<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
  <url>
    <loc>https://www.redhotcyber.com/post/app-ue-per-verificare-leta-hackerata-in-pochi-minuti-scoppia-il-caso-sicurezza/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T12:36:23+02:00</news:publication_date>
      <news:title>App UE per verificare l’età: hackerata in pochi minuti, scoppia il caso sicurezza></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-197.jpg</image:loc>
      <image:caption>App UE per verificare l’età: hackerata in pochi minuti, scoppia il caso sicurezza</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/en/post/diary-of-a-threat-actor-from-ghost-of-the-web-to-unmasked-man/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T11:37:47+02:00</news:publication_date>
      <news:title>Diary of a Threat Actor: from Ghost of the Web to Unmasked Man></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/GhostExodus-Diary-of-a-Threat-Actor-Book.jpg</image:loc>
      <image:caption>Diary of a Threat Actor: from Ghost of the Web to Unmasked Man</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/diary-of-a-threat-actor-da-fantasma-della-rete-a-uomo-senza-maschera/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T11:37:18+02:00</news:publication_date>
      <news:title>Diary of a Threat Actor: da fantasma della rete a uomo senza maschera></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/GhostExodus-Diary-of-a-Threat-Actor-Book.jpg</image:loc>
      <image:caption>Diary of a Threat Actor: da fantasma della rete a uomo senza maschera</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/la-sicurezza-dellaes-128-non-sara-compromessa-dai-computer-quantistici/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T07:55:30+02:00</news:publication_date>
      <news:title>AES-128 sotto attacco con il quantum computing? La risposta degli esperti sorprende></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2025/04/image-27.jpg</image:loc>
      <image:caption>AES-128 sotto attacco con il quantum computing? La risposta degli esperti sorprende</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/onecritto-il-password-manager-italiano-che-elimina-il-cloud-e-i-suoi-rischi/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T07:10:54+02:00</news:publication_date>
      <news:title>OneCritto: il password manager italiano che elimina il cloud (e i suoi rischi)></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-207.jpg</image:loc>
      <image:caption>OneCritto: il password manager italiano che elimina il cloud (e i suoi rischi)</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/deepseek-contro-le-ai-statunitensi-tra-closed-e-open-source-geopolitica-e-sorveglianza/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-27T07:02:18+02:00</news:publication_date>
      <news:title>DeepSeek contro le AI Statunitensi! Tra closed e open source, geopolitica e sorveglianza></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-226.jpg</image:loc>
      <image:caption>DeepSeek contro le AI Statunitensi! Tra closed e open source, geopolitica e sorveglianza</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/dicevamo-che-rust-era-piu-sicuro-di-c-trovati-113-bug-nelle-utility-di-ubuntu/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-26T08:59:04+02:00</news:publication_date>
      <news:title>Dicevamo che Rust era più sicuro di C++? Trovati 113 bug nelle utility di Ubuntu></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-222.jpg</image:loc>
      <image:caption>Dicevamo che Rust era più sicuro di C++? Trovati 113 bug nelle utility di Ubuntu</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/openai-chiude-laccesso-ai-suoi-modelli-cyber-ai-piu-avanzati-cosa-sta-succedendo/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T22:22:00+02:00</news:publication_date>
      <news:title>OpenAI chiude l’accesso ai suoi modelli cyber AI più avanzati: cosa sta succedendo?></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/03/image-98.jpg</image:loc>
      <image:caption>OpenAI chiude l’accesso ai suoi modelli cyber AI più avanzati: cosa sta succedendo?</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/neuroni-vivi-addestrati-come-unai-la-nuova-frontiera-del-calcolo-e-biologica/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T22:22:00+02:00</news:publication_date>
      <news:title>Neuroni vivi addestrati come un’AI: la nuova frontiera del calcolo è biologica></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-56.jpg</image:loc>
      <image:caption>Neuroni vivi addestrati come un’AI: la nuova frontiera del calcolo è biologica</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/la-guerra-degli-0day-e-iniziata-lia-cinese-scopre-1-000-bug-su-microsoft-e-openclaw/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T19:32:50+02:00</news:publication_date>
      <news:title>La Guerra degli 0day è iniziata! l’IA cinese scopre 1.000 bug su Microsoft e OpenClaw></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-221.jpg</image:loc>
      <image:caption>La Guerra degli 0day è iniziata! l’IA cinese scopre 1.000 bug su Microsoft e OpenClaw</image:caption>
    </image:image>
  </url>
</urlset>