<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//hawkeyecybersecurity.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://hawkeyecybersecurity.com/ai-assisted-lazarus-campaign-targets-developers-with-backdoored-coding-challenges/</loc>
		<lastmod>2026-04-24T03:02:08+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/AI-Assisted-Lazarus-Campaign-Targets-Developers-With-Backdoored-Coding-Challenges-Uglu1E.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/north-korean-hackers-use-fake-it-worker-scheme-to-infiltrate-companies-and-evade-sanctions/</loc>
		<lastmod>2026-04-24T03:02:08+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/North-Korean-Hackers-Use-Fake-IT-Worker-Scheme-to-Infiltrate-Companies-and-Evade-Sanctions-tnGrJg.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/malicious-npm-package-turns-hugging-face-into-malware-cdn-and-exfiltration-backend/</loc>
		<lastmod>2026-04-24T03:02:08+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Malicious-npm-Package-Turns-Hugging-Face-Into-Malware-CDN-and-Exfiltration-Backend-CAC88y.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/microsoft-warns-jasper-sleet-uses-fake-it-worker-identities-to-infiltrate-cloud-environments/</loc>
		<lastmod>2026-04-24T03:02:09+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Microsoft-Warns-Jasper-Sleet-Uses-Fake-IT-Worker-Identities-to-Infiltrate-Cloud-Environments-j11rNO.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/bitwarden-cli-compromised-in-supply-chain-attack-via-github-actions/</loc>
		<lastmod>2026-04-24T03:02:09+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Bitwarden-CLI-Compromised-DXIcV7.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/hackers-abuse-fake-wallpaper-app-and-youtube-channel-to-spread-notnullosx-malware/</loc>
		<lastmod>2026-04-24T03:02:09+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Hackers-Abuse-Fake-Wallpaper-App-and-YouTube-Channel-to-Spread-notnullOSX-Malware-yu3jsw.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/malicious-google-ads-target-crypto-users-with-wallet-drainers-and-seed-phrase-theft/</loc>
		<lastmod>2026-04-24T03:02:09+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Malicious-Google-Ads-Target-Crypto-Users-With-Wallet-Drainers-and-Seed-Phrase-Theft-fIhrg5.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/hackers-use-lotus-wiper-to-destroy-drives-and-delete-files-in-energy-sector-attack/</loc>
		<lastmod>2026-04-24T03:02:09+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Hackers-Use-Lotus-Wiper-to-Destroy-Drives-and-Delete-Files-in-Energy-Sector-Attack-tzQcYx.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/cybercriminals-exploit-french-fintech-accounts-to-move-stolen-money-before-detection/</loc>
		<lastmod>2026-04-24T03:02:09+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Cybercriminals-Exploit-French-Fintech-Accounts-to-Move-Stolen-Money-Before-Detection-ErIms7.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/109-fake-github-repositories-used-to-deliver-smartloader-and-stealc-malware/</loc>
		<lastmod>2026-04-24T03:02:09+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/109-Fake-GitHub-Repositories-Used-to-Deliver-SmartLoader-and-StealC-Malware-0jSM35.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/breachlock-named-representative-vendor-in-the-2026-gartner-market-guide-for-adversarial-exposure-validation/</loc>
		<lastmod>2026-04-24T03:02:09+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/TTT20-202026-04-21T202408.150-f2YjWV.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/new-ngate-malware-developed-using-ai-hides-in-nfc-payment-apps/</loc>
		<lastmod>2026-04-24T03:02:10+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/New-NGate-Malware-Developed-Using-AI-Hides-in-NFC-Payment-Apps-lIrABh.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/north-korea-linked-unc1069-uses-fake-zoom-and-teams-meetings-to-hack-crypto-professionals/</loc>
		<lastmod>2026-04-24T03:02:10+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/North-Korea-Linked-UNC1069-Uses-Fake-Zoom-and-Teams-Meetings-to-Hack-Crypto-Professionals-Hq7N9n.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/hackers-use-appdomain-hijacking-to-turn-trusted-intel-utility-into-malware-launcher/</loc>
		<lastmod>2026-04-24T03:02:10+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Hackers-Use-AppDomain-Hijacking-to-Turn-Trusted-Intel-Utility-Into-Malware-Launcher-Kh9DGZ.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/new-purerat-campaign-hides-pe-payloads-in-png-files-and-executes-them-filelessly/</loc>
		<lastmod>2026-04-24T03:02:10+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/New-PureRAT-Campaign-Hides-PE-Payloads-in-PNG-Files-and-Executes-Them-Filelessly-OC0Gwy.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/the-ungoverned-workforce-cybersecurity-insiders-finds-92-lack-visibility-into-ai-identities/</loc>
		<lastmod>2026-04-24T03:02:10+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/TTT20-202026-04-21T201515.248-nujRSE.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/where-most-socs-stall-building-soc-maturity-with-threat-intelligence-feeds/</loc>
		<lastmod>2026-04-24T03:02:10+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/SOC20Maturity20with20Threat20Intelligence20Feeds-36PWFb.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/gh0st-rat-and-cloverplus-adware-delivered-together-in-new-dual-payload-malware-campaign/</loc>
		<lastmod>2026-04-24T03:02:10+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Gh0st-RAT-and-CloverPlus-Adware-Delivered-Together-in-New-Dual-Payload-Malware-Campaign-7eOhPy.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/lovable-ai-app-builder-reportedly-exposes-thousands-of-projects-data-via-api-flaw/</loc>
		<lastmod>2026-04-24T03:02:11+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Lovable-AI-App-Builder-Customer-Data-FRckVb.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/researchers-say-iranian-mois-uses-multiple-hacker-personas-for-one-coordinated-cyber-campaign/</loc>
		<lastmod>2026-04-24T03:02:11+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Researchers-Say-Iranian-MOIS-Uses-Multiple-Hacker-Personas-for-One-Coordinated-Cyber-Campaign-qxsbxi.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/microsoft-teams-right-click-paste-broken-following-edge-browser-update/</loc>
		<lastmod>2026-04-24T03:02:52+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Teams-Right-Click-Paste-Broken-HgDn4Y.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/fiverr-allegedly-leaks-user-information-to-google-indexing-researchers-say/</loc>
		<lastmod>2026-04-24T03:02:52+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Fiverr-Allegedly-Leaks-User-Information-to-Google-Indexing-Researchers-Say-1-f6jbUi.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/openai-expands-cyber-defense-program-with-gpt-5-4-cyber-access-for-trusted-organizations/</loc>
		<lastmod>2026-04-24T03:02:52+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/OpenAI-Expands-Cyber-Defense-Program-With-GPT-5.4-Cyber-Access-for-Trusted-Organizations-cBQPqx.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/researcher-uses-claude-opus-to-build-a-working-chrome-exploit-chain/</loc>
		<lastmod>2026-04-24T03:02:52+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Researcher-Uses-Claude-Opus-to-Build-a-Working-Chrome-Exploit-Chain-1-ZIQFhz.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/apple-works-on-fix-for-iphone-passcode-bug-linked-to-missing-czech-keyboard-character/</loc>
		<lastmod>2026-04-24T03:02:52+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Apple-Works-on-Fix-for-iPhone-Passcode-Bug-Linked-to-Missing-Czech-Keyboard-Character-1-1-2ZpOR8.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/nexcorium-associated-mirai-variant-uses-tbk-dvr-exploit-to-scale-botnet-operations/</loc>
		<lastmod>2026-04-24T03:02:53+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Nexcorium-Mirai-Variant-Weaponizes-TBK-DVR-Vulnerability-in-Fresh-IoT-Botnet-Push-1-2-1-vAtx1h.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/nearly-6-million-internet-facing-ftp-servers-still-exposed-in-2026-censys-warns/</loc>
		<lastmod>2026-04-24T03:02:53+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Nearly-6-Million-Internet-Facing-FTP-Servers-Still-Exposed-in-2026-Censys-Warns-5uK2ny.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/attackers-weaponize-cve-2026-39987-to-spread-blockchain-based-backdoor-via-hugging-face/</loc>
		<lastmod>2026-04-24T03:02:53+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Attackers-Weaponize-CVE-2026-39987-to-Spread-Blockchain-Based-Backdoor-Via-Hugging-Face-1RiFdj.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/fake-zoom-sdk-update-delivers-sapphire-sleet-malware-in-new-macos-intrusion-chain/</loc>
		<lastmod>2026-04-24T03:02:53+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Fake-Zoom-SDK-Update-Delivers-Sapphire-Sleet-Malware-in-New-macOS-Intrusion-Chain-H3cqpK.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/email-borne-worm-surge-drives-new-threat-wave-across-industrial-control-systems/</loc>
		<lastmod>2026-04-24T03:02:53+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Email-Borne-Worm-Surge-Drives-New-Threat-Wave-Across-Industrial-Control-Systems-kNQ7Wy.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/fake-ledger-hardware-wallets-on-chinese-marketplaces-steal-crypto-seeds-and-pins/</loc>
		<lastmod>2026-04-24T03:02:53+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Fake-Ledger-Hardware-Wallets-1-hqsqq0.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/spankrat-exploits-windows-explorer-processes-for-stealth-and-delayed-detection/</loc>
		<lastmod>2026-04-24T03:02:53+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/SpankRAT-Exploits-Windows-Process-Jhxg8Y.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/hackers-target-tp-link-routers-with-mirai-malware-in-cve-2023-33538-exploitation-attempts/</loc>
		<lastmod>2026-04-24T03:02:53+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Hackers-Target-TP-Link-Routers-With-Mirai-Malware-in-CVE-2023-33538-Exploitation-Attempts-lcmMO9.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/microsoft-365-web-services-hit-by-google-chrome-147-compatibility-issue/</loc>
		<lastmod>2026-04-24T03:02:54+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Microsoft-365-Chrome-147-Issue-n0gZJk.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/two-u-s-nationals-sentenced-for-running-laptop-farm-for-dprk-remote-workers/</loc>
		<lastmod>2026-04-24T03:02:54+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Two-U.S.-Nationals-Sentenced-for-Running-Laptop-Farms-in-5-Million-DPRK-Remote-Worker-Scheme-gB3oO4.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/google-microsoft-meta-tracking-you-even-if-you-opt-out-new-research/</loc>
