<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
  <url>
    <loc>https://www.redhotcyber.com/post/lidentita-di-satoshi-nakamoto-linventore-del-bitcoin-e-stata-svelata-e-stato-adam-back/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T20:42:05+02:00</news:publication_date>
      <news:title>L&#8217;identità di Satoshi Nakamoto, l&#8217;inventore del Bitcoin è stata svelata? È Adam Back?></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-68.jpg</image:loc>
      <image:caption>L&#8217;identità di Satoshi Nakamoto, l&#8217;inventore del Bitcoin è stata svelata? È Adam Back?</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/il-caso-del-direttore-dellfbi-kash-patel-anatomia-di-unesposizione-prevedibile/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T15:36:38+02:00</news:publication_date>
      <news:title>Il caso del direttore dell&#8217;FBI Kash Patel: anatomia di un’esposizione prevedibile></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/FBI-Kash-Patel.jpg</image:loc>
      <image:caption>Il caso del direttore dell&#8217;FBI Kash Patel: anatomia di un’esposizione prevedibile</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/sviluppo-cognitivo-anche-la-grecia-vieta-i-social-network-ai-minori-di-15-anni/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T12:34:14+02:00</news:publication_date>
      <news:title>Sviluppo Cognitivo: Anche la Grecia vieta i social network ai minori di 15 anni></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-67.jpg</image:loc>
      <image:caption>Sviluppo Cognitivo: Anche la Grecia vieta i social network ai minori di 15 anni</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/hai-creato-il-tuo-chatbot-fai-attenzione-perche-i-bug-sono-ad-un-passo-dagli-hacker-cattivi/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T12:03:25+02:00</news:publication_date>
      <news:title>Hai creato il tuo chatbot? Fai attenzione perché i bug sono ad un passo dagli hacker cattivi></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-66.jpg</image:loc>
      <image:caption>Hai creato il tuo chatbot? Fai attenzione perché i bug sono ad un passo dagli hacker cattivi</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/maven-e-ai-nella-guerra-moderna-chi-paghera-per-luccisione-di-civili-innocenti/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T10:24:12+02:00</news:publication_date>
      <news:title>Maven e AI nella guerra moderna: Chi pagherà per l&#8217;uccisione di civili innocenti?></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-64.jpg</image:loc>
      <image:caption>Maven e AI nella guerra moderna: Chi pagherà per l&#8217;uccisione di civili innocenti?</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/minacce-informatiche-2025-cisco-talos-analizza-levoluzione-del-panorama-cyber/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T08:55:42+02:00</news:publication_date>
      <news:title>Minacce informatiche 2025: Cisco Talos analizza l&#8217;evoluzione del panorama cyber></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2025/11/image-79.jpg</image:loc>
      <image:caption>Minacce informatiche 2025: Cisco Talos analizza l&#8217;evoluzione del panorama cyber</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/quantum-computing-la-crittografia-sta-per-crollare-allora-il-cloud-si-sposta-nello-spazio/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T06:57:35+02:00</news:publication_date>
      <news:title>Quantum computing: La crittografia sta per crollare? Allora il Cloud si sposta nello spazio></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-60.jpg</image:loc>
      <image:caption>Quantum computing: La crittografia sta per crollare? Allora il Cloud si sposta nello spazio</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/smart-tv-sotto-accusa-i-broadcaster-ue-chiedono-nuove-regole/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T06:55:03+02:00</news:publication_date>
      <news:title>Smart TV sotto accusa: i broadcaster UE chiedono nuove regole></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-53.jpg</image:loc>
      <image:caption>Smart TV sotto accusa: i broadcaster UE chiedono nuove regole</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/google-corregge-una-falla-critica-su-android-che-porta-a-dos-senza-alcuna-azione/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T16:46:52+02:00</news:publication_date>
      <news:title>Google corregge una falla critica su Android che porta a DoS senza alcuna azione></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-63.jpg</image:loc>
      <image:caption>uno smartphone con installato google android viene attaccato da malware e da hacker criminali</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/vpn-sotto-attacco-un-bug-espone-il-vero-ip-degli-utenti-a-loro-insaputa/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T15:06:56+02:00</news:publication_date>
      <news:title>VPN sotto attacco: un bug espone il vero IP degli utenti a loro insaputa></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-62.jpg</image:loc>
      <image:caption>VPN sotto attacco: un bug espone il vero IP degli utenti a loro insaputa</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/hasbro-sotto-attacco-hacker-settimane-di-caos-per-il-colosso-dei-giocattoli/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T14:27:52+02:00</news:publication_date>
      <news:title>Hasbro sotto attacco hacker: settimane di caos per il colosso dei giocattoli></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-57.jpg</image:loc>
      <image:caption>Hasbro sotto attacco hacker: settimane di caos per il colosso dei giocattoli</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/microsoft-scarica-lai-copilot-e-solo-per-intrattenimento-cosa-sta-succedendo/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T11:11:24+02:00</news:publication_date>
      <news:title>Microsoft scarica l’AI: Copilot è “solo per intrattenimento”. Cosa sta succedendo?></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2025/09/microsoft-cloud-dark-2.jpg</image:loc>
      <image:caption>Microsoft scarica l’AI: Copilot è “solo per intrattenimento”. Cosa sta succedendo?</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/hacker-nordcoreani-rubano-285-milioni-di-dollari-a-drift-attacco-pianificato-da-mesi/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T09:24:02+02:00</news:publication_date>
      <news:title>Hacker nordcoreani rubano 285 milioni di dollari a Drift: attacco pianificato da mesi></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-59.jpg</image:loc>
      <image:caption>Un hacker sta al terminale mentre forzieri espellono criptovaluta e sullo sfondo la bandiera della corea del nord.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/the-gentlemen-il-ransomware-che-sfrutta-14-000-firewall-gia-compromessi/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T07:46:08+02:00</news:publication_date>
      <news:title>The Gentlemen: il ransomware che sfrutta 14.000 firewall già compromessi></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2025/09/image-123.jpg</image:loc>
      <image:caption>The Gentlemen: il ransomware che sfrutta 14.000 firewall già compromessi</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/attacco-hacker-no-e-stato-puffo-inventore-guida-al-coaching-per-cyber-puffi/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T07:05:40+02:00</news:publication_date>
      <news:title>Attacco hacker? No, è stato Puffo Inventore! Guida al Coaching per Cyber-Puffi></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-52.jpg</image:loc>
      <image:caption>Attacco hacker? No, è stato Puffo Inventore! Guida al Coaching per Cyber-Puffi</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/google-sa-meglio-di-te-dove-devi-andare-nel-mondo-reale-gemini-e-maps-si-alleano/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T07:01:25+02:00</news:publication_date>
      <news:title>Google sa meglio di te dove devi andare nel mondo reale. Gemini e Maps si alleano!></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-55.jpg</image:loc>
      <image:caption>Un itinerario creato dall&#039;intelligenza artificiale</image:caption>
    </image:image>
  </url>
</urlset>