<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
<url>
<loc>https://thehackernewsbdarija.com</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com" />
<changefreq>daily</changefreq>
<priority>1</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en" />
<changefreq>daily</changefreq>
<priority>0.95</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/archive</loc>
<changefreq>daily</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/newsletter</loc>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/sponsors</loc>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/about</loc>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/ai-security-vulnerability</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/ad-fraud-artificial-intelligence</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/artificial-intelligence-enterprise-security</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/artificial-intelligence-mobile-security</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/artificial-intelligence-privacy</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/artificial-intelligence-secure-coding</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/artificial-intelligence-threat-detection</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/artificial-intelligence-vulnerability</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/botnet-cryptomining</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/botnet-endpoint-security</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/browser-security-vulnerability</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/cloud-security-ai-security</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/cloud-security-data-breach</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/cloud-security-malware</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/cloud-security-ransomware</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/cloud-security-threat-intelligence</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/compliance-cyber-insurance</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/compliance-data-protection</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/cryptocurrency-threat-intelligence</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/cryptomining-malware</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/cryptomining-network-security</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/cyber-espionage-malware</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/cyber-espionage-network-security</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/cyber-espionage-vulnerability</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/cybercrime-financial-crime</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/cybercrime-threat-intelligence</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/cybersecurity-hacking</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/cybersecurity-hacking-news</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/cybersecurity-malware</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/cyberwarfare-national-security</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/ddos-cybercrime</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/data-breach-artificial-intelligence</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/data-protection-security-automation</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/devsecops-artificial-intelligence</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/devsecops-software-security</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/endpoint-security-data-protection</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/endpoint-security-digital-forensics</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/enterprise-security-artificial-intelligence</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/espionage-national-security</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/exposure-management-security-operations</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/hacking-news-cybersecurity-news</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/hacktivism-critical-infrastructure</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/hacktivism-threat-intelligence</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/insider-threat-cybercrime</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/iot-security-network-security</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/iot-security-vulnerability</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/linux-server-hardening</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/linux-vulnerability</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/malware-blockchain</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/malware-browser-security</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/malware-cloud-security</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/malware-critical-infrastructure</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/malware-cryptocurrency</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/malware-cyber-espionage</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/malware-devops</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/malware-devsecops</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/malware-operational-technology</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/malware-social-engineering</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/malware-threat-intelligence</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/malware-website-security</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/malware-windows-security</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/mobile-security-artificial-intelligence</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/mobile-security-compliance</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/mobile-security-email-security</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/mobile-security-network-security</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/mobile-security-surveillance</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/mobile-security-threat-intelligence</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/money-laundering-regulatory-compliance</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/network-security-botnet</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/network-security-infrastructure-security</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/network-security-vulnerability</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/open-source-server-security</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/operational-technology-data-integrity</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/ransomware-malware</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/saas-security-ai-agents</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/saas-security-enterprise-security</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/security-testing-security-automation</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/social-engineering-malware</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/software-security-devsecops</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/spyware-mobile-security</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/supply-chain-attack-malware</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/supply-chain-attack-open-source</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/surveillance-digital-advertising</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/threat-detection-endpoint-security</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/threat-intelligence-cloud-security</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/threat-intelligence-enterprise-security</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/threat-intelligence-malware</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/threat-intelligence-network-intrusion</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/threat-intelligence-social-engineering</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/vulnerability-api-security</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/vulnerability-browser-security</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/vulnerability-cloud-security</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/vulnerability-data-breach</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/vulnerability-devsecops</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/vulnerability-endpoint-security</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/vulnerability-enterprise-security</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/vulnerability-identity-management</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/vulnerability-mobile-security</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/vulnerability-network-security</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/vulnerability-secure-coding</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/vulnerability-software-security</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/vulnerability-threat-intelligence</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/vulnerability-web-hosting</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/vulnerability-management</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/web-security-vulnerability</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/zero-trust-enterprise-security</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/tag/zero-day-vulnerability</loc>
<changefreq>weekly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/30000-facebook-accounts-hacked-via-google-appsheet-phishing-campaign</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/30000-facebook-accounts-hacked-via-google-appsheet-phishing-campaign" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/30000-facebook-accounts-hacked-via-google-appsheet-phishing-campaign" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/30000-facebook-accounts-hacked-via-google-appsheet-phishing-campaign" />
<lastmod>2026-05-02T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/30000-facebook-accounts-hacked-via-google-appsheet-phishing-campaign</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/30000-facebook-accounts-hacked-via-google-appsheet-phishing-campaign" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/30000-facebook-accounts-hacked-via-google-appsheet-phishing-campaign" />
<lastmod>2026-05-02T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/china-linked-hackers-target-asian-governments-nato-state-journalists-and-activists</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/china-linked-hackers-target-asian-governments-nato-state-journalists-and-activists" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/china-linked-hackers-target-asian-governments-nato-state-journalists-and-activists" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/china-linked-hackers-target-asian-governments-nato-state-journalists-and-activists" />
<lastmod>2026-05-02T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/china-linked-hackers-target-asian-governments-nato-state-journalists-and-activists</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/china-linked-hackers-target-asian-governments-nato-state-journalists-and-activists" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/china-linked-hackers-target-asian-governments-nato-state-journalists-and-activists" />
<lastmod>2026-05-02T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/cybercrime-groups-using-vishing-and-sso-abuse-in-rapid-saas-extortion-attacks</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/cybercrime-groups-using-vishing-and-sso-abuse-in-rapid-saas-extortion-attacks" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/cybercrime-groups-using-vishing-and-sso-abuse-in-rapid-saas-extortion-attacks" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/cybercrime-groups-using-vishing-and-sso-abuse-in-rapid-saas-extortion-attacks" />
<lastmod>2026-05-02T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/cybercrime-groups-using-vishing-and-sso-abuse-in-rapid-saas-extortion-attacks</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/cybercrime-groups-using-vishing-and-sso-abuse-in-rapid-saas-extortion-attacks" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/cybercrime-groups-using-vishing-and-sso-abuse-in-rapid-saas-extortion-attacks" />
<lastmod>2026-05-02T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/top-five-sales-challenges-costing-msps-cybersecurity-revenue</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/top-five-sales-challenges-costing-msps-cybersecurity-revenue" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/top-five-sales-challenges-costing-msps-cybersecurity-revenue" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/top-five-sales-challenges-costing-msps-cybersecurity-revenue" />
<lastmod>2026-05-02T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/top-five-sales-challenges-costing-msps-cybersecurity-revenue</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/top-five-sales-challenges-costing-msps-cybersecurity-revenue" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/top-five-sales-challenges-costing-msps-cybersecurity-revenue" />
<lastmod>2026-05-02T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/etherrat-distribution-spoofing-administrative-tools-via-github-facades</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/etherrat-distribution-spoofing-administrative-tools-via-github-facades" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/etherrat-distribution-spoofing-administrative-tools-via-github-facades" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/etherrat-distribution-spoofing-administrative-tools-via-github-facades" />
<lastmod>2026-05-01T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/etherrat-distribution-spoofing-administrative-tools-via-github-facades</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/etherrat-distribution-spoofing-administrative-tools-via-github-facades" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/etherrat-distribution-spoofing-administrative-tools-via-github-facades" />
<lastmod>2026-05-01T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/new-linux-copy-fail-vulnerability-enables-root-access-on-major-distributions</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/new-linux-copy-fail-vulnerability-enables-root-access-on-major-distributions" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/new-linux-copy-fail-vulnerability-enables-root-access-on-major-distributions" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/new-linux-copy-fail-vulnerability-enables-root-access-on-major-distributions" />
<lastmod>2026-05-01T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/new-linux-copy-fail-vulnerability-enables-root-access-on-major-distributions</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/new-linux-copy-fail-vulnerability-enables-root-access-on-major-distributions" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/new-linux-copy-fail-vulnerability-enables-root-access-on-major-distributions" />
<lastmod>2026-05-01T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/new-python-backdoor-uses-tunneling-service-to-steal-browser-and-cloud-credentials</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/new-python-backdoor-uses-tunneling-service-to-steal-browser-and-cloud-credentials" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/new-python-backdoor-uses-tunneling-service-to-steal-browser-and-cloud-credentials" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/new-python-backdoor-uses-tunneling-service-to-steal-browser-and-cloud-credentials" />
<lastmod>2026-05-01T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/new-python-backdoor-uses-tunneling-service-to-steal-browser-and-cloud-credentials</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/new-python-backdoor-uses-tunneling-service-to-steal-browser-and-cloud-credentials" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/new-python-backdoor-uses-tunneling-service-to-steal-browser-and-cloud-credentials" />
<lastmod>2026-05-01T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/pytorch-lightning-and-intercom-client-hit-in-supply-chain-attacks-to-steal-credentials</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/pytorch-lightning-and-intercom-client-hit-in-supply-chain-attacks-to-steal-credentials" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/pytorch-lightning-and-intercom-client-hit-in-supply-chain-attacks-to-steal-credentials" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/pytorch-lightning-and-intercom-client-hit-in-supply-chain-attacks-to-steal-credentials" />
<lastmod>2026-05-01T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/pytorch-lightning-and-intercom-client-hit-in-supply-chain-attacks-to-steal-credentials</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/pytorch-lightning-and-intercom-client-hit-in-supply-chain-attacks-to-steal-credentials" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/pytorch-lightning-and-intercom-client-hit-in-supply-chain-attacks-to-steal-credentials" />
<lastmod>2026-05-01T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/threatsday-bulletin-sms-blaster-busts-openemr-flaws-600k-roblox-hacks-and-25-more-stories</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/threatsday-bulletin-sms-blaster-busts-openemr-flaws-600k-roblox-hacks-and-25-more-stories" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/threatsday-bulletin-sms-blaster-busts-openemr-flaws-600k-roblox-hacks-and-25-more-stories" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/threatsday-bulletin-sms-blaster-busts-openemr-flaws-600k-roblox-hacks-and-25-more-stories" />
<lastmod>2026-05-01T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/threatsday-bulletin-sms-blaster-busts-openemr-flaws-600k-roblox-hacks-and-25-more-stories</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/threatsday-bulletin-sms-blaster-busts-openemr-flaws-600k-roblox-hacks-and-25-more-stories" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/threatsday-bulletin-sms-blaster-busts-openemr-flaws-600k-roblox-hacks-and-25-more-stories" />
