<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 21, 2026 at 9:33 pm by All in One SEO v4.9.6.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://inionline.net/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>inionline.net</title>
		<link><![CDATA[https://inionline.net]]></link>
		<description><![CDATA[inionline.net]]></description>
		<lastBuildDate><![CDATA[Wed, 15 Apr 2026 15:12:01 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://inionline.net/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://inionline.net/prepping-for-q-day-why-quantum-risk-management-should-start-now/]]></guid>
			<link><![CDATA[https://inionline.net/prepping-for-q-day-why-quantum-risk-management-should-start-now/]]></link>
			<title>Prepping for &#8216;Q-Day&#8217;: Why Quantum Risk Management Should Start Now</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 15:12:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/exploits-turn-windows-defender-into-attacker-tool/]]></guid>
			<link><![CDATA[https://inionline.net/exploits-turn-windows-defender-into-attacker-tool/]]></link>
			<title>Exploits Turn Windows Defender into Attacker Tool</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 19:12:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/systembc-c2-server-reveals-1570-victims-in-the-gentlemen-ransomware-operation/]]></guid>
			<link><![CDATA[https://inionline.net/systembc-c2-server-reveals-1570-victims-in-the-gentlemen-ransomware-operation/]]></link>
			<title>SystemBC C2 Server Reveals 1,570+ Victims in The Gentlemen Ransomware Operation</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 18:18:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/22-bridgebreak-flaws-expose-20000-lantronix-and-silex-serial-to-ip-converters/]]></guid>
			<link><![CDATA[https://inionline.net/22-bridgebreak-flaws-expose-20000-lantronix-and-silex-serial-to-ip-converters/]]></link>
			<title>22 BRIDGE:BREAK Flaws Expose 20,000 Lantronix and Silex Serial-to-IP Converters</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 15:46:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/surge-in-bomgar-rmm-exploitation-demonstrates-supply-chain-risk/]]></guid>
			<link><![CDATA[https://inionline.net/surge-in-bomgar-rmm-exploitation-demonstrates-supply-chain-risk/]]></link>
			<title>Surge in Bomgar RMM Exploitation Demonstrates Supply Chain Risk</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 15:29:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/ransomware-negotiator-pleads-guilty-to-aiding-blackcat-attacks-in-2023/]]></guid>
			<link><![CDATA[https://inionline.net/ransomware-negotiator-pleads-guilty-to-aiding-blackcat-attacks-in-2023/]]></link>
			<title>Ransomware Negotiator Pleads Guilty to Aiding BlackCat Attacks in 2023</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 14:31:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/5-places-where-mature-socs-keep-mttr-fast-and-others-waste-time/]]></guid>
			<link><![CDATA[https://inionline.net/5-places-where-mature-socs-keep-mttr-fast-and-others-waste-time/]]></link>
			<title>5 Places where Mature SOCs Keep MTTR Fast and Others Waste Time</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 13:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/chinese-apt-targets-indian-banks-korean-policy-circles/]]></guid>
			<link><![CDATA[https://inionline.net/chinese-apt-targets-indian-banks-korean-policy-circles/]]></link>
			<title>Chinese APT Targets Indian Banks, Korean Policy Circles</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 12:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/no-exploit-needed-how-attackers-walk-through-the-front-door-via-identity-based-attacks/]]></guid>
			<link><![CDATA[https://inionline.net/no-exploit-needed-how-attackers-walk-through-the-front-door-via-identity-based-attacks/]]></link>
			<title>No Exploit Needed: How Attackers Walk Through the Front Door via Identity-Based Attacks</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 11:30:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/google-fixes-critical-rce-flaw-in-ai-based-antigravity-tool/]]></guid>
			<link><![CDATA[https://inionline.net/google-fixes-critical-rce-flaw-in-ai-based-antigravity-tool/]]></link>
			<title>Google Fixes Critical RCE Flaw in AI-Based Antigravity Tool</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 10:52:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/ngate-campaign-targets-brazil-trojanizes-handypay-to-steal-nfc-data-and-pins/]]></guid>
			<link><![CDATA[https://inionline.net/ngate-campaign-targets-brazil-trojanizes-handypay-to-steal-nfc-data-and-pins/]]></link>
			<title>NGate Campaign Targets Brazil, Trojanizes HandyPay to Steal NFC Data and PINs</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 10:40:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/google-patches-antigravity-ide-flaw-enabling-prompt-injection-code-execution/]]></guid>