		<lastmod>2026-04-24T03:02:54+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Google-Microsoft-Meta-Tracking-You-Even-if-You-Opt-Out-New-Research-sbeEqP.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/critical-cisco-ise-vulnerabilities-let-remote-attackers-execute-malicious-code/</loc>
		<lastmod>2026-04-24T03:02:54+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Critical-Cisco-ISE-Vulnerabilities-Let-Remote-Attackers-Execute-Malicious-Code-2ggwf0.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/new-uac-0247-campaign-steals-browser-and-whatsapp-data-from-hospitals-and-governments/</loc>
		<lastmod>2026-04-24T03:02:54+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/New-UAC-0247-Campaign-Steals-Browser-and-WhatsApp-Data-From-Hospitals-and-Governments-1ZHRwu.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/windows-active-directory-vulnerability-allow-attackers-to-execute-malicious-code/</loc>
		<lastmod>2026-04-24T03:02:54+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Windows-Active-Directory-Vulnerability-Allow-Attackers-to-execute-Malicious-code-2xTdfV.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/microsoft-releases-cumulative-update-kb5083769-for-windows-11-version-25h2-and-24h2/</loc>
		<lastmod>2026-04-24T03:02:54+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Microsoft-Releases-cumulative-update-KB5083769-for-Windows-11-version-25H2-and-24H2-HAWoPd.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/adobe-acrobat-reader-vulnerabilities-let-attackers-execute-arbitrary-code/</loc>
		<lastmod>2026-04-24T03:03:15+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Adobe-Acrobat-Reader-Vulnerability-Let-Attackers-Execute-Arbitrary-Code-19B5wP.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/new-php-composer-vulnerability-let-attackers-execute-arbitrary-commands/</loc>
		<lastmod>2026-04-24T03:03:15+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/New-s-Vulnerability-Let-Attackers-Execute-arbitrary-commands-aCmAJB.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/fortinet-patches-11-vulnerabilities-across-fortisandbox-fortios-fortianalyzer-and-fortimanager/</loc>
		<lastmod>2026-04-24T03:03:15+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/FortiClient-EMS-Instances-Exposed-Online-18bWxY.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/security-risk-advisors-purple-team-participants-can-now-earn-cpe-credits/</loc>
		<lastmod>2026-04-24T03:03:15+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/sra-purple-team-cpe-credits-pr-featured_1776180900VZhTqvBTWp-YUS57K.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/microsoft-patch-tuesday-april-2026-168-vulnerabilities-fixed-including-actively-exploited-0-day/</loc>
		<lastmod>2026-04-24T03:03:15+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Microsoft-Patch-Tuesday-April-2026-GEEuby.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/hackers-abuse-github-and-jira-notifications-to-deliver-phishing-through-trusted-saas-channels/</loc>
		<lastmod>2026-04-24T03:03:16+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Hackers-Abuse-GitHub-and-Jira-Notifications-to-Deliver-Phishing-Through-Trusted-SaaS-Channels-M5xg6Q.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/claude-ai-reportedly-down-for-hundreds-of-users-with-intermittent-500-errors/</loc>
		<lastmod>2026-04-24T03:03:16+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Claude-AI-Reportedly-Down-TPdvLn.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/nginx-1-29-8-and-freenginx-released-with-critical-security-updates/</loc>
		<lastmod>2026-04-24T03:03:16+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Nginx-1.29.8-and-FreeNginx-Released-With-Critical-Security-Updates-b4qQIX.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/how-threat-intelligence-drives-a-real-roi-boost-for-your-soc/</loc>
		<lastmod>2026-04-24T03:03:16+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Threat20Intelligence20Boosts20ROI20and20Strengthens20Your20SOC-cE0QPj.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/mozilla-criticizes-microsoft-for-installing-copilot-on-windows-without-user-consent/</loc>
		<lastmod>2026-04-24T03:03:16+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Mozilla-Criticizes-Microsoft-for-Copilot-9F0x9H.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/ivanti-neurons-for-itsm-vulnerabilities-allow-remote-attacker-to-obtain-user-sessions/</loc>
		<lastmod>2026-04-24T03:03:16+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Ivanti-Neurons-ITSM-Vulnerabilities-XrFzHw.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/critical-etcd-auth-bypass-flaw-allows-unauthorized-access-to-sensitive-cluster-apis/</loc>
		<lastmod>2026-04-24T03:03:16+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Critical-etcd-Auth-Bypass-Flaw-Lets-Attackers-Access-Sensitive-Cluster-APIs-Without-Authorization-yYl3zO.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/hacker-uses-claude-and-chatgpt-to-breach-multiple-government-agencies/</loc>
		<lastmod>2026-04-24T03:03:17+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Hacker-Uses-Claude-and-ChatGPT-to-Breach-Multiple-Government-Agencies-1-WBwuLB.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/google-unveils-device-bound-chrome-sessions-in-anti-cookie-theft-move/</loc>
		<lastmod>2026-04-24T03:03:17+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Google-Unveils-Device-Bound-Chrome-Sessions-in-Anti-Cookie-Theft-Move-1-7l9fe9.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/google-launches-gmail-end-to-end-encryption-for-android-and-ios/</loc>
		<lastmod>2026-04-24T03:03:17+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Google-Launches-Gmail-End-to-End-Encryption-for-Android-and-iOS-1-QCeBPm.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/ransomware-gangs-expand-use-of-edr-killers-beyond-vulnerable-drivers-eset-warns/</loc>
		<lastmod>2026-04-24T03:03:17+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Ransomware-Gangs-Expand-Use-of-EDR-Killers-Beyond-Vulnerable-Drivers-ESET-Warns-1-4GicgC.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/openai-warns-macos-users-to-update-chatgpt-and-codex-immediately/</loc>
		<lastmod>2026-04-24T03:03:17+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/OpenAI-macOS-Users-EIBUGY.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/hackers-use-aitm-session-hijacking-to-redirect-employee-salaries-in-new-storm-2755-campaign/</loc>
		<lastmod>2026-04-24T03:03:17+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Hackers-Use-AiTM-Session-Hijacking-to-Redirect-Employee-Salaries-in-New-Storm-2755-Campaign-FFfasr.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/engagesdk-vulnerability-exposes-millions-of-crypto-wallet-users-to-cyberattacks/</loc>
		<lastmod>2026-04-24T03:03:17+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/EngageSDK-Vulnerability-Exposes-Millions-of-Crypto-Wallet-Users-to-Cyberattacks-goU8S6.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/france-to-replace-windows-with-linux-on-government-desktops/</loc>
		<lastmod>2026-04-24T03:03:18+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/France-Replace-Windows-Linux-kQoH0c.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/censys-warns-5219-rockwell-allen-bradley-plcs-are-exposed-amid-iranian-apt-activity/</loc>
		<lastmod>2026-04-24T03:03:34+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Censys-Warns-5219-Rockwell-Allen-Bradley-PLCs-Are-Exposed-Amid-Iranian-APT-Activity-BiZ6Tk.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/hackers-use-fake-bts-world-tour-ticket-sites-to-scam-fans-across-multiple-countries/</loc>
		<lastmod>2026-04-24T03:03:34+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Hackers-Use-Fake-BTS-World-Tour-Ticket-Sites-to-Scam-Fans-Across-Multiple-Countries-T5CtzN.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/new-clickfix-campaign-uses-macos-script-editor-to-deliver-atomic-stealer/</loc>
		<lastmod>2026-04-24T03:03:34+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/New-ClickFix-Campaign-Uses-macOS-Script-Editor-to-Deliver-Atomic-Stealer-DeV7Sz.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/hackers-impersonate-linux-foundation-leader-in-slack-to-target-open-source-developers/</loc>
		<lastmod>2026-04-24T03:03:35+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Hackers-Impersonate-Linux-Foundation-Leader-in-Slack-to-Target-Open-Source-Developers-bokGxT.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/hackers-use-fake-security-software-to-deliver-lucidrook-malware-in-taiwan-attacks/</loc>
		<lastmod>2026-04-24T03:03:35+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Hackers-Use-Fake-Security-Software-to-Deliver-LucidRook-Malware-in-Taiwan-Attacks-RCP5kn.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/hackers-used-eviltokens-clickfix-campaign-to-attack-claude-code-users-with-amos-stealer/</loc>
		<lastmod>2026-04-24T03:03:35+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/EvilTokens20and20AMOS20redefine20modern20phishing20attacks-NI7E1z.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/new-stx-rat-uses-hidden-remote-desktop-and-infostealer-features-to-evade-detection/</loc>
		<lastmod>2026-04-24T03:03:35+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/New-STX-RAT-Uses-Hidden-Remote-Desktop-and-Infostealer-Features-to-Evade-Detection-ARB8yY.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/hackers-use-clickfix-and-malicious-dmg-files-to-deliver-notnullosx-on-macos/</loc>
		<lastmod>2026-04-24T03:03:35+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Hackers-Use-ClickFix-and-Malicious-DMG-Files-to-Deliver-notnullOSX-on-macOS-2nfMKs.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/microsoft-365-network-level-disruption-affecting-exchange-online-teams-and-core-suite-services/</loc>
		<lastmod>2026-04-24T03:03:35+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Microsoft-365-Network-Level-Disruption-kAhZva.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/ibm-identity-and-verify-access-vulnerabilities-allow-remote-attacker-to-access-sensitive-data/</loc>
		<lastmod>2026-04-24T03:03:36+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/IBM-Identity-and-Verify-Access-Vulnerabilities-Allow-remote-attacker-to-access-sensitive-Data-YD9Pxm.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/hackers-exploit-kubernetes-misconfigurations-to-move-from-containers-to-cloud-accounts/</loc>
		<lastmod>2026-04-24T03:03:36+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Hackers-Exploit-Kubernetes-Misconfigurations-to-Move-From-Containers-to-Cloud-Accounts-D0ln5S.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/new-bpfdoor-variants-use-stateless-c2-and-icmp-relays-to-evade-detection/</loc>
		<lastmod>2026-04-24T03:03:36+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/New-BPFDoor-Variants-Use-Stateless-C2-and-ICMP-Relays-to-Evade-Detection-30T2bZ.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/anthropic-unveils-claude-mythos-preview-with-powerful-zero-day-detection-capabilities/</loc>
