<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
  <url>
    <loc>https://www.redhotcyber.com/post/e-se-zionsiphon-riuscisse-davvero-ad-avvelenare-le-acque-di-israele/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T15:09:54+02:00</news:publication_date>
      <news:title>E se ZionSiphon riuscisse davvero ad avvelenare le acque di Israele?></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-189.jpg</image:loc>
      <image:caption>E se ZionSiphon riuscisse davvero ad avvelenare le acque di Israele?</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/truffe-booking-ora-gli-hacker-conoscono-i-dettagli-del-tuo-viaggio/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T14:56:40+02:00</news:publication_date>
      <news:title>Al via le Truffe Booking: ora gli hacker conoscono i dettagli dei tuoi viaggi></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-188.jpg</image:loc>
      <image:caption>Al via le Truffe Booking: ora gli hacker conoscono i dettagli dei tuoi viaggi</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/vuoi-passare-lo-stretto-di-hormuz-nessun-problema-paga-in-bitcoin/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T11:33:13+02:00</news:publication_date>
      <news:title>Vuoi passare lo Stretto di Hormuz? Nessun problema, paga in Bitcoin!></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-186.jpg</image:loc>
      <image:caption>Vuoi passare lo Stretto di Hormuz? Nessun problema, paga in Bitcoin!</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/mythos-il-modello-ai-piu-potente-e-stato-violato-in-pochi-giorni/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T08:01:38+02:00</news:publication_date>
      <news:title>Mythos, il modello AI più potente, è stato violato in pochi giorni></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-187.jpg</image:loc>
      <image:caption>Mythos, il modello AI più potente, è stato violato in pochi giorni</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/lunaspy-quando-i-criminali-ti-regalano-uno-smartphone-con-trojan-integrato/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T07:22:53+02:00</news:publication_date>
      <news:title>LunaSpy: quando i criminali ti regalano uno smartphone con Trojan integrato></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-174.jpg</image:loc>
      <image:caption>LunaSpy: quando i criminali ti regalano uno smartphone con Trojan integrato</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/firewall-antivirus-no-il-problema-sei-tu-dopo-8-ore-di-lavoro/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-22T07:16:31+02:00</news:publication_date>
      <news:title>Firewall? Antivirus? No, il problema sei tu dopo 8 ore di lavoro></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-158.jpg</image:loc>
      <image:caption>Firewall? Antivirus? No, il problema sei tu dopo 8 ore di lavoro</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/zero-day-su-microsoft-defender-senza-patch-exploit-pubblici-usati-in-attacchi-reali/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T18:09:58+02:00</news:publication_date>
      <news:title>Zero-day su Microsoft Defender senza patch: exploit pubblici usati in attacchi reali></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-182.jpg</image:loc>
      <image:caption>Zero-day su Microsoft Defender senza patch: exploit pubblici usati in attacchi reali</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/lo-zero-trust-era-gia-tutto-scritto-2000-anni-fa/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T15:41:53+02:00</news:publication_date>
      <news:title>Lo Zero Trust? Era già tutto scritto 2000 anni fa></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-156.jpg</image:loc>
      <image:caption>Lo Zero Trust? Era già tutto scritto 2000 anni fa</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/ai-in-italia-adozione-da-record-ma-la-governance-resta-pericolosamente-indietro/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T10:50:03+02:00</news:publication_date>
      <news:title>AI in Italia: adozione da record ma la governance resta pericolosamente indietro></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-180.jpg</image:loc>
      <image:caption>AI in Italia: adozione da record ma la governance resta pericolosamente indietro</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/mozilla-cambia-il-bug-bounty-per-firefox-solo-bug-critici-e-ben-documentati/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T09:34:54+02:00</news:publication_date>
      <news:title>Mozilla cambia il bug bounty per Firefox: solo bug critici e ben documentati></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-177.jpg</image:loc>
      <image:caption>Mozilla cambia il bug bounty per Firefox: solo bug critici e ben documentati</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/nis-2-e-cybersecurity-perche-il-cda-non-puo-piu-ignorare-il-ciso/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T07:55:52+02:00</news:publication_date>
      <news:title>NIS 2 e cybersecurity: perché il CdA non può più ignorare il CISO></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-152.jpg</image:loc>
      <image:caption>NIS 2 e cybersecurity: perché il CdA non può più ignorare il CISO</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/lanello-debole-della-sicurezza-luomo-e-la-manipolazione-ai/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T07:25:49+02:00</news:publication_date>
      <news:title>Zero EDR. Zero Firewall. Zero&#8230; Trust. L’unico punto debole sei tu!></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-136.jpg</image:loc>
      <image:caption>Zero EDR. Zero Firewall. Zero&#8230; Trust. L’unico punto debole sei tu!</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/il-caso-claude-mythos-di-anthropic-ha-trovato-davvero-migliaia-di-vulnerabilita/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-21T07:09:31+02:00</news:publication_date>
      <news:title>Il Caso Claude Mythos di Anthropic. Ha trovato davvero migliaia di vulnerabilità?></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-33.jpg</image:loc>
      <image:caption>visualizzato il logo di claude code e sullo sfondo del codice sorgente</image:caption>
    </image:image>
  </url>
</urlset>