<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on May 12, 2026 at 2:38 pm by All in One SEO v4.9.6.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://mycyberway.co.uk/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>MyCyberWay</title>
		<link><![CDATA[https://mycyberway.co.uk]]></link>
		<description><![CDATA[MyCyberWay]]></description>
		<lastBuildDate><![CDATA[Tue, 12 May 2026 09:58:02 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://mycyberway.co.uk/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://mycyberway.co.uk/mycyberway-courses/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/mycyberway-courses/]]></link>
			<title>MyCyberWay Courses</title>
			<pubDate><![CDATA[Tue, 12 May 2026 09:58:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/mcwbts/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/mcwbts/]]></link>
			<title>MCW &#8211; Blue Team Specialist Course Details</title>
			<pubDate><![CDATA[Tue, 12 May 2026 09:56:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/cyber-security-training/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/cyber-security-training/]]></link>
			<title>Cyber Security Training</title>
			<pubDate><![CDATA[Tue, 12 May 2026 09:55:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/courses/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/courses/]]></link>
			<title>Courses</title>
			<pubDate><![CDATA[Tue, 12 May 2026 09:52:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/aggregator/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/aggregator/]]></link>
			<title>Aggregator</title>
			<pubDate><![CDATA[Sun, 23 Nov 2025 19:34:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/]]></link>
			<title>Home</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 20:19:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/double-canvas-breach-acknowledged-as-shinyhunters-sets-new-pay-or-leak-deadline/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/double-canvas-breach-acknowledged-as-shinyhunters-sets-new-pay-or-leak-deadline/]]></link>
			<title>Double Canvas breach acknowledged as ShinyHunters sets new pay-or-leak deadline</title>
			<pubDate><![CDATA[Mon, 11 May 2026 23:16:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/gm-agrees-to-12-75m-california-settlement-over-sale-of-drivers-data/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/gm-agrees-to-12-75m-california-settlement-over-sale-of-drivers-data/]]></link>
			<title>GM agrees to $12.75M California settlement over sale of drivers’ data</title>
			<pubDate><![CDATA[Mon, 11 May 2026 22:40:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/official-checkmarx-jenkins-package-compromised-with-infostealer/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/official-checkmarx-jenkins-package-compromised-with-infostealer/]]></link>
			<title>Official CheckMarx Jenkins package compromised with infostealer</title>
			<pubDate><![CDATA[Mon, 11 May 2026 22:03:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/new-ghostlock-tool-abuses-windows-api-to-block-file-access/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/new-ghostlock-tool-abuses-windows-api-to-block-file-access/]]></link>
			<title>New GhostLock tool abuses Windows API to block file access</title>
			<pubDate><![CDATA[Mon, 11 May 2026 22:02:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/fcc-softens-ban-on-foreign-made-routers/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/fcc-softens-ban-on-foreign-made-routers/]]></link>
			<title>FCC Softens Ban on Foreign-Made Routers</title>
			<pubDate><![CDATA[Mon, 11 May 2026 21:15:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/cookie-thieves-caught-stealing-dev-secrets-via-fake-claude-code-installers/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/cookie-thieves-caught-stealing-dev-secrets-via-fake-claude-code-installers/]]></link>
			<title>Cookie thieves caught stealing dev secrets via fake Claude Code installers</title>
			<pubDate><![CDATA[Mon, 11 May 2026 20:21:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/tech-cant-stop-these-threats-your-people-can/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/tech-cant-stop-these-threats-your-people-can/]]></link>
			<title>Tech Can&#8217;t Stop These Threats — Your People Can</title>
			<pubDate><![CDATA[Mon, 11 May 2026 19:50:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/teampcp-compromises-checkmarx-jenkins-ast-plugin-weeks-after-kics-supply-chain-attack/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/teampcp-compromises-checkmarx-jenkins-ast-plugin-weeks-after-kics-supply-chain-attack/]]></link>
