<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on May 15, 2026 at 3:56 pm by All in One SEO v4.9.7.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://inionline.net/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>inionline.net</title>
		<link><![CDATA[https://inionline.net]]></link>
		<description><![CDATA[inionline.net]]></description>
		<lastBuildDate><![CDATA[Thu, 14 May 2026 20:57:27 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://inionline.net/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://inionline.net/securityscorecard-snags-driftnet-to-level-up-threat-intelligence/]]></guid>
			<link><![CDATA[https://inionline.net/securityscorecard-snags-driftnet-to-level-up-threat-intelligence/]]></link>
			<title>SecurityScorecard Snags Driftnet to Level Up Threat Intelligence</title>
			<pubDate><![CDATA[Thu, 14 May 2026 20:57:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/maximum-severity-cisco-sd-wan-bug-exploited-in-the-wild/]]></guid>
			<link><![CDATA[https://inionline.net/maximum-severity-cisco-sd-wan-bug-exploited-in-the-wild/]]></link>
			<title>Maximum Severity Cisco SD-WAN Bug Exploited in the Wild</title>
			<pubDate><![CDATA[Thu, 14 May 2026 20:25:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/what-45-days-of-watching-your-own-tools-will-tell-you-about-your-real-attack-surface/]]></guid>
			<link><![CDATA[https://inionline.net/what-45-days-of-watching-your-own-tools-will-tell-you-about-your-real-attack-surface/]]></link>
			<title>What 45 Days of Watching Your Own Tools Will Tell You About Your Real Attack Surface</title>
			<pubDate><![CDATA[Fri, 15 May 2026 11:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/tanstack-supply-chain-attack-hits-two-openai-employee-devices-forces-macos-updates/]]></guid>
			<link><![CDATA[https://inionline.net/tanstack-supply-chain-attack-hits-two-openai-employee-devices-forces-macos-updates/]]></link>
			<title>TanStack Supply Chain Attack Hits Two OpenAI Employee Devices, Forces macOS Updates</title>
			<pubDate><![CDATA[Fri, 15 May 2026 10:54:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/on-prem-microsoft-exchange-server-cve-2026-42897-exploited-via-crafted-email/]]></guid>
			<link><![CDATA[https://inionline.net/on-prem-microsoft-exchange-server-cve-2026-42897-exploited-via-crafted-email/]]></link>
			<title>On-Prem Microsoft Exchange Server CVE-2026-42897 Exploited via Crafted Email</title>
			<pubDate><![CDATA[Fri, 15 May 2026 06:19:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/cisa-adds-cisco-sd-wan-cve-2026-20182-to-kev-after-admin-access-exploits/]]></guid>
			<link><![CDATA[https://inionline.net/cisa-adds-cisco-sd-wan-cve-2026-20182-to-kev-after-admin-access-exploits/]]></link>
			<title>CISA Adds Cisco SD-WAN CVE-2026-20182 to KEV After Admin Access Exploits</title>
			<pubDate><![CDATA[Fri, 15 May 2026 05:28:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/taiwan-incident-highlights-cybersecurity-gaps-in-rail-systems/]]></guid>
			<link><![CDATA[https://inionline.net/taiwan-incident-highlights-cybersecurity-gaps-in-rail-systems/]]></link>
			<title>Taiwan Incident Highlights Cybersecurity Gaps in Rail Systems</title>
			<pubDate><![CDATA[Fri, 15 May 2026 01:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/cisco-catalyst-sd-wan-controller-auth-bypass-actively-exploited-to-gain-admin-access/]]></guid>
			<link><![CDATA[https://inionline.net/cisco-catalyst-sd-wan-controller-auth-bypass-actively-exploited-to-gain-admin-access/]]></link>
			<title>Cisco Catalyst SD-WAN Controller Auth Bypass Actively Exploited to Gain Admin Access</title>
			<pubDate><![CDATA[Thu, 14 May 2026 17:45:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/stealer-backdoor-found-in-3-node-ipc-versions-targeting-developer-secrets/]]></guid>
			<link><![CDATA[https://inionline.net/stealer-backdoor-found-in-3-node-ipc-versions-targeting-developer-secrets/]]></link>
			<title>Stealer Backdoor Found in 3 Node-IPC Versions Targeting Developer Secrets</title>
