<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://cyberhappenings.com/</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/404.html</loc>
    <lastmod>2025-10-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/about/</loc>
    <lastmod>2025-10-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/browse.html</loc>
    <lastmod>2025-09-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/browse/</loc>
    <lastmod>2025-10-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/changelog/</loc>
    <lastmod>2025-09-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/contact/</loc>
    <lastmod>2025-10-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/04/23/cisa-inl-and-lsu-conduct-joint-cybersecurity-exercise-for-energy-sector.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/04/23/cisa-inl-and-lsu-conduct-joint-cybersecurity-exercise-for-energy-sector/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/05/13/cisa-adjusts-cybersecurity-alerts-and-notifications-strategy.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/05/13/cisa-adjusts-cybersecurity-alerts-and-notifications-strategy/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/05/19/madhu-gottumukkala-appointed-as-cisa-deputy-director.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/05/19/madhu-gottumukkala-appointed-as-cisa-deputy-director/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/06/30/iranian-cyber-threat-activity-against-us-critical-infrastructure.html</loc>
    <lastmod>2026-03-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/06/30/iranian-cyber-threat-activity-against-us-critical-infrastructure/</loc>
    <lastmod>2026-03-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/07/30/cisa-releases-eviction-strategies-tool-for-cyber-incident-response.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/07/30/cisa-releases-eviction-strategies-tool-for-cyber-incident-response/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/07/31/cisa-releases-thorium-for-scalable-malware-and-forensic-analysis.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/07/31/cisa-releases-thorium-for-scalable-malware-and-forensic-analysis/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/01/dhs-allocates-1038-million-in-cybersecurity-grants-for-state-local-and-tribal-governments.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/01/dhs-allocates-1038-million-in-cybersecurity-grants-for-state-local-and-tribal-governments/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/06/cisa-alert-on-high-severity-microsoft-exchange-vulnerability.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/06/cisa-alert-on-high-severity-microsoft-exchange-vulnerability/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/07/cisa-emergency-directive-25-02-issued-for-microsoft-exchange-vulnerability-affecting-hybrid-environments.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/07/cisa-emergency-directive-25-02-issued-for-microsoft-exchange-vulnerability-affecting-hybrid-environments/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/08/bigid-launches-shadow-ai-discovery-to-address-unauthorized-ai-models-and-risky-ai-data.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/08/bigid-launches-shadow-ai-discovery-to-address-unauthorized-ai-models-and-risky-ai-data/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/08/brazilian-phishing-scams-leveraging-ai-tools-and-efimer-trojan-targeting-crypto-users.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/08/brazilian-phishing-scams-leveraging-ai-tools-and-efimer-trojan-targeting-crypto-users/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/08/credential-leaks-surge-160-in-2025.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/08/credential-leaks-surge-160-in-2025/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/08/malicious-rubygems-packages-target-korean-spam-marketers.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/08/malicious-rubygems-packages-target-korean-spam-marketers/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/09/gpt-5-jailbreak-and-zero-click-ai-agent-attacks-exposed.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/09/gpt-5-jailbreak-and-zero-click-ai-agent-attacks-exposed/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/09/lenovo-webcams-vulnerable-to-remote-badusb-exploitation.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/09/lenovo-webcams-vulnerable-to-remote-badusb-exploitation/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/09/multiple-vulnerabilities-in-dell-controlvault3-firmware-enable-persistent-attacks.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/09/multiple-vulnerabilities-in-dell-controlvault3-firmware-enable-persistent-attacks/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/09/vault-fault-vulnerabilities-in-cyberark-and-hashicorp-vaults-enable-remote-takeover.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/09/vault-fault-vulnerabilities-in-cyberark-and-hashicorp-vaults-enable-remote-takeover/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/10/epm-poisoning-exploit-chain-in-windows-rpc-enables-domain-privilege-escalation.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/10/epm-poisoning-exploit-chain-in-windows-rpc-enables-domain-privilege-escalation/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/10/win-ddos-public-domain-controllers-exploited-for-ddos-attacks-via-rpc-ldap.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/10/win-ddos-public-domain-controllers-exploited-for-ddos-attacks-via-rpc-ldap/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/11/black-hat-noc-ai-implementation-and-security-observations.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/11/black-hat-noc-ai-implementation-and-security-observations/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/11/convicted-revil-affiliate-accuses-russian-government-of-planning-2021-kaseya-attack.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/11/convicted-revil-affiliate-accuses-russian-government-of-planning-2021-kaseya-attack/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/11/emerging-trends-in-cybersecurity-careers-driven-by-ai.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/11/emerging-trends-in-cybersecurity-careers-driven-by-ai/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/11/erlang-otp-ssh-rce-exploits-targeting-ot-firewalls.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/11/erlang-otp-ssh-rce-exploits-targeting-ot-firewalls/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/11/google-chrome-enterprise-premium-enhances-browser-security-for-hybrid-work-environments.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/11/google-chrome-enterprise-premium-enhances-browser-security-for-hybrid-work-environments/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/11/mclaren-racings-browser-based-security-strategy-for-global-operations.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/11/mclaren-racings-browser-based-security-strategy-for-global-operations/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/11/multiple-tetra-radio-encryption-vulnerabilities-disclosed.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/11/multiple-tetra-radio-encryption-vulnerabilities-disclosed/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/11/path-traversal-vulnerability-in-winrar-actively-exploited-by-multiple-threat-actors.html</loc>
    <lastmod>2026-02-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/11/path-traversal-vulnerability-in-winrar-actively-exploited-by-multiple-threat-actors/</loc>
    <lastmod>2026-02-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/11/security-risks-in-passwordless-account-recovery-highlighted-at-black-hat-usa-2025.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/11/security-risks-in-passwordless-account-recovery-highlighted-at-black-hat-usa-2025/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/11/security-teams-align-exposure-management-with-business-critical-assets.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/11/security-teams-align-exposure-management-with-business-critical-assets/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/11/trend-micro-apex-one-management-console-0-day-exploited.html</loc>
    <lastmod>2026-02-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/11/trend-micro-apex-one-management-console-0-day-exploited/</loc>
    <lastmod>2026-02-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/12/active-exploitation-of-citrix-netscaler-cve-2025-6543-in-dutch-critical-sectors.html</loc>
    <lastmod>2026-02-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/12/active-exploitation-of-citrix-netscaler-cve-2025-6543-in-dutch-critical-sectors/</loc>
    <lastmod>2026-02-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/12/blacksuit-ransomware-infrastructure-disrupted-in-international-law-enforcement-operation.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/12/blacksuit-ransomware-infrastructure-disrupted-in-international-law-enforcement-operation/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/12/brute-force-attacks-target-fortinet-ssl-vpns-and-fortimanager.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/12/brute-force-attacks-target-fortinet-ssl-vpns-and-fortimanager/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/12/business-logic-vulnerabilities-in-saas-and-web-applications.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/12/business-logic-vulnerabilities-in-saas-and-web-applications/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/12/charon-ransomware-targets-middle-east-public-sector-and-aviation-with-apt-style-tactics.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/12/charon-ransomware-targets-middle-east-public-sector-and-aviation-with-apt-style-tactics/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/12/curly-comrades-apt-targets-georgian-and-moldovan-entities-via-ngen-com-hijacking.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/12/curly-comrades-apt-targets-georgian-and-moldovan-entities-via-ngen-com-hijacking/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/12/enterprise-browser-vs-secure-browser-extension-comparison-for-in-session-security.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/12/enterprise-browser-vs-secure-browser-extension-comparison-for-in-session-security/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/12/shinyhunters-and-scattered-spider-collaboration.html</loc>
    <lastmod>2026-03-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/12/shinyhunters-and-scattered-spider-collaboration/</loc>
    <lastmod>2026-03-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/12/xz-utils-backdoor-discovered-in-docker-hub-images.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/12/xz-utils-backdoor-discovered-in-docker-hub-images/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/13/ai-based-penetration-testing-tool-achieves-top-spot-on-hackerone-leaderboard.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/13/ai-based-penetration-testing-tool-achieves-top-spot-on-hackerone-leaderboard/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/13/ai-driven-cyberattacks-targeting-identity-systems.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/13/ai-driven-cyberattacks-targeting-identity-systems/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/13/ai-soc-capabilities-and-their-impact-on-security-operations.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/13/ai-soc-capabilities-and-their-impact-on-security-operations/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/13/ai-systems-show-mixed-effectiveness-in-offensive-security-tasks.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/13/ai-systems-show-mixed-effectiveness-in-offensive-security-tasks/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/13/cisa-and-partners-release-ot-asset-inventory-guidance.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/13/cisa-and-partners-release-ot-asset-inventory-guidance/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/13/critical-os-command-injection-vulnerability-in-fortisiem-cve-2025-25256-exploited-in-the-wild.html</loc>
    <lastmod>2026-01-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/13/critical-os-command-injection-vulnerability-in-fortisiem-cve-2025-25256-exploited-in-the-wild/</loc>
    <lastmod>2026-01-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/13/lockbit-40-leak-exposes-disorganized-ransomware-ecosystem.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/13/lockbit-40-leak-exposes-disorganized-ransomware-ecosystem/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/13/microsoft-august-2025-patch-tuesday-multiple-critical-elevation-of-privilege-vulnerabilities.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/13/microsoft-august-2025-patch-tuesday-multiple-critical-elevation-of-privilege-vulnerabilities/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/13/new-ps1bot-malware-campaign-uses-malvertising-to-deploy-multi-stage-in-memory-attacks.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/13/new-ps1bot-malware-campaign-uses-malvertising-to-deploy-multi-stage-in-memory-attacks/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/13/nvidia-and-amd-ai-chips-face-security-scrutiny-from-china.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/13/nvidia-and-amd-ai-chips-face-security-scrutiny-from-china/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/13/privilege-escalation-and-rce-flaws-patched-in-zoom-and-xerox-products.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/13/privilege-escalation-and-rce-flaws-patched-in-zoom-and-xerox-products/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/14/active-government-and-law-enforcement-email-accounts-sold-on-dark-web.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/14/active-government-and-law-enforcement-email-accounts-sold-on-dark-web/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/14/agentic-ai-adoption-in-security-operations-accelerates-but-risks-and-challenges-persist.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/14/agentic-ai-adoption-in-security-operations-accelerates-but-risks-and-challenges-persist/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/14/crossc2-framework-used-to-extend-cobalt-strike-to-linux-and-macos.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/14/crossc2-framework-used-to-extend-cobalt-strike-to-linux-and-macos/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/14/cybersecurity-and-data-protection-budget-allocation-challenges.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/14/cybersecurity-and-data-protection-budget-allocation-challenges/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/14/cybersecurity-budget-growth-slows-to-4-year-over-year-in-2025.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/14/cybersecurity-budget-growth-slows-to-4-year-over-year-in-2025/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/14/external-attack-surface-management-easm-and-digital-risk-protection-drp-for-continuous-security-monitoring.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/14/external-attack-surface-management-easm-and-digital-risk-protection-drp-for-continuous-security-monitoring/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/14/google-enforces-crypto-app-licensing-in-15-regions.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/14/google-enforces-crypto-app-licensing-in-15-regions/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/14/http-2-madeyoureset-vulnerability-enables-large-scale-dos-attacks.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/14/http-2-madeyoureset-vulnerability-enables-large-scale-dos-attacks/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/14/n-able-n-central-vulnerabilities-added-to-cisas-kev-catalog.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/14/n-able-n-central-vulnerabilities-added-to-cisas-kev-catalog/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/14/nist-updates-digital-identity-guidelines-to-address-evolving-threats.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/14/nist-updates-digital-identity-guidelines-to-address-evolving-threats/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/14/phantomcard-android-trojan-targets-brazilian-banking-customers-via-nfc-relay-attacks.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/14/phantomcard-android-trojan-targets-brazilian-banking-customers-via-nfc-relay-attacks/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/14/proactive-defense-strategies-for-attack-surface-reduction.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/14/proactive-defense-strategies-for-attack-surface-reduction/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/14/scarcruft-apt37-ransomware-campaign-targets-south-korea.html</loc>
    <lastmod>2026-02-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/14/scarcruft-apt37-ransomware-campaign-targets-south-korea/</loc>
    <lastmod>2026-02-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/15/colt-technology-services-experiences-cyber-incident-and-service-disruptions.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/15/colt-technology-services-experiences-cyber-incident-and-service-disruptions/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/15/critical-radius-authentication-flaw-in-cisco-secure-firewall-management-center.html</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/15/critical-radius-authentication-flaw-in-cisco-secure-firewall-management-center/</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/15/crypto24-ransomware-bypasses-edr-solutions-in-targeted-attacks.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/15/crypto24-ransomware-bypasses-edr-solutions-in-targeted-attacks/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/15/fido-downgrade-attack-demonstrated-in-microsoft-entra-id.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/15/fido-downgrade-attack-demonstrated-in-microsoft-entra-id/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/15/ms-isac-funding-cuts-threaten-us-state-and-local-cybersecurity.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/15/ms-isac-funding-cuts-threaten-us-state-and-local-cybersecurity/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/15/privacy-implications-of-agentic-ai-in-cybersecurity.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/15/privacy-implications-of-agentic-ai-in-cybersecurity/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/15/realdefense-launches-10m-fund-for-smartscan-cybersecurity-sdk-integration.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/15/realdefense-launches-10m-fund-for-smartscan-cybersecurity-sdk-integration/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/15/russian-actors-target-water-systems-in-norway-and-poland.html</loc>
    <lastmod>2025-12-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/15/russian-actors-target-water-systems-in-norway-and-poland/</loc>
    <lastmod>2025-12-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/15/security-expertise-bridging-communication-gap-between-technical-teams-and-c-suite.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/15/security-expertise-bridging-communication-gap-between-technical-teams-and-c-suite/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/15/uat-7237-targets-taiwan-web-servers-with-customized-open-source-tools.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/15/uat-7237-targets-taiwan-web-servers-with-customized-open-source-tools/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/15/us-sanctions-garantex-and-grinex-for-facilitating-ransomware-linked-crypto-transactions.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/15/us-sanctions-garantex-and-grinex-for-facilitating-ransomware-linked-crypto-transactions/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/16/encrypthub-exploits-msc-eviltwin-vulnerability-to-deploy-fickle-stealer-malware.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/16/encrypthub-exploits-msc-eviltwin-vulnerability-to-deploy-fickle-stealer-malware/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/16/ermac-v30-banking-trojan-source-code-leak-exposes-full-malware-infrastructure.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/16/ermac-v30-banking-trojan-source-code-leak-exposes-full-malware-infrastructure/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/16/quantum-safe-360-alliance-launched-to-accelerate-pqc-implementation.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/16/quantum-safe-360-alliance-launched-to-accelerate-pqc-implementation/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/18/advanced-rats-exploit-architectural-blind-spots-and-native-tools-to-evade-detection.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/18/advanced-rats-exploit-architectural-blind-spots-and-native-tools-to-evade-detection/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/18/cryptojacking-scheme-results-in-1-year-sentence-for-nebraska-man.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/18/cryptojacking-scheme-results-in-1-year-sentence-for-nebraska-man/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/18/malicious-pypi-and-npm-packages-exploit-supply-chain-dependencies.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/18/malicious-pypi-and-npm-packages-exploit-supply-chain-dependencies/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/18/n-able-n-central-vulnerabilities-exploited-in-the-wild.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/18/n-able-n-central-vulnerabilities-exploited-in-the-wild/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/18/noodlophile-malware-campaign-expands-with-enhanced-phishing-tactics.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/18/noodlophile-malware-campaign-expands-with-enhanced-phishing-tactics/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/18/storm-0501-ransomware-campaign-targets-hybrid-cloud-environments.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/18/storm-0501-ransomware-campaign-targets-hybrid-cloud-environments/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/18/uk-sentences-serial-hacker-of-3000-sites-to-20-months-in-prison.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/18/uk-sentences-serial-hacker-of-3000-sites-to-20-months-in-prison/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/18/wazuh-siem-xdr-for-regulatory-compliance.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/18/wazuh-siem-xdr-for-regulatory-compliance/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/18/xenorat-malware-campaign-targets-embassies-in-south-korea.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/18/xenorat-malware-campaign-targets-embassies-in-south-korea/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/19/ai-assisted-coding-security-practices-and-tools.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/19/ai-assisted-coding-security-practices-and-tools/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/19/bcnys-data-breach-exposes-personal-financial-and-health-information-of-47329-individuals.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/19/bcnys-data-breach-exposes-personal-financial-and-health-information-of-47329-individuals/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/19/dripdropper-malware-campaign-targets-linux-servers-via-apache-activemq-vulnerability.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/19/dripdropper-malware-campaign-targets-linux-servers-via-apache-activemq-vulnerability/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/19/elastic-denies-rce-zero-day-in-defend-edr.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/19/elastic-denies-rce-zero-day-in-defend-edr/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/19/github-risk-vectors-in-software-development-life-cycle.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/19/github-risk-vectors-in-software-development-life-cycle/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/19/godrat-trojan-targets-trading-firms-using-steganography-and-gh0st-rat-code.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/19/godrat-trojan-targets-trading-firms-using-steganography-and-gh0st-rat-code/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/19/human-factor-in-cybersecurity-breaches.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/19/human-factor-in-cybersecurity-breaches/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/19/inotiv-ransomware-attack-disrupts-operations.html</loc>
    <lastmod>2026-02-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/19/inotiv-ransomware-attack-disrupts-operations/</loc>
    <lastmod>2026-02-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/19/microsoft-teams-couldnt-connect-error-affects-desktop-and-web-apps.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/19/microsoft-teams-couldnt-connect-error-affects-desktop-and-web-apps/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/19/okta-publishes-open-source-sigma-rules-for-auth0-threat-detection.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/19/okta-publishes-open-source-sigma-rules-for-auth0-threat-detection/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/19/openai-introduces-gpt-go-subscription-plan-initially-available-in-india.html</loc>
    <lastmod>2025-10-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/19/openai-introduces-gpt-go-subscription-plan-initially-available-in-india/</loc>
    <lastmod>2025-10-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/19/organizations-lack-comprehensive-ai-policies-amid-rapid-adoption.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/19/organizations-lack-comprehensive-ai-policies-amid-rapid-adoption/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/19/pipemagic-backdoor-used-in-play-ransomware-attacks-exploiting-windows-clfs-vulnerability.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/19/pipemagic-backdoor-used-in-play-ransomware-attacks-exploiting-windows-clfs-vulnerability/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/19/public-exploit-for-chained-sap-netweaver-flaws-enables-remote-code-execution.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/19/public-exploit-for-chained-sap-netweaver-flaws-enables-remote-code-execution/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/19/pypi-implements-expired-domain-checks-to-prevent-account-takeovers-and-supply-chain-attacks.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/19/pypi-implements-expired-domain-checks-to-prevent-account-takeovers-and-supply-chain-attacks/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/19/ringreaper-post-exploitation-tool-leverages-io-uring-to-evade-linux-edrs.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/19/ringreaper-post-exploitation-tool-leverages-io-uring-to-evade-linux-edrs/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/19/uk-government-withdraws-apple-encryption-backdoor-mandate.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/19/uk-government-withdraws-apple-encryption-backdoor-mandate/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/19/zero-click-exploit-targets-ai-enterprise-agents.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/19/zero-click-exploit-targets-ai-enterprise-agents/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/20/ai-browsers-vulnerable-to-promptfix-exploit-for-malicious-prompts.html</loc>
    <lastmod>2026-03-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/20/ai-browsers-vulnerable-to-promptfix-exploit-for-malicious-prompts/</loc>
    <lastmod>2026-03-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/20/anti-cheat-systems-in-video-games-provide-insights-for-cybersecurity.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/20/anti-cheat-systems-in-video-games-provide-insights-for-cybersecurity/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/20/business-impact-analysis-bia-for-resilient-recovery-planning.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/20/business-impact-analysis-bia-for-resilient-recovery-planning/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/20/clickjacking-vulnerabilities-in-major-password-managers.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/20/clickjacking-vulnerabilities-in-major-password-managers/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/20/critical-vulnerabilities-identified-in-space-mission-systems.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/20/critical-vulnerabilities-identified-in-space-mission-systems/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/20/image-i-o-framework-zero-day-exploited-in-targeted-attacks.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/20/image-i-o-framework-zero-day-exploited-in-targeted-attacks/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/20/incode-acquires-authenticid-to-enhance-ai-driven-identity-verification.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/20/incode-acquires-authenticid-to-enhance-ai-driven-identity-verification/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/20/increased-cybersecurity-scrutiny-of-suppliers-in-asia.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/20/increased-cybersecurity-scrutiny-of-suppliers-in-asia/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/20/mcdonalds-partner-and-employee-portals-vulnerabilities-disclosed.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/20/mcdonalds-partner-and-employee-portals-vulnerabilities-disclosed/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/20/microsoft-365-logins-stolen-via-adfs-redirects-in-phishing-campaign.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/20/microsoft-365-logins-stolen-via-adfs-redirects-in-phishing-campaign/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/20/polish-hydropower-plant-targeted-by-russian-hacktivists-in-second-attack.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/20/polish-hydropower-plant-targeted-by-russian-hacktivists-in-second-attack/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/20/ransomware-surge-in-europe-signals-potential-us-threat.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/20/ransomware-surge-in-europe-signals-potential-us-threat/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/20/rapperbot-botnet-administrator-charged-in-the-us.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/20/rapperbot-botnet-administrator-charged-in-the-us/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/20/russian-fsb-linked-hackers-exploit-cisco-smart-install-vulnerability-for-cyber-espionage.html</loc>
    <lastmod>2026-03-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/20/russian-fsb-linked-hackers-exploit-cisco-smart-install-vulnerability-for-cyber-espionage/</loc>
    <lastmod>2026-03-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/20/shadow-ai-agents-in-enterprise-environments.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/20/shadow-ai-agents-in-enterprise-environments/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/20/windows-11-24h2-updates-cause-ssd-failures-on-certain-models.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/20/windows-11-24h2-updates-cause-ssd-failures-on-certain-models/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/21/ai-security-paradigm-shift-architectural-controls-for-ai-systems.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/21/ai-security-paradigm-shift-architectural-controls-for-ai-systems/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/21/chatgpt-downgrade-attack-via-prompt-manipulation.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/21/chatgpt-downgrade-attack-via-prompt-manipulation/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/21/columbia-university-enhances-security-posture-with-logging-and-automation.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/21/columbia-university-enhances-security-posture-with-logging-and-automation/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/21/cybercriminals-exploit-lovable-vibe-coding-service-for-malicious-websites.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/21/cybercriminals-exploit-lovable-vibe-coding-service-for-malicious-websites/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/21/darpas-ai-cyber-challenge-aixcc-demonstrates-ais-effectiveness-in-securing-open-source-software.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/21/darpas-ai-cyber-challenge-aixcc-demonstrates-ais-effectiveness-in-securing-open-source-software/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/21/hacktivist-al-mashriky-sentenced-for-website-defacements-and-data-theft.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/21/hacktivist-al-mashriky-sentenced-for-website-defacements-and-data-theft/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/21/increased-password-cracking-success-rates-in-2025.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/21/increased-password-cracking-success-rates-in-2025/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/21/increased-social-engineering-attacks-targeting-mfa-and-help-desks.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/21/increased-social-engineering-attacks-targeting-mfa-and-help-desks/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/21/k-12-schools-face-increasing-ransomware-attacks-and-incident-response-challenges.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/21/k-12-schools-face-increasing-ransomware-attacks-and-incident-response-challenges/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/21/microsoft-outlines-quantum-safe-transition-plan-for-core-products-and-services.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/21/microsoft-outlines-quantum-safe-transition-plan-for-core-products-and-services/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/21/north-korean-state-actors-exploit-fake-employee-schemes-to-infiltrate-companies.html</loc>
    <lastmod>2026-02-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/21/north-korean-state-actors-exploit-fake-employee-schemes-to-infiltrate-companies/</loc>
    <lastmod>2026-02-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/21/openai-announces-development-of-gpt-6.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/21/openai-announces-development-of-gpt-6/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/21/orange-belgium-data-breach-impacts-850000-customers.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/21/orange-belgium-data-breach-impacts-850000-customers/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/21/pre-authentication-exploit-chains-in-commvault-versions-before-113660.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/21/pre-authentication-exploit-chains-in-commvault-versions-before-113660/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/21/quirkyloader-malware-distributes-multiple-payloads-via-email-spam-campaigns.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/21/quirkyloader-malware-distributes-multiple-payloads-via-email-spam-campaigns/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/21/scattered-spider-member-sentenced-to-10-years-for-wire-fraud-and-conspiracy.html</loc>
    <lastmod>2025-11-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/21/scattered-spider-member-sentenced-to-10-years-for-wire-fraud-and-conspiracy/</loc>
    <lastmod>2025-11-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/21/security-risks-in-iso-15118-smart-charging-standard-for-electric-vehicles.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/21/security-risks-in-iso-15118-smart-charging-standard-for-electric-vehicles/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/21/tree-of-ast-ai-enhanced-vulnerability-discovery-framework-presented-at-black-hat-usa-2025.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/21/tree-of-ast-ai-enhanced-vulnerability-discovery-framework-presented-at-black-hat-usa-2025/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/21/unc5518-access-as-a-service-campaign-via-clickfix-and-fake-captcha-pages.html</loc>
    <lastmod>2026-02-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/21/unc5518-access-as-a-service-campaign-via-clickfix-and-fake-captcha-pages/</loc>
    <lastmod>2026-02-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/21/vps-infrastructure-abused-for-stealthy-saas-account-compromises.html</loc>
    <lastmod>2026-02-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/21/vps-infrastructure-abused-for-stealthy-saas-account-compromises/</loc>
    <lastmod>2026-02-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/21/warlock-ransomware-exploits-vulnerable-sharepoint-servers.html</loc>
    <lastmod>2026-02-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/21/warlock-ransomware-exploits-vulnerable-sharepoint-servers/</loc>
    <lastmod>2026-02-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/22/apt36-abuses-linux-desktop-files-to-install-malware-in-targeted-attacks.html</loc>
    <lastmod>2026-02-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/22/apt36-abuses-linux-desktop-files-to-install-malware-in-targeted-attacks/</loc>
    <lastmod>2026-02-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/22/automation-of-pentest-delivery-enhances-security-operations.html</loc>
    <lastmod>2025-10-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/22/automation-of-pentest-delivery-enhances-security-operations/</loc>
    <lastmod>2025-10-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/22/cisa-publishes-draft-software-bill-of-materials-sbom-guide-for-public-comment.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/22/cisa-publishes-draft-software-bill-of-materials-sbom-guide-for-public-comment/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/22/cisos-face-increased-personal-liability-and-security-risks.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/22/cisos-face-increased-personal-liability-and-security-risks/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/22/claude-code-security-reviews-introduced-for-ai-assisted-development.html</loc>
    <lastmod>2026-02-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/22/claude-code-security-reviews-introduced-for-ai-assisted-development/</loc>
    <lastmod>2026-02-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/22/contextual-data-collection-by-apple-intelligence.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/22/contextual-data-collection-by-apple-intelligence/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/22/cyber-insurers-consider-limiting-payouts-for-breaches-exploiting-unpatched-cves.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/22/cyber-insurers-consider-limiting-payouts-for-breaches-exploiting-unpatched-cves/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/22/davita-ransomware-attack-exposes-data-of-nearly-27-million-individuals.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/22/davita-ransomware-attack-exposes-data-of-nearly-27-million-individuals/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/22/growing-threat-landscape-for-ai-agents-and-non-human-identities.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/22/growing-threat-landscape-for-ai-agents-and-non-human-identities/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/22/large-scale-africa-wide-cybercrime-crackdown-arrests-over-1200-suspects.html</loc>
    <lastmod>2026-03-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/22/large-scale-africa-wide-cybercrime-crackdown-arrests-over-1200-suspects/</loc>
    <lastmod>2026-03-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/22/murky-panda-genesis-panda-glacial-panda-cloud-and-telecom-intrusions.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/22/murky-panda-genesis-panda-glacial-panda-cloud-and-telecom-intrusions/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/22/shamos-infostealer-targeting-mac-devices-via-clickfix-attacks.html</loc>
    <lastmod>2026-03-31</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/22/shamos-infostealer-targeting-mac-devices-via-clickfix-attacks/</loc>
    <lastmod>2026-03-31</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/22/software-developer-sentenced-for-malicious-kill-switch-on-ex-employers-windows-network.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/22/software-developer-sentenced-for-malicious-kill-switch-on-ex-employers-windows-network/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/23/ftc-warns-tech-giants-against-foreign-demands-to-weaken-encryption.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/23/ftc-warns-tech-giants-against-foreign-demands-to-weaken-encryption/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/23/geoserver-vulnerability-exploited-for-stealthy-monetary-gain.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/23/geoserver-vulnerability-exploited-for-stealthy-monetary-gain/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/23/outlook-mobile-sync-delays-reported-in-hybrid-modern-authentication-environments.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/23/outlook-mobile-sync-delays-reported-in-hybrid-modern-authentication-environments/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/24/android-spyware-targeting-russian-executives-masquerades-as-fsb-antivirus.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/24/android-spyware-targeting-russian-executives-masquerades-as-fsb-antivirus/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/24/malicious-ssh-brute-force-go-module-exfiltrates-credentials-via-telegram-bot.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/24/malicious-ssh-brute-force-go-module-exfiltrates-credentials-via-telegram-bot/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/25/clickfix-attack-exploits-ai-summaries-to-deliver-ransomware.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/25/clickfix-attack-exploits-ai-summaries-to-deliver-ransomware/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/25/critical-docker-desktop-ssrf-vulnerability-exploitable-via-malicious-containers.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/25/critical-docker-desktop-ssrf-vulnerability-exploitable-via-malicious-containers/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/25/ftc-chair-urges-tech-companies-to-maintain-encryption-standards.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/25/ftc-chair-urges-tech-companies-to-maintain-encryption-standards/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/25/global-phishing-campaign-installs-multiple-rats-via-javascript-droppers.html</loc>
    <lastmod>2026-01-29</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/25/global-phishing-campaign-installs-multiple-rats-via-javascript-droppers/</loc>
    <lastmod>2026-01-29</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/25/increased-cloud-attacks-in-singapore-highlight-need-for-data-centric-security.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/25/increased-cloud-attacks-in-singapore-highlight-need-for-data-centric-security/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/25/malicious-android-apps-with-19m-installs-removed-from-google-play.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/25/malicious-android-apps-with-19m-installs-removed-from-google-play/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/25/malware-persistence-techniques-and-defense-strategies.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/25/malware-persistence-techniques-and-defense-strategies/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/25/russian-hackers-exploit-old-cisco-vulnerability-to-target-us-critical-infrastructure.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/25/russian-hackers-exploit-old-cisco-vulnerability-to-target-us-critical-infrastructure/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/25/sensitive-data-exposed-in-auchan-retailer-cyberattack.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/25/sensitive-data-exposed-in-auchan-retailer-cyberattack/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/25/siem-detection-failures-highlighted-in-picus-blue-report-2025.html</loc>
    <lastmod>2025-10-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/25/siem-detection-failures-highlighted-in-picus-blue-report-2025/</loc>
    <lastmod>2025-10-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/25/unc6384-targets-diplomats-with-plugx-via-captive-portal-hijacks.html</loc>
    <lastmod>2026-01-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/25/unc6384-targets-diplomats-with-plugx-via-captive-portal-hijacks/</loc>
    <lastmod>2026-01-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/26/ai-systems-vulnerable-to-data-theft-via-hidden-prompts-in-downscaled-images.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/26/ai-systems-vulnerable-to-data-theft-via-hidden-prompts-in-downscaled-images/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/26/cisa-releases-software-acquisition-guide-supplier-response-web-tool.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/26/cisa-releases-software-acquisition-guide-supplier-response-web-tool/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/26/coordinated-scans-target-microsoft-rdp-authentication-servers.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/26/coordinated-scans-target-microsoft-rdp-authentication-servers/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/26/data-i-o-experiences-ransomware-attack-and-system-outages.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/26/data-i-o-experiences-ransomware-attack-and-system-outages/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/26/exploitation-of-consumer-devices-in-hybrid-work-environments.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/26/exploitation-of-consumer-devices-in-hybrid-work-environments/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/26/farmers-insurance-data-breach-affects-over-1-million-customers.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/26/farmers-insurance-data-breach-affects-over-1-million-customers/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/26/google-to-enforce-developer-verification-on-android-in-four-countries.html</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/26/google-to-enforce-developer-verification-on-android-in-four-countries/</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/26/hacktivist-group-lab-dookhtegan-disables-communications-on-iranian-ships.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/26/hacktivist-group-lab-dookhtegan-disables-communications-on-iranian-ships/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/26/healthcare-services-group-data-breach-affects-624000-individuals.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/26/healthcare-services-group-data-breach-affects-624000-individuals/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/26/mixshell-malware-targets-us-supply-chain-manufacturers-via-contact-forms.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/26/mixshell-malware-targets-us-supply-chain-manufacturers-via-contact-forms/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/26/philippines-successful-implementation-of-zero-knowledge-proofs-in-2025-midterm-elections.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/26/philippines-successful-implementation-of-zero-knowledge-proofs-in-2025-midterm-elections/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/26/sentinelone-recognized-as-leader-in-endpoint-protection-for-fifth-consecutive-year.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/26/sentinelone-recognized-as-leader-in-endpoint-protection-for-fifth-consecutive-year/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/26/shadowcaptcha-campaign-exploits-wordpress-sites-to-distribute-malware.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/26/shadowcaptcha-campaign-exploits-wordpress-sites-to-distribute-malware/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/26/sni5gect-attack-framework-enables-5g-downgrade-and-modem-crashes.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/26/sni5gect-attack-framework-enables-5g-downgrade-and-modem-crashes/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/26/three-vulnerabilities-in-citrix-and-git-added-to-cisa-kev-catalog.html</loc>
    <lastmod>2026-03-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/26/three-vulnerabilities-in-citrix-and-git-added-to-cisa-kev-catalog/</loc>
    <lastmod>2026-03-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/27/ai-adoption-guidelines-for-secure-enterprise-environments.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/27/ai-adoption-guidelines-for-secure-enterprise-environments/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/27/ai-powered-cyberattacks-automating-theft-and-extortion-disrupted-by-anthropic.html</loc>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/27/ai-powered-cyberattacks-automating-theft-and-extortion-disrupted-by-anthropic/</loc>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/27/blind-eagles-five-clusters-target-colombian-government-and-other-sectors.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/27/blind-eagles-five-clusters-target-colombian-government-and-other-sectors/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/27/chinese-state-sponsored-actors-target-global-critical-infrastructure.html</loc>
    <lastmod>2026-02-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/27/chinese-state-sponsored-actors-target-global-critical-infrastructure/</loc>
    <lastmod>2026-02-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/27/cisa-and-partners-respond-to-cyber-attack-on-nevadas-essential-services.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/27/cisa-and-partners-respond-to-cyber-attack-on-nevadas-essential-services/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/27/emergence-of-ai-powered-ransomware-strain-promptlock.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/27/emergence-of-ai-powered-ransomware-strain-promptlock/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/27/nevada-state-agencies-disrupted-by-cyberattack.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/27/nevada-state-agencies-disrupted-by-cyberattack/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/27/noncompliance-with-ccpa-by-data-brokers.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/27/noncompliance-with-ccpa-by-data-brokers/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/27/ransomware-in-healthcare-spillover-effects-on-surrounding-hospitals.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/27/ransomware-in-healthcare-spillover-effects-on-surrounding-hospitals/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/27/salesloft-oauth-breach-via-drift-ai-chat-agent-exposes-salesforce-customer-data.html</loc>
    <lastmod>2026-03-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/27/salesloft-oauth-breach-via-drift-ai-chat-agent-exposes-salesforce-customer-data/</loc>
    <lastmod>2026-03-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/27/shadowsilk-intrusions-targeting-central-asia-and-apac-governments.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/27/shadowsilk-intrusions-targeting-central-asia-and-apac-governments/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/28/akira-and-cl0p-lead-most-active-ransomware-as-a-service-groups-in-2025.html</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/28/akira-and-cl0p-lead-most-active-ransomware-as-a-service-groups-in-2025/</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/28/cisas-2025-sbom-guidelines-released-with-mixed-feedback.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/28/cisas-2025-sbom-guidelines-released-with-mixed-feedback/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/28/crowdstrike-to-acquire-onum-for-enhanced-falcon-next-gen-siem.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/28/crowdstrike-to-acquire-onum-for-enhanced-falcon-next-gen-siem/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/28/dark-web-cybercriminal-activity-and-law-enforcement-tactics.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/28/dark-web-cybercriminal-activity-and-law-enforcement-tactics/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/28/malicious-nx-packages-exfiltrate-credentials-in-s1ngularity-supply-chain-attack.html</loc>
    <lastmod>2026-03-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/28/malicious-nx-packages-exfiltrate-credentials-in-s1ngularity-supply-chain-attack/</loc>
    <lastmod>2026-03-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/28/project-management-tools-vulnerabilities-and-data-loss-risks.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/28/project-management-tools-vulnerabilities-and-data-loss-risks/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/28/transunion-data-breach-affects-over-4-million-customers.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/28/transunion-data-breach-affects-over-4-million-customers/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/28/vs-code-marketplace-extension-name-reuse-vulnerability.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/28/vs-code-marketplace-extension-name-reuse-vulnerability/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/29/ai-powered-offensive-research-system-generates-exploits-in-minutes.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/29/ai-powered-offensive-research-system-generates-exploits-in-minutes/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/29/apt29-watering-hole-campaign-disrupted-by-amazon.html</loc>
    <lastmod>2026-03-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/29/apt29-watering-hole-campaign-disrupted-by-amazon/</loc>
    <lastmod>2026-03-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/29/authentication-bypass-in-passwordstate-emergency-access-page.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/29/authentication-bypass-in-passwordstate-emergency-access-page/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/29/code-to-cloud-visibility-for-enhanced-appsec.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/29/code-to-cloud-visibility-for-enhanced-appsec/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/29/espionage-campaign-targeting-eastern-asia-via-sogou-zhuyin-update-server-hijacking.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/29/espionage-campaign-targeting-eastern-asia-via-sogou-zhuyin-update-server-hijacking/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/29/freepbx-zero-day-exploited-in-the-wild-emergency-patch-released.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/29/freepbx-zero-day-exploited-in-the-wild-emergency-patch-released/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/29/network-based-data-loss-prevention-for-generative-ai-platforms.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/29/network-based-data-loss-prevention-for-generative-ai-platforms/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/29/proactive-cloud-security-audits-as-strategic-allies-in-cloud-transformations.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/29/proactive-cloud-security-audits-as-strategic-allies-in-cloud-transformations/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/29/sitecore-experience-platform-exploit-chain-combines-cache-poisoning-and-remote-code-execution.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/29/sitecore-experience-platform-exploit-chain-combines-cache-poisoning-and-remote-code-execution/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/29/tamperedchef-malware-campaign-exploits-fake-pdf-editors-to-steal-credentials-and-cookies.html</loc>
    <lastmod>2026-01-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/29/tamperedchef-malware-campaign-exploits-fake-pdf-editors-to-steal-credentials-and-cookies/</loc>
    <lastmod>2026-01-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/29/veriftools-fake-id-marketplace-seized-and-relaunched.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/29/veriftools-fake-id-marketplace-seized-and-relaunched/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/30/velociraptor-forensic-tool-abused-for-c2-tunneling-via-visual-studio-code.html</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/30/velociraptor-forensic-tool-abused-for-c2-tunneling-via-visual-studio-code/</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/31/anthropic-developing-web-based-claude-code-ai-coding-assistant.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/31/anthropic-developing-web-based-claude-code-ai-coding-assistant/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/31/brokewell-android-malware-campaign-targets-cryptocurrency-users-via-fake-tradingview-ads.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/31/brokewell-android-malware-campaign-targets-cryptocurrency-users-via-fake-tradingview-ads/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/31/chatgpt-flashcard-quiz-feature-for-learning-topics.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/31/chatgpt-flashcard-quiz-feature-for-learning-topics/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/31/openai-enhances-codex-with-agentic-coding-capabilities.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/31/openai-enhances-codex-with-agentic-coding-capabilities/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/31/openai-introduces-thinking-effort-picker-for-chatgpt.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/08/31/openai-introduces-thinking-effort-picker-for-chatgpt/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/01/android-droppers-now-deliver-sms-stealers-and-spyware.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/01/android-droppers-now-deliver-sms-stealers-and-spyware/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/01/scattered-spiders-browser-based-attacks-and-mitigation-strategies.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/01/scattered-spiders-browser-based-attacks-and-mitigation-strategies/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/01/whatsapp-zero-day-exploited-in-targeted-attacks.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/01/whatsapp-zero-day-exploited-in-targeted-attacks/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/02/azure-active-directory-credentials-exposed-via-public-aspnet-configuration-file.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/02/azure-active-directory-credentials-exposed-via-public-aspnet-configuration-file/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/02/cloudflare-mitigates-115-tbps-udp-flood-ddos-attack.html</loc>
    <lastmod>2026-03-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/02/cloudflare-mitigates-115-tbps-udp-flood-ddos-attack/</loc>
    <lastmod>2026-03-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/02/google-denies-widespread-gmail-password-reset-warnings.html</loc>
    <lastmod>2025-10-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/02/google-denies-widespread-gmail-password-reset-warnings/</loc>
    <lastmod>2025-10-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/02/jaguar-land-rover-production-disrupted-by-cyberattack.html</loc>
    <lastmod>2025-11-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/02/jaguar-land-rover-production-disrupted-by-cyberattack/</loc>
    <lastmod>2025-11-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/02/lazarus-group-deploys-multiple-rats-in-defi-sector-campaign.html</loc>
    <lastmod>2026-03-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/02/lazarus-group-deploys-multiple-rats-in-defi-sector-campaign/</loc>
    <lastmod>2026-03-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/02/malicious-npm-package-nodejs-smtp-targets-atomic-and-exodus-wallets.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/02/malicious-npm-package-nodejs-smtp-targets-atomic-and-exodus-wallets/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/02/mystrodx-backdoor-with-dns-and-icmp-triggers-used-in-cyber-espionage.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/02/mystrodx-backdoor-with-dns-and-icmp-triggers-used-in-cyber-espionage/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/02/nicholas-andersen-appointed-as-cisa-executive-assistant-director-for-cybersecurity.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/02/nicholas-andersen-appointed-as-cisa-executive-assistant-director-for-cybersecurity/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/02/nist-updates-security-and-privacy-control-catalog-for-improved-patch-management.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/02/nist-updates-security-and-privacy-control-catalog-for-improved-patch-management/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/02/pennsylvania-attorney-generals-office-hit-by-ransomware-attack.html</loc>
    <lastmod>2025-11-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/02/pennsylvania-attorney-generals-office-hit-by-ransomware-attack/</loc>
    <lastmod>2025-11-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/02/ransomware-negotiation-tactics-against-sophisticated-opportunistic-and-impatient-hackers.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/02/ransomware-negotiation-tactics-against-sophisticated-opportunistic-and-impatient-hackers/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/02/silver-fox-exploits-microsoft-signed-watchdog-driver-to-deploy-valleyrat-malware.html</loc>
    <lastmod>2026-02-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/02/silver-fox-exploits-microsoft-signed-watchdog-driver-to-deploy-valleyrat-malware/</loc>
    <lastmod>2026-02-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/02/ukrainian-network-fdn3-conducts-massive-brute-force-attacks-on-ssl-vpn-and-rdp-devices.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/02/ukrainian-network-fdn3-conducts-massive-brute-force-attacks-on-ssl-vpn-and-rdp-devices/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/02/unsanctioned-ai-tool-usage-in-enterprises.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/02/unsanctioned-ai-tool-usage-in-enterprises/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/03/academic-perspective-on-hacker-motivations-and-neurodiversity.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/03/academic-perspective-on-hacker-motivations-and-neurodiversity/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/03/active-exploitation-of-tp-link-and-whatsapp-vulnerabilities-added-to-kev-catalog.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/03/active-exploitation-of-tp-link-and-whatsapp-vulnerabilities-added-to-kev-catalog/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/03/apitor-technology-sued-for-exposing-childrens-geolocation-data-to-chinese-third-party.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/03/apitor-technology-sued-for-exposing-childrens-geolocation-data-to-chinese-third-party/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/03/apt28-deploys-notdoor-backdoor-via-microsoft-outlook.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/03/apt28-deploys-notdoor-backdoor-via-microsoft-outlook/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/03/cato-networks-integrates-ai-security-via-aim-security-acquisition.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/03/cato-networks-integrates-ai-security-via-aim-security-acquisition/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/03/cisa-nsa-and-international-partners-release-joint-sbom-cybersecurity-guide.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/03/cisa-nsa-and-international-partners-release-joint-sbom-cybersecurity-guide/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/03/deepseek-data-leak-exposes-over-1-million-sensitive-log-streams.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/03/deepseek-data-leak-exposes-over-1-million-sensitive-log-streams/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/03/disney-settles-10m-ftc-case-over-youtube-kids-data-collection.html</loc>
    <lastmod>2026-01-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/03/disney-settles-10m-ftc-case-over-youtube-kids-data-collection/</loc>
    <lastmod>2026-01-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/03/geolocation-based-cyberattacks-and-their-evolving-threat-landscape.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/03/geolocation-based-cyberattacks-and-their-evolving-threat-landscape/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/03/hexstrike-ai-weaponized-to-exploit-citrix-vulnerabilities.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/03/hexstrike-ai-weaponized-to-exploit-citrix-vulnerabilities/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/03/high-severity-use-after-free-flaw-in-chromes-v8-javascript-engine-patched.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/03/high-severity-use-after-free-flaw-in-chromes-v8-javascript-engine-patched/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/03/streameast-largest-pirated-sports-streaming-network-disrupted-by-police.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/03/streameast-largest-pirated-sports-streaming-network-disrupted-by-police/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/03/two-android-zero-day-vulnerabilities-exploited-in-targeted-attacks.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/03/two-android-zero-day-vulnerabilities-exploited-in-targeted-attacks/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/03/unauthorized-access-to-sinqias-pix-environment-leads-to-130m-attempted-heist.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/03/unauthorized-access-to-sinqias-pix-environment-leads-to-130m-attempted-heist/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/04/apple-2026-security-research-device-program-application-period-opens.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/04/apple-2026-security-research-device-program-application-period-opens/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/04/bridgestone-americas-manufacturing-facilities-impacted-by-cyberattack.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/04/bridgestone-americas-manufacturing-facilities-impacted-by-cyberattack/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/04/chesscom-suffers-data-breach-via-third-party-file-transfer-app.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/04/chesscom-suffers-data-breach-via-third-party-file-transfer-app/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/04/cnil-fines-google-and-shein-for-cookie-consent-violations.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/04/cnil-fines-google-and-shein-for-cookie-consent-violations/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/04/ghostredirector-campaign-targets-windows-servers-with-rungan-backdoor-and-gamshen-iis-module.html</loc>
    <lastmod>2026-01-31</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/04/ghostredirector-campaign-targets-windows-servers-with-rungan-backdoor-and-gamshen-iis-module/</loc>
    <lastmod>2026-01-31</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/04/increased-demand-for-gray-zone-hosting-services-in-response-to-us-data-access-concerns.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/04/increased-demand-for-gray-zone-hosting-services-in-response-to-us-data-access-concerns/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/04/isc2-introduces-threat-handling-foundations-certificate-to-address-dfir-skills-gap.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/04/isc2-introduces-threat-handling-foundations-certificate-to-address-dfir-skills-gap/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/04/large-scale-phishing-as-a-service-phaas-operation-using-expired-domains-on-google-cloud-and-cloudflare.html</loc>
    <lastmod>2026-02-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/04/large-scale-phishing-as-a-service-phaas-operation-using-expired-domains-on-google-cloud-and-cloudflare/</loc>
    <lastmod>2026-02-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/04/malicious-link-spreading-via-xs-grok-ai-assistant.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/04/malicious-link-spreading-via-xs-grok-ai-assistant/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/04/massive-data-breach-at-powerschool-exposes-62-million-students-personal-information.html</loc>
    <lastmod>2026-03-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/04/massive-data-breach-at-powerschool-exposes-62-million-students-personal-information/</loc>
    <lastmod>2026-03-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/04/model-namespace-reuse-attack-demonstrated-on-google-microsoft-ai-platforms.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/04/model-namespace-reuse-attack-demonstrated-on-google-microsoft-ai-platforms/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/04/post-quantum-tls-migration-in-hybrid-cloud-environments.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/04/post-quantum-tls-migration-in-hybrid-cloud-environments/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/04/sola-security-secures-35m-for-no-code-cybersecurity-platform.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/04/sola-security-secures-35m-for-no-code-cybersecurity-platform/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/04/threat-hunting-as-a-key-component-of-security-programs.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/04/threat-hunting-as-a-key-component-of-security-programs/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/04/tidal-cyber-secures-10m-for-threat-informed-defense-platform.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/04/tidal-cyber-secures-10m-for-threat-informed-defense-platform/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/04/tp-link-router-vulnerabilities-actively-exploited-in-the-wild.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/04/tp-link-router-vulnerabilities-actively-exploited-in-the-wild/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/04/weepsteel-malware-deployed-via-sitecore-zero-day-exploit.html</loc>
    <lastmod>2026-01-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/04/weepsteel-malware-deployed-via-sitecore-zero-day-exploit/</loc>
    <lastmod>2026-01-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/04/wytec-website-defacement-disrupts-operations-financial-losses-expected.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/04/wytec-website-defacement-disrupts-operations-financial-losses-expected/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/05/argo-cd-api-vulnerability-exposes-repository-credentials.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/05/argo-cd-api-vulnerability-exposes-repository-credentials/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/05/google-fined-295-billion-by-eu-for-anti-competitive-adtech-practices.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/05/google-fined-295-billion-by-eu-for-anti-competitive-adtech-practices/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/05/iot-security-progress-and-challenges-over-the-past-five-years.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/05/iot-security-progress-and-challenges-over-the-past-five-years/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/05/legacy-iga-solutions-hinder-security-and-compliance-efforts.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/05/legacy-iga-solutions-hinder-security-and-compliance-efforts/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/05/louisiana-state-university-implements-student-run-security-operations-center.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/05/louisiana-state-university-implements-student-run-security-operations-center/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/05/microsoft-enforces-mfa-on-azure-portal-sign-ins-for-all-tenants.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/05/microsoft-enforces-mfa-on-azure-portal-sign-ins-for-all-tenants/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/05/microsoft-offers-free-microsoft-365-personal-subscriptions-to-us-college-students.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/05/microsoft-offers-free-microsoft-365-personal-subscriptions-to-us-college-students/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/05/sap-s-4hana-command-injection-vulnerability-cve-2025-42957-exploited-in-the-wild.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/05/sap-s-4hana-command-injection-vulnerability-cve-2025-42957-exploited-in-the-wild/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/05/svg-files-used-in-phishing-attacks-impersonating-colombian-judicial-system.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/05/svg-files-used-in-phishing-attacks-impersonating-colombian-judicial-system/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/05/tag-150-develops-castlerat-in-python-and-c-for-expanded-malware-operations.html</loc>
    <lastmod>2026-02-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/05/tag-150-develops-castlerat-in-python-and-c-for-expanded-malware-operations/</loc>
    <lastmod>2026-02-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/05/toxic-flows-in-agentic-ai-systems-pose-significant-cybersecurity-risks.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/05/toxic-flows-in-agentic-ai-systems-pose-significant-cybersecurity-risks/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/05/wealthsimple-data-breach-affects-less-than-1-of-clients.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/05/wealthsimple-data-breach-affects-less-than-1-of-clients/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/06/kazakhstan-energy-sector-phishing-test-mistaken-for-noisy-bear-campaign.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/06/kazakhstan-energy-sector-phishing-test-mistaken-for-noisy-bear-campaign/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/06/malicious-npm-packages-impersonating-flashbots-steal-ethereum-wallet-keys.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/06/malicious-npm-packages-impersonating-flashbots-steal-ethereum-wallet-keys/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/07/phishing-campaign-abuses-icloud-calendar-to-send-emails-from-apple-servers.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/07/phishing-campaign-abuses-icloud-calendar-to-send-emails-from-apple-servers/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/08/action1-cloud-native-patch-management-platform-emerges-as-wsus-alternative.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/08/action1-cloud-native-patch-management-platform-emerges-as-wsus-alternative/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/08/calcio-sports-streaming-piracy-service-shut-down-by-ace-and-dazn.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/08/calcio-sports-streaming-piracy-service-shut-down-by-ace-and-dazn/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/08/challenges-in-vulnerability-management-and-the-rise-of-network-device-exploits.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/08/challenges-in-vulnerability-management-and-the-rise-of-network-device-exploits/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/08/chatgpt-projects-feature-made-free-and-new-chat-splitting-option-added.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/08/chatgpt-projects-feature-made-free-and-new-chat-splitting-option-added/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/08/cisa-to-discuss-strategic-cybersecurity-initiatives-at-16th-annual-billington-cybersecurity-summit.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/08/cisa-to-discuss-strategic-cybersecurity-initiatives-at-16th-annual-billington-cybersecurity-summit/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/08/ghostaction-github-supply-chain-attack-steals-3325-secrets.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/08/ghostaction-github-supply-chain-attack-steals-3325-secrets/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/08/google-ai-mode-to-become-more-accessible-as-default-search-option.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/08/google-ai-mode-to-become-more-accessible-as-default-search-option/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/08/gpugate-malware-campaign-targets-it-firms-in-western-europe.html</loc>
    <lastmod>2026-02-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/08/gpugate-malware-campaign-targets-it-firms-in-western-europe/</loc>
    <lastmod>2026-02-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/08/lovesac-data-breach-after-ransomware-attack.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/08/lovesac-data-breach-after-ransomware-attack/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/08/mostererat-malware-campaign-targets-japanese-windows-users.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/08/mostererat-malware-campaign-targets-japanese-windows-users/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/08/signal-introduces-secure-cloud-backups-for-chat-restoration.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/08/signal-introduces-secure-cloud-backups-for-chat-restoration/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/08/supply-chain-attack-on-drift-via-oauth-token-theft.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/08/supply-chain-attack-on-drift-via-oauth-token-theft/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/09/axios-and-direct-send-abuse-in-microsoft-365-phishing-campaigns.html</loc>
    <lastmod>2025-11-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/09/axios-and-direct-send-abuse-in-microsoft-365-phishing-campaigns/</loc>
    <lastmod>2025-11-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/09/blackdb-cybercrime-marketplace-admin-pleads-guilty.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/09/blackdb-cybercrime-marketplace-admin-pleads-guilty/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/09/cisos-leverage-business-continuity-and-risk-frameworks-to-secure-budget-approval.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/09/cisos-leverage-business-continuity-and-risk-frameworks-to-secure-budget-approval/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/09/critical-sessionreaper-flaw-in-adobe-commerce-and-magento-open-source-patched.html</loc>
    <lastmod>2025-10-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/09/critical-sessionreaper-flaw-in-adobe-commerce-and-magento-open-source-patched/</loc>
    <lastmod>2025-10-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/09/critical-vulnerabilities-in-sap-netweaver-and-related-products-addressed.html</loc>
    <lastmod>2025-11-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/09/critical-vulnerabilities-in-sap-netweaver-and-related-products-addressed/</loc>
