<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
  <url>
    <loc>https://www.redhotcyber.com/post/la-cina-alza-il-livello-arriva-deepseek-v4-e-ricambia-tutto-nellintelligenza-artificiale/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T12:07:19+02:00</news:publication_date>
      <news:title>La Cina alza il livello: arriva DeepSeek V4. E ricambia tutto nell’intelligenza artificiale></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-219.jpg</image:loc>
      <image:caption>La Cina alza il livello: arriva DeepSeek V4. E ricambia tutto nell’intelligenza artificiale</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/e-se-il-tuo-ambiente-di-sviluppo-fosse-gia-compromesso-senza-saperlo/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T09:03:15+02:00</news:publication_date>
      <news:title>E se il tuo ambiente di sviluppo fosse già compromesso senza saperlo?></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-213.jpg</image:loc>
      <image:caption>E se il tuo ambiente di sviluppo fosse già compromesso senza saperlo?</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/palantir-il-libro-del-ceo-alex-karp-e-la-sua-visione-per-la-tecnologia/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-25T08:50:33+02:00</news:publication_date>
      <news:title>Palantir: il libro del CEO Alex Karp e la sua visione per la tecnologia></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/03/image-156.jpg</image:loc>
      <image:caption>Palantir: il libro del CEO Alex Karp e la sua visione per la tecnologia</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/copilot-licenziato-microsoft-cede-ora-puoi-rimuoverlo-ma-non-su-tutti-i-windows/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T21:00:18+02:00</news:publication_date>
      <news:title>Copilot licenziato! Microsoft cede: ora puoi rimuoverlo (ma non su tutti i Windows)></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/01/image-1-1768459503.jpg</image:loc>
      <image:caption>Copilot licenziato! Microsoft cede: ora puoi rimuoverlo (ma non su tutti i Windows)</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/spionaggio-globale-su-rete-mobile-nuovi-fornitori-sfruttano-vecchie-falle-di-sicurezza/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T20:46:31+02:00</news:publication_date>
      <news:title>Spionaggio globale su rete mobile: nuovi fornitori sfruttano vecchie falle di sicurezza></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/file_00000000dbdc72438aef53280b310402.jpg</image:loc>
      <image:caption>Spionaggio globale su rete mobile: nuovi fornitori sfruttano vecchie falle di sicurezza</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/privacy-a-rischio-vulnerabilita-in-firefox-e-tor-browser-permette-il-tracciamento/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T15:52:13+02:00</news:publication_date>
      <news:title>Privacy a rischio: vulnerabilità in Firefox e Tor Browser permette il tracciamento></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-209.jpg</image:loc>
      <image:caption>Privacy a rischio: vulnerabilità in Firefox e Tor Browser permette il tracciamento</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/the-gentlemen-il-nuovo-ransomware-che-sta-crescendo-piu-veloce-di-lockbit/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T11:48:11+02:00</news:publication_date>
      <news:title>The Gentlemen: il nuovo ransomware che sta crescendo più veloce di LockBit></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-206.jpg</image:loc>
      <image:caption>The Gentlemen: il nuovo ransomware che sta crescendo più veloce di LockBit</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/una-fregata-olandese-tracciata-con-un-portachiavi-da-5-euro/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T08:14:17+02:00</news:publication_date>
      <news:title>Una fregata olandese tracciata con un portachiavi da 5 euro!></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-203.jpg</image:loc>
      <image:caption>Una fregata olandese tracciata con un portachiavi da 5 euro!</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/hai-firmato-una-petizione-online-ecco-cosa-puo-succedere-ai-tuoi-dati/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T07:11:20+02:00</news:publication_date>
      <news:title>Hai firmato una petizione online? Ecco cosa può succedere ai tuoi dati></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-185.jpg</image:loc>
      <image:caption>Hai firmato una petizione online? Ecco cosa può succedere ai tuoi dati</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/usa-e-se-un-attacco-ransomware-ad-un-ospedale-fosse-considerato-un-omicidio/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-24T07:04:10+02:00</news:publication_date>
      <news:title>USA: e se un attacco ransomware ad un ospedale fosse considerato un omicidio?></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-194.jpg</image:loc>
      <image:caption>USA: e se un attacco ransomware ad un ospedale fosse considerato un omicidio?</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.redhotcyber.com/post/un-bug-nei-chip-qualcomm-consente-la-compromissione-totale-dei-dispositivi/</loc>
    <news:news>
      <news:publication>
        <news:name>Red Hot Cyber</news:name>
        <news:language>it</news:language>
      </news:publication>
      <news:publication_date>2026-04-23T17:44:36+02:00</news:publication_date>
      <news:title>Un bug nei chip Qualcomm, consente la compromissione totale dei dispositivi></news:title>
    </news:news>
    <changefreq>monthly</changefreq>
    <image:image>
      <image:loc>https://www.redhotcyber.com/wp-content/uploads/2026/04/image-202.jpg</image:loc>
      <image:caption>Un bug nei chip Qualcomm, consente la compromissione totale dei dispositivi</image:caption>
    </image:image>
  </url>
</urlset>