<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
  <url>
    <loc>https://deafnews.it/en/article/worm-mini-shai-hulud-169-pacchetti-npmpypi-con-slsa-valida</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T04:15:01.296852Z</news:publication_date>
      <news:title>Mini Shai-Hulud Worm Subverts Supply Chain Trust: 169 npm and PyPI Packages Carry Valid SLSA Attestations</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/en/article/exim-deadletter-rce-non-autenticata-su-server-mail-gnutls</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T03:17:55.571958Z</news:publication_date>
      <news:title>Exim &apos;Dead.Letter&apos; Vulnerability: Unauthenticated RCE Threatens GnuTLS-Based Mail Servers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/en/article/google-primo-zero-day-ai-in-the-wild-bypass-2fa-attivo</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T03:16:26.016787Z</news:publication_date>
      <news:title>Google Identifies First AI-Generated Zero-Day Weaponized in the Wild</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/en/article/google-ferma-zero-day-ai-bypass-2fa-su-tool-open-source</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T03:16:06.16868Z</news:publication_date>
      <news:title>Google Disrupts AI-Generated Zero-Day: 2FA Bypass Found in Open-Source Tool</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/en/article/google-scopre-primo-zero-day-generato-da-ai-per-bypass-2fa</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T03:15:04.808906Z</news:publication_date>
      <news:title>Google Identifies First AI-Generated Zero-Day Exploit for 2FA Bypass</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/en/article/google-blocca-il-primo-zero-day-ai-bypass-2fa-su-tool-admin</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T03:14:46.417824Z</news:publication_date>
      <news:title>Google Disrupts First AI-Generated Zero-Day Targeting 2FA in Admin Tools</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/en/article/bleeding-llama-la-vulnerabilita-cve-2026-7482-mette-a-rischio-300000-server</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T02:57:48.099959Z</news:publication_date>
      <news:title>Bleeding Llama: Critical CVE-2026-7482 Vulnerability Threatens 300,000 Ollama Servers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/en/article/bleeding-llama-fuga-di-memoria-su-300mila-server-ollama-esposti</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T02:50:40.121387Z</news:publication_date>
      <news:title>Bleeding Llama: 300,000 Ollama Servers Exposed to Unauthenticated Memory Leak</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/en/article/bleeding-llama-leak-di-memoria-su-300000-server-ollama</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T02:46:31.120461Z</news:publication_date>
      <news:title>Bleeding Llama: Critical Memory Leak Exposes 300,000 Ollama Servers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/en/article/bleeding-llama-bug-ollama-leak-memoria-su-300mila-server</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T02:45:16.335248Z</news:publication_date>
      <news:title>Bleeding Llama: Critical Ollama Vulnerability Exposes Memory on 300,000 Servers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/en/article/cve-2026-7482-ollama-leaka-memoria-esposte-300mila-istanze</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T02:44:57.234711Z</news:publication_date>
      <news:title>CVE-2026-7482: ‘Bleeding Llama’ Vulnerability Exposes 300,000 Ollama Instances</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/en/article/cve-2026-7482-in-ollama-leak-di-memoria-su-300mila-server-esposti</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T02:43:04.275685Z</news:publication_date>
      <news:title>‘Bleeding Llama’: Critical Ollama Vulnerability Exposes Memory on 300,000 Servers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/en/article/ollama-bug-in-gguf-loader-leak-memoria-da-300mila-server</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T02:42:26.567105Z</news:publication_date>
      <news:title>Bleeding Llama: Ollama GGUF Loader Bug Exposes Process Memory Across 300,000 Servers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/en/article/cve-2026-7482-memoria-ollama-in-fuga-per-un-gguf-maligno</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T02:42:04.453114Z</news:publication_date>
      <news:title>CVE-2026-7482: Malicious GGUF Files Trigger Memory Leaks in Ollama</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/en/article/cpanelcve-2026-41940-oltre-2000-ip-in-attacco-attivo</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T02:10:57.781715Z</news:publication_date>
      <news:title>cPanel Auth Bypass Under Mass Attack: 2,000 IPs Exploiting CVE-2026-41940</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/en/article/exploit-attivo-cve-2026-41940-root-su-cpanel-senza-password</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T02:09:19.022402Z</news:publication_date>
      <news:title>Critical cPanel Vulnerability CVE-2026-41940 Under Active Exploitation: Passwordless Root Access</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/en/article/cpanel-cve-2026-41940-sotto-attacco-oltre-2000-ip-attivi</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T02:09:00.410107Z</news:publication_date>