			<link><![CDATA[https://inionline.net/google-patches-antigravity-ide-flaw-enabling-prompt-injection-code-execution/]]></link>
			<title>Google Patches Antigravity IDE Flaw Enabling Prompt Injection Code Execution</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 10:22:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/cisa-adds-8-exploited-flaws-to-kev-sets-april-may-2026-federal-deadlines/]]></guid>
			<link><![CDATA[https://inionline.net/cisa-adds-8-exploited-flaws-to-kev-sets-april-may-2026-federal-deadlines/]]></link>
			<title>CISA Adds 8 Exploited Flaws to KEV, Sets April-May 2026 Federal Deadlines</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 06:23:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/apache-activemq-rce/]]></guid>
			<link><![CDATA[https://inionline.net/apache-activemq-rce/]]></link>
			<title>Apache ActiveMQ RCE</title>
			<pubDate><![CDATA[Tue, 21 Apr 2026 04:56:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/vercel-employees-ai-tool-access-led-to-data-breach/]]></guid>
			<link><![CDATA[https://inionline.net/vercel-employees-ai-tool-access-led-to-data-breach/]]></link>
			<title>Vercel Employee&#8217;s AI Tool Access Led to Data Breach</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 21:01:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/serial-to-ip-devices-hide-thousands-of-old-and-new-bugs/]]></guid>
			<link><![CDATA[https://inionline.net/serial-to-ip-devices-hide-thousands-of-old-and-new-bugs/]]></link>
			<title>Serial-to-IP Devices Hide Thousands of Old and New Bugs</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 21:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/sglang-cve-2026-5760-cvss-9-8-enables-rce-via-malicious-gguf-model-files/]]></guid>
			<link><![CDATA[https://inionline.net/sglang-cve-2026-5760-cvss-9-8-enables-rce-via-malicious-gguf-model-files/]]></link>
			<title>SGLang CVE-2026-5760 (CVSS 9.8) Enables RCE via Malicious GGUF Model Files</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 17:14:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/mirai-variant-nexcorium-exploits-cve-2024-3721-to-hijack-tbk-dvrs-for-ddos-botnet/]]></guid>
			<link><![CDATA[https://inionline.net/mirai-variant-nexcorium-exploits-cve-2024-3721-to-hijack-tbk-dvrs-for-ddos-botnet/]]></link>
			<title>Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet</title>
			<pubDate><![CDATA[Sat, 18 Apr 2026 06:01:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/whatsapp-leaks-user-metadata-to-attackers/]]></guid>
			<link><![CDATA[https://inionline.net/whatsapp-leaks-user-metadata-to-attackers/]]></link>
			<title>WhatsApp Leaks User Metadata to Attackers</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 14:33:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/13-74m-hack-shuts-down-sanctioned-grinex-exchange-after-intelligence-claims/]]></guid>
			<link><![CDATA[https://inionline.net/13-74m-hack-shuts-down-sanctioned-grinex-exchange-after-intelligence-claims/]]></link>
			<title>$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims</title>
			<pubDate><![CDATA[Sat, 18 Apr 2026 07:59:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/⚡-weekly-recap-vercel-hack-push-fraud-qemu-abused-new-android-rats-emerge-more/]]></guid>
			<link><![CDATA[https://inionline.net/⚡-weekly-recap-vercel-hack-push-fraud-qemu-abused-new-android-rats-emerge-more/]]></link>
			<title>⚡ Weekly Recap: Vercel Hack, Push Fraud, QEMU Abused, New Android RATs Emerge &amp; More</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 13:41:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/why-most-ai-deployments-stall-after-the-demo/]]></guid>
			<link><![CDATA[https://inionline.net/why-most-ai-deployments-stall-after-the-demo/]]></link>
			<title>Why Most AI Deployments Stall After the Demo</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 11:30:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/anthropic-mcp-design-vulnerability-enables-rce-threatening-ai-supply-chain/]]></guid>
			<link><![CDATA[https://inionline.net/anthropic-mcp-design-vulnerability-enables-rce-threatening-ai-supply-chain/]]></link>
			<title>Anthropic MCP Design Vulnerability Enables RCE, Threatening AI Supply Chain</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 10:42:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/researchers-detect-zionsiphon-malware-targeting-israeli-water-desalination-ot-systems/]]></guid>
			<link><![CDATA[https://inionline.net/researchers-detect-zionsiphon-malware-targeting-israeli-water-desalination-ot-systems/]]></link>
			<title>Researchers Detect ZionSiphon Malware Targeting Israeli Water, Desalination OT Systems</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 07:34:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/vercel-breach-tied-to-context-ai-hack-exposes-limited-customer-credentials/]]></guid>
