<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
  <url>
    <loc>https://www.redhotcyber.com/post/masquerads-colpiscono-ancora-clonato-il-sito-dell-per-diffondere-malware-tramite-rvtools/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T07:36:28+02:00</news:publication_date>
      <news:title>MasquerAds colpiscono ancora: clonato il sito Dell per diffondere malware tramite RVTools></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/03/dell.jpg</image:loc>
      <image:caption>MasquerAds colpiscono ancora: clonato il sito Dell per diffondere malware tramite RVTools</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/pawn-storm-colpisce-ancora-prismex-prende-di-mira-infrastrutture-critiche-europee/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T07:30:58+02:00</news:publication_date>
      <news:title>Pawn Storm colpisce ancora: PRISMEX prende di mira infrastrutture critiche europee></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/03/image-257.jpg</image:loc>
      <image:caption>Pawn Storm colpisce ancora: PRISMEX prende di mira infrastrutture critiche europee</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/influencer-sotto-osservazione-arriva-la-legge-del-creator/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T07:56:20+02:00</news:publication_date>
      <news:title>Influencer sotto osservazione: arriva la “Legge del Creator”></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-20.jpg</image:loc>
      <image:caption>un influencer sta parlando dentro uno smartphone</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/crystalx-rat-il-nuovo-malware-che-ti-hackera-e-poi-ti-prende-in-giro/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T22:22:00+02:00</news:publication_date>
      <news:title>CrystalX RAT: Il nuovo malware che ti hackera… e poi ti prende in giro></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-24.jpg</image:loc>
      <image:caption>Un ratto robotico feroce e con gli occhi rossi, che sta  mangiando con i denti affilati un cavo di rete.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/lagi-potrebbe-non-arrivare-mai-e-a-quel-punto-chi-paghera-il-conto/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T22:22:00+02:00</news:publication_date>
      <news:title>L’AGI potrebbe non arrivare mai. E a quel punto, chi pagherà il conto?></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/03/Gemini_Generated_Image_lvukjxlvukjxlvuk.jpg</image:loc>
      <image:caption>L’AGI potrebbe non arrivare mai. E a quel punto, chi pagherà il conto?</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/linkedin-sta-spiando-le-tue-estensioni-senza-dirtelo/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T09:50:41+02:00</news:publication_date>
      <news:title>LinkedIn sta spiando le tue estensioni senza dirtelo?></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-50.jpg</image:loc>
      <image:caption>una grande lente di ingrandimento sta sopra il logo di linkedin e sullo sfondo la bandiera della comunità europea</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/attacco-a-trivy-scatena-il-caos-nella-supply-chain-cisco-e-tra-le-aziende-colpite/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T09:00:58+02:00</news:publication_date>
      <news:title>Attacco a Trivy scatena il caos nella Supply Chain: Cisco è tra le aziende colpite></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2025/11/image-78.jpg</image:loc>
      <image:caption>Attacco a Trivy scatena il caos nella Supply Chain: Cisco è tra le aziende colpite</image:caption>
    </image:image>
  </url>
</urlset>