		<lastmod>2026-04-24T03:03:36+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Anthropic-Unveils-Claude-Mythos-Preview-With-Powerful-Zero-Day-Discovery-Capabilities-vgu4Az.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/hackers-actively-attacking-adobe-reader-users-using-sophisticated-0-day-exploit/</loc>
		<lastmod>2026-04-24T03:03:36+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Hackers-Actively-Attacking-Adobe-Reader-Users-Using-Sophisticated-0-Day-Exploit-GityPa.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/hackers-exploit-next-js-react2shell-flaw-to-steal-credentials-from-766-hosts-in-24-hours/</loc>
		<lastmod>2026-04-24T03:03:36+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Hackers-Exploit-Next.js-React2Shell-Flaw-to-Steal-Credentials-From-766-Hosts-in-24-Hours-1bw9ad.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/hackers-use-fake-gemini-npm-package-to-steal-tokens-from-claude-cursor-and-other-ai-tools/</loc>
		<lastmod>2026-04-24T03:03:36+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Hackers-Use-Fake-Gemini-npm-Package-to-Steal-Tokens-From-Claude-Cursor-and-Other-AI-Tools-PFHUaa.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/hackers-use-clickfix-lure-to-drop-node-js-based-windows-rat-with-tor-powered-c2/</loc>
		<lastmod>2026-04-24T03:03:37+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Hackers-Use-ClickFix-Lure-to-Drop-Node.js-Based-Windows-RAT-With-Tor-Powered-C2-f6OTZr.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/trojanized-pypi-ai-proxy-uses-stolen-claude-prompt-to-exfiltrates-data/</loc>
		<lastmod>2026-04-24T03:03:37+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Trojanized-PyPI-AI-Proxy-Uses-Stolen-Claude-Prompt-to-Exfiltrates-Data-vYXtZm.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/cisa-warns-of-fortinet-0-day-vulnerability-actively-exploited-in-attacks/</loc>
		<lastmod>2026-04-24T03:03:37+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/CISA-Warns-Fortinet-Vulnerability-UeTnfV.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/hackers-drain-286-million-from-drift-protocol-in-suspected-north-korea-linked-exploit/</loc>
		<lastmod>2026-04-24T03:03:37+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Hackers-Drain-286-Million-From-Drift-Protocol-in-Suspected-North-Korea-Linked-Exploit-dbEYsv.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/new-github-actions-attack-chain-uses-fake-ci-updates-to-exfiltrate-secrets-and-tokens/</loc>
		<lastmod>2026-04-24T03:03:53+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/New-GitHub-Actions-Attack-Chain-Uses-Fake-CI-Updates-to-Exfiltrate-Secrets-and-Tokens-Px9mia.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/dprk-cyber-program-uses-modular-malware-strategy-to-evade-attribution-and-survive-takedowns/</loc>
		<lastmod>2026-04-24T03:03:53+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/DPRK-Cyber-Program-Uses-Modular-Malware-Strategy-to-Evade-Attribution-and-Survive-Takedowns-yDFjRI.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/top-node-js-maintainers-targeted-in-sophisticated-social-engineering-scheme/</loc>
		<lastmod>2026-04-24T03:03:53+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Hackers-Launch-Social-Engineering-Offensive-Against-Key-Node.js-Maintainers-1-1-1-t6u7GJ.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/critical-fortinet-forticlient-ems-0-day-vulnerability-actively-exploited-in-the-wild/</loc>
		<lastmod>2026-04-24T03:03:53+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Fortinet-FortiClient-EMS-0-Day-gLUZGh.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/new-progress-sharefile-bugs-let-attackers-take-over-servers-without-logging-in/</loc>
		<lastmod>2026-04-24T03:03:53+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/New-Progress-ShareFile-Bugs-Let-Attackers-Take-Over-Servers-Without-Logging-In-YK43Yf.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/hackers-weaponize-claude-code-leak-to-spread-vidar-and-ghostsocks-malware/</loc>
		<lastmod>2026-04-24T03:03:53+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Claude-Code-Leak-Exploited-by-Hackers-to-Deliver-Vidar-and-GhostSocks-1-1-1-x3tMLf.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/how-elite-socs-cut-escalation-rates-by-arming-tier-1-with-better-threat-intelligence/</loc>
		<lastmod>2026-04-24T03:03:54+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Elite20SOCs20Reduce20Escalations20With20Better20Threat20Intelligence201-ybz01n.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/top-10-best-user-access-management-tools-in-2026/</loc>
		<lastmod>2026-04-24T03:03:54+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/User20Access20Management20Tools201-YZU3Bn.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/14000-f5-big-ip-apm-devices-exposed-online-amid-active-rce-vulnerability-exploits/</loc>
		<lastmod>2026-04-24T03:03:54+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/14000-F5-BIG-IP-APM-Exposed-Online-as-Attackers-Actively-Exploiting-RCE-Vulnerability-YaboX9.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/high-stakes-security-protecting-the-digital-infrastructure-of-the-gaming-industry/</loc>
		<lastmod>2026-04-24T03:03:54+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/TTT20-202026-03-25T195627.010-PQ6vg0.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/kimsuky-deploys-malicious-lnk-files-to-deliver-python-based-backdoor-in-multi-stage-attack/</loc>
		<lastmod>2026-04-24T03:03:54+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Kimsuky-Deploys-Malicious-LNK-Files-to-Deliver-Python-Based-Backdoor-in-Multi-Stage-Attack-TqxtdN.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/hackers-abuse-trusted-platforms-to-steal-bank-credentials-from-philippine-users/</loc>
		<lastmod>2026-04-24T03:03:54+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Hackers-Abuse-Trusted-Platforms-to-Steal-Bank-Credentials-From-Philippine-Users-RcKvj5.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/axios-maintainer-confirms-the-npm-compromise-was-via-a-targeted-social-engineering-attack/</loc>
		<lastmod>2026-04-24T03:03:54+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Axios-Maintainer-Confirms-The-npm-Compromise-Was-via-a-Targeted-Social-Engineering-Attack-uW71mr.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/hackers-clone-cert-ua-site-to-trick-victims-into-installing-go-based-rat/</loc>
		<lastmod>2026-04-24T03:03:55+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Hackers-Clone-CERT-UA-Site-to-Trick-Victims-Into-Installing-Go-Based-RAT-xmYc6h.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/new-akira-lookalike-ransomware-campaign-targeting-windows-users-in-south-america/</loc>
		<lastmod>2026-04-24T03:03:55+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/New-Akira-Lookalike-Ransomware-Campaign-Targeting-Windows-Users-in-South-America-nosayX.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/qilin-ransomware-uses-malicious-dll-to-kill-almost-every-vendors-edr-solutions/</loc>
		<lastmod>2026-04-24T03:03:55+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Qilin-Ransomware-Kill-EDR-eop9uK.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/magecart-hackers-uses-100-domains-to-hijack-estores-checkouts-and-steal-card-data/</loc>
		<lastmod>2026-04-24T03:03:55+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Magecart20Hijacks20eStore20Checkouts20to20Steal20Card20Data201-6o4XY5.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/google-clouds-vertex-ai-platform-vulnerability-allow-attackers-to-access-sensitive-data/</loc>
		<lastmod>2026-04-24T03:03:55+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Google-Clouds-Vertex-AI-platform-Vulnerability-Allow-Attackers-to-Access-Sensitive-Data-1-McfUYm.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/hackers-actively-exploiting-critical-weblogic-rce-vulnerabilities-in-attacks/</loc>
		<lastmod>2026-04-24T03:03:55+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Hackers-Actively-Exploiting-Critical-WebLogic-RCE-Vulnerabilities-in-Attacks-GCRnNw.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/openssh-10-3-fixes-shell-injection-and-multiple-ssh-security-issues/</loc>
		<lastmod>2026-04-24T03:03:55+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/OpenSSH-10.3-Release-7Y7Zb0.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/hackers-weaponize-legitimate-windows-tools-to-disable-antivirus-before-ransomware-attacks/</loc>
		<lastmod>2026-04-24T03:04:13+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/Hackers-Weaponize-Legitimate-Windows-Tools-to-Disable-Antivirus-Before-Ransomware-Attacks-maDuD6.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/google-unveils-ransomware-detection-and-file-restoration-for-google-drive/</loc>
		<lastmod>2026-04-24T03:04:13+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/Google-unveils-Ransomware-Detection-and-File-Restoration-for-Google-Drive-NGy3wb.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/hackers-deploy-telegram-based-resokerrat-with-screenshot-and-persistence-features/</loc>
		<lastmod>2026-04-24T03:04:13+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/Hackers-Deploy-Telegram-Based-ResokerRAT-With-Screenshot-and-Persistence-Features-FYMBAB.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/russian-hackers-using-remote-access-toolkit-ctrl-for-rdp-hijacking/</loc>
		<lastmod>2026-04-24T03:04:13+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Russian-Hackers-Using-remote-access-toolkit-CTRL-for-RDP-hijacking-8VAR38.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/new-chrome-zero-day-vulnerability-actively-exploited-in-attacks-patch-now/</loc>
		<lastmod>2026-04-24T03:04:13+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Chrome-Zero-Day-Vulnerability-1y0idR.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/microsoft-issues-critical-winre-and-setup-updates-ahead-of-2026-secure-boot-certificate-expiration/</loc>
		<lastmod>2026-04-24T03:04:14+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/Microsoft-Critical-WinRE-Update-7jO5ia.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/12-best-aws-monitoring-tools-in-2026/</loc>
		<lastmod>2026-04-24T03:04:14+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/Best20AWS20Monitoring20Tool-fDUhiE.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/exposed-server-reveals-thegentlemen-ransomware-toolkit-victim-credentials-and-ngrok-tokens/</loc>
		<lastmod>2026-04-24T03:04:14+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/Exposed-Server-Reveals-TheGentlemen-Ransomware-Toolkit-Victim-Credentials-and-Ngrok-Tokens-263kwm.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/north-korean-it-worker-allegedly-used-stolen-identity-and-ai-resume-in-job-application-scam/</loc>
