<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 7, 2026 at 4:20 pm by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://mycyberway.co.uk/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>MyCyberWay</title>
		<link><![CDATA[https://mycyberway.co.uk]]></link>
		<description><![CDATA[MyCyberWay]]></description>
		<lastBuildDate><![CDATA[Sun, 23 Nov 2025 19:34:16 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://mycyberway.co.uk/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://mycyberway.co.uk/aggregator/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/aggregator/]]></link>
			<title>Aggregator</title>
			<pubDate><![CDATA[Sun, 23 Nov 2025 19:34:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/german-authorities-identify-revil-and-gangcrab-ransomware-bosses/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/german-authorities-identify-revil-and-gangcrab-ransomware-bosses/]]></link>
			<title>German authorities identify REvil and GangCrab ransomware bosses</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 23:54:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/ai-agents-found-vulns-in-this-popular-linux-and-unix-print-server/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/ai-agents-found-vulns-in-this-popular-linux-and-unix-print-server/]]></link>
			<title>AI agents found vulns in this popular Linux and Unix print server</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 23:03:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/new-gpubreach-attack-enables-system-takeover-via-gpu-rowhammer/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/new-gpubreach-attack-enables-system-takeover-via-gpu-rowhammer/]]></link>
			<title>New GPUBreach attack enables system takeover via GPU rowhammer</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 21:44:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/ai-assisted-supply-chain-attack-targets-github/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/ai-assisted-supply-chain-attack-targets-github/]]></link>
			<title>AI-Assisted Supply Chain Attack Targets GitHub</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 21:38:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/axios-attack-shows-social-complex-engineering-is-industrialized/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/axios-attack-shows-social-complex-engineering-is-industrialized/]]></link>
			<title>Axios Attack Shows Social Complex Engineering Is Industrialized</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 20:55:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/fortinet-issues-emergency-patch-for-forticlient-zero-day/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/fortinet-issues-emergency-patch-for-forticlient-zero-day/]]></link>
			<title>Fortinet Issues Emergency Patch for FortiClient Zero-Day</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 20:24:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/phishing-lnk-files-and-github-c2-power-new-dprk-cyber-attacks/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/phishing-lnk-files-and-github-c2-power-new-dprk-cyber-attacks/]]></link>
			<title>Phishing LNK files and GitHub C2 power new DPRK cyber attacks</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 19:34:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/disgruntled-researcher-leaks-bluehammer-windows-zero-day-exploit/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/disgruntled-researcher-leaks-bluehammer-windows-zero-day-exploit/]]></link>
			<title>Disgruntled researcher leaks “BlueHammer” Windows zero-day exploit</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 19:19:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/microsoft-fixes-classic-outlook-bug-causing-email-delivery-issues/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/microsoft-fixes-classic-outlook-bug-causing-email-delivery-issues/]]></link>
			<title>Microsoft fixes Classic Outlook bug causing email delivery issues</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 19:19:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/iran-linked-password-spraying-campaign-targets-300-israeli-microsoft-365-organizations/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/iran-linked-password-spraying-campaign-targets-300-israeli-microsoft-365-organizations/]]></link>
			<title>Iran-Linked Password-Spraying Campaign Targets 300+ Israeli Microsoft 365 Organizations</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 18:37:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/attackers-exploited-this-critical-forticlient-ems-bug-as-a-0-day/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/attackers-exploited-this-critical-forticlient-ems-bug-as-a-0-day/]]></link>
			<title>Attackers exploited this critical FortiClient EMS bug as a 0-day</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 18:14:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/microsoft-removes-support-and-recovery-assistant-from-windows/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/microsoft-removes-support-and-recovery-assistant-from-windows/]]></link>
			<title>Microsoft removes Support and Recovery Assistant from Windows</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 17:45:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/microsoft-links-medusa-ransomware-affiliate-to-zero-day-attacks/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/microsoft-links-medusa-ransomware-affiliate-to-zero-day-attacks/]]></link>
			<title>Microsoft links Medusa ransomware affiliate to zero-day attacks</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 16:56:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/drift-280m-crypto-theft-linked-to-6-month-in-person-operation/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/drift-280m-crypto-theft-linked-to-6-month-in-person-operation/]]></link>
			<title>Drift $280M crypto theft linked to 6-month in-person operation</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 16:35:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/inside-an-ai-enabled-device-code-phishing-campaign/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/inside-an-ai-enabled-device-code-phishing-campaign/]]></link>
			<title>Inside an AI‑enabled device code phishing campaign</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 16:34:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/dprk-linked-hackers-use-github-as-c2-in-multi-stage-attacks-targeting-south-korea/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/dprk-linked-hackers-use-github-as-c2-in-multi-stage-attacks-targeting-south-korea/]]></link>
