastmod>2026-04-28T12:33:12.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
</urlset>