		<lastmod>2026-04-24T03:04:14+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/North-Korean-IT-Worker-Allegedly-Used-Stolen-Identity-and-AI-Resume-in-Job-Application-Scam-F3xReT.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/crysome-rat-emerges-as-advanced-net-malware-with-av-killer-and-hvnc-capabilities/</loc>
		<lastmod>2026-04-24T03:04:14+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/CrySome-RAT-Emerges-as-Advanced-.NET-Malware-With-AV-Killer-and-HVNC-Capabilities-eQqps8.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/new-clickfix-variant-uses-rundll32-and-webdav-to-evade-powershell-detection/</loc>
		<lastmod>2026-04-24T03:04:14+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/New-ClickFix-Variant-Uses-Rundll32-and-WebDAV-to-Evade-PowerShell-Detection-Uc3DTx.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/anthropics-claude-code-source-code-reportedly-leaked-via-their-npm-registry/</loc>
		<lastmod>2026-04-24T03:04:14+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/Claude-Code-Source-Code-Leaked-mM5Bxa.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/wordpress-plugin-vulnerability-exposes-sensitive-data-from-800000-sites/</loc>
		<lastmod>2026-04-24T03:04:14+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/WordPress-Plugin-Vulnerability-Exposes-Sensitive-Data-from-800000-Sites-7BWCFK.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/fbi-chief-kash-patels-gmail-account-was-hacked-by-iranian-hackers/</loc>
		<lastmod>2026-04-24T03:04:15+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/FBI-Chief-Kash-Patel-Gmail-Hacked-Idz4Ls.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/cybersecurity-companies-stocks-fall-as-anthropic-tests-powerful-new-model/</loc>
		<lastmod>2026-04-24T03:04:15+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/Cybersecurity-Stocks-Anthropic-AWvHPt.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/cisa-warns-of-f5-big-ip-vulnerability-actively-exploited-in-attacks/</loc>
		<lastmod>2026-04-24T03:04:15+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/F5-BIG-IP-Vulnerability-Actively-Exploited-jAc2Ur.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/european-commission-confirms-cyberattack-following-aws-account-hack/</loc>
		<lastmod>2026-04-24T03:04:15+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/European-Commission-AWS-Hack-WPqJXQ.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/windows-11-and-server-2025-update-to-block-untrusted-cross-signed-kernel-drivers-by-default/</loc>
		<lastmod>2026-04-24T03:04:15+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/Windows-11-and-Server-2025-Update-to-Block-Untrusted-Cross-Signed-Kernel-Drivers-by-Default-1-1-HZcuMS.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/cisa-adds-aquasecurity-trivy-scanner-vulnerability-to-kev-catalog/</loc>
		<lastmod>2026-04-24T03:04:15+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/CISA-Adds-Aquasecurity-Trivy-Scanner-Vulnerability-to-KEV-Catalog-1-5SGS6z.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/hackers-probe-citrix-netscaler-instances-ahead-of-likely-cve-2026-3055-exploitation/</loc>
		<lastmod>2026-04-24T03:04:15+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/Citrix-NetScaler-Instances-Exploited-1-d98ZkP.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/new-clickfix-attack-leverage-windows-run-dialog-box-and-macos-terminal-to-deploy-malware/</loc>
		<lastmod>2026-04-24T03:04:43+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/New-ClickFix-Attack-Leverage-Windows-Run-Dialog-Box-and-macOS-Terminal-to-Deploy-Malware-OflGyJ.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/new-silver-fox-campaign-hits-japanese-businesses-with-tax-themed-phishing-lures/</loc>
		<lastmod>2026-04-24T03:04:43+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/New-Silver-Fox-Campaign-Hits-Japanese-Businesses-With-Tax-Themed-Phishing-Lures-zPkb75.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/hackers-deploy-brushworm-and-brushlogger-against-south-asian-financial-firm/</loc>
		<lastmod>2026-04-24T03:04:43+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/Hackers-Deploy-BRUSHWORM-and-BRUSHLOGGER-Against-South-Asian-Financial-Firm-xic55K.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/hackers-use-usb-malware-rats-and-stealers-in-espionage-attacks-on-southeast-asian-government/</loc>
		<lastmod>2026-04-24T03:04:43+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/Hackers-Use-USB-Malware-RATs-and-Stealers-in-Espionage-Attacks-on-Southeast-Asian-Government-QPL69Y.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/hackers-use-phishing-zip-files-to-deploy-pxa-stealer-against-financial-firms/</loc>
		<lastmod>2026-04-24T03:04:43+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/Hackers20Use20Phishing20ZIP20Files20to20Deploy20PXA20Stealer20Against20Financial20Firms-WaJl6P.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/china-linked-hackers-breach-southeast-asian-military-systems-in-long-running-spy-campaign/</loc>
		<lastmod>2026-04-24T03:04:44+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/China-Linked-Hackers-Breach-Southeast-Asian-Military-Systems-in-Long-Running-Spy-Campaign-iSBOZb.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/open-directory-malware-campaign-uses-obfuscated-vbs-png-loaders-and-rat-payloads/</loc>
		<lastmod>2026-04-24T03:04:44+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/Open-Directory-Malware-Campaign-Uses-Obfuscated-VBS-PNG-Loaders-and-RAT-Payloads-OtwnTO.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/mirai-based-botnets-evolve-into-massive-ddos-and-proxy-abuse-threat/</loc>
		<lastmod>2026-04-24T03:04:44+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/Mirai-Based-Botnets-Evolve-Into-Massive-DDoS-and-Proxy-Abuse-Threat-Th311J.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/leak-bazaar-turns-stolen-corporate-data-into-a-structured-criminal-marketplace/</loc>
		<lastmod>2026-04-24T03:04:44+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/Leak-Bazaar-Turns-Stolen-Corporate-Data-Into-a-Structured-Criminal-Marketplace-AEDIpr.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/voidlink-rootkit-uses-ebpf-and-kernel-modules-to-hide-deep-inside-linux-systems/</loc>
		<lastmod>2026-04-24T03:04:44+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/VoidLink-Rootkit-Uses-eBPF-and-Kernel-Modules-to-Hide-Deep-Inside-Linux-Systems-1QjOiy.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/cisa-warns-of-langflow-code-injection-vulnerability-exploited-in-attacks/</loc>
		<lastmod>2026-04-24T03:04:44+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/CISA-Warns-of-Langflow-Code-Injection-Vulnerability-Exploited-in-Attacks-1-QD6247.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/idrive-for-windows-vulnerability-let-attackers-escalate-privileges/</loc>
		<lastmod>2026-04-24T03:04:44+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/IDrive-for-Windows-Vulnerability-Let-Attackers-Escalate-Privileges-1-GMezZG.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/hackerone-data-breach-employees-data-stolen-following-navia-hack/</loc>
		<lastmod>2026-04-24T03:04:45+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/HackerOne-Data-Breach-a9SBaj.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/dell-wyse-management-vulnerabilities-enables-complete-system-compromise/</loc>
		<lastmod>2026-04-24T03:04:45+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/Dell-Wyse-Management-Vulnerabilities-Enables-complete-system-compromise-2-KrHjXm.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/tycoon2fa-operators-resume-cloud-account-phishing-after-infrastructure-disruption/</loc>
		<lastmod>2026-04-24T03:04:45+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/Tycoon2FA-Operators-Resume-Cloud-Account-Phishing-After-Infrastructure-Disruption-gtl0ez.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/canisterworm-gets-destructive-as-teampcp-deploys-iran-focused-kubernetes-wiper/</loc>
		<lastmod>2026-04-24T03:04:45+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/CanisterWorm-Gets-Destructive-as-TeamPCP-Deploys-Iran-Focused-Kubernetes-Wiper-QPOS55.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/threat-actors-continuously-attacking-ms-sql-servers-to-deploy-ice-cloud-scanner/</loc>
		<lastmod>2026-04-24T03:04:45+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/Threat-Actors-Continuously-Attacking-MS-SQL-Servers-to-Deploy-ICE-Cloud-Scanner-JgYYfi.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/linux-ransomware-pay2key-attacking-organizations-ervers-virtualization-hosts-and-cloud-workloads/</loc>
		<lastmod>2026-04-24T03:04:45+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/Linux-Ransomware-Pay2Key-Attacking-Organizations-Ervers-Virtualization-Hosts-and-Cloud-Workloads-WzMWz3.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/macos-threats-are-the-biggest-security-gap-in-2026-how-soc-teams-close-it/</loc>
		<lastmod>2026-04-24T03:04:45+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/macOS20Threats20Closing20Security20Gaps20in202026-pOuhWx.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/tax-themed-google-ads-lead-to-byovd-edr-killer-in-huntress-traced-malvertising-campaign/</loc>
		<lastmod>2026-04-24T03:04:46+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/Tax-Themed-Google-Ads-Lead-to-BYOVD-EDR-Killer-in-Huntress-Traced-Malvertising-Campaign-ovSjq5.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/seo-poisoning-campaign-impersonates-25-popular-apps-to-deliver-asyncrat-since-october-2025/</loc>
		<lastmod>2026-04-24T03:05:17+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/SEO-Poisoning-Campaign-Impersonates-25-Popular-Apps-to-Deliver-AsyncRAT-Since-October-2025-100z1s.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/critical-qnap-qvr-pro-vulnerability-let-remote-attackers-gain-access-to-the-system/</loc>
		<lastmod>2026-04-24T03:05:17+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/Critical20QNAP20QVR20Pro20Vulnerability20Let20remote20attackers20gain20access20to20the20system2028129-VwOarK.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/critical-netscaler-adc-and-gateway-vulnerabilities-enable-remote-attacks-on-affected-systems/</loc>
		<lastmod>2026-04-24T03:05:17+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/NetScaler-ADC-and-Gateway-Vulnerabilities-NUix9T.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/cisa-warns-of-zimbra-collaboration-suite-vulnerability-exploited-in-attacks/</loc>
		<lastmod>2026-04-24T03:05:18+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/CISA20Warns20of20Zimbra20Collaboration20Suite20vulnerability20exploited20in20Attacks2028129-3Yj5Gv.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/anthropic-launches-projects-feature-for-claude-cowork-desktop/</loc>
		<lastmod>2026-04-24T03:05:18+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/Projects-Feature-Claude-Cowork-Desktop-CnT8LE.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/windows-11-march-update-breaks-microsoft-teams-and-onedrive-sign-ins/</loc>