      <news:title>CVE-2026-41940: Massive cPanel Exploit Campaign Linked to &apos;Mr_Rot13&apos; Actor</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/en/article/google-scoperto-primo-zero-day-ai-in-the-wild-bypassa-2fa</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T01:39:06.984243Z</news:publication_date>
      <news:title>Google Identifies First AI-Authored Zero-Day Exploiting 2FA in the Wild</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/en/article/google-primo-zero-day-ai-in-the-wild-bypass-2fa-rilevato</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T01:37:17.472402Z</news:publication_date>
      <news:title>Google Identifies First AI-Generated Zero-Day Exploit Used in the Wild</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/en/article/google-scopre-primo-zero-day-ai-bypass-2fa-in-tool-admin-open</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T01:37:00.93697Z</news:publication_date>
      <news:title>Google Detects First AI-Assisted Zero-Day: 2FA Bypass Found in Popular Admin Tool</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/en/article/primo-zero-day-ai-scoperto-bypass-2fa-su-tool-open-source</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T01:36:47.366555Z</news:publication_date>
      <news:title>First AI-Generated Zero-Day Spotted: 2FA Bypass Hits Open-Source Admin Tool</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/en/article/github-rce-critica-una-git-push-esegue-codice-sui-server</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T01:17:52.947677Z</news:publication_date>
      <news:title>Critical GitHub RCE: A Single Git Push Can Trigger Remote Code Execution</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/en/article/exim-rce-non-autenticata-su-server-gnutls-patch-4993</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T21:00:03.448383Z</news:publication_date>
      <news:title>Exim Patches Critical Unauthenticated RCE Vulnerability in GnuTLS-Linked Servers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/en/article/worm-mini-shai-hulud-170-pacchetti-infetti-slsa-bypassata</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T17:00:40.856517Z</news:publication_date>
      <news:title>Mini Shai-Hulud Worm: 170+ Packages Compromised as SLSA Protections Bypassed</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/en/article/bleeding-llama-vuln-ollama-svela-api-key-a-300mila-server</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T12:55:45.814779Z</news:publication_date>
      <news:title>Bleeding Llama: Why &quot;On-Premises&quot; Doesn&apos;t Mean &quot;Safe&quot; — CVE-2026-7482 and the 300,000 Exposed Servers</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/en/article/attacchi-oauth-attivi-su-entra-id-governo-nel-mirino</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T03:18:16.290285Z</news:publication_date>
      <news:title>Active OAuth Redirection Attacks Targeting Government Entities via Entra ID</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/en/article/ivanti-epmm-rce-autenticata-cve-2026-6973-in-exploitation-attivo</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T22:13:17.787656Z</news:publication_date>
      <news:title>Ivanti EPMM Authenticated RCE Under Active Exploitation; CISA Sets Patch Deadline</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/en/article/attacco-attivo-cpanel-backdoor-filemanager-in-distribuzione</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T20:41:28.684775Z</news:publication_date>
      <news:title>Active Exploitation of cPanel Vulnerability Deploys &apos;Filemanager&apos; Backdoor</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/en/article/dirty-frag-root-su-linux-con-poc-e-exploit-attivo</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T18:39:29.858068Z</news:publication_date>
      <news:title>Dirty Frag: Linux Kernel Vulnerability Chain Exploited in the Wild for Root Access</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/en/article/cve-2026-0300-rce-su-firewall-palo-alto-attacchi-attivi</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T17:42:10.316562Z</news:publication_date>
      <news:title>Critical Palo Alto Networks PAN-OS RCE (CVE-2026-0300) Under Active Exploitation</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/en/article/reset-password-in-ad-lattaccante-resta-dentro-dopo-il-cambio</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T15:58:10.979139Z</news:publication_date>
      <news:title>Why an Active Directory Password Reset Isn&apos;t Enough to Evict an Attacker</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/en/article/il-primo-zero-day-sviluppato-con-lausilio-di-un-modello-ai-aggira-la-2fa-il</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T14:44:23.926112Z</news:publication_date>
      <news:title>Google Detects First AI-Weaponized Zero-Day Bypassing 2FA</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/en/article/report-google-2026-90-zero-day-nel-2025-record-enterprise-al-48</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T14:34:32.209507Z</news:publication_date>
      <news:title>Google Report: Enterprise Tech Hit by Record 48% of Zero-Day Exploits in 2025</news:title>
    </news:news>
  </url>
</urlset>
