<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
  <url>
    <loc>https://www.redhotcyber.com/post/data-center-al-limite-arriveranno-i-nuovi-chip-che-tagliano-i-consumi-delle-gpu-del-96/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T15:20:26+02:00</news:publication_date>
      <news:title>Data Center al limite? Arriveranno i nuovi chip che tagliano i consumi delle GPU del 96%></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-81.jpg</image:loc>
      <image:caption>Data Center al limite? Arriveranno i nuovi chip che tagliano i consumi delle GPU del 96%</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/2149-break-the-sphere-la-ctf-di-rhc-hack-the-box-allinterno-della-rhc-conference/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T10:42:17+02:00</news:publication_date>
      <news:title>2149 BREAK THE SPHERE! La CTF di RHC &amp; Hack The Box all&#8217;interno della RHC Conference></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/rhc-conference-2026-capture-the-flag.jpg</image:loc>
      <image:caption>2149 BREAK THE SPHERE! La CTF di RHC &amp; Hack The Box all&#8217;interno della RHC Conference</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/cane-guida-per-non-vedenti-questa-e-lai-che-vogliamo-non-quella-che-genera-morte/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T09:16:06+02:00</news:publication_date>
      <news:title>Cane guida per non vedenti! Questa è l&#8217;AI che vogliamo, non quella che genera morte></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-82.jpg</image:loc>
      <image:caption>Cane guida per non vedenti! Questa è l&#8217;AI che vogliamo, non quella che genera morte</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/e-se-la-tua-ai-aziendale-stesse-gia-esponendo-dati-senza-che-tu-lo-sappia/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-10T07:45:50+02:00</news:publication_date>
      <news:title>E se la tua AI aziendale stesse già esponendo dati senza che tu lo sappia?></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-80.jpg</image:loc>
      <image:caption>E se la tua AI aziendale stesse già esponendo dati senza che tu lo sappia?</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/irlid-il-nuovo-sistema-che-verifica-con-una-stretta-di-mano-se-sei-un-essere-umano/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T22:22:00+02:00</news:publication_date>
      <news:title>IRLid: il nuovo sistema che verifica con una &#8220;stretta di mano&#8221; se sei un essere umano></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-51.jpg</image:loc>
      <image:caption>IRLid</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/copiare-2-0-cosi-gli-occhiali-intelligenti-stanno-rivoluzionando-e-falsando-gli-esami/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T22:22:00+02:00</news:publication_date>
      <news:title>Copiare 2.0: così gli occhiali intelligenti stanno rivoluzionando (e falsando) gli esami></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/17753699436612622006799187207930.jpg</image:loc>
      <image:caption>Copiare 2.0: così gli occhiali intelligenti stanno rivoluzionando (e falsando) gli esami</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/bug-bounty-in-crisi-per-colpa-delle-ai-che-trova-bug-a-raffica-ma-chi-li-sistema/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T15:57:04+02:00</news:publication_date>
      <news:title>Bug bounty in crisi per colpa delle AI che trova bug a raffica… ma chi li sistema?></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2025/10/image-18.jpg</image:loc>
      <image:caption>Bug bounty in crisi per colpa delle AI che trova bug a raffica… ma chi li sistema?</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/frodi-digitali-fuori-controllo-meno-carte-rubate-ma-attacchi-piu-letali/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T14:42:12+02:00</news:publication_date>
      <news:title>Frodi digitali fuori controllo: meno carte rubate, ma attacchi più letali></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2025/08/carte-di-credito.jpg</image:loc>
      <image:caption>Frodi digitali fuori controllo: meno carte rubate, ma attacchi più letali</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/venezia-sotto-tiro-600-per-laccesso-al-sistema-anti-allagamento-della-basilica-di-san-marco/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T10:32:34+02:00</news:publication_date>
      <news:title>Venezia sotto tiro: 600$ per l&#8217;accesso al sistema anti allagamento della Basilica di San Marco></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-75.jpg</image:loc>
      <image:caption>Venezia sotto tiro: 600$ per l&#8217;accesso al sistema anti allagamento della Basilica di San Marco</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/ed-e-quantum-shock-bastano-meno-qubit-per-violare-la-crittografia-ecc/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T07:10:12+02:00</news:publication_date>
      <news:title>Ed è Quantum shock! Bastano meno qubit per violare la crittografia ECC></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-72.jpg</image:loc>
      <image:caption>Ed è Quantum shock! Bastano meno qubit per violare la crittografia ECC</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/windows-sotto-attacco-lexploit-zero-day-bluehammer-e-su-github/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-09T07:08:11+02:00</news:publication_date>
      <news:title>Windows sotto attacco: l&#8217;exploit zero-day “BlueHammer” è su GitHub></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-70.jpg</image:loc>
      <image:caption>Windows sotto attacco: l&#8217;exploit zero-day “BlueHammer” è su GitHub</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/lidentita-di-satoshi-nakamoto-linventore-del-bitcoin-e-stata-svelata-e-stato-adam-back/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T20:42:05+02:00</news:publication_date>
      <news:title>L&#8217;identità di Satoshi Nakamoto, l&#8217;inventore del Bitcoin è stata svelata? È Adam Back?></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-68.jpg</image:loc>
      <image:caption>L&#8217;identità di Satoshi Nakamoto, l&#8217;inventore del Bitcoin è stata svelata? È Adam Back?</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/il-caso-del-direttore-dellfbi-kash-patel-anatomia-di-unesposizione-prevedibile/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-08T15:36:38+02:00</news:publication_date>
      <news:title>Il caso del direttore dell&#8217;FBI Kash Patel: anatomia di un’esposizione prevedibile></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/FBI-Kash-Patel.jpg</image:loc>
      <image:caption>Il caso del direttore dell&#8217;FBI Kash Patel: anatomia di un’esposizione prevedibile</image:caption>
    </image:image>
  </url>
</urlset>