		<lastmod>2026-04-24T03:05:18+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/Windows201120March20Update20Breaks20Teams-SMOZtv.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/hackers-compromised-7500-magento-websites-to-upload-hidden-malicious-files-and-steal-data/</loc>
		<lastmod>2026-04-24T03:05:18+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/Hackers20Compromised20750020Magento20Websites20to20Upload20Hidden20Malicious20Files20and20Steal20Data-NfOU84.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/new-voidstealer-variant-bypasses-chrome-abe-without-injection-or-privilege-escalation/</loc>
		<lastmod>2026-04-24T03:05:18+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/New20VoidStealer20Variant20Bypasses20Chrome20ABE20Without20Injection20or20Privilege20Escalation-UpVUVD.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/perseus-android-malware-steals-user-notes-and-enables-full-device-takeover/</loc>
		<lastmod>2026-04-24T03:05:18+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/Perseus20Android20Malware20Steals20User20Notes20and20Enables20Full20Device20Takeover-qD0dBR.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/hackers-compromise-trivy-scanner-to-inject-malicious-scripts-and-steal-login-credentials/</loc>
		<lastmod>2026-04-24T03:05:18+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/Malicious20Script20Injection20in20Trivy20Compromise20Enables20Credential20Theft2028129-ofrUyt.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/fbi-cisa-warn-russian-hackers-are-targeting-high-value-individuals-through-signal/</loc>
		<lastmod>2026-04-24T03:05:18+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/FBI20CISA20Warn20Russian20Hackers20Are20Targeting20High-Value20Individuals20Through20Signal2028129-MlFpDN.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/chrome-security-update-fixes-26-vulnerabilities-allowing-remote-code-execution/</loc>
		<lastmod>2026-04-24T03:05:18+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/Chrome20Security20Update20Patches202620Vulnerabilities20that20Enable20Attackers20to20Execute20Malicious20Code20Remotely2028129-NP5lcr.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/oracle-issues-urgent-security-update-for-critical-rce-flaw-in-identity-manager-and-web-services-manager/</loc>
		<lastmod>2026-04-24T03:05:18+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/Oracle-Urgent-Security-Update-qGnNYm.avif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/astrazeneca-data-breach-lapsus-group-allegedly-claims-access-to-internal-data/</loc>
		<lastmod>2026-04-24T03:05:18+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/AstraZeneca-Data-Breach-2APkOJ.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/libyan-oil-refinery-hit-in-long-running-espionage-campaign-using-asyncrat/</loc>
		<lastmod>2026-04-24T03:05:18+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/Libyan-Oil-Refinery-Hit-in-Long-Running-Espionage-Campaign-Using-AsyncRAT-xeZGL0.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/cisco-firewall-0-day-vulnerability-exploited-in-the-wild-to-deploy-interlock-ransomware/</loc>
		<lastmod>2026-04-24T03:05:19+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/Cisco20Firewall200-day20Ransomware-rmZEaQ.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/cisa-urges-organizations-to-secure-microsoft-intune-environments-following-stryker-breach/</loc>
		<lastmod>2026-04-24T03:05:19+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/CISA20Urges20Organizations20to20Secure20Microsoft20Intune20Environments20Following20Stryker20Breach2028129-b8DZ1F.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/ciso-whisperer-names-11-vendors-leading-the-shift-from-tools-to-outcomes-at-rsa-conference-2026/</loc>
		<lastmod>2026-04-24T03:05:19+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/TTT20-202026-03-19T191744.609-Hj9o1j.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/critical-ubiquiti-unifi-vulnerabilities-allow-attackers-to-seize-full-control-of-underlying-systems/</loc>
		<lastmod>2026-04-24T03:05:19+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/Ubiquiti20UniFi20Vulnerabilities-VKPlk2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/vibe-coded-malware-campaign-uses-fake-tools-cdns-and-file-hosts-to-infect-users/</loc>
		<lastmod>2026-04-24T03:05:19+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/E28098Vibe-CodedE2809920Malware20Campaign20Uses20Fake20Tools20CDNs20and20File20Hosts20to20Infect20Users-vsrSdW.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/iranian-cyber-ops-maintain-us-network-footholds-target-cameras-for-regional-surveillance/</loc>
		<lastmod>2026-04-24T03:05:38+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/Iranian20Cyber20Ops20Maintain20US20Network20Footholds20Target20Cameras20for20Regional20Surveillance-xdpNDn.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/new-ios-exploit-with-advanced-iphone-hacking-tools-attacking-users-to-steal-personal-data/</loc>
		<lastmod>2026-04-24T03:05:38+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/DarkSword20iOS20Exploit-aNmDIw.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/the-high-cost-of-slow-triage-how-to-make-tier-1-the-fastest-layer-in-your-soc/</loc>
		<lastmod>2026-04-24T03:05:38+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/Turn20Tier20120Into20Your20Fastest20SOC20Layer-vM67d1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/openai-launches-gpt-5-4-mini-and-nano-to-provide-answers-2x-faster/</loc>
		<lastmod>2026-04-24T03:05:38+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/OpenAI20Launches20GPT-5.420Mini20and20Nano20to20Provide20Answers202X20Faster2028129-kkYz7O.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/uidai-launches-bug-bounty-programme-to-strengthen-aadhaar-security/</loc>
		<lastmod>2026-04-24T03:05:38+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/UIDAI20Launches20Bug20Bounty20Programme20to20Strengthen20Aadhaar20Security20281292028129-dBGwpO.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/ibm-uncovers-slopoly-likely-ai-generated-malware-used-in-hive0163-ransomware-attack/</loc>
		<lastmod>2026-04-24T03:05:39+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/IBM20Uncovers20E28098SlopolyE2809920Likely20AI-Generated20Malware20Used20in20Hive016320Ransomware20Attack-OMQpKE.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/qihoo-360-leaked-its-own-wildcard-ssl-private-key-inside-public-ai-installer/</loc>
		<lastmod>2026-04-24T03:05:39+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/Qihoo2036020Leaked20SSL20Private20Key-SHLG9n.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/fake-filezilla-downloads-lead-to-rat-infections-through-stealthy-multi-stage-loader/</loc>
		<lastmod>2026-04-24T03:05:39+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/Fake20FileZilla20Downloads20Lead20to20RAT20Infections20Through20Stealthy20Multi-Stage20Loader-juC7UC.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/google-warns-ransomware-actors-are-shifting-tactics-as-profits-fall-and-data-theft-rises/</loc>
		<lastmod>2026-04-24T03:05:39+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/Google20Warns20Ransomware20Actors20Are20Shifting20Tactics20as20Profits20Fall20and20Data20Theft20Rises-q8UWgV.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/glassworm-hits-popular-react-native-packages-with-credential-stealing-npm-malware/</loc>
		<lastmod>2026-04-24T03:05:39+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/Glassworm20Hits20Popular20React20Native20Packages20With20Credential-Stealing20npm20Malware-s2TgWC.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/simple-custom-font-rendering-can-poison-chatgpt-claude-gemini-and-other-ai-systems/</loc>
		<lastmod>2026-04-24T03:05:39+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/Custom20Font20Poison20AI20Systems-3Ko46p.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/how-to-shop-online-safely-while-finding-better-deals/</loc>
		<lastmod>2026-04-24T03:05:39+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/TTT20-202026-03-17T140652.834-CRlenA.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/malicious-npm-packages-posing-as-solara-executor-target-discord-browsers-and-crypto-wallets/</loc>
		<lastmod>2026-04-24T03:05:40+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/Malicious20npm20Campaign20Impersonates20Solara20Executor20to20Steal20Discord20and20Crypto20Wallet20Data20282292028129-f2U5WU.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/meta-to-permanently-remove-end-to-end-encryption-feature-in-instagram-dms/</loc>
		<lastmod>2026-04-24T03:05:40+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/Instagram20Encryption-ymycHV.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/microsoft-releases-out-of-band-patch-for-critical-rras-rce-vulnerabilities-in-windows-11/</loc>
		<lastmod>2026-04-24T03:05:40+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/Windows201120Out-of-Band20Update-Be281f.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/fortigate-firewalls-exploited-in-wave-of-attacks-to-breach-networks-and-steal-credentials/</loc>
		<lastmod>2026-04-24T03:05:40+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/FortiGate20Firewalls20Exploited-goVuW5.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/new-acrstealer-variant-uses-syscall-evasion-tls-c2-and-secondary-payload-delivery/</loc>
		<lastmod>2026-04-24T03:05:40+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/New20ACRStealer20Variant20Uses20Syscall20Evasion20TLS20C220and20Secondary20Payload20Delivery-fNeH2p.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/microsoft-exchange-online-mailbox-access-outage-affects-users-globally/</loc>
		<lastmod>2026-04-24T03:05:40+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/Microsoft20Exchange20Online20Outage-fUXEe5.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/glassworm-campaign-uses-72-malicious-open-vsx-extensions-to-broaden-reach/</loc>
		<lastmod>2026-04-24T03:05:41+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/GlassWorm20Spreads20via207220Malicious20Open20VSX20Extensions20Hidden20in20Transitive20Dependencies202812920281292028129-DEXttA.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/critical-langsmith-account-takeover-vulnerability-puts-users-at-risk/</loc>
		<lastmod>2026-04-24T03:05:41+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/Critical20LangSmith20Vulnerability20Enables20Complete20Account20Takeover202812920281292028129-BJZ9GK.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/loblaw-data-breach-hackers-accessed-it-network-and-customer-information/</loc>
		<lastmod>2026-04-24T03:05:55+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/Loblaw20Data20Breach20-20Hackers20Accessed20IT20network20and20Customer20information2028129-OFYv8A.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/authorities-dismantle-malicious-proxy-service-used-to-deploy-malware-attacking-thousands-of-users/</loc>
