<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
  <url>
    <loc>https://www.redhotcyber.com/post/venezia-sotto-tiro-600-per-laccesso-al-sistema-anti-allagamento-della-basilica-di-san-marco/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T10:32:34+02:00</news:publication_date>
      <news:title>Venezia sotto tiro: 600$ per l&#8217;accesso al sistema anti allagamento della Basilica di San Marco></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-75.jpg</image:loc>
      <image:caption>Venezia sotto tiro: 600$ per l&#8217;accesso al sistema anti allagamento della Basilica di San Marco</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/ed-e-quantum-shock-bastano-meno-qubit-per-violare-la-crittografia-ecc/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T07:10:12+02:00</news:publication_date>
      <news:title>Ed è Quantum shock! Bastano meno qubit per violare la crittografia ECC></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-72.jpg</image:loc>
      <image:caption>Ed è Quantum shock! Bastano meno qubit per violare la crittografia ECC</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/windows-sotto-attacco-lexploit-zero-day-bluehammer-e-su-github/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T07:08:11+02:00</news:publication_date>
      <news:title>Windows sotto attacco: l&#8217;exploit zero-day “BlueHammer” è su GitHub></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-70.jpg</image:loc>
      <image:caption>Windows sotto attacco: l&#8217;exploit zero-day “BlueHammer” è su GitHub</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/lidentita-di-satoshi-nakamoto-linventore-del-bitcoin-e-stata-svelata-e-stato-adam-back/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T20:42:05+02:00</news:publication_date>
      <news:title>L&#8217;identità di Satoshi Nakamoto, l&#8217;inventore del Bitcoin è stata svelata? È Adam Back?></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-68.jpg</image:loc>
      <image:caption>L&#8217;identità di Satoshi Nakamoto, l&#8217;inventore del Bitcoin è stata svelata? È Adam Back?</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/il-caso-del-direttore-dellfbi-kash-patel-anatomia-di-unesposizione-prevedibile/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T15:36:38+02:00</news:publication_date>
      <news:title>Il caso del direttore dell&#8217;FBI Kash Patel: anatomia di un’esposizione prevedibile></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/FBI-Kash-Patel.jpg</image:loc>
      <image:caption>Il caso del direttore dell&#8217;FBI Kash Patel: anatomia di un’esposizione prevedibile</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/sviluppo-cognitivo-anche-la-grecia-vieta-i-social-network-ai-minori-di-15-anni/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T12:34:14+02:00</news:publication_date>
      <news:title>Sviluppo Cognitivo: Anche la Grecia vieta i social network ai minori di 15 anni></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-67.jpg</image:loc>
      <image:caption>Sviluppo Cognitivo: Anche la Grecia vieta i social network ai minori di 15 anni</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/hai-creato-il-tuo-chatbot-fai-attenzione-perche-i-bug-sono-ad-un-passo-dagli-hacker-cattivi/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T12:03:25+02:00</news:publication_date>
      <news:title>Hai creato il tuo chatbot? Fai attenzione perché i bug sono ad un passo dagli hacker cattivi></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-66.jpg</image:loc>
      <image:caption>Hai creato il tuo chatbot? Fai attenzione perché i bug sono ad un passo dagli hacker cattivi</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/maven-e-ai-nella-guerra-moderna-chi-paghera-per-luccisione-di-civili-innocenti/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T10:24:12+02:00</news:publication_date>
      <news:title>Maven e AI nella guerra moderna: Chi pagherà per l&#8217;uccisione di civili innocenti?></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-64.jpg</image:loc>
      <image:caption>Maven e AI nella guerra moderna: Chi pagherà per l&#8217;uccisione di civili innocenti?</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/minacce-informatiche-2025-cisco-talos-analizza-levoluzione-del-panorama-cyber/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T08:55:42+02:00</news:publication_date>
      <news:title>Minacce informatiche 2025: Cisco Talos analizza l&#8217;evoluzione del panorama cyber></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2025/11/image-79.jpg</image:loc>
      <image:caption>Minacce informatiche 2025: Cisco Talos analizza l&#8217;evoluzione del panorama cyber</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/quantum-computing-la-crittografia-sta-per-crollare-allora-il-cloud-si-sposta-nello-spazio/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T06:57:35+02:00</news:publication_date>
      <news:title>Quantum computing: La crittografia sta per crollare? Allora il Cloud si sposta nello spazio></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-60.jpg</image:loc>
      <image:caption>Quantum computing: La crittografia sta per crollare? Allora il Cloud si sposta nello spazio</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/smart-tv-sotto-accusa-i-broadcaster-ue-chiedono-nuove-regole/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T06:55:03+02:00</news:publication_date>
      <news:title>Smart TV sotto accusa: i broadcaster UE chiedono nuove regole></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-53.jpg</image:loc>
      <image:caption>Smart TV sotto accusa: i broadcaster UE chiedono nuove regole</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/google-corregge-una-falla-critica-su-android-che-porta-a-dos-senza-alcuna-azione/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T16:46:52+02:00</news:publication_date>
      <news:title>Google corregge una falla critica su Android che porta a DoS senza alcuna azione></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-63.jpg</image:loc>
      <image:caption>uno smartphone con installato google android viene attaccato da malware e da hacker criminali</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/vpn-sotto-attacco-un-bug-espone-il-vero-ip-degli-utenti-a-loro-insaputa/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T15:06:56+02:00</news:publication_date>
      <news:title>VPN sotto attacco: un bug espone il vero IP degli utenti a loro insaputa></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-62.jpg</image:loc>
      <image:caption>VPN sotto attacco: un bug espone il vero IP degli utenti a loro insaputa</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/hasbro-sotto-attacco-hacker-settimane-di-caos-per-il-colosso-dei-giocattoli/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T14:27:52+02:00</news:publication_date>
      <news:title>Hasbro sotto attacco hacker: settimane di caos per il colosso dei giocattoli></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-57.jpg</image:loc>
      <image:caption>Hasbro sotto attacco hacker: settimane di caos per il colosso dei giocattoli</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/microsoft-scarica-lai-copilot-e-solo-per-intrattenimento-cosa-sta-succedendo/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T11:11:24+02:00</news:publication_date>
      <news:title>Microsoft scarica l’AI: Copilot è “solo per intrattenimento”. Cosa sta succedendo?></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2025/09/microsoft-cloud-dark-2.jpg</image:loc>
      <image:caption>Microsoft scarica l’AI: Copilot è “solo per intrattenimento”. Cosa sta succedendo?</image:caption>
    </image:image>
  </url>
</urlset>