<lastmod>2026-05-01T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/critical-cpanel-authentication-vulnerability-identified-update-your-server-immediately</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/critical-cpanel-authentication-vulnerability-identified-update-your-server-immediately" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/critical-cpanel-authentication-vulnerability-identified-update-your-server-immediately" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/critical-cpanel-authentication-vulnerability-identified-update-your-server-immediately" />
<lastmod>2026-04-30T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/critical-cpanel-authentication-vulnerability-identified-update-your-server-immediately</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/critical-cpanel-authentication-vulnerability-identified-update-your-server-immediately" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/critical-cpanel-authentication-vulnerability-identified-update-your-server-immediately" />
<lastmod>2026-04-30T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/google-fixes-cvss-10-gemini-cli-ci-rce-and-cursor-flaws-enable-code-execution</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/google-fixes-cvss-10-gemini-cli-ci-rce-and-cursor-flaws-enable-code-execution" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/google-fixes-cvss-10-gemini-cli-ci-rce-and-cursor-flaws-enable-code-execution" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/google-fixes-cvss-10-gemini-cli-ci-rce-and-cursor-flaws-enable-code-execution" />
<lastmod>2026-04-30T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/google-fixes-cvss-10-gemini-cli-ci-rce-and-cursor-flaws-enable-code-execution</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/google-fixes-cvss-10-gemini-cli-ci-rce-and-cursor-flaws-enable-code-execution" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/google-fixes-cvss-10-gemini-cli-ci-rce-and-cursor-flaws-enable-code-execution" />
<lastmod>2026-04-30T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/new-wave-of-dprk-attacks-uses-ai-inserted-npm-malware-fake-firms-and-rats</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/new-wave-of-dprk-attacks-uses-ai-inserted-npm-malware-fake-firms-and-rats" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/new-wave-of-dprk-attacks-uses-ai-inserted-npm-malware-fake-firms-and-rats" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/new-wave-of-dprk-attacks-uses-ai-inserted-npm-malware-fake-firms-and-rats" />
<lastmod>2026-04-30T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/new-wave-of-dprk-attacks-uses-ai-inserted-npm-malware-fake-firms-and-rats</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/new-wave-of-dprk-attacks-uses-ai-inserted-npm-malware-fake-firms-and-rats" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/new-wave-of-dprk-attacks-uses-ai-inserted-npm-malware-fake-firms-and-rats" />
<lastmod>2026-04-30T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/sap-related-npm-packages-compromised-in-credential-stealing-supply-chain-attack</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/sap-related-npm-packages-compromised-in-credential-stealing-supply-chain-attack" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/sap-related-npm-packages-compromised-in-credential-stealing-supply-chain-attack" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/sap-related-npm-packages-compromised-in-credential-stealing-supply-chain-attack" />
<lastmod>2026-04-30T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/sap-related-npm-packages-compromised-in-credential-stealing-supply-chain-attack</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/sap-related-npm-packages-compromised-in-credential-stealing-supply-chain-attack" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/sap-related-npm-packages-compromised-in-credential-stealing-supply-chain-attack" />
<lastmod>2026-04-30T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/what-to-look-for-in-an-exposure-management-platform-and-what-most-of-them-get-wrong</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/what-to-look-for-in-an-exposure-management-platform-and-what-most-of-them-get-wrong" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/what-to-look-for-in-an-exposure-management-platform-and-what-most-of-them-get-wrong" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/what-to-look-for-in-an-exposure-management-platform-and-what-most-of-them-get-wrong" />
<lastmod>2026-04-30T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/what-to-look-for-in-an-exposure-management-platform-and-what-most-of-them-get-wrong</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/what-to-look-for-in-an-exposure-management-platform-and-what-most-of-them-get-wrong" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/what-to-look-for-in-an-exposure-management-platform-and-what-most-of-them-get-wrong" />
<lastmod>2026-04-30T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/litellm-cve-2026-42208-sql-injection-exploited-within-36-hours-of-disclosure</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/litellm-cve-2026-42208-sql-injection-exploited-within-36-hours-of-disclosure" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/litellm-cve-2026-42208-sql-injection-exploited-within-36-hours-of-disclosure" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/litellm-cve-2026-42208-sql-injection-exploited-within-36-hours-of-disclosure" />
<lastmod>2026-04-29T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/litellm-cve-2026-42208-sql-injection-exploited-within-36-hours-of-disclosure</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/litellm-cve-2026-42208-sql-injection-exploited-within-36-hours-of-disclosure" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/litellm-cve-2026-42208-sql-injection-exploited-within-36-hours-of-disclosure" />
<lastmod>2026-04-29T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/researchers-discover-critical-github-cve-2026-3854-rce-flaw-exploitable-via-single-git-push</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/researchers-discover-critical-github-cve-2026-3854-rce-flaw-exploitable-via-single-git-push" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/researchers-discover-critical-github-cve-2026-3854-rce-flaw-exploitable-via-single-git-push" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/researchers-discover-critical-github-cve-2026-3854-rce-flaw-exploitable-via-single-git-push" />
<lastmod>2026-04-29T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/researchers-discover-critical-github-cve-2026-3854-rce-flaw-exploitable-via-single-git-push</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/researchers-discover-critical-github-cve-2026-3854-rce-flaw-exploitable-via-single-git-push" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/researchers-discover-critical-github-cve-2026-3854-rce-flaw-exploitable-via-single-git-push" />
<lastmod>2026-04-29T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/why-secure-data-movement-is-the-zero-trust-bottleneck-nobody-talks-about</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/why-secure-data-movement-is-the-zero-trust-bottleneck-nobody-talks-about" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/why-secure-data-movement-is-the-zero-trust-bottleneck-nobody-talks-about" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/why-secure-data-movement-is-the-zero-trust-bottleneck-nobody-talks-about" />
<lastmod>2026-04-29T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/why-secure-data-movement-is-the-zero-trust-bottleneck-nobody-talks-about</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/why-secure-data-movement-is-the-zero-trust-bottleneck-nobody-talks-about" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/why-secure-data-movement-is-the-zero-trust-bottleneck-nobody-talks-about" />
<lastmod>2026-04-29T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/checkmarx-confirms-github-repository-data-posted-on-dark-web-after-march-23-attack</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/checkmarx-confirms-github-repository-data-posted-on-dark-web-after-march-23-attack" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/checkmarx-confirms-github-repository-data-posted-on-dark-web-after-march-23-attack" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/checkmarx-confirms-github-repository-data-posted-on-dark-web-after-march-23-attack" />
<lastmod>2026-04-28T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/checkmarx-confirms-github-repository-data-posted-on-dark-web-after-march-23-attack</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/checkmarx-confirms-github-repository-data-posted-on-dark-web-after-march-23-attack" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/checkmarx-confirms-github-repository-data-posted-on-dark-web-after-march-23-attack" />
<lastmod>2026-04-28T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/chinese-silk-typhoon-hacker-extradited-to-us-over-covid-research-cyberattacks</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/chinese-silk-typhoon-hacker-extradited-to-us-over-covid-research-cyberattacks" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/chinese-silk-typhoon-hacker-extradited-to-us-over-covid-research-cyberattacks" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/chinese-silk-typhoon-hacker-extradited-to-us-over-covid-research-cyberattacks" />
<lastmod>2026-04-28T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/chinese-silk-typhoon-hacker-extradited-to-us-over-covid-research-cyberattacks</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/chinese-silk-typhoon-hacker-extradited-to-us-over-covid-research-cyberattacks" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/chinese-silk-typhoon-hacker-extradited-to-us-over-covid-research-cyberattacks" />
<lastmod>2026-04-28T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/microsoft-confirms-active-exploitation-of-windows-shell-cve-2026-32202</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/microsoft-confirms-active-exploitation-of-windows-shell-cve-2026-32202" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/microsoft-confirms-active-exploitation-of-windows-shell-cve-2026-32202" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/microsoft-confirms-active-exploitation-of-windows-shell-cve-2026-32202" />
<lastmod>2026-04-28T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/microsoft-confirms-active-exploitation-of-windows-shell-cve-2026-32202</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/microsoft-confirms-active-exploitation-of-windows-shell-cve-2026-32202" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/microsoft-confirms-active-exploitation-of-windows-shell-cve-2026-32202" />
<lastmod>2026-04-28T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/microsoft-patches-entra-id-role-flaw-that-enabled-service-principal-takeover</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/microsoft-patches-entra-id-role-flaw-that-enabled-service-principal-takeover" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/microsoft-patches-entra-id-role-flaw-that-enabled-service-principal-takeover" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/microsoft-patches-entra-id-role-flaw-that-enabled-service-principal-takeover" />
<lastmod>2026-04-28T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/microsoft-patches-entra-id-role-flaw-that-enabled-service-principal-takeover</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/microsoft-patches-entra-id-role-flaw-that-enabled-service-principal-takeover" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/microsoft-patches-entra-id-role-flaw-that-enabled-service-principal-takeover" />
<lastmod>2026-04-28T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/firestarter-backdoor-hit-federal-cisco-firepower-device-survives-security-patches</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/firestarter-backdoor-hit-federal-cisco-firepower-device-survives-security-patches" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/firestarter-backdoor-hit-federal-cisco-firepower-device-survives-security-patches" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/firestarter-backdoor-hit-federal-cisco-firepower-device-survives-security-patches" />
<lastmod>2026-04-27T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/firestarter-backdoor-hit-federal-cisco-firepower-device-survives-security-patches</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/firestarter-backdoor-hit-federal-cisco-firepower-device-survives-security-patches" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/firestarter-backdoor-hit-federal-cisco-firepower-device-survives-security-patches" />
<lastmod>2026-04-27T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/fake-captcha-irsf-scam-and-120-keitaro-campaigns-drive-global-sms-crypto-fraud</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/fake-captcha-irsf-scam-and-120-keitaro-campaigns-drive-global-sms-crypto-fraud" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/fake-captcha-irsf-scam-and-120-keitaro-campaigns-drive-global-sms-crypto-fraud" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/fake-captcha-irsf-scam-and-120-keitaro-campaigns-drive-global-sms-crypto-fraud" />
<lastmod>2026-04-27T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/fake-captcha-irsf-scam-and-120-keitaro-campaigns-drive-global-sms-crypto-fraud</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/fake-captcha-irsf-scam-and-120-keitaro-campaigns-drive-global-sms-crypto-fraud" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/fake-captcha-irsf-scam-and-120-keitaro-campaigns-drive-global-sms-crypto-fraud" />
<lastmod>2026-04-27T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/bridging-the-ai-agent-authority-gap-continuous-observability-as-the-decision-engine</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/bridging-the-ai-agent-authority-gap-continuous-observability-as-the-decision-engine" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/bridging-the-ai-agent-authority-gap-continuous-observability-as-the-decision-engine" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/bridging-the-ai-agent-authority-gap-continuous-observability-as-the-decision-engine" />
<lastmod>2026-04-26T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/bridging-the-ai-agent-authority-gap-continuous-observability-as-the-decision-engine</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/bridging-the-ai-agent-authority-gap-continuous-observability-as-the-decision-engine" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/bridging-the-ai-agent-authority-gap-continuous-observability-as-the-decision-engine" />
<lastmod>2026-04-26T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/cisa-adds-4-exploited-flaws-to-kev-sets-may-2026-federal-deadline</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/cisa-adds-4-exploited-flaws-to-kev-sets-may-2026-federal-deadline" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/cisa-adds-4-exploited-flaws-to-kev-sets-may-2026-federal-deadline" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/cisa-adds-4-exploited-flaws-to-kev-sets-may-2026-federal-deadline" />
<lastmod>2026-04-26T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/cisa-adds-4-exploited-flaws-to-kev-sets-may-2026-federal-deadline</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/cisa-adds-4-exploited-flaws-to-kev-sets-may-2026-federal-deadline" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/cisa-adds-4-exploited-flaws-to-kev-sets-may-2026-federal-deadline" />
<lastmod>2026-04-26T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/nasa-employees-duped-in-chinese-phishing-scheme-targeting-us-defense-software</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/nasa-employees-duped-in-chinese-phishing-scheme-targeting-us-defense-software" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/nasa-employees-duped-in-chinese-phishing-scheme-targeting-us-defense-software" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/nasa-employees-duped-in-chinese-phishing-scheme-targeting-us-defense-software" />
<lastmod>2026-04-26T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/nasa-employees-duped-in-chinese-phishing-scheme-targeting-us-defense-software</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/nasa-employees-duped-in-chinese-phishing-scheme-targeting-us-defense-software" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/nasa-employees-duped-in-chinese-phishing-scheme-targeting-us-defense-software" />
<lastmod>2026-04-26T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/researchers-uncover-pre-stuxnet-fast16-malware-targeting-engineering-software</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/researchers-uncover-pre-stuxnet-fast16-malware-targeting-engineering-software" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/researchers-uncover-pre-stuxnet-fast16-malware-targeting-engineering-software" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/researchers-uncover-pre-stuxnet-fast16-malware-targeting-engineering-software" />
<lastmod>2026-04-26T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/researchers-uncover-pre-stuxnet-fast16-malware-targeting-engineering-software</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/researchers-uncover-pre-stuxnet-fast16-malware-targeting-engineering-software" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/researchers-uncover-pre-stuxnet-fast16-malware-targeting-engineering-software" />
<lastmod>2026-04-26T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/26-fakewallet-apps-found-on-apple-app-store-targeting-crypto-seed-phrases</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/26-fakewallet-apps-found-on-apple-app-store-targeting-crypto-seed-phrases" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/26-fakewallet-apps-found-on-apple-app-store-targeting-crypto-seed-phrases" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/26-fakewallet-apps-found-on-apple-app-store-targeting-crypto-seed-phrases" />