		<lastmod>2026-04-24T03:05:55+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/Authorities20Dismantle20Malicious20Proxy20Service20Used20to20Deploy20Malware20Attacking20Thousands20of20Users2028129-JUNaPi.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/apple-released-emergency-updates-for-ios-15-8-7-to-thwart-coruna-exploit-kit/</loc>
		<lastmod>2026-04-24T03:05:55+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/Apple20Released20Emergency20Updates20for20iOS2015.8.720to20Thwart20E28098CorunaE2809920Exploit20Kit2028129-n3qxxa.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/authorities-crack-down-on-45000-malicious-ips-powering-ransomware-attacks/</loc>
		<lastmod>2026-04-24T03:05:55+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/Authorities20Crack20Down20on204500020Malicious20IPs20Powering20Ransomware20Attacks2028129-r38wVB.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/microsoft-confirms-windows-11-24h2-25h2-bug-blocks-access-to-the-system-drive-c/</loc>
		<lastmod>2026-04-24T03:05:55+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/Windows201120Bug20Drive20C-O70CYP.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/stryker-cyber-attack-hackers-claim-system-breach-and-device-wipe/</loc>
		<lastmod>2026-04-24T03:05:56+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/Stryker20Cyber20Attack-c9U71Z.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/attackers-hijack-microsoft-365-accounts-through-oauth-device-code-abuse-without-stealing-passwords/</loc>
		<lastmod>2026-04-24T03:05:56+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/Exposing20OAuth20Device20Code20Phishing20in20Microsoft-qeCHfR.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/critical-mediatek-vulnerability-lets-attackers-steal-android-phone-pins-in-45-seconds/</loc>
		<lastmod>2026-04-24T03:05:56+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/MediaTek20Vulnerability20Android20Phone-YHVlAX.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/microsoft-copilot-email-and-teams-summarization-vulnerability-enables-phishing-attacks/</loc>
		<lastmod>2026-04-24T03:05:56+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/Microsoft20Copilot20Summarization20Vulnerability-ejyxXq.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/paloalto-cortex-xdr-broker-vulnerability-attackers-to-obtain-and-modify-sensitive-information/</loc>
		<lastmod>2026-04-24T03:05:56+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/Paloalto20Cortex20XDR20Broker20Vulnerability20Attackers20to20obtain20and20modify20sensitive20information2028129-bs4Oyp.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/ericsson-us-discloses-data-breach-hackers-stolen-employees-and-customers-data/</loc>
		<lastmod>2026-04-24T03:05:56+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/Ericsson20US20discloses20data20breach20-20Hackers20Stolen20employees20and20customers20Data2028129-S0BbmP.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/ai-healthtech-innovator-humata-health-partners-with-accuknox-for-zero-trust-cnapp/</loc>
		<lastmod>2026-04-24T03:05:56+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/TTT20-202026-03-13T152849.198-Xy6MLJ.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/starbucks-data-breach-hundreds-of-users-personal-data-exposed/</loc>
		<lastmod>2026-04-24T03:05:56+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/Starbucks20Data20Breach-jUQgpI.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/irans-internet-blackout-surpasses-10-days-as-traffic-flatlines-below-1-of-normal-levels/</loc>
		<lastmod>2026-04-24T03:05:57+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/03/Iran20Internet20Blackout-XvSMYr.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/xiongmai-ip-camera-vulnerability-let-attackers-bypass-authentication-and-have-remote-access/</loc>
		<lastmod>2026-04-24T11:40:35+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Xiongmai-IP-Camera-Vulnerability-Let-Attackers-Bypass-Authentication-and-have-Remote-Access-OOCnSq.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/void-dokkaebi-hackers-use-fake-job-interviews-to-spread-malware-via-code-repositories/</loc>
		<lastmod>2026-04-24T12:37:56+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Void-Dokkaebi-Hackers-Use-Fake-Job-Interviews-to-Spread-Malware-via-Code-Repositories-2Je746.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/hackers-use-pastebin-hosted-powershell-script-to-steal-telegram-sessions/</loc>
		<lastmod>2026-04-24T13:23:37+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Hackers-Use-Pastebin-Hosted-PowerShell-Script-to-Steal-Telegram-Sessions-JelHA4.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/hackers-use-fake-captcha-pages-to-trigger-costly-international-sms-fraud/</loc>
		<lastmod>2026-04-24T13:40:04+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Hackers-Use-Fake-CAPTCHA-Pages-to-Trigger-Costly-International-SMS-Fraud-RlWNDV.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/claude-desktop-reportedly-adds-browser-access-bridge-to-multiple-chromium-based-browsers/</loc>
		<lastmod>2026-04-24T16:20:50+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Claude-Desktop-Reportedly-Adds-Browser-Access-Bridge-to-Multiple-Chromium-Based-Browsers-fJNsDa.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/hackers-can-abuse-entra-agent-id-administrator-role-to-hijack-service-principals/</loc>
		<lastmod>2026-04-25T06:37:42+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Entra-Agent-ID-Administrator-Abused-IygEQg.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/gpt-5-5-bio-bug-bounty-to-strengthen-advanced-ai-capabilities/</loc>
		<lastmod>2026-04-25T11:28:50+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/GPTE280915.5-Bio-Bug-Bounty-to-Strengthen-advanced-AI-capabilities-2-hJafyC.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/claude-ai-agents-close-186-deals-in-anthropics-marketplace-experiment/</loc>
		<lastmod>2026-04-25T15:16:30+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Claude-AI-Agents-Close-Deals-ENGHiE.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/cisa-warns-of-multiple-simplehelp-vulnerabilities-exploited-in-attack/</loc>
		<lastmod>2026-04-25T17:23:40+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/CISA-Warns-of-Multiple-SimpleHelp-Vulnerabilities-Exploited-in-Attack-GwqNbh.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/new-windows-rpc-vulnerability-lets-attackers-escalate-privileges-across-all-windows-versions/</loc>
		<lastmod>2026-04-25T17:50:54+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/New-Windows-RPC-Vulnerability-8Gq3o4.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/litecoin-zero-day-vulnerability-exploited-in-dos-attack-disrupts-major-mining-pools/</loc>
		<lastmod>2026-04-26T04:18:58+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Litecoin-Zero-Day-Vulnerability-Exploited-a7hOja.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/73-open-vsx-sleeper-extensions-linked-to-glassworm-activate-new-malware-campaign/</loc>
		<lastmod>2026-04-26T04:29:58+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/73-Open-VSX-Sleeper-Extensions-Linked-to-GlassWorm-Activate-New-Malware-Campaign-1-kra89W.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/new-malware-uses-obfuscation-and-staged-payload-delivery-to-evade-detection/</loc>
		<lastmod>2026-04-27T13:06:38+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/New-Malware-Uses-Obfuscation-and-Staged-Payload-Delivery-to-Evade-Detection-YJyLir.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/new-vidar-malware-campaign-uses-fake-youtube-software-downloads-to-steal-corporate-credentials/</loc>
		<lastmod>2026-04-27T13:25:21+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/New-Vidar-Malware-Campaign-Uses-Fake-YouTube-Software-Downloads-to-Steal-Corporate-Credentials-cDh4oT.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/critical-gemini-cli-vulnerability-enables-remote-code-execution-attacks/</loc>
		<lastmod>2026-04-27T15:13:39+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Critical-Gemini-CLI-Vulnerability-Enables-Remote-Code-Execution-Attacks-M6vQrl.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/clickups-hardcoded-api-key-exposes-959-emails-from-fortune-500-giants/</loc>
		<lastmod>2026-04-27T15:34:31+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/ClickUp-Hardcoded-API-Key-Expose-CABHfS.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/notepad-vulnerability-allows-attackers-to-crash-application-leak-memory-data/</loc>
		<lastmod>2026-04-27T16:06:56+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Notepad-Vulnerability-Crash-9twFBv.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/critical-litellm-sql-injection-vulnerability-exploited-in-the-wild/</loc>
		<lastmod>2026-04-28T15:22:20+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Critical-LiteLLM-SQL-Injection-Vulnerability-Exploited-in-the-Wild-1-tb41iE.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/checkmarx-confirms-github-repository-data-published-on-dark-web/</loc>
		<lastmod>2026-04-28T16:00:02+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Checkmarx-Confirms-GitHub-Repository-Data-Published-on-Dark-Web-Q1BOWw.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/microsoft-confirms-remote-desktop-warnings-may-display-incorrectly-after-april-update/</loc>
		<lastmod>2026-04-28T16:29:44+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Remote-Desktop-Warnings-Display-Incorrectly-n2gIvy.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/critical-github-com-and-enterprise-server-rce-vulnerability-enables-full-server-compromise/</loc>
		<lastmod>2026-04-28T17:30:24+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/GitHub.com-and-Enterprise-Server-RCE-z6CDSG.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/new-blobphish-attack-leverages-browser-blob-objects-to-steal-users-login-credentials/</loc>
		<lastmod>2026-04-28T17:40:18+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/BlobPhish20Browser-Based20Phishing20Attack-EdQIsb.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/slotagent-malware-uses-api-hashing-and-encrypted-strings-to-hinder-reverse-engineering/</loc>
		<lastmod>2026-04-29T12:26:44+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/SLOTAGENT-Malware-Uses-API-Hashing-and-Encrypted-Strings-to-Hinder-Reverse-Engineering-qY3PDX.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/cursor-ai-coding-agent-vulnerability-allow-attackers-to-execute-code-on-developers-machine/</loc>
		<lastmod>2026-04-29T12:43:53+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Cursor-AI-Coding-Agent-Vulnerability-Allow-Attackers-to-Execute-Code-on-Developers-Machine-yU78Nu.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/brinker-introduces-a-novel-approach-to-deepfake-detection/</loc>