			<title>TeamPCP Compromises Checkmarx Jenkins AST Plugin Weeks After KICS Supply Chain Attack</title>
			<pubDate><![CDATA[Mon, 11 May 2026 18:30:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/identity-security-firm-sailpoint-discloses-github-repository-breach/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/identity-security-firm-sailpoint-discloses-github-repository-breach/]]></link>
			<title>Identity security firm SailPoint discloses GitHub repository breach</title>
			<pubDate><![CDATA[Mon, 11 May 2026 18:05:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/cpanel-cve-2026-41940-under-active-exploitation-to-deploy-filemanager-backdoor/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/cpanel-cve-2026-41940-under-active-exploitation-to-deploy-filemanager-backdoor/]]></link>
			<title>cPanel CVE-2026-41940 Under Active Exploitation to Deploy Filemanager Backdoor</title>
			<pubDate><![CDATA[Mon, 11 May 2026 17:54:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/frame-security-emerges-from-stealth-with-50m-for-awareness-and-training-platform/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/frame-security-emerges-from-stealth-with-50m-for-awareness-and-training-platform/]]></link>
			<title>Frame Security Emerges From Stealth With $50M for Awareness and Training Platform</title>
			<pubDate><![CDATA[Mon, 11 May 2026 17:17:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/anthropics-bug-hunting-mythos-was-greatest-marketing-stunt-ever-says-curl-creator/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/anthropics-bug-hunting-mythos-was-greatest-marketing-stunt-ever-says-curl-creator/]]></link>
			<title>Anthropic’s bug-hunting Mythos was greatest marketing stunt ever, says cURL creator</title>
			<pubDate><![CDATA[Mon, 11 May 2026 16:30:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/hackers-used-ai-to-develop-first-known-zero-day-2fa-bypass-for-mass-exploitation/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/hackers-used-ai-to-develop-first-known-zero-day-2fa-bypass-for-mass-exploitation/]]></link>
			<title>Hackers Used AI to Develop First Known Zero-Day 2FA Bypass for Mass Exploitation</title>
			<pubDate><![CDATA[Mon, 11 May 2026 15:45:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/instructure-confirms-hackers-used-canvas-flaw-to-deface-portals/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/instructure-confirms-hackers-used-canvas-flaw-to-deface-portals/]]></link>
			<title>Instructure confirms hackers used Canvas flaw to deface portals</title>
			<pubDate><![CDATA[Mon, 11 May 2026 15:26:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/trickmo-variant-routes-android-trojan-traffic-through-ton/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/trickmo-variant-routes-android-trojan-traffic-through-ton/]]></link>
			<title>TrickMo Variant Routes Android Trojan Traffic Through TON</title>
			<pubDate><![CDATA[Mon, 11 May 2026 15:15:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/dirty-frag-exploit-poised-to-blow-up-on-enterprise-linux-distros/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/dirty-frag-exploit-poised-to-blow-up-on-enterprise-linux-distros/]]></link>
			<title>&#8216;Dirty Frag&#8217; Exploit Poised to Blow Up on Enterprise Linux Distros</title>
			<pubDate><![CDATA[Mon, 11 May 2026 15:05:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/bwh-hotels-guests-warned-after-reservation-data-checks-out-with-cybercrooks/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/bwh-hotels-guests-warned-after-reservation-data-checks-out-with-cybercrooks/]]></link>
			<title>BWH Hotels guests warned after reservation data checks out with cybercrooks</title>
			<pubDate><![CDATA[Mon, 11 May 2026 14:34:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/rushed-patches-follow-broken-embargo-on-new-linux-kernel-vulnerabilities/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/rushed-patches-follow-broken-embargo-on-new-linux-kernel-vulnerabilities/]]></link>
			<title>Rushed Patches Follow Broken Embargo on New Linux Kernel Vulnerabilities</title>
			<pubDate><![CDATA[Mon, 11 May 2026 14:30:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/google-warns-artificial-intelligence-is-accelerating-cyberattacks-and-zero-day-exploits/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/google-warns-artificial-intelligence-is-accelerating-cyberattacks-and-zero-day-exploits/]]></link>
			<title>Google warns artificial intelligence is accelerating cyberattacks and zero-day exploits</title>
			<pubDate><![CDATA[Mon, 11 May 2026 14:06:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/build-application-firewalls-aim-to-stop-the-next-supply-chain-attack/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/build-application-firewalls-aim-to-stop-the-next-supply-chain-attack/]]></link>
