<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 28, 2026 at 4:22 pm by All in One SEO v4.9.6.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://inionline.net/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>inionline.net</title>
		<link><![CDATA[https://inionline.net]]></link>
		<description><![CDATA[inionline.net]]></description>
		<lastBuildDate><![CDATA[Wed, 22 Apr 2026 14:48:05 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://inionline.net/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://inionline.net/dprk-fake-job-scams-self-propagate-in-contagious-interview/]]></guid>
			<link><![CDATA[https://inionline.net/dprk-fake-job-scams-self-propagate-in-contagious-interview/]]></link>
			<title>DPRK Fake Job Scams Self-Propagate in &#8216;Contagious Interview&#8217;</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 14:48:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/fresh-wave-of-glassworm-vs-code-extensions-slices-through-supply-chain/]]></guid>
			<link><![CDATA[https://inionline.net/fresh-wave-of-glassworm-vs-code-extensions-slices-through-supply-chain/]]></link>
			<title>Fresh Wave of GlassWorm VS Code Extensions Slices Through Supply Chain</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 14:59:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/vect-2-0-ransomware-irreversibly-destroys-files-over-131kb-on-windows-linux-esxi/]]></guid>
			<link><![CDATA[https://inionline.net/vect-2-0-ransomware-irreversibly-destroys-files-over-131kb-on-windows-linux-esxi/]]></link>
			<title>VECT 2.0 Ransomware Irreversibly Destroys Files Over 131KB on Windows, Linux, ESXi</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 14:01:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/why-secure-data-movement-is-the-zero-trust-bottleneck-nobody-talks-about/]]></guid>
			<link><![CDATA[https://inionline.net/why-secure-data-movement-is-the-zero-trust-bottleneck-nobody-talks-about/]]></link>
			<title>Why Secure Data Movement Is the Zero Trust Bottleneck Nobody Talks About</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 11:58:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/critical-unpatched-flaw-leaves-hugging-face-lerobot-open-to-unauthenticated-rce/]]></guid>
			<link><![CDATA[https://inionline.net/critical-unpatched-flaw-leaves-hugging-face-lerobot-open-to-unauthenticated-rce/]]></link>
			<title>Critical Unpatched Flaw Leaves Hugging Face LeRobot Open to Unauthenticated RCE</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 11:18:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/after-mythos-new-playbooks-for-a-zero-window-era/]]></guid>
			<link><![CDATA[https://inionline.net/after-mythos-new-playbooks-for-a-zero-window-era/]]></link>
			<title>After Mythos: New Playbooks For a Zero-Window Era</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 10:30:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/chinese-silk-typhoon-hacker-extradited-to-u-s-over-covid-research-cyberattacks/]]></guid>
			<link><![CDATA[https://inionline.net/chinese-silk-typhoon-hacker-extradited-to-u-s-over-covid-research-cyberattacks/]]></link>
			<title>Chinese Silk Typhoon Hacker Extradited to U.S. Over COVID Research Cyberattacks</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 07:57:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/microsoft-patches-entra-id-role-flaw-that-enabled-service-principal-takeover/]]></guid>
			<link><![CDATA[https://inionline.net/microsoft-patches-entra-id-role-flaw-that-enabled-service-principal-takeover/]]></link>
			<title>Microsoft Patches Entra ID Role Flaw That Enabled Service Principal Takeover</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 06:37:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/microsoft-confirms-active-exploitation-of-windows-shell-cve-2026-32202/]]></guid>
			<link><![CDATA[https://inionline.net/microsoft-confirms-active-exploitation-of-windows-shell-cve-2026-32202/]]></link>
			<title>Microsoft Confirms Active Exploitation of Windows Shell CVE-2026-32202</title>
			<pubDate><![CDATA[Tue, 28 Apr 2026 05:50:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/unc6692-combines-social-engineering-malware-cloud-abuse/]]></guid>
			<link><![CDATA[https://inionline.net/unc6692-combines-social-engineering-malware-cloud-abuse/]]></link>
			<title>UNC6692 Combines Social Engineering, Malware, Cloud Abuse</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 20:12:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/unpatched-phantomrpc-flaw-in-windows-enables-privilege-escalation/]]></guid>
			<link><![CDATA[https://inionline.net/unpatched-phantomrpc-flaw-in-windows-enables-privilege-escalation/]]></link>
			<title>Unpatched &#8216;PhantomRPC&#8217; Flaw in Windows Enables Privilege Escalation</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 15:31:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/checkmarx-confirms-github-repository-data-posted-on-dark-web-after-march-23-attack/]]></guid>
			<link><![CDATA[https://inionline.net/checkmarx-confirms-github-repository-data-posted-on-dark-web-after-march-23-attack/]]></link>