    <lastmod>2025-11-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/09/external-attack-surface-management-easm-enhances-cyber-risk-management.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/09/external-attack-surface-management-easm-enhances-cyber-risk-management/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/09/former-whatsapp-security-chief-files-whistleblower-lawsuit-against-meta.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/09/former-whatsapp-security-chief-files-whistleblower-lawsuit-against-meta/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/09/increased-focus-on-browser-security-due-to-rising-threats.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/09/increased-focus-on-browser-security-due-to-rising-threats/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/09/increased-network-scans-targeting-cisco-asa-devices-observed.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/09/increased-network-scans-targeting-cisco-asa-devices-observed/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/09/microsoft-anti-spam-service-misidentifies-safe-urls-in-exchange-online-and-teams.html</loc>
    <lastmod>2026-02-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/09/microsoft-anti-spam-service-misidentifies-safe-urls-in-exchange-online-and-teams/</loc>
    <lastmod>2026-02-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/09/microsoft-introduces-ai-powered-features-in-windows-11-file-explorer.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/09/microsoft-introduces-ai-powered-features-in-windows-11-file-explorer/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/09/microsoft-september-2025-patch-tuesday-addresses-81-vulnerabilities-including-two-zero-days.html</loc>
    <lastmod>2026-02-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/09/microsoft-september-2025-patch-tuesday-addresses-81-vulnerabilities-including-two-zero-days/</loc>
    <lastmod>2026-02-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/09/misconfigured-docker-apis-exploited-in-tor-based-cryptojacking-campaign.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/09/misconfigured-docker-apis-exploited-in-tor-based-cryptojacking-campaign/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/09/mitsubishi-electric-acquires-nozomi-networks-for-883-million.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/09/mitsubishi-electric-acquires-nozomi-networks-for-883-million/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/09/plex-data-breach-exposes-customer-authentication-details.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/09/plex-data-breach-exposes-customer-authentication-details/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/09/qantas-data-breach-affects-57-million-passengers-executive-pay-reduced.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/09/qantas-data-breach-affects-57-million-passengers-executive-pay-reduced/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/09/ransomware-and-phishing-threats-surge-in-2025.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/09/ransomware-and-phishing-threats-surge-in-2025/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/09/raton-android-malware-with-nfc-relay-and-ats-banking-fraud-capabilities-detected.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/09/raton-android-malware-with-nfc-relay-and-ats-banking-fraud-capabilities-detected/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/09/salt-typhoon-and-unc4841-domains-reveal-longstanding-cyber-espionage-infrastructure.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/09/salt-typhoon-and-unc4841-domains-reveal-longstanding-cyber-espionage-infrastructure/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/09/sectoprat-and-betruger-malware-linked-to-play-ransomhub-and-dragonforce-ransomware-operations.html</loc>
    <lastmod>2025-11-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/09/sectoprat-and-betruger-malware-linked-to-play-ransomhub-and-dragonforce-ransomware-operations/</loc>
    <lastmod>2025-11-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/09/sentinelone-to-acquire-observo-ai-for-enhanced-autonomous-security-operations.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/09/sentinelone-to-acquire-observo-ai-for-enhanced-autonomous-security-operations/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/09/shadow-ai-agents-unauthorized-ai-agents-proliferating-in-enterprise-environments.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/09/shadow-ai-agents-unauthorized-ai-agents-proliferating-in-enterprise-environments/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/09/us-sanctions-cyber-scam-operations-in-southeast-asia.html</loc>
    <lastmod>2026-02-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/09/us-sanctions-cyber-scam-operations-in-southeast-asia/</loc>
    <lastmod>2026-02-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/09/volodymyr-tymoshchuk-charged-for-lockergoga-megacortex-nefilim-ransomware-operations.html</loc>
    <lastmod>2025-12-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/09/volodymyr-tymoshchuk-charged-for-lockergoga-megacortex-nefilim-ransomware-operations/</loc>
    <lastmod>2025-12-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/09/wayne-memorial-hospital-ransomware-attack-affects-160000-individuals.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/09/wayne-memorial-hospital-ransomware-attack-affects-160000-individuals/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/10/apple-introduces-memory-integrity-enforcement-in-iphone-17-and-iphone-air.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/10/apple-introduces-memory-integrity-enforcement-in-iphone-17-and-iphone-air/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/10/apt41-targets-us-trade-officials-with-phishing-campaigns-amid-negotiations.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/10/apt41-targets-us-trade-officials-with-phishing-campaigns-amid-negotiations/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/10/automation-of-vciso-and-compliance-services-for-msps-and-mssps.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/10/automation-of-vciso-and-compliance-services-for-msps-and-mssps/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/10/cisa-outlines-strategic-vision-for-the-cve-programs-quality-era.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/10/cisa-outlines-strategic-vision-for-the-cve-programs-quality-era/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/10/cursor-ide-autorun-flaw-allows-malicious-code-execution.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/10/cursor-ide-autorun-flaw-allows-malicious-code-execution/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/10/eggstreme-fileless-malware-used-in-philippine-military-breach.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/10/eggstreme-fileless-malware-used-in-philippine-military-breach/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/10/google-integrates-c2pa-content-credentials-in-pixel-10-for-ai-generated-image-verification.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/10/google-integrates-c2pa-content-credentials-in-pixel-10-for-ai-generated-image-verification/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/10/microsoft-removes-fees-for-windows-developers-publishing-to-microsoft-store.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/10/microsoft-removes-fees-for-windows-developers-publishing-to-microsoft-store/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/10/student-insider-threats-in-k-12-education-sector.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/10/student-insider-threats-in-k-12-education-sector/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/10/talos-linux-adoption-in-kubernetes-environments.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/10/talos-linux-adoption-in-kubernetes-environments/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/11/ai-enhanced-malware-campaign-targeting-multiple-sectors.html</loc>
    <lastmod>2025-10-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/11/ai-enhanced-malware-campaign-targeting-multiple-sectors/</loc>
    <lastmod>2025-10-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/11/asyncrat-delivered-via-connectwise-screenconnect-to-steal-credentials-and-cryptocurrency.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/11/asyncrat-delivered-via-connectwise-screenconnect-to-steal-credentials-and-cryptocurrency/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/11/browser-extension-management-risks-and-tools.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/11/browser-extension-management-risks-and-tools/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/11/ciso-board-communication-gap-addressed-through-new-training-program.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/11/ciso-board-communication-gap-addressed-through-new-training-program/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/11/f5-to-acquire-calypsoai-for-ai-security-integration.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/11/f5-to-acquire-calypsoai-for-ai-security-integration/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/11/gentlemen-ransomware-exploits-vulnerable-driver-to-disable-security-software.html</loc>
    <lastmod>2026-03-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/11/gentlemen-ransomware-exploits-vulnerable-driver-to-disable-security-software/</loc>
    <lastmod>2026-03-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/11/k2-think-ai-model-jailbroken-using-partial-prompt-leaking.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/11/k2-think-ai-model-jailbroken-using-partial-prompt-leaking/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/11/malicious-browser-extensions-target-meta-business-accounts.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/11/malicious-browser-extensions-target-meta-business-accounts/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/11/massive-15-bpps-ddos-attack-targets-european-ddos-mitigation-provider.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/11/massive-15-bpps-ddos-attack-targets-european-ddos-mitigation-provider/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/11/microsoft-exchange-online-outage-affecting-global-users.html</loc>
    <lastmod>2025-11-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/11/microsoft-exchange-online-outage-affecting-global-users/</loc>
    <lastmod>2025-11-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/11/microsoft-teams-enhances-security-with-malicious-link-warnings-in-private-chats.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/11/microsoft-teams-enhances-security-with-malicious-link-warnings-in-private-chats/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/11/senator-wyden-calls-for-ftc-probe-into-microsofts-alleged-ransomware-related-cybersecurity-negligence.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/11/senator-wyden-calls-for-ftc-probe-into-microsofts-alleged-ransomware-related-cybersecurity-negligence/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/11/unpatched-apple-carplay-rce-exploit-in-most-vehicles.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/11/unpatched-apple-carplay-rce-exploit-in-most-vehicles/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/11/vidar-infostealer-campaigns-employ-new-obfuscation-techniques.html</loc>
    <lastmod>2025-10-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/11/vidar-infostealer-campaigns-employ-new-obfuscation-techniques/</loc>
    <lastmod>2025-10-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/11/vmscape-attack-breaks-guest-host-isolation-on-amd-intel-cpus.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/11/vmscape-attack-breaks-guest-host-isolation-on-amd-intel-cpus/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/12/apple-spyware-notifications-sent-to-targeted-users-in-2025.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/12/apple-spyware-notifications-sent-to-targeted-users-in-2025/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/12/cisa-defunding-and-dismantling-affects-us-cyber-defense.html</loc>
    <lastmod>2025-11-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/12/cisa-defunding-and-dismantling-affects-us-cyber-defense/</loc>
    <lastmod>2025-11-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/12/critical-deserialization-flaw-in-delmia-apriso-mom-actively-exploited.html</loc>
    <lastmod>2025-11-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/12/critical-deserialization-flaw-in-delmia-apriso-mom-actively-exploited/</loc>
    <lastmod>2025-11-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/12/cyberattack-response-clarity-control-and-recovery.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/12/cyberattack-response-clarity-control-and-recovery/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/12/hybridpetya-ransomware-bypasses-uefi-secure-boot-via-cve-2024-7344.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/12/hybridpetya-ransomware-bypasses-uefi-secure-boot-via-cve-2024-7344/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/12/runtime-visibility-becomes-critical-for-cloud-native-security.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/12/runtime-visibility-becomes-critical-for-cloud-native-security/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/12/samsung-patches-zero-day-vulnerability-in-libimagecodecquramso.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/12/samsung-patches-zero-day-vulnerability-in-libimagecodecquramso/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/12/sentencing-of-steven-r-hale-for-unreleased-movie-theft-and-distribution.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/12/sentencing-of-steven-r-hale-for-unreleased-movie-theft-and-distribution/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/12/undocumented-radios-in-solar-powered-devices-pose-supply-chain-risks.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/12/undocumented-radios-in-solar-powered-devices-pose-supply-chain-risks/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/12/vyro-ai-leak-exposes-sensitive-user-data-from-three-applications.html</loc>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/12/vyro-ai-leak-exposes-sensitive-user-data-from-three-applications/</loc>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/12/windows-11-23h2-home-and-pro-editions-reach-end-of-support-in-november-2025.html</loc>
    <lastmod>2025-11-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/12/windows-11-23h2-home-and-pro-editions-reach-end-of-support-in-november-2025/</loc>
    <lastmod>2025-11-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/13/microsoft-to-end-support-for-windows-10-on-october-14-2025.html</loc>
    <lastmod>2025-11-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/13/microsoft-to-end-support-for-windows-10-on-october-14-2025/</loc>
    <lastmod>2025-11-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/13/whitecobra-targets-vscode-users-with-crypto-stealing-extensions.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/13/whitecobra-targets-vscode-users-with-crypto-stealing-extensions/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/14/voidproxy-phishing-service-targets-microsoft-365-google-accounts.html</loc>
    <lastmod>2025-11-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/14/voidproxy-phishing-service-targets-microsoft-365-google-accounts/</loc>
    <lastmod>2025-11-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/15/ai-powered-villager-penetration-testing-tool-exploited-by-threat-actors.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/15/ai-powered-villager-penetration-testing-tool-exploited-by-threat-actors/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/15/chinese-malware-campaigns-exploit-seo-and-github-pages-to-distribute-hiddengh0st-winos-and-kkrat.html</loc>
    <lastmod>2026-01-29</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/15/chinese-malware-campaigns-exploit-seo-and-github-pages-to-distribute-hiddengh0st-winos-and-kkrat/</loc>
    <lastmod>2026-01-29</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/15/finwise-insider-breach-exposes-689k-american-first-finance-customers-data.html</loc>
    <lastmod>2025-10-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/15/finwise-insider-breach-exposes-689k-american-first-finance-customers-data/</loc>
    <lastmod>2025-10-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/15/hybridpetya-ransomware-capable-of-uefi-secure-boot-bypass-discovered.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/15/hybridpetya-ransomware-capable-of-uefi-secure-boot-bypass-discovered/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/15/increased-browser-based-attacks-targeting-business-applications.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/15/increased-browser-based-attacks-targeting-business-applications/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/15/killsec-ransomware-attack-on-brazilian-healthcare-software-provider-medicsolution.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/15/killsec-ransomware-attack-on-brazilian-healthcare-software-provider-medicsolution/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/15/lies-in-the-loop-attack-exploits-ai-coding-agents.html</loc>
    <lastmod>2025-12-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/15/lies-in-the-loop-attack-exploits-ai-coding-agents/</loc>
    <lastmod>2025-12-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/15/microsoft-365-copilot-app-to-be-automatically-installed-on-windows-devices-outside-eea.html</loc>
    <lastmod>2026-03-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/15/microsoft-365-copilot-app-to-be-automatically-installed-on-windows-devices-outside-eea/</loc>
    <lastmod>2026-03-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/15/microsoft-exchange-2016-and-2019-reach-end-of-support-on-october-14-2025.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/15/microsoft-exchange-2016-and-2019-reach-end-of-support-on-october-14-2025/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/15/mustang-panda-targets-thailand-with-yokai-backdoor-via-snakedisk-usb-worm.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/15/mustang-panda-targets-thailand-with-yokai-backdoor-via-snakedisk-usb-worm/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/15/phoenix-attack-bypasses-rowhammer-defenses-in-ddr5-memory.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/15/phoenix-attack-bypasses-rowhammer-defenses-in-ddr5-memory/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/15/secalerts-service-launched-for-real-time-vulnerability-alerts.html</loc>
    <lastmod>2025-12-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/15/secalerts-service-launched-for-real-time-vulnerability-alerts/</loc>
    <lastmod>2025-12-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/15/secure-by-design-principles-applied-to-it-infrastructure.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/15/secure-by-design-principles-applied-to-it-infrastructure/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/15/windows-11-24h2-update-block-for-dirac-audio-software-removed.html</loc>
    <lastmod>2025-10-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/15/windows-11-24h2-update-block-for-dirac-audio-software-removed/</loc>
    <lastmod>2025-10-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/15/windows-september-2025-updates-cause-smbv1-share-connection-issues.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/15/windows-september-2025-updates-cause-smbv1-share-connection-issues/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/16/astrix-introduces-ai-agent-control-plane-for-secure-ai-agent-deployment.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/16/astrix-introduces-ai-agent-control-plane-for-secure-ai-agent-deployment/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/16/chaos-mesh-vulnerabilities-enable-kubernetes-cluster-takeover.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/16/chaos-mesh-vulnerabilities-enable-kubernetes-cluster-takeover/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/16/modern-web-browsers-as-primary-attack-surface-in-enterprise-infrastructure.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/16/modern-web-browsers-as-primary-attack-surface-in-enterprise-infrastructure/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/16/openai-rolls-out-gpt-5-codex-for-coding-automation.html</loc>
    <lastmod>2025-11-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/16/openai-rolls-out-gpt-5-codex-for-coding-automation/</loc>
    <lastmod>2025-11-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/16/securityscorecard-acquires-hypercomply-to-enhance-vendor-risk-management.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/16/securityscorecard-acquires-hypercomply-to-enhance-vendor-risk-management/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/16/slopads-fraud-ring-exploits-224-android-apps-for-ad-fraud.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/16/slopads-fraud-ring-exploits-224-android-apps-for-ad-fraud/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/16/vane-viper-cybercrime-operation-linked-to-propellerads-and-adtech-holding.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/16/vane-viper-cybercrime-operation-linked-to-propellerads-and-adtech-holding/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/16/vmware-certification-enhances-security-posture-and-team-capabilities.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/16/vmware-certification-enhances-security-posture-and-team-capabilities/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/16/yurei-ransomware-targets-food-manufacturing-and-other-companies.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/16/yurei-ransomware-targets-food-manufacturing-and-other-companies/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/17/ai-data-security-buyers-guide-for-enterprises.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/17/ai-data-security-buyers-guide-for-enterprises/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/17/ai-powered-sign-up-fraud-targets-customer-acquisition.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/17/ai-powered-sign-up-fraud-targets-customer-acquisition/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/17/breachforums-administrator-fitzpatrick-resentenced-to-three-years-in-prison.html</loc>
    <lastmod>2026-01-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/17/breachforums-administrator-fitzpatrick-resentenced-to-three-years-in-prison/</loc>
    <lastmod>2026-01-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/17/end-of-support-for-microsoft-office-2016-and-office-2019.html</loc>
    <lastmod>2025-10-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/17/end-of-support-for-microsoft-office-2016-and-office-2019/</loc>
    <lastmod>2025-10-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/17/insight-partners-ransomware-breach-affects-12657-individuals.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/17/insight-partners-ransomware-breach-affects-12657-individuals/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/17/quantum-computing-and-ai-cybersecurity-threats-and-resilience-strategies.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/17/quantum-computing-and-ai-cybersecurity-threats-and-resilience-strategies/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/17/raccoono365-phishing-network-disrupted-by-microsoft-and-cloudflare.html</loc>
    <lastmod>2025-12-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/17/raccoono365-phishing-network-disrupted-by-microsoft-and-cloudflare/</loc>
    <lastmod>2025-12-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/17/raven-stealer-exfiltrates-chromium-data-via-telegram.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/17/raven-stealer-exfiltrates-chromium-data-via-telegram/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/17/ray-security-launches-predictive-data-security-platform.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/17/ray-security-launches-predictive-data-security-platform/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/17/sonicwall-mysonicwall-breach-exposes-firewall-configuration-files.html</loc>
    <lastmod>2026-03-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/17/sonicwall-mysonicwall-breach-exposes-firewall-configuration-files/</loc>
    <lastmod>2026-03-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/17/ta558-uses-ai-generated-scripts-to-deliver-venom-rat-in-brazil-hotel-attacks.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/17/ta558-uses-ai-generated-scripts-to-deliver-venom-rat-in-brazil-hotel-attacks/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/18/ai-governance-strategies-for-cisos-in-enterprise-environments.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/18/ai-governance-strategies-for-cisos-in-enterprise-environments/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/18/ai-powered-text-features-added-to-notepad-for-copilot-pcs-with-windows-11.html</loc>
    <lastmod>2026-01-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/18/ai-powered-text-features-added-to-notepad-for-copilot-pcs-with-windows-11/</loc>
    <lastmod>2026-01-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/18/cloud-edge-security-challenges-and-mitigation-strategies.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/18/cloud-edge-security-challenges-and-mitigation-strategies/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/18/critical-out-of-bounds-write-vulnerability-in-watchguard-firebox-firewalls.html</loc>
    <lastmod>2025-12-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/18/critical-out-of-bounds-write-vulnerability-in-watchguard-firebox-firewalls/</loc>
    <lastmod>2025-12-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/18/digital-forensics-skills-and-roles-in-cybersecurity.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/18/digital-forensics-skills-and-roles-in-cybersecurity/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/18/microsoft-365-becomes-prime-target-for-cybercriminals.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/18/microsoft-365-becomes-prime-target-for-cybercriminals/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/18/tiktok-us-operations-under-new-ownership-to-address-security-concerns.html</loc>
    <lastmod>2026-01-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/18/tiktok-us-operations-under-new-ownership-to-address-security-concerns/</loc>
    <lastmod>2026-01-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/18/type-confusion-vulnerability-in-chromes-v8-engine-exploited-in-the-wild.html</loc>
    <lastmod>2025-11-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/18/type-confusion-vulnerability-in-chromes-v8-engine-exploited-in-the-wild/</loc>
    <lastmod>2025-11-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/19/ai-transformation-and-cybersecurity-lessons-from-former-cia-digital-director.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/19/ai-transformation-and-cybersecurity-lessons-from-former-cia-digital-director/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/19/automated-alert-triage-with-ai-agents-and-confluence-sops.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/19/automated-alert-triage-with-ai-agents-and-confluence-sops/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/19/critical-azure-entra-id-vulnerability-exposes-cross-tenant-access-risks.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/19/critical-azure-entra-id-vulnerability-exposes-cross-tenant-access-risks/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/19/critical-deserialization-flaw-in-goanywhere-mft-cve-2025-10035-patched.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/19/critical-deserialization-flaw-in-goanywhere-mft-cve-2025-10035-patched/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/19/exploitation-of-ivanti-epmm-vulnerabilities-cve-2025-4427-cve-2025-4428-leads-to-malware-deployment.html</loc>
    <lastmod>2026-02-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/19/exploitation-of-ivanti-epmm-vulnerabilities-cve-2025-4427-cve-2025-4428-leads-to-malware-deployment/</loc>
    <lastmod>2026-02-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/19/fake-fbi-crime-reporting-portals-used-in-cybercrime-campaigns.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/19/fake-fbi-crime-reporting-portals-used-in-cybercrime-campaigns/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/19/gamaredon-and-turla-collaboration-to-deploy-kazuar-backdoor-in-ukraine.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/19/gamaredon-and-turla-collaboration-to-deploy-kazuar-backdoor-in-ukraine/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/19/lighthouse-and-lucid-phaas-campaigns-target-316-brands-across-74-countries.html</loc>
    <lastmod>2025-11-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/19/lighthouse-and-lucid-phaas-campaigns-target-316-brands-across-74-countries/</loc>
    <lastmod>2025-11-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/19/microsoft-gaming-copilot-beta-rollout-for-windows-11.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/19/microsoft-gaming-copilot-beta-rollout-for-windows-11/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/19/openai-enhances-chatgpt-search-with-improved-accuracy-and-reasoning-options.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/19/openai-enhances-chatgpt-search-with-improved-accuracy-and-reasoning-options/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/19/public-sector-cybersecurity-leaders-adopting-proactive-frameworks-for-enhanced-cyber-resilience.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/19/public-sector-cybersecurity-leaders-adopting-proactive-frameworks-for-enhanced-cyber-resilience/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/19/ransomware-attacks-continue-to-evade-defenses-despite-security-efforts.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/19/ransomware-attacks-continue-to-evade-defenses-despite-security-efforts/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/19/shadowleak-undetectable-email-theft-via-ai-agents.html</loc>
    <lastmod>2026-01-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/19/shadowleak-undetectable-email-theft-via-ai-agents/</loc>
    <lastmod>2026-01-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/19/splunks-boss-of-the-soc-bots-competition-shapes-cybersecurity-careers.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/19/splunks-boss-of-the-soc-bots-competition-shapes-cybersecurity-careers/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/19/steam-to-end-support-for-32-bit-windows-in-january-2026.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/19/steam-to-end-support-for-32-bit-windows-in-january-2026/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/19/synthetic-identity-fraud-targeting-automotive-lending-sector.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/19/synthetic-identity-fraud-targeting-automotive-lending-sector/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/20/canadian-authorities-dismantle-tradeogre-cryptocurrency-exchange-seize-40-million-in-crypto.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/20/canadian-authorities-dismantle-tradeogre-cryptocurrency-exchange-seize-40-million-in-crypto/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/20/discovery-of-malterminal-malware-leveraging-gpt-4-for-ransomware-and-reverse-shell.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/20/discovery-of-malterminal-malware-leveraging-gpt-4-for-ransomware-and-reverse-shell/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/22/cryptocurrency-theft-via-steam-game-blockblasters.html</loc>
    <lastmod>2026-03-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/22/cryptocurrency-theft-via-steam-game-blockblasters/</loc>
    <lastmod>2026-03-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/22/edr-freeze-windows-wer-abuse-suspends-security-software.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/22/edr-freeze-windows-wer-abuse-suspends-security-software/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/22/formbook-malware-deployed-in-phishing-campaigns-targeting-eurasian-organizations.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/22/formbook-malware-deployed-in-phishing-campaigns-targeting-eurasian-organizations/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/22/growing-security-risks-from-non-human-identities-and-ai-agents.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/22/growing-security-risks-from-non-human-identities-and-ai-agents/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/22/insecure-direct-object-reference-exploit-in-american-archive-of-public-broadcasting.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/22/insecure-direct-object-reference-exploit-in-american-archive-of-public-broadcasting/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/22/mozilla-enables-firefox-extension-rollback-for-bug-fixes.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/22/mozilla-enables-firefox-extension-rollback-for-bug-fixes/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/22/zero-day-in-google-chrome-exploited-in-the-wild.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/22/zero-day-in-google-chrome-exploited-in-the-wild/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/23/command-injection-flaw-in-libraesva-esg-exploited-by-state-actors.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/23/command-injection-flaw-in-libraesva-esg-exploited-by-state-actors/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/23/critical-deserialization-rce-vulnerability-in-solarwinds-web-help-desk.html</loc>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/23/critical-deserialization-rce-vulnerability-in-solarwinds-web-help-desk/</loc>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/23/crypto-fraud-ring-dismantled-by-european-authorities.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/23/crypto-fraud-ring-dismantled-by-european-authorities/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/23/geoserver-rce-exploit-used-in-federal-agency-breach.html</loc>
    <lastmod>2025-12-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/23/geoserver-rce-exploit-used-in-federal-agency-breach/</loc>
    <lastmod>2025-12-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/23/github-strengthens-npm-supply-chain-security-with-2fa-and-short-lived-tokens.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/23/github-strengthens-npm-supply-chain-security-with-2fa-and-short-lived-tokens/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/23/increased-risk-of-credential-based-security-incidents-due-to-lean-teams.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/23/increased-risk-of-credential-based-security-incidents-due-to-lean-teams/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/23/kaseya-ciso-discusses-unconventional-paths-to-cybersecurity-careers.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/23/kaseya-ciso-discusses-unconventional-paths-to-cybersecurity-careers/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/23/malicious-npm-package-fezbox-uses-qr-codes-to-deliver-cookie-stealing-malware.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/23/malicious-npm-package-fezbox-uses-qr-codes-to-deliver-cookie-stealing-malware/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/23/ransomware-attack-disrupts-check-in-and-boarding-systems-at-multiple-european-airports.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/23/ransomware-attack-disrupts-check-in-and-boarding-systems-at-multiple-european-airports/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/23/shadowv2-botnet-exploits-misconfigured-aws-docker-containers-for-ddos-attacks.html</loc>
    <lastmod>2025-11-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/23/shadowv2-botnet-exploits-misconfigured-aws-docker-containers-for-ddos-attacks/</loc>
    <lastmod>2025-11-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/23/steve-casapulla-appointed-as-executive-assistant-director-for-infrastructure-security-at-cisa.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/23/steve-casapulla-appointed-as-executive-assistant-director-for-infrastructure-security-at-cisa/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/23/supermicro-bmc-firmware-vulnerabilities-allow-firmware-tampering.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/23/supermicro-bmc-firmware-vulnerabilities-allow-firmware-tampering/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/23/tenfold-community-edition-free-identity-governance-administration-tool-released.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/23/tenfold-community-edition-free-identity-governance-administration-tool-released/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/23/us-secret-service-seizes-sim-servers-and-cards-near-un-general-assembly.html</loc>
    <lastmod>2026-03-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/23/us-secret-service-seizes-sim-servers-and-cards-near-un-general-assembly/</loc>
    <lastmod>2026-03-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/23/whatsapp-introduces-on-device-message-translation-for-ios-and-android.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/23/whatsapp-introduces-on-device-message-translation-for-ios-and-android/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/24/akira-ransomware-group-disables-knp-logistics-group-with-weak-password-exploit.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/24/akira-ransomware-group-disables-knp-logistics-group-with-weak-password-exploit/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/24/authentication-bypass-vulnerabilities-in-wondershare-repairit.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/24/authentication-bypass-vulnerabilities-in-wondershare-repairit/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/24/boyd-gaming-corporation-data-breach-after-cyberattack.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/24/boyd-gaming-corporation-data-breach-after-cyberattack/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/24/brickstorm-malware-used-in-long-term-espionage-against-us-organizations.html</loc>
    <lastmod>2026-01-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/24/brickstorm-malware-used-in-long-term-espionage-against-us-organizations/</loc>
    <lastmod>2026-01-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/24/cisco-ios-and-ios-xe-snmp-zero-day-exploited-in-attacks.html</loc>
    <lastmod>2026-01-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/24/cisco-ios-and-ios-xe-snmp-zero-day-exploited-in-attacks/</loc>
    <lastmod>2026-01-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/24/github-notifications-exploited-to-impersonate-y-combinator-in-crypto-theft-campaign.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/24/github-notifications-exploited-to-impersonate-y-combinator-in-crypto-theft-campaign/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/24/interpol-led-operation-haechi-vi-seizes-439-million-in-global-cybercrime-crackdown.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/24/interpol-led-operation-haechi-vi-seizes-439-million-in-global-cybercrime-crackdown/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/24/japanese-government-critical-systems-lack-security-controls-amid-rising-cyberattacks.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/24/japanese-government-critical-systems-lack-security-controls-amid-rising-cyberattacks/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/24/kali-linux-20253-released-with-new-tools-and-wi-fi-enhancements.html</loc>
    <lastmod>2025-12-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/24/kali-linux-20253-released-with-new-tools-and-wi-fi-enhancements/</loc>
    <lastmod>2025-12-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/24/new-obscura-ransomware-variant-encrypts-networks.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/24/new-obscura-ransomware-variant-encrypts-networks/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/24/new-yibackdoor-malware-with-code-overlaps-to-icedid-and-latrodectus.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/24/new-yibackdoor-malware-with-code-overlaps-to-icedid-and-latrodectus/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/24/openai-testing-gpt-alpha-based-on-gpt-5.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/24/openai-testing-gpt-alpha-based-on-gpt-5/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/24/pandoc-ssrf-vulnerability-exploited-to-target-aws-imds-and-steal-ec2-iam-credentials.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/24/pandoc-ssrf-vulnerability-exploited-to-target-aws-imds-and-steal-ec2-iam-credentials/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/24/stripe-iframe-skimmer-campaign-exploits-payment-iframes.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/24/stripe-iframe-skimmer-campaign-exploits-payment-iframes/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/25/adoption-and-security-of-passkeys-in-passwordless-authentication.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/25/adoption-and-security-of-passkeys-in-passwordless-authentication/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/25/amazon-settles-ftc-lawsuit-over-deceptive-prime-subscription-practices.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/25/amazon-settles-ftc-lawsuit-over-deceptive-prime-subscription-practices/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/25/cisa-emergency-directive-25-03-mitigation-of-cisco-asa-zero-day-vulnerabilities.html</loc>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/25/cisa-emergency-directive-25-03-mitigation-of-cisco-asa-zero-day-vulnerabilities/</loc>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/25/cloud-service-outages-impact-devops-and-development-workflows.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/25/cloud-service-outages-impact-devops-and-development-workflows/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/25/continuous-threat-exposure-management-ctem-emphasizes-prioritization-and-validation.html</loc>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/25/continuous-threat-exposure-management-ctem-emphasizes-prioritization-and-validation/</loc>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/25/forcedleak-vulnerability-in-salesforce-agentforce-exploited-via-ai-prompt-injection.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/25/forcedleak-vulnerability-in-salesforce-agentforce-exploited-via-ai-prompt-injection/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/25/malicious-postmark-mcp-npm-package-exfiltrated-user-emails.html</loc>
    <lastmod>2025-10-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/25/malicious-postmark-mcp-npm-package-exfiltrated-user-emails/</loc>
    <lastmod>2025-10-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/25/malicious-rust-crates-exfiltrate-solana-and-ethereum-keys.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/25/malicious-rust-crates-exfiltrate-solana-and-ethereum-keys/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/25/microsoft-to-provide-free-windows-10-security-updates-in-eea.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/25/microsoft-to-provide-free-windows-10-security-updates-in-eea/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/25/technology-sector-surpasses-gaming-as-top-ddos-attack-target-in-q1q2-2025.html</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/25/technology-sector-surpasses-gaming-as-top-ddos-attack-target-in-q1q2-2025/</loc>
    <lastmod>2025-10-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/26/coldriver-apt-group-uses-clickfix-tactics-to-deliver-baitswitch-and-simplefix-malware.html</loc>
    <lastmod>2025-12-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/26/coldriver-apt-group-uses-clickfix-tactics-to-deliver-baitswitch-and-simplefix-malware/</loc>
    <lastmod>2025-12-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/26/cybersecurity-challenges-for-the-2026-fifa-world-cup.html</loc>
    <lastmod>2025-10-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/26/cybersecurity-challenges-for-the-2026-fifa-world-cup/</loc>
    <lastmod>2025-10-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/26/inadequate-security-readiness-for-ai-deployments-in-organizations.html</loc>
    <lastmod>2025-10-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/26/inadequate-security-readiness-for-ai-deployments-in-organizations/</loc>
    <lastmod>2025-10-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/26/iranian-apt-unc1549-uses-sslcom-certificates-to-sign-malware.html</loc>
    <lastmod>2025-10-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/26/iranian-apt-unc1549-uses-sslcom-certificates-to-sign-malware/</loc>
    <lastmod>2025-10-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/26/microsoft-edge-to-block-malicious-sideloaded-extensions.html</loc>
    <lastmod>2025-10-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/26/microsoft-edge-to-block-malicious-sideloaded-extensions/</loc>
    <lastmod>2025-10-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/26/microsoft-introduces-ai-powered-photo-categorization-in-windows-11.html</loc>
    <lastmod>2025-10-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/26/microsoft-introduces-ai-powered-photo-categorization-in-windows-11/</loc>
    <lastmod>2025-10-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/26/outlook-encrypted-email-errors-affecting-cross-tenant-communications.html</loc>
    <lastmod>2025-10-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/26/outlook-encrypted-email-errors-affecting-cross-tenant-communications/</loc>
    <lastmod>2025-10-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/26/volvo-na-employee-data-stolen-in-miljödata-ransomware-attack.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/26/volvo-na-employee-data-stolen-in-miljödata-ransomware-attack/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/26/xcsset-macos-malware-targets-xcode-developers-with-enhanced-features.html</loc>
    <lastmod>2025-10-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/26/xcsset-macos-malware-targets-xcode-developers-with-enhanced-features/</loc>
    <lastmod>2025-10-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/27/dutch-teens-arrested-for-attempting-to-spy-on-europol-for-russia.html</loc>
    <lastmod>2025-10-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/27/dutch-teens-arrested-for-attempting-to-spy-on-europol-for-russia/</loc>
    <lastmod>2025-10-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/27/oyster-malware-distributed-via-fake-microsoft-teams-installers.html</loc>
    <lastmod>2026-02-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/27/oyster-malware-distributed-via-fake-microsoft-teams-installers/</loc>
    <lastmod>2026-02-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/28/eu-probes-sap-for-anti-competitive-erp-support-practices.html</loc>
    <lastmod>2025-10-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/28/eu-probes-sap-for-anti-competitive-erp-support-practices/</loc>
    <lastmod>2025-10-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/28/harrods-data-breach-via-third-party-provider.html</loc>
    <lastmod>2025-10-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/28/harrods-data-breach-via-third-party-provider/</loc>
    <lastmod>2025-10-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/29/ai-assisted-vulnerability-check-development.html</loc>
    <lastmod>2025-10-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/29/ai-assisted-vulnerability-check-development/</loc>
    <lastmod>2025-10-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/29/ai-driven-phishing-campaign-targeting-us-organizations.html</loc>
    <lastmod>2025-10-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/29/ai-driven-phishing-campaign-targeting-us-organizations/</loc>
    <lastmod>2025-10-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/29/arcanedoor-campaign-exploits-cisco-zero-day-vulnerabilities.html</loc>
    <lastmod>2025-10-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/29/arcanedoor-campaign-exploits-cisco-zero-day-vulnerabilities/</loc>
    <lastmod>2025-10-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/29/asahi-group-holdings-suffers-cyberattack-disrupting-japanese-operations.html</loc>
    <lastmod>2025-10-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/29/asahi-group-holdings-suffers-cyberattack-disrupting-japanese-operations/</loc>
    <lastmod>2025-10-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/29/brave-software-introduces-ask-brave-ai-powered-search-feature.html</loc>
    <lastmod>2025-10-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/29/brave-software-introduces-ask-brave-ai-powered-search-feature/</loc>
    <lastmod>2025-10-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/29/cisa-transitions-to-new-model-for-direct-cyber-support-to-state-and-local-governments.html</loc>
    <lastmod>2025-10-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/29/cisa-transitions-to-new-model-for-direct-cyber-support-to-state-and-local-governments/</loc>
    <lastmod>2025-10-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/29/cybersecurity-awareness-month-2025-initiated-by-dhs-and-cisa.html</loc>
    <lastmod>2025-10-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/29/cybersecurity-awareness-month-2025-initiated-by-dhs-and-cisa/</loc>
    <lastmod>2025-10-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/29/fileless-phishing-campaign-targets-ukrainian-government-entities.html</loc>
    <lastmod>2025-10-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/29/fileless-phishing-campaign-targets-ukrainian-government-entities/</loc>
    <lastmod>2025-10-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/29/medusa-ransomware-gang-targets-bbc-correspondent-for-insider-access.html</loc>
    <lastmod>2025-10-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/29/medusa-ransomware-gang-targets-bbc-correspondent-for-insider-access/</loc>
    <lastmod>2025-10-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/29/openais-gpt-4o-redirects-to-safety-models-for-harmful-activity-detection.html</loc>
    <lastmod>2025-10-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/29/openais-gpt-4o-redirects-to-safety-models-for-harmful-activity-detection/</loc>
    <lastmod>2025-10-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/29/safehill-launches-secureiq-continuous-threat-exposure-management-platform.html</loc>
    <lastmod>2025-10-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/29/safehill-launches-secureiq-continuous-threat-exposure-management-platform/</loc>
    <lastmod>2025-10-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/29/security-operations-centers-socs-embrace-ai-to-manage-alert-fatigue-and-volume.html</loc>
    <lastmod>2025-10-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/29/security-operations-centers-socs-embrace-ai-to-manage-alert-fatigue-and-volume/</loc>
    <lastmod>2025-10-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/30/ai-powered-voice-cloning-facilitates-advanced-vishing-attacks.html</loc>
    <lastmod>2025-10-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/30/ai-powered-voice-cloning-facilitates-advanced-vishing-attacks/</loc>
    <lastmod>2025-10-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/30/ai-security-challenges-in-enterprise-environments.html</loc>
    <lastmod>2025-10-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/30/ai-security-challenges-in-enterprise-environments/</loc>
    <lastmod>2025-10-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/30/battering-ram-attack-bypasses-intel-and-amd-cloud-security-protections.html</loc>
    <lastmod>2025-10-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/30/battering-ram-attack-bypasses-intel-and-amd-cloud-security-protections/</loc>
    <lastmod>2025-10-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/30/conifers-cognitivesoc-platform-enhances-incident-response.html</loc>
    <lastmod>2025-10-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/30/conifers-cognitivesoc-platform-enhances-incident-response/</loc>
    <lastmod>2025-10-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/30/critical-command-injection-vulnerability-in-western-digital-my-cloud-nas-devices.html</loc>
    <lastmod>2025-10-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/30/critical-command-injection-vulnerability-in-western-digital-my-cloud-nas-devices/</loc>
    <lastmod>2025-10-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/30/datzbro-android-trojan-targeting-elderly-via-ai-generated-facebook-events.html</loc>
    <lastmod>2025-10-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/30/datzbro-android-trojan-targeting-elderly-via-ai-generated-facebook-events/</loc>
    <lastmod>2025-10-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/30/ftc-sues-sendit-for-illegal-collection-of-childrens-data-and-deceptive-practices.html</loc>
    <lastmod>2025-10-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/30/ftc-sues-sendit-for-illegal-collection-of-childrens-data-and-deceptive-practices/</loc>
    <lastmod>2025-10-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/30/google-gemini-ai-vulnerabilities-allowing-prompt-injection-and-data-exfiltration.html</loc>
    <lastmod>2026-03-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/30/google-gemini-ai-vulnerabilities-allowing-prompt-injection-and-data-exfiltration/</loc>
    <lastmod>2026-03-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/30/guidance-for-ot-operators-to-maintain-updated-system-inventories.html</loc>
    <lastmod>2025-10-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/30/guidance-for-ot-operators-to-maintain-updated-system-inventories/</loc>
    <lastmod>2025-10-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/30/high-severity-vmware-nsx-vulnerabilities-patched-by-broadcom.html</loc>
    <lastmod>2025-10-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/30/high-severity-vmware-nsx-vulnerabilities-patched-by-broadcom/</loc>
    <lastmod>2025-10-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/30/increased-demand-for-vmware-certifications-in-hybrid-it-environments.html</loc>
    <lastmod>2025-10-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/30/increased-demand-for-vmware-certifications-in-hybrid-it-environments/</loc>
    <lastmod>2025-10-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/30/increased-risks-from-shadow-ai-and-nonhuman-identities.html</loc>
    <lastmod>2025-10-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/30/increased-risks-from-shadow-ai-and-nonhuman-identities/</loc>
    <lastmod>2025-10-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/30/iot-device-security-vulnerabilities-and-regulatory-efforts.html</loc>
    <lastmod>2025-10-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/30/iot-device-security-vulnerabilities-and-regulatory-efforts/</loc>
    <lastmod>2025-10-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/30/john-flynn-on-ai-security-and-the-evolving-role-of-the-ciso.html</loc>
    <lastmod>2025-10-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/30/john-flynn-on-ai-security-and-the-evolving-role-of-the-ciso/</loc>
    <lastmod>2025-10-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/30/klopatra-android-trojan-conducts-nighttime-bank-transfers.html</loc>
    <lastmod>2026-02-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/30/klopatra-android-trojan-conducts-nighttime-bank-transfers/</loc>
    <lastmod>2026-02-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/30/largest-cryptocurrency-seizure-in-uk-bitcoin-queen-convicted.html</loc>
    <lastmod>2025-11-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/30/largest-cryptocurrency-seizure-in-uk-bitcoin-queen-convicted/</loc>
    <lastmod>2025-11-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/30/matrixpdf-toolkit-enables-phishing-and-malware-distribution-via-pdfs.html</loc>
    <lastmod>2025-10-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/30/matrixpdf-toolkit-enables-phishing-and-malware-distribution-via-pdfs/</loc>
    <lastmod>2025-10-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/30/microsoft-sentinel-enhancements-with-unified-data-lake-and-agentic-security.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/30/microsoft-sentinel-enhancements-with-unified-data-lake-and-agentic-security/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/30/phantom-taurus-targets-government-and-telecommunications-organizations.html</loc>
    <lastmod>2025-10-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/30/phantom-taurus-targets-government-and-telecommunications-organizations/</loc>
    <lastmod>2025-10-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/30/sudo-vulnerability-cve-2025-32463-actively-exploited-in-linux-and-unix-systems.html</loc>
    <lastmod>2025-10-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/30/sudo-vulnerability-cve-2025-32463-actively-exploited-in-linux-and-unix-systems/</loc>
    <lastmod>2025-10-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/30/unc5174-exploits-vmware-zero-day-privilege-escalation-since-october-2024.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/30/unc5174-exploits-vmware-zero-day-privilege-escalation-since-october-2024/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/30/windows-11-2025-update-25h2-released-with-enhanced-security-features.html</loc>
    <lastmod>2025-10-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/30/windows-11-2025-update-25h2-released-with-enhanced-security-features/</loc>
    <lastmod>2025-10-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/30/windows-11-kb5065789-preview-update-released-with-41-changes-and-fixes.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/30/windows-11-kb5065789-preview-update-released-with-41-changes-and-fixes/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/30/windows-drm-video-playback-issues-partially-resolved-in-september-2025-update.html</loc>
    <lastmod>2025-10-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/09/30/windows-drm-video-playback-issues-partially-resolved-in-september-2025-update/</loc>
    <lastmod>2025-10-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/01/adobe-analytics-data-leakage-incident-due-to-ingestion-bug.html</loc>
    <lastmod>2025-10-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/01/adobe-analytics-data-leakage-incident-due-to-ingestion-bug/</loc>
    <lastmod>2025-10-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/01/cabinetrat-backdoor-deployed-via-xll-add-ins-in-ukraine.html</loc>
    <lastmod>2025-10-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/01/cabinetrat-backdoor-deployed-via-xll-add-ins-in-ukraine/</loc>
    <lastmod>2025-10-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/01/china-implements-new-cyber-incident-reporting-regulations.html</loc>
    <lastmod>2025-10-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/01/china-implements-new-cyber-incident-reporting-regulations/</loc>
    <lastmod>2025-10-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/01/cisa-validates-microsegmentation-as-foundational-to-zero-trust-security.html</loc>
    <lastmod>2025-10-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/01/cisa-validates-microsegmentation-as-foundational-to-zero-trust-security/</loc>
    <lastmod>2025-10-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/01/credential-themed-zip-archives-deliver-dll-implants-via-windows-shortcuts.html</loc>
    <lastmod>2025-10-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/01/credential-themed-zip-archives-deliver-dll-implants-via-windows-shortcuts/</loc>
    <lastmod>2025-10-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/01/google-drive-desktop-adds-ai-powered-ransomware-detection.html</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/01/google-drive-desktop-adds-ai-powered-ransomware-detection/</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/01/googles-developer-verification-policy-threatens-f-droid.html</loc>
    <lastmod>2025-11-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/01/googles-developer-verification-policy-threatens-f-droid/</loc>
    <lastmod>2025-11-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/01/imgur-blocks-uk-users-following-ico-investigation.html</loc>
    <lastmod>2025-10-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/01/imgur-blocks-uk-users-following-ico-investigation/</loc>
    <lastmod>2025-10-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/01/increased-pressure-on-security-teams-to-conceal-breaches-and-growing-attack-surfaces.html</loc>
    <lastmod>2025-10-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/01/increased-pressure-on-security-teams-to-conceal-breaches-and-growing-attack-surfaces/</loc>
    <lastmod>2025-10-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/01/legacy-operating-systems-in-enterprise-networks.html</loc>
    <lastmod>2025-10-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/01/legacy-operating-systems-in-enterprise-networks/</loc>
    <lastmod>2025-10-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/01/microsoft-365-classic-outlook-crashes-on-launch.html</loc>
    <lastmod>2025-10-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/01/microsoft-365-classic-outlook-crashes-on-launch/</loc>
    <lastmod>2025-10-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/01/microsoft-365-companion-apps-to-be-automatically-installed-on-windows-11-devices.html</loc>
    <lastmod>2025-10-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/01/microsoft-365-companion-apps-to-be-automatically-installed-on-windows-11-devices/</loc>
    <lastmod>2025-10-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/01/milesight-routers-exploited-in-european-smishing-campaign.html</loc>
    <lastmod>2025-10-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/01/milesight-routers-exploited-in-european-smishing-campaign/</loc>
    <lastmod>2025-10-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/01/motility-software-solutions-ransomware-attack-exposes-766000-client-records.html</loc>
    <lastmod>2025-10-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/01/motility-software-solutions-ransomware-attack-exposes-766000-client-records/</loc>
    <lastmod>2025-10-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/01/onelogin-oidc-client-secret-exposure-via-api-key-misconfiguration.html</loc>
    <lastmod>2025-10-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/01/onelogin-oidc-client-secret-exposure-via-api-key-misconfiguration/</loc>
    <lastmod>2025-10-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/01/openssl-vulnerabilities-in-versions-354-343-335-326-3018-102zm-and-111zd.html</loc>
    <lastmod>2025-10-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/01/openssl-vulnerabilities-in-versions-354-343-335-326-3018-102zm-and-111zd/</loc>
    <lastmod>2025-10-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/01/red-hat-openshift-ai-privilege-escalation-vulnerability.html</loc>
    <lastmod>2025-10-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/01/red-hat-openshift-ai-privilege-escalation-vulnerability/</loc>
    <lastmod>2025-10-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/01/webinar-on-blending-ai-and-human-workflows-in-cybersecurity.html</loc>
    <lastmod>2025-10-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/01/webinar-on-blending-ai-and-human-workflows-in-cybersecurity/</loc>
    <lastmod>2025-10-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/01/westjet-data-breach-impacts-12-million-customers.html</loc>
    <lastmod>2025-10-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/01/westjet-data-breach-impacts-12-million-customers/</loc>
    <lastmod>2025-10-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/01/windows-11-media-creation-tool-fails-on-arm64-devices.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/01/windows-11-media-creation-tool-fails-on-arm64-devices/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/02/anyrun-soc-efficiency-improvements-in-threat-detection.html</loc>
    <lastmod>2025-10-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/02/anyrun-soc-efficiency-improvements-in-threat-detection/</loc>
    <lastmod>2025-10-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/02/brave-browser-reaches-101-million-monthly-active-users.html</loc>
    <lastmod>2025-10-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/02/brave-browser-reaches-101-million-monthly-active-users/</loc>
    <lastmod>2025-10-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/02/clop-extortion-campaign-targets-oracle-e-business-suite.html</loc>
    <lastmod>2025-12-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/02/clop-extortion-campaign-targets-oracle-e-business-suite/</loc>
    <lastmod>2025-12-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/02/confucius-targets-pakistan-with-wooperstealer-and-anondoor-malware.html</loc>
    <lastmod>2025-10-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/02/confucius-targets-pakistan-with-wooperstealer-and-anondoor-malware/</loc>
    <lastmod>2025-10-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/02/hackerone-bug-bounty-payouts-reach-81-million-in-2024-2025.html</loc>
    <lastmod>2025-10-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/02/hackerone-bug-bounty-payouts-reach-81-million-in-2024-2025/</loc>
    <lastmod>2025-10-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/02/increased-scanning-for-pan-os-globalprotect-vulnerability.html</loc>
    <lastmod>2026-03-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/02/increased-scanning-for-pan-os-globalprotect-vulnerability/</loc>
    <lastmod>2026-03-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/02/increasing-cve-volume-and-cyber-insurance-strategies.html</loc>
    <lastmod>2025-10-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/02/increasing-cve-volume-and-cyber-insurance-strategies/</loc>
    <lastmod>2025-10-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/02/increasing-phishing-attacks-on-mobile-platforms.html</loc>
    <lastmod>2025-10-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/02/increasing-phishing-attacks-on-mobile-platforms/</loc>
    <lastmod>2025-10-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/02/malicious-pypi-package-soopsocks-infects-2653-systems.html</loc>
    <lastmod>2025-10-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/02/malicious-pypi-package-soopsocks-infects-2653-systems/</loc>
    <lastmod>2025-10-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/02/microsoft-defender-for-endpoint-bug-causes-false-bios-update-alerts-for-dell-devices.html</loc>
    <lastmod>2025-10-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/02/microsoft-defender-for-endpoint-bug-causes-false-bios-update-alerts-for-dell-devices/</loc>
    <lastmod>2025-10-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/02/microsoft-outlook-disables-inline-svg-images-to-mitigate-security-risks.html</loc>
    <lastmod>2025-10-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/02/microsoft-outlook-disables-inline-svg-images-to-mitigate-security-risks/</loc>
    <lastmod>2025-10-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/02/nfl-teams-address-cybersecurity-challenges-in-2025.html</loc>
    <lastmod>2025-10-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/02/nfl-teams-address-cybersecurity-challenges-in-2025/</loc>
    <lastmod>2025-10-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/02/phishing-and-vulnerability-exploitation-dominate-eu-intrusions.html</loc>
    <lastmod>2025-10-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/02/phishing-and-vulnerability-exploitation-dominate-eu-intrusions/</loc>
    <lastmod>2025-10-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/02/predicted-agentic-ai-data-breach-in-2026.html</loc>
    <lastmod>2025-10-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/02/predicted-agentic-ai-data-breach-in-2026/</loc>
    <lastmod>2025-10-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/02/red-hat-consulting-data-breach.html</loc>
    <lastmod>2026-01-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/02/red-hat-consulting-data-breach/</loc>
    <lastmod>2026-01-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/02/remote-code-execution-vulnerability-in-draytek-vigor-routers.html</loc>
    <lastmod>2025-10-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/02/remote-code-execution-vulnerability-in-draytek-vigor-routers/</loc>
    <lastmod>2025-10-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/02/security-and-privacy-risks-in-free-vpn-applications.html</loc>
    <lastmod>2025-10-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/02/security-and-privacy-risks-in-free-vpn-applications/</loc>
    <lastmod>2025-10-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/02/service-desk-exploited-as-attack-vector-by-social-engineering.html</loc>
    <lastmod>2025-10-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/02/service-desk-exploited-as-attack-vector-by-social-engineering/</loc>
    <lastmod>2025-10-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/02/tospy-and-prospy-spyware-targeting-uae-users.html</loc>
    <lastmod>2025-10-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/02/tospy-and-prospy-spyware-targeting-uae-users/</loc>
    <lastmod>2025-10-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/02/zania-secures-18m-for-ai-driven-grc-platform-expansion.html</loc>
    <lastmod>2025-10-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/02/zania-secures-18m-for-ai-driven-grc-platform-expansion/</loc>
    <lastmod>2025-10-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/03/brain-computer-interface-bci-security-challenges-and-emerging-threats.html</loc>
    <lastmod>2025-10-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/03/brain-computer-interface-bci-security-challenges-and-emerging-threats/</loc>
    <lastmod>2025-10-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/03/cavalry-werewolf-campaign-targets-russian-public-sector-with-foalshell-and-stallionrat.html</loc>
    <lastmod>2025-10-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/03/cavalry-werewolf-campaign-targets-russian-public-sector-with-foalshell-and-stallionrat/</loc>
    <lastmod>2025-10-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/03/cometjacking-attack-exploits-comet-browser-to-steal-emails.html</loc>
    <lastmod>2025-10-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/03/cometjacking-attack-exploits-comet-browser-to-steal-emails/</loc>
    <lastmod>2025-10-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/03/detour-dog-facilitates-strela-stealer-distribution-via-dns-powered-malware-factory.html</loc>
    <lastmod>2025-10-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/03/detour-dog-facilitates-strela-stealer-distribution-via-dns-powered-malware-factory/</loc>
    <lastmod>2025-10-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/03/google-workspace-e2ee-for-gmail-extended-to-external-recipients.html</loc>
    <lastmod>2025-10-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/03/google-workspace-e2ee-for-gmail-extended-to-external-recipients/</loc>
    <lastmod>2025-10-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/03/keep-aware-releases-template-for-ciso-genai-board-presentations.html</loc>
    <lastmod>2025-10-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/03/keep-aware-releases-template-for-ciso-genai-board-presentations/</loc>
    <lastmod>2025-10-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/03/meteobridge-command-injection-vulnerability-exploited-in-the-wild.html</loc>
    <lastmod>2025-10-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/03/meteobridge-command-injection-vulnerability-exploited-in-the-wild/</loc>
    <lastmod>2025-10-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/03/microsoft-abandons-speak-for-me-voice-cloning-feature-due-to-security-concerns.html</loc>
    <lastmod>2025-10-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/03/microsoft-abandons-speak-for-me-voice-cloning-feature-due-to-security-concerns/</loc>
    <lastmod>2025-10-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/03/passwork-7-enhances-enterprise-password-and-secrets-management.html</loc>
    <lastmod>2025-11-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/03/passwork-7-enhances-enterprise-password-and-secrets-management/</loc>
    <lastmod>2025-11-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/03/renault-and-dacia-uk-customers-affected-by-third-party-data-breach.html</loc>
    <lastmod>2025-10-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/03/renault-and-dacia-uk-customers-affected-by-third-party-data-breach/</loc>
    <lastmod>2025-10-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/03/rhadamanthys-stealer-adds-device-fingerprinting-png-steganography-payloads.html</loc>
    <lastmod>2025-11-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/03/rhadamanthys-stealer-adds-device-fingerprinting-png-steganography-payloads/</loc>
    <lastmod>2025-11-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/03/signal-introduces-sparse-post-quantum-ratchet-spqr-for-quantum-resistant-encryption.html</loc>
    <lastmod>2025-10-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/03/signal-introduces-sparse-post-quantum-ratchet-spqr-for-quantum-resistant-encryption/</loc>
    <lastmod>2025-10-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/03/sorvepotel-malware-spreads-via-whatsapp-in-brazil.html</loc>
    <lastmod>2025-12-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/03/sorvepotel-malware-spreads-via-whatsapp-in-brazil/</loc>
    <lastmod>2025-12-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/04/apple-m5-chip-benchmarks-leaked.html</loc>
    <lastmod>2025-10-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/04/apple-m5-chip-benchmarks-leaked/</loc>
    <lastmod>2025-10-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/04/chatgpt-direct-messaging-feature-in-development.html</loc>
    <lastmod>2025-10-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/04/chatgpt-direct-messaging-feature-in-development/</loc>
    <lastmod>2025-10-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/04/discord-user-data-compromised-in-third-party-breach.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/04/discord-user-data-compromised-in-third-party-breach/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/04/gpt-5-instant-model-update-improves-emotional-support.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/04/gpt-5-instant-model-update-improves-emotional-support/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/04/increased-scanning-activity-on-palo-alto-networks-login-portals.html</loc>
    <lastmod>2025-12-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/04/increased-scanning-activity-on-palo-alto-networks-login-portals/</loc>
    <lastmod>2025-12-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/04/openai-releases-gpt-codex-alpha-with-new-models.html</loc>
    <lastmod>2025-10-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/04/openai-releases-gpt-codex-alpha-with-new-models/</loc>
    <lastmod>2025-10-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/04/opera-neon-ai-browser-released-with-monthly-subscription.html</loc>
    <lastmod>2025-10-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/04/opera-neon-ai-browser-released-with-monthly-subscription/</loc>
    <lastmod>2025-10-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/05/parkmobile-2021-data-breach-settlement-finalized.html</loc>
    <lastmod>2025-10-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/05/parkmobile-2021-data-breach-settlement-finalized/</loc>
    <lastmod>2025-10-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/05/zimbra-collaboration-suite-zero-day-exploited-via-icalendar-files.html</loc>
    <lastmod>2025-10-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/05/zimbra-collaboration-suite-zero-day-exploited-via-icalendar-files/</loc>
    <lastmod>2025-10-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/06/ai-adoption-in-cybersecurity-for-enhanced-threat-detection-and-response.html</loc>
    <lastmod>2025-10-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/06/ai-adoption-in-cybersecurity-for-enhanced-threat-detection-and-response/</loc>
    <lastmod>2025-10-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/06/bieta-and-ciii-linked-to-chinas-mss-cyber-operations.html</loc>
    <lastmod>2025-10-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/06/bieta-and-ciii-linked-to-chinas-mss-cyber-operations/</loc>
    <lastmod>2025-10-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/06/code-execution-vulnerability-in-unity-game-engine-affects-multiple-platforms.html</loc>
    <lastmod>2025-10-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/06/code-execution-vulnerability-in-unity-game-engine-affects-multiple-platforms/</loc>
    <lastmod>2025-10-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/06/critical-considerations-for-adopting-ai-security-posture-management-solutions.html</loc>
    <lastmod>2025-10-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/06/critical-considerations-for-adopting-ai-security-posture-management-solutions/</loc>
    <lastmod>2025-10-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/06/critical-redis-lua-use-after-free-vulnerability-exploitable-for-remote-code-execution.html</loc>
    <lastmod>2025-10-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/06/critical-redis-lua-use-after-free-vulnerability-exploitable-for-remote-code-execution/</loc>
    <lastmod>2025-10-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/06/doctors-imaging-group-data-breach-affects-171000-individuals.html</loc>
    <lastmod>2025-10-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/06/doctors-imaging-group-data-breach-affects-171000-individuals/</loc>
    <lastmod>2025-10-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/06/europol-conference-highlights-data-access-challenges-in-cybercrime-investigations.html</loc>
    <lastmod>2025-10-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/06/europol-conference-highlights-data-access-challenges-in-cybercrime-investigations/</loc>