			<title>DPRK-Linked Hackers Use GitHub as C2 in Multi-Stage Attacks Targeting South Korea</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 16:24:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/cisa-orders-feds-to-patch-exploited-fortinet-ems-flaw-by-friday/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/cisa-orders-feds-to-patch-exploited-fortinet-ems-flaw-by-friday/]]></link>
			<title>CISA orders feds to patch exploited Fortinet EMS flaw by Friday</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 16:02:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/storm-1175-focuses-gaze-on-vulnerable-web-facing-assets-in-high-tempo-medusa-ransomware-operations/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/storm-1175-focuses-gaze-on-vulnerable-web-facing-assets-in-high-tempo-medusa-ransomware-operations/]]></link>
			<title>Storm-1175 focuses gaze on vulnerable web-facing assets in high-tempo Medusa ransomware operations</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 16:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/]]></link>
			<title>Home</title>
			<pubDate><![CDATA[Fri, 20 Mar 2026 18:41:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/traffic-violation-scams-switch-to-qr-codes-in-new-phishing-texts/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/traffic-violation-scams-switch-to-qr-codes-in-new-phishing-texts/]]></link>
			<title>Traffic violation scams switch to QR codes in new phishing texts</title>
			<pubDate><![CDATA[Sun, 05 Apr 2026 19:44:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/new-forticlient-ems-flaw-exploited-in-attacks-emergency-patch-released/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/new-forticlient-ems-flaw-exploited-in-attacks-emergency-patch-released/]]></link>
			<title>New FortiClient EMS flaw exploited in attacks, emergency patch released</title>
			<pubDate><![CDATA[Sun, 05 Apr 2026 18:45:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/automated-credential-harvesting-campaign-exploits-react2shell-flaw/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/automated-credential-harvesting-campaign-exploits-react2shell-flaw/]]></link>
			<title>Automated Credential Harvesting Campaign Exploits React2Shell Flaw</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 15:31:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/shadow-ai-in-healthcare-is-here-to-stay/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/shadow-ai-in-healthcare-is-here-to-stay/]]></link>
			<title>Shadow AI in Healthcare Is Here to Stay</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 14:07:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/attackers-exploit-rce-flaw-as-14000-f5-big-ip-apm-instances-remain-exposed/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/attackers-exploit-rce-flaw-as-14000-f5-big-ip-apm-instances-remain-exposed/]]></link>
			<title>Attackers Exploit RCE Flaw as 14,000 F5 BIG-IP APM Instances Remain Exposed</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 13:07:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/⚡-weekly-recap-axios-hack-chrome-0-day-fortinet-exploits-paragon-spyware-and-more/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/⚡-weekly-recap-axios-hack-chrome-0-day-fortinet-exploits-paragon-spyware-and-more/]]></link>
			<title>⚡ Weekly Recap: Axios Hack, Chrome 0-Day, Fortinet Exploits, Paragon Spyware and More</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 12:46:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/how-litellm-turned-developer-machines-into-credential-vaults-for-attackers/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/how-litellm-turned-developer-machines-into-credential-vaults-for-attackers/]]></link>
			<title>How LiteLLM Turned Developer Machines Into Credential Vaults for Attackers</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 11:45:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/guardarian-users-targeted-with-malicious-strapi-npm-packages/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/guardarian-users-targeted-with-malicious-strapi-npm-packages/]]></link>
			<title>Guardarian Users Targeted With Malicious Strapi NPM Packages</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 11:40:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/north-korean-hackers-target-high-profile-node-js-maintainers/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/north-korean-hackers-target-high-profile-node-js-maintainers/]]></link>
			<title>North Korean Hackers Target High-Profile Node.js Maintainers</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 11:02:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/qilin-and-warlock-ransomware-use-vulnerable-drivers-to-disable-300-edr-tools/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/qilin-and-warlock-ransomware-use-vulnerable-drivers-to-disable-300-edr-tools/]]></link>
			<title>Qilin and Warlock Ransomware Use Vulnerable Drivers to Disable 300+ EDR Tools</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 10:07:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/fortinet-rushes-emergency-fixes-for-exploited-zero-day/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/fortinet-rushes-emergency-fixes-for-exploited-zero-day/]]></link>
			<title>Fortinet Rushes Emergency Fixes for Exploited Zero-Day</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 09:37:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/285-million-drift-hack-traced-to-six-month-dprk-social-engineering-operation/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/285-million-drift-hack-traced-to-six-month-dprk-social-engineering-operation/]]></link>
			<title>$285 Million Drift Hack Traced to Six-Month DPRK Social Engineering Operation</title>
			<pubDate><![CDATA[Sun, 05 Apr 2026 18:25:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/multi-os-cyberattacks-how-socs-close-a-critical-risk-in-3-steps/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/multi-os-cyberattacks-how-socs-close-a-critical-risk-in-3-steps/]]></link>
			<title>Multi-OS Cyberattacks: How SOCs Close a Critical Risk in 3 Steps</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 13:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/bka-identifies-revil-leaders-behind-130-german-ransomware-attacks/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/bka-identifies-revil-leaders-behind-130-german-ransomware-attacks/]]></link>
