<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
  <url>
    <loc>https://www.redhotcyber.com/post/una-patch-di-windows-introduce-un-nuovo-bug-credenziali-rubate-tramite-esplora-file/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T15:12:27+02:00</news:publication_date>
      <news:title>Una patch di Windows introduce un nuovo bug: credenziali rubate tramite Esplora File></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-230.jpg</image:loc>
      <image:caption>Una patch di Windows introduce un nuovo bug: credenziali rubate tramite Esplora File</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/arriva-la-bixonimania-la-malattia-fake-che-ha-ingannato-ai-scienza-e-utenti/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T14:29:46+02:00</news:publication_date>
      <news:title>Arriva la BIXONIMANIA! E se la prossima pandemia venga creata dalle AI?></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-229.jpg</image:loc>
      <image:caption>Arriva la BIXONIMANIA! E se la prossima pandemia venga creata dalle AI?</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/app-ue-per-verificare-leta-hackerata-in-pochi-minuti-scoppia-il-caso-sicurezza/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T12:36:23+02:00</news:publication_date>
      <news:title>App UE per verificare l’età: hackerata in pochi minuti, scoppia il caso sicurezza></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-197.jpg</image:loc>
      <image:caption>App UE per verificare l’età: hackerata in pochi minuti, scoppia il caso sicurezza</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/en/post/diary-of-a-threat-actor-from-ghost-of-the-web-to-unmasked-man/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T11:37:47+02:00</news:publication_date>
      <news:title>Diary of a Threat Actor: from Ghost of the Web to Unmasked Man></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/GhostExodus-Diary-of-a-Threat-Actor-Book.jpg</image:loc>
      <image:caption>Diary of a Threat Actor: from Ghost of the Web to Unmasked Man</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/diary-of-a-threat-actor-da-fantasma-della-rete-a-uomo-senza-maschera/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T11:37:18+02:00</news:publication_date>
      <news:title>Diary of a Threat Actor: da fantasma della rete a uomo senza maschera></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/GhostExodus-Diary-of-a-Threat-Actor-Book.jpg</image:loc>
      <image:caption>Diary of a Threat Actor: da fantasma della rete a uomo senza maschera</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/la-sicurezza-dellaes-128-non-sara-compromessa-dai-computer-quantistici/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T07:55:30+02:00</news:publication_date>
      <news:title>AES-128 sotto attacco con il quantum computing? La risposta degli esperti sorprende></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2025/04/image-27.jpg</image:loc>
      <image:caption>AES-128 sotto attacco con il quantum computing? La risposta degli esperti sorprende</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/onecritto-il-password-manager-italiano-che-elimina-il-cloud-e-i-suoi-rischi/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T07:10:54+02:00</news:publication_date>
      <news:title>OneCritto: il password manager italiano che elimina il cloud (e i suoi rischi)></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-207.jpg</image:loc>
      <image:caption>OneCritto: il password manager italiano che elimina il cloud (e i suoi rischi)</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/deepseek-contro-le-ai-statunitensi-tra-closed-e-open-source-geopolitica-e-sorveglianza/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T07:02:18+02:00</news:publication_date>
      <news:title>DeepSeek contro le AI Statunitensi! Tra closed e open source, geopolitica e sorveglianza></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-226.jpg</image:loc>
      <image:caption>DeepSeek contro le AI Statunitensi! Tra closed e open source, geopolitica e sorveglianza</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/dicevamo-che-rust-era-piu-sicuro-di-c-trovati-113-bug-nelle-utility-di-ubuntu/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-26T08:59:04+02:00</news:publication_date>
      <news:title>Dicevamo che Rust era più sicuro di C++? Trovati 113 bug nelle utility di Ubuntu></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-222.jpg</image:loc>
      <image:caption>Dicevamo che Rust era più sicuro di C++? Trovati 113 bug nelle utility di Ubuntu</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/openai-chiude-laccesso-ai-suoi-modelli-cyber-ai-piu-avanzati-cosa-sta-succedendo/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T22:22:00+02:00</news:publication_date>
      <news:title>OpenAI chiude l’accesso ai suoi modelli cyber AI più avanzati: cosa sta succedendo?></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/03/image-98.jpg</image:loc>
      <image:caption>OpenAI chiude l’accesso ai suoi modelli cyber AI più avanzati: cosa sta succedendo?</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/neuroni-vivi-addestrati-come-unai-la-nuova-frontiera-del-calcolo-e-biologica/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T22:22:00+02:00</news:publication_date>
      <news:title>Neuroni vivi addestrati come un’AI: la nuova frontiera del calcolo è biologica></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-56.jpg</image:loc>
      <image:caption>Neuroni vivi addestrati come un’AI: la nuova frontiera del calcolo è biologica</image:caption>
    </image:image>
  </url>
</urlset>