<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
  <url>
    <loc>https://www.redhotcyber.com/post/bug-bounty-in-crisi-per-colpa-delle-ai-che-trova-bug-a-raffica-ma-chi-li-sistema/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T15:57:04+02:00</news:publication_date>
      <news:title>Bug bounty in crisi per colpa delle AI che trova bug a raffica… ma chi li sistema?></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2025/10/image-18.jpg</image:loc>
      <image:caption>Bug bounty in crisi per colpa delle AI che trova bug a raffica… ma chi li sistema?</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/frodi-digitali-fuori-controllo-meno-carte-rubate-ma-attacchi-piu-letali/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T14:42:12+02:00</news:publication_date>
      <news:title>Frodi digitali fuori controllo: meno carte rubate, ma attacchi più letali></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2025/08/carte-di-credito.jpg</image:loc>
      <image:caption>Frodi digitali fuori controllo: meno carte rubate, ma attacchi più letali</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/venezia-sotto-tiro-600-per-laccesso-al-sistema-anti-allagamento-della-basilica-di-san-marco/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T10:32:34+02:00</news:publication_date>
      <news:title>Venezia sotto tiro: 600$ per l&#8217;accesso al sistema anti allagamento della Basilica di San Marco></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-75.jpg</image:loc>
      <image:caption>Venezia sotto tiro: 600$ per l&#8217;accesso al sistema anti allagamento della Basilica di San Marco</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/ed-e-quantum-shock-bastano-meno-qubit-per-violare-la-crittografia-ecc/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T07:10:12+02:00</news:publication_date>
      <news:title>Ed è Quantum shock! Bastano meno qubit per violare la crittografia ECC></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-72.jpg</image:loc>
      <image:caption>Ed è Quantum shock! Bastano meno qubit per violare la crittografia ECC</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/windows-sotto-attacco-lexploit-zero-day-bluehammer-e-su-github/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T07:08:11+02:00</news:publication_date>
      <news:title>Windows sotto attacco: l&#8217;exploit zero-day “BlueHammer” è su GitHub></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-70.jpg</image:loc>
      <image:caption>Windows sotto attacco: l&#8217;exploit zero-day “BlueHammer” è su GitHub</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/lidentita-di-satoshi-nakamoto-linventore-del-bitcoin-e-stata-svelata-e-stato-adam-back/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T20:42:05+02:00</news:publication_date>
      <news:title>L&#8217;identità di Satoshi Nakamoto, l&#8217;inventore del Bitcoin è stata svelata? È Adam Back?></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-68.jpg</image:loc>
      <image:caption>L&#8217;identità di Satoshi Nakamoto, l&#8217;inventore del Bitcoin è stata svelata? È Adam Back?</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/il-caso-del-direttore-dellfbi-kash-patel-anatomia-di-unesposizione-prevedibile/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T15:36:38+02:00</news:publication_date>
      <news:title>Il caso del direttore dell&#8217;FBI Kash Patel: anatomia di un’esposizione prevedibile></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/FBI-Kash-Patel.jpg</image:loc>
      <image:caption>Il caso del direttore dell&#8217;FBI Kash Patel: anatomia di un’esposizione prevedibile</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/sviluppo-cognitivo-anche-la-grecia-vieta-i-social-network-ai-minori-di-15-anni/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T12:34:14+02:00</news:publication_date>
      <news:title>Sviluppo Cognitivo: Anche la Grecia vieta i social network ai minori di 15 anni></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-67.jpg</image:loc>
      <image:caption>Sviluppo Cognitivo: Anche la Grecia vieta i social network ai minori di 15 anni</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/hai-creato-il-tuo-chatbot-fai-attenzione-perche-i-bug-sono-ad-un-passo-dagli-hacker-cattivi/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T12:03:25+02:00</news:publication_date>
      <news:title>Hai creato il tuo chatbot? Fai attenzione perché i bug sono ad un passo dagli hacker cattivi></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-66.jpg</image:loc>
      <image:caption>Hai creato il tuo chatbot? Fai attenzione perché i bug sono ad un passo dagli hacker cattivi</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/maven-e-ai-nella-guerra-moderna-chi-paghera-per-luccisione-di-civili-innocenti/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T10:24:12+02:00</news:publication_date>
      <news:title>Maven e AI nella guerra moderna: Chi pagherà per l&#8217;uccisione di civili innocenti?></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-64.jpg</image:loc>
      <image:caption>Maven e AI nella guerra moderna: Chi pagherà per l&#8217;uccisione di civili innocenti?</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/minacce-informatiche-2025-cisco-talos-analizza-levoluzione-del-panorama-cyber/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T08:55:42+02:00</news:publication_date>
      <news:title>Minacce informatiche 2025: Cisco Talos analizza l&#8217;evoluzione del panorama cyber></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2025/11/image-79.jpg</image:loc>
      <image:caption>Minacce informatiche 2025: Cisco Talos analizza l&#8217;evoluzione del panorama cyber</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/quantum-computing-la-crittografia-sta-per-crollare-allora-il-cloud-si-sposta-nello-spazio/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T06:57:35+02:00</news:publication_date>
      <news:title>Quantum computing: La crittografia sta per crollare? Allora il Cloud si sposta nello spazio></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-60.jpg</image:loc>
      <image:caption>Quantum computing: La crittografia sta per crollare? Allora il Cloud si sposta nello spazio</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/smart-tv-sotto-accusa-i-broadcaster-ue-chiedono-nuove-regole/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T06:55:03+02:00</news:publication_date>
      <news:title>Smart TV sotto accusa: i broadcaster UE chiedono nuove regole></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-53.jpg</image:loc>
      <image:caption>Smart TV sotto accusa: i broadcaster UE chiedono nuove regole</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/google-corregge-una-falla-critica-su-android-che-porta-a-dos-senza-alcuna-azione/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T16:46:52+02:00</news:publication_date>
      <news:title>Google corregge una falla critica su Android che porta a DoS senza alcuna azione></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-63.jpg</image:loc>
      <image:caption>uno smartphone con installato google android viene attaccato da malware e da hacker criminali</image:caption>
    </image:image>
  </url>
</urlset>