			<title>Checkmarx Confirms GitHub Repository Data Posted on Dark Web After March 23 Attack</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 14:19:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/⚡-weekly-recap-fast16-malware-xchat-launch-federal-backdoor-ai-employee-tracking-more/]]></guid>
			<link><![CDATA[https://inionline.net/⚡-weekly-recap-fast16-malware-xchat-launch-federal-backdoor-ai-employee-tracking-more/]]></link>
			<title>⚡ Weekly Recap: Fast16 Malware, XChat Launch, Federal Backdoor, AI Employee Tracking &amp; More</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 13:30:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/20-year-old-malware-rewrites-history-of-cyber-sabotage/]]></guid>
			<link><![CDATA[https://inionline.net/20-year-old-malware-rewrites-history-of-cyber-sabotage/]]></link>
			<title>20-Year-Old Malware Rewrites History of Cyber Sabotage</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 13:09:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/parsing-agentic-offensive-securitys-existential-threat/]]></guid>
			<link><![CDATA[https://inionline.net/parsing-agentic-offensive-securitys-existential-threat/]]></link>
			<title>Parsing Agentic Offensive Security&#8217;s Existential Threat</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 13:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/mythos-changed-the-math-on-vulnerability-discovery-most-teams-arent-ready-for-the-remediation-side/]]></guid>
			<link><![CDATA[https://inionline.net/mythos-changed-the-math-on-vulnerability-discovery-most-teams-arent-ready-for-the-remediation-side/]]></link>
			<title>Mythos Changed the Math on Vulnerability Discovery. Most Teams Aren&#8217;t Ready for the Remediation Side</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 11:58:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/phantomcore-exploits-trueconf-vulnerabilities-to-breach-russian-networks/]]></guid>
			<link><![CDATA[https://inionline.net/phantomcore-exploits-trueconf-vulnerabilities-to-breach-russian-networks/]]></link>
			<title>PhantomCore Exploits TrueConf Vulnerabilities to Breach Russian Networks</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 11:54:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/researchers-uncover-pre-stuxnet-fast16-malware-targeting-engineering-software/]]></guid>
			<link><![CDATA[https://inionline.net/researchers-uncover-pre-stuxnet-fast16-malware-targeting-engineering-software/]]></link>
			<title>Researchers Uncover Pre-Stuxnet ‘fast16’ Malware Targeting Engineering Software</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 09:26:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/cisa-adds-4-exploited-flaws-to-kev-sets-may-2026-federal-deadline/]]></guid>
			<link><![CDATA[https://inionline.net/cisa-adds-4-exploited-flaws-to-kev-sets-may-2026-federal-deadline/]]></link>
			<title>CISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal Deadline</title>
			<pubDate><![CDATA[Sat, 25 Apr 2026 05:08:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/researchers-uncover-73-fake-vs-code-extensions-delivering-glassworm-v2-malware/]]></guid>
			<link><![CDATA[https://inionline.net/researchers-uncover-73-fake-vs-code-extensions-delivering-glassworm-v2-malware/]]></link>
			<title>Researchers Uncover 73 Fake VS Code Extensions Delivering GlassWorm v2 Malware</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 11:23:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/fake-captcha-irsf-scam-and-120-keitaro-campaigns-drive-global-sms-crypto-fraud/]]></guid>
			<link><![CDATA[https://inionline.net/fake-captcha-irsf-scam-and-120-keitaro-campaigns-drive-global-sms-crypto-fraud/]]></link>
			<title>Fake CAPTCHA IRSF Scam and 120 Keitaro Campaigns Drive Global SMS, Crypto Fraud</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 06:33:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/helping-romance-scam-victims-require-a-proactive-empathic-approach/]]></guid>
			<link><![CDATA[https://inionline.net/helping-romance-scam-victims-require-a-proactive-empathic-approach/]]></link>
			<title>Helping Romance Scam Victims Require a Proactive, Empathic Approach</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 22:34:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/firestarter-backdoor-hit-federal-cisco-firepower-device-survives-security-patches/]]></guid>
			<link><![CDATA[https://inionline.net/firestarter-backdoor-hit-federal-cisco-firepower-device-survives-security-patches/]]></link>
			<title>FIRESTARTER Backdoor Hit Federal Cisco Firepower Device, Survives Security Patches</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 17:06:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/us-busts-myanmar-ring-targeting-us-citizens-in-financial-fraud/]]></guid>
			<link><![CDATA[https://inionline.net/us-busts-myanmar-ring-targeting-us-citizens-in-financial-fraud/]]></link>
			<title>US Busts Myanmar Ring Targeting US Citizens in Financial Fraud</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 16:48:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/glasswing-secured-the-code-the-rest-of-your-stack-is-still-on-you/]]></guid>