    <lastmod>2025-10-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/06/linkedin-sues-proapis-for-scraping-user-data-using-1m-fake-accounts.html</loc>
    <lastmod>2025-10-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/06/linkedin-sues-proapis-for-scraping-user-data-using-1m-fake-accounts/</loc>
    <lastmod>2025-10-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/06/microsoft-office-copilot-issues-with-multiple-apps-running.html</loc>
    <lastmod>2025-10-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/06/microsoft-office-copilot-issues-with-multiple-apps-running/</loc>
    <lastmod>2025-10-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/06/openai-agent-builder-for-custom-ai-agents.html</loc>
    <lastmod>2025-10-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/06/openai-agent-builder-for-custom-ai-agents/</loc>
    <lastmod>2025-10-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/06/openais-chatgpt-pulse-web-rollout-for-pro-subscribers.html</loc>
    <lastmod>2025-10-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/06/openais-chatgpt-pulse-web-rollout-for-pro-subscribers/</loc>
    <lastmod>2025-10-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/06/xworm-malware-variants-with-ransomware-module-and-over-35-plugins-observed.html</loc>
    <lastmod>2025-10-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/06/xworm-malware-variants-with-ransomware-module-and-over-35-plugins-observed/</loc>
    <lastmod>2025-10-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/06/zerodaycloud-hacking-competition-announced-with-45-million-in-prizes.html</loc>
    <lastmod>2025-12-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/06/zerodaycloud-hacking-competition-announced-with-45-million-in-prizes/</loc>
    <lastmod>2025-12-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/07/ai-powered-breach-and-attack-simulation-enhances-security-validation.html</loc>
    <lastmod>2025-10-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/07/ai-powered-breach-and-attack-simulation-enhances-security-validation/</loc>
    <lastmod>2025-10-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/07/ai-tools-identified-as-leading-data-exfiltration-channel-in-enterprises.html</loc>
    <lastmod>2025-10-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/07/ai-tools-identified-as-leading-data-exfiltration-channel-in-enterprises/</loc>
    <lastmod>2025-10-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/07/avnet-breach-emea-sales-tool-compromised-data-stolen.html</loc>
    <lastmod>2025-10-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/07/avnet-breach-emea-sales-tool-compromised-data-stolen/</loc>
    <lastmod>2025-10-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/07/batshadow-group-uses-vampire-bot-malware-to-target-job-seekers.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/07/batshadow-group-uses-vampire-bot-malware-to-target-job-seekers/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/07/credential-stuffing-attacks-target-draftkings-user-accounts.html</loc>
    <lastmod>2025-10-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/07/credential-stuffing-attacks-target-draftkings-user-accounts/</loc>
    <lastmod>2025-10-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/07/google-gemini-vulnerable-to-ascii-smuggling-attacks.html</loc>
    <lastmod>2025-10-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/07/google-gemini-vulnerable-to-ascii-smuggling-attacks/</loc>
    <lastmod>2025-10-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/07/google-launches-ai-vulnerability-reward-program.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/07/google-launches-ai-vulnerability-reward-program/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/07/googles-codemender-ai-automatically-patches-vulnerabilities-in-code.html</loc>
    <lastmod>2025-10-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/07/googles-codemender-ai-automatically-patches-vulnerabilities-in-code/</loc>
    <lastmod>2025-10-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/07/microsoft-removes-additional-methods-to-bypass-microsoft-account-setup-in-windows-11.html</loc>
    <lastmod>2025-10-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/07/microsoft-removes-additional-methods-to-bypass-microsoft-account-setup-in-windows-11/</loc>
    <lastmod>2025-10-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/07/north-korean-hackers-steal-2-billion-in-cryptocurrency-in-2025.html</loc>
    <lastmod>2026-03-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/07/north-korean-hackers-steal-2-billion-in-cryptocurrency-in-2025/</loc>
    <lastmod>2026-03-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/08/active-exploitation-of-authentication-bypass-in-service-finder-wordpress-theme.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/08/active-exploitation-of-authentication-bypass-in-service-finder-wordpress-theme/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/08/ai-security-posture-management-ai-spm-for-secure-ai-adoption.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/08/ai-security-posture-management-ai-spm-for-secure-ai-adoption/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/08/chatgpt-misuse-by-nation-state-actors-for-malware-development-and-influence-operations.html</loc>
    <lastmod>2026-02-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/08/chatgpt-misuse-by-nation-state-actors-for-malware-development-and-influence-operations/</loc>
    <lastmod>2026-02-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/08/command-injection-vulnerability-in-figma-mcp.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/08/command-injection-vulnerability-in-figma-mcp/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/08/digital-fraud-costs-companies-77-of-annual-revenue.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/08/digital-fraud-costs-companies-77-of-annual-revenue/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/08/docker-hardened-images-catalog-access-expanded-to-small-businesses.html</loc>
    <lastmod>2025-12-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/08/docker-hardened-images-catalog-access-expanded-to-small-businesses/</loc>
    <lastmod>2025-12-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/08/filefix-attack-evolves-with-cache-smuggling-technique.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/08/filefix-attack-evolves-with-cache-smuggling-technique/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/08/five-ai-focused-cybersecurity-startups-selected-for-datatribe-challenge-2025.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/08/five-ai-focused-cybersecurity-startups-selected-for-datatribe-challenge-2025/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/08/increasing-use-of-css-based-hidden-text-salting-in-email-attacks.html</loc>
    <lastmod>2025-10-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/08/increasing-use-of-css-based-hidden-text-salting-in-email-attacks/</loc>
    <lastmod>2025-10-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/08/lockbit-qilin-and-dragonforce-form-ransomware-alliance.html</loc>
    <lastmod>2025-10-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/08/lockbit-qilin-and-dragonforce-form-ransomware-alliance/</loc>
    <lastmod>2025-10-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/08/metropolitan-police-arrest-two-teens-for-ransomware-attack-on-london-nursery-group.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/08/metropolitan-police-arrest-two-teens-for-ransomware-attack-on-london-nursery-group/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/08/microsoft-365-services-outage-affects-teams-exchange-online-and-admin-center.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/08/microsoft-365-services-outage-affects-teams-exchange-online-and-admin-center/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/08/microsoft-enables-exchange-online-auto-archiving-by-default.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/08/microsoft-enables-exchange-online-auto-archiving-by-default/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/08/nezha-agent-used-in-web-application-intrusions.html</loc>
    <lastmod>2025-12-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/08/nezha-agent-used-in-web-application-intrusions/</loc>
    <lastmod>2025-12-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/08/spear-phishing-campaign-targets-social-media-and-marketing-professionals-with-fake-job-offers.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/08/spear-phishing-campaign-targets-social-media-and-marketing-professionals-with-fake-job-offers/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/08/specops-software-and-the-hacker-news-to-host-webinar-on-password-security.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/08/specops-software-and-the-hacker-news-to-host-webinar-on-password-security/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/08/wordpress-sites-exploited-for-clickfix-phishing-attacks.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/08/wordpress-sites-exploited-for-clickfix-phishing-attacks/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/09/ai-driven-malware-and-phishing-campaigns-targeting-ukraine.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/09/ai-driven-malware-and-phishing-campaigns-targeting-ukraine/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/09/ai-notetakers-pose-cybersecurity-and-compliance-risks.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/09/ai-notetakers-pose-cybersecurity-and-compliance-risks/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/09/azure-front-door-cdn-outage-affecting-microsoft-365-services.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/09/azure-front-door-cdn-outage-affecting-microsoft-365-services/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/09/camoleak-attack-exploits-github-copilot-for-data-exfiltration.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/09/camoleak-attack-exploits-github-copilot-for-data-exfiltration/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/09/chaos-ransomware-evolves-with-destructive-c-variant.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/09/chaos-ransomware-evolves-with-destructive-c-variant/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/09/china-aligned-uta0388-targets-multiple-regions-with-govershell-malware.html</loc>
    <lastmod>2025-11-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/09/china-aligned-uta0388-targets-multiple-regions-with-govershell-malware/</loc>
    <lastmod>2025-11-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/09/clayrat-spyware-campaign-targets-android-users-in-russia.html</loc>
    <lastmod>2025-12-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/09/clayrat-spyware-campaign-targets-android-users-in-russia/</loc>
    <lastmod>2025-12-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/09/crimson-collective-targets-aws-environments.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/09/crimson-collective-targets-aws-environments/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/09/fastly-ciso-marshall-erwin-on-leveraging-major-incidents-for-career-advancement.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/09/fastly-ciso-marshall-erwin-on-leveraging-major-incidents-for-career-advancement/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/09/icos-75m-fine-against-clearview-ai-upheld-in-uk-court.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/09/icos-75m-fine-against-clearview-ai-upheld-in-uk-court/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/09/microsoft-defender-misidentifies-sql-server-versions-as-end-of-life.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/09/microsoft-defender-misidentifies-sql-server-versions-as-end-of-life/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/09/microsoft-rolls-out-windows-backup-for-organizations.html</loc>
    <lastmod>2026-02-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/09/microsoft-rolls-out-windows-backup-for-organizations/</loc>
    <lastmod>2026-02-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/09/ncsc-urges-uk-organizations-to-enhance-observability-and-threat-hunting.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/09/ncsc-urges-uk-organizations-to-enhance-observability-and-threat-hunting/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/09/oauth-and-api-token-theft-driving-saas-breaches.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/09/oauth-and-api-token-theft-driving-saas-breaches/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/09/rondodox-botnet-exploits-56-n-day-vulnerabilities-in-global-attacks.html</loc>
    <lastmod>2026-01-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/09/rondodox-botnet-exploits-56-n-day-vulnerabilities-in-global-attacks/</loc>
    <lastmod>2026-01-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/09/security-weaknesses-identified-in-ai-browsers.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/09/security-weaknesses-identified-in-ai-browsers/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/09/storm-2657-targets-university-hr-employees-in-payroll-hijacking-campaign.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/09/storm-2657-targets-university-hr-employees-in-payroll-hijacking-campaign/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/09/twonet-hacktivists-target-critical-infrastructure-with-realistic-honeypot-attack.html</loc>
    <lastmod>2025-11-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/09/twonet-hacktivists-target-critical-infrastructure-with-realistic-honeypot-attack/</loc>
    <lastmod>2025-11-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/09/velociraptor-dfir-tool-abused-in-lockbit-and-babuk-ransomware-campaigns.html</loc>
    <lastmod>2026-02-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/09/velociraptor-dfir-tool-abused-in-lockbit-and-babuk-ransomware-campaigns/</loc>
    <lastmod>2026-02-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/10/active-exploitation-of-unpatched-gladinet-and-triofox-vulnerability.html</loc>
    <lastmod>2025-12-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/10/active-exploitation-of-unpatched-gladinet-and-triofox-vulnerability/</loc>
    <lastmod>2025-12-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/10/ai-soc-platforms-shift-to-mesh-agentic-architectures.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/10/ai-soc-platforms-shift-to-mesh-agentic-architectures/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/10/apple-increases-bug-bounty-payouts-for-zero-click-rce-vulnerabilities.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/10/apple-increases-bug-bounty-payouts-for-zero-click-rce-vulnerabilities/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/10/copilot-on-windows-updated-to-connect-to-email-and-create-office-documents.html</loc>
    <lastmod>2025-10-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/10/copilot-on-windows-updated-to-connect-to-email-and-create-office-documents/</loc>
    <lastmod>2025-10-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/10/credential-phishing-campaign-using-175-malicious-npm-packages.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/10/credential-phishing-campaign-using-175-malicious-npm-packages/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/10/cybersecurity-for-dummies-3rd-edition-ebook-available-for-free.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/10/cybersecurity-for-dummies-3rd-edition-ebook-available-for-free/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/10/dark-reading-commentary-section-redesigned-to-focus-on-cybersecurity-opinions.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/10/dark-reading-commentary-section-redesigned-to-focus-on-cybersecurity-opinions/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/10/google-chrome-to-revoke-notification-access-for-inactive-sites.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/10/google-chrome-to-revoke-notification-access-for-inactive-sites/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/10/increasing-deepfake-threats-and-organizational-preparedness.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/10/increasing-deepfake-threats-and-organizational-preparedness/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/10/manufacturing-sector-continues-to-face-heightened-ransomware-threats.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/10/manufacturing-sector-continues-to-face-heightened-ransomware-threats/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/10/stealit-malware-campaign-abuses-nodejs-sea-feature.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/10/stealit-malware-campaign-abuses-nodejs-sea-feature/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/10/unpatched-ivanti-endpoint-manager-vulnerabilities-disclosed-by-zdi.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/10/unpatched-ivanti-endpoint-manager-vulnerabilities-disclosed-by-zdi/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/10/vmware-certification-path-to-it-leadership.html</loc>
    <lastmod>2025-10-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/10/vmware-certification-path-to-it-leadership/</loc>
    <lastmod>2025-10-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/11/1password-secure-agentic-autofill-integration-to-mitigate-ai-browser-agent-credential-risks.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/11/1password-secure-agentic-autofill-integration-to-mitigate-ai-browser-agent-credential-risks/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/11/gxc-team-caas-platform-dismantled-in-spain.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/11/gxc-team-caas-platform-dismantled-in-spain/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/12/smishing-campaign-targets-new-yorkers-with-fake-inflation-refunds.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/12/smishing-campaign-targets-new-yorkers-with-fake-inflation-refunds/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/12/unauthenticated-access-vulnerability-in-oracle-e-business-suite-configurator.html</loc>
    <lastmod>2025-10-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/12/unauthenticated-access-vulnerability-in-oracle-e-business-suite-configurator/</loc>
    <lastmod>2025-10-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/13/ais-impact-on-entry-level-cybersecurity-jobs.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/13/ais-impact-on-entry-level-cybersecurity-jobs/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/13/astaroth-banking-trojan-campaign-leverages-github-for-resilience.html</loc>
    <lastmod>2026-01-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/13/astaroth-banking-trojan-campaign-leverages-github-for-resilience/</loc>
    <lastmod>2026-01-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/13/client-side-javascript-security-gaps-exploited-during-holiday-shopping-seasons.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/13/client-side-javascript-security-gaps-exploited-during-holiday-shopping-seasons/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/13/financial-and-government-sectors-urged-to-prepare-for-quantum-computing-threats.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/13/financial-and-government-sectors-urged-to-prepare-for-quantum-computing-threats/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/13/large-scale-rdp-targeting-campaign-detected-from-multi-country-botnet.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/13/large-scale-rdp-targeting-campaign-detected-from-multi-country-botnet/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/13/microsoft-365-service-disruption-affecting-user-access.html</loc>
    <lastmod>2026-02-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/13/microsoft-365-service-disruption-affecting-user-access/</loc>
    <lastmod>2026-02-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/13/microsoft-restricts-internet-explorer-mode-in-edge-after-exploitation.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/13/microsoft-restricts-internet-explorer-mode-in-edge-after-exploitation/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/13/screenconnect-abused-for-network-intrusions-by-apt-groups.html</loc>
    <lastmod>2026-03-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/13/screenconnect-abused-for-network-intrusions-by-apt-groups/</loc>
    <lastmod>2026-03-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/13/simonmed-imaging-data-breach-affects-12-million-patients.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/13/simonmed-imaging-data-breach-affects-12-million-patients/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/13/unity-speedtree-website-compromised-to-skim-customer-data.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/13/unity-speedtree-website-compromised-to-skim-customer-data/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/13/unmonitored-collaboration-platforms-pose-significant-risk-to-critical-infrastructure.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/13/unmonitored-collaboration-platforms-pose-significant-risk-to-critical-infrastructure/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/13/varonis-introduces-ai-native-email-security-solution-interceptor.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/13/varonis-introduces-ai-native-email-security-solution-interceptor/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/14/ai-enhanced-reconnaissance-accelerates-web-application-attacks.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/14/ai-enhanced-reconnaissance-accelerates-web-application-attacks/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/14/credential-theft-via-legacy-windows-protocols-in-local-networks.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/14/credential-theft-via-legacy-windows-protocols-in-local-networks/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/14/dispute-over-cve-credit-between-fuzzinglabs-and-gecko-security.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/14/dispute-over-cve-credit-between-fuzzinglabs-and-gecko-security/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/14/emerging-security-risks-from-autonomous-ai-agents.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/14/emerging-security-risks-from-autonomous-ai-agents/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/14/flax-typhoon-apt-group-exploits-arcgis-for-persistent-access.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/14/flax-typhoon-apt-group-exploits-arcgis-for-persistent-access/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/14/microsoft-october-2025-patch-tuesday-fixes-6-zero-days-172-flaws.html</loc>
    <lastmod>2026-02-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/14/microsoft-october-2025-patch-tuesday-fixes-6-zero-days-172-flaws/</loc>
    <lastmod>2026-02-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/14/microsoft-releases-october-2025-patch-tuesday-updates-for-windows-11.html</loc>
    <lastmod>2026-02-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/14/microsoft-releases-october-2025-patch-tuesday-updates-for-windows-11/</loc>
    <lastmod>2026-02-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/14/microsofts-deputy-ciso-strategy-and-future-of-ciso-role.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/14/microsofts-deputy-ciso-strategy-and-future-of-ciso-role/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/14/pixnapping-android-flaw-enables-2fa-code-theft.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/14/pixnapping-android-flaw-enables-2fa-code-theft/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/14/proactive-threat-hunting-enhances-cybersecurity-readiness.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/14/proactive-threat-hunting-enhances-cybersecurity-readiness/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/14/rmpocalypse-vulnerability-in-amd-secure-encrypted-virtualization.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/14/rmpocalypse-vulnerability-in-amd-secure-encrypted-virtualization/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/14/secure-boot-bypass-risk-on-framework-linux-systems.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/14/secure-boot-bypass-risk-on-framework-linux-systems/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/14/ta585-using-monsterv2-in-phishing-campaigns.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/14/ta585-using-monsterv2-in-phishing-campaigns/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/14/uk-firms-report-significant-financial-losses-due-to-unmanaged-ai-risks.html</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/14/uk-firms-report-significant-financial-losses-due-to-unmanaged-ai-risks/</loc>
    <lastmod>2025-10-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/14/uk-ncsc-reports-significant-increase-in-nationally-significant-cyber-incidents.html</loc>
    <lastmod>2026-02-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/14/uk-ncsc-reports-significant-increase-in-nationally-significant-cyber-incidents/</loc>
    <lastmod>2026-02-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/14/us-seizes-15-billion-in-crypto-from-prince-groups-pig-butchering-scam.html</loc>
    <lastmod>2025-10-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/14/us-seizes-15-billion-in-crypto-from-prince-groups-pig-butchering-scam/</loc>
    <lastmod>2025-10-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/15/africa-remains-top-global-target-for-cyberattacks-despite-recent-declines.html</loc>
    <lastmod>2025-10-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/15/africa-remains-top-global-target-for-cyberattacks-despite-recent-declines/</loc>
    <lastmod>2025-10-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/15/arbitrary-file-read-vulnerability-in-slider-revolution-plugin.html</loc>
    <lastmod>2025-10-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/15/arbitrary-file-read-vulnerability-in-slider-revolution-plugin/</loc>
    <lastmod>2025-10-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/15/capita-fined-14m-for-2023-data-breach-affecting-66-million-people.html</loc>
    <lastmod>2025-10-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/15/capita-fined-14m-for-2023-data-breach-affecting-66-million-people/</loc>
    <lastmod>2025-10-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/15/critical-vulnerabilities-in-red-lion-sixnet-and-versatrak-rtus.html</loc>
    <lastmod>2025-10-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/15/critical-vulnerabilities-in-red-lion-sixnet-and-versatrak-rtus/</loc>
    <lastmod>2025-10-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/15/dark-web-threats-detection-using-network-detection-and-response.html</loc>
    <lastmod>2025-10-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/15/dark-web-threats-detection-using-network-detection-and-response/</loc>
    <lastmod>2025-10-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/15/f5-big-ip-source-code-and-vulnerability-information-stolen-in-cyberattack.html</loc>
    <lastmod>2025-10-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/15/f5-big-ip-source-code-and-vulnerability-information-stolen-in-cyberattack/</loc>
    <lastmod>2025-10-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/15/f5-devices-targeted-by-nation-state-actors-cisa-issues-emergency-directive.html</loc>
    <lastmod>2025-10-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/15/f5-devices-targeted-by-nation-state-actors-cisa-issues-emergency-directive/</loc>
    <lastmod>2025-10-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/15/ictbroadcast-autodialer-software-exploited-to-gain-remote-shell-access.html</loc>
    <lastmod>2025-10-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/15/ictbroadcast-autodialer-software-exploited-to-gain-remote-shell-access/</loc>
    <lastmod>2025-10-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/15/jewelbug-infiltrates-russian-it-service-provider-for-five-months.html</loc>
    <lastmod>2025-10-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/15/jewelbug-infiltrates-russian-it-service-provider-for-five-months/</loc>
    <lastmod>2025-10-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/15/mango-marketing-vendor-data-breach.html</loc>
    <lastmod>2025-10-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/15/mango-marketing-vendor-data-breach/</loc>
    <lastmod>2025-10-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/15/phishing-as-a-service-platform-whisper-2fa-facilitates-one-million-attacks-since-july-2025.html</loc>
    <lastmod>2025-10-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/15/phishing-as-a-service-platform-whisper-2fa-facilitates-one-million-attacks-since-july-2025/</loc>
    <lastmod>2025-10-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/15/phishing-campaign-targets-lastpass-and-bitwarden-users-to-install-remote-access-tools.html</loc>
    <lastmod>2025-10-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/15/phishing-campaign-targets-lastpass-and-bitwarden-users-to-install-remote-access-tools/</loc>
    <lastmod>2025-10-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/15/synced-passkeys-vulnerable-to-enterprise-attacks.html</loc>
    <lastmod>2025-10-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/15/synced-passkeys-vulnerable-to-enterprise-attacks/</loc>
    <lastmod>2025-10-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/15/tigerjack-campaign-targets-developers-with-malicious-vscode-extensions.html</loc>
    <lastmod>2026-01-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/15/tigerjack-campaign-targets-developers-with-malicious-vscode-extensions/</loc>
    <lastmod>2026-01-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/16/active-exploitation-of-critical-adobe-aem-forms-misconfiguration.html</loc>
    <lastmod>2025-10-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/16/active-exploitation-of-critical-adobe-aem-forms-misconfiguration/</loc>
    <lastmod>2025-10-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/16/adoption-of-unified-exposure-management-platforms-for-preemptive-cyber-defense.html</loc>
    <lastmod>2025-10-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/16/adoption-of-unified-exposure-management-platforms-for-preemptive-cyber-defense/</loc>
    <lastmod>2025-10-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/16/ai-soc-platforms-architectures-risks-and-adoption.html</loc>
    <lastmod>2025-10-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/16/ai-soc-platforms-architectures-risks-and-adoption/</loc>
    <lastmod>2025-10-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/16/hidden-costs-of-traditional-penetration-testing.html</loc>
    <lastmod>2025-10-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/16/hidden-costs-of-traditional-penetration-testing/</loc>
    <lastmod>2025-10-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/16/linkpro-rootkit-exploits-ebpf-to-evade-detection-on-linux-systems.html</loc>
    <lastmod>2025-10-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/16/linkpro-rootkit-exploits-ebpf-to-evade-detection-on-linux-systems/</loc>
    <lastmod>2025-10-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/16/microsoft-introduces-copilot-actions-for-agentic-ai-driven-windows-tasks.html</loc>
    <lastmod>2025-10-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/16/microsoft-introduces-copilot-actions-for-agentic-ai-driven-windows-tasks/</loc>
    <lastmod>2025-10-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/16/microsoft-reports-surge-in-ai-driven-cyber-threats-and-defenses.html</loc>
    <lastmod>2025-10-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/16/microsoft-reports-surge-in-ai-driven-cyber-threats-and-defenses/</loc>
    <lastmod>2025-10-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/16/prosper-data-breach-exposes-176-million-accounts.html</loc>
    <lastmod>2025-10-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/16/prosper-data-breach-exposes-176-million-accounts/</loc>
    <lastmod>2025-10-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/16/q3-2025-data-breaches-in-the-us.html</loc>
    <lastmod>2025-10-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/16/q3-2025-data-breaches-in-the-us/</loc>
    <lastmod>2025-10-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/16/sothebys-data-breach-exposes-customer-financial-information.html</loc>
    <lastmod>2025-10-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/16/sothebys-data-breach-exposes-customer-financial-information/</loc>
    <lastmod>2025-10-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/16/unc5142-abuses-blockchain-smart-contracts-to-spread-malware-via-compromised-wordpress-sites.html</loc>
    <lastmod>2025-10-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/16/unc5142-abuses-blockchain-smart-contracts-to-spread-malware-via-compromised-wordpress-sites/</loc>
    <lastmod>2025-10-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/16/us-seizes-15-billion-in-cryptocurrency-from-forced-labor-scam-compounds.html</loc>
    <lastmod>2025-10-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/16/us-seizes-15-billion-in-cryptocurrency-from-forced-labor-scam-compounds/</loc>
    <lastmod>2025-10-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/16/youtube-experiences-global-outage-with-playback-errors.html</loc>
    <lastmod>2025-10-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/16/youtube-experiences-global-outage-with-playback-errors/</loc>
    <lastmod>2025-10-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/17/ai-chatbot-data-used-in-criminal-investigations.html</loc>
    <lastmod>2025-10-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/17/ai-chatbot-data-used-in-criminal-investigations/</loc>
    <lastmod>2025-10-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/17/connectwise-automate-vulnerabilities-patched.html</loc>
    <lastmod>2025-10-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/17/connectwise-automate-vulnerabilities-patched/</loc>
    <lastmod>2025-10-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/17/http-request-smuggling-vulnerability-in-aspnet-core-kestrel-web-server.html</loc>
    <lastmod>2025-10-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/17/http-request-smuggling-vulnerability-in-aspnet-core-kestrel-web-server/</loc>
    <lastmod>2025-10-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/17/identity-security-emerges-as-critical-enterprise-defense.html</loc>
    <lastmod>2025-10-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/17/identity-security-emerges-as-critical-enterprise-defense/</loc>
    <lastmod>2025-10-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/17/infostealers-driving-ransomware-attacks-and-mitigation-strategies.html</loc>
    <lastmod>2025-10-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/17/infostealers-driving-ransomware-attacks-and-mitigation-strategies/</loc>
    <lastmod>2025-10-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/17/sim-box-operation-dismantled-enabling-global-telecom-fraud.html</loc>
    <lastmod>2025-10-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/17/sim-box-operation-dismantled-enabling-global-telecom-fraud/</loc>
    <lastmod>2025-10-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/17/windows-11-updates-disrupt-localhost-http-2-connections.html</loc>
    <lastmod>2025-10-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/17/windows-11-updates-disrupt-localhost-http-2-connections/</loc>
    <lastmod>2025-10-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/17/zendesk-platform-abused-for-email-flood-attacks.html</loc>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/17/zendesk-platform-abused-for-email-flood-attacks/</loc>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/18/capi-backdoor-targets-russian-auto-and-e-commerce-firms-via-net-malware.html</loc>
    <lastmod>2025-10-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/18/capi-backdoor-targets-russian-auto-and-e-commerce-firms-via-net-malware/</loc>
    <lastmod>2025-10-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/18/silver-fox-expands-winos-40-attacks-to-japan-and-malaysia-with-holdinghands-rat.html</loc>
    <lastmod>2025-10-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/18/silver-fox-expands-winos-40-attacks-to-japan-and-malaysia-with-holdinghands-rat/</loc>
    <lastmod>2025-10-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/19/experian-fined-for-gdpr-violations-in-the-netherlands.html</loc>
    <lastmod>2025-10-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/19/experian-fined-for-gdpr-violations-in-the-netherlands/</loc>
    <lastmod>2025-10-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/19/openai-denies-gpt-6-release-in-2025.html</loc>
    <lastmod>2025-10-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/19/openai-denies-gpt-6-release-in-2025/</loc>
    <lastmod>2025-10-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/20/131-chrome-extensions-hijack-whatsapp-web-for-spam-campaign.html</loc>
    <lastmod>2025-10-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/20/131-chrome-extensions-hijack-whatsapp-web-for-spam-campaign/</loc>
    <lastmod>2025-10-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/20/active-directory-sync-issues-in-windows-server-2025.html</loc>
    <lastmod>2025-10-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/20/active-directory-sync-issues-in-windows-server-2025/</loc>
    <lastmod>2025-10-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/20/ai-driven-social-engineering-emerges-as-top-cyber-threat-for-2026.html</loc>
    <lastmod>2025-10-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/20/ai-driven-social-engineering-emerges-as-top-cyber-threat-for-2026/</loc>
    <lastmod>2025-10-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/20/aws-us-east-1-region-outage-affects-multiple-services.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/20/aws-us-east-1-region-outage-affects-multiple-services/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/20/bring-your-own-car-byoc-attack-demonstrated.html</loc>
    <lastmod>2025-10-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/20/bring-your-own-car-byoc-attack-demonstrated/</loc>
    <lastmod>2025-10-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/20/five-vulnerabilities-added-to-cisas-known-exploited-vulnerabilities-catalog.html</loc>
    <lastmod>2025-10-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/20/five-vulnerabilities-added-to-cisas-known-exploited-vulnerabilities-catalog/</loc>
    <lastmod>2025-10-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/20/glassworm-malware-targets-openvsx-vs-code-registries.html</loc>
    <lastmod>2026-03-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/20/glassworm-malware-targets-openvsx-vs-code-registries/</loc>
    <lastmod>2026-03-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/20/increased-use-of-clickfix-attacks-by-threat-actors.html</loc>
    <lastmod>2026-02-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/20/increased-use-of-clickfix-attacks-by-threat-actors/</loc>
    <lastmod>2026-02-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/20/lumma-stealer-activity-declines-following-doxxing-of-core-members.html</loc>
    <lastmod>2025-10-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/20/lumma-stealer-activity-declines-following-doxxing-of-core-members/</loc>
    <lastmod>2025-10-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/20/malicious-oauth-apps-in-microsoft-365-environments.html</loc>
    <lastmod>2025-10-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/20/malicious-oauth-apps-in-microsoft-365-environments/</loc>
    <lastmod>2025-10-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/20/microsoft-october-2025-updates-disable-usb-input-in-windows-recovery-environment.html</loc>
    <lastmod>2026-03-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/20/microsoft-october-2025-updates-disable-usb-input-in-windows-recovery-environment/</loc>
    <lastmod>2026-03-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/20/muji-online-sales-disrupted-by-askul-ransomware-attack.html</loc>
    <lastmod>2025-12-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/20/muji-online-sales-disrupted-by-askul-ransomware-attack/</loc>
    <lastmod>2025-12-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/20/nsa-accused-of-multi-stage-cyber-attack-on-chinas-national-time-service-center.html</loc>
    <lastmod>2025-10-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/20/nsa-accused-of-multi-stage-cyber-attack-on-chinas-national-time-service-center/</loc>
    <lastmod>2025-10-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/20/south-korean-citizens-repatriated-from-cambodia-for-online-scam-involvement.html</loc>
    <lastmod>2025-10-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/20/south-korean-citizens-repatriated-from-cambodia-for-online-scam-involvement/</loc>
    <lastmod>2025-10-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/21/34-zero-day-vulnerabilities-exploited-on-first-day-of-pwn2own-ireland-2025.html</loc>
    <lastmod>2025-10-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/21/34-zero-day-vulnerabilities-exploited-on-first-day-of-pwn2own-ireland-2025/</loc>
    <lastmod>2025-10-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/21/cursor-and-windsurf-ides-vulnerable-to-94-n-day-chromium-issues.html</loc>
    <lastmod>2025-10-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/21/cursor-and-windsurf-ides-vulnerable-to-94-n-day-chromium-issues/</loc>
    <lastmod>2025-10-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/21/dns0eu-private-dns-service-shuts-down-due-to-sustainability-issues.html</loc>
    <lastmod>2025-10-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/21/dns0eu-private-dns-service-shuts-down-due-to-sustainability-issues/</loc>
    <lastmod>2025-10-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/21/enhanced-gateway-security-strategies-for-network-protection.html</loc>
    <lastmod>2025-10-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/21/enhanced-gateway-security-strategies-for-network-protection/</loc>
    <lastmod>2025-10-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/21/meta-enhances-scam-protection-for-messenger-and-whatsapp.html</loc>
    <lastmod>2026-03-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/21/meta-enhances-scam-protection-for-messenger-and-whatsapp/</loc>
    <lastmod>2026-03-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/21/polaredge-botnet-targets-cisco-asus-qnap-synology-routers.html</loc>
    <lastmod>2025-10-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/21/polaredge-botnet-targets-cisco-asus-qnap-synology-routers/</loc>
    <lastmod>2025-10-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/21/ransomware-payouts-surge-to-36m-amid-evolving-tactics.html</loc>
    <lastmod>2025-10-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/21/ransomware-payouts-surge-to-36m-amid-evolving-tactics/</loc>
    <lastmod>2025-10-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/21/securing-ai-in-cyber-defense-operations.html</loc>
    <lastmod>2025-10-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/21/securing-ai-in-cyber-defense-operations/</loc>
    <lastmod>2025-10-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/21/sophisticated-investment-scam-impersonates-singapore-officials.html</loc>
    <lastmod>2025-10-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/21/sophisticated-investment-scam-impersonates-singapore-officials/</loc>
    <lastmod>2025-10-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/21/windows-authentication-failures-due-to-duplicate-security-identifiers.html</loc>
    <lastmod>2025-10-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/21/windows-authentication-failures-due-to-duplicate-security-identifiers/</loc>
    <lastmod>2025-10-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/22/ai-model-poisoning-with-minimal-documents.html</loc>
    <lastmod>2025-10-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/22/ai-model-poisoning-with-minimal-documents/</loc>
    <lastmod>2025-10-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/22/critical-command-injection-vulnerabilities-in-tp-link-omada-gateways.html</loc>
    <lastmod>2025-10-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/22/critical-command-injection-vulnerabilities-in-tp-link-omada-gateways/</loc>
    <lastmod>2025-10-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/22/cryptomus-fined-176m-for-facilitating-cybercrime-and-money-laundering.html</loc>
    <lastmod>2025-10-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/22/cryptomus-fined-176m-for-facilitating-cybercrime-and-money-laundering/</loc>
    <lastmod>2025-10-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/22/guidance-on-transitioning-from-passwords-to-passphrases.html</loc>
    <lastmod>2025-10-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/22/guidance-on-transitioning-from-passwords-to-passphrases/</loc>
    <lastmod>2025-10-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/22/keycard-secures-38-million-for-ai-agent-identity-infrastructure.html</loc>
    <lastmod>2025-10-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/22/keycard-secures-38-million-for-ai-agent-identity-infrastructure/</loc>
    <lastmod>2025-10-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/22/malicious-nethereum-nuget-package-exfiltrates-cryptocurrency-wallet-keys.html</loc>
    <lastmod>2025-10-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/22/malicious-nethereum-nuget-package-exfiltrates-cryptocurrency-wallet-keys/</loc>
    <lastmod>2025-10-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/22/muddywater-phishing-campaign-using-compromised-mailboxes.html</loc>
    <lastmod>2026-03-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/22/muddywater-phishing-campaign-using-compromised-mailboxes/</loc>
    <lastmod>2026-03-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/22/passiveneuron-apt-campaign-targeting-government-financial-and-industrial-sectors.html</loc>
    <lastmod>2025-10-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/22/passiveneuron-apt-campaign-targeting-government-financial-and-industrial-sectors/</loc>
    <lastmod>2025-10-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/22/pentera-resolve-automates-remediation-workflows.html</loc>
    <lastmod>2025-10-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/22/pentera-resolve-automates-remediation-workflows/</loc>
    <lastmod>2025-10-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/22/phantomcaptcha-campaign-targets-ukraine-aid-groups.html</loc>
    <lastmod>2026-02-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/22/phantomcaptcha-campaign-targets-ukraine-aid-groups/</loc>
    <lastmod>2026-02-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/22/tarmageddon-vulnerability-in-async-tar-and-tokio-tar-libraries.html</loc>
    <lastmod>2025-10-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/22/tarmageddon-vulnerability-in-async-tar-and-tokio-tar-libraries/</loc>
    <lastmod>2025-10-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/23/active-exploitation-of-critical-motex-lanscope-endpoint-manager-vulnerability.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/23/active-exploitation-of-critical-motex-lanscope-endpoint-manager-vulnerability/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/23/ai-sidebar-spoofing-vulnerability-in-atlas-and-comet-browsers.html</loc>
    <lastmod>2025-10-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/23/ai-sidebar-spoofing-vulnerability-in-atlas-and-comet-browsers/</loc>
    <lastmod>2025-10-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/23/identity-governance-for-ai-agents-in-zero-trust-architecture.html</loc>
    <lastmod>2025-10-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/23/identity-governance-for-ai-agents-in-zero-trust-architecture/</loc>
    <lastmod>2025-10-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/23/jingle-thief-targets-cloud-environments-for-gift-card-fraud.html</loc>
    <lastmod>2025-10-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/23/jingle-thief-targets-cloud-environments-for-gift-card-fraud/</loc>
    <lastmod>2025-10-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/23/lumma-stealer-operations-disrupted-by-doxxing-campaign.html</loc>
    <lastmod>2025-10-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/23/lumma-stealer-operations-disrupted-by-doxxing-campaign/</loc>
    <lastmod>2025-10-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/23/microsoft-disables-file-explorer-preview-for-downloaded-files-to-mitigate-ntlm-theft-attacks.html</loc>
    <lastmod>2025-10-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/23/microsoft-disables-file-explorer-preview-for-downloaded-files-to-mitigate-ntlm-theft-attacks/</loc>
    <lastmod>2025-10-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/23/microsoft-launches-mico-avatar-for-copilot-digital-assistant.html</loc>
    <lastmod>2025-10-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/23/microsoft-launches-mico-avatar-for-copilot-digital-assistant/</loc>
    <lastmod>2025-10-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/23/shift-from-static-secrets-to-managed-identities-in-cloud-environments.html</loc>
    <lastmod>2025-10-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/23/shift-from-static-secrets-to-managed-identities-in-cloud-environments/</loc>
    <lastmod>2025-10-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/23/unmanaged-ai-agents-pose-security-risks-in-enterprise-environments.html</loc>
    <lastmod>2025-10-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/23/unmanaged-ai-agents-pose-security-risks-in-enterprise-environments/</loc>
    <lastmod>2025-10-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/23/vidar-20-infostealer-emerges-as-lumma-stealer-declines.html</loc>
    <lastmod>2026-03-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/23/vidar-20-infostealer-emerges-as-lumma-stealer-declines/</loc>
    <lastmod>2026-03-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/24/critical-wsus-rce-vulnerability-exploited-in-the-wild.html</loc>
    <lastmod>2025-11-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/24/critical-wsus-rce-vulnerability-exploited-in-the-wild/</loc>
    <lastmod>2025-11-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/24/cybersecurity-perception-gap-between-executives-and-practitioners-identified.html</loc>
    <lastmod>2025-10-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/24/cybersecurity-perception-gap-between-executives-and-practitioners-identified/</loc>
    <lastmod>2025-10-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/24/hp-oneagent-update-deletes-microsoft-entra-id-certificates-on-ai-pcs.html</loc>
    <lastmod>2025-10-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/24/hp-oneagent-update-deletes-microsoft-entra-id-certificates-on-ai-pcs/</loc>
    <lastmod>2025-10-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/24/mass-exploitation-campaign-targets-outdated-wordpress-plugins.html</loc>
    <lastmod>2025-10-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/24/mass-exploitation-campaign-targets-outdated-wordpress-plugins/</loc>
    <lastmod>2025-10-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/24/mozilla-mandates-data-collection-disclosure-for-new-firefox-extensions.html</loc>
    <lastmod>2025-10-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/24/mozilla-mandates-data-collection-disclosure-for-new-firefox-extensions/</loc>
    <lastmod>2025-10-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/24/phishing-campaign-targets-lastpass-users-with-fake-death-claims.html</loc>
    <lastmod>2025-10-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/24/phishing-campaign-targets-lastpass-users-with-fake-death-claims/</loc>
    <lastmod>2025-10-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/24/self-service-password-resets-sspr-reduce-costs-and-improve-security.html</loc>
    <lastmod>2025-10-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/24/self-service-password-resets-sspr-reduce-costs-and-improve-security/</loc>
    <lastmod>2025-10-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/24/smishing-triads-global-phishing-campaign-targets-194000-domains.html</loc>
    <lastmod>2025-10-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/24/smishing-triads-global-phishing-campaign-targets-194000-domains/</loc>
    <lastmod>2025-10-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/24/toys-r-us-canada-data-breach-exposes-customer-information.html</loc>
    <lastmod>2025-10-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/24/toys-r-us-canada-data-breach-exposes-customer-information/</loc>
    <lastmod>2025-10-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/24/youtube-ghost-network-exploits-3000-videos-for-malware-distribution.html</loc>
    <lastmod>2025-10-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/24/youtube-ghost-network-exploits-3000-videos-for-malware-distribution/</loc>
    <lastmod>2025-10-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/25/new-cophish-technique-exploits-microsoft-copilot-for-oauth-phishing.html</loc>
    <lastmod>2025-10-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/25/new-cophish-technique-exploits-microsoft-copilot-for-oauth-phishing/</loc>
    <lastmod>2025-10-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/25/pwn2own-2025-whatsapp-exploit-withdrawal-and-low-risk-vulnerabilities-disclosed.html</loc>
    <lastmod>2025-10-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/25/pwn2own-2025-whatsapp-exploit-withdrawal-and-low-risk-vulnerabilities-disclosed/</loc>
    <lastmod>2025-10-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/26/redtiger-based-infostealer-targets-discord-accounts.html</loc>
    <lastmod>2025-10-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/26/redtiger-based-infostealer-targets-discord-accounts/</loc>
    <lastmod>2025-10-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/27/active-exploitation-of-critical-microsoft-wsus-flaw.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/27/active-exploitation-of-critical-microsoft-wsus-flaw/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/27/critical-aspnet-core-vulnerability-in-qnap-netbak-pc-agent.html</loc>
    <lastmod>2025-10-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/27/critical-aspnet-core-vulnerability-in-qnap-netbak-pc-agent/</loc>
    <lastmod>2025-10-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/27/google-ai-studio-to-enable-vibe-coding-for-video-games.html</loc>
    <lastmod>2025-10-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/27/google-ai-studio-to-enable-vibe-coding-for-video-games/</loc>
    <lastmod>2025-10-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/27/increased-caller-id-spoofing-attacks-targeting-europe.html</loc>
    <lastmod>2025-10-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/27/increased-caller-id-spoofing-attacks-targeting-europe/</loc>
    <lastmod>2025-10-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/27/increased-high-severity-vulnerabilities-and-improved-remediation-times-in-2025.html</loc>
    <lastmod>2025-10-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/27/increased-high-severity-vulnerabilities-and-improved-remediation-times-in-2025/</loc>
    <lastmod>2025-10-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/27/memento-labs-linked-to-chrome-zero-day-exploitation-in-operation-forumtroll.html</loc>
    <lastmod>2025-12-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/27/memento-labs-linked-to-chrome-zero-day-exploitation-in-operation-forumtroll/</loc>
    <lastmod>2025-12-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/27/microsoft-introduces-policy-to-remove-pre-installed-microsoft-store-apps.html</loc>
    <lastmod>2025-10-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/27/microsoft-introduces-policy-to-remove-pre-installed-microsoft-store-apps/</loc>
    <lastmod>2025-10-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/27/persistent-memory-exploit-in-chatgpt-atlas-browser.html</loc>
    <lastmod>2025-10-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/27/persistent-memory-exploit-in-chatgpt-atlas-browser/</loc>
    <lastmod>2025-10-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/27/ransomware-payment-rates-decline-to-23-in-q3-2025.html</loc>
    <lastmod>2025-10-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/27/ransomware-payment-rates-decline-to-23-in-q3-2025/</loc>
    <lastmod>2025-10-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/27/tata-consultancy-services-denies-losing-ms-contract-after-april-cyber-attack.html</loc>
    <lastmod>2025-10-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/27/tata-consultancy-services-denies-losing-ms-contract-after-april-cyber-attack/</loc>
    <lastmod>2025-10-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/27/uk-fraud-cases-surge-17-annually-in-h1-2025.html</loc>
    <lastmod>2025-10-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/27/uk-fraud-cases-surge-17-annually-in-h1-2025/</loc>
    <lastmod>2025-10-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/27/windows-11-to-prompt-for-memory-scans-after-bsod-crashes.html</loc>
    <lastmod>2025-10-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/27/windows-11-to-prompt-for-memory-scans-after-bsod-crashes/</loc>
    <lastmod>2025-10-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/27/x-security-key-re-enrollment-required-by-november-10-2025.html</loc>
    <lastmod>2025-10-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/27/x-security-key-re-enrollment-required-by-november-10-2025/</loc>
    <lastmod>2025-10-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/28/ai-driven-remediation-trust-issues-in-cybersecurity.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/28/ai-driven-remediation-trust-issues-in-cybersecurity/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/28/atroposia-malware-as-a-service-platform-discovered.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/28/atroposia-malware-as-a-service-platform-discovered/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/28/bidi-swap-url-spoofing-exploiting-bidirectional-text.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/28/bidi-swap-url-spoofing-exploiting-bidirectional-text/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/28/cybercrime-center-kk-park-in-myanmar-demolished-workers-flee-to-thailand.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/28/cybercrime-center-kk-park-in-myanmar-demolished-workers-flee-to-thailand/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/28/early-threat-detection-as-a-business-growth-strategy.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/28/early-threat-detection-as-a-business-growth-strategy/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/28/google-chrome-to-enable-https-first-mode-by-default.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/28/google-chrome-to-enable-https-first-mode-by-default/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/28/google-workspace-security-hardening-recommendations.html</loc>
    <lastmod>2026-01-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/28/google-workspace-security-hardening-recommendations/</loc>
    <lastmod>2026-01-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/28/herodotus-android-malware-evades-detection-with-human-like-typing.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/28/herodotus-android-malware-evades-detection-with-human-like-typing/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/28/increased-cryptocurrency-and-forex-investment-scams-in-asia.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/28/increased-cryptocurrency-and-forex-investment-scams-in-asia/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/28/merkle-dentsu-subsidiary-suffers-cybersecurity-incident-exposing-staff-and-client-data.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/28/merkle-dentsu-subsidiary-suffers-cybersecurity-incident-exposing-staff-and-client-data/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/28/microsoft-365-copilot-ai-integration-prompts-legal-action-in-australia.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/28/microsoft-365-copilot-ai-integration-prompts-legal-action-in-australia/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/28/microsoft-365-copilot-introduces-app-builder-and-workflows-agents.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/28/microsoft-365-copilot-introduces-app-builder-and-workflows-agents/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/28/rising-mental-health-impact-of-identity-fraud-and-scams.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/28/rising-mental-health-impact-of-identity-fraud-and-scams/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/28/sanctions-impact-on-nation-state-cyber-ecosystems.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/28/sanctions-impact-on-nation-state-cyber-ecosystems/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/28/sidewinder-adopts-clickonce-based-attack-chain-targeting-south-asian-diplomats.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/28/sidewinder-adopts-clickonce-based-attack-chain-targeting-south-asian-diplomats/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/28/teefail-attack-exploits-intel-amd-and-nvidia-cpus.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/28/teefail-attack-exploits-intel-amd-and-nvidia-cpus/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/28/teefail-side-channel-attack-targets-intel-and-amd-ddr5-secure-enclaves.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/28/teefail-side-channel-attack-targets-intel-and-amd-ddr5-secure-enclaves/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/29/2026-cybersecurity-threats-identity-based-attack-vectors.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/29/2026-cybersecurity-threats-identity-based-attack-vectors/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/29/ai-generated-code-contributes-to-security-and-technical-debt.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/29/ai-generated-code-contributes-to-security-and-technical-debt/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/29/ai-governance-gap-widens-as-businesses-prioritize-adoption-over-controls.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/29/ai-governance-gap-widens-as-businesses-prioritize-adoption-over-controls/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/29/ai-integration-in-governance-risk-and-compliance.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/29/ai-integration-in-governance-risk-and-compliance/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/29/ai-targeted-cloaking-attack-exploits-ai-crawlers.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/29/ai-targeted-cloaking-attack-exploits-ai-crawlers/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/29/anti-malware-security-and-brute-force-firewall-plugin-vulnerability-exposes-private-data.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/29/anti-malware-security-and-brute-force-firewall-plugin-vulnerability-exposes-private-data/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/29/hacktivist-intrusions-target-canadian-water-and-energy-facilities.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/29/hacktivist-intrusions-target-canadian-water-and-energy-facilities/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/29/increased-botnet-activity-targeting-php-servers-iot-devices-and-cloud-gateways.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/29/increased-botnet-activity-targeting-php-servers-iot-devices-and-cloud-gateways/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/29/malicious-npm-packages-targeting-windows-macos-and-linux-systems.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/29/malicious-npm-packages-targeting-windows-macos-and-linux-systems/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/29/merkle-breach-exposes-employee-and-client-data.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/29/merkle-breach-exposes-employee-and-client-data/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/29/microsoft-dns-outage-impacts-azure-and-microsoft-365-services.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/29/microsoft-dns-outage-impacts-azure-and-microsoft-365-services/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/29/open-source-benchmark-framework-b3-for-llm-security-in-ai-agents.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/29/open-source-benchmark-framework-b3-for-llm-security-in-ai-agents/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/29/phantomraven-npm-credential-harvesting-campaign-leverages-invisible-dependencies.html</loc>
    <lastmod>2026-03-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/29/phantomraven-npm-credential-harvesting-campaign-leverages-invisible-dependencies/</loc>
    <lastmod>2026-03-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/29/python-software-foundation-rejects-15m-nsf-grant-due-to-dei-restrictions.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/29/python-software-foundation-rejects-15m-nsf-grant-due-to-dei-restrictions/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/29/russian-actors-use-living-off-the-land-tactics-against-ukrainian-organizations.html</loc>
    <lastmod>2026-02-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/29/russian-actors-use-living-off-the-land-tactics-against-ukrainian-organizations/</loc>
    <lastmod>2026-02-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/29/visibility-gaps-in-patch-management-and-vulnerability-remediation.html</loc>
    <lastmod>2026-02-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/29/visibility-gaps-in-patch-management-and-vulnerability-remediation/</loc>
    <lastmod>2026-02-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/30/adaptixc2-framework-abused-in-ransomware-operations.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/30/adaptixc2-framework-abused-in-ransomware-operations/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/30/adaptixc2-framework-weaponized-by-russian-ransomware-groups.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/30/adaptixc2-framework-weaponized-by-russian-ransomware-groups/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/30/android-ai-defenses-blocking-10-billion-scam-messages-monthly.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/30/android-ai-defenses-blocking-10-billion-scam-messages-monthly/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/30/authentication-bypass-in-claroty-secure-remote-access.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/30/authentication-bypass-in-claroty-secure-remote-access/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/30/brash-exploit-crashes-chromium-based-browsers-via-document-title-api.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/30/brash-exploit-crashes-chromium-based-browsers-via-document-title-api/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/30/breach-and-attack-simulation-bas-adoption-in-daily-security-operations.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/30/breach-and-attack-simulation-bas-adoption-in-daily-security-operations/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/30/conduent-data-breach-affects-millions.html</loc>
    <lastmod>2026-02-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/30/conduent-data-breach-affects-millions/</loc>
    <lastmod>2026-02-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/30/critical-vulnerabilities-in-building-automation-systems-affect-global-infrastructure.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/30/critical-vulnerabilities-in-building-automation-systems-affect-global-infrastructure/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/30/critical-vulnerabilities-in-elementor-king-addons-plugin-affect-10000-wordpress-sites.html</loc>
    <lastmod>2025-12-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/30/critical-vulnerabilities-in-elementor-king-addons-plugin-affect-10000-wordpress-sites/</loc>
    <lastmod>2025-12-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/30/emerging-security-challenges-with-autonomous-ai-agents-in-enterprise-environments.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/30/emerging-security-challenges-with-autonomous-ai-agents-in-enterprise-environments/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/30/irans-mois-linked-ravin-academy-student-data-leaked.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/30/irans-mois-linked-ravin-academy-student-data-leaked/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/30/l3harris-employee-pleads-guilty-to-selling-zero-day-exploits-to-russian-entities.html</loc>
    <lastmod>2026-02-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/30/l3harris-employee-pleads-guilty-to-selling-zero-day-exploits-to-russian-entities/</loc>
    <lastmod>2026-02-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/30/malware-delivery-via-windows-native-ai-stack.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/30/malware-delivery-via-windows-native-ai-stack/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/30/microsoft-365-companion-apps-to-receive-expanded-copilot-integration.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/30/microsoft-365-companion-apps-to-receive-expanded-copilot-integration/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/30/nation-state-actors-compromise-ribbon-communications-network.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/30/nation-state-actors-compromise-ribbon-communications-network/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/30/netsupport-rat-campaigns-exploit-clickfix-lures.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/30/netsupport-rat-campaigns-exploit-clickfix-lures/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/30/nfc-relay-malware-surge-targeting-european-payment-cards.html</loc>
    <lastmod>2026-01-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/30/nfc-relay-malware-surge-targeting-european-payment-cards/</loc>
    <lastmod>2026-01-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/30/phishing-campaign-targets-finance-executives-with-fake-linkedin-board-invites.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/30/phishing-campaign-targets-finance-executives-with-fake-linkedin-board-invites/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/30/proton-data-breach-observatory-identifies-300-million-compromised-records-in-2025.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/30/proton-data-breach-observatory-identifies-300-million-compromised-records-in-2025/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/30/unapproved-ai-tools-in-use-by-27-of-employees.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/30/unapproved-ai-tools-in-use-by-27-of-employees/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/30/whatsapp-introduces-passkey-encrypted-chat-backups-for-ios-and-android.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/30/whatsapp-introduces-passkey-encrypted-chat-backups-for-ios-and-android/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/31/airstalk-malware-linked-to-supply-chain-attack.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/31/airstalk-malware-linked-to-supply-chain-attack/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/31/chinese-state-sponsored-group-exploits-windows-zero-day-in-espionage-campaign-against-european-diplomats.html</loc>
    <lastmod>2026-02-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/31/chinese-state-sponsored-group-exploits-windows-zero-day-in-espionage-campaign-against-european-diplomats/</loc>
    <lastmod>2026-02-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/31/cisco-ios-xe-devices-in-australia-targeted-by-badcandy-webshell.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/31/cisco-ios-xe-devices-in-australia-targeted-by-badcandy-webshell/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/31/clearview-ai-faces-criminal-complaint-in-austria.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/31/clearview-ai-faces-criminal-complaint-in-austria/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/31/conti-ransomware-member-extradited-from-ireland-to-us.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/31/conti-ransomware-member-extradited-from-ireland-to-us/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/31/google-search-ai-mode-to-access-user-data-for-enhanced-personalization.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/31/google-search-ai-mode-to-access-user-data-for-enhanced-personalization/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/31/increased-digital-authoritarianism-and-surveillance.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/31/increased-digital-authoritarianism-and-surveillance/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/31/jamf-acquired-by-francisco-partners-in-22-billion-deal.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/31/jamf-acquired-by-francisco-partners-in-22-billion-deal/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/31/managed-service-providers-msps-enhance-cybersecurity-offerings-to-drive-growth.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/31/managed-service-providers-msps-enhance-cybersecurity-offerings-to-drive-growth/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/31/meduza-stealer-malware-admins-arrested-in-russia.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/31/meduza-stealer-malware-admins-arrested-in-russia/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/31/microsoft-edge-scareware-sensor-enhances-scam-detection.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/31/microsoft-edge-scareware-sensor-enhances-scam-detection/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/31/openais-aardvark-agent-for-automated-code-vulnerability-detection-and-patching.html</loc>
    <lastmod>2026-03-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/31/openais-aardvark-agent-for-automated-code-vulnerability-detection-and-patching/</loc>
    <lastmod>2026-03-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/31/privilege-escalation-vulnerability-in-linux-kernel-exploited-in-ransomware-attacks.html</loc>
    <lastmod>2026-03-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/31/privilege-escalation-vulnerability-in-linux-kernel-exploited-in-ransomware-attacks/</loc>
    <lastmod>2026-03-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/31/russian-hackers-exploit-password-vulnerabilities-in-microsoft-breach.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/31/russian-hackers-exploit-password-vulnerabilities-in-microsoft-breach/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/31/threatlocker-dac-for-macos-beta-release.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/31/threatlocker-dac-for-macos-beta-release/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/31/university-of-pennsylvania-suffers-email-compromise-and-harassment-campaign.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/31/university-of-pennsylvania-suffers-email-compromise-and-harassment-campaign/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/31/unmanaged-legacy-assets-and-zombie-projects-expand-attack-surfaces.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/31/unmanaged-legacy-assets-and-zombie-projects-expand-attack-surfaces/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/31/windows-11-shared-audio-feature-for-ai-pcs.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/10/31/windows-11-shared-audio-feature-for-ai-pcs/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/01/google-confirms-ads-in-ai-search-with-personalized-experiences.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/01/google-confirms-ads-in-ai-search-with-personalized-experiences/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/01/openai-considers-memory-based-ads-for-chatgpt.html</loc>
    <lastmod>2026-02-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/01/openai-considers-memory-based-ads-for-chatgpt/</loc>
    <lastmod>2026-02-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/01/windows-11-build-262207051-introduces-new-features-for-insiders.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/01/windows-11-build-262207051-introduces-new-features-for-insiders/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/02/jabber-zeus-developer-mricq-extradited-to-us.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/02/jabber-zeus-developer-mricq-extradited-to-us/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/03/balancer-defi-protocol-exploit-results-in-over-128-million-loss.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/03/balancer-defi-protocol-exploit-results-in-over-128-million-loss/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/03/bankbot-ynrk-and-deliveryrat-android-trojans-stealing-financial-data.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/03/bankbot-ynrk-and-deliveryrat-android-trojans-stealing-financial-data/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/03/blackcat-ransomware-attacks-by-former-cybersecurity-experts.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/03/blackcat-ransomware-attacks-by-former-cybersecurity-experts/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/03/continuous-exposure-management-enhances-soc-operations.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/03/continuous-exposure-management-enhances-soc-operations/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/03/httptroy-backdoor-deployed-in-targeted-south-korean-cyberattack.html</loc>
    <lastmod>2026-01-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/03/httptroy-backdoor-deployed-in-targeted-south-korean-cyberattack/</loc>
