<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
  <url>
    <loc>https://www.redhotcyber.com/post/lia-ci-estinguera-e-tenta-di-colpire-sam-altman-con-una-molotov/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T09:04:33+02:00</news:publication_date>
      <news:title>L’IA ci estinguerà! E tenta di colpire Sam Altman con una molotov></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-123.jpg</image:loc>
      <image:caption>L’IA ci estinguerà! E tenta di colpire Sam Altman con una molotov</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/vulnerabilita-zero-day-in-microsoft-sharepoint-server-exploit-attivi-prima-della-patch/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T07:48:11+02:00</news:publication_date>
      <news:title>Vulnerabilità zero-day in Microsoft SharePoint Server: exploit attivi prima della patch></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2024/01/image-195.jpg</image:loc>
      <image:caption>Vulnerabilità zero-day in Microsoft SharePoint Server: exploit attivi prima della patch</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/google-ha-cambiato-qualcosa-in-chrome-e-gli-hacker-non-sono-contenti/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T07:22:31+02:00</news:publication_date>
      <news:title>Google ha cambiato qualcosa in Chrome… e gli hacker non sono contenti></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-122.jpg</image:loc>
      <image:caption>Google ha cambiato qualcosa in Chrome… e gli hacker non sono contenti</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/masjesu-la-botnet-invisibile-che-trasforma-router-e-iot-in-armi-ddos/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T06:53:56+02:00</news:publication_date>
      <news:title>Masjesu: la botnet invisibile che trasforma router e IoT in armi DDoS></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-111.jpg</image:loc>
      <image:caption>Masjesu: la botnet invisibile che trasforma router e IoT in armi DDoS</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/booking-com-violato-il-dettaglio-che-rende-questo-attacco-pericoloso/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T21:10:55+02:00</news:publication_date>
      <news:title>Booking.com violato! Il dettaglio che rende questo attacco pericoloso></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-116.jpg</image:loc>
      <image:caption>Booking.com violato! Il dettaglio che rende questo attacco pericoloso</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/webloc-ha-trasformato-il-tuo-smartphone-in-un-tracker-globale-senza-consenso/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T16:26:57+02:00</news:publication_date>
      <news:title>Webloc: ha trasformato il tuo smartphone in un tracker globale senza consenso></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-102.jpg</image:loc>
      <image:caption>Webloc: ha trasformato il tuo smartphone in un tracker globale senza consenso</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/rockstar-games-vittima-di-un-nuovo-attacco-hacker-da-parte-di-shinyhunters/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T14:30:37+02:00</news:publication_date>
      <news:title>Rockstar Games vittima di un nuovo attacco hacker da parte di ShinyHunters></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-110.jpg</image:loc>
      <image:caption>Rockstar Games vittima di un nuovo attacco hacker da parte di ShinyHunters</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/aggiornamenti-urgenti-per-apache-tomcat-multiple-vulnerabilita-corrette-ad-aprile-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T10:08:32+02:00</news:publication_date>
      <news:title>Aggiornamenti urgenti per Apache Tomcat: multiple vulnerabilità corrette ad aprile 2026></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2025/12/image-68.jpg</image:loc>
      <image:caption>Aggiornamenti urgenti per Apache Tomcat: multiple vulnerabilità corrette ad aprile 2026</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/cyber-guerra-prima-delle-bombe-cosi-liran-ha-preparato-gli-attacchi-in-medio-oriente/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T09:09:47+02:00</news:publication_date>
      <news:title>Cyber guerra prima delle bombe: così l’Iran ha preparato gli attacchi in Medio Oriente></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-106.jpg</image:loc>
      <image:caption>Cyber guerra prima delle bombe: così l’Iran ha preparato gli attacchi in Medio Oriente</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/anthropic-progetto-glasswing-unai-individua-falle-globali-e-viene-subito-bloccata/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T07:16:55+02:00</news:publication_date>
      <news:title>Cybersecurity o arma digitale? Il confine sempre più sottile dell’intelligenza artificiale></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-92.jpg</image:loc>
      <image:caption>Cybersecurity o arma digitale? Il confine sempre più sottile dell’intelligenza artificiale</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/arriva-la-sovranita-industriale-gli-usa-inseguono-la-cina-e-la-partita-si-gioca-sui-dati/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T07:07:25+02:00</news:publication_date>
      <news:title>Arriva la Sovranità Industriale: gli USA inseguono la Cina e la partita si gioca sui dati></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/03/image-270.jpg</image:loc>
      <image:caption>Arriva la Sovranità Industriale: gli USA inseguono la Cina e la partita si gioca sui dati</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/linux-7-0-cambia-tutto-sicurezza-post-quantistica-e-rust-entrano-nel-kernel/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T16:59:31+02:00</news:publication_date>
      <news:title>Linux 7.0 cambia tutto: sicurezza post-quantistica e Rust entrano nel kernel></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-105.jpg</image:loc>
      <image:caption>Linux 7.0 cambia tutto: sicurezza post-quantistica e Rust entrano nel kernel</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/zeroday-le-armi-cibernetiche-e-il-caso-di-anthropic-glasswing/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T14:00:03+02:00</news:publication_date>
      <news:title>Anthropic limita Mythos: l&#8217;AI che trova zero-day è un vantaggio strategico e fa paura></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-93.jpg</image:loc>
      <image:caption>Anthropic limita Mythos: l&#8217;AI che trova zero-day è un vantaggio strategico e fa paura</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/attacco-alla-basilica-di-san-marco-gli-hacker-sono-ancora-dentro-i-sistemi/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T09:03:16+02:00</news:publication_date>
      <news:title>Attacco alla Basilica di San Marco: gli hacker sostengono che sono ancora dentro i sistemi></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-101.jpg</image:loc>
      <image:caption>Attacco alla Basilica di San Marco: gli hacker sostengono che sono ancora dentro i sistemi</image:caption>
    </image:image>
  </url>
</urlset>