			<pubDate><![CDATA[Thu, 14 May 2026 17:22:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/frostyneighbor-apt-carefully-targets-govt-orgs-in-poland-ukraine/]]></guid>
			<link><![CDATA[https://inionline.net/frostyneighbor-apt-carefully-targets-govt-orgs-in-poland-ukraine/]]></link>
			<title>&#8216;FrostyNeighbor&#8217; APT Carefully Targets Govt Orgs in Poland, Ukraine</title>
			<pubDate><![CDATA[Thu, 14 May 2026 16:59:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/threatsday-bulletin-pan-os-rce-mythos-curl-bug-ai-tokenizer-attacks-and-10-stories/]]></guid>
			<link><![CDATA[https://inionline.net/threatsday-bulletin-pan-os-rce-mythos-curl-bug-ai-tokenizer-attacks-and-10-stories/]]></link>
			<title>ThreatsDay Bulletin: PAN-OS RCE, Mythos cURL Bug, AI Tokenizer Attacks, and 10+ Stories</title>
			<pubDate><![CDATA[Thu, 14 May 2026 16:07:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/ghostwriter-targets-ukrainian-government-with-geofenced-pdf-phishing-cobalt-strike/]]></guid>
			<link><![CDATA[https://inionline.net/ghostwriter-targets-ukrainian-government-with-geofenced-pdf-phishing-cobalt-strike/]]></link>
			<title>Ghostwriter Targets Ukrainian Government With Geofenced PDF Phishing, Cobalt Strike</title>
			<pubDate><![CDATA[Thu, 14 May 2026 14:00:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/ai-drives-cybersecurity-investments-widening-valley-of-death/]]></guid>
			<link><![CDATA[https://inionline.net/ai-drives-cybersecurity-investments-widening-valley-of-death/]]></link>
			<title>AI Drives Cybersecurity Investments, Widening &#8216;Valley of Death&#8217;</title>
			<pubDate><![CDATA[Thu, 14 May 2026 13:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/foxconn-attack-highlights-manufacturings-cyber-crisis/]]></guid>
			<link><![CDATA[https://inionline.net/foxconn-attack-highlights-manufacturings-cyber-crisis/]]></link>
			<title>Foxconn Attack Highlights Manufacturing&#8217;s Cyber Crisis</title>
			<pubDate><![CDATA[Thu, 14 May 2026 12:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/praisonai-cve-2026-44338-auth-bypass-targeted-within-hours-of-disclosure/]]></guid>
			<link><![CDATA[https://inionline.net/praisonai-cve-2026-44338-auth-bypass-targeted-within-hours-of-disclosure/]]></link>
			<title>PraisonAI CVE-2026-44338 Auth Bypass Targeted Within Hours of Disclosure</title>
			<pubDate><![CDATA[Thu, 14 May 2026 11:40:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/how-ai-hallucinations-are-creating-real-security-risks/]]></guid>
			<link><![CDATA[https://inionline.net/how-ai-hallucinations-are-creating-real-security-risks/]]></link>
			<title>How AI Hallucinations Are Creating Real Security Risks</title>
			<pubDate><![CDATA[Thu, 14 May 2026 11:30:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/windows-zero-days-expose-bitlocker-bypasses-and-ctfmon-privilege-escalation/]]></guid>
			<link><![CDATA[https://inionline.net/windows-zero-days-expose-bitlocker-bypasses-and-ctfmon-privilege-escalation/]]></link>
			<title>Windows Zero-Days Expose BitLocker Bypasses And CTFMON Privilege Escalation</title>
			<pubDate><![CDATA[Thu, 14 May 2026 09:25:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/new-fragnesia-linux-kernel-lpe-grants-root-access-via-page-cache-corruption/]]></guid>
			<link><![CDATA[https://inionline.net/new-fragnesia-linux-kernel-lpe-grants-root-access-via-page-cache-corruption/]]></link>
			<title>New Fragnesia Linux Kernel LPE Grants Root Access via Page Cache Corruption</title>
			<pubDate><![CDATA[Thu, 14 May 2026 07:06:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/checkbox-assessments-arent-fit-to-measure-to-risk/]]></guid>
			<link><![CDATA[https://inionline.net/checkbox-assessments-arent-fit-to-measure-to-risk/]]></link>
			<title>Checkbox Assessments Aren&#8217;t Fit to Measure to Risk</title>
			<pubDate><![CDATA[Wed, 13 May 2026 21:17:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/18-year-old-nginx-rewrite-module-flaw-enables-unauthenticated-rce/]]></guid>