<lastmod>2026-04-25T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/26-fakewallet-apps-found-on-apple-app-store-targeting-crypto-seed-phrases</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/26-fakewallet-apps-found-on-apple-app-store-targeting-crypto-seed-phrases" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/26-fakewallet-apps-found-on-apple-app-store-targeting-crypto-seed-phrases" />
<lastmod>2026-04-25T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/bitwarden-cli-compromised-in-ongoing-checkmarx-supply-chain-campaign</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/bitwarden-cli-compromised-in-ongoing-checkmarx-supply-chain-campaign" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/bitwarden-cli-compromised-in-ongoing-checkmarx-supply-chain-campaign" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/bitwarden-cli-compromised-in-ongoing-checkmarx-supply-chain-campaign" />
<lastmod>2026-04-24T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/bitwarden-cli-compromised-in-ongoing-checkmarx-supply-chain-campaign</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/bitwarden-cli-compromised-in-ongoing-checkmarx-supply-chain-campaign" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/bitwarden-cli-compromised-in-ongoing-checkmarx-supply-chain-campaign" />
<lastmod>2026-04-24T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/lmdeploy-cve-2026-33626-flaw-exploited-within-13-hours-of-disclosure</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/lmdeploy-cve-2026-33626-flaw-exploited-within-13-hours-of-disclosure" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/lmdeploy-cve-2026-33626-flaw-exploited-within-13-hours-of-disclosure" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/lmdeploy-cve-2026-33626-flaw-exploited-within-13-hours-of-disclosure" />
<lastmod>2026-04-24T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/lmdeploy-cve-2026-33626-flaw-exploited-within-13-hours-of-disclosure</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/lmdeploy-cve-2026-33626-flaw-exploited-within-13-hours-of-disclosure" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/lmdeploy-cve-2026-33626-flaw-exploited-within-13-hours-of-disclosure" />
<lastmod>2026-04-24T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/threatsday-bulletin-290m-defi-hack-macos-lotl-abuse-proxysmart-sim-farms-25-new-stories</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/threatsday-bulletin-290m-defi-hack-macos-lotl-abuse-proxysmart-sim-farms-25-new-stories" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/threatsday-bulletin-290m-defi-hack-macos-lotl-abuse-proxysmart-sim-farms-25-new-stories" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/threatsday-bulletin-290m-defi-hack-macos-lotl-abuse-proxysmart-sim-farms-25-new-stories" />
<lastmod>2026-04-24T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/threatsday-bulletin-290m-defi-hack-macos-lotl-abuse-proxysmart-sim-farms-25-new-stories</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/threatsday-bulletin-290m-defi-hack-macos-lotl-abuse-proxysmart-sim-farms-25-new-stories" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/threatsday-bulletin-290m-defi-hack-macos-lotl-abuse-proxysmart-sim-farms-25-new-stories" />
<lastmod>2026-04-24T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/unc6692-impersonates-it-helpdesk-via-microsoft-teams-to-deploy-snow-malware</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/unc6692-impersonates-it-helpdesk-via-microsoft-teams-to-deploy-snow-malware" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/unc6692-impersonates-it-helpdesk-via-microsoft-teams-to-deploy-snow-malware" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/unc6692-impersonates-it-helpdesk-via-microsoft-teams-to-deploy-snow-malware" />
<lastmod>2026-04-24T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/unc6692-impersonates-it-helpdesk-via-microsoft-teams-to-deploy-snow-malware</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/unc6692-impersonates-it-helpdesk-via-microsoft-teams-to-deploy-snow-malware" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/unc6692-impersonates-it-helpdesk-via-microsoft-teams-to-deploy-snow-malware" />
<lastmod>2026-04-24T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/webinar-mythos-reality-check-beating-automated-exploitation-at-ai-speed</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/webinar-mythos-reality-check-beating-automated-exploitation-at-ai-speed" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/webinar-mythos-reality-check-beating-automated-exploitation-at-ai-speed" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/webinar-mythos-reality-check-beating-automated-exploitation-at-ai-speed" />
<lastmod>2026-04-24T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/webinar-mythos-reality-check-beating-automated-exploitation-at-ai-speed</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/webinar-mythos-reality-check-beating-automated-exploitation-at-ai-speed" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/webinar-mythos-reality-check-beating-automated-exploitation-at-ai-speed" />
<lastmod>2026-04-24T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/harvester-deploys-linux-gogra-backdoor-in-south-asia-using-microsoft-graph-api</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/harvester-deploys-linux-gogra-backdoor-in-south-asia-using-microsoft-graph-api" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/harvester-deploys-linux-gogra-backdoor-in-south-asia-using-microsoft-graph-api" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/harvester-deploys-linux-gogra-backdoor-in-south-asia-using-microsoft-graph-api" />
<lastmod>2026-04-23T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/harvester-deploys-linux-gogra-backdoor-in-south-asia-using-microsoft-graph-api</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/harvester-deploys-linux-gogra-backdoor-in-south-asia-using-microsoft-graph-api" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/harvester-deploys-linux-gogra-backdoor-in-south-asia-using-microsoft-graph-api" />
<lastmod>2026-04-23T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/lotus-wiper-malware-targets-venezuelan-energy-systems-in-destructive-attack</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/lotus-wiper-malware-targets-venezuelan-energy-systems-in-destructive-attack" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/lotus-wiper-malware-targets-venezuelan-energy-systems-in-destructive-attack" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/lotus-wiper-malware-targets-venezuelan-energy-systems-in-destructive-attack" />
<lastmod>2026-04-23T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/lotus-wiper-malware-targets-venezuelan-energy-systems-in-destructive-attack</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/lotus-wiper-malware-targets-venezuelan-energy-systems-in-destructive-attack" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/lotus-wiper-malware-targets-venezuelan-energy-systems-in-destructive-attack" />
<lastmod>2026-04-23T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/self-propagating-supply-chain-worm-hijacks-npm-packages-to-steal-developer-tokens</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/self-propagating-supply-chain-worm-hijacks-npm-packages-to-steal-developer-tokens" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/self-propagating-supply-chain-worm-hijacks-npm-packages-to-steal-developer-tokens" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/self-propagating-supply-chain-worm-hijacks-npm-packages-to-steal-developer-tokens" />
<lastmod>2026-04-23T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/self-propagating-supply-chain-worm-hijacks-npm-packages-to-steal-developer-tokens</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/self-propagating-supply-chain-worm-hijacks-npm-packages-to-steal-developer-tokens" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/self-propagating-supply-chain-worm-hijacks-npm-packages-to-steal-developer-tokens" />
<lastmod>2026-04-23T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/toxic-combinations-when-cross-app-permissions-stack-into-risk</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/toxic-combinations-when-cross-app-permissions-stack-into-risk" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/toxic-combinations-when-cross-app-permissions-stack-into-risk" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/toxic-combinations-when-cross-app-permissions-stack-into-risk" />
<lastmod>2026-04-23T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/toxic-combinations-when-cross-app-permissions-stack-into-risk</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/toxic-combinations-when-cross-app-permissions-stack-into-risk" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/toxic-combinations-when-cross-app-permissions-stack-into-risk" />
<lastmod>2026-04-23T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/22-bridgebreak-flaws-expose-thousands-of-lantronix-and-silex-serial-to-ip-converters</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/22-bridgebreak-flaws-expose-thousands-of-lantronix-and-silex-serial-to-ip-converters" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/22-bridgebreak-flaws-expose-thousands-of-lantronix-and-silex-serial-to-ip-converters" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/22-bridgebreak-flaws-expose-thousands-of-lantronix-and-silex-serial-to-ip-converters" />
<lastmod>2026-04-22T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/22-bridgebreak-flaws-expose-thousands-of-lantronix-and-silex-serial-to-ip-converters</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/22-bridgebreak-flaws-expose-thousands-of-lantronix-and-silex-serial-to-ip-converters" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/22-bridgebreak-flaws-expose-thousands-of-lantronix-and-silex-serial-to-ip-converters" />
<lastmod>2026-04-22T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/5-places-where-mature-socs-keep-mttr-fast-and-others-waste-time</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/5-places-where-mature-socs-keep-mttr-fast-and-others-waste-time" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/5-places-where-mature-socs-keep-mttr-fast-and-others-waste-time" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/5-places-where-mature-socs-keep-mttr-fast-and-others-waste-time" />
<lastmod>2026-04-22T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/5-places-where-mature-socs-keep-mttr-fast-and-others-waste-time</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/5-places-where-mature-socs-keep-mttr-fast-and-others-waste-time" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/5-places-where-mature-socs-keep-mttr-fast-and-others-waste-time" />
<lastmod>2026-04-22T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/ngate-campaign-targets-brazil-trojanizes-handypay-to-steal-nfc-data-and-pins</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/ngate-campaign-targets-brazil-trojanizes-handypay-to-steal-nfc-data-and-pins" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/ngate-campaign-targets-brazil-trojanizes-handypay-to-steal-nfc-data-and-pins" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/ngate-campaign-targets-brazil-trojanizes-handypay-to-steal-nfc-data-and-pins" />
<lastmod>2026-04-22T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/ngate-campaign-targets-brazil-trojanizes-handypay-to-steal-nfc-data-and-pins</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/ngate-campaign-targets-brazil-trojanizes-handypay-to-steal-nfc-data-and-pins" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/ngate-campaign-targets-brazil-trojanizes-handypay-to-steal-nfc-data-and-pins" />
<lastmod>2026-04-22T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/ransomware-negotiator-pleads-guilty-to-aiding-blackcat-attacks-in-2023</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/ransomware-negotiator-pleads-guilty-to-aiding-blackcat-attacks-in-2023" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/ransomware-negotiator-pleads-guilty-to-aiding-blackcat-attacks-in-2023" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/ransomware-negotiator-pleads-guilty-to-aiding-blackcat-attacks-in-2023" />
<lastmod>2026-04-22T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/ransomware-negotiator-pleads-guilty-to-aiding-blackcat-attacks-in-2023</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/ransomware-negotiator-pleads-guilty-to-aiding-blackcat-attacks-in-2023" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/ransomware-negotiator-pleads-guilty-to-aiding-blackcat-attacks-in-2023" />
<lastmod>2026-04-22T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/systembc-c2-server-reveals-1570-victims-in-the-gentlemen-ransomware-operation</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/systembc-c2-server-reveals-1570-victims-in-the-gentlemen-ransomware-operation" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/systembc-c2-server-reveals-1570-victims-in-the-gentlemen-ransomware-operation" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/systembc-c2-server-reveals-1570-victims-in-the-gentlemen-ransomware-operation" />
<lastmod>2026-04-22T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/systembc-c2-server-reveals-1570-victims-in-the-gentlemen-ransomware-operation</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/systembc-c2-server-reveals-1570-victims-in-the-gentlemen-ransomware-operation" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/systembc-c2-server-reveals-1570-victims-in-the-gentlemen-ransomware-operation" />
<lastmod>2026-04-22T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/anthropic-mcp-design-vulnerability-enables-rce-threatening-ai-supply-chain</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/anthropic-mcp-design-vulnerability-enables-rce-threatening-ai-supply-chain" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/anthropic-mcp-design-vulnerability-enables-rce-threatening-ai-supply-chain" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/anthropic-mcp-design-vulnerability-enables-rce-threatening-ai-supply-chain" />
<lastmod>2026-04-21T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/anthropic-mcp-design-vulnerability-enables-rce-threatening-ai-supply-chain</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/anthropic-mcp-design-vulnerability-enables-rce-threatening-ai-supply-chain" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/anthropic-mcp-design-vulnerability-enables-rce-threatening-ai-supply-chain" />
<lastmod>2026-04-21T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/sglang-cve-2026-5760-cvss-98-enables-rce-via-malicious-gguf-model-files</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/sglang-cve-2026-5760-cvss-98-enables-rce-via-malicious-gguf-model-files" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/sglang-cve-2026-5760-cvss-98-enables-rce-via-malicious-gguf-model-files" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/sglang-cve-2026-5760-cvss-98-enables-rce-via-malicious-gguf-model-files" />
<lastmod>2026-04-21T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/sglang-cve-2026-5760-cvss-98-enables-rce-via-malicious-gguf-model-files</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/sglang-cve-2026-5760-cvss-98-enables-rce-via-malicious-gguf-model-files" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/sglang-cve-2026-5760-cvss-98-enables-rce-via-malicious-gguf-model-files" />
<lastmod>2026-04-21T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/weekly-recap-vercel-hack-push-fraud-qemu-abused-new-android-rats-emerge-more</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/weekly-recap-vercel-hack-push-fraud-qemu-abused-new-android-rats-emerge-more" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/weekly-recap-vercel-hack-push-fraud-qemu-abused-new-android-rats-emerge-more" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/weekly-recap-vercel-hack-push-fraud-qemu-abused-new-android-rats-emerge-more" />
<lastmod>2026-04-21T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/weekly-recap-vercel-hack-push-fraud-qemu-abused-new-android-rats-emerge-more</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/weekly-recap-vercel-hack-push-fraud-qemu-abused-new-android-rats-emerge-more" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/weekly-recap-vercel-hack-push-fraud-qemu-abused-new-android-rats-emerge-more" />
<lastmod>2026-04-21T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/why-most-ai-deployments-stall-after-the-demo</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/why-most-ai-deployments-stall-after-the-demo" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/why-most-ai-deployments-stall-after-the-demo" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/why-most-ai-deployments-stall-after-the-demo" />
<lastmod>2026-04-21T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/why-most-ai-deployments-stall-after-the-demo</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/why-most-ai-deployments-stall-after-the-demo" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/why-most-ai-deployments-stall-after-the-demo" />
<lastmod>2026-04-21T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/mirai-variant-nexcorium-exploits-cve-2024-3721-to-hijack-tbk-dvrs-for-ddos-botnet</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/mirai-variant-nexcorium-exploits-cve-2024-3721-to-hijack-tbk-dvrs-for-ddos-botnet" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/mirai-variant-nexcorium-exploits-cve-2024-3721-to-hijack-tbk-dvrs-for-ddos-botnet" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/mirai-variant-nexcorium-exploits-cve-2024-3721-to-hijack-tbk-dvrs-for-ddos-botnet" />
<lastmod>2026-04-20T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/mirai-variant-nexcorium-exploits-cve-2024-3721-to-hijack-tbk-dvrs-for-ddos-botnet</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/mirai-variant-nexcorium-exploits-cve-2024-3721-to-hijack-tbk-dvrs-for-ddos-botnet" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/mirai-variant-nexcorium-exploits-cve-2024-3721-to-hijack-tbk-dvrs-for-ddos-botnet" />
