<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
  <url>
    <loc>https://www.redhotcyber.com/post/una-macchina-del-caffe-ha-causato-un-data-breach-cosa-e-successo/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T19:43:00+02:00</news:publication_date>
      <news:title>Una macchina del caffè ha causato un data breach: cosa è successo></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-41.jpg</image:loc>
      <image:caption>Una macchina del caffè ha causato un data breach: cosa è successo</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/claude-code-il-codice-sorgente-e-fuori-e-i-malware-hanno-fatto-festa-insieme/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T16:09:41+02:00</news:publication_date>
      <news:title>Claude Code: il codice sorgente è fuori, e i malware hanno fatto festa insieme></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-33.jpg</image:loc>
      <image:caption>visualizzato il logo di claude code e sullo sfondo del codice sorgente</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/500-mb-di-passaporti-italiani-gratis-online-cosa-ce-dietro-il-leak-di-anonymous/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T11:28:44+02:00</news:publication_date>
      <news:title>500 MB di Passaporti italiani gratis online: cosa c’è dietro il leak di Anonymous></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-38.jpg</image:loc>
      <image:caption>Un uomo tiene in mano un passaporto mentre accanto c&#039;è un hacker di anonymous. Copre lo sfondo la bandiera italiana.Un uomo tiene in mano un passaporto mentre accanto c&#039;è un hacker di anonymous. Copre lo sfondo la bandiera italiana.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/leak-bazaar-quando-il-dato-rubato-smette-di-essere-un-problema-e-diventa-un-prodotto/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T09:29:33+02:00</news:publication_date>
      <news:title>Leak Bazaar: quando il dato rubato smette di essere un problema e diventa un prodotto></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2025/09/hacker-italia-database-1.jpg</image:loc>
      <image:caption>Leak Bazaar: quando il dato rubato smette di essere un problema e diventa un prodotto</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/liran-colpisce-il-cloud-i-datacenter-di-oracle-e-amazon-colpiti-dalla-guardia-rivoluzionaria/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T08:22:36+02:00</news:publication_date>
      <news:title>L’Iran punta al cloud! I Datacenter di Oracle e Amazon colpiti dalla guardia rivoluzionaria></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-31.jpg</image:loc>
      <image:caption>una immagine di un messaggio diffuso dalle guardie rivoluzionarie iraniane che mostra l&#039;attacco ai datacenter di Oracle</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/cavo-sottomarino-danneggiato-a-matsu-sospetti-su-una-nave-cinese-taipei-indaga/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T07:43:47+02:00</news:publication_date>
      <news:title>Cavo sottomarino danneggiato a Matsu: sospetti su una nave cinese: Taipei indaga></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2025/11/image-55.jpg</image:loc>
      <image:caption>Cavo sottomarino danneggiato a Matsu: sospetti su una nave cinese: Taipei indaga</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/attacco-alla-commissione-europea-la-violazione-per-il-furto-di-un-account-aws/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T21:20:30+02:00</news:publication_date>
      <news:title>Attacco alla Commissione europea: violazione per il furto di un account AWS></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-28.jpg</image:loc>
      <image:caption>Attacco alla Commissione europea: violazione per il furto di un account AWS</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/32-000-dati-sensibili-della-pa-italiana-sono-gratis-nel-dark-web/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T17:27:16+02:00</news:publication_date>
      <news:title>32.000 dati sensibili della PA italiana sono &#8220;gratis&#8221; nel dark web></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-26.jpg</image:loc>
      <image:caption>Un hacker con la felpa e il cappuccio e gli occhiali da sole ha un database in mano e sorride.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/google-rattoppa-nuovamente-chrome-dopo-che-gli-hacker-erano-gia-entrati/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T12:57:46+02:00</news:publication_date>
      <news:title>Google rattoppa nuovamente Chrome dopo che gli hacker erano già entrati></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-22.jpg</image:loc>
      <image:caption>il logo di google chrome ricoperto di mosche che stanno succhiando il logo come fosse del miele.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/sembra-google-play-ma-non-lo-e-cosa-succede-davvero-dopo-il-clic/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T12:25:15+02:00</news:publication_date>
      <news:title>Sembra Google Play, ma non lo è! E cosa succede davvero dopo il clic?></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-21.jpg</image:loc>
      <image:caption>Un uomo clicca su un Play Store che non sembra essere quello ufficiale</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/cybersecurity-in-italia-italiani-sempre-piu-online-ma-sempre-meno-protetti/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T10:09:26+02:00</news:publication_date>
      <news:title>Cybersecurity in Italia: italiani sempre più online ma sempre meno protetti. L&#8217;analisi di Europ Assistance Italia></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2024/10/image-200.jpg</image:loc>
      <image:caption>Cybersecurity in Italia: italiani sempre più online ma sempre meno protetti. L&#8217;analisi di Europ Assistance Italia</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/non-e-il-cloud-non-sono-gli-hacker-e-litalia-che-vuole-essere-fragile-nel-cyberspazio/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T09:17:27+02:00</news:publication_date>
      <news:title>Non è il cloud, non sono gli hacker: è l’Italia che vuole essere fragile nel cyberspazio></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/03/17724866841828800235642530519929.jpg</image:loc>
      <image:caption>Non è il cloud, non sono gli hacker: è l’Italia che vuole essere fragile nel cyberspazio</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/vulnerabilita-critica-cisco-imc-accesso-admin-senza-autenticazione/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T07:55:27+02:00</news:publication_date>
      <news:title>Vulnerabilità critica Cisco IMC: accesso admin senza autenticazione></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2025/03/cisco-network.jpg</image:loc>
      <image:caption>Vulnerabilità critica Cisco IMC: accesso admin senza autenticazione</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/le-tue-api-stanno-gia-esponendo-dati-sensibili-senza-che-tu-lo-sappia/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T07:24:23+02:00</news:publication_date>
      <news:title>Le tue API stanno già esponendo dati sensibili senza che tu lo sappia?></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/03/image-285.jpg</image:loc>
      <image:caption>L&#039;imperatore Adriano e un datacenter</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/la-tua-smart-tv-sta-partecipando-al-piu-grande-attacco-informatico-di-sempre-lo-sai/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-02T07:12:13+02:00</news:publication_date>
      <news:title>La tua smart TV sta partecipando al più grande attacco informatico di sempre. Lo sai?></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/03/image-277.jpg</image:loc>
      <image:caption>Una Smart TV con espressione minacciosa nel soggiorno di una abitazione</image:caption>
    </image:image>
  </url>
</urlset>