			<link><![CDATA[https://inionline.net/18-year-old-nginx-rewrite-module-flaw-enables-unauthenticated-rce/]]></link>
			<title>18-Year-Old NGINX Rewrite Module Flaw Enables Unauthenticated RCE</title>
			<pubDate><![CDATA[Thu, 14 May 2026 06:00:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/attackers-weaponize-rubygems-for-data-dead-drops/]]></guid>
			<link><![CDATA[https://inionline.net/attackers-weaponize-rubygems-for-data-dead-drops/]]></link>
			<title>Attackers Weaponize RubyGems for Data Dead Drops</title>
			<pubDate><![CDATA[Wed, 13 May 2026 21:09:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/tables-turn-on-the-gentlemen-raas-gang-with-data-leak/]]></guid>
			<link><![CDATA[https://inionline.net/tables-turn-on-the-gentlemen-raas-gang-with-data-leak/]]></link>
			<title>Tables Turn on &#8216;The Gentlemen&#8217; RaaS Gang With Data Leak</title>
			<pubDate><![CDATA[Wed, 13 May 2026 20:47:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/dark-reading-celebrates-20-years-as-a-leading-authority-on-cybersecurity-highlighting-the-people-events-ideas-and-technologies-shaping-the-modern-risk-landscape/]]></guid>
			<link><![CDATA[https://inionline.net/dark-reading-celebrates-20-years-as-a-leading-authority-on-cybersecurity-highlighting-the-people-events-ideas-and-technologies-shaping-the-modern-risk-landscape/]]></link>
			<title>Dark Reading Celebrates 20 Years as a Leading Authority on Cybersecurity, Highlighting the People, Events, Ideas, and Technologies Shaping the Modern Risk Landscape</title>
			<pubDate><![CDATA[Wed, 13 May 2026 18:52:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/microsofts-mdash-ai-system-finds-16-windows-flaws-fixed-in-patch-tuesday/]]></guid>
			<link><![CDATA[https://inionline.net/microsofts-mdash-ai-system-finds-16-windows-flaws-fixed-in-patch-tuesday/]]></link>
			<title>Microsoft&#8217;s MDASH AI System Finds 16 Windows Flaws Fixed in Patch Tuesday</title>
			<pubDate><![CDATA[Wed, 13 May 2026 13:46:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/chinas-famoussparrow-apt-nests-in-south-caucasus-energy-firm/]]></guid>
			<link><![CDATA[https://inionline.net/chinas-famoussparrow-apt-nests-in-south-caucasus-energy-firm/]]></link>
			<title>China&#8217;s &#8216;FamousSparrow&#8217; APT Nests in South Caucasus Energy Firm</title>
			<pubDate><![CDATA[Wed, 13 May 2026 13:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/latam-vibe-hackers-generate-custom-hacking-tools-on-the-fly/]]></guid>
			<link><![CDATA[https://inionline.net/latam-vibe-hackers-generate-custom-hacking-tools-on-the-fly/]]></link>
			<title>LatAm Vibe Hackers Generate Custom Hacking Tools on the Fly</title>
			<pubDate><![CDATA[Wed, 13 May 2026 13:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/azerbaijani-energy-firm-hit-by-repeated-microsoft-exchange-exploitation/]]></guid>
			<link><![CDATA[https://inionline.net/azerbaijani-energy-firm-hit-by-repeated-microsoft-exchange-exploitation/]]></link>
			<title>Azerbaijani Energy Firm Hit by Repeated Microsoft Exchange Exploitation</title>
			<pubDate><![CDATA[Wed, 13 May 2026 13:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/webinar-why-your-appsec-tools-miss-the-lethal-path-and-how-to-fix-it/]]></guid>
			<link><![CDATA[https://inionline.net/webinar-why-your-appsec-tools-miss-the-lethal-path-and-how-to-fix-it/]]></link>
			<title>[Webinar] Why Your AppSec Tools Miss the &#8220;Lethal Path&#8221; (and How to Fix It)</title>
			<pubDate><![CDATA[Wed, 13 May 2026 11:52:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/most-remediation-programs-never-confirm-the-fix-actually-worked/]]></guid>
			<link><![CDATA[https://inionline.net/most-remediation-programs-never-confirm-the-fix-actually-worked/]]></link>
			<title>Most Remediation Programs Never Confirm the Fix Actually Worked</title>
			<pubDate><![CDATA[Wed, 13 May 2026 11:30:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/microsoft-patches-138-vulnerabilities-including-dns-and-netlogon-rce-flaws/]]></guid>