			<link><![CDATA[https://inionline.net/vercel-breach-tied-to-context-ai-hack-exposes-limited-customer-credentials/]]></link>
			<title>Vercel Breach Tied to Context AI Hack Exposes Limited Customer Credentials</title>
			<pubDate><![CDATA[Mon, 20 Apr 2026 03:35:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/how-nists-cutback-of-cve-handling-impacts-cyber-teams/]]></guid>
			<link><![CDATA[https://inionline.net/how-nists-cutback-of-cve-handling-impacts-cyber-teams/]]></link>
			<title>How NIST&#8217;s Cutback of CVE Handling Impacts Cyber Teams</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 19:51:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/tycoon-2fa-phishers-scatter-adopt-device-code-phishing/]]></guid>
			<link><![CDATA[https://inionline.net/tycoon-2fa-phishers-scatter-adopt-device-code-phishing/]]></link>
			<title>Tycoon 2FA Phishers Scatter, Adopt Device Code Phishing</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 19:05:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/microsofts-original-windows-secure-boot-certificate-is-expiring/]]></guid>
			<link><![CDATA[https://inionline.net/microsofts-original-windows-secure-boot-certificate-is-expiring/]]></link>
			<title>Microsoft&#8217;s Original Windows Secure Boot Certificate Is Expiring</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 15:16:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/every-old-vulnerability-is-now-an-ai-vulnerability/]]></guid>
			<link><![CDATA[https://inionline.net/every-old-vulnerability-is-now-an-ai-vulnerability/]]></link>
			<title>Every Old Vulnerability Is Now an AI Vulnerability</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 14:47:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/threatsday-bulletin-defender-0-day-sonicwall-brute-force-17-year-old-excel-rce-and-15-more-stories/]]></guid>
			<link><![CDATA[https://inionline.net/threatsday-bulletin-defender-0-day-sonicwall-brute-force-17-year-old-excel-rce-and-15-more-stories/]]></link>
			<title>ThreatsDay Bulletin: Defender 0-Day, SonicWall Brute-Force, 17-Year-Old Excel RCE and 15 More Stories</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 13:05:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/three-microsoft-defender-zero-days-actively-exploited-two-still-unpatched/]]></guid>
			<link><![CDATA[https://inionline.net/three-microsoft-defender-zero-days-actively-exploited-two-still-unpatched/]]></link>
			<title>Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 13:21:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/nist-revamps-cve-framework-to-focus-on-high-impact-vulnerabilities/]]></guid>
			<link><![CDATA[https://inionline.net/nist-revamps-cve-framework-to-focus-on-high-impact-vulnerabilities/]]></link>
			<title>NIST Revamps CVE Framework to Focus on High-Impact Vulnerabilities</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 21:47:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/north-korea-uses-clickfix-to-target-macos-users-data/]]></guid>
			<link><![CDATA[https://inionline.net/north-korea-uses-clickfix-to-target-macos-users-data/]]></link>
			<title>North Korea Uses ClickFix to Target macOS Users&#8217; Data</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 19:42:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/harmless-global-adware-transforms-into-an-av-killer/]]></guid>
			<link><![CDATA[https://inionline.net/harmless-global-adware-transforms-into-an-av-killer/]]></link>
			<title>&#8216;Harmless&#8217; Global Adware Transforms Into an AV Killer</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 19:07:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/newly-discovered-powmix-botnet-hits-czech-workers-using-randomized-c2-traffic/]]></guid>
			<link><![CDATA[https://inionline.net/newly-discovered-powmix-botnet-hits-czech-workers-using-randomized-c2-traffic/]]></link>
			<title>Newly Discovered PowMix Botnet Hits Czech Workers Using Randomized C2 Traffic</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 17:52:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/two-factor-authentication-breaks-free-from-the-desktop/]]></guid>
			<link><![CDATA[https://inionline.net/two-factor-authentication-breaks-free-from-the-desktop/]]></link>
			<title>Two-Factor Authentication Breaks Free from the Desktop</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 15:28:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/coast-guards-new-cybersecurity-rules-offers-lessons-for-cisos/]]></guid>
			<link><![CDATA[https://inionline.net/coast-guards-new-cybersecurity-rules-offers-lessons-for-cisos/]]></link>
			<title>Coast Guard&#8217;s New Cybersecurity Rules Offers Lessons for CISOs</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 13:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/webinar-find-and-eliminate-orphaned-non-human-identities-in-your-environment/]]></guid>