			<title>BKA Identifies REvil Leaders Behind 130 German Ransomware Attacks</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 06:59:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/cve-2026-35616-fortinet-fixes-actively-exploited-high-severity-flaw/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/cve-2026-35616-fortinet-fixes-actively-exploited-high-severity-flaw/]]></link>
			<title>CVE-2026-35616: Fortinet fixes actively exploited high-severity flaw</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 05:10:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/anthropic-sure-has-a-mess-on-its-hands-thanks-to-that-claude-code-source-leak/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/anthropic-sure-has-a-mess-on-its-hands-thanks-to-that-claude-code-source-leak/]]></link>
			<title>Anthropic sure has a mess on its hands thanks to that Claude Code source leak</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 00:02:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/security-affairs-malware-newsletter-round-91/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/security-affairs-malware-newsletter-round-91/]]></link>
			<title>SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 91</title>
			<pubDate><![CDATA[Sun, 05 Apr 2026 14:34:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/google-deepmind-researchers-map-web-attacks-against-ai-agents/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/google-deepmind-researchers-map-web-attacks-against-ai-agents/]]></link>
			<title>Google DeepMind Researchers Map Web Attacks Against AI Agents</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 15:32:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/hackers-exploit-react2shell-in-automated-credential-theft-campaign/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/hackers-exploit-react2shell-in-automated-credential-theft-campaign/]]></link>
			<title>Hackers exploit React2Shell in automated credential theft campaign</title>
			<pubDate><![CDATA[Sun, 05 Apr 2026 14:17:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/researchers-didnt-want-to-glamorize-cybercrims-so-they-roasted-them/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/researchers-didnt-want-to-glamorize-cybercrims-so-they-roasted-them/]]></link>
			<title>Researchers didn’t want to glamorize cybercrims. So they roasted them</title>
			<pubDate><![CDATA[Sun, 05 Apr 2026 13:00:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/image-or-malware-read-until-the-end-and-answer-in-comments/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/image-or-malware-read-until-the-end-and-answer-in-comments/]]></link>
			<title>Image or Malware? Read until the end and answer in comments :)</title>
			<pubDate><![CDATA[Sun, 05 Apr 2026 08:35:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/security-affairs-newsletter-round-571-by-pierluigi-paganini-international-edition/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/security-affairs-newsletter-round-571-by-pierluigi-paganini-international-edition/]]></link>
			<title>Security Affairs newsletter Round 571 by Pierluigi Paganini – INTERNATIONAL EDITION</title>
			<pubDate><![CDATA[Sun, 05 Apr 2026 08:29:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/36-malicious-npm-packages-exploited-redis-postgresql-to-deploy-persistent-implants/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/36-malicious-npm-packages-exploited-redis-postgresql-to-deploy-persistent-implants/]]></link>
			<title>36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants</title>
			<pubDate><![CDATA[Sun, 05 Apr 2026 05:07:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/bka-unmasks-two-revil-ransomware-operators-behind-130-german-attacks/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/bka-unmasks-two-revil-ransomware-operators-behind-130-german-attacks/]]></link>
			<title>BKA unmasks two REvil Ransomware operators behind 130+ German attacks</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 14:48:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/fortinet-patches-actively-exploited-cve-2026-35616-in-forticlient-ems/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/fortinet-patches-actively-exploited-cve-2026-35616-in-forticlient-ems/]]></link>
			<title>Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS</title>
			<pubDate><![CDATA[Sun, 05 Apr 2026 04:32:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/axios-npm-hack-used-fake-teams-error-fix-to-hijack-maintainer-account/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/axios-npm-hack-used-fake-teams-error-fix-to-hijack-maintainer-account/]]></link>
			<title>Axios npm hack used fake Teams error fix to hijack maintainer account</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 20:30:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/why-simple-breach-monitoring-is-no-longer-enough/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/why-simple-breach-monitoring-is-no-longer-enough/]]></link>
			<title>Why Simple Breach Monitoring is No Longer Enough</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 14:02:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/qilin-ransomware-group-claims-the-hack-of-german-political-party-die-linke/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/qilin-ransomware-group-claims-the-hack-of-german-political-party-die-linke/]]></link>
			<title>Qilin ransomware group claims the hack of German political party Die Linke</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 17:37:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/u-s-cisa-adds-a-flaw-in-trueconf-client-to-its-known-exploited-vulnerabilities-catalog/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/u-s-cisa-adds-a-flaw-in-trueconf-client-to-its-known-exploited-vulnerabilities-catalog/]]></link>
			<title>U.S. CISA adds a flaw in TrueConf Client to its Known Exploited Vulnerabilities catalog</title>
			<pubDate><![CDATA[Sat, 04 Apr 2026 16:42:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://mycyberway.co.uk/owasp-genai-security-project-gets-update-new-tools-matrix/]]></guid>
			<link><![CDATA[https://mycyberway.co.uk/owasp-genai-security-project-gets-update-new-tools-matrix/]]></link>
			<title>OWASP GenAI Security Project Gets Update, New Tools Matrix</title>
			<pubDate><![CDATA[Mon, 06 Apr 2026 13:49:27 +0000]]></pubDate>
		</item>
				</channel>
</rss>
