<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
  <url>
    <loc>https://deafnews.it/article/vishing-e-aitm-bypassano-lmfa-estorsioni-invisibili-nel-saas</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T15:18:11.970032Z</news:publication_date>
      <news:title>Vishing e AiTM bypassano l&apos;MFA: estorsioni invisibili nel SaaS</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/article/phishing-aviazione-russa-simulatori-droni-rubano-dati-sensibili</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T14:24:17.827635Z</news:publication_date>
      <news:title>Phishing aviazione russa: simulatori droni rubano dati sensibili</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/article/onda-di-patch-spinta-dallia-il-debito-tecnico-espone-le-reti</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T14:00:22.835087Z</news:publication_date>
      <news:title>Onda di patch spinta dall&apos;IA: il debito tecnico espone le reti</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/article/rischio-sistemico-violazioni-dati-bancarie-e-supply-chain</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T13:33:23.183246Z</news:publication_date>
      <news:title>Rischio sistemico: violazioni dati bancarie e supply chain</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/article/attacco-supply-chain-ruby-e-go-scopri-il-rischio-sleeper</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T12:24:49.020202Z</news:publication_date>
      <news:title>Attacco supply chain Ruby e Go: scopri il rischio sleeper</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/article/multa-garante-privacy-a-poste-impatto-sicurezza-e-gdpr</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T11:36:18.36525Z</news:publication_date>
      <news:title>Multa Garante Privacy a Poste: impatto sicurezza e GDPR</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/article/rischio-insider-nel-ransomware-blackcat-analisi-del-tradimento</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T09:22:27.575091Z</news:publication_date>
      <news:title>Rischio Insider nel Ransomware BlackCat: Analisi del Tradimento</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/article/sicurezza-ot-allarme-apt-e-ritardo-italiano-nellindustria</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T07:25:47.271041Z</news:publication_date>
      <news:title>Sicurezza OT: allarme APT e ritardo italiano nell&apos;industria</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/article/analisi-deepfake-taylor-swift-registra-voce-e-immagine</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T04:14:26.284891Z</news:publication_date>
      <news:title>Analisi Deepfake: Taylor Swift registra voce e immagine</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/article/cyberattack-e-furto-cargo-rischio-rmm-nella-logistica</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-05-01T00:29:25.114206Z</news:publication_date>
      <news:title>Cyberattack e furto cargo: rischio RMM nella logistica</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/article/rischio-zero-day-anthropic-mythos-paradosso-sicurezza-rivelato</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T21:33:34.232866Z</news:publication_date>
      <news:title>Rischio Zero-Day Anthropic Mythos: Paradosso Sicurezza Rivelato</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/article/rischio-bluekit-il-kit-phishing-ai-che-bypassa-lmfa</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T19:08:39.135256Z</news:publication_date>
      <news:title>Rischio Bluekit: il kit phishing AI che bypassa l&apos;MFA</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/article/cybersecurity-report-cert-agid-rivela-rischi-ai-e-rce-github</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T19:01:17.788354Z</news:publication_date>
      <news:title>Cybersecurity: report CERT-AGID rivela rischi AI e RCE GitHub</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/article/attacco-pytorch-lightning-rischio-supply-chain-rivelato</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T18:00:07.572242Z</news:publication_date>
      <news:title>Attacco PyTorch Lightning: rischio supply chain rivelato</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/article/violazione-ants-francia-accesso-fraudolento-e-rischi-per-i-dati</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T17:10:08.437353Z</news:publication_date>
      <news:title>Violazione ANTS Francia: accesso fraudolento e rischi per i dati</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/article/botnet-ddos-e-dns-amplification-il-caso-degli-isp-brasiliani</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T15:28:39.261221Z</news:publication_date>
      <news:title>Botnet DDoS e DNS amplification: il caso degli ISP brasiliani</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/article/cve-2026-41940-rischio-bypass-cpanel-e-mitigazioni</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T14:21:07.786803Z</news:publication_date>
      <news:title>CVE-2026-41940: rischio bypass cPanel e mitigazioni</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/article/etherrat-analisi-rischio-c2-tramite-smart-contract-ethereum</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T13:22:28.487041Z</news:publication_date>
      <news:title>EtherRAT: analisi rischio C2 tramite Smart Contract Ethereum</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/article/rischio-copy-fail-linux-lexploit-root-invisibile-in-4-byte</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T12:08:21.716449Z</news:publication_date>
      <news:title>Rischio Copy Fail Linux: l&apos;exploit root invisibile in 4 byte</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/article/fast16-malware-pre-stuxnet-rivelato-analisi-e-impatto</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T11:33:52.883047Z</news:publication_date>
      <news:title>Fast16, malware pre-Stuxnet rivelato: analisi e impatto</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/article/analisi-rinnovo-fisa-702-stallo-al-senato-sulla-sorveglianza</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T09:41:01.571378Z</news:publication_date>
      <news:title>Analisi Rinnovo FISA 702: stallo al Senato sulla sorveglianza</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/article/vulnerabilita-rce-in-gemini-cli-e-cursor-ai-dettagli-e-patch</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T08:20:15.175896Z</news:publication_date>
      <news:title>Vulnerabilità RCE in Gemini CLI e Cursor AI: Dettagli e Patch</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/article/cybercrime-dubai-operazione-usa-cina-smantella-centri-truffa-crypto</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T07:15:38.76621Z</news:publication_date>
      <news:title>Cybercrime Dubai: Operazione USA-Cina smantella centri truffa crypto</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/article/vulnerabilita-rce-qinglong-rivelato-bypass-expressjs</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T06:17:48.692513Z</news:publication_date>
      <news:title>Vulnerabilità RCE Qinglong: rivelato bypass Express.js</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/article/attacchi-supply-chain-wordpress-backdoor-dormienti-e-rce-nei-plugin</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T05:09:57.026038Z</news:publication_date>
      <news:title>Attacchi supply chain WordPress: backdoor dormienti e RCE nei plugin</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/article/zero-day-microsoft-rivelato-il-rischio-della-patch-difettosa</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-30T04:32:38.583004Z</news:publication_date>
      <news:title>Zero-day Microsoft: rivelato il rischio della patch difettosa</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/article/arresti-hacker-roblox-ucraina-610000-account-rubati</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T20:08:27.486052Z</news:publication_date>
      <news:title>Arresti hacker Roblox Ucraina: 610.000 account rubati</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/article/attacco-supply-chain-npm-sap-malware-colpisce-pacchetti-cap</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T19:28:40.665723Z</news:publication_date>
      <news:title>Attacco supply chain npm SAP: malware colpisce pacchetti CAP</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/article/sicurezza-cavi-sottomarini-leuropa-corre-ai-ripari-con-347-milioni</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T18:17:14.626252Z</news:publication_date>
      <news:title>Sicurezza cavi sottomarini: l&apos;Europa corre ai ripari con 347 milioni</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/article/supply-chain-attack-npm-malware-colpisce-claude-code-e-vs-code</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-29T17:06:23.582846Z</news:publication_date>
      <news:title>Supply chain attack npm: malware colpisce Claude Code e VS Code</news:title>
    </news:news>
  </url>
</urlset>