			<title>Build Application Firewalls Aim to Stop the Next Supply Chain Attack</title>
			<pubDate><![CDATA[Mon, 11 May 2026 14:06:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/fake-claude-code-page-pushes-powershell-stealer-at-devs/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/fake-claude-code-page-pushes-powershell-stealer-at-devs/]]></link>
			<title>Fake Claude Code Page Pushes PowerShell Stealer at Devs</title>
			<pubDate><![CDATA[Mon, 11 May 2026 14:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/why-changing-passwords-doesnt-end-an-active-directory-breach/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/why-changing-passwords-doesnt-end-an-active-directory-breach/]]></link>
			<title>Why Changing Passwords Doesn’t End an Active Directory Breach</title>
			<pubDate><![CDATA[Mon, 11 May 2026 13:53:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/google-detects-first-ai-generated-zero-day-exploit/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/google-detects-first-ai-generated-zero-day-exploit/]]></link>
			<title>Google Detects First AI-Generated Zero-Day Exploit</title>
			<pubDate><![CDATA[Mon, 11 May 2026 13:04:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/google-hackers-used-ai-to-develop-zero-day-exploit-for-web-admin-tool/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/google-hackers-used-ai-to-develop-zero-day-exploit-for-web-admin-tool/]]></link>
			<title>Google: Hackers used AI to develop zero-day exploit for web admin tool</title>
			<pubDate><![CDATA[Mon, 11 May 2026 13:02:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/hackers-observed-using-ai-to-develop-zero-day-for-the-first-time/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/hackers-observed-using-ai-to-develop-zero-day-for-the-first-time/]]></link>
			<title>Hackers Observed Using AI to Develop Zero-Day for the First Time</title>
			<pubDate><![CDATA[Mon, 11 May 2026 13:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/hackers-use-ai-for-exploit-development-attack-automation/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/hackers-use-ai-for-exploit-development-attack-automation/]]></link>
			<title>Hackers Use AI for Exploit Development, Attack Automation</title>
			<pubDate><![CDATA[Mon, 11 May 2026 13:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/⚡-weekly-recap-linux-rootkit-macos-crypto-stealer-websocket-skimmers-and-more/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/⚡-weekly-recap-linux-rootkit-macos-crypto-stealer-websocket-skimmers-and-more/]]></link>
			<title>⚡ Weekly Recap: Linux Rootkit, macOS Crypto Stealer, WebSocket Skimmers and More</title>
			<pubDate><![CDATA[Mon, 11 May 2026 12:36:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/webinar-this-week-prevention-alone-is-not-enough-against-modern-attacks/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/webinar-this-week-prevention-alone-is-not-enough-against-modern-attacks/]]></link>
			<title>Webinar this week: Prevention alone is not enough against modern attacks</title>
			<pubDate><![CDATA[Mon, 11 May 2026 12:30:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/checkmarx-tackles-another-teampcp-intrusion-as-jenkins-plugin-sabotaged/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/checkmarx-tackles-another-teampcp-intrusion-as-jenkins-plugin-sabotaged/]]></link>
			<title>Checkmarx tackles another TeamPCP intrusion as Jenkins plugin sabotaged</title>
			<pubDate><![CDATA[Mon, 11 May 2026 12:11:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/cyber-espionage-group-targets-aviation-firms-to-steal-map-data/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/cyber-espionage-group-targets-aviation-firms-to-steal-map-data/]]></link>
			<title>Cyber Espionage Group Targets Aviation Firms to Steal Map Data</title>
			<pubDate><![CDATA[Mon, 11 May 2026 12:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/skoda-data-breach-hits-online-shop-customers/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/skoda-data-breach-hits-online-shop-customers/]]></link>
			<title>Skoda Data Breach Hits Online Shop Customers</title>
			<pubDate><![CDATA[Mon, 11 May 2026 11:54:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/your-purple-team-isnt-purple-its-just-red-and-blue-in-the-same-room/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/your-purple-team-isnt-purple-its-just-red-and-blue-in-the-same-room/]]></link>
			<title>Your Purple Team Isn&#8217;t Purple — It&#8217;s Just Red and Blue in the Same Room</title>
