<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
  <url>
    <loc>https://www.redhotcyber.com/post/il-nist-alza-bandiera-bianca-troppe-cve-mentre-gli-exploit-corrono-senza-controllo/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T18:08:00+02:00</news:publication_date>
      <news:title>Il NIST alza bandiera bianca! Troppe CVE mentre gli exploit corrono senza controllo></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-137.jpg</image:loc>
      <image:caption>Il NIST alza bandiera bianca! Troppe CVE mentre gli exploit corrono senza controllo</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/mancano-solo-3-anni-kurzweil-rilancia-la-sua-previsione-shock-sul-futuro-del-mondo/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T16:20:36+02:00</news:publication_date>
      <news:title>Mancano solo 3 anni! Kurzweil rilancia la sua previsione shock sul futuro del mondo></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-131.jpg</image:loc>
      <image:caption>Mancano solo 3 anni! Kurzweil rilancia la sua previsione shock sul futuro del mondo</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/cybersecurity-il-vero-punto-debole-sei-tu-e-nessuno-te-lo-dice-per-bene/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T15:00:50+02:00</news:publication_date>
      <news:title>Cybersecurity: il vero punto debole sei tu (e nessuno te lo dice per bene)></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-135.jpg</image:loc>
      <image:caption>Cybersecurity: il vero punto debole sei tu (e nessuno te lo dice per bene)</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/en/post/ai-and-security-is-the-mythos-model-a-breakthrough-or-just-hype-marcus-hutchinss-vision/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T12:22:38+02:00</news:publication_date>
      <news:title>AI and Security: Is the Mythos Model a Breakthrough or Just Hype? Marcus Hutchins&#8217;s Vision></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-133.jpg</image:loc>
      <image:caption>AI and Security: Is the Mythos Model a Breakthrough or Just Hype? Marcus Hutchins&#8217;s Vision</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/ai-e-sicurezza-il-modello-mythos-e-una-svolta-o-solo-hype-la-visione-di-marcus-hutchins/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T11:26:07+02:00</news:publication_date>
      <news:title>AI e sicurezza: il modello Mythos è una svolta o solo hype? La visione di Marcus Hutchins></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-133.jpg</image:loc>
      <image:caption>AI e sicurezza: il modello Mythos è una svolta o solo hype? La visione di Marcus Hutchins</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/bitlocker-sotto-attacco-falla-critica-aggira-secure-boot-nei-server-windows/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T07:49:14+02:00</news:publication_date>
      <news:title>BitLocker sotto tiro: una falla critica aggira Secure Boot nei server Windows></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2025/05/image-129.jpg</image:loc>
      <image:caption>BitLocker sotto tiro: una falla critica aggira Secure Boot nei server Windows</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/bitcoin-depot-subisce-un-altro-attacco-hacker-questa-volta-509-btc-sono-stati-rubati/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T07:01:38+02:00</news:publication_date>
      <news:title>Bitcoin Depot subisce un altro attacco hacker. Questa volta 50,9 BTC sono stati rubati></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-103.jpg</image:loc>
      <image:caption>Bitcoin Depot subisce un altro attacco hacker. Questa volta 50,9 BTC sono stati rubati</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/nginx-sotto-attacco-lexploit-uscito-la-mattina-e-la-violazione-allora-di-pranzo/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-16T07:00:15+02:00</news:publication_date>
      <news:title>Nginx sotto attacco: l&#8217;exploit uscito la mattina e la violazione all&#8217;ora di pranzo!></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/02/image-70.jpg</image:loc>
      <image:caption>Nginx sotto attacco: l&#8217;exploit uscito la mattina e la violazione all&#8217;ora di pranzo!</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/il-sistema-operativo-sociale-mauceli-la-paura-vende-piu-della-competenza/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T15:17:31+02:00</news:publication_date>
      <news:title>Ecco a voi il sistema operativo sociale! Mauceli: &#8220;La paura vende più della competenza&#8221;></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/02/image-50.jpg</image:loc>
      <image:caption>Ecco a voi il sistema operativo sociale! Mauceli: &#8220;La paura vende più della competenza&#8221;</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/il-giallo-dellaccesso-allazienda-italiana-da-28-milioni-di-fatturato-in-vendita-a-2000-euro/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T10:54:21+02:00</news:publication_date>
      <news:title>Il giallo dell&#8217;accesso all&#8217;azienda italiana da 28 milioni di fatturato in vendita a 2000 euro></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-118.jpg</image:loc>
      <image:caption>Il giallo dell&#8217;accesso all&#8217;azienda italiana da 28 milioni di fatturato in vendita a 2000 euro</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/lia-ci-estinguera-e-tenta-di-colpire-sam-altman-con-una-molotov/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T09:04:33+02:00</news:publication_date>
      <news:title>L’IA ci estinguerà! E tenta di colpire Sam Altman con una molotov></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-123.jpg</image:loc>
      <image:caption>L’IA ci estinguerà! E tenta di colpire Sam Altman con una molotov</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/vulnerabilita-zero-day-in-microsoft-sharepoint-server-exploit-attivi-prima-della-patch/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T07:48:11+02:00</news:publication_date>
      <news:title>Vulnerabilità zero-day in Microsoft SharePoint Server: exploit attivi prima della patch></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2024/01/image-195.jpg</image:loc>
      <image:caption>Vulnerabilità zero-day in Microsoft SharePoint Server: exploit attivi prima della patch</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/google-ha-cambiato-qualcosa-in-chrome-e-gli-hacker-non-sono-contenti/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T07:22:31+02:00</news:publication_date>
      <news:title>Google ha cambiato qualcosa in Chrome… e gli hacker non sono contenti></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-122.jpg</image:loc>
      <image:caption>Google ha cambiato qualcosa in Chrome… e gli hacker non sono contenti</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/masjesu-la-botnet-invisibile-che-trasforma-router-e-iot-in-armi-ddos/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-15T06:53:56+02:00</news:publication_date>
      <news:title>Masjesu: la botnet invisibile che trasforma router e IoT in armi DDoS></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-111.jpg</image:loc>
      <image:caption>Masjesu: la botnet invisibile che trasforma router e IoT in armi DDoS</image:caption>
    </image:image>
  </url>
</urlset>