<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on May 12, 2026 at 10:43 pm by All in One SEO v4.9.6.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://inionline.net/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>inionline.net</title>
		<link><![CDATA[https://inionline.net]]></link>
		<description><![CDATA[inionline.net]]></description>
		<lastBuildDate><![CDATA[Wed, 06 May 2026 12:03:00 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://inionline.net/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://inionline.net/the-hacker-news-launches-cybersecurity-stars-awards-2026-submissions-now-open/]]></guid>
			<link><![CDATA[https://inionline.net/the-hacker-news-launches-cybersecurity-stars-awards-2026-submissions-now-open/]]></link>
			<title>The Hacker News Launches &#8216;Cybersecurity Stars Awards 2026&#8217; — Submissions Now Open</title>
			<pubDate><![CDATA[Wed, 06 May 2026 12:03:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/its-patch-tuesday-for-microsoft-and-not-a-zero-day-in-sight/]]></guid>
			<link><![CDATA[https://inionline.net/its-patch-tuesday-for-microsoft-and-not-a-zero-day-in-sight/]]></link>
			<title>It&#8217;s Patch Tuesday for Microsoft and Not a Zero-Day In Sight</title>
			<pubDate><![CDATA[Tue, 12 May 2026 21:03:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/new-exim-bdat-vulnerability-exposes-gnutls-builds-to-potential-code-execution/]]></guid>
			<link><![CDATA[https://inionline.net/new-exim-bdat-vulnerability-exposes-gnutls-builds-to-potential-code-execution/]]></link>
			<title>New Exim BDAT Vulnerability Exposes GnuTLS Builds to Potential Code Execution</title>
			<pubDate><![CDATA[Tue, 12 May 2026 16:44:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/rubygems-suspends-new-signups-after-hundreds-of-malicious-packages-are-uploaded/]]></guid>
			<link><![CDATA[https://inionline.net/rubygems-suspends-new-signups-after-hundreds-of-malicious-packages-are-uploaded/]]></link>
			<title>RubyGems Suspends New Signups After Hundreds of Malicious Packages Are Uploaded</title>
			<pubDate><![CDATA[Tue, 12 May 2026 14:47:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/hugging-face-packages-weaponized-with-a-single-file-tweak/]]></guid>
			<link><![CDATA[https://inionline.net/hugging-face-packages-weaponized-with-a-single-file-tweak/]]></link>
			<title>Hugging Face Packages Weaponized With a Single File Tweak</title>
			<pubDate><![CDATA[Tue, 12 May 2026 14:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/new-trickmo-variant-uses-ton-c2-and-socks5-to-create-android-network-pivots/]]></guid>
			<link><![CDATA[https://inionline.net/new-trickmo-variant-uses-ton-c2-and-socks5-to-create-android-network-pivots/]]></link>
			<title>New TrickMo Variant Uses TON C2 and SOCKS5 to Create Android Network Pivots</title>
			<pubDate><![CDATA[Tue, 12 May 2026 12:50:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/20-leaders-who-built-the-ciso-era-2-decades-of-change/]]></guid>
			<link><![CDATA[https://inionline.net/20-leaders-who-built-the-ciso-era-2-decades-of-change/]]></link>
			<title>20 Leaders Who Built the CISO Era: 2 Decades of Change</title>
			<pubDate><![CDATA[Tue, 12 May 2026 12:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/webinar-what-the-riskiest-soc-alerts-go-unanswered-and-how-radiant-security-can-help/]]></guid>
			<link><![CDATA[https://inionline.net/webinar-what-the-riskiest-soc-alerts-go-unanswered-and-how-radiant-security-can-help/]]></link>
			<title>Webinar: What the Riskiest SOC Alerts Go Unanswered &#8211; and How Radiant Security Can Help</title>
			<pubDate><![CDATA[Tue, 12 May 2026 11:58:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/why-agentic-ai-is-securitys-next-blind-spot/]]></guid>
			<link><![CDATA[https://inionline.net/why-agentic-ai-is-securitys-next-blind-spot/]]></link>
			<title>Why Agentic AI Is Security&#8217;s Next Blind Spot</title>
			<pubDate><![CDATA[Tue, 12 May 2026 10:30:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/mini-shai-hulud-worm-compromises-tanstack-mistral-ai-guardrails-ai-more-packages/]]></guid>
