<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
  <url>
    <loc>https://www.redhotcyber.com/post/linkedin-sta-spiando-le-tue-estensioni-senza-dirtelo/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T09:50:41+02:00</news:publication_date>
      <news:title>LinkedIn sta spiando le tue estensioni senza dirtelo?></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-50.jpg</image:loc>
      <image:caption>una grande lente di ingrandimento sta sopra il logo di linkedin e sullo sfondo la bandiera della comunità europea</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/attacco-a-trivy-scatena-il-caos-nella-supply-chain-cisco-e-tra-le-aziende-colpite/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T09:00:58+02:00</news:publication_date>
      <news:title>Attacco a Trivy scatena il caos nella Supply Chain: Cisco è tra le aziende colpite></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2025/11/image-78.jpg</image:loc>
      <image:caption>Attacco a Trivy scatena il caos nella Supply Chain: Cisco è tra le aziende colpite</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/le-ai-iniziano-a-proteggersi-tra-loro-lo-studio-che-cambia-tutto/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T08:45:39+02:00</news:publication_date>
      <news:title>Le AI iniziano a proteggersi tra loro: lo studio che cambia tutto></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-45.jpg</image:loc>
      <image:caption>un umano a mezzo busto di profilo sta di fronte ad un robot umanoide di profilo. i due si guardano con sguardo di sfida. lo sfondo è nero</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/la-sicurezza-informatica-nel-2026-non-si-vince-con-piu-ia-ma-con-disciplina-ed-esperienza/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T08:06:32+02:00</news:publication_date>
      <news:title>La sicurezza informatica nel 2026 non si vince con più IA, ma con disciplina ed esperienza></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/03/image-40.jpg</image:loc>
      <image:caption>La sicurezza informatica nel 2026 non si vince con più IA, ma con disciplina ed esperienza</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/il-giallo-dellattacco-hacker-agli-uffizi-cosa-e-successo-a-palazzo-pitti/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T21:56:00+02:00</news:publication_date>
      <news:title>Il giallo dell&#8217;attacco hacker agli Uffizi: cosa è successo a Palazzo Pitti></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-43.jpg</image:loc>
      <image:caption>Il giallo dell&#8217;attacco hacker agli Uffizi: cosa è successo a Palazzo Pitti</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/una-macchina-del-caffe-ha-causato-un-data-breach-cosa-e-successo/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T19:43:00+02:00</news:publication_date>
      <news:title>Una macchina del caffè ha causato un data breach: cosa è successo></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-41.jpg</image:loc>
      <image:caption>Una macchina del caffè ha causato un data breach: cosa è successo</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/claude-code-il-codice-sorgente-e-fuori-e-i-malware-hanno-fatto-festa-insieme/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T16:09:41+02:00</news:publication_date>
      <news:title>Claude Code: il codice sorgente è fuori, e i malware hanno fatto festa insieme></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-33.jpg</image:loc>
      <image:caption>visualizzato il logo di claude code e sullo sfondo del codice sorgente</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/500-mb-di-passaporti-italiani-gratis-online-cosa-ce-dietro-il-leak-di-anonymous/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T11:28:44+02:00</news:publication_date>
      <news:title>500 MB di Passaporti italiani gratis online: cosa c’è dietro il leak di Anonymous></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-38.jpg</image:loc>
      <image:caption>Un uomo tiene in mano un passaporto mentre accanto c&#039;è un hacker di anonymous. Copre lo sfondo la bandiera italiana.Un uomo tiene in mano un passaporto mentre accanto c&#039;è un hacker di anonymous. Copre lo sfondo la bandiera italiana.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/leak-bazaar-quando-il-dato-rubato-smette-di-essere-un-problema-e-diventa-un-prodotto/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T09:29:33+02:00</news:publication_date>
      <news:title>Leak Bazaar: quando il dato rubato smette di essere un problema e diventa un prodotto></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2025/09/hacker-italia-database-1.jpg</image:loc>
      <image:caption>Leak Bazaar: quando il dato rubato smette di essere un problema e diventa un prodotto</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/liran-colpisce-il-cloud-i-datacenter-di-oracle-e-amazon-colpiti-dalla-guardia-rivoluzionaria/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T08:22:36+02:00</news:publication_date>
      <news:title>L’Iran punta al cloud! I Datacenter di Oracle e Amazon colpiti dalla guardia rivoluzionaria></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-31.jpg</image:loc>
      <image:caption>una immagine di un messaggio diffuso dalle guardie rivoluzionarie iraniane che mostra l&#039;attacco ai datacenter di Oracle</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/cavo-sottomarino-danneggiato-a-matsu-sospetti-su-una-nave-cinese-taipei-indaga/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T07:43:47+02:00</news:publication_date>
      <news:title>Cavo sottomarino danneggiato a Matsu: sospetti su una nave cinese: Taipei indaga></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2025/11/image-55.jpg</image:loc>
      <image:caption>Cavo sottomarino danneggiato a Matsu: sospetti su una nave cinese: Taipei indaga</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/attacco-alla-commissione-europea-la-violazione-per-il-furto-di-un-account-aws/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T21:20:30+02:00</news:publication_date>
      <news:title>Attacco alla Commissione europea: violazione per il furto di un account AWS></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-28.jpg</image:loc>
      <image:caption>Attacco alla Commissione europea: violazione per il furto di un account AWS</image:caption>
    </image:image>
  </url>
</urlset>