			<link><![CDATA[https://inionline.net/webinar-find-and-eliminate-orphaned-non-human-identities-in-your-environment/]]></link>
			<title>[Webinar] Find and Eliminate Orphaned Non-Human Identities in Your Environment</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 11:55:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/google-blocks-8-3b-policy-violating-ads-in-2025-launches-android-17-privacy-overhaul/]]></guid>
			<link><![CDATA[https://inionline.net/google-blocks-8-3b-policy-violating-ads-in-2025-launches-android-17-privacy-overhaul/]]></link>
			<title>Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 10:47:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/critical-mcp-integration-flaw-puts-nginx-at-risk/]]></guid>
			<link><![CDATA[https://inionline.net/critical-mcp-integration-flaw-puts-nginx-at-risk/]]></link>
			<title>Critical MCP Integration Flaw Puts NGINX at Risk</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 21:45:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/operation-poweroff-seizes-53-ddos-domains-exposes-3-million-criminal-accounts/]]></guid>
			<link><![CDATA[https://inionline.net/operation-poweroff-seizes-53-ddos-domains-exposes-3-million-criminal-accounts/]]></link>
			<title>Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 05:46:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/navigating-the-unique-security-risks-of-asias-digital-supply-chain/]]></guid>
			<link><![CDATA[https://inionline.net/navigating-the-unique-security-risks-of-asias-digital-supply-chain/]]></link>
			<title>Navigating the Unique Security Risks of Asia&#8217;s Digital Supply Chain</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 19:30:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/n8n-webhooks-abused-since-october-2025-to-deliver-malware-via-phishing-emails/]]></guid>
			<link><![CDATA[https://inionline.net/n8n-webhooks-abused-since-october-2025-to-deliver-malware-via-phishing-emails/]]></link>
			<title>n8n Webhooks Abused Since October 2025 to Deliver Malware via Phishing Emails</title>
			<pubDate><![CDATA[Wed, 15 Apr 2026 17:09:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/cisco-patches-four-critical-identity-services-webex-flaws-enabling-code-execution/]]></guid>
			<link><![CDATA[https://inionline.net/cisco-patches-four-critical-identity-services-webex-flaws-enabling-code-execution/]]></link>
			<title>Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 11:27:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/obsidian-plugin-abuse-delivers-phantompulse-rat-in-targeted-finance-crypto-attacks/]]></guid>
			<link><![CDATA[https://inionline.net/obsidian-plugin-abuse-delivers-phantompulse-rat-in-targeted-finance-crypto-attacks/]]></link>
			<title>Obsidian Plugin Abuse Delivers PHANTOMPULSE RAT in Targeted Finance, Crypto Attacks</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 11:02:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/hidden-passenger-how-taboola-routes-logged-in-banking-sessions-to-temu/]]></guid>
			<link><![CDATA[https://inionline.net/hidden-passenger-how-taboola-routes-logged-in-banking-sessions-to-temu/]]></link>
			<title>Hidden Passenger? How Taboola Routes Logged-In Banking Sessions to Temu</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 10:30:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/uac-0247-targets-ukrainian-clinics-and-government-in-data-theft-malware-campaign/]]></guid>
			<link><![CDATA[https://inionline.net/uac-0247-targets-ukrainian-clinics-and-government-in-data-theft-malware-campaign/]]></link>
			<title>UAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaign</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 06:20:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/6-year-ransomware-campaign-targets-turkish-homes-smbs/]]></guid>
			<link><![CDATA[https://inionline.net/6-year-ransomware-campaign-targets-turkish-homes-smbs/]]></link>
			<title>6-Year Ransomware Campaign Targets Turkish Homes &amp; SMBs</title>
			<pubDate><![CDATA[Thu, 16 Apr 2026 06:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/nist-limits-cve-enrichment-after-263-surge-in-vulnerability-submissions/]]></guid>
			<link><![CDATA[https://inionline.net/nist-limits-cve-enrichment-after-263-surge-in-vulnerability-submissions/]]></link>
			<title>NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 07:14:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://inionline.net/apache-activemq-cve-2026-34197-added-to-cisa-kev-amid-active-exploitation/]]></guid>
			<link><![CDATA[https://inionline.net/apache-activemq-cve-2026-34197-added-to-cisa-kev-amid-active-exploitation/]]></link>
			<title>Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation</title>
			<pubDate><![CDATA[Fri, 17 Apr 2026 03:22:00 +0000]]></pubDate>
		</item>
				</channel>
</rss>