			<link><![CDATA[https://inionline.net/mini-shai-hulud-worm-compromises-tanstack-mistral-ai-guardrails-ai-more-packages/]]></link>
			<title>Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI &amp; More Packages</title>
			<pubDate><![CDATA[Tue, 12 May 2026 08:50:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/instructure-reaches-ransom-agreement-with-shinyhunters-to-stop-3-65tb-canvas-leak/]]></guid>
			<link><![CDATA[https://inionline.net/instructure-reaches-ransom-agreement-with-shinyhunters-to-stop-3-65tb-canvas-leak/]]></link>
			<title>Instructure Reaches Ransom Agreement with ShinyHunters to Stop 3.65TB Canvas Leak</title>
			<pubDate><![CDATA[Tue, 12 May 2026 07:37:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/openai-launches-daybreak-for-ai-powered-vulnerability-detection-and-patch-validation/]]></guid>
			<link><![CDATA[https://inionline.net/openai-launches-daybreak-for-ai-powered-vulnerability-detection-and-patch-validation/]]></link>
			<title>OpenAI Launches Daybreak for AI-Powered Vulnerability Detection and Patch Validation</title>
			<pubDate><![CDATA[Tue, 12 May 2026 06:55:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/ios-26-5-brings-default-end-to-end-encrypted-rcs-messaging-between-iphone-and-android/]]></guid>
			<link><![CDATA[https://inionline.net/ios-26-5-brings-default-end-to-end-encrypted-rcs-messaging-between-iphone-and-android/]]></link>
			<title>iOS 26.5 Brings Default End-to-End Encrypted RCS Messaging Between iPhone and Android</title>
			<pubDate><![CDATA[Tue, 12 May 2026 05:18:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/fcc-softens-ban-on-foreign-made-routers/]]></guid>
			<link><![CDATA[https://inionline.net/fcc-softens-ban-on-foreign-made-routers/]]></link>
			<title>FCC Softens Ban on Foreign-Made Routers</title>
			<pubDate><![CDATA[Mon, 11 May 2026 21:15:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/tech-cant-stop-these-threats-your-people-can/]]></guid>
			<link><![CDATA[https://inionline.net/tech-cant-stop-these-threats-your-people-can/]]></link>
			<title>Tech Can&#8217;t Stop These Threats — Your People Can</title>
			<pubDate><![CDATA[Mon, 11 May 2026 19:50:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/teampcp-compromises-checkmarx-jenkins-ast-plugin-weeks-after-kics-supply-chain-attack/]]></guid>
			<link><![CDATA[https://inionline.net/teampcp-compromises-checkmarx-jenkins-ast-plugin-weeks-after-kics-supply-chain-attack/]]></link>
			<title>TeamPCP Compromises Checkmarx Jenkins AST Plugin Weeks After KICS Supply Chain Attack</title>
			<pubDate><![CDATA[Mon, 11 May 2026 18:30:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/cpanel-cve-2026-41940-under-active-exploitation-to-deploy-filemanager-backdoor/]]></guid>
			<link><![CDATA[https://inionline.net/cpanel-cve-2026-41940-under-active-exploitation-to-deploy-filemanager-backdoor/]]></link>
			<title>cPanel CVE-2026-41940 Under Active Exploitation to Deploy Filemanager Backdoor</title>
			<pubDate><![CDATA[Mon, 11 May 2026 17:54:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/ollama-out-of-bounds-read-vulnerability-allows-remote-process-memory-leak/]]></guid>
			<link><![CDATA[https://inionline.net/ollama-out-of-bounds-read-vulnerability-allows-remote-process-memory-leak/]]></link>
			<title>Ollama Out-of-Bounds Read Vulnerability Allows Remote Process Memory Leak</title>
			<pubDate><![CDATA[Sun, 10 May 2026 12:41:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/cpanel-whm-release-fixes-for-three-new-vulnerabilities-patch-now/]]></guid>
			<link><![CDATA[https://inionline.net/cpanel-whm-release-fixes-for-three-new-vulnerabilities-patch-now/]]></link>
			<title>cPanel, WHM Release Fixes for Three New Vulnerabilities — Patch Now</title>
			<pubDate><![CDATA[Sat, 09 May 2026 07:16:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/hackers-used-ai-to-develop-first-known-zero-day-2fa-bypass-for-mass-exploitation/]]></guid>
			<link><![CDATA[https://inionline.net/hackers-used-ai-to-develop-first-known-zero-day-2fa-bypass-for-mass-exploitation/]]></link>
