<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
  <url>
    <loc>https://www.redhotcyber.com/post/linux-7-0-cambia-tutto-sicurezza-post-quantistica-e-rust-entrano-nel-kernel/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T16:59:31+02:00</news:publication_date>
      <news:title>Linux 7.0 cambia tutto: sicurezza post-quantistica e Rust entrano nel kernel></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-105.jpg</image:loc>
      <image:caption>Linux 7.0 cambia tutto: sicurezza post-quantistica e Rust entrano nel kernel</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/zeroday-le-armi-cibernetiche-e-il-caso-di-anthropic-glasswing/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T14:00:03+02:00</news:publication_date>
      <news:title>Anthropic limita Mythos: l&#8217;AI che trova zero-day è un vantaggio strategico e fa paura></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-93.jpg</image:loc>
      <image:caption>Anthropic limita Mythos: l&#8217;AI che trova zero-day è un vantaggio strategico e fa paura</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/attacco-alla-basilica-di-san-marco-gli-hacker-sono-ancora-dentro-i-sistemi/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T09:03:16+02:00</news:publication_date>
      <news:title>Attacco alla Basilica di San Marco: gli hacker sostengono che sono ancora dentro i sistemi></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-101.jpg</image:loc>
      <image:caption>Attacco alla Basilica di San Marco: gli hacker sostengono che sono ancora dentro i sistemi</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/botnet-globale-scoperta-in-iran-dopo-un-clamoroso-errore-di-configurazione/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T07:23:22+02:00</news:publication_date>
      <news:title>Botnet globale scoperta in Iran dopo un clamoroso errore di configurazione></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2025/02/image-110.jpg</image:loc>
      <image:caption>Botnet globale scoperta in Iran dopo un clamoroso errore di configurazione</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/addio-sicurezza-per-apple-la-meta-dei-mac-espone-traffico-sospetto/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T07:06:53+02:00</news:publication_date>
      <news:title>Addio sicurezza per Apple: la metà dei Mac espone traffico sospetto></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-74.jpg</image:loc>
      <image:caption>Addio sicurezza per Apple: la metà dei Mac espone traffico sospetto</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/cavi-sottomarini-e-tensioni-con-la-russia-il-regno-unito-avverte-vi-stiamo-osservando/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T17:37:12+02:00</news:publication_date>
      <news:title>Cavi sottomarini e tensioni con la Russia: il Regno Unito avverte “Vi stiamo osservando”></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-97.jpg</image:loc>
      <image:caption>Cavi sottomarini e tensioni con la Russia: il Regno Unito avverte “Vi stiamo osservando”</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/chip-war-la-cina-sfida-loccidente-arriva-il-primo-chip-100-nazionale/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T09:11:15+02:00</news:publication_date>
      <news:title>Chip War: La Cina sfida l’Occidente. Arriva il primo chip 100% nazionale></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-96.jpg</image:loc>
      <image:caption>Chip War: La Cina sfida l’Occidente. Arriva il primo chip 100% nazionale</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/fbi-recupera-messaggi-signal-cancellati-il-bug-nascosto-negli-iphone/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T08:42:09+02:00</news:publication_date>
      <news:title>FBI recupera messaggi Signal cancellati: il “bug” nascosto negli iPhone></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-94.jpg</image:loc>
      <image:caption>FBI recupera messaggi Signal cancellati: il “bug” nascosto negli iPhone</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/23-milioni-di-persone-hanno-scaricato-un-gioco-e-hanno-installato-un-hacker/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T08:18:52+02:00</news:publication_date>
      <news:title>2,3 milioni di persone hanno scaricato un gioco… e hanno installato un hacker></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-40.jpg</image:loc>
      <image:caption>il robot di google android combatte contro i malware</image:caption>
    </image:image>
  </url>
</urlset>