<lastmod>2026-04-20T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/1374m-hack-shuts-down-sanctioned-grinex-exchange-after-intelligence-claims</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/1374m-hack-shuts-down-sanctioned-grinex-exchange-after-intelligence-claims" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/1374m-hack-shuts-down-sanctioned-grinex-exchange-after-intelligence-claims" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/1374m-hack-shuts-down-sanctioned-grinex-exchange-after-intelligence-claims" />
<lastmod>2026-04-20T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/1374m-hack-shuts-down-sanctioned-grinex-exchange-after-intelligence-claims</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/1374m-hack-shuts-down-sanctioned-grinex-exchange-after-intelligence-claims" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/1374m-hack-shuts-down-sanctioned-grinex-exchange-after-intelligence-claims" />
<lastmod>2026-04-20T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/webinar-eliminate-ghost-identities-before-they-expose-your-enterprise-data</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/webinar-eliminate-ghost-identities-before-they-expose-your-enterprise-data" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/webinar-eliminate-ghost-identities-before-they-expose-your-enterprise-data" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/webinar-eliminate-ghost-identities-before-they-expose-your-enterprise-data" />
<lastmod>2026-04-20T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/webinar-eliminate-ghost-identities-before-they-expose-your-enterprise-data</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/webinar-eliminate-ghost-identities-before-they-expose-your-enterprise-data" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/webinar-eliminate-ghost-identities-before-they-expose-your-enterprise-data" />
<lastmod>2026-04-20T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/researchers-detect-zionsiphon-malware-targeting-israeli-water-desalination-ot-systems</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/researchers-detect-zionsiphon-malware-targeting-israeli-water-desalination-ot-systems" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/researchers-detect-zionsiphon-malware-targeting-israeli-water-desalination-ot-systems" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/researchers-detect-zionsiphon-malware-targeting-israeli-water-desalination-ot-systems" />
<lastmod>2026-04-20T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/researchers-detect-zionsiphon-malware-targeting-israeli-water-desalination-ot-systems</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/researchers-detect-zionsiphon-malware-targeting-israeli-water-desalination-ot-systems" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/researchers-detect-zionsiphon-malware-targeting-israeli-water-desalination-ot-systems" />
<lastmod>2026-04-20T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/vercel-breach-tied-to-context-ai-hack-exposes-limited-customer-credentials</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/vercel-breach-tied-to-context-ai-hack-exposes-limited-customer-credentials" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/vercel-breach-tied-to-context-ai-hack-exposes-limited-customer-credentials" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/vercel-breach-tied-to-context-ai-hack-exposes-limited-customer-credentials" />
<lastmod>2026-04-20T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/vercel-breach-tied-to-context-ai-hack-exposes-limited-customer-credentials</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/vercel-breach-tied-to-context-ai-hack-exposes-limited-customer-credentials" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/vercel-breach-tied-to-context-ai-hack-exposes-limited-customer-credentials" />
<lastmod>2026-04-20T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/google-blocks-83b-policy-violating-ads-in-2025-launches-android-17-privacy-overhaul</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/google-blocks-83b-policy-violating-ads-in-2025-launches-android-17-privacy-overhaul" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/google-blocks-83b-policy-violating-ads-in-2025-launches-android-17-privacy-overhaul" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/google-blocks-83b-policy-violating-ads-in-2025-launches-android-17-privacy-overhaul" />
<lastmod>2026-04-19T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/google-blocks-83b-policy-violating-ads-in-2025-launches-android-17-privacy-overhaul</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/google-blocks-83b-policy-violating-ads-in-2025-launches-android-17-privacy-overhaul" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/google-blocks-83b-policy-violating-ads-in-2025-launches-android-17-privacy-overhaul" />
<lastmod>2026-04-19T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/three-microsoft-defender-zero-days-actively-exploited-two-still-unpatched</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/three-microsoft-defender-zero-days-actively-exploited-two-still-unpatched" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/three-microsoft-defender-zero-days-actively-exploited-two-still-unpatched" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/three-microsoft-defender-zero-days-actively-exploited-two-still-unpatched" />
<lastmod>2026-04-19T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/three-microsoft-defender-zero-days-actively-exploited-two-still-unpatched</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/three-microsoft-defender-zero-days-actively-exploited-two-still-unpatched" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/three-microsoft-defender-zero-days-actively-exploited-two-still-unpatched" />
<lastmod>2026-04-19T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/nist-limits-cve-enrichment-after-263-surge-in-vulnerability-submissions</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/nist-limits-cve-enrichment-after-263-surge-in-vulnerability-submissions" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/nist-limits-cve-enrichment-after-263-surge-in-vulnerability-submissions" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/nist-limits-cve-enrichment-after-263-surge-in-vulnerability-submissions" />
<lastmod>2026-04-18T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/nist-limits-cve-enrichment-after-263-surge-in-vulnerability-submissions</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/nist-limits-cve-enrichment-after-263-surge-in-vulnerability-submissions" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/nist-limits-cve-enrichment-after-263-surge-in-vulnerability-submissions" />
<lastmod>2026-04-18T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/operation-poweroff-seizes-53-ddos-domains-exposes-3-million-criminal-accounts</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/operation-poweroff-seizes-53-ddos-domains-exposes-3-million-criminal-accounts" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/operation-poweroff-seizes-53-ddos-domains-exposes-3-million-criminal-accounts" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/operation-poweroff-seizes-53-ddos-domains-exposes-3-million-criminal-accounts" />
<lastmod>2026-04-18T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/operation-poweroff-seizes-53-ddos-domains-exposes-3-million-criminal-accounts</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/operation-poweroff-seizes-53-ddos-domains-exposes-3-million-criminal-accounts" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/operation-poweroff-seizes-53-ddos-domains-exposes-3-million-criminal-accounts" />
<lastmod>2026-04-18T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/apache-activemq-cve-2026-34197-added-to-cisa-kev-amid-active-exploitation</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/apache-activemq-cve-2026-34197-added-to-cisa-kev-amid-active-exploitation" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/apache-activemq-cve-2026-34197-added-to-cisa-kev-amid-active-exploitation" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/apache-activemq-cve-2026-34197-added-to-cisa-kev-amid-active-exploitation" />
<lastmod>2026-04-17T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/apache-activemq-cve-2026-34197-added-to-cisa-kev-amid-active-exploitation</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/apache-activemq-cve-2026-34197-added-to-cisa-kev-amid-active-exploitation" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/apache-activemq-cve-2026-34197-added-to-cisa-kev-amid-active-exploitation" />
<lastmod>2026-04-17T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/newly-discovered-powmix-botnet-hits-czech-workers-using-randomized-c2-traffic</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/newly-discovered-powmix-botnet-hits-czech-workers-using-randomized-c2-traffic" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/newly-discovered-powmix-botnet-hits-czech-workers-using-randomized-c2-traffic" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/newly-discovered-powmix-botnet-hits-czech-workers-using-randomized-c2-traffic" />
<lastmod>2026-04-17T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/newly-discovered-powmix-botnet-hits-czech-workers-using-randomized-c2-traffic</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/newly-discovered-powmix-botnet-hits-czech-workers-using-randomized-c2-traffic" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/newly-discovered-powmix-botnet-hits-czech-workers-using-randomized-c2-traffic" />
<lastmod>2026-04-17T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/threatsday-bulletin-defender-0-day-sonicwall-brute-force-17-year-old-excel-rce-and-15-more-stories</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/threatsday-bulletin-defender-0-day-sonicwall-brute-force-17-year-old-excel-rce-and-15-more-stories" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/threatsday-bulletin-defender-0-day-sonicwall-brute-force-17-year-old-excel-rce-and-15-more-stories" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/threatsday-bulletin-defender-0-day-sonicwall-brute-force-17-year-old-excel-rce-and-15-more-stories" />
<lastmod>2026-04-17T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/threatsday-bulletin-defender-0-day-sonicwall-brute-force-17-year-old-excel-rce-and-15-more-stories</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/threatsday-bulletin-defender-0-day-sonicwall-brute-force-17-year-old-excel-rce-and-15-more-stories" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/threatsday-bulletin-defender-0-day-sonicwall-brute-force-17-year-old-excel-rce-and-15-more-stories" />
<lastmod>2026-04-17T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/actively-exploited-nginx-ui-flaw-cve-2026-33032-enables-full-nginx-server-takeover</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/actively-exploited-nginx-ui-flaw-cve-2026-33032-enables-full-nginx-server-takeover" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/actively-exploited-nginx-ui-flaw-cve-2026-33032-enables-full-nginx-server-takeover" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/actively-exploited-nginx-ui-flaw-cve-2026-33032-enables-full-nginx-server-takeover" />
<lastmod>2026-04-16T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/actively-exploited-nginx-ui-flaw-cve-2026-33032-enables-full-nginx-server-takeover</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/actively-exploited-nginx-ui-flaw-cve-2026-33032-enables-full-nginx-server-takeover" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/actively-exploited-nginx-ui-flaw-cve-2026-33032-enables-full-nginx-server-takeover" />
<lastmod>2026-04-16T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/april-patch-tuesday-fixes-critical-flaws-across-sap-adobe-microsoft-fortinet-and-more</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/april-patch-tuesday-fixes-critical-flaws-across-sap-adobe-microsoft-fortinet-and-more" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/april-patch-tuesday-fixes-critical-flaws-across-sap-adobe-microsoft-fortinet-and-more" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/april-patch-tuesday-fixes-critical-flaws-across-sap-adobe-microsoft-fortinet-and-more" />
<lastmod>2026-04-16T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/april-patch-tuesday-fixes-critical-flaws-across-sap-adobe-microsoft-fortinet-and-more</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/april-patch-tuesday-fixes-critical-flaws-across-sap-adobe-microsoft-fortinet-and-more" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/april-patch-tuesday-fixes-critical-flaws-across-sap-adobe-microsoft-fortinet-and-more" />
<lastmod>2026-04-16T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/deterministic-agentic-ai-the-architecture-exposure-validation-requires</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/deterministic-agentic-ai-the-architecture-exposure-validation-requires" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/deterministic-agentic-ai-the-architecture-exposure-validation-requires" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/deterministic-agentic-ai-the-architecture-exposure-validation-requires" />
<lastmod>2026-04-16T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/deterministic-agentic-ai-the-architecture-exposure-validation-requires</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/deterministic-agentic-ai-the-architecture-exposure-validation-requires" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/deterministic-agentic-ai-the-architecture-exposure-validation-requires" />
<lastmod>2026-04-16T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/n8n-webhooks-abused-since-october-2025-to-deliver-malware-via-phishing-emails</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/n8n-webhooks-abused-since-october-2025-to-deliver-malware-via-phishing-emails" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/n8n-webhooks-abused-since-october-2025-to-deliver-malware-via-phishing-emails" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/n8n-webhooks-abused-since-october-2025-to-deliver-malware-via-phishing-emails" />
<lastmod>2026-04-16T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/n8n-webhooks-abused-since-october-2025-to-deliver-malware-via-phishing-emails</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/n8n-webhooks-abused-since-october-2025-to-deliver-malware-via-phishing-emails" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/n8n-webhooks-abused-since-october-2025-to-deliver-malware-via-phishing-emails" />
<lastmod>2026-04-16T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/uac-0247-targets-ukrainian-clinics-and-government-in-data-theft-malware-campaign</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/uac-0247-targets-ukrainian-clinics-and-government-in-data-theft-malware-campaign" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/uac-0247-targets-ukrainian-clinics-and-government-in-data-theft-malware-campaign" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/uac-0247-targets-ukrainian-clinics-and-government-in-data-theft-malware-campaign" />
<lastmod>2026-04-16T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/uac-0247-targets-ukrainian-clinics-and-government-in-data-theft-malware-campaign</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/uac-0247-targets-ukrainian-clinics-and-government-in-data-theft-malware-campaign" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/uac-0247-targets-ukrainian-clinics-and-government-in-data-theft-malware-campaign" />
<lastmod>2026-04-16T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/ai-driven-pushpaganda-scam-exploits-google-discover-to-spread-scareware-and-ad-fraud</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/ai-driven-pushpaganda-scam-exploits-google-discover-to-spread-scareware-and-ad-fraud" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/ai-driven-pushpaganda-scam-exploits-google-discover-to-spread-scareware-and-ad-fraud" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/ai-driven-pushpaganda-scam-exploits-google-discover-to-spread-scareware-and-ad-fraud" />
<lastmod>2026-04-15T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/ai-driven-pushpaganda-scam-exploits-google-discover-to-spread-scareware-and-ad-fraud</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/ai-driven-pushpaganda-scam-exploits-google-discover-to-spread-scareware-and-ad-fraud" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/ai-driven-pushpaganda-scam-exploits-google-discover-to-spread-scareware-and-ad-fraud" />
<lastmod>2026-04-15T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/google-adds-rust-based-dns-parser-into-pixel-10-modem-to-enhance-security</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/google-adds-rust-based-dns-parser-into-pixel-10-modem-to-enhance-security" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/google-adds-rust-based-dns-parser-into-pixel-10-modem-to-enhance-security" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/google-adds-rust-based-dns-parser-into-pixel-10-modem-to-enhance-security" />
<lastmod>2026-04-15T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/google-adds-rust-based-dns-parser-into-pixel-10-modem-to-enhance-security</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/google-adds-rust-based-dns-parser-into-pixel-10-modem-to-enhance-security" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/google-adds-rust-based-dns-parser-into-pixel-10-modem-to-enhance-security" />
<lastmod>2026-04-15T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/mirax-android-rat-turns-devices-into-socks5-proxies-reaching-220000-via-meta-ads</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/mirax-android-rat-turns-devices-into-socks5-proxies-reaching-220000-via-meta-ads" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/mirax-android-rat-turns-devices-into-socks5-proxies-reaching-220000-via-meta-ads" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/mirax-android-rat-turns-devices-into-socks5-proxies-reaching-220000-via-meta-ads" />