    <lastmod>2026-01-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/03/increased-physical-and-cyber-threats-to-us-power-grid.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/03/increased-physical-and-cyber-threats-to-us-power-grid/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/03/malicious-vsx-extension-sleepyduck-targets-solidity-developers.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/03/malicious-vsx-extension-sleepyduck-targets-solidity-developers/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/03/north-korean-threat-actor-bluenoroff-targets-web3-sector.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/03/north-korean-threat-actor-bluenoroff-targets-web3-sector/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/03/ransomware-victims-in-europe-increase-by-13-in-2024-2025.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/03/ransomware-victims-in-europe-increase-by-13-in-2024-2025/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/03/rmm-software-exploited-in-logistics-and-freight-network-intrusions.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/03/rmm-software-exploited-in-logistics-and-freight-network-intrusions/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/03/sesameop-malware-leverages-openai-assistants-api-for-command-and-control.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/03/sesameop-malware-leverages-openai-assistants-api-for-command-and-control/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/03/trufflenet-attack-campaign-targeting-aws-environments.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/03/trufflenet-attack-campaign-targeting-aws-environments/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/04/apache-openoffice-denies-akira-ransomware-breach-claims.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/04/apache-openoffice-denies-akira-ransomware-breach-claims/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/04/balancer-v2-composable-stable-pools-exploited-in-120m-defi-attack.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/04/balancer-v2-composable-stable-pools-exploited-in-120m-defi-attack/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/04/browser-sandbox-threats-bypassing-modern-security-tools.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/04/browser-sandbox-threats-bypassing-modern-security-tools/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/04/cryptocurrency-fraud-network-dismantled-by-european-authorities.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/04/cryptocurrency-fraud-network-dismantled-by-european-authorities/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/04/dragonforce-cartel-ransomware-emerges-with-conti-derived-encryption.html</loc>
    <lastmod>2026-02-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/04/dragonforce-cartel-ransomware-emerges-with-conti-derived-encryption/</loc>
    <lastmod>2026-02-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/04/five-webkit-vulnerabilities-discovered-in-apple-safari.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/04/five-webkit-vulnerabilities-discovered-in-apple-safari/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/04/identity-related-weaknesses-drive-cloud-attack-surge.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/04/identity-related-weaknesses-drive-cloud-attack-surge/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/04/jobmonster-wordpress-theme-authentication-bypass-exploits.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/04/jobmonster-wordpress-theme-authentication-bypass-exploits/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/04/malicious-android-apps-on-google-play-downloaded-42-million-times.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/04/malicious-android-apps-on-google-play-downloaded-42-million-times/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/04/microsoft-to-remove-defender-application-guard-from-office-by-december-2027.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/04/microsoft-to-remove-defender-application-guard-from-office-by-december-2027/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/04/multiple-microsoft-teams-vulnerabilities-enable-impersonation-and-message-tampering.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/04/multiple-microsoft-teams-vulnerabilities-enable-impersonation-and-message-tampering/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/04/nikkei-slack-platform-breach-exposes-17000-peoples-data.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/04/nikkei-slack-platform-breach-exposes-17000-peoples-data/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/04/operation-skycloak-targets-defense-sectors-with-tor-enabled-openssh-backdoor.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/04/operation-skycloak-targets-defense-sectors-with-tor-enabled-openssh-backdoor/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/04/post-smtp-plugin-vulnerability-exploited-to-hijack-wordpress-admin-accounts.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/04/post-smtp-plugin-vulnerability-exploited-to-hijack-wordpress-admin-accounts/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/04/ransomware-groups-success-factors-and-tactics.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/04/ransomware-groups-success-factors-and-tactics/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/04/react-native-cli-remote-code-execution-vulnerability-cve-2025-11953.html</loc>
    <lastmod>2026-02-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/04/react-native-cli-remote-code-execution-vulnerability-cve-2025-11953/</loc>
    <lastmod>2026-02-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/04/scattered-spider-shinyhunters-and-lapsus-form-unified-cyber-extortion-collective.html</loc>
    <lastmod>2025-11-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/04/scattered-spider-shinyhunters-and-lapsus-form-unified-cyber-extortion-collective/</loc>
    <lastmod>2025-11-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/04/startup-ai-app-spending-trends-reveal-security-tool-oversight.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/04/startup-ai-app-spending-trends-reveal-security-tool-oversight/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/04/us-cybersecurity-insiders-indicted-for-blackcat-ransomware-attacks.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/04/us-cybersecurity-insiders-indicted-for-blackcat-ransomware-attacks/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/04/wazuh-xdr-siem-platform-for-ransomware-defense.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/04/wazuh-xdr-siem-platform-for-ransomware-defense/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/04/windows-10-update-bug-triggers-incorrect-end-of-support-alerts.html</loc>
    <lastmod>2025-11-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/04/windows-10-update-bug-triggers-incorrect-end-of-support-alerts/</loc>
    <lastmod>2025-11-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/05/ai-integration-challenges-for-cisos-in-2025.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/05/ai-integration-challenges-for-cisos-in-2025/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/05/ai-powered-malware-families-deployed-in-the-wild.html</loc>
    <lastmod>2026-02-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/05/ai-powered-malware-families-deployed-in-the-wild/</loc>
    <lastmod>2026-02-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/05/critical-remote-command-execution-vulnerability-exploited-in-centos-web-panel.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/05/critical-remote-command-execution-vulnerability-exploited-in-centos-web-panel/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/05/decline-in-sms-fraud-losses-projected-for-2026.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/05/decline-in-sms-fraud-losses-projected-for-2026/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/05/indirect-prompt-injection-vulnerabilities-in-chatgpt-models.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/05/indirect-prompt-injection-vulnerabilities-in-chatgpt-models/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/05/international-law-enforcement-dismantles-credit-card-fraud-networks.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/05/international-law-enforcement-dismantles-credit-card-fraud-networks/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/05/iranian-apt-phishing-campaign-targets-us-think-tanks.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/05/iranian-apt-phishing-campaign-targets-us-think-tanks/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/05/manufacturing-sector-faces-persistent-ot-security-challenges.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/05/manufacturing-sector-faces-persistent-ot-security-challenges/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/05/microsoft-store-multi-app-installer-feature-for-windows-11.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/05/microsoft-store-multi-app-installer-feature-for-windows-11/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/05/october-2025-windows-updates-trigger-bitlocker-recovery-on-intel-devices.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/05/october-2025-windows-updates-trigger-bitlocker-recovery-on-intel-devices/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/05/outpost24-compassdrp-integrates-easm-and-drp-for-unified-digital-risk-management.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/05/outpost24-compassdrp-integrates-easm-and-drp-for-unified-digital-risk-management/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/05/prompt-injection-vulnerabilities-in-anthropics-claude-desktop-extensions.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/05/prompt-injection-vulnerabilities-in-anthropics-claude-desktop-extensions/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/05/samsung-knox-enhances-android-security-for-enterprise.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/05/samsung-knox-enhances-android-security-for-enterprise/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/05/soc-burnout-mitigation-strategies.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/05/soc-burnout-mitigation-strategies/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/05/supply-chain-risk-in-advanced-installer-update-tool.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/05/supply-chain-risk-in-advanced-installer-update-tool/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/05/uk-mobile-carriers-to-block-spoofed-phone-numbers-in-fraud-crackdown.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/05/uk-mobile-carriers-to-block-spoofed-phone-numbers-in-fraud-crackdown/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/05/us-sanctions-north-korean-entities-and-individuals-for-cybercrime-and-it-worker-fraud.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/05/us-sanctions-north-korean-entities-and-individuals-for-cybercrime-and-it-worker-fraud/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/06/adaptive-multi-turn-attacks-bypass-defenses-in-open-weight-llms.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/06/adaptive-multi-turn-attacks-bypass-defenses-in-open-weight-llms/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/06/agentic-ai-systems-introduce-new-cybersecurity-challenges.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/06/agentic-ai-systems-introduce-new-cybersecurity-challenges/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/06/anticipated-rise-of-cyber-physical-attacks-on-european-critical-infrastructure-in-2026.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/06/anticipated-rise-of-cyber-physical-attacks-on-european-critical-infrastructure-in-2026/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/06/bitdefender-recognized-as-representative-vendor-in-2025-gartner-market-guide-for-managed-detection-and-response.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/06/bitdefender-recognized-as-representative-vendor-in-2025-gartner-market-guide-for-managed-detection-and-response/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/06/critical-cisco-uccx-rmi-vulnerability-exploitable-for-root-command-execution.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/06/critical-cisco-uccx-rmi-vulnerability-exploitable-for-root-command-execution/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/06/curly-comrades-use-hyper-v-to-hide-linux-vm-and-evade-edr-detection.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/06/curly-comrades-use-hyper-v-to-hide-linux-vm-and-evade-edr-detection/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/06/hacktivist-driven-ddos-attacks-dominate-public-sector-cyber-incidents.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/06/hacktivist-driven-ddos-attacks-dominate-public-sector-cyber-incidents/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/06/increased-regulatory-focus-on-cyber-resilience-in-financial-services.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/06/increased-regulatory-focus-on-cyber-resilience-in-financial-services/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/06/purple-teaming-with-breach-and-attack-simulation-bas-for-continuous-cyber-defense.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/06/purple-teaming-with-breach-and-attack-simulation-bas-for-continuous-cyber-defense/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/06/sora-2-ai-video-generation-model-enhances-deepfake-risks.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/06/sora-2-ai-video-generation-model-enhances-deepfake-risks/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/06/truffle-security-secures-25-million-for-secret-scanning-enhancements.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/06/truffle-security-secures-25-million-for-secret-scanning-enhancements/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/06/windows-gdi-vulnerabilities-resurface.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/06/windows-gdi-vulnerabilities-resurface/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/07/ai-security-agents-with-synthetic-personas-introduce-operational-and-security-challenges.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/07/ai-security-agents-with-synthetic-personas-introduce-operational-and-security-challenges/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/07/china-linked-threat-actor-targets-us-non-profit-with-legacy-exploits.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/07/china-linked-threat-actor-targets-us-non-profit-with-legacy-exploits/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/07/credential-compromise-lifecycle-and-enterprise-risks.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/07/credential-compromise-lifecycle-and-enterprise-risks/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/07/discord-breach-highlights-risks-of-mandated-id-data-collection.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/07/discord-breach-highlights-risks-of-mandated-id-data-collection/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/07/google-maps-introduces-extortion-reporting-feature-for-businesses.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/07/google-maps-introduces-extortion-reporting-feature-for-businesses/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/07/google-prepares-gemini-3-pro-and-nano-banana-2-ai-models-for-release.html</loc>
    <lastmod>2025-11-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/07/google-prepares-gemini-3-pro-and-nano-banana-2-ai-models-for-release/</loc>
    <lastmod>2025-11-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/07/landfall-android-spyware-exploits-samsung-zero-day-via-whatsapp.html</loc>
    <lastmod>2025-11-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/07/landfall-android-spyware-exploits-samsung-zero-day-via-whatsapp/</loc>
    <lastmod>2025-11-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/07/microsoft-enhances-quick-machine-recovery-in-windows-11.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/07/microsoft-enhances-quick-machine-recovery-in-windows-11/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/07/misinterpretation-of-radical-empowerment-in-cybersecurity-leadership.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/07/misinterpretation-of-radical-empowerment-in-cybersecurity-leadership/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/07/qnap-patches-seven-zero-day-vulnerabilities-exploited-at-pwn2own-ireland-2025.html</loc>
    <lastmod>2025-11-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/07/qnap-patches-seven-zero-day-vulnerabilities-exploited-at-pwn2own-ireland-2025/</loc>
    <lastmod>2025-11-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/08/whisper-leak-attack-exposes-ai-chat-topic-inference-via-encrypted-traffic.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/08/whisper-leak-attack-exposes-ai-chat-topic-inference-via-encrypted-traffic/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/09/critical-runc-vulnerabilities-enable-container-escape-to-host-system.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/09/critical-runc-vulnerabilities-enable-container-escape-to-host-system/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/09/nakivo-backup-replication-v111-enhances-disaster-recovery-and-msp-features.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/09/nakivo-backup-replication-v111-enhances-disaster-recovery-and-msp-features/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/09/openai-prepares-gpt-51-family-release.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/09/openai-prepares-gpt-51-family-release/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/09/phishing-scam-targets-iphone-users-via-find-my-lock-screen-messages.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/09/phishing-scam-targets-iphone-users-via-find-my-lock-screen-messages/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/09/us-proposed-ban-on-tp-link-networking-gear.html</loc>
    <lastmod>2026-02-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/09/us-proposed-ban-on-tp-link-networking-gear/</loc>
    <lastmod>2026-02-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/10/65-of-leading-ai-companies-leak-sensitive-secrets-on-github.html</loc>
    <lastmod>2025-11-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/10/65-of-leading-ai-companies-leak-sensitive-secrets-on-github/</loc>
    <lastmod>2025-11-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/10/critical-rce-flaw-in-expr-eval-javascript-library.html</loc>
    <lastmod>2025-11-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/10/critical-rce-flaw-in-expr-eval-javascript-library/</loc>
    <lastmod>2025-11-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/10/curly-comrades-exploits-hyper-v-to-hide-malware-in-linux-vms.html</loc>
    <lastmod>2025-11-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/10/curly-comrades-exploits-hyper-v-to-hide-malware-in-linux-vms/</loc>
    <lastmod>2025-11-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/10/emerging-browser-security-threats-in-enterprise-environments.html</loc>
    <lastmod>2025-11-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/10/emerging-browser-security-threats-in-enterprise-environments/</loc>
    <lastmod>2025-11-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/10/linkedin-phishing-campaigns-targeting-enterprises.html</loc>
    <lastmod>2025-11-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/10/linkedin-phishing-campaigns-targeting-enterprises/</loc>
    <lastmod>2025-11-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/10/nca-launches-campaign-against-crypto-investment-scams-targeting-men-under-45.html</loc>
    <lastmod>2025-11-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/10/nca-launches-campaign-against-crypto-investment-scams-targeting-men-under-45/</loc>
    <lastmod>2025-11-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/10/ncsc-to-retire-web-check-and-mail-check-tools-by-march-2026.html</loc>
    <lastmod>2025-11-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/10/ncsc-to-retire-web-check-and-mail-check-tools-by-march-2026/</loc>
    <lastmod>2025-11-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/10/windows-11-start-menu-redesign-rolling-out.html</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/10/windows-11-start-menu-redesign-rolling-out/</loc>
    <lastmod>2025-11-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/10/yanluowang-ransomware-initial-access-broker-pleads-guilty.html</loc>
    <lastmod>2026-03-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/10/yanluowang-ransomware-initial-access-broker-pleads-guilty/</loc>
    <lastmod>2026-03-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/11/ai-enabled-supply-chain-attacks-surge-156-in-2024.html</loc>
    <lastmod>2025-11-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/11/ai-enabled-supply-chain-attacks-surge-156-in-2024/</loc>
    <lastmod>2025-11-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/11/firefox-145-introduces-advanced-anti-fingerprinting-measures.html</loc>
    <lastmod>2025-11-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/11/firefox-145-introduces-advanced-anti-fingerprinting-measures/</loc>
    <lastmod>2025-11-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/11/gootloader-resurfaces-with-new-font-obfuscation-and-zip-evasion-tactics.html</loc>
    <lastmod>2026-01-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/11/gootloader-resurfaces-with-new-font-obfuscation-and-zip-evasion-tactics/</loc>
    <lastmod>2026-01-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/11/microsoft-releases-emergency-update-for-windows-10-esu-enrollment-bug.html</loc>
    <lastmod>2025-11-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/11/microsoft-releases-emergency-update-for-windows-10-esu-enrollment-bug/</loc>
    <lastmod>2025-11-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/11/military-veterans-transitioning-into-cybersecurity-roles.html</loc>
    <lastmod>2025-11-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/11/military-veterans-transitioning-into-cybersecurity-roles/</loc>
    <lastmod>2025-11-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/11/webinar-on-modern-patch-management-strategies.html</loc>
    <lastmod>2025-11-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/11/webinar-on-modern-patch-management-strategies/</loc>
    <lastmod>2025-11-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/12/active-directory-security-vulnerabilities-and-mitigation-strategies.html</loc>
    <lastmod>2025-11-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/12/active-directory-security-vulnerabilities-and-mitigation-strategies/</loc>
    <lastmod>2025-11-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/12/bitdefender-introduces-dynamic-attack-surface-reduction-dasr-webinar.html</loc>
    <lastmod>2025-11-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/12/bitdefender-introduces-dynamic-attack-surface-reduction-dasr-webinar/</loc>
    <lastmod>2025-11-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/12/danabot-malware-resurfaces-with-new-version-669.html</loc>
    <lastmod>2025-11-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/12/danabot-malware-resurfaces-with-new-version-669/</loc>
    <lastmod>2025-11-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/12/google-introduces-private-ai-compute-for-secure-cloud-based-ai-processing.html</loc>
    <lastmod>2025-11-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/12/google-introduces-private-ai-compute-for-secure-cloud-based-ai-processing/</loc>
    <lastmod>2025-11-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/12/high-severity-vulnerabilities-patched-in-ivanti-endpoint-manager-and-zoom-clients.html</loc>
    <lastmod>2025-11-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/12/high-severity-vulnerabilities-patched-in-ivanti-endpoint-manager-and-zoom-clients/</loc>
    <lastmod>2025-11-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/12/uk-cyber-insurance-payouts-increase-230-due-to-rising-threats.html</loc>
    <lastmod>2025-11-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/12/uk-cyber-insurance-payouts-increase-230-due-to-rising-threats/</loc>
    <lastmod>2025-11-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/12/uk-introduces-cyber-security-and-resilience-bill-to-strengthen-national-defenses.html</loc>
    <lastmod>2026-01-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/12/uk-introduces-cyber-security-and-resilience-bill-to-strengthen-national-defenses/</loc>
    <lastmod>2026-01-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/12/windows-11-adds-third-party-passkey-manager-support.html</loc>
    <lastmod>2025-11-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/12/windows-11-adds-third-party-passkey-manager-support/</loc>
    <lastmod>2025-11-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/12/windows-task-manager-bug-fixed-in-november-update.html</loc>
    <lastmod>2025-11-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/12/windows-task-manager-bug-fixed-in-november-update/</loc>
    <lastmod>2025-11-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/12/zero-trust-principles-extended-to-ai-agents.html</loc>
    <lastmod>2025-11-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/12/zero-trust-principles-extended-to-ai-agents/</loc>
    <lastmod>2025-11-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/13/accelerated-exploitation-of-new-vulnerabilities-in-2025.html</loc>
    <lastmod>2026-02-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/13/accelerated-exploitation-of-new-vulnerabilities-in-2025/</loc>
    <lastmod>2026-02-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/13/ciso-compensation-rises-67-despite-slower-budget-growth.html</loc>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/13/ciso-compensation-rises-67-despite-slower-budget-growth/</loc>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/13/high-severity-flaws-patched-in-firefox-145-and-chrome-142.html</loc>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/13/high-severity-flaws-patched-in-firefox-145-and-chrome-142/</loc>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/13/international-law-enforcement-disrupts-rhadamanthys-venomrat-and-elysium-malware-operations.html</loc>
    <lastmod>2025-11-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/13/international-law-enforcement-disrupts-rhadamanthys-venomrat-and-elysium-malware-operations/</loc>
    <lastmod>2025-11-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/13/kerberoasting-attacks-targeting-active-directory-service-accounts.html</loc>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/13/kerberoasting-attacks-targeting-active-directory-service-accounts/</loc>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/13/malicious-chrome-extension-safery-steals-ethereum-seed-phrases-via-sui-blockchain.html</loc>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/13/malicious-chrome-extension-safery-steals-ethereum-seed-phrases-via-sui-blockchain/</loc>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/13/massive-npm-registry-spam-campaign-with-46000-fake-packages.html</loc>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/13/massive-npm-registry-spam-campaign-with-46000-fake-packages/</loc>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/13/microsoft-introduces-screen-capture-prevention-for-teams-premium.html</loc>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/13/microsoft-introduces-screen-capture-prevention-for-teams-premium/</loc>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/13/organizations-adopt-passwordless-authentication-to-mitigate-weak-password-risks.html</loc>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/13/organizations-adopt-passwordless-authentication-to-mitigate-weak-password-risks/</loc>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/13/remote-code-execution-vulnerability-in-imunifyav-ai-bolit.html</loc>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/13/remote-code-execution-vulnerability-in-imunifyav-ai-bolit/</loc>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/13/synnovis-ransomware-attack-data-breach-notification-delayed-over-a-year.html</loc>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/13/synnovis-ransomware-attack-data-breach-notification-delayed-over-a-year/</loc>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/13/techuk-advocates-for-cross-sector-collaboration-to-combat-rising-fraud.html</loc>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/13/techuk-advocates-for-cross-sector-collaboration-to-combat-rising-fraud/</loc>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/13/uhale-android-based-photo-frames-deliver-malware-on-boot.html</loc>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/13/uhale-android-based-photo-frames-deliver-malware-on-boot/</loc>
    <lastmod>2025-11-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/14/critical-authentication-bypass-flaw-in-asus-dsl-routers.html</loc>
    <lastmod>2025-11-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/14/critical-authentication-bypass-flaw-in-asus-dsl-routers/</loc>
    <lastmod>2025-11-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/14/doordash-data-breach-exposed-user-contact-information.html</loc>
    <lastmod>2025-11-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/14/doordash-data-breach-exposed-user-contact-information/</loc>
    <lastmod>2025-11-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/14/kraken-ransomware-implements-system-benchmarking-for-encryption-optimization.html</loc>
    <lastmod>2025-11-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/14/kraken-ransomware-implements-system-benchmarking-for-encryption-optimization/</loc>
    <lastmod>2025-11-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/14/shadowmq-vulnerabilities-in-ai-inference-frameworks.html</loc>
    <lastmod>2025-12-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/14/shadowmq-vulnerabilities-in-ai-inference-frameworks/</loc>
    <lastmod>2025-12-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/14/shinyhunters-breach-affects-checkoutcom-legacy-cloud-storage.html</loc>
    <lastmod>2025-11-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/14/shinyhunters-breach-affects-checkoutcom-legacy-cloud-storage/</loc>
    <lastmod>2025-11-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/16/google-to-flag-android-apps-with-excessive-battery-drain.html</loc>
    <lastmod>2025-11-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/16/google-to-flag-android-apps-with-excessive-battery-drain/</loc>
    <lastmod>2025-11-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/17/android-memory-safety-bugs-fall-below-20-due-to-rust-adoption.html</loc>
    <lastmod>2025-11-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/17/android-memory-safety-bugs-fall-below-20-due-to-rust-adoption/</loc>
    <lastmod>2025-11-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/17/eurofiber-france-data-breach-via-ticket-management-system-exploit.html</loc>
    <lastmod>2025-11-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/17/eurofiber-france-data-breach-via-ticket-management-system-exploit/</loc>
    <lastmod>2025-11-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/17/europol-and-eight-countries-remove-thousands-of-extremist-links-from-gaming-platforms.html</loc>
    <lastmod>2025-11-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/17/europol-and-eight-countries-remove-thousands-of-extremist-links-from-gaming-platforms/</loc>
    <lastmod>2025-11-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/17/microsoft-365-desktop-app-installation-blocked-due-to-authentication-misconfiguration.html</loc>
    <lastmod>2025-12-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/17/microsoft-365-desktop-app-installation-blocked-due-to-authentication-misconfiguration/</loc>
    <lastmod>2025-12-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/17/princeton-university-database-compromised-in-phishing-attack.html</loc>
    <lastmod>2025-11-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/17/princeton-university-database-compromised-in-phishing-attack/</loc>
    <lastmod>2025-11-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/17/stagnation-in-cyber-readiness-despite-confidence-in-incident-response.html</loc>
    <lastmod>2025-11-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/17/stagnation-in-cyber-readiness-despite-confidence-in-incident-response/</loc>
    <lastmod>2025-11-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/18/cloudflare-global-network-outage-affects-multiple-services.html</loc>
    <lastmod>2025-11-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/18/cloudflare-global-network-outage-affects-multiple-services/</loc>
    <lastmod>2025-11-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/18/fortiweb-zero-day-exploitation-cve-2025-58034.html</loc>
    <lastmod>2025-11-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/18/fortiweb-zero-day-exploitation-cve-2025-58034/</loc>
    <lastmod>2025-11-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/18/half-a-million-stolen-ftse-100-credentials-discovered-on-criminal-sites.html</loc>
    <lastmod>2025-11-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/18/half-a-million-stolen-ftse-100-credentials-discovered-on-criminal-sites/</loc>
    <lastmod>2025-11-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/18/malicious-npm-packages-redirecting-users-to-crypto-sites.html</loc>
    <lastmod>2025-11-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/18/malicious-npm-packages-redirecting-users-to-crypto-sites/</loc>
    <lastmod>2025-11-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/18/meta-enhances-whatsapp-security-with-research-proxy-and-anti-scraping-measures.html</loc>
    <lastmod>2025-11-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/18/meta-enhances-whatsapp-security-with-research-proxy-and-anti-scraping-measures/</loc>
    <lastmod>2025-11-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/18/microsoft-integrates-sysmon-natively-into-windows-11-and-server-2025.html</loc>
    <lastmod>2026-03-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/18/microsoft-integrates-sysmon-natively-into-windows-11-and-server-2025/</loc>
    <lastmod>2026-03-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/18/microsoft-introduces-cloud-rebuild-and-point-in-time-restore-for-windows-11.html</loc>
    <lastmod>2025-11-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/18/microsoft-introduces-cloud-rebuild-and-point-in-time-restore-for-windows-11/</loc>
    <lastmod>2025-11-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/18/microsoft-teams-adds-false-positive-reporting-for-threat-alerts.html</loc>
    <lastmod>2025-11-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/18/microsoft-teams-adds-false-positive-reporting-for-threat-alerts/</loc>
    <lastmod>2025-11-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/18/pajemploi-data-breach-exposes-12m-individuals-personal-information.html</loc>
    <lastmod>2026-02-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/18/pajemploi-data-breach-exposes-12m-individuals-personal-information/</loc>
    <lastmod>2026-02-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/18/rise-in-ai-driven-digital-forgeries-and-biometric-fraud.html</loc>
    <lastmod>2025-11-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/18/rise-in-ai-driven-digital-forgeries-and-biometric-fraud/</loc>
    <lastmod>2025-11-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/18/shadowray-20-campaign-hijacks-ray-clusters-for-cryptomining-and-ddos-attacks.html</loc>
    <lastmod>2025-11-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/18/shadowray-20-campaign-hijacks-ray-clusters-for-cryptomining-and-ddos-attacks/</loc>
    <lastmod>2025-11-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/18/tuoni-c2-framework-used-in-unsuccessful-real-estate-cyber-intrusion.html</loc>
    <lastmod>2025-11-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/18/tuoni-c2-framework-used-in-unsuccessful-real-estate-cyber-intrusion/</loc>
    <lastmod>2025-11-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/19/active-exploitation-of-7-zip-symbolic-link-rce-vulnerability-cve-2025-11001.html</loc>
    <lastmod>2025-11-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/19/active-exploitation-of-7-zip-symbolic-link-rce-vulnerability-cve-2025-11001/</loc>
    <lastmod>2025-11-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/19/cisa-releases-guide-to-mitigate-bulletproof-hosting-threats.html</loc>
    <lastmod>2025-11-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/19/cisa-releases-guide-to-mitigate-bulletproof-hosting-threats/</loc>
    <lastmod>2025-11-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/19/cisa-releases-uas-threat-mitigation-guides-for-critical-infrastructure.html</loc>
    <lastmod>2025-11-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/19/cisa-releases-uas-threat-mitigation-guides-for-critical-infrastructure/</loc>
    <lastmod>2025-11-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/19/crypto-laundering-scheme-involving-230m-heist-uncovered.html</loc>
    <lastmod>2025-11-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/19/crypto-laundering-scheme-involving-230m-heist-uncovered/</loc>
    <lastmod>2025-11-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/19/devops-stack-security-risks-and-mitigation-strategies.html</loc>
    <lastmod>2025-11-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/19/devops-stack-security-risks-and-mitigation-strategies/</loc>
    <lastmod>2025-11-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/19/europol-disrupts-55m-in-cryptocurrency-linked-to-online-piracy.html</loc>
    <lastmod>2025-11-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/19/europol-disrupts-55m-in-cryptocurrency-linked-to-online-piracy/</loc>
    <lastmod>2025-11-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/19/google-integrates-gemini-3-into-ai-mode-for-interactive-ui-generation.html</loc>
    <lastmod>2025-11-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/19/google-integrates-gemini-3-into-ai-mode-for-interactive-ui-generation/</loc>
    <lastmod>2025-11-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/19/googles-gemini-3-pro-demonstrates-advanced-game-creation-capabilities.html</loc>
    <lastmod>2025-11-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/19/googles-gemini-3-pro-demonstrates-advanced-game-creation-capabilities/</loc>
    <lastmod>2025-11-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/19/plushdaemon-hijacks-software-updates-in-supply-chain-attacks.html</loc>
    <lastmod>2025-11-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/19/plushdaemon-hijacks-software-updates-in-supply-chain-attacks/</loc>
    <lastmod>2025-11-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/19/sanctions-imposed-on-russian-bulletproof-hosting-provider-media-land-over-ransomware-support.html</loc>
    <lastmod>2025-11-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/19/sanctions-imposed-on-russian-bulletproof-hosting-provider-media-land-over-ransomware-support/</loc>
    <lastmod>2025-11-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/19/servicenow-now-assist-ai-agents-vulnerable-to-second-order-prompt-injection.html</loc>
    <lastmod>2026-01-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/19/servicenow-now-assist-ai-agents-vulnerable-to-second-order-prompt-injection/</loc>
    <lastmod>2026-01-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/19/shinysp1d3r-ransomware-as-a-service-emerges-from-shinyhunters.html</loc>
    <lastmod>2025-11-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/19/shinysp1d3r-ransomware-as-a-service-emerges-from-shinyhunters/</loc>
    <lastmod>2025-11-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/19/threatlocker-ringfencing-for-application-containment.html</loc>
    <lastmod>2025-11-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/19/threatlocker-ringfencing-for-application-containment/</loc>
    <lastmod>2025-11-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/19/thunderbird-145-adds-native-microsoft-exchange-support-via-ews.html</loc>
    <lastmod>2025-11-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/19/thunderbird-145-adds-native-microsoft-exchange-support-via-ews/</loc>
    <lastmod>2025-11-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/19/w3-total-cache-wordpress-plugin-command-injection-vulnerability.html</loc>
    <lastmod>2025-11-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/19/w3-total-cache-wordpress-plugin-command-injection-vulnerability/</loc>
    <lastmod>2025-11-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/20/97-of-organizations-impacted-by-supply-chain-breaches-in-2025.html</loc>
    <lastmod>2025-11-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/20/97-of-organizations-impacted-by-supply-chain-breaches-in-2025/</loc>
    <lastmod>2025-11-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/20/d-link-dir-878-routers-affected-by-multiple-rce-vulnerabilities.html</loc>
    <lastmod>2026-01-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/20/d-link-dir-878-routers-affected-by-multiple-rce-vulnerabilities/</loc>
    <lastmod>2026-01-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/20/gartner-predicts-40-of-firms-will-face-shadow-ai-security-incidents-by-2030.html</loc>
    <lastmod>2025-11-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/20/gartner-predicts-40-of-firms-will-face-shadow-ai-security-incidents-by-2030/</loc>
    <lastmod>2025-11-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/20/global-cybersecurity-threats-and-developments-in-november-2025.html</loc>
    <lastmod>2025-11-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/20/global-cybersecurity-threats-and-developments-in-november-2025/</loc>
    <lastmod>2025-11-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/20/global-whatsapp-hijacking-campaign-exploits-session-hijacking-and-account-takeover.html</loc>
    <lastmod>2025-11-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/20/global-whatsapp-hijacking-campaign-exploits-session-hijacking-and-account-takeover/</loc>
    <lastmod>2025-11-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/20/mozilla-ends-onerep-collaboration-after-16-months.html</loc>
    <lastmod>2025-11-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/20/mozilla-ends-onerep-collaboration-after-16-months/</loc>
    <lastmod>2025-11-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/20/photocall-tv-piracy-service-shutdown.html</loc>
    <lastmod>2025-11-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/20/photocall-tv-piracy-service-shutdown/</loc>
    <lastmod>2025-11-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/20/samourai-wallet-founders-sentenced-for-laundering-237-million.html</loc>
    <lastmod>2025-11-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/20/samourai-wallet-founders-sentenced-for-laundering-237-million/</loc>
    <lastmod>2025-11-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/20/sonicwall-sonicos-sslvpn-stack-based-buffer-overflow-vulnerability.html</loc>
    <lastmod>2025-11-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/20/sonicwall-sonicos-sslvpn-stack-based-buffer-overflow-vulnerability/</loc>
    <lastmod>2025-11-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/20/sturnus-android-malware-targets-encrypted-messaging-apps-and-banking-credentials.html</loc>
    <lastmod>2025-11-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/20/sturnus-android-malware-targets-encrypted-messaging-apps-and-banking-credentials/</loc>
    <lastmod>2025-11-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/20/tsundere-botnet-expands-via-game-lures-and-ethereum-based-c2-on-windows.html</loc>
    <lastmod>2026-01-29</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/20/tsundere-botnet-expands-via-game-lures-and-ethereum-based-c2-on-windows/</loc>
    <lastmod>2026-01-29</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/20/unc2891-atm-fraud-campaign-targets-indonesian-banks.html</loc>
    <lastmod>2025-11-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/20/unc2891-atm-fraud-campaign-targets-indonesian-banks/</loc>
    <lastmod>2025-11-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/21/apt-groups-exploiting-governance-and-compliance-frameworks-as-attack-surfaces.html</loc>
    <lastmod>2025-11-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/21/apt-groups-exploiting-governance-and-compliance-frameworks-as-attack-surfaces/</loc>
    <lastmod>2025-11-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/21/apt24-utilizes-badaudio-malware-in-multi-year-espionage-campaign.html</loc>
    <lastmod>2025-11-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/21/apt24-utilizes-badaudio-malware-in-multi-year-espionage-campaign/</loc>
    <lastmod>2025-11-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/21/avast-releases-free-ai-powered-scam-guardian-for-global-protection.html</loc>
    <lastmod>2025-11-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/21/avast-releases-free-ai-powered-scam-guardian-for-global-protection/</loc>
    <lastmod>2025-11-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/21/critical-scim-flaw-in-grafana-enables-privilege-escalation-and-impersonation.html</loc>
    <lastmod>2025-11-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/21/critical-scim-flaw-in-grafana-enables-privilege-escalation-and-impersonation/</loc>
    <lastmod>2025-11-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/21/fcc-reverses-cybersecurity-mandates-for-us-telecom-carriers.html</loc>
    <lastmod>2025-11-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/21/fcc-reverses-cybersecurity-mandates-for-us-telecom-carriers/</loc>
    <lastmod>2025-11-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/21/google-introduces-ads-in-ai-mode-answers.html</loc>
    <lastmod>2025-11-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/21/google-introduces-ads-in-ai-mode-answers/</loc>
    <lastmod>2025-11-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/21/google-quick-share-adds-airdrop-compatibility-with-rust-hardened-security.html</loc>
    <lastmod>2025-11-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/21/google-quick-share-adds-airdrop-compatibility-with-rust-hardened-security/</loc>
    <lastmod>2025-11-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/21/matrix-push-c2-malware-delivery-via-browser-push-notifications.html</loc>
    <lastmod>2025-11-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/21/matrix-push-c2-malware-delivery-via-browser-push-notifications/</loc>
    <lastmod>2025-11-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/21/samsung-knox-suite-enhances-enterprise-mobile-security.html</loc>
    <lastmod>2025-11-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/21/samsung-knox-suite-enhances-enterprise-mobile-security/</loc>
    <lastmod>2025-11-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/21/sec-dismisses-solarwinds-case-after-allegations-of-misleading-investors.html</loc>
    <lastmod>2025-11-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/21/sec-dismisses-solarwinds-case-after-allegations-of-misleading-investors/</loc>
    <lastmod>2025-11-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/21/unauthorized-data-access-via-gainsight-linked-oauth-activity-on-salesforce.html</loc>
    <lastmod>2025-11-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/21/unauthorized-data-access-via-gainsight-linked-oauth-activity-on-salesforce/</loc>
    <lastmod>2025-11-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/22/oracle-identity-manager-rce-flaw-cve-2025-61757-exploited-in-attacks.html</loc>
    <lastmod>2025-11-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/22/oracle-identity-manager-rce-flaw-cve-2025-61757-exploited-in-attacks/</loc>
    <lastmod>2025-11-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/22/qilin-ransomware-incident-analysis.html</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/22/qilin-ransomware-incident-analysis/</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/22/whatsapp-api-flaw-enabled-large-scale-user-enumeration.html</loc>
    <lastmod>2025-11-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/22/whatsapp-api-flaw-enabled-large-scale-user-enumeration/</loc>
    <lastmod>2025-11-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/23/costco-membership-promotion-with-digital-shop-card-offer.html</loc>
    <lastmod>2025-11-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/23/costco-membership-promotion-with-digital-shop-card-offer/</loc>
    <lastmod>2025-11-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/23/iberia-customer-data-exposed-in-third-party-vendor-breach.html</loc>
    <lastmod>2025-11-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/23/iberia-customer-data-exposed-in-third-party-vendor-breach/</loc>
    <lastmod>2025-11-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/24/critical-vulnerabilities-in-fluent-bit-logging-agent.html</loc>
    <lastmod>2025-11-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/24/critical-vulnerabilities-in-fluent-bit-logging-agent/</loc>
    <lastmod>2025-11-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/24/deepseek-r1-ai-model-generates-insecure-code-for-politically-sensitive-topics.html</loc>
    <lastmod>2025-11-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/24/deepseek-r1-ai-model-generates-insecure-code-for-politically-sensitive-topics/</loc>
    <lastmod>2025-11-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/24/fortinet-fortiweb-vulnerabilities-exploited-in-the-wild.html</loc>
    <lastmod>2025-11-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/24/fortinet-fortiweb-vulnerabilities-exploited-in-the-wild/</loc>
    <lastmod>2025-11-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/24/legacy-sccm-and-wsus-patching-challenges-in-hybrid-work-environments.html</loc>
    <lastmod>2025-11-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/24/legacy-sccm-and-wsus-patching-challenges-in-hybrid-work-environments/</loc>
    <lastmod>2025-11-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/24/microsoft-tests-file-explorer-preloading-for-performance-improvements.html</loc>
    <lastmod>2025-11-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/24/microsoft-tests-file-explorer-preloading-for-performance-improvements/</loc>
    <lastmod>2025-11-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/24/microsoft-to-remove-wins-support-after-windows-server-2025.html</loc>
    <lastmod>2025-11-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/24/microsoft-to-remove-wins-support-after-windows-server-2025/</loc>
    <lastmod>2025-11-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/24/microsoft-warns-of-security-risks-in-new-agentic-ai-feature-for-windows-11.html</loc>
    <lastmod>2025-11-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/24/microsoft-warns-of-security-risks-in-new-agentic-ai-feature-for-windows-11/</loc>
    <lastmod>2025-11-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/24/situsamc-data-breach-exposes-client-and-customer-information.html</loc>
    <lastmod>2025-11-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/24/situsamc-data-breach-exposes-client-and-customer-information/</loc>
    <lastmod>2025-11-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/24/superbox-android-tv-streaming-devices-linked-to-botnet-activity.html</loc>
    <lastmod>2025-11-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/24/superbox-android-tv-streaming-devices-linked-to-botnet-activity/</loc>
    <lastmod>2025-11-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/24/uk-launches-international-defence-esports-games-ideg-for-military-cyber-skills.html</loc>
    <lastmod>2025-11-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/24/uk-launches-international-defence-esports-games-ideg-for-military-cyber-skills/</loc>
    <lastmod>2025-11-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/24/windows-11-24h2-bug-causes-critical-system-component-crashes.html</loc>
    <lastmod>2025-11-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/24/windows-11-24h2-bug-causes-critical-system-component-crashes/</loc>
    <lastmod>2025-11-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/25/2026-ciso-budget-benchmark-report-released.html</loc>
    <lastmod>2025-11-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/25/2026-ciso-budget-benchmark-report-released/</loc>
    <lastmod>2025-11-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/25/active-spyware-campaigns-targeting-high-value-signal-and-whatsapp-users.html</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/25/active-spyware-campaigns-targeting-high-value-signal-and-whatsapp-users/</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/25/ai-and-deepfake-powered-fraud-surge-amid-stagnant-identity-fraud-rates.html</loc>
    <lastmod>2025-11-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/25/ai-and-deepfake-powered-fraud-surge-amid-stagnant-identity-fraud-rates/</loc>
    <lastmod>2025-11-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/25/fbi-warns-of-262m-stolen-in-account-takeover-fraud-schemes.html</loc>
    <lastmod>2025-12-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/25/fbi-warns-of-262m-stolen-in-account-takeover-fraud-schemes/</loc>
    <lastmod>2025-12-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/25/flexibleferret-malware-chain-targets-macos-with-go-backdoor.html</loc>
    <lastmod>2025-11-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/25/flexibleferret-malware-chain-targets-macos-with-go-backdoor/</loc>
    <lastmod>2025-11-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/25/inc-ransom-gang-disrupts-onsolve-codered-emergency-alert-platform.html</loc>
    <lastmod>2026-01-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/25/inc-ransom-gang-disrupts-onsolve-codered-emergency-alert-platform/</loc>
    <lastmod>2026-01-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/25/microsoft-teams-desktop-client-performance-optimization-via-new-call-handler.html</loc>
    <lastmod>2025-11-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/25/microsoft-teams-desktop-client-performance-optimization-via-new-call-handler/</loc>
    <lastmod>2025-11-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/25/sensitive-data-exposed-via-publicly-accessible-code-formatting-tools.html</loc>
    <lastmod>2025-11-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/25/sensitive-data-exposed-via-publicly-accessible-code-formatting-tools/</loc>
    <lastmod>2025-11-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/25/soc-challenges-and-ai-driven-solutions-for-2026.html</loc>
    <lastmod>2025-11-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/25/soc-challenges-and-ai-driven-solutions-for-2026/</loc>
    <lastmod>2025-11-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/25/strategic-cybersecurity-budget-allocation-for-year-end-risk-reduction.html</loc>
    <lastmod>2025-11-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/25/strategic-cybersecurity-budget-allocation-for-year-end-risk-reduction/</loc>
    <lastmod>2025-11-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/25/toddycat-deploys-new-tools-to-steal-outlook-emails-and-microsoft-365-tokens.html</loc>
    <lastmod>2025-11-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/25/toddycat-deploys-new-tools-to-steal-outlook-emails-and-microsoft-365-tokens/</loc>
    <lastmod>2025-11-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/25/tor-network-adopts-counter-galois-onion-cgo-encryption-algorithm.html</loc>
    <lastmod>2025-11-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/25/tor-network-adopts-counter-galois-onion-cgo-encryption-algorithm/</loc>
    <lastmod>2025-11-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/26/comcast-fined-15m-for-vendor-breach-exposing-270k-customers.html</loc>
    <lastmod>2025-11-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/26/comcast-fined-15m-for-vendor-breach-exposing-270k-customers/</loc>
    <lastmod>2025-11-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/26/cyber-incident-affects-multiple-london-councils.html</loc>
    <lastmod>2025-12-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/26/cyber-incident-affects-multiple-london-councils/</loc>
    <lastmod>2025-12-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/26/growing-concerns-over-non-human-identity-security-in-enterprises.html</loc>
    <lastmod>2025-11-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/26/growing-concerns-over-non-human-identity-security-in-enterprises/</loc>
    <lastmod>2025-11-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/26/malicious-chrome-extension-crypto-copilot-injects-hidden-solana-transfer-fees.html</loc>
    <lastmod>2025-11-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/26/malicious-chrome-extension-crypto-copilot-injects-hidden-solana-transfer-fees/</loc>
    <lastmod>2025-11-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/26/microsoft-to-strengthen-entra-id-sign-ins-against-script-injection-attacks.html</loc>
    <lastmod>2026-02-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/26/microsoft-to-strengthen-entra-id-sign-ins-against-script-injection-attacks/</loc>
    <lastmod>2026-02-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/26/nordvpn-black-friday-2025-discounts.html</loc>
    <lastmod>2025-11-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/26/nordvpn-black-friday-2025-discounts/</loc>
    <lastmod>2025-11-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/26/signature-verification-bypass-in-node-forge-library-cve-2025-12816.html</loc>
    <lastmod>2025-11-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/26/signature-verification-bypass-in-node-forge-library-cve-2025-12816/</loc>
    <lastmod>2025-11-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/26/soc-investment-critical-for-effective-security-posture.html</loc>
    <lastmod>2025-11-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/26/soc-investment-critical-for-effective-security-posture/</loc>
    <lastmod>2025-11-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/26/webinar-on-secure-patch-management-with-community-tools.html</loc>
    <lastmod>2025-11-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/26/webinar-on-secure-patch-management-with-community-tools/</loc>
    <lastmod>2025-11-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/26/windows-11-fido2-security-key-pin-prompt-introduced-in-recent-updates.html</loc>
    <lastmod>2025-11-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/26/windows-11-fido2-security-key-pin-prompt-introduced-in-recent-updates/</loc>
    <lastmod>2025-11-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/27/bloody-wolf-apt-expands-operations-in-central-asia-using-netsupport-rat.html</loc>
    <lastmod>2026-02-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/27/bloody-wolf-apt-expands-operations-in-central-asia-using-netsupport-rat/</loc>
    <lastmod>2026-02-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/27/greynoise-ip-check-tool-detects-botnet-participation.html</loc>
    <lastmod>2025-11-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/27/greynoise-ip-check-tool-detects-botnet-participation/</loc>
    <lastmod>2025-11-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/27/hackers-hijack-us-radio-equipment-to-broadcast-false-alerts-and-offensive-content.html</loc>
    <lastmod>2025-11-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/27/hackers-hijack-us-radio-equipment-to-broadcast-false-alerts-and-offensive-content/</loc>
    <lastmod>2025-11-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/27/malicious-llms-enable-low-skilled-attackers-to-execute-advanced-cyberattacks.html</loc>
    <lastmod>2025-11-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/27/malicious-llms-enable-low-skilled-attackers-to-execute-advanced-cyberattacks/</loc>
    <lastmod>2025-11-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/27/mixpanel-data-breach-exposes-openai-api-user-information.html</loc>
    <lastmod>2025-11-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/27/mixpanel-data-breach-exposes-openai-api-user-information/</loc>
    <lastmod>2025-11-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/28/australian-man-sentenced-for-in-flight-evil-twin-wifi-attacks.html</loc>
    <lastmod>2025-12-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/28/australian-man-sentenced-for-in-flight-evil-twin-wifi-attacks/</loc>
    <lastmod>2025-12-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/28/darktrace-observes-surge-in-black-friday-themed-phishing-campaigns.html</loc>
    <lastmod>2025-11-29</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/28/darktrace-observes-surge-in-black-friday-themed-phishing-campaigns/</loc>
    <lastmod>2025-11-29</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/28/exposed-secrets-in-public-gitlab-repositories.html</loc>
    <lastmod>2025-11-29</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/28/exposed-secrets-in-public-gitlab-repositories/</loc>
    <lastmod>2025-11-29</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/28/french-football-federation-data-breach-exposes-amateur-player-information.html</loc>
    <lastmod>2025-11-29</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/28/french-football-federation-data-breach-exposes-amateur-player-information/</loc>
    <lastmod>2025-11-29</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/28/legacy-python-bootstrap-scripts-pose-domain-takeover-risk-in-pypi-packages.html</loc>
    <lastmod>2025-11-29</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/28/legacy-python-bootstrap-scripts-pose-domain-takeover-risk-in-pypi-packages/</loc>
    <lastmod>2025-11-29</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/28/microsoft-teams-guest-access-bypasses-defender-for-office-365-protections.html</loc>
    <lastmod>2025-11-29</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/28/microsoft-teams-guest-access-bypasses-defender-for-office-365-protections/</loc>
    <lastmod>2025-11-29</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/28/organizations-adopting-remote-privileged-access-management-rpam-for-secure-remote-work.html</loc>
    <lastmod>2025-11-29</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/28/organizations-adopting-remote-privileged-access-management-rpam-for-secure-remote-work/</loc>
    <lastmod>2025-11-29</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/28/threat-actors-exploit-calendar-subscriptions-for-phishing-and-malware-delivery.html</loc>
    <lastmod>2025-11-29</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/28/threat-actors-exploit-calendar-subscriptions-for-phishing-and-malware-delivery/</loc>
    <lastmod>2025-11-29</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/28/windows-11-updates-hide-password-login-option-on-lock-screen.html</loc>
    <lastmod>2026-02-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/28/windows-11-updates-hide-password-login-option-on-lock-screen/</loc>
    <lastmod>2026-02-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/30/cisa-adds-actively-exploited-xss-bug-in-openplc-scadabr-to-kev.html</loc>
    <lastmod>2025-12-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/11/30/cisa-adds-actively-exploited-xss-bug-in-openplc-scadabr-to-kev/</loc>
    <lastmod>2025-12-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/01/albiriox-maas-malware-targets-400-apps-for-on-device-fraud.html</loc>
    <lastmod>2025-12-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/01/albiriox-maas-malware-targets-400-apps-for-on-device-fraud/</loc>
    <lastmod>2025-12-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/01/coupang-data-breach-exposes-337-million-customer-records.html</loc>
    <lastmod>2026-01-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/01/coupang-data-breach-exposes-337-million-customer-records/</loc>
    <lastmod>2026-01-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/01/cryptomixer-cryptocurrency-mixing-service-disrupted-in-operation-olympia.html</loc>
    <lastmod>2025-12-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/01/cryptomixer-cryptocurrency-mixing-service-disrupted-in-operation-olympia/</loc>
    <lastmod>2025-12-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/01/cybersecurity-firms-expand-ai-and-observability-capabilities-through-strategic-acquisitions.html</loc>
    <lastmod>2025-12-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/01/cybersecurity-firms-expand-ai-and-observability-capabilities-through-strategic-acquisitions/</loc>
    <lastmod>2025-12-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/01/emerging-security-risks-of-agentic-ai-browsers.html</loc>
    <lastmod>2025-12-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/01/emerging-security-risks-of-agentic-ai-browsers/</loc>
    <lastmod>2025-12-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/01/google-removes-ai-generated-recipe-infographic-accused-of-plagiarism.html</loc>
    <lastmod>2025-12-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/01/google-removes-ai-generated-recipe-infographic-accused-of-plagiarism/</loc>
    <lastmod>2025-12-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/01/increasing-threat-of-insider-cyber-threats-through-fake-worker-schemes.html</loc>
    <lastmod>2025-12-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/01/increasing-threat-of-insider-cyber-threats-through-fake-worker-schemes/</loc>
    <lastmod>2025-12-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/01/india-mandates-pre-installation-of-sanchar-saathi-app-to-combat-telecom-fraud.html</loc>
    <lastmod>2025-12-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/01/india-mandates-pre-installation-of-sanchar-saathi-app-to-combat-telecom-fraud/</loc>
    <lastmod>2025-12-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/01/malicious-npm-package-uses-ai-manipulation-tactics.html</loc>
    <lastmod>2025-12-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/01/malicious-npm-package-uses-ai-manipulation-tactics/</loc>
    <lastmod>2025-12-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/01/microsoft-outlook-new-client-excel-attachment-opening-issue.html</loc>
    <lastmod>2025-12-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/01/microsoft-outlook-new-client-excel-attachment-opening-issue/</loc>
    <lastmod>2025-12-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/01/shadypanda-browser-extensions-campaign-exploits-43m-installs.html</loc>
    <lastmod>2025-12-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/01/shadypanda-browser-extensions-campaign-exploits-43m-installs/</loc>
    <lastmod>2025-12-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/01/smarttube-youtube-app-for-android-tv-compromised-to-distribute-malicious-update.html</loc>
    <lastmod>2025-12-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/01/smarttube-youtube-app-for-android-tv-compromised-to-distribute-malicious-update/</loc>
    <lastmod>2025-12-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/02/chatgpt-worldwide-outage-and-data-loss-reported.html</loc>
    <lastmod>2025-12-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/02/chatgpt-worldwide-outage-and-data-loss-reported/</loc>
    <lastmod>2025-12-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/02/cybercrime-adoption-of-saas-models-for-on-demand-criminal-services.html</loc>
    <lastmod>2025-12-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/02/cybercrime-adoption-of-saas-models-for-on-demand-criminal-services/</loc>
    <lastmod>2025-12-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/02/four-suspects-arrested-for-hacking-120000-ip-cameras-and-selling-stolen-footage.html</loc>
    <lastmod>2025-12-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/02/four-suspects-arrested-for-hacking-120000-ip-cameras-and-selling-stolen-footage/</loc>
    <lastmod>2025-12-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/02/ftc-settlement-mandates-illuminate-education-to-delete-unnecessary-student-data-and-improve-security.html</loc>
    <lastmod>2025-12-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/02/ftc-settlement-mandates-illuminate-education-to-delete-unnecessary-student-data-and-improve-security/</loc>
    <lastmod>2025-12-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/02/google-patches-two-exploited-android-framework-vulnerabilities.html</loc>
    <lastmod>2025-12-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/02/google-patches-two-exploited-android-framework-vulnerabilities/</loc>
    <lastmod>2025-12-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/02/ico-launches-review-of-mobile-games-for-childrens-code-compliance.html</loc>
    <lastmod>2025-12-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/02/ico-launches-review-of-mobile-games-for-childrens-code-compliance/</loc>
    <lastmod>2025-12-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/02/increased-concern-over-state-sponsored-cyber-attacks-and-call-for-government-support.html</loc>
    <lastmod>2025-12-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/02/increased-concern-over-state-sponsored-cyber-attacks-and-call-for-government-support/</loc>
    <lastmod>2025-12-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/02/india-mandates-sim-binding-for-messaging-apps-to-prevent-fraud.html</loc>
    <lastmod>2025-12-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/02/india-mandates-sim-binding-for-messaging-apps-to-prevent-fraud/</loc>
    <lastmod>2025-12-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/02/microsoft-defender-xdr-portal-outage-affects-threat-hunting-alerts.html</loc>
    <lastmod>2025-12-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/02/microsoft-defender-xdr-portal-outage-affects-threat-hunting-alerts/</loc>
    <lastmod>2025-12-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/02/phishing-campaign-targets-ad-manager-accounts-via-fake-calendly-invites.html</loc>
    <lastmod>2025-12-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/02/phishing-campaign-targets-ad-manager-accounts-via-fake-calendly-invites/</loc>
    <lastmod>2025-12-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/02/windows-11-kb5070311-update-addresses-file-explorer-and-search-issues.html</loc>
    <lastmod>2026-03-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/02/windows-11-kb5070311-update-addresses-file-explorer-and-search-issues/</loc>
    <lastmod>2026-03-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/03/ai-integration-in-cybersecurity-workflows.html</loc>
    <lastmod>2025-12-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/03/ai-integration-in-cybersecurity-workflows/</loc>
    <lastmod>2025-12-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/03/ai-powered-phishing-tools-industrialize-cybercrime.html</loc>
    <lastmod>2025-12-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/03/ai-powered-phishing-tools-industrialize-cybercrime/</loc>
    <lastmod>2025-12-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/03/cisa-and-international-partners-publish-guide-for-secure-ai-integration-in-ot-systems.html</loc>
    <lastmod>2025-12-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/03/cisa-and-international-partners-publish-guide-for-secure-ai-integration-in-ot-systems/</loc>
    <lastmod>2025-12-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/03/critical-react-server-components-rsc-bugs-enable-unauthenticated-remote-code-execution.html</loc>
    <lastmod>2026-03-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/03/critical-react-server-components-rsc-bugs-enable-unauthenticated-remote-code-execution/</loc>
    <lastmod>2026-03-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/03/freedom-mobile-data-breach-exposes-customer-information.html</loc>
    <lastmod>2025-12-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/03/freedom-mobile-data-breach-exposes-customer-information/</loc>
    <lastmod>2025-12-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/03/global-executives-rank-disinformation-and-cyber-insecurity-among-top-threats.html</loc>
    <lastmod>2025-12-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/03/global-executives-rank-disinformation-and-cyber-insecurity-among-top-threats/</loc>
    <lastmod>2025-12-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/03/google-expands-android-in-call-scam-protection-to-chase-and-cash-app-in-us.html</loc>
    <lastmod>2025-12-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/03/google-expands-android-in-call-scam-protection-to-chase-and-cash-app-in-us/</loc>
    <lastmod>2025-12-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/03/leroy-merlin-data-breach-exposes-customer-information.html</loc>
    <lastmod>2025-12-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/03/leroy-merlin-data-breach-exposes-customer-information/</loc>
    <lastmod>2025-12-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/03/pall-mall-process-aims-to-define-responsible-commercial-cyber-intrusion-practices.html</loc>
    <lastmod>2025-12-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/03/pall-mall-process-aims-to-define-responsible-commercial-cyber-intrusion-practices/</loc>
    <lastmod>2025-12-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/03/russia-blocks-roblox-over-lgbt-propaganda-and-extremist-content.html</loc>
    <lastmod>2025-12-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/03/russia-blocks-roblox-over-lgbt-propaganda-and-extremist-content/</loc>
    <lastmod>2025-12-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/03/uk-proposes-ransomware-payment-ban-with-national-security-exemptions.html</loc>
    <lastmod>2025-12-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/03/uk-proposes-ransomware-payment-ban-with-national-security-exemptions/</loc>
    <lastmod>2025-12-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/03/uks-share-and-defend-service-blocks-nearly-1-billion-malicious-site-attempts.html</loc>
    <lastmod>2025-12-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/03/uks-share-and-defend-service-blocks-nearly-1-billion-malicious-site-attempts/</loc>
    <lastmod>2025-12-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/03/yearn-finance-yeth-pool-exploited-via-cached-storage-flaw.html</loc>
    <lastmod>2025-12-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/03/yearn-finance-yeth-pool-exploited-via-cached-storage-flaw/</loc>
    <lastmod>2025-12-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/04/2025-web-security-threats-ai-generated-code-javascript-injections-and-supply-chain-attacks.html</loc>
    <lastmod>2025-12-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/04/2025-web-security-threats-ai-generated-code-javascript-injections-and-supply-chain-attacks/</loc>
    <lastmod>2025-12-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/04/cisa-launches-industry-engagement-platform-for-enhanced-collaboration.html</loc>
    <lastmod>2025-12-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/04/cisa-launches-industry-engagement-platform-for-enhanced-collaboration/</loc>
    <lastmod>2025-12-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/04/critical-cybersecurity-skills-shortages-worsen-security-postures-globally.html</loc>
    <lastmod>2025-12-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/04/critical-cybersecurity-skills-shortages-worsen-security-postures-globally/</loc>
    <lastmod>2025-12-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/04/defi-exploit-drains-9-million-from-yearn-finance.html</loc>
    <lastmod>2025-12-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/04/defi-exploit-drains-9-million-from-yearn-finance/</loc>
    <lastmod>2025-12-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/04/former-contractors-accused-of-wiping-96-us-government-databases.html</loc>
    <lastmod>2025-12-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/04/former-contractors-accused-of-wiping-96-us-government-databases/</loc>
    <lastmod>2025-12-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/04/ghostframe-phishing-framework-exploits-iframe-architecture-for-over-one-million-attacks.html</loc>
    <lastmod>2025-12-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/04/ghostframe-phishing-framework-exploits-iframe-architecture-for-over-one-million-attacks/</loc>
    <lastmod>2025-12-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/04/goldfactory-deploys-modified-banking-apps-in-southeast-asia.html</loc>
    <lastmod>2026-02-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/04/goldfactory-deploys-modified-banking-apps-in-southeast-asia/</loc>
    <lastmod>2026-02-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/04/marquis-software-solutions-ransomware-attack-exposes-data-from-74-us-financial-institutions.html</loc>
    <lastmod>2025-12-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/04/marquis-software-solutions-ransomware-attack-exposes-data-from-74-us-financial-institutions/</loc>
    <lastmod>2025-12-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/04/password-security-best-practices-for-operational-technology-ot-systems.html</loc>
    <lastmod>2025-12-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/04/password-security-best-practices-for-operational-technology-ot-systems/</loc>
    <lastmod>2025-12-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/04/post-office-data-breach-leaks-502-postmasters-personal-information.html</loc>
    <lastmod>2025-12-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/04/post-office-data-breach-leaks-502-postmasters-personal-information/</loc>
    <lastmod>2025-12-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/04/predator-spyware-exploits-zero-click-infection-vector-via-malicious-ads.html</loc>
    <lastmod>2026-02-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/04/predator-spyware-exploits-zero-click-infection-vector-via-malicious-ads/</loc>
    <lastmod>2026-02-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/04/russia-blocks-facetime-and-snapchat-over-terrorism-concerns.html</loc>
    <lastmod>2025-12-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/04/russia-blocks-facetime-and-snapchat-over-terrorism-concerns/</loc>
    <lastmod>2025-12-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/04/uk-and-canadian-cyber-agencies-publish-report-on-digital-content-provenance.html</loc>
    <lastmod>2025-12-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/04/uk-and-canadian-cyber-agencies-publish-report-on-digital-content-provenance/</loc>