			<title>Hackers Used AI to Develop First Known Zero-Day 2FA Bypass for Mass Exploitation</title>
			<pubDate><![CDATA[Mon, 11 May 2026 15:45:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/dirty-frag-exploit-poised-to-blow-up-on-enterprise-linux-distros/]]></guid>
			<link><![CDATA[https://inionline.net/dirty-frag-exploit-poised-to-blow-up-on-enterprise-linux-distros/]]></link>
			<title>&#8216;Dirty Frag&#8217; Exploit Poised to Blow Up on Enterprise Linux Distros</title>
			<pubDate><![CDATA[Mon, 11 May 2026 15:05:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/hackers-use-ai-for-exploit-development-attack-automation/]]></guid>
			<link><![CDATA[https://inionline.net/hackers-use-ai-for-exploit-development-attack-automation/]]></link>
			<title>Hackers Use AI for Exploit Development, Attack Automation</title>
			<pubDate><![CDATA[Mon, 11 May 2026 13:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/⚡-weekly-recap-linux-rootkit-macos-crypto-stealer-websocket-skimmers-and-more/]]></guid>
			<link><![CDATA[https://inionline.net/⚡-weekly-recap-linux-rootkit-macos-crypto-stealer-websocket-skimmers-and-more/]]></link>
			<title>⚡ Weekly Recap: Linux Rootkit, macOS Crypto Stealer, WebSocket Skimmers and More</title>
			<pubDate><![CDATA[Mon, 11 May 2026 12:36:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/cyber-espionage-group-targets-aviation-firms-to-steal-map-data/]]></guid>
			<link><![CDATA[https://inionline.net/cyber-espionage-group-targets-aviation-firms-to-steal-map-data/]]></link>
			<title>Cyber Espionage Group Targets Aviation Firms to Steal Map Data</title>
			<pubDate><![CDATA[Mon, 11 May 2026 12:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/your-purple-team-isnt-purple-its-just-red-and-blue-in-the-same-room/]]></guid>
			<link><![CDATA[https://inionline.net/your-purple-team-isnt-purple-its-just-red-and-blue-in-the-same-room/]]></link>
			<title>Your Purple Team Isn&#8217;t Purple — It&#8217;s Just Red and Blue in the Same Room</title>
			<pubDate><![CDATA[Mon, 11 May 2026 11:30:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/fake-openai-privacy-filter-repo-hits-1-on-hugging-face-draws-244k-downloads/]]></guid>
			<link><![CDATA[https://inionline.net/fake-openai-privacy-filter-repo-hits-1-on-hugging-face-draws-244k-downloads/]]></link>
			<title>Fake OpenAI Privacy Filter Repo Hits #1 on Hugging Face, Draws 244K Downloads</title>
			<pubDate><![CDATA[Mon, 11 May 2026 07:05:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/shinyhunters-claims-second-attack-against-instructure/]]></guid>
			<link><![CDATA[https://inionline.net/shinyhunters-claims-second-attack-against-instructure/]]></link>
			<title>ShinyHunters Claims Second Attack Against Instructure</title>
			<pubDate><![CDATA[Fri, 08 May 2026 20:08:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/pan-os-rce-exploit-under-active-use-enabling-root-access-and-espionage/]]></guid>
			<link><![CDATA[https://inionline.net/pan-os-rce-exploit-under-active-use-enabling-root-access-and-espionage/]]></link>
			<title>PAN-OS RCE Exploit Under Active Use Enabling Root Access and Espionage</title>
			<pubDate><![CDATA[Thu, 07 May 2026 13:34:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/tclbanker-banking-trojan-targets-financial-platforms-via-whatsapp-and-outlook-worms/]]></guid>
			<link><![CDATA[https://inionline.net/tclbanker-banking-trojan-targets-financial-platforms-via-whatsapp-and-outlook-worms/]]></link>
			<title>TCLBANKER Banking Trojan Targets Financial Platforms via WhatsApp and Outlook Worms</title>
			<pubDate><![CDATA[Fri, 08 May 2026 18:12:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/worlds-first-ai-driven-cyberattack-couldnt-breach-ot-systems/]]></guid>
			<link><![CDATA[https://inionline.net/worlds-first-ai-driven-cyberattack-couldnt-breach-ot-systems/]]></link>
			<title>World&#8217;s First AI-Driven Cyberattack Couldn&#8217;t Breach OT Systems</title>