		<lastmod>2026-04-29T13:45:18+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/TTT20-202026-04-29T183203.747-c9ibxm.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/lazarus-hackers-attacking-macos-users-with-mach-o-man-malware-kit/</loc>
		<lastmod>2026-04-29T16:50:24+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Mach-O20Man20Malware20Targets20macOS20Crypto20Executives201-lqvM2f.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/sap-npm-packages-compromised-to-harvest-developer-and-ci-cd-secrets/</loc>
		<lastmod>2026-04-29T17:02:37+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/SAP-npm-Packages-Compromised-oyuS3Q.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/fbi-and-cisa-released-zero-trust-principles-implementation-guide-for-ot-environments/</loc>
		<lastmod>2026-04-30T15:30:37+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/FBI-and-CISA-Released-Zero-Trust-principles-Implementation-Guide-for-operational-technology-Environments-1-8YG34a.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/new-phaas-platform-phoenix-drives-brand-impersonation-smishing-across-finance-telecom-and-logistics/</loc>
		<lastmod>2026-04-30T15:40:08+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/New-PhaaS-Platform-Phoenix-Drives-Brand-Impersonation-Smishing-Across-Finance-Telecom-and-Logistics-6sjxQy.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/targeted-large-scale-campaign-attacking-u-s-organizations-with-fake-event-invitations/</loc>
		<lastmod>2026-04-30T15:54:43+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Targeted-Large-Scale-Campaign-Attacking-U.S.-Organizations-with-Fake-Event-Invitations-xlI0iK.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/qilin-ransomware-enumerates-rdp-authentication-history-on-a-compromised-server/</loc>
		<lastmod>2026-04-30T16:05:25+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Qilin-Ransomware-Enumerates-RDP-Authentication-History-on-a-Compromised-Server-vTzvJu.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/microsoft-windows-11-april-2026-security-update-breaks-third-party-backup-applications/</loc>
		<lastmod>2026-04-30T17:24:09+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/04/Windows-11-Backup-Applications-yKnkTk.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/attackers-abuse-captcha-and-clickfix-tactics-to-boost-credential-theft-campaigns/</loc>
		<lastmod>2026-05-01T13:55:54+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/Attackers-Abuse-CAPTCHA-and-ClickFix-Tactics-to-Boost-Credential-Theft-Campaigns-rN5Xhk.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/new-spyware-platform-lets-buyers-rebrand-and-resell-android-surveillance-malware/</loc>
		<lastmod>2026-05-01T14:32:18+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/New-Spyware-Platform-Lets-Buyers-Rebrand-and-Resell-Android-Surveillance-Malware-otLV4E.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/the-agency-mirage-why-ai-needs-real-engineering-not-just-hype/</loc>
		<lastmod>2026-05-01T15:18:56+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/TTT20-202026-05-01T205315.658-LYEFlR.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/etherrat-campaign-uses-seo-poisoning-and-github-facades-to-target-enterprise-admins/</loc>
		<lastmod>2026-05-01T15:25:28+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/EtherRAT-Campaign-Uses-SEO-Poisoning-and-GitHub-Facades-to-Target-Enterprise-Admins-aSyjxh.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/criminal-ip-and-securonix-threatq-collaborate-to-enhance-threat-intelligence-operations/</loc>
		<lastmod>2026-05-01T17:40:23+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/TTT20-202026-05-01T203622.398-90EsA1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/attackers-abuse-google-appsheet-netlify-and-telegram-in-facebook-phishing-campaign/</loc>
		<lastmod>2026-05-02T05:36:35+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/Attackers-Abuse-Google-AppSheet-Netlify-and-Telegram-in-Facebook-Phishing-Campaign-1-1-AooH7b.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/attackers-deploy-aitm-phishing-pages-to-access-sharepoint-hubspot-and-google-workspace/</loc>
		<lastmod>2026-05-02T06:36:19+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/Attackers-Deploy-AiTM-Phishing-Pages-to-Access-SharePoint-HubSpot-and-Google-Workspace-1-xkgXM2.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/multiple-exim-mail-server-vulnerabilities-leads-to-crash-with-malicious-dns-data/</loc>
		<lastmod>2026-05-02T11:14:18+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/Multiple-Exim-Mail-Server-Vulnerabilities-Leads-to-Crash-with-malicious-DNS-data-jMUACk.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/hackers-breach-government-and-military-servers-by-exploiting-cpanel-vulnerability/</loc>
		<lastmod>2026-05-02T16:15:02+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/cPanel-Vulnerability-Exploited-rn4psL.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/trellix-source-code-breach-hackers-gain-unauthorized-access-to-repository/</loc>
		<lastmod>2026-05-02T16:38:36+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/Trellix-Source-Code-Breach-yC8BjR.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/microsoft-defender-mistakenly-flags-digicert-root-certificates-as-malware/</loc>
		<lastmod>2026-05-03T16:55:13+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/Defender-Flags-DigiCert-Root-Certificates-IOmnqY.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/new-xlabs_v1-botnet-targets-minecraft-servers-through-adb-exposed-android-devices/</loc>
		<lastmod>2026-05-04T14:35:00+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/New-xlabs_v1-Botnet-Targets-Minecraft-Servers-Through-ADB-Exposed-Android-Devices-qdxzq5.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/malicious-tanstack-package-uses-postinstall-script-to-steal-developer-environment-files/</loc>
		<lastmod>2026-05-04T15:24:35+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/Malicious-Tanstack-Package-Uses-Postinstall-Script-to-Steal-Developer-Environment-Files-m5WeUg.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/bluekit-phishing-kit-automates-domains-2fa-lures-and-session-hijacking-in-one-panel/</loc>
		<lastmod>2026-05-04T16:12:16+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/Bluekit-Phishing-Kit-Automates-Domains-2FA-Lures-and-Session-Hijacking-in-One-Panel-X24Mec.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/new-microstealer-malware-actively-attacking-telecom-education-sectors/</loc>
		<lastmod>2026-05-04T16:28:54+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/New-MicroStealer-Malware-Actively-Attacking-Telecom-Education-Sectors-1XGEEQ.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/digicert-hacked-via-weaponized-screensaver-file-to-obtain-ev-code-signing-certificates/</loc>
		<lastmod>2026-05-04T17:50:41+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/DigiCert-Hacked-Screensaver-5lwgWM.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/critical-qualcomm-chipset-vulnerabilities-enables-remote-code-execution/</loc>
		<lastmod>2026-05-05T16:01:48+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/Critical-Qualcomm-Chipset-Vulnerabilities-Enables-Remote-Code-Execution-vjPKvg.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/critical-weaver-e-cology-rce-vulnerability-actively-exploited-in-attacks/</loc>
		<lastmod>2026-05-05T16:08:11+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/Critical-Weaver-E-cology-RCE-Vulnerability-Actively-Exploited-in-Attacks-zGBld3.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/cisco-to-acquire-astrix-security-to-strengthen-ai-agent-and-non-human-identity-security/</loc>
		<lastmod>2026-05-05T16:30:40+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/Cisco-to-Acquire-Astrix-Security-to-Strengthen-AI-Agent-and-Non-Human-Identity-Security-SaSQfi.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/gnutls-3-8-13-released-with-fix-for-12-vulnerabilities-affecting-network-communications/</loc>
		<lastmod>2026-05-05T16:36:40+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/GnuTLS-3.8.13-Released-with-Fix-for-12-Vulnerabilities-LN6105.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/low-noise-high-confidence-optimizing-soc-costs-with-better-threat-intelligence/</loc>
		<lastmod>2026-05-05T17:01:09+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/Reduce20SOC20Costs20with20Actionable20Threat20Intelligence-GXikSw.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/taiwan-high-speed-rail-hacked-using-radio-signal-spoofing-attack-that-halted-three-trains/</loc>
		<lastmod>2026-05-06T17:16:14+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/Taiwan-High-Speed-Rail-Hacked-Using-Radio-Signal-Spoofing-Attack-That-Halted-Three-Trains-zELQfO.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/argo-cds-serversidediff-vulnerability-enables-kubernetes-secret-extraction/</loc>
		<lastmod>2026-05-06T17:17:59+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/Argo-CDs-ServerSideDiff-Vulnerability-Enables-Kubernetes-Secret-Extraction-NQNmdb.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/member-of-prolific-russian-ransomware-group-sentenced-to-102-months-in-prison/</loc>
		<lastmod>2026-05-06T17:19:25+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/Member-of-Prolific-Russian-Ransomware-Group-Sentenced-to-102-Months-in-Prison-mZD2Fs.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/qlnx-targets-developers-with-credential-theft-designed-for-supply-chain-compromise/</loc>
		<lastmod>2026-05-06T17:55:36+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/QLNX-Targets-Developers-With-Credential-Theft-Designed-for-Supply-Chain-Compromise-cbwV0x.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/cloudz-rat-abuses-microsoft-phone-link-to-steal-sms-otps-and-mobile-notifications/</loc>
		<lastmod>2026-05-06T18:22:48+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/CloudZ-RAT-Abuses-Microsoft-Phone-Link-to-Steal-SMS-OTPs-and-Mobile-Notifications-U4Mhsg.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/scammers-use-short-lived-voip-numbers-and-reuse-windows-to-defeat-reputation-based-blocking/</loc>
		<lastmod>2026-05-07T12:53:52+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/Scammers-Use-Short-Lived-VoIP-Numbers-and-Reuse-Windows-to-Defeat-Reputation-Based-Blocking-EpjwZ5.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/hackers-using-fake-claude-ai-installer-pages-to-trick-users-into-running-malware-on-their-systems/</loc>
		<lastmod>2026-05-07T13:00:07+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/Hackers-Using-Fake-Claude-AI-Installer-Pages-to-Trick-Users-Into-Running-Malware-on-Their-Systems-6Ky8BC.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/new-cisco-network-vulnerability-let-remote-attacker-cause-dos-attack/</loc>