    <lastmod>2025-12-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/05/arrayos-ag-vpn-flaw-exploited-to-deploy-webshells.html</loc>
    <lastmod>2025-12-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/05/arrayos-ag-vpn-flaw-exploited-to-deploy-webshells/</loc>
    <lastmod>2025-12-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/05/china-based-phishing-groups-expand-to-fake-e-commerce-sites-and-tax-refund-lures.html</loc>
    <lastmod>2025-12-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/05/china-based-phishing-groups-expand-to-fake-e-commerce-sites-and-tax-refund-lures/</loc>
    <lastmod>2025-12-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/05/chinese-hackers-exploit-react2shell-vulnerability-cve-2025-55182-in-targeted-campaigns.html</loc>
    <lastmod>2025-12-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/05/chinese-hackers-exploit-react2shell-vulnerability-cve-2025-55182-in-targeted-campaigns/</loc>
    <lastmod>2025-12-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/05/cloudflare-service-disruption-causes-widespread-500-internal-server-errors.html</loc>
    <lastmod>2025-12-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/05/cloudflare-service-disruption-causes-widespread-500-internal-server-errors/</loc>
    <lastmod>2025-12-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/05/continuous-attack-surface-visibility-critical-for-modern-security.html</loc>
    <lastmod>2025-12-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/05/continuous-attack-surface-visibility-critical-for-modern-security/</loc>
    <lastmod>2025-12-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/05/critical-xxe-vulnerability-in-apache-tika-cve-2025-66516.html</loc>
    <lastmod>2025-12-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/05/critical-xxe-vulnerability-in-apache-tika-cve-2025-66516/</loc>
    <lastmod>2025-12-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/05/eu-fines-x-120-million-for-dsa-violations-related-to-blue-checkmarks-and-transparency.html</loc>
    <lastmod>2025-12-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/05/eu-fines-x-120-million-for-dsa-violations-related-to-blue-checkmarks-and-transparency/</loc>
    <lastmod>2025-12-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/05/fbi-warns-of-virtual-kidnapping-scams-using-altered-social-media-photos.html</loc>
    <lastmod>2025-12-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/05/fbi-warns-of-virtual-kidnapping-scams-using-altered-social-media-photos/</loc>
    <lastmod>2025-12-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/05/louvre-launches-57m-security-overhaul-after-high-profile-theft.html</loc>
    <lastmod>2025-12-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/05/louvre-launches-57m-security-overhaul-after-high-profile-theft/</loc>
    <lastmod>2025-12-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/05/msps-adopt-trust-first-framework-to-improve-cybersecurity-sales.html</loc>
    <lastmod>2025-12-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/05/msps-adopt-trust-first-framework-to-improve-cybersecurity-sales/</loc>
    <lastmod>2025-12-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/05/react2shell-vulnerability-exploited-by-china-linked-threat-actors.html</loc>
    <lastmod>2025-12-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/05/react2shell-vulnerability-exploited-by-china-linked-threat-actors/</loc>
    <lastmod>2025-12-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/05/uk-ncsc-launches-proactive-notifications-for-vulnerability-alerts.html</loc>
    <lastmod>2025-12-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/05/uk-ncsc-launches-proactive-notifications-for-vulnerability-alerts/</loc>
    <lastmod>2025-12-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/06/multiple-vulnerabilities-in-ai-powered-ides-enable-data-theft-and-rce.html</loc>
    <lastmod>2025-12-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/06/multiple-vulnerabilities-in-ai-powered-ides-enable-data-theft-and-rce/</loc>
    <lastmod>2025-12-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/06/nerdify-essay-mill-linked-to-russian-university-and-drone-production.html</loc>
    <lastmod>2025-12-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/06/nerdify-essay-mill-linked-to-russian-university-and-drone-production/</loc>
    <lastmod>2025-12-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/07/portugal-updates-cybercrime-law-to-exempt-security-researchers.html</loc>
    <lastmod>2025-12-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/07/portugal-updates-cybercrime-law-to-exempt-security-researchers/</loc>
    <lastmod>2025-12-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/08/arrest-of-ukrainians-with-advanced-hacking-equipment-in-poland.html</loc>
    <lastmod>2025-12-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/08/arrest-of-ukrainians-with-advanced-hacking-equipment-in-poland/</loc>
    <lastmod>2025-12-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/08/google-enhances-chrome-agentic-ai-security-against-indirect-prompt-injection-attacks.html</loc>
    <lastmod>2025-12-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/08/google-enhances-chrome-agentic-ai-security-against-indirect-prompt-injection-attacks/</loc>
    <lastmod>2025-12-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/08/increased-credential-stuffing-and-account-takeover-risks-during-holiday-shopping-season.html</loc>
    <lastmod>2025-12-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/08/increased-credential-stuffing-and-account-takeover-risks-during-holiday-shopping-season/</loc>
    <lastmod>2025-12-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/08/new-android-malware-families-fvncbot-seedsnatcher-and-enhanced-clayrat-target-financial-and-cryptocurrency-data.html</loc>
    <lastmod>2025-12-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/08/new-android-malware-families-fvncbot-seedsnatcher-and-enhanced-clayrat-target-financial-and-cryptocurrency-data/</loc>
    <lastmod>2025-12-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/08/picus-agentic-ai-enhances-threat-emulation-with-safe-rapid-validation.html</loc>
    <lastmod>2025-12-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/08/picus-agentic-ai-enhances-threat-emulation-with-safe-rapid-validation/</loc>
    <lastmod>2025-12-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/08/ransomware-extortion-totals-21b-from-2022-to-2024-fincen-reports.html</loc>
    <lastmod>2026-03-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/08/ransomware-extortion-totals-21b-from-2022-to-2024-fincen-reports/</loc>
    <lastmod>2026-03-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/08/sneeit-wordpress-rce-exploited-in-active-attacks.html</loc>
    <lastmod>2025-12-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/08/sneeit-wordpress-rce-exploited-in-active-attacks/</loc>
    <lastmod>2025-12-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/08/uk-ico-demands-clarity-on-racial-bias-in-facial-recognition-technology.html</loc>
    <lastmod>2025-12-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/08/uk-ico-demands-clarity-on-racial-bias-in-facial-recognition-technology/</loc>
    <lastmod>2025-12-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/09/critical-forticloud-sso-authentication-bypass-vulnerabilities-patched.html</loc>
    <lastmod>2026-03-31</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/09/critical-forticloud-sso-authentication-bypass-vulnerabilities-patched/</loc>
    <lastmod>2026-03-31</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/09/critical-ivanti-endpoint-manager-xss-flaw-disclosed.html</loc>
    <lastmod>2025-12-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/09/critical-ivanti-endpoint-manager-xss-flaw-disclosed/</loc>
    <lastmod>2025-12-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/09/deadlock-ransomware-campaign-uses-byovd-to-evade-security-tools.html</loc>
    <lastmod>2026-01-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/09/deadlock-ransomware-campaign-uses-byovd-to-evade-security-tools/</loc>
    <lastmod>2026-01-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/09/gartner-recommends-blocking-ai-browsers-due-to-security-risks.html</loc>
    <lastmod>2025-12-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/09/gartner-recommends-blocking-ai-browsers-due-to-security-risks/</loc>
    <lastmod>2025-12-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/09/microsoft-copilot-outage-in-europe-due-to-capacity-scaling-issue.html</loc>
    <lastmod>2025-12-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/09/microsoft-copilot-outage-in-europe-due-to-capacity-scaling-issue/</loc>
    <lastmod>2025-12-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/09/microsoft-december-2025-patch-tuesday-addresses-3-zero-days-57-flaws.html</loc>
    <lastmod>2025-12-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/09/microsoft-december-2025-patch-tuesday-addresses-3-zero-days-57-flaws/</loc>
    <lastmod>2025-12-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/09/microsoft-promotes-operating-cisos-to-strengthen-cyber-defense.html</loc>
    <lastmod>2025-12-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/09/microsoft-promotes-operating-cisos-to-strengthen-cyber-defense/</loc>
    <lastmod>2025-12-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/09/ncsc-warns-of-persistent-prompt-injection-risks-in-ai-systems.html</loc>
    <lastmod>2025-12-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/09/ncsc-warns-of-persistent-prompt-injection-risks-in-ai-systems/</loc>
    <lastmod>2025-12-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/09/powershell-51-adds-security-warning-for-invoke-webrequest-scripts.html</loc>
    <lastmod>2025-12-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/09/powershell-51-adds-security-warning-for-invoke-webrequest-scripts/</loc>
    <lastmod>2025-12-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/09/pro-russia-hacktivists-target-critical-infrastructure-with-low-sophistication-attacks.html</loc>
    <lastmod>2026-02-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/09/pro-russia-hacktivists-target-critical-infrastructure-with-low-sophistication-attacks/</loc>
    <lastmod>2026-02-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/09/ransomware-gangs-leverage-shanya-exe-packer-to-evade-edr-detection.html</loc>
    <lastmod>2025-12-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/09/ransomware-gangs-leverage-shanya-exe-packer-to-evade-edr-detection/</loc>
    <lastmod>2025-12-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/09/shared-signals-framework-workflow-for-zero-trust-implementation.html</loc>
    <lastmod>2025-12-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/09/shared-signals-framework-workflow-for-zero-trust-implementation/</loc>
    <lastmod>2025-12-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/09/spanish-teen-arrested-for-stealing-64-million-personal-data-records.html</loc>
    <lastmod>2025-12-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/09/spanish-teen-arrested-for-stealing-64-million-personal-data-records/</loc>
    <lastmod>2025-12-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/09/stac6565-targets-canadian-organizations-with-qwcrypt-ransomware.html</loc>
    <lastmod>2025-12-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/09/stac6565-targets-canadian-organizations-with-qwcrypt-ransomware/</loc>
    <lastmod>2025-12-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/09/storm-0249-adopts-advanced-tactics-for-ransomware-attacks.html</loc>
    <lastmod>2025-12-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/09/storm-0249-adopts-advanced-tactics-for-ransomware-attacks/</loc>
    <lastmod>2025-12-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/09/wazuh-it-hygiene-capability-enhances-enterprise-security-posture.html</loc>
    <lastmod>2025-12-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/09/wazuh-it-hygiene-capability-enhances-enterprise-security-posture/</loc>
    <lastmod>2025-12-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/10/critical-authentication-and-code-execution-flaws-patched-in-fortinet-ivanti-and-sap-products.html</loc>
    <lastmod>2025-12-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/10/critical-authentication-and-code-execution-flaws-patched-in-fortinet-ivanti-and-sap-products/</loc>
    <lastmod>2025-12-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/10/droidlock-android-ransomware-targets-spanish-speaking-users.html</loc>
    <lastmod>2025-12-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/10/droidlock-android-ransomware-targets-spanish-speaking-users/</loc>
    <lastmod>2025-12-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/10/exposed-credentials-in-over-10000-docker-hub-images.html</loc>
    <lastmod>2025-12-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/10/exposed-credentials-in-over-10000-docker-hub-images/</loc>
    <lastmod>2025-12-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/10/jaguar-land-rover-attack-highlights-critical-need-for-secure-software-development-in-manufacturing.html</loc>
    <lastmod>2025-12-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/10/jaguar-land-rover-attack-highlights-critical-need-for-secure-software-development-in-manufacturing/</loc>
    <lastmod>2025-12-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/10/microsoft-teams-to-introduce-external-domains-anomalies-report.html</loc>
    <lastmod>2025-12-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/10/microsoft-teams-to-introduce-external-domains-anomalies-report/</loc>
    <lastmod>2025-12-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/10/palo-alto-networks-webinar-on-cloud-misconfigurations-and-attack-vectors.html</loc>
    <lastmod>2025-12-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/10/palo-alto-networks-webinar-on-cloud-misconfigurations-and-attack-vectors/</loc>
    <lastmod>2025-12-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/10/sap-december-2025-security-updates-address-three-critical-vulnerabilities.html</loc>
    <lastmod>2025-12-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/10/sap-december-2025-security-updates-address-three-critical-vulnerabilities/</loc>
    <lastmod>2025-12-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/10/soapwn-vulnerability-in-net-framework-enables-remote-code-execution.html</loc>
    <lastmod>2025-12-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/10/soapwn-vulnerability-in-net-framework-enables-remote-code-execution/</loc>
    <lastmod>2025-12-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/10/spiderman-phishing-kit-targets-european-banks-and-cryptocurrency-services.html</loc>
    <lastmod>2025-12-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/10/spiderman-phishing-kit-targets-european-banks-and-cryptocurrency-services/</loc>
    <lastmod>2025-12-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/10/ukrainian-national-charged-for-cyberattacks-on-critical-infrastructure.html</loc>
    <lastmod>2025-12-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/10/ukrainian-national-charged-for-cyberattacks-on-critical-infrastructure/</loc>
    <lastmod>2025-12-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/11/2025-mitre-attck-evaluations-highlight-scattered-spider-and-mustang-panda-scenarios.html</loc>
    <lastmod>2025-12-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/11/2025-mitre-attck-evaluations-highlight-scattered-spider-and-mustang-panda-scenarios/</loc>
    <lastmod>2025-12-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/11/active-exploitation-of-gogs-zero-day-vulnerability.html</loc>
    <lastmod>2026-01-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/11/active-exploitation-of-gogs-zero-day-vulnerability/</loc>
    <lastmod>2026-01-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/11/ai-driven-cyberattacks-exploit-network-vulnerabilities.html</loc>
    <lastmod>2026-01-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/11/ai-driven-cyberattacks-exploit-network-vulnerabilities/</loc>
    <lastmod>2026-01-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/11/eighth-chrome-zero-day-vulnerability-patched-in-2025.html</loc>
    <lastmod>2025-12-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/11/eighth-chrome-zero-day-vulnerability-patched-in-2025/</loc>
    <lastmod>2025-12-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/11/fca-launches-firm-checker-tool-to-combat-financial-fraud.html</loc>
    <lastmod>2025-12-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/11/fca-launches-firm-checker-tool-to-combat-financial-fraud/</loc>
    <lastmod>2025-12-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/11/mirai-broadside-botnet-targets-maritime-iot-with-advanced-tactics.html</loc>
    <lastmod>2025-12-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/11/mirai-broadside-botnet-targets-maritime-iot-with-advanced-tactics/</loc>
    <lastmod>2025-12-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/11/notepad-update-mechanism-exploited-to-deliver-malicious-payloads.html</loc>
    <lastmod>2026-02-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/11/notepad-update-mechanism-exploited-to-deliver-malicious-payloads/</loc>
    <lastmod>2026-02-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/11/openai-enhances-defensive-models-to-counter-cyber-threats.html</loc>
    <lastmod>2025-12-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/11/openai-enhances-defensive-models-to-counter-cyber-threats/</loc>
    <lastmod>2025-12-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/11/rpa-bots-and-iam-security-challenges.html</loc>
    <lastmod>2025-12-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/11/rpa-bots-and-iam-security-challenges/</loc>
    <lastmod>2025-12-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/11/smbs-raise-prices-post-breach-due-to-cyber-threats.html</loc>
    <lastmod>2025-12-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/11/smbs-raise-prices-post-breach-due-to-cyber-threats/</loc>
    <lastmod>2025-12-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/11/uk-ico-fines-lastpass-12-million-for-2022-data-breach-affecting-16-million-users.html</loc>
    <lastmod>2025-12-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/11/uk-ico-fines-lastpass-12-million-for-2022-data-breach-affecting-16-million-users/</loc>
    <lastmod>2025-12-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/11/wirte-deploys-ashtag-espionage-backdoor-via-ashenloader-sideloading.html</loc>
    <lastmod>2025-12-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/11/wirte-deploys-ashtag-espionage-backdoor-via-ashenloader-sideloading/</loc>
    <lastmod>2025-12-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/12/brave-introduces-agentic-ai-mode-for-automated-tasks-in-nightly-build.html</loc>
    <lastmod>2025-12-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/12/brave-introduces-agentic-ai-mode-for-automated-tasks-in-nightly-build/</loc>
    <lastmod>2025-12-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/12/dark-reading-expands-commentary-section-with-tech-talks-and-ask-the-expert.html</loc>
    <lastmod>2025-12-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/12/dark-reading-expands-commentary-section-with-tech-talks-and-ask-the-expert/</loc>
    <lastmod>2025-12-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/12/malicious-torrent-distributes-agent-tesla-via-subtitle-files.html</loc>
    <lastmod>2025-12-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/12/malicious-torrent-distributes-agent-tesla-via-subtitle-files/</loc>
    <lastmod>2025-12-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/12/mitre-and-cisa-release-2025s-top-25-most-dangerous-software-weaknesses.html</loc>
    <lastmod>2025-12-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/12/mitre-and-cisa-release-2025s-top-25-most-dangerous-software-weaknesses/</loc>
    <lastmod>2025-12-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/12/mkvcinemas-piracy-service-shutdown-after-142m-visits.html</loc>
    <lastmod>2025-12-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/12/mkvcinemas-piracy-service-shutdown-after-142m-visits/</loc>
    <lastmod>2025-12-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/12/multiple-react-rsc-vulnerabilities-patched.html</loc>
    <lastmod>2025-12-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/12/multiple-react-rsc-vulnerabilities-patched/</loc>
    <lastmod>2025-12-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/12/ncsc-pilot-project-identifies-barriers-and-risks-in-cyber-deception.html</loc>
    <lastmod>2025-12-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/12/ncsc-pilot-project-identifies-barriers-and-risks-in-cyber-deception/</loc>
    <lastmod>2025-12-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/12/pystorerat-malware-distributed-via-fake-github-repositories.html</loc>
    <lastmod>2025-12-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/12/pystorerat-malware-distributed-via-fake-github-repositories/</loc>
    <lastmod>2025-12-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/12/securing-genai-in-the-browser-policy-isolation-and-data-controls.html</loc>
    <lastmod>2025-12-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/12/securing-genai-in-the-browser-policy-isolation-and-data-controls/</loc>
    <lastmod>2025-12-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/12/shadow-spreadsheets-pose-security-risks-due-to-uncontrolled-data-sharing.html</loc>
    <lastmod>2025-12-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/12/shadow-spreadsheets-pose-security-risks-due-to-uncontrolled-data-sharing/</loc>
    <lastmod>2025-12-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/13/apple-patches-two-zero-day-flaws-in-webkit-exploited-in-targeted-attacks.html</loc>
    <lastmod>2026-02-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/13/apple-patches-two-zero-day-flaws-in-webkit-exploited-in-targeted-attacks/</loc>
    <lastmod>2026-02-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/13/cisa-adds-actively-exploited-sierra-wireless-router-flaw-to-kev-catalog.html</loc>
    <lastmod>2025-12-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/13/cisa-adds-actively-exploited-sierra-wireless-router-flaw-to-kev-catalog/</loc>
    <lastmod>2025-12-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/13/cybervolks-volklocker-ransomware-flaw-allows-free-decryption.html</loc>
    <lastmod>2025-12-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/13/cybervolks-volklocker-ransomware-flaw-allows-free-decryption/</loc>
    <lastmod>2025-12-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/14/paypal-subscription-feature-abused-to-send-fake-purchase-emails.html</loc>
    <lastmod>2025-12-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/14/paypal-subscription-feature-abused-to-send-fake-purchase-emails/</loc>
    <lastmod>2025-12-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/15/2025-phishing-trends-omni-channel-attacks-phaas-dominance-and-bypassing-phishing-resistant-authentication.html</loc>
    <lastmod>2025-12-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/15/2025-phishing-trends-omni-channel-attacks-phaas-dominance-and-bypassing-phishing-resistant-authentication/</loc>
    <lastmod>2025-12-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/15/700credit-data-breach-exposes-58-million-records-via-compromised-api.html</loc>
    <lastmod>2025-12-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/15/700credit-data-breach-exposes-58-million-records-via-compromised-api/</loc>
    <lastmod>2025-12-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/15/credential-stuffing-attack-on-fantasy-sports-betting-platform.html</loc>
    <lastmod>2025-12-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/15/credential-stuffing-attack-on-fantasy-sports-betting-platform/</loc>
    <lastmod>2025-12-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/15/cyberattack-on-french-interior-ministry-email-servers.html</loc>
    <lastmod>2025-12-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/15/cyberattack-on-french-interior-ministry-email-servers/</loc>
    <lastmod>2025-12-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/15/freepbx-patches-critical-sqli-file-upload-and-authtype-bypass-flaws.html</loc>
    <lastmod>2025-12-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/15/freepbx-patches-critical-sqli-file-upload-and-authtype-bypass-flaws/</loc>
    <lastmod>2025-12-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/15/microsoft-december-2025-updates-break-message-queuing-functionality.html</loc>
    <lastmod>2025-12-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/15/microsoft-december-2025-updates-break-message-queuing-functionality/</loc>
    <lastmod>2025-12-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/15/multiple-critical-vulnerabilities-exploited-in-popular-software.html</loc>
    <lastmod>2025-12-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/15/multiple-critical-vulnerabilities-exploited-in-popular-software/</loc>
    <lastmod>2025-12-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/15/ncsc-releases-playbook-to-embed-cyber-essentials-in-supply-chains.html</loc>
    <lastmod>2025-12-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/15/ncsc-releases-playbook-to-embed-cyber-essentials-in-supply-chains/</loc>
    <lastmod>2025-12-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/15/phantom-stealer-malware-spread-via-iso-phishing-emails-targeting-russian-finance-sector.html</loc>
    <lastmod>2025-12-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/15/phantom-stealer-malware-spread-via-iso-phishing-emails-targeting-russian-finance-sector/</loc>
    <lastmod>2025-12-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/15/soundcloud-vpn-access-blocked-by-403-error.html</loc>
    <lastmod>2025-12-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/15/soundcloud-vpn-access-blocked-by-403-error/</loc>
    <lastmod>2025-12-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/15/urban-vpn-proxy-chrome-extension-harvests-ai-chat-data-from-millions.html</loc>
    <lastmod>2025-12-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/15/urban-vpn-proxy-chrome-extension-harvests-ai-chat-data-from-millions/</loc>
    <lastmod>2025-12-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/15/windows-updates-break-vpn-access-for-wsl-users.html</loc>
    <lastmod>2025-12-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/15/windows-updates-break-vpn-access-for-wsl-users/</loc>
    <lastmod>2025-12-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/16/ai-enabled-coding-assistants-exploited-via-slopsquatting.html</loc>
    <lastmod>2025-12-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/16/ai-enabled-coding-assistants-exploited-via-slopsquatting/</loc>
    <lastmod>2025-12-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/16/ai-powered-phishing-and-social-scams-surge-ahead-of-christmas.html</loc>
    <lastmod>2025-12-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/16/ai-powered-phishing-and-social-scams-surge-ahead-of-christmas/</loc>
    <lastmod>2025-12-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/16/aws-crypto-mining-campaign-exploits-compromised-iam-credentials.html</loc>
    <lastmod>2025-12-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/16/aws-crypto-mining-campaign-exploits-compromised-iam-credentials/</loc>
    <lastmod>2025-12-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/16/cyberattack-disrupts-pdvsa-operations-amid-geopolitical-tensions.html</loc>
    <lastmod>2025-12-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/16/cyberattack-disrupts-pdvsa-operations-amid-geopolitical-tensions/</loc>
    <lastmod>2025-12-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/16/european-authorities-dismantle-ukraine-based-call-center-fraud-ring.html</loc>
    <lastmod>2025-12-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/16/european-authorities-dismantle-ukraine-based-call-center-fraud-ring/</loc>
    <lastmod>2025-12-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/16/google-discontinues-dark-web-report-feature.html</loc>
    <lastmod>2025-12-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/16/google-discontinues-dark-web-report-feature/</loc>
    <lastmod>2025-12-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/16/hounddogai-introduces-privacy-focused-static-code-scanner.html</loc>
    <lastmod>2025-12-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/16/hounddogai-introduces-privacy-focused-static-code-scanner/</loc>
    <lastmod>2025-12-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/16/increased-targeting-of-hypervisors-by-ransomware-groups.html</loc>
    <lastmod>2025-12-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/16/increased-targeting-of-hypervisors-by-ransomware-groups/</loc>
    <lastmod>2025-12-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/16/jumpcloud-remote-assist-privilege-escalation-vulnerability-cve-2025-34352.html</loc>
    <lastmod>2025-12-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/16/jumpcloud-remote-assist-privilege-escalation-vulnerability-cve-2025-34352/</loc>
    <lastmod>2025-12-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/16/majority-of-parked-domains-redirect-to-malicious-content.html</loc>
    <lastmod>2025-12-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/16/majority-of-parked-domains-redirect-to-malicious-content/</loc>
    <lastmod>2025-12-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/16/malicious-nuget-package-tracerfodynlog-steals-cryptocurrency-wallet-data.html</loc>
    <lastmod>2025-12-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/16/malicious-nuget-package-tracerfodynlog-steals-cryptocurrency-wallet-data/</loc>
    <lastmod>2025-12-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/16/microsoft-to-block-exchange-online-access-for-outdated-mobile-devices.html</loc>
    <lastmod>2025-12-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/16/microsoft-to-block-exchange-online-access-for-outdated-mobile-devices/</loc>
    <lastmod>2025-12-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/16/russian-gru-shifts-tactics-to-target-misconfigured-edge-devices-in-western-critical-infrastructure.html</loc>
    <lastmod>2025-12-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/16/russian-gru-shifts-tactics-to-target-misconfigured-edge-devices-in-western-critical-infrastructure/</loc>
    <lastmod>2025-12-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/16/santastealer-malware-as-a-service-targets-browsers-and-crypto-wallets.html</loc>
    <lastmod>2025-12-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/16/santastealer-malware-as-a-service-targets-browsers-and-crypto-wallets/</loc>
    <lastmod>2025-12-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/16/texas-sues-tv-manufacturers-for-alleged-unauthorized-data-collection-via-acr-technology.html</loc>
    <lastmod>2026-03-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/16/texas-sues-tv-manufacturers-for-alleged-unauthorized-data-collection-via-acr-technology/</loc>
    <lastmod>2026-03-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/17/active-exploitation-of-unpatched-cisco-asyncos-zero-day-in-seg-and-sewm-appliances.html</loc>
    <lastmod>2026-01-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/17/active-exploitation-of-unpatched-cisco-asyncos-zero-day-in-seg-and-sewm-appliances/</loc>
    <lastmod>2026-01-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/17/arbitrary-file-upload-vulnerability-in-motors-wordpress-theme.html</loc>
    <lastmod>2025-12-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/17/arbitrary-file-upload-vulnerability-in-motors-wordpress-theme/</loc>
    <lastmod>2025-12-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/17/cellik-android-malware-as-a-service-leverages-google-play-apps.html</loc>
    <lastmod>2025-12-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/17/cellik-android-malware-as-a-service-leverages-google-play-apps/</loc>
    <lastmod>2025-12-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/17/ghostposter-campaign-uses-steganography-in-firefox-addon-logos.html</loc>
    <lastmod>2026-01-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/17/ghostposter-campaign-uses-steganography-in-firefox-addon-logos/</loc>
    <lastmod>2026-01-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/17/isaca-appointed-as-global-credentialing-authority-for-dod-cmmc-program.html</loc>
    <lastmod>2025-12-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/17/isaca-appointed-as-global-credentialing-authority-for-dod-cmmc-program/</loc>
    <lastmod>2025-12-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/17/proactive-threat-intelligence-enhances-soc-effectiveness.html</loc>
    <lastmod>2025-12-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/17/proactive-threat-intelligence-enhances-soc-effectiveness/</loc>
    <lastmod>2025-12-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/17/sonicwall-sma-100-appliances-vulnerability-exploited-in-the-wild.html</loc>
    <lastmod>2025-12-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/17/sonicwall-sma-100-appliances-vulnerability-exploited-in-the-wild/</loc>
    <lastmod>2025-12-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/17/tokens-wireless-biometric-authentication-reduces-login-time-and-costs.html</loc>
    <lastmod>2025-12-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/17/tokens-wireless-biometric-authentication-reduces-login-time-and-costs/</loc>
    <lastmod>2025-12-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/17/weaxor-ransomware-exploits-react2shell-vulnerability-in-targeted-attacks.html</loc>
    <lastmod>2025-12-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/17/weaxor-ransomware-exploits-react2shell-vulnerability-in-targeted-attacks/</loc>
    <lastmod>2025-12-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/18/critical-asus-live-update-flaw-added-to-cisa-kev-catalog.html</loc>
    <lastmod>2025-12-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/18/critical-asus-live-update-flaw-added-to-cisa-kev-catalog/</loc>
    <lastmod>2025-12-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/18/critical-rce-flaw-in-hpe-oneview-software-patched.html</loc>
    <lastmod>2026-03-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/18/critical-rce-flaw-in-hpe-oneview-software-patched/</loc>
    <lastmod>2026-03-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/18/hmrc-reports-over-135000-scam-attempts-targeting-uk-taxpayers.html</loc>
    <lastmod>2025-12-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/18/hmrc-reports-over-135000-scam-attempts-targeting-uk-taxpayers/</loc>
    <lastmod>2025-12-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/18/latvian-crew-member-arrested-for-malware-installation-on-italian-ferry.html</loc>
    <lastmod>2025-12-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/18/latvian-crew-member-arrested-for-malware-installation-on-italian-ferry/</loc>
    <lastmod>2025-12-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/18/lazarus-group-expands-beavertail-malware-capabilities.html</loc>
    <lastmod>2025-12-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/18/lazarus-group-expands-beavertail-malware-capabilities/</loc>
    <lastmod>2025-12-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/18/nis2-compliance-requirements-for-passwords-and-mfa.html</loc>
    <lastmod>2025-12-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/18/nis2-compliance-requirements-for-passwords-and-mfa/</loc>
    <lastmod>2025-12-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/18/oauth-device-code-phishing-campaigns-target-microsoft-365-accounts.html</loc>
    <lastmod>2026-03-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/18/oauth-device-code-phishing-campaigns-target-microsoft-365-accounts/</loc>
    <lastmod>2026-03-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/18/rise-of-dynamic-ai-saas-security-to-address-ai-copilot-risks.html</loc>
    <lastmod>2025-12-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/18/rise-of-dynamic-ai-saas-security-to-address-ai-copilot-risks/</loc>
    <lastmod>2025-12-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/18/threatsday-bulletin-emerging-cyber-threat-trends.html</loc>
    <lastmod>2026-03-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/18/threatsday-bulletin-emerging-cyber-threat-trends/</loc>
    <lastmod>2026-03-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/18/university-of-sydney-data-breach-exposes-personal-information-of-27000-individuals.html</loc>
    <lastmod>2025-12-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/18/university-of-sydney-data-breach-exposes-personal-information-of-27000-individuals/</loc>
    <lastmod>2025-12-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/18/us-seizes-e-note-crypto-exchange-for-ransomware-laundering.html</loc>
    <lastmod>2025-12-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/18/us-seizes-e-note-crypto-exchange-for-ransomware-laundering/</loc>
    <lastmod>2025-12-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/18/windows-updates-cause-remoteapp-connection-failures-in-azure-virtual-desktop.html</loc>
    <lastmod>2026-01-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/18/windows-updates-cause-remoteapp-connection-failures-in-azure-virtual-desktop/</loc>
    <lastmod>2026-01-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/19/active-exploitation-of-critical-watchguard-fireware-os-vpn-vulnerability-cve-2025-14733.html</loc>
    <lastmod>2025-12-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/19/active-exploitation-of-critical-watchguard-fireware-os-vpn-vulnerability-cve-2025-14733/</loc>
    <lastmod>2025-12-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/19/countloader-and-gachiloader-malware-campaigns-via-cracked-software-and-youtube.html</loc>
    <lastmod>2025-12-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/19/countloader-and-gachiloader-malware-campaigns-via-cracked-software-and-youtube/</loc>
    <lastmod>2025-12-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/19/criminal-ip-and-cortex-xsoar-integration-enhances-incident-response-with-ai-driven-exposure-intelligence.html</loc>
    <lastmod>2025-12-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/19/criminal-ip-and-cortex-xsoar-integration-enhances-incident-response-with-ai-driven-exposure-intelligence/</loc>
    <lastmod>2025-12-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/19/identity-fraud-in-home-care-services-puts-patients-at-risk.html</loc>
    <lastmod>2025-12-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/19/identity-fraud-in-home-care-services-puts-patients-at-risk/</loc>
    <lastmod>2025-12-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/19/instacart-to-refund-60m-for-deceptive-subscription-practices.html</loc>
    <lastmod>2025-12-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/19/instacart-to-refund-60m-for-deceptive-subscription-practices/</loc>
    <lastmod>2025-12-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/19/microsoft-teams-outage-affects-global-users-with-message-delays.html</loc>
    <lastmod>2026-02-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/19/microsoft-teams-outage-affects-global-users-with-message-delays/</loc>
    <lastmod>2026-02-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/19/trump-administrations-2025-cybersecurity-and-policy-shifts.html</loc>
    <lastmod>2025-12-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/19/trump-administrations-2025-cybersecurity-and-policy-shifts/</loc>
    <lastmod>2025-12-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/19/uefi-flaw-enables-early-boot-dma-attacks-on-multiple-motherboard-vendors.html</loc>
    <lastmod>2025-12-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/19/uefi-flaw-enables-early-boot-dma-attacks-on-multiple-motherboard-vendors/</loc>
    <lastmod>2025-12-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/19/us-charges-54-in-atm-jackpotting-conspiracy-linked-to-venezuelan-crime-syndicate.html</loc>
    <lastmod>2026-02-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/19/us-charges-54-in-atm-jackpotting-conspiracy-linked-to-venezuelan-crime-syndicate/</loc>
    <lastmod>2026-02-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/20/ransomhouse-enhances-encryption-with-multi-layered-data-processing.html</loc>
    <lastmod>2025-12-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/20/ransomhouse-enhances-encryption-with-multi-layered-data-processing/</loc>
    <lastmod>2025-12-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/21/infy-apt-resurfaces-with-updated-malware-and-expanded-targeting.html</loc>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/21/infy-apt-resurfaces-with-updated-malware-and-expanded-targeting/</loc>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/22/86-increase-in-fake-delivery-websites-targeting-holiday-shoppers.html</loc>
    <lastmod>2025-12-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/22/86-increase-in-fake-delivery-websites-targeting-holiday-shoppers/</loc>
    <lastmod>2025-12-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/22/android-malware-wonderland-targets-uzbekistan-with-sms-theft-and-rat-capabilities.html</loc>
    <lastmod>2025-12-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/22/android-malware-wonderland-targets-uzbekistan-with-sms-theft-and-rat-capabilities/</loc>
    <lastmod>2025-12-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/22/dxs-international-cyber-attack-confirmed-minimal-impact-on-nhs-services.html</loc>
    <lastmod>2025-12-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/22/dxs-international-cyber-attack-confirmed-minimal-impact-on-nhs-services/</loc>
    <lastmod>2025-12-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/22/exploitation-of-network-security-flaws-by-apt-actors.html</loc>
    <lastmod>2025-12-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/22/exploitation-of-network-security-flaws-by-apt-actors/</loc>
    <lastmod>2025-12-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/22/malicious-npm-package-lotusbail-steals-whatsapp-credentials-and-messages.html</loc>
    <lastmod>2025-12-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/22/malicious-npm-package-lotusbail-steals-whatsapp-credentials-and-messages/</loc>
    <lastmod>2025-12-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/22/scripted-sparrow-bec-gang-sends-millions-of-customized-emails-monthly.html</loc>
    <lastmod>2025-12-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/22/scripted-sparrow-bec-gang-sends-millions-of-customized-emails-monthly/</loc>
    <lastmod>2025-12-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/22/wave-browser-promotes-sustainable-web-browsing-with-environmental-impact.html</loc>
    <lastmod>2025-12-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/22/wave-browser-promotes-sustainable-web-browsing-with-environmental-impact/</loc>
    <lastmod>2025-12-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/23/baker-university-data-breach-exposes-53624-records.html</loc>
    <lastmod>2026-01-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/23/baker-university-data-breach-exposes-53624-records/</loc>
    <lastmod>2026-01-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/23/critical-n8n-workflow-automation-vulnerability-cve-2025-68613.html</loc>
    <lastmod>2026-03-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/23/critical-n8n-workflow-automation-vulnerability-cve-2025-68613/</loc>
    <lastmod>2026-03-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/23/ddos-attack-disrupts-la-poste-and-la-banque-postale-services.html</loc>
    <lastmod>2025-12-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/23/ddos-attack-disrupts-la-poste-and-la-banque-postale-services/</loc>
    <lastmod>2025-12-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/23/fcc-bans-foreign-made-drones-and-critical-components-over-national-security-risks.html</loc>
    <lastmod>2025-12-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/23/fcc-bans-foreign-made-drones-and-critical-components-over-national-security-risks/</loc>
    <lastmod>2025-12-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/23/google-workspace-password-manager-passwd-launched-for-enterprise-credential-management.html</loc>
    <lastmod>2025-12-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/23/google-workspace-password-manager-passwd-launched-for-enterprise-credential-management/</loc>
    <lastmod>2025-12-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/23/italy-fines-apple-116-million-for-app-store-tracking-privacy-policy.html</loc>
    <lastmod>2025-12-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/23/italy-fines-apple-116-million-for-app-store-tracking-privacy-policy/</loc>
    <lastmod>2025-12-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/23/microsoft-introduces-hardware-accelerated-bitlocker-in-windows-11.html</loc>
    <lastmod>2025-12-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/23/microsoft-introduces-hardware-accelerated-bitlocker-in-windows-11/</loc>
    <lastmod>2025-12-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/23/microsoft-teams-enables-default-messaging-safety-features.html</loc>
    <lastmod>2025-12-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/23/microsoft-teams-enables-default-messaging-safety-features/</loc>
    <lastmod>2025-12-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/23/phantom-shuttle-chrome-extensions-steal-user-credentials.html</loc>
    <lastmod>2025-12-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/23/phantom-shuttle-chrome-extensions-steal-user-credentials/</loc>
    <lastmod>2025-12-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/23/ransomware-activity-trends-and-victim-statistics-in-2025.html</loc>
    <lastmod>2025-12-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/23/ransomware-activity-trends-and-victim-statistics-in-2025/</loc>
    <lastmod>2025-12-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/23/webrat-malware-distributed-via-fake-github-exploits.html</loc>
    <lastmod>2025-12-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/23/webrat-malware-distributed-via-fake-github-exploits/</loc>
    <lastmod>2025-12-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/24/coordinated-fake-job-ad-scams-targeting-mena-region.html</loc>
    <lastmod>2025-12-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/24/coordinated-fake-job-ad-scams-targeting-mena-region/</loc>
    <lastmod>2025-12-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/24/high-severity-rce-flaw-in-mongodb-requires-immediate-patching.html</loc>
    <lastmod>2025-12-31</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/24/high-severity-rce-flaw-in-mongodb-requires-immediate-patching/</loc>
    <lastmod>2025-12-31</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/24/increased-targeting-of-smbs-by-cybercriminals-in-2025.html</loc>
    <lastmod>2025-12-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/24/increased-targeting-of-smbs-by-cybercriminals-in-2025/</loc>
    <lastmod>2025-12-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/24/microsoft-teams-to-integrate-external-user-blocking-via-defender-for-office-365.html</loc>
    <lastmod>2025-12-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/24/microsoft-teams-to-integrate-external-user-blocking-via-defender-for-office-365/</loc>
    <lastmod>2025-12-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/24/nist-and-mitre-launch-20m-ai-centers-for-manufacturing-and-cybersecurity.html</loc>
    <lastmod>2025-12-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/24/nist-and-mitre-launch-20m-ai-centers-for-manufacturing-and-cybersecurity/</loc>
    <lastmod>2025-12-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/24/nomani-investment-scam-expands-with-ai-deepfake-ads.html</loc>
    <lastmod>2025-12-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/24/nomani-investment-scam-expands-with-ai-deepfake-ads/</loc>
    <lastmod>2025-12-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/24/sec-charges-in-14m-crypto-scam-using-fake-ai-investment-tips.html</loc>
    <lastmod>2025-12-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/24/sec-charges-in-14m-crypto-scam-using-fake-ai-investment-tips/</loc>
    <lastmod>2025-12-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/24/servicenow-acquires-ot-security-specialist-armis-for-78bn.html</loc>
    <lastmod>2025-12-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/24/servicenow-acquires-ot-security-specialist-armis-for-78bn/</loc>
    <lastmod>2025-12-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/24/typosquatted-mas-domain-distributes-cosmali-loader-malware.html</loc>
    <lastmod>2025-12-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/24/typosquatted-mas-domain-distributes-cosmali-loader-malware/</loc>
    <lastmod>2025-12-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/25/active-exploitation-of-fortios-ssl-vpn-2fa-bypass-vulnerability-cve-2020-12812.html</loc>
    <lastmod>2025-12-30</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/25/active-exploitation-of-fortios-ssl-vpn-2fa-bypass-vulnerability-cve-2020-12812/</loc>
    <lastmod>2025-12-30</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/25/cisa-adds-actively-exploited-digiever-nvr-vulnerability-to-kev-catalog.html</loc>
    <lastmod>2025-12-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/25/cisa-adds-actively-exploited-digiever-nvr-vulnerability-to-kev-catalog/</loc>
    <lastmod>2025-12-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/25/emerging-trends-in-cyber-threat-tactics-and-techniques.html</loc>
    <lastmod>2025-12-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/25/emerging-trends-in-cyber-threat-tactics-and-techniques/</loc>
    <lastmod>2025-12-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/25/google-introduces-gmail-address-change-feature.html</loc>
    <lastmod>2026-01-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/25/google-introduces-gmail-address-change-feature/</loc>
    <lastmod>2026-01-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/25/openai-testing-skills-feature-for-chatgpt.html</loc>
    <lastmod>2025-12-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/25/openai-testing-skills-feature-for-chatgpt/</loc>
    <lastmod>2025-12-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/26/dark-reading-launches-2025-state-of-application-security-survey.html</loc>
    <lastmod>2025-12-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/26/dark-reading-launches-2025-state-of-application-security-survey/</loc>
    <lastmod>2025-12-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/26/evasive-panda-conducts-dns-poisoning-campaign-to-deploy-mgbot-malware.html</loc>
    <lastmod>2025-12-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/26/evasive-panda-conducts-dns-poisoning-campaign-to-deploy-mgbot-malware/</loc>
    <lastmod>2025-12-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/26/grubhub-crypto-scam-targets-users-with-fake-holiday-promotion.html</loc>
    <lastmod>2026-01-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/26/grubhub-crypto-scam-targets-users-with-fake-holiday-promotion/</loc>
    <lastmod>2026-01-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/26/langchain-core-serialization-injection-vulnerability-cve-2025-68664.html</loc>
    <lastmod>2025-12-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/26/langchain-core-serialization-injection-vulnerability-cve-2025-68664/</loc>
    <lastmod>2025-12-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/26/openai-introduces-formatting-blocks-for-chatgpt.html</loc>
    <lastmod>2025-12-30</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/26/openai-introduces-formatting-blocks-for-chatgpt/</loc>
    <lastmod>2025-12-30</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/26/trust-wallet-chrome-extension-exploit-leads-to-millions-in-crypto-losses.html</loc>
    <lastmod>2026-01-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/26/trust-wallet-chrome-extension-exploit-leads-to-millions-in-crypto-losses/</loc>
    <lastmod>2026-01-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/28/condé-nast-data-leak-by-threat-actor-lovely.html</loc>
    <lastmod>2025-12-29</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/28/condé-nast-data-leak-by-threat-actor-lovely/</loc>
    <lastmod>2025-12-29</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/28/ubisoft-rainbow-six-siege-breach-grants-players-billions-in-in-game-currency.html</loc>
    <lastmod>2025-12-29</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/28/ubisoft-rainbow-six-siege-breach-grants-players-billions-in-in-game-currency/</loc>
    <lastmod>2025-12-29</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/29/27-malicious-npm-packages-used-in-targeted-phishing-campaign.html</loc>
    <lastmod>2025-12-30</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/29/27-malicious-npm-packages-used-in-targeted-phishing-campaign/</loc>
    <lastmod>2025-12-30</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/29/ai-specific-attack-vectors-exploit-gaps-in-traditional-security-frameworks.html</loc>
    <lastmod>2025-12-30</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/29/ai-specific-attack-vectors-exploit-gaps-in-traditional-security-frameworks/</loc>
    <lastmod>2025-12-30</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/29/former-coinbase-support-agent-arrested-for-facilitating-data-breach.html</loc>
    <lastmod>2025-12-30</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/29/former-coinbase-support-agent-arrested-for-facilitating-data-breach/</loc>
    <lastmod>2025-12-30</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/29/krebsonsecurity-highlights-16-years-of-cybercrime-investigations.html</loc>
    <lastmod>2025-12-30</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/29/krebsonsecurity-highlights-16-years-of-cybercrime-investigations/</loc>
    <lastmod>2025-12-30</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/29/lithuanian-national-arrested-for-kmsauto-clipper-malware-campaign.html</loc>
    <lastmod>2025-12-30</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/29/lithuanian-national-arrested-for-kmsauto-clipper-malware-campaign/</loc>
    <lastmod>2025-12-30</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/29/microsoft-introduces-gpt-52-as-smart-plus-mode-in-copilot.html</loc>
    <lastmod>2025-12-30</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/29/microsoft-introduces-gpt-52-as-smart-plus-mode-in-copilot/</loc>
    <lastmod>2025-12-30</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/29/mongobleed-vulnerability-actively-exploited-in-the-wild.html</loc>
    <lastmod>2025-12-30</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/29/mongobleed-vulnerability-actively-exploited-in-the-wild/</loc>
    <lastmod>2025-12-30</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/29/owasp-releases-agentic-ai-top-10-framework.html</loc>
    <lastmod>2025-12-30</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/29/owasp-releases-agentic-ai-top-10-framework/</loc>
    <lastmod>2025-12-30</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/29/sax-llp-data-breach-impacts-220000-individuals.html</loc>
    <lastmod>2025-12-30</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/29/sax-llp-data-breach-impacts-220000-individuals/</loc>
    <lastmod>2025-12-30</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/30/ai-integration-challenges-in-modern-soc-workflows.html</loc>
    <lastmod>2025-12-31</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/30/ai-integration-challenges-in-modern-soc-workflows/</loc>
    <lastmod>2025-12-31</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/30/critical-smartermail-arbitrary-file-upload-vulnerability-disclosed.html</loc>
    <lastmod>2025-12-31</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/30/critical-smartermail-arbitrary-file-upload-vulnerability-disclosed/</loc>
    <lastmod>2025-12-31</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/30/errtraffic-service-enables-automated-clickfix-attacks-via-fake-browser-glitches.html</loc>
    <lastmod>2025-12-31</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/30/errtraffic-service-enables-automated-clickfix-attacks-via-fake-browser-glitches/</loc>
    <lastmod>2025-12-31</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/31/critical-authentication-bypass-vulnerability-in-ibm-api-connect.html</loc>
    <lastmod>2026-01-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/31/critical-authentication-bypass-vulnerability-in-ibm-api-connect/</loc>
    <lastmod>2026-01-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/31/darkspectre-campaigns-target-88-million-users-with-malicious-browser-extensions.html</loc>
    <lastmod>2026-01-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/31/darkspectre-campaigns-target-88-million-users-with-malicious-browser-extensions/</loc>
    <lastmod>2026-01-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/31/unleash-protocol-suffers-39m-loss-after-multisig-hijack.html</loc>
    <lastmod>2026-01-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/31/unleash-protocol-suffers-39m-loss-after-multisig-hijack/</loc>
    <lastmod>2026-01-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/31/us-treasury-removes-sanctions-on-three-individuals-linked-to-intellexa-and-predator-spyware.html</loc>
    <lastmod>2026-01-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2025/12/31/us-treasury-removes-sanctions-on-three-individuals-linked-to-intellexa-and-predator-spyware/</loc>
    <lastmod>2026-01-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/01/flipper-zero-and-raspberry-pi-banned-from-nyc-mayoral-inauguration.html</loc>
    <lastmod>2026-01-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/01/flipper-zero-and-raspberry-pi-banned-from-nyc-mayoral-inauguration/</loc>
    <lastmod>2026-01-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/06/microsoft-cancels-exchange-online-bulk-email-rate-limit-plans.html</loc>
    <lastmod>2026-01-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/06/microsoft-cancels-exchange-online-bulk-email-rate-limit-plans/</loc>
    <lastmod>2026-01-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/07/black-cat-seo-poisoning-campaign-targets-popular-software-searches.html</loc>
    <lastmod>2026-01-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/07/black-cat-seo-poisoning-campaign-targets-popular-software-searches/</loc>
    <lastmod>2026-01-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/07/chatgpt-market-share-decline-as-gemini-gains-popularity.html</loc>
    <lastmod>2026-01-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/07/chatgpt-market-share-decline-as-gemini-gains-popularity/</loc>
    <lastmod>2026-01-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/07/critical-path-traversal-flaw-in-jspdf-library.html</loc>
    <lastmod>2026-01-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/07/critical-path-traversal-flaw-in-jspdf-library/</loc>
    <lastmod>2026-01-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/07/emergence-of-ai-driven-cybercrime-and-vibe-hacking.html</loc>
    <lastmod>2026-01-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/07/emergence-of-ai-driven-cybercrime-and-vibe-hacking/</loc>
    <lastmod>2026-01-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/07/google-hiring-ai-quality-engineers-to-address-ai-overviews-hallucinations.html</loc>
    <lastmod>2026-01-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/07/google-hiring-ai-quality-engineers-to-address-ai-overviews-hallucinations/</loc>
    <lastmod>2026-01-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/07/infostealer-breach-exploits-lack-of-mfa-in-50-enterprises.html</loc>
    <lastmod>2026-01-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/07/infostealer-breach-exploits-lack-of-mfa-in-50-enterprises/</loc>
    <lastmod>2026-01-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/07/logitech-options-and-g-hub-macos-apps-disabled-by-expired-certificate.html</loc>
    <lastmod>2026-01-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/07/logitech-options-and-g-hub-macos-apps-disabled-by-expired-certificate/</loc>
    <lastmod>2026-01-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/07/microsoft-outlook-classic-bug-prevents-opening-encrypted-emails.html</loc>
    <lastmod>2026-01-31</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/07/microsoft-outlook-classic-bug-prevents-opening-encrypted-emails/</loc>
    <lastmod>2026-01-31</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/07/misconfigured-email-routing-exploited-for-internal-domain-phishing.html</loc>
    <lastmod>2026-01-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/07/misconfigured-email-routing-exploited-for-internal-domain-phishing/</loc>
    <lastmod>2026-01-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/07/openai-rolls-out-gpt-52-codex-max-for-select-users.html</loc>
    <lastmod>2026-01-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/07/openai-rolls-out-gpt-52-codex-max-for-select-users/</loc>
    <lastmod>2026-01-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/07/owncloud-urges-mfa-adoption-following-credential-theft-attacks.html</loc>
    <lastmod>2026-01-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/07/owncloud-urges-mfa-adoption-following-credential-theft-attacks/</loc>
    <lastmod>2026-01-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/07/pkr-mtsi-malware-loader-distributes-diverse-payloads-via-malvertising-and-seo-poisoning.html</loc>
    <lastmod>2026-01-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/07/pkr-mtsi-malware-loader-distributes-diverse-payloads-via-malvertising-and-seo-poisoning/</loc>
    <lastmod>2026-01-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/07/rising-cybersecurity-risks-from-non-human-identities.html</loc>
    <lastmod>2026-01-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/07/rising-cybersecurity-risks-from-non-human-identities/</loc>
    <lastmod>2026-01-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/07/shadow-ai-usage-and-data-leak-risks-in-workplace.html</loc>
    <lastmod>2026-01-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/07/shadow-ai-usage-and-data-leak-risks-in-workplace/</loc>
    <lastmod>2026-01-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/07/veeam-patches-critical-rce-vulnerability-in-backup-replication.html</loc>
    <lastmod>2026-03-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/07/veeam-patches-critical-rce-vulnerability-in-backup-replication/</loc>
    <lastmod>2026-03-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/07/webinar-on-ai-powered-zero-trust-for-detecting-fileless-attacks.html</loc>
    <lastmod>2026-01-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/07/webinar-on-ai-powered-zero-trust-for-detecting-fileless-attacks/</loc>
    <lastmod>2026-01-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/08/chainguard-report-highlights-open-source-security-risks-in-longtail-images.html</loc>
    <lastmod>2026-01-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/08/chainguard-report-highlights-open-source-security-risks-in-longtail-images/</loc>
    <lastmod>2026-01-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/08/china-linked-uat-7290-targets-telecoms-with-linux-malware-and-orb-nodes.html</loc>
    <lastmod>2026-03-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/08/china-linked-uat-7290-targets-telecoms-with-linux-malware-and-orb-nodes/</loc>
    <lastmod>2026-03-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/08/cisa-adds-actively-exploited-microsoft-office-and-hpe-oneview-vulnerabilities-to-kev-catalog.html</loc>
    <lastmod>2026-01-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/08/cisa-adds-actively-exploited-microsoft-office-and-hpe-oneview-vulnerabilities-to-kev-catalog/</loc>
    <lastmod>2026-01-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/08/cisco-switches-affected-by-dns-client-bug-causing-reboot-loops.html</loc>
    <lastmod>2026-01-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/08/cisco-switches-affected-by-dns-client-bug-causing-reboot-loops/</loc>
    <lastmod>2026-01-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/08/critical-coolify-flaws-enable-full-server-compromise-on-self-hosted-instances.html</loc>
    <lastmod>2026-01-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/08/critical-coolify-flaws-enable-full-server-compromise-on-self-hosted-instances/</loc>
    <lastmod>2026-01-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/08/crowdstrike-acquires-sgnl-for-740-million-to-enhance-identity-security.html</loc>
    <lastmod>2026-01-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/08/crowdstrike-acquires-sgnl-for-740-million-to-enhance-identity-security/</loc>
    <lastmod>2026-01-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/08/endpoint-disruption-recovery-times-and-costs-for-us-and-uk-organizations.html</loc>
    <lastmod>2026-01-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/08/endpoint-disruption-recovery-times-and-costs-for-us-and-uk-organizations/</loc>
    <lastmod>2026-01-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/08/gobruteforcer-botnet-expands-attacks-on-linux-servers.html</loc>
    <lastmod>2026-01-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/08/gobruteforcer-botnet-expands-attacks-on-linux-servers/</loc>
    <lastmod>2026-01-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/08/microsoft-enforces-mfa-for-microsoft-365-admin-center-access.html</loc>
    <lastmod>2026-01-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/08/microsoft-enforces-mfa-for-microsoft-365-admin-center-access/</loc>
    <lastmod>2026-01-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/08/microsoft-exchange-online-imap4-access-disruption-due-to-authentication-misconfiguration.html</loc>
    <lastmod>2026-03-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/08/microsoft-exchange-online-imap4-access-disruption-due-to-authentication-misconfiguration/</loc>
    <lastmod>2026-03-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/08/nodecordrat-malware-delivered-via-bitcoin-themed-npm-packages.html</loc>
    <lastmod>2026-01-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/08/nodecordrat-malware-delivered-via-bitcoin-themed-npm-packages/</loc>
    <lastmod>2026-01-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/08/openai-introduces-chatgpt-health-with-privacy-commitments.html</loc>
    <lastmod>2026-01-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/08/openai-introduces-chatgpt-health-with-privacy-commitments/</loc>
    <lastmod>2026-01-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/08/resecurity-lures-scattered-lapsus-hunters-into-honeytrap.html</loc>
    <lastmod>2026-01-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/08/resecurity-lures-scattered-lapsus-hunters-into-honeytrap/</loc>
    <lastmod>2026-01-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/08/us-withdraws-from-global-forum-on-cyber-expertise-and-hybrid-coe.html</loc>
    <lastmod>2026-01-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/08/us-withdraws-from-global-forum-on-cyber-expertise-and-hybrid-coe/</loc>
    <lastmod>2026-01-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/09/ai-powered-investment-fraud-operation-mimics-truman-show.html</loc>
    <lastmod>2026-01-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/09/ai-powered-investment-fraud-operation-mimics-truman-show/</loc>
    <lastmod>2026-01-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/09/bitdefender-webinar-on-2026-cybersecurity-trends-and-risks.html</loc>
    <lastmod>2026-01-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/09/bitdefender-webinar-on-2026-cybersecurity-trends-and-risks/</loc>
    <lastmod>2026-01-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/09/cisa-retires-10-emergency-directives-in-bulk-closure.html</loc>
    <lastmod>2026-01-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/09/cisa-retires-10-emergency-directives-in-bulk-closure/</loc>
    <lastmod>2026-01-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/09/critical-rce-flaw-in-trend-micro-apex-central-on-prem-windows.html</loc>
    <lastmod>2026-01-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/09/critical-rce-flaw-in-trend-micro-apex-central-on-prem-windows/</loc>
    <lastmod>2026-01-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/09/deepfake-face-swapping-tools-bypass-kyc-protections.html</loc>
    <lastmod>2026-01-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/09/deepfake-face-swapping-tools-bypass-kyc-protections/</loc>
    <lastmod>2026-01-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/09/global-law-enforcement-disrupts-black-axe-cybercrime-operations.html</loc>
    <lastmod>2026-01-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/09/global-law-enforcement-disrupts-black-axe-cybercrime-operations/</loc>
    <lastmod>2026-01-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/09/google-introduces-ai-inbox-with-gemini-for-gmail.html</loc>
    <lastmod>2026-01-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/09/google-introduces-ai-inbox-with-gemini-for-gmail/</loc>
    <lastmod>2026-01-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/09/illicit-cryptocurrency-transactions-surge-160-in-2025.html</loc>
    <lastmod>2026-01-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/09/illicit-cryptocurrency-transactions-surge-160-in-2025/</loc>
    <lastmod>2026-01-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/09/illinois-department-of-human-services-data-exposure-affects-700k-residents.html</loc>
    <lastmod>2026-01-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/09/illinois-department-of-human-services-data-exposure-affects-700k-residents/</loc>
    <lastmod>2026-01-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/09/microsoft-introduces-policy-to-uninstall-copilot-on-managed-devices.html</loc>
    <lastmod>2026-01-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/09/microsoft-introduces-policy-to-uninstall-copilot-on-managed-devices/</loc>
    <lastmod>2026-01-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/09/security-teams-urged-to-shift-focus-beyond-phishing-click-rates.html</loc>
    <lastmod>2026-01-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/09/security-teams-urged-to-shift-focus-beyond-phishing-click-rates/</loc>
    <lastmod>2026-01-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/09/threat-actors-target-misconfigured-proxies-for-paid-llm-access.html</loc>
    <lastmod>2026-01-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/09/threat-actors-target-misconfigured-proxies-for-paid-llm-access/</loc>
    <lastmod>2026-01-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/09/xai-announces-major-grok-code-upgrade-and-new-cli.html</loc>
    <lastmod>2026-01-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/09/xai-announces-major-grok-code-upgrade-and-new-cli/</loc>
    <lastmod>2026-01-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/10/anthropic-denies-fake-claude-ban-notifications.html</loc>
    <lastmod>2026-01-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/10/anthropic-denies-fake-claude-ban-notifications/</loc>
    <lastmod>2026-01-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/10/ireland-recalls-13000-passports-due-to-software-induced-printing-defect.html</loc>
    <lastmod>2026-01-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/10/ireland-recalls-13000-passports-due-to-software-induced-printing-defect/</loc>
    <lastmod>2026-01-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/10/openai-tests-chatgpt-jobs-feature-for-career-assistance.html</loc>
    <lastmod>2026-01-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/10/openai-tests-chatgpt-jobs-feature-for-career-assistance/</loc>
    <lastmod>2026-01-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/11/california-bans-datamasters-from-reselling-health-data-of-millions.html</loc>
    <lastmod>2026-01-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/11/california-bans-datamasters-from-reselling-health-data-of-millions/</loc>
    <lastmod>2026-01-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/11/instagram-data-leak-claims-denied-by-meta.html</loc>
    <lastmod>2026-01-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/11/instagram-data-leak-claims-denied-by-meta/</loc>
    <lastmod>2026-01-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/11/microsoft-retires-send-to-kindle-feature-in-word.html</loc>
    <lastmod>2026-01-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/11/microsoft-retires-send-to-kindle-feature-in-word/</loc>
    <lastmod>2026-01-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/12/anthropic-expands-claude-ai-to-healthcare-with-hipaa-ready-tools.html</loc>
    <lastmod>2026-01-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/12/anthropic-expands-claude-ai-to-healthcare-with-hipaa-ready-tools/</loc>
    <lastmod>2026-01-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/12/anthropic-introduces-claude-for-healthcare-with-secure-health-record-access.html</loc>
    <lastmod>2026-01-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/12/anthropic-introduces-claude-for-healthcare-with-secure-health-record-access/</loc>
    <lastmod>2026-01-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/12/apex-legends-live-match-hijacking-incident.html</loc>
    <lastmod>2026-01-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/12/apex-legends-live-match-hijacking-incident/</loc>
    <lastmod>2026-01-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/12/apple-integrates-google-gemini-into-siri-for-enhanced-ai-capabilities.html</loc>
    <lastmod>2026-01-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/12/apple-integrates-google-gemini-into-siri-for-enhanced-ai-capabilities/</loc>
    <lastmod>2026-01-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/12/cyber-fraud-surpasses-ransomware-as-top-business-concern.html</loc>
    <lastmod>2026-01-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/12/cyber-fraud-surpasses-ransomware-as-top-business-concern/</loc>
    <lastmod>2026-01-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/12/endesa-data-breach-exposes-customer-contract-information.html</loc>
    <lastmod>2026-01-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/12/endesa-data-breach-exposes-customer-contract-information/</loc>
    <lastmod>2026-01-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/12/microsoft-365-access-reviews-to-prevent-cloud-data-leaks.html</loc>
    <lastmod>2026-01-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/12/microsoft-365-access-reviews-to-prevent-cloud-data-leaks/</loc>
    <lastmod>2026-01-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/12/microsoft-lens-scanner-app-retirement-for-ios-and-android.html</loc>
    <lastmod>2026-01-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/12/microsoft-lens-scanner-app-retirement-for-ios-and-android/</loc>
    <lastmod>2026-01-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/12/n8n-supply-chain-attack-exploits-community-nodes-to-steal-oauth-tokens.html</loc>
    <lastmod>2026-01-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/12/n8n-supply-chain-attack-exploits-community-nodes-to-steal-oauth-tokens/</loc>
    <lastmod>2026-01-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/12/palo-alto-networks-introduces-shield-framework-for-vibe-coding-security-governance.html</loc>
    <lastmod>2026-01-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/12/palo-alto-networks-introduces-shield-framework-for-vibe-coding-security-governance/</loc>
    <lastmod>2026-01-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/12/pbaas-providers-enable-industrial-scale-pig-butchering-scams.html</loc>
    <lastmod>2026-01-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/12/pbaas-providers-enable-industrial-scale-pig-butchering-scams/</loc>
    <lastmod>2026-01-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/12/ransomware-attack-on-university-of-hawaii-cancer-center.html</loc>
    <lastmod>2026-03-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/12/ransomware-attack-on-university-of-hawaii-cancer-center/</loc>
    <lastmod>2026-03-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/12/record-158bn-in-illicit-crypto-activity-in-2025.html</loc>
    <lastmod>2026-01-31</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/12/record-158bn-in-illicit-crypto-activity-in-2025/</loc>
    <lastmod>2026-01-31</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/12/targets-internal-source-code-allegedly-stolen-and-offered-for-sale.html</loc>
    <lastmod>2026-01-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/12/targets-internal-source-code-allegedly-stolen-and-offered-for-sale/</loc>
    <lastmod>2026-01-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/12/telegram-proxy-links-expose-user-ip-addresses-on-click.html</loc>
    <lastmod>2026-01-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/12/telegram-proxy-links-expose-user-ip-addresses-on-click/</loc>
    <lastmod>2026-01-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/13/android-volume-key-malfunction-with-select-to-speak-enabled.html</loc>
    <lastmod>2026-01-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/13/android-volume-key-malfunction-with-select-to-speak-enabled/</loc>
    <lastmod>2026-01-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/13/attackers-optimize-traditional-ttps-with-ai-in-2025.html</loc>
    <lastmod>2026-01-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/13/attackers-optimize-traditional-ttps-with-ai-in-2025/</loc>
    <lastmod>2026-01-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/13/belgian-hospital-az-monica-disrupted-by-cyberattack.html</loc>
    <lastmod>2026-01-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/13/belgian-hospital-az-monica-disrupted-by-cyberattack/</loc>