			<pubDate><![CDATA[Thu, 07 May 2026 13:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/fake-call-history-apps-stole-payments-from-users-after-7-3-million-play-store-downloads/]]></guid>
			<link><![CDATA[https://inionline.net/fake-call-history-apps-stole-payments-from-users-after-7-3-million-play-store-downloads/]]></link>
			<title>Fake Call History Apps Stole Payments From Users After 7.3 Million Play Store Downloads</title>
			<pubDate><![CDATA[Fri, 08 May 2026 15:08:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/after-replacing-teampcp-malware-pcpjack-steals-cloud-secrets/]]></guid>
			<link><![CDATA[https://inionline.net/after-replacing-teampcp-malware-pcpjack-steals-cloud-secrets/]]></link>
			<title>After Replacing TeamPCP Malware, &#8216;PCPJack&#8217; Steals Cloud Secrets</title>
			<pubDate><![CDATA[Thu, 07 May 2026 20:43:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/ivanti-epmm-cve-2026-6973-rce-under-active-exploitation-grants-admin-level-access/]]></guid>
			<link><![CDATA[https://inionline.net/ivanti-epmm-cve-2026-6973-rce-under-active-exploitation-grants-admin-level-access/]]></link>
			<title>Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access</title>
			<pubDate><![CDATA[Thu, 07 May 2026 17:55:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/pcpjack-credential-stealer-exploits-5-cves-to-spread-worm-like-across-cloud-systems/]]></guid>
			<link><![CDATA[https://inionline.net/pcpjack-credential-stealer-exploits-5-cves-to-spread-worm-like-across-cloud-systems/]]></link>
			<title>PCPJack Credential Stealer Exploits 5 CVEs to Spread Worm-Like Across Cloud Systems</title>
			<pubDate><![CDATA[Thu, 07 May 2026 17:45:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/has-cisa-finally-found-its-new-leader-in-tom-parker/]]></guid>
			<link><![CDATA[https://inionline.net/has-cisa-finally-found-its-new-leader-in-tom-parker/]]></link>
			<title>Has CISA Finally Found Its New Leader in Tom Parker?</title>
			<pubDate><![CDATA[Thu, 07 May 2026 16:55:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/one-click-total-shutdown-the-patient-zero-webinar-on-killing-stealth-breaches/]]></guid>
			<link><![CDATA[https://inionline.net/one-click-total-shutdown-the-patient-zero-webinar-on-killing-stealth-breaches/]]></link>
			<title>One Click, Total Shutdown: The &#8220;Patient Zero&#8221; Webinar on Killing Stealth Breaches</title>
			<pubDate><![CDATA[Thu, 07 May 2026 13:50:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/quasar-linux-rat-steals-developer-credentials-for-software-supply-chain-compromise/]]></guid>
			<link><![CDATA[https://inionline.net/quasar-linux-rat-steals-developer-credentials-for-software-supply-chain-compromise/]]></link>
			<title>Quasar Linux RAT Steals Developer Credentials for Software Supply Chain Compromise</title>
			<pubDate><![CDATA[Fri, 08 May 2026 11:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/trustfall-convention-exposes-claude-code-execution-risk/]]></guid>
			<link><![CDATA[https://inionline.net/trustfall-convention-exposes-claude-code-execution-risk/]]></link>
			<title>&#8216;TrustFall&#8217; Convention Exposes Claude Code Execution Risk</title>
			<pubDate><![CDATA[Thu, 07 May 2026 13:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/one-missed-threat-per-week-what-25m-alerts-reveal-about-low-severity-risk/]]></guid>
			<link><![CDATA[https://inionline.net/one-missed-threat-per-week-what-25m-alerts-reveal-about-low-severity-risk/]]></link>
			<title>One Missed Threat Per Week: What 25M Alerts Reveal About Low-Severity Risk</title>
			<pubDate><![CDATA[Fri, 08 May 2026 10:30:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/instructure-breach-exposes-schools-vendor-dependence/]]></guid>
			<link><![CDATA[https://inionline.net/instructure-breach-exposes-schools-vendor-dependence/]]></link>
			<title>Instructure Breach Exposes Schools&#8217; Vendor Dependence</title>
			<pubDate><![CDATA[Wed, 06 May 2026 21:02:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/linux-kernel-dirty-frag-lpe-exploit-enables-root-access-across-major-distributions/]]></guid>