		<lastmod>2026-05-07T15:44:08+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/New-Cisco-Network-Vulnerability-Let-remote-attacker-cause-DoS-Attack-VTFbne.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/cisa-warns-of-palo-alto-pan-os-vulnerability-exploited-to-gain-root-access/</loc>
		<lastmod>2026-05-07T15:59:54+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/CISA-Warns-of-Palo-Alto-PAN-OS-Vulnerability-Exploited-to-Gain-Root-Access-kwtXRH.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/new-ivanti-epmm-0-day-vulnerability-actively-exploited-in-attacks/</loc>
		<lastmod>2026-05-07T16:29:53+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/Ivanti-EPMM-0-Day-Vulnerability-Exploited-1-T6aeGE.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/new-zichatbot-malware-uses-zulip-rest-apis-as-command-and-control-server/</loc>
		<lastmod>2026-05-08T14:06:50+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/New-ZiChatBot-Malware-Uses-Zulip-REST-APIs-as-Command-and-Control-Server-0gx6Ke.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/hackers-use-fake-openclaw-installer-to-steal-crypto-wallet-and-password-manager-credentials/</loc>
		<lastmod>2026-05-08T17:15:20+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/Hackers-Use-Fake-OpenClaw-Installer-to-Steal-Crypto-Wallet-and-Password-Manager-Credentials-1-9s6CBx.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/skoda-security-incident-exposes-customers-data-from-online-shop/</loc>
		<lastmod>2026-05-08T17:53:56+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/Skoda-Security-Incident-ULVOg4.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/hackers-deploy-modular-rat-with-credential-theft-and-screenshot-capture-capabilities/</loc>
		<lastmod>2026-05-08T19:01:42+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/Hackers-Deploy-Modular-RAT-With-Credential-Theft-and-Screenshot-Capture-Capabilities-7qdnYo.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/new-pamdoora-backdoor-attacking-linux-systems-to-steal-ssh-credentials/</loc>
		<lastmod>2026-05-08T19:12:46+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/New-PamDOORa-Backdoor-Attacking-Linux-Systems-to-Steal-SSH-Credentials-qOWIRh.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/critical-microsoft-365-copilot-vulnerabilities-expose-sensitive-information/</loc>
		<lastmod>2026-05-09T02:34:14+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/Microsoft-365-Copilot-Vulnerabilities-Data-ELfztd.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/lets-encrypt-halts-certificate-issuance-after-cross-signed-root-certificate-incident/</loc>
		<lastmod>2026-05-09T03:00:51+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/Lets-Encrypt-Halts-Certificate-Issuance-3ZX2D4.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/nvidia-data-breach-reportedly-exposes-personal-information-of-geforce-users/</loc>
		<lastmod>2026-05-09T03:33:48+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/NVIDIA-Confirms-GeForce-Data-Breach-Exposed-Users-Personal-Data-1-1-1-FVtgfA.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/tclbanker-malware-targets-users-through-self-propagating-whatsapp-and-outlook-worm-modules/</loc>
		<lastmod>2026-05-09T06:00:28+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/TCLBANKER-Malware-Targets-Users-Through-Self-Propagating-WhatsApp-and-Outlook-Worm-Modules-1-T3gsvd.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/new-cpanel-and-whm-flaws-enable-code-execution-dos-attacks/</loc>
		<lastmod>2026-05-10T05:25:15+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/cPanel-and-WHM-Flaws-gBwGy2.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/shinyhunters-breaches-instructure-canvas-lms-through-free-for-teacher-account-program/</loc>
		<lastmod>2026-05-11T13:21:11+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/ShinyHunters-Breaches-Instructure-Canvas-LMS-Through-Free-For-Teacher-Account-Program-iJRqU1.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/hackers-use-fake-deepseek-tui-github-repositories-to-deliver-malware/</loc>
		<lastmod>2026-05-11T15:11:31+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/Hackers-Use-Fake-DeepSeek-TUI-GitHub-Repositories-to-Deliver-Malware-u94Gyo.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/hackers-use-plugx-like-dll-sideloading-chain-in-fake-claude-malware-campaign/</loc>
		<lastmod>2026-05-11T15:55:58+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/Hackers-Use-PlugX-Like-DLL-Sideloading-Chain-in-Fake-Claude-Malware-Campaign-CFkTfy.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/google-warns-of-hackers-using-ai-to-create-working-zero-day-exploit/</loc>
		<lastmod>2026-05-11T16:04:42+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/AI-Zero-Day-Exploit-g5dcrT.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/popular-go-library-fsnotify-raises-supply-chain-alarms-after-maintainer-access-changes/</loc>
		<lastmod>2026-05-11T16:14:40+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/Popular-Go-Library-fsnotify-Raises-Supply-Chain-Alarms-After-Maintainer-Access-Changes-9evVG5.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/ivanti-patches-multiple-vulnerabilities-in-secure-access-xtraction-vtm-and-endpoint-manager/</loc>
		<lastmod>2026-05-12T17:12:34+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/Ivanti-Patches-Multiple-Vulnerabilities-b3J52T.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/open-webui-vulnerability-via-file-upload-leads-to-1-click-rce-attack/</loc>
		<lastmod>2026-05-12T17:27:54+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/Open-WebUI-Vulnerability-via-File-Upload-leads-to-1-Click-RCE-Attack-Wr14jF.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/critical-fortinet-fortisandbox-vulnerability-enables-code-execution-attacks/</loc>
		<lastmod>2026-05-12T17:45:54+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/Fortinet-FortiSandbox-Vulnerability-M9Gk2v.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/fortinet-patches-five-vulnerabilities-across-fortiap-fortios-and-enterprise-products/</loc>
		<lastmod>2026-05-12T17:58:50+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/Fortinet-Enterprise-Products-Vulnerabilities-QgMp8B.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/microsoft-patch-tuesday-may-2026-120-vulnerabilities-fixed-including-29-critical-rce-flaws/</loc>
		<lastmod>2026-05-12T18:40:46+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/Microsoft-Patch-Tuesday-May-2026-9TT2Jv.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/critical-sandboxjs-escape-vulnerability-enables-host-takeover/</loc>
		<lastmod>2026-05-13T10:30:21+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/Critical-SandboxJS-Escape-Vulnerability-Enables-Host-Takeover-WVBXpI.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/clickfix-evolves-with-10-year-old-open-source-python-socks5-proxy/</loc>
		<lastmod>2026-05-13T11:06:52+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/ClickFix-Evolves-with-10-Year-Old-Open-Source-Python-SOCKS5-Prox-ZSwpqV.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/fragnesia-linux-vulnerability-let-attackers-gain-root-privileges-poc-released/</loc>
		<lastmod>2026-05-13T13:48:15+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/Fragnesia-Linux-Vulnerability-LM7c3z.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/foxconn-confirms-cyberattack-after-nitrogen-ransomware-gang-claim/</loc>
		<lastmod>2026-05-13T14:18:25+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/Foxconn-Confirms-Cyberattack-JdW523.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/how-top-socs-and-mssps-prevent-phishing-incidents-missed-by-email-filters/</loc>
		<lastmod>2026-05-13T14:32:46+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/Prevent20Phishing20Incidents20Missed20by20Email20Filters-TtR5HV.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/anthropics-mythos-ai-reportedly-found-macos-vulnerabilities-that-could-bypass-apple-security/</loc>
		<lastmod>2026-05-14T17:42:02+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/Anthropics-Mythos-macOS-Vulnerabilities-vKHPjK.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/node-ipc-npm-package-with-822k-weekly-downloads-compromised-in-supply-chain-attack/</loc>
		<lastmod>2026-05-14T18:08:21+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/node-ipc-npm-Package-Compromised-f80Unl.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/new-malware-framework-enables-screen-control-browser-artifact-access-and-uac-bypass/</loc>
		<lastmod>2026-05-14T18:32:23+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/New-Malware-Framework-Enables-Screen-Control-Browser-Artifact-Access-and-UAC-Bypass-7mvf0f.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/chinese-apt-hackers-exploit-microsoft-exchange-to-breach-energy-sector-network/</loc>
		<lastmod>2026-05-14T20:01:59+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/Chinese-APT-Hackers-Exploit-Microsoft-Exchange-to-Breach-Energy-Sector-Network-K2b6YM.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/sandworm-hackers-pivot-from-compromised-it-systems-toward-critical-ot-assets/</loc>
		<lastmod>2026-05-14T20:14:42+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/Sandworm-Hackers-Pivot-From-Compromised-IT-Systems-Toward-Critical-OT-Assets-fLCoEP.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/microsoft-edge-windows-11-and-litellm-hacked-in-pwn2own-berlin-2026/</loc>
		<lastmod>2026-05-15T13:20:55+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/Microsoft-Edge-Windows-11-and-LiteLLM-hacked-in-Pwn2Own-Berlin-2026-2-a7uNVq.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/hackers-abuse-oauth-device-authorization-flow-to-steal-microsoft-365-tokens/</loc>
		<lastmod>2026-05-15T14:53:32+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/Hackers-Abuse-OAuth-Device-Authorization-Flow-to-Steal-Microsoft-365-Tokens-0xeVfY.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/shai-hulud-worm-steals-npm-github-aws-and-kubernetes-secrets-from-developers/</loc>
		<lastmod>2026-05-15T15:29:19+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/Shai-Hulud-Worm-Steals-npm-GitHub-AWS-and-Kubernetes-Secrets-From-Developers-4xRVMK.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/openclaw-chain-vulnerabilities-expose-245000-public-ai-agent-servers-to-attack/</loc>
		<lastmod>2026-05-15T15:41:39+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/OpenClaw-Chain-Vulnerabilities-DISPMP.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://hawkeyecybersecurity.com/gunra-ransomware-expands-raas-operations-after-shifting-from-conti-based-locker/</loc>
		<lastmod>2026-05-15T15:46:30+00:00</lastmod>
		<image:image>
			<image:loc>https://hawkeyecybersecurity.com/wp-content/uploads/2026/05/Gunra-Ransomware-Expands-RaaS-Operations-After-Shifting-From-Conti-Based-Locker-WObTkZ.webp</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->