<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
  <url>
    <loc>https://deafnews.it/article/report-google-2026-90-zero-day-nel-2025-record-enterprise-al-48</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T14:34:32.209507Z</news:publication_date>
      <news:title>Report Google 2026: 90 zero-day nel 2025, record enterprise al 48%</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/article/metinfo-cms-sotto-attacco-rce-exploit-attivo-su-cve-2026-29014</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T03:20:57.922571Z</news:publication_date>
      <news:title>MetInfo CMS sotto attacco RCE: exploit attivo su CVE-2026-29014</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/article/cve-2026-3854-rce-su-github-con-un-solo-comando-git-push</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-05-11T01:14:46.690225Z</news:publication_date>
      <news:title>CVE-2026-3854: RCE su GitHub con un solo comando git push</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/article/bleeding-llama-ollama-leak-di-memoria-su-300000-server-ai</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T21:51:11.901129Z</news:publication_date>
      <news:title>Bleeding Llama: Ollama leak di memoria su 300.000 server AI</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/article/oauth-weaponizzato-governo-e-pa-reindirizzati-a-malware</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-05-10T01:37:50.913426Z</news:publication_date>
      <news:title>OAuth weaponizzato: governo e PA reindirizzati a malware</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/article/apache-http2-grave-falla-rce-basta-una-connessione-tcp</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T17:18:07.72587Z</news:publication_date>
      <news:title>Apache HTTP/2, grave falla RCE: basta una connessione TCP</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/article/weaver-e-cology-n-day-rce-cve-2026-22679-exploitation-attiva-tramite-debug-api</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T15:33:17.611384Z</news:publication_date>
      <news:title>Weaver E-cology N-day RCE CVE-2026-22679: exploitation attiva tramite debug API</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://deafnews.it/article/exploit-rce-weaver-e-cology-endpoint-debug-sotto-attacco</loc>
    <news:news>
      <news:publication>
        <news:name>DeafNews</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-05-09T15:30:59.221152Z</news:publication_date>
      <news:title>Exploit RCE Weaver E-cology: endpoint debug sotto attacco</news:title>
    </news:news>
  </url>
</urlset>