			<link><![CDATA[https://inionline.net/linux-kernel-dirty-frag-lpe-exploit-enables-root-access-across-major-distributions/]]></link>
			<title>Linux Kernel Dirty Frag LPE Exploit Enables Root Access Across Major Distributions</title>
			<pubDate><![CDATA[Fri, 08 May 2026 05:12:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/mirai-based-xlabs_v1-botnet-exploits-adb-to-hijack-iot-devices-for-ddos-attacks/]]></guid>
			<link><![CDATA[https://inionline.net/mirai-based-xlabs_v1-botnet-exploits-adb-to-hijack-iot-devices-for-ddos-attacks/]]></link>
			<title>Mirai-Based xlabs_v1 Botnet Exploits ADB to Hijack IoT Devices for DDoS Attacks</title>
			<pubDate><![CDATA[Wed, 06 May 2026 20:21:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/muddywater-uses-microsoft-teams-to-steal-credentials-in-false-flag-ransomware-attack/]]></guid>
			<link><![CDATA[https://inionline.net/muddywater-uses-microsoft-teams-to-steal-credentials-in-false-flag-ransomware-attack/]]></link>
			<title>MuddyWater Uses Microsoft Teams to Steal Credentials in False Flag Ransomware Attack</title>
			<pubDate><![CDATA[Wed, 06 May 2026 13:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/threatsday-bulletin-edge-plaintext-passwords-ics-0-days-patch-or-die-alerts-and-25-new-stories/]]></guid>
			<link><![CDATA[https://inionline.net/threatsday-bulletin-edge-plaintext-passwords-ics-0-days-patch-or-die-alerts-and-25-new-stories/]]></link>
			<title>ThreatsDay Bulletin: Edge Plaintext Passwords, ICS 0-Days, Patch-or-Die Alerts and 25+ New Stories</title>
			<pubDate><![CDATA[Thu, 07 May 2026 11:33:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/yet-another-way-to-bypass-google-chromes-encryption-protection/]]></guid>
			<link><![CDATA[https://inionline.net/yet-another-way-to-bypass-google-chromes-encryption-protection/]]></link>
			<title>Yet Another Way to Bypass Google Chrome&#8217;s Encryption Protection</title>
			<pubDate><![CDATA[Wed, 06 May 2026 21:19:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/day-zero-readiness-the-operational-gaps-that-break-incident-response/]]></guid>
			<link><![CDATA[https://inionline.net/day-zero-readiness-the-operational-gaps-that-break-incident-response/]]></link>
			<title>Day Zero Readiness: The Operational Gaps That Break Incident Response</title>
			<pubDate><![CDATA[Thu, 07 May 2026 10:54:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/pypi-packages-deliver-zichatbot-malware-via-zulip-apis-on-windows-and-linux/]]></guid>
			<link><![CDATA[https://inionline.net/pypi-packages-deliver-zichatbot-malware-via-zulip-apis-on-windows-and-linux/]]></link>
			<title>PyPI Packages Deliver ZiChatBot Malware via Zulip APIs on Windows and Linux</title>
			<pubDate><![CDATA[Thu, 07 May 2026 09:20:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/vm2-node-js-library-vulnerabilities-enable-sandbox-escape-and-arbitrary-code-execution/]]></guid>
			<link><![CDATA[https://inionline.net/vm2-node-js-library-vulnerabilities-enable-sandbox-escape-and-arbitrary-code-execution/]]></link>
			<title>vm2 Node.js Library Vulnerabilities Enable Sandbox Escape and Arbitrary Code Execution</title>
			<pubDate><![CDATA[Thu, 07 May 2026 04:15:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/new-linux-pamdoora-backdoor-uses-pam-modules-to-steal-ssh-credentials/]]></guid>
			<link><![CDATA[https://inionline.net/new-linux-pamdoora-backdoor-uses-pam-modules-to-steal-ssh-credentials/]]></link>
			<title>New Linux PamDOORa Backdoor Uses PAM Modules to Steal SSH Credentials</title>
			<pubDate><![CDATA[Fri, 08 May 2026 08:41:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/linux-kernel-dirty-frag-lpe-exploit-enables-root-access-across-major-distributions-2/]]></guid>
			<link><![CDATA[https://inionline.net/linux-kernel-dirty-frag-lpe-exploit-enables-root-access-across-major-distributions-2/]]></link>
			<title>Linux Kernel Dirty Frag LPE Exploit Enables Root Access Across Major Distributions</title>
			<pubDate><![CDATA[Fri, 08 May 2026 05:12:00 +0000]]></pubDate>
		</item>
				</channel>
</rss>