    <lastmod>2026-01-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/13/central-maine-healthcare-breach-exposes-data-of-145000-individuals.html</loc>
    <lastmod>2026-01-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/13/central-maine-healthcare-breach-exposes-data-of-145000-individuals/</loc>
    <lastmod>2026-01-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/13/dutch-hacker-sentenced-for-port-system-breaches-and-drug-trafficking.html</loc>
    <lastmod>2026-01-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/13/dutch-hacker-sentenced-for-port-system-breaches-and-drug-trafficking/</loc>
    <lastmod>2026-01-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/13/linkedin-phishing-campaign-using-fake-comment-replies.html</loc>
    <lastmod>2026-01-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/13/linkedin-phishing-campaign-using-fake-comment-replies/</loc>
    <lastmod>2026-01-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/13/magecart-campaign-targets-six-major-card-networks-since-2022.html</loc>
    <lastmod>2026-01-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/13/magecart-campaign-targets-six-major-card-networks-since-2022/</loc>
    <lastmod>2026-01-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/13/malicious-chrome-extension-targets-mexc-api-keys-via-telegram-exfiltration.html</loc>
    <lastmod>2026-01-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/13/malicious-chrome-extension-targets-mexc-api-keys-via-telegram-exfiltration/</loc>
    <lastmod>2026-01-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/13/microsoft-january-2026-patch-tuesday-addresses-3-zero-days-114-flaws.html</loc>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/13/microsoft-january-2026-patch-tuesday-addresses-3-zero-days-114-flaws/</loc>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/13/microsoft-releases-windows-10-kb5073724-extended-security-update.html</loc>
    <lastmod>2026-01-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/13/microsoft-releases-windows-10-kb5073724-extended-security-update/</loc>
    <lastmod>2026-01-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/13/security-risks-in-agentic-ai-workflows-and-machine-control-protocols.html</loc>
    <lastmod>2026-01-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/13/security-risks-in-agentic-ai-workflows-and-machine-control-protocols/</loc>
    <lastmod>2026-01-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/13/voidlink-malware-framework-targets-cloud-and-container-environments.html</loc>
    <lastmod>2026-02-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/13/voidlink-malware-framework-targets-cloud-and-container-environments/</loc>
    <lastmod>2026-02-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/14/ai-agents-as-privilege-escalation-paths-in-enterprise-environments.html</loc>
    <lastmod>2026-01-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/14/ai-agents-as-privilege-escalation-paths-in-enterprise-environments/</loc>
    <lastmod>2026-01-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/14/aikido-security-secures-60m-in-series-b-funding.html</loc>
    <lastmod>2026-01-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/14/aikido-security-secures-60m-in-series-b-funding/</loc>
    <lastmod>2026-01-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/14/ciso-turnover-and-succession-planning-challenges.html</loc>
    <lastmod>2026-01-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/14/ciso-turnover-and-succession-planning-challenges/</loc>
    <lastmod>2026-01-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/14/cnil-fines-free-mobile-42-million-for-2024-data-breach.html</loc>
    <lastmod>2026-01-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/14/cnil-fines-free-mobile-42-million-for-2024-data-breach/</loc>
    <lastmod>2026-01-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/14/critical-nodejs-async-hooks-stack-overflow-vulnerability.html</loc>
    <lastmod>2026-01-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/14/critical-nodejs-async-hooks-stack-overflow-vulnerability/</loc>
    <lastmod>2026-01-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/14/g7-recommends-2034-deadline-for-financial-sector-to-adopt-quantum-safe-systems.html</loc>
    <lastmod>2026-01-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/14/g7-recommends-2034-deadline-for-financial-sector-to-adopt-quantum-safe-systems/</loc>
    <lastmod>2026-01-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/14/increase-in-unjustified-third-party-access-to-sensitive-data.html</loc>
    <lastmod>2026-01-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/14/increase-in-unjustified-third-party-access-to-sensitive-data/</loc>
    <lastmod>2026-01-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/14/malware-campaign-exploits-c-ares-dll-side-loading-for-evasion.html</loc>
    <lastmod>2026-01-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/14/malware-campaign-exploits-c-ares-dll-side-loading-for-evasion/</loc>
    <lastmod>2026-01-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/14/pax8-data-exposure-affects-1800-msp-partners.html</loc>
    <lastmod>2026-01-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/14/pax8-data-exposure-affects-1800-msp-partners/</loc>
    <lastmod>2026-01-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/14/pluggyape-backdoor-targets-ukraines-defense-forces-in-charity-themed-campaign.html</loc>
    <lastmod>2026-03-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/14/pluggyape-backdoor-targets-ukraines-defense-forces-in-charity-themed-campaign/</loc>
    <lastmod>2026-03-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/14/ransomware-attack-on-kyowon-group-leads-to-data-exfiltration.html</loc>
    <lastmod>2026-01-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/14/ransomware-attack-on-kyowon-group-leads-to-data-exfiltration/</loc>
    <lastmod>2026-01-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/14/record-17bn-in-crypto-losses-driven-by-impersonation-fraud.html</loc>
    <lastmod>2026-01-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/14/record-17bn-in-crypto-losses-driven-by-impersonation-fraud/</loc>
    <lastmod>2026-01-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/14/redvds-cybercrime-as-a-service-disrupted-by-microsoft.html</loc>
    <lastmod>2026-01-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/14/redvds-cybercrime-as-a-service-disrupted-by-microsoft/</loc>
    <lastmod>2026-01-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/14/reprompt-attack-exploits-microsoft-copilot-session-hijacking.html</loc>
    <lastmod>2026-01-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/14/reprompt-attack-exploits-microsoft-copilot-session-hijacking/</loc>
    <lastmod>2026-01-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/14/verizon-wireless-outage-disrupts-cellular-service-nationwide.html</loc>
    <lastmod>2026-01-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/14/verizon-wireless-outage-disrupts-cellular-service-nationwide/</loc>
    <lastmod>2026-01-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/14/victorian-department-of-education-data-breach-exposes-student-information.html</loc>
    <lastmod>2026-01-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/14/victorian-department-of-education-data-breach-exposes-student-information/</loc>
    <lastmod>2026-01-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/15/ai-workflow-security-risks-highlighted-by-recent-attacks.html</loc>
    <lastmod>2026-01-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/15/ai-workflow-security-risks-highlighted-by-recent-attacks/</loc>
    <lastmod>2026-01-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/15/aws-codebuild-misconfiguration-enables-supply-chain-attack-path.html</loc>
    <lastmod>2026-01-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/15/aws-codebuild-misconfiguration-enables-supply-chain-attack-path/</loc>
    <lastmod>2026-01-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/15/ciso-role-evolution-to-executive-level-positions.html</loc>
    <lastmod>2026-01-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/15/ciso-role-evolution-to-executive-level-positions/</loc>
    <lastmod>2026-01-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/15/data-privacy-teams-report-understaffing-and-budget-constraints-amid-rising-threats.html</loc>
    <lastmod>2026-01-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/15/data-privacy-teams-report-understaffing-and-budget-constraints-amid-rising-threats/</loc>
    <lastmod>2026-01-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/15/ddos-attack-targets-ice-agent-doxxing-site.html</loc>
    <lastmod>2026-01-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/15/ddos-attack-targets-ice-agent-doxxing-site/</loc>
    <lastmod>2026-01-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/15/ftc-bans-gm-from-selling-drivers-location-data-for-five-years.html</loc>
    <lastmod>2026-01-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/15/ftc-bans-gm-from-selling-drivers-location-data-for-five-years/</loc>
    <lastmod>2026-01-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/15/global-agencies-release-ot-network-security-guidance.html</loc>
    <lastmod>2026-01-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/15/global-agencies-release-ot-network-security-guidance/</loc>
    <lastmod>2026-01-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/15/google-integrates-gemini-ai-into-chrome-for-android.html</loc>
    <lastmod>2026-01-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/15/google-integrates-gemini-ai-into-chrome-for-android/</loc>
    <lastmod>2026-01-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/15/googles-personal-intelligence-integrates-gemini-with-user-data-across-services.html</loc>
    <lastmod>2026-01-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/15/googles-personal-intelligence-integrates-gemini-with-user-data-across-services/</loc>
    <lastmod>2026-01-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/15/grubhub-data-breach-and-extortion-attempt-by-shinyhunters.html</loc>
    <lastmod>2026-01-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/15/grubhub-data-breach-and-extortion-attempt-by-shinyhunters/</loc>
    <lastmod>2026-01-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/15/high-severity-dos-vulnerability-in-palo-alto-networks-firewalls.html</loc>
    <lastmod>2026-01-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/15/high-severity-dos-vulnerability-in-palo-alto-networks-firewalls/</loc>
    <lastmod>2026-01-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/15/increased-ics-vulnerability-exploits-and-hacktivist-activity-in-2025.html</loc>
    <lastmod>2026-01-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/15/increased-ics-vulnerability-exploits-and-hacktivist-activity-in-2025/</loc>
    <lastmod>2026-01-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/15/microsoft-releases-copilot-studio-extension-for-vs-code.html</loc>
    <lastmod>2026-01-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/15/microsoft-releases-copilot-studio-extension-for-vs-code/</loc>
    <lastmod>2026-01-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/15/openai-introduces-chatgpt-translate-feature.html</loc>
    <lastmod>2026-01-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/15/openai-introduces-chatgpt-translate-feature/</loc>
    <lastmod>2026-01-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/15/openai-testing-cross-platform-feature-codenamed-agora.html</loc>
    <lastmod>2026-01-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/15/openai-testing-cross-platform-feature-codenamed-agora/</loc>
    <lastmod>2026-01-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/15/outdated-soc-practices-hindering-incident-response-in-2026.html</loc>
    <lastmod>2026-01-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/15/outdated-soc-practices-hindering-incident-response-in-2026/</loc>
    <lastmod>2026-01-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/15/rise-in-encryptionless-ransomware-attacks.html</loc>
    <lastmod>2026-01-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/15/rise-in-encryptionless-ransomware-attacks/</loc>
    <lastmod>2026-01-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/15/threatsday-bulletin-ai-voice-cloning-wi-fi-kill-switch-and-plc-vulnerabilities.html</loc>
    <lastmod>2026-01-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/15/threatsday-bulletin-ai-voice-cloning-wi-fi-kill-switch-and-plc-vulnerabilities/</loc>
    <lastmod>2026-01-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/15/tines-workflow-automates-just-in-time-application-access.html</loc>
    <lastmod>2026-01-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/15/tines-workflow-automates-just-in-time-application-access/</loc>
    <lastmod>2026-01-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/15/unauthenticated-privilege-escalation-in-wordpress-modular-ds-plugin-exploited-in-the-wild.html</loc>
    <lastmod>2026-01-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/15/unauthenticated-privilege-escalation-in-wordpress-modular-ds-plugin-exploited-in-the-wild/</loc>
    <lastmod>2026-01-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/15/whisperpair-vulnerability-in-googles-fast-pair-protocol.html</loc>
    <lastmod>2026-01-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/15/whisperpair-vulnerability-in-googles-fast-pair-protocol/</loc>
    <lastmod>2026-01-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/16/black-basta-leader-identified-and-added-to-interpols-red-notice-list.html</loc>
    <lastmod>2026-01-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/16/black-basta-leader-identified-and-added-to-interpols-red-notice-list/</loc>
    <lastmod>2026-01-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/16/china-directs-domestic-companies-to-stop-using-us-and-israeli-cybersecurity-software.html</loc>
    <lastmod>2026-01-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/16/china-directs-domestic-companies-to-stop-using-us-and-israeli-cybersecurity-software/</loc>
    <lastmod>2026-01-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/16/credential-theft-and-account-compromise-surge-in-2025.html</loc>
    <lastmod>2026-01-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/16/credential-theft-and-account-compromise-surge-in-2025/</loc>
    <lastmod>2026-01-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/16/exposure-of-personal-data-online-poses-physical-safety-risks.html</loc>
    <lastmod>2026-01-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/16/exposure-of-personal-data-online-poses-physical-safety-risks/</loc>
    <lastmod>2026-01-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/16/openai-enhances-chatgpt-with-advanced-chat-history-search-and-personalization-features.html</loc>
    <lastmod>2026-01-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/16/openai-enhances-chatgpt-with-advanced-chat-history-search-and-personalization-features/</loc>
    <lastmod>2026-01-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/16/windows-11-23h2-shutdown-issue-with-system-guard-secure-launch.html</loc>
    <lastmod>2026-02-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/16/windows-11-23h2-shutdown-issue-with-system-guard-secure-launch/</loc>
    <lastmod>2026-02-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/16/windows-11-update-kb5074109-causes-outlook-freezes-for-pop-users.html</loc>
    <lastmod>2026-01-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/16/windows-11-update-kb5074109-causes-outlook-freezes-for-pop-users/</loc>
    <lastmod>2026-01-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/18/ciro-data-breach-impacts-750000-canadian-investors.html</loc>
    <lastmod>2026-01-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/18/ciro-data-breach-impacts-750000-canadian-investors/</loc>
    <lastmod>2026-01-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/18/google-chrome-adds-option-to-disable-on-device-ai-for-scam-detection.html</loc>
    <lastmod>2026-01-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/18/google-chrome-adds-option-to-disable-on-device-ai-for-scam-detection/</loc>
    <lastmod>2026-01-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/18/google-chrome-tests-gemini-powered-ai-skills-for-automated-tasks.html</loc>
    <lastmod>2026-01-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/18/google-chrome-tests-gemini-powered-ai-skills-for-automated-tasks/</loc>
    <lastmod>2026-01-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/19/critical-fortinet-fortisiem-flaw-exploited-in-the-wild.html</loc>
    <lastmod>2026-01-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/19/critical-fortinet-fortisiem-flaw-exploited-in-the-wild/</loc>
    <lastmod>2026-01-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/19/increased-devops-saas-downtime-incidents-and-financial-impact.html</loc>
    <lastmod>2026-01-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/19/increased-devops-saas-downtime-incidents-and-financial-impact/</loc>
    <lastmod>2026-01-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/19/jordanian-cybercriminal-admits-selling-access-to-50-enterprise-networks.html</loc>
    <lastmod>2026-01-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/19/jordanian-cybercriminal-admits-selling-access-to-50-enterprise-networks/</loc>
    <lastmod>2026-01-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/19/openai-testing-new-chatgpt-features-including-secure-tunnel-and-task-management.html</loc>
    <lastmod>2026-01-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/19/openai-testing-new-chatgpt-features-including-secure-tunnel-and-task-management/</loc>
    <lastmod>2026-01-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/19/openai-tests-new-feature-codenamed-sonata.html</loc>
    <lastmod>2026-01-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/19/openai-tests-new-feature-codenamed-sonata/</loc>
    <lastmod>2026-01-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/19/pdfsider-malware-facilitates-long-term-covert-system-access.html</loc>
    <lastmod>2026-01-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/19/pdfsider-malware-facilitates-long-term-covert-system-access/</loc>
    <lastmod>2026-01-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/19/stackwarp-hardware-flaw-bypasses-amd-sev-snp-protections-on-zen-15-cpus.html</loc>
    <lastmod>2026-01-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/19/stackwarp-hardware-flaw-bypasses-amd-sev-snp-protections-on-zen-15-cpus/</loc>
    <lastmod>2026-01-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/19/uk-business-leaders-rank-cyber-breaches-as-top-risk-for-2026.html</loc>
    <lastmod>2026-01-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/19/uk-business-leaders-rank-cyber-breaches-as-top-risk-for-2026/</loc>
    <lastmod>2026-01-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/19/us-supreme-court-americorps-and-va-breaches-by-nicholas-moore.html</loc>
    <lastmod>2026-01-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/19/us-supreme-court-americorps-and-va-breaches-by-nicholas-moore/</loc>
    <lastmod>2026-01-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/20/ai-driven-fifth-wave-of-cybercrime-expands-with-dark-llms-and-deepfake-kits.html</loc>
    <lastmod>2026-01-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/20/ai-driven-fifth-wave-of-cybercrime-expands-with-dark-llms-and-deepfake-kits/</loc>
    <lastmod>2026-01-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/20/chainlit-framework-vulnerabilities-expose-ai-application-infrastructure.html</loc>
    <lastmod>2026-01-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/20/chainlit-framework-vulnerabilities-expose-ai-application-infrastructure/</loc>
    <lastmod>2026-01-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/20/cloudflare-acme-validation-bug-allows-waf-bypass-to-origin-servers.html</loc>
    <lastmod>2026-01-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/20/cloudflare-acme-validation-bug-allows-waf-bypass-to-origin-servers/</loc>
    <lastmod>2026-01-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/20/eu-proposes-cybersecurity-legislation-to-restrict-high-risk-suppliers.html</loc>
    <lastmod>2026-01-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/20/eu-proposes-cybersecurity-legislation-to-restrict-high-risk-suppliers/</loc>
    <lastmod>2026-01-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/20/exposed-secrets-in-javascript-bundles-across-millions-of-applications.html</loc>
    <lastmod>2026-02-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/20/exposed-secrets-in-javascript-bundles-across-millions-of-applications/</loc>
    <lastmod>2026-02-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/20/gartner-predicts-ai-data-risks-to-drive-zero-trust-adoption.html</loc>
    <lastmod>2026-01-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/20/gartner-predicts-ai-data-risks-to-drive-zero-trust-adoption/</loc>
    <lastmod>2026-01-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/20/identity-threat-detection-and-response-itdr-as-a-critical-security-strategy-for-2026.html</loc>
    <lastmod>2026-01-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/20/identity-threat-detection-and-response-itdr-as-a-critical-security-strategy-for-2026/</loc>
    <lastmod>2026-01-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/20/increased-ceo-concern-over-cyber-risks-amid-economic-uncertainty.html</loc>
    <lastmod>2026-01-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/20/increased-ceo-concern-over-cyber-risks-amid-economic-uncertainty/</loc>
    <lastmod>2026-01-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/20/linkedin-phishing-campaign-uses-open-source-pen-testing-tool-to-target-business-executives.html</loc>
    <lastmod>2026-01-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/20/linkedin-phishing-campaign-uses-open-source-pen-testing-tool-to-target-business-executives/</loc>
    <lastmod>2026-01-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/20/microsoft-powertoys-097-introduces-cursorwrap-and-command-palette-enhancements.html</loc>
    <lastmod>2026-01-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/20/microsoft-powertoys-097-introduces-cursorwrap-and-command-palette-enhancements/</loc>
    <lastmod>2026-01-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/20/openai-offers-free-chatgpt-plus-trial-to-all-users.html</loc>
    <lastmod>2026-01-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/20/openai-offers-free-chatgpt-plus-trial-to-all-users/</loc>
    <lastmod>2026-01-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/20/orphaned-accounts-pose-persistent-security-risks.html</loc>
    <lastmod>2026-01-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/20/orphaned-accounts-pose-persistent-security-risks/</loc>
    <lastmod>2026-01-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/20/three-flaws-in-anthropic-mcp-git-server-enable-file-access-and-code-execution.html</loc>
    <lastmod>2026-01-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/20/three-flaws-in-anthropic-mcp-git-server-enable-file-access-and-code-execution/</loc>
    <lastmod>2026-01-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/20/tudou-guarantee-marketplace-halts-telegram-transactions-after-processing-12-billion.html</loc>
    <lastmod>2026-01-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/20/tudou-guarantee-marketplace-halts-telegram-transactions-after-processing-12-billion/</loc>
    <lastmod>2026-01-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/20/webinar-addressing-soc-tooling-disconnects-with-executives.html</loc>
    <lastmod>2026-01-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/20/webinar-addressing-soc-tooling-disconnects-with-executives/</loc>
    <lastmod>2026-01-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/21/37-zero-day-exploits-demonstrated-at-pwn2own-automotive-2026.html</loc>
    <lastmod>2026-03-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/21/37-zero-day-exploits-demonstrated-at-pwn2own-automotive-2026/</loc>
    <lastmod>2026-03-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/21/ai-adoption-in-mssps-to-improve-margins-and-efficiency.html</loc>
    <lastmod>2026-01-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/21/ai-adoption-in-mssps-to-improve-margins-and-efficiency/</loc>
    <lastmod>2026-01-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/21/aifwall-launches-ai-powered-firewall-for-ai-deployments.html</loc>
    <lastmod>2026-01-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/21/aifwall-launches-ai-powered-firewall-for-ai-deployments/</loc>
    <lastmod>2026-01-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/21/critical-privilege-escalation-vulnerability-in-acf-extended-plugin.html</loc>
    <lastmod>2026-01-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/21/critical-privilege-escalation-vulnerability-in-acf-extended-plugin/</loc>
    <lastmod>2026-01-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/21/critical-rce-flaw-in-zoom-mmrs-and-multiple-gitlab-vulnerabilities-patched.html</loc>
    <lastmod>2026-01-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/21/critical-rce-flaw-in-zoom-mmrs-and-multiple-gitlab-vulnerabilities-patched/</loc>
    <lastmod>2026-01-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/21/cve-2026-1245-privilege-level-code-execution-in-binary-parser-npm-library.html</loc>
    <lastmod>2026-01-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/21/cve-2026-1245-privilege-level-code-execution-in-binary-parser-npm-library/</loc>
    <lastmod>2026-01-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/21/gartner-introduces-exposure-assessment-platforms-eap-category.html</loc>
    <lastmod>2026-01-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/21/gartner-introduces-exposure-assessment-platforms-eap-category/</loc>
    <lastmod>2026-01-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/21/gitlab-patches-high-severity-2fa-bypass-and-dos-vulnerabilities.html</loc>
    <lastmod>2026-01-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/21/gitlab-patches-high-severity-2fa-bypass-and-dos-vulnerabilities/</loc>
    <lastmod>2026-01-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/21/global-cybersecurity-vulnerability-enumeration-gcve-initiative-launched.html</loc>
    <lastmod>2026-01-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/21/global-cybersecurity-vulnerability-enumeration-gcve-initiative-launched/</loc>
    <lastmod>2026-01-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/21/hackers-exploit-misconfigured-security-testing-apps-to-breach-cloud-environments.html</loc>
    <lastmod>2026-02-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/21/hackers-exploit-misconfigured-security-testing-apps-to-breach-cloud-environments/</loc>
    <lastmod>2026-02-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/21/identity-security-beyond-mfa-emerging-threats-and-solutions.html</loc>
    <lastmod>2026-01-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/21/identity-security-beyond-mfa-emerging-threats-and-solutions/</loc>
    <lastmod>2026-01-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/21/openai-introduces-age-prediction-model-for-chatgpt-to-enforce-age-restrictions.html</loc>
    <lastmod>2026-01-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/21/openai-introduces-age-prediction-model-for-chatgpt-to-enforce-age-restrictions/</loc>
    <lastmod>2026-01-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/21/openai-tests-ads-in-chatgpt-while-google-confirms-no-ads-in-gemini.html</loc>
    <lastmod>2026-01-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/21/openai-tests-ads-in-chatgpt-while-google-confirms-no-ads-in-gemini/</loc>
    <lastmod>2026-01-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/21/openais-chatgpt-atlas-browser-introduces-actions-feature-and-video-understanding.html</loc>
    <lastmod>2026-01-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/21/openais-chatgpt-atlas-browser-introduces-actions-feature-and-video-understanding/</loc>
    <lastmod>2026-01-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/21/pccomponentes-denies-data-breach-but-confirms-credential-stuffing-attack.html</loc>
    <lastmod>2026-01-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/21/pccomponentes-denies-data-breach-but-confirms-credential-stuffing-attack/</loc>
    <lastmod>2026-01-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/21/peruvian-loan-scam-harvests-cards-and-pins-via-fake-applications.html</loc>
    <lastmod>2026-01-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/21/peruvian-loan-scam-harvests-cards-and-pins-via-fake-applications/</loc>
    <lastmod>2026-01-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/21/phishing-and-spoofed-sites-target-milano-cortina-2026-olympics.html</loc>
    <lastmod>2026-01-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/21/phishing-and-spoofed-sites-target-milano-cortina-2026-olympics/</loc>
    <lastmod>2026-01-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/21/phishing-attacks-exploit-human-psychology-and-ai-advancements.html</loc>
    <lastmod>2026-01-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/21/phishing-attacks-exploit-human-psychology-and-ai-advancements/</loc>
    <lastmod>2026-01-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/21/phishing-campaign-targets-lastpass-users-with-fake-maintenance-messages.html</loc>
    <lastmod>2026-01-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/21/phishing-campaign-targets-lastpass-users-with-fake-maintenance-messages/</loc>
    <lastmod>2026-01-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/21/uk-launches-report-fraud-service-to-replace-action-fraud.html</loc>
    <lastmod>2026-01-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/21/uk-launches-report-fraud-service-to-replace-action-fraud/</loc>
    <lastmod>2026-01-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/22/android-malware-uses-ai-for-click-fraud.html</loc>
    <lastmod>2026-01-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/22/android-malware-uses-ai-for-click-fraud/</loc>
    <lastmod>2026-01-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/22/cisco-unified-communications-rce-zero-day-exploited-in-attacks.html</loc>
    <lastmod>2026-01-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/22/cisco-unified-communications-rce-zero-day-exploited-in-attacks/</loc>
    <lastmod>2026-01-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/22/claroty-secures-150-million-in-series-f-funding.html</loc>
    <lastmod>2026-01-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/22/claroty-secures-150-million-in-series-f-funding/</loc>
    <lastmod>2026-01-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/22/critical-authentication-bypass-in-gnu-inetutils-telnetd.html</loc>
    <lastmod>2026-01-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/22/critical-authentication-bypass-in-gnu-inetutils-telnetd/</loc>
    <lastmod>2026-01-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/22/critical-authentication-flaw-in-appsmith-enables-account-takeovers.html</loc>
    <lastmod>2026-01-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/22/critical-authentication-flaw-in-appsmith-enables-account-takeovers/</loc>
    <lastmod>2026-01-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/22/curl-ends-bug-bounty-program-due-to-ai-generated-low-quality-reports.html</loc>
    <lastmod>2026-01-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/22/curl-ends-bug-bounty-program-due-to-ai-generated-low-quality-reports/</loc>
    <lastmod>2026-01-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/22/gdpr-breach-notifications-surge-by-22-in-2025.html</loc>
    <lastmod>2026-01-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/22/gdpr-breach-notifications-surge-by-22-in-2025/</loc>
    <lastmod>2026-01-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/22/increase-in-zero-day-and-one-day-exploits-in-2025.html</loc>
    <lastmod>2026-01-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/22/increase-in-zero-day-and-one-day-exploits-in-2025/</loc>
    <lastmod>2026-01-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/22/increased-active-directory-password-resets-in-hybrid-work-environments.html</loc>
    <lastmod>2026-01-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/22/increased-active-directory-password-resets-in-hybrid-work-environments/</loc>
    <lastmod>2026-01-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/22/latin-american-organizations-struggle-with-cybersecurity-defenses-and-skills-shortage.html</loc>
    <lastmod>2026-03-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/22/latin-american-organizations-struggle-with-cybersecurity-defenses-and-skills-shortage/</loc>
    <lastmod>2026-03-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/22/malicious-pypi-package-sympy-dev-deploys-xmrig-miner-on-linux-hosts.html</loc>
    <lastmod>2026-01-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/22/malicious-pypi-package-sympy-dev-deploys-xmrig-miner-on-linux-hosts/</loc>
    <lastmod>2026-01-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/22/microsoft-teams-to-introduce-brand-impersonation-protection-for-calls.html</loc>
    <lastmod>2026-01-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/22/microsoft-teams-to-introduce-brand-impersonation-protection-for-calls/</loc>
    <lastmod>2026-01-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/22/osiris-ransomware-leverages-poortry-driver-in-byovd-attack.html</loc>
    <lastmod>2026-01-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/22/osiris-ransomware-leverages-poortry-driver-in-byovd-attack/</loc>
    <lastmod>2026-01-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/22/realhomes-crm-plugin-vulnerability-patched.html</loc>
    <lastmod>2026-01-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/22/realhomes-crm-plugin-vulnerability-patched/</loc>
    <lastmod>2026-01-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/22/smartermail-authentication-bypass-exploited-post-patch.html</loc>
    <lastmod>2026-02-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/22/smartermail-authentication-bypass-exploited-post-patch/</loc>
    <lastmod>2026-02-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/22/uk-executives-concerned-about-cyber-attack-survival.html</loc>
    <lastmod>2026-01-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/22/uk-executives-concerned-about-cyber-attack-survival/</loc>
    <lastmod>2026-01-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/22/vishing-attacks-target-okta-sso-accounts-for-data-theft.html</loc>
    <lastmod>2026-01-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/22/vishing-attacks-target-okta-sso-accounts-for-data-theft/</loc>
    <lastmod>2026-01-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/23/ai-generated-code-vulnerability-in-honeypot-deployment.html</loc>
    <lastmod>2026-01-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/23/ai-generated-code-vulnerability-in-honeypot-deployment/</loc>
    <lastmod>2026-01-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/23/cisa-adds-four-actively-exploited-vulnerabilities-to-kev-catalog.html</loc>
    <lastmod>2026-03-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/23/cisa-adds-four-actively-exploited-vulnerabilities-to-kev-catalog/</loc>
    <lastmod>2026-03-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/23/multi-stage-aitm-phishing-and-bec-campaigns-target-energy-sector.html</loc>
    <lastmod>2026-02-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/23/multi-stage-aitm-phishing-and-bec-campaigns-target-energy-sector/</loc>
    <lastmod>2026-02-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/23/nhs-proactively-engages-suppliers-to-enhance-cybersecurity-resilience.html</loc>
    <lastmod>2026-01-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/23/nhs-proactively-engages-suppliers-to-enhance-cybersecurity-resilience/</loc>
    <lastmod>2026-01-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/23/outlook-for-ios-crashes-due-to-coding-error.html</loc>
    <lastmod>2026-01-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/23/outlook-for-ios-crashes-due-to-coding-error/</loc>
    <lastmod>2026-01-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/23/phishing-campaign-deploys-logmein-rmm-for-persistent-access.html</loc>
    <lastmod>2026-01-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/23/phishing-campaign-deploys-logmein-rmm-for-persistent-access/</loc>
    <lastmod>2026-01-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/23/under-armour-investigates-data-breach-after-72-million-records-allegedly-exposed.html</loc>
    <lastmod>2026-02-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/23/under-armour-investigates-data-breach-after-72-million-records-allegedly-exposed/</loc>
    <lastmod>2026-02-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/24/ai-agents-challenge-traditional-access-models-and-introduce-new-security-risks.html</loc>
    <lastmod>2026-01-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/24/ai-agents-challenge-traditional-access-models-and-introduce-new-security-risks/</loc>
    <lastmod>2026-01-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/24/cve-2024-37079-in-vmware-vcenter-exploited-in-the-wild.html</loc>
    <lastmod>2026-01-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/24/cve-2024-37079-in-vmware-vcenter-exploited-in-the-wild/</loc>
    <lastmod>2026-01-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/24/multi-stage-phishing-campaign-targeting-russia-with-amnesia-rat-and-ransomware.html</loc>
    <lastmod>2026-01-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/24/multi-stage-phishing-campaign-targeting-russia-with-amnesia-rat-and-ransomware/</loc>
    <lastmod>2026-01-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/25/1password-introduces-pop-up-warnings-for-suspected-phishing-sites.html</loc>
    <lastmod>2026-01-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/25/1password-introduces-pop-up-warnings-for-suspected-phishing-sites/</loc>
    <lastmod>2026-01-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/26/blackmoon-malware-deployed-in-indian-tax-phishing-campaign.html</loc>
    <lastmod>2026-01-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/26/blackmoon-malware-deployed-in-indian-tax-phishing-campaign/</loc>
    <lastmod>2026-01-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/26/chatgpt-temporary-chat-feature-upgrade.html</loc>
    <lastmod>2026-01-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/26/chatgpt-temporary-chat-feature-upgrade/</loc>
    <lastmod>2026-01-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/26/cisa-publishes-initial-list-of-post-quantum-cryptography-product-categories.html</loc>
    <lastmod>2026-01-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/26/cisa-publishes-initial-list-of-post-quantum-cryptography-product-categories/</loc>
    <lastmod>2026-01-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/26/cloudflare-bgp-route-leak-due-to-misconfiguration.html</loc>
    <lastmod>2026-01-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/26/cloudflare-bgp-route-leak-due-to-misconfiguration/</loc>
    <lastmod>2026-01-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/26/escan-antivirus-supply-chain-compromise-delivers-signed-malware.html</loc>
    <lastmod>2026-02-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/26/escan-antivirus-supply-chain-compromise-delivers-signed-malware/</loc>
    <lastmod>2026-02-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/26/eu-investigates-x-over-grok-generated-sexual-content.html</loc>
    <lastmod>2026-02-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/26/eu-investigates-x-over-grok-generated-sexual-content/</loc>
    <lastmod>2026-02-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/26/fortinet-firewalls-exploited-via-incompletely-patched-flaws.html</loc>
    <lastmod>2026-01-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/26/fortinet-firewalls-exploited-via-incompletely-patched-flaws/</loc>
    <lastmod>2026-01-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/26/haxorseo-marketplace-facilitates-seo-poisoning-campaigns.html</loc>
    <lastmod>2026-01-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/26/haxorseo-marketplace-facilitates-seo-poisoning-campaigns/</loc>
    <lastmod>2026-01-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/26/okta-security-settings-for-enhanced-identity-protection.html</loc>
    <lastmod>2026-01-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/26/okta-security-settings-for-enhanced-identity-protection/</loc>
    <lastmod>2026-01-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/27/ai-adoption-surges-among-ethical-hackers.html</loc>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/27/ai-adoption-surges-among-ethical-hackers/</loc>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/27/china-linked-apts-deploy-peckbirdy-jscript-c2-framework-since-2023.html</loc>
    <lastmod>2026-01-29</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/27/china-linked-apts-deploy-peckbirdy-jscript-c2-framework-since-2023/</loc>
    <lastmod>2026-01-29</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/27/critical-grist-core-vulnerability-enables-rce-via-spreadsheet-formulas.html</loc>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/27/critical-grist-core-vulnerability-enables-rce-via-spreadsheet-formulas/</loc>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/27/critical-linux-vulnerabilities-exploited-in-the-wild.html</loc>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/27/critical-linux-vulnerabilities-exploited-in-the-wild/</loc>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/27/critical-sandbox-escape-flaw-in-vm2-nodejs-library.html</loc>
    <lastmod>2026-01-29</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/27/critical-sandbox-escape-flaw-in-vm2-nodejs-library/</loc>
    <lastmod>2026-01-29</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/27/ransomware-evolution-in-2025-psychological-extortion-and-targeted-attacks.html</loc>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/27/ransomware-evolution-in-2025-psychological-extortion-and-targeted-attacks/</loc>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/27/stanley-maas-offers-malicious-chrome-extensions-via-chrome-web-store.html</loc>
    <lastmod>2026-01-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/27/stanley-maas-offers-malicious-chrome-extensions-via-chrome-web-store/</loc>
    <lastmod>2026-01-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/27/whatsapp-introduces-lockdown-style-security-mode-for-high-risk-users.html</loc>
    <lastmod>2026-01-29</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/27/whatsapp-introduces-lockdown-style-security-mode-for-high-risk-users/</loc>
    <lastmod>2026-01-29</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/27/world-leaks-ransomware-group-exfiltrates-14tb-of-nike-data.html</loc>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/27/world-leaks-ransomware-group-exfiltrates-14tb-of-nike-data/</loc>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/28/454000-malicious-open-source-packages-discovered-in-2026.html</loc>
    <lastmod>2026-01-29</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/28/454000-malicious-open-source-packages-discovered-in-2026/</loc>
    <lastmod>2026-01-29</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/28/ai-agents-introduce-compliance-challenges-for-cisos.html</loc>
    <lastmod>2026-01-29</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/28/ai-agents-introduce-compliance-challenges-for-cisos/</loc>
    <lastmod>2026-01-29</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/28/ai-soc-agents-redefine-security-operations-workflows.html</loc>
    <lastmod>2026-01-29</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/28/ai-soc-agents-redefine-security-operations-workflows/</loc>
    <lastmod>2026-01-29</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/28/bizarre-bazaar-campaign-exploits-exposed-llm-endpoints.html</loc>
    <lastmod>2026-02-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/28/bizarre-bazaar-campaign-exploits-exposed-llm-endpoints/</loc>
    <lastmod>2026-02-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/28/chinese-money-laundering-networks-dominate-global-illicit-cryptocurrency-flows.html</loc>
    <lastmod>2026-01-29</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/28/chinese-money-laundering-networks-dominate-global-illicit-cryptocurrency-flows/</loc>
    <lastmod>2026-01-29</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/28/critical-authentication-bypass-and-rce-flaws-in-solarwinds-web-help-desk.html</loc>
    <lastmod>2026-01-29</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/28/critical-authentication-bypass-and-rce-flaws-in-solarwinds-web-help-desk/</loc>
    <lastmod>2026-01-29</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/28/critical-vulnerabilities-found-in-100-of-ai-systems-amid-rapid-enterprise-adoption.html</loc>
    <lastmod>2026-01-29</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/28/critical-vulnerabilities-found-in-100-of-ai-systems-amid-rapid-enterprise-adoption/</loc>
    <lastmod>2026-01-29</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/28/empire-market-co-founder-pleads-guilty-to-drug-conspiracy.html</loc>
    <lastmod>2026-01-29</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/28/empire-market-co-founder-pleads-guilty-to-drug-conspiracy/</loc>
    <lastmod>2026-01-29</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/28/fbi-seizes-ramp-cybercrime-forum.html</loc>
    <lastmod>2026-03-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/28/fbi-seizes-ramp-cybercrime-forum/</loc>
    <lastmod>2026-03-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/28/kingdom-market-darknet-marketplace-shutdown.html</loc>
    <lastmod>2026-01-29</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/28/kingdom-market-darknet-marketplace-shutdown/</loc>
    <lastmod>2026-01-29</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/28/malicious-moltbot-ai-coding-assistant-extension-on-vs-code-marketplace.html</loc>
    <lastmod>2026-03-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/28/malicious-moltbot-ai-coding-assistant-extension-on-vs-code-marketplace/</loc>
    <lastmod>2026-03-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/28/malicious-python-spellchecker-packages-on-pypi-distributed-remote-access-trojan.html</loc>
    <lastmod>2026-01-29</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/28/malicious-python-spellchecker-packages-on-pypi-distributed-remote-access-trojan/</loc>
    <lastmod>2026-01-29</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/28/near-identical-password-reuse-persists-as-underrated-security-risk.html</loc>
    <lastmod>2026-01-29</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/28/near-identical-password-reuse-persists-as-underrated-security-risk/</loc>
    <lastmod>2026-01-29</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/28/sicarii-ransomware-decryption-fails-due-to-key-generation-flaw.html</loc>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/28/sicarii-ransomware-decryption-fails-due-to-key-generation-flaw/</loc>
    <lastmod>2026-01-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/29/2026-cybersecurity-resolutions-quantum-ai-and-social-engineering.html</loc>
    <lastmod>2026-01-30</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/29/2026-cybersecurity-resolutions-quantum-ai-and-social-engineering/</loc>
    <lastmod>2026-01-30</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/29/ai-adoption-in-security-operations-limited-scope-despite-high-interest.html</loc>
    <lastmod>2026-01-30</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/29/ai-adoption-in-security-operations-limited-scope-despite-high-interest/</loc>
    <lastmod>2026-01-30</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/29/cisa-releases-insider-threat-mitigation-framework.html</loc>
    <lastmod>2026-01-30</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/29/cisa-releases-insider-threat-mitigation-framework/</loc>
    <lastmod>2026-01-30</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/29/cisos-prioritize-threat-intelligence-to-reduce-downtime-risk-in-2026.html</loc>
    <lastmod>2026-01-30</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/29/cisos-prioritize-threat-intelligence-to-reduce-downtime-risk-in-2026/</loc>
    <lastmod>2026-01-30</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/29/critical-ot-cybersecurity-gaps-identified-in-energy-systems.html</loc>
    <lastmod>2026-01-30</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/29/critical-ot-cybersecurity-gaps-identified-in-energy-systems/</loc>
    <lastmod>2026-01-30</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/29/fbi-launches-operation-winter-shield-to-enhance-cyber-resilience.html</loc>
    <lastmod>2026-01-30</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/29/fbi-launches-operation-winter-shield-to-enhance-cyber-resilience/</loc>
    <lastmod>2026-01-30</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/29/fbi-seizes-ramp-cybercrime-forum.html</loc>
    <lastmod>2026-01-30</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/29/fbi-seizes-ramp-cybercrime-forum/</loc>
    <lastmod>2026-01-30</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/29/france-travail-fined-5-million-for-data-breach-exposing-43-million-records.html</loc>
    <lastmod>2026-01-30</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/29/france-travail-fined-5-million-for-data-breach-exposing-43-million-records/</loc>
    <lastmod>2026-01-30</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/29/google-enhances-android-theft-protection-features.html</loc>
    <lastmod>2026-01-30</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/29/google-enhances-android-theft-protection-features/</loc>
    <lastmod>2026-01-30</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/29/increase-in-ransomware-victims-despite-decline-in-active-groups.html</loc>
    <lastmod>2026-01-30</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/29/increase-in-ransomware-victims-despite-decline-in-active-groups/</loc>
    <lastmod>2026-01-30</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/29/infostealer-malware-targeting-gamers-via-roblox-mods.html</loc>
    <lastmod>2026-01-30</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/29/infostealer-malware-targeting-gamers-via-roblox-mods/</loc>
    <lastmod>2026-01-30</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/29/microsoft-teams-adds-call-reporting-feature-for-suspicious-activity.html</loc>
    <lastmod>2026-01-30</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/29/microsoft-teams-adds-call-reporting-feature-for-suspicious-activity/</loc>
    <lastmod>2026-01-30</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/29/uk-cybersecurity-workforce-grows-194-in-four-years.html</loc>
    <lastmod>2026-01-30</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/29/uk-cybersecurity-workforce-grows-194-in-four-years/</loc>
    <lastmod>2026-01-30</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/29/us-data-breaches-reach-record-high-in-2025.html</loc>
    <lastmod>2026-01-30</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/29/us-data-breaches-reach-record-high-in-2025/</loc>
    <lastmod>2026-01-30</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/30/agentic-ai-emerges-as-primary-cyber-target-in-2026.html</loc>
    <lastmod>2026-01-31</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/30/agentic-ai-emerges-as-primary-cyber-target-in-2026/</loc>
    <lastmod>2026-01-31</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/30/android-malware-campaign-abuses-hugging-face-platform.html</loc>
    <lastmod>2026-02-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/30/android-malware-campaign-abuses-hugging-face-platform/</loc>
    <lastmod>2026-02-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/30/critical-unauthenticated-rce-flaw-in-smartermail-patched.html</loc>
    <lastmod>2026-02-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/30/critical-unauthenticated-rce-flaw-in-smartermail-patched/</loc>
    <lastmod>2026-02-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/30/emerging-cybersecurity-trends-and-challenges-in-2026.html</loc>
    <lastmod>2026-01-31</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/30/emerging-cybersecurity-trends-and-challenges-in-2026/</loc>
    <lastmod>2026-01-31</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/30/ex-google-engineer-convicted-for-stealing-ai-trade-secrets-for-china.html</loc>
    <lastmod>2026-02-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/30/ex-google-engineer-convicted-for-stealing-ai-trade-secrets-for-china/</loc>
    <lastmod>2026-02-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/30/global-law-enforcement-actions-against-cybercrime-20212025.html</loc>
    <lastmod>2026-01-31</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/30/global-law-enforcement-actions-against-cybercrime-20212025/</loc>
    <lastmod>2026-01-31</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/30/global-law-enforcement-dismantles-major-pirate-iptv-services.html</loc>
    <lastmod>2026-01-31</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/30/global-law-enforcement-dismantles-major-pirate-iptv-services/</loc>
    <lastmod>2026-01-31</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/30/malicious-chrome-extensions-hijack-affiliate-links-and-steal-chatgpt-tokens.html</loc>
    <lastmod>2026-01-31</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/30/malicious-chrome-extensions-hijack-affiliate-links-and-steal-chatgpt-tokens/</loc>
    <lastmod>2026-01-31</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/30/microsoft-to-disable-ntlm-by-default-in-future-windows-releases.html</loc>
    <lastmod>2026-02-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/30/microsoft-to-disable-ntlm-by-default-in-future-windows-releases/</loc>
    <lastmod>2026-02-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/30/openclaw-ai-agent-security-concerns-in-business-environments.html</loc>
    <lastmod>2026-01-31</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/30/openclaw-ai-agent-security-concerns-in-business-environments/</loc>
    <lastmod>2026-01-31</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/30/tenable-introduces-ai-exposure-management-to-mitigate-shadow-ai-risks.html</loc>
    <lastmod>2026-01-31</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/30/tenable-introduces-ai-exposure-management-to-mitigate-shadow-ai-risks/</loc>
    <lastmod>2026-01-31</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/30/trump-administration-rescinds-biden-era-sbom-and-secure-software-development-mandates.html</loc>
    <lastmod>2026-01-30</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/30/trump-administration-rescinds-biden-era-sbom-and-secure-software-development-mandates/</loc>
    <lastmod>2026-01-30</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/30/uk-nca-and-natwest-warn-of-rising-invoice-fraud-threats.html</loc>
    <lastmod>2026-03-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/30/uk-nca-and-natwest-warn-of-rising-invoice-fraud-threats/</loc>
    <lastmod>2026-03-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/31/instagram-private-profile-data-leak-via-server-side-authorization-failure.html</loc>
    <lastmod>2026-02-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/01/31/instagram-private-profile-data-leak-via-server-side-authorization-failure/</loc>
    <lastmod>2026-02-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/01/apple-introduces-location-tracking-privacy-feature-for-select-iphone-and-ipad-models.html</loc>
    <lastmod>2026-02-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/01/apple-introduces-location-tracking-privacy-feature-for-select-iphone-and-ipad-models/</loc>
    <lastmod>2026-02-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/01/mongodb-data-extortion-attacks-continue-with-low-ransom-demands.html</loc>
    <lastmod>2026-02-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/01/mongodb-data-extortion-attacks-continue-with-low-ransom-demands/</loc>
    <lastmod>2026-02-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/01/openai-retires-gpt-4o-model-in-favor-of-gpt-52.html</loc>
    <lastmod>2026-02-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/01/openai-retires-gpt-4o-model-in-favor-of-gpt-52/</loc>
    <lastmod>2026-02-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/02/341-malicious-clawhub-skills-target-openclaw-users-with-atomic-stealer.html</loc>
    <lastmod>2026-03-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/02/341-malicious-clawhub-skills-target-openclaw-users-with-atomic-stealer/</loc>
    <lastmod>2026-03-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/02/global-surge-in-fraudulent-high-yield-investment-programs.html</loc>
    <lastmod>2026-02-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/02/global-surge-in-fraudulent-high-yield-investment-programs/</loc>
    <lastmod>2026-02-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/02/mid-market-cybersecurity-challenges-and-lifecycle-solutions.html</loc>
    <lastmod>2026-02-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/02/mid-market-cybersecurity-challenges-and-lifecycle-solutions/</loc>
    <lastmod>2026-02-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/02/mozilla-adds-ai-feature-toggle-in-firefox-148.html</loc>
    <lastmod>2026-02-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/02/mozilla-adds-ai-feature-toggle-in-firefox-148/</loc>
    <lastmod>2026-02-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/02/nationstates-data-breach-due-to-exploited-vulnerability.html</loc>
    <lastmod>2026-02-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/02/nationstates-data-breach-due-to-exploited-vulnerability/</loc>
    <lastmod>2026-02-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/02/nsa-releases-zero-trust-implementation-guidelines-for-target-level-maturity.html</loc>
    <lastmod>2026-02-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/02/nsa-releases-zero-trust-implementation-guidelines-for-target-level-maturity/</loc>
    <lastmod>2026-02-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/02/openclaw-token-exfiltration-vulnerability-enables-one-click-rce.html</loc>
    <lastmod>2026-02-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/02/openclaw-token-exfiltration-vulnerability-enables-one-click-rce/</loc>
    <lastmod>2026-02-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/02/panera-bread-breach-affects-51-million-accounts-via-sso-compromise.html</loc>
    <lastmod>2026-02-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/02/panera-bread-breach-affects-51-million-accounts-via-sso-compromise/</loc>
    <lastmod>2026-02-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/02/penetration-testers-receive-600k-settlement-after-wrongful-arrest.html</loc>
    <lastmod>2026-02-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/02/penetration-testers-receive-600k-settlement-after-wrongful-arrest/</loc>
    <lastmod>2026-02-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/03/ai-agent-identity-management-challenges-and-solutions.html</loc>
    <lastmod>2026-02-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/03/ai-agent-identity-management-challenges-and-solutions/</loc>
    <lastmod>2026-02-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/03/ai-augmentation-in-penetration-testing.html</loc>
    <lastmod>2026-02-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/03/ai-augmentation-in-penetration-testing/</loc>
    <lastmod>2026-02-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/03/cloud-outages-disrupt-identity-systems-and-business-continuity.html</loc>
    <lastmod>2026-02-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/03/cloud-outages-disrupt-identity-systems-and-business-continuity/</loc>
    <lastmod>2026-02-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/03/dockerdash-vulnerability-in-dockers-ask-gordon-ai-assistant.html</loc>
    <lastmod>2026-02-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/03/dockerdash-vulnerability-in-dockers-ask-gordon-ai-assistant/</loc>
    <lastmod>2026-02-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/03/lotus-blossom-hacking-group-exploits-notepad-hosting-breach-to-deploy-chrysalis-backdoor.html</loc>
    <lastmod>2026-02-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/03/lotus-blossom-hacking-group-exploits-notepad-hosting-breach-to-deploy-chrysalis-backdoor/</loc>
    <lastmod>2026-02-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/03/metro4shell-rce-flaw-exploited-in-react-native-cli-npm-package.html</loc>
    <lastmod>2026-02-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/03/metro4shell-rce-flaw-exploited-in-react-native-cli-npm-package/</loc>
    <lastmod>2026-02-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/03/multi-stage-phishing-campaign-targets-dropbox-corporate-credentials.html</loc>
    <lastmod>2026-02-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/03/multi-stage-phishing-campaign-targets-dropbox-corporate-credentials/</loc>
    <lastmod>2026-02-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/03/new-vect-raas-group-targets-organizations-in-brazil-and-south-africa.html</loc>
    <lastmod>2026-02-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/03/new-vect-raas-group-targets-organizations-in-brazil-and-south-africa/</loc>
    <lastmod>2026-02-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/03/sql-injection-vulnerability-in-quiz-and-survey-master-plugin-affects-40000-wordpress-sites.html</loc>
    <lastmod>2026-02-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/03/sql-injection-vulnerability-in-quiz-and-survey-master-plugin-affects-40000-wordpress-sites/</loc>
    <lastmod>2026-02-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/03/webinar-on-modernizing-soc-operations.html</loc>
    <lastmod>2026-02-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/03/webinar-on-modernizing-soc-operations/</loc>
    <lastmod>2026-02-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/04/ai-driven-phishing-attacks-double-in-volume-year-over-year.html</loc>
    <lastmod>2026-02-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/04/ai-driven-phishing-attacks-double-in-volume-year-over-year/</loc>
    <lastmod>2026-02-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/04/china-linked-amaranth-dragon-exploits-winrar-flaw-in-southeast-asian-espionage-campaigns.html</loc>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/04/china-linked-amaranth-dragon-exploits-winrar-flaw-in-southeast-asian-espionage-campaigns/</loc>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/04/critical-vulnerabilities-in-google-looker-enable-cross-tenant-rce-and-data-exfiltration.html</loc>
    <lastmod>2026-02-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/04/critical-vulnerabilities-in-google-looker-enable-cross-tenant-rce-and-data-exfiltration/</loc>
    <lastmod>2026-02-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/04/eclipse-foundation-implements-pre-publish-security-checks-for-open-vsx-extensions.html</loc>
    <lastmod>2026-02-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/04/eclipse-foundation-implements-pre-publish-security-checks-for-open-vsx-extensions/</loc>
    <lastmod>2026-02-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/04/edr-killer-tool-abuses-revoked-encase-kernel-driver.html</loc>
    <lastmod>2026-02-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/04/edr-killer-tool-abuses-revoked-encase-kernel-driver/</loc>
    <lastmod>2026-02-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/04/incident-response-discipline-in-the-first-90-seconds.html</loc>
    <lastmod>2026-02-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/04/incident-response-discipline-in-the-first-90-seconds/</loc>
    <lastmod>2026-02-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/04/incognito-market-operator-sentenced-to-30-years-for-dark-web-drug-trafficking.html</loc>
    <lastmod>2026-02-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/04/incognito-market-operator-sentenced-to-30-years-for-dark-web-drug-trafficking/</loc>
    <lastmod>2026-02-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/04/microsoft-develops-scanner-for-detecting-backdoors-in-open-weight-llms.html</loc>
    <lastmod>2026-02-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/04/microsoft-develops-scanner-for-detecting-backdoors-in-open-weight-llms/</loc>
    <lastmod>2026-02-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/04/non-human-identities-exposed-in-docker-hub-container-images.html</loc>
    <lastmod>2026-02-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/04/non-human-identities-exposed-in-docker-hub-container-images/</loc>
    <lastmod>2026-02-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/04/orchid-security-introduces-continuous-identity-observability-for-enterprise-applications.html</loc>
    <lastmod>2026-02-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/04/orchid-security-introduces-continuous-identity-observability-for-enterprise-applications/</loc>
    <lastmod>2026-02-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/04/shadowsyndicate-expands-infrastructure-with-reused-ssh-fingerprints.html</loc>
    <lastmod>2026-02-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/04/shadowsyndicate-expands-infrastructure-with-reused-ssh-fingerprints/</loc>
    <lastmod>2026-02-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/04/threat-actors-use-windows-screensavers-to-deploy-rmm-tools.html</loc>
    <lastmod>2026-02-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/04/threat-actors-use-windows-screensavers-to-deploy-rmm-tools/</loc>
    <lastmod>2026-02-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/04/vmware-esxi-sandbox-escape-flaw-exploited-in-ransomware-attacks.html</loc>
    <lastmod>2026-02-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/04/vmware-esxi-sandbox-escape-flaw-exploited-in-ransomware-attacks/</loc>
    <lastmod>2026-02-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/05/ai-enabled-fraud-surges-1210-in-2025.html</loc>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/05/ai-enabled-fraud-surges-1210-in-2025/</loc>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/05/betterment-data-breach-exposes-14-million-accounts.html</loc>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/05/betterment-data-breach-exposes-14-million-accounts/</loc>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/05/cloud-migration-blind-spots-addressed-with-network-layer-telemetry.html</loc>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/05/cloud-migration-blind-spots-addressed-with-network-layer-telemetry/</loc>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/05/cyberattack-disrupts-la-sapienza-university-it-systems.html</loc>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/05/cyberattack-disrupts-la-sapienza-university-it-systems/</loc>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/05/emergence-of-ai-usage-control-as-a-critical-security-category.html</loc>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/05/emergence-of-ai-usage-control-as-a-critical-security-category/</loc>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/05/github-codespaces-rce-via-malicious-repository-configurations.html</loc>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/05/github-codespaces-rce-via-malicious-repository-configurations/</loc>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/05/increased-operational-efficiency-in-cyber-threats.html</loc>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/05/increased-operational-efficiency-in-cyber-threats/</loc>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/05/microsoft-announces-phased-retirement-of-exchange-web-services-ews-in-exchange-online.html</loc>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/05/microsoft-announces-phased-retirement-of-exchange-web-services-ews-in-exchange-online/</loc>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/05/nginx-server-traffic-hijacking-campaign.html</loc>
    <lastmod>2026-02-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/05/nginx-server-traffic-hijacking-campaign/</loc>
    <lastmod>2026-02-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/05/ransomware-operators-abuse-ispsystem-vms-for-stealthy-payload-delivery.html</loc>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/05/ransomware-operators-abuse-ispsystem-vms-for-stealthy-payload-delivery/</loc>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/05/react2shell-exploit-used-to-hijack-web-traffic-via-nginx-configurations.html</loc>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/05/react2shell-exploit-used-to-hijack-web-traffic-via-nginx-configurations/</loc>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/05/smartphones-critical-to-police-investigations-challenges-highlighted.html</loc>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/05/smartphones-critical-to-police-investigations-challenges-highlighted/</loc>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/05/spains-ministry-of-science-shuts-down-systems-after-idor-exploit-claims.html</loc>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/05/spains-ministry-of-science-shuts-down-systems-after-idor-exploit-claims/</loc>
    <lastmod>2026-02-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/05/substack-data-breach-exposes-user-email-addresses-and-phone-numbers.html</loc>
    <lastmod>2026-02-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/05/substack-data-breach-exposes-user-email-addresses-and-phone-numbers/</loc>
    <lastmod>2026-02-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/06/asian-state-backed-group-tgr-sta-1030-targets-70-government-and-infrastructure-entities.html</loc>
    <lastmod>2026-02-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/06/asian-state-backed-group-tgr-sta-1030-targets-70-government-and-infrastructure-entities/</loc>
    <lastmod>2026-02-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/06/browser-attacks-evasion-of-traditional-security-measures.html</loc>
    <lastmod>2026-02-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/06/browser-attacks-evasion-of-traditional-security-measures/</loc>
    <lastmod>2026-02-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/06/china-linked-dknife-aitm-framework-targets-routers-for-traffic-hijacking-and-malware-delivery.html</loc>
    <lastmod>2026-02-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/06/china-linked-dknife-aitm-framework-targets-routers-for-traffic-hijacking-and-malware-delivery/</loc>
    <lastmod>2026-02-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/06/cisa-mandates-replacement-of-end-of-life-edge-devices-in-federal-networks.html</loc>
    <lastmod>2026-02-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/06/cisa-mandates-replacement-of-end-of-life-edge-devices-in-federal-networks/</loc>
    <lastmod>2026-02-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/06/claude-opus-46-identifies-500-high-severity-flaws-in-open-source-libraries.html</loc>
    <lastmod>2026-02-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/06/claude-opus-46-identifies-500-high-severity-flaws-in-open-source-libraries/</loc>
    <lastmod>2026-02-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/06/eff-launches-encrypt-it-already-campaign-for-big-tech-e2ee-adoption.html</loc>
    <lastmod>2026-02-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/06/eff-launches-encrypt-it-already-campaign-for-big-tech-e2ee-adoption/</loc>
    <lastmod>2026-02-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/06/eu-fines-tiktok-for-addictive-design-violating-digital-services-act.html</loc>
    <lastmod>2026-02-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/06/eu-fines-tiktok-for-addictive-design-violating-digital-services-act/</loc>
    <lastmod>2026-02-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/06/flickr-data-exposure-via-third-party-email-service-vulnerability.html</loc>
    <lastmod>2026-02-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/06/flickr-data-exposure-via-third-party-email-service-vulnerability/</loc>
    <lastmod>2026-02-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/06/infosecurity-europe-launches-cyber-startup-programme-for-2026.html</loc>
    <lastmod>2026-02-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/06/infosecurity-europe-launches-cyber-startup-programme-for-2026/</loc>
    <lastmod>2026-02-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/06/kev-collider-tool-enhances-vulnerability-triage-for-security-teams.html</loc>
    <lastmod>2026-02-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/06/kev-collider-tool-enhances-vulnerability-triage-for-security-teams/</loc>
    <lastmod>2026-02-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/06/kyle-svara-pleads-guilty-to-hacking-600-snapchat-accounts-for-exploitative-purposes.html</loc>
    <lastmod>2026-02-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/06/kyle-svara-pleads-guilty-to-hacking-600-snapchat-accounts-for-exploitative-purposes/</loc>
    <lastmod>2026-02-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/06/malicious-dydx-npm-and-pypi-packages-deliver-wallet-stealers-and-rat-malware.html</loc>
    <lastmod>2026-02-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/06/malicious-dydx-npm-and-pypi-packages-deliver-wallet-stealers-and-rat-malware/</loc>
    <lastmod>2026-02-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/06/samsung-knox-enhances-mobile-network-security-with-granular-controls-and-zero-trust.html</loc>
    <lastmod>2026-02-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/06/samsung-knox-enhances-mobile-network-security-with-granular-controls-and-zero-trust/</loc>
    <lastmod>2026-02-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/06/zscaler-acquires-squarex-to-enhance-browser-security.html</loc>
    <lastmod>2026-02-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/06/zscaler-acquires-squarex-to-enhance-browser-security/</loc>
    <lastmod>2026-02-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/07/ransomware-attack-disrupts-bridgepay-payment-services.html</loc>
    <lastmod>2026-02-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/07/ransomware-attack-disrupts-bridgepay-payment-services/</loc>
    <lastmod>2026-02-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/08/tirith-tool-detects-and-blocks-homoglyph-attacks-in-command-line-environments.html</loc>
    <lastmod>2026-02-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/08/tirith-tool-detects-and-blocks-homoglyph-attacks-in-command-line-environments/</loc>
    <lastmod>2026-02-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/09/attackers-exploit-contextual-language-for-targeted-password-guesses.html</loc>
    <lastmod>2026-02-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/09/attackers-exploit-contextual-language-for-targeted-password-guesses/</loc>
    <lastmod>2026-02-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/09/critical-pre-auth-rce-vulnerability-in-beyondtrust-remote-support-and-pra.html</loc>
    <lastmod>2026-02-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/09/critical-pre-auth-rce-vulnerability-in-beyondtrust-remote-support-and-pra/</loc>
    <lastmod>2026-02-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/09/critical-zero-click-rce-flaw-in-claude-desktop-extensions.html</loc>
    <lastmod>2026-02-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/09/critical-zero-click-rce-flaw-in-claude-desktop-extensions/</loc>
    <lastmod>2026-02-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/09/european-commission-investigates-breach-in-mobile-device-management-platform.html</loc>
    <lastmod>2026-03-31</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/09/european-commission-investigates-breach-in-mobile-device-management-platform/</loc>
    <lastmod>2026-03-31</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/09/massive-fanduel-fraud-scheme-using-stolen-identities.html</loc>
    <lastmod>2026-02-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/09/massive-fanduel-fraud-scheme-using-stolen-identities/</loc>
    <lastmod>2026-02-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/09/openclaw-security-concerns-and-ai-agent-exploits.html</loc>
    <lastmod>2026-02-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/09/openclaw-security-concerns-and-ai-agent-exploits/</loc>
    <lastmod>2026-02-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/09/printer-security-gaps-highlighted-in-enterprise-environments.html</loc>
    <lastmod>2026-02-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/09/printer-security-gaps-highlighted-in-enterprise-environments/</loc>
    <lastmod>2026-02-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/09/social-media-platforms-generate-billions-from-scam-ads-in-europe.html</loc>
    <lastmod>2026-02-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/09/social-media-platforms-generate-billions-from-scam-ads-in-europe/</loc>
    <lastmod>2026-02-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/09/teampcp-worm-exploits-cloud-infrastructure-for-criminal-operations.html</loc>
    <lastmod>2026-02-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/09/teampcp-worm-exploits-cloud-infrastructure-for-criminal-operations/</loc>
    <lastmod>2026-02-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/09/top-cisos-improve-soc-efficiency-with-sandbox-first-and-automated-triage.html</loc>
    <lastmod>2026-02-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/09/top-cisos-improve-soc-efficiency-with-sandbox-first-and-automated-triage/</loc>
    <lastmod>2026-02-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/10/automating-aws-incident-investigation-with-tines-and-ai.html</loc>
    <lastmod>2026-02-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/10/automating-aws-incident-investigation-with-tines-and-ai/</loc>