<lastmod>2026-04-15T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/mirax-android-rat-turns-devices-into-socks5-proxies-reaching-220000-via-meta-ads</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/mirax-android-rat-turns-devices-into-socks5-proxies-reaching-220000-via-meta-ads" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/mirax-android-rat-turns-devices-into-socks5-proxies-reaching-220000-via-meta-ads" />
<lastmod>2026-04-15T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/new-php-composer-flaws-enable-arbitrary-command-execution-patches-released</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/new-php-composer-flaws-enable-arbitrary-command-execution-patches-released" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/new-php-composer-flaws-enable-arbitrary-command-execution-patches-released" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/new-php-composer-flaws-enable-arbitrary-command-execution-patches-released" />
<lastmod>2026-04-15T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/new-php-composer-flaws-enable-arbitrary-command-execution-patches-released</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/new-php-composer-flaws-enable-arbitrary-command-execution-patches-released" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/new-php-composer-flaws-enable-arbitrary-command-execution-patches-released" />
<lastmod>2026-04-15T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/openai-launches-gpt-54-cyber-with-expanded-access-for-security-teams</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/openai-launches-gpt-54-cyber-with-expanded-access-for-security-teams" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/openai-launches-gpt-54-cyber-with-expanded-access-for-security-teams" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/openai-launches-gpt-54-cyber-with-expanded-access-for-security-teams" />
<lastmod>2026-04-15T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/openai-launches-gpt-54-cyber-with-expanded-access-for-security-teams</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/openai-launches-gpt-54-cyber-with-expanded-access-for-security-teams" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/openai-launches-gpt-54-cyber-with-expanded-access-for-security-teams" />
<lastmod>2026-04-15T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/cisa-adds-6-known-exploited-flaws-in-fortinet-microsoft-and-adobe-software</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/cisa-adds-6-known-exploited-flaws-in-fortinet-microsoft-and-adobe-software" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/cisa-adds-6-known-exploited-flaws-in-fortinet-microsoft-and-adobe-software" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/cisa-adds-6-known-exploited-flaws-in-fortinet-microsoft-and-adobe-software" />
<lastmod>2026-04-14T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/cisa-adds-6-known-exploited-flaws-in-fortinet-microsoft-and-adobe-software</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/cisa-adds-6-known-exploited-flaws-in-fortinet-microsoft-and-adobe-software" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/cisa-adds-6-known-exploited-flaws-in-fortinet-microsoft-and-adobe-software" />
<lastmod>2026-04-14T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/fbi-and-indonesian-police-dismantle-w3ll-phishing-network-behind-20m-fraud-attempts</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/fbi-and-indonesian-police-dismantle-w3ll-phishing-network-behind-20m-fraud-attempts" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/fbi-and-indonesian-police-dismantle-w3ll-phishing-network-behind-20m-fraud-attempts" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/fbi-and-indonesian-police-dismantle-w3ll-phishing-network-behind-20m-fraud-attempts" />
<lastmod>2026-04-14T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/fbi-and-indonesian-police-dismantle-w3ll-phishing-network-behind-20m-fraud-attempts</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/fbi-and-indonesian-police-dismantle-w3ll-phishing-network-behind-20m-fraud-attempts" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/fbi-and-indonesian-police-dismantle-w3ll-phishing-network-behind-20m-fraud-attempts" />
<lastmod>2026-04-14T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/janelarat-malware-targets-latin-american-banks-with-14739-attacks-in-brazil-in-2025</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/janelarat-malware-targets-latin-american-banks-with-14739-attacks-in-brazil-in-2025" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/janelarat-malware-targets-latin-american-banks-with-14739-attacks-in-brazil-in-2025" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/janelarat-malware-targets-latin-american-banks-with-14739-attacks-in-brazil-in-2025" />
<lastmod>2026-04-14T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/janelarat-malware-targets-latin-american-banks-with-14739-attacks-in-brazil-in-2025</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/janelarat-malware-targets-latin-american-banks-with-14739-attacks-in-brazil-in-2025" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/janelarat-malware-targets-latin-american-banks-with-14739-attacks-in-brazil-in-2025" />
<lastmod>2026-04-14T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/showdoc-rce-flaw-cve-2025-0520-actively-exploited-on-unpatched-servers</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/showdoc-rce-flaw-cve-2025-0520-actively-exploited-on-unpatched-servers" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/showdoc-rce-flaw-cve-2025-0520-actively-exploited-on-unpatched-servers" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/showdoc-rce-flaw-cve-2025-0520-actively-exploited-on-unpatched-servers" />
<lastmod>2026-04-14T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/showdoc-rce-flaw-cve-2025-0520-actively-exploited-on-unpatched-servers</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/showdoc-rce-flaw-cve-2025-0520-actively-exploited-on-unpatched-servers" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/showdoc-rce-flaw-cve-2025-0520-actively-exploited-on-unpatched-servers" />
<lastmod>2026-04-14T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/weekly-recap-fiber-optic-spying-windows-rootkit-ai-vulnerability-hunting-and-more</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/weekly-recap-fiber-optic-spying-windows-rootkit-ai-vulnerability-hunting-and-more" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/weekly-recap-fiber-optic-spying-windows-rootkit-ai-vulnerability-hunting-and-more" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/weekly-recap-fiber-optic-spying-windows-rootkit-ai-vulnerability-hunting-and-more" />
<lastmod>2026-04-14T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/weekly-recap-fiber-optic-spying-windows-rootkit-ai-vulnerability-hunting-and-more</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/weekly-recap-fiber-optic-spying-windows-rootkit-ai-vulnerability-hunting-and-more" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/weekly-recap-fiber-optic-spying-windows-rootkit-ai-vulnerability-hunting-and-more" />
<lastmod>2026-04-14T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/citizen-lab-law-enforcement-used-webloc-to-track-500-million-devices-via-ad-data</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/citizen-lab-law-enforcement-used-webloc-to-track-500-million-devices-via-ad-data" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/citizen-lab-law-enforcement-used-webloc-to-track-500-million-devices-via-ad-data" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/citizen-lab-law-enforcement-used-webloc-to-track-500-million-devices-via-ad-data" />
<lastmod>2026-04-13T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/citizen-lab-law-enforcement-used-webloc-to-track-500-million-devices-via-ad-data</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/citizen-lab-law-enforcement-used-webloc-to-track-500-million-devices-via-ad-data" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/citizen-lab-law-enforcement-used-webloc-to-track-500-million-devices-via-ad-data" />
<lastmod>2026-04-13T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/glassworm-campaign-uses-zig-dropper-to-infect-multiple-developer-ides</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/glassworm-campaign-uses-zig-dropper-to-infect-multiple-developer-ides" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/glassworm-campaign-uses-zig-dropper-to-infect-multiple-developer-ides" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/glassworm-campaign-uses-zig-dropper-to-infect-multiple-developer-ides" />
<lastmod>2026-04-13T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/glassworm-campaign-uses-zig-dropper-to-infect-multiple-developer-ides</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/glassworm-campaign-uses-zig-dropper-to-infect-multiple-developer-ides" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/glassworm-campaign-uses-zig-dropper-to-infect-multiple-developer-ides" />
<lastmod>2026-04-13T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/adobe-patches-actively-exploited-acrobat-reader-flaw-cve-2026-34621</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/adobe-patches-actively-exploited-acrobat-reader-flaw-cve-2026-34621" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/adobe-patches-actively-exploited-acrobat-reader-flaw-cve-2026-34621" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/adobe-patches-actively-exploited-acrobat-reader-flaw-cve-2026-34621" />
<lastmod>2026-04-13T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/adobe-patches-actively-exploited-acrobat-reader-flaw-cve-2026-34621</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/adobe-patches-actively-exploited-acrobat-reader-flaw-cve-2026-34621" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/adobe-patches-actively-exploited-acrobat-reader-flaw-cve-2026-34621" />
<lastmod>2026-04-13T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/cpuid-breach-distributes-stx-rat-via-trojanized-cpu-z-and-hwmonitor-downloads</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/cpuid-breach-distributes-stx-rat-via-trojanized-cpu-z-and-hwmonitor-downloads" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/cpuid-breach-distributes-stx-rat-via-trojanized-cpu-z-and-hwmonitor-downloads" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/cpuid-breach-distributes-stx-rat-via-trojanized-cpu-z-and-hwmonitor-downloads" />
<lastmod>2026-04-13T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/cpuid-breach-distributes-stx-rat-via-trojanized-cpu-z-and-hwmonitor-downloads</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/cpuid-breach-distributes-stx-rat-via-trojanized-cpu-z-and-hwmonitor-downloads" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/cpuid-breach-distributes-stx-rat-via-trojanized-cpu-z-and-hwmonitor-downloads" />
<lastmod>2026-04-13T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/openai-revokes-macos-app-certificate-after-malicious-axios-supply-chain-incident</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/openai-revokes-macos-app-certificate-after-malicious-axios-supply-chain-incident" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/openai-revokes-macos-app-certificate-after-malicious-axios-supply-chain-incident" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/openai-revokes-macos-app-certificate-after-malicious-axios-supply-chain-incident" />
<lastmod>2026-04-13T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/openai-revokes-macos-app-certificate-after-malicious-axios-supply-chain-incident</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/openai-revokes-macos-app-certificate-after-malicious-axios-supply-chain-incident" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/openai-revokes-macos-app-certificate-after-malicious-axios-supply-chain-incident" />
<lastmod>2026-04-13T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/browser-extensions-are-the-new-ai-consumption-channel-that-no-one-is-talking-about</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/browser-extensions-are-the-new-ai-consumption-channel-that-no-one-is-talking-about" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/browser-extensions-are-the-new-ai-consumption-channel-that-no-one-is-talking-about" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/browser-extensions-are-the-new-ai-consumption-channel-that-no-one-is-talking-about" />
<lastmod>2026-04-12T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/browser-extensions-are-the-new-ai-consumption-channel-that-no-one-is-talking-about</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/browser-extensions-are-the-new-ai-consumption-channel-that-no-one-is-talking-about" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/browser-extensions-are-the-new-ai-consumption-channel-that-no-one-is-talking-about" />
<lastmod>2026-04-12T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/google-rolls-out-dbsc-in-chrome-146-to-block-session-theft-on-windows</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/google-rolls-out-dbsc-in-chrome-146-to-block-session-theft-on-windows" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/google-rolls-out-dbsc-in-chrome-146-to-block-session-theft-on-windows" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/google-rolls-out-dbsc-in-chrome-146-to-block-session-theft-on-windows" />
<lastmod>2026-04-11T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/google-rolls-out-dbsc-in-chrome-146-to-block-session-theft-on-windows</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/google-rolls-out-dbsc-in-chrome-146-to-block-session-theft-on-windows" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/google-rolls-out-dbsc-in-chrome-146-to-block-session-theft-on-windows" />
<lastmod>2026-04-11T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/marimo-rce-flaw-cve-2026-39987-exploited-within-10-hours-of-disclosure</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/marimo-rce-flaw-cve-2026-39987-exploited-within-10-hours-of-disclosure" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/marimo-rce-flaw-cve-2026-39987-exploited-within-10-hours-of-disclosure" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/marimo-rce-flaw-cve-2026-39987-exploited-within-10-hours-of-disclosure" />
<lastmod>2026-04-11T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/marimo-rce-flaw-cve-2026-39987-exploited-within-10-hours-of-disclosure</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/marimo-rce-flaw-cve-2026-39987-exploited-within-10-hours-of-disclosure" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/marimo-rce-flaw-cve-2026-39987-exploited-within-10-hours-of-disclosure" />
<lastmod>2026-04-11T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/backdoored-smart-slider-3-pro-update-distributed-via-compromised-nextend-servers</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/backdoored-smart-slider-3-pro-update-distributed-via-compromised-nextend-servers" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/backdoored-smart-slider-3-pro-update-distributed-via-compromised-nextend-servers" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/backdoored-smart-slider-3-pro-update-distributed-via-compromised-nextend-servers" />
<lastmod>2026-04-10T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/backdoored-smart-slider-3-pro-update-distributed-via-compromised-nextend-servers</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/backdoored-smart-slider-3-pro-update-distributed-via-compromised-nextend-servers" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/backdoored-smart-slider-3-pro-update-distributed-via-compromised-nextend-servers" />
<lastmod>2026-04-10T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/engagelab-sdk-flaw-exposed-50m-android-users-including-30m-crypto-wallet-installs</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/engagelab-sdk-flaw-exposed-50m-android-users-including-30m-crypto-wallet-installs" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/engagelab-sdk-flaw-exposed-50m-android-users-including-30m-crypto-wallet-installs" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/engagelab-sdk-flaw-exposed-50m-android-users-including-30m-crypto-wallet-installs" />
<lastmod>2026-04-10T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/engagelab-sdk-flaw-exposed-50m-android-users-including-30m-crypto-wallet-installs</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/engagelab-sdk-flaw-exposed-50m-android-users-including-30m-crypto-wallet-installs" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/engagelab-sdk-flaw-exposed-50m-android-users-including-30m-crypto-wallet-installs" />
<lastmod>2026-04-10T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/threatsday-bulletin-hybrid-p2p-botnet-13-year-old-apache-rce-and-18-more-stories</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/threatsday-bulletin-hybrid-p2p-botnet-13-year-old-apache-rce-and-18-more-stories" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/threatsday-bulletin-hybrid-p2p-botnet-13-year-old-apache-rce-and-18-more-stories" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/threatsday-bulletin-hybrid-p2p-botnet-13-year-old-apache-rce-and-18-more-stories" />
<lastmod>2026-04-10T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/threatsday-bulletin-hybrid-p2p-botnet-13-year-old-apache-rce-and-18-more-stories</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/threatsday-bulletin-hybrid-p2p-botnet-13-year-old-apache-rce-and-18-more-stories" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/threatsday-bulletin-hybrid-p2p-botnet-13-year-old-apache-rce-and-18-more-stories" />
<lastmod>2026-04-10T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/uat-10362-targets-taiwanese-ngos-with-lucidrook-malware-in-spear-phishing-campaigns</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/uat-10362-targets-taiwanese-ngos-with-lucidrook-malware-in-spear-phishing-campaigns" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/uat-10362-targets-taiwanese-ngos-with-lucidrook-malware-in-spear-phishing-campaigns" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/uat-10362-targets-taiwanese-ngos-with-lucidrook-malware-in-spear-phishing-campaigns" />
