<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
  <url>
    <loc>https://www.redhotcyber.com/post/aggiornamenti-urgenti-per-apache-tomcat-multiple-vulnerabilita-corrette-ad-aprile-2026/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T10:08:32+02:00</news:publication_date>
      <news:title>Aggiornamenti urgenti per Apache Tomcat: multiple vulnerabilità corrette ad aprile 2026></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2025/12/image-68.jpg</image:loc>
      <image:caption>Aggiornamenti urgenti per Apache Tomcat: multiple vulnerabilità corrette ad aprile 2026</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/cyber-guerra-prima-delle-bombe-cosi-liran-ha-preparato-gli-attacchi-in-medio-oriente/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T09:09:47+02:00</news:publication_date>
      <news:title>Cyber guerra prima delle bombe: così l’Iran ha preparato gli attacchi in Medio Oriente></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-106.jpg</image:loc>
      <image:caption>Cyber guerra prima delle bombe: così l’Iran ha preparato gli attacchi in Medio Oriente</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/anthropic-progetto-glasswing-unai-individua-falle-globali-e-viene-subito-bloccata/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T07:16:55+02:00</news:publication_date>
      <news:title>Cybersecurity o arma digitale? Il confine sempre più sottile dell’intelligenza artificiale></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-92.jpg</image:loc>
      <image:caption>Cybersecurity o arma digitale? Il confine sempre più sottile dell’intelligenza artificiale</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/arriva-la-sovranita-industriale-gli-usa-inseguono-la-cina-e-la-partita-si-gioca-sui-dati/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-14T07:07:25+02:00</news:publication_date>
      <news:title>Arriva la Sovranità Industriale: gli USA inseguono la Cina e la partita si gioca sui dati></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/03/image-270.jpg</image:loc>
      <image:caption>Arriva la Sovranità Industriale: gli USA inseguono la Cina e la partita si gioca sui dati</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/linux-7-0-cambia-tutto-sicurezza-post-quantistica-e-rust-entrano-nel-kernel/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T16:59:31+02:00</news:publication_date>
      <news:title>Linux 7.0 cambia tutto: sicurezza post-quantistica e Rust entrano nel kernel></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-105.jpg</image:loc>
      <image:caption>Linux 7.0 cambia tutto: sicurezza post-quantistica e Rust entrano nel kernel</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/zeroday-le-armi-cibernetiche-e-il-caso-di-anthropic-glasswing/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T14:00:03+02:00</news:publication_date>
      <news:title>Anthropic limita Mythos: l&#8217;AI che trova zero-day è un vantaggio strategico e fa paura></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-93.jpg</image:loc>
      <image:caption>Anthropic limita Mythos: l&#8217;AI che trova zero-day è un vantaggio strategico e fa paura</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/attacco-alla-basilica-di-san-marco-gli-hacker-sono-ancora-dentro-i-sistemi/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T09:03:16+02:00</news:publication_date>
      <news:title>Attacco alla Basilica di San Marco: gli hacker sostengono che sono ancora dentro i sistemi></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-101.jpg</image:loc>
      <image:caption>Attacco alla Basilica di San Marco: gli hacker sostengono che sono ancora dentro i sistemi</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/botnet-globale-scoperta-in-iran-dopo-un-clamoroso-errore-di-configurazione/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T07:23:22+02:00</news:publication_date>
      <news:title>Botnet globale scoperta in Iran dopo un clamoroso errore di configurazione></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2025/02/image-110.jpg</image:loc>
      <image:caption>Botnet globale scoperta in Iran dopo un clamoroso errore di configurazione</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/addio-sicurezza-per-apple-la-meta-dei-mac-espone-traffico-sospetto/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-13T07:06:53+02:00</news:publication_date>
      <news:title>Addio sicurezza per Apple: la metà dei Mac espone traffico sospetto></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-74.jpg</image:loc>
      <image:caption>Addio sicurezza per Apple: la metà dei Mac espone traffico sospetto</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/cavi-sottomarini-e-tensioni-con-la-russia-il-regno-unito-avverte-vi-stiamo-osservando/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-12T17:37:12+02:00</news:publication_date>
      <news:title>Cavi sottomarini e tensioni con la Russia: il Regno Unito avverte “Vi stiamo osservando”></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-97.jpg</image:loc>
      <image:caption>Cavi sottomarini e tensioni con la Russia: il Regno Unito avverte “Vi stiamo osservando”</image:caption>
    </image:image>
  </url>
</urlset>