			<link><![CDATA[https://inionline.net/microsoft-patches-138-vulnerabilities-including-dns-and-netlogon-rce-flaws/]]></link>
			<title>Microsoft Patches 138 Vulnerabilities, Including DNS and Netlogon RCE Flaws</title>
			<pubDate><![CDATA[Wed, 13 May 2026 10:36:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/gemstuffer-abuses-150-rubygems-to-exfiltrate-scraped-u-k-council-portal-data/]]></guid>
			<link><![CDATA[https://inionline.net/gemstuffer-abuses-150-rubygems-to-exfiltrate-scraped-u-k-council-portal-data/]]></link>
			<title>GemStuffer Abuses 150+ RubyGems to Exfiltrate Scraped U.K. Council Portal Data</title>
			<pubDate><![CDATA[Wed, 13 May 2026 08:08:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/android-adds-intrusion-logging-for-sophisticated-spyware-forensics/]]></guid>
			<link><![CDATA[https://inionline.net/android-adds-intrusion-logging-for-sophisticated-spyware-forensics/]]></link>
			<title>Android Adds Intrusion Logging for Sophisticated Spyware Forensics</title>
			<pubDate><![CDATA[Wed, 13 May 2026 06:55:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/its-patch-tuesday-for-microsoft-and-not-a-zero-day-in-sight/]]></guid>
			<link><![CDATA[https://inionline.net/its-patch-tuesday-for-microsoft-and-not-a-zero-day-in-sight/]]></link>
			<title>It&#8217;s Patch Tuesday for Microsoft and Not a Zero-Day In Sight</title>
			<pubDate><![CDATA[Tue, 12 May 2026 21:03:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/new-exim-bdat-vulnerability-exposes-gnutls-builds-to-potential-code-execution/]]></guid>
			<link><![CDATA[https://inionline.net/new-exim-bdat-vulnerability-exposes-gnutls-builds-to-potential-code-execution/]]></link>
			<title>New Exim BDAT Vulnerability Exposes GnuTLS Builds to Potential Code Execution</title>
			<pubDate><![CDATA[Tue, 12 May 2026 16:44:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/rubygems-suspends-new-signups-after-hundreds-of-malicious-packages-are-uploaded/]]></guid>
			<link><![CDATA[https://inionline.net/rubygems-suspends-new-signups-after-hundreds-of-malicious-packages-are-uploaded/]]></link>
			<title>RubyGems Suspends New Signups After Hundreds of Malicious Packages Are Uploaded</title>
			<pubDate><![CDATA[Tue, 12 May 2026 14:47:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/hugging-face-packages-weaponized-with-a-single-file-tweak/]]></guid>
			<link><![CDATA[https://inionline.net/hugging-face-packages-weaponized-with-a-single-file-tweak/]]></link>
			<title>Hugging Face Packages Weaponized With a Single File Tweak</title>
			<pubDate><![CDATA[Tue, 12 May 2026 14:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/new-trickmo-variant-uses-ton-c2-and-socks5-to-create-android-network-pivots/]]></guid>
			<link><![CDATA[https://inionline.net/new-trickmo-variant-uses-ton-c2-and-socks5-to-create-android-network-pivots/]]></link>
			<title>New TrickMo Variant Uses TON C2 and SOCKS5 to Create Android Network Pivots</title>
			<pubDate><![CDATA[Tue, 12 May 2026 12:50:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/20-leaders-who-built-the-ciso-era-2-decades-of-change/]]></guid>
			<link><![CDATA[https://inionline.net/20-leaders-who-built-the-ciso-era-2-decades-of-change/]]></link>
			<title>20 Leaders Who Built the CISO Era: 2 Decades of Change</title>
			<pubDate><![CDATA[Tue, 12 May 2026 12:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/webinar-what-the-riskiest-soc-alerts-go-unanswered-and-how-radiant-security-can-help/]]></guid>
			<link><![CDATA[https://inionline.net/webinar-what-the-riskiest-soc-alerts-go-unanswered-and-how-radiant-security-can-help/]]></link>
			<title>Webinar: What the Riskiest SOC Alerts Go Unanswered &#8211; and How Radiant Security Can Help</title>
			<pubDate><![CDATA[Tue, 12 May 2026 11:58:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/why-agentic-ai-is-securitys-next-blind-spot/]]></guid>
			<link><![CDATA[https://inionline.net/why-agentic-ai-is-securitys-next-blind-spot/]]></link>