<lastmod>2026-04-10T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/uat-10362-targets-taiwanese-ngos-with-lucidrook-malware-in-spear-phishing-campaigns</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/uat-10362-targets-taiwanese-ngos-with-lucidrook-malware-in-spear-phishing-campaigns" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/uat-10362-targets-taiwanese-ngos-with-lucidrook-malware-in-spear-phishing-campaigns" />
<lastmod>2026-04-10T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/anthropics-claude-mythos-finds-thousands-of-zero-day-flaws-across-major-systems</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/anthropics-claude-mythos-finds-thousands-of-zero-day-flaws-across-major-systems" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/anthropics-claude-mythos-finds-thousands-of-zero-day-flaws-across-major-systems" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/anthropics-claude-mythos-finds-thousands-of-zero-day-flaws-across-major-systems" />
<lastmod>2026-04-09T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/anthropics-claude-mythos-finds-thousands-of-zero-day-flaws-across-major-systems</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/anthropics-claude-mythos-finds-thousands-of-zero-day-flaws-across-major-systems" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/anthropics-claude-mythos-finds-thousands-of-zero-day-flaws-across-major-systems" />
<lastmod>2026-04-09T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/apt28-deploys-prismex-malware-in-campaign-targeting-ukraine-and-nato-allies</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/apt28-deploys-prismex-malware-in-campaign-targeting-ukraine-and-nato-allies" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/apt28-deploys-prismex-malware-in-campaign-targeting-ukraine-and-nato-allies" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/apt28-deploys-prismex-malware-in-campaign-targeting-ukraine-and-nato-allies" />
<lastmod>2026-04-09T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/apt28-deploys-prismex-malware-in-campaign-targeting-ukraine-and-nato-allies</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/apt28-deploys-prismex-malware-in-campaign-targeting-ukraine-and-nato-allies" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/apt28-deploys-prismex-malware-in-campaign-targeting-ukraine-and-nato-allies" />
<lastmod>2026-04-09T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/masjesu-botnet-emerges-as-ddos-for-hire-service-targeting-global-iot-devices</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/masjesu-botnet-emerges-as-ddos-for-hire-service-targeting-global-iot-devices" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/masjesu-botnet-emerges-as-ddos-for-hire-service-targeting-global-iot-devices" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/masjesu-botnet-emerges-as-ddos-for-hire-service-targeting-global-iot-devices" />
<lastmod>2026-04-09T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/masjesu-botnet-emerges-as-ddos-for-hire-service-targeting-global-iot-devices</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/masjesu-botnet-emerges-as-ddos-for-hire-service-targeting-global-iot-devices" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/masjesu-botnet-emerges-as-ddos-for-hire-service-targeting-global-iot-devices" />
<lastmod>2026-04-09T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/new-chaos-variant-targets-misconfigured-cloud-deployments-adds-socks-proxy</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/new-chaos-variant-targets-misconfigured-cloud-deployments-adds-socks-proxy" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/new-chaos-variant-targets-misconfigured-cloud-deployments-adds-socks-proxy" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/new-chaos-variant-targets-misconfigured-cloud-deployments-adds-socks-proxy" />
<lastmod>2026-04-09T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/new-chaos-variant-targets-misconfigured-cloud-deployments-adds-socks-proxy</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/new-chaos-variant-targets-misconfigured-cloud-deployments-adds-socks-proxy" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/new-chaos-variant-targets-misconfigured-cloud-deployments-adds-socks-proxy" />
<lastmod>2026-04-09T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/shrinking-the-iam-attack-surface-through-identity-visibility-and-intelligence-platforms-ivip</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/shrinking-the-iam-attack-surface-through-identity-visibility-and-intelligence-platforms-ivip" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/shrinking-the-iam-attack-surface-through-identity-visibility-and-intelligence-platforms-ivip" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/shrinking-the-iam-attack-surface-through-identity-visibility-and-intelligence-platforms-ivip" />
<lastmod>2026-04-09T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/shrinking-the-iam-attack-surface-through-identity-visibility-and-intelligence-platforms-ivip</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/shrinking-the-iam-attack-surface-through-identity-visibility-and-intelligence-platforms-ivip" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/shrinking-the-iam-attack-surface-through-identity-visibility-and-intelligence-platforms-ivip" />
<lastmod>2026-04-09T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/docker-cve-2026-34040-lets-attackers-bypass-authorization-and-gain-host-access</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/docker-cve-2026-34040-lets-attackers-bypass-authorization-and-gain-host-access" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/docker-cve-2026-34040-lets-attackers-bypass-authorization-and-gain-host-access" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/docker-cve-2026-34040-lets-attackers-bypass-authorization-and-gain-host-access" />
<lastmod>2026-04-08T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/docker-cve-2026-34040-lets-attackers-bypass-authorization-and-gain-host-access</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/docker-cve-2026-34040-lets-attackers-bypass-authorization-and-gain-host-access" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/docker-cve-2026-34040-lets-attackers-bypass-authorization-and-gain-host-access" />
<lastmod>2026-04-08T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/iran-linked-hackers-disrupt-us-critical-infrastructure-by-targeting-internet-exposed-plcs</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/iran-linked-hackers-disrupt-us-critical-infrastructure-by-targeting-internet-exposed-plcs" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/iran-linked-hackers-disrupt-us-critical-infrastructure-by-targeting-internet-exposed-plcs" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/iran-linked-hackers-disrupt-us-critical-infrastructure-by-targeting-internet-exposed-plcs" />
<lastmod>2026-04-08T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/iran-linked-hackers-disrupt-us-critical-infrastructure-by-targeting-internet-exposed-plcs</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/iran-linked-hackers-disrupt-us-critical-infrastructure-by-targeting-internet-exposed-plcs" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/iran-linked-hackers-disrupt-us-critical-infrastructure-by-targeting-internet-exposed-plcs" />
<lastmod>2026-04-08T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/over-1000-exposed-comfyui-instances-targeted-in-cryptomining-botnet-campaign</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/over-1000-exposed-comfyui-instances-targeted-in-cryptomining-botnet-campaign" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/over-1000-exposed-comfyui-instances-targeted-in-cryptomining-botnet-campaign" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/over-1000-exposed-comfyui-instances-targeted-in-cryptomining-botnet-campaign" />
<lastmod>2026-04-08T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/over-1000-exposed-comfyui-instances-targeted-in-cryptomining-botnet-campaign</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/over-1000-exposed-comfyui-instances-targeted-in-cryptomining-botnet-campaign" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/over-1000-exposed-comfyui-instances-targeted-in-cryptomining-botnet-campaign" />
<lastmod>2026-04-08T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/russian-state-linked-apt28-exploits-soho-routers-in-global-dns-hijacking-campaign</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/russian-state-linked-apt28-exploits-soho-routers-in-global-dns-hijacking-campaign" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/russian-state-linked-apt28-exploits-soho-routers-in-global-dns-hijacking-campaign" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/russian-state-linked-apt28-exploits-soho-routers-in-global-dns-hijacking-campaign" />
<lastmod>2026-04-08T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/russian-state-linked-apt28-exploits-soho-routers-in-global-dns-hijacking-campaign</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/russian-state-linked-apt28-exploits-soho-routers-in-global-dns-hijacking-campaign" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/russian-state-linked-apt28-exploits-soho-routers-in-global-dns-hijacking-campaign" />
<lastmod>2026-04-08T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/webinar-how-to-close-identity-gaps-in-2026-before-ai-exploits-enterprise-risk</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/webinar-how-to-close-identity-gaps-in-2026-before-ai-exploits-enterprise-risk" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/webinar-how-to-close-identity-gaps-in-2026-before-ai-exploits-enterprise-risk" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/webinar-how-to-close-identity-gaps-in-2026-before-ai-exploits-enterprise-risk" />
<lastmod>2026-04-08T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/webinar-how-to-close-identity-gaps-in-2026-before-ai-exploits-enterprise-risk</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/webinar-how-to-close-identity-gaps-in-2026-before-ai-exploits-enterprise-risk" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/webinar-how-to-close-identity-gaps-in-2026-before-ai-exploits-enterprise-risk" />
<lastmod>2026-04-08T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/china-linked-storm-1175-exploits-zero-days-to-rapidly-deploy-medusa-ransomware</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/china-linked-storm-1175-exploits-zero-days-to-rapidly-deploy-medusa-ransomware" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/china-linked-storm-1175-exploits-zero-days-to-rapidly-deploy-medusa-ransomware" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/china-linked-storm-1175-exploits-zero-days-to-rapidly-deploy-medusa-ransomware" />
<lastmod>2026-04-07T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/china-linked-storm-1175-exploits-zero-days-to-rapidly-deploy-medusa-ransomware</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/china-linked-storm-1175-exploits-zero-days-to-rapidly-deploy-medusa-ransomware" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/china-linked-storm-1175-exploits-zero-days-to-rapidly-deploy-medusa-ransomware" />
<lastmod>2026-04-07T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/dprk-linked-hackers-use-github-as-c2-in-multi-stage-attacks-targeting-south-korea</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/dprk-linked-hackers-use-github-as-c2-in-multi-stage-attacks-targeting-south-korea" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/dprk-linked-hackers-use-github-as-c2-in-multi-stage-attacks-targeting-south-korea" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/dprk-linked-hackers-use-github-as-c2-in-multi-stage-attacks-targeting-south-korea" />
<lastmod>2026-04-07T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/dprk-linked-hackers-use-github-as-c2-in-multi-stage-attacks-targeting-south-korea</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/dprk-linked-hackers-use-github-as-c2-in-multi-stage-attacks-targeting-south-korea" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/dprk-linked-hackers-use-github-as-c2-in-multi-stage-attacks-targeting-south-korea" />
<lastmod>2026-04-07T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/flowise-ai-agent-builder-under-active-cvss-100-rce-exploitation-12000-instances-exposed</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/flowise-ai-agent-builder-under-active-cvss-100-rce-exploitation-12000-instances-exposed" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/flowise-ai-agent-builder-under-active-cvss-100-rce-exploitation-12000-instances-exposed" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/flowise-ai-agent-builder-under-active-cvss-100-rce-exploitation-12000-instances-exposed" />
<lastmod>2026-04-07T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/flowise-ai-agent-builder-under-active-cvss-100-rce-exploitation-12000-instances-exposed</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/flowise-ai-agent-builder-under-active-cvss-100-rce-exploitation-12000-instances-exposed" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/flowise-ai-agent-builder-under-active-cvss-100-rce-exploitation-12000-instances-exposed" />
<lastmod>2026-04-07T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/iran-linked-password-spraying-campaign-targets-300-israeli-microsoft-365-organizations</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/iran-linked-password-spraying-campaign-targets-300-israeli-microsoft-365-organizations" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/iran-linked-password-spraying-campaign-targets-300-israeli-microsoft-365-organizations" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/iran-linked-password-spraying-campaign-targets-300-israeli-microsoft-365-organizations" />
<lastmod>2026-04-07T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/iran-linked-password-spraying-campaign-targets-300-israeli-microsoft-365-organizations</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/iran-linked-password-spraying-campaign-targets-300-israeli-microsoft-365-organizations" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/iran-linked-password-spraying-campaign-targets-300-israeli-microsoft-365-organizations" />
<lastmod>2026-04-07T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/multi-os-cyberattacks-how-socs-close-a-critical-risk-in-3-steps</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/multi-os-cyberattacks-how-socs-close-a-critical-risk-in-3-steps" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/multi-os-cyberattacks-how-socs-close-a-critical-risk-in-3-steps" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/multi-os-cyberattacks-how-socs-close-a-critical-risk-in-3-steps" />
<lastmod>2026-04-07T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/multi-os-cyberattacks-how-socs-close-a-critical-risk-in-3-steps</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/multi-os-cyberattacks-how-socs-close-a-critical-risk-in-3-steps" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/multi-os-cyberattacks-how-socs-close-a-critical-risk-in-3-steps" />
<lastmod>2026-04-07T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/china-linked-ta416-targets-european-governments-with-plugx-and-oauth-based-phishing</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/china-linked-ta416-targets-european-governments-with-plugx-and-oauth-based-phishing" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/china-linked-ta416-targets-european-governments-with-plugx-and-oauth-based-phishing" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/china-linked-ta416-targets-european-governments-with-plugx-and-oauth-based-phishing" />
<lastmod>2026-04-06T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/china-linked-ta416-targets-european-governments-with-plugx-and-oauth-based-phishing</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/china-linked-ta416-targets-european-governments-with-plugx-and-oauth-based-phishing" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/china-linked-ta416-targets-european-governments-with-plugx-and-oauth-based-phishing" />
<lastmod>2026-04-06T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/36-malicious-npm-packages-exploited-redis-postgresql-to-deploy-persistent-implants</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/36-malicious-npm-packages-exploited-redis-postgresql-to-deploy-persistent-implants" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/36-malicious-npm-packages-exploited-redis-postgresql-to-deploy-persistent-implants" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/36-malicious-npm-packages-exploited-redis-postgresql-to-deploy-persistent-implants" />
<lastmod>2026-04-06T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/36-malicious-npm-packages-exploited-redis-postgresql-to-deploy-persistent-implants</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/36-malicious-npm-packages-exploited-redis-postgresql-to-deploy-persistent-implants" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/36-malicious-npm-packages-exploited-redis-postgresql-to-deploy-persistent-implants" />
<lastmod>2026-04-06T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/fortinet-patches-actively-exploited-cve-2026-35616-in-forticlient-ems</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/fortinet-patches-actively-exploited-cve-2026-35616-in-forticlient-ems" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/fortinet-patches-actively-exploited-cve-2026-35616-in-forticlient-ems" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/fortinet-patches-actively-exploited-cve-2026-35616-in-forticlient-ems" />
<lastmod>2026-04-06T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/fortinet-patches-actively-exploited-cve-2026-35616-in-forticlient-ems</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/fortinet-patches-actively-exploited-cve-2026-35616-in-forticlient-ems" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/fortinet-patches-actively-exploited-cve-2026-35616-in-forticlient-ems" />
