<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
  <url>
    <loc>https://deafnews.it/article/cve-2026-7482-memoria-ollama-in-fuga-per-un-gguf-maligno</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T02:42:04.453114Z</news:publication_date>
      <news:title>CVE-2026-7482: memoria Ollama in fuga per un GGUF maligno</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/article/cpanelcve-2026-41940-oltre-2000-ip-in-attacco-attivo</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T02:10:57.781715Z</news:publication_date>
      <news:title>cPanel/CVE-2026-41940: oltre 2000 IP in attacco attivo</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/article/exploit-attivo-cve-2026-41940-root-su-cpanel-senza-password</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T02:09:19.022402Z</news:publication_date>
      <news:title>Exploit attivo CVE-2026-41940: root su cPanel senza password</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/article/cpanel-cve-2026-41940-sotto-attacco-oltre-2000-ip-attivi</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T02:09:00.410107Z</news:publication_date>
      <news:title>cPanel CVE-2026-41940 sotto attacco: oltre 2.000 IP attivi</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/article/google-scoperto-primo-zero-day-ai-in-the-wild-bypassa-2fa</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T01:39:06.984243Z</news:publication_date>
      <news:title>Google: scoperto primo zero-day AI in-the-wild, bypassa 2FA</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/article/google-primo-zero-day-ai-in-the-wild-bypass-2fa-rilevato</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T01:37:17.472402Z</news:publication_date>
      <news:title>Google: primo zero-day AI in-the-wild, bypass 2FA rilevato</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/article/google-scopre-primo-zero-day-ai-bypass-2fa-in-tool-admin-open</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T01:37:00.93697Z</news:publication_date>
      <news:title>Google scopre primo zero-day AI: bypass 2FA in tool admin open</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/article/primo-zero-day-ai-scoperto-bypass-2fa-su-tool-open-source</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T01:36:47.366555Z</news:publication_date>
      <news:title>Primo zero-day AI scoperto: bypass 2FA su tool open-source</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/article/github-rce-critica-una-git-push-esegue-codice-sui-server</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-05-13T01:17:52.947677Z</news:publication_date>
      <news:title>GitHub RCE critica: una git push esegue codice sui server</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/article/exim-rce-non-autenticata-su-server-gnutls-patch-4993</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T21:00:03.448383Z</news:publication_date>
      <news:title>Exim, RCE non autenticata su server GnuTLS: patch 4.99.3</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/article/worm-mini-shai-hulud-170-pacchetti-infetti-slsa-bypassata</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T17:00:40.856517Z</news:publication_date>
      <news:title>Worm Mini Shai-Hulud: 170+ pacchetti infetti, SLSA bypassata</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/article/bleeding-llama-vuln-ollama-svela-api-key-a-300mila-server</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T12:55:45.814779Z</news:publication_date>
      <news:title>Bleeding Llama: vuln Ollama svela API key a 300mila server</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/article/attacchi-oauth-attivi-su-entra-id-governo-nel-mirino</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-05-12T03:18:16.290285Z</news:publication_date>
      <news:title>Attacchi OAuth attivi su Entra ID: governo nel mirino</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/article/ivanti-epmm-rce-autenticata-cve-2026-6973-in-exploitation-attivo</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T22:13:17.787656Z</news:publication_date>
      <news:title>Ivanti EPMM: RCE autenticata CVE-2026-6973 in exploitation attivo</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/article/attacco-attivo-cpanel-backdoor-filemanager-in-distribuzione</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T20:41:28.684775Z</news:publication_date>
      <news:title>Attacco attivo cPanel, backdoor Filemanager in distribuzione</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/article/dirty-frag-root-su-linux-con-poc-e-exploit-attivo</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T18:39:29.858068Z</news:publication_date>
      <news:title>Dirty Frag: root su Linux con PoC e exploit attivo</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/article/cve-2026-0300-rce-su-firewall-palo-alto-attacchi-attivi</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T17:42:10.316562Z</news:publication_date>
      <news:title>CVE-2026-0300: RCE su firewall Palo Alto, attacchi attivi</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/article/reset-password-in-ad-lattaccante-resta-dentro-dopo-il-cambio</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T15:58:10.979139Z</news:publication_date>
      <news:title>Reset password in AD: l&apos;attaccante resta dentro dopo il cambio</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/article/il-primo-zero-day-sviluppato-con-lausilio-di-un-modello-ai-aggira-la-2fa-il</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T14:44:23.926112Z</news:publication_date>
      <news:title>Il primo zero-day sviluppato con l&apos;ausilio di un modello AI aggira la 2FA: il</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/article/report-google-2026-90-zero-day-nel-2025-record-enterprise-al-48</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T14:34:32.209507Z</news:publication_date>
      <news:title>Report Google 2026: 90 zero-day nel 2025, record enterprise al 48%</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/article/metinfo-cms-sotto-attacco-rce-exploit-attivo-su-cve-2026-29014</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T03:20:57.922571Z</news:publication_date>
      <news:title>MetInfo CMS sotto attacco RCE: exploit attivo su CVE-2026-29014</news:title>
    </news:news>
  </url>
</urlset>