			<link><![CDATA[https://inionline.net/glasswing-secured-the-code-the-rest-of-your-stack-is-still-on-you/]]></link>
			<title>Glasswing Secured the Code. The Rest of Your Stack Is Still on You</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 15:04:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/nasa-employees-duped-in-chinese-phishing-scheme-targeting-u-s-defense-software/]]></guid>
			<link><![CDATA[https://inionline.net/nasa-employees-duped-in-chinese-phishing-scheme-targeting-u-s-defense-software/]]></link>
			<title>NASA Employees Duped in Chinese Phishing Scheme Targeting U.S. Defense Software</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 14:13:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/ai-phishing-is-no-1-with-a-bullet-for-cyberattackers/]]></guid>
			<link><![CDATA[https://inionline.net/ai-phishing-is-no-1-with-a-bullet-for-cyberattackers/]]></link>
			<title>AI Phishing Is No. 1 With a Bullet for Cyberattackers</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 13:30:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/webinar-mythos-reality-check-beating-automated-exploitation-at-ai-speed/]]></guid>
			<link><![CDATA[https://inionline.net/webinar-mythos-reality-check-beating-automated-exploitation-at-ai-speed/]]></link>
			<title>[Webinar] Mythos Reality Check: Beating Automated Exploitation at AI Speed</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 12:03:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/north-koreas-lazarus-targets-macos-users-via-clickfix/]]></guid>
			<link><![CDATA[https://inionline.net/north-koreas-lazarus-targets-macos-users-via-clickfix/]]></link>
			<title>North Korea&#8217;s Lazarus Targets macOS Users via ClickFix</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 13:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/project-glasswing-proved-ai-can-find-the-bugs-whos-going-to-fix-them/]]></guid>
			<link><![CDATA[https://inionline.net/project-glasswing-proved-ai-can-find-the-bugs-whos-going-to-fix-them/]]></link>
			<title>Project Glasswing Proved AI Can Find the Bugs. Who&#8217;s Going to Fix Them?</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 11:30:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/bridging-the-ai-agent-authority-gap-continuous-observability-as-the-decision-engine/]]></guid>
			<link><![CDATA[https://inionline.net/bridging-the-ai-agent-authority-gap-continuous-observability-as-the-decision-engine/]]></link>
			<title>Bridging the AI Agent Authority Gap: Continuous Observability as the Decision Engine</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 11:49:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/china-backed-hackers-are-industrializing-botnets/]]></guid>
			<link><![CDATA[https://inionline.net/china-backed-hackers-are-industrializing-botnets/]]></link>
			<title>China-Backed Hackers Are Industrializing Botnets</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 20:52:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/unc6692-impersonates-it-helpdesk-via-microsoft-teams-to-deploy-snow-malware/]]></guid>
			<link><![CDATA[https://inionline.net/unc6692-impersonates-it-helpdesk-via-microsoft-teams-to-deploy-snow-malware/]]></link>
			<title>UNC6692 Impersonates IT Helpdesk via Microsoft Teams to Deploy SNOW Malware</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 18:16:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/bad-memories-still-haunt-ai-agents/]]></guid>
			<link><![CDATA[https://inionline.net/bad-memories-still-haunt-ai-agents/]]></link>
			<title>Bad Memories Still Haunt AI Agents</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 14:30:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/bitwarden-cli-compromised-in-ongoing-checkmarx-supply-chain-campaign/]]></guid>
			<link><![CDATA[https://inionline.net/bitwarden-cli-compromised-in-ongoing-checkmarx-supply-chain-campaign/]]></link>
			<title>Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain Campaign</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 13:42:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/threatsday-bulletin-290m-defi-hack-macos-lotl-abuse-proxysmart-sim-farms-25-new-stories/]]></guid>
			<link><![CDATA[https://inionline.net/threatsday-bulletin-290m-defi-hack-macos-lotl-abuse-proxysmart-sim-farms-25-new-stories/]]></link>
			<title>ThreatsDay Bulletin: $290M DeFi Hack, macOS LotL Abuse, ProxySmart SIM Farms +25 New Stories</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 13:17:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/26-fakewallet-apps-found-on-apple-app-store-targeting-crypto-seed-phrases/]]></guid>
			<link><![CDATA[https://inionline.net/26-fakewallet-apps-found-on-apple-app-store-targeting-crypto-seed-phrases/]]></link>
			<title>26 FakeWallet Apps Found on Apple App Store Targeting Crypto Seed Phrases</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 11:48:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/zealot-shows-what-ais-capable-of-in-staged-cloud-attack/]]></guid>