			<pubDate><![CDATA[Mon, 11 May 2026 11:30:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/crimenetwork-returns-after-takedown-dismantled-again-by-german-authorities/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/crimenetwork-returns-after-takedown-dismantled-again-by-german-authorities/]]></link>
			<title>Crimenetwork returns after takedown, dismantled again by German authorities</title>
			<pubDate><![CDATA[Mon, 11 May 2026 11:25:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/cloudflare-lays-off-1100-employees-in-ai-driven-restructuring/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/cloudflare-lays-off-1100-employees-in-ai-driven-restructuring/]]></link>
			<title>Cloudflare Lays Off 1,100 Employees in AI-Driven Restructuring</title>
			<pubDate><![CDATA[Mon, 11 May 2026 11:25:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/us-fcc-relaxes-foreign-made-router-ban-to-allow-for-security-updates/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/us-fcc-relaxes-foreign-made-router-ban-to-allow-for-security-updates/]]></link>
			<title>US: FCC Relaxes Foreign-Made Router Ban to Allow for Security Updates</title>
			<pubDate><![CDATA[Mon, 11 May 2026 11:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/sailpoint-discloses-github-repository-hack/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/sailpoint-discloses-github-repository-hack/]]></link>
			<title>SailPoint Discloses GitHub Repository Hack</title>
			<pubDate><![CDATA[Mon, 11 May 2026 10:52:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/shinyhunters-escalates-canvas-extortion-with-school-by-school-ransom-campaign/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/shinyhunters-escalates-canvas-extortion-with-school-by-school-ransom-campaign/]]></link>
			<title>ShinyHunters Escalates Canvas Extortion with School by School Ransom Campaign</title>
			<pubDate><![CDATA[Mon, 11 May 2026 10:05:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/checkmarx-jenkins-ast-plugin-compromised-in-supply-chain-attack/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/checkmarx-jenkins-ast-plugin-compromised-in-supply-chain-attack/]]></link>
			<title>Checkmarx Jenkins AST Plugin Compromised in Supply Chain Attack</title>
			<pubDate><![CDATA[Mon, 11 May 2026 09:34:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/u-s-cisa-adds-a-flaw-in-berriai-litellm-to-its-known-exploited-vulnerabilities-catalog/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/u-s-cisa-adds-a-flaw-in-berriai-litellm-to-its-known-exploited-vulnerabilities-catalog/]]></link>
			<title>U.S. CISA adds a flaw in BerriAI LiteLLM to its Known Exploited Vulnerabilities catalog</title>
			<pubDate><![CDATA[Mon, 11 May 2026 09:14:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/trickmo-android-banker-adopts-ton-blockchain-for-covert-comms/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/trickmo-android-banker-adopts-ton-blockchain-for-covert-comms/]]></link>
			<title>TrickMo Android banker adopts TON blockchain for covert comms</title>
			<pubDate><![CDATA[Mon, 11 May 2026 09:03:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/zara-data-breach-impacts-nearly-200000-customers/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/zara-data-breach-impacts-nearly-200000-customers/]]></link>
			<title>Zara Data Breach Impacts Nearly 200,000 Customers</title>
			<pubDate><![CDATA[Mon, 11 May 2026 09:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/canvas-system-is-online-after-a-cyberattack-disrupted-thousands-of-schools/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/canvas-system-is-online-after-a-cyberattack-disrupted-thousands-of-schools/]]></link>
			<title>Canvas System Is Online After a Cyberattack Disrupted Thousands of Schools</title>
			<pubDate><![CDATA[Mon, 11 May 2026 08:35:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/taiwans-train-cyber-trauma-reveals-a-global-system-thats-coming-off-the-tracks/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/taiwans-train-cyber-trauma-reveals-a-global-system-thats-coming-off-the-tracks/]]></link>
			<title>Taiwan&#8217;s train cyber-trauma reveals a global system that’s coming off the tracks</title>
			<pubDate><![CDATA[Mon, 11 May 2026 08:30:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/new-dirty-frag-linux-vulnerability-possibly-exploited-in-attacks/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/new-dirty-frag-linux-vulnerability-possibly-exploited-in-attacks/]]></link>
			<title>New ‘Dirty Frag’ Linux Vulnerability Possibly Exploited in Attacks</title>
			<pubDate><![CDATA[Mon, 11 May 2026 08:15:28 +0000]]></pubDate>
		</item>
				</channel>
</rss>