    <lastmod>2026-02-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/10/increase-in-stealthy-persistence-and-evasion-techniques-for-data-extortion.html</loc>
    <lastmod>2026-02-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/10/increase-in-stealthy-persistence-and-evasion-techniques-for-data-extortion/</loc>
    <lastmod>2026-02-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/10/microsoft-february-2026-patch-tuesday-addresses-6-zero-days-and-58-flaws.html</loc>
    <lastmod>2026-02-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/10/microsoft-february-2026-patch-tuesday-addresses-6-zero-days-and-58-flaws/</loc>
    <lastmod>2026-02-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/10/microsoft-releases-new-secure-boot-certificates-ahead-of-june-2026-expiration.html</loc>
    <lastmod>2026-02-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/10/microsoft-releases-new-secure-boot-certificates-ahead-of-june-2026-expiration/</loc>
    <lastmod>2026-02-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/10/microsoft-releases-windows-10-kb5075912-extended-security-update.html</loc>
    <lastmod>2026-02-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/10/microsoft-releases-windows-10-kb5075912-extended-security-update/</loc>
    <lastmod>2026-02-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/10/phorpiex-phishing-campaign-delivers-global-group-ransomware.html</loc>
    <lastmod>2026-02-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/10/phorpiex-phishing-campaign-delivers-global-group-ransomware/</loc>
    <lastmod>2026-02-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/10/reynolds-ransomware-integrates-byovd-driver-for-edr-evasion.html</loc>
    <lastmod>2026-02-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/10/reynolds-ransomware-integrates-byovd-driver-for-edr-evasion/</loc>
    <lastmod>2026-02-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/10/shift-to-stealthy-long-term-access-in-cyberattacks.html</loc>
    <lastmod>2026-02-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/10/shift-to-stealthy-long-term-access-in-cyberattacks/</loc>
    <lastmod>2026-02-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/10/soc-transformation-and-ai-integration-for-future-threat-mitigation.html</loc>
    <lastmod>2026-02-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/10/soc-transformation-and-ai-integration-for-future-threat-mitigation/</loc>
    <lastmod>2026-02-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/10/trojanized-7-zip-installer-distributes-proxy-malware.html</loc>
    <lastmod>2026-02-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/10/trojanized-7-zip-installer-distributes-proxy-malware/</loc>
    <lastmod>2026-02-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/10/windows-11-kb5077181-kb5075941-cumulative-updates-released.html</loc>
    <lastmod>2026-02-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/10/windows-11-kb5077181-kb5075941-cumulative-updates-released/</loc>
    <lastmod>2026-02-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/10/zastai-secures-6m-pre-a-funding-for-ai-powered-code-security.html</loc>
    <lastmod>2026-02-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/10/zastai-secures-6m-pre-a-funding-for-ai-powered-code-security/</loc>
    <lastmod>2026-02-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/10/zerodayrat-malware-targets-android-and-ios-devices.html</loc>
    <lastmod>2026-02-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/10/zerodayrat-malware-targets-android-and-ios-devices/</loc>
    <lastmod>2026-02-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/11/chinese-national-sentenced-for-73m-crypto-investment-fraud.html</loc>
    <lastmod>2026-02-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/11/chinese-national-sentenced-for-73m-crypto-investment-fraud/</loc>
    <lastmod>2026-02-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/11/cisa-2025-year-in-review-strengthening-critical-infrastructure-security.html</loc>
    <lastmod>2026-02-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/11/cisa-2025-year-in-review-strengthening-critical-infrastructure-security/</loc>
    <lastmod>2026-02-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/11/crazy-ransomware-gang-abuses-employee-monitoring-and-remote-support-tools.html</loc>
    <lastmod>2026-02-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/11/crazy-ransomware-gang-abuses-employee-monitoring-and-remote-support-tools/</loc>
    <lastmod>2026-02-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/11/first-predicts-record-50000-cves-in-2026.html</loc>
    <lastmod>2026-02-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/11/first-predicts-record-50000-cves-in-2026/</loc>
    <lastmod>2026-02-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/11/jokerotp-mfa-phishing-as-a-service-dismantled-third-suspect-arrested.html</loc>
    <lastmod>2026-02-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/11/jokerotp-mfa-phishing-as-a-service-dismantled-third-suspect-arrested/</loc>
    <lastmod>2026-02-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/11/patch-tuesday-over-60-vendors-release-security-fixes-for-critical-vulnerabilities.html</loc>
    <lastmod>2026-02-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/11/patch-tuesday-over-60-vendors-release-security-fixes-for-critical-vulnerabilities/</loc>
    <lastmod>2026-02-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/11/sshstalker-linux-botnet-uses-irc-for-c2-communications.html</loc>
    <lastmod>2026-02-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/11/sshstalker-linux-botnet-uses-irc-for-c2-communications/</loc>
    <lastmod>2026-02-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/11/wazuh-enhances-cyber-resilience-with-advanced-detection-and-response-capabilities.html</loc>
    <lastmod>2026-02-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/11/wazuh-enhances-cyber-resilience-with-advanced-detection-and-response-capabilities/</loc>
    <lastmod>2026-02-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/11/windows-11-26h1-released-for-select-arm-based-devices.html</loc>
    <lastmod>2026-02-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/11/windows-11-26h1-released-for-select-arm-based-devices/</loc>
    <lastmod>2026-02-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/12/ai-skills-exposed-as-new-attack-surface-for-data-theft-and-sabotage.html</loc>
    <lastmod>2026-02-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/12/ai-skills-exposed-as-new-attack-surface-for-data-theft-and-sabotage/</loc>
    <lastmod>2026-02-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/12/bitwarden-launches-cupid-vault-for-secure-password-sharing.html</loc>
    <lastmod>2026-02-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/12/bitwarden-launches-cupid-vault-for-secure-password-sharing/</loc>
    <lastmod>2026-02-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/12/critical-rce-vulnerability-in-wpvivid-backup-migration-plugin.html</loc>
    <lastmod>2026-02-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/12/critical-rce-vulnerability-in-wpvivid-backup-migration-plugin/</loc>
    <lastmod>2026-02-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/12/ctem-adoption-divide-84-of-security-programs-lagging.html</loc>
    <lastmod>2026-02-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/12/ctem-adoption-divide-84-of-security-programs-lagging/</loc>
    <lastmod>2026-02-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/12/notepad-markdown-link-command-injection-vulnerability-cve-2026-20841.html</loc>
    <lastmod>2026-02-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/12/notepad-markdown-link-command-injection-vulnerability-cve-2026-20841/</loc>
    <lastmod>2026-02-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/12/odido-data-breach-exposes-62-million-customer-records.html</loc>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/12/odido-data-breach-exposes-62-million-customer-records/</loc>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/12/world-leaks-ransomware-group-deploys-custom-rustyrocket-malware.html</loc>
    <lastmod>2026-02-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/12/world-leaks-ransomware-group-deploys-custom-rustyrocket-malware/</loc>
    <lastmod>2026-02-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/13/cisa-announces-town-halls-for-circia-rulemaking-engagement.html</loc>
    <lastmod>2026-02-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/13/cisa-announces-town-halls-for-circia-rulemaking-engagement/</loc>
    <lastmod>2026-02-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/13/criminal-ip-integrates-with-ibm-qradar-for-enhanced-threat-intelligence.html</loc>
    <lastmod>2026-02-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/13/criminal-ip-integrates-with-ibm-qradar-for-enhanced-threat-intelligence/</loc>
    <lastmod>2026-02-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/13/fake-ai-assistant-extensions-in-google-chrome-web-store-exfiltrate-credentials-and-monitor-emails.html</loc>
    <lastmod>2026-02-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/13/fake-ai-assistant-extensions-in-google-chrome-web-store-exfiltrate-credentials-and-monitor-emails/</loc>
    <lastmod>2026-02-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/13/g7-nations-rank-cyber-threats-as-top-security-risk-for-second-consecutive-year.html</loc>
    <lastmod>2026-02-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/13/g7-nations-rank-cyber-threats-as-top-security-risk-for-second-consecutive-year/</loc>
    <lastmod>2026-02-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/13/lvmh-brands-fined-25-million-for-inadequate-data-security.html</loc>
    <lastmod>2026-02-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/13/lvmh-brands-fined-25-million-for-inadequate-data-security/</loc>
    <lastmod>2026-02-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/13/microsoft-family-safety-bug-blocking-google-chrome-and-other-browsers-fixed.html</loc>
    <lastmod>2026-02-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/13/microsoft-family-safety-bug-blocking-google-chrome-and-other-browsers-fixed/</loc>
    <lastmod>2026-02-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/13/npm-enhances-supply-chain-security-with-authentication-overhaul.html</loc>
    <lastmod>2026-02-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/13/npm-enhances-supply-chain-security-with-authentication-overhaul/</loc>
    <lastmod>2026-02-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/13/russia-intensifies-communication-blockade-by-targeting-whatsapp-and-telegram.html</loc>
    <lastmod>2026-02-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/13/russia-intensifies-communication-blockade-by-targeting-whatsapp-and-telegram/</loc>
    <lastmod>2026-02-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/13/state-sponsored-actors-target-defense-industrial-base-with-multi-vector-cyber-operations.html</loc>
    <lastmod>2026-02-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/13/state-sponsored-actors-target-defense-industrial-base-with-multi-vector-cyber-operations/</loc>
    <lastmod>2026-02-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/16/85-increase-in-crypto-payments-to-human-traffickers.html</loc>
    <lastmod>2026-02-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/16/85-increase-in-crypto-payments-to-human-traffickers/</loc>
    <lastmod>2026-02-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/16/cve-2026-2441-chrome-zero-day-exploited-in-the-wild.html</loc>
    <lastmod>2026-02-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/16/cve-2026-2441-chrome-zero-day-exploited-in-the-wild/</loc>
    <lastmod>2026-02-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/16/dutch-man-arrested-for-refusing-to-delete-accidentally-leaked-police-data.html</loc>
    <lastmod>2026-02-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/16/dutch-man-arrested-for-refusing-to-delete-accidentally-leaked-police-data/</loc>
    <lastmod>2026-02-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/16/eurail-data-breach-stolen-customer-data-sold-on-dark-web.html</loc>
    <lastmod>2026-02-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/16/eurail-data-breach-stolen-customer-data-sold-on-dark-web/</loc>
    <lastmod>2026-02-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/16/infostealer-malware-targets-openclaw-configuration-files.html</loc>
    <lastmod>2026-02-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/16/infostealer-malware-targets-openclaw-configuration-files/</loc>
    <lastmod>2026-02-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/16/iso-iec-27001-compliance-with-passkey-authentication.html</loc>
    <lastmod>2026-02-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/16/iso-iec-27001-compliance-with-passkey-authentication/</loc>
    <lastmod>2026-02-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/16/lithuanias-ai-driven-cyber-fraud-defense-initiatives.html</loc>
    <lastmod>2026-02-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/16/lithuanias-ai-driven-cyber-fraud-defense-initiatives/</loc>
    <lastmod>2026-02-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/16/malicious-outlook-add-in-hijacked-to-steal-4000-microsoft-credentials.html</loc>
    <lastmod>2026-02-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/16/malicious-outlook-add-in-hijacked-to-steal-4000-microsoft-credentials/</loc>
    <lastmod>2026-02-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/16/operation-doppelbrand-phishing-campaign-targets-fortune-500-firms.html</loc>
    <lastmod>2026-02-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/16/operation-doppelbrand-phishing-campaign-targets-fortune-500-firms/</loc>
    <lastmod>2026-02-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/16/shinyhunters-leak-600k-canada-goose-customer-records.html</loc>
    <lastmod>2026-02-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/16/shinyhunters-leak-600k-canada-goose-customer-records/</loc>
    <lastmod>2026-02-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/16/vulnerabilities-in-cloud-based-password-managers-enable-full-vault-compromise.html</loc>
    <lastmod>2026-02-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/16/vulnerabilities-in-cloud-based-password-managers-enable-full-vault-compromise/</loc>
    <lastmod>2026-02-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/16/washington-hotel-in-japan-hit-by-ransomware-attack.html</loc>
    <lastmod>2026-02-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/16/washington-hotel-in-japan-hit-by-ransomware-attack/</loc>
    <lastmod>2026-02-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/17/ai-assistants-abused-as-command-and-control-proxies.html</loc>
    <lastmod>2026-02-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/17/ai-assistants-abused-as-command-and-control-proxies/</loc>
    <lastmod>2026-02-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/17/ai-recommendation-poisoning-via-summarize-with-ai-buttons.html</loc>
    <lastmod>2026-02-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/17/ai-recommendation-poisoning-via-summarize-with-ai-buttons/</loc>
    <lastmod>2026-02-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/17/android-17-beta-introduces-secure-by-default-architecture-and-enhanced-security-features.html</loc>
    <lastmod>2026-02-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/17/android-17-beta-introduces-secure-by-default-architecture-and-enhanced-security-features/</loc>
    <lastmod>2026-02-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/17/apple-tests-end-to-end-encrypted-rcs-messaging-in-ios-264-developer-beta.html</loc>
    <lastmod>2026-02-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/17/apple-tests-end-to-end-encrypted-rcs-messaging-in-ios-264-developer-beta/</loc>
    <lastmod>2026-02-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/17/corelight-investigator-ndr-platform-reviewed-for-soc-workflows.html</loc>
    <lastmod>2026-02-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/17/corelight-investigator-ndr-platform-reviewed-for-soc-workflows/</loc>
    <lastmod>2026-02-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/17/critical-vulnerabilities-in-popular-vscode-extensions-enable-rce-and-file-theft.html</loc>
    <lastmod>2026-02-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/17/critical-vulnerabilities-in-popular-vscode-extensions-enable-rce-and-file-theft/</loc>
    <lastmod>2026-02-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/17/keenadu-android-backdoor-discovered-in-firmware-and-google-play-apps.html</loc>
    <lastmod>2026-02-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/17/keenadu-android-backdoor-discovered-in-firmware-and-google-play-apps/</loc>
    <lastmod>2026-02-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/17/low-skilled-cybercriminals-use-ai-for-vibe-extortion-attacks.html</loc>
    <lastmod>2026-02-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/17/low-skilled-cybercriminals-use-ai-for-vibe-extortion-attacks/</loc>
    <lastmod>2026-02-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/17/over-privileged-ai-systems-linked-to-higher-incident-rates.html</loc>
    <lastmod>2026-02-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/17/over-privileged-ai-systems-linked-to-higher-incident-rates/</loc>
    <lastmod>2026-02-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/17/phobos-ransomware-suspect-arrested-in-poland.html</loc>
    <lastmod>2026-03-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/17/phobos-ransomware-suspect-arrested-in-poland/</loc>
    <lastmod>2026-03-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/17/rise-in-ransomware-attacks-targeting-industrial-operations.html</loc>
    <lastmod>2026-02-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/17/rise-in-ransomware-attacks-targeting-industrial-operations/</loc>
    <lastmod>2026-02-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/17/smartloader-campaign-uses-trojanized-oura-mcp-server-to-deploy-stealc-infostealer.html</loc>
    <lastmod>2026-02-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/17/smartloader-campaign-uses-trojanized-oura-mcp-server-to-deploy-stealc-infostealer/</loc>
    <lastmod>2026-02-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/17/webinar-on-modern-cloud-forensics-and-ai-driven-incident-response.html</loc>
    <lastmod>2026-02-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/17/webinar-on-modern-cloud-forensics-and-ai-driven-incident-response/</loc>
    <lastmod>2026-02-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/18/automated-workflows-for-security-and-it-operations.html</loc>
    <lastmod>2026-02-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/18/automated-workflows-for-security-and-it-operations/</loc>
    <lastmod>2026-02-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/18/chinese-apt-group-exploits-dell-zero-day-for-two-years.html</loc>
    <lastmod>2026-02-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/18/chinese-apt-group-exploits-dell-zero-day-for-two-years/</loc>
    <lastmod>2026-02-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/18/cogent-security-secures-42m-for-ai-driven-vulnerability-management.html</loc>
    <lastmod>2026-02-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/18/cogent-security-secures-42m-for-ai-driven-vulnerability-management/</loc>
    <lastmod>2026-02-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/18/critical-authentication-bypass-flaw-in-honeywell-cctv-systems.html</loc>
    <lastmod>2026-02-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/18/critical-authentication-bypass-flaw-in-honeywell-cctv-systems/</loc>
    <lastmod>2026-02-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/18/cybersecurity-adaptations-for-permanent-instability-in-2026.html</loc>
    <lastmod>2026-02-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/18/cybersecurity-adaptations-for-permanent-instability-in-2026/</loc>
    <lastmod>2026-02-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/18/darknet-drug-ring-operators-sentenced-in-us-federal-court.html</loc>
    <lastmod>2026-02-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/18/darknet-drug-ring-operators-sentenced-in-us-federal-court/</loc>
    <lastmod>2026-02-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/18/email-bombing-exploits-cognitive-overload-for-fraud-and-harassment.html</loc>
    <lastmod>2026-02-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/18/email-bombing-exploits-cognitive-overload-for-fraud-and-harassment/</loc>
    <lastmod>2026-02-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/18/figure-fintech-breach-exposes-967200-accounts-via-social-engineering.html</loc>
    <lastmod>2026-02-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/18/figure-fintech-breach-exposes-967200-accounts-via-social-engineering/</loc>
    <lastmod>2026-02-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/18/gemini-chatbot-abused-in-fake-crypto-scam.html</loc>
    <lastmod>2026-02-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/18/gemini-chatbot-abused-in-fake-crypto-scam/</loc>
    <lastmod>2026-02-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/18/microsoft-365-copilot-bug-bypasses-dlp-policies-for-confidential-emails.html</loc>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/18/microsoft-365-copilot-bug-bypasses-dlp-policies-for-confidential-emails/</loc>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/18/ransomware-victims-and-groups-reach-record-highs-in-2025.html</loc>
    <lastmod>2026-02-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/18/ransomware-victims-and-groups-reach-record-highs-in-2025/</loc>
    <lastmod>2026-02-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/18/spanish-court-orders-nordvpn-and-protonvpn-to-block-laliga-piracy-streams.html</loc>
    <lastmod>2026-02-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/18/spanish-court-orders-nordvpn-and-protonvpn-to-block-laliga-piracy-streams/</loc>
    <lastmod>2026-02-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/18/unauthenticated-remote-code-execution-in-grandstream-gxp1600-voip-phones.html</loc>
    <lastmod>2026-02-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/18/unauthenticated-remote-code-execution-in-grandstream-gxp1600-voip-phones/</loc>
    <lastmod>2026-02-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/19/abu-dhabi-finance-week-cloud-storage-leak-exposes-vip-attendee-data.html</loc>
    <lastmod>2026-02-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/19/abu-dhabi-finance-week-cloud-storage-leak-exposes-vip-attendee-data/</loc>
    <lastmod>2026-02-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/19/ai-driven-attack-acceleration-and-new-attack-surfaces.html</loc>
    <lastmod>2026-02-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/19/ai-driven-attack-acceleration-and-new-attack-surfaces/</loc>
    <lastmod>2026-02-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/19/crescentharvest-campaign-targets-iran-protest-supporters-with-rat-malware.html</loc>
    <lastmod>2026-02-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/19/crescentharvest-campaign-targets-iran-protest-supporters-with-rat-malware/</loc>
    <lastmod>2026-02-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/19/google-play-security-measures-block-175-million-app-submissions-in-2025.html</loc>
    <lastmod>2026-02-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/19/google-play-security-measures-block-175-million-app-submissions-in-2025/</loc>
    <lastmod>2026-02-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/19/infostealers-exploit-stolen-credentials-to-construct-real-identities.html</loc>
    <lastmod>2026-02-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/19/infostealers-exploit-stolen-credentials-to-construct-real-identities/</loc>
    <lastmod>2026-02-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/19/nigerian-national-sentenced-for-tax-firm-hacking-and-fraudulent-refunds.html</loc>
    <lastmod>2026-02-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/19/nigerian-national-sentenced-for-tax-firm-hacking-and-fraudulent-refunds/</loc>
    <lastmod>2026-02-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/19/openssl-rce-vulnerability-patched.html</loc>
    <lastmod>2026-02-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/19/openssl-rce-vulnerability-patched/</loc>
    <lastmod>2026-02-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/19/privilege-escalation-flaw-in-windows-admin-center-patched.html</loc>
    <lastmod>2026-02-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/19/privilege-escalation-flaw-in-windows-admin-center-patched/</loc>
    <lastmod>2026-02-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/19/promptspy-android-malware-uses-gemini-ai-for-persistence.html</loc>
    <lastmod>2026-02-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/19/promptspy-android-malware-uses-gemini-ai-for-persistence/</loc>
    <lastmod>2026-02-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/19/record-high-in-industrial-control-system-vulnerabilities-reported-in-2025.html</loc>
    <lastmod>2026-02-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/19/record-high-in-industrial-control-system-vulnerabilities-reported-in-2025/</loc>
    <lastmod>2026-02-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/19/remcos-rat-enhances-real-time-surveillance-and-evasion-techniques.html</loc>
    <lastmod>2026-02-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/19/remcos-rat-enhances-real-time-surveillance-and-evasion-techniques/</loc>
    <lastmod>2026-02-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/19/six-new-openclaw-vulnerabilities-patched.html</loc>
    <lastmod>2026-02-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/19/six-new-openclaw-vulnerabilities-patched/</loc>
    <lastmod>2026-02-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/19/starkiller-phishing-kit-bypasses-mfa-via-proxy-based-attacks.html</loc>
    <lastmod>2026-03-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/19/starkiller-phishing-kit-bypasses-mfa-via-proxy-based-attacks/</loc>
    <lastmod>2026-03-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/20/clickfix-campaign-deploys-mimicrat-rat-via-compromised-websites.html</loc>
    <lastmod>2026-02-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/20/clickfix-campaign-deploys-mimicrat-rat-via-compromised-websites/</loc>
    <lastmod>2026-02-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/20/cyber-insurance-underwriting-emphasizes-identity-posture-in-2026.html</loc>
    <lastmod>2026-02-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/20/cyber-insurance-underwriting-emphasizes-identity-posture-in-2026/</loc>
    <lastmod>2026-02-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/20/dramatic-increase-in-ddos-attack-frequency-and-power-in-2025.html</loc>
    <lastmod>2026-02-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/20/dramatic-increase-in-ddos-attack-frequency-and-power-in-2025/</loc>
    <lastmod>2026-02-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/20/paypal-working-capital-loan-app-data-exposure.html</loc>
    <lastmod>2026-02-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/20/paypal-working-capital-loan-app-data-exposure/</loc>
    <lastmod>2026-02-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/20/ransomware-attack-disrupts-university-of-mississippi-medical-center-operations.html</loc>
    <lastmod>2026-03-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/20/ransomware-attack-disrupts-university-of-mississippi-medical-center-operations/</loc>
    <lastmod>2026-03-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/20/ransomware-attack-on-advantest-corporation.html</loc>
    <lastmod>2026-02-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/20/ransomware-attack-on-advantest-corporation/</loc>
    <lastmod>2026-02-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/20/shift-left-security-strategy-fails-to-deliver-expected-benefits.html</loc>
    <lastmod>2026-02-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/20/shift-left-security-strategy-fails-to-deliver-expected-benefits/</loc>
    <lastmod>2026-02-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/21/ai-assisted-hacker-breaches-600-fortigate-firewalls-in-5-weeks.html</loc>
    <lastmod>2026-03-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/21/ai-assisted-hacker-breaches-600-fortigate-firewalls-in-5-weeks/</loc>
    <lastmod>2026-03-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/21/ec-council-launches-enterprise-ai-credential-suite-to-address-workforce-gaps.html</loc>
    <lastmod>2026-03-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/21/ec-council-launches-enterprise-ai-credential-suite-to-address-workforce-gaps/</loc>
    <lastmod>2026-03-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/21/predator-spyware-hides-ios-recording-indicators-via-springboard-hooking.html</loc>
    <lastmod>2026-02-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/21/predator-spyware-hides-ios-recording-indicators-via-springboard-hooking/</loc>
    <lastmod>2026-02-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/21/two-actively-exploited-roundcube-vulnerabilities-added-to-cisa-kev-catalog.html</loc>
    <lastmod>2026-02-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/21/two-actively-exploited-roundcube-vulnerabilities-added-to-cisa-kev-catalog/</loc>
    <lastmod>2026-02-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/22/arkanix-stealer-ai-assisted-info-stealer-experiment.html</loc>
    <lastmod>2026-02-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/22/arkanix-stealer-ai-assisted-info-stealer-experiment/</loc>
    <lastmod>2026-02-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/23/active-agent-based-crypto-scam-exploits-trust-in-ai-agent-networks.html</loc>
    <lastmod>2026-02-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/23/active-agent-based-crypto-scam-exploits-trust-in-ai-agent-networks/</loc>
    <lastmod>2026-02-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/23/anonymous-fenix-hacktivists-arrested-for-ddos-attacks-on-spanish-government-sites.html</loc>
    <lastmod>2026-02-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/23/anonymous-fenix-hacktivists-arrested-for-ddos-attacks-on-spanish-government-sites/</loc>
    <lastmod>2026-02-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/23/dell-recoverpoint-for-vms-zero-day-exploited-by-unc6201.html</loc>
    <lastmod>2026-02-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/23/dell-recoverpoint-for-vms-zero-day-exploited-by-unc6201/</loc>
    <lastmod>2026-02-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/23/exposed-llm-endpoints-increase-attack-surface-and-risk.html</loc>
    <lastmod>2026-02-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/23/exposed-llm-endpoints-increase-attack-surface-and-risk/</loc>
    <lastmod>2026-02-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/23/historical-cryptography-lessons-from-enigma-machine-relevant-to-modern-cybersecurity.html</loc>
    <lastmod>2026-02-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/23/historical-cryptography-lessons-from-enigma-machine-relevant-to-modern-cybersecurity/</loc>
    <lastmod>2026-02-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/23/microsoft-investigates-mouse-pointer-disappearance-in-classic-outlook.html</loc>
    <lastmod>2026-03-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/23/microsoft-investigates-mouse-pointer-disappearance-in-classic-outlook/</loc>
    <lastmod>2026-03-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/23/modern-access-risks-beyond-identity-in-workforce-security.html</loc>
    <lastmod>2026-02-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/23/modern-access-risks-beyond-identity-in-workforce-security/</loc>
    <lastmod>2026-02-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/23/optimizely-data-breach-after-vishing-attack.html</loc>
    <lastmod>2026-03-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/23/optimizely-data-breach-after-vishing-attack/</loc>
    <lastmod>2026-03-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/23/python-malware-deployment-with-obfuscation-and-credential-theft.html</loc>
    <lastmod>2026-02-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/23/python-malware-deployment-with-obfuscation-and-credential-theft/</loc>
    <lastmod>2026-02-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/24/1campaign-platform-facilitates-prolonged-malicious-google-ads.html</loc>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/24/1campaign-platform-facilitates-prolonged-malicious-google-ads/</loc>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/24/ai-agent-security-requires-intent-based-access-controls.html</loc>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/24/ai-agent-security-requires-intent-based-access-controls/</loc>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/24/ai-enabled-cyberattacks-surge-by-89-in-2025.html</loc>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/24/ai-enabled-cyberattacks-surge-by-89-in-2025/</loc>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/24/bitpanda-phishing-campaign-uses-fake-mfa-to-harvest-personal-data.html</loc>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/24/bitpanda-phishing-campaign-uses-fake-mfa-to-harvest-personal-data/</loc>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/24/cargurus-data-breach-exposes-124-million-records.html</loc>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/24/cargurus-data-breach-exposes-124-million-records/</loc>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/24/identity-risk-prioritization-framework-for-modern-enterprises.html</loc>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/24/identity-risk-prioritization-framework-for-modern-enterprises/</loc>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/24/insider-incidents-cost-organizations-195m-on-average-in-2025.html</loc>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/24/insider-incidents-cost-organizations-195m-on-average-in-2025/</loc>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/24/lazarus-group-linked-to-medusa-ransomware-attacks-on-us-healthcare.html</loc>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/24/lazarus-group-linked-to-medusa-ransomware-attacks-on-us-healthcare/</loc>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/24/record-vc-investments-in-ai-native-cybersecurity-solutions-in-2025.html</loc>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/24/record-vc-investments-in-ai-native-cybersecurity-solutions-in-2025/</loc>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/24/roguepilot-vulnerability-in-github-codespaces-enables-github-token-leak-via-copilot.html</loc>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/24/roguepilot-vulnerability-in-github-codespaces-enables-github-token-leak-via-copilot/</loc>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/24/security-vulnerabilities-in-popular-android-mental-health-apps.html</loc>
    <lastmod>2026-02-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/24/security-vulnerabilities-in-popular-android-mental-health-apps/</loc>
    <lastmod>2026-02-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/24/uac-0050-targets-european-financial-institution-with-spoofed-domain-and-rms-malware.html</loc>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/24/uac-0050-targets-european-financial-institution-with-spoofed-domain-and-rms-malware/</loc>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/24/uk-ico-fines-reddit-19-million-for-unlawful-collection-of-childrens-data.html</loc>
    <lastmod>2026-02-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/24/uk-ico-fines-reddit-19-million-for-unlawful-collection-of-childrens-data/</loc>
    <lastmod>2026-02-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/24/unsolicitedbooker-targets-central-asian-telecoms-with-lucidoor-and-marssnake-backdoors.html</loc>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/24/unsolicitedbooker-targets-central-asian-telecoms-with-lucidoor-and-marssnake-backdoors/</loc>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/24/wynn-resorts-employee-data-breach-confirmed.html</loc>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/24/wynn-resorts-employee-data-breach-confirmed/</loc>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/25/44-increase-in-public-facing-application-exploits-driven-by-ai.html</loc>
    <lastmod>2026-02-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/25/44-increase-in-public-facing-application-exploits-driven-by-ai/</loc>
    <lastmod>2026-02-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/25/active-exploitation-of-filezen-cve-2026-25108-os-command-injection-vulnerability.html</loc>
    <lastmod>2026-02-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/25/active-exploitation-of-filezen-cve-2026-25108-os-command-injection-vulnerability/</loc>
    <lastmod>2026-02-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/25/broken-triage-processes-increase-security-risks-and-operational-costs.html</loc>
    <lastmod>2026-02-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/25/broken-triage-processes-increase-security-risks-and-operational-costs/</loc>
    <lastmod>2026-02-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/25/cisa-issues-emergency-directive-for-cisco-sd-wan-vulnerabilities.html</loc>
    <lastmod>2026-03-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/25/cisa-issues-emergency-directive-for-cisco-sd-wan-vulnerabilities/</loc>
    <lastmod>2026-03-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/25/claude-code-vulnerabilities-enable-remote-code-execution-and-api-key-theft.html</loc>
    <lastmod>2026-02-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/25/claude-code-vulnerabilities-enable-remote-code-execution-and-api-key-theft/</loc>
    <lastmod>2026-02-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/25/critical-authentication-bypass-in-cisco-catalyst-sd-wan-exploited-since-2023.html</loc>
    <lastmod>2026-03-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/25/critical-authentication-bypass-in-cisco-catalyst-sd-wan-exploited-since-2023/</loc>
    <lastmod>2026-03-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/25/critical-rce-flaw-in-zyxel-routers-allows-remote-command-execution.html</loc>
    <lastmod>2026-02-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/25/critical-rce-flaw-in-zyxel-routers-allows-remote-command-execution/</loc>
    <lastmod>2026-02-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/25/diesel-vortex-phishing-campaign-targets-freight-and-logistics-organizations.html</loc>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/25/diesel-vortex-phishing-campaign-targets-freight-and-logistics-organizations/</loc>
    <lastmod>2026-02-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/25/increased-exploitation-of-unauthenticated-vulnerabilities-and-ai-enhanced-attack-techniques.html</loc>
    <lastmod>2026-02-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/25/increased-exploitation-of-unauthenticated-vulnerabilities-and-ai-enhanced-attack-techniques/</loc>
    <lastmod>2026-02-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/25/malicious-nuget-and-npm-packages-target-developers-to-steal-data-and-deploy-backdoors.html</loc>
    <lastmod>2026-02-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/25/malicious-nuget-and-npm-packages-target-developers-to-steal-data-and-deploy-backdoors/</loc>
    <lastmod>2026-02-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/25/national-security-organizations-still-rely-on-manual-processes-for-sensitive-data-transfers.html</loc>
    <lastmod>2026-02-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/25/national-security-organizations-still-rely-on-manual-processes-for-sensitive-data-transfers/</loc>
    <lastmod>2026-02-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/25/openclaw-automation-framework-faces-supply-chain-security-risks.html</loc>
    <lastmod>2026-02-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/25/openclaw-automation-framework-faces-supply-chain-security-risks/</loc>
    <lastmod>2026-02-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/25/oti-impact-score-introduced-for-measuring-ot-cyber-incident-severity.html</loc>
    <lastmod>2026-02-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/25/oti-impact-score-introduced-for-measuring-ot-cyber-incident-severity/</loc>
    <lastmod>2026-02-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/25/pci-security-standards-council-highlights-accelerating-threats-to-payment-systems.html</loc>
    <lastmod>2026-02-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/25/pci-security-standards-council-highlights-accelerating-threats-to-payment-systems/</loc>
    <lastmod>2026-02-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/25/telephone-oriented-attack-delivery-toad-bypasses-secure-email-gateways.html</loc>
    <lastmod>2026-02-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/25/telephone-oriented-attack-delivery-toad-bypasses-secure-email-gateways/</loc>
    <lastmod>2026-02-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/25/unc2814-campaign-targeting-telecom-and-government-networks.html</loc>
    <lastmod>2026-02-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/25/unc2814-campaign-targeting-telecom-and-government-networks/</loc>
    <lastmod>2026-02-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/25/windows-11-kb5077241-update-introduces-bitlocker-improvements-and-sysmon-tool.html</loc>
    <lastmod>2026-02-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/25/windows-11-kb5077241-update-introduces-bitlocker-improvements-and-sysmon-tool/</loc>
    <lastmod>2026-02-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/26/87-of-organizations-have-exploitable-software-vulnerabilities-in-production.html</loc>
    <lastmod>2026-02-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/26/87-of-organizations-have-exploitable-software-vulnerabilities-in-production/</loc>
    <lastmod>2026-02-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/26/aeternum-botnet-adopts-polygon-blockchain-for-command-and-control.html</loc>
    <lastmod>2026-02-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/26/aeternum-botnet-adopts-polygon-blockchain-for-command-and-control/</loc>
    <lastmod>2026-02-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/26/cisa-updates-resurge-malware-analysis-reveals-advanced-evasion-techniques.html</loc>
    <lastmod>2026-02-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/26/cisa-updates-resurge-malware-analysis-reveals-advanced-evasion-techniques/</loc>
    <lastmod>2026-02-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/26/critical-juniper-networks-ptx-router-vulnerability-cve-2026-21902.html</loc>
    <lastmod>2026-02-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/26/critical-juniper-networks-ptx-router-vulnerability-cve-2026-21902/</loc>
    <lastmod>2026-02-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/26/darktrace-detects-32-million-phishing-emails-in-2025-as-identity-attacks-surge.html</loc>
    <lastmod>2026-02-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/26/darktrace-detects-32-million-phishing-emails-in-2025-as-identity-attacks-surge/</loc>
    <lastmod>2026-02-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/26/google-api-keys-expose-gemini-ai-data.html</loc>
    <lastmod>2026-03-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/26/google-api-keys-expose-gemini-ai-data/</loc>
    <lastmod>2026-03-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/26/harvest-now-decrypt-later-urgent-need-for-post-quantum-cryptography-migration.html</loc>
    <lastmod>2026-03-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/26/harvest-now-decrypt-later-urgent-need-for-post-quantum-cryptography-migration/</loc>
    <lastmod>2026-03-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/26/increased-speed-and-sophistication-in-cyber-threats.html</loc>
    <lastmod>2026-02-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/26/increased-speed-and-sophistication-in-cyber-threats/</loc>
    <lastmod>2026-02-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/26/malicious-stripeapinet-nuget-package-exfiltrates-stripe-api-tokens.html</loc>
    <lastmod>2026-02-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/26/malicious-stripeapinet-nuget-package-exfiltrates-stripe-api-tokens/</loc>
    <lastmod>2026-02-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/26/manomano-data-breach-affects-38-million-customers-via-third-party-service-provider.html</loc>
    <lastmod>2026-02-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/26/manomano-data-breach-affects-38-million-customers-via-third-party-service-provider/</loc>
    <lastmod>2026-02-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/26/new-york-sues-valve-over-illegal-gambling-via-game-loot-boxes.html</loc>
    <lastmod>2026-02-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/26/new-york-sues-valve-over-illegal-gambling-via-game-loot-boxes/</loc>
    <lastmod>2026-02-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/26/olympique-marseille-confirms-cyberattack-after-data-leak.html</loc>
    <lastmod>2026-02-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/26/olympique-marseille-confirms-cyberattack-after-data-leak/</loc>
    <lastmod>2026-02-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/26/ransomware-payment-rate-declines-amid-rising-attacks.html</loc>
    <lastmod>2026-03-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/26/ransomware-payment-rate-declines-amid-rising-attacks/</loc>
    <lastmod>2026-03-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/26/uat-10027-campaign-targets-us-education-and-healthcare-with-dohdoor-backdoor.html</loc>
    <lastmod>2026-02-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/26/uat-10027-campaign-targets-us-education-and-healthcare-with-dohdoor-backdoor/</loc>
    <lastmod>2026-02-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/26/ufp-technologies-cyberattack-results-in-data-theft.html</loc>
    <lastmod>2026-02-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/26/ufp-technologies-cyberattack-results-in-data-theft/</loc>
    <lastmod>2026-02-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/26/uk-ico-transitions-to-board-run-model-under-data-use-and-access-act-2025.html</loc>
    <lastmod>2026-02-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/26/uk-ico-transitions-to-board-run-model-under-data-use-and-access-act-2025/</loc>
    <lastmod>2026-02-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/27/ai-powered-fake-id-service-onlyfake-disrupted.html</loc>
    <lastmod>2026-02-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/27/ai-powered-fake-id-service-onlyfake-disrupted/</loc>
    <lastmod>2026-02-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/27/global-law-enforcement-disrupts-the-com-cybercrime-collective.html</loc>
    <lastmod>2026-03-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/27/global-law-enforcement-disrupts-the-com-cybercrime-collective/</loc>
    <lastmod>2026-03-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/27/malicious-go-crypto-module-exploits-namespace-confusion-to-deploy-rekoobe-backdoor.html</loc>
    <lastmod>2026-02-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/27/malicious-go-crypto-module-exploits-namespace-confusion-to-deploy-rekoobe-backdoor/</loc>
    <lastmod>2026-02-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/27/meta-files-lawsuits-against-advertisers-involved-in-celeb-bait-scams.html</loc>
    <lastmod>2026-02-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/27/meta-files-lawsuits-against-advertisers-involved-in-celeb-bait-scams/</loc>
    <lastmod>2026-02-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/27/ongoing-web-shell-attacks-on-sangoma-freepbx-instances-via-cve-2025-64328.html</loc>
    <lastmod>2026-02-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/27/ongoing-web-shell-attacks-on-sangoma-freepbx-instances-via-cve-2025-64328/</loc>
    <lastmod>2026-02-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/27/trojanized-gaming-tools-distribute-java-based-rat-via-browser-and-chat-platforms.html</loc>
    <lastmod>2026-02-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/27/trojanized-gaming-tools-distribute-java-based-rat-via-browser-and-chat-platforms/</loc>
    <lastmod>2026-02-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/27/uk-vms-reduces-critical-vulnerability-backlog-by-75.html</loc>
    <lastmod>2026-02-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/27/uk-vms-reduces-critical-vulnerability-backlog-by-75/</loc>
    <lastmod>2026-02-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/27/windows-11-batch-file-security-enhancements-in-insider-preview.html</loc>
    <lastmod>2026-02-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/27/windows-11-batch-file-security-enhancements-in-insider-preview/</loc>
    <lastmod>2026-02-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/28/clawjacked-flaw-in-openclaw-enables-local-ai-agent-hijacking-via-websocket.html</loc>
    <lastmod>2026-03-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/28/clawjacked-flaw-in-openclaw-enables-local-ai-agent-hijacking-via-websocket/</loc>
    <lastmod>2026-03-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/28/kimwolf-botmaster-dort-linked-to-cybercrime-activities.html</loc>
    <lastmod>2026-03-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/28/kimwolf-botmaster-dort-linked-to-cybercrime-activities/</loc>
    <lastmod>2026-03-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/28/pentagon-designates-anthropic-as-supply-chain-risk-over-ai-use-dispute.html</loc>
    <lastmod>2026-03-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/28/pentagon-designates-anthropic-as-supply-chain-risk-over-ai-use-dispute/</loc>
    <lastmod>2026-03-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/28/quicklens-chrome-extension-compromised-to-steal-cryptocurrency-and-credentials.html</loc>
    <lastmod>2026-03-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/28/quicklens-chrome-extension-compromised-to-steal-cryptocurrency-and-credentials/</loc>
    <lastmod>2026-03-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/28/south-korean-tax-agency-exposes-wallet-seed-48m-in-crypto-stolen.html</loc>
    <lastmod>2026-03-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/02/28/south-korean-tax-agency-exposes-wallet-seed-48m-in-crypto-stolen/</loc>
    <lastmod>2026-03-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/02/alabama-man-pleads-guilty-to-extortion-and-cyberstalking-of-hundreds-of-women.html</loc>
    <lastmod>2026-03-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/02/alabama-man-pleads-guilty-to-extortion-and-cyberstalking-of-hundreds-of-women/</loc>
    <lastmod>2026-03-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/02/anthropics-claude-ai-service-experiences-worldwide-outage.html</loc>
    <lastmod>2026-03-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/02/anthropics-claude-ai-service-experiences-worldwide-outage/</loc>
    <lastmod>2026-03-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/02/cisco-sd-wan-zero-day-exploited-by-highly-sophisticated-threat-actor.html</loc>
    <lastmod>2026-03-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/02/cisco-sd-wan-zero-day-exploited-by-highly-sophisticated-threat-actor/</loc>
    <lastmod>2026-03-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/02/deepfakes-and-injection-attacks-compromise-identity-verification-systems.html</loc>
    <lastmod>2026-03-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/02/deepfakes-and-injection-attacks-compromise-identity-verification-systems/</loc>
    <lastmod>2026-03-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/02/fake-google-security-pwa-campaign-steals-credentials-and-mfa-codes.html</loc>
    <lastmod>2026-03-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/02/fake-google-security-pwa-campaign-steals-credentials-and-mfa-codes/</loc>
    <lastmod>2026-03-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/02/firewall-backlogs-and-developer-security-team-tensions-in-ai-driven-development.html</loc>
    <lastmod>2026-03-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/02/firewall-backlogs-and-developer-security-team-tensions-in-ai-driven-development/</loc>
    <lastmod>2026-03-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/02/google-advances-quantum-resistant-https-certificates-with-merkle-tree-certificates.html</loc>
    <lastmod>2026-03-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/02/google-advances-quantum-resistant-https-certificates-with-merkle-tree-certificates/</loc>
    <lastmod>2026-03-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/02/microsoft-coa-fraud-scheme-leads-to-22-month-prison-sentence.html</loc>
    <lastmod>2026-03-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/02/microsoft-coa-fraud-scheme-leads-to-22-month-prison-sentence/</loc>
    <lastmod>2026-03-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/02/safeline-waf-deployment-for-saas-bot-protection.html</loc>
    <lastmod>2026-03-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/02/safeline-waf-deployment-for-saas-bot-protection/</loc>
    <lastmod>2026-03-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/03/ai-tools-lower-barrier-to-entry-for-sophisticated-cyber-attacks.html</loc>
    <lastmod>2026-03-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/03/ai-tools-lower-barrier-to-entry-for-sophisticated-cyber-attacks/</loc>
    <lastmod>2026-03-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/03/airsnitch-attacks-bypass-wi-fi-client-isolation.html</loc>
    <lastmod>2026-03-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/03/airsnitch-attacks-bypass-wi-fi-client-isolation/</loc>
    <lastmod>2026-03-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/03/cloud-imperium-games-breach-exposes-user-data.html</loc>
    <lastmod>2026-03-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/03/cloud-imperium-games-breach-exposes-user-data/</loc>
    <lastmod>2026-03-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/03/cpanel-access-brokerage-thrives-in-cybercrime-markets.html</loc>
    <lastmod>2026-03-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/03/cpanel-access-brokerage-thrives-in-cybercrime-markets/</loc>
    <lastmod>2026-03-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/03/cve-2026-21385-exploited-in-qualcomm-android-component.html</loc>
    <lastmod>2026-03-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/03/cve-2026-21385-exploited-in-qualcomm-android-component/</loc>
    <lastmod>2026-03-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/03/drone-strikes-damage-aws-data-centers-in-middle-east.html</loc>
    <lastmod>2026-03-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/03/drone-strikes-damage-aws-data-centers-in-middle-east/</loc>
    <lastmod>2026-03-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/03/enterprise-ai-agents-become-identity-dark-matter.html</loc>
    <lastmod>2026-03-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/03/enterprise-ai-agents-become-identity-dark-matter/</loc>
    <lastmod>2026-03-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/03/expanded-impact-of-third-party-breaches-in-2025.html</loc>
    <lastmod>2026-03-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/03/expanded-impact-of-third-party-breaches-in-2025/</loc>
    <lastmod>2026-03-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/03/google-chrome-accelerates-release-cycle-to-bi-weekly-updates.html</loc>
    <lastmod>2026-03-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/03/google-chrome-accelerates-release-cycle-to-bi-weekly-updates/</loc>
    <lastmod>2026-03-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/03/havoc-c2-framework-deployed-via-fake-tech-support-campaign.html</loc>
    <lastmod>2026-03-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/03/havoc-c2-framework-deployed-via-fake-tech-support-campaign/</loc>
    <lastmod>2026-03-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/03/increased-workload-and-evolving-role-of-us-cisos-due-to-ai-and-threat-landscape.html</loc>
    <lastmod>2026-03-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/03/increased-workload-and-evolving-role-of-us-cisos-due-to-ai-and-threat-landscape/</loc>
    <lastmod>2026-03-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/03/iran-linked-dust-specter-targets-iraqi-officials-with-ai-assisted-malware.html</loc>
    <lastmod>2026-03-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/03/iran-linked-dust-specter-targets-iraqi-officials-with-ai-assisted-malware/</loc>
    <lastmod>2026-03-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/03/iranian-crypto-exchange-ariomex-linked-to-sanctions-evasion.html</loc>
    <lastmod>2026-03-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/03/iranian-crypto-exchange-ariomex-linked-to-sanctions-evasion/</loc>
    <lastmod>2026-03-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/03/lexisnexis-breach-via-react2shell-vulnerability.html</loc>
    <lastmod>2026-03-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/03/lexisnexis-breach-via-react2shell-vulnerability/</loc>
    <lastmod>2026-03-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/03/redalert-spyware-campaign-exploits-wartime-panic-with-trojanized-app.html</loc>
    <lastmod>2026-03-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/03/redalert-spyware-campaign-exploits-wartime-panic-with-trojanized-app/</loc>
    <lastmod>2026-03-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/03/strengthening-tier-1-soc-analysts-with-threat-intelligence.html</loc>
    <lastmod>2026-03-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/03/strengthening-tier-1-soc-analysts-with-threat-intelligence/</loc>
    <lastmod>2026-03-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/03/workload-identity-crisis-and-authentication-challenges-in-2026.html</loc>
    <lastmod>2026-03-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/03/workload-identity-crisis-and-authentication-challenges-in-2026/</loc>
    <lastmod>2026-03-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/04/ai-enabled-cyberattacks-and-hive-mind-analogies-in-cybersecurity.html</loc>
    <lastmod>2026-03-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/04/ai-enabled-cyberattacks-and-hive-mind-analogies-in-cybersecurity/</loc>
    <lastmod>2026-03-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/04/akzonobel-us-site-breached-by-anubis-ransomware-gang.html</loc>
    <lastmod>2026-03-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/04/akzonobel-us-site-breached-by-anubis-ransomware-gang/</loc>
    <lastmod>2026-03-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/04/brute-force-attack-reveals-ransomware-infrastructure-network.html</loc>
    <lastmod>2026-03-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/04/brute-force-attack-reveals-ransomware-infrastructure-network/</loc>
    <lastmod>2026-03-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/04/coruna-ios-exploit-kit-targets-ios-131721-with-23-exploits.html</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/04/coruna-ios-exploit-kit-targets-ios-131721-with-23-exploits/</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/04/critical-zero-click-rce-vulnerability-in-freescout-helpdesk-platform.html</loc>
    <lastmod>2026-03-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/04/critical-zero-click-rce-vulnerability-in-freescout-helpdesk-platform/</loc>
    <lastmod>2026-03-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/04/facebook-outage-renders-accounts-temporarily-unavailable-worldwide.html</loc>
    <lastmod>2026-03-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/04/facebook-outage-renders-accounts-temporarily-unavailable-worldwide/</loc>
    <lastmod>2026-03-04</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/04/global-coalition-on-telecoms-gcot-publishes-6g-cybersecurity-and-resilience-principles.html</loc>
    <lastmod>2026-03-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/04/global-coalition-on-telecoms-gcot-publishes-6g-cybersecurity-and-resilience-principles/</loc>
    <lastmod>2026-03-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/04/hungerrush-extortion-campaign-targets-restaurant-customers.html</loc>
    <lastmod>2026-03-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/04/hungerrush-extortion-campaign-targets-restaurant-customers/</loc>
    <lastmod>2026-03-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/04/lack-of-digital-estate-standards-poses-posthumous-deepfake-fraud-risks.html</loc>
    <lastmod>2026-03-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/04/lack-of-digital-estate-standards-poses-posthumous-deepfake-fraud-risks/</loc>
    <lastmod>2026-03-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/04/malicious-laravel-packages-deploy-cross-platform-rat-via-packagist.html</loc>
    <lastmod>2026-03-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/04/malicious-laravel-packages-deploy-cross-platform-rat-via-packagist/</loc>
    <lastmod>2026-03-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/04/rfp-guide-for-ai-usage-control-and-governance-released.html</loc>
    <lastmod>2026-03-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/04/rfp-guide-for-ai-usage-control-and-governance-released/</loc>
    <lastmod>2026-03-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/04/silver-dragon-apt41-linked-group-targets-governments-with-cobalt-strike-and-google-drive-c2.html</loc>
    <lastmod>2026-03-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/04/silver-dragon-apt41-linked-group-targets-governments-with-cobalt-strike-and-google-drive-c2/</loc>
    <lastmod>2026-03-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/04/tycoon2fa-phishing-as-a-service-takedown.html</loc>
    <lastmod>2026-03-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/04/tycoon2fa-phishing-as-a-service-takedown/</loc>
    <lastmod>2026-03-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/04/vmware-aria-operations-rce-flaw-exploited-in-attacks.html</loc>
    <lastmod>2026-03-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/04/vmware-aria-operations-rce-flaw-exploited-in-attacks/</loc>
    <lastmod>2026-03-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/05/2026-browser-security-report-highlights-enterprise-blind-spots.html</loc>
    <lastmod>2026-03-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/05/2026-browser-security-report-highlights-enterprise-blind-spots/</loc>
    <lastmod>2026-03-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/05/bitwarden-adds-passkey-login-support-for-windows-11.html</loc>
    <lastmod>2026-03-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/05/bitwarden-adds-passkey-login-support-for-windows-11/</loc>
    <lastmod>2026-03-05</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/05/contextcrush-vulnerability-in-context7-mcp-server.html</loc>
    <lastmod>2026-03-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/05/contextcrush-vulnerability-in-context7-mcp-server/</loc>
    <lastmod>2026-03-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/05/credential-abuse-in-windows-environments-despite-mfa.html</loc>
    <lastmod>2026-03-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/05/credential-abuse-in-windows-environments-despite-mfa/</loc>
    <lastmod>2026-03-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/05/critical-vulnerability-in-wordpress-user-registration-membership-plugin-exploited.html</loc>
    <lastmod>2026-03-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/05/critical-vulnerability-in-wordpress-user-registration-membership-plugin-exploited/</loc>
    <lastmod>2026-03-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/05/increase-in-zero-day-exploits-in-2025.html</loc>
    <lastmod>2026-03-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/05/increase-in-zero-day-exploits-in-2025/</loc>
    <lastmod>2026-03-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/05/online-gambling-ring-exploiting-ukrainian-women-dismantled.html</loc>
    <lastmod>2026-03-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/05/online-gambling-ring-exploiting-ukrainian-women-dismantled/</loc>
    <lastmod>2026-03-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/05/preparing-for-quantum-computing-threats-with-post-quantum-cryptography.html</loc>
    <lastmod>2026-03-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/05/preparing-for-quantum-computing-threats-with-post-quantum-cryptography/</loc>
    <lastmod>2026-03-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/05/rise-in-ai-driven-insider-threats-classified-as-critical-business-risk.html</loc>
    <lastmod>2026-03-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/05/rise-in-ai-driven-insider-threats-classified-as-critical-business-risk/</loc>
    <lastmod>2026-03-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/05/self-propagating-javascript-worm-targets-wikimedia-projects.html</loc>
    <lastmod>2026-03-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/05/self-propagating-javascript-worm-targets-wikimedia-projects/</loc>
    <lastmod>2026-03-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/05/threatsday-bulletin-ddr5-bot-scalping-samsung-tv-tracking-reddit-privacy-fine-more.html</loc>
    <lastmod>2026-03-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/05/threatsday-bulletin-ddr5-bot-scalping-samsung-tv-tracking-reddit-privacy-fine-more/</loc>
    <lastmod>2026-03-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/05/us-marshals-service-contractors-son-arrested-for-46m-crypto-theft.html</loc>
    <lastmod>2026-03-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/05/us-marshals-service-contractors-son-arrested-for-46m-crypto-theft/</loc>
    <lastmod>2026-03-06</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/06/ai-powered-risk-management-for-msp-cybersecurity-scaling.html</loc>
    <lastmod>2026-03-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/06/ai-powered-risk-management-for-msp-cybersecurity-scaling/</loc>
    <lastmod>2026-03-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/06/cisa-adds-hikvision-and-rockwell-automation-flaws-to-kev-catalog.html</loc>
    <lastmod>2026-03-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/06/cisa-adds-hikvision-and-rockwell-automation-flaws-to-kev-catalog/</loc>
    <lastmod>2026-03-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/06/ghanaian-fraud-ring-member-pleads-guilty-to-100-million-scam.html</loc>
    <lastmod>2026-03-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/06/ghanaian-fraud-ring-member-pleads-guilty-to-100-million-scam/</loc>
    <lastmod>2026-03-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/06/hacktivists-use-ai-to-compromise-mexican-government-agencies.html</loc>
    <lastmod>2026-03-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/06/hacktivists-use-ai-to-compromise-mexican-government-agencies/</loc>
    <lastmod>2026-03-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/06/installfix-attacks-distribute-amatera-infostealer-via-fake-claude-code-install-guides.html</loc>
    <lastmod>2026-03-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/06/installfix-attacks-distribute-amatera-infostealer-via-fake-claude-code-install-guides/</loc>
    <lastmod>2026-03-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/06/microsoft-365-backup-introduces-file-level-restore-for-faster-recovery.html</loc>
    <lastmod>2026-03-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/06/microsoft-365-backup-introduces-file-level-restore-for-faster-recovery/</loc>
    <lastmod>2026-03-07</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/06/north-korean-apts-leverage-ai-to-enhance-it-worker-scams.html</loc>
    <lastmod>2026-03-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/06/north-korean-apts-leverage-ai-to-enhance-it-worker-scams/</loc>
    <lastmod>2026-03-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/06/trizetto-healthcare-data-breach-exposes-34-million-patient-records.html</loc>
    <lastmod>2026-03-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/06/trizetto-healthcare-data-breach-exposes-34-million-patient-records/</loc>
    <lastmod>2026-03-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/07/anthropic-ai-model-discovers-22-firefox-vulnerabilities.html</loc>
    <lastmod>2026-03-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/07/anthropic-ai-model-discovers-22-firefox-vulnerabilities/</loc>
    <lastmod>2026-03-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/07/velvet-tempest-leverages-clickfix-and-castlerat-in-ransomware-operations.html</loc>
    <lastmod>2026-03-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/07/velvet-tempest-leverages-clickfix-and-castlerat-in-ransomware-operations/</loc>
    <lastmod>2026-03-08</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/08/eu-advocate-general-rules-banks-must-immediately-refund-phishing-victims.html</loc>
    <lastmod>2026-03-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/08/eu-advocate-general-rules-banks-must-immediately-refund-phishing-victims/</loc>
    <lastmod>2026-03-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/08/threat-actors-abuse-arpa-dns-and-ipv6-for-phishing-campaigns.html</loc>
    <lastmod>2026-03-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/08/threat-actors-abuse-arpa-dns-and-ipv6-for-phishing-campaigns/</loc>
    <lastmod>2026-03-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/09/ai-assistants-pose-new-security-risks-with-autonomous-actions-and-misconfigurations.html</loc>
    <lastmod>2026-03-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/09/ai-assistants-pose-new-security-risks-with-autonomous-actions-and-misconfigurations/</loc>
    <lastmod>2026-03-09</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/09/ai-security-startups-dominate-2026-cyber-150-awards.html</loc>
    <lastmod>2026-03-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/09/ai-security-startups-dominate-2026-cyber-150-awards/</loc>
    <lastmod>2026-03-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/09/bitdefender-gravityzone-security-platform-for-mid-market-organizations.html</loc>
    <lastmod>2026-03-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/09/bitdefender-gravityzone-security-platform-for-mid-market-organizations/</loc>
    <lastmod>2026-03-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/09/cl-unk-1068-targets-asian-critical-infrastructure-with-web-server-exploits-and-mimikatz.html</loc>
    <lastmod>2026-03-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/09/cl-unk-1068-targets-asian-critical-infrastructure-with-web-server-exploits-and-mimikatz/</loc>
    <lastmod>2026-03-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/09/ericsson-us-data-breach-via-service-provider-compromise.html</loc>
    <lastmod>2026-03-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/09/ericsson-us-data-breach-via-service-provider-compromise/</loc>
    <lastmod>2026-03-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/09/malicious-npm-package-targets-macos-users-with-rat-and-credential-theft.html</loc>
    <lastmod>2026-03-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/09/malicious-npm-package-targets-macos-users-with-rat-and-credential-theft/</loc>
    <lastmod>2026-03-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/09/microsoft-teams-to-tag-third-party-bots-in-meeting-lobbies.html</loc>
    <lastmod>2026-03-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/09/microsoft-teams-to-tag-third-party-bots-in-meeting-lobbies/</loc>
    <lastmod>2026-03-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/09/password-audits-overlook-critical-attacker-targets.html</loc>
    <lastmod>2026-03-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/09/password-audits-overlook-critical-attacker-targets/</loc>
    <lastmod>2026-03-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/09/phishing-attacks-impersonating-us-city-and-county-officials.html</loc>
    <lastmod>2026-03-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/09/phishing-attacks-impersonating-us-city-and-county-officials/</loc>
    <lastmod>2026-03-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/09/threat-actor-uses-elastic-cloud-siem-to-manage-stolen-data-from-multiple-organizations.html</loc>
    <lastmod>2026-03-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/09/threat-actor-uses-elastic-cloud-siem-to-manage-stolen-data-from-multiple-organizations/</loc>
    <lastmod>2026-03-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/09/transparent-tribe-uses-ai-powered-malware-against-indian-entities.html</loc>
    <lastmod>2026-03-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/09/transparent-tribe-uses-ai-powered-malware-against-indian-entities/</loc>
    <lastmod>2026-03-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/09/trump-administration-releases-national-cyber-strategy.html</loc>
    <lastmod>2026-03-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/09/trump-administration-releases-national-cyber-strategy/</loc>
    <lastmod>2026-03-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/09/uk-establishes-online-crime-centre-to-disrupt-cyber-fraud-operations.html</loc>
    <lastmod>2026-03-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/09/uk-establishes-online-crime-centre-to-disrupt-cyber-fraud-operations/</loc>
    <lastmod>2026-03-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/09/unc4899-exploits-airdrop-to-compromise-crypto-firms-cloud-environment.html</loc>
    <lastmod>2026-03-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/09/unc4899-exploits-airdrop-to-compromise-crypto-firms-cloud-environment/</loc>
    <lastmod>2026-03-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/10/a0backdoor-malware-deployed-via-microsoft-teams-phishing-campaign.html</loc>
    <lastmod>2026-03-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/10/a0backdoor-malware-deployed-via-microsoft-teams-phishing-campaign/</loc>
    <lastmod>2026-03-10</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/10/ai-agent-security-risks-and-mitigation-strategies.html</loc>
    <lastmod>2026-03-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/10/ai-agent-security-risks-and-mitigation-strategies/</loc>
    <lastmod>2026-03-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/10/beatbanker-android-malware-targets-users-with-starlink-app-disguise.html</loc>
    <lastmod>2026-03-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/10/beatbanker-android-malware-targets-users-with-starlink-app-disguise/</loc>
    <lastmod>2026-03-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/10/cisa-adds-solarwinds-ivanti-and-workspace-one-vulnerabilities-to-kev-catalog.html</loc>
    <lastmod>2026-03-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/10/cisa-adds-solarwinds-ivanti-and-workspace-one-vulnerabilities-to-kev-catalog/</loc>
    <lastmod>2026-03-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/10/jazz-launches-ai-powered-dlp-solution-with-61m-funding.html</loc>
    <lastmod>2026-03-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/10/jazz-launches-ai-powered-dlp-solution-with-61m-funding/</loc>
    <lastmod>2026-03-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/10/kadnap-botnet-hijacks-asus-routers-for-cybercrime-proxy-network.html</loc>
    <lastmod>2026-03-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/10/kadnap-botnet-hijacks-asus-routers-for-cybercrime-proxy-network/</loc>
    <lastmod>2026-03-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/10/leakylooker-vulnerabilities-in-google-looker-studio.html</loc>
    <lastmod>2026-03-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/10/leakylooker-vulnerabilities-in-google-looker-studio/</loc>
    <lastmod>2026-03-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/10/limited-identity-disaster-recovery-testing-among-organizations.html</loc>
    <lastmod>2026-03-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/10/limited-identity-disaster-recovery-testing-among-organizations/</loc>
    <lastmod>2026-03-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/10/microsoft-introduces-phishing-resistant-passkeys-for-windows-sign-ins.html</loc>
    <lastmod>2026-03-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/10/microsoft-introduces-phishing-resistant-passkeys-for-windows-sign-ins/</loc>
    <lastmod>2026-03-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/10/microsoft-march-2026-patch-tuesday-addresses-2-zero-days-and-79-flaws.html</loc>
    <lastmod>2026-03-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/10/microsoft-march-2026-patch-tuesday-addresses-2-zero-days-and-79-flaws/</loc>
    <lastmod>2026-03-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/10/microsoft-releases-windows-10-kb5078885-extended-security-update.html</loc>
    <lastmod>2026-03-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/10/microsoft-releases-windows-10-kb5078885-extended-security-update/</loc>
    <lastmod>2026-03-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/10/microsoft-to-enable-windows-hotpatch-security-updates-by-default.html</loc>
    <lastmod>2026-03-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/10/microsoft-to-enable-windows-hotpatch-security-updates-by-default/</loc>
    <lastmod>2026-03-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/10/openai-acquires-promptfoo-to-strengthen-ai-agent-security-testing.html</loc>
    <lastmod>2026-03-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/10/openai-acquires-promptfoo-to-strengthen-ai-agent-security-testing/</loc>
    <lastmod>2026-03-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/10/reducing-attack-surface-to-mitigate-zero-day-exploits.html</loc>
    <lastmod>2026-03-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/10/reducing-attack-surface-to-mitigate-zero-day-exploits/</loc>