			<link><![CDATA[https://inionline.net/zealot-shows-what-ais-capable-of-in-staged-cloud-attack/]]></link>
			<title>&#8216;Zealot&#8217; Shows What AI&#8217;s Capable of in Staged Cloud Attack</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 10:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/tropic-trooper-uses-trojanized-sumatrapdf-and-github-to-deploy-adaptixc2/]]></guid>
			<link><![CDATA[https://inionline.net/tropic-trooper-uses-trojanized-sumatrapdf-and-github-to-deploy-adaptixc2/]]></link>
			<title>Tropic Trooper Uses Trojanized SumatraPDF and GitHub to Deploy AdaptixC2</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 09:29:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/malicious-kics-docker-images-and-vs-code-extensions-hit-checkmarx-supply-chain/]]></guid>
			<link><![CDATA[https://inionline.net/malicious-kics-docker-images-and-vs-code-extensions-hit-checkmarx-supply-chain/]]></link>
			<title>Malicious KICS Docker Images and VS Code Extensions Hit Checkmarx Supply Chain</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 17:55:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/chinese-apt-abuses-multiple-cloud-tools-to-spy-on-mongolia/]]></guid>
			<link><![CDATA[https://inionline.net/chinese-apt-abuses-multiple-cloud-tools-to-spy-on-mongolia/]]></link>
			<title>Chinese APT Abuses Multiple Cloud Tools to Spy on Mongolia</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 01:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/self-propagating-supply-chain-worm-hijacks-npm-packages-to-steal-developer-tokens/]]></guid>
			<link><![CDATA[https://inionline.net/self-propagating-supply-chain-worm-hijacks-npm-packages-to-steal-developer-tokens/]]></link>
			<title>Self-Propagating Supply Chain Worm Hijacks npm Packages to Steal Developer Tokens</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 17:33:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/harvester-deploys-linux-gogra-backdoor-in-south-asia-using-microsoft-graph-api/]]></guid>
			<link><![CDATA[https://inionline.net/harvester-deploys-linux-gogra-backdoor-in-south-asia-using-microsoft-graph-api/]]></link>
			<title>Harvester Deploys Linux GoGra Backdoor in South Asia Using Microsoft Graph API</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 15:28:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/china-linked-gopherwhisper-infects-12-mongolian-government-systems-with-go-backdoors/]]></guid>
			<link><![CDATA[https://inionline.net/china-linked-gopherwhisper-infects-12-mongolian-government-systems-with-go-backdoors/]]></link>
			<title>China-Linked GopherWhisper Infects 12 Mongolian Government Systems with Go Backdoors</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 09:04:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/the-gentlemen-rapidly-rises-to-ransomware-prominence/]]></guid>
			<link><![CDATA[https://inionline.net/the-gentlemen-rapidly-rises-to-ransomware-prominence/]]></link>
			<title>&#8216;The Gentlemen&#8217; Rapidly Rises to Ransomware Prominence</title>
			<pubDate><![CDATA[Wed, 22 Apr 2026 20:51:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/vercel-finds-more-compromised-accounts-in-context-ai-linked-breach/]]></guid>
			<link><![CDATA[https://inionline.net/vercel-finds-more-compromised-accounts-in-context-ai-linked-breach/]]></link>
			<title>Vercel Finds More Compromised Accounts in Context.ai-Linked Breach</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 08:40:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/apple-patches-ios-flaw-that-stored-deleted-signal-notifications-in-fbi-forensic-case/]]></guid>
			<link><![CDATA[https://inionline.net/apple-patches-ios-flaw-that-stored-deleted-signal-notifications-in-fbi-forensic-case/]]></link>
			<title>Apple Patches iOS Flaw That Stored Deleted Signal Notifications in FBI Forensic Case</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 08:06:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/africa-relinquishes-cyberattack-lead-to-latin-america-for-now/]]></guid>
			<link><![CDATA[https://inionline.net/africa-relinquishes-cyberattack-lead-to-latin-america-for-now/]]></link>
			<title>Africa Relinquishes Cyberattack Lead to Latin America — For Now</title>
			<pubDate><![CDATA[Thu, 23 Apr 2026 07:01:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/lmdeploy-cve-2026-33626-flaw-exploited-within-13-hours-of-disclosure/]]></guid>
			<link><![CDATA[https://inionline.net/lmdeploy-cve-2026-33626-flaw-exploited-within-13-hours-of-disclosure/]]></link>
			<title>LMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of Disclosure</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 07:24:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/tropic-trooper-apt-takes-aim-at-home-routers-japanese-targets/]]></guid>
			<link><![CDATA[https://inionline.net/tropic-trooper-apt-takes-aim-at-home-routers-japanese-targets/]]></link>
			<title>Tropic Trooper APT Takes Aim at Home Routers, Japanese Targets</title>
			<pubDate><![CDATA[Fri, 24 Apr 2026 01:00:00 +0000]]></pubDate>
		</item>
				</channel>
</rss>