<lastmod>2026-04-06T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/285-million-drift-hack-traced-to-six-month-dprk-social-engineering-operation</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/285-million-drift-hack-traced-to-six-month-dprk-social-engineering-operation" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/285-million-drift-hack-traced-to-six-month-dprk-social-engineering-operation" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/285-million-drift-hack-traced-to-six-month-dprk-social-engineering-operation" />
<lastmod>2026-04-06T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/285-million-drift-hack-traced-to-six-month-dprk-social-engineering-operation</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/285-million-drift-hack-traced-to-six-month-dprk-social-engineering-operation" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/285-million-drift-hack-traced-to-six-month-dprk-social-engineering-operation" />
<lastmod>2026-04-06T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/bka-identifies-revil-leaders-behind-130-german-ransomware-attacks</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/bka-identifies-revil-leaders-behind-130-german-ransomware-attacks" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/bka-identifies-revil-leaders-behind-130-german-ransomware-attacks" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/bka-identifies-revil-leaders-behind-130-german-ransomware-attacks" />
<lastmod>2026-04-06T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/bka-identifies-revil-leaders-behind-130-german-ransomware-attacks</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/bka-identifies-revil-leaders-behind-130-german-ransomware-attacks" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/bka-identifies-revil-leaders-behind-130-german-ransomware-attacks" />
<lastmod>2026-04-06T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/microsoft-details-cookie-controlled-php-web-shells-persisting-via-cron-on-linux-servers</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/microsoft-details-cookie-controlled-php-web-shells-persisting-via-cron-on-linux-servers" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/microsoft-details-cookie-controlled-php-web-shells-persisting-via-cron-on-linux-servers" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/microsoft-details-cookie-controlled-php-web-shells-persisting-via-cron-on-linux-servers" />
<lastmod>2026-04-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/microsoft-details-cookie-controlled-php-web-shells-persisting-via-cron-on-linux-servers</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/microsoft-details-cookie-controlled-php-web-shells-persisting-via-cron-on-linux-servers" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/microsoft-details-cookie-controlled-php-web-shells-persisting-via-cron-on-linux-servers" />
<lastmod>2026-04-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/unc1069-social-engineering-of-axios-maintainer-led-to-npm-supply-chain-attack</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/unc1069-social-engineering-of-axios-maintainer-led-to-npm-supply-chain-attack" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/unc1069-social-engineering-of-axios-maintainer-led-to-npm-supply-chain-attack" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/unc1069-social-engineering-of-axios-maintainer-led-to-npm-supply-chain-attack" />
<lastmod>2026-04-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/unc1069-social-engineering-of-axios-maintainer-led-to-npm-supply-chain-attack</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/unc1069-social-engineering-of-axios-maintainer-led-to-npm-supply-chain-attack" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/unc1069-social-engineering-of-axios-maintainer-led-to-npm-supply-chain-attack" />
<lastmod>2026-04-05T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/new-sparkcat-variant-in-ios-android-apps-steals-crypto-wallet-recovery-phrase-images</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/new-sparkcat-variant-in-ios-android-apps-steals-crypto-wallet-recovery-phrase-images" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/new-sparkcat-variant-in-ios-android-apps-steals-crypto-wallet-recovery-phrase-images" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/new-sparkcat-variant-in-ios-android-apps-steals-crypto-wallet-recovery-phrase-images" />
<lastmod>2026-04-04T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/new-sparkcat-variant-in-ios-android-apps-steals-crypto-wallet-recovery-phrase-images</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/new-sparkcat-variant-in-ios-android-apps-steals-crypto-wallet-recovery-phrase-images" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/new-sparkcat-variant-in-ios-android-apps-steals-crypto-wallet-recovery-phrase-images" />
<lastmod>2026-04-04T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/why-third-party-risk-is-the-biggest-gap-in-your-clients-security-posture</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/why-third-party-risk-is-the-biggest-gap-in-your-clients-security-posture" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/why-third-party-risk-is-the-biggest-gap-in-your-clients-security-posture" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/why-third-party-risk-is-the-biggest-gap-in-your-clients-security-posture" />
<lastmod>2026-04-04T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/why-third-party-risk-is-the-biggest-gap-in-your-clients-security-posture</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/why-third-party-risk-is-the-biggest-gap-in-your-clients-security-posture" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/why-third-party-risk-is-the-biggest-gap-in-your-clients-security-posture" />
<lastmod>2026-04-04T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/cisco-patches-98-cvss-imc-and-ssm-flaws-allowing-remote-system-compromise</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/cisco-patches-98-cvss-imc-and-ssm-flaws-allowing-remote-system-compromise" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/cisco-patches-98-cvss-imc-and-ssm-flaws-allowing-remote-system-compromise" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/cisco-patches-98-cvss-imc-and-ssm-flaws-allowing-remote-system-compromise" />
<lastmod>2026-04-03T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/cisco-patches-98-cvss-imc-and-ssm-flaws-allowing-remote-system-compromise</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/cisco-patches-98-cvss-imc-and-ssm-flaws-allowing-remote-system-compromise" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/cisco-patches-98-cvss-imc-and-ssm-flaws-allowing-remote-system-compromise" />
<lastmod>2026-04-03T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/hackers-exploit-cve-2025-55182-to-breach-766-nextjs-hosts-steal-credentials</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/hackers-exploit-cve-2025-55182-to-breach-766-nextjs-hosts-steal-credentials" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/hackers-exploit-cve-2025-55182-to-breach-766-nextjs-hosts-steal-credentials" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/hackers-exploit-cve-2025-55182-to-breach-766-nextjs-hosts-steal-credentials" />
<lastmod>2026-04-03T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/hackers-exploit-cve-2025-55182-to-breach-766-nextjs-hosts-steal-credentials</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/hackers-exploit-cve-2025-55182-to-breach-766-nextjs-hosts-steal-credentials" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/hackers-exploit-cve-2025-55182-to-breach-766-nextjs-hosts-steal-credentials" />
<lastmod>2026-04-03T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/researchers-uncover-mining-operation-using-iso-lures-to-spread-rats-and-crypto-miners</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/researchers-uncover-mining-operation-using-iso-lures-to-spread-rats-and-crypto-miners" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/researchers-uncover-mining-operation-using-iso-lures-to-spread-rats-and-crypto-miners" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/researchers-uncover-mining-operation-using-iso-lures-to-spread-rats-and-crypto-miners" />
<lastmod>2026-04-03T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/researchers-uncover-mining-operation-using-iso-lures-to-spread-rats-and-crypto-miners</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/researchers-uncover-mining-operation-using-iso-lures-to-spread-rats-and-crypto-miners" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/researchers-uncover-mining-operation-using-iso-lures-to-spread-rats-and-crypto-miners" />
<lastmod>2026-04-03T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/the-state-of-trusted-open-source-report</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/the-state-of-trusted-open-source-report" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/the-state-of-trusted-open-source-report" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/the-state-of-trusted-open-source-report" />
<lastmod>2026-04-03T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/the-state-of-trusted-open-source-report</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/the-state-of-trusted-open-source-report" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/the-state-of-trusted-open-source-report" />
<lastmod>2026-04-03T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/threatsday-bulletin-pre-auth-chains-android-rootkits-cloudtrail-evasion-10-more-stories</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/threatsday-bulletin-pre-auth-chains-android-rootkits-cloudtrail-evasion-10-more-stories" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/threatsday-bulletin-pre-auth-chains-android-rootkits-cloudtrail-evasion-10-more-stories" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/threatsday-bulletin-pre-auth-chains-android-rootkits-cloudtrail-evasion-10-more-stories" />
<lastmod>2026-04-03T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/threatsday-bulletin-pre-auth-chains-android-rootkits-cloudtrail-evasion-10-more-stories</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/threatsday-bulletin-pre-auth-chains-android-rootkits-cloudtrail-evasion-10-more-stories" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/threatsday-bulletin-pre-auth-chains-android-rootkits-cloudtrail-evasion-10-more-stories" />
<lastmod>2026-04-03T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/block-the-prompt-not-the-work-the-end-of-doctor-no</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/block-the-prompt-not-the-work-the-end-of-doctor-no" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/block-the-prompt-not-the-work-the-end-of-doctor-no" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/block-the-prompt-not-the-work-the-end-of-doctor-no" />
<lastmod>2026-04-02T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/block-the-prompt-not-the-work-the-end-of-doctor-no</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/block-the-prompt-not-the-work-the-end-of-doctor-no" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/block-the-prompt-not-the-work-the-end-of-doctor-no" />
<lastmod>2026-04-02T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/casbaneiro-phishing-targets-latin-america-and-europe-using-dynamic-pdf-lures</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/casbaneiro-phishing-targets-latin-america-and-europe-using-dynamic-pdf-lures" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/casbaneiro-phishing-targets-latin-america-and-europe-using-dynamic-pdf-lures" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/casbaneiro-phishing-targets-latin-america-and-europe-using-dynamic-pdf-lures" />
<lastmod>2026-04-02T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/casbaneiro-phishing-targets-latin-america-and-europe-using-dynamic-pdf-lures</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/casbaneiro-phishing-targets-latin-america-and-europe-using-dynamic-pdf-lures" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/casbaneiro-phishing-targets-latin-america-and-europe-using-dynamic-pdf-lures" />
<lastmod>2026-04-02T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/microsoft-warns-of-whatsapp-delivered-vbs-malware-hijacking-windows-via-uac-bypass</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/microsoft-warns-of-whatsapp-delivered-vbs-malware-hijacking-windows-via-uac-bypass" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/microsoft-warns-of-whatsapp-delivered-vbs-malware-hijacking-windows-via-uac-bypass" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/microsoft-warns-of-whatsapp-delivered-vbs-malware-hijacking-windows-via-uac-bypass" />
<lastmod>2026-04-02T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/microsoft-warns-of-whatsapp-delivered-vbs-malware-hijacking-windows-via-uac-bypass</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/microsoft-warns-of-whatsapp-delivered-vbs-malware-hijacking-windows-via-uac-bypass" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/microsoft-warns-of-whatsapp-delivered-vbs-malware-hijacking-windows-via-uac-bypass" />
<lastmod>2026-04-02T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/new-chrome-zero-day-cve-2026-5281-under-active-exploitation-patch-released</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/new-chrome-zero-day-cve-2026-5281-under-active-exploitation-patch-released" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/new-chrome-zero-day-cve-2026-5281-under-active-exploitation-patch-released" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/new-chrome-zero-day-cve-2026-5281-under-active-exploitation-patch-released" />
<lastmod>2026-04-02T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/new-chrome-zero-day-cve-2026-5281-under-active-exploitation-patch-released</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/new-chrome-zero-day-cve-2026-5281-under-active-exploitation-patch-released" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/new-chrome-zero-day-cve-2026-5281-under-active-exploitation-patch-released" />
<lastmod>2026-04-02T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/android-developer-verification-rollout-begins-ahead-of-september-enforcement</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/android-developer-verification-rollout-begins-ahead-of-september-enforcement" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/android-developer-verification-rollout-begins-ahead-of-september-enforcement" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/android-developer-verification-rollout-begins-ahead-of-september-enforcement" />
<lastmod>2026-04-01T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/android-developer-verification-rollout-begins-ahead-of-september-enforcement</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/android-developer-verification-rollout-begins-ahead-of-september-enforcement" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/android-developer-verification-rollout-begins-ahead-of-september-enforcement" />
<lastmod>2026-04-01T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/claude-code-source-leaked-via-npm-packaging-error-anthropic-confirms</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/claude-code-source-leaked-via-npm-packaging-error-anthropic-confirms" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/claude-code-source-leaked-via-npm-packaging-error-anthropic-confirms" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/claude-code-source-leaked-via-npm-packaging-error-anthropic-confirms" />
<lastmod>2026-04-01T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/claude-code-source-leaked-via-npm-packaging-error-anthropic-confirms</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/claude-code-source-leaked-via-npm-packaging-error-anthropic-confirms" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/claude-code-source-leaked-via-npm-packaging-error-anthropic-confirms" />
<lastmod>2026-04-01T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/the-ai-arms-race-why-unified-exposure-management-is-becoming-a-boardroom-priority</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/the-ai-arms-race-why-unified-exposure-management-is-becoming-a-boardroom-priority" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/the-ai-arms-race-why-unified-exposure-management-is-becoming-a-boardroom-priority" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/the-ai-arms-race-why-unified-exposure-management-is-becoming-a-boardroom-priority" />
<lastmod>2026-04-01T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/the-ai-arms-race-why-unified-exposure-management-is-becoming-a-boardroom-priority</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/the-ai-arms-race-why-unified-exposure-management-is-becoming-a-boardroom-priority" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/the-ai-arms-race-why-unified-exposure-management-is-becoming-a-boardroom-priority" />
<lastmod>2026-04-01T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/trueconf-zero-day-exploited-in-attacks-on-southeast-asian-government-networks</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/trueconf-zero-day-exploited-in-attacks-on-southeast-asian-government-networks" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/trueconf-zero-day-exploited-in-attacks-on-southeast-asian-government-networks" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/trueconf-zero-day-exploited-in-attacks-on-southeast-asian-government-networks" />
<lastmod>2026-04-01T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/trueconf-zero-day-exploited-in-attacks-on-southeast-asian-government-networks</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/trueconf-zero-day-exploited-in-attacks-on-southeast-asian-government-networks" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/trueconf-zero-day-exploited-in-attacks-on-southeast-asian-government-networks" />