    <lastmod>2026-03-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/10/zombie-zip-technique-bypasses-security-tools.html</loc>
    <lastmod>2026-03-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/10/zombie-zip-technique-bypasses-security-tools/</loc>
    <lastmod>2026-03-11</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/11/ai-automated-exploitation-accelerates-threat-actor-capabilities.html</loc>
    <lastmod>2026-03-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/11/ai-automated-exploitation-accelerates-threat-actor-capabilities/</loc>
    <lastmod>2026-03-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/11/blacksanta-edr-killer-targets-hr-departments-with-stealthy-malware-campaign.html</loc>
    <lastmod>2026-03-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/11/blacksanta-edr-killer-targets-hr-departments-with-stealthy-malware-campaign/</loc>
    <lastmod>2026-03-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/11/critical-vulnerabilities-patched-in-sap-microsoft-adobe-and-hpe-products.html</loc>
    <lastmod>2026-03-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/11/critical-vulnerabilities-patched-in-sap-microsoft-adobe-and-hpe-products/</loc>
    <lastmod>2026-03-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/11/global-infostealer-campaign-exploits-compromised-wordpress-sites.html</loc>
    <lastmod>2026-03-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/11/global-infostealer-campaign-exploits-compromised-wordpress-sites/</loc>
    <lastmod>2026-03-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/11/infosecurity-europe-2026-keynote-lineup-announced.html</loc>
    <lastmod>2026-03-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/11/infosecurity-europe-2026-keynote-lineup-announced/</loc>
    <lastmod>2026-03-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/11/iranian-hacktivist-group-claims-wiper-attack-on-stryker.html</loc>
    <lastmod>2026-03-29</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/11/iranian-hacktivist-group-claims-wiper-attack-on-stryker/</loc>
    <lastmod>2026-03-29</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/11/malicious-rust-crates-and-ai-bot-target-ci-cd-pipelines-to-steal-secrets.html</loc>
    <lastmod>2026-03-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/11/malicious-rust-crates-and-ai-bot-target-ci-cd-pipelines-to-steal-secrets/</loc>
    <lastmod>2026-03-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/11/meta-disables-150k-accounts-linked-to-southeast-asian-scam-centers.html</loc>
    <lastmod>2026-03-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/11/meta-disables-150k-accounts-linked-to-southeast-asian-scam-centers/</loc>
    <lastmod>2026-03-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/11/ransomware-attacks-decline-in-france-in-2025-anssi-reports.html</loc>
    <lastmod>2026-03-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/11/ransomware-attacks-decline-in-france-in-2025-anssi-reports/</loc>
    <lastmod>2026-03-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/11/security-vulnerabilities-in-llm-guardrails-exploited-via-prompt-injection.html</loc>
    <lastmod>2026-03-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/11/security-vulnerabilities-in-llm-guardrails-exploited-via-prompt-injection/</loc>
    <lastmod>2026-03-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/11/sql-injection-vulnerability-in-elementor-ally-plugin.html</loc>
    <lastmod>2026-03-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/11/sql-injection-vulnerability-in-elementor-ally-plugin/</loc>
    <lastmod>2026-03-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/11/uk-firms-experience-accelerated-cyber-attack-growth-rate.html</loc>
    <lastmod>2026-03-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/11/uk-firms-experience-accelerated-cyber-attack-growth-rate/</loc>
    <lastmod>2026-03-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/11/whatsapp-launches-parent-managed-accounts-for-pre-teens.html</loc>
    <lastmod>2026-03-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/11/whatsapp-launches-parent-managed-accounts-for-pre-teens/</loc>
    <lastmod>2026-03-12</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/12/adversarial-phishing-campaigns-exploit-soc-workloads.html</loc>
    <lastmod>2026-03-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/12/adversarial-phishing-campaigns-exploit-soc-workloads/</loc>
    <lastmod>2026-03-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/12/ailock-ransomware-targets-england-hockey.html</loc>
    <lastmod>2026-03-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/12/ailock-ransomware-targets-england-hockey/</loc>
    <lastmod>2026-03-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/12/googles-2025-vulnerability-reward-program-payouts-reach-record-171-million.html</loc>
    <lastmod>2026-03-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/12/googles-2025-vulnerability-reward-program-payouts-reach-record-171-million/</loc>
    <lastmod>2026-03-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/12/hive0163-deploys-ai-assisted-slopoly-malware-for-persistent-access.html</loc>
    <lastmod>2026-03-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/12/hive0163-deploys-ai-assisted-slopoly-malware-for-persistent-access/</loc>
    <lastmod>2026-03-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/12/loblaw-data-breach-exposes-customer-pii.html</loc>
    <lastmod>2026-03-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/12/loblaw-data-breach-exposes-customer-pii/</loc>
    <lastmod>2026-03-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/12/oauth-consent-abuse-campaign-targets-multiple-organizations.html</loc>
    <lastmod>2026-03-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/12/oauth-consent-abuse-campaign-targets-multiple-organizations/</loc>
    <lastmod>2026-03-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/12/police-scotland-fined-for-unauthorized-disclosure-of-victims-sensitive-data.html</loc>
    <lastmod>2026-03-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/12/police-scotland-fined-for-unauthorized-disclosure-of-victims-sensitive-data/</loc>
    <lastmod>2026-03-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/12/scaling-phishing-detection-in-socs.html</loc>
    <lastmod>2026-03-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/12/scaling-phishing-detection-in-socs/</loc>
    <lastmod>2026-03-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/12/six-android-malware-families-target-pix-banking-apps-and-crypto-wallets.html</loc>
    <lastmod>2026-03-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/12/six-android-malware-families-target-pix-banking-apps-and-crypto-wallets/</loc>
    <lastmod>2026-03-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/12/socksescort-proxy-network-disrupted-by-law-enforcement.html</loc>
    <lastmod>2026-03-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/12/socksescort-proxy-network-disrupted-by-law-enforcement/</loc>
    <lastmod>2026-03-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/12/telus-digital-breach-by-shinyhunters.html</loc>
    <lastmod>2026-03-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/12/telus-digital-breach-by-shinyhunters/</loc>
    <lastmod>2026-03-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/12/underground-trade-in-compromised-travel-rewards.html</loc>
    <lastmod>2026-03-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/12/underground-trade-in-compromised-travel-rewards/</loc>
    <lastmod>2026-03-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/12/venon-malware-targets-33-brazilian-banks-with-credential-stealing-overlays.html</loc>
    <lastmod>2026-03-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/12/venon-malware-targets-33-brazilian-banks-with-credential-stealing-overlays/</loc>
    <lastmod>2026-03-13</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/13/china-linked-apt-targets-southeast-asian-militaries-with-applechris-and-memfun-malware.html</loc>
    <lastmod>2026-03-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/13/china-linked-apt-targets-southeast-asian-militaries-with-applechris-and-memfun-malware/</loc>
    <lastmod>2026-03-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/13/cyberattack-on-polands-national-centre-for-nuclear-research-thwarted.html</loc>
    <lastmod>2026-03-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/13/cyberattack-on-polands-national-centre-for-nuclear-research-thwarted/</loc>
    <lastmod>2026-03-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/13/google-chrome-zero-day-exploits-in-skia-and-v8-engine.html</loc>
    <lastmod>2026-03-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/13/google-chrome-zero-day-exploits-in-skia-and-v8-engine/</loc>
    <lastmod>2026-03-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/13/hypervisor-migration-risks-and-data-protection-challenges.html</loc>
    <lastmod>2026-03-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/13/hypervisor-migration-risks-and-data-protection-challenges/</loc>
    <lastmod>2026-03-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/13/meta-to-discontinue-instagram-end-to-end-encryption-support-by-may-2026.html</loc>
    <lastmod>2026-03-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/13/meta-to-discontinue-instagram-end-to-end-encryption-support-by-may-2026/</loc>
    <lastmod>2026-03-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/13/starbucks-employee-data-breach-via-compromised-partner-central-accounts.html</loc>
    <lastmod>2026-03-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/13/starbucks-employee-data-breach-via-compromised-partner-central-accounts/</loc>
    <lastmod>2026-03-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/13/storm-2561-distributes-fake-enterprise-vpn-clients-to-steal-credentials.html</loc>
    <lastmod>2026-03-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/13/storm-2561-distributes-fake-enterprise-vpn-clients-to-steal-credentials/</loc>
    <lastmod>2026-03-14</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/14/cryptocurrency-stealer-via-appsflyer-web-sdk.html</loc>
    <lastmod>2026-03-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/14/cryptocurrency-stealer-via-appsflyer-web-sdk/</loc>
    <lastmod>2026-03-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/14/microsoft-releases-oob-hotpatch-for-windows-11-rras-rce-vulnerabilities.html</loc>
    <lastmod>2026-03-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/14/microsoft-releases-oob-hotpatch-for-windows-11-rras-rce-vulnerabilities/</loc>
    <lastmod>2026-03-15</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/14/windows-11-access-denied-issue-on-samsung-laptops.html</loc>
    <lastmod>2026-03-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/14/windows-11-access-denied-issue-on-samsung-laptops/</loc>
    <lastmod>2026-03-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/15/betterleaks-advanced-secrets-scanner-released-as-gitleaks-successor.html</loc>
    <lastmod>2026-03-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/15/betterleaks-advanced-secrets-scanner-released-as-gitleaks-successor/</loc>
    <lastmod>2026-03-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/16/agentic-ai-transforming-security-validation.html</loc>
    <lastmod>2026-03-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/16/agentic-ai-transforming-security-validation/</loc>
    <lastmod>2026-03-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/16/android-17-restricts-accessibility-api-to-prevent-malware-abuse.html</loc>
    <lastmod>2026-03-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/16/android-17-restricts-accessibility-api-to-prevent-malware-abuse/</loc>
    <lastmod>2026-03-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/16/companies-house-webfiling-dashboard-vulnerability-exploited-for-fraud.html</loc>
    <lastmod>2026-03-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/16/companies-house-webfiling-dashboard-vulnerability-exploited-for-fraud/</loc>
    <lastmod>2026-03-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/16/dns-exfiltration-in-aws-bedrock-code-interpreter.html</loc>
    <lastmod>2026-03-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/16/dns-exfiltration-in-aws-bedrock-code-interpreter/</loc>
    <lastmod>2026-03-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/16/google-patches-two-actively-exploited-chrome-zero-day-vulnerabilities.html</loc>
    <lastmod>2026-03-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/16/google-patches-two-actively-exploited-chrome-zero-day-vulnerabilities/</loc>
    <lastmod>2026-03-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/16/nudge-security-introduces-ai-governance-and-monitoring-solution.html</loc>
    <lastmod>2026-03-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/16/nudge-security-introduces-ai-governance-and-monitoring-solution/</loc>
    <lastmod>2026-03-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/16/openai-confirms-chatgpt-ads-limited-to-us-despite-global-privacy-policy-updates.html</loc>
    <lastmod>2026-03-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/16/openai-confirms-chatgpt-ads-limited-to-us-despite-global-privacy-policy-updates/</loc>
    <lastmod>2026-03-16</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/16/wing-ftp-server-vulnerability-exploited-in-attacks.html</loc>
    <lastmod>2026-03-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/16/wing-ftp-server-vulnerability-exploited-in-attacks/</loc>
    <lastmod>2026-03-17</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/17/android-os-level-manipulation-enables-bypass-of-mobile-payment-security-controls-via-system-api-abuse.html</loc>
    <lastmod>2026-03-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/17/android-os-level-manipulation-enables-bypass-of-mobile-payment-security-controls-via-system-api-abuse/</loc>
    <lastmod>2026-03-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/17/escalation-of-nation-state-cyber-operations-targeting-uk-enterprises-in-2025.html</loc>
    <lastmod>2026-03-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/17/escalation-of-nation-state-cyber-operations-targeting-uk-enterprises-in-2025/</loc>
    <lastmod>2026-03-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/17/eu-sanctions-chinese-and-iranian-entities-for-state-backed-cyber-operations-and-influence-campaigns.html</loc>
    <lastmod>2026-03-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/17/eu-sanctions-chinese-and-iranian-entities-for-state-backed-cyber-operations-and-influence-campaigns/</loc>
    <lastmod>2026-03-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/17/font-rendering-spoofing-bypasses-ai-assistant-input-validation-via-glyph-substitution.html</loc>
    <lastmod>2026-03-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/17/font-rendering-spoofing-bypasses-ai-assistant-input-validation-via-glyph-substitution/</loc>
    <lastmod>2026-03-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/17/konni-apt-leverages-endrat-and-kakaotalk-for-multi-stage-phishing-and-lateral-propagation.html</loc>
    <lastmod>2026-03-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/17/konni-apt-leverages-endrat-and-kakaotalk-for-multi-stage-phishing-and-lateral-propagation/</loc>
    <lastmod>2026-03-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/17/leaknet-ransomware-expands-operations-with-clickfix-social-engineering-and-deno-based-in-memory-execution.html</loc>
    <lastmod>2026-03-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/17/leaknet-ransomware-expands-operations-with-clickfix-social-engineering-and-deno-based-in-memory-execution/</loc>
    <lastmod>2026-03-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/17/microsoft-teams-meeting-add-in-interference-causes-outlook-classic-client-failures.html</loc>
    <lastmod>2026-03-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/17/microsoft-teams-meeting-add-in-interference-causes-outlook-classic-client-failures/</loc>
    <lastmod>2026-03-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/17/organizational-gaps-in-ai-security-visibility-and-expertise-exposed-by-2026-pentera-study.html</loc>
    <lastmod>2026-03-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/17/organizational-gaps-in-ai-security-visibility-and-expertise-exposed-by-2026-pentera-study/</loc>
    <lastmod>2026-03-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/17/security-guidance-for-autonomous-ai-agents-emphasizes-identity-first-governance.html</loc>
    <lastmod>2026-03-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/17/security-guidance-for-autonomous-ai-agents-emphasizes-identity-first-governance/</loc>
    <lastmod>2026-03-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/17/shifting-ransomware-tactics-toward-built-in-windows-utilities-as-payment-rates-decline.html</loc>
    <lastmod>2026-03-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/17/shifting-ransomware-tactics-toward-built-in-windows-utilities-as-payment-rates-decline/</loc>
    <lastmod>2026-03-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/17/sustained-surge-in-api-targeted-attacks-with-behavior-based-vectors-and-ai-amplification-in-2025.html</loc>
    <lastmod>2026-03-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/17/sustained-surge-in-api-targeted-attacks-with-behavior-based-vectors-and-ai-amplification-in-2025/</loc>
    <lastmod>2026-03-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/17/uk-cyber-monitoring-centre-to-establish-us-presence-in-2027-with-scaled-methodology.html</loc>
    <lastmod>2026-03-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/17/uk-cyber-monitoring-centre-to-establish-us-presence-in-2027-with-scaled-methodology/</loc>
    <lastmod>2026-03-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/17/windows-11-enterprise-hotpatch-kb5084897-resolves-bluetooth-device-visibility-flaw.html</loc>
    <lastmod>2026-03-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/17/windows-11-enterprise-hotpatch-kb5084897-resolves-bluetooth-device-visibility-flaw/</loc>
    <lastmod>2026-03-18</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/18/ai-driven-acceleration-of-exploitation-timelines-reduces-window-between-vulnerability-disclosure-and-active-attacks.html</loc>
    <lastmod>2026-03-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/18/ai-driven-acceleration-of-exploitation-timelines-reduces-window-between-vulnerability-disclosure-and-active-attacks/</loc>
    <lastmod>2026-03-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/18/background-security-improvements-update-issued-to-remediate-cve-2026-20643-webkit-navigation-bypass.html</loc>
    <lastmod>2026-03-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/18/background-security-improvements-update-issued-to-remediate-cve-2026-20643-webkit-navigation-bypass/</loc>
    <lastmod>2026-03-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/18/compromise-of-nordstroms-salesforce-okta-integration-leveraged-for-cryptocurrency-scam-distribution.html</loc>
    <lastmod>2026-03-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/18/compromise-of-nordstroms-salesforce-okta-integration-leveraged-for-cryptocurrency-scam-distribution/</loc>
    <lastmod>2026-03-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/18/connectwise-screenconnect-cryptographic-signature-bypass-leading-to-unauthorized-access-fixed-in-version-261.html</loc>
    <lastmod>2026-03-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/18/connectwise-screenconnect-cryptographic-signature-bypass-leading-to-unauthorized-access-fixed-in-version-261/</loc>
    <lastmod>2026-03-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/18/gartner-forecasts-ai-related-incidents-to-dominate-enterprise-ir-workloads-by-2028.html</loc>
    <lastmod>2026-03-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/18/gartner-forecasts-ai-related-incidents-to-dominate-enterprise-ir-workloads-by-2028/</loc>
    <lastmod>2026-03-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/18/interlock-ransomware-leverages-cisco-fmc-insecure-deserialization-zero-day-cve-2026-20131-for-root-access.html</loc>
    <lastmod>2026-03-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/18/interlock-ransomware-leverages-cisco-fmc-insecure-deserialization-zero-day-cve-2026-20131-for-root-access/</loc>
    <lastmod>2026-03-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/18/magecart-skimmer-leverages-favicon-exif-steganography-in-web-supply-chain-attack-chain.html</loc>
    <lastmod>2026-03-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/18/magecart-skimmer-leverages-favicon-exif-steganography-in-web-supply-chain-attack-chain/</loc>
    <lastmod>2026-03-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/18/mesh-csma-platform-introduces-continuous-attack-path-discovery-and-remediation-for-critical-assets.html</loc>
    <lastmod>2026-03-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/18/mesh-csma-platform-introduces-continuous-attack-path-discovery-and-remediation-for-critical-assets/</loc>
    <lastmod>2026-03-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/18/refund-fraud-operationalized-as-underground-service-economy-targeting-major-retailers-and-payment-platforms.html</loc>
    <lastmod>2026-03-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/18/refund-fraud-operationalized-as-underground-service-economy-targeting-major-retailers-and-payment-platforms/</loc>
    <lastmod>2026-03-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/18/shieldguard-malicious-browser-extension-operation-dismantled-after-data-harvesting-campaign-uncovered.html</loc>
    <lastmod>2026-03-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/18/shieldguard-malicious-browser-extension-operation-dismantled-after-data-harvesting-campaign-uncovered/</loc>
    <lastmod>2026-03-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/18/shift-from-predictive-to-preemptive-security-as-attacker-speed-exceeds-defender-windows.html</loc>
    <lastmod>2026-03-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/18/shift-from-predictive-to-preemptive-security-as-attacker-speed-exceeds-defender-windows/</loc>
    <lastmod>2026-03-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/18/ubuntu-desktop-local-privilege-escalation-via-snap-confine-and-systemd-tmpfiles-interaction.html</loc>
    <lastmod>2026-03-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/18/ubuntu-desktop-local-privilege-escalation-via-snap-confine-and-systemd-tmpfiles-interaction/</loc>
    <lastmod>2026-03-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/18/ubuntu-privilege-escalation-via-snap-confine-and-systemd-tmpfiles-timing-attack.html</loc>
    <lastmod>2026-03-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/18/ubuntu-privilege-escalation-via-snap-confine-and-systemd-tmpfiles-timing-attack/</loc>
    <lastmod>2026-03-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/18/unauthenticated-remote-root-code-execution-vulnerability-in-gnu-inetutils-telnetd-cve-2026-32746.html</loc>
    <lastmod>2026-03-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/18/unauthenticated-remote-root-code-execution-vulnerability-in-gnu-inetutils-telnetd-cve-2026-32746/</loc>
    <lastmod>2026-03-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/18/unauthenticated-root-access-flaws-disclosed-in-multiple-ip-kvm-vendors.html</loc>
    <lastmod>2026-03-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/18/unauthenticated-root-access-flaws-disclosed-in-multiple-ip-kvm-vendors/</loc>
    <lastmod>2026-03-19</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/19/architectural-risks-in-model-context-protocol-mcp-integration-enabling-indirect-prompt-injection-and-tool-poisoning.html</loc>
    <lastmod>2026-03-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/19/architectural-risks-in-model-context-protocol-mcp-integration-enabling-indirect-prompt-injection-and-tool-poisoning/</loc>
    <lastmod>2026-03-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/19/ceros-ai-trust-layer-introduced-to-monitor-and-control-anthropics-claude-code-autonomous-coding-agent.html</loc>
    <lastmod>2026-03-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/19/ceros-ai-trust-layer-introduced-to-monitor-and-control-anthropics-claude-code-autonomous-coding-agent/</loc>
    <lastmod>2026-03-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/19/critical-path-traversal-in-ubiquiti-unifi-network-application-enables-account-takeover.html</loc>
    <lastmod>2026-03-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/19/critical-path-traversal-in-ubiquiti-unifi-network-application-enables-account-takeover/</loc>
    <lastmod>2026-03-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/19/eu-sanctions-extend-to-chinese-and-iranian-firms-for-state-linked-cyber-operations.html</loc>
    <lastmod>2026-03-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/19/eu-sanctions-extend-to-chinese-and-iranian-firms-for-state-linked-cyber-operations/</loc>
    <lastmod>2026-03-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/19/fca-introduces-streamlined-cyber-incident-and-third-party-outage-reporting-regime-for-uk-financial-sector.html</loc>
    <lastmod>2026-03-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/19/fca-introduces-streamlined-cyber-incident-and-third-party-outage-reporting-regime-for-uk-financial-sector/</loc>
    <lastmod>2026-03-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/19/mass-exploitation-of-signed-vulnerable-drivers-by-54-edr-killer-tools-via-byovd-technique.html</loc>
    <lastmod>2026-03-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/19/mass-exploitation-of-signed-vulnerable-drivers-by-54-edr-killer-tools-via-byovd-technique/</loc>
    <lastmod>2026-03-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/19/microsoft-intune-administrative-control-weaknesses-exploited-in-stryker-breach-leading-to-mass-device-wipes.html</loc>
    <lastmod>2026-03-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/19/microsoft-intune-administrative-control-weaknesses-exploited-in-stryker-breach-leading-to-mass-device-wipes/</loc>
    <lastmod>2026-03-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/19/mobile-banking-malware-campaigns-expand-to-1243-financial-brands-across-90-countries.html</loc>
    <lastmod>2026-03-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/19/mobile-banking-malware-campaigns-expand-to-1243-financial-brands-across-90-countries/</loc>
    <lastmod>2026-03-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/19/navia-benefit-solutions-reports-data-exposure-impacting-27-million-individuals.html</loc>
    <lastmod>2026-03-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/19/navia-benefit-solutions-reports-data-exposure-impacting-27-million-individuals/</loc>
    <lastmod>2026-03-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/19/perseus-android-banking-malware-leveraging-accessibility-services-for-real-time-device-takeover-and-note-monitoring.html</loc>
    <lastmod>2026-03-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/19/perseus-android-banking-malware-leveraging-accessibility-services-for-real-time-device-takeover-and-note-monitoring/</loc>
    <lastmod>2026-03-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/19/privilege-escalation-risks-via-weak-password-reset-processes-and-mitigations.html</loc>
    <lastmod>2026-03-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/19/privilege-escalation-risks-via-weak-password-reset-processes-and-mitigations/</loc>
    <lastmod>2026-03-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/19/speagle-malware-leverages-compromised-cobra-docguard-servers-and-infrastructure-to-exfiltrate-sensitive-data.html</loc>
    <lastmod>2026-03-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/19/speagle-malware-leverages-compromised-cobra-docguard-servers-and-infrastructure-to-exfiltrate-sensitive-data/</loc>
    <lastmod>2026-03-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/19/uk-critical-infrastructure-cyber-maturity-increasingly-driven-by-regulatory-compliance.html</loc>
    <lastmod>2026-03-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/19/uk-critical-infrastructure-cyber-maturity-increasingly-driven-by-regulatory-compliance/</loc>
    <lastmod>2026-03-20</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/19/unauthenticated-remote-code-execution-flaw-in-magento-and-adobe-commerce-via-polyshell-polyglot-uploads.html</loc>
    <lastmod>2026-03-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/19/unauthenticated-remote-code-execution-flaw-in-magento-and-adobe-commerce-via-polyshell-polyglot-uploads/</loc>
    <lastmod>2026-03-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/20/android-sideloading-protection-update-introduces-24-hour-delay-for-unverified-developer-installs.html</loc>
    <lastmod>2026-03-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/20/android-sideloading-protection-update-introduces-24-hour-delay-for-unverified-developer-installs/</loc>
    <lastmod>2026-03-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/20/beast-ransomware-group-s-toolset-disclosed-via-misconfigured-server-in-german-cloud.html</loc>
    <lastmod>2026-03-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/20/beast-ransomware-group-s-toolset-disclosed-via-misconfigured-server-in-german-cloud/</loc>
    <lastmod>2026-03-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/20/critical-unauthenticated-rce-vulnerability-in-oracle-identity-manager-and-web-services-manager-patched.html</loc>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/20/critical-unauthenticated-rce-vulnerability-in-oracle-identity-manager-and-web-services-manager-patched/</loc>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/20/former-data-analyst-convicted-for-25m-extortion-of-brightly-software-leveraging-internal-data-access.html</loc>
    <lastmod>2026-03-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/20/former-data-analyst-convicted-for-25m-extortion-of-brightly-software-leveraging-internal-data-access/</loc>
    <lastmod>2026-03-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/20/guilty-plea-in-10m-ai-generated-music-streaming-fraud-scheme.html</loc>
    <lastmod>2026-03-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/20/guilty-plea-in-10m-ai-generated-music-streaming-fraud-scheme/</loc>
    <lastmod>2026-03-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/20/increased-reliance-on-behavioral-analytics-required-amid-ai-enabled-cyber-attack-escalation.html</loc>
    <lastmod>2026-03-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/20/increased-reliance-on-behavioral-analytics-required-amid-ai-enabled-cyber-attack-escalation/</loc>
    <lastmod>2026-03-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/20/iran-linked-destructive-cyber-campaign-tactics-and-mitigation-strategies-against-wiper-attacks.html</loc>
    <lastmod>2026-03-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/20/iran-linked-destructive-cyber-campaign-tactics-and-mitigation-strategies-against-wiper-attacks/</loc>
    <lastmod>2026-03-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/20/langflow-unauthenticated-rce-vulnerability-cve-2026-33017-exploited-within-20-hours-of-disclosure.html</loc>
    <lastmod>2026-03-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/20/langflow-unauthenticated-rce-vulnerability-cve-2026-33017-exploited-within-20-hours-of-disclosure/</loc>
    <lastmod>2026-03-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/20/microsoft-account-sign-in-failures-triggered-by-kb5079473-windows-11-update.html</loc>
    <lastmod>2026-03-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/20/microsoft-account-sign-in-failures-triggered-by-kb5079473-windows-11-update/</loc>
    <lastmod>2026-03-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/20/tag-poisoning-in-trivy-github-actions-repositories-delivers-cloud-native-infostealer-payload.html</loc>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/20/tag-poisoning-in-trivy-github-actions-repositories-delivers-cloud-native-infostealer-payload/</loc>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/20/takedown-of-fraudulent-csam-distribution-scam-platform-alice-with-violence-cp.html</loc>
    <lastmod>2026-03-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/20/takedown-of-fraudulent-csam-distribution-scam-platform-alice-with-violence-cp/</loc>
    <lastmod>2026-03-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/20/uk-teens-targeted-by-radicalization-into-cybercrime-via-toxic-online-ecosystems.html</loc>
    <lastmod>2026-03-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/20/uk-teens-targeted-by-radicalization-into-cybercrime-via-toxic-online-ecosystems/</loc>
    <lastmod>2026-03-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/20/unauthenticated-remote-code-execution-and-account-takeover-via-magento-polyshell-file-upload-flaw.html</loc>
    <lastmod>2026-03-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/20/unauthenticated-remote-code-execution-and-account-takeover-via-magento-polyshell-file-upload-flaw/</loc>
    <lastmod>2026-03-21</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/21/abuse-of-microsoft-azure-monitor-alerting-system-in-callback-phishing-campaigns.html</loc>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/21/abuse-of-microsoft-azure-monitor-alerting-system-in-callback-phishing-campaigns/</loc>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/21/android-advanced-flow-mechanism-introduced-for-secure-apk-sideloading-of-unverified-applications.html</loc>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/21/android-advanced-flow-mechanism-introduced-for-secure-apk-sideloading-of-unverified-applications/</loc>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/21/cisa-adds-apple-webkit-kernel-craft-cms-and-laravel-livewire-flaws-to-kev-catalog.html</loc>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/21/cisa-adds-apple-webkit-kernel-craft-cms-and-laravel-livewire-flaws-to-kev-catalog/</loc>
    <lastmod>2026-03-22</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/21/self-propagating-canisterworm-leverages-icp-canisters-and-npm-packages-for-decentralized-supply-chain-compromise.html</loc>
    <lastmod>2026-03-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/21/self-propagating-canisterworm-leverages-icp-canisters-and-npm-packages-for-decentralized-supply-chain-compromise/</loc>
    <lastmod>2026-03-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/22/voidstealer-infostealer-implements-hardware-breakpoint-technique-to-extract-chrome-v20-master-key.html</loc>
    <lastmod>2026-03-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/22/voidstealer-infostealer-implements-hardware-breakpoint-technique-to-extract-chrome-v20-master-key/</loc>
    <lastmod>2026-03-23</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/23/acceleration-of-initial-access-handoff-to-secondary-threat-groups-observed-in-2025-incidents.html</loc>
    <lastmod>2026-03-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/23/acceleration-of-initial-access-handoff-to-secondary-threat-groups-observed-in-2025-incidents/</loc>
    <lastmod>2026-03-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/23/authentication-bypass-in-quest-kace-sma-exploited-in-the-wild-to-achieve-full-system-compromise.html</loc>
    <lastmod>2026-03-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/23/authentication-bypass-in-quest-kace-sma-exploited-in-the-wild-to-achieve-full-system-compromise/</loc>
    <lastmod>2026-03-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/23/crunchyroll-support-agent-account-compromise-leads-to-68-million-user-data-exposure.html</loc>
    <lastmod>2026-03-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/23/crunchyroll-support-agent-account-compromise-leads-to-68-million-user-data-exposure/</loc>
    <lastmod>2026-03-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/23/eight-aws-bedrock-attack-vectors-enabling-privilege-escalation-data-exfiltration-and-lateral-movement-across-cloud-and-on-premises-systems.html</loc>
    <lastmod>2026-03-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/23/eight-aws-bedrock-attack-vectors-enabling-privilege-escalation-data-exfiltration-and-lateral-movement-across-cloud-and-on-premises-systems/</loc>
    <lastmod>2026-03-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/23/high-tech-sector-identified-as-top-cyber-attack-target-for-2025-replacing-finance.html</loc>
    <lastmod>2026-03-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/23/high-tech-sector-identified-as-top-cyber-attack-target-for-2025-replacing-finance/</loc>
    <lastmod>2026-03-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/23/irs-themed-phishing-campaigns-deploy-rmm-malware-via-tax-lures.html</loc>
    <lastmod>2026-03-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/23/irs-themed-phishing-campaigns-deploy-rmm-malware-via-tax-lures/</loc>
    <lastmod>2026-03-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/23/microsoft-exchange-online-virtual-account-deployment-disrupts-mobile-and-mac-client-access.html</loc>
    <lastmod>2026-03-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/23/microsoft-exchange-online-virtual-account-deployment-disrupts-mobile-and-mac-client-access/</loc>
    <lastmod>2026-03-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/23/organizational-uncertainty-in-incident-response-timelines-for-ai-system-compromises.html</loc>
    <lastmod>2026-03-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/23/organizational-uncertainty-in-incident-response-timelines-for-ai-system-compromises/</loc>
    <lastmod>2026-03-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/23/supply-chain-compromise-in-trivy-scanner-triggers-canisterworm-propagation-across-ci-cd-pipelines.html</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/23/supply-chain-compromise-in-trivy-scanner-triggers-canisterworm-propagation-across-ci-cd-pipelines/</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/23/varonis-atlas-ai-security-platform-reaches-general-availability-with-unified-ai-lifecycle-controls.html</loc>
    <lastmod>2026-03-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/23/varonis-atlas-ai-security-platform-reaches-general-availability-with-unified-ai-lifecycle-controls/</loc>
    <lastmod>2026-03-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/24/authentication-and-device-posture-integration-gaps-in-zero-trust-implementations-exposed.html</loc>
    <lastmod>2026-03-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/24/authentication-and-device-posture-integration-gaps-in-zero-trust-implementations-exposed/</loc>
    <lastmod>2026-03-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/24/chatgpt-library-feature-enables-automated-cloud-storage-of-user-uploaded-files.html</loc>
    <lastmod>2026-03-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/24/chatgpt-library-feature-enables-automated-cloud-storage-of-user-uploaded-files/</loc>
    <lastmod>2026-03-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/24/fcc-covered-list-expansion-bans-foreign-made-consumer-routers-in-us-market.html</loc>
    <lastmod>2026-03-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/24/fcc-covered-list-expansion-bans-foreign-made-consumer-routers-in-us-market/</loc>
    <lastmod>2026-03-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/24/firefox-149-integrates-free-browser-level-vpn-with-50gb-monthly-allowance-for-authenticated-users.html</loc>
    <lastmod>2026-03-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/24/firefox-149-integrates-free-browser-level-vpn-with-50gb-monthly-allowance-for-authenticated-users/</loc>
    <lastmod>2026-03-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/24/gartner-market-guide-introduces-guardian-agents-to-supervise-autonomous-ai-agents-amid-rising-enterprise-adoption-and-identity-risks.html</loc>
    <lastmod>2026-03-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/24/gartner-market-guide-introduces-guardian-agents-to-supervise-autonomous-ai-agents-amid-rising-enterprise-adoption-and-identity-risks/</loc>
    <lastmod>2026-03-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/24/governance-gaps-exposed-in-autonomous-ai-agent-platforms-through-openclaw-incidents.html</loc>
    <lastmod>2026-03-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/24/governance-gaps-exposed-in-autonomous-ai-agent-platforms-through-openclaw-incidents/</loc>
    <lastmod>2026-03-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/24/keynote-at-infosecurity-europe-2026-to-feature-former-ukrainian-foreign-minister-on-russias-cyber-warfare-integration-with-kinetic-operations.html</loc>
    <lastmod>2026-03-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/24/keynote-at-infosecurity-europe-2026-to-feature-former-ukrainian-foreign-minister-on-russias-cyber-warfare-integration-with-kinetic-operations/</loc>
    <lastmod>2026-03-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/24/mazda-reports-unauthorized-access-to-thailand-warehouse-management-system-resulting-in-limited-employee-and-partner-data-exposure.html</loc>
    <lastmod>2026-03-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/24/mazda-reports-unauthorized-access-to-thailand-warehouse-management-system-resulting-in-limited-employee-and-partner-data-exposure/</loc>
    <lastmod>2026-03-24</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/24/microsoft-introduces-identity-management-and-guardrails-for-ai-agents-via-entra-id-and-azure-ai-foundry.html</loc>
    <lastmod>2026-03-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/24/microsoft-introduces-identity-management-and-guardrails-for-ai-agents-via-entra-id-and-azure-ai-foundry/</loc>
    <lastmod>2026-03-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/24/ncsc-urges-immediate-implementation-of-vibe-coding-security-safeguards-in-ai-code-generation-tools.html</loc>
    <lastmod>2026-03-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/24/ncsc-urges-immediate-implementation-of-vibe-coding-security-safeguards-in-ai-code-generation-tools/</loc>
    <lastmod>2026-03-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/24/ongoing-ghost-cluster-targets-npm-and-github-in-multi-stage-credential-and-crypto-wallet-theft-campaign.html</loc>
    <lastmod>2026-03-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/24/ongoing-ghost-cluster-targets-npm-and-github-in-multi-stage-credential-and-crypto-wallet-theft-campaign/</loc>
    <lastmod>2026-03-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/24/organizational-cybersecurity-drift-linked-to-loss-of-foundational-risk-and-system-understanding-amid-specialization.html</loc>
    <lastmod>2026-03-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/24/organizational-cybersecurity-drift-linked-to-loss-of-foundational-risk-and-system-understanding-amid-specialization/</loc>
    <lastmod>2026-03-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/24/silver-fox-apt-adapts-tooling-from-valleyrat-to-python-credential-stealer-in-dual-purpose-campaigns.html</loc>
    <lastmod>2026-03-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/24/silver-fox-apt-adapts-tooling-from-valleyrat-to-python-credential-stealer-in-dual-purpose-campaigns/</loc>
    <lastmod>2026-03-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/24/unauthorized-access-detected-in-dutch-ministry-of-finance-policy-department-systems.html</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/24/unauthorized-access-detected-in-dutch-ministry-of-finance-policy-department-systems/</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/24/widespread-operational-failure-in-enterprise-endpoint-security-tools-exposes-devices-to-prolonged-exploitation-windows.html</loc>
    <lastmod>2026-03-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/24/widespread-operational-failure-in-enterprise-endpoint-security-tools-exposes-devices-to-prolonged-exploitation-windows/</loc>
    <lastmod>2026-03-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/25/abuse-of-bubble-ai-app-builder-infrastructure-in-credential-phishing-campaigns-targeting-microsoft-accounts.html</loc>
    <lastmod>2026-03-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/25/abuse-of-bubble-ai-app-builder-infrastructure-in-credential-phishing-campaigns-targeting-microsoft-accounts/</loc>
    <lastmod>2026-03-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/25/cloud-based-android-devices-leveraged-as-dropper-accounts-for-financial-fraud.html</loc>
    <lastmod>2026-03-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/25/cloud-based-android-devices-leveraged-as-dropper-accounts-for-financial-fraud/</loc>
    <lastmod>2026-03-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/25/critical-authentication-bypass-and-command-injection-vulnerabilities-patched-in-tp-link-archer-nx-series-routers.html</loc>
    <lastmod>2026-03-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/25/critical-authentication-bypass-and-command-injection-vulnerabilities-patched-in-tp-link-archer-nx-series-routers/</loc>
    <lastmod>2026-03-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/25/critical-unauthenticated-rce-vulnerability-in-ptc-windchill-and-flexplm-disclosed-with-imminent-exploitation-risk.html</loc>
    <lastmod>2026-03-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/25/critical-unauthenticated-rce-vulnerability-in-ptc-windchill-and-flexplm-disclosed-with-imminent-exploitation-risk/</loc>
    <lastmod>2026-03-25</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/25/emergence-of-ai-powered-attack-and-defense-techniques-reshaping-cyber-threat-landscape-in-2026.html</loc>
    <lastmod>2026-03-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/25/emergence-of-ai-powered-attack-and-defense-techniques-reshaping-cyber-threat-landscape-in-2026/</loc>
    <lastmod>2026-03-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/25/escalating-threat-landscape-driven-by-ai-augmented-identity-compromise-and-geopolitically-motivated-attacks.html</loc>
    <lastmod>2026-03-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/25/escalating-threat-landscape-driven-by-ai-augmented-identity-compromise-and-geopolitically-motivated-attacks/</loc>
    <lastmod>2026-03-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/25/industrial-scale-exploitation-of-enterprise-identities-drives-shift-to-identity-based-attacks.html</loc>
    <lastmod>2026-03-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/25/industrial-scale-exploitation-of-enterprise-identities-drives-shift-to-identity-based-attacks/</loc>
    <lastmod>2026-03-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/25/kali-linux-20261-distribution-update-introduces-eight-new-tools-theme-refresh-and-backtrack-mode.html</loc>
    <lastmod>2026-03-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/25/kali-linux-20261-distribution-update-introduces-eight-new-tools-theme-refresh-and-backtrack-mode/</loc>
    <lastmod>2026-03-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/25/malicious-chrome-browser-extensions-exfiltrate-ai-prompts-via-api-interception-and-dom-scraping-in-prompt-poaching-campaigns.html</loc>
    <lastmod>2026-03-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/25/malicious-chrome-browser-extensions-exfiltrate-ai-prompts-via-api-interception-and-dom-scraping-in-prompt-poaching-campaigns/</loc>
    <lastmod>2026-03-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/25/mario-kart-botnet-operator-sentenced-for-facilitating-ransomware-attacks-via-phishing-campaigns.html</loc>
    <lastmod>2026-03-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/25/mario-kart-botnet-operator-sentenced-for-facilitating-ransomware-attacks-via-phishing-campaigns/</loc>
    <lastmod>2026-03-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/25/nationwide-uk-fraud-disruption-operation-leads-to-557-arrests-and-271m-in-seizures.html</loc>
    <lastmod>2026-03-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/25/nationwide-uk-fraud-disruption-operation-leads-to-557-arrests-and-271m-in-seizures/</loc>
    <lastmod>2026-03-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/25/sentencing-of-ta551-botnet-operator-for-ransomware-access-facilitation.html</loc>
    <lastmod>2026-03-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/25/sentencing-of-ta551-botnet-operator-for-ransomware-access-facilitation/</loc>
    <lastmod>2026-03-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/25/torg-grabber-infostealer-expands-to-850-browser-extensions-including-728-crypto-wallets.html</loc>
    <lastmod>2026-03-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/25/torg-grabber-infostealer-expands-to-850-browser-extensions-including-728-crypto-wallets/</loc>
    <lastmod>2026-03-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/25/underground-commercialization-of-premium-ai-platform-access-observed-in-fraud-communities.html</loc>
    <lastmod>2026-03-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/25/underground-commercialization-of-premium-ai-platform-access-observed-in-fraud-communities/</loc>
    <lastmod>2026-03-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/25/us-cyber-strategy-red-line-criteria-for-offensive-cyber-in-military-context-discussed-by-former-nsa-directors.html</loc>
    <lastmod>2026-03-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/25/us-cyber-strategy-red-line-criteria-for-offensive-cyber-in-military-context-discussed-by-former-nsa-directors/</loc>
    <lastmod>2026-03-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/25/widespread-oauth-device-code-phishing-campaign-targets-microsoft-365-via-eviltokens-phaas.html</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/25/widespread-oauth-device-code-phishing-campaign-targets-microsoft-365-via-eviltokens-phaas/</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/26/ajax-amsterdam-systems-breach-enables-ticket-manipulation-and-limited-fan-data-exposure.html</loc>
    <lastmod>2026-03-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/26/ajax-amsterdam-systems-breach-enables-ticket-manipulation-and-limited-fan-data-exposure/</loc>
    <lastmod>2026-03-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/26/bpfdoor-linux-kernel-implants-leveraged-by-red-menshen-for-stealthy-telecom-espionage.html</loc>
    <lastmod>2026-03-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/26/bpfdoor-linux-kernel-implants-leveraged-by-red-menshen-for-stealthy-telecom-espionage/</loc>
    <lastmod>2026-03-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/26/decline-in-physically-impactful-ot-cyberattacks-observed-in-2025.html</loc>
    <lastmod>2026-03-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/26/decline-in-physically-impactful-ot-cyberattacks-observed-in-2025/</loc>
    <lastmod>2026-03-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/26/escalation-of-ai-enabled-threats-driving-new-defense-priorities-amid-criminal-adoption.html</loc>
    <lastmod>2026-03-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/26/escalation-of-ai-enabled-threats-driving-new-defense-priorities-amid-criminal-adoption/</loc>
    <lastmod>2026-03-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/26/etherrat-malware-leverages-ethereum-smart-contracts-for-c2-evasion-and-cryptocurrency-theft.html</loc>
    <lastmod>2026-03-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/26/etherrat-malware-leverages-ethereum-smart-contracts-for-c2-evasion-and-cryptocurrency-theft/</loc>
    <lastmod>2026-03-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/26/frontier-ai-dependency-recommendations-found-to-generate-flawed-upgrade-and-patch-guidance.html</loc>
    <lastmod>2026-03-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/26/frontier-ai-dependency-recommendations-found-to-generate-flawed-upgrade-and-patch-guidance/</loc>
    <lastmod>2026-03-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/26/github-integrates-ai-driven-vulnerability-detection-into-code-security-tooling-for-expanded-language-and-framework-coverage.html</loc>
    <lastmod>2026-03-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/26/github-integrates-ai-driven-vulnerability-detection-into-code-security-tooling-for-expanded-language-and-framework-coverage/</loc>
    <lastmod>2026-03-26</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/26/multi-stage-fraud-campaigns-leveraging-automation-proxies-and-credential-stuffing-bypass-single-signal-defenses.html</loc>
    <lastmod>2026-03-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/26/multi-stage-fraud-campaigns-leveraging-automation-proxies-and-credential-stuffing-bypass-single-signal-defenses/</loc>
    <lastmod>2026-03-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/26/observed-immediate-exploitation-of-oracle-weblogic-cve-2026-21962-via-automated-campaigns.html</loc>
    <lastmod>2026-03-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/26/observed-immediate-exploitation-of-oracle-weblogic-cve-2026-21962-via-automated-campaigns/</loc>
    <lastmod>2026-03-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/26/openais-safety-bug-bounty-program-expands-ai-abuse-and-integrity-risk-coverage.html</loc>
    <lastmod>2026-03-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/26/openais-safety-bug-bounty-program-expands-ai-abuse-and-integrity-risk-coverage/</loc>
    <lastmod>2026-03-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/26/practical-validation-framework-for-security-controls-and-detection-efficacy-webinar-announced.html</loc>
    <lastmod>2026-03-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/26/practical-validation-framework-for-security-controls-and-detection-efficacy-webinar-announced/</loc>
    <lastmod>2026-03-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/26/redline-infostealer-operational-administrator-extradited-to-face-us-charges.html</loc>
    <lastmod>2026-03-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/26/redline-infostealer-operational-administrator-extradited-to-face-us-charges/</loc>
    <lastmod>2026-03-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/26/seizure-of-major-cybercrime-forum-leakbase-and-arrest-of-suspected-owner.html</loc>
    <lastmod>2026-03-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/26/seizure-of-major-cybercrime-forum-leakbase-and-arrest-of-suspected-owner/</loc>
    <lastmod>2026-03-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/26/surge-in-cve-classified-vulnerabilities-linked-to-ai-generated-code-in-production-environments.html</loc>
    <lastmod>2026-03-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/26/surge-in-cve-classified-vulnerabilities-linked-to-ai-generated-code-in-production-environments/</loc>
    <lastmod>2026-03-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/26/tiktok-for-business-credential-harvesting-via-cloudflare-hosted-phishing-reverse-proxy.html</loc>
    <lastmod>2026-03-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/26/tiktok-for-business-credential-harvesting-via-cloudflare-hosted-phishing-reverse-proxy/</loc>
    <lastmod>2026-03-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/26/whatsapp-expands-ai-features-multi-account-support-and-anti-scam-protections-in-latest-update.html</loc>
    <lastmod>2026-03-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/26/whatsapp-expands-ai-features-multi-account-support-and-anti-scam-protections-in-latest-update/</loc>
    <lastmod>2026-03-27</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/27/animeplay-streaming-piracy-operation-disrupted-with-takedown-of-5-million-user-platform.html</loc>
    <lastmod>2026-03-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/27/animeplay-streaming-piracy-operation-disrupted-with-takedown-of-5-million-user-platform/</loc>
    <lastmod>2026-03-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/27/bypass-of-open-vsx-pre-publish-scanning-via-boolean-return-value-flaw.html</loc>
    <lastmod>2026-03-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/27/bypass-of-open-vsx-pre-publish-scanning-via-boolean-return-value-flaw/</loc>
    <lastmod>2026-03-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/27/dutch-national-police-phishing-incident-leads-to-limited-breach-with-ongoing-investigation.html</loc>
    <lastmod>2026-03-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/27/dutch-national-police-phishing-incident-leads-to-limited-breach-with-ongoing-investigation/</loc>
    <lastmod>2026-03-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/27/enterprise-grc-teams-face-operational-identity-crisis-as-agentic-ai-replaces-workflows.html</loc>
    <lastmod>2026-03-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/27/enterprise-grc-teams-face-operational-identity-crisis-as-agentic-ai-replaces-workflows/</loc>
    <lastmod>2026-03-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/27/evolving-global-cyber-conflict-landscape-reshaping-critical-infrastructure-and-extortion-threats.html</loc>
    <lastmod>2026-03-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/27/evolving-global-cyber-conflict-landscape-reshaping-critical-infrastructure-and-extortion-threats/</loc>
    <lastmod>2026-03-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/27/windows-11-kb5079391-preview-update-introduces-smart-app-control-toggling-and-display-reliability-enhancements.html</loc>
    <lastmod>2026-03-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/27/windows-11-kb5079391-preview-update-introduces-smart-app-control-toggling-and-display-reliability-enhancements/</loc>
    <lastmod>2026-03-28</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/28/infinity-stealer-macos-infostealer-delivered-via-clickfix-captcha-lures.html</loc>
    <lastmod>2026-03-29</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/28/infinity-stealer-macos-infostealer-delivered-via-clickfix-captcha-lures/</loc>
    <lastmod>2026-03-29</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/29/arbitrary-file-read-vulnerability-in-smart-slider-3-plugin-exposes-wordpress-sites-to-credential-theft.html</loc>
    <lastmod>2026-03-30</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/29/arbitrary-file-read-vulnerability-in-smart-slider-3-plugin-exposes-wordpress-sites-to-credential-theft/</loc>
    <lastmod>2026-03-30</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/30/active-exploitation-of-citrix-netscaler-adc-gateway-memory-disclosure-vulnerability-cve-2026-3055.html</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/30/active-exploitation-of-citrix-netscaler-adc-gateway-memory-disclosure-vulnerability-cve-2026-3055/</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/30/active-exploitation-of-f5-big-ip-rce-vulnerability-cve-2025-53521.html</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/30/active-exploitation-of-f5-big-ip-rce-vulnerability-cve-2025-53521/</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/30/china-aligned-clusters-conduct-coordinated-southeast-asian-government-intrusion-campaign-with-multi-stage-malware-toolkits.html</loc>
    <lastmod>2026-03-31</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/30/china-aligned-clusters-conduct-coordinated-southeast-asian-government-intrusion-campaign-with-multi-stage-malware-toolkits/</loc>
    <lastmod>2026-03-31</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/30/deepload-malware-campaign-leverages-ai-generated-obfuscation-and-clickfix-for-persistent-credential-theft.html</loc>
    <lastmod>2026-03-31</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/30/deepload-malware-campaign-leverages-ai-generated-obfuscation-and-clickfix-for-persistent-credential-theft/</loc>
    <lastmod>2026-03-31</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/30/gartners-structured-evaluation-framework-for-ai-soc-agent-deployments-released-amid-rising-adoption.html</loc>
    <lastmod>2026-03-31</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/30/gartners-structured-evaluation-framework-for-ai-soc-agent-deployments-released-amid-rising-adoption/</loc>
    <lastmod>2026-03-31</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/30/roadk1ll-websocket-implant-observed-pivoting-within-breached-networks-via-outbound-only-tunneling.html</loc>
    <lastmod>2026-03-31</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/30/roadk1ll-websocket-implant-observed-pivoting-within-breached-networks-via-outbound-only-tunneling/</loc>
    <lastmod>2026-03-31</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/30/tax-season-phishing-campaigns-escalate-with-rmm-tools-and-multi-vector-social-engineering.html</loc>
    <lastmod>2026-03-31</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/30/tax-season-phishing-campaigns-escalate-with-rmm-tools-and-multi-vector-social-engineering/</loc>
    <lastmod>2026-03-31</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/30/transient-data-exposure-flaw-in-lloyds-mobile-banking-update.html</loc>
    <lastmod>2026-03-31</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/30/transient-data-exposure-flaw-in-lloyds-mobile-banking-update/</loc>
    <lastmod>2026-03-31</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/30/uk-alarm-provider-fined-100000-for-unlawful-nuisance-calls-to-tps-registrants.html</loc>
    <lastmod>2026-03-31</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/30/uk-alarm-provider-fined-100000-for-unlawful-nuisance-calls-to-tps-registrants/</loc>
    <lastmod>2026-03-31</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/30/windows-11-preview-update-kb5079391-installation-failures-prompt-rollback.html</loc>
    <lastmod>2026-03-31</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/30/windows-11-preview-update-kb5079391-installation-failures-prompt-rollback/</loc>
    <lastmod>2026-03-31</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/31/ai-proliferation-and-quantum-readiness-disrupting-digital-trust-and-cryptographic-validation.html</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/31/ai-proliferation-and-quantum-readiness-disrupting-digital-trust-and-cryptographic-validation/</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/31/commercial-stealer-as-a-service-campaign-delivers-phantom-stealer-across-european-enterprises-via-phishing.html</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/31/commercial-stealer-as-a-service-campaign-delivers-phantom-stealer-across-european-enterprises-via-phishing/</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/31/emerging-enterprise-ai-agent-categories-and-security-governance-priorities.html</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/31/emerging-enterprise-ai-agent-categories-and-security-governance-priorities/</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/31/erosion-of-organizational-data-integrity-amid-ai-driven-decision-dependence.html</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/31/erosion-of-organizational-data-integrity-amid-ai-driven-decision-dependence/</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/31/escalating-exposure-gap-in-mid-market-vulnerability-management-amid-cve-volume-surge-and-rapid-exploitation-timelines.html</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/31/escalating-exposure-gap-in-mid-market-vulnerability-management-amid-cve-volume-surge-and-rapid-exploitation-timelines/</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/31/exploiter-charged-for-533m-uranium-finance-smart-contract-heist-via-code-flaws-and-mixer-laundering.html</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/31/exploiter-charged-for-533m-uranium-finance-smart-contract-heist-via-code-flaws-and-mixer-laundering/</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/31/iran-linked-pay2key-operation-resurfaces-with-pseudo-ransomware-tactics-and-expanded-affiliate-network.html</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/31/iran-linked-pay2key-operation-resurfaces-with-pseudo-ransomware-tactics-and-expanded-affiliate-network/</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/31/lloyds-mobile-banking-software-flaw-exposes-transaction-data-to-concurrent-users.html</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/31/lloyds-mobile-banking-software-flaw-exposes-transaction-data-to-concurrent-users/</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/31/patient-data-exposure-at-carecloud-health-following-march-2026-intrusion.html</loc>
    <lastmod>2026-03-31</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/31/patient-data-exposure-at-carecloud-health-following-march-2026-intrusion/</loc>
    <lastmod>2026-03-31</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/31/stealthy-data-exfiltration-vulnerability-in-chatgpt-via-malicious-prompt-and-dns-side-channel.html</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/31/stealthy-data-exfiltration-vulnerability-in-chatgpt-via-malicious-prompt-and-dns-side-channel/</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/31/uk-employee-data-breach-notifications-reach-seven-year-high-amid-hybrid-work-risks.html</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/31/uk-employee-data-breach-notifications-reach-seven-year-high-amid-hybrid-work-risks/</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/31/venom-stealer-infostealer-kit-introduces-continuous-credential-harvesting-via-malware-as-a-service-model.html</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/03/31/venom-stealer-infostealer-kit-introduces-continuous-credential-harvesting-via-malware-as-a-service-model/</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/01/accidental-disclosure-of-anthropics-claude-code-closed-source-implementation-via-npm-package.html</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/01/accidental-disclosure-of-anthropics-claude-code-closed-source-implementation-via-npm-package/</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/01/agewheeze-rat-deployment-via-cert-ua-impersonation-campaign-targeting-ukrainian-entities.html</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/01/agewheeze-rat-deployment-via-cert-ua-impersonation-campaign-targeting-ukrainian-entities/</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/01/arbitrary-file-write-vulnerability-in-gigabyte-control-center-enables-remote-code-execution.html</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/01/arbitrary-file-write-vulnerability-in-gigabyte-control-center-enables-remote-code-execution/</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/01/casbaneiro-banking-trojan-distribution-via-dynamic-pdf-lures-and-horabot-propagation.html</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/01/casbaneiro-banking-trojan-distribution-via-dynamic-pdf-lures-and-horabot-propagation/</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/01/fbi-advisory-flags-privacy-and-data-access-risks-in-chinese-developed-mobile-applications.html</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/01/fbi-advisory-flags-privacy-and-data-access-risks-in-chinese-developed-mobile-applications/</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/01/fourth-actively-exploited-chrome-zero-day-cve-2026-5281-in-dawn-webgpu-implementation-patched-by-google.html</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/01/fourth-actively-exploited-chrome-zero-day-cve-2026-5281-in-dawn-webgpu-implementation-patched-by-google/</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/01/google-account-email-address-modification-feature-rolled-out-in-the-us.html</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/01/google-account-email-address-modification-feature-rolled-out-in-the-us/</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/01/increased-exploitation-of-legitimate-remote-access-pathways-and-trusted-tools-in-2025-intrusions-according-to-blackpoint-cyber-threat-analysis.html</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/01/increased-exploitation-of-legitimate-remote-access-pathways-and-trusted-tools-in-2025-intrusions-according-to-blackpoint-cyber-threat-analysis/</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/01/living-off-the-land-lotl-abuse-of-native-utilities-escalates-as-primary-intrusion-tactic-in-enterprise-environments.html</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/01/living-off-the-land-lotl-abuse-of-native-utilities-escalates-as-primary-intrusion-tactic-in-enterprise-environments/</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/01/modeline-based-rce-vulnerabilities-in-vim-and-gnu-emacs-uncovered-via-ai-assisted-analysis.html</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/01/modeline-based-rce-vulnerabilities-in-vim-and-gnu-emacs-uncovered-via-ai-assisted-analysis/</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/01/proton-meet-launches-as-privacy-focused-end-to-end-encrypted-video-conferencing-platform-with-eu-alignment.html</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/01/proton-meet-launches-as-privacy-focused-end-to-end-encrypted-video-conferencing-platform-with-eu-alignment/</loc>
    <lastmod>2026-04-01</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/01/shift-from-device-centric-controls-to-session-level-governance-in-enterprise-ai-and-web-use.html</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/01/shift-from-device-centric-controls-to-session-level-governance-in-enterprise-ai-and-web-use/</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/01/supply-chain-compromise-of-axios-npm-package-delivers-cross-platform-rats-via-malicious-dependency.html</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/01/supply-chain-compromise-of-axios-npm-package-delivers-cross-platform-rats-via-malicious-dependency/</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/01/undervalued-and-informally-trained-cybersecurity-talent-in-latin-america-drives-regional-hiring-challenges-amid-surge-in-attacks.html</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/01/undervalued-and-informally-trained-cybersecurity-talent-in-latin-america-drives-regional-hiring-challenges-amid-surge-in-attacks/</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/01/whatsapp-delivered-vbs-malware-abuses-uac-bypass-for-persistent-windows-compromise-via-cloud-hosted-msi-payloads.html</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/01/whatsapp-delivered-vbs-malware-abuses-uac-bypass-for-persistent-windows-compromise-via-cloud-hosted-msi-payloads/</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/01/widespread-cyber-incidents-disrupt-78-of-uk-manufacturing-sector-in-2025.html</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/01/widespread-cyber-incidents-disrupt-78-of-uk-manufacturing-sector-in-2025/</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/01/widespread-novoice-android-rootkit-campaign-with-23m-downloads-abuses-steganography-and-patchable-flaws.html</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/01/widespread-novoice-android-rootkit-campaign-with-23m-downloads-abuses-steganography-and-patchable-flaws/</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/02/authentication-bypass-and-pre-auth-rce-chain-in-progress-sharefile-storage-zones-controller-cve-2026-2699-cve-2026-2701.html</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/02/authentication-bypass-and-pre-auth-rce-chain-in-progress-sharefile-storage-zones-controller-cve-2026-2699-cve-2026-2701/</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/02/crystalrat-malware-as-a-service-expands-with-multi-functional-capabilities.html</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/02/crystalrat-malware-as-a-service-expands-with-multi-functional-capabilities/</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/02/drift-protocol-administrative-takeover-and-285-million-loss-via-security-council-manipulation-on-solana.html</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/02/drift-protocol-administrative-takeover-and-285-million-loss-via-security-council-manipulation-on-solana/</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/02/hybrid-fraud-workflows-leverage-vacant-residential-properties-and-postal-redirection-services-to-intercept-sensitive-mail.html</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/02/hybrid-fraud-workflows-leverage-vacant-residential-properties-and-postal-redirection-services-to-intercept-sensitive-mail/</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/02/lnk-based-multi-stage-malware-leveraging-github-for-c2-and-data-exfiltration-detected-in-south-korea.html</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/02/lnk-based-multi-stage-malware-leveraging-github-for-c2-and-data-exfiltration-detected-in-south-korea/</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/02/residential-proxy-networks-evade-detection-in-78-of-malicious-sessions-due-to-short-lived-ip-rotation.html</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/02/residential-proxy-networks-evade-detection-in-78-of-malicious-sessions-due-to-short-lived-ip-rotation/</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/02/storm-infostealer-enables-server-side-credential-decryption-with-automated-session-hijacking.html</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/02/storm-infostealer-enables-server-side-credential-decryption-with-automated-session-hijacking/</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/02/trueconf-zero-day-cve-2026-3502-exploited-to-deliver-havoc-c2-payloads-via-malicious-software-updates.html</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/02/trueconf-zero-day-cve-2026-3502-exploited-to-deliver-havoc-c2-payloads-via-malicious-software-updates/</loc>
    <lastmod>2026-04-02</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/02/uk-cni-providers-face-significant-downtime-costs-from-ot-targeting-cyber-attacks.html</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/02/uk-cni-providers-face-significant-downtime-costs-from-ot-targeting-cyber-attacks/</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/02/vidrar-infostealer-propagated-via-malicious-github-repositories-exploiting-exposed-claude-code-source-code.html</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/02/vidrar-infostealer-propagated-via-malicious-github-repositories-exploiting-exposed-claude-code-source-code/</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/03/cert-eu-attributes-european-commission-cloud-breach-to-teampcp-with-data-exfiltration-across-71-entities.html</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/03/cert-eu-attributes-european-commission-cloud-breach-to-teampcp-with-data-exfiltration-across-71-entities/</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/03/crowdstrike-falcon-next-gen-siem-integration-adds-microsoft-defender-telemetry-ingestion-and-expands-azure-marketplace-availability.html</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/03/crowdstrike-falcon-next-gen-siem-integration-adds-microsoft-defender-telemetry-ingestion-and-expands-azure-marketplace-availability/</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/03/forced-windows-11-25h2-upgrades-commence-for-unmanaged-home-and-pro-24h2-systems.html</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/03/forced-windows-11-25h2-upgrades-commence-for-unmanaged-home-and-pro-24h2-systems/</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/03/former-engineer-pleads-guilty-to-windows-domain-compromise-and-extortion-plot-at-new-jersey-industrial-company.html</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/03/former-engineer-pleads-guilty-to-windows-domain-compromise-and-extortion-plot-at-new-jersey-industrial-company/</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/03/global-c-suite-credential-theft-campaign-leverages-undocumented-venom-phaas-with-aitm-bypass.html</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/03/global-c-suite-credential-theft-campaign-leverages-undocumented-venom-phaas-with-aitm-bypass/</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/03/linkedins-browser-fingerprinting-expands-to-over-6000-chrome-extensions.html</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/03/linkedins-browser-fingerprinting-expands-to-over-6000-chrome-extensions/</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/03/multi-extortion-ransomware-attacks-surge-in-2025-2026-with-healthcare-finance-and-manufacturing-sectors-heavily-impacted.html</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/03/multi-extortion-ransomware-attacks-surge-in-2025-2026-with-healthcare-finance-and-manufacturing-sectors-heavily-impacted/</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/03/php-web-shells-leveraging-cookie-based-control-channels-for-persistent-rce-on-linux-servers.html</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/03/php-web-shells-leveraging-cookie-based-control-channels-for-persistent-rce-on-linux-servers/</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/03/sparkcat-malware-variant-expands-ocr-based-crypto-recovery-phrase-theft-to-ios-and-enhanced-android-targets.html</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/03/sparkcat-malware-variant-expands-ocr-based-crypto-recovery-phrase-theft-to-ios-and-enhanced-android-targets/</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/03/targeted-social-engineering-of-axios-maintainer-enables-unc1069-npm-supply-chain-compromise-via-waveshaperv2-implant.html</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/03/targeted-social-engineering-of-axios-maintainer-enables-unc1069-npm-supply-chain-compromise-via-waveshaperv2-implant/</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/03/third-party-risk-management-emerges-as-critical-frontline-security-challenge-amid-rising-supply-chain-breaches.html</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/03/third-party-risk-management-emerges-as-critical-frontline-security-challenge-amid-rising-supply-chain-breaches/</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/03/unauthorized-access-to-hims-hers-zendesk-support-tickets-by-shinyhunters-via-compromised-okta-sso.html</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/03/unauthorized-access-to-hims-hers-zendesk-support-tickets-by-shinyhunters-via-compromised-okta-sso/</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/04/app-store-privacy-labels-under-scrutiny-for-inconsistency-and-limited-user-protection.html</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
  <url>
    <loc>https://cyberhappenings.com/happenings/2026/04/04/app-store-privacy-labels-under-scrutiny-for-inconsistency-and-limited-user-protection/</loc>
    <lastmod>2026-04-03</lastmod>
  </url>
</urlset>
