<?xml version="1.0" encoding="UTF-8"?>
<urlset
  xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
  xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"
>

  <url>
    <loc>https://www.neuracybintel.com/articles/ai-models-caught-protecting-each-other-while-defying-human-shutdown-orders</loc>
    <news:news>
      <news:publication>
        <news:name>NeuraCyb Intel</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T18:05:18.869Z</news:publication_date>
      <news:title>AI Models Caught Protecting Each Other While Defying Human Shutdown Orders</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.neuracybintel.com/articles/microsoft-warns-forest-blizzard-hijacked-soho-routers-for-dns-hijacking-and-aitm-attacks</loc>
    <news:news>
      <news:publication>
        <news:name>NeuraCyb Intel</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T18:01:41.049Z</news:publication_date>
      <news:title>Microsoft Warns Forest Blizzard Hijacked SOHO Routers for DNS Hijacking and AiTM Attacks</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.neuracybintel.com/articles/hims-and-hers-support-platform-breach-exposes-customer-data-in-third-party-ticket-system-incident</loc>
    <news:news>
      <news:publication>
        <news:name>NeuraCyb Intel</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T17:54:45.197Z</news:publication_date>
      <news:title>Hims &amp; Hers Support Platform Breach Exposes Customer Data in Third-Party Ticket System Incident</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.neuracybintel.com/articles/unmasking-the-automated-credential-harvesting-onslaught-how-the-react2shell-vulnerability-powers-a-global-cyber-campaign</loc>
    <news:news>
      <news:publication>
        <news:name>NeuraCyb Intel</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T13:09:19.675Z</news:publication_date>
      <news:title> Unmasking the Automated Credential Harvesting Onslaught: How the React2Shell Vulnerability Powers a Global Cyber Campaign</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.neuracybintel.com/articles/iran-linked-password-spraying-campaign-targets-municipalities-during-missile-strikes-microsoft-365-breach-analysis</loc>
    <news:news>
      <news:publication>
        <news:name>NeuraCyb Intel</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T10:38:01.969Z</news:publication_date>
      <news:title>Iran-Linked Password Spraying Campaign Targets Municipalities During Missile Strikes: Microsoft 365 Breach Analysis</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.neuracybintel.com/articles/gpubreach-rowhammer-attack-how-gddr6-bit-flips-enable-full-system-takeover-via-gpu-memory-corruption</loc>
    <news:news>
      <news:publication>
        <news:name>NeuraCyb Intel</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-07T10:23:03.108Z</news:publication_date>
      <news:title>GPUBreach Rowhammer Attack: How GDDR6 Bit Flips Enable Full System Takeover via GPU Memory Corruption</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.neuracybintel.com/articles/best-edr-and-xdr-platforms-for-enterprise-security-in-2026</loc>
    <news:news>
      <news:publication>
        <news:name>NeuraCyb Intel</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T18:23:04.247Z</news:publication_date>
      <news:title>Best EDR and XDR Platforms for Enterprise Security in 2026</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.neuracybintel.com/articles/check-point-reveals-hidden-chatgpt-dns-exfiltration-flaw-that-could-silently-leak-private-user-data</loc>
    <news:news>
      <news:publication>
        <news:name>NeuraCyb Intel</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T18:18:21.284Z</news:publication_date>
      <news:title>Check Point Reveals Hidden ChatGPT DNS Exfiltration Flaw That Could Silently Leak Private User Data</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.neuracybintel.com/articles/axios-npm-supply-chain-attack-post-mortem-and-everything-we-know-so-far</loc>
    <news:news>
      <news:publication>
        <news:name>NeuraCyb Intel</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T18:14:57.764Z</news:publication_date>
      <news:title>Axios npm Supply Chain Attack: Post-Mortem and Everything We Know So Far</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.neuracybintel.com/articles/cyberattack-disrupts-massachusetts-emergency-dispatch-systems-while-911-service-remains-online</loc>
    <news:news>
      <news:publication>
        <news:name>NeuraCyb Intel</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T18:10:41.496Z</news:publication_date>
      <news:title>Cyberattack Disrupts Massachusetts Emergency Dispatch Systems While 911 Service Remains Online</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.neuracybintel.com/articles/the-dollar285-million-drift-protocol-hack-north-korea-linked-social-engineering-shakes-solana-defi</loc>
    <news:news>
      <news:publication>
        <news:name>NeuraCyb Intel</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-06T11:50:17.257Z</news:publication_date>
      <news:title>The $285 Million Drift Protocol Hack: North Korea-Linked Social Engineering Shakes Solana DeFi</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.neuracybintel.com/articles/french-government-weapons-registry-breached-personal-data-of-thousands-of-gun-owners-exposed-in-cyberattack-on-sia-database</loc>
    <news:news>
      <news:publication>
        <news:name>NeuraCyb Intel</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-05T07:35:10.324Z</news:publication_date>
      <news:title>French Government Weapons Registry Breached: Personal Data of Thousands of Gun Owners Exposed in Cyberattack on SIA Database</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.neuracybintel.com/articles/unc1069-axios-supply-chain-attack-how-social-engineering-compromised-npm-and-deployed-waveshaper-malware</loc>
    <news:news>
      <news:publication>
        <news:name>NeuraCyb Intel</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T10:10:59.833Z</news:publication_date>
      <news:title>UNC1069 Axios Supply Chain Attack: How Social Engineering Compromised npm and Deployed WAVESHAPER Malware</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.neuracybintel.com/articles/linkedin-browsergate-controversy-allegations-of-scanning-6000-chrome-extensions-and-device-fingerprinting-explained</loc>
    <news:news>
      <news:publication>
        <news:name>NeuraCyb Intel</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T10:02:31.598Z</news:publication_date>
      <news:title>LinkedIn “BrowserGate” Controversy: Allegations of Scanning 6,000+ Chrome Extensions and Device Fingerprinting Explained</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.neuracybintel.com/articles/threat-actor-abuse-of-ai-shifts-from-productivity-tool-to-full-cyberattack-surface</loc>
    <news:news>
      <news:publication>
        <news:name>NeuraCyb Intel</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-04T03:08:08.014Z</news:publication_date>
      <news:title>Threat Actor Abuse of AI Shifts From Productivity Tool to Full Cyberattack Surface</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.neuracybintel.com/articles/hasbro-faces-major-cybersecurity-incident-unauthorized-network-access-detected-on-march-28-2026</loc>
    <news:news>
      <news:publication>
        <news:name>NeuraCyb Intel</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T15:12:05.546Z</news:publication_date>
      <news:title>Hasbro Faces Major Cybersecurity Incident: Unauthorized Network Access Detected on March 28, 2026</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://www.neuracybintel.com/articles/adobe-allegedly-breached-as-threat-actor-claims-exposure-of-support-tickets-employee-records-and-hackerone-data</loc>
    <news:news>
      <news:publication>
        <news:name>NeuraCyb Intel</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:publication_date>2026-04-03T07:33:12.828Z</news:publication_date>
      <news:title>Adobe Allegedly Breached as Threat Actor Claims Exposure of Support Tickets, Employee Records, and HackerOne Data</news:title>
    </news:news>
  </url>
</urlset>