			<title>Why Agentic AI Is Security&#8217;s Next Blind Spot</title>
			<pubDate><![CDATA[Tue, 12 May 2026 10:30:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/mini-shai-hulud-worm-compromises-tanstack-mistral-ai-guardrails-ai-more-packages/]]></guid>
			<link><![CDATA[https://inionline.net/mini-shai-hulud-worm-compromises-tanstack-mistral-ai-guardrails-ai-more-packages/]]></link>
			<title>Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI &amp; More Packages</title>
			<pubDate><![CDATA[Tue, 12 May 2026 08:50:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/instructure-reaches-ransom-agreement-with-shinyhunters-to-stop-3-65tb-canvas-leak/]]></guid>
			<link><![CDATA[https://inionline.net/instructure-reaches-ransom-agreement-with-shinyhunters-to-stop-3-65tb-canvas-leak/]]></link>
			<title>Instructure Reaches Ransom Agreement with ShinyHunters to Stop 3.65TB Canvas Leak</title>
			<pubDate><![CDATA[Tue, 12 May 2026 07:37:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/openai-launches-daybreak-for-ai-powered-vulnerability-detection-and-patch-validation/]]></guid>
			<link><![CDATA[https://inionline.net/openai-launches-daybreak-for-ai-powered-vulnerability-detection-and-patch-validation/]]></link>
			<title>OpenAI Launches Daybreak for AI-Powered Vulnerability Detection and Patch Validation</title>
			<pubDate><![CDATA[Tue, 12 May 2026 06:55:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/ios-26-5-brings-default-end-to-end-encrypted-rcs-messaging-between-iphone-and-android/]]></guid>
			<link><![CDATA[https://inionline.net/ios-26-5-brings-default-end-to-end-encrypted-rcs-messaging-between-iphone-and-android/]]></link>
			<title>iOS 26.5 Brings Default End-to-End Encrypted RCS Messaging Between iPhone and Android</title>
			<pubDate><![CDATA[Tue, 12 May 2026 05:18:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/cyber-pioneers-ponder-past-as-prologue/]]></guid>
			<link><![CDATA[https://inionline.net/cyber-pioneers-ponder-past-as-prologue/]]></link>
			<title>Cyber Pioneers Ponder Past as Prologue</title>
			<pubDate><![CDATA[Fri, 15 May 2026 12:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/fcc-softens-ban-on-foreign-made-routers/]]></guid>
			<link><![CDATA[https://inionline.net/fcc-softens-ban-on-foreign-made-routers/]]></link>
			<title>FCC Softens Ban on Foreign-Made Routers</title>
			<pubDate><![CDATA[Mon, 11 May 2026 21:15:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/tech-cant-stop-these-threats-your-people-can/]]></guid>
			<link><![CDATA[https://inionline.net/tech-cant-stop-these-threats-your-people-can/]]></link>
			<title>Tech Can&#8217;t Stop These Threats — Your People Can</title>
			<pubDate><![CDATA[Mon, 11 May 2026 19:50:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/teampcp-compromises-checkmarx-jenkins-ast-plugin-weeks-after-kics-supply-chain-attack/]]></guid>
			<link><![CDATA[https://inionline.net/teampcp-compromises-checkmarx-jenkins-ast-plugin-weeks-after-kics-supply-chain-attack/]]></link>
			<title>TeamPCP Compromises Checkmarx Jenkins AST Plugin Weeks After KICS Supply Chain Attack</title>
			<pubDate><![CDATA[Mon, 11 May 2026 18:30:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/cpanel-cve-2026-41940-under-active-exploitation-to-deploy-filemanager-backdoor/]]></guid>
			<link><![CDATA[https://inionline.net/cpanel-cve-2026-41940-under-active-exploitation-to-deploy-filemanager-backdoor/]]></link>
			<title>cPanel CVE-2026-41940 Under Active Exploitation to Deploy Filemanager Backdoor</title>
			<pubDate><![CDATA[Mon, 11 May 2026 17:54:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/four-openclaw-flaws-enable-data-theft-privilege-escalation-and-persistence/]]></guid>
			<link><![CDATA[https://inionline.net/four-openclaw-flaws-enable-data-theft-privilege-escalation-and-persistence/]]></link>
			<title>Four OpenClaw Flaws Enable Data Theft, Privilege Escalation, and Persistence</title>
			<pubDate><![CDATA[Fri, 15 May 2026 13:35:04 +0000]]></pubDate>
		</item>
				</channel>
</rss>