<lastmod>2026-04-01T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/vertex-ai-vulnerability-exposes-google-cloud-data-and-private-artifacts</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/vertex-ai-vulnerability-exposes-google-cloud-data-and-private-artifacts" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/vertex-ai-vulnerability-exposes-google-cloud-data-and-private-artifacts" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/vertex-ai-vulnerability-exposes-google-cloud-data-and-private-artifacts" />
<lastmod>2026-04-01T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/vertex-ai-vulnerability-exposes-google-cloud-data-and-private-artifacts</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/vertex-ai-vulnerability-exposes-google-cloud-data-and-private-artifacts" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/vertex-ai-vulnerability-exposes-google-cloud-data-and-private-artifacts" />
<lastmod>2026-04-01T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/3-soc-process-fixes-that-unlock-tier-1-productivity</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/3-soc-process-fixes-that-unlock-tier-1-productivity" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/3-soc-process-fixes-that-unlock-tier-1-productivity" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/3-soc-process-fixes-that-unlock-tier-1-productivity" />
<lastmod>2026-03-31T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/3-soc-process-fixes-that-unlock-tier-1-productivity</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/3-soc-process-fixes-that-unlock-tier-1-productivity" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/3-soc-process-fixes-that-unlock-tier-1-productivity" />
<lastmod>2026-03-31T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/openai-patches-chatgpt-data-exfiltration-flaw-and-codex-github-token-vulnerability</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/openai-patches-chatgpt-data-exfiltration-flaw-and-codex-github-token-vulnerability" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/openai-patches-chatgpt-data-exfiltration-flaw-and-codex-github-token-vulnerability" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/openai-patches-chatgpt-data-exfiltration-flaw-and-codex-github-token-vulnerability" />
<lastmod>2026-03-31T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/openai-patches-chatgpt-data-exfiltration-flaw-and-codex-github-token-vulnerability</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/openai-patches-chatgpt-data-exfiltration-flaw-and-codex-github-token-vulnerability" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/openai-patches-chatgpt-data-exfiltration-flaw-and-codex-github-token-vulnerability" />
<lastmod>2026-03-31T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/weekly-recap-telecom-sleeper-cells-llm-jailbreaks-apple-forces-uk-age-checks-and-more</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/weekly-recap-telecom-sleeper-cells-llm-jailbreaks-apple-forces-uk-age-checks-and-more" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/weekly-recap-telecom-sleeper-cells-llm-jailbreaks-apple-forces-uk-age-checks-and-more" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/weekly-recap-telecom-sleeper-cells-llm-jailbreaks-apple-forces-uk-age-checks-and-more" />
<lastmod>2026-03-31T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/weekly-recap-telecom-sleeper-cells-llm-jailbreaks-apple-forces-uk-age-checks-and-more</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/weekly-recap-telecom-sleeper-cells-llm-jailbreaks-apple-forces-uk-age-checks-and-more" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/weekly-recap-telecom-sleeper-cells-llm-jailbreaks-apple-forces-uk-age-checks-and-more" />
<lastmod>2026-03-31T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/cisa-adds-cve-2025-53521-to-kev-after-active-f5-big-ip-apm-exploitation</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/cisa-adds-cve-2025-53521-to-kev-after-active-f5-big-ip-apm-exploitation" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/cisa-adds-cve-2025-53521-to-kev-after-active-f5-big-ip-apm-exploitation" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/cisa-adds-cve-2025-53521-to-kev-after-active-f5-big-ip-apm-exploitation" />
<lastmod>2026-03-30T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/cisa-adds-cve-2025-53521-to-kev-after-active-f5-big-ip-apm-exploitation</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/cisa-adds-cve-2025-53521-to-kev-after-active-f5-big-ip-apm-exploitation" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/cisa-adds-cve-2025-53521-to-kev-after-active-f5-big-ip-apm-exploitation" />
<lastmod>2026-03-30T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/citrix-netscaler-under-active-recon-for-cve-2026-3055-cvss-93-memory-overread-bug</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/citrix-netscaler-under-active-recon-for-cve-2026-3055-cvss-93-memory-overread-bug" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/citrix-netscaler-under-active-recon-for-cve-2026-3055-cvss-93-memory-overread-bug" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/citrix-netscaler-under-active-recon-for-cve-2026-3055-cvss-93-memory-overread-bug" />
<lastmod>2026-03-30T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/citrix-netscaler-under-active-recon-for-cve-2026-3055-cvss-93-memory-overread-bug</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/citrix-netscaler-under-active-recon-for-cve-2026-3055-cvss-93-memory-overread-bug" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/citrix-netscaler-under-active-recon-for-cve-2026-3055-cvss-93-memory-overread-bug" />
<lastmod>2026-03-30T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/iran-linked-hackers-breach-fbi-directors-personal-email-hit-stryker-with-wiper-attack</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/iran-linked-hackers-breach-fbi-directors-personal-email-hit-stryker-with-wiper-attack" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/iran-linked-hackers-breach-fbi-directors-personal-email-hit-stryker-with-wiper-attack" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/iran-linked-hackers-breach-fbi-directors-personal-email-hit-stryker-with-wiper-attack" />
<lastmod>2026-03-30T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/iran-linked-hackers-breach-fbi-directors-personal-email-hit-stryker-with-wiper-attack</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/iran-linked-hackers-breach-fbi-directors-personal-email-hit-stryker-with-wiper-attack" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/iran-linked-hackers-breach-fbi-directors-personal-email-hit-stryker-with-wiper-attack" />
<lastmod>2026-03-30T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/ta446-deploys-darksword-ios-exploit-kit-in-targeted-spear-phishing-campaign</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/ta446-deploys-darksword-ios-exploit-kit-in-targeted-spear-phishing-campaign" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/ta446-deploys-darksword-ios-exploit-kit-in-targeted-spear-phishing-campaign" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/ta446-deploys-darksword-ios-exploit-kit-in-targeted-spear-phishing-campaign" />
<lastmod>2026-03-30T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/ta446-deploys-darksword-ios-exploit-kit-in-targeted-spear-phishing-campaign</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/ta446-deploys-darksword-ios-exploit-kit-in-targeted-spear-phishing-campaign" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/ta446-deploys-darksword-ios-exploit-kit-in-targeted-spear-phishing-campaign" />
<lastmod>2026-03-30T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/three-china-linked-clusters-target-southeast-asian-government-in-2025-cyber-campaign</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/three-china-linked-clusters-target-southeast-asian-government-in-2025-cyber-campaign" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/three-china-linked-clusters-target-southeast-asian-government-in-2025-cyber-campaign" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/three-china-linked-clusters-target-southeast-asian-government-in-2025-cyber-campaign" />
<lastmod>2026-03-30T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/three-china-linked-clusters-target-southeast-asian-government-in-2025-cyber-campaign</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/three-china-linked-clusters-target-southeast-asian-government-in-2025-cyber-campaign" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/three-china-linked-clusters-target-southeast-asian-government-in-2025-cyber-campaign" />
<lastmod>2026-03-30T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/apple-sends-lock-screen-alerts-to-outdated-iphones-over-active-web-based-exploits</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/apple-sends-lock-screen-alerts-to-outdated-iphones-over-active-web-based-exploits" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/apple-sends-lock-screen-alerts-to-outdated-iphones-over-active-web-based-exploits" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/apple-sends-lock-screen-alerts-to-outdated-iphones-over-active-web-based-exploits" />
<lastmod>2026-03-29T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/apple-sends-lock-screen-alerts-to-outdated-iphones-over-active-web-based-exploits</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/apple-sends-lock-screen-alerts-to-outdated-iphones-over-active-web-based-exploits" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/apple-sends-lock-screen-alerts-to-outdated-iphones-over-active-web-based-exploits" />
<lastmod>2026-03-29T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/aitm-phishing-targets-tiktok-business-accounts-using-cloudflare-turnstile-evasion</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/aitm-phishing-targets-tiktok-business-accounts-using-cloudflare-turnstile-evasion" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/aitm-phishing-targets-tiktok-business-accounts-using-cloudflare-turnstile-evasion" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/aitm-phishing-targets-tiktok-business-accounts-using-cloudflare-turnstile-evasion" />
<lastmod>2026-03-28T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/aitm-phishing-targets-tiktok-business-accounts-using-cloudflare-turnstile-evasion</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/aitm-phishing-targets-tiktok-business-accounts-using-cloudflare-turnstile-evasion" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/aitm-phishing-targets-tiktok-business-accounts-using-cloudflare-turnstile-evasion" />
<lastmod>2026-03-28T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/open-vsx-bug-let-malicious-vs-code-extensions-bypass-pre-publish-security-checks</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/open-vsx-bug-let-malicious-vs-code-extensions-bypass-pre-publish-security-checks" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/open-vsx-bug-let-malicious-vs-code-extensions-bypass-pre-publish-security-checks" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/open-vsx-bug-let-malicious-vs-code-extensions-bypass-pre-publish-security-checks" />
<lastmod>2026-03-28T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/open-vsx-bug-let-malicious-vs-code-extensions-bypass-pre-publish-security-checks</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/open-vsx-bug-let-malicious-vs-code-extensions-bypass-pre-publish-security-checks" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/open-vsx-bug-let-malicious-vs-code-extensions-bypass-pre-publish-security-checks" />
<lastmod>2026-03-28T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/teampcp-pushes-malicious-telnyx-versions-to-pypi-hides-stealer-in-wav-files</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/teampcp-pushes-malicious-telnyx-versions-to-pypi-hides-stealer-in-wav-files" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/teampcp-pushes-malicious-telnyx-versions-to-pypi-hides-stealer-in-wav-files" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/teampcp-pushes-malicious-telnyx-versions-to-pypi-hides-stealer-in-wav-files" />
<lastmod>2026-03-28T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/teampcp-pushes-malicious-telnyx-versions-to-pypi-hides-stealer-in-wav-files</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/teampcp-pushes-malicious-telnyx-versions-to-pypi-hides-stealer-in-wav-files" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/teampcp-pushes-malicious-telnyx-versions-to-pypi-hides-stealer-in-wav-files" />
<lastmod>2026-03-28T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/we-are-at-war</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/we-are-at-war" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/we-are-at-war" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/we-are-at-war" />
<lastmod>2026-03-28T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/we-are-at-war</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/we-are-at-war" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/we-are-at-war" />
<lastmod>2026-03-28T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/china-linked-red-menshen-uses-stealthy-bpfdoor-implants-to-spy-via-telecom-networks</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/china-linked-red-menshen-uses-stealthy-bpfdoor-implants-to-spy-via-telecom-networks" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/china-linked-red-menshen-uses-stealthy-bpfdoor-implants-to-spy-via-telecom-networks" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/china-linked-red-menshen-uses-stealthy-bpfdoor-implants-to-spy-via-telecom-networks" />
<lastmod>2026-03-27T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/china-linked-red-menshen-uses-stealthy-bpfdoor-implants-to-spy-via-telecom-networks</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/china-linked-red-menshen-uses-stealthy-bpfdoor-implants-to-spy-via-telecom-networks" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/china-linked-red-menshen-uses-stealthy-bpfdoor-implants-to-spy-via-telecom-networks" />
<lastmod>2026-03-27T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/claude-extension-flaw-enabled-zero-click-xss-prompt-injection-via-any-website</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/claude-extension-flaw-enabled-zero-click-xss-prompt-injection-via-any-website" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/claude-extension-flaw-enabled-zero-click-xss-prompt-injection-via-any-website" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/claude-extension-flaw-enabled-zero-click-xss-prompt-injection-via-any-website" />
<lastmod>2026-03-27T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/claude-extension-flaw-enabled-zero-click-xss-prompt-injection-via-any-website</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/claude-extension-flaw-enabled-zero-click-xss-prompt-injection-via-any-website" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/claude-extension-flaw-enabled-zero-click-xss-prompt-injection-via-any-website" />
<lastmod>2026-03-27T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/masters-of-imitation-how-hackers-and-art-forgers-perfect-the-art-of-deception</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/masters-of-imitation-how-hackers-and-art-forgers-perfect-the-art-of-deception" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/masters-of-imitation-how-hackers-and-art-forgers-perfect-the-art-of-deception" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/masters-of-imitation-how-hackers-and-art-forgers-perfect-the-art-of-deception" />
<lastmod>2026-03-27T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/masters-of-imitation-how-hackers-and-art-forgers-perfect-the-art-of-deception</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/masters-of-imitation-how-hackers-and-art-forgers-perfect-the-art-of-deception" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/masters-of-imitation-how-hackers-and-art-forgers-perfect-the-art-of-deception" />
<lastmod>2026-03-27T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/threatsday-bulletin-pqc-push-ai-vuln-hunting-pirated-traps-phishing-kits-20-more-stories</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/threatsday-bulletin-pqc-push-ai-vuln-hunting-pirated-traps-phishing-kits-20-more-stories" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/threatsday-bulletin-pqc-push-ai-vuln-hunting-pirated-traps-phishing-kits-20-more-stories" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/threatsday-bulletin-pqc-push-ai-vuln-hunting-pirated-traps-phishing-kits-20-more-stories" />
<lastmod>2026-03-27T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/threatsday-bulletin-pqc-push-ai-vuln-hunting-pirated-traps-phishing-kits-20-more-stories</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/threatsday-bulletin-pqc-push-ai-vuln-hunting-pirated-traps-phishing-kits-20-more-stories" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/threatsday-bulletin-pqc-push-ai-vuln-hunting-pirated-traps-phishing-kits-20-more-stories" />
<lastmod>2026-03-27T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/post/webinar-stop-guessing-learn-to-validate-your-defenses-against-real-attacks</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/webinar-stop-guessing-learn-to-validate-your-defenses-against-real-attacks" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/webinar-stop-guessing-learn-to-validate-your-defenses-against-real-attacks" />
<xhtml:link rel="alternate" hreflang="x-default" href="https://thehackernewsbdarija.com/post/webinar-stop-guessing-learn-to-validate-your-defenses-against-real-attacks" />
<lastmod>2026-03-27T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://thehackernewsbdarija.com/en/post/webinar-stop-guessing-learn-to-validate-your-defenses-against-real-attacks</loc>
<xhtml:link rel="alternate" hreflang="ar-MA" href="https://thehackernewsbdarija.com/post/webinar-stop-guessing-learn-to-validate-your-defenses-against-real-attacks" />
<xhtml:link rel="alternate" hreflang="en" href="https://thehackernewsbdarija.com/en/post/webinar-stop-guessing-learn-to-validate-your-defenses-against-real-attacks" />
<lastmod>2026-03-27T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
</urlset>
